Download presentation
Presentation is loading. Please wait.
1
FAA Information Technology- Information Systems Security R&D Workshop 2003 13 June 2015© 2002-3 USC-CSE Extending COCOMO II to Estimate the Cost of Developing Secure Software Edward Colbert, Murali Gangadharan, Donald Reifer, & Barry Boehm {ecolbert, murali, boehm}@cse.usc.edu, d.reifer@ieee.org
2
23 June 2015© 2002-3 USC-CSE Outline Why Extend COCOMO II for Security? The COCOMO II & Modeling Methodology New Security Cost Driver & its Factors COCOMO II Cost Driver Values Analysis of Security Impact On Other Drivers Next Steps & Summary
3
33 June 2015© 2002-3 USC-CSE Why Extend COCOMO II for Security Military projects have considered security in developing software since the early 1980s Until recently commercial projects often gave it little weight Threat to business-critical systems & private information has grown –Security can no longer be ignored Few cost models (including COCOMO II) include security factors –Based 1980s military perspective (Orange Book) –Developing secure systems has changed dramatically
4
43 June 2015© 2002-3 USC-CSE Adding Security to Cost Models Several approaches for addressing security –Modernize existing models Primarily by updating definitions of cost drivers –Add new cost drivers to cost models –Develop separate security model
5
53 June 2015© 2002-3 USC-CSE Adding Security to Cost Models USC has taken intermediate approach –Add factor that addresses security from 3 viewpoints Development Operational Physical (Development Constraints) –Include factors as appropriate to all COCOMO II family cost models –Address both commercial & military projects regardless of Size Domain Level of maturity
6
63 June 2015© 2002-3 USC-CSE Outline Why Extend COCOMO for Security? The COCOMO II & Modeling Methodology New Security Cost Driver & its Factors COCOMO II Cost Driver Values Analysis of Security Impact On Other Drivers Next Steps & Summary
7
73 June 2015© 2002-3 USC-CSE Project scale factors: maturity, risk, flexibility, teamwork & precedentedness Software product, process, project & personnel cost drivers COCOMO II Refresher COCOMO II Model Software size estimate Software organization’s project data Effort & duration estimates Cost, schedule distribution by phase, activity, increment COCOMO II recalibrated to organization’s data Effort in Person Month SF: Scale Factors (5) EM: Effort Multipliers(17)
8
83 June 2015© 2002-3 USC-CSE COCOMO II Family of Cost Models COCOMO II Calibration Models Risk & Tradeoff Models Allocation Models Sizing Models Reuse Models COCOTS COQUALMO CORADMO COSYSMO OTHERS
9
93 June 2015© 2002-3 USC-CSE COCOMO II Modeling Methodology Analyze Existing Literature Perform Behavioral Analysis Determine Form of model &Identify relative significance of parameters Perform expert Judgment, Delphi Assessment Gather Project Data Determine Bayesian A Posteriori update Gather more data; Refine model
10
103 June 2015© 2002-3 USC-CSE Outline Why Extend COCOMO for Security? The COCOMO II & Modeling Methodology New Security Cost Driver & its Factors COCOMO II Cost Driver Values Analysis of Security Impact On Other Drivers Next Steps & Summary
11
113 June 2015© 2002-3 USC-CSE COCOMO II Security Driver (SECU) Viewpoints –Design & Development for Security –Operational Security –Physical Security (Development Constraints) Driver Ratings –Low –Nominal –High –Very High –Extremely High
12
123 June 2015© 2002-3 USC-CSE Security Factors Design & Development for Security –Effect of design methodologies & processes for development & validation when security is factor Operational Security –Effect of security policies, processes, tools & facilities that: Permit identification of security events Define subsequent actions to identify key elements Report pertinent information to appropriate individual, group, or process Development Constraints –Constraints placed on development when protecting software facilities: From outside perimeter to inside office space Includes all of information system resources
13
133 June 2015© 2002-3 USC-CSE Design & Development for Security Rating : Low & Nominal Low –No security requirements –No protection other than provided by execution environment Nominal Requirements Informal security requirements formulated for system Design Analysis of security functions using –Informal functional & interface specification –Descriptive high-level design –Informal demonstration of corresponding pairs Testing Developer tests implementation of requirements –Black box testing Life-cycle controls Simple Configuration Management with version numbers
14
143 June 2015© 2002-3 USC-CSE Design & Development for Security Rating : High Nominal + Requirements Fully defined external interfaces Informal security policy modeling Design High-level design enforces security Informal low-level design description Testing Independent testing of all functional requirements Inspection of COTS/OSS source code if available Developer vulnerability analysis Life-cycle controls Detailed delivery & installation procedures –with well-defined security defaults Developer-defined life-cycle model –with well-defined development tools
15
153 June 2015© 2002-3 USC-CSE Design & Development for Security Rating: Very High High+ Requirements Semi-formal functional specifications Semi-formal security policy modeling Design Semi-formal high-level design Semi-formal Correspondence demonstration Modular implementation Dynamic analysis for COTS/OSS Testing Evidence of coverage for all developer test results Testing of high-level design Independent vulnerability analysis Independent validation of analysis Life-cycle controls Partial automation of CM –with authorization control, problem tracking, & detection of modification Measurable life-cycle model –with compliance to implementation standards
16
