coordination of threat analysis in ict ecosystems · threats 16 itu workshop on 5g security stride...

21
Coordination of Threat Analysis in ICT Ecosystems Antonio Kung, CTO Trialog 25 rue du Général Foy, 75008 Paris, France www.trialog.com ITU workshop on 5G security 19 March 2018 1

Upload: tranthu

Post on 06-May-2018

216 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Coordination of Threat Analysis in ICT Ecosystems · Threats 16 ITU workshop on 5G security STRIDE threat categories ... Attempt from external parties to re-identify vehicle owner

Coordination of Threat Analysis in ICT Ecosystems

Antonio Kung, CTO Trialog25 rue du Général Foy, 75008 Paris, France

www.trialog.com

ITU workshop on 5G security19 March 2018 1

Page 2: Coordination of Threat Analysis in ICT Ecosystems · Threats 16 ITU workshop on 5G security STRIDE threat categories ... Attempt from external parties to re-identify vehicle owner

Speaker: Antonio Kung

Engineering background Chair of citizen approach to data

initiative EIP-SCC: European Innovation

Platform on Smart Cities and Communities

Data protection / Privacy standards wiki for Ipen Ipen.trialog.com

ITU-T SG17

– Cybersecurity framework for intelligent transport system

FG-DPM– Security and privacy framework

ISO/IEC Projects

– 27550 Privacy engineering – 27030 Security and privacy guidelines

for the IoT– 27570 Privacy guidelines for smart

cities– 20547-4 Big data Security and privacy

Study periods– Big data security and privacy processes– Big data implementation security– Framework privacy preference

management (Joint ITU-ISO)

ITU workshop on 5G security19 March 2018 2

Page 3: Coordination of Threat Analysis in ICT Ecosystems · Threats 16 ITU workshop on 5G security STRIDE threat categories ... Attempt from external parties to re-identify vehicle owner

Ecosystems are complex

ITU workshop on 5G security19 March 2018

Security

Privacy

SafetySmart grid

Transport

Health

Smart Cities

Bigdata

IoT

Ecosystems Domains Concerns

3

Page 4: Coordination of Threat Analysis in ICT Ecosystems · Threats 16 ITU workshop on 5G security STRIDE threat categories ... Attempt from external parties to re-identify vehicle owner

Ecosystem Security and Data Protection Concerns

ITU workshop on 5G security19 March 2018 4

StakeholderLegal

ComplianceConcern

Management Concern

SystemLifecycleConcern

Demand sidePolicy maker

Compliance Check / Follow standardsTransparency

Operator

Regulation for security

Regulation for privacy

Security and data protection risk

analysis

Agreement withother operators

Security-by-designPrivacy-by-Design

Supply sideSupplier Operators Requirements

Page 5: Coordination of Threat Analysis in ICT Ecosystems · Threats 16 ITU workshop on 5G security STRIDE threat categories ... Attempt from external parties to re-identify vehicle owner

Ecosystem Cybersecurity: What we Need

ITU workshop on 5G security19 March 2018 5

EcosystemStakeholders

Ecosystem AssetsEcosystem

Cybersecuritycapabilities

Provide to protect

EcosystemPolicy makers Verify/Certify

(or Direct – Control – Evaluate)

Page 6: Coordination of Threat Analysis in ICT Ecosystems · Threats 16 ITU workshop on 5G security STRIDE threat categories ... Attempt from external parties to re-identify vehicle owner

Ecosystem Cybersecurity: What we Have

ITU workshop on 5G security19 March 2018 6

EcosystemStakeholder 1

EcosystemStakeholder 2

EcosystemStakeholder 2

EcosystemStakeholder 2

Asset 1

Asset 2

Asset 3

Asset 4

Cybersecuritycapability 1

Cybersecuritycapability 2

Cybersecuritycapability 3

Cybersecuritycapability 4

Provides to protect

Provides to protect

Provides to protect

Provides to protect

EcosystemPolicy makers Verify/Certify

Page 7: Coordination of Threat Analysis in ICT Ecosystems · Threats 16 ITU workshop on 5G security STRIDE threat categories ... Attempt from external parties to re-identify vehicle owner

Example of Ecosystem: AutoMathttp://www.automat-project.eu

ITU workshop on 5G security19 March 2018 7

Page 8: Coordination of Threat Analysis in ICT Ecosystems · Threats 16 ITU workshop on 5G security STRIDE threat categories ... Attempt from external parties to re-identify vehicle owner

Example of Ecosystem: AutoMat

ITU workshop on 5G security

Four types of stakeholders

19 March 2018 8

Storage provider

Automotive manufacturer

Marketplace

Service provider

Page 9: Coordination of Threat Analysis in ICT Ecosystems · Threats 16 ITU workshop on 5G security STRIDE threat categories ... Attempt from external parties to re-identify vehicle owner

Ecosystem Design

ITU workshop on 5G security

Personal data ecosystem

Interoperability Common description

– CVIM (Common vehicleinformation model)

