22
Cross-Agency Priority Goal: Cybersecurity – FY2013 Q1 Update 1 Cross Agency Priority Goal: Cybersecurity FY2013 Q1 Status Update Cross Agency Priority Goal Statement Executive branch departments and agencies will achieve 95% implementation of the Administration’s priority cybersecurity capabilities by the end of FY 2014. These capabilities include strong authentication, Trusted Internet Connections (TIC), and Continuous Monitoring. Goal Leader J. Michael Daniel, Special Assistant to the President and Cybersecurity Coordinator About this document The Cross-Agency Priority (CAP) Goals were a key innovation introduced in the FY2013 Federal Budget. These goals focus on 14 major issues that run across several Federal agencies. Each of these historic goals has a Goal Leader who is a senior level White House official and is fully accountable for the success and outcomes of the goal. Historically, areas of shared responsibility for multiple government agencies have been resistant to real progress. Success in these areas requires a new kind of management approach – one that brings people together from across and outside the Federal Government to coordinate their work and combine their skills, insights, and resources. The CAP Goals represent Presidential priorities for which this approach is likeliest to bear fruit. This report discusses one of these CAP Goals, the Cybersecurity Goal, in detail, describing the plan for achieving the goal and the current status of progress. To see the full list of CAP Goals and to find out more about them, we encourage you to visit performance.gov.

Png f41 cybersecurity update

Embed Size (px)

Citation preview

Page 1: Png f41 cybersecurity update

Cross-Agency Priority Goal: Cybersecurity – FY2013 Q1 Update 1

Cross Agency Priority Goal: Cybersecurity FY2013 Q1 Status Update

Cross Agency Priority Goal Statement Executive branch departments and agencies will achieve 95% implementation of the Administration’s priority cybersecurity capabilities by the end of FY 2014. These capabilities include strong authentication, Trusted Internet Connections (TIC), and Continuous Monitoring.

Goal Leader J. Michael Daniel, Special Assistant to the President and Cybersecurity Coordinator

About this document The Cross-Agency Priority (CAP) Goals were a key innovation introduced in the FY2013 Federal Budget. These goals focus on 14 major issues that run across several Federal agencies. Each of these historic goals has a Goal Leader who is a senior level White House official and is fully accountable for the success and outcomes of the goal.

Historically, areas of shared responsibility for multiple government agencies have been resistant to real progress. Success in these areas requires a new kind of management approach – one that brings people together from across and outside the Federal Government to coordinate their work and combine their skills, insights, and resources. The CAP Goals represent Presidential priorities for which this approach is likeliest to bear fruit.

This report discusses one of these CAP Goals, the Cybersecurity Goal, in detail, describing the plan for achieving the goal and the current status of progress. To see the full list of CAP Goals and to find out more about them, we encourage you to visit performance.gov.

Page 2: Png f41 cybersecurity update

Cross-Agency Priority Goal: Cybersecurity – FY2013 Q1 Update 2

Contents

Cross Agency Priority Goal Statement .......................................................................................................... 1

Goal Leader ................................................................................................................................................... 1

Overview ....................................................................................................................................................... 3

Strategies and Action Plan ............................................................................................................................ 3

Use the FISMA Governance Structure ...................................................................................................... 4

Embrace Federal Information Security Management Principles .............................................................. 4

Cross-Agency Coordination ....................................................................................................................... 5

Deputy Secretary Coordination ............................................................................................................ 5

Performance Improvement Officer (PIO)/Chief Financial Officer (CFO) Coordination ........................ 5

Chief Information Officer (CIO)/Chief Information Security Officer (CISO) Coordination .................... 6

National Security Systems Coordination ............................................................................................... 6

Monitoring and Reviewing Progress ............................................................................................................. 6

1. Longer-term Milestones ................................................................................................................... 7

2. Milestones for the Upcoming Quarter (FY2013 Q2) ......................................................................... 8

3. Contributing Programs and Other Factors ...................................................................................... 10

Progress Update .......................................................................................................................................... 13

