systems theoretic process analysis for security of...

41
David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems Theoretic Process Analysis for Security of Aircraft Systems (STPA-Sec A ) DISTRIBUTION STATEMENT A. Approved for public release: distribution unlimited.

Upload: others

Post on 24-Sep-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

David J. Weller-Fahy

2019 STAMP Workshop

2019-03-28

Systems Theoretic Process Analysis for Security of Aircraft Systems (STPA-SecA)

DISTRIBUTION STATEMENT A. Approved for public release: distribution unlimited.

Page 2: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 2 DJWF/LL/ACA/DS 2019-03-24

This material is based upon work supported by the Federal Aviation Administration under Air Force Contract No. FA8702-15-D-0001. Any opinions, findings, conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the Federal Aviation Administration. © 2019 Massachusetts Institute of Technology. Delivered to the U.S. Government with Unlimited Rights, as defined in DFARS Part 252.227-7013 or 7014 (Feb 2014). Notwithstanding any copyright notice, U.S. Government rights in this work are defined by DFARS 252.227-7013 or DFARS 252.227-7014 as detailed above. Use of this work other than as specifically authorized by the U.S. Government may violate any copyrights that exist in this work.

Page 3: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 3 DJWF/LL/ACA/DS 2019-03-24

•  Problem Statement

•  Approach

•  Methodology Overview

•  Differences from STPA{,-Sec}

•  Example

•  Lessons Learned

•  Questions

Overview

Page 4: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 4 DJWF/LL/ACA/DS 2019-03-24

•  Problem Statement

•  Approach

•  Methodology Overview

•  Differences from STPA{,-Sec}

•  Example

•  Lessons Learned

•  Questions

Overview

Page 5: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 5 DJWF/LL/ACA/DS 2019-03-24

–  Repeatable –  Documented –  Executable by non-STPA domain experts –  Allow evaluation of safety impact –  Provide traceability from mitigations to

defined losses

Problem Statement

–  Handle cases where likelihood is not available •  Traditional risk calculation:

risk = probability * impact •  STPA-SecA risk calculation:

risk = capability * impact –  Extend beyond scenarios to mitigation

•  The FAA must assess safety of aircraft and systems as a whole –  Industry assessments do not explicitly account for malicious actors –  Assessments are executed by industry, not FAA

Required characteristics

Page 6: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 6 DJWF/LL/ACA/DS 2019-03-24

•  Problem Statement

•  Approach

•  Methodology Overview

•  Differences from STPA{,-Sec}

•  Example

•  Lessons Learned

•  Questions

Overview

Page 7: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 7 DJWF/LL/ACA/DS 2019-03-24

Aircraft: Complex Human-in-the-Loop Control System

Threat Agent

System Response

Risks based on system response to inputs

•  Controlled flight into terrain, or loss of separation

•  Encounter dangerous atmospheric conditions

•  Flight parameters outside performance limits

•  Cabin incompatible with human life

•  Operation with degraded equipment

System = Aircraft + Hardware/Software + Pilots/Flight Crew/Maintenance Crew

Vulnerabilities

Pilot & Maintenance Personnel

Cyber/EW Inputs

Page 8: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 8 DJWF/LL/ACA/DS 2019-03-24

Approach – STPA-Sec as Core Tool

STPA STPA-Sec

STPA process from STPA Handbook, March 2018 edition, Figure 2.1 STPA-Sec process from STAMP 2017 STPA-Sec Tutorial, Slide 25

Page 9: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 9 DJWF/LL/ACA/DS 2019-03-24

•  Problem Statement

•  Approach

•  Methodology Overview

•  Differences from STPA{,-Sec}

•  Example

Overview

Page 10: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 10 DJWF/LL/ACA/DS 2019-03-24

Methodology Overview

Scoping Research

Report Writing

Functional Hazard

Analysis System

Definition

Weakness/ Vulnerability Identification

Threat Scenario

Development

Threat Assessment

Risk Assessment

Subject of Assessment

Legend Analytical Process

Supplemental Methods

Output Product

Input

Page 11: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 11 DJWF/LL/ACA/DS 2019-03-24

