The
Systems Security Engineering
Capability Maturity Model
(SSE-CMM)
Karen Ferraiolo
ISSEA Director of Technical Development
[email protected] 410-309-1780
Topics
• Why define security engineering practices?
• How can they best be defined?
• Who developed and supports the SSE-CMM?
• What is security engineering?
• How does the SSE-CMM* define practices
for security engineering?
• What is the relation between the SSE-CMM
and other methods of obtaining assurance?
* SSE-CMM = Systems Security Engineering Capability Maturity Model
2
Where are we now?
• Security needs are changing
– global interconnection
– massive complexity
– release of beta versions of products
– evolutionary development of systems
3
Where are we now? (cont.)
• Security products/systems
– come to market through:
• lengthy and expensive evaluation
• no evaluation
– results:
• technology growth more rapid than its assimilation
• unsubstantiated security claims
• Security services
– viewed as an art
– relies on individual expertise
• Secure system operation and maintenance
– everyone has security concerns
– improved practices are needed today
4
The Relevance of Competencies
5
What is needed?
• Continuity
• Repeatability
• Efficiency
• Assurance
6
What tools are currently available
to address the problem?
Tool Target Benefit
ISO-9000 Quality Assurance Defined Software QA
Process for Software Process
CMMs Engineering/ Continuously Improved
Organizational Processes
Processes
CISSP Security Individual Certification
Engineering
Professionals
ISO-13335 Security Defined Security
Management Management Processes
Processes
CMM = Capability Maturity Model
CISSP = Certification of Information Systems Security Professionals
7
Why use the CMM approach
to define practices?
• Accepted way of defining practices and
improving capability
• Increasing use in acquisition as an indicator of
capability
• Return on Investment for software indicates
success
– productivity gains per year: 9 - 67%
– yearly reduction in time to market: 15 - 23%
– yearly reduction in post-release defect reports: 10 - 94%
– value returned on each dollar invested: 4 - 8.8%
Statistics from:“Benefits of CMM-Based Software Process Improvement:
Initial Results,” CMU/SEI-94-TR-13, August 1994 8
Why was the SSE-CMM
developed?
• Objective:
– advance security engineering as a defined, mature, and
measurable discipline
• Project Goal:
– Develop a mechanism to enable:
• selection of appropriately qualified security
engineering providers
• focused investments in security engineering practices
• capability-based assurance
9
Who developed the SSE-CMM?
• SSE-CMM Project
– Original work and project infrastructure sponsored
by NSA
– Additional support provided by OSD and
Communications Security Establishment (Canada)
– Collaborative effort by industry and government on
their own funding
10
SSE-CMM Project Participants
44 Pioneers
• Arca Systems, Inc. • Motorola
• BDM International Inc. • National Center for Supercomputing Applications
• Booz-Allen and Hamilton, Inc. • National Institute for Standards and Technology
• Communications Security Establishment (Canadian) • National Security Agency
• Computer Sciences Corporation • Naval Research Laboratory
• Data Systems Analysts, Inc. • Navy Command, Control, Operations Support Center;
• Defense Information Systems Agency Research, Development, Testing, and Evaluation
Division (NRaD)
• E-Systems
• Northrop Grumman
• Electronic Warfare Associates - Canada, Ltd.
• Office of the Secretary of Defense
• Fuentez Systems Concepts
• Oracle Corporation
• G-J Consulting
• pragma Systems Corp.
• GRC International, Inc.
• San Antonio Air Logistics Center
• Harris Corp.
• Science Applications International Corp.
• Hughes Aircraft
• SPARTA, Inc.
• Institute for Computer & Information Sciences
• Stanford Telecom
• Institute for Defense Analyses
• Systems Research & Applications Corp.
• Internal Revenue Service
• Tax Modernization Institute
• ITT Aerospace
• The Sachs Groups
• JOTA System Security Consultants Inc.
• tOmega Engineering
• Lockheed Martin
• Trusted Information Systems
• Merdan Group, Inc.
• TRW
• MITRE Corporation
• Unisys Government Systems
• Mitretek Systems
11
What is ISSEA?
ISSEA
SSE-CMM Board of
Advisory
Support Sustaining
Council
Organization Members
• Selected by SSE-CMM Project to continue support
• Non-profit professional membership organization
• Oversees SSO in furthering development and use of the
SSE-CMM
• receives advice and guidance from Advisory Council and
Board of Sustaining Members
12
* ISSEA = International Systems Security Engineering Association
Membership Options
• Organizations
– Sustaining Membership
– Charter Sustaining Membership
• Individuals
– Individual membership
13
ISSEA’s Current Activities
• ISO* Standardization
– ISSEA approved as Publicly Available Standard
(PAS) Submitter
• Annual Conference
– February 28 - March 2, 2001
• Appraiser Certification
– developing program for appraiser and facilitator
certification
• Training
– 2 and 4 day courses in model and appraisal method
• SSE Textbook 14
* ISO = International Organization for Standardization
What is Security Engineering?