Scorecards ............................................................................................................................................... 16

Key Indicators and Metrics ......................................................................................................................... 21

Milestones Accomplished to Date (FY13Q1) .............................................................................................. 22

Page 3: Png f41 cybersecurity update

Cross-Agency Priority Goal: Cybersecurity – FY2013 Q1 Update 3

Overview The Federal cybersecurity Cross-Agency Priority Goal helps Federal departments and agencies improve cybersecurity performance by focusing efforts on what data and information is entering and exiting their networks, what components are on their information networks and when their security status changes, and who is on their systems. The White House will focus agency efforts on improving the security of their networks by implementing the Administration’s priority cybersecurity capabilities and developing metrics to measure their success. The Administration’s priority cybersecurity capabilities are:

Trusted Internet Connections (TIC) - Consolidate external Internet traffic and ensure a set of common security capabilities for situational awareness and enhanced monitoring. Continuous Monitoring of Federal Information Systems - Transform the historically static security control assessment and authorization process into an integral part of a dynamic enterprise-wide risk management process. This change allows departments and agencies to maintain an ongoing near-real-time awareness and assessment of information security risk and rapidly respond to support organizational risk management decisions. Strong Authentication – Ensure only authorized employees have access to Federal information systems by requiring a higher level of assurance following the HSPD-12 Personal Identity Verification standard.

Strategies and Action Plan The Cybersecurity CAP Goal strategy is to help Federal departments and agencies improve cybersecurity performance so they can provide secure and effective services to the American people. Federal departments and agencies need to focus their cybersecurity activity on the most cost-effective and efficient cybersecurity controls relevant for Federal information system security.

Therefore, the Cybersecurity CAP goal strategy starts with holding agency leadership accountable for Cybersecurity. The Deputy Secretary for each agency is responsible with leading their organization’s efforts to implement the Administration’s priority cybersecurity capabilities. The Performance Improvement Officer (PIO), frequently the same person as the Chief Financial Officer (CFO), is

Effective leadership anchored at the White House alone will not be sufficient to achieve the broad range of objectives necessary to lead the United States in the digital age. Leadership and accountability must extend throughout the Federal government. Cyberspace Policy Review – May 2009

Page 4: Png f41 cybersecurity update

Cross-Agency Priority Goal: Cybersecurity – FY2013 Q1 Update 4

responsible for improving the performance of their department or agency programs, including Cybersecurity performance. An empowered Chief Information Officer (CIO) with executive leadership support, authority and resources to direct agency activity is necessary to successfully implement these priorities and report agency progress to the Deputy Secretary.

Implementation should be coordinated across multiple stakeholders, including cross-agency coordination using established bodies such as the President’s Management Council (PMC), the Performance Improvement Council (PIC), and the CIO Council.

Finally, these priority capabilities should be included in agency strategic plans, budget submissions, and annual performance plans.

Use the FISMA Governance Structure The Cybersecurity Cross Agency Priority (CAP) Goal uses the Federal Information Security Management Act (FISMA) of 2002 reporting structure, guidelines and metrics to measure agency progress. FISMA requires agencies to provide information security protections commensurate with risks and their potential harms to governmental information systems, to review their information security program, and to report results to the Office of Management and Budget (OMB). OMB uses this data to assist in its oversight responsibilities and to prepare an annual report to Congress on agency compliance with the act.

OMB Memorandum 10-28 “Clarifying Cybersecurity Responsibilities and Activities of the Executive Office of the President (EOP) and the Department of Homeland Security (DHS)” designated DHS to exercise primary responsibility within the Executive Branch for the operational aspects of Federal department and agency cybersecurity initiatives with respect to the Federal information systems that fall within FISMA under 44 U.S.C. §3543. OMB requires departments and agencies to adhere to DHS direction for reporting data on the security status of their information systems through the DHS CyberScope reporting tool.

