Skip to content

Final Prototype # 1 RC6

Latest
Compare
Choose a tag to compare
@yasali yasali released this 06 Oct 09:59

Release Notes MUSES
Copyright (C) 2013 - 2014 Sweden Connectivity
Date: 20141006
Release: Muses Prototype # 1 RC6 (FINAL)

Binaries
Muses Client
Git: d1b3f20cd3650714026a9a2ad178aaf8a11dcc81
File: MusesClient.apk
MusesAwareApp
Git: 5b52219ad0e5a901af2f3c18211275282eb71108
File: MusesAwareApp.apk
common
Git: cab27ee67ea6b046edd3059a4d44a38f4ca708f6
File: common-0.0.1-SNAPSHOT.jar
server
Git: 7d659bf8122fcb0ad4458e5fcbb2635dc42d805b
File: server-0.0.1-SNAPSHOT.war

Fixes
- Disable screen lock for checking device configuration fixed
- Requires apps installed fixed, now uninstallation receives a policy and shows the feedback
- Folders sensed for opening,saving and receives policy now from non musesaware file explorer.

Issues
- opening blacklist app does not work.
- policies are some times not received on the first attempt.
- path is null in decision maker which causes no feedback shown to the user.

Coverage
- 33.5% coverage for server project (1 failure)
- No test coverage for common project
- 35.1% (No failures)

Code quality
- Server : Rules Compliance 84.1%, Violations 637
- Common : Rules Compliance 91.6%, Violations 75
- Client : Lint: 71 issues.

