™ ™ © 2006, KDM Analytics Software Assurance Ecosystem and its Applications Djenana Campara Chief Executive Officer, KDM Analytics Board Director, Object.

Slides:



Advertisements
Similar presentations
© 2007 IBM Corporation Enterprise Content Management Integrating Content, Process, and Connectivity for Competitive Advantage Malcolm Holden October 2007.
Advertisements

ARCH-05 Application Prophecy UML 101 Peter Varhol Principal Product Manager.
Nick Vennaro, NHIN Team (Contractor), Office of the National Coordinator for Health IT Michael Torppey, CONNECT Health IT Security Specialist (Contractor)
More CMM Part Two : Details.
The Engine Driving Business Management in Project Centric Environments MAGSOFT INTERNATIONAL LLC.
Chapter 2 The Software Process
SmartER Semantic Cloud Sevices Karuna P Joshi University of Maryland, Baltimore County Advisors: Dr. Tim Finin, Dr. Yelena Yesha.
Enterprise Architecture. 2 Agenda What is Enterprise Architecture (EA)? Roles in EA? Why is EA Important? Tangible Benefits from EA? What Do We Need to.
OASIS Reference Model for Service Oriented Architecture 1.0
© 2004 Visible Systems Corporation. All rights reserved. 1 (800) 6VISIBLE Holistic View of the Enterprise Business Development Operations.
SE 555 Software Requirements & Specification Requirements Validation.
High-Level Assessment Month Year
Asset management guidelines
Software Verification and Validation (V&V) By Roger U. Fujii Presented by Donovan Faustino.
Igal Kaptsan Research Director Applied Research, Bentley Systems Change Management.
Enterprise Architecture
Presented to: By: Date: Federal Aviation Administration Enterprise Information Management SOA Brown Bag #2 Sam Ceccola – SOA Architect November 17, 2010.
TGDC Meeting, December 2011 Michael Kass National Institute of Standards and Technology Update on SAMATE Automated Source Code Conformance.
Effective Methods for Software and Systems Integration
Chapter : Software Process
Complete and Integrated Lifecycle Management. Challenges 1.
Sai-innovations.com. Why we care about IA Review of Information Management statistics published by Gartner shows  Information is doubling every 2 years.
SEC835 Database and Web application security Information Security Architecture.
Object-Oriented Analysis and Design Iterative Development and the Unified Process.
Security Assessments FITSP-A Module 5
Engineering, Operations & Technology | Information TechnologyAPEX | 1 Copyright © 2009 Boeing. All rights reserved. Architecture Concept UG D- DOC UG D-
The Engine Driving Purchasing Management in Complex Environments MAGSOFT INTERNATIONAL LLC.
1 Process Engineering A Systems Approach to Process Improvement Jeffrey L. Dutton Jacobs Sverdrup Advanced Systems Group Engineering Performance Improvement.
The Challenge of IT-Business Alignment
T. Dawson, TASC 9/11/13 Use of a Technical Reference in NASA IV&V.
©Ian Sommerville 2000, Mejia-Alvarez 2009 Slide 1 Software Processes l Coherent sets of activities for specifying, designing, implementing and testing.
Roles and Responsibilities
Using Business Scenarios for Active Loss Prevention Terry Blevins t
ETICS2 All Hands Meeting VEGA GmbH INFSOM-RI Uwe Mueller-Wilm Palermo, Oct ETICS Service Management Framework Business Objectives and “Best.
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
EHR System (EHR-S) Functional Requirements Implementation Guide: Laboratory Results Interface (LRI) Kickoff March 3 rd,
Ontology for Federation and Integration of Systems Cross-track A2 Summary Anatoly Levenchuk & Cory Casanave Co-chairs 1 Ontology Summit 2012
CBP National Trade Strategy Winter Presenter’s Name June 17, 2003 CBP’s Trade Vision  CBP’s trade vision is to develop a swift, safe, and secure.
CHECKPOINTS OF THE PROCESS Three sequences of project checkpoints are used to synchronize stakeholder expectations throughout the lifecycle: 1)Major milestones,
© 2012 xtUML.org Bill Chown – Mentor Graphics Model Driven Engineering.
Enterprise Architecture, Enterprise Data Management, and Data Standardization Efforts at the U.S. Department of Education May 2006 Joe Rose, Chief Architect.
Software Engineering - I
Software Engineering Prof. Ing. Ivo Vondrak, CSc. Dept. of Computer Science Technical University of Ostrava
Systems Analysis and Design in a Changing World, Fourth Edition
™ ™ Assurance Ecosystem Djenana Campara Chief Executive Officer, KDM Analytics Board Director, Object Management Group (OMG) Co-Chair Software Assurance.
Database Administration
Verification and Validation — An OSD Perspective — Fred Myers Deputy Director, Test Infrastructure Test Resource Management Center November 4, 2009.
MODEL-BASED SOFTWARE ARCHITECTURES.  Models of software are used in an increasing number of projects to handle the complexity of application domains.
NIST SAMATE Project and OMG Michael Kass NIST Information Technology Laboratory March 11, 2008.
Technical Support to SOA Governance E-Government Conference May 1-2, 2008 John Salasin, Ph.D. DARPA
Software Engineering Introduction.
SwA Co-Chair and Task Lead Strategy Session Agenda Technology, Tools and Product Evaluation Working Group Status Briefing Co-Chair(s) Michael Kass (NIST),
State of Georgia Release Management Training
© 2016 LDRA Ltd The FACE Conformance Verification Matrix in Practice.
Information Security tools for records managers Frank Rankin.
Enterprise Architectures. Core Concepts Key Learning Points: This chapter will help you to answer the following questions: What are the ADM phase names.
Basic Concepts Key Learning Points : The objectives of this chapter are as follows:  To provide an introduction to the basic Concepts of enterprise architectures,
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
Verification vs. Validation Verification: "Are we building the product right?" The software should conform to its specification.The software should conform.
Discussion Topics for Exploring OMG UPDM Way-ahead
Software Quality Control and Quality Assurance: Introduction
CIM Modeling for E&U - (Short Version)
Testbed for Medical Cyber-Physical Systems
Chapter 10 Software Quality Assurance& Test Plan Software Testing
Object-Oriented Software Engineering Using UML, Patterns, and Java,
Speaker’s Name, SAP Month 00, 2017
CMMI – Staged Representation
Baisc Of Software Testing
Metadata The metadata contains
Presentation transcript:

