21
William E. Young, Jr, PhD Candidate, Engineering Systems Division Systems Engineering Research Lab Advisor: Prof N. Leveson STPA-SEC for Cyber Security / Mission Assurance 1 25 March, 2014 [email protected] © Copyright William Young, 2014

STPA-SEC for Cyber Security / Mission Assurancepsas.scripts.mit.edu/home/wp-content/uploads/2014/03/... · 2014-03-28 · Mission Assurance / Cyber Security ? Operational Art and

  • Upload
    others

  • View
    9

  • Download
    0

Embed Size (px)

Citation preview

Page 1: STPA-SEC for Cyber Security / Mission Assurancepsas.scripts.mit.edu/home/wp-content/uploads/2014/03/... · 2014-03-28 · Mission Assurance / Cyber Security ? Operational Art and

William E. Young, Jr,

PhD Candidate, Engineering Systems Division

Systems Engineering Research Lab

Advisor: Prof N. Leveson

STPA-SEC

for

Cyber Security / Mission Assurance

1

25 March, 2014

[email protected] © Copyright William Young, 2014

Page 2: STPA-SEC for Cyber Security / Mission Assurancepsas.scripts.mit.edu/home/wp-content/uploads/2014/03/... · 2014-03-28 · Mission Assurance / Cyber Security ? Operational Art and

Overview

• Motivation

• STPA-Sec

• Real World Insights to Date

• Conclusion

2 [email protected] © Copyright William Young, 2014

Page 3: STPA-SEC for Cyber Security / Mission Assurancepsas.scripts.mit.edu/home/wp-content/uploads/2014/03/... · 2014-03-28 · Mission Assurance / Cyber Security ? Operational Art and

Mission Assurance / Cyber Security ?

Operational Art and Operational Design

III-27

forces and assets for attacking, seizing, retaining, controlling, or protecting these decisive

points.

g. Lines of Operation and Lines of Effort

(1) Lines of Operation

(a) A LOO defines the interior or exterior orientation of the force in

relation to the enemy or that connects actions on nodes and/or decisive points related in

time and space to an objective(s). LOOs describe and connect a series of decisive actions

that lead to control of a geographic or force-oriented objective (see Figure III-13).

Operations designed using LOOs generally consist of a series of actions executed according

to a well-defined sequence, although multiple LOOs can exist at the same time (parallel

operations). Major combat operations are typically designed using LOOs. These lines tie

offensive, defensive, and stability tasks to the geographic and positional references in the

OA. Commanders synchronize activities along complementary LOOs to achieve the end

state.

(b) A force operates on interior lines when its operations diverge from a

central point. Interior lines usually represent central position, where a friendly force can

reinforce or concentrate its elements faster than the enemy force can reposition. With

interior lines, friendly forces are closer to separate enemy forces than the enemy forces are to

one another. Interior lines allow an isolated force to mass combat power against a specific

portion of an enemy force by shifting capabilities more rapidly than the enemy can react.

(c) A force operates on exterior lines when its operations converge on the

enemy. Operations on exterior lines offer opportunities to encircle and annihilate an enemy

force. However, these operations typically require a force stronger or more mobile than the

enemy.

(d) The relevance of interior and exterior lines depends on the time and space

relationship between the opposing forces. Although an enemy force may have interior lines

with respect to the friendly force, this advantage disappears if the friendly force is more agile

and operates at a higher tempo. Conversely, if a smaller friendly force maneuvers to a

Figure III-13. Sample Line of Operation

Sample Line of Operation

Establish and Operate Intermediate Bases

Secure and Operate Air and Sea Ports

Actions on Decisive Points and/or Nodes

Secure Routes to Capitaltown

SecureCapitaltown

Objective

Secure Entry Points

Seize Key Terrain

Military “Mission” Physical System

STPA-Sec Allows us to Analyze Both of these for Security

Complex “System” of Activities Complex “System” of Components

3 [email protected] © Copyright William Young, 2014

Reference: US Defense Dept Joint Publication 5.0

Page 4: STPA-SEC for Cyber Security / Mission Assurancepsas.scripts.mit.edu/home/wp-content/uploads/2014/03/... · 2014-03-28 · Mission Assurance / Cyber Security ? Operational Art and

Motivation: Where Should We Place Our Emphasis?