Methodology Overview

Scoping Research

Report Writing

Functional Hazard

Analysis System

Definition

Weakness/ Vulnerability Identification

Threat Scenario

Development

Threat Assessment

Risk Assessment

Subject of Assessment

Inputs Safety

Hazards Threat

Scenarios

Weaknesses/ Vulnerabilities

Scored Scenarios

Safety Risks

SRA Report

Scoping Agreement

Subject Tech. Info

Intel

Intel Existing Weakness /

Vulnerability List Cyber Capability

List

Legend Analytical Process

Supplemental Methods

Output Product

Input

Page 12: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 12 DJWF/LL/ACA/DS 2019-03-24

Methodology Overview

Scoping Research

Report Writing

Functional Hazard

Analysis System

Definition

Weakness/ Vulnerability Identification

Threat Scenario

Development

Threat Assessment

Risk Assessment

Subject of Assessment

Inputs Safety

Hazards Threat

Scenarios

Weaknesses/ Vulnerabilities

Scored Scenarios

Safety Risks

SRA Report

Discover or Validate Threats/Risks

Discover or Validate Weaknesses/Vulnerabilities

Scoping Agreement

Subject Tech. Info

M&S / HITL

Penetration Testing

Implementation Analysis

Vulnerability Database

Intel

Intel Existing Weakness /

Vulnerability List Cyber Capability

List

Legend Analytical Process

Supplemental Methods

Output Product

Input

Page 13: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 13 DJWF/LL/ACA/DS 2019-03-24

•  Problem Statement

•  Approach

•  Methodology Overview

•  Differences from STPA{,-Sec}

•  Example

•  Lessons Learned

•  Questions

Overview

Page 14: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 14 DJWF/LL/ACA/DS 2019-03-24

STPA-Sec to STPA-SecA Map

M&S / HITL

Penetration Testing

Implementation Analysis

Vulnerability Database

Scoping Research

Functional Hazard

Analysis System

Definition

Weakness/ Vulnerability Identification

Threat Scenario

Development

Threat Assessment

Risk Assessment

Page 15: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 15 DJWF/LL/ACA/DS 2019-03-24

STPA-Sec to STPA-SecA Map

M&S / HITL

Penetration Testing

Implementation Analysis

Vulnerability Database

Scoping Research

Functional Hazard

Analysis System

Definition

Weakness/ Vulnerability Identification

Threat Scenario

Development

Threat Assessment

Risk Assessment

Page 16: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 16 DJWF/LL/ACA/DS 2019-03-24

STPA-Sec to STPA-SecA Map

M&S / HITL

Penetration Testing

Implementation Analysis

Vulnerability Database

Scoping Research

Functional Hazard

Analysis System

Definition

Weakness/ Vulnerability Identification

Threat Scenario

Development

Threat Assessment

Risk Assessment

Page 17: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 17 DJWF/LL/ACA/DS 2019-03-24

STPA-Sec to STPA-SecA Map

M&S / HITL

Penetration Testing

Implementation Analysis

Vulnerability Database

Scoping Research

Functional Hazard

Analysis System

Definition

Weakness/ Vulnerability Identification

Threat Scenario

Development

Threat Assessment

Risk Assessment

Page 18: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 18 DJWF/LL/ACA/DS 2019-03-24

STPA-Sec to STPA-SecA Map

M&S / HITL

Penetration Testing

Implementation Analysis

Vulnerability Database

Scoping Research

Functional Hazard

Analysis System

Definition

Weakness/ Vulnerability Identification

Threat Scenario

Development

Threat Assessment

Risk Assessment

Page 19: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 19 DJWF/LL/ACA/DS 2019-03-24

STPA-Sec to STPA-SecA Map

M&S / HITL

Penetration Testing

Implementation Analysis

Vulnerability Database

Scoping Research

Functional Hazard

Analysis System

Definition

Weakness/ Vulnerability Identification

Threat Scenario

Development

Threat Assessment

Risk Assessment

Page 20: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 20 DJWF/LL/ACA/DS 2019-03-24

STPA-Sec to STPA-SecA Map

M&S / HITL

Penetration Testing

Implementation Analysis

Vulnerability Database

Scoping Research

Functional Hazard

Analysis System

Definition

Weakness/ Vulnerability Identification

Threat Scenario

Development

Threat Assessment

Risk Assessment

*

D4 chart from http://psas.scripts.mit.edu/home/wp-content/uploads/2016/01/24-BillYoung-W2016.pdf

