{"id":24,"date":"2019-09-18T21:57:57","date_gmt":"2019-09-18T21:57:57","guid":{"rendered":"http:\/\/prosaweb.duckdns.org\/?page_id=24"},"modified":"2021-11-30T09:04:37","modified_gmt":"2021-11-30T09:04:37","slug":"our-approach","status":"publish","type":"page","link":"https:\/\/prosasecurity.com\/index.php\/our-approach\/","title":{"rendered":"Our approach"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"24\" class=\"elementor elementor-24\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2cb2d514 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2cb2d514\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-326f4625\" data-id=\"326f4625\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bfa6be5 elementor-widget elementor-widget-heading\" data-id=\"bfa6be5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our approach: Protect against the widest range of attacks<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4a00a6e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4a00a6e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-23a4d12\" data-id=\"23a4d12\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ba419c9 elementor-widget elementor-widget-text-editor\" data-id=\"ba419c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The PROSA approach is based on modeling behaviour and communication through your solution using a Domain-Specific Language (DSL) with which the logic and critical-security areas of the system under development can be represented. This semantics covers all aspects relevant to IT security in applications and layers of applications. This model can be either be integrated directly into your source code or be a separate model.<\/p><p>Based on the model developed the following testing process is carried out:<\/p><ol><li>The scope is identified through documentation review and interviews giving a first idea of the critical sections. This step benefits from a network representation of the underlying systems.<\/li><li>Modeling relies on further documentation review to obtain detailed systems behaviour, uniform documentation, and eliminate implementation errors.<\/li><li>Security Requirements are identified and validated. This contains the confidentiality and integrity goals of the model.<\/li><li>Threats include the completion of eavesdropper simulations and attack landscaping. At this stage the full, active and passive, attack spectrum is used. As a result, possible threats are documented (description of attack behaviour).<\/li><li>Risk Analysis contains a threats overview together with decision-making priorities. Risk documentation for each attack is generated.<\/li><\/ol><p>With regulatory requirements such as the Payment Services Directive 2 (PSD2), we can help you identify the security requirements that are relevant to your solution. By following the PROSA approach you can link the regulatory requirements to a risk analysis of potential threats, which lets you prove that your solution is secure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4fb1e38\" data-id=\"4fb1e38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-25c604d elementor-widget elementor-widget-image\" data-id=\"25c604d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"246\" height=\"321\" src=\"https:\/\/prosasecurity.com\/wp-content\/uploads\/2019\/09\/process.png\" class=\"attachment-large size-large wp-image-45\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9afb682 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9afb682\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ebaec30\" data-id=\"ebaec30\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f09713a elementor-widget elementor-widget-heading\" data-id=\"f09713a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Saving money and improving code quality with PROSA<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60af886 elementor-widget elementor-widget-text-editor\" data-id=\"60af886\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A common rule of thumb in computer security is that every 100 lines of source code contain ONE defect, representing a potential entry point for attackers to a system. Even more worrying is that systems are getting more and more complex, possibly containing dozens or hundreds of components spread across various servers and cloud services. Attackers are also getting more and more advanced. With PROSA you can analyze complex solutions and show what happens when an attacker is able to:<\/p><ul><li>listen in on the communication between your systems<\/li><li>modify data sent to or from your systems<\/li><li>change or destroy data locally on a system<\/li><li>have access to crypto-keys, e.g. from an attack on onboarding<\/li><\/ul><p>Designing applications following security principles allows to mitigate potential weaknesses. With the PROSA approach we can help you see the bigger picture of your security solution, and help you avoid potentially costly design errors:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0b039d2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0b039d2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a1ce299\" data-id=\"a1ce299\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-94037ad elementor-widget elementor-widget-heading\" data-id=\"94037ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PROSA compared with traditional methods<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-09ff518 elementor-widget elementor-widget-text-editor\" data-id=\"09ff518\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<table>\n<tbody>\n<tr>\n<th><\/th>\n<th>Traditional approach<\/th>\n<th>PROSA approach<\/th>\n<th>Effect from PROSA estimate<\/th>\n<\/tr>\n<tr>\n<td><strong>Modelling<\/strong><\/td>\n<td>500-3000 pages of informal description, fragmented, on a component-by-component level<\/td>\n<td>3-10A4 pages with a precise, formal system description<\/td>\n<td>20x faster understanding of the system or new employees<\/td>\n<\/tr>\n<tr>\n<td><strong>Security requirements<\/strong><\/td>\n<td>General requirements, imprecise, not connected to concrete assets<\/td>\n<td>Precise description of assets and security goals<\/td>\n<td>4x more requirements<\/td>\n<\/tr>\n<tr>\n<td><strong>Issues<\/strong><\/td>\n<td>Semi-manual and expert-based<\/td>\n<td>Precise description of issues, dynamic simulations of attacks<\/td>\n<td>10 more threats and issues found<\/td>\n<\/tr>\n<tr>\n<td><strong>Risk<\/strong><\/td>\n<td>Experience-based<\/td>\n<td>Provides a systematic index of threats based on issues<\/td>\n<td>4x aster process for estimating risks<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>An asset can be a defined security asset, such as a payload, key identity or password.<\/p>\n<p>An issue is a potential for misuse of a system, a partial compromise, an attack, etc<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Our approach: Protect against the widest range of attacks The PROSA approach is based on modeling behaviour and communication through your solution using a Domain-Specific Language (DSL) with which the logic and critical-security areas of the system under development can be represented. This semantics covers all aspects relevant to IT security in applications and layers [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-24","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/pages\/24","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/comments?post=24"}],"version-history":[{"count":19,"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/pages\/24\/revisions"}],"predecessor-version":[{"id":469,"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/pages\/24\/revisions\/469"}],"wp:attachment":[{"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/media?parent=24"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}