BT

Resilient Security Architecture

Posted by John Diamant on Sep 27, 2011 |

A Complementary Approach to Reducing Vulnerabilities

This article first appeared in Security & Privacy IEEE magazine and is brought to you by InfoQ & IEEE Computer Society.

Today, the IT world places little emphasis on “getting security quality right” from the be­ginning. The most common approaches to the latent (generally called 0-day) vulnerability problem fall into one of two categories:

  • Do nothing. Wait for vulnerabili­ties to be discovered after re­lease, and then patch them.
  • Test security in. Implement code with vulnerabilities, and invest in finding or removing as many vulnerabilities as practical before release or production.

You won’t find advocacy for “do nothing” here because we must protect assets and reduce breaches. Regarding testing security in, I’m an advocate for security code re­view and scanning, testing, and solid security patching processes and policies, but are they enough?

The software industry would benefit from more emphasis on avoiding security mistakes in the first place. That means security re­quirements analysis and architect­ing and designing security in, an approach that’s currently rare but that provides substantial benefits. I wouldn’t expect to see much dis­agreement in principle from read­ers of this department. However, take a good look at your organi­zation’s information assurance in­vestment profile; compare how much you’re investing in getting it right to how much your organiza­tion spends fixing it, and you’ll see my point.

At Hewlett-Packard, we’ve de­veloped HP Enterprise Services Comprehensive Applications Threat Analysis (CATA) Service, a methodology that takes an early-life-cycle and whole-life-cycle perspective on se­curity quality improvement. Using it, we’ve avoided introducing thou­sands of vulnerabilities in hundreds of applications, dramatically reduc­ing rework costs while increasing assurance. Our requirements- and architectural-analysis approach works effectively to identify and reduce security risks and exposures for new applications, for applica­tions undergoing maintenance and modernization, and for assessing fully deployed stable systems. So, the methodology is effective re­gardless of the mix of new devel­opment and legacy systems.

The Deming Lesson

Those who cannot remember the past are condemned to re­peat it.[1] — George Santayana

Broadly speaking, the IT indus­try hasn’t remembered the qual­ity improvement revolution or applied it to IT security quality. This isn’t surprising, because spe­cialized disciplines tend to ad­vance primarily on their own, and the cross-disciplinary application of lessons learned is less common. To make the connection clear, I start with an abbreviated history of quality and W. Edwards Dem­ing’s role in igniting the quality improvement revolution.

In the 1950s, global manufac­turing quality was poor. Repeat­ability was poor, and defects were rampant. Deming had been devel­oping statistical process controls and quality improvement meth­odologies and had been presenting this work. His ideas first gained traction with the Japanese manu­facturing industry, which is why Japanese cars have been known for so long for superior quality and reliability. Of course, high qual­ity and repeatability have benefits beyond improved reputation and market differentiation; they can also dramatically reduce costs and increase productivity. However, Deming’s quality message didn’t gain traction in the US and the rest of the world for another 30 years.

What we’re seeing in IT security is much the same problem Deming saw in manufacturing quality - high incidents of defects, few qual­ity controls, expensive rework, and so on. Consider a simple back-of-the-envelope calculation - the US National Vulnerability Database lists more than 40,000 unique vulnerabili­ties. Independent analysis by HP[2] and by IBM[3] indicates that the total number of vulnerabilities is at least 20 times the number of re­ported vulnerabilities, leading to at least 800,000 unique vulnerabili­ties (including latent and otherwise unreported vulnerabilities). Con­sider that each application can have many (maybe dozens or even hun­dreds) of vulnerabilities, and you quickly arrive at millions to tens of millions of vulnerabilities across IT development.

The proximate cause (I say proximate because the economic root causes are beyond this article’s scope) for the large number of la­tent vulnerabilities is the lack of attention to the lessons from qual­ity. Just as you can’t test quality in, you can’t test security quality in. You must architect and design it in first and then test to find and fix the smaller number of vulnerabili­ties introduced.

Cost-of-quality analysis from decades past established that defects cost orders of magnitude more to fix the later in the life cycle they’re discovered, fixed, or avoided. Typical study findings range from 30x to 100x increases, with some studies showing increases as high as 880x for postrelease defect re­pair versus repair in the earliest life-cycle stages. The most widely quoted figure is 100x, based on re­search by Barry Boehm[4]. Studies specific to security vulnerabilities track well with the findings for quality in general (in other words, vulnerabilities can be considered security defects). See Figure 1.

