




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
RequirementsFrameworkforCyber-InformedEngineering
2IdahoNational
2IdahoNationalCyber-InformedEngineering(CIE)ProgramactivitiesaresponsoredbytheU.S.DepartmentofEnergy’sOfficeofCybersecurity,EnergySecurity,andEmergencyResponse(DOECESER)andperformedbyIdahoNationalLaboratoryandtheNationalRenewableEnergyLaboratory.
公室(DOECESER)Page1Page1ofPage1of
致謝 RequirementsScopingand
Intended Primary Secondary Document RequirementsScopingand Writing Modeling
Intended CIERequirementsScopingand and驗 PagePAGE10of Model
文獻.
ExecutiveInanerawherecyberthreatsareincreasinglysophisticatedandpervasive,traditionalengineeringpracticesmustevolvetointegratecybersecurityconsiderationsfromtheoutset.CyberInformedEngineering(CIE)addressesthisneedbyembeddingcybersecurityprinciplesintotheengineeringlifecycle,ensuringthatsystemsaredesignedtobesecureandresilientagainstpotentialcyber-attacks.ThispaperaimstodevelopacomprehensiverequirementsframeworkforCIE,detailinghowtraditionalrequirementsengineeringprocessescanbecustomizedtoincorporatekeyCIEprinciples.Thegoalistoprovideastructuredapproachthatorganizationscanusetoensurethatcybersecurityisanintegralpartoftheirsystemdesignandimplementationprocesses.Theframeworkisdevelopedthroughanin-depthexplorationoftherequirementsengineeringprocess,includingrequirementselicitation,specification,validation,andmanagement.Eachstageistailoredtoaddresscybersecurityconcernsbyintegratingactivitiessuchasformalreviews,prototyping,andmodelchecking.Specifictechniquesforeliciting,writing,modeling,reviewing,andvalidatingrequirementsaredetailed,withafocusonquantifyingthefeasibilityofimplementingCIEprinciples.Byintegratingcybersecurityconsiderationsintotherequirementsengineeringprocess,theproposedframeworkensuresthatsecurityisnotanafterthoughtbutafundamentalcomponentofsystemdesign.Thisapproachenhancestheresilienceandsecurityofengineeredsystems,helpingorganizationsproactivelymitigatecyberthreatsandreduceambiguity.Theframeworkservesasavaluabletoolforengineersandcybersecurityprofessionals,providingasystematicwaytoembedrobustsecuritypracticesintotheengineeringlifecycle.ThisworkwasauthoredbytheNationalRenewableEnergyLaboratory,operatedbyAllianceforSustainableEnergyLLC,fortheU.S.DepartmentofEnergyunderContractNo.DE-AC36-08GO28308,andbyIdahoNationalLaboratory,operatedbyBattelleEnergyAllianceLLC,fortheU.S.DepartmentofEnergyunderDOEIdahoOperationsOfficeContractDE-AC07-05ID14517.FundingprovidedbytheU.S.DepartmentofEnergyOfficeofCybersecurity,EnergySecurity,andEmergencyResponse.TheviewsexpressedinthearticledonotnecessarilyrepresenttheviewsoftheDOEortheU.S.Government.TheU.S.Governmentretainsandthepublisher,byacceptingthearticleforpublication,acknowledgesthattheU.S.Governmentretainsanonexclusive,paid-up,irrevocable,worldwidelicensetopublishorreproducethepublishedformofthiswork,orallowotherstodoso,forU.S.Governmentpurposes.
