12
CyberSecurity,US CNCI-SCRM, Public-Private STANDARDIZATION … Countering-COUNTERFEITS @ ANSI’s – “Crossing Borders and Sectors: Exploring Robust Anti-Counterfeiting Solutions” (22 Sep 2010 in Crystal City, VA) [email protected] Trusted Mission Systems & Networks OASD-NII / DoD CIO

Countering-COUNTERFEITS documents/Meetings... · Internet • Domain Name System • Web Hosting Internet Domain Name System • Web Hosting Control Systems SCADA • PCS • DCS

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Countering-COUNTERFEITS documents/Meetings... · Internet • Domain Name System • Web Hosting Internet Domain Name System • Web Hosting Control Systems SCADA • PCS • DCS

CyberSecurity,US CNCI-SCRM, Public-Private STANDARDIZATION …

Countering-COUNTERFEITS

@ ANSI’s – “Crossing Borders and Sectors: Exploring Robust Anti-Counterfeiting Solutions”

(22 Sep 2010 in Crystal City, VA)

[email protected] Mission Systems & Networks

OASD-NII / DoD CIOUnclassified / FOUO

Page 2: Countering-COUNTERFEITS documents/Meetings... · Internet • Domain Name System • Web Hosting Internet Domain Name System • Web Hosting Control Systems SCADA • PCS • DCS

CyberSecurity

Page 3: Countering-COUNTERFEITS documents/Meetings... · Internet • Domain Name System • Web Hosting Internet Domain Name System • Web Hosting Control Systems SCADA • PCS • DCS

3

Trusted Internet Connections

Trusted Internet Connections

Focu

s A

rea

1

Deploy Passive Sensors Across Federal Systems

Deploy Passive Sensors Across Federal Systems

Pursue Deployment of Intrusion Prevention

System

(Dynamic Defense)

Pursue Deployment of Intrusion Prevention

System

(Dynamic Defense)

Coordinate and Redirect R&D Efforts

Coordinate and Redirect R&D Efforts

Connect Current Centers to Enhance

Cyber Situational Awareness

Connect Current Centers to Enhance

Cyber Situational Awareness

Increase the Security of the Classified

Networks

Increase the Security of the Classified

Networks

Develop a Government Wide Cyber

Counterintelligence Plan

Develop a Government Wide Cyber

Counterintelligence Plan

Define and Develop Enduring Leap Ahead

Technology, Strategies & Programs

Define and Develop Enduring Leap Ahead

Technology, Strategies & Programs

Expand EducationExpand Education

Define the Federal Role for Extending Cybersecurity into

Critical Infrastructure Domains

Define the Federal Role for Extending Cybersecurity into

Critical Infrastructure Domains

Develop Multi-Pronged Approach for Global Supply Chain Risk

Management

Develop Multi-Pronged Approach for Global Supply Chain Risk

Management

Define and Develop Enduring Deterrence

Strategies & Programs

Define and Develop Enduring Deterrence

Strategies & Programs

Focu

s A

rea

2Fo

cus

Are

a 3

Establish a front line of defense

Demonstrate resolve to secure U.S. cyberspace & set conditions for long-term success

Shape the future environment to demonstrate resolve to secureU.S. technological advantage and address new attack and defend vectors

Comprehensive National Cybersecurity Initiative (CNCI)

Page 4: Countering-COUNTERFEITS documents/Meetings... · Internet • Domain Name System • Web Hosting Internet Domain Name System • Web Hosting Control Systems SCADA • PCS • DCS

Globalization brings challenges

• We all have suppliers that we may not know and may never see

– Less insight into suppliers’security practices

– Less control over business practices

– Increased vulnerability to adversaries

“Scope of Supplier Expansion and Foreign Involvement” graphic in DACS www.softwaretechnews.com Secure Software Engineering, July 2005 article “Software Development Security: A Risk Management Perspective” synopsis of May 2004 GAO-04-678 report “Defense Acquisition: Knowledge of Software Suppliers Needed to Manage Risks”

Page 5: Countering-COUNTERFEITS documents/Meetings... · Internet • Domain Name System • Web Hosting Internet Domain Name System • Web Hosting Control Systems SCADA • PCS • DCS

* Source – 2009 Verizon Data Breach Investigations Report

Who is behind data breaches?

74% resulted from external sources (+1%).20% were caused by insiders (+2%).32% implicated business partners (-7%).39% involved multiple parties (+9%).

How do breaches occur?

7% were aided by significant errors (<>).64% resulted from hacking (+5%). 38% utilized malware (+7%.)22% involved privilege misuse (+7%).9% occurred via physical attacks (+7%).

Today’s Reality of our Increased Dependency Requires an Increased Confidence in our ICT

Services• Managed Security• Information Services

Services• Managed Security• Information Services

Software• Financial Systems• Human Resources

Software• Financial Systems• Human Resources

• Reservoirs Treatment plants• Farms• Food Processing Plants• Hospitals• Power Plants• Production Sites

• Reservoirs Treatment plants• Farms• Food Processing Plants• Hospitals• Power Plants• Production Sites

• Railroad Tracks• Highway Bridges• Pipelines• Ports• Cable• Fiber

• Railroad Tracks• Highway Bridges• Pipelines• Ports• Cable• Fiber

• FDIC Institutions• Chemical Plants• Delivery Sites• Nuclear power plants• Government Facilities• Dams

• FDIC Institutions• Chemical Plants• Delivery Sites• Nuclear power plants• Government Facilities• Dams

• Agriculture and Food• Energy• Transportation• Chemical Industry• Postal and Shipping

• Agriculture and Food• Energy• Transportation• Chemical Industry• Postal and Shipping