• Definition: No precise definition exists today!
• Goals:
– Understand Security Risks
– Establish Security Needs
– Develop Security Guidance
– Determine Acceptable Risks
– Establish Assurance
15
Who practices security
engineering?
• Developers
• Product vendors
• Integrators
• Buyers
• Security evaluation organizations
• System administrators
• Consulting/service organizations
• Program/project management
16
When is security engineering
practiced?
• Pre-concept
• Concept exploration and definition
• Demonstration and validation
• Engineering, development, and manufacturing
• Production and deployment
• Operations and support
• Disposal
17
Who needs to know about
security?
• Enterprise Engineering
• Systems Engineering
• Software Engineering
• Human Factors Engineering
• Communications Engineering
• Hardware Engineering
• Test Engineering
• Systems Administration
18
What do security engineering
activities encompass?
• Operations Security • Administrative Security
• Information Security • Communications
• Network Security Security
• Physical Security • Emanations Security
• Personnel Security • Computer Security
19
How does the SSE-CMM define
best practices?
• Domain Aspect
– process areas
– base practices
• Organizational Capability Aspect
– implementation of process areas
– institutionalization of process areas
20
SSE-CMM Base Architecture
• Three Domain Process Categories
– Security Engineering
– Project
– Organization
• Five Capability Levels
– Performed Informally
– Planned and Tracked
– Well Defined
– Quantitatively Controlled
– Continuously Improving
21
SSE-CMM Process Categories
Engineering
Processes
Project
Processes
Organizational
Processes
22
SSE-CMM Organizational
Process Areas
• Define Organization’s Security Engineering
Process
• Improve Organization’s Security Engineering
Process
• Manage Security Product Line Evolution
• Manage Security Engineering Support
Environment
• Provide Ongoing Skills and Knowledge
• Coordinate with Suppliers
23
SSE-CMM Project Process
Areas
• Ensure Quality
• Manage Configurations
• Manage Program Risk
• Monitor and Control Technical Effort
• Plan Technical Effort
24
SSE-CMM Engineering
Process Areas
• Administer Security • Coordinate Security
Controls • Monitor Security
• Assess Impact Posture
• Assess Security Risk • Provide Security Input
• Assess Threat • Specify Security
• Assess Vulnerability Needs
• Build Assurance • Verify and Validate
Argument Security
25
The Security Engineering
Process
Product, System,
or Service
Engineering
Engineering
Process
Process
Assurance
Assurance Risk
Risk
Process
Process Process
Process
Assurance Risk
Argument Information
26
The Security Engineering
Process
Product, System,
or Service
Engineering
Engineering
Process
Process
Assurance
Assurance Risk
Risk
Process
Process Process
Process
Assurance Risk
Argument Information
27
Security Risk Area
• Purpose:
– To identify combinations of threat, vulnerability, and
impact that deserve further attention
• Goals:
– Determine Metrics
– Gather Threat, Vulnerability, and Impact Information
– Identify and Assess Risks
28
What is Risk?
• Definition
– The expected value (likelihood * consequence)
associated with an unwanted event
• Approaches
– All involve notions of consequence, threat, and
vulnerability
29
Risk Definitions
• Events: threat-vulnerability pairs that lead to
unwanted outcomes
• Likelihood: the probability that an unwanted
event will occur
Likelihood = Threat ∗ Vulnerability
30
Risk Definitions
• Consequence: the impact, either harm or loss,
associated with an exploited vulnerability
• Risk: combines the concepts of likelihood and
consequence
Risk = Likelihood ∗ Consequence
31
The Model
Assess Assess Assess Assess
Assess
Assess Assess Assess Security
Threat
Threat Vulnerability
Vulnerability Impact
Impact Security
Risk
Risk
Threat Vulnerability Impact Risk
Information Information Information Information
32
PA 04: Assess Threat
Goal
• Threats to the security of the system are identified and
characterized
BP 04.01 Identify Natural Threats
BP 04.02 Identify Man-made Threats
BP 04.03 Identify Threat Units of Measure
BP 04.04 Assess Threat Agent Capability
BP 04.05 Assess Threat Likelihood
BP 04.06 Monitor Threats and Their
Characteristics 33
PA 05: Assess Vulnerability
Goal
• An understanding of system security vulnerabilities
within a defined environment is achieved
BP.05.01 Select Vulnerability Analysis
Method
BP.05.02 Identify Vulnerabilities
BP.05.03 Gather Vulnerability Data
BP.05.04 Synthesize System Vulnerability
BP.05.05 Monitor Vulnerabilities and Their
Characteristics
34
PA 02: Assess Impact
Goal
• The security impacts of risks to the system are
identified and characterized
BP.02.01 Prioritize Capabilities
BP.02.02 Identify System Assets
BP 02.03 Select Impact Metrics
BP 02.04 Identify Metric Relationship
BP 02.05 Identify and Characterize Impacts
BP 02.06 Monitor Impacts
35
PA 03: Assess Security Risk
Goals
• An understanding of the security risk associated with
operating the system within a defined environment
is achieved
• Risks are prioritized according to a defined methodology
BP.03.01 Select Risk Analysis Method
BP 03.02 Exposure Identification
BP 03.03 Assess Exposure Risk
BP 03.04 Assess Total Uncertainty
BP 03.05 Prioritize Risks
BP 03.06 Monitor Risks and Their Characteristics
36
The Security Engineering
Process
Product, System,
or Service
Engineering
Engineering
Process
Process
Assurance
Assurance Risk
Risk
Process
Process Process
Process
Assurance Risk
Argument Information
37
What Is Assurance?
