0
Fabio Massacci,        UNITN,Federica Paci,        UNITN Stephane Paul,   MANAGING SECURITY AND       THALES              ...
SECURE CHANGE PROJECT Challenge: support evolution while maintaining security at all levels of the software development pr...
SECURITY ENGINEERING PROCESS  Interplay between software life-cycle phases and risk assessment activities  Change manageme...
CHANGE PROPAGATION Concepts are mapped amongst the requirement and risk domains The mapped concepts are the basis for proc...
A POSSIBLE INSTANTIATION Requirements models are Si* models – goal oriented requirements language by UNITN Risk Models are...
AN EXAMPLE – BEFORE REQUIREMNT MODELEvolution in ATM Domain - Introduction of a new tool to support thecontrollers during ...
AN EXAMPLE –EVOLUTION IN ATM Risk analyst identifies a new risk  Failure in the provisioning of correct or optimal arrival...
AN EXAMPLE – AFTER REQUIREMENT MODEL                  02/08/2011           8
More details about the project at              www.securechange.eu                               02/08/2011   9
Upcoming SlideShare
Loading in...5
×

Nessos securechange cluster meeting

332

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
332
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Nessos securechange cluster meeting"

  1. 1. Fabio Massacci, UNITN,Federica Paci, UNITN Stephane Paul, MANAGING SECURITY AND THALES CHANGES AT MODEL LEVEL (SECURE CHANGE)
  2. 2. SECURE CHANGE PROJECT Challenge: support evolution while maintaining security at all levels of the software development process Solution: Change driven security engineering process Interplay between risk assessment and different phases of software engineering process Models as basic unit of change Change propagation is supported by identifying mappings at conceptual level and orchestrating the respective analysis process 02/08/2011 2
  3. 3. SECURITY ENGINEERING PROCESS Interplay between software life-cycle phases and risk assessment activities Change management artefacts and methodologies are sprinkled throughout the whole phases 02/08/2011 3
  4. 4. CHANGE PROPAGATION Concepts are mapped amongst the requirement and risk domains The mapped concepts are the basis for processes orchestration and change propagation When a change affects a concept of the interface, the change is propagated to the other domain. 02/08/2011 4
  5. 5. A POSSIBLE INSTANTIATION Requirements models are Si* models – goal oriented requirements language by UNITN Risk Models are RA DSML models – domain specific language for risk analysis by THALES Mapped concepts Rem. Business Object - Risk. Essential Elements Rem.Goal - Risk.Security Objective Rem.Security Goal – Risk.Security Requirement Rem.Process – Risk Security Solution 02/08/2011 5
  6. 6. AN EXAMPLE – BEFORE REQUIREMNT MODELEvolution in ATM Domain - Introduction of a new tool to support thecontrollers during approach phase 02/08/2011 6
  7. 7. AN EXAMPLE –EVOLUTION IN ATM Risk analyst identifies a new risk Failure in the provisioning of correct or optimal arrival information due to ATCO mistakes Two security objectives are defined: The system shall be computed automatically by an Arrival Manager system The update of the system should be handled through a dedicated role of Sequence Manager Security objectives are refined into security requirements: The system should integrate an AMAN The organization should integrate a SQM 02/08/2011 7
  8. 8. AN EXAMPLE – AFTER REQUIREMENT MODEL 02/08/2011 8
  9. 9. More details about the project at www.securechange.eu 02/08/2011 9
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×