Document Title Security Models

Document Title Security Models

HEAVENS – HEAling Vulnerabilities to ENhance Software Security and Safety Dnr 2012-04625 Document Title Security models Document Type Deliverable Document Number D2 Aljoscha Lautenbach, [email protected], Chalmers Document Responsible Mafijul Islam, [email protected], Volvo AB Document Version 2.0 Document Status Released (March 18, 2016) Dissemination Level Public Last Change March 18, 2016 Project Acronym HEAVENS Project Title HEAling Vulnerabilities to ENhance Software Security and Safety Research Program Vinnova/FFI (Fordonsutveckling/Vehicle Development), Sweden Diary Number 2012-04625 Project Duration April 2013 – March 2016 Project Coordinator Mats Olsson, [email protected] , Volvo AB © 2016 The HEAVENS Consortium HEAVENS (Dnr 2012-04625) Deliverable D2 Security models This page is intentionally left blank © 2016 The HEAVENS Consortium 2(100) HEAVENS (Dnr 2012-04625) Deliverable D2 Security models Executive Summary This deliverable (D2 Security models, Release 2, Version 2.0) presents the results and achievements of work package WP2 (Security models) of the HEAVENS project. The goal of this deliverable is to present a systematic approach of deriving security requirements for the automotive Electrical and/or Electronic (E/E) systems. It suggests an adaption of generic security engineering process for the automotive domain. The deliverable presents state-of-the-art threat analysis and risk assessment methodologies, processes, frameworks and tools, considering various industrial domains, for example, IT security, telecommunications, software engineering and defense. It presents the results obtained from performing a critical review of the state-of-the-art threat analysis and risk assessment in the context of the automotive industry. Based on this, a new security model − HEAVENS security model − for the automotive industry is proposed to facilitate deriving security requirements for the automotive E/E systems. The model includes methods, processes and tool support with focus on threat analysis and risk assessment aspects of security engineering process. Then, this deliverable presents the results obtained from a proof-of-concept implementation and evaluation of the proposed HEAVENS security model by using a couple of automotive use cases. This deliverable also discusses the HEAVENS security model in the context of existing standards, for example, ISO 26262 for functional safety and Common Criteria for IT Security Evaluation. © 2016 The HEAVENS Consortium 3(100) HEAVENS (Dnr 2012-04625) Deliverable D2 Security models This page is intentionally left blank © 2016 The HEAVENS Consortium 4(100) HEAVENS (Dnr 2012-04625) Deliverable D2 Security models Contributors Editors Affiliation Email Aljoscha Lautenbach Chalmers [email protected] Mafijul Islam ATR, GTT, Volvo AB [email protected] Contributors Affiliation Email Mafijul Islam ATR, GTT, Volvo AB Christian Sandberg ATR, GTT, Volvo AB Andreas Bokesand VE, GTT, Volvo AB Tomas Olovsson Chalmers Pierre Kleberger Chalmers Aljoscha Lautenbach Chalmers Andrew Söderberg-Rivkin Chalmers/Volvo AB Sathya Prakash Kadhirvelan Chalmers/Volvo AB Anders Hansson SECTRA AB Henrik Broberg Volvo Car Corporation (VCC) HEAVENS Consortium © 2016 The HEAVENS Consortium 5(100) HEAVENS (Dnr 2012-04625) Deliverable D2 Security models This page is intentionally left blank © 2016 The HEAVENS Consortium 6(100) HEAVENS (Dnr 2012-04625) Deliverable D2 Security models Document Change History Version Date Contributor Description 0.1 May 09, 2014 Aljoscha Lautenbach First draft of “D2 Security models” created. 1.0 Sep 29, 2014 Mafijul Islam Version 1.0, Release 1 of D2. 2.0 Feb 23, 2016 Christian Sandberg Moved material from D3.1 to this document. Draft version 2.0 Mar 18, 2016 Mafijul Islam Updated with comments and references. Released version © 2016 The HEAVENS Consortium 7(100) HEAVENS (Dnr 2012-04625) Deliverable D2 Security models This page is intentionally left blank © 2016 The HEAVENS Consortium 8(100) HEAVENS (Dnr 2012-04625) Deliverable D2 Security models Table of Contents Executive Summary ................................................................................................................................. 3 Contributors ............................................................................................................................................. 5 Document Change History ...................................................................................................................... 7 Table of Contents .................................................................................................................................... 9 List of Figures ........................................................................................................................................ 13 List of Tables ......................................................................................................................................... 15 List of Abbreviations .............................................................................................................................. 17 1. Introduction .................................................................................................................................... 19 1.1 Background .............................................................................................................................. 19 1.2 Objective ................................................................................................................................... 19 1.3 Scope and limitation ................................................................................................................. 19 1.4 Relation to other project activities ............................................................................................ 20 1.5 Document outline ...................................................................................................................... 21 2. Approaches to security modeling ................................................................................................... 23 2.1 What is security? ...................................................................................................................... 23 2.1.1 Security attributes ........................................................................................................................................... 24 2.1.2 Security objectives .......................................................................................................................................... 26 2.2 Security and safety engineering ............................................................................................... 27 2.3 Security modeling ..................................................................................................................... 31 2.4 Security metrics ........................................................................................................................ 31 3. Threat modeling and risk assessment – processes, methods and tools ....................................... 33 3.1 Concepts, frameworks and processes ..................................................................................... 33 3.1.1 Generic system security engineering .............................................................................................................. 33 3.1.2 Microsoft − threat modeling and security development lifecycle ...................................................................... 34 3.1.3 Trike ............................................................................................................................................................... 35 3.1.4 OCTAVE ......................................................................................................................................................... 36 3.1.5 Miscellaneous models ..................................................................................................................................... 37 3.2 Methods and models for threat analysis and risk assessment ................................................. 38 3.2.1 CIA model ....................................................................................................................................................... 39 3.2.2 Microsoft – STRIDE and DREAD .................................................................................................................... 39 3.2.3 CVSS model ................................................................................................................................................... 40 3.2.4 OWASP model ................................................................................................................................................ 41 © 2016 The HEAVENS Consortium 9(100) HEAVENS (Dnr 2012-04625) Deliverable D2 Security models 3.2.5 EVITA model .................................................................................................................................................. 42 3.2.6 Threat, Vulnerability, and Risk Analysis (TVRA) .............................................................................................. 42 3.2.7 SECTRA model .............................................................................................................................................. 44 3.3 Tool support .............................................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    100 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us