19 March 2018 9

Storage manager

Automotive manufacturer 1

Vehicle A data

capturing

CVIM

Vehicle B data

capturing

Automotive manufacturer 2

Vehicle C data

capturing

CVIM

Vehicle A owner

data vault

Vehicle B owner

data vault

Vehicle C owner

data vault

Page 10: Coordination of Threat Analysis in ICT Ecosystems · Threats 16 ITU workshop on 5G security STRIDE threat categories ... Attempt from external parties to re-identify vehicle owner

Ecosystem Risk Analysis

ITU workshop on 5G security

Risk analysis includes security risk analysis (e.g. ISO/IEC 27005)

privacy impact analysis (e.g. ISO/IEC 29134)

19 March 2018 10

Storage Provider

Risk analysis

Automotive manufacturerRisk analysis

Marketplace Risk analysis

Service provider

Risk analysis

EcosystemRisk analysis

Page 11: Coordination of Threat Analysis in ICT Ecosystems · Threats 16 ITU workshop on 5G security STRIDE threat categories ... Attempt from external parties to re-identify vehicle owner

Ecosystem Interoperability

ITU workshop on 5G security

Interoperabilityincludes Functional

interoperability

Cybersecurityinteroperability

19 March 2018 11

Marketplace 2Marketplace 1

Service provider Service provider 2Service provider 1

Marketplace

Storage provider 2Storage provider 1

Marketplace Marketplace 1Marketplace 1

Storage provider

Automotive manufacturer 2

Automotive manufacturer 1

Storage provider Storage provider 2Storage provider 1

Automotive manufacturer

Page 12: Coordination of Threat Analysis in ICT Ecosystems · Threats 16 ITU workshop on 5G security STRIDE threat categories ... Attempt from external parties to re-identify vehicle owner

Different Types of Interoperability

ITU workshop on 5G security19 March 2018 12

Different descriptionDifferent description

Service Provider

Market place2Capability

Market place1Capability

No interoperability

Common descriptionCommon description

Service Provider

Market place2Same capability

Market place1Same capability

Interoperability of capabilities

Common descriptionCommon description

Service Provider

Market place2Different capability

Market place1Different capability

Interoperability of descriptions

Page 13: Coordination of Threat Analysis in ICT Ecosystems · Threats 16 ITU workshop on 5G security STRIDE threat categories ... Attempt from external parties to re-identify vehicle owner

Need for Consistent Individual Cybersecurity Framework

ITU workshop on 5G security19 March 2018 13

Service providerCybersecurity framework

• Capabilities• Agreement

• Risks - Incidents - Consequences• Measures

MarketplaceService provider

MarketplaceCybersecurity framework

• Capabilities• Agreement

• Risks - Incidents - Consequences• Measures

Page 14: Coordination of Threat Analysis in ICT Ecosystems · Threats 16 ITU workshop on 5G security STRIDE threat categories ... Attempt from external parties to re-identify vehicle owner

Cybersecurity Capabilities

ITU workshop on 5G securitySlide 14

Secure processing Protect data processing

Transparency informationProvide information how data processing is protected

Data controller responsibility

Verifies whether service provider has data controller responsibility

19 March 2018

Marketplacecapability

Service providercapability

Secure processingProtect data pipeline and processing

Owner consentCapability for vehicle owner to provide consent on personal data processing

Consent revocationCapability for vehicle owner to withdraw from data pipeline

Transparency informationCapability to provide information on data processing chain

Secure connection to service providers

Capability to provide data to service provider securely

Secure connection to storage providers

Capability to retrieve data from storage manager securely

Data processor responsibility

Verifies whether marketplace has data processor responsibility

Page 15: Coordination of Threat Analysis in ICT Ecosystems · Threats 16 ITU workshop on 5G security STRIDE threat categories ... Attempt from external parties to re-identify vehicle owner

Agreement Cybersecurity Capabilities

ITU workshop on 5G security1519 March 2018

Providing evidence of capability

provide evidence of cybersecurity compliance to marketplace

Getting evidence of capability

obtain evidence of marketplace cybersecurity compliance

Marketplaceagreement

Service provideragreement

Providing evidence of capability

provide evidence of cybersecurity compliance to service provider

Getting evidence of capability

obtain evidence of serviceprovider cybersecurity compliance

Page 16: Coordination of Threat Analysis in ICT Ecosystems · Threats 16 ITU workshop on 5G security STRIDE threat categories ... Attempt from external parties to re-identify vehicle owner

Threats

ITU workshop on 5G security16

STRIDE threat categoriesSpoofing Spoofing marketplace

TamperingIntegrity and completeness of data obtainedfrom marketplace

Informationdisclosure

Eavesdropping data during communicationEavesdropping metadata (e.g. log of interactionswith marketplace)Incorrect management of data processing chainleading to leaks (e.g. incorrect deletion)

Denial Of Service Massive access to marketplaceLINDDUN threat categories

Linkability

Anonymisation not carried out correctlyAttempt from external parties to re-identifyvehicle owner by using other datasetsNew linkability threat not taken into account