• Definition:
– “the degree of confidence that security needs are
satisfied”
• What are security needs?
• What is confidence?
• How can we measure?
38
Assurance Area
• Purpose:
– To generate and communicate confidence that the
enterprise has satisfied its security needs
• Goals:
– Appropriate evidence is collected efficiently
– Clear and convincing argument establishing confidence
is created
39
The Model
Verify
Verifyand
and
Validate
Validate
Security
Security
Verification Build
and Build
Assurance
Assurance
Validation Argument
Evidence Argument
Assurance
Argument
Many other PAs
Many other PAs
Many
Manyother
Many
Many otherPAs
other
other PAs
PAs
PAs
Evidence
40
Assurance Arguments
Top Level
Claim
People Process Environment Technology
Argument Argument Argument Argument
41
PA 11: Verify and Validate
Security
Goals
• Solutions meet security requirements
• Solutions meet the customer's operational security needs
BP.11.01 Identify Verification and Validation
Targets
BP.11.02 Define Verification and Validation
Approach
BP.11.03 Perform Verification
BP.11.04 Perform Validation
BP.11.05 Provide Verification and Validation
Results
42
PA 06: Build Assurance
Argument
Goal
• The work products and processes clearly provide the
evidence that the customer’s security needs have been
met
BP.06.01 Identify Assurance Objectives
BP.06.02 Define Assurance Strategy
BP.06.03 Control Assurance Evidence
BP.06.04 Analyze Evidence
BP.06.05 Provide Assurance Argument
43
The Security Engineering
Process
Product, System,
or Service
Engineering
Engineering
Process
Process
Assurance
Assurance Risk
Risk
Process
Process Process
Process
Assurance Risk
Argument Information
44
What is Engineering?
• Solving problems
– Requirements
– Identify candidate solutions
– Tradeoff analyses
– System configuration
• Part of overall systems processes
– Not an isolated activity
– Must balance considerations of performance, safety,
human factors, etc…
45
Security Engineering Area
• Purpose:
– To solve engineering problems involving security
• Goals:
– Determine customer security needs
– Develop solutions and guidance on security issues
– Coordinate with other engineering groups
– Monitor security posture
46
The Model
Risk
Specify
Specify Information Monitor
Monitor
Security
Security Security
Security
Needs
Needs Posture
Posture
Requirements, Coordinate
Coordinate Configuration
Policy, etc... Security
Security Information
Provide
Provide Administer
Administer
Security
Security Security
Security
Input
Input Controls
Controls
Solutions,
Guidance, etc...
47
PA 10: Specify Security Needs
Goal
• A common understanding of security needs is reached
between all parties, including the customer
BP.10.01 Gain Understanding of Customer’s Security
Needs
BP.10.02 Identify Applicable Laws, Policies, and
Constraints
BP.10.03 Identify System Security Context
BP.10.04 Capture Security View of System Operation
BP.10.05 Capture Security High-Level Goals
BP.10.06 Define Security Related Requirements
BP.10.07 Obtain Agreement
48
PA 09: Provide Security Input
Goals
• All system issues are reviewed for security implications and are
resolved in accordance with security goals
• All members of the project team have an understanding of security
so they can perform their functions
• The solution reflects the security input provided
BP.09.01 Understand Security Input Needs
BP.09.02 Determine Security Constraints and
Considerations
BP.09.03 Identify Security Alternatives
BP.09.04 Analyze Security of Engineering
Alternatives
BP.09.05 Provide Security Related Guidance
49
BP.09.06 Provide Operational Security Guidance
PA 07: Coordinate Security
Goals
• All members of the project team are aware of and
involved with security engineering activities to the extent
necessary to perform their functions
• Decisions and recommendations related to security are
communicated and coordinated
BP.07.01 Define Coordination Objectives
BP.07.02 Identify Coordination Mechanisms
BP.07.03 Facilitate coordination
BP.07.04 Coordinate Security Decisions and
Recommendations
50
PA 01: Administer Security
Controls
Goal
• Security controls are properly configured and used
BP.01.01 Establish Security Responsibilities
BP.01.02 Manage Security Configuration
BP.01.03 Manage Security Awareness, Training,
and Education Programs
BP.01.04 Manage Security Services and Control
Mechanisms
51
PA 08: Monitor Security Posture
Goals
• Both internal and external security related events are
detected and tracked
• Incident responses are in accordance with policy
• Changes to the operational security posture are identified
and handled in accordance with the security objectives
BP 08.01 Analyze Event Records
BP 08.02 Monitor Changes
BP 08.03 Identify Security Incidents
BP 08.04 Monitor Security Safeguards
BP 08.05 Review Security Posture
BP.08.06 Manage Security Incident Response
BP.08.07 Protect Security Monitoring Artifacts 52
How does the SSE-CMM define
best practices?