Good Mission (& System) Development Emphasizes Avoidance Not Reaction

Avoid Vulnerabilities to Max Extent Threat Countermeasure At Endgame

4 [email protected] © Copyright William Young, 2014

Page 5: STPA-SEC for Cyber Security / Mission Assurancepsas.scripts.mit.edu/home/wp-content/uploads/2014/03/... · 2014-03-28 · Mission Assurance / Cyber Security ? Operational Art and

Problem: Begin to Address Security (Mission Assurance) from Start of System Engineering Efforts (Before Design)

NEED

Concept Requirements Design Build Operate

Attack Response

System Security

Requirements

Secure Systems

Engineering

Cyber Security

“Bolt-on”

Secure Systems Thinking

System Engineering Phases

Security Approaches

Goal: Develop Systems That Enable us to More Securely Satisfy Needs

“Abstract Systems” “Physical Systems”

5 [email protected] © Copyright William Young, 2014

Page 6: STPA-SEC for Cyber Security / Mission Assurancepsas.scripts.mit.edu/home/wp-content/uploads/2014/03/... · 2014-03-28 · Mission Assurance / Cyber Security ? Operational Art and

Controlled Process

Process Model

Control Feedback

• Use a functional decomposition of mission as the “Controlled Process”

• Complex system of activities

• Process completion represents mission accomplishment

• Information is required (allows control)

• Four types of functional system vulnerabilities: • Required control information missing

(Availability violation) • Incorrect control information provided

(Integrity violation) • Proper control information given too early,

too late • Proper control information stops too soon

or applied too long

Controller

(Leveson, 2003); (Leveson, 2011)

Control

Algorithm

Applying the System-Theoretic Framework for Mission Assurance / Cyber Security

6 [email protected] © Copyright William Young, 2014

Page 7: STPA-SEC for Cyber Security / Mission Assurancepsas.scripts.mit.edu/home/wp-content/uploads/2014/03/... · 2014-03-28 · Mission Assurance / Cyber Security ? Operational Art and

Approach: STPA-Sec (System-Theoretic Process Analysis for Security)

• Modifies Leveson’s STPA successfully used to improve safety

• A top-down, system engineering technique

– Can be used from beginning of project

• Identifies security vulnerabilities and requirements

• Identifies scenarios leading to violation of security constraints; use results to refine system concept to be more secure

• Can address technical and organizational issues

• Supports a security-driven concept development process where

– Vulnerability analysis influences and shapes early design decisions

– Vulnerability analysis iterated and refined as concept evolves

7 [email protected] © Copyright William Young, 2014

Page 8: STPA-SEC for Cyber Security / Mission Assurancepsas.scripts.mit.edu/home/wp-content/uploads/2014/03/... · 2014-03-28 · Mission Assurance / Cyber Security ? Operational Art and

100k’ View of STPA-Sec • Establish security engineering analysis foundation (WHY)

– Determine unacceptable system losses

– Determine vulnerabilities that can lead to losses

• Vulnerable system state + worst case environmental conditions Loss

– Develop High Level Functional Control Structure

• Perform analysis on Control Actions (WHAT)

– Find those control actions (information) that, if disrupted (wrong / missing), lead to vulnerable states previously identified

• Identify disruption scenarios (HOW)

• Adjust concept based on insights

Top-down System Engineering Process, Only Deep-Dive Where Necessary

8 [email protected] © Copyright William Young, 2014

Page 9: STPA-SEC for Cyber Security / Mission Assurancepsas.scripts.mit.edu/home/wp-content/uploads/2014/03/... · 2014-03-28 · Mission Assurance / Cyber Security ? Operational Art and

Determining Unacceptable Losses

• Ultimately come from mission “owner” – Subject matter experts can assist

• Very high level initially

• Will impact how mission is conducted

• Example – Injure or kill non-combatants

– Corporate reputation irreparably damaged

– Loss of PII

– Expose residents to dangerous radiation

9 [email protected] © Copyright William Young, 2014

Page 10: STPA-SEC for Cyber Security / Mission Assurancepsas.scripts.mit.edu/home/wp-content/uploads/2014/03/... · 2014-03-28 · Mission Assurance / Cyber Security ? Operational Art and

