Engineering Safety- and Security-Related Requirements for SoftwareIntensive Systems Presented at SEPG’2007 Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213

Donald Firesmith 5 February 2007 © 2007 Carnegie Mellon University

Contents Three Disciplines Challenges Fundamental Concepts Types of Safety- and Security-related Requirements

Consistent Common Process • Requirements Process • Safety and Security Processes

Conclusion

Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

2

Three Disciplines: Requirements, Safety, and Security Engineering

Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

3

Three Related Disciplines Safety Engineering the engineering discipline within systems engineering concerned with lowering the risk of unintentional unauthorized harm to valuable assets to a level that is acceptable to the system’s stakeholders by preventing, detecting, and reacting to such harm, mishaps (i.e., accidents and incidents), hazards, and safety risks

Security Engineering the engineering discipline within systems engineering concerned with lowering the risk of intentional unauthorized harm to valuable assets to a level that is acceptable to the system’s stakeholders by preventing, detecting, and reacting to such harm, misuses (i.e., attacks and incidents), threats, and security risks

Requirements Engineering the engineering discipline within systems/software engineering concerned with identifying, analyzing, reusing, specifying, managing, verifying, and validating goals and requirements (including safety- and security-related requirements) Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

4

Challenges: Combining Requirements, Safety, and Security Engineering

Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

5

Challenges1 Requirements Engineering, Safety Engineering, and Security Engineering: • Different Communities • Different Disciplines with different Training, Books, Journals, and Conferences • Different Professions with different Job Titles • Different fundamental underlying Concepts and Terminologies • Different Tasks, Techniques, and Tools

Safety and Security Engineering are: • Typically treated as Specialty Engineering Disciplines • Performed separately and largely independently of the primary Engineering

Workflow (Requirements, Architecture, Design, Implementation, Integration, Testing.

Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

6

Challenges2 Current separate Processes for Requirements, Safety, and Security are Inefficient and Ineffective. Separation of Requirements Engineering, Safety Engineering, and Security Engineering: • Causes poor Safety- and Security-related Requirements. —

Goals rather than Requirements



Vague, unverifiable, unfeasible, architectural and design constraints

• Inadequate and too late to drive architecture and testing

• Difficult to achieve Certification and Accreditation

Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

7

Challenges3 Poor requirements are a primary cause of more than half of all project failures (defined in terms of): • Major Cost Overruns • Major Schedule Overruns • Major Functionality not delivered • Cancelled Projects • Delivered Systems that are never used

Poor Requirements are a major Root Cause of many (or most) Accidents involving Software-Intensive Systems. Security ‘Requirements’ often mandated: • Industry Best Practices

• Security Functions Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

8

Challenges4 How Safe and Secure is Safe and Secure enough? Situation Cries out for Process Improvement: • Better Consistency between Safety and Security Engineering —

More consistent Concepts and Terminology



Reuse of Techniques



Less Unnecessary Overlap and Avoidance of Redundant Work

• Better Collaboration: —

Between Safety and Security Engineering



With Requirements Engineering

• Better Safety- and Security-related Requirements

Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

9

Fundamental Concepts: A Foundation for Understanding

Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

10

Quality Model

defines the meaning of quality for the 1

1..*

Quality Factor defines a type of the quality of the 1..*

Quality Model

1..* 0..*

Quality Subfactor

1..*

is measured using a

Quality Measure

1..*

(Measurement Scale)

defines a part of a type of the quality of the

System

Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

11

Quality Factors Quality Model

Quality Factor

Quality Subfactor

Development-Oriented Quality Factor

Capacity

Configurability

Quality Measure (Measurement Scale)

Usage-Oriented Quality Factor

Dependability

Efficiency

Defensibility

Robustness

is measured using a

Interoperability

Performance

Utility

Soundness

Security Safety

Survivability

Correctness

Predictability

Operational Availability

Reliability

Stability Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

12

Defensibility Quality Subfactors Occurrence of Unauthorized Harm Occurrence of Defensibility Event Existence of External Agent

Prevention

Existence of Internal Vulnerability

Detection

Existence of Danger

Reaction

Existence of Defensibility Risk

Adaptation

Safety

Security

Defensibility

Quality Factor

Defensibility Problem Type

Defensibility Solution Type

Defensibility Subfactor

Quality Subfactor

is measured using a

Quality Measure (Measurement Scale)

