Your SlideShare is downloading. ×
Protection Poker: An Agile Security Game
Protection Poker: An Agile Security Game
Protection Poker: An Agile Security Game
Protection Poker: An Agile Security Game
Protection Poker: An Agile Security Game
Protection Poker: An Agile Security Game
Protection Poker: An Agile Security Game
Protection Poker: An Agile Security Game
Protection Poker: An Agile Security Game
Protection Poker: An Agile Security Game
Protection Poker: An Agile Security Game
Protection Poker: An Agile Security Game
Protection Poker: An Agile Security Game
Protection Poker: An Agile Security Game
Protection Poker: An Agile Security Game
Protection Poker: An Agile Security Game
Protection Poker: An Agile Security Game
Protection Poker: An Agile Security Game
Protection Poker: An Agile Security Game
Protection Poker: An Agile Security Game
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Protection Poker: An Agile Security Game

90

Published on

Each time a new feature is added to a product, developers need to consider the security risk implications, find ways to securely implement the function, and develop tests to confirm that the risk is …

Each time a new feature is added to a product, developers need to consider the security risk implications, find ways to securely implement the function, and develop tests to confirm that the risk is gone or significantly lowered. Laurie Williams shares a Wideband Delphi practice called Protection Poker she's employed as a collaborative, interactive, and informal agile structure for "misuse case" development and threat modeling. Laurie shares the case study results of a software development team at RedHat that used Protection Poker to identify security risks, find ways to mitigate those risks, and increase security knowledge throughout the team. In this session, Laurie leads an interactive Protection Poker exercise in which you and other participants analyze the security risk of sample new features and learn to collaboratively think like an attacker. Participants will discuss implementation and testing strategies for the sample features to discover first hand the opportunities and challenges a security focus brings to development.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
90
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1.           AT3 Concurrent Session  11/8/2012 10:15 AM                "Protection Poker: An Agile Security Game"       Presented by: Laurie Williams North Carolina State University                 Brought to you by:        340 Corporate Way, Suite 300, Orange Park, FL 32073  888‐268‐8770 ∙ 904‐278‐0524 ∙ sqeinfo@sqe.com ∙ www.sqe.com
  • 2. Laurie Williams North Carolina State University A professor of computer science at North Carolina State University, Laurie Williams has been researching agile development methodologies and practices for thirteen years and software security for seven years. She has taught agile courses and coached industrial agile teams at a number of organizations in a variety of domains for the past five years. Laurie is the author of Pair Programming Illuminated; sixty refereed papers on agile software development, test-driven development, and pair programming; and thirty papers on software security. .  
  • 3. Protection Poker: An Agile Security Game Laurie Williams williams@csc.ncsu.edu Picture from http://www.thevelvetstore.com 1 Another vote for… “Everything should be made as simple as possible, but not simpler.” --Albert Einstein http://imagecache2.allposters.com/images/pic/CMA G/956-037~Albert-Einstein-Posters.jpg 1
  • 4. Estimation Planning Poker How many engineers? How long? What is the security risk? Protection Poker Pictures from http://www.doolwind.com , http://news.cnet.com and http://www.itsablackthang.com/images/Art-Sports/irving-sinclair-the-pokergame.jpg Effort Estimation: Planning Poker How many engineers? How long? Pictures from http://www.doolwind.com , http://www.legendsofamerica.com/photos-oldwest/Faro2-500.jpg 2
  • 5. Coming up with the plan Desired Feature s 5 story points/ iteration 30 story points 6 iterations June 10 5 Estimating “dog points” • Estimate each of the dogs below in dog points, assigning each dog a minimum of 1 dog point and a maximum of 10 dog points • A dog point represents the height of a dog at the shoulder – – – – – – – – Labrador retriever Terrier Great Dane Poodle Dachshund German shepherd St. Bernard Bulldog 6 3
  • 6. What if? • Estimate each of the dogs below in dog points, assigning each dog a minimum of 1 dog point and a maximum of 100 dog points • A dog point represents the height of a dog at the shoulder – – – – – – – – Labrador retriever Terrier Great Dane Poodle Dachshund German shepherd St. Bernard Bulldog Harder or easier? More or less accurate? More or less time consuming? 7 Estimating story points • Estimate stories relative to each other – – – – Twice T i as big bi Half as big Almost but not quite as big A little bit bigger • Only values: – 0 1, 2, 3, 5, 8, 13, 20 40, 100 0, 1 2 3 5 8 13 20, 40 Near term iteration “stories” A few iterations away “epic” 8 4
  • 7. Diversity of opinion is essential! Vote based on: •Disaggregation •Analogy •Expert opinion (Subjective) Results of Planning Poker • Explicit result (<20%): – Effort Estimate • Side effects/implicit results (80%+): – Greater understanding of requirement – Expectation setting – Implementation hints – High level design/architecture discussion – Ownership of estimate 5
  • 8. Security Risk Estimation: Protection Poker What is the security risk? http://news.cnet.com and http://swamptour.net/images/ST7PokerGame1.gif http://collaboration.csc.ncsu.edu/laurie/Papers/ProtectionPoker.pdf Software Security Risk Assessment via Protection Poker 6
