Secure By Design Thoughts Part 1

Secure By Design Thoughts Part 1

With #securitybydesign , #securitybydefault , #securebydesign, #securebydefault trending this week, some thoughts on what it should mean.

First up, disclaimer - unless otherwise stated, all views expressed are mine and don’t necessarily reflect those of my employer or MITRE sponsors.

I don't if anyone except the authors saw the drafts of NIST SP 800-160 Volume 1 Revision 1 Engineering Trustworthy Secure Systems (V1R1) with it, but those early drafts had what is now Appendix D titled Secure by Design - in shared drafts and the final we went with Trustworthy Secure Design. These thoughts follow a bit along those lines of D, but also realize the team published Appendix D as part of the whole 15 months ago, and from there limited ourselves to clarifying based on comments received. So I'm feeling free to vary from that expression, following some lessons learned on presenting.

Design Approach

A design approach for engineering trustworthy secure systems must establish and maintain the ability to deliver system capabilities while minimizing the occurrence and extent of loss. The approach must provide a system structure for optimal employing engineered features and devices. The system design must provide the intended behaviors and outcomes, avoid the unintended behaviors and outcomes, prevent loss, and limit loss when it occurs (Opening of Appendix D.1 of V1R1, paraphrased for brevity).

Stated more philosophically, the design approach for a secure by design system must think strategically about outcomes: deliver required performance, minimize unacceptable effects of loss. Later may surprise many, but other than "pride" or other extraneous emotion, the ultimate aim is to avoid effects against a system's objectives - meet the system purpose, keep stakeholders happy, etc. Not security for security's sake.

Much written recently about security-by-design focuses to tactics. But tactics without strategy is the noise before defeat (Sun Tzu, Art of War). Granted, tactics are needed (Strategy without tactics is the slowest path to victory, ibid), but so much of security focuses to tactics without thinking strategy (Young & Leveson) ( William "Dollar" Young )

The elements to a design approach we identified in V1R1 include (again, paraphrasing - See V1R1 D.1)

  • know the intended behaviors and outcomes for the system
  • Identify the states and conditions reflecting those intended behaviors and outcomes
  • Identify states and conditions that potentially lead to loss in the system (and NOT just the ones you "know" the malicious actor can create).
  • select and alter the system design to prevent loss to the extent practicable (preferred) and limit the loss that does occur (where, when, and to the extent necessary and practicable)
  • Iterate

Security Design Order of Precedence

Informing the design approach is the security design order of precedence. Very briefly

  1. Among design alternatives, select those that eliminate the potential for loss
  2. Within a selected design, select means to reduce loss potential (e.g., reduce interfaces, segment)
  3. Incorporate engineered features to control loss potential
  4. Provide visibility and feedback to external entities
  5. Incorporate signage, training, etc.

As an order, those early stages are preferred means over later. One nuance is that in executing 1 and 2, need to look to setting the stage for successful incorporation of engineering features, such as those that support mediating access and inform situational awareness.

Assurance

For V1R1, we dedicated a whole appendix (Appendix F) though threads on it appear exist throughout. For now, just want to focus to assurance associated with incorporating engineered features to control loss potential.

Engineered features, or mechanisms, must meet four essential design criteria (Uchenick & Vanfleet, 2005):

  • Non-Bypassable: the mechanism is of no use if it can be circumvented
  • Evaluatable: if the mechanism is too complicated to be evaluated for correctness in implementation (not just tested!!!!!), then there cannot be sufficient confidence in its function.
  • Always Invoked: loss may occur when the mechanism is off or suspended
  • Tamper-proof: if it can be modified in an unauthorized manner, integrity of function is in doubt.

Two foundational principles

Two foundational principles for a secure system are completed mediation and system control.

Complete mediation dates back about 50 years (well before it become core to zero trust!), formalized in the work of Saltzer and Schroeder but you can see it expressed in some informal ways in the Ware Report (1970) and the Anderson Report (1972). It is the idea that any access to an entity (e.g., a resource) must be mediated - that is, the access must be authorized.