Quality Model Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

13

Low-Level Fundamental Concepts Defensibility Goals

Goals

Stakeholders have an interest in the state

System

have

Unauthorized Harm

must meet must defend may occur to

Stakeholder Needs value

Valuable Assets Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

14

Accidents and Attacks Agents

Vulnerabilities

typically cause

may cause

Dangers

Defensibility Risks

can be may enable the estimated occurrence of using the probability of

Defensibility

Defensibility Occurrences Quality Factors

may cause Stakeholders have an interest in the have

Unauthorized Harm define types of ‘quality’ of the

System must meet

may occur to must defend

Stakeholder Needs value

Valuable Assets Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

15

Dangers and Related Concepts Defensibility

Quality Factors Defensibility Risks

are partially defined in terms of vulnerable

is the expected amount of

can be estimated using the probability of are partially defined in terms of the existence of system-external

Dangers are partially defined in terms of the existence of system-internal

Agents

may enable the occurrence of

exist in the

Stakeholders have an interest in the have

Defensibility Occurrences may cause

exploit

desire

Unauthorized Harm define types of ‘quality’ of the

System must meet

Nonmalicious Agents Malicious Agents

Vulnerabilities may cause

typically cause

may occur to must defend

Stakeholder Needs value

Valuable Assets

Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

16

Mishaps and Misuses vs. Hazards and Threats Malicious Agents

Nonmalicious Agents

do not cause

do not cause

Unauthorized Harm

cause

cause may occur to

Mishaps

Valuable Assets

Safety Incidents

cause Harm Events

Accident Triggers

Safety Events

Hazardous Events

Conditions cause the occurrence of

Security Incidents

Dangers

Hazards

enable the occurrence of

Events

cause

Probes

may cause the occurrence of Accidents

Misuses

Unsuccessful Attacks

cause the occurrence of

Threats

Threatening Events

enable the occurrence of

Defensibility Events

exploit

Attacks

Successful Attacks

Attack Triggers

Harm Events

Security Events

Vulnerabilities

Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

17

Safety and Security Goals and Policies mandate minimum amounts of

Quality Requirements

Safety Defensibility Requirements

Security

mandate minimum amounts of

Survivability

Defensibility state rules to achieve

Defensibility Policies

state desired end results regarding Defensibility Goals

are partially defined in terms of vulnerable

Dangers

Agents

may enable the occurrence of

exist in the

have an interest in the have

Defensibility Occurrences may cause

Nonmalicious Agents

exploit

desire

Unauthorized Harm define types of ‘quality’ of the

System must meet

typically cause

Malicious Agents

Vulnerabilities

Stakeholders

state

are partially defined in terms of the existence of system-external

are partially defined in terms of the existence of system-internal

may cause

Quality Factors

may occur to must defend

Stakeholder Needs value

Valuable Assets

Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

18

Safety- and Security-Related Requirements Nonfunctional Requirements

Safety Defensibility Requirements

Defensibility Function / Subsystem Requirements

DefensibilityRelated Requirements

help to meet the

support support objectify

specify the achievement of acceptable

Defenses

lower

state desired end results regarding

Defensibility Goals

Quality Factors

state

state acceptable

Defensibility Risks

are partially defined in terms of the existence of system-internal

Agents

may enable the occurrence of

may cause

exist in the

have an interest in the

Defensibility Occurrences may cause

Nonmalicious Agents

exploit

desire

Unauthorized Harm define types of ‘quality’ of the

System must meet

typically cause

Malicious Agents

Vulnerabilities

have

Survivability

is the expected amount of can be estimated using the probability of are partially defined in terms of the existence of system-external Dangers

eliminate or mitigate

Stakeholders

Security

mandate minimum Defensibility amounts of state rules Defensibility to achieve Policies

Defensibility Constraints

System Requirements

Thresholds on Quality Measures

Quality Criteria

mandate minimum amounts of

Quality Requirements

DefensibilitySignificant Requirements

are partially defined in terms of vulnerable

Conditions

may occur to must defend

Stakeholder Needs value

Valuable Assets

Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

19

Safety- and Security-Related Requirements

Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

20

Types of Safety- and Security-Related Requirements Too often only a Single Type of Requirements is considered. Not just: • Special Non-Functional Requirements (NFRs): —

