SlideShare a Scribd company logo
Making (Implicit) Security
Requirements Explicit for
Cyber-Physical Systems:
A Maritime Use Case
Security Analysis
Tope Omitola,
Abdolbaghi Rezazadeh,
Michael Butler
1
Presented at the 3rd International Workshop on
Cyber-Security and Functional Safety in Cyber-
Physical Systems (IWCFS 2019), Linz, Austria, August
26 - 29, 2019
CONTENT
• Importance of Software Requirements
• Critical Maritime Infrastructure (CMI)
• Security Requirements Analysis for CMI
• System Theoretic Process Analysis (STPA) for Safety
Requirements Analysis
• STPA for Security Requirements Analysis
• STPA for CMI Security Requirements Analysis
• Conclusions
2
Importance of
Software Requirements
•System Requirements
are very important
•“Blueprints” everyone on
project works from
3
Reason for
Software
Project Failure
• “Unclear Requirements” –
Top 3 or 4 reason why
projects fail –(Standish
Group & Software
Engineering Institute)
• Why “Unclear
Requirements” – One
reason - Implicit
Knowledge NOT made
Explicit Enough 4
Requirements Analysis is
Critical to the Success or
Failure of a Project
• Question - How to make the
Requirements Gathering
Explicit Enough
• Requirements analysis
usually done iteratively with
many delicate social and
other trade-offs involved
5
CRITICAL MARITIME
INFRASTRUCTURE
(CMI)
• Maritime is V. BIG business
(80% Global Trade)
• Important to Global
Transport and Supply Chains
• Maritime Infrastructure Is
Increasingly Networked
Together (Ships, On-Shore
Based Bridge, Controller)
6
CRITICAL MARITIME
INFRASTRUCTURE (CMI)
-- CYBER-THREATS
• Increased Networking
Brings Increased Risk of
Cyber-Threats
• Getting Security
Requirements Right Are
Important First Steps in
Securing CMI
7
SOME RELATED WORK IN
SECURITY
REQUIREMENTS ANALYSIS
• THROP: Fault-error-failure
chain model of single
component
• THROP: NOT useful for inter-
connected systems (e.g. CPS)
• STRIDE: Threat-centric
approach. Good approach to
Focus on Threats
• STRIDE: Focuses on Software
Systems – NOT useful for CPS
(H/W + S/W)
8
APPLYING STPA TO
SECURITY
REQUIREMENTS
ANALYSIS
• System Theoretic
Process Analysis focuses
on inter-connected
components (H/W &
S/W)
• Useful for CPS
• Usually Applied to
Safety Requirements
9
STPA -
Concepts
• Safety Constraints
• A Hierarchical Safety
Control Structure
• Process Models 10
THE SEVEN STEPS OF STPA
• State System Purpose
• Identify accidents
• Identify system hazards associated
with accidents
• Construct high-level control
structure
• Translate system hazards to high-
level safety requirements
• Identify Unsafe Control Actions
• Use Results to Create/Improve
Design
11
STPA – Applied to Security
STPA – SAFETY STPA - SECURITY
State System Purpose State System Purpose
Identify Accidents Identify System Losses
Identify System Hazards Identify System Threats
Construct Control Structure Construct Control Structure
Translate Hazards into Safety
Requirements
Translate Threats to Security
Constraints
Identify Unsafe Control Actions Identify Insecure Actions
Use Results to Create Design Use Results to Create/Improve
Design 12
SYSTEM PURPOSE – MARITIME
COMMS SYSTEM (MNS)
• This may require a few iterations
• “The Provision of Timely, Confidential,
Correct Communication of Navigation
Data, Acknowledgements and Route
Updates between Controller and Ship”
13
IDENTIFY SYSTEM LOSSES
Loss (from CS’s perspective) Loss (from Ship’s perspective)
L1: Not receiving ship location
data (affects data
provisioning)
L5: Not receiving navigation data from CS (affects
data provisioning)
L2: Receiving incorrect ship
location data (affects data
correctness)
L6: Receiving incorrect navigation data from CS
(affects data correctness)
L3: Receiving ship location
data v. late (affects timeliness)
L7: Receiving navigation data v. late (affects
timeliness)
