SlideShare uma empresa Scribd logo
1 de 20
Baixar para ler offline
 
 
 
 
 

AT3
Concurrent Session 
11/8/2012 10:15 AM 
 
 
 
 
 
 
 

"Protection Poker:
An Agile Security Game"
 
 
 

Presented by:
Laurie Williams
North Carolina State University
 
 
 
 
 
 
 
 

Brought to you by: 
 

 
 
340 Corporate Way, Suite 300, Orange Park, FL 32073 
888‐268‐8770 ∙ 904‐278‐0524 ∙ sqeinfo@sqe.com ∙ www.sqe.com
Laurie Williams
North Carolina State University
A professor of computer science at North Carolina State University, Laurie Williams has
been researching agile development methodologies and practices for thirteen years and
software security for seven years. She has taught agile courses and coached industrial
agile teams at a number of organizations in a variety of domains for the past five years.
Laurie is the author of Pair Programming Illuminated; sixty refereed papers on agile
software development, test-driven development, and pair programming; and thirty
papers on software security.
.

 
Protection Poker: An Agile
Security Game

Laurie Williams
williams@csc.ncsu.edu

Picture from http://www.thevelvetstore.com

1

Another vote for…

“Everything should
be made as simple
as possible, but not
simpler.”
--Albert Einstein

http://imagecache2.allposters.com/images/pic/CMA
G/956-037~Albert-Einstein-Posters.jpg

1
Estimation
Planning Poker
How many engineers?
How long?

What is the security risk?

Protection Poker
Pictures from http://www.doolwind.com , http://news.cnet.com and
http://www.itsablackthang.com/images/Art-Sports/irving-sinclair-the-pokergame.jpg

Effort Estimation: Planning Poker
How many engineers?
How long?

Pictures from http://www.doolwind.com ,
http://www.legendsofamerica.com/photos-oldwest/Faro2-500.jpg

2
Coming up with the plan
Desired
Feature
s

5 story points/
iteration
30 story
points

6
iterations

June
10

5

Estimating “dog points”
• Estimate each of the dogs below in dog points, assigning
each dog a minimum of 1 dog point and a maximum of
10 dog points
• A dog point represents the height of a dog at the
shoulder
–
–
–
–
–
–
–
–

Labrador retriever
Terrier
Great Dane
Poodle
Dachshund
German shepherd
St. Bernard
Bulldog

6

3
What if?
• Estimate each of the dogs below in dog points, assigning
each dog a minimum of 1 dog point and a maximum of
100 dog points
• A dog point represents the height of a dog at the
shoulder
–
–
–
–
–
–
–
–

Labrador retriever
Terrier
Great Dane
Poodle
Dachshund
German shepherd
St. Bernard
Bulldog

Harder or easier?

More or less accurate?

More or less time consuming?

7

Estimating story points
• Estimate stories relative to each other
–
–
–
–

Twice
T i as big
bi
Half as big
Almost but not quite as big
A little bit bigger

• Only values:
– 0 1, 2, 3, 5, 8, 13, 20 40, 100
0, 1 2 3 5 8 13 20, 40
Near term iteration
“stories”

A few iterations away
“epic”

8

4
Diversity of opinion is
essential!

Vote based on:
•Disaggregation
•Analogy
•Expert opinion

(Subjective) Results of Planning Poker
• Explicit result (<20%):
– Effort Estimate
• Side effects/implicit results (80%+):
– Greater understanding of requirement
– Expectation setting
– Implementation hints
– High level design/architecture discussion
– Ownership of estimate

5
Security Risk Estimation: Protection
Poker
What is the security risk?

http://news.cnet.com and
http://swamptour.net/images/ST7PokerGame1.gif
http://collaboration.csc.ncsu.edu/laurie/Papers/ProtectionPoker.pdf

Software Security Risk Assessment
via Protection Poker

6
Computing Security Risk Exposure
Traditional Risk
Exposure

probability of
occurrence

NIST Security Risk likelihood of threat
threatExposure
source exercising
vulnerability

X

impact of loss

X

impact of adverse event on
organization
enumeration of adversary
types

difficulty
motivation of adversaries
Proposed Security ease of attack
Risk Exposure

Ease points

X

value of asset
- To organization
- To adversary

Value points

Memory Jogger

7
Step 1: Calibrate value of database
tables (done once)
• Which database table would be least attractive to an
attacker?
• Which database table would be most attractive to an
attacker?
• Use your planning poker cards to assign relative point
values for the “value” of each database table, giving a 1
to the least attractive.
• Circle the database tables in Table 1 and put the value
points in the appropriate column.
• There are your “value” endpoints.

Step 2: Calibrate ease of attack for
requirements (done once)
•

Which requirement adds functionality that will make an
attack easiest?
• Which requirement adds functionality that will make
attack hardest?
• Use your planning poker cards to assign relative point
values for the “ease” of each requirement.
• There are your “ease” endpoints for the rest of the
exercise.
exercise

8
Step 3: Compute security risk of
requirements (each iteration)
• For each requirement:
– Identify database tables used in that requirement For
requirement.
each:
• Table already have a “value”? Use it.
• Table doesn‘t have a “value”? “Poker” a value.
– Record the sum of database table values.
– “Poker” a value for ease points. Discuss changes to
implementation that may reduce the ease.
– Compute security risk by multiplying value by ease.