網(wǎng)絡(luò)知情工程(CIE)通過將網(wǎng)絡(luò)安全原則嵌入工程生命周期,解決了這一需求,確保系統(tǒng)被DE?AC36?08GO28308為美國能源部工作,并由愛達荷國家實驗室撰寫,該實驗室由貝特DE?AC07?05ID14517為ListofFigure1:Purelinearmodel Figure2:Linearwithiterationsbetweenactivitiesmodel Figure3:Iterativerequirementmodel Figure4:Effectiverequirementengineeringprocessmodel Figure5:Requirementframeworkfor
1[24]3[26]5:CIE11Intoday'sinterconnecteddigitallandscape,cybersecurityisnotjustatechnicalnecessitybutafoundationalelementofmodernengineering.Thefrequencyandsophisticationofcyber-attacksareincreasing,posingsignificantthreatstocriticalinfrastructure,enterprises,andindividualusers.Traditionalengineeringpracticesoftenconsidersecurityasanadd-on,leadingtosystemsthatareinherentlyvulnerabletocyberthreats.CyberInformedEngineering(CIE)isatransformativeapproachthatmitigatescybersecuritychallengesthroughengineeringmeansthroughoutthesystemengineeringlifecycle,ensuringthatsystemsaredesignedwithsecurityandresilienceattheircore.Theneedforaproactiveapproachtocybersecurityhasneverbeenmoreurgent.Cyber-attackscanhavedevastatingconsequences,fromfinanciallossesandoperationaldisruptionstotheerosionofcustomertrustandeffectsonnationalsecurity.Despitethegrowingrecognitionoftheserisks,manyorganizationsstruggletointegratecybersecurityeffectivelyintotheirengineeringprocesses.WhileexistingguidessuchasCIEimplementationguideintegratecybersecurityintotheengineeringprocess,thereremainsagapinthepracticalimplementationofCIEprinciples.ManyengineeringteamslackastructuredframeworktoguidetheincorporationofCIEprinciplesthroughoutthedevelopmentlifecycle.Thisgapcancontributetosystemsthatarelessresilienttoevolvingcyberthreats,potentiallyincreasingtheriskoffinanciallosses,compromiseddataintegrity,andoperationaldisruptions.Addressingthisgapiscriticalforenhancingthesecurityandresilienceofengineeredsystems.ThepurposeofthispaperistoprovideadetailedandactionablerequirementsframeworkforincorporatingCIEprinciplesinthesystemengineeringlifecycle.Bysystematicallyembeddingcybersecurityprinciplesintoeachstageoftherequirementsengineeringprocess,thisframeworkaimstobridgethegapbetweentraditionalengineeringpracticesandthedemandsofmoderncybersecurity.Theimpactofthisdocumentisfar-reaching,offeringapracticalguidefororganizationsacrossvariousindustriestoenhancetheirsecuritypostureandmitigatetherisksposedbycyberthreats.Themethodologyemployedinthispaperinvolvesin-depthcustomizationofthetraditionalrequirementsengineeringprocesstoincorporateCIEprinciples.Thisincludesdetailedactivitiesforrequirementselicitation,specification,validation,andmanagement,eachtailoredtoaddressspecificcybersecurityconcerns.Techniquessuchasformalreviews,prototyping,andmodelcheckingareemployedtoensurethattherequirementsarebothpracticalandeffective.QuantifiablemetricsareintroducedtoassessthefeasibilityofimplementingCIEprinciples,providingaclearandmeasurableframeworkfororganizationstofollow.Chapter2describesrequirementengineeringprocess,requirementmodelsused,andbackgroundaboutcyber-informedengineering.Chapter3describestheintendedaudienceforthisframework.Chapter4describestherequirementsframeworkforcyber-informedengineering.Finally,Chapter5concludestherequirementframeworkpaper.