™ ™ © 2006, KDM Analytics Software Assurance Ecosystem and its Applications Djenana Campara Chief Executive Officer, KDM Analytics Board Director, Object Management Group (OMG) Co-Chair Software Assurance and Architecture Driven Modernization, OMG

™ © 2007, KDM Analytics Agenda Software Assurance Definition - OMG and Government Initiative The Assurance Case Software Assurance Ecosystem Introduction and Current State Enabling Technologies ISO/OMG Tooling Standards Detailed View of the Ecosystem Software Assurance Ecosystem in Action

™ © 2007, KDM Analytics Software Assurance

™ © 2007, KDM Analytics Software Assurance Definition The justified confidence that the system functions as intended and is free of exploitable vulnerabilities, either intentionally or unintentionally designed or inserted as part of the system at any time during the lifecycle” [National Defense Industrial Association -NDIA]. Basic Principals For each software artifact of interest, there exist a set of claims (generally related to safety and security) about the software artifact, a set of facts (collectively called evidence) about the software artifact, and a set of assurance arguments that use the evidence to show that the software artifact does, in fact, satisfy the claims. The Justified Confidence is presented through Assurance Case: set of auditable claims, arguments and evidence created to support the contention that a defined system/service will satisfy the particular requirements through supporting arguments and evidence

™ © 2007, KDM Analytics Assurance Case: Claims, Arguments & Evidence Exchanged Among SwA Participants Procurement agency Certification agency Audit agency Software Supplier Software Integrator Courts of lawLegislators Software Tool Vendor Insurance organizations Claims Arguments Evidence Consumers

™ © 2007, KDM Analytics Delivering Software Assurance: Delivering System Predictability and Reducing Uncertainty Software Assurance (SwA) is 3 step process 1. Specify Assurance Case Enable supplier to make bounded assurance claims about safety, security and/or dependability of systems, product or services 2. Obtain Evidence for Assurance Case perform software assurance assessment to justify claims of meeting a set of requirements through a structure of sub-claims, arguments, and supporting evidence Collecting Evidence and verifying claims’ compliance is complex and costly process 3. Use Assurance Case to calculate and mitigate risk Exam non compliant claims and their evidence to calculate risk and identify course of actions to mitigate it Each stakeholder will have own risk assessment – e.g. security, liability, performance, compliance Currently, SwA 3 step process is informal, subjective & manual due to lack of comprehensive tooling and formalized specifications

™ © 2007, KDM Analytics The Software Assurance Ecosystem – achieving more objectivity and automation