19 March 2018

MarketplaceThreats

Service providerThreats

STRIDE threat categories

SpoofingSpoofing storage providerSpoofing service provider

TamperingIntegrity and completeness of data provided toservice provider

Repudiation Service provider repudiation

Informationdisclosure

Eavesdropping data during communicationEavesdropping metadata (e.g. log of interactionswith storage provider and with service provider)Incorrect management of data pipeline leading toleaks (e.g. incorrect deletion)

Denial Of ServiceMassive access to marketplace by faked serviceproviders

Elevation of privilegeIncorrect management of vehicle owner privacyrules (expressed in obtained metadata)

LINDDUN threat categories

LinkabilityAnonymisation not carried out correctlyNew linkability threat not taken into account

[

Page 17: Coordination of Threat Analysis in ICT Ecosystems · Threats 16 ITU workshop on 5G security STRIDE threat categories ... Attempt from external parties to re-identify vehicle owner

Incidents

ITU workshop on 5G security17

Incident Description Severity

Massive personal data breach

Public report of potential massive personal data leak because of improper operation at service provider level

Maximum

Massive denial of service

Service provider can no longer operate.

Significant

19 March 2018

MarketplaceIncidents

Service providerIncidents

Incident Description Severity

Case of personal data breach

Public reporting that personal data vault has been accessed or that it has been processed against consent or privacy rules

Significant

Massive business data leak.

Public report of potential massive business data leak because of improper operation at marketplace level

Maximum

Massive personal data breach

Public report of potential massive personal data leak because of improper operation at marketplace level.

Maximum

Massive denial of service

Marketplace can no longer operate.

Significant

Page 18: Coordination of Threat Analysis in ICT Ecosystems · Threats 16 ITU workshop on 5G security STRIDE threat categories ... Attempt from external parties to re-identify vehicle owner

Measures

ITU workshop on 5G securitySlide 18

ISO 27001 Categories of controls ControlInformation security policies

Management direction. Data management policies

Human resource security During employmentInternal cybersecurity preparedness

External cybersecurity preparedness

Access controlSystem and application access control

Secure access to marketplace provider

Cryptography Cryptographic controls Anonymisation of data sets

Operation security

Operational procedures and responsibilities

Operation procedures for data processing

Logging and monitoring Logging capabilitiesControl of operational software Operation procedures for transparency.Technical vulnerability management Plausibility check

Communication security Information transfer Secure transmission of dataSystem acquisition, development and maintenance

Security in development and support processes

Secure data processing capabilities

Cybersecurity monitoring capabilities

Information security incident management

Management of information security incidents and improvements

Alerting data processing chain

Information security aspects of business continuity management

Information security continuity

Assurance of service provider cybersecurity capabilitiesPeriodic review of service provider cybersecurity capabilities

Compliance

Compliance with legal and contractual requirements

GDPR and cybersecurity compliance verification

Information security reviews Periodic review of interoperability

19 March 2018

ISO 27001 Categories of controls ControlInformation security policies

Management direction. Data management policies

Human resource security During employmentInternal cybersecurity preparednessExternal cybersecurity preparedness

Access control

Business requirements for access control

Requirements for service provider access

System and application access control

Secure access from service provider

Secure access to cloud storage provider

Cryptography Cryptographic controls Confidentiality of personal data vaults

Anonymisation of data sets

Operation security

Operational procedures and responsibilities

Operation procedures for data search and processing

Logging and monitoring Logging capabilitiesControl of operational software

Operation procedures for transparency.

Communication security Information transfer Secure transmission of data

System acquisition, development and maintenance

Security in development and support processes

Secure data pipeline capabilities

Cybersecurity monitoring capabilities

Information security incident management

Management of information security incidents and improvements

Alerting data processing chain

Information security aspects of business continuity management

Information security continuity

Assurance of cloud storage manager cybersecurity capabilitiesPeriodic review of cloud storage manager cybersecurity capabilities

Compliance

Compliance with legal and contractual requirements

GDPR and cybersecurity compliance verification

Information security reviews Periodic review of interoperability

Marketplace MeasuresService provider measures

Page 19: Coordination of Threat Analysis in ICT Ecosystems · Threats 16 ITU workshop on 5G security STRIDE threat categories ... Attempt from external parties to re-identify vehicle owner

Conclusions

ITU workshop on 5G security

Need for ecosystem design viewpoint

Need for ecosystem risk analysis

Need for interoperability of cybersecurity capabilities

Need for Coordination of cybersecurity capabilities between different stakeholders of an ecosystem

Ecosystem vision must be better explained at standardisation level

19 March 2018 19

Page 20: Coordination of Threat Analysis in ICT Ecosystems · Threats 16 ITU workshop on 5G security STRIDE threat categories ... Attempt from external parties to re-identify vehicle owner

Example of 5G Ecosystem

ITU workshop on 5G security19 March 2018 20

5G Mobile operator

IoT Device operator

Mobile platform operator

Service provider

Page 21: Coordination of Threat Analysis in ICT Ecosystems · Threats 16 ITU workshop on 5G security STRIDE threat categories ... Attempt from external parties to re-identify vehicle owner

Questions?

www.trialog.com

ITU workshop on 5G security19 March 2018 21