methodological findings from applying stpa in cyber...

17
This informa,on is exempt under the Freedom of Informa,on Act 2000 (FOIA) and may be exempt under other UK informa,on legisla,on. Refer any FOIA queries to [email protected]. All material is UK Crown Copyright © Methodological Findings from Applying STPA in Cyber Security Case Studies Dr Anna G. – Sociotechnical Security Researcher UK Na,onal Cyber Security Centre

Upload: others

Post on 16-Nov-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Methodological Findings from Applying STPA in Cyber ...psas.scripts.mit.edu/home/wp-content/uploads/2019/04/1...2019/04/01  · in Cyber Security Case Studies • Intro to the role

Thisinforma,onisexemptundertheFreedomofInforma,onAct2000(FOIA)andmaybeexemptunderotherUKinforma,onlegisla,on.ReferanyFOIAqueriestoncscinfoleg@ncsc.gov.uk.AllmaterialisUKCrownCopyright©

Methodological Findings from Applying STPA in Cyber Security Case Studies DrAnnaG.–SociotechnicalSecurityResearcherUKNa,onalCyberSecurityCentre

Page 2: Methodological Findings from Applying STPA in Cyber ...psas.scripts.mit.edu/home/wp-content/uploads/2019/04/1...2019/04/01  · in Cyber Security Case Studies • Intro to the role

Thisinforma,onisexemptundertheFreedomofInforma,onAct2000(FOIA)andmaybeexemptunderotherUKinforma,onlegisla,on.ReferanyFOIAqueriestoncscinfoleg@ncsc.gov.uk.AllmaterialisUKCrownCopyright©

Methodological Findings from Applying STPA in Cyber Security Case Studies

•  IntrototheroleoftheUKNa,onalCyberSecurityCentre(NCSC)

•  OurWorkwithSTAMPandSTPA

•  MethodologicalFindings:-  TypeBScenarioGenera,on

-  Documenta,onofaddi,onalinforma,onsuchassubsystemstatesandcondi,ons

Page 3: Methodological Findings from Applying STPA in Cyber ...psas.scripts.mit.edu/home/wp-content/uploads/2019/04/1...2019/04/01  · in Cyber Security Case Studies • Intro to the role

Thisinforma,onisexemptundertheFreedomofInforma,onAct2000(FOIA)andmaybeexemptunderotherUKinforma,onlegisla,on.ReferanyFOIAqueriestoncscinfoleg@ncsc.gov.uk.AllmaterialisUKCrownCopyright©

UKNa&onalCyberSecurityCentre

Actasabridgebetweenindustry,governmentandacademia

Unifiedsourceofadvice,guidanceandsupportoncybersecurity

MIT STAMP Conference March 26th 2019

SociotechnicalSecurityGroup

Cybersecurityresearchinprac,ce

Sociotechnicallensoncybersecurityproblems

Mul,disciplinary

Vision:TomaketheUKthe

safestplacetoliveandworkonline

Interac,onsbetweenpeople,technology,organisa,onsand

processes

Page 4: Methodological Findings from Applying STPA in Cyber ...psas.scripts.mit.edu/home/wp-content/uploads/2019/04/1...2019/04/01  · in Cyber Security Case Studies • Intro to the role

Thisinforma,onisexemptundertheFreedomofInforma,onAct2000(FOIA)andmaybeexemptunderotherUKinforma,onlegisla,on.ReferanyFOIAqueriestoncscinfoleg@ncsc.gov.uk.AllmaterialisUKCrownCopyright©

Our Work with STAMP and STPA

RiskFrameworks–CoreResearchQues&ons:

Dowehavetherightmixoftools/techniques/frameworks

forthecybersecurityproblemsoftodayandinthefuture?

Ifnot,whatdoweneedtoensure

ourcybersecurityrisktoolboxisfitforthecybersecurityproblemsoftoday

andinthefuture?

MIT STAMP Conference March 26th 2019

Systemstheore,capproachestocybersecurityrisk,

andSTAMPinpar,cular,shouldbepartofourcybersecurity

risktoolbox.