Security Risk Assessment

Requirement

Ease 
Ease
Points

Value Points Security Risk 

Ranking

Req 1

1

100

100

3

Req 2

5

1

5

6

Req 3

5

1

5

6

Req 4

20

5

100

3

Req 5

13

13

169

2

Req 6

1

40

40

5

Req 7

40

60

2400

1

Sum of asset value (e.g.
one 20 and one 40)

9
Step 4: Risk Ranking and Discussion
(each iteration)
• Rank your risks.
• Any surprises? Satisfied with values you
gave?
• What plans would you put in place now that
you are more aware of the security risk?

“Diversity of ideas is healthy,
and it lends a creativity and
drive to the security field that
we must take advantage of.”
-- Gary McGraw

Informal discussions of:
•Threat models
•Misuse cases

10
Attacker mindset

RedHat Case Study

Current software security knowledge

PP help spread software security knowledge

PP learn about software security

Focus on true software security risks

11
Discussions

# of contributions

time talking

(Subjective) Results of Protection
Poker
• Explicit result (<20%):
– Relative security risk assessment

• Side effects/implicit results (80%+):
– Greater awareness understanding of security implications
of requirement
• Collaborative threat modeling
• Collaborative misuse case development
– Requirements changed to reduce risk
q
g
– Allocation of time to build security into new functionality
“delivered” at end of iteration (appropriate to relative risk)
– Knowledge sharing and transfer of security information

12
Group exercise
• Let’s play protection poker!

13
14
Req 1: Emergency Responder
Currently the only roles in iTrust are licensed health care
professional, unlicensed health care professional (a.k.a secretarial
support),
support) administrator and patient The need for another role has
patient.
arisen: emergency responder (ER). An emergency responder is
defined as follows: police, fire, emergency medical technicians
(EMTs), and other medically trained emergency responders who
provide care while at, or in transport from, the site of an
emergency. The only capability provided to an ER is access to an
emergency report for a patient which provides basic but important
information such as: allergies blood type recent short term
allergies,
type,
short-term
diagnoses, long term, chronic illness diagnoses, prescription
history, and immunization history. The patient is sent an email to
notify them of the viewing of their records by an emergency
responder.

Req 2: Find qualified LHCP
A patient has just been diagnosed with a condition and wants to
find the licensed health care professionals (LHCPs) in the area
who h
h have h dl d th t condition. Th patient chooses 'M
handled that
diti
The ti t h
'My
Diagnoses” and is presented with a listing of all their own
diagnoses, sorted by diagnosis date (more recent first). The
patient can select a diagnosis and will be presented with the
LHCPs in the patient's living area (based upon the first three
numbers of their zip code) who have handled this diagnosis in
the last three years. The list is ranked by the quantity of
patients the LHCP has treated for that diagnosis (each patient
is only counted once regardless of the number of office visits).

15
Req 3: Update diagnosis code table
The American Medical Association has
decided that beginning January 1 2013 all
1,
diagnoses must be coded with ICD-10
rather than ICD-9CM. These new codes
need to be saved for eventual use by the
iTrust application.

Req 4: View access log
A patient can view a listing of the names of
licensed health care professionals that
viewed or edited their medical records and
the date the viewing/editing occurred is
displayed.

16
For each requirement
• Discuss the most sensitive data element involved
(value)
–E d i t
Endpoints
– Relative values

• Discuss whether the new functionality provides
functionality that could make it easier for an attacker to
exploit the system (ease)
– Endpoints
– Relative values

• Using Protection Poker language, which requirement
seems the least and most risky and why

http://www.photosofoldamerica.com/webart/large/254.JPG
http://www.cardcow.com/images/albert-einstein-at-beach1945-celebrities-28954.jpg

17
Protection Poker Resources
• Williams, L., Meneely, A., and Shipley, G.,
Protection Poker: The New Software
Security "Game", IEEE Security and
Privacy, Vol. 8, Number 3, May/June 2010,
pp. 14-20.
• http://collaboration.csc.ncsu.edu/laurie/Sec
urity/ProtectionPoker/

18

Mais conteúdo relacionado

Mais procurados

Threat Based Risk Assessment
Threat Based Risk AssessmentThreat Based Risk Assessment
Threat Based Risk AssessmentMichael Lines
 
Anomaly detection with machine learning at scale
Anomaly detection with machine learning at scaleAnomaly detection with machine learning at scale
Anomaly detection with machine learning at scaleImpetus Technologies
 
Dss vs expert system
Dss vs expert systemDss vs expert system
Dss vs expert systemAnita Johri
 
Administering security
Administering securityAdministering security
Administering securityG Prachi
 
Adversarial Attacks and Defense
Adversarial Attacks and DefenseAdversarial Attacks and Defense
Adversarial Attacks and DefenseKishor Datta Gupta
 

Mais procurados (7)

Threat Based Risk Assessment
Threat Based Risk AssessmentThreat Based Risk Assessment
Threat Based Risk Assessment
 
5 ai lecture-05 expert system
5  ai lecture-05 expert system5  ai lecture-05 expert system
5 ai lecture-05 expert system
 