L4: Unauthorised agent read
ship location data (affects data
L8: Unauthorised agent read navigation data
(affects data confidentiality) 14
IDENTIFY SYSTEM THREATS
Threats Threats
T1 Message
Congestion
T2
Interference
T3 Tampering T4 Injection Attack
T5 Replay Attack T6 Relay Attack
T7 Identity Spoofing T8 Loss of
Communications
Infrastructure
T9 Denial of Service T10 Traffic Analysis
T11 Eaves-dropping 15
CONTROL
STRUCTURE
• What are the main components
• What Role does each play
• What are command actions being used to interact
TRANSLATE
THREATS TO
SECURITY
CONSTRAINTS
(Some Example
Constraints)
What constraints need to be in place to prevent threat
conditions from occurring?
Threat System Constraint
T1 Message
Congestion
SC1 The system shall be able to prove the
identity of agents during long, probably
intermittent, transactions
T2 Interference SC2 The system shall guarantee against
communication interference between CS
and Ship
T4 Injection Attack SC4 The system shall maintain strong
mutual continuous authentication, of CS
and Ship, during all operations'
transactions
17
IDENTIFY (SECURE) AND INSECURE ACTIONS
Malicious Control
Action
Not Providing
Exposes Threats
Providing
Exposes
Threats
Wrong Time or
Wrong Order
Exposes Threats
Stopped
Too Soon
or
Applied
Too Long
Exposes
Threats
Address Resolution
Protocol spoofing
None UCA1. IS, T,
RPA, RLA, IA
As in UCA1 As in UCA1
IP spoofing None As in UCA1 As in UCA1 As in UCA1
Packet Tampering None As in UCA1 As in UCA1 As in UCA1
Eavesdropping None UCA2. Eavesdropping. As in UCA2 As in UCA2
Traffic Analysis
command
None UCA3. Traffic Analysis As in UCA3 As in UCA3
(T: Tampering, I: Interference, IA: Injection Attack, RPA: Replay Attack, RLA: Relay Attack,
IS: Identity Spoofing, DoS: DoS Attack, TA: Traffic Analysis, E: Eavesdropping).
18
(Possible) Mitigation Strategies and Techniques –
To Improve System Design
Threat Type Loss Link Mitigation Strategy Mitigation Technique
Identity spoofing L4, L8
(Confidentiality)
Crypto https/ssl
Tampering L2, L6
(Integrity)
Crypto ipsec, ssl
Traffic Analysis L4, L8
(Confidentiality)
Packet padding Message
Encryption
DoS L1, L3, L5, L7
(Availability)
Watch out for
Resource
exhaustion
Network provisioning
using access control lists
19
Systematic Security Analysis and System Trade-offs
• Can be used for design trade-offs & to relax system
purpose.
• System’s new purpose: “the provision of timely and
correct communication of navigation data,
acknowledgements and route updates, between SBB
and Ship". (Here, data confidentiality requirement
removed).
• Allows us to reduce system losses of interest, reduce
system threats of interest, system constraints, etc.
20
Systematic Security Analysis and System Trade-offs
Purpose Losses Threats Constraints Mit. Strg. Mit. Tech.
Provision of
timely &
correct
communi-
cation
of nav.
data,acks &
updates
between CS
& Ship
L1,
L2,
L3,
L5,
L6,
L7
T1,
T2,
T3,
T4,
T5,
T6,
T7,
T8,
T9
SC1,
SC2,
SC3,
SC4,
SC5,
SC6,
SC7,
SC8,
SC9
Crypt
ographic
& To
watch
out for
exhaustible
resources
(a)
HTTPS/SSL
,
IPSEC,
MACs &
(b) ACLs
HELPED US REMOVE LOSS 8 & THREAT 10; as a result of not including data
confidentiality in Requirement 21
SERIOUS THREATS TO CMI
22
CONCLUSIONS & FUTURE WORK
•Getting Security Requirements Right Is Very Important
•Systems Theory & Concepts from Safety Analyses (esp.
STPA) useful for security analysis of CMI
•STPA Systematic Approach (The 7 Steps) Can Help Elicit
System Purpose, Identify System Losses & Threats
•Can Help Derive System Constraints Useful To
Construct Mitigation Procedures
•Future Work: Use Event-B to Verify System Constraints
23
Questions
• Acknowledgement:
• Work conducted within the ENABLE-S3
project that has received funding from the
ECSEL Joint Undertaking under Grant
Agreement no. 692455.
24