Page 5: Methodological Findings from Applying STPA in Cyber ...psas.scripts.mit.edu/home/wp-content/uploads/2019/04/1...2019/04/01  · in Cyber Security Case Studies • Intro to the role

Thisinforma,onisexemptundertheFreedomofInforma,onAct2000(FOIA)andmaybeexemptunderotherUKinforma,onlegisla,on.ReferanyFOIAqueriestoncscinfoleg@ncsc.gov.uk.AllmaterialisUKCrownCopyright©

Our Work with STAMP and STPA Exploringapplicabilitytoavarietyofdifferentusecases:

Tradi&onalcybersecurityscenarios

•  EnterpriseITinfrastructure

Jointsafetyandcybersecuritycontexts•  Automated/connectedproducts

•  Industrialcontrolsystems•  Cri,calna,onalinfrastructure

NumberofcasestudiesworkingwithUKstakeholdersinvolvingsystemsindesignandinopera&ons

MIT STAMP Conference March 26th 2019

Page 6: Methodological Findings from Applying STPA in Cyber ...psas.scripts.mit.edu/home/wp-content/uploads/2019/04/1...2019/04/01  · in Cyber Security Case Studies • Intro to the role

Thisinforma,onisexemptundertheFreedomofInforma,onAct2000(FOIA)andmaybeexemptunderotherUKinforma,onlegisla,on.ReferanyFOIAqueriestoncscinfoleg@ncsc.gov.uk.AllmaterialisUKCrownCopyright©

Illustrative Example – Drone

MIT STAMP Conference March 26th 2019

KeyPoints-  Casestudyinvolvinganautomatedproductin

design

-  Userinterfacesuchasasmartdevice

-  Safetyandsecurityconcerns-  CompletedseveralSTPAitera,ons-  IncreasinglydetailedandcomplexHCS

Page 7: Methodological Findings from Applying STPA in Cyber ...psas.scripts.mit.edu/home/wp-content/uploads/2019/04/1...2019/04/01  · in Cyber Security Case Studies • Intro to the role

Thisinforma,onisexemptundertheFreedomofInforma,onAct2000(FOIA)andmaybeexemptunderotherUKinforma,onlegisla,on.ReferanyFOIAqueriestoncscinfoleg@ncsc.gov.uk.AllmaterialisUKCrownCopyright©MIT STAMP Conference March 26th 2019

Controller

Controlledprocess

Controlac,ons Feedback

ControlAlgorithm

ProcessModel

TypeA

TypeB

Methodological Findings: Type B Scenario Generation WhywouldanUnsafeControlAc,onoccur?

Whywouldcontrolac,onsbeimproperlyexecutedornotexecuted,leadingtohazard?

STPAStep4:Iden,fyLossScenariosandRequirementsOuroriginalmethodappliedincasestudies-  TakeeachindividualUCAiden,fiedinStep3-  ApplyTypeAscenariothinkingtotheUCA-  ApplyTypeBscenariothinkingtotheUCAToolimited-  TypeBscenarioslinkeddirectlytohazard-  CanapplyTypeBtocontrolac,onsButnotwanttoloserela,onshipbetweenUCAsandbothtypesofscenarios

Page 8: Methodological Findings from Applying STPA in Cyber ...psas.scripts.mit.edu/home/wp-content/uploads/2019/04/1...2019/04/01  · in Cyber Security Case Studies • Intro to the role

Thisinforma,onisexemptundertheFreedomofInforma,onAct2000(FOIA)andmaybeexemptunderotherUKinforma,onlegisla,on.ReferanyFOIAqueriestoncscinfoleg@ncsc.gov.uk.AllmaterialisUKCrownCopyright©MIT STAMP Conference March 26th 2019

Type B Scenario Generation How to generate the broadest range of Type B scenarios to inform subsequent requirements? Adjustedmethodologyappliedincasestudies:-  TakeeachindividualUCAiden,fiedinStep3-  ApplyTypeAscenariothinkingtotheUCA-  ApplyTypeBscenariothinkingtotheUCA-  ApplyTypeBscenariothinkingtothecontrolac,on

asawhole-  ConsiderrequirementsgeneratedfrombothTypeA

andBscenariosappliedtotheindividualUCAswhengenera,ngrequirementstomi,gateTypeBscenariosfromcorrespondingControlAc,on

Illustra&veDroneExample

CA.1Take-offCA.2Land

CA.3PairsmartdeviceCA.4Unpairsmartdevice

CA.5Take-offCA.6Land

CA.7PairsmartdeviceCA.8Unpairsmartdevice

CA.9PairsmartdeviceCA.10Revokesmartdevice

User

Interface(SmartDevice)

InternalAutomatedController

CentralManagementSubsystem

CA.11Pairsmartdevice

CA.12Revokesmartdevice

Page 9: Methodological Findings from Applying STPA in Cyber ...psas.scripts.mit.edu/home/wp-content/uploads/2019/04/1...2019/04/01  · in Cyber Security Case Studies • Intro to the role