Safety and Security Requirements are Quality Requirements are NFRs

• Safety- and Security-Significant Functional, Data, and Interface Requirements • Constraints on Functional Requirements • Architecture and Design Constraints • Safety and Security Functions/Subsystems • Software Requirements

Reason for Presentation Title Safety- and Security-Related Requirements for Software-Intensive Systems

Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

21

Types of Safety- and Security-Related Requirements Stakeholder (Business) Requirements Derived Requirements

Requirements

Development Method Requirements

Quality Requirements

Non-Functional Requirements

Data Requirements

Defensibility Requirements

Software Requirements Hardware Requirements Manual Procedure Requirements

Product Requirements

Functional Requirements

System/ Subsystem Requirements

Primary Mission Requirements

Interface Requirements

Supporting Requirements

Constraints

Defensibility Constraints

Safety Function / Subsystem Requirements Security Function / Subsystem Requirements

Safety Requirements

Safety Constraints

Security Requirements

Security Constraints

Survivability Requirements

Survivability Constraints

Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

22

Types of Defensibility-Related Requirements

Safety Requirements

Safety-Significant Requirements

Security Requirements

Security-Significant Requirements

Defensibility Requirements

DefensibilitySignificant Requirements

System Requirements

Safety Function/Subsystem Requirements Security Function/Subsystem Requirements

Defensibility Function/Subsystem Requirements

DefensibilityRelated Requirements

Safety Constraints Safety Constraints

Defensibility Constraints

Safety-Related Requirements Security-Related Requirements

Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

23

Types of Safety-Related Requirements Asset / Harm Requirements

Safety-Significant Requirements SIL = 1 - 5

Safety-Independent Requirements SIL = 0

React to Safety Incidents Requirements Non-Safety Quality Requirements

Safety Requirements Safety Constraints

Safety-Minor Requirements SIL = 1 Safety Integrity Level (SIL)

Safety Risk Requirements

Detect Safety Incidents Requirements

Safety-Critical Requirements SIL = 4

Safety-Moderate Requirements SIL = 2

Hazard Requirements

Protect Valuable Assets Requirements

Safety-Intolerable Requirements SIL = 5

Safety-Major Requirements SIL = 3

Safety Incident Requirements

Functional Requirements

Data Requirements

Interface Requirements

System Requirements

Quality Requirements

Constraints

Main Mission Requirements Safety System Requirements

Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

24

Common Process: A Basis for Effective Collaboration

Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

25

Defensibility & Requirements Engineering Safety Team

Security Team collaborates with

System Analysis

Safety and Security Engineering

Requirements Engineering Requirements Team

Stakeholder Analysis performs Asset Analysis

performs

Vulnerability Analysis

Requirements Identification

Defensibility Analysis Event Analysis

DefensibilityWork Products

Agent Analysis

Requirements Validation

Danger Analysis

Risk Analysis

DefensibilityRelated Requirements

Requirements Analysis

perform

Stakeholders

Subject Matter Experts

Safety Team

Security Team

Significance Analysis

Defense Analysis

Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

26

Systems Analysis Safety and Security Engineering

Requirements Engineering Vision Statement

Safety Team

Security Team collaborates with

Context Diagram Goals

performs

Understand Requirements

ConOps

Requirements Team

Scenarios Use Cases System Analysis

Requirements Models Requirements Specifications Requirements Architecture Model Understand Architecture

Architecture Team

Architecture Documentation

Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

27

Asset Analysis Subject Matter Experts

Stakeholders

Safety Team

Requirements Engineering

Security Team collaborates with

provide input during

Requirements Team Standard / Reusable Asset-Harm Requirements

Preparation performs performs

provide input during Project Documentation (RFP, Contract, ConOps)

