Top Banner
Security Analysis Principles, Failure Analysis and Architectural Validation
43

Security Analysis Principles, Failure Analysis and Architectural Validation.

Dec 26, 2015

Download

Documents

Brenda Phillips
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security Analysis Principles, Failure Analysis and Architectural Validation.

Security Analysis

Principles, Failure Analysis and Architectural Validation

Page 2: Security Analysis Principles, Failure Analysis and Architectural Validation.

Overview

1. Basic Principles of Security Analysis (risc, concepts and threat models, topologies and architecture, connectivity, people problem)

2. Analysis of Failures (Societe General, OBSOC, Cisco)

3. Architectural Validation (Observation System, Enterprise Search Plattform)

Page 3: Security Analysis Principles, Failure Analysis and Architectural Validation.

Basic Principles of Security Analysis

- Risk and Risk Analysis

Page 4: Security Analysis Principles, Failure Analysis and Architectural Validation.

consequences

probability

Frequent but rel. harmless

Not frequent and rel. harmless

Frequent and damaging

Not frequent and damaging

Page 5: Security Analysis Principles, Failure Analysis and Architectural Validation.

Threat Frequence Damage Result

Forged tickets

Rare small Accept risc

Stolen Cards

More often Small Accept risc

DOS Attack on Service

Frequent Small Accept risc

Page 6: Security Analysis Principles, Failure Analysis and Architectural Validation.

Attack Attacker Difficulty Gain Risc Priority

Forged ticket

anybody easy Small high low

DOS Script kiddy Easy None/ fame

High high

Stolen ID Professional Medium Small medium medium

Page 7: Security Analysis Principles, Failure Analysis and Architectural Validation.

Portal Security

Pay once –use Many times

Same timeDifferent

days

Collect credit Card info

Card DB access

AuthenticateTo DB

UseStolen IDs

Get authorization

Entercredentials

Orderticket

Use ticket To travel

Show ID

Use fakedID

Use sameID

Sell customerprofiles

Access Server Logs

Access CRMDB

Get authorization

Page 8: Security Analysis Principles, Failure Analysis and Architectural Validation.

Security Meta-Pattern

• Spatial Transformation of things (mobility, ownership)

• Moral Transformations of Participants (from employee to attacker)

• ?

Page 9: Security Analysis Principles, Failure Analysis and Architectural Validation.

Basic Principles of Security Analysis

- Threat Models

Page 10: Security Analysis Principles, Failure Analysis and Architectural Validation.

User Threat Model

phising (credential attacks through social engineering)

certificate confusion

User Conceptual Model

Plattform Threat Model:

Browser bugs

credential attacks (cookie/sessionID stealiing)

virus/trojans

Ambient authority

Trusted path

Server Threat Model: SSL Cipher Specs

buffer overruns

authentication problems

maintenance problems (e-mail to customers etc.)

Plattform Threats

Developer Threat Model:

authorization errows

input /output validation errorsPeer Threat

Model:

sesson takeover, web trojans, XSS, SQL injection

Situational Threat Model:

- home, kiosk, Internet Cafe

Internet Threat Model:

Integrity, confidentiality, partner ident.

Intranet Threat Model: RBAC, SSO, End-to-end security

Web(2.0) Threat Model: CSS, Collaborating Users, malware, semantic Attacks

Enter-PriseDB

Page 11: Security Analysis Principles, Failure Analysis and Architectural Validation.

User Conceptual ModelsNew Design Patterns for Representation of Security Information needed

The „Personal Message“ is ALL a user has to guarantee that the message is from VISA. It could still be a MIM attack but I doubt that most user will even understand the importance of this field.

Page 12: Security Analysis Principles, Failure Analysis and Architectural Validation.

UML Actor

Humanity seen by IT

-No sex

-No age

-No culture

-No education

-No situation

-No mood

-No preferences

And so on…

Page 13: Security Analysis Principles, Failure Analysis and Architectural Validation.
Page 14: Security Analysis Principles, Failure Analysis and Architectural Validation.

Basic Principles of Security Analysis

- Topology and Architecture

Page 15: Security Analysis Principles, Failure Analysis and Architectural Validation.

Portal

Clients

Corp.-Clients

Ticket-Automata

Credit-Card comp.