*

Page 21: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 21 DJWF/LL/ACA/DS 2019-03-24

•  The four ways control actions can be unsafe/unsecure (from STPA handbook) –  Not providing the control action leads to a

hazard –  Providing the control action leads to a

hazard –  Providing a potentially safe control action

but too early, too late, or in the wrong order

–  The control action lasts too long or is stopped too soon (for continuous control actions, not discrete ones)

Differences – UCA types

•  The four ways STPA-SecA control actions can be unsafe –  Not providing the control action leads to a

hazard –  Providing the control action leads to a

hazard –  Providing control action at the wrong time

(e.g., too early, too late, too long, not long enough, wrong frequency/sequence

–  Providing the control action with incorrect data

Page 22: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 22 DJWF/LL/ACA/DS 2019-03-24

•  The four ways control actions can be unsafe/unsecure (from STPA handbook) –  Not providing the control action leads to a

hazard –  Providing the control action leads to a

hazard –  Providing a potentially safe control action

but too early, too late, or in the wrong order

–  The control action lasts too long or is stopped too soon (for continuous control actions, not discrete ones)

Differences – UCA types

•  The four ways STPA-SecA control actions can be unsafe –  Not providing the control action leads to a

hazard –  Providing the control action leads to a

hazard –  Providing control action at the wrong time

(e.g., too early, too late, too long, not long enough, wrong frequency/sequence

–  Providing the control action with incorrect data

Page 23: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 23 DJWF/LL/ACA/DS 2019-03-24

•  The four ways control actions can be unsafe/unsecure (from STPA handbook) –  Not providing the control action leads to a

hazard –  Providing the control action leads to a

hazard –  Providing a potentially safe control action

but too early, too late, or in the wrong order

–  The control action lasts too long or is stopped too soon (for continuous control actions, not discrete ones)

Differences – UCA types

•  The four ways STPA-SecA control actions can be unsafe –  Not providing the control action leads to a

hazard –  Providing the control action leads to a

hazard –  Providing control action at the wrong time

(e.g., too early, too late, too long, not long enough, wrong frequency/sequence

–  Providing the control action with incorrect data

Page 24: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 24 DJWF/LL/ACA/DS 2019-03-24

•  Instead of D4 chart, capability vs. safety impact •  Traditional risk unusable without a likelihood of occurrence •  Capability provides a reasonable proxy for likelihood •  Also provides leaf nodes for our attack trees •  Level of concern is notional and will depend on the subject under assessment, the

perspective of the customer, and other factors

Differences – Risk with Capability, not Probability

Risk Chart Level of Concern

Cap

abili

ty

Leve

l

1 Novice/Intermediate 2 Proficient Low 3 Organized Group Medium 4 Lesser Nation State High 5 Greater Nation State

Total Risks: Minor Major Hazardous Catastrophic

Safety Impact

Page 25: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 25 DJWF/LL/ACA/DS 2019-03-24

Differences – Attack Trees as Scenario Representation

Scenario 1: Adversary uses C1

to take step A to cause Hazard.

Page 26: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 26 DJWF/LL/ACA/DS 2019-03-24

Differences – Attack Trees as Scenario Representation

Capability 1 (C1) Step A Hazard

(H)

Scenario 1: Adversary uses C1

to take step A to cause Hazard.

Page 27: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 27 DJWF/LL/ACA/DS 2019-03-24

Differences – Attack Trees as Scenario Representation

Capability 1 (C1) Step A Hazard

(H)

Capability 2 (C2) Step A Hazard

(H)

Scenario 1: Adversary uses C1

to take step A to cause Hazard.

Scenario 2: Adversary uses C2

to take step A to cause Hazard.

Page 28: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 28 DJWF/LL/ACA/DS 2019-03-24

Differences – Attack Trees as Scenario Representation

Capability 1 (C1) Step A Hazard

(H)

Capability 2 (C2) Step A Hazard

(H)

Capability 3 (C3) Step A Hazard

(H)

Scenario 1: Adversary uses C1

to take step A to cause Hazard.

Scenario 2: Adversary uses C2

to take step A to cause Hazard.

Scenario 3: Adversary uses C3

to take step A to cause Hazard.