CIECIEThissectionprovidesbackgroundontherequirementsengineeringprocess,requirementmodelsinliterature,andanoverviewofCIE.ReadersfamiliarwithrequirementprocessesandCIEmayconsiderskippingthissection.RequirementsEngineeringRequirementsengineeringinvolvesseveralinterconnectedsteps,eachcriticaltothesuccessfuldevelopmentofaproject.REQUIREMENTSThegoalofthisstepistogathercomprehensiveinformationfromstakeholderstounderstandtheirneedsandconstraints.Thisprocessisachievedbyseveralapproachessuchas:Interviews:Theinterviewscanbeeitherstructuredorunstructured.Thestructuredinterviewsinvolvepredefinedquestionstoensureallaspectsarecoveredandunstructuredinterviewsinvolveopen-endeddiscussionstoexplorebroaderSurveys/Questionnaires:Thesurveys/questionnairesareusefulforbroaderreachtocollectdatafromalargernumberofusers.Workshops:Theworkshopsinvolvecollaborativesessionsforstakeholderstodiscussandbrainstormrequirements.Observation:TheobservationinvolvescontextualinquirytoobserveusersintheirDocumentanalysis:Thedocumentanalysisinvolvesreviewingthecurrentsystems,manuals,andbusinessprocesses.REQUIREMENTSSCOPINGANDThegoalofthisstepistoscope,prioritize,andresolveconflictsamonggatheredrequirements.ThisprocessisachievedbyClassifyingrequirements:Theclassificationofrequirementsinvolvescategorizingneedsbasedonbusinessrequirements[1],user/stakeholderrequirements[2],architecturalrequirements[3],structuralrequirements[4],behavioralrequirements[5],functionalrequirements(solution)[6],non-functionalrequirements(qualityofservice)[7],implementationrequirements[8],andregulatoryrequirements[9].Prioritization:Theprioritizationinvolvesranking[10]basedonMoSCoWmethod[11]ofMusthave,Shouldhave,Couldhave,andWon’thavethistime.SomeoftheotherprioritizationtechniquesareRanking,NumericalAssignments(Grouping),BubblesSortTechniques,HundredDollarMethod,AnalyticHierarchyProcess(AHP),KanoAnalysis,FiveWhys,PrioritizationBasedonValue,Cost,andRisk,PairwisecomparisonConflictresolution:Theconflictresolutioninvolvesreconcilingpotentiallyincompatiblerequirementsthroughstakeholderdiscussions[12].
REQUIREMENTS需求分類:需求分類涉及根據(jù)業(yè)務(wù)需求[1],[2],架構(gòu)需求[3],結(jié)構(gòu)需求[4],行為需求[5],功能需求(解決方案)[6],非功能需求(服務(wù)質(zhì)量)[7]實施需求[8],以及監(jiān)管需求[9]MoSCoW方法[10]進行排序,即必須有、應(yīng)該有、可以元法、層次分析法(AHP)、卡諾分析、五個為什么、基于價值、成本和風險的優(yōu)先排序、REQUIREMENTSThegoalofthisstepistodocumenttherequirementsinaclearanddetailedmannertoensuretheyareunderstoodandagreeduponbyallstakeholders.ThisprocessisachievedbyWritingrequirements:Therequirementsshouldbewritteninacleanandpreciselanguageavoidingambiguity[13][14][15].Requirementsshouldalsobecapableofstandingaloneandnotcombinedsuchthattheycanbevalidatedindependently.Modelingrequirements:Therequirementscanbemodeledusingvariousmethods,likecreatingausecasediagramthatvisuallyrepresentsthesysteminteractionoradataflowdiagramthatillustratesdatamovementwithinthesystem[16][17].Reviewingandvalidating:Thisinvolvesregularstakeholdersreviewstoensurerequirementsarecorrectlycaptured[18].REQUIREMENTSThegoalofthisstepistoensurethatthedocumentedrequirementsareaccurate,complete,andfeasible.ThisprocessisachievedbyFormalreviews:Thisinvolvesstep-by-stepwalkthroughreviewoftherequirementsandinspectionsthroughdetailedexaminationoftherequirementsdocument.Prototyping:Theprototypinginvolveseitherhigh-fidelityprototypesthatareinteractivelow-fidelityprototypesthatinvolvessimplesketchesModelchecking:Themodelcheckingisaformalmathematicaltechniquetoensurethatrequirementsarelogicallysoundandimplementable[20].REQUIREMENTSThegoalofthisstepistomanagechangestotherequirementsandmaintaintheirconsistencythroughouttheprojectlifecycle.ThisprocessisachievedbyChangemanagement:Thechangemanagementinvolvesprocessessuchasformalchangerequestsforproposingchangesandimpactanalysistoassesstheimplicationsofchanges[21].Traceability:Thetraceabilityinvolvesusingarequirementstraceabilitymatrix(RTM)[22]tolinkrequirementstotheiroriginsandimplementation.Versioncontrol:Versioncontrolinvolvesdocumentingversionstomaintainversionsoftherequirementdocument[23].RequirementsEngineeringTherearemanyengineeringmodelsdescribedinliterature.Someofthemsuchasapurelinearmodel,linearwithiterationsbetweenactivitiesmodel,iterativerequirementmodel,andfinallyaneffectiverequirementengineeringprocessaredescribed.Thesemodelsarehelpfulinunderstandingthestepsintherequirementsprocess.