Figure 1. The relative costs of defect repair depend on when in the software development life cycle the defect is found and fixed.4 Defects cost orders of magnitude more to fix the later you deal with them.

This confirms that the return on investment (ROI) will be highest the earliest we deal with security defects. Pushing at least some security quality improve­ment investment to earlier in the life cycle will help improve secu­rity quality ROI and reduce cost.

The Reactive Approach

Historically, the IT industry has taken a reactive approach to secu­rity quality—it has worked back­ward,

Figure 2. The IT industry security quality timeline. The circles’ sizes and colors indicate the relative return on investment for improving security quality. The industry has addressed vulnerabilities when they’ve manifested, grudgingly working earlier in the software development life cycle.

Security patching to fix vul­nerabilities after a product’s re­lease is critical, of course, but shouldn’t be the primary way to deal with vulnerabilities. Howev­er, it’s how the industry had first responded to them.

Some security quality invest­ments then moved to the prere­lease stage, but near the life cycle’s end. This work focuses on securi­ty testing of running code, in the form of vulnerability assessment and penetration testing (human or tool based), called dynamic applica­tion security testing. This technique was a significant improvement be­cause it finds vulnerabilities before release. However, it’s still reac­tive, and rework is costly. This is because the code already contains vulnerabilities, and the goal at this stage is to find and fix as many of them as is practical.

Next in the progression, and a step earlier in the life cycle, is find­ing vulnerabilities in source code through static application security testing, either through automated scanners or human-expert secu­rity code review. This technique improves the ROI; however, it’s still reactive in that it removes vulnerabilities instead of prevent­ing them.

Checklists Don’t Work (in Isolation)

Security checklists are an easy way for organizations to improve secu­rity quality. Unfortunately, unless employed carefully in the context of a broader security quality pro­gram (or as a specific finding in an assessment), they’ll more likely produce a false sense of security rather than real improvements. Checklists only address some­body’s list of egregious security is­sues. If all you do is address such a checklist, consider how much larger the set of (serious) unad­dressed security issues is! Fully ad­dressing the checklist doesn’t tell you much about how secure the resulting application is because it tells you nothing about what re­mains exposed.

The Proactive Approach

To achieve the maximal ROI, you’ll need to use these two methodolo­gies in the life cycle’s earliest phases:

  • Security requirements gap analysis. Rigorously examine the security requirements relevant to your project and your commitment level to meet those requirements, addressing gaps and disconnects.
  • Architectural threat analysis. Ex­amine the planned or imple­mented architecture for attack surfaces, consistent application of sound secure-design prin­ciples, security vulnerability robustness, and resiliency. The goal is to dramatically reduce the probability and severity of latent vulnerabilities, both known and unknown.

This approach reverses IT’s ten­dency to address security reac­tively. Instead, it starts at the life cycle’s beginning, reducing the need for rework, and emphasizes quality throughout.

We found this early-life-cycle approach necessary because when we looked under a (security) rock, we almost always found some­thing. So, we realized that a more proactive approach was the only way to get ahead of the problem. We first started examining layered (user space) operating system soft­ware. But the more we looked at the different functional areas of software, firmware, and hardware across different industry verticals, the more we saw the universality of the problem and our solution. Systematic, scalable, repeatable so­lutions are required; reactive ele­ments, although necessary, can’t solve the problem by themselves.

You might argue that your organization already considers some security requirements and some security design principles, so is this really new? It’s great if you already do, but this approach is more than basic consideration. It’s a systematic examination of security requirements and secu­rity design principles - a quality and completeness check. And even when teams pay attention to these issues up front, we still consistent­ly discover some major gaps and security issues.

You might also argue that this approach makes sense only in a waterfall life cycle and that you use agile (or iterative) development. It is simplest to discuss this approach using waterfall terminology, but there’s nothing inherently water­fall about it. You can just as eas­ily consider the various techniques I’ve outlined as tackling security from different abstraction layers (requirements, architecture, de­sign, source code, or dynamic be­havior), regardless of the order of implementation. Small changes in architecture can dramatically re­duce the probability of vulnerabili­ties in large quantities of code - for instance, by using a checkpoint se­curity design pattern or reducing excessive elevation of privilege. If you remain exclusively at the code or runtime-behavior layers, you must deal individually with each vulnerability, rather than poten­tially eliminating tens or hundreds of vulnerabilities at a time.