Corp.Partner

InternalSystems

Employees

Call-Center

Conductors

MobileScanner

Book, cancel, buy

Access client info (bonus points etc.), online card booking

Payments, validations

Offer services, access client data, payments, commercials

Bahncard system, itinerary, reservations

Ticket validation

Trains

Content provisioning, client data

Help desk, trouble shooting

Store travel data

Inform, validate

Book for employees

Page 16: Security Analysis Principles, Failure Analysis and Architectural Validation.

Portal

ClientsCorp.-Clients

Ticket-Automata

Credit-Card comp.

Corp.Partner

InternalSystems

Employees

Call-Center

Conductors

MobileScanner

Autenticate, key management

Secure against tampering, secure client keys, authenticate system

compliance

Allow authenticated employee access to portal services

Secure delegation, authenticated systems, use services

Secure device, secure collected data

Trains

Authenticate, authorized, roles

Authenticate, authorized, restricted rights

Secure data

Prevent tampering, enforce compliance

Secure delegation, multi-party security

ClientEnvironm.

Trusted?

Telco line

Public line

intranetPublic line

wireless

Public line

Public line

Public line

intranet

offline

Page 17: Security Analysis Principles, Failure Analysis and Architectural Validation.

Other Company

client

Internet

Internet

External

TTP

Reverse

Proxy

Authent

Server

Author.

Server

App.

Server

User

Registry

Host

App.

Server

Credent.

Vault.

App.

Server App.

Server

Domain

Bridge

(TTP)

CSIv2CSIv2 CSIv2

WS-SWS-

S

Desktop

Page 18: Security Analysis Principles, Failure Analysis and Architectural Validation.

Security Context

App.Server

Syst.Mgt.Agent

App.DB

Sess..DB

Reg.

SSOServer

Author.Sever

Browser

FatClient

Rev.Proxy

WebServer

SystemManager

Browser Console

App.Server

Syst.Mgt.Agent

MOM

Browser

Console

WebServer

AdminProxy

MA,ST

MA,ST A,ST

A,ST

A,ST

MA,ST

MA,ST

A,ST

A, CAS

Page 19: Security Analysis Principles, Failure Analysis and Architectural Validation.
Page 20: Security Analysis Principles, Failure Analysis and Architectural Validation.
Page 21: Security Analysis Principles, Failure Analysis and Architectural Validation.

Rp

Auth.Server

Registry

AppServer

AppServer

AppServer

AppServer

TAI JAAS

cookie

JAAS

Subject

LTPA Key

Admin keykey

key

key

key key

key

SSOPW

Reg.PW

DBDB.PW

Reg.PW

DB.PW

Self signed

cert

Self signed

cert

AgentAgent

Agent

Agent

AgentAgent

Credential Context

SystemManagement

key

key

key

SSOPW

Page 22: Security Analysis Principles, Failure Analysis and Architectural Validation.

Failure Analysis

Societe General, OBSOC, Cisco

Page 23: Security Analysis Principles, Failure Analysis and Architectural Validation.

The Architecture of a 7.9 Billion $ Loss

• Junior Broker invests 73 Billion Dollar in Stocks and makes a 4.9 Bill. Euro Loss

• No embezzlement

• Management claims to be innocent

• Case resembles Barcley debacle (Singapore)

• Was it an IT-Security or management Problem?

Jean-Jacques Dubray on infoq.com

Page 24: Security Analysis Principles, Failure Analysis and Architectural Validation.
Page 25: Security Analysis Principles, Failure Analysis and Architectural Validation.

How it was done• Entry followed by cancellation of fake operations hiding the risks

and the P&L. The trader entered one or several fake operations in the systems so that they could be taken into account in risk calculation and value of the portfolio.... we have identified 947 transactions of this type.

• Entry of fake compensated transaction  (buy/sell) for identical quantities for different prices "outside the market", with the goal to mask the P&L when transactions become effective... we have identified 115 transactions of this type

• Entry of provisions that would temporarily cancel his P&L. The trader used the ability to correct model biases, normally reserved to trader-assistants -without access rights to prevent traders to enter them-, to enter positive or negative provisions [in the middle-office system] to modify the calculated value [of a position] by the front-office system. We have identified 9 operations of this type.

Page 26: Security Analysis Principles, Failure Analysis and Architectural Validation.

Who is responsible?

