37
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Organization, Mission, and Information Systems View 2009 Workshop on Cyber Security and Global Affairs Oxford University, United Kingdom August 5, 2009 Dr. Ron Ross Computer Security Division Information Technology Laboratory

Dr. Ron Ross Computer Security Division Information Technology Laboratory

  • Upload
    belita

  • View
    59

  • Download
    3

Embed Size (px)

DESCRIPTION

Integrated Enterprise-wide Risk Management Organization, Mission, and Information Systems View 2009 Workshop on Cyber Security and Global Affairs Oxford University, United Kingdom August 5, 2009. Dr. Ron Ross Computer Security Division Information Technology Laboratory. The Threat Situation. - PowerPoint PPT Presentation

Citation preview

Page 1: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1

Integrated Enterprise-wide Risk ManagementOrganization, Mission, and Information Systems View

2009 Workshop on Cyber Security and Global AffairsOxford University, United Kingdom

August 5, 2009

Dr. Ron Ross

Computer Security DivisionInformation Technology Laboratory

Page 2: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 2

The Threat SituationContinuing serious cyber attacks on federal informationsystems, large and small; targeting key federal operationsand assets… Attacks are organized, disciplined, aggressive, and well resourced;

many are extremely sophisticated. Adversaries are nation states, terrorist groups, criminals, hackers,

and individuals or groups with intentions of compromising federal information systems.

Effective deployment of malicious software causing significant exfiltration of sensitive information (including intellectual property) and potential for disruption of critical information systems/services.

Page 3: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 3

Unconventional Threats to SecurityConnectivity

Complexity

Page 4: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 4

Asymmetry of Cyber Warfare

The weapons of choice are—

Laptop computers, hand-held devices, cell phones.

Sophisticated attack tools and techniques downloadable from the Internet.

World-wide telecommunication networks including telephone networks, radio, and microwave.

Resulting in low-cost, highly destructive attack potential.

Page 5: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 5

What is at Risk? Federal information systems supporting Defense, Civil, and

Intelligence agencies within the federal government. Private sector information systems supporting U.S. industry

and businesses (intellectual capital). Information systems supporting critical infrastructures within

the United States (public and private sector) including: Energy (electrical, nuclear, gas and oil, dams) Transportation (air, road, rail, port, waterways) Public Health Systems / Emergency Services Information and Telecommunications Defense Industry Banking and Finance Postal and Shipping Agriculture / Food / Water / Chemical

Page 6: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 6

Unconventional WisdomNEW RULE: Boundary protection is no longer sufficientagainst high-end threats capable of launching sophisticatedcyber attacks... Complexity of IT products and information systems.

Insufficient penetration resistance (trustworthiness) in commercial IT products.

Insufficient application of information system and security engineering practices.

Undisciplined behavior and use of information technology and systems by individuals.

Page 7: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 7

The FundamentalsFighting and winning a 21st century cyber war requires21st century strategies, tactics, training, and technologies… Integration of information security into enterprise architectures and system life

cycle processes. Common, shared information security standards for unified cyber command. Enterprise-wide, risk-based protection strategies. Flexible and agile selection / deployment of safeguards and countermeasures

(maximum tactical advantage based on missions / environments of operation). More resilient, penetration-resistant information systems. Competent, capable cyber warriors.

Page 8: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 8

Information Security Transformation Establishing a common approach to risk management.

Converging parallel efforts across U.S. Intelligence Community, Defense Department, and federal civil agencies.

Leveraging partnerships with NIST and the national security community.

Benefiting the federal government and its partners. Facilitating information sharing and reciprocity. Achieving process efficiencies. Improving communication and increasing decision advantage. Promoting outreach to state and local governments and private

sector (including contracting base).

Page 9: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 9

Transformation Goals Establish a common approach to risk management.

Define a common set of trust (impact) levels; adopt and apply those levels across the federal government.

Adopt reciprocity as the norm, enabling organizations to accept the approvals by others without retesting or reviewing.

Define, document, and adopt common security controls.

Adopt a common security lexicon—providing a common language and common understanding.

Page 10: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 10

Transformation Goals Institute a senior risk executive function, which bases

decisions on an “enterprise” view of risk considering all factors, including mission, IT, budget, and security.

Incorporate information security into Enterprise Architectures and deliver security as common enterprise service across the federal government.

Enable a common process that incorporates information security within the “life cycle” processes and eliminate security-specific processes.

