Index

A

access paths, 31

ACM (Association for Computing Machinery), 12

acquirers, 57

acquisition. See software acquisition

acquisition cases

acquisition of COTS software, 151158

acquisition organization that specifies requirements as RFP, 151

acquisition organization with typical client role, 151156

activities (BSIMM), 310, 315318

ADM (Asset Definition and Management) process area, 66

Alberts, Christopher, 13

alert originators (AOs), 14

alerts, emergency

definition of, 14

WEA (Wireless Emergency Alerts) case study

description, 1314

mission thread example, 217219

preparation for mission thread analysis, 213215

security analysis, 219224

systems of systems, 213215

alignment of risk, 8

Allspaw, John, 160

analysis. See gap analysis; malware analysis; risk analysis

analytics, Software Assurance Competency Model, 246

Android operating system, 175

AOs (alert originators), 14

Applications Security Advisory Board, proposed SwA competency mappings

comprehensive list of job titles, 259277

initial list of job titles, 249258

architecture, security measures for, 40, 326

Assessment Final Report (BSIMM)

audience, 283

comparison within vertical, 300304

conclusion, 305307

contacts, 283

copyright page, 279280

data gathering, 290

executive summary, 284289

high-water mark, 291292

list of figures, 282

overview, 108113

practices, 293

purpose, 283

scorecard, 293

table of contents, 281

assessment of risk, 21

Asset Definition and Management (ADM) process area, 66

Association for Computing Machinery (ACM), 12

assurance. See software assurance (SwA)

assurance cases, 1013

assurance models, 121

assured systems, 4042

attacks

attacker interest, measures of, 330

expecting, 89

audience (BSIMM Assessment Final Report), 283

audits, 9

automation of information security standards

DevOps practices, 164166

DevOpsSec competencies, 170171

availability, 29

avoidance of risk, 28

B

“Balancing Software Engineering Education and Industrial Needs”, 77

@barackobama account, 165166

Bartol, Nadya, 55

baselines, 132133, 147

BASF (Building Assured Systems Framework), 6062

to-be state, determining. See gap analysis

behavioral indicators (DHS competency model), 80

bibliography, 211212

boards of directors, oversight of cybersecurity, 137138

BoK (Body of Knowledge)

MSwA (Master of Software Assurance) Reference Curriculum

assurance across life cycles, 227228

assurance assessment, 228229

assurance management, 230231

maturity levels, 6061

risk management, 6162, 228

system functionality assurance, 232233

system operational assurance, 233234

system security assurance, 103105, 231232

Software Assurance Curriculum Project, 236237

bottlenecks, minimizing, 167168, 171

BSIMM (Building Security In Maturity Model)

activities, 315318

background on, 106108

BSIMM Community, 314

BSIMM6, 310

GoFast Automotive case study, 107

history of, 308309

how to use, 311312

purpose of, 309310

sample BSIMM Assessment Final Report

audience, 283

comparison within vertical, 300304

conclusion, 305307

contacts, 283

copyright page, 279280

data gathering, 290

executive summary, 284289

high-water mark, 291292

list of figures, 282

overview, 4950

practices, 293

purpose, 283

report overview, 108113

scorecard, 293, 296299

table of contents, 281

software security initiatives, constructing, 312314

SSF (software security framework), 5051

terminology, 310311

when to use, 312

BSIMM Community, 314

build and integration tests, 164165

Building Assured Systems Framework (BASF), 6062

Building Security In Maturity Model. See BSIMM (Building Security In Maturity Model)

business processes, 29

Business Roundtable, 137

business-aligned threat modeling, 169170

business-driven risk analysis

DevOps practices, 163164

DevOpsSec competencies, 169170

C

Capability Maturity Model Integration models. See CMMI® (Capability Maturity Model Integration) models

care, duty of, 140

case studies

code and design flaw vulnerabilities

Android operating system, 175

CWE (Common Weakness Enumeration), 176177

digital certificates, 175

D-link routers, 173174

overview, 173174

Fly-By-Night Airlines

description, 1415

gap analysis, 105106

GoFast Automotive

description, 15

gap analysis, 102, 107

project staffing, 95

Twitter security automation, 165166

WEA (Wireless Emergency Alerts)