Thisinforma,onisexemptundertheFreedomofInforma,onAct2000(FOIA)andmaybeexemptunderotherUKinforma,onlegisla,on.ReferanyFOIAqueriestoncscinfoleg@ncsc.gov.uk.AllmaterialisUKCrownCopyright©MIT STAMP Conference March 26th 2019

Interplay between Type A and Type B Scenarios and Requirements Illustra&veDrone

ExampleTypeBScenarioanalysisappliedtoCA.5‘Take-off’andCA.6‘Land’

Serial From To Ac&on TypeBScenarioDescrip&on Hazard Addi&onalRequirements

CA.5 Interface(SmartDevice)

InternalAutomatedController

Take-off

Thesescenariosrefertoasitua,oninwhichthecommandsarenotac,oned.Thiscouldoccurduetoafailureinthecontrolpath,eitherbyamaliciousactorjammingtheconnec,on,orbyatechnicalfailure.Thereisalsoapossibilitythatlegi,matecommandsfromtheuserwouldbecountermandedinthecontrolpathbyaspoofedsmartdevice.Theseriskshavealreadybeenmi,gatedbyR3.5andR.3.9.

H.02,H.03

None–exposureto

hazardmi,gatedbyexis,ng

requirements.

CA.6 Interface(SmartDevice)

InternalAutomatedController

Land

CA.1Take-offCA.2Land

CA.3PairsmartdeviceCA.4Unpairsmartdevice

CA.5Take-offCA.6Land

CA.7PairsmartdeviceCA.8Unpairsmartdevice

CA.9PairsmartdeviceCA.10Revokesmartdevice

User

Interface(SmartDevice)

InternalAutomatedController

CentralManagementSubsystem

CA.11Pairsmartdevice

CA.12Revokesmartdevice

Page 10: Methodological Findings from Applying STPA in Cyber ...psas.scripts.mit.edu/home/wp-content/uploads/2019/04/1...2019/04/01  · in Cyber Security Case Studies • Intro to the role

Thisinforma,onisexemptundertheFreedomofInforma,onAct2000(FOIA)andmaybeexemptunderotherUKinforma,onlegisla,on.ReferanyFOIAqueriestoncscinfoleg@ncsc.gov.uk.AllmaterialisUKCrownCopyright©MIT STAMP Conference March 26th 2019

Interplay between Type A and Type B Scenarios and Requirements Illustra&veDrone

Example

TypeBScenarioanalysisappliedtoCA.12RevokesmartdeviceSerial From To Ac&on TypeBScenarioDescrip&on Hazard Addi&onal

Requirements

CA.12 CentralManage-mentSubsystem

InternalAutomatedController

Revokesmartdevice

InthisscenariotheCA‘Revokesmartdevice’isnotreceivedorac,onedbytheInternalAutomatedController.Thiscouldallowcontrolac,onsfromastolenorspoofedsmartdevicetocon,nuetoexertcontroloverthedrone.Currentlycommandsfromthesmartdeviceandthecentralmanagementsystemcouldbereceivedcontemporaneouslyandthosefromthesmartdevicecouldbeac,oned,overridingthosefromthecentralmanagementsystem.Mi,ga,onwouldbetoprivilegethecommandsfromthecentralmanagementsubsystemoverothercontrollers.

H.01,H.05

R.3.28Thereshouldbea

mechanismtoensurethatcommandsfromtheCentral

ManagementSystemare

givenprecedence

overcommandsfromothercontrollers.

CA.1Take-offCA.2Land

CA.3PairsmartdeviceCA.4Unpairsmartdevice

CA.5Take-offCA.6Land

CA.7PairsmartdeviceCA.8Unpairsmartdevice

CA.9PairsmartdeviceCA.10Revokesmartdevice

User

Interface(SmartDevice)

InternalAutomatedController

CentralManagementSubsystem

CA.11Pairsmartdevice

CA.12Revokesmartdevice

Page 11: Methodological Findings from Applying STPA in Cyber ...psas.scripts.mit.edu/home/wp-content/uploads/2019/04/1...2019/04/01  · in Cyber Security Case Studies • Intro to the role

Thisinforma,onisexemptundertheFreedomofInforma,onAct2000(FOIA)andmaybeexemptunderotherUKinforma,onlegisla,on.ReferanyFOIAqueriestoncscinfoleg@ncsc.gov.uk.AllmaterialisUKCrownCopyright©MIT STAMP Conference March 26th 2019

Interplay between Type A and Type B Scenarios and Requirements Whatdidthisapproachgiveus?