163 June 2015© 2002-3 USC-CSE Design & Development for Security Rating: Extremely High Very High + Requirements Formal functional specification Formal security policy modeling Design Formal high level explanation Formal Correspondence Demonstration Structured implementation with minimization of complexity Secure container for COTS & OSS Testing Analysis of coverage of tests Analysis & testing for insecure states Ordered functional testing with tests of low-level design Covert channel analysis Life-cycle controls Compete automation of CM –with coverage for developer tools Measurable life-cycle model –with supporting empirical data
17
173 June 2015© 2002-3 USC-CSE Operational Security Rating: Low & Nominal Low –No organization-wide security policies –Ad-hoc security practices –Optional firewall & virus protection Nominal Administrative controls Basic Security policies –inc. Password & Virus Protection policy Network access & system use policy Guidelines for administrators & users Guidelines for regular backups of critical data Technical Controls Reasonable practices for –Checksum Verification –Firewalls –Operating system logging Simple password-based authentication schemes
18
183 June 2015© 2002-3 USC-CSE Operational Security Rating: High Nominal + Administrative Controls Security policies include –User administration policies –Access administration policies Documentation & logging of all security incidents Discretionary Access Control Policies for all resources Security Screening of all staff on project –Initial background screening Technical Controls Media access controls –Marking, logging & Integrity verification Strong communication security implemented with reasonable practices for –Virtual Public Networks –Wireless Access –Active systems & network monitoring Multi-factor authentication using passwords & smart-tokens
19
193 June 2015© 2002-3 USC-CSE Operational Security Rating: Very High High + Administrative Controls Security policies include – Incident response policy – Data classification policy Incident response teams formed to handle security breaches Mandatory Access Control Policies to all resources Project staffing process considers –Separation of duties –Access with least privilege Technical Controls Defense-in-Depth strategy to protect system with reasonable practices for –Layered system monitoring with Intrusion Detection Systems –Write protected audit trails Digital certificates & signatures used for –Authentication –Message integrity –Non-repudiation
20
203 June 2015© 2002-3 USC-CSE Operational Security Rating : Extremely High Very High + Administrative Controls Comprehensive Security policies including – Business continuity plans – Disaster recovery plans Strong role-based access control for all resources Technical Controls Defense-in-depth strategy for protection is implemented with reasonable practices for –Protection against insider & outsider attacks –Honeypots for proactive defense Independent vulnerability analysis & penetration tests All communications are encrypted Multi-factor authentication with biometrics
21
213 June 2015© 2002-3 USC-CSE Development Constraints Rating Description Nominal –None High –All source materials are locked up when not in active use Very High –High + Audited security markings in code Extremely High –Very High+ Multi-compartment developer communication constraints
22
223 June 2015© 2002-3 USC-CSE Outline Why Extend COCOMO for Security? The COCOMO II Modeling & Methodology New Security Cost Driver & its Factors COCOMO II Cost Driver Values Analysis of Security Impact On Other Drivers Next Steps & Summary
23
233 June 2015© 2002-3 USC-CSE Draft Security Effort Distribution With large Standard Deviation
24
243 June 2015© 2002-3 USC-CSE Outline Why Extend COCOMO for Security? The COCOMO II & Modeling Methodology New Security Cost Driver & its Factors COCOMO II Cost Driver Values Analysis of Security Impact On Other Drivers Next Steps & Summary
25
253 June 2015© 2002-3 USC-CSE Existing COCOMO Drivers Affected By Security Proposed security cost driver (SECU) constrain existing COCOMO II cost drivers Security functions add to project’s size Increases project risk RELYRequired software reliability CPLXProduct complexity DOCUDocumentation match to life-cycle needs SITEMulti-site development TOOLUse of software tools
26
263 June 2015© 2002-3 USC-CSE Security Effect on Risk Projects risk is increased when –Security driver rating is >= high & –Rating of following drivers are <= low or nominal ACAP : Analyst Capability PCAP : Programmer Capability APEX : Application Experience PLEX : Platform Experience LTEX : Language Experience
27
273 June 2015© 2002-3 USC-CSE Outline Why Extend COCOMO for Security? The COCOMO II & Modeling Methodology New Security Cost Driver & its Factors COCOMO II Cost Driver Values Analysis of Security Impact On Other Drivers Next Steps & Summary
28
283 June 2015© 2002-3 USC-CSE Next Steps Reach consensus on cost drivers –FAA Workshop with AS400 on security, July 03 –Delphi run & calibration of factors in works Initiate efforts to statistically validate accuracy of model –Survey available 160+ COCOMO project data –Perform initial calibration Create enhanced COCOMO data collection forms –Gather security related efforts Compare actual project data to expert opinions –Calibrate the model by weighting Actual data Expert opinions using Bayesian statistical techniques
29
293 June 2015© 2002-3 USC-CSE Summary Proposed extensions to COCOMO for development of Secure Systems –Based on Common Criteria & DITSCAP –1 Driver: SECU –3 Factors: Development for Security Operational Security Physical Security (Development Constraints) –Affects on other COCOMO II Drivers RELY, CPLX, DOCU, SITE, TOOL –Affects on Size –Affects on project risk Hopefully stimulated your interest & motivated you to participate by sharing project data
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.