Selecting the combination of security controls that will most effectively protect a system's assets is a difficult task. If the wrong controls are selected, the system may be left vulnerable to cyber-attacks that can impact the confidentiality, integrity, and availability of critical data and services. In practical settings, as standardized control catalogues can be quite large, it is not possible to select and implement every control possible. Instead, considerations, such as budget, effectiveness, and dependencies among various controls, must be considered to choose a combination of security controls that best achieve a set of system security objectives. In this paper, we present a game-theoretic approach for selecting effective combinations of security controls based on expected attacker profiles and a set budget. The control selection problem is set up as a two-person zero-sum one-shot game. Valid control combinations for selection are generated using an algebraic formalism to account for dependencies among selected controls. Using a software tool, we apply the approach on a fictional Canadian military system with Canada's standardized control catalogue, ITSG-33. Through this case study, we demonstrate the approach's scalability to assist in selecting an effective set of security controls for large systems. The results illustrate how a security analyst can use the proposed approach and supporting tool to guide and support decision-making in the control selection activity when developing secure systems of all sizes.
翻译:选择能够最有效保护系统资产的安全控制措施组合是一项艰巨的任务。若选择不当,系统可能面临网络攻击的威胁,进而影响关键数据与服务的机密性、完整性和可用性。在实际应用中,由于标准化控制目录规模庞大,无法选择并实施所有可能的控制措施。因此,必须综合考虑预算、有效性及不同控制措施间的依赖关系,以选择最能实现系统安全目标的安全控制组合。本文提出一种基于博弈论的方法,依据预期攻击者特征和给定预算,选择有效的安全控制组合。该控制选择问题被建模为两人零和单次博弈。通过代数形式化方法生成符合依赖关系的有效控制组合以供选择。借助软件工具,我们将该方法应用于一个虚构的加拿大军事系统,并采用加拿大标准化控制目录ITSG-33进行验证。通过该案例研究,我们证明了该方法具备可扩展性,能够协助为大型系统选择有效的安全控制集合。结果表明,安全分析师可运用所提方法及辅助工具,在开发各类规模的安全系统时,指导并支持控制选择活动中的决策过程。