Adopting this proactive ap­proach creates some challenges because security expertise is far from pervasive, and that’s unlikely to change any time soon. So, we needed an approach that didn’t re­quire pervasive security expertise. Also, because programmers are human, we can’t keep them from ever making mistakes. So, because we couldn’t rely on defect-free software, we realized our approach needed to significantly reduce the probability that ordinary defects would become vulnerabilities.

Over several years, we’ve developed and optimized our methodology and early-life-cycle security quality processes. We scale by requiring security exper­tise in a small cadre of certified reviewers who can review many projects. The larger development teams don’t require security exper­tise. (Of course, such embedded expertise obviously helps, and we encourage expanding that exper­tise through security training and participation in security reviews.) We apprentice and certify our re­viewers in CATA.

Security Requirements Gap Analysis

Although I’ve made a big point about the early-life-cycle ap­proach, we added security require­ments gap analysis only after we’d been using architectural threat analysis for a couple of years. This happened because, when we asked development teams during archi­tectural threat analysis what their security requirements were, they frequently had insufficient infor­mation to answer and looked to us for guidance.

There were several reasons for this; the most significant was that the end users weren’t the security stakeholders. Development teams often have good processes to com­municate with potential customers or end users, but not with security stakeholders. Typically, the securi­ty stakeholders are IT information security departments, business information security managers, CIOs, chief information security officers, and so on.

Also, the security require­ments’ sources might be laws, reg­ulations, and practices, which are far outside most developers’ field of vision or experience. When development teams gather their requirements from application us­ers, they gather an important set of requirements but not a complete set of nonfunctional requirements, such as security.

We’ve developed methods, intellectual property, tools, databases, and years of expertise to help us translate security re­quirements from the stakehold­ers’ language to the developers’ language. Without such transla­tion, development teams often fail to implement the underlying security mechanisms needed to enable cost-effective application deployment that meets regulatory-compliance requirements. This failure results in increased use of compensating controls, more audit findings, and acceptance of higher risk in deployment environments.

Applying our methodology, we’ve been able to consistently identify otherwise-missed security requirements that can, if addressed early on, significantly reduce de­ployed applications’ total cost of ownership. A typical assessment using our methodology finds 8 to 10 issues during requirements analysis (and a similar number dur­ing architectural threat analysis).

Some issues can translate into a high probability of dozens or hundreds of vulnerabilities if not addressed early. For example, one case involved two nearly identical applications (the same functionality independently de­veloped for two different OS platforms, eventually resulting in a project to merge the two devel­opment efforts). One application had applied CATA (because the development occurred in an or­ganization that had adopted the methodology); the other hadn’t yet (that organization planned to adopt the methodology). At the last count, the first application avoided more than 70 vulner­abilities; the other had to issue several security bulletins to patch the more than 70 vulnerabilities.

Late-life-cycle fixing can be 100 times more expensive, and breach disclosure costs, security-related regulatory-compliance penalties, and downtime costs can amount to millions of dollars. So, it’s easy to see that small-to-moderate expen­ditures up front can easily pay for themselves many times over.

Architectural Threat Analysis

We analyze security and control requirements and architecture to evaluate how robust or resilient the application architecture and high-level design are with respect to security vulnerabilities. This is based partly on known approaches to threat analysis, such as attack surface analysis, and quantitative and qualitative risk analysis. Over years of use and improvement, our methodology has evolved into something unique, as we found that no prior methodology scaled adequately or generated consistent high-reliability results.

For instance, structured brain­storm-based approaches (most in­dustry approaches rely somewhat on structured or unstructured threat brainstorming) depend heav­ily on the participants’ creativ­ity, security expertise, and stamina. Variability in these factors produces dramatically different results. Bruce Schneier said[5]

Threat modeling is, for the most part, ad hoc. You think about the threats until you can’t think of any more, then you stop. And then you’re an­noyed and surprised when some attacker thinks of an at­tack you didn’t.