System control in simple terms means that system functions and behaviors are kept to what they should be.

Perhaps these are to be expanded on in future articles.

Closing

Secure by design is not just some baking in of tactics. It is a deliberate perspective to design, one that needs to be as foundational to system design as performance and safety ( INCOSE Systems Engineering Vision 2035)

Thoughts, comments, suggestions for follow ons?

#INCOSE #cyberresilience #cybersecurity

Additional reference info

Uchenick GM, Vanfleet WM (2005) Multiple Independent Levels of Safety and Security: High Assurance Architecture for MSLS/MLS. IEEE Military Communications Conference, pp. 610-614 Vol. 1.

Anton Abashkin

Application / Software Security Engineer & Researcher

1 年

So I understand correctly, would incorporating something like dual authorization fall under SecDOP #3?

回复
Anton Abashkin

Application / Software Security Engineer & Researcher

1 年

Could you expand on the difference between “evaluated for correctness in implementation” and tested?

回复
Pons Mudivai Arun

Curious about systems' interconnectedness, emergence, and impact

1 年

That is beautifully said Mark W.; I would say the modern zero trust is about affirming the 1970s mediation concept - but in a "continuous" fashion throughout the access instead of just doing it once.?Please help to learn better if if I"m missing something Regarding Strategy vs. Tactics, Looking at it as different sides of a spectrum is a crucial reason for a strategy's failure. Strategy -?It is a mixture of guiding policy *AND* coherent actions designed to surmount high-stakes challenges (ie, Crux). Here are the fundamental misconceptions about the strategy, * It is all about deciding what to do - in reality; it is primarily around what is going on to diagnose the Crux of the current challenge to comprehend the current situation much better. * It is just a big-picture overall direction (to realize the leaders' superficial sprinkling of buzzwords), divorced from any specific action. By doing this, we often ignore the role of strategy in defining coherent actions - which creates a wide chasm between the "Strategy" and "Tactical implementation". Thanks to Richard Rumelt for changing my perspective on the actual 'strategy' through his books. #zerotrust #strategy #securebydesign

回复

要查看或添加评论,请登录

Mark W.的更多文章

  • RIF Incoming

    RIF Incoming

    My company is preparing for its first broad Reduction in Force (RIF) in a generation - though there have been targeted…

    5 条评论
  • The New Triad?

    The New Triad?

    Unless otherwise stated, all views expressed are mine and don’t necessarily reflect those of my employer or MITRE…

    3 条评论
  • Confusion: Social Security

    Confusion: Social Security

    Last time I did an article on confusion around the chaos of financial aspects, with intent in time to get back it with…

    1 条评论
  • Red Tape

    Red Tape

    Reading through Senator Roger Wicker's Restoring Freedom's Forge this week, the quote of Admiral Hyman Rickover at the…

    5 条评论
  • Confusion

    Confusion

    For a second post, and maybe the immediate next few, I thought I would talk to the confusion around income generation…

    2 条评论
  • Ron Ross

    Ron Ross

    With Ron Ross' announced retirement this past week (Post | Ron Ross' Retirement), I thought I'd take some time to talk…

    4 条评论
  • Embracing Opportunity for Change

    Embracing Opportunity for Change

    My current company allows easy transitions to part time - and I've just ended the second week of it. I do see this as a…

    5 条评论
  • Evidence-Based Assurance

    Evidence-Based Assurance

    Some readers may have heard Michael McEvilley and/or I speak to evidence-based assurance. I forget when we even started…

    1 条评论
  • Visiting McNamara's Fallacy and Folly

    Visiting McNamara's Fallacy and Folly

    Talking about a pivot - I was about one thing on data/evidence fallacies with things security/resilience, and in…

    2 条评论
  • "Security" or Pseudo-Science

    "Security" or Pseudo-Science

    David Slater is a great follow. Safety and Security are closer related than most realize - much of what Michael…

    8 条评论

社区洞察

其他会员也浏览了