description, 1314

mission thread example, 217219

preparation for mission thread analysis, 213215

risk management, 131

security analysis, 219224

systems of systems, 213215

CERT Resilience Management Model (CERT-RMM), 6367

certainty versus uncertainty, 18

certificates, digital, 175

CERT-RMM (CERT Resilience Management Model), 6367

Cigital (BSIMM sample report), 323

CMMI® (Capability Maturity Model Integration) models

CMMI assurance process reference model, 5052

CMMI-ACQ (CMMI for Acquisition), 4547

CMMI-DEV (CMMI for Development), 4445

CMMI-SVC (CMMI for Services), 4748

overview, 4243

uses, 48

CMSPs (commercial mobile service providers), 213

code and design flaw vulnerabilities

Android operating system, 175

CWE (Common Weakness Enumeration), 176177

definition of, 173174

digital certificates, 175

D-link routers, 173174

coding, security measures for, 326

commercial mobile service providers (CMSPs), 213, 214

commercial off-the-shelf (COTS) software, 4, 151158

Common Vulnerability Enumeration (CVE), 122

Common Weakness Enumeration (CWE), 125, 176177

communications

Microsoft SDL (Security Development Lifecycle), 5960

SD3+C, 59

comparison within vertical (BSIMM Assessment Final Report), 300304

competencies. See also competency models

competency attributes of effectiveness, 88

competency designations, 8890

DevOps operational competencies

collaborative culture of, 160161

definition of, 159160

deployment pipeline, 161

efficiency and effectiveness of, 161

practices for software assurance, 161168

DevOpsSec competencies

business-driven risk analysis, 169170

continuous monitoring and improvement, 171

InfoSec expert integration, 169

integration/automation of information security standards, 170171

overview, 169

proposed mappings from (ISC)2 Application Security Advisory Board

abridged table, 98

augmented by project needs, 100102

comprehensive list of job titles, 259277

initial list of job titles, 249258

Competency Lifecycle Roadmap: Toward Performance Readiness (Software Engineering Institute), 78

competency models. See also competencies

DHS Software Assurance Professional Competency Model

behavioral indicators, 80

NICE (National Initiative for Cybersecurity Education), 8081

organization of competency areas, 79

overview, 77, 78

proficiency targets, 80

purpose, 7879

SwA competency levels, 79

improvement plans, 186

influential sources, 7778

Software Assurance Competency Model

advantages of, 94

competency attributes of effectiveness, 88

competency designations, 8890, 239248

endorsements of, 94

examples in practice, 9194

KAs (knowledge areas), 8587

levels of competency, 8284

overview, 8182

professional growth and career advancement and, 9193

project staffing case study, 95

software engineering profession and, 7577

complete mediation, 6

compliance, Software Assurance Competency Model, 243

components of risk, 2123

Conclusion section (BSIMM Assessment Final Report), 305307

conditions, 1923

confidence gap, 1011

confidentiality, 29

conformance (environment), enforcing, 170171

consequences, 1923, 28

Contacts section (BSIMM Assessment Final Report), 283

containment, 40

continuous monitoring

DevOps practices, 167168

DevOpsSec competencies, 171

control plan development, 3738

controlling risk, 21

coordination, 9, 330

CorBoK (Core Body of Knowledge) areas

Software Assurance Competency Model

competency attributes of effectiveness, 8588

competency designations, 8890

KAs (knowledge areas), 8487

Software Assurance Curriculum Project, 236237

COTS (commercial off-the-shelf) software, 4, 151158

critical data, 31

Curriculum Architecture (MSwA), 237238

CVE (Common Vulnerability Enumeration), 122

CWE (Common Weakness Enumeration), 125, 176177

cyber security assurance, 36

cyber security standards

characteristics of, 144149

need for, 144149

optimistic view of, 149150

cybercrime, increase in, 2

D

daily operations, security analysis for, 169

dashboards (DevOps), 165, 168

data gathering (BSIMM Assessment Final Report), 290

Data Security Standard (DSS), 142143

Debois, Patrick, 160

default, security by (SD3+C), 5859

Department of Homeland Security. See DHS (Department of Homeland Security)

Department of Labor Information Technology Competency Model, 77

dependencies, trusted, 8, 126, 330

deployment

DevOps

deployment pipeline, 161

metrics, 167168

to production, 166

streamlining, 171

Microsoft SDL (Security Development Lifecycle), 59

security in (SD3+C), 59

design, security by (SD3+C), 58

design analysis, 163164

design flaw vulnerabilities

Android operating system, 175

CWE (Common Weakness Enumeration), 176177

definition of, 173174

digital certificates, 175

D-link routers, 173174

development. See software development

DevOps

collaborative culture of, 160161

dashboards, 168

definition of, 159160

deployment pipeline, 161

DevOpsSec competencies

business-driven risk analysis, 169170

continuous monitoring and improvement, 171

InfoSec expert integration, 169

integration/automation of information security standards, 170171

overview, 169

requirements, 163164

efficiency and effectiveness of, 161

practices for software assurance

business-driven risk analysis, 163164

continuous monitoring and improvement, 167168

integration of InfoSec experts, 162163

integration/automation of information security standards, 164166

overview, 161162

DevOpsSec competencies

business-driven risk analysis, 169170

continuous monitoring and improvement, 171

InfoSec expert integration, 169

integration/automation of information security standards, 170171

overview, 169

requirements, 163164

DHS (Department of Homeland Security)

DHS S&T (Department of Homeland Security Science and Technology), 213

DHS SwA Measurement Work, 5558

Software Assurance Professional Competency Model

behavioral indicators, 80

NICE (National Initiative for Cybersecurity Education), 8081

organization of competency areas, 79

overview, 77, 78

proficiency targets, 80

purpose, 7879

SwA competency levels, 79

SwA (Software Assurance) working group, CMMI assurance process reference model, 5052