Page 11: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 11

A Unified FrameworkFor Information Security

The Generalized Model

Common Information Security Requirements

Unique Information Security Requirements

The “Delta”

Foundational Set of Information Security Standards and Guidance

• Standardized risk management process• Standardized security categorization (criticality/sensitivity)• Standardized security controls (safeguards/countermeasures)• Standardized security assessment procedures• Standardized security authorization process

Intelligence Community

Department of Defense

Federal Civil Agencies

National security and non national security information systems

Page 12: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 12

Compliance vs. Risk-based Protection

“We should not be consumed with countingthe number of dead bolts on the front doorwhen the back door is wide open...”

-- Anonymous

Page 13: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 13

Risk-Based Protection Enterprise missions and business processes drive security

requirements and associated safeguards and countermeasures for organizational information systems.

Highly flexible implementation; recognizing diversity in missions/business processes and operational environments.

Senior leaders take ownership of their security plans including the safeguards/countermeasures for the information systems.

Senior leaders are both responsible and accountable for their information security decisions; understanding, acknowledging, and explicitly accepting resulting mission/business risk.

Page 14: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 14

Information Security Programs

Adversaries attack the weakest link…where is yours?

Risk assessment Security planning, policies, procedures Configuration management and control Contingency planning Incident response planning Security awareness and training Security in acquisitions Physical security Personnel security Security assessments Certification and accreditation

Access control mechanisms Identification & authentication mechanisms (Biometrics, tokens, passwords) Audit mechanisms Encryption mechanisms Boundary and network protection devices (Firewalls, guards, routers, gateways) Intrusion protection/detection systems Security configuration settings Anti-viral, anti-spyware, anti-spam software Smart cards

Links in the Security Chain: Management, Operational, and Technical Controls

Page 15: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 15

Strategic InitiativesThe Long-term View

Build a unified information security framework for the federal government and support contractors.

Integrate information security and privacy requirements into enterprise architectures.

Employ systems and security engineering techniques to develop more secure (penetration-resistant) information systems.

Page 16: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 16

Tactical InitiativesThe Short-term View

Update security controls catalog and baselines. Delivery vehicle: NIST Special Publication 800-53, Revision 3

Develop enterprise-wide risk management guidance. Delivery vehicle: NIST Special Publication 800-39

Restructure the current certification and accreditation process for information systems. Delivery vehicle: NIST Special Publication 800-37, Revision 1

Provide more targeted guidance on risk assessments. Delivery vehicle: NIST Special Publication 800-30, Revision 1

Page 17: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 17

Risk Management Hierarchy

NISTSP 800-39

LEVEL 3Information System

LEVEL 2Mission / Business Process

LEVEL 1Organization

Multi-tiered Risk Management Approach Implemented by the Risk Executive Function Enterprise Architecture and SDLC Focus Flexible and Agile Implementation

STRATEGIC RISK FOCUS

TACTICAL RISK FOCUS

Page 18: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 18

Risk Management Hierarchy

NISTSP 800-39

Risk Management Strategy

LEVEL 3Information System

LEVEL 2Mission / Business Process

LEVEL 1Organization

Risk Executive Function (Oversight and Governance) Risk Assessment Methodologies Risk Mitigation Approaches Risk Tolerance Risk Monitoring Approaches Linkage to ISO/IEC 27001

Page 19: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 19

Risk Management Hierarchy

NISTSP 800-39

Risk Management Strategy

LEVEL 3Information System

LEVEL 2Mission / Business Process

LEVEL 1Organization

Mission / Business Processes Information Flows Information Categorization Information Protection Strategy Information Security Requirements Linkage to Enterprise Architecture

Page 20: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 20

Risk Management Hierarchy

NISTSP 800-37

LEVEL 3Information System

LEVEL 2Mission / Business Process

LEVEL 1Organization

Linkage to SDLC Information System Categorization Selection of Security Controls Security Control Allocation and Implementation Security Control Assessment Risk Acceptance Continuous Monitoring

Risk Management Framework

Page 21: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 21

The Central QuestionFrom Two Perspectives

Security Capability PerspectiveWhat security capability is needed to defend against a specific class of cyber threat, avoid adverse impacts, and achieve mission success? (REQUIREMENTS DEFINITION)

Threat Capability PerspectiveGiven a certain level of security capability, what class of cyber threat can be addressed and is that capability sufficient to avoid adverse impacts and achieve mission success? (GAP ANALYSIS)

Page 22: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 22

Risk Management Framework

Security Life CycleSP 800-39

Determine security control effectiveness(i.e., controls implemented correctly,

operating as intended, meeting security requirements for information system).

