risk monitoring of a pseudonymisation service based on trick

17
Risk monitoring of a pseudonymisation service based on TRICK Service Speaker: Ben Fetler Authors: Ben Fetler, Steve Muller

Upload: tranquynh

Post on 10-Feb-2017

221 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Risk monitoring of a pseudonymisation service based on TRICK

Ri sk mon i t o r i n g o f a pseudo n ym i s a t i o nse r v i ce based on TRICK Se r v i ce

Speaker: Ben FetlerAuthors: Ben Fetler, Steve Muller

Page 2: Risk monitoring of a pseudonymisation service based on TRICK

Real-­time risk assessment

Conclusion and outlook

Introduction to TRICK Service & ÉpStan project

Agenda

SASSI Workshop 2015 2 / 17

Page 3: Risk monitoring of a pseudonymisation service based on TRICK

Tool for Risk management of an ISMS based on a Central Knowledge base

IntroductionTRICK Service

SASSI Workshop 2015 3 / 17

Page 4: Risk monitoring of a pseudonymisation service based on TRICK

• Risk management following ISO/IEC 27005;;

• Quantitative assessment of likelihood and impact of different risk scenarios;;

• Use of a “Risk Reduction Factor” (RRF) which enables to quantify the influence of security measures on the losses caused by threats to assets;;

• Cost-­effectiveness of security controls;; TRICK Service considers the Return On Security Investment (ROSI) and derives a prioritised action plan.

Core principles

TRICK ServiceIntroduction

SASSI Workshop 2015 4 / 17

Page 5: Risk monitoring of a pseudonymisation service based on TRICK

Luxembourg’s national school monitoring programme

IntroductionÉpStan

SASSI Workshop 2015 5 / 17

Page 6: Risk monitoring of a pseudonymisation service based on TRICK

Requirement:University and Ministry shall not make link between results and student.

Solution:Involve a trusted third party (TTP) offering a pseudonymisation service.

IntroductionÉpStan

SASSI Workshop 2015 6 / 17

Page 7: Risk monitoring of a pseudonymisation service based on TRICK

IntroductionÉpStan

SASSI Workshop 2015 7 / 17

statistics

(anonymized,aggregated)statistics

logins

link «login – pseudonym»generates pseudo-­nym for each student(validity: infinite)

generates logins (validity: 1 year)

test score by login

only pseudonym only personal data (name, ID)

Test Evaluator Student ManagementTrusted third party

Page 8: Risk monitoring of a pseudonymisation service based on TRICK

Real-­time risk assessmentRisk computation

SASSI Workshop 2015 8 / 17

𝑅𝑖𝑠𝑘(𝑎𝑠𝑠𝑒𝑡) = + 𝐼𝑚𝑝𝑎𝑐𝑡 ⋅ 𝑃𝑟𝑜𝑏𝑎𝑏𝑖𝑙𝑖𝑡𝑦 ⋅ 𝑅𝑖𝑠𝑘𝑅𝑒𝑑𝑢𝑐𝑡𝑖𝑜𝑛:;<=>?@A

Damage caused to asset in scenario

Probability that scenario occurs

Reduction of risk caused by implementation of additional security measures (factor between 0 and 1)

Dynamically

Page 9: Risk monitoring of a pseudonymisation service based on TRICK

Real-­time risk assessmentStrategy

SASSI Workshop 2015 9 / 17

Vulnerability assessment tool

Intrusion detection system

Vulnerability scanner

Handled device WorkStation Server

Communication hardware

Log server

Log processing utility

Page 10: Risk monitoring of a pseudonymisation service based on TRICK

Real-­time risk assessmentLog processing utility

SASSI Workshop 2015 10 / 17

• Pr [𝑐𝑎𝑡𝑒𝑔𝑜𝑟𝑦] increases with each log entry(the higher the severity, the higher the increase)

• Pr [𝑐𝑎𝑡𝑒𝑔𝑜𝑟𝑦] decreases with time

ddos,7/10log entries

Category Probabilityddos Pr 𝑑𝑑𝑜𝑠

malware Pr [𝑚𝑎𝑙𝑤𝑎𝑟𝑒]diskfailure Pr [𝑑𝑖𝑠𝑘𝑓𝑎𝑖𝑙𝑢𝑟𝑒]

... ...