• First company report: the top management

• Second company report: middle management, helpers

• Kerveils lawyer jokes: in the third company report the cleaning ladies will be blamed for the desaster…

Page 27: Security Analysis Principles, Failure Analysis and Architectural Validation.

What PWC recommends

• using biometric authentication instead of Windows authentication for the most sensitive applications

• forbidding any transaction from the front-office onto middle-office applications

• considering forbidding any XL connection where the password is stored in the spreadsheet

• secure reporting applications (the report notes that many reporting feeds have been insufficiently tested)

• check if the workstation matches the potential user of an application

Page 28: Security Analysis Principles, Failure Analysis and Architectural Validation.

Questions for Risk Mitigation

• Does the action work towards the intended goal?• Is the action in a reasonable relation to the risk it

prevents or mitigates?• Are there strong negative side-effects?• Does the action calm down the nerves or does it

really help?• Are the people who recommend the action the

same that will profit by seeing it implemented?• Is it a „cover your ass“ action to avoid

responsibility?

Page 29: Security Analysis Principles, Failure Analysis and Architectural Validation.

IT-Architecture

• Is a synchronous client-server system (DB backed) the right solution?

• How could an asynchronous, event based system detect fraud?

Page 30: Security Analysis Principles, Failure Analysis and Architectural Validation.

Architectural Validation

Observation System Analysis

Page 31: Security Analysis Principles, Failure Analysis and Architectural Validation.

-Use of security related meta-pattern (transformations like division, maliciousness)

-Results of Mobility

-Non repudiation problems

-Legal Aspects

-Key Management Problems

- POLA

- Data Security and safety (backup etc.)

Page 32: Security Analysis Principles, Failure Analysis and Architectural Validation.

Crime scene

operator

telnet

ftp

Non-root User

camera

Sig.key

PW

MaterialPW

Page 33: Security Analysis Principles, Failure Analysis and Architectural Validation.

Crime scene

operator

telnetftp

Non-root User

camera

Sig.key

PW

Material

Platform threat model:Tampering, physical Security, Credential protection, Signing, Authority, Entry Protection

Internet threat model: Transport security (integrity, confidentiality, partner authentication

Intranet threat model: access control, auditing, archiving

PW

Page 34: Security Analysis Principles, Failure Analysis and Architectural Validation.

Crime scene

Non-root User

camera

Sig.key

PW

Material

Theft

Accountability

Applic.POLA

maintenance

Telnetd

FTPd

Non-repudiation

Insertion attack

firewall

Page 35: Security Analysis Principles, Failure Analysis and Architectural Validation.

telnetftp

integrity

confidentiality

OS-User required

Correct target?

Correct sender?

Dedicated line?

Open line (modem, DSL)

Page 36: Security Analysis Principles, Failure Analysis and Architectural Validation.

operator

authentication

archivingModification control

theft

key

authorization

Page 37: Security Analysis Principles, Failure Analysis and Architectural Validation.

Crime scene

operator

telnetftp

Non-root User

camera

Sig.key

PW

Material

Transformations: spatial and moral

PW

1

2

Page 38: Security Analysis Principles, Failure Analysis and Architectural Validation.

HSM

Crime scene

operator

Non-root User

camera

Sig.key

Material

Transformations: spatial and type

1

HSM

APPl.

APPl.

Browser

Intranet

Production

Sig.key

Archive

2

Page 39: Security Analysis Principles, Failure Analysis and Architectural Validation.

Architectural Validation

Enterprise Search Platform

Page 40: Security Analysis Principles, Failure Analysis and Architectural Validation.

- the importance of backend security)

- Access to platform

-Privacy

-Authentication and Access Control Problems

Page 41: Security Analysis Principles, Failure Analysis and Architectural Validation.

WEB

DB

FS

IndexerDocumentProcessor

Spider

ConnectorIndex

Q&RServer

FrontendApplication

Query API

End-user

AdminServer

User/Groups

Bus.App.

FederatedSearchEngine

Connector

Document Sources/ ACLs

RegistryServer

Admin.

Search EnginePlatform

Page 42: Security Analysis Principles, Failure Analysis and Architectural Validation.

DataSource

EnterpriseSearchPlatform

Index

Front-EndAppl./User

Page 43: Security Analysis Principles, Failure Analysis and Architectural Validation.

Signs and Minds

• Infoq.com articles on societe general desaster

• Datenschleuder on OBSOC desaster