Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide a practical and convenient automobile risk assessment automation system, which improves the efficiency of automobile information safety risk assessment work, realizes the automation of the assessment work and improves the correctness of an assessment result.
In order to achieve the purpose, the invention provides the following technical scheme: the utility model provides an automobile information safety risk assessment automation system which characterized in that: the method comprises the following steps:
the online design engine of the automobile risk assessment model is used for realizing the construction of a data model for an assessment product or service;
the automobile information security risk assessment authority management engine is used for realizing authority management of different granularities of risk assessment items by combining user management of a system;
the automobile information security risk assessment automation workflow engine based on Flowable is used for automating a risk assessment business process through a BPMN2.0 process modeling language;
the agile management engine for the automobile information safety wind direction assessment project is used for dividing the responsibility of team members, allocating special personnel to take charge for each stage of risk assessment, and performing all assessment work cooperatively;
the distributed file storage engine is used for dividing the data types of the risk assessment system into structured data and unstructured data and storing the structured data and the unstructured data, wherein the structured data of the system is stored in a MySQL database and is subjected to master-slave replication and read-write separation, so that high reliability of database storage and high-performance read-write of the database are realized; the system unstructured data is stored in a distributed file system;
the risk assessment system report engine is used for carrying out stage statistical analysis and graphical display on a risk assessment process, generating an assessment report, and finally generating and exporting a risk assessment report;
and the visual log analysis engine is used for collecting the system logs, filtering and extracting the system logs, analyzing and visually displaying the system logs, and realizing quick positioning of system faults and proposing a solution.
As a further improvement of the invention, the data model constructed by the online design engine of the automobile risk assessment model comprises:
the various types of graphic modules are used for drawing UML, a user diagram, a data flow diagram and BPM;
the automobile information safety icon set module comprises a interest related party, a connecting line and an automobile part icon set;
the figure setting module is used for adjusting the size, the figure rotation, the proportion adjustment and the mouse dragging;
the text setting module is used for supporting rich fonts, color setting, size adjustment and position movement;
the canvas configuration module is used for adjusting the size of the canvas, the background color and the inner edge distance, the scaling and the automatic adjustment of the canvas according to the size;
the intelligent connection module is used for quickly connecting the line graph and automatically attaching the connecting line to the graph along with the movement of the graph;
the global style module is used for realizing that a newly added graph can reuse the style of the last graph and supporting the copying and pasting operations of the style;
the import and export module is used for supporting various types of import and export file formats;
the cloud storage function module is used for integrating the functions of part of the cloud network disks and realizing real-time storage and sharing functions;
and the business linkage module is used for performing activity association with the risk assessment process, providing convenient assessment operation in the diagram and improving the assessment efficiency.
As a further improvement of the invention, when the automobile information security risk assessment authority management engine is used for user management, user roles are firstly allocated and divided into an information security assessment engineer, a service/function development engineer, an information security test engineer, a security solution engineer and a risk assessment work acceptance check worker, and then corresponding authorities are divided according to the user roles.
As a further improvement of the invention, the risk assessment business process of the Flowable-based automobile information security risk assessment automation workflow engine comprises the steps of case modeling, asset assessment, damage identification, threat scene identification, attack path analysis, risk handling, security target and security requirement, abstracting and drawing a standard flow chart, determining trigger events, trigger conditions and gateways among all stages, appointing gradual circulation according to flow definition through the Flowable flow engine, and recording the project execution process.
As a further improvement of the invention, the data storage bottom layer of the distributed file storage engine adopts an optimized distributed file system, and realizes reliable storage and safe storage of data storage through an erasure code and multi-copy backup mixed strategy.
As a further improvement of the invention, the statistical types of the risk assessment system report engine comprise asset identification statistics, damage scene statistics, threat scene statistics, attack path statistics, risk disposition statistics and safety requirement statistics, the assessment report type of the engine comprises an asset report, a damage report, a threat report, an attack feasibility report, a risk disposition report, a safety target and a safety requirement report which can be generated, and the file export type of the engine comprises XML, Word and PDF.
As a further improvement of the invention, the visual log analysis engine comprises a log collection module, a log transmission module, a log storage module, a log analysis module and an alarm prompt module.
The method has the advantages that the data model can be effectively constructed through the setting of the online design engine of the automobile risk assessment model, then the user is effectively managed through the automobile information security risk assessment authority management engine, the automation of the assessment business process is realized through the Flowable-based automobile information security risk assessment automatic workflow engine, the responsibility division of team members is realized through the setting of the automobile information security wind direction assessment project agility management engine, so that all assessment works are carried out in a coordinated mode, the files can be simply and effectively stored and the assessment report forms can be generated through the setting of the distributed file storage engine, the risk assessment system report engine and the visual log analysis engine, and the rapid positioning and the solution can be realized when the system fails
Detailed Description
The invention will be further described in detail with reference to the following examples, which are given in the accompanying drawings.
