Analysis of Systems Security Engineering Design Principles for the Development of Secure and Resilient Systems
Total Page:16
File Type:pdf, Size:1020Kb
Air Force Institute of Technology AFIT Scholar Faculty Publications 7-24-2019 Analysis of Systems Security Engineering Design Principles for the Development of Secure and Resilient Systems Paul M. Beach Air Force Institute of Technology Logan O. Mailloux Air Force Institute of Technology Brent T. Langhals Air Force Institute of Technology Robert F. Mills Air Force Institute of Technology Follow this and additional works at: https://scholar.afit.edu/facpub Part of the Information Security Commons, and the Systems Engineering Commons Recommended Citation Beach, P. M., Mailloux, L. O., Langhals, B. T., & Mills, R. F. (2019). Analysis of Systems Security Engineering Design Principles for the Development of Secure and Resilient Systems. IEEE Access, 7, 101741–101757. https://doi.org/10.1109/ACCESS.2019.2930718 This Article is brought to you for free and open access by AFIT Scholar. It has been accepted for inclusion in Faculty Publications by an authorized administrator of AFIT Scholar. For more information, please contact [email protected]. Received July 5, 2019, accepted July 12, 2019, date of publication July 24, 2019, date of current version August 9, 2019. Digital Object Identifier 10.1109/ACCESS.2019.2930718 Analysis of Systems Security Engineering Design Principles for the Development of Secure and Resilient Systems PAUL M. BEACH 1, (Student Member, IEEE), LOGAN O. MAILLOUX 1, (Senior Member, IEEE), BRENT T. LANGHALS1, AND ROBERT F. MILLS 2, (Senior Member, IEEE) 1Department of Systems Engineering and Management, Air Force Institute of Technology, Wright-Patterson Air Force Base, OH 45385, USA 2Department of Electrical and Computer Engineering, Air Force Institute of Technology, Wright-Patterson Air Force Base, OH 45385, USA Corresponding author: Logan O. Mailloux ([email protected]) This work was supported in part by the Air Force Research Laboratory Space Vehicles Directorate (AFRL/RV). ABSTRACT The increasing prevalence of cyber-attacks highlights the need for improved systems secu- rity analysis and engineering in safety-critical and mission-essential systems. Moreover, the engineering challenge of developing secure and resilient systems that meet specified constraints of cost, schedule, and performance is progressively difficult given the trend toward increasing complexity, interrelated systems- of-systems. This paper analyzes the 18 design principles presented in the National Institute of Standards and Technology Special Publication (NIST SP) 800-160 Volume 1 and considers their applicability for the development of secure and resilient systems of interest. The purpose of this work is to better understand how these design principles can be consistently and effectively employed to meet stakeholder defined security and resiliency needs as part of a comprehensive systems security engineering approach. Specifically, this work uses the Design Structure Matrix (DSM) analysis to study the 18 design principles presented in NIST SP 800-160 Vol. 1, Appendix F, along with their intra- and inter-dependencies to develop complex cyber- physical systems that are secure, trustworthy, and resilient. The DSM analysis results increase understanding of the various relationships between the 18 design principles and identifies two clusters for secure systems design: Architecture and Trust. Lastly, this work provides a notional command and control system case study, along with a detailed listing of engineering considerations, to demonstrate how these principles and their groupings can be systematically applied as part of a comprehensive approach for developing cyber-physical systems which are designed to operate in hostile environments. INDEX TERMS Design principles, systems security engineering, security engineering. I. INTRODUCTION States Department of Defense (U.S. DoD) – arguably the Modern systems are increasingly complex compositions of world's largest acquirer of complex systems – has conceded system elements, subsystems, supporting & enabling sys- that they cannot confidently assure their critical mission sys- tems, and extensive infrastructures that often result in a tems will operate as intended through a full-spectrum cyber- myriad of cyber dependencies, complicated interactions, attack by well-resourced nation-state actors [1]. Thus, it is and emergent behaviors. Moreover, because of their cyber necessary to undertake deliberate systems-level engineering dependencies (e.g., hardware, software, communications, efforts to design, develop, and field secure and resilient sys- etc.) these expansive Systems-of-Systems are inherently sus- tems capable of operating in highly contested operational ceptible to a wide range of