digital certificates, 175

directives, 145

diverse operational systems, 92, 244

D-link routers, 173174

documents, Software Assurance Curriculum Project, 235236

domains (BSIMM), 311

Dorofee, Audrey, 13

doubts, role of, 12

drivers

analysis, 2527

definition of, 25

failure state, 25

identification, 2526

success state, 25

DSS (Data Security Standard), 142143

duty of care, 140

dynamic evidence, 330

E

economy of mechanism, 6

effectiveness

competency attributes of, 88

of DevOps, 161

effective governance, 141142

efficiency of DevOps, 161

Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2), 143

emergency alerts

definition of, 14

WEA (Wireless Emergency Alerts) case study

description, 1314

mission thread example, 217219

preparation for mission thread analysis, 213215

security analysis, 219224

systems of systems, 213215

enforcing environment conformance, 170171

entities, 19

environment

conformance, 170171

security risk, 2930

ES-C2M2 (Electricity Subsector Cybersecurity Capability Maturity Model), 143

ethics, Software Assurance Competency Model, 93, 245

evaluating evidence, 129130

evidence

evaluating, 129130

mapping between security risk focus areas and principles for software security, 125

product evidence, 127129

seven principles of, 125126, 329331

software security questions, 125, 327328

from standards, 127

Executive Summary section (BSIMM Assessment Final Report), 284289

executives

decision makers, 57

oversight of cybersecurity, 137138

exploit kits, 180

F

facilitated assessments, 33

fail-safe defaults, 6

failure, 122

failure state (drivers), 25

Fairley, Dick, 94

FakeFirm BSIMM sample report. See Assessment Final Report (BSIMM)

FCC (Federal Communication Commission), 213

FEMA (Federal Emergency Management Agency), 213

files, log, 168

Final Report (BSIMM). See Assessment Final Report (BSIMM)

Fly-By-Night Airlines case study

description, 1415

gap analysis, 105106

A Framework for PAB Competency Models, 77

frameworks

BASF (Building Assured Systems Framework), 6062

BSIMM (Building Security In Maturity Model). See BSIMM (Building Security In Maturity Model)

CMMI assurance process reference model, 5052

DHS SwA Measurement Work, 5558

IRPC (International Process Research Consortium) roadmap, 6770

Microsoft SDL (Security Development Lifecycle)

CERT research and, 6264

communications, 5960

overview, 58

security by default, 5859

security by design, 58

security in deployment, 59

National Cybersecurity Workforce Framework, 8081

NIST Framework for Improving Critical Infrastructure Cybersecurity, 6772

overview, 1213, 4849

RTSE (Resilient Technical Solution Engineering) process area, 6367

SAMM (Software Assurance Maturity Model), 5355

uses, 72

frequency structure, 129130

functional correctness, 118

G

gap analysis

with BSIMM (Building Security In Maturity Model)

background, 106108

BSIMM Assessment Final Report, 108113, 279307

GoFast Automotive case study, 107

history of, 308309

improvement plans, 186

overview, 9798

with Software Assurance Competency Model

competency mappings from (ISC)2 Application Security Advisory Board, 98102

Fly-By-Night Airlines case study, 105106

GoFast Automotive case study, 102

system security assurance KA specification, 103105

Goal-Question-Metric (GQM), 116

GoFast Automotive case study

description, 15

gap analysis

with BSIMM (Building Security In Maturity Model), 107

with Software Assurance Competency Model, 102

governance

definition of, 138139

examples of, 142143

scope of

characteristics of effective governance, 141142

duty of care, 140

leading by example, 140141

overview, 135138

GQM (Goal-Question-Metric), 116

guidelines, 147

H

Hammond, Paul, 160

high-water mark, 108, 291292

Hilburn, Tom, 14

Homeland Security. See DHS (Department of Homeland Security)

I

IaC (Infrastructure as Code), 166

identification of mission risk

driver analysis, 2527

driver identification, 2526

mission/objective identification, 2425

SERA (Security Engineering Risk Analysis) framework, 3335

IEEE (Institute of Electrical and Electronics Engineers)

endorsement of frameworks, 12

A Framework for PAB Competency Models, 77

PAB (Professional Advisory Board), 94

SWICOM (Software Engineering Competency Model), 78

IGF (Internet Governance Forum), 137

impact, 20

implemented information security management system (ISMS), 120

improvement plans

engineering competencies, 186

gap analysis, 186

management and organizational models, 184186

metrics, 186

order of implementation, 183

risk analysis, 184

special topics in cyber security engineering, 187

Improving Critical Infrastructure Cybersecurity, 6771

Information Technology Competency Model, 77

InfoSec experts, integration of

DevOps practices for, 162163

DevOpsSec competencies, 169

Infrastructure as Code (IaC), 166

Institute of Electrical and Electronics Engineers. See IEEE (Institute of Electrical and Electronics Engineers)

integration

build and integration tests, 164165

DevOps integration strategy

DevOps practices, 164166

DevOpsSec competencies, 170171

overview, 169

of InfoSec experts, 162163, 169

integrity, 29, 93, 245

interactions, 329

International Organization for Standardization (ISO), 12

International Process Research Consortium (IRPC) roadmap, 6770

Internet Governance Forum (IGF), 137

IPAWS (commercial mobile service providers), 214

IRPC (International Process Research Consortium) roadmap, 6770

as-is state, documenting, 100

(ISC)2 Application Security Advisory Board, proposed SwA competency mappings

abridged table, 98

augmented by project needs, 100102

comprehensive list of job titles, 259277

initial list of job titles, 249258

ISMS (implemented information security management system), 120

ISO (International Organization for Standardization), 12

J-K

job titles, proposed SwA competency mappings

comprehensive list of job titles, 259277

initial list of job titles, 249258

KAs (knowledge areas)