Referring to fig. 1 to 3, an automatic system for evaluating automobile information security risk according to the present embodiment mainly includes the following aspects.
In a first aspect, an online design engine for constructing an automobile risk assessment model. And performing secondary development based on an open source UML modeling tool Drawio to realize the construction of a data model for the evaluation product or service. The method mainly comprises the following steps:
a set of automotive information security icons including a stakeholder graphic representation, a connecting line graphic representation, an automotive part graphic representation, and the like;
setting a graph, adjusting the size, rotating the graph, adjusting the proportion, dragging the mouse and the like;
text setting, which supports rich fonts, color setting, size adjustment, position movement and the like;
canvas configuration, namely adjusting the size of the canvas, the background color and the inner edge distance, and zooming and automatically adjusting the canvas according to the size;
intelligent connection, namely, a quick connection line graph and a connection line automatically attach to each other along with the graph movement;
the global style, the newly added graph can reuse the style of the last graph, and the copy and paste operation of the style is supported;
various figures can be drawn, such as UML, use case diagram, data flow diagram, BPM and the like;
importing and exporting, and supporting various types of formats PNG, JPG, SVG, PDF, HTML, VSDX, CSV and the like;
the cloud storage function integrates the functions of part of the cloud network disk, such as the connection with a Baidu network disk and an Onedrive, and utilizes the storage characteristics and the real-time storage function of the software;
business linkage, wherein the business linkage is in activity association with a risk assessment process, and convenient assessment operation is provided in a diagram, such as asset identification, damage and threat scene addition, attack path addition, risk handling strategy selection and the like;
in a second aspect, an automobile information security risk assessment authority management engine is provided. And the service authority management of the risk assessment system is realized by combining the user and the authority management of the system.
The system user roles are 5 in total, and can be divided into the following details: information security assessment engineers, business/function development engineers, information security tests, security solution engineers, risk assessment work acceptance personnel.
The user & authority management function implements management of system users, including inquiry, addition, modification, deletion, etc. of user information. The common user can inquire the user attribute of the common user, modify the user password, bind the mobile phone number and other information. The administrator user has the highest authority and can manage the ordinary users. And the user management allocates different use authorities according to different user roles. Different user roles correspond to different service permissions.
And the service authority management mainly comprises project authority and process authority management. In the process of the risk assessment project, the authority to be allocated at the current stage can be determined according to the role of the user, and the method comprises the following steps: read-only permissions, read/write permissions, delete permissions, etc. And the staff in charge of the assessment work at each stage of risk assessment can synchronously carry out risk assessment. And the evaluation work of other stages is not disturbed. Meanwhile, the specific authority of the personnel participating in the evaluation at a certain stage of risk evaluation can be configured according to the project requirements, and the project-level authority management is realized.
In a third aspect, an automatic workflow engine for automobile information security risk assessment based on Flowable.
Through BPMN2.0 process modeling language, risk assessment business process comprises: use case modeling, asset assessment, damage identification, threat scenario identification, attack path analysis, risk handling, security objectives and security requirements, and the like. Abstracting into a standard flow chart, triggering events, triggering conditions, gateways and the like among all phases. And (4) utilizing a Flowable flow engine to appoint gradual circulation according to flow definition, so as to realize automation of the risk assessment workflow. The related process is as follows:
firstly, an assessment engineer creates a risk assessment project and inputs information such as project name, project type and creator;
secondly, providing a data flow graph and a project document required by evaluation by an evaluation engineer through uploading and online design;
thirdly, the assessment engineer identifies assets and confirms related safety attributes;
fourthly, the assessment engineer identifies a damage scene and a threat scene;
fifthly, evaluating an engineer cooperative business/function development engineer, analyzing S/F/O/P influence, and automatically generating an influence grade;
meanwhile, a cooperative test engineer analyzes an attack path and determines an attack feasibility level;
and sixthly, automatically generating a risk grade according to the influence grade and the attack feasibility grade.
Seventhly, jointly determining a risk disposal strategy by an assessment engineer and a test engineer in cooperation with a solution engineer;
eighthly, determining a safety target and safety requirements by the evaluation engineer in cooperation with other engineers;
ninthly, performing overall evaluation acceptance by the acceptance staff in cooperation with other engineers;
the fourth aspect provides an agile management engine for automobile information security risk assessment, which realizes cooperative work, backlog, progress tracking and version management.