More Related Content

PDF
Splunk for fisma
PPTX
Systems architecture with the functional safety/security emphasis
PPTX
Continuous Monitoring: Getting Past Complexity & Reducing Risk
PPTX
Achieving Continuous Monitoring with Security Automation
PPTX
"Backoff" Malware: How to Know If You're Infected
PPTX
Algo sec suite overview 2013 05
PDF
20 Critical Controls for Effective Cyber Defense (A must read for security pr...
PDF
The Critical Security Controls and the StealthWatch System
Splunk for fisma
Systems architecture with the functional safety/security emphasis
Continuous Monitoring: Getting Past Complexity & Reducing Risk
Achieving Continuous Monitoring with Security Automation
"Backoff" Malware: How to Know If You're Infected
Algo sec suite overview 2013 05
20 Critical Controls for Effective Cyber Defense (A must read for security pr...
The Critical Security Controls and the StealthWatch System

What's hot (20)

PPTX
Machine Learning for Threat Detection
PDF
Outlier+Overview
PPTX
Teri_Radichel_Top_5_Priorities_for_Cloud_Security
PPTX
Prioritized Approach Twenty Critical Controls 2008
PPTX
Functional Safety and Security process alignment
DOCX
ADRIAN BOWENS Udated Resume2 good 2
PPTX
Lessons Learned for a Behavior-Based IDS in the Energy Sector
PPTX
The CIS Critical Security Controls the International Standard for Defense
PPT
Lesson 1- Intrusion Detection
PPTX
Advanced Persistent Threat in ICS/SCADA/IOT world: a case study
PPTX
SIEM in NIST Cyber Security Framework
PPT
NIST 800-37 Certification & Accreditation Process
PPT
Information Assurance And Security - Chapter 1 - Lesson 3
PPT
Lessson 2 - Application Layer
PPT
Lumension Security Solutions
PPTX
Skybox security
PPT
PPTX
Canadian Cyber Cecurity
PPTX
Canadian Cyber Cecurity
PPTX
Security Architecture for Cyber Physical Systems
Machine Learning for Threat Detection
Outlier+Overview
Teri_Radichel_Top_5_Priorities_for_Cloud_Security
Prioritized Approach Twenty Critical Controls 2008
Functional Safety and Security process alignment
ADRIAN BOWENS Udated Resume2 good 2
Lessons Learned for a Behavior-Based IDS in the Energy Sector
The CIS Critical Security Controls the International Standard for Defense
Lesson 1- Intrusion Detection
Advanced Persistent Threat in ICS/SCADA/IOT world: a case study
SIEM in NIST Cyber Security Framework
NIST 800-37 Certification & Accreditation Process
Information Assurance And Security - Chapter 1 - Lesson 3
Lessson 2 - Application Layer
Lumension Security Solutions
Skybox security
Canadian Cyber Cecurity
Canadian Cyber Cecurity
Security Architecture for Cyber Physical Systems
Ad

Similar to Making (Implicit) Security Requirements Explicit for Cyber-Physical Systems: A Maritime Use Case Security Analysis (20)

ODP
Securing control systems v0.4
PDF
Slide Griffin - Practical Attacks and Mitigations
PDF
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
PPTX
Will future vehicles be secure?
PDF
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
DOCX
Running Head Security Assessment Repot (SAR) .docx
PDF
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
PPTX
lecture 6 - Network Security Fundamentals.pptx
PPTX
Safe and secure autonomous systems
PPTX
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
PDF
2014-12-16 defense news - shutdown the hackers
PDF
WIRELESS COMPUTING AND IT ECOSYSTEMS
PPT
2008: Web Application Security Tutorial
PDF
Creating Your Own Threat Intel Through Hunting & Visualization
PDF
Understanding Cyber Kill Chain and OODA loop
PDF
SOC Analyst Interview Questions & Answers.pdf
PDF
PPTX
Using a Network Model to Address SANS Critical Controls 10 and 11
PDF
D03302030036
PPT
Lumeta IPsonar Aligned to ITIL v3
Securing control systems v0.4
Slide Griffin - Practical Attacks and Mitigations
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Will future vehicles be secure?
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Running Head Security Assessment Repot (SAR) .docx
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
lecture 6 - Network Security Fundamentals.pptx
Safe and secure autonomous systems
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
2014-12-16 defense news - shutdown the hackers
WIRELESS COMPUTING AND IT ECOSYSTEMS
2008: Web Application Security Tutorial
Creating Your Own Threat Intel Through Hunting & Visualization
Understanding Cyber Kill Chain and OODA loop
SOC Analyst Interview Questions & Answers.pdf
Using a Network Model to Address SANS Critical Controls 10 and 11
D03302030036
Lumeta IPsonar Aligned to ITIL v3
Ad

Recently uploaded (20)

PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Geodesy 1.pptx...............................................
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
CH1 Production IntroductoryConcepts.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Well-logging-methods_new................
PDF
composite construction of structures.pdf
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Sustainable Sites - Green Building Construction
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
DOCX
573137875-Attendance-Management-System-original
PPT
introduction to datamining and warehousing
PDF
Digital Logic Computer Design lecture notes
PPT
Project quality management in manufacturing
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Geodesy 1.pptx...............................................
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Foundation to blockchain - A guide to Blockchain Tech
CH1 Production IntroductoryConcepts.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Well-logging-methods_new................
composite construction of structures.pdf
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
OOP with Java - Java Introduction (Basics)
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Sustainable Sites - Green Building Construction
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
UNIT-1 - COAL BASED THERMAL POWER PLANTS
573137875-Attendance-Management-System-original
introduction to datamining and warehousing
Digital Logic Computer Design lecture notes
Project quality management in manufacturing

Making (Implicit) Security Requirements Explicit for Cyber-Physical Systems: A Maritime Use Case Security Analysis

  • 1. Making (Implicit) Security Requirements Explicit for Cyber-Physical Systems: A Maritime Use Case Security Analysis Tope Omitola, Abdolbaghi Rezazadeh, Michael Butler 1 Presented at the 3rd International Workshop on Cyber-Security and Functional Safety in Cyber- Physical Systems (IWCFS 2019), Linz, Austria, August 26 - 29, 2019
  • 2. CONTENT • Importance of Software Requirements • Critical Maritime Infrastructure (CMI) • Security Requirements Analysis for CMI • System Theoretic Process Analysis (STPA) for Safety Requirements Analysis • STPA for Security Requirements Analysis • STPA for CMI Security Requirements Analysis • Conclusions 2
  • 3. Importance of Software Requirements •System Requirements are very important •“Blueprints” everyone on project works from 3
  • 4. Reason for Software Project Failure • “Unclear Requirements” – Top 3 or 4 reason why projects fail –(Standish Group & Software Engineering Institute) • Why “Unclear Requirements” – One reason - Implicit Knowledge NOT made Explicit Enough 4
  • 5. Requirements Analysis is Critical to the Success or Failure of a Project • Question - How to make the Requirements Gathering Explicit Enough • Requirements analysis usually done iteratively with many delicate social and other trade-offs involved 5
  • 6. CRITICAL MARITIME INFRASTRUCTURE (CMI) • Maritime is V. BIG business (80% Global Trade) • Important to Global Transport and Supply Chains • Maritime Infrastructure Is Increasingly Networked Together (Ships, On-Shore Based Bridge, Controller) 6
  • 7. CRITICAL MARITIME INFRASTRUCTURE (CMI) -- CYBER-THREATS • Increased Networking Brings Increased Risk of Cyber-Threats • Getting Security Requirements Right Are Important First Steps in Securing CMI 7
  • 8. SOME RELATED WORK IN SECURITY REQUIREMENTS ANALYSIS • THROP: Fault-error-failure chain model of single component • THROP: NOT useful for inter- connected systems (e.g. CPS) • STRIDE: Threat-centric approach. Good approach to Focus on Threats • STRIDE: Focuses on Software Systems – NOT useful for CPS (H/W + S/W) 8
  • 9. APPLYING STPA TO SECURITY REQUIREMENTS ANALYSIS • System Theoretic Process Analysis focuses on inter-connected components (H/W & S/W) • Useful for CPS • Usually Applied to Safety Requirements 9
  • 10. STPA - Concepts • Safety Constraints • A Hierarchical Safety Control Structure • Process Models 10
  • 11. THE SEVEN STEPS OF STPA • State System Purpose • Identify accidents • Identify system hazards associated with accidents • Construct high-level control structure • Translate system hazards to high- level safety requirements • Identify Unsafe Control Actions • Use Results to Create/Improve Design 11
  • 12. STPA – Applied to Security STPA – SAFETY STPA - SECURITY State System Purpose State System Purpose Identify Accidents Identify System Losses Identify System Hazards Identify System Threats Construct Control Structure Construct Control Structure Translate Hazards into Safety Requirements Translate Threats to Security Constraints Identify Unsafe Control Actions Identify Insecure Actions Use Results to Create Design Use Results to Create/Improve Design 12