Software Assurance Competency Model

assurance across life cycles, 240

assurance assessment, 242

assurance management, 243

overview, 8587

risk management, 241

system functionality assurance, 245246

system operational assurance, 247248

system security assurance, 244245

Software Assurance Curriculum Project, 236237

L

L1 maturity level, 60, 73

L2 maturity level, 60, 73

L3 maturity level, 60, 73

L4 maturity level, 60, 73

leading by example, 140141

least common mechanism, 7

least privilege, 7, 58

levels, maturity. See maturity levels

lifecycle, 10

lifecycle assurance

assurance cases, 1013

definition of, 36

lifecycle-phase measures, 325326

MSwA BoK (Body of Knowledge), 227228

Software Assurance Competency Model, 89, 240248

lifecycle-phase measures, 124, 325326

List of Figures section (BSIMM Assessment Final Report), 282

log files (DevOps), 168

M

macrocycle, 6

malware analysis

code and design flaw vulnerabilities

Android operating system, 175

CWE (Common Weakness Enumeration), 176177

definition of, 173174

digital certificates, 175

D-link routers, 173174

future research, 179180

overview, 172173

status of, 179180

use cases, 177179

Malware Analysis Leading to Overlooked Security Requirements (MORE), 180

malware exploits, 172

management. See also models

assured systems, 4042

challenges, 3940

measurement management, 132133

ORM (operational resilience management), 134

software security frameworks

BASF (Building Assured Systems Framework), 6062

BSIMM (Building Security In Maturity Model). See BSIMM (Building Security In Maturity Model)

CMMI assurance process reference model, 5052

IRPC (International Process Research Consortium) roadmap, 6770

linkages between CERT research and Microsoft SDL, 6264

Microsoft SDL (Security Development Lifecycle), 5860

NIST Framework for Improving Critical Infrastructure Cybersecurity, 6772

overview, 4849

Practical Measurement Framework, 5558

RTSE (Resilient Technical Solution Engineering) process area, 6367

SAMM (Software Assurance Maturity Model), 5355

uses, 72

mappings

proposed mappings from (ISC)2 Application Security Advisory Board

abridged table, 98

augmented by project needs, 100102

comprehensive list of job titles, 259277

initial list of job titles, 249258

security risk focus areas and principles for software security, 125, 328329

Master of Software Assurance Reference Curriculum. See MSwA (Master of Software Assurance) Reference Curriculum

maturity levels

improvement plans and

engineering competencies, 186

gap analysis, 186

management and organizational models, 184186

metrics, 186

overview, 183184

risk analysis, 184

MSwA (Master of Software Assurance) Reference Curriculum

assurance across life cycles, 227228

assurance assessment, 228229

assurance management, 230231

overview, 6061, 7373

risk management, 228

system functionality assurance, 232233

system operational assurance, 233234

system security assurance, 231232

measurable evidence, 331

measurement baselines, 132133

measures

assurance, measuring, 9

attacker interest, 330

definition of, 115

DHS Practical Measurement Framework, 5558

evidence

evaluating, 129130

mapping between security risk focus areas and principles for software security, 125, 328329

overview, 127

process evidence, 123127

product evidence, 127129

seven principles of, 329331

lifecycle-phase measures, 325326

measurement baselines, 132133

measurement management, 132133

Measures for Managing Operational Resilience (Allen), 134

mediation, 6

metrics

characteristics of good metrics, 116117

for cyber security engineering, 117120

definition of, 115

deployment pipeline metrics, 167168

DevOps, 171

evidence

evaluating, 129130

mapping between security risk focus areas and principles for software security, 125, 328329

overview, 127

process evidence, 123127

product evidence, 127129

questions for software security, 125, 327328

seven principles of, 125126, 329331

GQM (Goal-Question-Metric), 116

importance of, 9

improvement plans, 186

measurement models, 121122

measures

attacker interest, 330

definition of, 115

lifecycle-phase measures, 325326

measurement baselines, 132133

measurement management, 132133

system health and resiliency metrics, 168

when to use, 122123

Microsoft

SDL (Security Development Lifecycle)

communications, 5960

overview, 58

security by default, 5859

security by design, 58

security in deployment, 59

STRIDE analysis, 219224

minimizing security bottlenecks, 167168, 171

mission risk

definition of, 23

MRD (Mission Risk Diagnostic)

core tasks summary, 2324

driver analysis, 2527

driver identification, 2526

mission/objective identification, 2425

WEA (Wireless Emergency Alerts) case study

mission thread example, 217219

preparation for mission thread analysis, 213215

security analysis, 219224

mission threads

overview, 29

WEA (Wireless Emergency Alerts) case study

mission thread example, 217219

preparation for mission thread analysis, 213215

security analysis, 219224

misuse cases, 172

mitigation of risk, 28

models

CMMI (Capability Maturity Model Integration) models

CMMI-ACQ (CMMI for Acquisition), 4547

CMMI-DEV (CMMI for Development), 4445

CMMI-SVC (CMMI for Services), 4748

overview, 4243

uses, 48

DHS competency model

organization of competency areas, 79

overview, 77, 78

proficiency targets, 80

purpose, 7879

SwA competency levels, 79

improvement plans, 184186

Information Technology Competency Model, 77

secure lifecycle models, 177

Software Assurance Competency Model

advantages of, 94

competency attributes of effectiveness, 88

competency designations, 8890, 239248

endorsements of, 94

examples in practice, 9194

influential sources, 7778

KAs (knowledge areas), 8587

levels of competency, 8284

overview, 8182

professional growth and career advancement and, 9193

project staffing case study, 95

software engineering profession and, 7577

software security frameworks

BASF (Building Assured Systems Framework), 6062

BSIMM (Building Security In Maturity Model). See BSIMM (Building Security In Maturity Model)