SP 800-53A

ASSESSSecurity Controls

Define criticality/sensitivity of information system according to

potential worst-case, adverse impact to mission/business.

FIPS 199 / SP 800-60

CATEGORIZE Information System

Starting Point

Continuously track changes to the information system that may affect

security controls and reassess control effectiveness.

SP 800-37 / SP 800-53A

MONITORSecurity State

SP 800-37

AUTHORIZE Information System

Determine risk to organizational operations and assets, individuals,

other organizations, and the Nation;if acceptable, authorize operation.

Implement security controls within enterprise architecture using sound

systems engineering practices; apply security configuration settings.

IMPLEMENT Security Controls

SP 800-70

FIPS 200 / SP 800-53

SELECT Security Controls

Select baseline security controls; apply tailoring guidance and

supplement controls as needed based on risk assessment.

Page 23: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 23

RMF Characteristics The NIST Risk Management Framework and the

associated security standards and guidance documents provide a process that is: Disciplined Flexible Extensible Repeatable Organized Structured

“Building information security into the infrastructure of the organization…so that critical enterprise missions and business cases will be protected.”

Page 24: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 24

Security Control Selection STEP 1: Select Baseline Security Controls

(NECESSARY TO COUNTER THREATS)

STEP 2: Tailor Baseline Security Controls(NECESSARY TO COUNTER THREATS)

STEP 3: Supplement Tailored Baseline(SUFFICIENT TO COUNTER THREATS)

CATEGORIZEInformation/System

ASSESSSecurity Controls

AUTHORIZEInformation System

IMPLEMENTSecurity Controls

MONITORSecurity Controls

SELECTSecurity Controls

Risk ManagementFramework

Page 25: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 25

Cyber Preparedness

THREAT LEVEL 5 CYBER PREP LEVEL 5

THREAT LEVEL 4 CYBER PREP LEVEL 4

THREAT LEVEL 3 CYBER PREP LEVEL 3

THREAT LEVEL 2 CYBER PREP LEVEL 2

THREAT LEVEL 1 CYBER PREP LEVEL 1

Adversary Capabilities

andIntentions

Defender Security

Capability

HIGH

LOW

HIGH

LOW

An increasingly sophisticated and motivated threat requires increasing preparedness…

Page 26: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 26

Dual Protection Strategies

Boundary ProtectionPrimary Consideration: Penetration ResistanceAdversary Location: Outside the Defensive PerimeterObjective: Repelling the Attack

Agile DefensePrimary Consideration: Information System ResilienceAdversary Location: Inside the Defensive Perimeter

Objective: Operating while under Attack

Page 27: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 27

Agile Defense Boundary protection is a necessary but not sufficient

condition for Agile Defense Examples of Agile Defense measures:

Compartmentalization and segregation of critical assets Targeted allocation of security controls Virtualization and obfuscation techniques Encryption of data at rest Limiting of privileges Routine reconstitution to known secure state

Bottom Line: Limit damage of hostile attack while operating in a (potentially)degraded mode…

Page 28: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 28

RISK EXECUTIVE FUNCTIONEnterprise-wide Oversight, Monitoring, and Risk Management Strategy

INFORMATIONSYSTEM

INFORMATIONSYSTEM

Common Controls(Inherited by Information Systems)

INFORMATIONSYSTEM

INFORMATIONSYSTEM

RMFRISK

MANAGEMENT FRAMEWORK

POAM

SAR

SP

Authorization Decision

Authorization Decision

POAM

SAR

SP

POAM

SAR

SP

Authorization Decision

POAM

SAR

SP

Authorization Decision

POAM

SAR

SP

Authorization Decision

POAM

SAR

SP

Authorization Decision

Architecture DescriptionArchitecture Reference Models

Segment and Solution ArchitecturesMission and Business ProcessesInformation System Boundaries

Organizational InputsLaws, Directives, Policy Guidance

Strategic Goals and ObjectivesPriorities and Resource Availability

Supply Chain Considerations

SP: Security PlanSAR: Security Assessment ReportPOAM: Plan of Action and Milestones

Page 29: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 29

Risk Executive Function

Establish organizational information security priorities. Allocate information security resources across the organization. Provide oversight of information system security categorizations. Identify and assign responsibility for common security controls. Provide guidance on security control selection (tailoring and supplementation). Define common security control inheritance relationships for information systems. Establish and apply mandatory security configuration settings. Identify and correct systemic weaknesses and deficiencies in information systems.