Anomaly detection with machine learning at scale
Anomaly detection with machine learning at scaleAnomaly detection with machine learning at scale
Anomaly detection with machine learning at scale
 
Dss vs expert system
Dss vs expert systemDss vs expert system
Dss vs expert system
 
Administering security
Administering securityAdministering security
Administering security
 
Adversarial Attacks and Defense
Adversarial Attacks and DefenseAdversarial Attacks and Defense
Adversarial Attacks and Defense
 
Information systems risk assessment frame workisraf 130215042410-phpapp01
Information systems risk assessment frame workisraf 130215042410-phpapp01Information systems risk assessment frame workisraf 130215042410-phpapp01
Information systems risk assessment frame workisraf 130215042410-phpapp01
 

Destaque

Designing Your Team and Organization for Innovation
Designing Your Team and Organization for InnovationDesigning Your Team and Organization for Innovation
Designing Your Team and Organization for InnovationTechWell
 
Agile Testing: It’s a Team Sport
Agile Testing: It’s a Team SportAgile Testing: It’s a Team Sport
Agile Testing: It’s a Team SportTechWell
 
Agile Success with Scrum: It’s All about the People
Agile Success with Scrum: It’s All about the PeopleAgile Success with Scrum: It’s All about the People
Agile Success with Scrum: It’s All about the PeopleTechWell
 
Design for Testability: A Tutorial for Devs and Testers
Design for Testability: A Tutorial for Devs and TestersDesign for Testability: A Tutorial for Devs and Testers
Design for Testability: A Tutorial for Devs and TestersTechWell
 
Test Managers: How You Can Really Make a Difference
Test Managers: How You Can Really Make a DifferenceTest Managers: How You Can Really Make a Difference
Test Managers: How You Can Really Make a DifferenceTechWell
 
Software Metrics: Taking the Guesswork Out of Software Projects
Software Metrics: Taking the Guesswork Out of Software ProjectsSoftware Metrics: Taking the Guesswork Out of Software Projects
Software Metrics: Taking the Guesswork Out of Software ProjectsTechWell
 
The Google Hacking Database: A Key Resource to Exposing Vulnerabilities
The Google Hacking Database: A Key Resource to Exposing VulnerabilitiesThe Google Hacking Database: A Key Resource to Exposing Vulnerabilities
The Google Hacking Database: A Key Resource to Exposing VulnerabilitiesTechWell
 
Agile and CMMI: Yes, They Can Work Together
Agile and CMMI: Yes, They Can Work TogetherAgile and CMMI: Yes, They Can Work Together
Agile and CMMI: Yes, They Can Work TogetherTechWell
 
Agile Program Management: Networks, Not Hierarchies
Agile Program Management: Networks, Not HierarchiesAgile Program Management: Networks, Not Hierarchies
Agile Program Management: Networks, Not HierarchiesTechWell
 
Agile Redefines Global Economics: What Recent Data Reveals
Agile Redefines Global Economics: What Recent Data RevealsAgile Redefines Global Economics: What Recent Data Reveals
Agile Redefines Global Economics: What Recent Data RevealsTechWell
 
Influence Strategies for Software Professionals
Influence Strategies for Software ProfessionalsInfluence Strategies for Software Professionals
Influence Strategies for Software ProfessionalsTechWell
 
Tests and Requirements: Like Ham and Eggs, Sugar and Spice, Lucy and Desi
Tests and Requirements: Like Ham and Eggs, Sugar and Spice, Lucy and DesiTests and Requirements: Like Ham and Eggs, Sugar and Spice, Lucy and Desi
Tests and Requirements: Like Ham and Eggs, Sugar and Spice, Lucy and DesiTechWell
 
Governing Agile Teams: Disciplined Strategies to Increase Agile Effectiveness
Governing Agile Teams: Disciplined Strategies to Increase Agile EffectivenessGoverning Agile Teams: Disciplined Strategies to Increase Agile Effectiveness
Governing Agile Teams: Disciplined Strategies to Increase Agile EffectivenessTechWell
 
Seven Keys to Navigating Your Agile Testing Transition
Seven Keys to Navigating Your Agile Testing TransitionSeven Keys to Navigating Your Agile Testing Transition
Seven Keys to Navigating Your Agile Testing TransitionTechWell
 
How to Jumpstart Enterprise Agile Adoption
How to Jumpstart Enterprise Agile AdoptionHow to Jumpstart Enterprise Agile Adoption
How to Jumpstart Enterprise Agile AdoptionTechWell
 
Data Warehouse Testing: It’s All about the Planning
Data Warehouse Testing: It’s All about the PlanningData Warehouse Testing: It’s All about the Planning
Data Warehouse Testing: It’s All about the PlanningTechWell
 

Destaque (16)

Designing Your Team and Organization for Innovation
Designing Your Team and Organization for InnovationDesigning Your Team and Organization for Innovation
Designing Your Team and Organization for Innovation
 
Agile Testing: It’s a Team Sport
Agile Testing: It’s a Team SportAgile Testing: It’s a Team Sport
Agile Testing: It’s a Team Sport
 