• Domain Aspect
– process areas
– base practices
• Organizational Capability Aspect
– implementation of process areas
– institutionalization of process areas
53
SSE-CMM Base Architecture
• Three Domain Process Categories
– Security Engineering
– Project
– Organization
• Five Capability Levels
– Performed Informally
– Planned and Tracked
– Well Defined
– Quantitatively Controlled
– Continuously Improving
54
Organizational Capability Measures
5 Continuously Improving
Improve organizational capability
t
en
Improve process effectiveness
em
4 Quantitatively Controlled
ov
pr
Im Establish measurable quality goals
Objectively manage performance
tal
3 Well-Defined
en
Define a standard process
rem
Perform the defined process
Inc
Coordinate practices
2 Planned and Tracked
Plan Performance
Disciplined Performance
Verify Performance
Track Performance
1 Performed Informally
Base Practices Performed 55
SSE-CMM Model Architecture
Domain
BasePractices
Base Practices
Base
Base Practices
Practices
BasePractices
Base Practices
ProcessAreas
Process Areas
Process Areas
Process Areas
Process Category
Capability 5
4
Generic
Generic Common
Generic
Generic Common
Common Capability 3
Practices
Generic
Practices
Generic Features
Practices
Practices Features
Features Level
Practices
Practices 2
56
Applying Capability Measures to
Base Practices: the Rating
Profile
5
Capability 3
Level 2
0
PA01 PA02 PA03 PA04 PA05
Process Area
57
The SSE-CMM Appraisal Process
Planning
Phase Preparation
Phase On-Site Phase
Scope Appraisal Executive Brief/
Prepare
Opening Meeting Reporting
Appraisal Team
Collect Phase
Preliminary Interview Leads/ Develop Final
Administer
Evidence Practitioners Report
Questionnaire
Plan Appraisal Consolidate Analyze Data Report Appraisal
Evidence Outcomes to
Establish Findings Sponsor
Analyze
Develop Rating Manage
Evidence/
Profile Appraisal
Questionnaire
Artifacts
Manage Records
Report Lessons
58
Conduct Wrap Up
Learned
Using the SSE-CMM
Acquisition
Decisions
Product Vendors
System
Development
Service Providers
Compliance
Critical Business Operations
SSE-CMM 59
Where is it taking hold?
• US National Security Agency (NSA)
– evaluating INFOSEC assessors’ capability
– trusted product evaluation support
– applying within to improve
• Canadian Communications Security Establishment (CSE)
– evaluating contractors’ capability
– trusted product evaluation support
– best practices for Canadian CERTs
• United States Agency for International Development
– framework for model security program
– component of best practices framework
• Internal Revenue Service Information Systems
– pilot program for improving security practices
• SSE-CMM Project Pilot Program
– organizations used results to improve practices 60
Contributors to
Product/Project Success
Product/Project
Cost/Quality/Timeliness
Process
People Technology
61
Determining the right combination
Top Level
Claim
People Process Environment Technology
Argument Argument Argument Argument
62
Reference:
Williams, Jeffrey; Jelen, George,“A Framework for Reasoning about Assurance,” April 23, 1998
Summary
• Why define best practices?
– Focus investments in security engineering practices
• How can they best be defined?
– Use an accepted and proven mechanism
• What is security engineering?
– No precise definition, but can discuss goals
• How does the SSE-CMM define best practices?
– Domain base practices
– Capability measures
• What is the relation between the SSE-CMM and
other methods of obtaining assurance?
– SSE-CMM guides effectiveness of process
– all contribute to assurance 63
For More Information
International Systems Security
Engineering Association:
www.issea.org
Systems Security Engineering
Capability Maturity Model
www.sse-cmm.org
64