CATEGORY

SEVERITY ddos,7/10ddos

0.71

Page 11: Risk monitoring of a pseudonymisation service based on TRICK

Real-­time risk assessmentPoC -­ Intrusion detection system

SASSI Workshop 2015 11 / 17

Handled device

IDS Log processing utility TRICK API TRICK Database

Alert Classify:Category, severity

Create notification:Category, severity, timestamp

Store into the database

Retrieve all notifications from last month

For each category, compute weighted likelihood that such an incident occurs

For each category, create related dynamic parameter with the computed likelihood

as its value

Store dynamic parameters, named after the related category

Page 12: Risk monitoring of a pseudonymisation service based on TRICK

Real-­time risk assessmentTRICK Service: dynamic likelihood

• Definition of all ÉpStan-­related assets• Automatic real-­time estimation of Annual Loss Expectancy (ALE)ALE = impact · likelihood

SASSI Workshop 2015 12 / 17

Page 13: Risk monitoring of a pseudonymisation service based on TRICK

Real-­time risk assessmentTRICK Service: dynamic likelihood

SASSI Workshop 2015 13 / 17

• Support for expressions in ‘likelihood’ field involving variables resulting from log processing utility

• ALE is updated in real-­time

Impacti0 2 k€i1 4 k€i2 10 k€i3 16 k€i4 25 k€i5 50 k€i6 100 k€i7 200 k€i8 400 k€i9 800 k€i10 1 600 k€

Probabilityp0 1/100yp1 1/50yp2 1/30yp3 1/16yp4 1/10yp5 1/5yp6 1/3yp7 1/2yp8 1/yp9 2/yp10 3/y

Page 14: Risk monitoring of a pseudonymisation service based on TRICK

Real-­time risk assessmentTRICK Service: dynamic risk reduction

• Implementation rate withsupport for expressions

• Real-­time update ofimplementation rate

SASSI Workshop 2015

IR = Implementation Rate

14 / 17

Page 15: Risk monitoring of a pseudonymisation service based on TRICK

Real-­time risk assessmentTRICK Service: Cockpit

• Real-­time graphdisplaying ALE perasset type

• Logarithmic timescale to put focuson recent past

• Click on asset typeopens up detailedview (see nextslide)

SASSI Workshop 2015 15 / 17

0

20

40

60

80

100

120

0,0010,010,1110100

Annual Loss Expectancy [k€/y]

Time in the past

Information (ÉpStan data) Software (ÉpStan Application)

Service (ÉpStan Service) Hardware (ÉpStan Server)

10d 1d 2h 15m 1m14w

Page 16: Risk monitoring of a pseudonymisation service based on TRICK

0

10

20

30

40

50

60

70

80

90

100

0,0010,010,1110100

Annual Loss Expectancy [k€/y]

Time in the past

A_all

C3

A_1

I3

C1

Total

14w

Real-­time risk assessmentTRICK Service: ALE evolution of «Information» assets

SASSI Workshop 2015

1. Port scan (IDS)2. Disk failure (S.M.A.R.T.)3. Login bruteforce (IDS)4. Disk replacement (S.M.A.R.T.)

10d 1d 2h 15m 1m

1 42 316 / 17

Page 17: Risk monitoring of a pseudonymisation service based on TRICK

Conclusion and outlook

• Real added value: Having view on current risk situation & its impacts;;

• Use logs of several information security tools;;

• Apply real-­time risk assessment to Industrial Control System environment;;

• Define generic expressions for dynamic likelihood and risk reduction computation;;

• Add asset dependency functionality.

SASSI Workshop 2015 17 / 17