Security Assessment Techniques for Software Assurance - a "Virtual Team" Approach

被引:0
|
作者
Isaacs, Derek [1 ]
机构
[1] Boecore Inc, Colorado Springs, CO USA
关键词
Information assurance; software assurance; software testing; virtual systems;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Software Assurance / Software "Security" often imposes a requirement that applications be tested in a "live" (or as close to as is practicable) system - this often includes the surrounding implementation environment as greater fidelity is needed for critical application testing and implementation confidence levels. Merely installing the software and performing a "short list" verification activity is insufficient - actual " hands on" execution of the software is needed - and when this can be done in a simulated live environment - a higher confidence level can be extended to the application target of evaluation (TOE) for implementation. This task is daunting not because of the nature of the testing - but of the need to setup and subsequently tear-down systems to participate in the performance of these tests. Fortunately - there are tools and techniques for testing application security - using a reduced set of hardware and yet maintaining operational fidelity. Virtual Machines (VM)'s and virtual network environments (team architectures) offer a method for providing this level of testing confidence while allowing for a greater variety of tests and test participant systems. This paper presents a series of architectures and scenarios proposed to implement such a testing environment that retains the viability (and fidelity) of a 'real-world' network environment while providing an isolated and restricted test and analysis area. This is shown through a series of scenarios and VM Team setups (scenario players) in a virtual machine based environment. This approach allows a number of benefits: Isolation of the testing environment Focus on the Target of Evaluation (TOE) for testing Capture and provide metrics on tool and technique usage and impact Provide limits and mitigation of risk and liability issues for the TOE The VM environment also offers a unique opportunity to simulate interactions between various known systems under test (TOE)'s in a 'replicated' environment. A set of proposed scenarios and an environmental architecture, including toolsets and targets of evaluation (TOE) systems is proposed. The applicability of the VM 'team' systems approach is discussed through a suite of scenarios designed to illustrate System evaluation, monitoring, and detection.
引用
收藏
页码:500 / 506
页数:7
相关论文
共 50 条
  • [1] Assessing of software security reliability: Dimensional security assurance techniques
    Ali, Mohammad
    Ullah, Ahsan
    Islam, Md. Rashedul
    Hossain, Rifat
    COMPUTERS & SECURITY, 2025, 150
  • [2] Challenging software developers: dialectic as a foundation for security assurance techniques
    Weir, Charles
    Rashid, Awais
    Noble, James
    JOURNAL OF CYBERSECURITY, 2020, 6 (01): : 1 - 16
  • [3] Challenging software developers: Dialectic as a foundation for security assurance techniques
    Weir C.
    Rashid A.
    Noble J.
    Journal of Cybersecurity, 2021, 6 (01):
  • [4] Software assurance for security
    McGraw, G
    COMPUTER, 1999, 32 (04) : 103 - 105
  • [5] Interventions for Software Security Creating a Lightweight Program of Assurance Techniques for Developers
    Weir, Charles
    Becker, Ingolf
    Noble, James
    Blair, Lynne
    Sasse, M. Angela
    Rashid, Awais
    2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: SOFTWARE ENGINEERING IN PRACTICE (ICSE-SEIP 2019), 2019, : 41 - 50
  • [6] Demanding software security assurance
    Cusimano, John
    Control (Chicago, Ill), 2011, 24 (02): : 14 - 16
  • [7] Empirical Software Security Assurance
    Harper, Dave
    WEB APPLICATION SECURITY, 2010, 72 : 11 - 11
  • [8] Software Security Assurance of Telecommunication Systems
    Savola, Reijo M.
    2009 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS 2009), 2009, : 138 - 143
  • [9] Software security assurance SOUP to NUTS
    Axelrod, C. Warren
    Axelrod, C. Warren (waxelrod@delta-risk.net), 2015, U.S. Department of Defense (28): : 37 - 43
  • [10] Providing Security Assurance & Hardening for Open Source Software/Hardware: The SecOPERA approach
    Fournaris, Apostolos P.
    Tselios, Christos
    Haleplidis, Evangelos
    Athanasopoulos, Elias
    Dionysiou, Antreas
    Mitropoulos, Dimitrios
    Louridas, Panos
    Christou, Georgios
    Athanatos, Manos
    Hatzivasilis, George
    Georgopoulos, Konstantinos
    Kalogeros, Costas
    Kotselidis, Christos
    Vogl, Simon
    Hamon, Francois
    Ioannidis, Sotiris
    2023 IEEE 28TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS, CAMAD 2023, 2023, : 80 - 86