And in cooperation, the evaluation team members can cooperatively carry out risk evaluation work in different stages of different evaluation projects and projects in the system. The responsibility division can be carried out on the team members, and special personnel are allocated to take charge of each stage of risk assessment, and each assessment work is carried out cooperatively by assessment personnel, business/function developers, testing personnel and solution personnel. Meanwhile, the assessment team can simultaneously develop a plurality of risk assessment projects, and the plurality of projects are carried out synchronously.
The backlog is used, the daily backlog list is updated by using intelligent personalized suggestions, backlog tasks can be subdivided into simple steps, expiration dates are added, and daily list reminders are set. Sharing of the to-do task list with team members is supported.
And tracking progress, and counting the progress condition of the project, including work task amount, completed condition, work time consumption and the like. Progress is made for the project population and team members. And graphically displaying through modes such as a burnout chart and the like so as to control the project progress for project responsible persons.
Version management, which records and maintains the evaluation process of the risk evaluation item, and comprises the following functions: initializing operations, creating, committing, undoing, viewing commit history, branching and tagging, and the like. The relevant operations are as follows:
1. creating a version library, and creating the new version library for the current project in the version management service when creating the new project;
2. submitting a stage evaluation result, generating data such as related asset data and threat scenes after the risk evaluation work is carried out, and uploading the data to a version management service project warehouse;
3. canceling submission, namely canceling the last submitted content and needing to restore the previous version;
4. viewing historical record information submitted by the project, including a submitter, a modification position, a modification result and the like;
5. the system comprises branches and labels, wherein different branches are created for a current project, and as the iteration model of a money product, the branches can be used for management and the different branches can be labeled;
in a fifth aspect, a high performance and high reliability distributed file storage engine is provided. The data types of the risk assessment system can be divided into structured data and unstructured data. The system structured data is stored in a MySQL database; the system unstructured data is stored in the underlying distributed file system.
Structured data is mainly written into a MySQL database cluster by calling a background writing interface from the front end and starting through a JDBC database. MSQL cluster configuration master-slave copy and read-write separation, improve reliability and performance of the database; the system unstructured data is mainly pictures and project related development documents. The data is stored in a distributed file system, and the MySQL database stores the storage path of the picture.
The distributed file storage adopts a distributed file system and a general storage server, and has the advantages of high expansion, easy operation and maintenance and the like. High expansion, no restriction of a traditional centralized storage controller, and linear increase of capacity expansion performance; and unified management of multi-type file objects is supported. Supporting heterogeneous storage, the SSD and the mechanical hard disk can be used simultaneously, and an independent hard disk identifier can be established for the hard disk to specify data to be stored to a specific magnetic disk.
And in a sixth aspect, a fast risk assessment system reporting engine is provided. And performing stage statistical analysis on the risk assessment process, generating an assessment report and a visual display, and finally generating and exporting the risk assessment report.
The statistical types include: carrying out asset identification statistics, wherein different types of assets are counted; carrying out damage scene statistics, and carrying out statistics on different influence levels; threat scene statistics, wherein different threat types are counted; carrying out attack path statistics, and carrying out statistics on different attack feasibility; risk disposal statistics, which is to perform statistics on different risk levels and risk disposal strategies, and the like; and 4, safety requirement statistics, wherein statistics is carried out on different safety requirement distributions.
According to the statistical result, graphical display support is carried out, various graphs such as a histogram and a pie chart are displayed, and the statistical information of the project is displayed more visually.
In the asset evaluation stage, a project asset report can be exported; in the damage scene analysis stage, a project damage scene report can be exported; a threat scene analysis stage, which can derive an item threat scene report; an attack path analysis stage, which can derive an attack path report; in the risk disposal stage, a risk disposal report can be led out; in the safe target stage, a safe target report can be exported; in the safety requirement stage, a safety requirement report can be exported; and finally generating and exporting a risk assessment report.
In a seventh aspect, a visual log analysis engine is provided, which collects, analyzes and visually displays system logs by using a log analysis suite ELK, so as to realize quick positioning of system faults and propose a solution. The main module comprises:
collecting logs, deploying a log collection service on nodes, and carrying out mobile phone and preprocessing on running logs generated by a system and a server;
log transmission, namely transmitting log data to a log cleaning/filtering service for processing, message middleware or directly forwarding the log data to a log analysis engine for formatting;
log storage, namely storing formatted logs in a storage module of a distributed file system or a log analysis engine;
and log analysis, namely, storing and establishing an inverted index based on the data fragments through a log analysis engine to realize full text search and real-time index and analysis, and analyzing a system and a network.