Asset Analysis

Generic / Reusable Asset Tables

Asset Identification

Asset Table

Stakeholder Analysis

Asset Stakeholder Table

Asset Use Analysis

Standard / Reusable Asset Value and Harm Severity Categories

Value Analysis

Generic / Reusable Asset Value and Harm Severity Tables

Asset Value and Harm Table

Requirements Validation

Asset-Harm Goals

Stakeholders

Asset-Harm Requirements

Requirements Analysis

Asset Usage Table

Harm Analysis

Standard / Reusable Asset-Harm Goals

Requirements Identification

performs Subject Matter Experts

Safety Team

Security Team

Safety and Security Engineering

Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

28

Defensibility Occurrence Analysis Subject Matter Experts

Safety Team

Safety and Security Engineering

Security Team collaborates with

Stakeholders

provide input during performs provide input during

Project Documentation (RFP, Contract, ConOps) Asset Table

Requirements Team

Requirements Engineering

performs

Occurrence Identification

Defensibility Occurrence Table

Abuse Tree Analysis

Abuse Trees

Abuse Case Analysis

Abuse Cases

Requirements Analysis

Goal Identification

Defensibility Event Goals

Requirements Validation

Requirements Identification

Occurrence Analysis

Abuse Requirements

Asset Value and Harm Table Generic / Reusable Attack Type Lists Generic / Reusable Defensibility Occurrence Table Standard / Reusable Occurrence Likelihood Categories

perform

Stakeholders

Subject Matter Experts

Safety Team

Security Team

Generic / Reusable Occurrence Goals

Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

29

Vulnerability Analysis Architects, Designers, and Implementers

Safety Team

Safety and Security Engineering

Security Team collaborates with

Quality Engineers, Testers, and Maintainers

Actual / Proposed System Design Actual / Proposed System Implementation

Requirements Engineering

performs provide input during

performs

provide input during Actual / Proposed System Architecture

Requirements Team

Vulnerability Analysis

Vulnerability Identification System Vulnerability Analysis

Vulnerability Table

Requirements Identification Vulnerability Requirements Requirements Analysis

Organization Vulnerability Analysis

Vulnerability Constraints Defensibility Compliance Repository

Requirements Validation

performs Asset Value and Harm Table Architects, Designers, and Implementers

Quality Engineers, Testers, and Maintainers Safety Team

Security Team

Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

30

Danger Analysis Safety Team Subject Matter Experts

Security Team collaborates with

Safety and Security Engineering

Requirements Engineering Requirements Team Generic / Reusable Hazard and Threat Requirements

Danger Identification provide input during

Stakeholders

performs

provide input during System Safety and Security Documentation

Danger Analysis

Danger Profiling

Danger Cause Analysis

Other System Documentation Non-System Documentation Generic / Reusable Danger Lists Generic / Reusable Danger Profiles Generic / Reusable Danger Likelihoods

Danger Effects Analysis Danger Likelihood Analysis

Danger (Hazard & Threat) Profiles Cause Analysis Root Cause Analysis Common Cause Analysis

Danger (Hazard & Threat) Cause and Effects Diagrams

performs

Requirements Identification Hazard Requirements Requirements Analysis

Threat Requirements

Requirements Validation

performs Defensibility Compliance Repository

Subject Matter Stakeholders Experts

Safety Team

Security Team

Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

31

Defense Analysis Safety Team collaborates with

Subject Matter Experts

Stakeholders

provide input during provide input during

Safety and Security Requirements Generic / Reusable Safeguard and Countermeasure Lists

Safety and Security Engineering

Security Team

Defense Type Identification

Countermeasure and Safeguard Type Lists

Defense Functionality Identification

List of Defense Functions / Subsystems

Market Research

Vendor Trade Studies

Defense Selection

Countermeasure and Safeguard Selection Reports

Requirements Engineering

performs

performs

Defense Analysis

Defense Adequacy Analysis

Requirements Identification

Defense Functionality Requirements

Requirements Analysis

Defense Constraints

Requirements Validation

performs

Standard Defense Functionality and Constraint Requirements Safety and Security Assurance Level (SAL) Allocations

Requirements Team

collaborate in the performance of

Architecture Team

Stakeholders

Subject Matter Experts

Safety Team

Security Team

Architecting

Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

32

Defense Certification and Accreditation Safety Team

Safety and Security Engineering

Security Team collaborates with

Safety Certification

performs

Safety Certification Repository Security Certification Repository

Defensibility Certification and Accreditation

Security Certification

Safety Case(s)

Requirements Engineering

Requirements Specification

Safety Certificate Security Case(s)

Requirements Validation

Security Certificate

Safety Accreditation

Safety Authorization

Security Accreditation

Security Authorization

Requirements Team performs

performs performs Management Team

Project Management

Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

33

Conclusion: Process Improvement Recommendations

Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

34

Process Improvement Recommendations1 Ensure close Collaboration among Safety, Security, and Requirements Teams.