Page 29: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 29 DJWF/LL/ACA/DS 2019-03-24

Differences – Attack Trees as Scenario Representation

Capability 1 (C1) Step A Hazard

(H)

Capability 2 (C2) Step A Hazard

(H)

Capability 3 (C3) Step A Hazard

(H)

Capability 3 (C3) Step B Hazard

(H)

Scenario 1: Adversary uses C1

to take step A to cause Hazard.

Scenario 2: Adversary uses C2

to take step A to cause Hazard.

Scenario 3: Adversary uses C3

to take step A to cause Hazard.

Scenario 4: Adversary uses C3

to take step B to cause Hazard.

Page 30: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 30 DJWF/LL/ACA/DS 2019-03-24

Differences – Attack Trees as Scenario Representation

Capability 1 (C1) Step A Hazard

(H)

Capability 2 (C2) Step A Hazard

(H)

Capability 3 (C3) Step A Hazard

(H)

Capability 3 (C3) Step B Hazard

(H)

Scenario 1: Adversary uses C1

to take step A to cause Hazard.

Scenario 2: Adversary uses C2

to take step A to cause Hazard.

Scenario 3: Adversary uses C3

to take step A to cause Hazard.

Scenario 4: Adversary uses C3

to take step B to cause Hazard.

Page 31: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 31 DJWF/LL/ACA/DS 2019-03-24

Differences – Attack Trees as Scenario Representation

Hazard(H)

OR

Capability1(C1)

Capability2(C2)

Capability3(C3)

OR OR

StepBStepA

Capability 1 (C1) Step A Hazard

(H)

Capability 2 (C2) Step A Hazard

(H)

Capability 3 (C3) Step A Hazard

(H)

Capability 3 (C3) Step B Hazard

(H)

Scenario 1: Adversary uses C1

to take step A to cause Hazard.

Scenario 2: Adversary uses C2

to take step A to cause Hazard.

Scenario 3: Adversary uses C3

to take step A to cause Hazard.

Scenario 4: Adversary uses C3

to take step B to cause Hazard.

Page 32: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 32 DJWF/LL/ACA/DS 2019-03-24

Differences – Attack Trees as Scenario Representation

Hazard(H)

OR

Capability1(C1)

Capability2(C2)

Capability3(C3)

OR OR

StepBStepA

Capability 1 (C1) Step A Hazard

(H)

Capability 2 (C2) Step A Hazard

(H)

Capability 3 (C3) Step A Hazard

(H)

Capability 3 (C3) Step B Hazard

(H)

Scenario 1: Adversary uses C1

to take step A to cause Hazard.

Scenario 2: Adversary uses C2

to take step A to cause Hazard.

Scenario 3: Adversary uses C3

to take step A to cause Hazard.

Scenario 4: Adversary uses C3

to take step B to cause Hazard.

Page 33: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 33 DJWF/LL/ACA/DS 2019-03-24

Differences – Attack Trees as Scenario Representation

Hazard(H)

OR

Capability1(C1)

Capability2(C2)

Capability3(C3)

OR OR

StepBStepA

Page 34: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 34 DJWF/LL/ACA/DS 2019-03-24

•  Problem Statement

•  Approach

•  Methodology Overview

•  Differences from STPA{,-Sec}

•  Example

•  Lessons Learned

•  Questions

Overview

Page 35: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 35 DJWF/LL/ACA/DS 2019-03-24

•  Example – organization requests a safety risk assessment of AW1 –  Examples are taken from our documentation –  Key portions of methodology are highlighted –  Lessons learned and future work are from actual case studies, although release is restricted

Aviation Widget 1 (AW1)

Page 36: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 36 DJWF/LL/ACA/DS 2019-03-24

Example – Functional Hazard Analysis

•  Develop, review, refine losses and hazards •  Two levels of hazards can be used

–  Aircraft level –  Subject level

•  Create Control actions and hazardous control actions

Label Description

L1 Loss of life or injury

L2 Loss or damage to aircraft

L3 Loss of confidence in aircraft systems

Label Hazard Description Trace to

Unacceptable Losses

AH1 Aircraft placed on trajectory or position that intersects with a physical obstruction (e.g., loss of separation, controlled flight into terrain).

