As mitigations are merely suggestions on
possible security measures (e.g. integrating new
security measures for existing assets, creating new
assets, etc.), the ESSAF TOOL is not able to decide
on which mitigations should be realized. Instead, it
supports users in making their own decisions on the
matter. It does so by requesting them to consider and
to verify targeted mitigation measures in regard of
correctness, redundancy and feasibility. Thus, the
ESSAF TOOL can support increasing rationality and
consistency of system design and feasibility of
security implementation.
6.2 Validation and Plausibility
To maintain transparency and hence to ensure
plausibility of design decisions, the engine integrates
a logging function that elaborately manifests user
activities and circumstantial changes of all
assessment elements. ESSAF TOOL also requires
that users document rationales and justify actions to
be performed on an element. These rationales are
attributed to the edited element and accessible to
other stakeholders for consultation. In that way, a
user is always able to trace changes and to verify
whether the changes are correct or correctly
implemented in accordance with the given
rationales. For example, when deciding that a Flash
Card needs not provide constant availability, the
user has to specify his rationale for this decision e.g.
that this storage may be substituted by another
resource that is constantly available. The ESSAF
TOOL has proved that enforcing stakeholders to
communicate and document design and modeling
decisions, supports them achieving qualitative
security assessments.
Further benefits of the exchange of transparent
design decisions that have been distilled since the
ESSAF TOOL’s inception are: enhanced accuracy
of system models, verified feasible security models,
and increased design alternatives.
6.3 Collaboration Support
The ESSAF TOOL is constructed to support
collaboration among multiple stakeholders. To
achieve this goal it incorporates the following
features.
Change Notification. The notification mechanism
of the ESSAF TOOL provides capabilities to
highlight and to trace all changes of assessments,
particularly changes that have been performed by
other stakeholders since the last login of the current
user. Also, it is able to determine and to highlight
elements that need attentions (e.g. completion,
adjustment, revision, etc.) or are subject to
verification and validation.
User Management System. The ESSAF TOOL
incorporates an extensive user management system
to support change tracking and to determine which
users are authorized to work on which assessments.
Using the ESSAF TOOL, stakeholders can (or have
to) be invited to join an assessment process by the
assessment owner and are registered for one
assessment only. In order to participate in other
assessments they have to repeat the
registration/invitation procedure. Assessments are
only accessible and distributed among authorized
users to prevent disclosure of confidential corporate
information that may be incorporated within a
device.
Assessment Management. In the ESSAF TOOL,
assessments are maintained as an independent closed
system that cannot be influenced by other
assessments. Therefore, the ESSAF TOOL does not
permit elements of one assessment to be transferred
to another assessment. In that way, the ESSAF
TOOL avoids unintended dependencies and
deadlocks among assessments of different systems.
For sharing purposes, assessments are centrally
stored as XML-files on a server. Remote access is
only granted to authorised ESSAF TOOL-users. Any
access requests by unauthorized users or other
software-tools are denied to ensure the integrity and
compatibility of these assessments. To avoid
concurrent modification conflicts a versioning
system is connected upstream to coordinate
assessment assignments: Whenever an assessment is
assigned to a user, it is changed to in-editing-mode
and unavailable to other users until the current editor
has finished or the reserved locking time has passed.
Providing these features, the ESSAF TOOL
ensures confidentiality of assessment contents in a
flexible collaborative working environment without
versioning and editing conflicts.
6.4 Evaluation of the ESSAF TOOL
To prove its practicability, ESSAF TOOL has been
evaluated against the significant criteria specified in
section 3. The evaluation results (charted in
Table 2)
show that by its incorporated functionalities ESSAF
TOOL is capable of supporting asynchronous
collaborative security assessment processes at
flexible levels of granularity while enabling
TOOL SUPPORT FOR ACHIEVING QUALITATIVE SECURITY ASSESSMENTS OF CRITICAL
INFRASTRUCTURES - The ESSAF Framework for Structured Qualitative Analysis
303