Better Integrate Safety and Security Processes: • Concepts and Terminology • Techniques and Work Products

• Provide Cross Training

Better Integrate Safety and Security Processes with Requirements Process: • Early during Development Cycle • Clearly define Team Responsibilities • Provide Cross Training

Develop all types of Safety- and Security-related Requirements. Ensure that these Requirements have proper Properties. Engineering Safety- & Security-Related Requirements Donald Firesmith, 5 February 2007 © 2007 Carnegie Mellon University

35

Engineering Safety- and Security-Related Requirements for Software ...

Feb 5, 2007 - the engineering discipline within systems/software engineering ..... Safety and. Security. Engineering. Event. Analysis. Danger. Analysis. Risk.

680KB Sizes 0 Downloads 262 Views

Recommend Documents

Engineering Safety-Related Requirements for Software ...
May 15, 2005 - ABSTRACT. Many software-intensive systems have significant safety .... Systems (RHAS) Workshop, in Kyoto, Japan, IEEE Computer Society,.

Engineering Safety-Related Requirements for Software ...
Engineering Safety-Related Requirements for Software-Intensive Systems. 2 ... Safeware Engineering, “Safety-Critical Requirements Specification and Analysis.

Engineering Safety-Related Requirements for Software ...
Engineering Safety-Related Requirements for Software-Intensive Systems. 2. Topics .... “A hazard analysis shall be performed during early in the project.”.

Engineering Safety-Related Requirements for Software ...
Mar 9, 2006 - F. Brooks, No Silver Bullet, IEEE Computer, 1987 ... ○The system shall be easy to use. ... subsystem, software application, or component).

Engineering Safety Requirements, Safety Constraints ...
Thus, safety (like security and survivability) is a kind of defensibility ... cost-effectiveness, we are developing more and more safety-critical systems that are ..... How can we best perform management and engineering trade-offs between them.

The Business Case for Requirements Engineering - Software ...
Sep 12, 2003 - The Business Case for. Requirements Engineering ... Implementation. • Integration. • Testing ... (e.g., use case modeling). • Requirements Tools ...

Engineering Safety and Security Related Requirements ...
Many software-intensive systems have significant safety and security ramifications and need to have their associated safety- and security-related requirements ...

Guideline on efficacy and target animal safety data requirements for ...
Dec 8, 2016 - General requirements for applications for minor uses or minor species .. 6. 6. .... to stimulate the development of new veterinary medicines for minor species and ... The general aim of this guideline is to define acceptable data ...

Guideline on efficacy and target animal safety data requirements for ...
Dec 8, 2016 - opportunities to reduce data requirements for veterinary medicines intended ... there is now a legal obligation to use alternatives to animal tests if .... information relating to use in that species may can be .... sense of security'.

Guideline on efficacy and target animal safety data requirements for ...
Dec 8, 2016 - little flexibility in the application of the guideline and the proposed ... option to support the development of, for example, effective antimicrobials ...

IEEE Recommended Practice for Software Requirements Specifications
James J. Longbucco. Dieter Look. John Lord. Stan Magee. David Maibor. Harold Mains. Robert A. Martin. Tomoo Matsubara. Mike McAndrew. Patrick D. McCray.

IEEE Recommended Practice for Software Requirements Specifications
Carl A. Singer. James M. Sivak. Richard S. Sky. Nancy M. Smith ..... hidden assumptions they may have. b) Have developers make correct design decisions and ...

pdf-0977\requirements-engineering-fundamentals-principles-and ...
... Klaus Pohl From. Hardcover for? Page 3 of 6. pdf-0977\requirements-engineering-fundamentals-principles-and-techniques-by-klaus-pohl-from-hardcover.pdf.