Agile Success with Scrum: It’s All about the People
Agile Success with Scrum: It’s All about the PeopleAgile Success with Scrum: It’s All about the People
Agile Success with Scrum: It’s All about the People
 
Design for Testability: A Tutorial for Devs and Testers
Design for Testability: A Tutorial for Devs and TestersDesign for Testability: A Tutorial for Devs and Testers
Design for Testability: A Tutorial for Devs and Testers
 
Test Managers: How You Can Really Make a Difference
Test Managers: How You Can Really Make a DifferenceTest Managers: How You Can Really Make a Difference
Test Managers: How You Can Really Make a Difference
 
Software Metrics: Taking the Guesswork Out of Software Projects
Software Metrics: Taking the Guesswork Out of Software ProjectsSoftware Metrics: Taking the Guesswork Out of Software Projects
Software Metrics: Taking the Guesswork Out of Software Projects
 
The Google Hacking Database: A Key Resource to Exposing Vulnerabilities
The Google Hacking Database: A Key Resource to Exposing VulnerabilitiesThe Google Hacking Database: A Key Resource to Exposing Vulnerabilities
The Google Hacking Database: A Key Resource to Exposing Vulnerabilities
 
Agile and CMMI: Yes, They Can Work Together
Agile and CMMI: Yes, They Can Work TogetherAgile and CMMI: Yes, They Can Work Together
Agile and CMMI: Yes, They Can Work Together
 
Agile Program Management: Networks, Not Hierarchies
Agile Program Management: Networks, Not HierarchiesAgile Program Management: Networks, Not Hierarchies
Agile Program Management: Networks, Not Hierarchies
 
Agile Redefines Global Economics: What Recent Data Reveals
Agile Redefines Global Economics: What Recent Data RevealsAgile Redefines Global Economics: What Recent Data Reveals
Agile Redefines Global Economics: What Recent Data Reveals
 
Influence Strategies for Software Professionals
Influence Strategies for Software ProfessionalsInfluence Strategies for Software Professionals
Influence Strategies for Software Professionals
 
Tests and Requirements: Like Ham and Eggs, Sugar and Spice, Lucy and Desi
Tests and Requirements: Like Ham and Eggs, Sugar and Spice, Lucy and DesiTests and Requirements: Like Ham and Eggs, Sugar and Spice, Lucy and Desi
Tests and Requirements: Like Ham and Eggs, Sugar and Spice, Lucy and Desi
 
Governing Agile Teams: Disciplined Strategies to Increase Agile Effectiveness
Governing Agile Teams: Disciplined Strategies to Increase Agile EffectivenessGoverning Agile Teams: Disciplined Strategies to Increase Agile Effectiveness
Governing Agile Teams: Disciplined Strategies to Increase Agile Effectiveness
 
Seven Keys to Navigating Your Agile Testing Transition
Seven Keys to Navigating Your Agile Testing TransitionSeven Keys to Navigating Your Agile Testing Transition
Seven Keys to Navigating Your Agile Testing Transition
 
How to Jumpstart Enterprise Agile Adoption
How to Jumpstart Enterprise Agile AdoptionHow to Jumpstart Enterprise Agile Adoption
How to Jumpstart Enterprise Agile Adoption
 
Data Warehouse Testing: It’s All about the Planning
Data Warehouse Testing: It’s All about the PlanningData Warehouse Testing: It’s All about the Planning
Data Warehouse Testing: It’s All about the Planning
 

Semelhante a Protection Poker: An Agile Security Game

OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakMarc St-Pierre
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipRedZone Technologies
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...robbiesamuel
 
We need Paper on Risk Assessment for the organization (NASA). Th.docx
We need Paper on Risk Assessment for the organization (NASA). Th.docxWe need Paper on Risk Assessment for the organization (NASA). Th.docx
We need Paper on Risk Assessment for the organization (NASA). Th.docxcelenarouzie
 
Beyond security testing
Beyond security testingBeyond security testing
Beyond security testingCu Nguyen
 
Assessing System Risk the Smart Way
Assessing System Risk the Smart WayAssessing System Risk the Smart Way
Assessing System Risk the Smart WaySecurity Innovation
 
How to Develop a Secure Web Application and Stay in Mind? (PHDays 3)
How to Develop a Secure Web Application and Stay in Mind? (PHDays 3)How to Develop a Secure Web Application and Stay in Mind? (PHDays 3)
How to Develop a Secure Web Application and Stay in Mind? (PHDays 3)Vladimir Kochetkov
 
27 Introduction Risk management begins with first .docx
27 Introduction Risk management begins with first .docx27 Introduction Risk management begins with first .docx
27 Introduction Risk management begins with first .docxlorainedeserre
 
27 Introduction Risk management begins with first .docx
27 Introduction Risk management begins with first .docx27 Introduction Risk management begins with first .docx
27 Introduction Risk management begins with first .docxvickeryr87
 
Security metrics 2
Security metrics 2Security metrics 2
Security metrics 2Manish Kumar
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comPrescottLunt386
 
SOC Analyst Interview Questions & Answers.pdf
SOC Analyst Interview Questions & Answers.pdfSOC Analyst Interview Questions & Answers.pdf
SOC Analyst Interview Questions & Answers.pdfinfosec train
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber riskStephen Cobb
 