With our consistent, repeatable, and scalable methodology, we typ­ically can find several fundamental architectural security risk issues that, when addressed, can avoid many vulnerabilities (in some cas­es, hundreds with a single finding). Our methodology also achieves completeness that a brainstorm-based approach can’t—we know when we’ve completed the analy­sis, and not simply because we “can’t think of any more.”

Comparisons

Which is more beneficial—secu­rity requirements gap analysis or architectural threat analysis? Both provide substantial but different benefits. Getting requirements wrong is a huge issue, because you can do the greatest job of build­ing the wrong application, and it won’t achieve its purpose. Howev­er, if the application isn’t architect­ed to be robust and resilient from a security perspective, it’s doomed to be riddled with vulnerabilities and thus likely won’t meet its se­curity requirements.

How does our methodology compare to Microsoft Security Development Lifecycle (SDL )? We start with substantial analysis to identify missing security requirements, whereas SDL’s requirements analysis is more limited to security-process requirements. We both have a threat-modeling component, but Microsoft’s falls more in the structured-brainstorming model.

The Optimized Approach

No single approach is a panacea, so we combine early- and late-life-cycle approaches. Optimized security requires a full-life-cycle perspective, with increased em­phasis in the earliest phases (see Figure 3).

(Click on the image to enlarge it)

Figure 3. Optimized security. Fixing or avoiding vulnerabilities earlier reduces exposure and costs.

Security requirements gap analysis ensures we’re building the right product from a security perspective. Architectural threat analysis ensures we’re building the product right - dramatically re­ducing the number of vulnerabili­ties in the application. Dynamic and static application security test­ing identify most of the remaining vulnerabilities, reducing the need for security patching.

Most of you would probably agree that the IT indus­try has a security quality (latent or 0-day vulnerability) problem and that security quality invest­ments must consider the whole life cycle. What might be a new idea for some is that security quality investment profiles must shift to earlier during development.

One sign of the increased rec­ognition of the need to solve this problem is the 2011 US Depart­ment of Defense authorization bill, which requires

  • “assuring the security of software and software applications during software development” and
  • “detecting vulnerabilities dur­ing testing of software.”[6]

Another is the relatively recent creation of the Certified Secure Software Lifecycle Professional credential. It should be self-evident that security quality improvement can’t rely on programmers never making mistakes. However, the implication that far greater robust­ness and resiliency must there­fore be designed into applications might not be so evident.

About the Author

John Diamant is a Hewlett-Packard Distinguished Technologist and HP’s Secure Product Development Strategist. He founded and leads HP’s security quality program. Contact him at john.diamant@hp.com.

IEEE Security & Privacy's primary objective is to stimulate and track advances in security, privacy, and dependability and present these advances in a form that can be useful to a broad cross-section of the professional community -- ranging from academic researchers to industry practitioners.

 


[1] G. Santayana, Reason in Com­mon Sense, Dover, 1980; 
[2] D. Hamilton, “HP Adds Early Life Cycle Application Security Anal­ysis to Discover Hidden Weak­nesses,” Web Host Industry Rev., 11 June 2010; 
[3] T. Espiner, “IBM: Public Vulner­abilities Are Tip of the Iceberg,CNET News, 1 June 2007; 
[4] B. Boehm, “Industrial Metrics Top 10 List,” IEEE Software, vol. 4, no. 5, 1987, pp. 84–85.
[5] B. Schneier, Secrets and Lies: Digi­tal Security in a Networked World, John Wiley & Sons, 2000, p. 318.
[6] Ike Skelton National Defense Au­thorization Act for Fiscal Year 2011, HR 6523, US Government Print­ing Office, 2010; 

 

Hello stranger!

You need to Register an InfoQ account or or login to post comments. But there's so much more behind being registered.

Get the most out of the InfoQ experience.

Tell us what you think

Allowed html: a,b,br,blockquote,i,li,pre,u,ul,p

Email me replies to any of my messages in this thread
Community comments

Allowed html: a,b,br,blockquote,i,li,pre,u,ul,p

Email me replies to any of my messages in this thread

Allowed html: a,b,br,blockquote,i,li,pre,u,ul,p

Email me replies to any of my messages in this thread

Discuss

Educational Content

General Feedback
Bugs
Advertising
Editorial
InfoQ.com and all content copyright © 2006-2014 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT