You are on page 1of 3

A New Application of CONOPS in Security Requirements Engineering

by Darwin Ammala
MPI Software Technology Inc.
The Concept of Operations (CONOPS) document, IEEE Standard 1362-1998, is a powerful tool for communi-
cating a customers vision for a new system. Normally used for describing full systems, CONOPS can also be used
to address one single aspectsuch as security in a large-scale project. This paper reports on a recent Navy contract
effort, which demonstrated this use of the CONOPS. This paper will describe and analyze the results of this effort.
The IEEE CONOPS document [1] see steady transitions of requirements from es, many of which are described by Hassan
will gain in popularity, once the software his expressed concepts, to requirements to Gomaa[4] Barry Boehm[5], Alan M.
engineering community discovers its flexi- specification, to code, to product. Davis [6], et al. These authors do not sin-
bility, extensibility, and versatility. This gle out security development practices per
With the new Unified Modeling
paper summarizes a recent case of employ- se, but one can infer that a definable
Language now standardized, conver-
ing the CONOPS document to describe development process is followed. With the
gence of development methods is
the desired multilevel security, and high- new Unified Modeling Language now
more likely. From a security, software,
performance computing infrastructure standardized, convergence of development
development perspective, this could
characteristics to be included in the Navys methods is more likely. From a security,
improve the state of software security
next generation combat vessels. The software, development perspective, this
engineering.
DD21 (21st Century) land attack destroy- could improve the state of software securi-
er is one such ship undergoing design People are most comfortable with ty engineering.
competition. The Navys Small Business describing things in the language of their Users, in most cases, have only rudi-
Innovations Research solicitation topic [2] problem domain. The primary objective mentary knowledge of security, and thus,
identified this vessel as a candidate for the of software engineering is to build the are less likely to be able to help articulate
most advanced multilevel security in a product that the user needs (validation); their concerns in a language other than
computer-intensive environment. after this is to build that product correctly that of their native domain. The user is
(verification). A high priority should be less likely to understand documents, such
User Requirements placed on allowing the user to directly as an SRS, written by a developer com-
Traditionally, the Software Require- express desires and ideas for needed capa- munity having security domain knowl-
ments Specification (SRS) has been devel- bilities of the expected system. The user edge due to the specialized jargon. Terms
oped as the primary document for stating may also provide some insight into specif- such as mandatory access control, nonrepu-
user requirements. The SRS usually is ic testing criteria to be considered. Early diation, and ubiquitous login capability are
produced by the developing organization attention to testing is also relevant during far from everyday usage.
following discussions with the potential concept definition, as the system testing is This leads us to conclude that per-
user of the system and analysis of the a peer off-core development activity in the haps security-relevant software engineer-
requirements gleaned from these discus- software development life cycle [3]. ing would benefit from a more thorough
sions. This document is well suited for and well-understood collection of
use by its authors, but may be of less Security Requirements requirements. This would ensure that the
value to others, such as when users are A compounding requirement prob- right product is being built correctly. The
presented the document for their com- lem arises when security requirements are CONOPS document written in user lan-
ment. Users do not express their require- considered along with functional require- guage is an ideal vehicle for this purpose.
ments at the level of specificity found in ments. The area of Systems and Software
completed SRS documents. Systems Security underwent growth dur- CONOPS Overview
An ideal SRS for a software-intensive ing the 1990s. The Internets emergence A CONOPS is a user-oriented docu-
system can be characterized as having spurred numerous e-companies to rapid ment that describes system characteristics
requirements that completely capture a growth and success, while the field of for a proposed system from the users
problem, is devoid of design evidence, and electronic commerce remains in its infan- viewpoint [7]. The CONOPS document
has succinctly stated requirements. This cy. Like all software, security-relevant soft- is written in order to communicate overall
type of document would generally over- ware often is designed and released with quantitative and qualitative system charac-
whelm the user in the sheer density of latent defects. With the user communitys teristics to the user, buyer, developer, and
detail, repetitiveness of the language, and heightened awareness of security, the other organizational elements. It describes
the total number of requirements stated. developer community will observe a raised the existing system, operational policies,
Most users would not be readily able to concern for sound, functional security classes of users, interactions among users,
determine if the system described in this within the software products that they are and organizational objectives from an
manner would truly address their original hired to produce. integrated systems point of view [1].
needs. The users confidence in the devel- Developers of these products employ The CONOPS is intended to aid in
opment process can be fortified if he can disparate development life-cycle approach- requirement capture and communication