Feature List

UC 1 states: “Check of the end user terminal before granting access to company sensitive data on the company intranet”
Ref:Feature descriptionPrototypeStatusDeltaComments
F1:1Grant/deny access to company sensitive information1Open3%"Total actions: 62
Left: 4"
F1:2Check user device's security level1Open50%"Total actions: 6
Left: 3"
F1:3Check user past usage patterns1Open20%"Total actions:5
Left:1"
F1:4Check connection properties1Done0%
F1:5Evaluation of device trust level2Open100%
F1:6Provide ad hoc suggestions to the user1Done0%
F1:7MUSES checks if end user is connected to the company Intranet1Done0%
F1:8MUSES checks Wi-Fi is unsecure1Done0%
F1:9MUSES perform risk analysis. Risk analysis is based on continuously updating the measures of trust levels.1Done0%
F1:10MUSES provides authentication1Open30%
UC 2 states: “Check of the end user terminal before granting access to company sensitive data from the Internet”
Ref:Feature descriptionPrototypeStatusDeltaComments
F2:1Check potentially unsafe communication settings1Done0%
F2:2Check existence of additional protection features (VPN,…)1Done0%
F2:3Provide ad hoc suggestions to the user: Migrate to a secure network connection1Done0%
F2:4Detection of sensible data insertion (PIN, passwords,…)1Done0%
F2:5Evaluation of current security and risk level1Done0%
F2:6Propose a possible insertion and data transmission method (private place, Setup SSL connection)1Open100%
F2:7Performs all the checks necessary to evaluate the context and uses the results against the company policies associated to the requested asset2Open100%
F2:8Grant/deny access to company sensitive information1Done0%
F2:9MUSES dynamically perform risk analysis. Risk analysis is based on continuously updating the measures of trust levels.1Done0%
UC 3 states: “Dynamic data aggregation within the company intranet”
Ref:Feature descriptionPrototypeStatusDeltaComments
F3:1Generate specific hints (advices)1Open60%"Total actions:10
Left:6"
F3:2Detect asset's sensitivity level2Open100%
F3:3Detection of data aggregation from different sources1Open100%
F3:4Check risk of data combination1Open100%
F3:5Grant/deny access to requested data1Done0%
F3:6Removes sensible information stored into the terminal if the device is not safe.1Open25%"Total actions:4
Left:1"
F3:7Assign value to assets1Open100%
F3:8Perform risk analysis with regard to User's past behaviour1Done0%
UC 4 states: “Dynamic data aggregation from the Internet”
Ref:Feature descriptionPrototypeStatusDeltaComments
F4:1Change Policy. (A trusted user and terminal remotely change a document policy. A policy is an Asset) 1Open100%
F4:2Configuration enforcement1Open100%
F4:3Performs more strict evaluation of the device environment1Open100%
F4:4Actively monitors terminal's configuration within the trusted state1Done0%
F4:5Detects a change of configuration in the system and reverts the terminal to the non-trusted status1Open100%
UC 5 states: “Check-up of the connected terminals/end points (still previously connected)”
Ref:Feature descriptionPrototypeStatusDeltaComments
F5:1Detection of terminal corruption1Open100%"Total actions:2
Left:2"
F5:2Analyse risk of having two active editing sessions on the same asset (Removed from scope matrix)1Open100%"Total actions:2
Left:2"
F5:3Understanding the risk that a cross contamination could have happened in the past or is still present1Open100%"Total actions:2
Left:2"
F5:4Evaluating the security levels and the interaction models among the devices1Open100%
F5:5Suspending the task until the terminal has been verified and possibly cleaned1Open100%
F5:6Invokes cleaning of the stored assets (If no other solution available)2Open100%"Total actions:2
Left:2"
F5:7Keep track of all opened and closed assets, multiple devices, Users2Open100%
UC 6 states: “A non-secure mobile terminal is physically moved to a high-security area”
Ref:Feature descriptionPrototypeStatusDeltaComments
F6:1Sensing of physical context (GPS, Cell Ids, indoor Wi-Fi)1Open85%"Total actions:7
Left:6"
F6:2Sensing of connected peripherals (USB keys)2Open100%
F6:3Detection of unsatisfied policy requirements1Open7%"Total actions:14
Left:1"
F6:5Avoids physical violation of an asset1Open100%
F6:6Enforce the new configuration on the terminal (making sure physical location is secure)2Open13%"Total actions:15
Left:2"
UC 7 states: “Supply chain partner data exchange”
Ref:Feature descriptionPrototypeStatusDeltaComments
F7:1Application installation control1Open12%"Total actions:6
Left:1"
F7:2Application execution control1Done0%
F7:3Check communication encryption1Done0%
F7:4Evaluate all communication endpoints (i.e., the company user’s and its supply chain counterparts’ terminals)2Open100%
F7:5Prevent the sharing of any sensible data to the uncontrolled terminals of the third parties until MUSES is correctly configured1Done0%
F7:6Directly asks to the user to manually do the changes or ask the permissions to do them automatically1Open87%"Total actions:8
Left:7"
F7:7Verify partner’s Trustability2Open100%
The general features are not derived from any Use Case, but are essential for the system.
Ref:Feature descriptionPrototypeStatusDeltaComments
G1:1Authenticate user to MUSES1Done0%
G1:2Authenticate device to MUSES1Done0%
G1:3Provide a dashboard for MUSES2Open100%
G1:4Getting information from antivirus on device1Done0%
G1:5Cooperate with safe storage app on device2Open100%
G1:6Protect MUSES on device (From tampering)1Done0%
G1:7Provide secure communication between MUSES Server and Clients2Open100%
G1:8Monitor location details while trying to access a asset2Open100%
G1:9Send alerts/messages from MUSES - MUSES alerting system2Open100%
G1:10Local anti-virus detects the infection and alert MUSES local agent2Open100%
G1:11Protect the DB on the device (Encrypt policies, rules etc.)2Open100%
G1:12Set device policies ( Windows: Group policy, Android: Google Apps Device Policy, iOS: Mobile Device Management)1Open16%"Total actions:6
Left:1"
G1:13Knowledge refinement:Detection of new context event combinations/patterns that might be related to existing corporate policies adapting the associated rules or creating new ones to cope with previously uncoded situations.2Open100%
G1:14Server GUI for Security Policies / Risk Management2Open100%
G1:15Anonymize data in server2Open100%"Total actions:2
Left:0"
G1:16Register user with MUSES (server and device)2Open33%"Total actions:3
Left:1"
G1:17Log information per component2Open100%"Total actions:15
Left:0"
G1:18Sensor that are not assigned to a Use Case yet1Open20%"Total actions:5
Left:1"
G1:19Get sensor configuration from server2Open66%"Total actions:6
Left:4"
G1:20Server Database setup2Open100%"Total actions:9
Left:9"
G1:21Context aggregation1Open100%