Analyzing, Designing & Implementing a Secure, Centralized, Generic
Total Page:16
File Type:pdf, Size:1020Kb
Analyzing, Designing & Implementing a Secure, Centralized, Generic, Extensible, Input-Sanitizing, Intuitive Configuration Management Station Master’s Thesis, November 2015 E. Ton i <<Page left blank intentionally>> ii Analyzing, Designing & Implementing a Secure, Centralized, Generic, Extensible, Input-Sanitizing, Intuitive Configuration Management Station THESIS Submitted in the partial fulfillment of The requirements for the degree of MASTER OF SCIENCE in COMPUTER SCIENCE TRACK INFORMATION ARCHITECTURE by E. Ton Born in The Hague, the Netherlands Web Information Systems Fox-IT Department of Software Technology Faculty, EEMCS, Delft University of Technology Olof Palmestraat 6 Delft, the Netherlands Delft, the Netherlands http://wis.ewi.tudelft.nl http://www.fox-it.com iii Analyzing, Designing &Implementing a Secure, Centralized, Generic, Extensible, Input-Sanitizing, Intuitive Configuration Management Station Author: E. Ton Student ID: 1344862 Email: [email protected] Abstract This thesis describes the analysis, design and implementation of a management station that is able to support different security network products. It is designed to be centralized so it can support multiple devices from one interface. The management station is generic and extensible, to support a range of different products. As the management station could be used in high assurance organizations, security of the product is taken into account during the whole process. For usability we looked into ways to make the usage more intuitive to users. It also contains a model that improves the quality of configurations used by connected devices by sanitizing user input on correctness. Keywords: security, management station, centralized, genericity, extensibility, input sanitation checking, intuitive, configuration management Future work: extending functionalities of FMS, hardening the device in the network Graduation Committee: Prof. dr. ir. G.J. Houben, Faculty EEMCS1, TU Delft Dr. ir. A.J.H. Hidders, Faculty EEMCS, TU Delft Dr.ir. J.H. Weber, Faculty EEMCS, TU Delft ir. A.N.de Jong, Fox-IT 1 Electrical Engineering, Mathematics and Computer Science i Preface I have been interested in information security for a long time. When I got the chance to do my Master's thesis at Fox-IT, it was a really nice opportunity to be able to combine my security interests with work experience. I have worked during the first part of this project part-time at Fox-IT. There I got the chance to use professional security products, had interesting security related discussions and learned new useful technologies. During the second part of this project where I had to write the thesis, I worked as a freelance software developer and later as security specialist at another company. This combination was far from optimal and finishing the thesis took me therefore a lot of time. I am very happy to finally finish this thesis. From Fox-IT I want to thank my supervisor Adriaan de Jong for his help during the project and feedback on this thesis. From the TU Delft I want to thank my supervisor Jan Hidders for his guidance, help and input. Finally I want to thank my boyfriend, friends and family for their support. ii Contents Preface .................................................................................................................................. ii List of Figures .................................................................................................................... vii 1. Introduction .................................................................................................................. 1 1.1. About Fox-IT .......................................................................................................... 1 1.2. Problem description ............................................................................................... 2 1.2.1. Introduction .................................................................................................... 2 1.2.2. Research problem, goal& objectives ............................................................... 3 1.2.3. Deliverables .................................................................................................... 3 1.3. Approach ................................................................................................................ 4 1.3.1. Methodology .................................................................................................... 4 1.3.2. Research approach and outline ...................................................................... 4 1.3.3. Validation ........................................................................................................ 5 2. Related work ................................................................................................................. 6 2.1. Secure systems ....................................................................................................... 6 2.1.1. High Assurance demands & classifications ................................................... 7 2.1.2. Secure software development: CLASP& SDL ................................................ 8 2.1.3. Validating the security of a system ...............................................................11 2.2. Generic and extensible software ..........................................................................13 2.2.1. Approach for analysis and architectural design. ..........................................13 2.2.2. Implementation .............................................................................................14 2.3. Sanity testing of user input ..................................................................................15 3. Environment analysis ..................................................................................................16 3.1. Security demands & development process ...........................................................16 3.2. Genericity & extensibility: analysis current Fox-IT Security Devices ................17 3.2.1. Approach ........................................................................................................17 3.2.2. General description of the different devices ..................................................17 3.2.3. Analysis security devices ...............................................................................19 3.3. Usability analysis: current problems with devices experienced by customers ...23 3.3.1. Stakeholders & user roles..............................................................................23 3.3.2. Analysis / interviews outcomes .....................................................................23 3.4. General requirements ...........................................................................................24 3.4.1. Requirements by Fox-IT and problem statement (chapter 1) ......................24 iii 3.4.2. Requirements by literature survey (chapter 2) .............................................24 3.4.3. Requirements by analysis (chapter 3) ...........................................................25 3.5. Functional specification ........................................................................................26 3.5.1. Overall concept: Improving the configuration process for the user ..............26 3.5.2. Concept 1: Configuring multiple devices centralized....................................27 3.5.3. Concept 2: Sanity checking of device configurations ....................................27 3.5.4. Concept 3: Extensibility & genericity of the management station ...............28 3.5.5. Concept 4: Security ........................................................................................28 4. General design of the management system ................................................................30 4.1. High level design ..................................................................................................30 4.1.1. General context ..............................................................................................30 4.1.2. Overview of the system ..................................................................................31 4.1.3. General design decisions ...............................................................................31 4.1.4. General workflow ...........................................................................................32 4.1.5. Example of FMS with other devices ..............................................................33 4.2. Containers & interactions ....................................................................................35 4.3. Major components & interactions ........................................................................37 4.3.1. Specification of components ...........................................................................37 4.3.2. Workflows ......................................................................................................38 5. Security Architecture (target) .....................................................................................40 5.1. Security Problem ..................................................................................................40 5.1.1. Assets .............................................................................................................40 5.1.2. Data flow between components .....................................................................42 5.1.3. Threat analysis ..............................................................................................43