編寫需求:需求應(yīng)使用簡潔和精確的語言編寫,避免含糊不清[13][14][15]。需求或創(chuàng)建數(shù)據(jù)流圖以說明系統(tǒng)內(nèi)部的數(shù)據(jù)流動[16][17]?,F(xiàn)的[20]??勺匪菪裕嚎勺匪菪陨婕笆褂眯枨罂勺匪菪跃仃嚕≧TM)[22]將需求與其來源和實現(xiàn) Figure1Puremodel Figure2LinearwithiterationsbetweenactivitiesmodelFigure3Iterativerequirementmodel
1 23 Figure4EffectiverequirementengineeringprocessmodelTable1SummaryoftheThepurelinearmodelisshowninFigure1.Thepurelinearmodelisasequentialapproachwhereeachphasemustbecompletedbeforethenextstepbegins.Thismodelisstraightforwardandeasytomanage,makingitsuitableforprojectswithwell-definedrequirementsthatareunlikelytoLinearwithThelinearwithiterationsbetweenactivitiesmodelisshowninFigure2.Thismodeldevelopsthesystemthroughrepeatedcycles(iterative)andinsmallerportionsatatime(incremental).Itallowsforpartialimplementationandsubsequentrefinement,makingiteasiertoadapttochangesinrequirements.TheiterativerequirementmodelisshowninFigure3.Thismodelisaflexible,iterativeapproachthatpromotescontinuousfeedbackandadaptiveplanning.Itemphasizescollaborationandcustomersatisfactionthroughthedeliveryofsmall,functionalincrementsoftheproduct.TheeffectiverequirementengineeringprocessmodelisshowninFigure4.Thismodelisarobustrequirementsengineeringmodelaimedatgeneratinghigh-qualityrequirementsforsoftwaredevelopment.Emphasizingindependentrequirementmanagementandplanningphases,itadoptsaniterativetoenhancebothinitialrequirementengineeringandsubsequentAsperthenationalcyber-informedengineeringstrategyoutlinedin[28],CIEisanemergingframeworkthatintegratessecuritycontrolsdirectlyintothedesignofsystemsfromthe
412迭代方法,促進持續(xù)反饋和適應(yīng)性規(guī)劃。 requirementmanagementandplanningphases,itadoptsaniterativeapproachtoenhancebothinitialrequirementengineeringandsubsequentmaintenance.根據(jù)[28],中概述的國家網(wǎng)絡(luò)賦能工程戰(zhàn)略,CIEbeginning.Itcombinesboththephysicsandmechanicsofengineeringwithdigitalprotectionstoenhancethesecurityofthenation'senergysystemsandothercriticalinfrastructures.Thisapproachtargetssystemswithdigitalconnectivity,monitoring,orprocesscontrol,ensuringtheyaresecurefromtheearlieststagesofdevelopment.Unliketraditionalmethods,whichoftenfocusonsecuringsystemsafterdeployment,CIEemphasizesproactivesecurityintegrationduringtheinitialdesignphase.Thisproactiveapproachensuresthatsecurityisinherentinthesystem'sfoundation,ratherthananafterthought.CIEachievesthisbyleveragingdesignchoicesandengineeringcontrolstoeithereliminateormitigatevulnerabilitiesthatcouldbeexploitedincyberattacks.CIEprinciplescontributetodeterminingthecriticalfunctionsthatthesystemdeliversandpreventingundesirableoutcomesthroughconsequence-drivendesign,usingengineeringcontrolstominimizevulnerabilities,safeguardingtheintegrityofvitaldatawithsecureinformationarchitecture,streamliningthedesignbyremovingunnecessaryelementstoachievedesignsimplification,establishingarobustsetofsystemdefensestoensureresilientlayereddefenses,andproactivelydefendingthesystemagainstthreatsthroughactivedefense.Additionally,thesystemcanhaveanimpactonothersystemsorbeimpactedbythem,whichrequiresinter-dependencyevaluation.Gainingaclearunderstandingofthepresenceandfunctioningofdigitalassetsensuresdigitalassetawareness,whileensuringthatsupplychainprovidersadheretosecuritystandardssupportscyber-securesupplychaincontrol.Converting’whatifs’into’evenifs’fostersplannedresilience,safeguardingtheknowledgeofthesystemtopreventitfromfallingintothewronghandsthroughengineeringinformationcontrol,andensuringthateveryone’sbehavioranddecisionsalignswiththeoverarchingsecuritygoalspromotesacybersecurity-awareculture.IntendedTherequirementsframeworkforCIEisdesignedtoassistandenhancetheexistingsystemengineeringlifecycle,nottocreateanewmethodologyfordevelopingrequirements.CIEleveragesestablishedengineeringprocessesandframeworks,integratingitsprinciplestohelpengineersandstakeholdersthinkcriticallyaboutthedigitalconsequencesoftheirdesignsandsystems.ByincorporatingCIE,thefocusisonimprovingthequalityofrequirementsthroughaconsequence-drivenapproach,ensuringthatengineeringsolutionsproactivelymitigatepotentialdigitalvulnerabilities.Thisway,CIEsupportsandstrengthensthetraditionalrequirementsprocesswithoutreinventingit.Theintendedaudiencefortheframeworkcanbeclassifiedintoprimaryandsecondaryaudience.PrimaryTheaudiencewhowillusethisframeworkthroughoutthesystemengineeringlifecyclefordevelopingasystemthatissecurebasedontheCIEprinciples.SystemEngineersandDevelopers:Professionalsinvolvedindesigningandbuildingsystemswhoneedtointegratecybersecuritymeasuresthroughoutthedevelopment
CIE最小化漏洞,通過安全的信息架構(gòu)保護重要數(shù)據(jù)的完整性,通過移除不必要元素來簡化設(shè)計以實現(xiàn)設(shè)計簡化,建立一套強大的系統(tǒng)防御措施以確保彈性分層防御,并通過主動防御積極防御系統(tǒng)免受威脅。CIEProjectManagers:IndividualsoverseeingsystemdevelopmentprojectswhoneedtoensurethatcybersecurityisaprioritizedandintegratedcomponentoftheprojectlifeQualityAssuranceandTestingTeams:ProfessionalstaskedwithverifyingthattheimplementedsystemmeetsthespecifiedsecurityrequirementsandisresilienttocyberSecondaryTheaudiencewhowillbeconsultedbytheprimaryaudiencetosuccessfullybuildthesystemthroughouttheengineeringlifecycleinaccordancewithCIEprinciples.CybersecurityExperts:Specialistsresponsibleforidentifying,analyzing,andmitigatingcyberthreatswhocanprovideinsightsandvalidationforsecurityrequirements.Policymakers,RegulatoryOfficials,andComplianceOfficers:Personnelresponsibleforensuringthatsystemsmeetregulatory,andcompliancestandardsrelatedtoBusinessStakeholdersandExecutives:Decision-makerswhoneedtounderstandtheimportanceofembeddingcybersecurityintoengineeringpracticestoprotectorganizationalassetsandmaintaincustomertrust.AcademicandResearchCommunities:Scholarsandresearchersstudyingcybersecurityandengineeringmethodologieswhocanbenefitfromastructuredframeworkforintegratingcybersecurityprinciplesintosystemdesignanddevelopment.RequirementFrameworkforFigure5Requirementframeworkfor
