Business Process Security Analysis - Design Time, Run Time, Audit Time

This paper reports on approaches and tool support for security and compliance analysis of executable business processes, so-called workflows, employed in the GESINE project. Specifically, focusing on the business layer and the corresponding workflow entities along the business process management lifecycle (i. e., workflow model, instance and event log), the techniques reported on in this paper cover the design time, run time and audit time analysis. Their goal is to verify the adherence to security requirements, such as the four-eyes principle and separation and binding of duties. Altogether, the complementary techniques described in this paper enable a holistic approach to ensure the security of workflows. Zusammenfassung Dieser Artikel stellt Ansätze und Tools zur Sicherheitsanalyse von ausführbaren Geschäftsprozessen, sogenannten Workflows, die im Projekt GESINE untersucht und eingesetzt werden, vor. Ein spezieller Fokus wird dabei auf der Business-Ebene und die damit entlang des BPMLebenszyklus verbundenen Workflow-Artefakte gelegt (d. h. Modell-, Instanzund Event-Logs). Die hier vorgestellten Techniken decken Designzeit, Laufzeit und log-basierte Analysen ab. Ziel ist die Einhaltung sicherheitsbezogener Anforderungen an Workflows, wie etwa das Vier-Augen-Prinzip, nachzuweisen. Es wird aufgezeigt, dass die vorgestellten Techniken komplementär zueinander sind und die gemeinsame Nutzung daher zu einer ganzheitlicheren Betrachtungsweise von Sicherheitsanforderungen auf der Ebene von Workflows führt.

[1]  Dorothy E. Denning,et al.  A lattice model of secure information flow , 1976, CACM.

[2]  John A. Zachman,et al.  Business Process Trends , 2015, The Complete Business Process Handbook, Vol. I.

[3]  Roberto Gorrieri,et al.  Petri Net Security Checker: Structural Non-interference at Work , 2009, Formal Aspects in Security and Trust.

[4]  Remco M. Dijkman,et al.  Petri Net Transformations for Business Processes - A Survey , 2009, Trans. Petri Nets Other Model. Concurr..

[5]  Lutz Lowis,et al.  Vulnerability Analysis in SOA-Based Business Processes , 2011, IEEE Transactions on Services Computing.

[6]  Rafael Accorsi,et al.  On the exploitation of process mining for security audits: the conformance checking case , 2012, SAC '12.

[7]  Rafael Accorsi,et al.  InDico: Information Flow Analysis of Business Processes for Confidentiality Requirements , 2010, STM.

[8]  Rafael Accorsi,et al.  SWAT: A Security Workflow Analysis Toolkit for Reliably Secure Process-aware Information Systems , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[9]  Josep Carmona,et al.  New Region-Based Algorithms for Deriving Bounded Petri Nets , 2010, IEEE Transactions on Computers.

[10]  M. Hammer The process audit. , 2007, Harvard business review.

[11]  Dirk Fahland,et al.  Information Flow Security for Business Process Models - just one click away , 2012, BPM.

[12]  Manfred Reichert,et al.  From ADEPT to AristaFlow BPM Suite: A Research Vision Has Become Reality , 2009, Business Process Management Workshops.

[13]  Günter Müller,et al.  On the exploitation of process mining for security audits: the process discovery case , 2013, SAC '13.

[14]  Roberto Gorrieri,et al.  Structural non-interference in elementary and trace nets , 2009, Mathematical Structures in Computer Science.

[15]  Günter Müller,et al.  Sichere Nutzungskontrolle für mehr Transparenz in Finanzmärkten , 2010, Informatik-Spektrum.

[16]  M. Bouaziz,et al.  An Introduction to Computer Security , 2012 .

[17]  Rafael Accorsi,et al.  Strong non-leak guarantees for workflow models , 2011, SAC.

[18]  Rafael Accorsi,et al.  Automatic Information Flow Analysis of Business Process Models , 2012, BPM.

[19]  Peter J. Denning,et al.  Certification of programs for secure information flow , 1977, CACM.