cybersecurity: engineering a secure information technology organization, 1st edition

44
Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition Chapter 9 The Systems Security Engineering Capability Maturity Model (ISO 21827)

Upload: venice

Post on 07-Jan-2016

27 views

Category:

Documents


1 download

DESCRIPTION

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition. Chapter 9 The Systems Security Engineering Capability Maturity Model (ISO 21827). Objectives. Follow a staged enhancement process to increase system security capability - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Cybersecurity: Engineering a Secure Information Technology

Organization, 1st Edition

Chapter 9The Systems Security Engineering

Capability Maturity Model (ISO 21827)

Page 2: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

2© Cengage Learning 2015

Objectives

• Follow a staged enhancement process to increase system security capability

• Ensure capability maturity based on best practices• Assess supplier fitness based on specified capability

requirements• Assess internal capability based on a best-practice

model• Target critical areas of security need based on a

formal profile

Page 3: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

3© Cengage Learning 2015

Overview of the SSE-CMM

• The Systems Security Engineering Capability Maturity Model (SSE-CMM)– Also known as ISO/IEC 21827– Specifies a set of behaviors that an organization can

adopt to ensure secure system and software engineering practice

– Built around a staged grouping of security engineering best practices

– Specifies security engineering practices for the organization as a whole

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 4: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

4© Cengage Learning 2015

Overview of the SSE-CMM

• SSE-CCM ensures that appropriate interactions take place with other disciplines, such as:– System software and hardware– Human factors security– Test engineering– System management– Operations and maintenance

• The model provides recommendations to ensure acquisition, system management, certification, accreditation, and evaluation

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 5: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

5© Cengage Learning 2015

Overview of the SSE-CMM

• Security controls are divided into two areas:– Security Base Practice– Project and Organizational Base Practice

• Security Base Practice includes 11 high-level control areas with a number of underlying controls

• Project and Operational Base Practice also include 11 high-level control areas and their own control objectives

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 6: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

6© Cengage Learning 2014

Page 7: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

7© Cengage Learning 2015

Overview of the SSE-CMM

• The capability maturity of the 22 control areas can be judged using a five-level scale:– Level 1, Performed Informally– Level 2, Planned and Tracked– Level 3, Managed– Level 4, Quantitative Management– Level 5, Optimizing

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 8: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

8© Cengage Learning 2015

Overview of the SSE-CMM

• SSE-CMM allows an organization to manage product engineering risk at the organizational, enterprise, or project level

• Activities support managers, suppliers, buyers, developers, participants, and other stakeholders– By dictating a single set of key practices that can

help manage a broad variety of risks while developing and procuring systems and software

• The model helps improve the management of risks associated with purchasing or developing software or systems

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 9: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

9© Cengage Learning 2015

Overview of the SSE-CMM

• An organization can increase its security engineering capability using the SSE-CMM– Can use it to help develop, manufacture, test,

support, or maintain ICT systems and components• Best-practices of the SSE-CMM help stakeholders

develop a shared understanding of the relationships required to coordinate :– Schedules– Processes– Development practices

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 10: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

10© Cengage Learning 2015

Background: The SSE-CMM Collaboration

• SSE-CMM project grew out of a joint effort between government and industry– Was aimed at developing a model for security

engineering• Overall goal was to provide a mechanism for

selecting qualified security engineering suppliers– To underwrite overall capability-based assurance

• Originated at the National Security Agency (NSA) in 1993

• Eventually involved 42 companies and other government agencies

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 11: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

11© Cengage Learning 2015

Background: The SSE-CMM Collaboration

• The model was approved by the ISO as an international standard in 2002– A second edition was approved by the ISO in 2008

• The model can be used to evaluate best practices for enhanced system and software engineering capability– Makes it an excellent tool for determining supplier

abilities and to make decisions about threats and risks that might be present in a worldwide ICT supply chain

• Ability to ensure trust is essential for global businessCybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 12: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

