4.4 Assessment of Incident Handling
Readiness
The IT system’s protections should be prepared for
security breaches. During the incident handling, it is
necessary to block the attack source and limit
spreading the incident to other systems.
Administrator has at her/his disposal two basic
incident handling methods: disconnecting the system
from the network and restoring its proper operation
(e.g. from the backup copy) or restoring the system
operation without disconnecting it from the network.
The systems of high availability requirements
(i.e. mission-critical systems) can not be
disconnected from the network until the incident is
handled and its effects eliminated. In such systems
the available access control and intrusion prevention
means should be used in order to limit possibilities
of spreading the incident to other systems.
Formal methods can be used for quick
verification if the network security design is correct
in respect of its incident handling readiness. For
example, using the graph’s path matrix from (2)
model, all the resources reachable from the specific
attack source can be found. Then using (1) model,
the network protections (e.g. firewalls) located in the
path between the attack source and endangered IT
system’s resources, can quickly be identified.
5 CONCLUSIONS
The models and methods described in this paper
allow for quick identification of network security
design errors resulted from violation of
“Compartmentalization of Information” (i.e.
correctness of network security zones) and
„Defense-in-Depth” (i.e. tightness of firewall and
IPS protections layers) security principles as well as
checking if network protections allow for proper
incident handling. Also other principles (e.g. "The
Principle of Least Privilege", "Defense Through
Diversification") and network protections (e.g. VPN,
anti-virus) analysis can be supported with formal
methods.
An inspiration for the development of the methods
was real problems that were experienced by the
author in the security audits. Formal methods can
speed up and improve the accuracy of network
security design analysis of complex IT systems.
Mathematical description allows for simple
implementation of the methods in the form of
computer programs as well as using for analysis the
available mathematical tools.
The effectiveness of the formal analysis methods
was in some part practically evaluated by the author
during security audits. Network security model (1)
can be easily constructed and graph’s shortest paths
found using available graph tools (e.g. David
Symonds’ GraphThing). Computer-aided analysis
process is faster and more accurate then the analysis
done in conventional way (i.e. network scheme
review and safeguards verification). For example,
the experienced security engineer needed about 8
hours to perform the analysis of e-banking system’s
network access control protections compliance with
the „Defense-in-Depth” principle. Using the formal
method (9) and GraphThing application, the same
task was performed in about 20 minutes. Practical
usage of all presented methods would require
implementation for this purpose the dedicated tools.
ACKNOWLEDGEMENTS
This work is the part of the author's doctoral
dissertation. The author thanks professor Ryszard
Antkiewicz of Military University of Technology in
Warsaw for useful discussions and support.
REFERENCES
DISA, 2003. Infrastructure Security Technical
Implementation Guide, US Defense Information
Systems Agency.
FCC, 2001. Computer Security Incident Response Guide,
US Federal Communications Commission.
Noel, S., Jacobs, M., Kalapa, P., Jajodia, S., Multiple
Coordinated Views for Network Attack Graphs, 2005.
In Proceedings of the Workshop on Visualization for
Computer Security. Minneapolis, Minnesota.
NSA, 2000. Defense in Depth - A practical strategy for
achieving Information Assurance in today’s highly
networked environments, NSA.
Phillips, C., Swiler, L., 1998. A Graph-Based Network-
Vulnerability Analysis System. In Proceedings of the
New Security Paradigms Workshop. Charlottesville,
VA.
Stang, T.H., Pourbayat, F., 2003. Measuring privacy using
network topology, Oslo University College.
Stawowski, M., 2006. The Principles and Good Practices
for Intrusion Prevention systems Design, CLICO.
Stoneburner, G., Hayden, C., Feringa, A., 2004.
Engineering Principles for Information Technology
Security, NIST.
Straub, K.R., 2003. Information Security Managing Risk
with Defense in Depth, SANS Institute.
Zimmerman, S.C., 2001. Secure Infrastructure Design,
CERT Coordination Center.
SECRYPT 2007 - International Conference on Security and Cryptography
318