T1.1.3, business and application IBM WS-based
architectural patterns were identified (Endrei, Ang et
al. 2004). The novelty of our approach resides in
showing how a risk analysis method conformed to
the Common Criteria Framework was integrated into
PWSSec in such a way that security requirements
and security engineering disciplines for Web
services-based system were successfully aligned,
integrated and developed. Few previous approaches
have been proposed on the subject of applying
security risk analysis in WS-based development
processes up until now. The problem with them is
that they explain how this subject from a very
abstract level of detail (Christopher Steel 2005). In
this paper, we provide a reusable, real and practical
solution on this area showing how we adjusted
Magerit2 to security analysis-related tasks of
PWSSec.
3.1 A1.1. Elicitation - T1.1.4:
Identify Possible Business
Threats
Rigorous risk analysis relies on an understanding of
business impacts, which requires an understanding
of laws and regulations as well as the business
model supported by the software (Verdon and
McGraw 2004). The main purpose of this task is,
from the business-level description elaborated
during task T1.1.2, to define the set of potential
business-level threats that applies to the system
under development. We’ve associated an abstract
business threat tree to every IBM WS business
(Endrei, Ang et al. 2004; Gutiérrez, Fernández-
Medina et al. 2005). This way, once the WS
business pattern has been identified its potential
threats are systematically discovered. These threats
are organized in a tree-like form (Moore, Ellison et
al. 2001). This task’s output is a Business Threat
Model containing the description of the identified
threats organized in the business threat tree. The
chosen notational language representation is based
on the Quality-of-Service UML Profile (OMG
2004).
3.2 A1.1. Elicitation - T1.1.5:
Identify Possible Application
Threats
Risk analysis on modern distributed paradigms such
as WS, requires a functional decomposition of the
application into major components, processes, data
stores, and data communication flows, mapped
against the environment across which the software
will be deployed (Verdon and McGraw 2004). In
this task, the application-level threat tree, which
provides such a functional decomposition, will be
created based on the IBM WS-based application
pattern identified during task T1.1.3 (see Figure 2).
The set of IBM WS application patterns and their
associated abstract threat trees are part of the WS
Security E&A (Elicitation and Analysis) Resources
Repository of WSSecReq subprocess (Gutiérrez,
Fernández-Medina et al. 2005). In Figure 2, the
fragment of the application threat tree that unfolds
branch 1.1 is presented. Under this branch, the set of
threats to be considered on WS agents that
participate in the WS-BTS system: Agent WS-
BTSConsumer (WS-BTSC) and agent WS-
BTSProvider (WS-BTSP) are organized according
to their types. The set of threats on the network
organized under branch 1.2 and 1.3 are omitted due
to space-limits. These threats have been extracted
from the catalogue of threats defined in Magerit2.
Under branch 1.4 the set of threats to be considered
on the WS-based interactions is presented. Here, the
division proposed by the abstract threat tree is based
on the set of threats on the messages of each one of
the interactions that support the functionality whose
security is under analysis (threats have been
extracted from (WS-I 2005) and (Crespo, Gómez et
al. 2005)). This task’s output is an Application
Threat Model. The description of these threats will
give place to a threat model at the application level
that will mainly contain: i) An application threat tree
specific for the system under analysis; ii) UML QoS
model of threats and assets (OMG 2004).
3.3 A1.1. Elicitation - T1.1.7: Threat
Assessment
Task T1.1.7 of WSSecReq is completed by applying
the following Magerit2’s steps: i) Identification of
Assets: According to the application threat tree, and
just focusing on threats on the interactions, the
lowest level assets (those whose risk depends on
higher-level assets) are TNT message (for the
developed branch), TTR Message, TTR Response
Message, RNP Message and RNP Response
Message as well as WS-BTSP and WS-BTSC
agents; ii) Definition of the Dependency Matrix of
Assets: Every (business/application) abstract threat
tree has predefined its own template for its
corresponding asset dependency matrix within the
WS Security E&A Resources WSSecReq’s
repository. The asset dependency matrix allows the
establishment of dependencies between branches
representing assets of the threat tree. The types of
assets considered in a WS context are: a) Web
SECRYPT 2006 - INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY
428