August 2000 www.stsc.hill.af.mil 19


Software Engineering Technolog y

of need to the developing organization. new levels of efficiency while carrying bilateral purpose. The prime focus was to
Posing the problems to be solved in the fewer sailors to operate them. define security and system functionality
users language ensures that the user can Obj ective: To develop techniques to requirements for the customers new class
more accurately express the problem. The address multilevel security in a complex, of ships. The secondary focus was to ini-
developers then have a good basis to software-intensive system. Of particular tiate the users to the use of a specialized
begin the requirements refinements, and concern is maintaining multilevel security CONOPS document. Since the develop-
initial design of the system. while supporting a robust ability to mi- er derived the requirements, the users
Bringing different communities of grate and reallocate tasks through a com- true requirements can be obtained only
people together (users in their domain, plex computer network architecture [2]. from the user communitys review and
and software developers in theirs) implies modification of the document
that communication will be a critical issue. Successful Proposal
The IEEE CONOPS standard does not The approach to this problem was Analysis
stipulate whether the user or the developer to propose a business process review dia- Computer-intensive environments,
must write the document [7]. There are logue with the sponsor that would elicit particularly those that must also provide
tradeoffs in every scenariowhether the the requirementsboth computing sys- multilevel security protection and services,
user or developer writes the document. tem, and computing system securityto are software-intensive systems. Building
Users will better articulate the desired produce a security-specific CONOPS such software systems requires the proper
capability in terms of their domain situa- document. The anticipated interplay was employment of requirements engineering
tion, while developers are more likely to be for the developer to produce the initial practices and tools. Among these practices
familiar with current computing technolo- draft of the CONOPS, and allow the are requirements elicitation and refine-
gy, and would express the required capabil- user representative an opportunity to ment. In cases where the developer has
ity in terms of technology. [7]. comment upon and edit the draft. limited access to the users, the developer
Once a draft CONOPS is written, it This approach rationalized that in can offer a preliminary CONOPS docu-
is presented to the user and developer light of the great complexity of a modern- ment. This preliminary CONOPS will
organizations for review and comment. day destroyer; the security should receive encourage the users to comment, clarify,
Ideally, the user should write the early, concentrated focus. or produce a response document, which is
CONOPS; however, the user must first determined to reflect their views of what is
Delivery
be taught the intentions, and guidelines needed. Once each side has had a chance
The contract team met with the
for doing so. Thus, collaboration between to contribute to the requirements concept,
sponsors, and learned that this system
the user and developer is paramount until a round of more probing analysis and
effort was the first to employ a revised
the user organization has mastered the questioning should follow. Employing an
procurement procedure within the Navy.
techniques. The IEEE standard for the interviewing technique along the format
In prior procurements, the developer was
CONOPS document [1] does a good job described by Joseph Groguen and
given statements of work and statements
of explaining the purpose for each sec- Charlotte Linde [8] to isolate areas of
of requirements that were refined and
tion. Additionally, not all sections of the requirements that need more clarification
worked with the contractor to produce
document are required. An agreement would be an efficient use of time. This
the requirements baseline documents,
between the user and developer can type of zooming in isolates a specific topic
including the SRS.
establish sections that are needed, and deemed critical in the new system, and
The new procurement model
which ones could be omitted. In practic- allows detailed exploration of the problem
employed by the Navy places more
ing due diligence, each of the sections and requirements related to it.
degrees of freedom on the developing
addresses unique aspects of the system life The security requirements were select-
organization to develop the product in the
cycle and should be addressed. ed as the focus of initial operational con-
way it does best, while working with the
sponsor. We learned that little informa- cept. This was based on existing best prac-
A Security CONOPS tice in computing and information sys-
This paper now turns to the case tion was available on specific DD21
requirements, primarily because the com- tems security that the systems security is
study of the use of the CONOPS to artic- designed prior to the production [9, 10].
ulate the security relevant portion of a pro- petition phase between the two project
teams was under way and 18 months Not doing so would entail retrofitting
posed new ship-based computing facility. security into a complex software system,
from completion. These factors gave us
Need and Solicitation incentive to be creative in general com- which if inadequately designed would be a
The overarching requirement came puting capabilities, and concentrate on precursor to failure. In the military
from an SBIR Phase 1 solicitation [2]: developing an adaptable computer-inten- domain, it is critical that security is imple-
sive environment that also employs suffi- mented correctly and completely. This gets
Problem: The Navys new ships
cient security to meet mission require- us back to understanding and capturing
require the most advanced technology
ments. This gave the CONOPS a tech- security requirements. Studies have proven
and security services, adaptable to quickly
nology-oriented composition. that the developing organizations lack of
changing conditions, and functional at
The work from this contract served a understanding of the requirements is the