Managing Risk at the Organizational Level

RISK EXECUTIVE FUNCTIONCoordinated policy, risk, and security-related activities

Supporting organizational missions and business processes

Information system-specific considerations

Information System

Information System

Information System

Information System

Mission / Business Processes

Mission / Business Processes

Mission / Business Processes

Page 30: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 30

Trust and Reciprocity

Determining risk to the organization’s operations and assets, individuals, other

organizations, and the Nation; and the acceptability of such risk.

The objective is to achieve transparency of prospective partner’s information security programs and processes…establishing trust relationships based on common, shared risk management principles.

Organization One

INFORMATION SYSTEM

Plan of Action and Milestones

Security Assessment Report

Security Plan

Mission / BusinessInformation Flow

Risk Management Information

Plan of Action and Milestones

Security Assessment Report

Security Plan

Organization Two

INFORMATION SYSTEM

Determining risk to the organization’s operations and assets, individuals, other

organizations, and the Nation; and the acceptability of such risk.

Page 31: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 31

Key Risk Management Publication NIST Special Publication 800-53, Revision 3

Recommended Security Controls for Federal Information Systems and OrganizationsPublished: August 2009

Updating all material from NIST Special Publication 800-53, Revision 2 Incorporating security controls from the national security community Incorporating new security controls for advanced cyber threats Incorporating information security program-level controls Incorporating threat appendix for cyber preparedness

(Separately vetted and added to SP 800-53, Revision 3 when completed)

NISTSP 800-53

Page 32: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 32

Key Risk Management Publication NIST Special Publication 800-37, Revision 1

Guide for Applying the Risk Management Framework to Federal Information SystemsProjected: October 2009

Incorporating comments from Initial Public Draft Implementing guideline for Risk Management Framework Transforming previous certification and accreditation process Integrating Risk Management Framework into the SDLC Greater emphasis on ongoing monitoring of information system security Ongoing security authorizations informed by risk executive function Greater accountability and assurances for common (inherited) controls Increased use of automated support tools

NISTSP 800-37

Page 33: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 33

Key Risk Management Publication NIST Special Publication 800-39

Integrated Enterprise-wide Risk ManagementOrganization, Mission, and Information Systems View

Projected: December 2009

Incorporating public comments from NIST Special Publication 800-39, Second Public Draft

Incorporating three-tiered risk management approach: organization, mission/business process, and information system views

Incorporating cyber preparedness information Providing ISO/IEC 27001 mapping to risk management

publicationsNIST

SP 800-39

Page 34: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 34

Key Risk Management Publication NIST Special Publication 800-53A, Revision 1

Guide for Assessing the Security Controls in Federal Information Systems and OrganizationsProjected: January 2010

Updating all assessment procedures to ensure consistency with NIST Special Publication 800-53, Revision 3

Developing new assessment procedures for information security program management controls

Updating web-based assessment cases for inventory of assessment procedures

NISTSP 800-53A

Page 35: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 35

Key Risk Management Publication NIST Special Publication 800-30, Revision 1 (Initial Public Draft)

Guide for Conducting Risk AssessmentsProjected: January 2010

Down scoping current publication from risk management focus to risk assessment focus

Providing guidance for conducting risk assessments at each step in the Risk Management Framework

Incorporating threat information for cyber preparednessNIST

SP 800-30

Page 36: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 36

Transformation… Getting ThereCurrent State

Lack of reciprocity in authorization and assessment results

Resource intensive

Redundant and duplicative activities

Inconsistent policy and process implementation

Lack of automation (for both workflowand testing tools)

Lack of standardized documentation and artifacts to facilitate informed decisions

Three-year “Paperwork Drill”

The Future

Enabled reciprocityand information sharing

Improve security postures(architecture and information)

Streamline processes and improveend-product quality

Uniform set of policies and practices

Consistent implementation and useof automated tools

More effective resourceallocation; reduce costs

Continuous monitoring

Page 37: Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 37

Contact Information100 Bureau Drive Mailstop 8930

Gaithersburg, MD USA 20899-8930

Project Leader Administrative SupportDr. Ron Ross Peggy Himes(301) 975-5390 (301) 975-2489

[email protected] [email protected]

Senior Information Security Researchers and Technical SupportMarianne Swanson Dr. Stu Katzke (301) 975-3293 (301) 975-4768 [email protected] [email protected]

Pat Toth Arnold Johnson(301) 975-5140 (301) 975-3247 [email protected] [email protected]

Matt Scholl Kelley Dempsey(301) 975-2941 (301) [email protected] [email protected]

Web: csrc.nist.gov/sec-cert Comments: [email protected]