Abstract
Assuring the security of software-dependent systems in the face of cyber-attacks and failures is now among the top priorities for governments and providers of electric, financial, communication, and other essential services. Practical and foundational solutions for systematic, secure, and trustworthy system development are needed to support developers, regulators, and certification bodies in providing assurance that security threats faced by the software systems used in these environments have been adequately mitigated. Using recent experiences reported in the literature as a basis, we discuss the challenges of providing security assurance for software-dependent systems. We also explore the barriers to adoption of existing approaches and techniques which can play an important role in security assurance efforts. Ultimately, we present a set of recommendations which outline a collection of follow-on research directions that can advance the state-of-the-art and support the development of more effective security assurance solutions for critical software-dependent systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
McLean, J., Heitmeyer, C.L.: High assurance computer systems: a research agenda. In: America in the Age of Information, National Science and Technology Council Committee on Information and Communications Forum (1995)
Mead, N.R.: SEHAS 2003: the future of high-assurance systems. IEEE Secur. Priv. 1, 68–72 (2003)
Government of Canada: National electric grid security and resilience action plan, December 2016. https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/pln-crtcl-nfrstrctr-2014-17/index-en.aspx
U.S.A. Department of Homeland Security: National critical infrastructure security and resilience research and development plan, November 2015
Weinstock, C.B., Lipson, H.F.: Evidence of assurance: laying the foundation for a credible security case. Technical report, Software Engineering Institute, August 2013
Agudo, I., Vivas, J.L., López, J.: Security assurance during the software development cycle. In: International Conference on Computer Systems and Technologies, CompSysTech 2009, pp. 20:1–20:6 (2009)
Winograd, T., McKinley, H.L., Oh, L., Colon, M., McGibbon, T., Fedchak, E., Vienneau, R.: Software Security Assurance: A State-of-the Art Report (SOAR). Information Assurance Technology Analysis Center (IATAC), July 2007
Federal Trade Commission: Internet of things: privacy and security in a connected world. FTC Staff Report, Federal Trade Commission, January 2015
Common Criteria Recognition Arrangement: Common Criteria for Information Technology Security Evaluation (CC). No. CCMB-2009-07, Common Criteria Recognition Arrangement, July 2009
Communications Security Establishment Canada: Annex 2 - Information System Security Risk Management Activities: IT Security Risk Management: A Lifecycle Approach. Communications Security Establishment Canada (2012)
Gilsinn, J.D., Schierholz, R.: Security assurance levels: a vector approach to describing security requirements. NIST, October 2010
Chandra, P.: Software assurance maturity model, a guide to building security into software development, version 1.0 (2009). http://www.opensamm.org/downloads/SAMM-1.0.pdf
Woody, C.C., Ellison, R.J.: Software assurance measurement - establishing a confidence that security is sufficient-establishing a confidence that security is sufficient. J. Cyber Secur. Inf. Syst. 5(3), 28–36 (2017)
Ross, R.S., McEvilley, M., Oren, J.C.: Systems security engineering: considerations for a multidisciplinary approach in the engineering of trustworthy secure systems. Special Publication (NIST SP) 800-160, NIST, November 2016
National Institute of Standards and Technology: Framework for improving critical infrastructure cybersecurity, version 1.1, April 2018. https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf
GSN Working Group: GSN community standard version 2, January 2018
Rushby, J., Xu, X., Rangarajan, M., Weaver, T.L.: Understanding and evaluating assurance cases. NASA Contractor Report NASA/CR–2015-218802, NASA Langley Research Center, September 2015
Rinehart, D.J., Knight, J.C., Rowanhill, J.: Current practices in constructing and evaluating assurance cases with applications to aviation. NASA Contractor Report NASA/CR–2015-218678, NASA Langley Research Center, January 2015
Rushby, J.: The interpretation and evaluation of assurance cases. Technical report, SRI-CSL-15-01, SRI International, July 2015
Wassyng, A., Maibaum, T., Lawford, M., Bherer, H.: Software certification: is there a case against safety cases? In: Calinescu, R., Jackson, E. (eds.) Monterey Workshop 2010: Foundations of Computer Software. Modeling, Development, and Verification of Adaptive Systems. LNCS, vol. 6662, pp. 206–227. Springer, Heidelberg (2011)
Alexander, R., Hawkins, R., Kelly, T.: Security assurance cases: motivation and the state of the art. Technical report CESG/TR/2011/1, University of York, April 2011
Weinstock, C.B., Lipson, H.F., Goodenough, J.B.: Arguing security - creating security assurance cases. Technical report, Software Engineering Institute, January 2007
U.S.A. Computer Emergency Readiness Team: Build security in: setting a standard for software assurance (2015). https://www.us-cert.gov/bsi