malicious and non-malicious environments fraught with uncertainty, unpredictability, and events which can result in unexpected disruptions and unpre- attacks from intelligent adversaries, as well as, abuse and dictable actions. Substantiating these realities, the United misuse by humans (e.g., owners, operators, maintainers, etc.) [2], [3]. Moreover, inherent in discussions of ``securing'' The associate editor coordinating the review of this manuscript and complex cyber-physical systems is often the issue of safety approving it for publication was Lin Wang. as a key stakeholder need [4]. For example, the safety of 2169-3536 2019 IEEE. Translations and content mining are permitted for academic research only. VOLUME 7, 2019 Personal use is also permitted, but republication/redistribution requires IEEE permission. 101741 See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. P. M. Beach et al.: Analysis of Systems Security Engineering Design Principles for the Development of Secure and Resilient Systems humans is paramount in the development of aircraft and more (e.g., design artifacts, analyses, test results, etc.) which can recently autonomous vehicles. aid system developers, owners, and operators in satisfying To address this critical systems security problem, their security and resiliency needs by mapping conceptual the National Institute of Standards and Technology (NIST), strategies to security principles that can be implemented the National Security Agency (NSA), MITRE, and sev- and tested. eral industry leaders from around the world collaborated on a five-year effort to produce a comprehensive Systems II. A STANDARDIZED SYSTEMS SECURITY APPROACH Security Engineering (SSE) approach: NIST Special Pub- This paper is part of an ongoing research activity to under- lication (SP) 800-160, Systems Security Engineering [5]. stand and promote the application of a standardized approach Subtitled ``Considerations for a Multidisciplinary Approach for developing secure systems. More specifically, the ``sys- in the Engineering of Trustworthy Secure Systems,'' NIST tems security engineering'' approach adopted in this work is SP 800-160 is focused on institutionalizing engineering- considered a specialty area of systems engineering and con- driven actions to develop more defensible systems through sistent with ISO/IEC/IEEE 15288, NIST SP 800-160 Vol. 1, a rigorous analysis approach in alignment with industry and the International Counsel on Systems Engineer- standards for systems development such as ISO/IEC/IEEE ing (INCOSE) handbook [5]. For related publications which 15288:2015 [6]. In 2018, NIST SP 800-160 was designated seek to promote a systems-oriented view of SSE please see as NIST SP 800-160 Volume 1 with the draft release of [11]–[14], and [15]; excellent comprehensive works are avail- NIST SP 800-160 Volume 2 [7]; however, at the time of this able here: [16], [17]. Note, while few formally adopt the name writing Vol. 2 is still in draft form and does not align with ``systems security engineering'' for their work the discipline standardized systems engineering approaches (i.e., Vol. 1 is of SSE continues to rapidly mature, especially with the ever based on the widely accepted ISO/IEC/IEEE 15288 systems increasing, world-wide interest in fielding secure and resilient engineering standard [8] while Vol. 2 is based on the MITRE cyber-physical systems such as autonomous vehicles. Cyber Resiliency Engineering Framework [9]). As a unified and comprehensive SSE approach, in this work, we've chosen A. DEFINING SYSTEMS SECURITY ENGINEERING to focus on the effective application of the systems security While the NIST SP 800-160 Vol. 1 does not formally provide design principles as presented in NIST SP 800-160 Vol. 1. a definition for SSE, two helpful definitions are offered in In this work we extend our previous work [10] by per- Military Handbook 1785 [18]: forming Design Structure Matrix (DSM) analysis of the System Security Engineering: An element of system security-oriented design principles presented in NIST SP engineering that applies scientific and engineering 800-160 Vol. 1 and studying their mappings to systems secu- principles to identify security vulnerabilities and min- rity strategies. The contribution of this paper is threefold: imize or contain risks associated with these vulner- 1) Mapping the NIST SP 800-160 Vol 1. SSE design abilities. It uses mathematical, physical, and related principles to the proposed resiliency security strategy scientific disciplines, and the principles and methods 2) Studying the design principle interactions and cluster- of engineering design and analysis to specify, predict, ing the principles for ease of implementation and evaluate the vulnerability of the system to security 3) Providing a case study which describes how the secu- threats.