  • 13. SYSTEM PURPOSE – MARITIME COMMS SYSTEM (MNS) • This may require a few iterations • “The Provision of Timely, Confidential, Correct Communication of Navigation Data, Acknowledgements and Route Updates between Controller and Ship” 13
  • 14. IDENTIFY SYSTEM LOSSES Loss (from CS’s perspective) Loss (from Ship’s perspective) L1: Not receiving ship location data (affects data provisioning) L5: Not receiving navigation data from CS (affects data provisioning) L2: Receiving incorrect ship location data (affects data correctness) L6: Receiving incorrect navigation data from CS (affects data correctness) L3: Receiving ship location data v. late (affects timeliness) L7: Receiving navigation data v. late (affects timeliness) L4: Unauthorised agent read ship location data (affects data L8: Unauthorised agent read navigation data (affects data confidentiality) 14
  • 15. IDENTIFY SYSTEM THREATS Threats Threats T1 Message Congestion T2 Interference T3 Tampering T4 Injection Attack T5 Replay Attack T6 Relay Attack T7 Identity Spoofing T8 Loss of Communications Infrastructure T9 Denial of Service T10 Traffic Analysis T11 Eaves-dropping 15
  • 16. CONTROL STRUCTURE • What are the main components • What Role does each play • What are command actions being used to interact
  • 17. TRANSLATE THREATS TO SECURITY CONSTRAINTS (Some Example Constraints) What constraints need to be in place to prevent threat conditions from occurring? Threat System Constraint T1 Message Congestion SC1 The system shall be able to prove the identity of agents during long, probably intermittent, transactions T2 Interference SC2 The system shall guarantee against communication interference between CS and Ship T4 Injection Attack SC4 The system shall maintain strong mutual continuous authentication, of CS and Ship, during all operations' transactions 17
  • 18. IDENTIFY (SECURE) AND INSECURE ACTIONS Malicious Control Action Not Providing Exposes Threats Providing Exposes Threats Wrong Time or Wrong Order Exposes Threats Stopped Too Soon or Applied Too Long Exposes Threats Address Resolution Protocol spoofing None UCA1. IS, T, RPA, RLA, IA As in UCA1 As in UCA1 IP spoofing None As in UCA1 As in UCA1 As in UCA1 Packet Tampering None As in UCA1 As in UCA1 As in UCA1 Eavesdropping None UCA2. Eavesdropping. As in UCA2 As in UCA2 Traffic Analysis command None UCA3. Traffic Analysis As in UCA3 As in UCA3 (T: Tampering, I: Interference, IA: Injection Attack, RPA: Replay Attack, RLA: Relay Attack, IS: Identity Spoofing, DoS: DoS Attack, TA: Traffic Analysis, E: Eavesdropping). 18
  • 19. (Possible) Mitigation Strategies and Techniques – To Improve System Design Threat Type Loss Link Mitigation Strategy Mitigation Technique Identity spoofing L4, L8 (Confidentiality) Crypto https/ssl Tampering L2, L6 (Integrity) Crypto ipsec, ssl Traffic Analysis L4, L8 (Confidentiality) Packet padding Message Encryption DoS L1, L3, L5, L7 (Availability) Watch out for Resource exhaustion Network provisioning using access control lists 19
  • 20. Systematic Security Analysis and System Trade-offs • Can be used for design trade-offs & to relax system purpose. • System’s new purpose: “the provision of timely and correct communication of navigation data, acknowledgements and route updates, between SBB and Ship". (Here, data confidentiality requirement removed). • Allows us to reduce system losses of interest, reduce system threats of interest, system constraints, etc. 20
  • 21. Systematic Security Analysis and System Trade-offs Purpose Losses Threats Constraints Mit. Strg. Mit. Tech. Provision of timely & correct communi- cation of nav. data,acks & updates between CS & Ship L1, L2, L3, L5, L6, L7 T1, T2, T3, T4, T5, T6, T7, T8, T9 SC1, SC2, SC3, SC4, SC5, SC6, SC7, SC8, SC9 Crypt ographic & To watch out for exhaustible resources (a) HTTPS/SSL , IPSEC, MACs & (b) ACLs HELPED US REMOVE LOSS 8 & THREAT 10; as a result of not including data confidentiality in Requirement 21
  • 23. CONCLUSIONS & FUTURE WORK •Getting Security Requirements Right Is Very Important •Systems Theory & Concepts from Safety Analyses (esp. STPA) useful for security analysis of CMI •STPA Systematic Approach (The 7 Steps) Can Help Elicit System Purpose, Identify System Losses & Threats •Can Help Derive System Constraints Useful To Construct Mitigation Procedures •Future Work: Use Event-B to Verify System Constraints 23
  • 24. Questions • Acknowledgement: • Work conducted within the ENABLE-S3 project that has received funding from the ECSEL Joint Undertaking under Grant Agreement no. 692455. 24