12© Cengage Learning 2015

Background: The SSE-CMM Collaboration

• The final product of this effort was the registration of ISO 21827 as a full international standard in 2002

• The International System Security Engineering Association (ISSEA) was named as the assessor and registrar – For organizations wanted to accredit their systems and

software engineering processes to the standard

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 13: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

13© Cengage Learning 2015

Structure of the SSE-CMM/ISO 21827 Standard

• SSE-CMM is meant to support self-assessment• Assesses processes based on a defined set of key

functional elements and produces a set of ratings– Ratings are expressed in the form of a process

profile – Evaluate each process on a sliding scale

• SSE-CMM assessment greatly increases the level of trust in the ISO 12207-2008 acquisition process – By reducing uncertainty in supplier selection

• Suppliers can determine the capability maturity of their own system security processes

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 14: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

14© Cengage Learning 2015

Structure of the SSE-CMM/ISO 21827 Standard

• Allows customers to identify common security risks associated with a given procurement project

• Also allows customers to balance business needs, requirements, and estimated project costs– Against the known capability of competing suppliers

• SSE-CMM compares the actual security capability of a selected process against a target capability profile– The outcomes of that comparison help the

organization better identify missing or vulnerable security engineering functions

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 15: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

15© Cengage Learning 2015

The Base Practices of the SSE-CMM

• The SSE-CMM embodies a set of standard base practices– Formal practices to ensure that work is executed

correctly• Goal of base practices: to disconnect the security

engineering process from the practices associated with overall good management

• The model employs two dimensions called:– Domain dimension– Capability dimension

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 16: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

16© Cengage Learning 2015

The Base Practices of the SSE-CMM

• The domain dimension consists of all the base practices that collectively define security engineering– Requires the organization to have a formalized

security process in place• The capability dimension consists of standard best

practices to ensure correct process management– Apply across a wide range of domains– Represents activities that should normally occur

while executing security base practices

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 17: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

17© Cengage Learning 2015

The Base Practices of the SSE-CMM

• Related base practices are organized into common process areas for ease of use

• Process area: distinct collection of related practices with common features

• Each process area embodies a set of organizational actions intended to successfully carry out the purposes of base practice– Applies across the lifecycle of the enterprise and

does not overlap with other base practices

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 18: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

18© Cengage Learning 2015

The Base Practices of the SSE-CMM

• Each process area can be addressed as a distinct entity and can be implemented in multiple contexts throughout an organization and for various products

• Satisfying the purpose of the process is the first step in building process capability

• The model does stipulate that security objectives are achieved by executing the base practices that underlie each process area

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 19: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

19© Cengage Learning 2015

Project and Organizational Base Practices

• Project process areas are an important part of the SSE-CMM – They characterize actions that must be performed to

satisfy the generic security practice goals of the standard

• Each process area itemizes an explicit set of security activities that have to be carried out for the security engineering process to be considered secure

• The next few slides summarize some process areas

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 20: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

20© Cengage Learning 2015

Project and Organizational Base Practices

• PA12 - Ensure Quality - to address system quality and the quality of the process used to create the system– Actions specified in this process are used to

measure and improve quality• PA13 - Manage Configurations - to maintain the

status of all project configurations and to analyze/control changes to the system and its configurations

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 21: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

21© Cengage Learning 2015

Project and Organizational Base Practices

• PA14 - Manage Project Risks - to identify, assess, monitor, and mitigate risks to ensure the success of systems engineering activities– And the overall technical effort

• PA15 - Monitor and Control Technical Effort - contains the activities that control the project’s technical aspects– As well as its systems engineering effort– Activities include directing, tracking, and reviewing

the project’s accomplishments, results and risks

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 22: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

22© Cengage Learning 2015

Project and Organizational Base Practices

• PA16 - Plan Technical Effort - defines the plans that guide the project– Plans provide the basis for scheduling, costing,

controlling, tracking, and negotiating the technical work involved in system engineering