And the alarm prompt can provide an error report, monitor the heartbeat of the process, use the memory, use the network state and the storage space, and prompt an alarm to a user according to an alarm threshold value set by the system.
Firstly, carrying out example description on the work of each engine;
the system provides an online design engine for constructing an automobile risk assessment model. And performing secondary development based on Drawio, and automatically integrating with a risk assessment automation system. The method mainly comprises the following steps:
1. adding the content of the Drawio-related front-end code put in the webapp to the original front-end item;
2. modifying the front section page to hide the menu buttons;
3. modifying the subsequent back end of the js file under webapp to match with a corresponding interface;
4. adding ajax requests can store drawing information in a database;
the overall change is that the display state of a menu bar and some functions are noted, the scratch pad is modified into a project library which can be saved in a local database, drawing information is saved in a distributed file system, the attribute can be bound to elements (the data is saved in the database), the preview function is adapted with a system import and export engine, and the like.
The system provides an automatic workflow engine for automobile information security risk assessment, integrates an automobile information security risk assessment flow based on a Flowable workflow engine, and achieves automation of assessment. The method mainly comprises the following steps:
1. configuring database information required by the Flowable;
2. reading a workflow of automobile information security risk assessment;
3. deploy workflow process engine getunitimeservice ();
4. opening procedure
runtimeService.startProcessInstanceByKey("myProcess");
5. Executing step by step according to a defined work flow chart, and finally finishing the process;
the system provides an automobile information security wind direction evaluation authority management engine which is realized based on an open source security framework Apache Shiro. The method realizes the operation of user authentication, full-line inspection, password management and session management.
The system provides an agile management engine for evaluating the wind direction of automobile information safety, combines the user management of the system, and realizes authority management, cooperative work and version management of risk evaluation projects based on open source version management tool Gitlab secondary development. The method mainly comprises the following steps:
1. deploying private Gitlab services in a private cloud;
2. obtaining user roles from a user management database, and creating corresponding users in the Gitlab;
3. providing account password for identity authentication through a Session interface;
4. determining whether the project can be submitted to be modified or returned to the historical version according to the user authority;
5. creating an initial project repository (existing projects may also be retrieved from a version repository);
6. submitting a project evaluation result;
7. and (3) other operations: canceling modification, viewing submission history, creating branches, labeling and the like;
the present system provides a high performance and highly reliable distributed file storage engine. The application layer data is cached by Redis, read-write separation is configured by a MySQL cluster, high performance and high reliability of the application layer are achieved, and a Glusterfs distributed file system is adopted at the bottom layer.
1. A user writes data into a MySQL database through a front-end page (permission verification) or a workflow engine;
2. the MySQL cluster synchronously modifies the result from the node through bin logs;
3. writing the data into a Glusterfs cluster;
4. setting a backup strategy, and automatically synchronizing data among nodes;
the system provides a rapid risk assessment system report engine which is realized based on an open source tool Apache POI, an html2canvas and a jpdf. The method mainly comprises the following steps:
and an Office file export step, adopting Apache POI to import and export the Office file. The related steps are as follows:
1. creating an Excel work file object;
2. creating a table object according to the file object;
3. creating a row object of the table according to the table object;
4. creating a cell object of the table according to the row object;
5. inserting data into the designated position;
6. storing data in a file in a streaming manner;
the Html is exported as a PDF document. The method mainly comprises the following steps:
1. converting html into pictures;
2. defining the size of a picture, and converting the picture into pdf through jpdf;
3. downloading PDF to local;
the system provides a visual log analysis engine, and the analytic search, the Logstash and the Kibana are adopted to provide the analysis and visual log analysis engine for a risk assessment system. The related steps are as follows:
1. deploying and starting a Beat acquisition suite in each node;
2. configuring a system operation and operation log directory;
3. reading a log file and sending the log file to a log processing component;
4. the log processing component filters and converts the acquired logs and forwards the log analysis component;
5. the filtered and converted logs, full-text search, structured search and analysis are performed through a log analysis component;
through the display component, various dimensional tables and graphs are generated, and a visual interactive page is provided.
The above description is only a preferred embodiment of the present invention, and the protection scope of the present invention is not limited to the above embodiments, and all technical solutions belonging to the idea of the present invention belong to the protection scope of the present invention. It should be noted that modifications and embellishments within the scope of the invention may occur to those skilled in the art without departing from the principle of the invention, and are considered to be within the scope of the invention.