-  Broadbasisforgenera,ngbothtypesofscenariosandcorrespondingrequirements

-  U,lityinprac,ceofconsideringthepoten,alexposure

tohazardfromdifferentdirec,ons

-  Foundnewscenariosandaddi,onalrequirements

-  InterplaybetweenscenariosandrequirementsgeneratedfromindividualUCAsandthecontrolac,ontheUCAisderivedfrom

Requirement Derivedfrom: Connec&ontoHazard

R3.5 UCA3.2-TypeACA.5-TypeBCA.6-TypeB

H.02H.03

R3.9 UCA3.2-TypeACA.5-TypeBCA.6-TypeB

H.02H.03

R3.28 CA.12-TypeB H.01H.05

…… ….. ……

-  Traceabilityofrequirementstomul,plescenariosandexposuretohazard

-  Addedweighttonecessityofrequirementswhencommunica,ngfindings

Page 12: Methodological Findings from Applying STPA in Cyber ...psas.scripts.mit.edu/home/wp-content/uploads/2019/04/1...2019/04/01  · in Cyber Security Case Studies • Intro to the role

Thisinforma,onisexemptundertheFreedomofInforma,onAct2000(FOIA)andmaybeexemptunderotherUKinforma,onlegisla,on.ReferanyFOIAqueriestoncscinfoleg@ncsc.gov.uk.AllmaterialisUKCrownCopyright©

Methodological Findings: Documentation of Subsystem States / Conditions • CaseStudyExampleKeyPoints:-  Automatedproductindesign-  Safetyandsecurityconcerns-  Geo-fencedperimeterforlanding-  Importanceof:•  Sequencingofavailablecontrolac,ons•  Movingbetweenstatesof‘Disabled’,‘FlightMode’,‘StandbyPassive’and‘StandbyAc,ve’

MIT STAMP Conference March 26th 2019

User

Interface(SmartDevice)

InternalAutomatedController

PhysicalProcesses

CA.Checklandingarea(whenin‘Standby

Passive’)CA.Land(whenin‘StandbyActive’)

F.Landingareaclear(i.e.changeto

‘StandbyActive’)/Notclear

(i.e.remainin‘StandbyPassive’)

Landed/Notlanded

CA.Land

CA.Land

GeolocationDetectionSubsystem

CA.Providegeolocation

status

F.Withinperimeter(i.e.changeto

‘StandbyPassive’)/Notwithinperimeter(i.eremainin‘Flight

Mode’)

F.Landed/Notlanded/Drone

Status

F.Landed/Notlanded/Drone

Status

Illustra&veDrone

Example

Page 13: Methodological Findings from Applying STPA in Cyber ...psas.scripts.mit.edu/home/wp-content/uploads/2019/04/1...2019/04/01  · in Cyber Security Case Studies • Intro to the role

Thisinforma,onisexemptundertheFreedomofInforma,onAct2000(FOIA)andmaybeexemptunderotherUKinforma,onlegisla,on.ReferanyFOIAqueriestoncscinfoleg@ncsc.gov.uk.AllmaterialisUKCrownCopyright©

Documentation of Subsystem States / Conditions From To Control

Ac&onWhenthiscondi&onistrue:

Feedback Changetostatus?

User Interface Land StandbyPassiveorStandbyAc,ve

LandedNotLandedDroneStatus

N/A

AutomatedInternalController

Geoloca,onDetec,onSubsystem

Providegeoloca,onstatus

Allstates WithinperimeterNotwithinperimeter

StandbyPassiveNochange

AutomatedInternalController

PhysicalProcesses

Checklandingarea

StandbyPassive

LandingareaclearNotclear

StandbyAc,veNochange

AutomatedInternalcontroller

PhysicalProcesses

Land StandbyAc,ve

LandedNotlanded

N/A

MIT STAMP Conference March 26th 2019

User

Interface(SmartDevice)

InternalAutomatedController

PhysicalProcesses

CA.Checklandingarea(whenin‘Standby

Passive’)CA.Land(whenin‘StandbyActive’)

F.Landingareaclear(i.e.changeto

‘StandbyActive’)/Notclear

(i.e.remainin‘StandbyPassive’)

Landed/Notlanded

CA.Land

CA.Land

GeolocationDetectionSubsystem

CA.Providegeolocation

status

F.Withinperimeter(i.e.changeto

‘StandbyPassive’)/Notwithinperimeter(i.eremainin‘Flight

Mode’)

F.Landed/Notlanded/Drone

Status

F.Landed/Notlanded/Drone

Status

Illustra&veDrone

Example

Page 14: Methodological Findings from Applying STPA in Cyber ...psas.scripts.mit.edu/home/wp-content/uploads/2019/04/1...2019/04/01  · in Cyber Security Case Studies • Intro to the role

Thisinforma,onisexemptundertheFreedomofInforma,onAct2000(FOIA)andmaybeexemptunderotherUKinforma,onlegisla,on.ReferanyFOIAqueriestoncscinfoleg@ncsc.gov.uk.AllmaterialisUKCrownCopyright©

Documentation of Subsystem States / Conditions From To Control

Ac&onWhenthiscondi&onistrue:

Feedback Changetostatus?