™ © 2007, KDM Analytics The Software Assurance Ecosystem: Turning Challenge into Solution SwA Ecosystem is a formal framework for analysis and exchange of information related to software security and trustworthiness Provides a technical environment where formalized claims, arguments and evidence can be brought together with formalized and abstracted software system representations to support high automation and high fidelity analysis. Based entirely on ISO/OMG Open Standards Semantics of Business Vocabulary and Rules (SBVR) Knowledge Discovery Meta-model (KDM) Software Assurance Meta-model (SAM) – work in progress Software Assurance Evidence Metamodel submissions received Software Assurance Claims & Arguments Metamodel RFP in progress Architected with a focus on providing fundamental improvements in analysis

™ © 2007, KDM Analytics Leveraging what we already have through SwA Ecosystem Software Assurance Ecosystem enables industry and government to leverage and connect existing policies, practices, processes and tools, in an affordable and efficient manner The key enabler is the Software Assurance (SwA) Ecosystem Infrastructure an open standard-based integrated tooling environment that dramatically reduces the cost of software assurance activities Integrates 3+1 different communities: Formal Methods, Reverse Engineering and Static Analysis, and Dynamic Analysis for a SwA solution Enables different tool types to interoperate Introduces many new vendors to ecosystem because they each leverage parts of the tool chain

™ © 2007, KDM Analytics Process, People, documentation Evidence Software System / Architecture Evaluation  Many integrated & highly automated tools to assist evaluators  Claims and Evidence in Formal vocabulary  Combination of tools and ISO/OMG standards  Standardized SW System Representation In KDM  Large scope capable (system of systems)  Iterative extraction and analysis for rules Executable Specifications Formalized Specifications Software system Technical Evidence Software System Artifacts Requirements/Design Docs & Artifacts Hardware Environment Process Docs & Artifacts Process, People & Documentation Evaluation Environment Some point tools to assist evaluators but mainly manual work Claims in Formal SBVR vocabulary Evidence in Formal SBVR vocabulary Large scope requires large effort IA Controls Protection Profiles CWE Claims, Arguments and Evidence Repository - Formalized in SBVR vocabulary - Automated verification of claims against evidence - Highly automated and sophisticated risk assessments using transitive inter- evidence point relationships Software Assurance Ecosystem: The Formal Framework The value of formalization extends beyond software systems to include related software system process, people and documentation Reports Risk Analysis, etc)

™ © 2007, KDM Analytics The Software Assurance Ecosystem in Action

™ © 2007, KDM Analytics From CWE Taxonomy to CWE Executable Specification Taxonomy Formalized Specification Executable Specification

™ © 2007, KDM Analytics Developers Automated Analysis of: Quality defects SW reliability defects Security vulnerabilities Security policies Design rules Architecture rules Security Engineering Management T&E Software Architects Development Management Information Value Chain Feedback Loop through Customized Reporting Visibility into Best Practices implementation in software lifecycle Security Analysis supporting security policies & risk management (Security Engineering and Audit) Assessment based on established Assurance Case (quality, reliability, security) Architecture understanding, architecture robustness & rules Reporting on Policies/ Rules violations Policies/Rules Creation & Administration Continuous Assurance: Integrated within SDLC control points Policy enforcement on Data  - Data discovered in context developer code System watchdog: continuous integration to verify that nothing is sneaking into the delivery software stream Executable Specifications

™ © 2007, KDM Analytics The Open standard-based SwA ecosystem can be leveraged to increase deployability of tested applications. The following are workflow and steps for established “sw vulnerability assurance case”: use of software assurance tools to perform CWE-based analyzes of application increase accuracy through building and applying exploit testing where weakness identified provide virtual patches to mitigate effect of vulnerabilities package application and virtual patch into deployable solution creating WIN-WIN situation for both supplier and consumer Perform Binary extraction into KDM Perform CWE Analysis Build exploits for found vulnerabilities Test Executable using exploits Use Virtual patching to mitigate vulnerabilities Test Executable using virtual patches Package Executable with virtual patches for deployment Typical Lab Operation Report Vulnerabilities found Addition of Exploit Generation and Testing Addition of Virtual Patching Two Bad Choices for suppliers: Go back and fix vulnerabilities or, deploy and expose outstanding vulnerabilities to community Removes false positives so that more accurate info goes back to supplier & generate virtual patch Best Choice for Suppliers and consumers: Go back and fix vulnerabilities and, safe deploy with virtual patches and NOT expose outstanding vulnerabilities 3rd Party Evaluation of Applications – LAB Environment