Jaskolka, J.: Challenges in assuring security and resilience of advanced metering infrastructure. In: 18th Annual IEEE Canada Electrical Power and Energy Conference, EPEC 2018, pp. 1–6 (2018)
U.S.A. Department of Homeland Security: Sector risk snapshots, March 2014
Asghar, M.R., Dán, G., Miorandi, D., Chlamtac, I.: Smart meter data privacy: a survey. IEEE Commun. Surv. Tutor. 19(4), 2820–2835 (2017)
Ibarra, I., Ward, D.: Assurance cases to argue system resilience properties for road vehicles. In: 2013 Workshop on Human Factors in the Safety and Security of Critical Systems, March 2013
Pantazopoulos, P., Haddad, S., Lambrinoudakis, C., Kalloniatis, C., Maliatsos, K., Kanatas, A., Varádi, A., Gay, M., Amditis, A.: Towards a security assurance framework for connected vehicles. In: 19th IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks, pp. 1–6 (2018)
Wassyng, A., Singh, N.K., Geven, M., Proscia, N., Wang, H., Lawford, M., Maibaum, T.: Can product-specific assurance case templates be used as medical device standards? IEEE Des. Test 32(5), 45–55 (2015)
Jackson, D., Thomas, M., Millett, L.I. (eds.): Software for Dependable Systems: Sufficient Evidence? National Academies Press, Washington, DC (2007)
U.S.A. Department of Defense: Trusted Computer System Evaluation Criteria (TCSEC). No. DoD 5200.28-STD in Defense Department Rainbow Series (Orange Book), Department of Defense/National Computer Security Center, December 1985
Nhlabatsi, A., Laney, R., Nuseibeh, B.: Feature interaction: the security threat from within software systems. Prog. Inform. 5, 75–89 (2008)
Deogun, D., Sawano, D., Bergh Johnsson, D.: Secure by Design. Manning Publications Company, Shelter Island (2018)
Tverdyshev, S.: Security by design: introduction to MILS. In: International Workshop on MILS: Architecture and Assurance for Secure Systems (2017)
Bass, L., Weber, I., Zhu, L.: DevOps: A Software Architect’s Perspective. Addison-Wesley Professional, New York (2015)
Shostack, A.: Threat Modeling: Designing for Security. Wiley, Hoboken (2014)
UcedaVélez, T., Morana, M.M.: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis, 1st edn. Wiley, Hoboken (2015)
Chong, S., Guttman, J., Datta, A., Myers, A., Pierce, B., Schaumont, P., Sherwood, T., Zeldovich, N.: Report on the NSF workshop on formal methods for security. Technical report (2016). http://arxiv.org/abs/1608.00678
Mandrioli, D.: The role of formal methods in developing high assurance systems: some old and some less old thoughts. In: Workshop on Software Engineering for High Assurance Systems, SEHAS 2003, pp. 29–32 (2003)
Rouland, Q., Hamid, B., Jaskolka, J.: Formalizing reusable communication models for distributed systems architecture. In: 8th International Conference on Model and Data Engineering, MEDI 2018, pp. 198–216 (2018)
International Electrotechnical Commission: IEC Standard: 62351, May 2007. http://www.iec.ch/smartgrid/standards/
The Smart Grid Interoperability Panel–Smart Grid Cybersecurity Committee: Guidelines for smart grid cybersecurity: Volume 1 – smart grid cybersecurity strategy, architecture, and high-level requirements. Interagency Report NISTIR 7628 Revision 1, NIST, September 2014
Dobbing, B., Lautieri, S.: SafSec methodology: Standard 3.1. SafSec: Integration of Safety & Security Certification S.P1199.50.2, Altran Praxis, November 2006
U.S.A. Department of Defense: DoD Instruction 8510.01, Risk Management Framework (RMF) for DoD Information Technology (IT), March 2014. http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214.pdf
U.K. Department of Trade & Industry: Information Technology Security Evaluation Criteria (ITSEC), COM(90) 314. Department of Trade & Industry, June 1991
Communications Security Establishment Canada: Canadian Trusted Computer Product Evaluation Criteria (CTCPEC). Communications Security Establishment Canada (1993)
Feiler, P.: Automated assurance of security-policy enforcement in critical systems. SEI Blog, February 2018. https://insights.sei.cmu.edu/sei_blog/2018/02/automated-assurance-of-security-policy-enforcement-in-critical-systems.html
Sljivo, I., Gallina, B.: Building multiple-viewpoint assurance cases using assumption/guarantee contracts. In: 10th European Conference on Software Architecture Workshops, ECSAW 2016, pp. 39:1–39:7. ACM (2016)
Hsu, T.H.C.: Hands-On Security in DevOps: Ensure Continuous Security, Deployment, and Delivery with DevSecOps. Packt Publishing Ltd., Birmingham (2018)
Acknowledgment
This research was supported by the Natural Sciences and Engineering Research Council of Canada (NSERC) grant RGPIN-2019-06306.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Jaskolka, J. (2020). Recommendations for Effective Security Assurance of Software-Dependent Systems. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Computing. SAI 2020. Advances in Intelligent Systems and Computing, vol 1230. Springer, Cham. https://doi.org/10.1007/978-3-030-52243-8_37
Download citation
DOI: https://doi.org/10.1007/978-3-030-52243-8_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-52242-1
Online ISBN: 978-3-030-52243-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)