DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.

Slides:



Advertisements
Similar presentations
Software Quality Assurance Plan
Advertisements

Chapter 7: Key Process Areas for Level 2: Repeatable - Arvind Kabir Yateesh.
More CMM Part Two : Details.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
SAE AS9100 Quality Systems - Aerospace Model for Quality Assurance
Information Systems Security Officer
Fundamentals of Information Systems, Second Edition
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Computer Security: Principles and Practice
Stephen S. Yau CSE , Fall Security Strategies.
1 CMPT 275 Software Engineering Requirements Analysis Process Janice Regan,
Configuration Management
Software Engineering Institute Capability Maturity Model (CMM)
Release & Deployment ITIL Version 3
Internal Auditing and Outsourcing
What is Business Analysis Planning & Monitoring?
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Effective Methods for Software and Systems Integration
Chapter 2: Overview of Essentials ISE 443 / ETM 543 Fall 2013.
S/W Project Management
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
Introduction to Software Quality Assurance (SQA)
C &A CS Unit 2: C&A Process Overview using DITSCAP Jocelyne Farah Clinton Campbell.
Information Systems Security Computer System Life Cycle Security.
Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition Chapter 7 Software Supporting Processes and Software Reuse.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
N-Wave Shareholders Meeting May 23, 2012 N-Wave Security Update Lisa
Software System Engineering: A tutorial
NIST Special Publication Revision 1
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
UNCLASSIFIED DITSCAP Primer. UNCLASSIFIED 1/18/01DITSCAP Primer.PPT 2 DITSCAP* Authority ASD/C3I Memo, 19 Aug 92 –Develop Standardized C&A Process DODI.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
ISM 5316 Week 3 Learning Objectives You should be able to: u Define and list issues and steps in Project Integration u List and describe the components.
Software Quality Assurance
Project Life Cycle.
Lecture 7: Requirements Engineering
© Mahindra Satyam 2009 Configuration Management QMS Training.
KS3 Phase4 Client Server Monitoring System October 1, 2008 by Stephen, Seema, Kam, Shpetim.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
Certification and Accreditation CS Syllabus Ms Jocelyne Farah Mr Clinton Campbell.
Maintaining and Sustaining System Integrity Configuration Management for Transportation Management Systems Configuration management (CM) describes a series.
Evaluate Phase Pertemuan Matakuliah: A0774/Information Technology Capital Budgeting Tahun: 2009.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Software Development Process CS 360 Lecture 3. Software Process The software process is a structured set of activities required to develop a software.
SwCDR (Peer) Review 1 UCB MAVEN Particles and Fields Flight Software Critical Design Review Peter R. Harvey.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
1 Certification and Accreditation CS Unit 4:RISK MANAGEMENT Jesus Gonzalez Kalpana Bahunoothula Jocelyne Farah.
Principles of Information Security, Fourth Edition Chapter 1 Introduction to Information Security Part II.
 System Requirement Specification and System Planning.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Introduction for the Implementation of Software Configuration Management I thought I knew it all !
Software Project Configuration Management
Software Quality Control and Quality Assurance: Introduction
Fundamentals of Information Systems, Sixth Edition
Software and Systems Integration
Introduction to the Federal Defense Acquisition Regulation
IEEE Std 1074: Standard for Software Lifecycle
Software Requirements
Description of Revision
Certification and Accreditation
Engineering Processes
Chapter 1 (pages 4-9); Overview of SDLC
HART Technologies Process Overview
Engineering Processes
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Software Reviews.
{Project Name} Organizational Chart, Roles and Responsibilities
Presentation transcript:

DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson

Diagram

Overview of Verification Purpose is to verify “the evolving system’s compliance with the risk management requirements in the SSAA” Verifies security requirements before the formal C&A 3 steps: Refine the SSAA System Development and Integration Initial Certification Analysis (6 parts)

Note about the steps Each task in the initial certification analysis of the process provides a “check-list” for what you should do, depending on what level of certification is being sought They are all pretty much the same for each task, only tailored to that particular task All levels (1-4) require the minimal security activities checklist Level 1 only requires the minimal security activities checklist

Higher levels - Review Level 2 – Analyze the system, identify interfaces to other computers, and evaluate for consistency and compliance Level 3 – A more detailed Level 2 analysis, with validation through testing, including security test plans and procedure Level 4 – Comprehensive analysis including extensive testing and formal analysis

Minimal Security Activities Checklist 1. Does the systems architecture documentation describe the architecture, including graphics, of the system and interconnections providing or supporting, system functions? 2. For a domain, does the systems architecture show how multiple systems link and interoperate, and describe the internal construction and operations of particular systems within the architecture? 3. For the individual system, does the systems architecture include the physical connection, location, and identification of key nodes (including circuits, networks, etc.)?

MSA Cont… 4. Does the system architecture specify system and component performance parameters (e.g., mean time between failure, maintainability, and availability)? 5. Does the system architecture identify and describe the hardware configuration? 6. Does the system architecture identify and describe the software configuration? 7. Does the system architecture identify and describe the firmware to be used in the system? 8. Does the system architecture identify and describe all system interfaces?

MSA Cont… 9. Does the system architecture identify and describe all external connections? 10. Does the system architecture define the accreditation boundary? 11. Does the system security architecture implement the security policy and requirements? 12. Does the architecture state how the security enforcing functions of the system will be provided?

