Abstract
Due to the increasing number of security incidents in the last years, the consideration of security during software development becomes more and more important. A certain level of security can be achieved by applying suitable countermeasures. The ISO 27001 standard demands a risk-based selection of countermeasures, i.e. controls, for information security. Risk serves as a prioritization criterion for selecting controls. To reduce the development effort, security should be addressed as early as possible in the software development lifecycle.
In this paper, we present an iterative and risk-based method to select controls during requirements engineering, following the principle of security-by-design. We select controls based on unacceptable risks and the related functional requirements. Each risk and control is described by attributes that allow an evaluation of the control’s effectiveness based on the Common Vulnerability Scoring System. The evaluation is supported by a web-based tool. A distinguishing feature of our method is that during iteration, we consider new incidents that may occur when applying a control. For documenting the results, we present a metamodel that ensures consistency and traceability between requirements and security aspects.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Google Material - https://material.io (last access: February 20, 2020).
- 2.
https://nodejs.org/en/ (last access: August 8, 2020).
References
Asnar, Y., Giorgini, P., Mylopoulos, J.: Goal-driven risk assessment in requirements engineering. Requir. Eng. 16(2), 101–116 (2011). https://doi.org/10.1007/s00766-010-0112-x
Barnard, L., von Solms, R.: A formalized approach to the effective selection and evaluation of information security controls. Comput. Secur. 19(2), 185–194 (2000). https://doi.org/10.1016/S0167-4048(00)87829-3. http://www.sciencedirect.com/science/article/pii/S0167404800878293
Bojanc, R., Jerman-Blažič, B.: A quantitative model for information-security risk management. Eng. Manage. J. 25(2), 25–37 (2013). https://doi.org/10.1080/10429247.2013.11431972
Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F., Mylopoulos, J.: Tropos: an agent-oriented software development methodology. Auton. Agents Multi-Agent Syst. 8(3), 203–236 (2004). https://doi.org/10.1023/B:AGNT.0000018806.20944.ef
BSI: IT-Grundschutz-Kompendium. Bundesamt für Sicherheit in der Informationstechnik (2019)
BSI: State of IT Security in Germany 2019 (2019). https://www.bsi.bund.de/EN/Publications/SecuritySituation/SecuritySituation_node.html
Common Criteria: Common Criteria for Information Technology Security Evaluation v3.1. Release 5. Standard (2017). http://www.iso.org/iso/catalogue_detail?csnumber=65694
Faßbender, S., Heisel, M., Meis, R.: Aspect-oriented requirements engineering with problem frames. In: Proceedings of the 9th International Conference on Software Paradigm Trends, ICSOFT-PT 2014. SciTePress (2014). https://doi.org/10.5220/0005001801450156
FIRST.org: Common Vulnerability Scoring System v3.1: Specification Document (2019). https://www.first.org/cvss/v3-1/cvss-v31-specification_r1.pdf
Gamma, E., Helm, R., Johnson, R., Vlissides, J.M.: Design Patterns: Elements of Reusable Object-Oriented Software, 1st edn. Addison-Wesley Professional, Boston (1994)
de Gramatica, M., Labunets, K., Massacci, F., Paci, F., Tedeschi, A.: The role of catalogues of threats and security controls in security risk assessment: an empirical study with ATM professionals. In: Fricker, S.A., Schneider, K. (eds.) REFSQ 2015. LNCS, vol. 9013, pp. 98–114. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-16101-3_7
Haskins, B., Stecklein, J., Dick, B., Moroney, G., Lovell, R., Dabney, J.: Error cost escalation through the project life cycle. INCOSE Int. Symp. 14, 1723–1737 (2004)
Herrmann, A., Morali, A., Etalle, S., Wieringa, R.: RiskREP: risk-based security requirements elicitation and prioritization. In: 1st International Workshop on Alignment of Business Process and Security Modelling, ABPSM 2011. Lecture Notes in Business Information Processing. Springer, Verlag (2011)
ISO: ISO 27001:2018 Information technology - Security techniques - Information security risk management. International Organization for Standardization (2018)
ISO: ISO/IEC 27005:2018 Information security management. International Organization for Standardization (2018)
Jackson, M.: Problem Frames: Analyzing and Structuring Software Development Problems. Addison-Wesley, Boston (2001)
