New NIST guidelines aim to help IT system developers build security in from the ground up

May 22, 2014

A new initiative by computer security experts at the National Institute of Standards and Technology (NIST) seeks to bring widely recognized systems and software engineering principles to bear on the problem of information system security.

The goal, according to computer scientist Ron Ross, a NIST Fellow, is to help establish processes that build security into IT systems from the beginning using sound design principles, rather than trying to tack it on at the end. "We need to have the same confidence in the trustworthiness of our IT products and systems that we have in the bridges we drive across or the airplanes we fly in," says Ross.

Civil engineers employ the principles of physics and engineering to build reliable structures, Ross says. Similarly, systems security engineering processes, supported by the fields of mathematics, computer science and systems/, can provide the discipline and structure needed to produce IT components and systems that enjoy the same level of trust and confidence.

NIST has launched a four-stage process to develop detailed guidelines for "systems security engineering," adapting a set of widely used international standards for systems and software engineering* to the specific needs of security engineering. The agency has released the first set of those guidelines for public comment in a new draft document, Systems Security Engineering: An Integrated Approach to Building Trustworthy Resilient Systems.**

The NIST engineering-driven guidelines are meant to be broadly applicable to systems design in both the public and private sectors, for small and large systems, and for many different types of applications including general-purpose financial systems, defense systems and the industrial control systems used in power plants and manufacturing.

The current draft—and the first stage of the planned process—describes the fundamentals of systems security engineering, elements and concepts and covers 11 core technical processes in systems and software development. Later public drafts will add material in supporting appendices, for example, on principles of security, trustworthiness and system resilience; use case scenarios; and important nontechnical processes such as risk management and quality control procedures. NIST expects to publish the final, complete version of the engineering guidelines by December 2014.

Explore further: US closes probe into Camry Hybrid brake problems

More information: The initial public draft of Systems Security Engineering: An Integrated Approach to Building Trustworthy Resilient Systems is available at csrc.nist.gov/publications/PubsDrafts.html#800-160 . Public comments on the current draft are requested by July 11, 2014, and should be sent to sec-cert@nist.gov.

*International Organization for Standardization (ISO), the International Electrotechnical Commission (IEC), and the Institute of Electrical and Electronic Engineers (IEEE) standard 15288:2008, Systems and software engineering—System life cycle processes.

**R. Ross, J.C. Oren and M. McEvilley. Systems Security Engineering: An Integrated Approach to Building Trustworthy Resilient Systems. NIST Special Publication 800-160. Initial Public Draft. May 2014.

add to favorites email to friend print save as pdf

Related Stories

NIST provides draft guidelines to secure mobile devices

Nov 01, 2012

The National Institute of Standards and Technology (NIST) has published draft guidelines that outline the baseline security technologies mobile devices should include to protect the information they handle. Smart phones, ...

Recommended for you

Overly polite drivers, not roadworks, cause traffic jams

Aug 25, 2014

British motorists who are too polite or timid in their driving style are the cause of lengthy traffic jams across the UK, particularly when faced with roadworks or lane closures, according to a leading Heriot-Watt ...

Voice, image give clues in hunt for Foley's killer

Aug 21, 2014

Police and intelligence services are using image analysis and voice-recognition software, studying social media postings and seeking human tips as they scramble to identify the militant recorded on a video ...

Smartphone-loss anxiety disorder

Aug 21, 2014

The smart phone has changed our behavior, sometimes for the better as we are now able to connect and engage with many more people than ever before, sometimes for the worse in that we may have become over-reliant on the connectivity ...

Why conspiracy theorists won't give up on MH17 and MH370

Aug 20, 2014

A huge criminal investigation is underway in the Netherlands, following the downing of flight MH17. Ten Dutch prosecutors and 200 policemen are involved in collecting evidence to present at the International Criminal Court in the Hague. The inv ...

Here's how you find out who shot down MH17

Aug 20, 2014

More than a month has passed since Malaysia Airlines flight MH17 crashed with the loss of all 298 lives on board. But despite the disturbances at the crash site near the small town of Grabovo, near Donetsk ...

User comments : 0