User Interface Land StandbyPassiveorStandbyAc,ve

LandedNotLandedDroneStatus

N/A

AutomatedInternalController

Geoloca,onDetec,onSubsystem

Providegeoloca,onstatus

Allstates WithinperimeterNotwithinperimeter

StandbyPassiveNochange

AutomatedInternalController

PhysicalProcesses

Checklandingarea

StandbyPassive

LandingareaclearNotclear

StandbyAc,veNochange

AutomatedInternalcontroller

PhysicalProcesses

Land StandbyAc,ve

LandedNotlanded

N/A

MIT STAMP Conference March 26th 2019

Helpsdefinewhatop,onsareavailableunderwhatcondi,ons

toformpartofControlAlgorithmofaController

HelpsdefinewhatfeedbackaControllerneedsforitsProcessModelandwhatitneedstoknowaboutthestateofthesystem

Page 15: Methodological Findings from Applying STPA in Cyber ...psas.scripts.mit.edu/home/wp-content/uploads/2019/04/1...2019/04/01  · in Cyber Security Case Studies • Intro to the role

Thisinforma,onisexemptundertheFreedomofInforma,onAct2000(FOIA)andmaybeexemptunderotherUKinforma,onlegisla,on.ReferanyFOIAqueriestoncscinfoleg@ncsc.gov.uk.AllmaterialisUKCrownCopyright©

Documentation of Subsystem States / Conditions

From To ControlAc&on Whenthiscondi&onistrue:

Feedback Changetostatus?

User Interface Land StandbyPassiveorStandbyAc,ve

LandedNotLandedDroneStatus

N/A

AutomatedInternalController

Geoloca,onDetec,onSubsystem

Providegeoloca,onstatus

Allstates WithinperimeterNotwithinperimeter

StandbyPassiveNochange

AutomatedInternalController

PhysicalProcesses

Checklandingarea

StandbyPassive LandingareaclearNotclear

StandbyAc,veNochange

AutomatedInternalcontroller

PhysicalProcesses

Land StandbyAc,ve LandedNotlanded

N/A

MIT STAMP Conference March 26th 2019

Addi,onalinforma,ontoberecorded:-  Subsystemstates-  Condi,onsthatmustbetruefortransi,onsbetween

suchstates-  Subsequentchangestostatusdependentonwhat

feedbackisreceived

Mayhelpanalysttospot:-  Missingsubsystemstates-  Missingcondi,onsnecessaryfortransi,ons-  Sequencingerrorsleadingtohazard

Mayhelpanalysttogenerate:-  UCAs-  Lossscenarios-  Requirementstomi,gateexposuretohazard

Dependentonsystemunderanalysis-  Levelofcomplexity/detailoftheHCS-  Numberofsubsystemstates/condi,ons

Page 16: Methodological Findings from Applying STPA in Cyber ...psas.scripts.mit.edu/home/wp-content/uploads/2019/04/1...2019/04/01  · in Cyber Security Case Studies • Intro to the role

Thisinforma,onisexemptundertheFreedomofInforma,onAct2000(FOIA)andmaybeexemptunderotherUKinforma,onlegisla,on.ReferanyFOIAqueriestoncscinfoleg@ncsc.gov.uk.AllmaterialisUKCrownCopyright©

Our Next Steps

•  Con,nuetodeepenourunderstandingofSTAMP(STPAandCAST)inrela,ontocybersecurity

•  Provideadviceandguidanceasapplicableacrossourbroadremit

•  Expandthesystemstheore,capproachesavailableinourcybersecurityrisktoolbox

MIT STAMP Conference March 26th 2019

Page 17: Methodological Findings from Applying STPA in Cyber ...psas.scripts.mit.edu/home/wp-content/uploads/2019/04/1...2019/04/01  · in Cyber Security Case Studies • Intro to the role

Thisinforma,onisexemptundertheFreedomofInforma,onAct2000(FOIA)andmaybeexemptunderotherUKinforma,onlegisla,on.ReferanyFOIAqueriestoncscinfoleg@ncsc.gov.uk.AllmaterialisUKCrownCopyright©

Ques&ons?

Contact:[email protected]

MIT STAMP Conference March 26th 2019