Determine System Vulnerabilities that Can Lead to Losses

• Establish foundation for analysis – Determine system vulnerabilities

• “System state or set of conditions that, together with a particular set of worst-case environmental conditions, will lead to a loss”

• Similar to Swiderski & Snyder Threat Modeling – “Set of conditions that must occur or be true for a threat to be

realized”

• Should be small, exhaustive set – “Designating a weapon impact area containing non-combatants”

– “Customer PII exposed to unauthorized individuals”

– “Inadvertently releasing radiation”

Focus: Identify and Control System Vulnerable States to Prevent Intentional (and Unintentional) Losses

10 [email protected] © Copyright William Young, 2014

Page 11: STPA-SEC for Cyber Security / Mission Assurancepsas.scripts.mit.edu/home/wp-content/uploads/2014/03/... · 2014-03-28 · Mission Assurance / Cyber Security ? Operational Art and

Specify the Required Functional Constraints (Initial Functional Security Requirements)

• Based on Vulnerabilities

• Identify necessary constraints on overall system function

• Examples – “Weapons must not be designated on areas

containing non-combatants”

– “Customer PII must not be disclosed to unauthorized individuals”

– “Radiation must not be inadvertently released”

Note That We Haven’t Talked About Technology Yet

11 [email protected] © Copyright William Young, 2014

Page 12: STPA-SEC for Cyber Security / Mission Assurancepsas.scripts.mit.edu/home/wp-content/uploads/2014/03/... · 2014-03-28 · Mission Assurance / Cyber Security ? Operational Art and

Develop High-Level Functional Control Structure

• Wide variety of ways to accomplish

• Start broadly and refine

• Must capture the control information

necessary to execute mission or system

function

12 [email protected] © Copyright William Young, 2014

Page 13: STPA-SEC for Cyber Security / Mission Assurancepsas.scripts.mit.edu/home/wp-content/uploads/2014/03/... · 2014-03-28 · Mission Assurance / Cyber Security ? Operational Art and

13 [email protected] © Copyright William Young, 2014

Example from Fictional Missile Defense System (Based on Grady Lee’s work)

Page 14: STPA-SEC for Cyber Security / Mission Assurancepsas.scripts.mit.edu/home/wp-content/uploads/2014/03/... · 2014-03-28 · Mission Assurance / Cyber Security ? Operational Art and

Operator

PhysicalPlant

OpenMSIV,CloseMSIV

OpenMSIVCloseMSIVSignal

MSIVValvePosi on,Rupture

MSIVValvePosi on,RuptureIndica ons

MSIVValveMechanicalForce

Actuator Sensor

Digital Control

System

MSIV & Cooling

System

MSIVValvePosi on,RuptureSignals

ControlledProcess

14 [email protected] © Copyright William Young, 2014

Simplified Example from Nuclear Power Plant Security Example

Page 15: STPA-SEC for Cyber Security / Mission Assurancepsas.scripts.mit.edu/home/wp-content/uploads/2014/03/... · 2014-03-28 · Mission Assurance / Cyber Security ? Operational Art and

Control Action Analysis

Control Action

Unsafe/Unsecure Control Actions

Not Providing Causes

Vulnerability

Providing

Incorrectly Causes

Vulnerability

Wrong Timing or Order Causes

Vulnerability

Stopped Too Soon or Applied Too Long

Close MSIV

Close MSIV not

provided when there is a rupture in the SG tube,

leak in main feedwater, or leak in main

steam line [V- 2, V-1, V-3]

Close MSIV provided when

there is no rupture or leak [V-4]

Close MSIV provided too early (while

SG pressure is high): SG pressure may rise, trigger relief valve, abrupt steam expansion [V-2, V-3]

N/A

15 [email protected] © Copyright William Young, 2014

Why Might A Trained Operator Issue the Wrong Command When There is NO Rupture in the System?