L1, L2

AH2 Aircraft placed on trajectory that intersects with dangerous atmospheric conditions (e.g., storms, volcanic ash). L1, L2

AH3 Flight parameters fall outside of performance limits. L1, L2

AH4 Cabin parameters incompatible with human survival. L1

AH5 Operation with degraded equipment (intentional or natural). L3

AH6 Situational awareness of flight crew is blurred or lost. L2, L3

AH7 Flight crew is overworked. L2, L3

Page 37: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 37 DJWF/LL/ACA/DS 2019-03-24

Example – Weakness and Vulnerability Identification

•  Depending on the level of abstraction, either weaknesses or vulnerabilities can be identified w.r.t. hazardous control actions

•  List of general weakness types help to improve comparability among studies •  This may include research into specific vulnerabilities, depending on the level of the

study

Weakness ID Title Family Description

W1 Authenticate Actor Design An actor communicating with the system is not authenticated or is incorrectly authenticated.

W1.1 Authenticate Actor:

Code Updates Design The source of the update being loaded into the system is not authenticated or is incorrectly authenticated.

W2 Authorize Actor Design The authority of an actor communicating with the system is not verified or is incorrectly verified.

⁞ ⁞ ⁞ ⁞

Page 38: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 38 DJWF/LL/ACA/DS 2019-03-24

Example – Threat Scenario Development

•  Development of scenarios and attack trees –  Extrapolate scenarios from hazardous control actions

(HCAs) –  Construct attack paths using scenarios –  Compose attack trees from overlapping attack paths

•  One scenario that could be part of the attack tree to the right follows “Adversary spoofs wireless connection to aircraft by imitating the Maintenance Computer. With access, the adversary deploys malicious software that will interfere with LRU operations.”

H3:InterferewithLRUoperation

RequestFLDoperation:P

AND

DevelopMaliciousSoftware

DeployMaliciousSoftware

OR

AccesstoLRUonaircraft

Wirelessaccesstoaircraft

OR

InterceptandAlterMaintenanceComputerdata(WirelessSpoofing)

CompromiseMaintenancePC

PhysicalAccessto

AvionicsBay

Subjectlevelhazardattop

HazardousControlAction

Combiningmultiplerequiredattacksteps

Intermediateattackstep

Combiningmultipleattackstepswhenonlyoneisrequired

Commonsub-tree.Detailsonseparatepage.

CapabilityfromCapabilityListatbottom.

Page 39: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 39 DJWF/LL/ACA/DS 2019-03-24

Example – Risk Assessment

•  Risk assessment –  Grouping scenarios into risks –  Calculating min capability for a given risk –  Calculating safety impact for a given risk

•  Given the previous scenario, calculating capability score is shown on the right –  AND uses highest score –  OR uses lowest score

•  Final capability score for a given scenario is that which propagates through the tree to the HCA node

Page 40: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 40 DJWF/LL/ACA/DS 2019-03-24

•  Terminology matters – terms of art and common use make common understanding difficult: define the terms that matter to the process!

•  The level of abstraction should be enforced – try not to get hung up on the details if the study is high-level

•  Safety impact is debatable – many of the impacts can be (legitimately) argued as higher or lower: make sure your decision is defensible, and move on

•  Remember that both capability and safety impact are ordinal, not quantitative – consistency is the goal

Lessons Learned

Page 41: Systems Theoretic Process Analysis for Security of ...psas.scripts.mit.edu/home/wp-content/uploads/2019/... · 5.04.2019  · David J. Weller-Fahy 2019 STAMP Workshop 2019-03-28 Systems

STAMP 2019 STPA-SecA - 41 DJWF/LL/ACA/DS 2019-03-24

? Questions?

Team Members: •  MIT Lincoln Laboratory

–  Rodolfo Cuevas* –  Gabriel Elkin –  Tom Jagatic –  Dr. Melva James –  Dr. Michael McPartland –  Dr. Eric Quintero –  David Weller-Fahy

•  Diakon Solutions –  Bill Trussell

•  Astronautics Corporation of America –  Beau Branback –  Christopher Kerr –  Elijah Liu –  Joe Reisinger

•  FAA –  John Peace –  Isidore Venetos

For any questions not answered within this presentation, feel free to contact me at [email protected]

* Formerly at Lincoln Lab, now at Boston Cybernetics Institute