The Golden Rules - Detecting more with RSA Security Analytics
The Golden Rules  - Detecting more with RSA Security AnalyticsThe Golden Rules  - Detecting more with RSA Security Analytics
The Golden Rules - Detecting more with RSA Security AnalyticsDemetrio Milea
 
INFORMATION SECURITY STUDY GUIDE for STUDENTS
INFORMATION SECURITY STUDY GUIDE for STUDENTSINFORMATION SECURITY STUDY GUIDE for STUDENTS
INFORMATION SECURITY STUDY GUIDE for STUDENTShenlydailymotion
 

Semelhante a Protection Poker: An Agile Security Game (20)

Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
Cyberedge 2015 Defense Report
Cyberedge 2015 Defense Report Cyberedge 2015 Defense Report
Cyberedge 2015 Defense Report
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and Leadership
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 
We need Paper on Risk Assessment for the organization (NASA). Th.docx
We need Paper on Risk Assessment for the organization (NASA). Th.docxWe need Paper on Risk Assessment for the organization (NASA). Th.docx
We need Paper on Risk Assessment for the organization (NASA). Th.docx
 
Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016
 
Auditing-Cybersecurity in the enterprise
Auditing-Cybersecurity in the enterpriseAuditing-Cybersecurity in the enterprise
Auditing-Cybersecurity in the enterprise
 
Beyond security testing
Beyond security testingBeyond security testing
Beyond security testing
 
Assessing System Risk the Smart Way
Assessing System Risk the Smart WayAssessing System Risk the Smart Way
Assessing System Risk the Smart Way
 
Cmgt 400 cmgt400
Cmgt 400 cmgt400Cmgt 400 cmgt400
Cmgt 400 cmgt400
 
How to Develop a Secure Web Application and Stay in Mind? (PHDays 3)
How to Develop a Secure Web Application and Stay in Mind? (PHDays 3)How to Develop a Secure Web Application and Stay in Mind? (PHDays 3)
How to Develop a Secure Web Application and Stay in Mind? (PHDays 3)
 
27 Introduction Risk management begins with first .docx
27 Introduction Risk management begins with first .docx27 Introduction Risk management begins with first .docx
27 Introduction Risk management begins with first .docx
 
27 Introduction Risk management begins with first .docx
27 Introduction Risk management begins with first .docx27 Introduction Risk management begins with first .docx
27 Introduction Risk management begins with first .docx
 
Security metrics 2
Security metrics 2Security metrics 2
Security metrics 2
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.com
 
SOC Analyst Interview Questions & Answers.pdf
SOC Analyst Interview Questions & Answers.pdfSOC Analyst Interview Questions & Answers.pdf
SOC Analyst Interview Questions & Answers.pdf
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
The Golden Rules - Detecting more with RSA Security Analytics
The Golden Rules  - Detecting more with RSA Security AnalyticsThe Golden Rules  - Detecting more with RSA Security Analytics
The Golden Rules - Detecting more with RSA Security Analytics
 
INFORMATION SECURITY STUDY GUIDE for STUDENTS
INFORMATION SECURITY STUDY GUIDE for STUDENTSINFORMATION SECURITY STUDY GUIDE for STUDENTS
INFORMATION SECURITY STUDY GUIDE for STUDENTS
 

Mais de TechWell

Failing and Recovering
Failing and RecoveringFailing and Recovering
Failing and RecoveringTechWell
 
Instill a DevOps Testing Culture in Your Team and Organization
Instill a DevOps Testing Culture in Your Team and Organization Instill a DevOps Testing Culture in Your Team and Organization
Instill a DevOps Testing Culture in Your Team and Organization TechWell
 
Test Design for Fully Automated Build Architecture
Test Design for Fully Automated Build ArchitectureTest Design for Fully Automated Build Architecture
Test Design for Fully Automated Build ArchitectureTechWell
 
System-Level Test Automation: Ensuring a Good Start
System-Level Test Automation: Ensuring a Good StartSystem-Level Test Automation: Ensuring a Good Start
System-Level Test Automation: Ensuring a Good StartTechWell
 
Build Your Mobile App Quality and Test Strategy
Build Your Mobile App Quality and Test StrategyBuild Your Mobile App Quality and Test Strategy
Build Your Mobile App Quality and Test StrategyTechWell
 
Testing Transformation: The Art and Science for Success
Testing Transformation: The Art and Science for SuccessTesting Transformation: The Art and Science for Success
Testing Transformation: The Art and Science for SuccessTechWell
 
Implement BDD with Cucumber and SpecFlow
Implement BDD with Cucumber and SpecFlowImplement BDD with Cucumber and SpecFlow
Implement BDD with Cucumber and SpecFlowTechWell
 
Develop WebDriver Automated Tests—and Keep Your Sanity
Develop WebDriver Automated Tests—and Keep Your SanityDevelop WebDriver Automated Tests—and Keep Your Sanity
Develop WebDriver Automated Tests—and Keep Your SanityTechWell
 
Eliminate Cloud Waste with a Holistic DevOps Strategy
Eliminate Cloud Waste with a Holistic DevOps StrategyEliminate Cloud Waste with a Holistic DevOps Strategy
Eliminate Cloud Waste with a Holistic DevOps StrategyTechWell
 