Page 16: STPA-SEC for Cyber Security / Mission Assurancepsas.scripts.mit.edu/home/wp-content/uploads/2014/03/... · 2014-03-28 · Mission Assurance / Cyber Security ? Operational Art and

Inadequate Control Algorithm

(Flaws in creation, process changes, incorrect modification

or adaptation)

Controller

Process Model (inconsistent, incomplete, or

incorrect)

Control input or

external information

wrong or missing

Actuator Inadequate operation

Inappropriate,

ineffective, or

missing control

action

Sensor Inadequate operation

Inadequate or

missing

feedback

Feedback

Delays

Component failures

Changes over time

Controlled Process

Unidentified or

out-of-range

disturbance

Controller

Process input missing or wrong

Incorrect or no

information provided

Measurement

inaccuracies

Feedback delays

Process output

contributes to

system hazard

Delayed

operation

Conflicting control actions

16 [email protected] © Copyright William Young, 2014

Page 17: STPA-SEC for Cyber Security / Mission Assurancepsas.scripts.mit.edu/home/wp-content/uploads/2014/03/... · 2014-03-28 · Mission Assurance / Cyber Security ? Operational Art and

Control Algorithm (Flaws in creation, process

changes, incorrect modification or adaptation)

Operator

Mental Model (inconsistent, incomplete, or

incorrect)

Control input or

external information

wrong or missing

Keyboard Inadequate operation

Screen Inadequate operation

Inadequate or

missing

feedback

Component failures

Changes over time

Digital Control System

Scenario:

1) Cyber Attack against

screen causes it to go

blank

2) Operator training says

screen only goes blank

under severe

degradation

3) Operator assumes plant

damage and issues

Close MSIV

Process input from Physical

Valve Sensor

Process output

contributes to Physical

valve actuator

CLOSE MSIV

SIGNAL

17 [email protected] © Copyright William Young, 2014

CLOSE MSIV

MSIV VALVE

POSITION

SIGNAL,

RUPTURE

STATUS

SIGNAL

MSIV VALVE

POSITION

INDICATION,

RUPTURE

STATUS

Page 18: STPA-SEC for Cyber Security / Mission Assurancepsas.scripts.mit.edu/home/wp-content/uploads/2014/03/... · 2014-03-28 · Mission Assurance / Cyber Security ? Operational Art and

Real World Work to Date

• Demonstrated ability to identify unknown vulnerabilities in a global mission

• Demonstrated ability to identify vulnerabilities in early system concept documents

• Demonstrated ability to improve ability of network defenders to identify and prioritize network assets based on mission assurance goals

– Real mission, Real mission owner, Real network

– Defenders able to more precisely identify what to defend & why (e.g. set of servers integrity of a single file)

– Defenders able to provide traceability allowing non-cyber experts to better understand mission impact of cyber disruptions

18 [email protected] © Copyright William Young, 2014

Page 19: STPA-SEC for Cyber Security / Mission Assurancepsas.scripts.mit.edu/home/wp-content/uploads/2014/03/... · 2014-03-28 · Mission Assurance / Cyber Security ? Operational Art and

Conclusions • STPA-Sec provides a way to frame the security challenge within a

mission context

• STPA-Sec provides a method to actually begin addressing security

(“high-level cyber vulnerabilities”) at the concept stage

• Security applications appear noticeably behind safety

applications…but seems to be following a similar trajectory

– Initial tests are encouraging

• Potential for non-zero sum game between attackers and defenders

19 [email protected] © Copyright William Young, 2014

Full Details Will Be Included in My Dissertation this Summer

Page 20: STPA-SEC for Cyber Security / Mission Assurancepsas.scripts.mit.edu/home/wp-content/uploads/2014/03/... · 2014-03-28 · Mission Assurance / Cyber Security ? Operational Art and

QUESTIONS ????

Page 21: STPA-SEC for Cyber Security / Mission Assurancepsas.scripts.mit.edu/home/wp-content/uploads/2014/03/... · 2014-03-28 · Mission Assurance / Cyber Security ? Operational Art and

William E. Young, Jr,

PhD Candidate, Engineering Systems Division

Systems Engineering Research Lab

Advisor: Prof N. Leveson

STPA-SEC

for

Cyber Security / Mission Assurance

21

25 March, 2014

[email protected] © Copyright William Young, 2014