CIE需求框架圖5CIETherequirementframeworkforCIEisshowninFigure5.Theelicitation,scoping,anddeconflictingrequirementsareinitialstepsinformingrequirements.Therequirementsspecificationsaretheactualrequirementsthatwillbeusedinthesystemengineeringlifecycle.TherequirementsvalidationandmanagementareusedthroughoutthesystemengineeringlifecycletodevelopthesystemaccordingtotherequirementsspecifiedandlogalltherequirementRequirementsWhenusingCIE,therequirementselicitationphaseiscriticaltoensurethatwelookatarequirementintheroundandteaseoutalltheneedsforengineering-basedprotectionsandlayereddefenses.Thisstageensuresthatallrelevantsecurityconcernsareidentifiedandconsideredfromtheoutset,formingthefoundationforasecuresystemdesign.Theelicitationprocessinvolvesmultipletechniques,includinginterviews,surveys/questionnaires,observations,anddocumentanalysis.Eachtechniqueprovidesuniqueinsightsandcomplementstheotherstocreateacomprehensiveunderstandingofthecybersecurityrequirements.MostofthequestionshereareforexamplesandacomprehensivelistisintheCIEimplementationguide[29].Interviewsareadirectandeffectivewaytogatherdetailedinformationfromstakeholders.ForCIE,interviewsshouldfocusonunderstandingthebroaderoperationalandengineeringprotectionsnecessarytomitigatethepotentialforcybersabotage.Thestakeholderstobeinterviewedincludebusinessowners,theoperationalteam,engineers,ITpersonnel,cybersecurityexperts,andend-users.Thekeyquestionstoaskmightincludethefollowing.BusinessOwners:Whatarethemostcriticalassetsandfunctionsthatneedprotection?Whatarethepotentialoperationalconsequencesofacyber-attackontheseassets?Howdoyoucurrentlyensureresilienceagainstsystemdisruptions?OperationalTeams:Whatoperationalprocessesandfunctionsaremostsusceptibletodisruptionfromexternalthreats?Howdoyoucurrentlymanageresilienceandcontinuityincriticaloperations?Whatimpactwouldafailureinengineering-baseddefenseshaveonsystemperformance?Engineers:Whatengineeringcontrolsareinplacetopreventsystemdisruptionsandfailures?Howcanthesecontrolsbestrengthenedtominimizetheriskofcybersabotage?Aretherespecificvulnerabilitiesinthesystem'sdesignthatcouldbeITStaff:Whatsecurityprotocolsanddefensesareintegratedwithengineeringsystems?Whatvulnerabilitiesinthecurrentsystemcouldimpactcriticalfunctions?Howdoyouhandleincidentsthatcanaffectoperationaltechnology(OT)?CybersecurityExperts:Whatarethelatestthreatsandattackvectorsrelevanttoourindustry,particularlythosethattargetoperationaltechnologies?Howdowealigncybersecuritymeasureswithengineeringprotectionstopreventsystemsabotage?Whatbestpracticescanimproveresiliencethroughthedesignofthesystem?
使用CIE時,需求獲取階段至關(guān)重要,以確保我們?nèi)鎸徱曅枨?,并提取所有基于工程保護的分層防御需求。此階段確保從一開始就識別并考慮所有相關(guān)安全問題,為安全系統(tǒng)設(shè)計奠定基礎(chǔ)。獲取過程涉及多種技術(shù),包括訪談、調(diào)查/并相互補充,以全面理解網(wǎng)絡(luò)安全需求。這里的大多數(shù)問題都是示例,完整列表在CIE實施指南CIE,訪談應(yīng)側(cè)重于理解必ITIT員工What安全 and防御措施are集成 with工程 當前系統(tǒng)中的哪些漏洞可能會影響關(guān)鍵功能?如何處理可能影響運營技術(shù)(OT)的 專家:Whatarethe最新威 and攻擊向 相關(guān)的toPagePAGE13ofIncludingthesebroaderperspectivesensuresthatinterviewsaddressbothoperationalandengineeringneeds,capturingtherequirementsnecessarytobuildprotectionfromcybersabotagethroughCIEprinciplesratherthanrelyingsolelyontraditionalITsecuritymeasures.Surveysandquestionnairesareusefulforgatheringinformationfromalargergroupofstakeholders,providingabroaderperspectiveoncybersecurityrequirements.Thesetoolscanbeusedtocollectquantitativeandqualitativedataonsecuritypriorities,userexperiences,andperceivedrisks.Questionsmightinclude:WhatarethesystemsthatperformandsupportcriticalfacilityWhatconsequencesoffailureormaloperationaretheengineeredcontrolsdesignedtoWhatengineering-basedprotectionandverificationcouldensurethatkeydatahavenotbeenWhatlayersofengineeredcontroldefensesexistinasystemandassesstheirinterdependencefromotherdefensesandareaofeffect?WhattemporaryoperationalchangescanbemadeinresponsetoaperceivedWhatoutputsdoesthesystemprovidethatarecriticalinputstootherbusinesssystemsorinfrastructures?Surveyscanalsoincludescenario-basedquestionstogaugestakeholderresponsestopotentialsecurityincidents.Thishelpsinunderstandingstakeholderexpectationsandpreparednessforvarioussecurityscenarios.Observingstakeholdersintheirnaturalenvironmentprovidesvaluableinformationonhowtheyinteractwiththesystemandcanrevealpotentialvulnerabilitiesthatmaynotbeapparentthroughinterviewsordocumentation.ForCIE,observationsshouldfocusonhowsystemoperatorsinteractwithandmanagecriticalassets,howengineersandoperationalstaffimplementandmaintainengineering-basedprotections,andhowroutinetasksareperformedinareal-worldcontexttoensuresystemresilience.Keyobservationsmightincludethefollowing.Howcanmultipleconcurrentcompromisesofalreadyin-placemitigations(i.e.,n-2,n-x)contributetomoresevereconsequences?Howareengineeringcontrolsmonitoredandreassessedtoidentifychangesfromevolvingoperationsthatmayweakentheireffectiveness?HowundesiredmanipulationofimportantdataisHowarefeaturesofthesystemthatarenotnecessarytoachievethecriticalfunctionsInsteadoffocusingonITstaffmanagingsecurityprotocols,theemphasiscouldbeonhowoperationalcontrolsandengineeringmeasuresareappliedandadaptedindailyactivitiestopreventpotentialdisruptionsorsabotage.ThisapproachalignswiththeCIE’sgoalofengineeringoutvulnerabilitiesandenhancingoperationaldefenses.
ITCIEPagePAGE14ofDOCUMENTDocumentanalysisinvolvesreviewingkeyartifactsthatareintegraltothesystemengineeringlifecycle,suchassystemsecurityplans,interfacecontroldocuments,andsystemdesigndocuments.Thesedocumentsprovidecrucialinsightsintotheexistingengineeringframework,operationalcontrols,andhowsecuritymeasuresareintegratedintosystemarchitecture.ForCIE,importantdocumentstoreviewmightinclude:SystemSecurityPlan:Whatsecuritymeasuresareinplace,andhowaretheyintegratedintothesystem’soveralldesignandoperation?Doestheplanaddresspotentialvulnerabilitiesengineeredintothesystem?InterfaceControlDocuments:Howdodifferentsystemcomponentsinteract?Arethereanyinterfacevulnerabilitiesthatcouldbeexploited?SystemDesignDocuments:Howisthesystemarchitected?Arethereengineeredredundanciesordefensesthatminimizethepotentialimpactofacyber-attack?Analyzingthesedocumentshelpsprovideacompleteunderstandingofthedesign,operationalprocedures,andprotectionsofthesystem,allowingidentificationofareaswhereadditionalsecurityorresiliencemeasuresmayberequired.ThisensuresalignmentwithCIEprincipleswhileaddressinggapsinthesystem'soverallsecurityposture.INTEGRATINGIntegratinginsightsfrominterviews,surveys,observations,anddocumentanalysisisacriticalandcomplexstepintherequirementselicitationprocess.Thisprocessinvolvesnotonlycollectingdata,butalsosynthesizingandanalyzingittoensurethatallperspectives,operational,engineering,andcybersecurity,arerepresentedinthefinalsetofrequirements.Todothiseffectively,itisimportanttodevelopastructuredapproachthatfocusesoncategorizingandcorrelatingtheinformationgatheredfromdifferentsources.Aneffectivestrategyistouseathematicanalysis,wherethedataisgroupedintothemessuchasassetprotection,operationalreliability,supplychainintegrity,andbuilt-indefenses.Byidentifyingrecurringthemes,theteamcanensurethatthesystem’smostcriticalcomponentsandfunctionsareprotectedbyappropriateengineeringandsecuritymeasures.Forexample,interviewswithsystemoperatorsmightrevealkeyinsightsintooperationaldependencies,whiledocumentanalysiscoulduncoverarchitecturalvulnerabilitiesthatneedtobeaddressed.Cross-functionalworkshopscanalsohelpintegrateinformationbybringingtogetherstakeholdersfromdifferentdomains:operations,engineering,IT,andsecurity,allowingthemtocollectivelyreviewthefindingsandvalidatetheemergingrequirements.Theseworkshopsshouldfocusonreconcilinganyconflictsbetweenoperationalneedsandsecurityrequirements,ensuringthatsolutionsarebalancedandfeasiblewithintheconstraintsofthesystem.Finally,prioritizingrequirementsbasedontheiralignmentwithCIEprincipleshelpstoensurethatthemostcriticalaspectsofthesystemareaddressedfirst,supportingbothresilienceandsecurityfromthestartofthedesignprocess.Thisstructured,multi-perspectiveapproachenablesamorecompleteandcohesivesetofrequirements,ensuringthatsecurityisembeddeddeeplyintothesystem’sarchitectureandoperations,andnottreatedasanafterthought.
CIE,需要審查的重要文檔可能包括:RequirementsScopingandWhenusingCIE,therequirementsscopinganddeconflictionstageispivotal.Itinvolvesdissectingthegatheredrequirementstounderstandtheirimplications,prioritizingthembasedonvariouscriteria,andresolvinganyconflictsthatmayarisebetweendifferentstakeholderneeds.Thisstageensuresthatcybersecurityrequirementsarenotonlycomprehensive,butalsofeasibleandalignedwiththeoverallgoalsofthesystem.DETAILEDThefirststepinthisstageistothoroughlyanalyzetherequirementselicited.Thisinvolvescategorizingrequirementsintofunctional(requirementsthatdirectlyimpactkeysystemfunctions)andnon-functional(requirementsrelatedtoresilience,supplychainintegrity,orculturalconsiderations)requir
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- AI診斷系統(tǒng)優(yōu)化醫(yī)療服務(wù)流程的新趨勢
- 醫(yī)療行業(yè)跨機構(gòu)數(shù)據(jù)安全保護的策略研究
- 2025年司機年終工作總結(jié)模版
- AI技術(shù)在輔助藥物研發(fā)中的潛在作用和責任分析
- 醫(yī)療產(chǎn)品推廣的動畫效果運用
- 協(xié)會年會發(fā)言稿模版
- 關(guān)注社會公共衛(wèi)生安全定期執(zhí)行醫(yī)療保健及預(yù)防策略研究
- 醫(yī)療機構(gòu)管理中的信息透明度與隱私保護探討
- 保時捷售車合同范例
- 從風險控制角度談企業(yè)級區(qū)塊鏈的合規(guī)和安全保障
- 消防設(shè)施的自動化控制
- 慢阻肺的康復(fù)治療
- 《中醫(yī)養(yǎng)生保健服務(wù)(非醫(yī)療)技術(shù)操作規(guī)范 刮痧》
- 婦產(chǎn)科三基三嚴培訓(xùn)內(nèi)容
- 洛必 達法則課件
- 單片機原理及應(yīng)用知到智慧樹章節(jié)測試課后答案2024年秋溫州醫(yī)科大學
- 《中美經(jīng)濟實力對比》課件
- DB32-T 4443-2023 罐區(qū)內(nèi)在役危險化學品(常低壓)儲罐管理規(guī)范
- 足療養(yǎng)生門店禮儀培訓(xùn)
- 乒乓球教學課件
- OECD -二十國集團 經(jīng)合組織公司治理原則2023
評論
0/150
提交評論