Transform Test Organizations for the New World of DevOps
Transform Test Organizations for the New World of DevOpsTransform Test Organizations for the New World of DevOps
Transform Test Organizations for the New World of DevOpsTechWell
 
The Fourth Constraint in Project Delivery—Leadership
The Fourth Constraint in Project Delivery—LeadershipThe Fourth Constraint in Project Delivery—Leadership
The Fourth Constraint in Project Delivery—LeadershipTechWell
 
Resolve the Contradiction of Specialists within Agile Teams
Resolve the Contradiction of Specialists within Agile TeamsResolve the Contradiction of Specialists within Agile Teams
Resolve the Contradiction of Specialists within Agile TeamsTechWell
 
Pin the Tail on the Metric: A Field-Tested Agile Game
Pin the Tail on the Metric: A Field-Tested Agile GamePin the Tail on the Metric: A Field-Tested Agile Game
Pin the Tail on the Metric: A Field-Tested Agile GameTechWell
 
Agile Performance Holarchy (APH)—A Model for Scaling Agile Teams
Agile Performance Holarchy (APH)—A Model for Scaling Agile TeamsAgile Performance Holarchy (APH)—A Model for Scaling Agile Teams
Agile Performance Holarchy (APH)—A Model for Scaling Agile TeamsTechWell
 
A Business-First Approach to DevOps Implementation
A Business-First Approach to DevOps ImplementationA Business-First Approach to DevOps Implementation
A Business-First Approach to DevOps ImplementationTechWell
 
Databases in a Continuous Integration/Delivery Process
Databases in a Continuous Integration/Delivery ProcessDatabases in a Continuous Integration/Delivery Process
Databases in a Continuous Integration/Delivery ProcessTechWell
 
Mobile Testing: What—and What Not—to Automate
Mobile Testing: What—and What Not—to AutomateMobile Testing: What—and What Not—to Automate
Mobile Testing: What—and What Not—to AutomateTechWell
 
Cultural Intelligence: A Key Skill for Success
Cultural Intelligence: A Key Skill for SuccessCultural Intelligence: A Key Skill for Success
Cultural Intelligence: A Key Skill for SuccessTechWell
 
Turn the Lights On: A Power Utility Company's Agile Transformation
Turn the Lights On: A Power Utility Company's Agile TransformationTurn the Lights On: A Power Utility Company's Agile Transformation
Turn the Lights On: A Power Utility Company's Agile TransformationTechWell
 

Mais de TechWell (20)

Failing and Recovering
Failing and RecoveringFailing and Recovering
Failing and Recovering
 
Instill a DevOps Testing Culture in Your Team and Organization
Instill a DevOps Testing Culture in Your Team and Organization Instill a DevOps Testing Culture in Your Team and Organization
Instill a DevOps Testing Culture in Your Team and Organization
 
Test Design for Fully Automated Build Architecture
Test Design for Fully Automated Build ArchitectureTest Design for Fully Automated Build Architecture
Test Design for Fully Automated Build Architecture
 
System-Level Test Automation: Ensuring a Good Start
System-Level Test Automation: Ensuring a Good StartSystem-Level Test Automation: Ensuring a Good Start
System-Level Test Automation: Ensuring a Good Start
 
Build Your Mobile App Quality and Test Strategy
Build Your Mobile App Quality and Test StrategyBuild Your Mobile App Quality and Test Strategy
Build Your Mobile App Quality and Test Strategy
 
Testing Transformation: The Art and Science for Success
Testing Transformation: The Art and Science for SuccessTesting Transformation: The Art and Science for Success
Testing Transformation: The Art and Science for Success
 
Implement BDD with Cucumber and SpecFlow
Implement BDD with Cucumber and SpecFlowImplement BDD with Cucumber and SpecFlow
Implement BDD with Cucumber and SpecFlow
 
Develop WebDriver Automated Tests—and Keep Your Sanity
Develop WebDriver Automated Tests—and Keep Your SanityDevelop WebDriver Automated Tests—and Keep Your Sanity
Develop WebDriver Automated Tests—and Keep Your Sanity
 
Ma 15
Ma 15Ma 15
Ma 15
 
Eliminate Cloud Waste with a Holistic DevOps Strategy
Eliminate Cloud Waste with a Holistic DevOps StrategyEliminate Cloud Waste with a Holistic DevOps Strategy
Eliminate Cloud Waste with a Holistic DevOps Strategy
 
Transform Test Organizations for the New World of DevOps
Transform Test Organizations for the New World of DevOpsTransform Test Organizations for the New World of DevOps
Transform Test Organizations for the New World of DevOps
 
The Fourth Constraint in Project Delivery—Leadership
The Fourth Constraint in Project Delivery—LeadershipThe Fourth Constraint in Project Delivery—Leadership
The Fourth Constraint in Project Delivery—Leadership
 
Resolve the Contradiction of Specialists within Agile Teams
Resolve the Contradiction of Specialists within Agile TeamsResolve the Contradiction of Specialists within Agile Teams
Resolve the Contradiction of Specialists within Agile Teams
 
Pin the Tail on the Metric: A Field-Tested Agile Game
Pin the Tail on the Metric: A Field-Tested Agile GamePin the Tail on the Metric: A Field-Tested Agile Game
Pin the Tail on the Metric: A Field-Tested Agile Game
 
Agile Performance Holarchy (APH)—A Model for Scaling Agile Teams
Agile Performance Holarchy (APH)—A Model for Scaling Agile TeamsAgile Performance Holarchy (APH)—A Model for Scaling Agile Teams
Agile Performance Holarchy (APH)—A Model for Scaling Agile Teams
 
A Business-First Approach to DevOps Implementation
A Business-First Approach to DevOps ImplementationA Business-First Approach to DevOps Implementation
A Business-First Approach to DevOps Implementation
 
Databases in a Continuous Integration/Delivery Process
Databases in a Continuous Integration/Delivery ProcessDatabases in a Continuous Integration/Delivery Process
Databases in a Continuous Integration/Delivery Process
 
Mobile Testing: What—and What Not—to Automate
Mobile Testing: What—and What Not—to AutomateMobile Testing: What—and What Not—to Automate
Mobile Testing: What—and What Not—to Automate
 
Cultural Intelligence: A Key Skill for Success
Cultural Intelligence: A Key Skill for SuccessCultural Intelligence: A Key Skill for Success
Cultural Intelligence: A Key Skill for Success
 
Turn the Lights On: A Power Utility Company's Agile Transformation
Turn the Lights On: A Power Utility Company's Agile TransformationTurn the Lights On: A Power Utility Company's Agile Transformation
Turn the Lights On: A Power Utility Company's Agile Transformation
 

Último

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Último (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