• PA17 - Define Systems Engineering Process - specifies and manages the organization’s standard system engineering

• PA18 - Improve Systems Engineering Process - describes continuing activities to measure and improve systems engineering

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 23: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

23© Cengage Learning 2015

Project and Organizational Base Practices

• PA19 - Manage Product Line Evolution - ensures that product development efforts achieve their strategic business purposes– Covers the practices associated with managing a

product line, but not the product engineering itself• PA20 - Manage Systems Engineering Support

Environment - applies to systems engineering support at both the project and organization level– The aim of this area is to maximize support

capability

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 24: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

24© Cengage Learning 2015

Project and Organizational Base Practices

• PA21 - Provide Ongoing Skills and Knowledge - provides training for the organization’s security engineering to ensure that project personnel have the necessary knowledge and skills to achieve objectives

• PA22 - Coordinate with Suppliers - to manage work done by other organizations based on a defined process– Other organizations include vendors, subcontractors,

and partners

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 25: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

25© Cengage Learning 2015

Assuring an Organization’s System Security Engineering Capability

• The SSE-CMM is meant to provide a general set of criteria for security best practice– Can be used to assess the security status of

software and system engineering processes• Organizations perform the evaluation by

determining the presence or absence of a set of security best practices– The comparison is then used to plan, manage,

monitor, control, and improve the security of all technical processes in the 12207-2008 standard

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 26: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

26© Cengage Learning 2015

Assuring an Organization’s System Security Engineering Capability

• At the management level– The SSE-CMM generates practical information that

allows decision makers to evaluate security of software operation against business needs

• The model focuses on process assessment, process improvement, and capability determination

• SSE-CMM is useful for supply chain risk assessment– Assurance that a chain of suppliers is functioning

properly

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 27: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

27© Cengage Learning 2015

Assuring an Organization’s System Security Engineering Capability

• The SSE-CMM’s documentation and its baseline security practices are linked to the concepts in process areas of ISO 12207-2008

• Process domains for systems and software engineering in the SSE-CMM are the same as those covered by 12207:– Acquisition – Supply– Technical and implementation processes– Project, project-enabling, and supporting processes

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 28: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

28© Cengage Learning 2015

Architectural Components of the SSE-CMM

• SSE-CMM implements two hierarchies:– The first consists of the traditional set of process

categories, composed of base practices– Processes are then rated in terms of a second

“assessment” hierarchy based on capability levels• The base practices represent unique actions taken

within the process– Have to be performed in order to achieve the

purposes of the process• The model requires an organization to judge

whether each practice is being executed correctlyCybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 29: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

29© Cengage Learning 2014

Page 30: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

30© Cengage Learning 2015

Process Capability Assessment

• Capability level: the assessed level of competency for the execution of a practice

• Capability levels create a way of progressing through the improvement of any given process

• The reference model has six levels:– Incomplete– Performed– Managed– Established– Predictable– Optimizing

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 31: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

31© Cengage Learning 2015

Process Capability Assessment

• Process maturity: the level of capability of a process based on practices and common features

• Escalating levels of process maturity are built on a foundation of increasingly capable practices

• Each process maturity level provides a major enhancement in capability from the process provided by its predecessors

• The successful satisfaction of a capability level within one process may require the presence of another process

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 32: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

32© Cengage Learning 2015

Process Capability Assessment

• The SSE-CMM capability levels:– Incomplete - the process has no easily identifiable

work products or outputs– Performed - base practices of the process are

generally performed• Their performance might not be rigorously planned

and tracked– Managed - performance is planned and tracked, and

the organization verifies that practices were performed according to specified procedures

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 33: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

33© Cengage Learning 2015

Process Capability Assessment

• The SSE-CMM capability levels (cont’d):– Established - base practices are performed

according to a well-defined process using approved, tailored versions of standards and documented processes

– Predictable - execution of the process is fully reliable because detailed measures of performance are collected and analyzed