Kaspersky Lab: The Kaspersky Lab Global IT Risk Report (2019). https://media.kaspersky.com/documents/business/brfwn/en/The-Kaspersky-Lab-Global-IT-Risk-Report_Kaspersky-Endpoint-Security-report.pdf
Kumar, P., Lin, Y., Bai, G., Paverd, A., Dong, J.S., Martin, A.P.: Smart grid metering networks: a survey on security, privacy and open research issues. IEEE Commun. Surv. Tutor. 21(3), 2886–2927 (2019). https://doi.org/10.1109/COMST.2019.2899354
Lund, M.S., Solhaug, B., Stølen, K.: Model-Driven Risk Analysis. The CORAS Approach. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-12323-8
NIST: Special Publication 800–53 Rev. 4. National Institute of Standards and Technology (2013)
Steinberg, D., Budinsky, F., Paternostro, M., Merks, E.: EMF: Eclipse Modeling Framework 2.0, 2nd edn. Addison-Wesley Professional, Boston (2009)
Tellbach, D., Li, Y.F.: Cyber-attacks on smart meters in household nanogrid: modeling, simulation and analysis. Energies 11(2), 316 (2018). https://doi.org/10.3390/en11020316
Varela-Vaca, A.J., Gasca, R.M.: Towards the automatic and optimal selection of risk treatments for business processes using a constraint programming approach. Inf. Softw. Technol 55(11), 1948–1973 (2013). https://doi.org/10.1016/j.infsof.2013.05.007
Varela-Vaca, A.J., Warschofsky, R., Gasca, R.M., Pozo, S., Meinel, C.: A security pattern-driven approach toward the automation of risk treatment in business processes. In: Herrero, Á., et al. (eds.) International Joint Conference CISIS’12-ICEUTE’12-SOCO’12 Special Sessions. Advances in Intelligent Systems and Computing, Ostrava, Czech Republic, 5–7 September 2012, vol. 189, pp. 13–23. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-33018-6_2
Wirtz, R., Heisel, M.: Managing security risks: template-based specification of controls. In: Sousa, T.B. (ed.) Proceedings of the 24th European Conference on Pattern Languages of Programs, EuroPLoP 2019, Irsee, Germany, 3–7 July 2019, pp. 10:1–10:13. ACM (2019). https://doi.org/10.1145/3361149.3361159
Wirtz, R., Heisel, M.: Model-based risk analysis and evaluation using CORAS and CVSS. In: Damiani, E., Spanoudakis, G., Maciaszek, L.A. (eds.) ENASE 2019. CCIS, vol. 1172, pp. 108–134. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-40223-5_6
Wirtz, R., Heisel, M.: RE4DIST: model-based elicitation of functional requirements for distributed systems. In: van Sinderen, M., Maciaszek, L.A. (eds.) Proceedings of the 14th International Conference on Software Technologies, ICSOFT 2019, Prague, Czech Republic, 26–28 July 2019, pp. 71–81. SciTePress (2019). https://doi.org/10.5220/0007919200710081
Wirtz, R., Heisel, M.: A systematic method to describe and identify security threats based on functional requirements. In: Zemmari, A., Mosbah, M., Cuppens-Boulahia, N., Cuppens, F. (eds.) CRiSIS 2018. LNCS, vol. 11391, pp. 205–221. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-12143-3_17
Wirtz, R., Heisel, M.: Risk identification: from requirements to threat models. In: Furnell, S., Mori, P., Weippl, E.R., Camp, O. (eds.) Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, Valletta, Malta, 25–27 February 2020, pp. 385–396. SCITEPRESS (2020). https://doi.org/10.5220/0008935803850396
Wirtz, R., Heisel, M.: Systematic treatment of security risks during requirements engineering. In: Ali, R., Kaindl, H., Maciaszek, L.A. (eds.) Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE 2020, Prague, Czech Republic, 5–6 May 2020, pp. 132–143. SCITEPRESS (2020). https://doi.org/10.5220/0009397001320143
Wirtz, R., Heisel, M., Wagner, M.: Distributed frames: pattern-based characterization of functional requirements for distributed systems. In: van Sinderen, M., Maciaszek, L.A. (eds.) ICSOFT 2019. CCIS, vol. 1250, pp. 81–107. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-52991-8_5
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Wirtz, R., Heisel, M. (2021). Risk Treatment: An Iterative Method for Identifying Controls. In: Ali, R., Kaindl, H., Maciaszek, L.A. (eds) Evaluation of Novel Approaches to Software Engineering. ENASE 2020. Communications in Computer and Information Science, vol 1375. Springer, Cham. https://doi.org/10.1007/978-3-030-70006-5_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-70006-5_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-70005-8
Online ISBN: 978-3-030-70006-5
eBook Packages: Computer ScienceComputer Science (R0)