CMMI assurance process reference model, 5052

IRPC (International Process Research Consortium) roadmap, 6770

linkages between CERT research and Mic, 6264

Microsoft SDL (Security Development Lifecycle), 5860

NIST Framework for Improving Critical Infrastructure Cybersecurity, 6772

overview, 4849

Practical Measurement Framework, 5558

RTSE (Resilient Technical Solution Engineering) process area, 6367

SAMM (Software Assurance Maturity Model), 5355

uses, 72

threat modeling, 169170

MON (Monitoring) process area, 66

monitoring

continuous monitoring and improvement

DevOps practices, 167168

DevOpsSec competencies, 171

MON (Monitoring) process area, 66

Software Assurance Competency Model, 247

Monitoring (MON) process area, 66

MORE (Malware Analysis Leading to Overlooked Security Requirements), 180

More Intelligent, More Effective Cybersecurity Protection (Business Roundtable), 137

Morris worm, 7

Moss, Michelle, 55

MRD (Mission Risk Diagnostic)

core tasks summary, 2324

driver analysis, 2527

driver identification, 2526

mission/objective identification, 2425

MSwA (Master of Software Assurance) Reference Curriculum

BoK (Body of Knowledge)

assurance across life cycles, 227228

assurance assessment, 228229

assurance management, 230231

maturity levels, 6061

risk management, 6162, 228

system functionality assurance, 232233

system operational assurance, 233234

system security assurance, 103105, 231232

Curriculum Architecture, 237238

Software Assurance Curriculum Project, 237238

MVS (Multiple Virtual Storage), 7

N

National Cybersecurity Workforce Framework, 8081

National Initiative for Cybersecurity Careers and Studies (NICCS), 80

National Initiative for Cybersecurity Education (NICE), 8081

National Institute of Standards and Technology. See NIST (National Institute of Standards and Technology)

NICCS (National Initiative for Cybersecurity Careers and Studies), 80

NICE (National Initiative for Cybersecurity Education), 8081

NIST (National Institute of Standards and Technology)

endorsement of frameworks, 12

NIST Framework for Improving Critical Infrastructure Cybersecurity, 6772, 120, 137

System Security Engineering: An Integrated Approach to Building Trustworthy Resilient Systems, 150

TACIT approach, 150

O

Obama, Barack, 6771

OODA (Observe, Orient, Decide, and Act) framework, 22

open design, 7

open source software

overview, 4

patches, 171

Open Web Application Security Project (OWASP), 5355

OpenSSL Heartbleed vulnerability, 177

operational competencies (DevOps)

collaborative culture of, 160161

definition of, 159160

deployment pipeline, 161

DevOpsSec competencies

business-driven risk analysis, 169170

continuous monitoring and improvement, 171

InfoSec expert integration, 169

integration/automation of information security standards, 170171

overview, 169

efficiency and effectiveness of, 161

practices for software assurance

business-driven risk analysis, 163164

continuous monitoring and improvement, 167168

integration of InfoSec experts, 162163

integration/automation of information security standards, 164166

overview, 161162

operational context, establishing, 34

operational monitoring, Software Assurance Competency Model, 247

operational resilience management (ORM), 134

operational risk analysis, 38

operational system model (SERA), 3133

organizational models. See models

ORM (operational resilience management), 134

OWASP (Open Web Application Security Project), 5355

P

PAB (Professional Advisory Board), 77, 94

PA-DSS (Payment Application Data Security Standard), 143

patches, 171

Payment Application Data Security Standard (PA-DSS), 143

PCI (Payment Card Industry), 142143

PDCA (Plan, Do, Check, Act) model, 2122

People CMM (People Capability Maturity Model), 43, 76

people skills, 169

Performance Measurement Guide for Information Security (NIST), 120

performance tests, 166

Plan, Do, Check, Act (PDCA) model, 2122

planning

control plans, 3738

importance of, 9

improvement plans

engineering competencies, 186

gap analysis, 186

management and organizational models, 184186

metrics, 186

order of implementation, 183

risk analysis, 184

special topics in cyber security engineering, 187

risk management, 21

potential events, 19

Practical Measurement Framework, 5558

Practical Measurement Framework for Software Assurance and Information Security (Bartol), 122, 127

practices

BSIMM Assessment Final Report, 293, 311

characteristics of, 148

RTSE (Resilient Technical Solution Engineering), 66

practioners, 57

pre-commit tests, 164165

Predicting Software Assurance Using Quality and Reliability Measures (Woody), 123

principles

characteristics of, 145

of evidence, 329331

for software assurance, 69

privilege

least privilege, 7, 58

separation of, 7

probability, 20

procedures, 148

process areas, 44. See also process models (CMMI)

process evidence, 123127

process improvement, 167

process institutionalization, 171

process models (CMMI)

CMMI-ACQ (CMMI for Acquisition), 4547

CMMI-DEV (CMMI for Development), 4445

CMMI-SVC (CMMI for Services), 4748

overview, 4243

uses, 48

processes, 29, 147

product evidence, 127129

Professional Advisory Board (PAB), 77, 94

proficiency targets, 80

program structure models, 121

project staffing case study, 95

“The Protection of Information in Computer Systems” (Saltzer and Schroeder), 3

psychological acceptability, 7

purpose of BSIMM Assessment Final Report, 283

Q-R

questions for software security, 125, 327328

recovery, 29

references, 189209

reports, BSIMM Assessment Final Report

audience, 283

comparison within vertical, 300304

conclusion, 305307

contacts, 283

copyright page, 279280

data gathering, 290

executive summary, 284289

high-water mark, 291292

list of figures, 282

overview, 108113

practices, 293

purpose, 283

scorecard, 293

table of contents, 281

requirements engineering, security measures for, 326

research in malware analysis, 179180

Resiliency Requirements Development (RRD), 66

Resiliency Requirements Management (RRM), 66

resilient systems

overview, 40

system health and resiliency metrics, 168

Resilient Technical Solution Engineering (RTSE) process area, 6367

resisting risk, 29

risk alignment, 8

risk analysis

certainty versus uncertainty, 18

definition of risk, 18

DevOps business-driven risk analysis

DevOps practices, 163164

DevOpsSec competencies, 169170

improvement plans, 184

mission risk. See also WEA (Wireless Emergency Alerts) case study

definition of, 23

MRD (Mission Risk Diagnostic), 2327

operational risk, 38

overview, 1718

risk management

components of risk, 2123

MSwA BoK (Body of Knowledge), 6162, 228

Software Assurance Competency Model, 90, 241

WEA (Wireless Emergency Alerts) case study, 131

security risk

components of, 2729

definition of, 27

mapping between security risk focus areas and principles for software security, 125, 328329

risk environment, 2930

SERA (Security Engineering Risk Analysis) framework, 3138

value of, 78

risk exposure, 20

risk management

components of risk, 2123

MSwA BoK (Body of Knowledge), 6162, 228

Software Assurance Competency Model, 90, 241

WEA (Wireless Emergency Alerts) case study, 131

roadmaps. See frameworks

routers, D-link, 173174

RRD (Resiliency Requirements Development), 66

RRM (Resiliency Requirements Management), 66

RTSE (Resilient Technical Solution Engineering) process area, 6367

S

SADB (Security Automation Dashboard), 165

SAFECode (Software Assurance Forum for Excellence in Code), 172

safety cases. See assurance cases

SAMM (Software Assurance Maturity Model), 5355

satellites (BSIMM), 311

SC (Service Continuity) process area, 66

scope of governance

characteristics of effective governance, 141142

definition of governance, 138139

duty of care, 140

leading by example, 140141

overview, 135138

scorecard (BSIMM Assessment Final Report), 293

SD3+C, 5860

SDL (Security Development Lifecycle)

communications, 5960

overview, 58, 311

security by default, 5859

security by design, 58

security in deployment, 59

Secure by Design, Secure by Default, Secure in Deployment, and Communications (SD3+C), 5860

secure coding, 63

secure lifecycle models, 177

Secure Software Development Lifecycle (SSDL), 309, 311

secure software engineering, 4041

Security Automation Dashboard (SADB), 165

security competency models. See competency models

Security Development Lifecycle. See SDL (Security Development Lifecycle)

Security Development Lifecycle (SDL), 311

Security Engineering Risk Analysis (SERA) framework. See SERA (Security Engineering Risk Analysis) framework

Security Quality Requirements Engineering. See SQUARE process

Security Quality Requirements Engineering for Acquisition (A-SQUARE), 135136

security requirements for acquisition overview, 150

SQUARE process

for acquisition of COTS software, 151158

for acquisition organization that specifies requirements as RFP, 151

for acquisition organization with typical client role, 151156

steps, 151153

summary, 159

security risk

components of, 2729

definition of, 27

mapping between security risk focus areas and principles for software security, 328329

risk environment, 2930

SERA (Security Engineering Risk Analysis) framework

control plan development, 3738

operational context, establishing, 34

operational system model, 3133

overview, 31

risk analysis, 36

risk identification, 3335

security standards

characteristics of, 144149

integration/automation of, 164166

need for, 144149

optimistic view of, 149150

security tool automation, 170

SEI (Software Engineering Institute)

Competency Lifecycle Roadmap: Toward Performance Readiness, 78

endorsement of frameworks, 12

research in relation to Microsoft SDL, 6264

Software Assurance Competency Model

advantages of, 94

competency attributes of effectiveness, 88

competency designations, 8890, 239248

endorsements of, 94

examples in practice, 9194

KAs (knowledge areas), 8587

levels of competency, 8284

overview, 8182

professional growth and career advancement and, 9193

project staffing case study, 95

Software Assurance Curriculum Project

MSwA (Master in Software Assurance) Curriculum Architecture, 237238

project documents, 235236

SwA CorBoK (Core Body of Knowledge) areas, 236237

separation of privilege, 7

SERA (Security Engineering Risk Analysis) framework

control plan development, 3738

operational context, establishing, 34

operational system model, 3133

overview, 31

risk analysis, 36

risk identification, 3335

Service Continuity (SC) process area, 66

seven principles of evidence, 329331

SFIA (Skills Framework for the Information Age), 78

Shafer, Andrew “Clay”, 160

Skills Framework for the Information Age (SFIA), 78

software acquisition

acquisition cases

acquisition of COTS software, 151158

acquisition organization that specifies requirements as RFP, 151

acquisition organization with typical client role, 151156

CMMI (Capability Maturity Model Integration) models

CMMI-ACQ (CMMI for Acquisition), 4547

CMMI-DEV (CMMI for Development), 4445

CMMI-SVC (CMMI for Services), 4748

overview, 4243

uses, 48

SQUARE process, 151158

Software Assurance Competency Model

advantages of, 94

competency attributes of effectiveness, 88

competency designations

assurance across life cycles, 240

assurance assessment, 242

assurance management, 243

overview, 8890

risk management, 241

system functionality assurance, 245246

system operational assurance, 247248

system security assurance, 244245

endorsements of, 94

examples in practice, 9194

gap analysis

competency mappings from (ISC)2 Application Security Advisory Board, 98102

Fly-By-Night Airlines case study, 105106

GoFast Automotive case study, 102

system security assurance KA specification, 103105

KAs (knowledge areas), 8587

levels of competency, 8284

overview, 8182

professional growth and career advancement and, 9193

project staffing case study, 95

software assurance competency models. See competency models

Software Assurance Curriculum Project

MSwA (Master in Software Assurance) Curriculum Architecture, 237238

project documents, 235236

SwA CorBoK (Core Body of Knowledge) areas, 236237

Software Assurance Forum for Excellence in Code (SAFECode), 172

Software Assurance Maturity Model (SAMM), 5355

Software Assurance Professional Competency Model (DHS)

behavioral indicators, 80

NICE (National Initiative for Cybersecurity Education), 8081

organization of competency areas, 79

overview, 77, 78

proficiency targets, 80

purpose, 7879

SwA competency levels, 79

software assurance (SwA). See also competency models; software development

assurance across life cycles

MSwA BoK (Body of Knowledge), 227228

Software Assurance Competency Model, 89, 240

assurance assessment

MSwA BoK (Body of Knowledge), 228229

Software Assurance Competency Model, 242

assurance cases, 1013

assurance management

MSwA BoK (Body of Knowledge), 230231

Software Assurance Competency Model, 243

assured systems, 4042

definition of, 36

DevOps practices for

business-driven risk analysis, 163164

continuous monitoring and improvement, 167168

integration of InfoSec experts, 162163

integration/automation of information security standards, 164166

overview, 161162

DHS CMMI assurance process reference model, 5052

DHS competency model

behavioral indicators, 80

NICE (National Initiative for Cybersecurity Education), 8081

organization of competency areas, 79

overview, 78

proficiency targets, 80

purpose, 7879

SwA competency levels, 79

DHS Practical Measurement Framework, 5558

mapping between security risk focus areas and principles for software security, 328329

MSwA (Master of Software Assurance) Reference Curriculum BoK

assurance across life cycles, 227228

assurance assessment, 228229

assurance management, 230231

maturity levels, 6061

risk management, 6162, 228

system functionality assurance, 232233

system operational assurance, 233234

system security assurance, 231232

principles for, 69

proposed competency mappings

comprehensive list of job titles, 259277

initial list of job titles, 249258

Software Assurance Competency Model

advantages of, 94

competency attributes of effectiveness, 88

competency designations, 8890, 239248

examples in practice, 9194

KAs (knowledge areas), 8587

levels of competency, 8284

overview, 8182

professional growth and career advancement and, 9193

project staffing case study, 95

Software Assurance Curriculum Project

MSwA (Master in Software Assurance) Curriculum Architecture, 237238

project documents, 235236

SwA CorBoK (Core Body of Knowledge) areas, 236237

software engineering profession and, 7577

software security frameworks

BASF (Building Assured Systems Framework), 6062

BSIMM (Building Security In Maturity Model), 4951

CMMI assurance process reference model, 5052

IRPC (International Process Research Consortium) roadmap, 6770

Microsoft SDL (Security Development Lifecycle), 5860

NIST Framework for Improving Critical Infrastructure Cybersecurity, 6772, 120, 137

overview, 4849

Practical Measurement Framework, 5558

RTSE (Resilient Technical Solution Engineering) process area, 6367

SAMM (Software Assurance Maturity Model), 5355

SEI (Software Engineering Institute), 6062

software development. See also software assurance (SwA)

assured systems, 4042

CMMI (Capability Maturity Model Integration) models

CMMI-ACQ (CMMI for Acquisition), 4547

CMMI-DEV (CMMI for Development), 4445

CMMI-SVC (CMMI for Services), 4748

overview, 4243

uses, 48

control plans, 3738

management challenges, 3940

software security frameworks

BASF (Building Assured Systems Framework), 6062

BSIMM (Building Security In Maturity Model). See BSIMM (Building Security In Maturity Model)