– Optimizing - organization establishes goals for determining the effectiveness of quantitative processes based on goals

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 34: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

34© Cengage Learning 2015

Process Capability Evaluations

• SSE-CMM processes probably exist at different levels of capability in most organizations

• The order of the actions initiated at each capability level is necessary – Certain activities must be performed before other

actions can be effective• Common features: correct characteristics of a

practice that can be confirmed by observation• The SSE-CMM has common features that address

a specific aspect of process implementation

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 35: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

35© Cengage Learning 2015

Process Capability Evaluations

• Common features and their required activities provide a baseline for improving process capability

• The generic base and organizational practices grouped into each common feature provide a basis for understanding the actions required to achieve a given capability level

• If some requirements were not achieved for a common feature at a given capability level:– The assessment shows where the organization is

operating at the lowest completed capability level

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 36: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

36© Cengage Learning 2015

Process Capability Evaluations

• The capability levels of the SSE-CMM are based on a set of defined base and organizational practices

• Organizations can identify an explicit sequence for implementing these practices– But the order is not implicit in the model itself

• The capabilities needed for any given process depend on its context– Context influences the degree to which an auditor

can compare the overall results of a process maturity assessment with required practice

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 37: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

37© Cengage Learning 2015

Determining Capability Using the SSE-CMM Assessment Model

• The SSE-CMM assessment model can give an organization an overall rating of capability maturity– Or it can provide an assessment of the capability of

a specific process instance• A process instance is a unique occurrence of a

process– Can be used to ensure repeatability

• Practice adequacy is a rating of the extent to which a practice meets its purpose

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 38: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

38© Cengage Learning 2015

Determining Capability Using the SSE-CMM Assessment Model

• The results of practice adequacy assessment support the organization’s overall business requirements– Helps managers decide whether the processes are

effective in achieving their goals– Helps identify significant causes of poor quality or

time and cost overruns– Helps set priorities for improving the process

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 39: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

39© Cengage Learning 2015

The SSE-CMM Assessment Process

• Overall aim of the assessment process is to make an organization’s base practices:– Repeatable– Reliable– Consistent

• Base practices enable an organization to take objective measurements of SSE-CMM processes– By stipulating a comprehensive set of activities that

indicate capability

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 40: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

40© Cengage Learning 2015

The SSE-CMM Assessment Process

• Considerations when using the model to improve security engineering:– How the assessment results are interpreted and

applied– How the model’s best practices are implemented as a

result of that interpretation– How the implementation is measured and judged to be

effective– How the organization can make a business case from

the assessment results– How an organization can create and sustain a culture

of improving capability and security

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 41: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

41© Cengage Learning 2015

Using Targeted Assessments to Ensure Supplier Capability

• Organizations can use the SSE-CMM to determine supplier capability– By comparing perceived risks against potential

return on investment• A supplier capability assessment can also provide

trust for complex situations and future projects• SSE-CMM helps the customer rate potential

suppliers against target capability levels– Customer can see potential gaps in a supplier’s

security engineering and other capabilities

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 42: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

42© Cengage Learning 2015

Using Targeted Assessments to Ensure Supplier Capability

• A capability assessment can be used to tell:– The supplier what risks are associated with a new

project– The customer whether the supplier’s system security

engineering is trustworthy• The ability of suppliers and customers to know the

above provides them with a major competitive advantage for doing business in a global economy

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Page 43: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

43© Cengage Learning 2015

Summary• Organizations should perform a set of prescribed

activities to ensure that they have secure engineering• Each organization creates a protection to describe the

base practices it will assess• Base practices specify the what but not the how of

system engineering• In addition to base practices, the other common

features of the SSE-CMM are the organizational practices

Page 44: Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition

44© Cengage Learning 2015

Summary• The context and situation are important when defining

the actual form of a base practice• An organization can apply a standard process to

evaluate its capability maturity in system security engineering

• An organization can use the SSE-CMM to determine supplier capability; these determinations can establish trust in a global outsourced environment