• Water• Public Health• Telecommunications• Banking and Finance• Key Assets

• Water• Public Health• Telecommunications• Banking and Finance• Key Assets

Hardware• Database Servers• Networking Equipment

Hardware• Database Servers• Networking Equipment

Internet• Domain Name System• Web Hosting

Internet• Domain Name System• Web Hosting

Control Systems• SCADA• PCS• DCS

Control Systems• SCADA• PCS• DCS

- Dependencies on technology are greater then ever

-- Possibility of disruption is greater than ever because software (and overall ICT) is vulnerable

--- Loss of confidence alone can lead to stakeholder actions that disrupt critical business activities

Internet users in the world: 1,766,727,004E-mail messages sent today: 215, 674, 475, 422Blog Posts Today: 458, 972Google searches Today: 2,302,204,936

Critical Infrastructure / Key Resources

Physical Infrastructure

Cyber Infrastructure Cyber

Assets

Physical

Assets

Sectors

Page 6: Countering-COUNTERFEITS documents/Meetings... · Internet • Domain Name System • Web Hosting Internet Domain Name System • Web Hosting Control Systems SCADA • PCS • DCS

Systems Assurance TRADESPACE

Hig

her C

OST

can

buy

Ris

k R

educ

tion

Lower Cost usually means Higher RISKSlippery Slope /Unmeasurable Reqts

SCRM Standardization and Levels of Assurance will enable Acquirers to better communicate requirements to Systems Integrators & Suppliers, so that the “supply chain” can demonstrate good/best practices and enable better overall risk measurement and management.

Unique Requirements

COTS products

Suppliers

Acquirers

Systems Integrators

Page 7: Countering-COUNTERFEITS documents/Meetings... · Internet • Domain Name System • Web Hosting Internet Domain Name System • Web Hosting Control Systems SCADA • PCS • DCS

SCRM Stakeholders

CIP

DoD DHS & IACommercial

Industry

SCRM STANDARDIZATION

Enabled by Informatio

n Sharing

Other Users

SCRM “commercially acceptable global

standard(s)”must be derived from Commercial Industry

Best Practices.

US (CNCI ) has vital interest in the global supply chain.

SCRM Standardization Requires Public-Private Collaborative Effort

Page 8: Countering-COUNTERFEITS documents/Meetings... · Internet • Domain Name System • Web Hosting Internet Domain Name System • Web Hosting Control Systems SCADA • PCS • DCS

Standards Development OrganizationsSDOs Landscape:

an SCRM Perspective

Page 9: Countering-COUNTERFEITS documents/Meetings... · Internet • Domain Name System • Web Hosting Internet Domain Name System • Web Hosting Control Systems SCADA • PCS • DCS

SCRM Study Periods:Nov’09 – Apr’10 / May-Oct’10

SCRMAd Hoc

WG

SCRMAd Hoc

WG

•Potential ICT SCRM ISO Standard•Development 2010-2013•Adoption 2013-2016

Page 10: Countering-COUNTERFEITS documents/Meetings... · Internet • Domain Name System • Web Hosting Internet Domain Name System • Web Hosting Control Systems SCADA • PCS • DCS

10

SCRM & C2T2 in the DoD Lifecycle

254 Report 254 Report Identified a Identified a Need for a Need for a

PlanPlan--ofof--Action Action onon

COUNTERING COUNTERING COUNTERFEITSCOUNTERFEITS

especially especially duringduring

OPERATIONSOPERATIONS&&

SUSTAINMENTSUSTAINMENT

““CNCICNCI--SCRM SCRM is is multimulti--pronged approach for global supply pronged approach for global supply chain risk management. chain risk management. ……Managing this risk will require a Managing this risk will require a

greater awareness of the threats, vulnerabilities, and greater awareness of the threats, vulnerabilities, and consequences associated with acquisition decisions; the consequences associated with acquisition decisions; the development and employment of tools and resources to development and employment of tools and resources to

technically and operationally mitigate risk across the technically and operationally mitigate risk across the lifecycle of products (from design through retirement); the lifecycle of products (from design through retirement); the development of new acquisition policies and practices that development of new acquisition policies and practices that

reflect the complex global marketplace; and partnership reflect the complex global marketplace; and partnership with industry to develop and adopt supply chain and risk with industry to develop and adopt supply chain and risk

management standards and best practices.management standards and best practices.””

Page 11: Countering-COUNTERFEITS documents/Meetings... · Internet • Domain Name System • Web Hosting Internet Domain Name System • Web Hosting Control Systems SCADA • PCS • DCS

Countering CounterfeitsStrategic Concept

11

SCRMSCRMActivitiesActivities

Countering Countering CounterfeitsCounterfeits

(C2T2)(C2T2)ActivitiesActivities

• Law• Policy & Guidance• Process -> from fault/failures to

T&E for counterfeit assessment• People-> Training & Education• Technology -> R&D / S&T• (Knowledge -> Leadership)

Number of Number of Known Known

CounterfeitsCounterfeitsIs IncreasingIs Increasing

From From Two Major Two Major SourcesSources

Criminal Criminal ElementElement

Bad Bad ActorsActors

Coord. withCoord. withWH directed WH directed IPR.gov TFIPR.gov TF

Page 12: Countering-COUNTERFEITS documents/Meetings... · Internet • Domain Name System • Web Hosting Internet Domain Name System • Web Hosting Control Systems SCADA • PCS • DCS

CyberSecurity,US CNCI-SCRM, Public-Private STANDARDIZATION …

Countering-COUNTERFEITS

[email protected] Mission Systems & Networks

OASD-NII / DoD CIO

Unclassified / FOUO