20 CROSSTALK The Journal of Defense Software Engineering August 2000


A New Application of CONOP S in Security Requirem ents

leading cause of project failure [3]. views and visions based on their working ware Development Life Cycle Models.
Our CONOPS document presents experience with the strengths, and weak- IEEE Transactions on Software Engineering.
the general concepts for the type of com- nesses of their existing systems. Traditional IEEE Computer Society Press. 1988.
puter-intensive control system that would software projects have been undertaken 7. Fairley, R. and R. Thayer, The Concept
be needed to meet the Navys stated with less than complete understanding of of Operations: The Bridge from
requirements for system resilience under requirements. The CONOPS document is Operational Requirements to Technical
dynamically changing conditions. The a stride toward allowing the users views to Specification, Software Engineering,
security CONOPS is the first document be heard, and allowing the developer to M. Dorfman, and R. Thayer, eds.
IEEE Computer Society Press. 1996.
in the systems development life cycle. It is demonstrate to the users that their needs
8. Groguen, J. and C. Linde. Techniques
conceivable that many parts or subparts are understood and acknowledged.u
for Requirements Elicitation. Proceedings
would have similar CONOPS documents
of the International Symposium on Require-
written to describe them. The full system References
ments Engineering. IEEE Press, 1993.
can be decomposed into mission or func- 1. Institute for Electrical and Electronics 9. Ford, W. Computer Communications
tional entities, each of which would have a Engineers, IEEE Guide for Information Security Principles, Standards, Protocols,
CONOPS written to describe it, e.g., Technology-System Definition-Concept of and Techniques, PTR Prentice Hall, 1994
command and control, radar/sonar, fire Operations (CONOPS) Document. IEEE 10. Pfleeger, C. Security in Computing,
control, general information technology Std 1362-1998, IEEE Computer Society PTR Prentice Hall, 1996.
support, etc. This full collection of Press, 1998.
CONOPS documents would represent the 2. Department of Defense, Topic N991- About the Author
079 Multi-Level Security for Computer- Darwin E. Ammala is a
user requirements for the entire system.
Intensive Environments, 1999 DoD senior-level software engi-
With this full set of documents, refining
SBIR/STTR Program Solicitation, U.S. neer with MPI Software
requirements and creating the System
Government Printing Office, 1999. Technology Inc., which has
Requirements Specification, or Software performed contract work for
3. Forsberg, K. and H. Mooz. System
Requirements Specification, could begin. Engineering Overview. Software the National Science
Requirements Engineering. 1996. Foundation, Navy, Department of Energy,
Conclusion IEEE Computer Society Press. and NASA JPL. Previously, he was a senior
Complex software-intensive systems 4. Gomaa, H. The Impact of Prototyping computer scientist with 14 years of experi-
must have a thoroughly understood and on Software System Engineering. In ence at Fort Mead, Md. He is pursing a
soundly engineered set of requirements, System and Software Requirements masters degree in science from Mississippi
which can be used along with best analysis Engineering. R. Thayer and M. Dofrman, State University, with an emphasis in secu-
practice to contribute to an effective eds. IEEE Computer Society Press. 1990. rity in high-performance and distributed-
design and ultimate implementation. The 5. Boehm, B. A Spiral Model of Software cluster computing.
requirements are the foundation for the Development and Enhancement, in MPI Software Technology Inc.
entire project, and must be understood Thayer ed. Tutorial: Software Engineering 101 South Lafayette ST.
precisely and managed diligently because Project Management IEEE Computer Starkville, Miss. 39759
changes are inevitable. It is advantageous Society Press, 1988. Voice: 662-320-4300, ext. 11
to ensure that the real users of the systems 6. Davis, A. E. Bersoff, and E. Comer. A Fax: 662-320-4301
Strategy for Comparing Alternative Soft- E-mail: dammala@mpi-softtech.com
are offered an opportunity to share their

Quote Marks

"Some day, on the corporate balance sheet, there


will be an entry which reads, "Information"; for
in most cases, the information is more valuable
than the hardware which processes it."
Adm. Grace Murray Hopper,
co-inventor of COBOL

August 2000 www.stsc.hill.af.mil 21

You might also like