3. Guidance3.1 Planning For V&V For Security Risk MitigationsProject managers ensure that software security risk mitigations identified and evaluated in SWE-154 - Identify Security Risks and SWE-156 - Evaluate Systems for Security Risks are verified and validated as part of the project’s development activities. The verification and validation (V&V) of these mitigations are included in the project’s planned V&V activities, reflected in the project’s V&V plans, and carried out throughout the project life cycle. When planning V&V for required software security risk mitigations, the following are useful source documents within the project and from the Information System Security Officer (ISSO): - System-level risk assessment report.
- Plan of actions and milestones (POA&M). (POA&M serves as the NASA management tool to address, report, resolve, and remediate security-related weaknesses, both at the information system level and program-level).
Examples of the type of information found in these documents relevant to planning V&V for software security risk mitigations include: - Vulnerabilities discovered during the security impact analysis or security control monitoring.
- Corrective efforts associated with the mitigation of identified security weaknesses.
- The NASA goal for vulnerability remediation identified during vulnerability scanning.
- To have all vulnerabilities categorized as high remediated within five working days of discovery.
- To have all vulnerabilities categorized as moderate remediated within thirty working days of discovery.
- To have all vulnerabilities categorized as low remediated within sixty working days of discovery.
See also SWE-154 - Identify Security Risks, SWE-156 - Evaluate Systems for Security Risks, SWE-157 - Protect Against Unauthorized Access, SWE-191 - Software Regression Testing. 3.2 V&V ActivitiesSpecific to software security risk mitigations, V&V activities include, at a minimum: - Security vulnerability checks during peer review/inspections of software requirements, design, code (may require updates to existing peer review/inspection checklists).
- Automated security static code analysis.
- Coding standard static analysis.
For Additional Guidance on Peer Reviews see SWE-087 - Software Peer Reviews and Inspections for Requirements, Plans, Design, Code, and Test Procedures, SWE-088 - Software Peer Reviews and Inspections - Checklist Criteria and Tracking, Topic 7.10 - Peer Review and Inspections Including Checklists. Additionally, repeating previous assessments for software security vulnerabilities could be used to confirm that the previously identified vulnerabilities and weaknesses have been addressed and no new vulnerabilities introduced or discovered. To keep costs down and prevent the propagation of risks through the project, mitigations are to be put in place as early as possible and verified throughout the life cycle. In the case of software systems that do not directly have security scan tools, manual methods and techniques can be used/applied to supplement and provide risk reduction. Software coding languages may not have security scanning tools, such as Programmable Logic Devices (PLDs)…, therefore alternative methods are necessary including manual techniques. Examples of these techniques are (not limited too): - Peer reviews from multiple people
- Checking for backdoors, hardcoded credentials, poor programming practices
- Examination of third-party software/libraries being used
- Security patches, supply chain risks, …
- Security practices for software development/test infrastructures (see SWE-136)
- Running malware scanners, Access restrictions, …
- Plans developed for reacting to security incidents
- Unit and formal tests to verify potential security measures are in place
- These should be at multiple levels
- For example, tests to show access to authorized accounts only, rejecting invalid commands
- Code paths are handled for all inputs
- Sanitization of inputs (for example restricting to only valid expected values)
- “Fuzzy” testing (i.e. using values outside of nominals)
- Identify the most critical and vulnerable systems, spend time focusing on those
Project Protection Plans (PPP) contain Controlled Unclassified Information (CUI) and may be supported by a classified appendix. Identification of and discussions with the owner of the PPP will help to identify what areas that the software needs to address. Due to the sensitive nature of the PPP documents exact details may not be given but requirements and needs can be derived and tested to support the plan. See also SWE-135 - Static Analysis, SWE-185 - Secure Coding Standards Verification, SWE-207 - Secure Coding Practices, Topic 8.04 - Additional Requirements Considerations for Use with Safety-Critical Software 3.3 Additional GuidanceAdditional guidance related to this requirement may be found in the following materials in this Handbook: 3.4 Center Process Asset Libraries
See the following link(s) in SPAN for process assets from contributing Centers (NASA Only). |