MSA Cont… 13. Does the system maintain a domain for its own execution that protects it from external interface or tampering? 14. Are safeguards in place to detect and minimize inadvertent or malicious modification or destruction of the computer system? 15. Does the system design documentation accurately reflect a decomposition of the system security policy and requirements into constituent system elements?

Overview System Development and Certification Refine Initial Certification Analysis Phase 3 Incomplete? Complete and accurate? SSAA

Refining The SSAA First, review the SSAA Update the SSAA to include changes during system development and to include the results of the certification analysis (done throughout verification) Changes must be approved by the DAA, certifier, program manager, and user representative

System Development and Integration Basically, try your best to implement the functional and security requirements that you said you would do earlier. Which may or may not include the following give or take items that you may or may not wish to add or subtract (love the strictness): Prepare system architecture (tell everyone what you want to install) Prepare high-level and detailed design documents (tell everyone everything exactly, but keep it general!) Integrate Commercial-off-the-Shelf (COTS) products Conduct system integration testing

Initial Certification Analysis Evaluate if it is ready to be evaluated Verifies that the development, modification and integration efforts will result in a higher probability of success for an accreditable IS before Phase 3 begins.

More initial c.a. “Initial certification analysis verifies by analysis, investigation, and comparison” that the system implements the SSAA requirements, and that it all works When complete, we should have a documented security specification, comprehensive test procedures, and written assurance that all requirements have been met.

Task 1 – System Architecture Analysis Verifies that the system architecture complies with the description Analysis of system level information reveals how effectively the security architecture implements the security policy and requirements. Identify interfaces to other systems, then evaluate relative to the security posture

Task 2 – Software Design Analysis Evaluates how well the software reflects the security requirements of the SSAA and security architecture. May include (for example) a detailed analysis of software specifications and design documentation Assess whether critical security features are implemented correctly and completely

Task 3 – Network Connection Rule Compliance Analysis This evaluates the intended connections to other systems and networks and ensures that the design will enforce the specific network policies and the protect the IS from adverse C,I,A impacts.

Task 4 - Integrity Analysis of Integrated Products This task evaluates the integration of COTS, GOTS, or Non-Development Items NDI software,hardware and firmware to ensure that their integration into the system design complies with the system security architecture.

Task 5 – Life Cycle Management Analysis This verifies that change control and configuration management practices are, or will be, in place and are sufficient to preserve the integrity of the security relevant software and hardware.

Task 5 Continued This process may require examining of the following documents or procedures. Life cycle management plan. Configuration identification procedures. Configuration control procedures. Configuration status accounting procedures. Configuration audit procedures and reports. Software engineering development approach and engineering environment procedures. System distribution plans.

Task 6 – Vulnerability Assessment This task evaluates security vulnerabilities with regard to with regard to confidentiality, integrity, availability, and accountability and recommends applicable countermeasures. In phase 2, the vulnerability assessment concentrates on verifying the implementation of the security requirements. If the level of risk exceeds the acceptable level of risk the system must return to phase1 for reconsideration.

Conclusion of process At the conclusion of each development or integration milestone, the certification analysis results are reviewed for SSAA compliance.If the results indicate significant deviation from SSAA, the DITSCAP should return to Phase 1 to resolve the problems. If the results are acceptable, the DITSCAP proceeds to the next task or to DITSCAP Phase 3.

Roles and Responsibilities in Phase 2 - DAA The DAA must continuously review the system for compliance with the SSAA. The DAA also reviews the SSAA to ensure it accurately describes the system, the threat, environment, security requirements, system vulnerabilities, and all conditions under which the system will be operated.

Roles and Responsibilities – Certifier/Certification Team Conducts a technical and nontechnical evaluation of the system, responsible for the following: 1. Conduct the Phase 2 certification analysis tasks. 2. Identify and assess system vulnerabilities. 3. Report certification results to the DAA, program manager, and user representative. 4. Provide advice to the DAA, program manager, and user representative regarding the readiness of the system to move into the Validation Phase. 5. Maintain C&A schedules, plan of action, and milestones based on performance of the technical effort. 6. Integrate changes into the SSAA.

Roles and Responsibilities - ISSO The ISSO is responsible for the following tasks: 1. Review the mission statement to determine if it accurately describes the system. 2. Review the environment description to determine if it accurately describes the system.

Roles and Responsibilities – User Representative Responsible for the following tasks: 1. Support certification actions. 2. Prepare Security Rules of Behavior and Standard Operating Procedures. 3. Provide changes to the mission statement, functional environment, and organizational structure to the certification team. 4. Verify the feasibility of security solutions and the ability to comply in the operational environment.

Roles and Responsibilities – Acquisition/Maintenance Org. The program manager is responsible for development of the system, including: 1. Develop system or system modifications. 2. Support the certification efforts by providing updates on the mission statement, environmental description, and architectural changes. 3. Review the certification results. 4. Make system modifications as necessary to reduce or eliminate system vulnerabilities.

R&R, A/M O Cont. The program management support staff perform the following tasks: 1. Determinate the level of effort. 2. Support cost and schedule determinations. 3. Monitor progress. 4. Maintain system documentation.

R&R, A/M O Cont. The developer, integrator, or maintainer is responsible for the following tasks: 1. Provide hardware and software architecture to the acquisition organization. 2. Provide technical equipment environment requirements to the acquisition organization. 3. Develop or integrate technical security solutions and security requirements.

R&R, A/M O Cont. The configuration management staff supports the program manager in the development and maintenance of system documentation. There are no system administration responsibilities in Phase 2.