CMMI assurance process reference model, 5052

IRPC (International Process Research Consortium) roadmap, 6770

Microsoft SDL (Security Development Lifecycle), 5860

NIST Framework for Improving Critical Infrastructure Cybersecurity, 6772, 120, 137

overview, 4849

Practical Measurement Framework, 5558

RTSE (Resilient Technical Solution Engineering) process area, 6367

SAMM (Software Assurance Maturity Model), 5355

SEI (Software Engineering Institute), 6062

Software Engineering Competency Model (SWECOM), 78

Software Engineering Institute. See SEI (Software Engineering Institute)

software error detection models, 121

Software Security Engineering (Allen), 41

Software Security Framework (SSF), 311

software security frameworks

BASF (Building Assured Systems Framework), 6062

BSIMM (Building Security In Maturity Model). See BSIMM (Building Security In Maturity Model)

CMMI assurance process reference model, 5052

IRPC (International Process Research Consortium) roadmap, 6770

linkages between CERT research and Mic, 6264

Microsoft SDL (Security Development Lifecycle)

communications, 5960

overview, 58

security by default, 5859

security by design, 58

security in deployment, 59

National Cybersecurity Workforce Framework, 8081

NIST Framework for Improving Critical Infrastructure Cybersecurity, 6772, 120, 137

overview, 4849

Practical Measurement Framework, 5558

RTSE (Resilient Technical Solution Engineering) process area, 6367

SAMM (Software Assurance Maturity Model), 5355

uses, 72

Software Security Group (SSG), 49, 311

software security initiatives (SSI), 108, 311, 312314

software security questions, 125, 327328

A-SQUARE (Security Quality Requirements Engineering for Acquisition), 135136

SQUARE process

for acquisition of COTS software, 151158

for acquisition organization that specifies requirements as RFP, 151

for acquisition organization with typical client role, 151156

steps, 151153

summary, 159

SSDL (Secure Software Development Lifecycle), 309, 311

SSF (software security framework), 311

SSG (software security group), 49, 311

SSI (software security initiatives), 108, 311, 312314

staging, 166

stakeholders, 30

standards

cyber security standards

characteristics of, 144149

integration/automation of, 164166

need for, 144149

optimistic view of, 149150

evidence from, 127

states of drivers, 25

stovepiping, 160161

STRIDE analysis, 219224

structural correctness, 118

success state (drivers), 25

suppliers, 5657

SwA. See software assurance (SwA)

SwA Competency Model. See Software Assurance Competency Model

SWICOM (Software Engineering Competency Model), 78

system control, Software Assurance Competency Model, 248

system functionality assurance

MSwA BoK (Body of Knowledge), 232233

Software Assurance Competency Model, 245246

system health and resiliency metrics, 168

system operational assurance

MSwA BoK (Body of Knowledge), 233234

Software Assurance Competency Model, 247248

system security assurance

MSwA (Master of Software Assurance) Reference Curriculum, 103105

MSwA BoK (Body of Knowledge), 231232

Software Assurance Competency Model, 244245

System Security Engineering: An Integrated Approach to Building Trustworthy Resilient Systems (NIST), 150

systemic risk. See mission risk

Systems Engineering Handbook (Haskins), 214

systems of systems, 213215

T

table of contents (BSIMM Assessment Final Report), 281

TACIT approach, 150

Technology Management (TM) process area, 66

testing

build and integration tests, 164165

performance tests, 166

pre-commit tests, 164165

software security measures, 326

user acceptance testing, 166

Thompson, William (Lord Kelvin), 115

threats

overview, 27

threat modeling, 163, 169170

threat outcomes, 3132

time frame, 20

TM (Technology Management) process area, 66

training catalog (NICCS), 81

transfer of risk, 28

trusted dependencies, 8, 126, 330

Twitter security automation, 165166

U

uncertainty, 18

US energy sector, 143

use cases

definition of, 172

malware analysis, 177179

user acceptance testing, 166

V

vertical data (BSIMM Assessment Final Report), 300304

Visible Ops Security (Kim), 162

vulnerabilities

code and design flaw vulnerabilities

Android operating system, 175

CWE (Common Weakness Enumeration), 176177

definition of, 173174

digital certificates, 175

D-link routers, 173174

CVE (Common Vulnerability Enumeration), 122

definition of, 10

OpenSSL Heartbleed vulnerability, 177

overview, 27

pervasiveness of, 2

vulnerability analysis, 63

zero-day vulnerabilities, 177

W-X-Y-Z

WEA (Wireless Emergency Alerts) case study

description, 1314

mission thread example, 217219

preparation for mission thread analysis, 213215

risk management, 131

security analysis

security risk scenario, 222224

STRIDE analysis, 219222

systems of systems, 213215

well planned evidence, 330

wireless emergency alerts

definition of, 14

WEA (Wireless Emergency Alerts) case study

description, 1314

mission thread example, 217219

preparation for mission thread analysis, 213215

risk management, 131

security risk scenario, 222224

STRIDE analysis, 219222

systems of systems, 213215

work processes, 29

workflows, 29

worms, Morris, 7

zero-day vulnerabilities, 177

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.16.50.71