Protection Poker: An Agile Security Game

  • 1.           AT3 Concurrent Session  11/8/2012 10:15 AM                "Protection Poker: An Agile Security Game"       Presented by: Laurie Williams North Carolina State University                 Brought to you by:        340 Corporate Way, Suite 300, Orange Park, FL 32073  888‐268‐8770 ∙ 904‐278‐0524 ∙ sqeinfo@sqe.com ∙ www.sqe.com
  • 2. Laurie Williams North Carolina State University A professor of computer science at North Carolina State University, Laurie Williams has been researching agile development methodologies and practices for thirteen years and software security for seven years. She has taught agile courses and coached industrial agile teams at a number of organizations in a variety of domains for the past five years. Laurie is the author of Pair Programming Illuminated; sixty refereed papers on agile software development, test-driven development, and pair programming; and thirty papers on software security. .  
  • 3. Protection Poker: An Agile Security Game Laurie Williams williams@csc.ncsu.edu Picture from http://www.thevelvetstore.com 1 Another vote for… “Everything should be made as simple as possible, but not simpler.” --Albert Einstein http://imagecache2.allposters.com/images/pic/CMA G/956-037~Albert-Einstein-Posters.jpg 1
  • 4. Estimation Planning Poker How many engineers? How long? What is the security risk? Protection Poker Pictures from http://www.doolwind.com , http://news.cnet.com and http://www.itsablackthang.com/images/Art-Sports/irving-sinclair-the-pokergame.jpg Effort Estimation: Planning Poker How many engineers? How long? Pictures from http://www.doolwind.com , http://www.legendsofamerica.com/photos-oldwest/Faro2-500.jpg 2
  • 5. Coming up with the plan Desired Feature s 5 story points/ iteration 30 story points 6 iterations June 10 5 Estimating “dog points” • Estimate each of the dogs below in dog points, assigning each dog a minimum of 1 dog point and a maximum of 10 dog points • A dog point represents the height of a dog at the shoulder – – – – – – – – Labrador retriever Terrier Great Dane Poodle Dachshund German shepherd St. Bernard Bulldog 6 3
  • 6. What if? • Estimate each of the dogs below in dog points, assigning each dog a minimum of 1 dog point and a maximum of 100 dog points • A dog point represents the height of a dog at the shoulder – – – – – – – – Labrador retriever Terrier Great Dane Poodle Dachshund German shepherd St. Bernard Bulldog Harder or easier? More or less accurate? More or less time consuming? 7 Estimating story points • Estimate stories relative to each other – – – – Twice T i as big bi Half as big Almost but not quite as big A little bit bigger • Only values: – 0 1, 2, 3, 5, 8, 13, 20 40, 100 0, 1 2 3 5 8 13 20, 40 Near term iteration “stories” A few iterations away “epic” 8 4
  • 7. Diversity of opinion is essential! Vote based on: •Disaggregation •Analogy •Expert opinion (Subjective) Results of Planning Poker • Explicit result (<20%): – Effort Estimate • Side effects/implicit results (80%+): – Greater understanding of requirement – Expectation setting – Implementation hints – High level design/architecture discussion – Ownership of estimate 5
  • 8. Security Risk Estimation: Protection Poker What is the security risk? http://news.cnet.com and http://swamptour.net/images/ST7PokerGame1.gif http://collaboration.csc.ncsu.edu/laurie/Papers/ProtectionPoker.pdf Software Security Risk Assessment via Protection Poker 6
  • 9. Computing Security Risk Exposure Traditional Risk Exposure probability of occurrence NIST Security Risk likelihood of threat threatExposure source exercising vulnerability X impact of loss X impact of adverse event on organization enumeration of adversary types difficulty motivation of adversaries Proposed Security ease of attack Risk Exposure Ease points X value of asset - To organization - To adversary Value points Memory Jogger 7
  • 10. Step 1: Calibrate value of database tables (done once) • Which database table would be least attractive to an attacker? • Which database table would be most attractive to an attacker? • Use your planning poker cards to assign relative point values for the “value” of each database table, giving a 1 to the least attractive. • Circle the database tables in Table 1 and put the value points in the appropriate column. • There are your “value” endpoints. Step 2: Calibrate ease of attack for requirements (done once) • Which requirement adds functionality that will make an attack easiest? • Which requirement adds functionality that will make attack hardest? • Use your planning poker cards to assign relative point values for the “ease” of each requirement. • There are your “ease” endpoints for the rest of the exercise. exercise 8
  • 11. Step 3: Compute security risk of requirements (each iteration) • For each requirement: – Identify database tables used in that requirement For requirement. each: • Table already have a “value”? Use it. • Table doesn‘t have a “value”? “Poker” a value. – Record the sum of database table values. – “Poker” a value for ease points. Discuss changes to implementation that may reduce the ease. – Compute security risk by multiplying value by ease. Security Risk Assessment Requirement Ease  Ease Points Value Points Security Risk  Ranking Req 1 1 100 100 3 Req 2 5 1 5 6 Req 3 5 1 5 6 Req 4 20 5 100 3 Req 5 13 13 169 2 Req 6 1 40 40 5 Req 7 40 60 2400 1 Sum of asset value (e.g. one 20 and one 40) 9
  • 12. Step 4: Risk Ranking and Discussion (each iteration) • Rank your risks. • Any surprises? Satisfied with values you gave? • What plans would you put in place now that you are more aware of the security risk? “Diversity of ideas is healthy, and it lends a creativity and drive to the security field that we must take advantage of.” -- Gary McGraw Informal discussions of: •Threat models •Misuse cases 10
  • 13. Attacker mindset RedHat Case Study Current software security knowledge PP help spread software security knowledge PP learn about software security Focus on true software security risks 11
  • 14. Discussions # of contributions time talking (Subjective) Results of Protection Poker • Explicit result (<20%): – Relative security risk assessment • Side effects/implicit results (80%+): – Greater awareness understanding of security implications of requirement • Collaborative threat modeling • Collaborative misuse case development – Requirements changed to reduce risk q g – Allocation of time to build security into new functionality “delivered” at end of iteration (appropriate to relative risk) – Knowledge sharing and transfer of security information 12
  • 15. Group exercise • Let’s play protection poker! 13
  • 16. 14
  • 17. Req 1: Emergency Responder Currently the only roles in iTrust are licensed health care professional, unlicensed health care professional (a.k.a secretarial support), support) administrator and patient The need for another role has patient. arisen: emergency responder (ER). An emergency responder is defined as follows: police, fire, emergency medical technicians (EMTs), and other medically trained emergency responders who provide care while at, or in transport from, the site of an emergency. The only capability provided to an ER is access to an emergency report for a patient which provides basic but important information such as: allergies blood type recent short term allergies, type, short-term diagnoses, long term, chronic illness diagnoses, prescription history, and immunization history. The patient is sent an email to notify them of the viewing of their records by an emergency responder. Req 2: Find qualified LHCP A patient has just been diagnosed with a condition and wants to find the licensed health care professionals (LHCPs) in the area who h h have h dl d th t condition. Th patient chooses 'M handled that diti The ti t h 'My Diagnoses” and is presented with a listing of all their own diagnoses, sorted by diagnosis date (more recent first). The patient can select a diagnosis and will be presented with the LHCPs in the patient's living area (based upon the first three numbers of their zip code) who have handled this diagnosis in the last three years. The list is ranked by the quantity of patients the LHCP has treated for that diagnosis (each patient is only counted once regardless of the number of office visits). 15
  • 18. Req 3: Update diagnosis code table The American Medical Association has decided that beginning January 1 2013 all 1, diagnoses must be coded with ICD-10 rather than ICD-9CM. These new codes need to be saved for eventual use by the iTrust application. Req 4: View access log A patient can view a listing of the names of licensed health care professionals that viewed or edited their medical records and the date the viewing/editing occurred is displayed. 16
  • 19. For each requirement • Discuss the most sensitive data element involved (value) –E d i t Endpoints – Relative values • Discuss whether the new functionality provides functionality that could make it easier for an attacker to exploit the system (ease) – Endpoints – Relative values • Using Protection Poker language, which requirement seems the least and most risky and why http://www.photosofoldamerica.com/webart/large/254.JPG http://www.cardcow.com/images/albert-einstein-at-beach1945-celebrities-28954.jpg 17
  • 20. Protection Poker Resources • Williams, L., Meneely, A., and Shipley, G., Protection Poker: The New Software Security "Game", IEEE Security and Privacy, Vol. 8, Number 3, May/June 2010, pp. 14-20. • http://collaboration.csc.ncsu.edu/laurie/Sec urity/ProtectionPoker/ 18