  • 9. Computing Security Risk Exposure Traditional Risk Exposure probability of occurrence NIST Security Risk likelihood of threat threatExposure source exercising vulnerability X impact of loss X impact of adverse event on organization enumeration of adversary types difficulty motivation of adversaries Proposed Security ease of attack Risk Exposure Ease points X value of asset - To organization - To adversary Value points Memory Jogger 7
  • 10. Step 1: Calibrate value of database tables (done once) • Which database table would be least attractive to an attacker? • Which database table would be most attractive to an attacker? • Use your planning poker cards to assign relative point values for the “value” of each database table, giving a 1 to the least attractive. • Circle the database tables in Table 1 and put the value points in the appropriate column. • There are your “value” endpoints. Step 2: Calibrate ease of attack for requirements (done once) • Which requirement adds functionality that will make an attack easiest? • Which requirement adds functionality that will make attack hardest? • Use your planning poker cards to assign relative point values for the “ease” of each requirement. • There are your “ease” endpoints for the rest of the exercise. exercise 8
  • 11. Step 3: Compute security risk of requirements (each iteration) • For each requirement: – Identify database tables used in that requirement For requirement. each: • Table already have a “value”? Use it. • Table doesn‘t have a “value”? “Poker” a value. – Record the sum of database table values. – “Poker” a value for ease points. Discuss changes to implementation that may reduce the ease. – Compute security risk by multiplying value by ease. Security Risk Assessment Requirement Ease  Ease Points Value Points Security Risk  Ranking Req 1 1 100 100 3 Req 2 5 1 5 6 Req 3 5 1 5 6 Req 4 20 5 100 3 Req 5 13 13 169 2 Req 6 1 40 40 5 Req 7 40 60 2400 1 Sum of asset value (e.g. one 20 and one 40) 9
  • 12. Step 4: Risk Ranking and Discussion (each iteration) • Rank your risks. • Any surprises? Satisfied with values you gave? • What plans would you put in place now that you are more aware of the security risk? “Diversity of ideas is healthy, and it lends a creativity and drive to the security field that we must take advantage of.” -- Gary McGraw Informal discussions of: •Threat models •Misuse cases 10
  • 13. Attacker mindset RedHat Case Study Current software security knowledge PP help spread software security knowledge PP learn about software security Focus on true software security risks 11
  • 14. Discussions # of contributions time talking (Subjective) Results of Protection Poker • Explicit result (<20%): – Relative security risk assessment • Side effects/implicit results (80%+): – Greater awareness understanding of security implications of requirement • Collaborative threat modeling • Collaborative misuse case development – Requirements changed to reduce risk q g – Allocation of time to build security into new functionality “delivered” at end of iteration (appropriate to relative risk) – Knowledge sharing and transfer of security information 12
  • 15. Group exercise • Let’s play protection poker! 13
  • 16. 14
  • 17. Req 1: Emergency Responder Currently the only roles in iTrust are licensed health care professional, unlicensed health care professional (a.k.a secretarial support), support) administrator and patient The need for another role has patient. arisen: emergency responder (ER). An emergency responder is defined as follows: police, fire, emergency medical technicians (EMTs), and other medically trained emergency responders who provide care while at, or in transport from, the site of an emergency. The only capability provided to an ER is access to an emergency report for a patient which provides basic but important information such as: allergies blood type recent short term allergies, type, short-term diagnoses, long term, chronic illness diagnoses, prescription history, and immunization history. The patient is sent an email to notify them of the viewing of their records by an emergency responder. Req 2: Find qualified LHCP A patient has just been diagnosed with a condition and wants to find the licensed health care professionals (LHCPs) in the area who h h have h dl d th t condition. Th patient chooses 'M handled that diti The ti t h 'My Diagnoses” and is presented with a listing of all their own diagnoses, sorted by diagnosis date (more recent first). The patient can select a diagnosis and will be presented with the LHCPs in the patient's living area (based upon the first three numbers of their zip code) who have handled this diagnosis in the last three years. The list is ranked by the quantity of patients the LHCP has treated for that diagnosis (each patient is only counted once regardless of the number of office visits). 15
  • 18. Req 3: Update diagnosis code table The American Medical Association has decided that beginning January 1 2013 all 1, diagnoses must be coded with ICD-10 rather than ICD-9CM. These new codes need to be saved for eventual use by the iTrust application. Req 4: View access log A patient can view a listing of the names of licensed health care professionals that viewed or edited their medical records and the date the viewing/editing occurred is displayed. 16
  • 19. For each requirement • Discuss the most sensitive data element involved (value) –E d i t Endpoints – Relative values • Discuss whether the new functionality provides functionality that could make it easier for an attacker to exploit the system (ease) – Endpoints – Relative values • Using Protection Poker language, which requirement seems the least and most risky and why http://www.photosofoldamerica.com/webart/large/254.JPG http://www.cardcow.com/images/albert-einstein-at-beach1945-celebrities-28954.jpg 17
  • 20. Protection Poker Resources • Williams, L., Meneely, A., and Shipley, G., Protection Poker: The New Software Security "Game", IEEE Security and Privacy, Vol. 8, Number 3, May/June 2010, pp. 14-20. • http://collaboration.csc.ncsu.edu/laurie/Sec urity/ProtectionPoker/ 18

×