Embrace Federal Information Security Management Principles The Administration’s priority cybersecurity capabilities and the Cybersecurity CAP goal embrace three principles for good Federal information security management:

Accountability with standard milestones – Department and agency progress on the Cybersecurity CAP Goal is measured quarterly and annually through the FISMA reporting process. Agencies and components are held accountable to leadership and the public through increased visibility and reporting frequency. Regular progress reporting occurs through manual and automated data feeds that are reported to

Page 5: Png f41 cybersecurity update

Cross-Agency Priority Goal: Cybersecurity – FY2013 Q1 Update 5

OMB, DHS, and agency leadership, including the Deputy Secretary and Performance Improvement Officer.

o Agencies are encouraged to highlight their progress towards the Administration’s priority cybersecurity capabilities through additional descriptions of specific activities that may not be captured in a reportable FISMA metric. Additionally, agencies are encouraged to highlight for senior leadership review any impediments that reduce or restrict progress on implementing these priority capabilities, especially if agencies do not expect to meet their planned cybersecurity capability targets.

Visibility through automation - Adopt automated reporting standards for continuous monitoring to increase visibility and sharing of agency cybersecurity posture. Enhanced visibility of the current security status and threats to the Federal IT environment provides greater situational awareness to improve defense and response. Mature information security management measurement – It is hard to measure good cybersecurity, so the Federal government is focusing on improving cybersecurity performance by evolving from checklist audits to outcome-based maturity metrics for department and agency information security management.

Cross-Agency Coordination The Administration’s priority cybersecurity capabilities require cross-agency coordination using established bodies:

Deputy Secretary Coordination

President’s Management Council (PMC): The PMC provides performance and management leadership throughout the executive branch of the Federal Government and advises and assists the President on government reform. The PMC is focused on identifying and adopting cross-cutting best practices government-wide and working with the other Councils to streamline policy development and facilitate cost savings.

Performance Improvement Officer (PIO)/Chief Financial Officer (CFO) Coordination

Performance Improvement Council (PIC): The PIC is composed of the Performance Improvement Officers (PIOs) of Federal agencies and departments and senior OMB officials. The PIC collaborates to improve the performance of Federal programs and facilitates information exchange among agencies. The PIC provides support to Federal Government PIOs and other program officials to facilitate coordination on cross-cutting performance areas, to include work in support of Federal Priority Goals.

Page 6: Png f41 cybersecurity update

Cross-Agency Priority Goal: Cybersecurity – FY2013 Q1 Update 6

Chief Information Officer (CIO)/Chief Information Security Officer (CISO) Coordination

Federal CIO Council: The CIO Council is the principal interagency forum for improving agency practices related to the design, acquisition, development, modernization, use, sharing, and performance of Federal information resources and is led by the Federal CIO.

o Information Security and Identity Management Committee (ISIMC) - ISIMC manages high-priority security and identity management initiatives and develops recommendations for policies, procedures, and standards to address those initiatives.

National Security Systems Coordination

The Committee on National Security Systems (CNSS): The CNSS provides a forum for the discussion of policy issues, and is responsible for setting national-level information assurance policies, directives, instructions, operational procedures, guidance, and advisories for departments and agencies for the security of National Security Systems through the CNSS Issuance System. CNSS promotes collaboration on cybersecurity efforts among owners of Federal National Security Systems, Federal non-National Security Systems, and non-Federal systems.

Monitoring and Reviewing Progress As specified under FISMA, all Federal information systems must follow prescribed information security standards and reporting guidance. The Cybersecurity CAP Goal applies to all Federal information systems that fall under the FISMA framework for compliance, oversight, and reporting. This includes both non-national security systems and National Security Systems.

Department and agency progress towards the Cybersecurity CAP Goal follows the same monthly and quarterly FISMA reporting requirements as specified by OMB1 and the same FISMA metrics and operational guidance provided by DHS.

Progress reporting should be no less than quarterly as required under GPRA Modernization.2 As Federal agencies transition to continuous monitoring, this frequency should increase as defined by the DHS continuous monitoring program. Agency progress towards milestones will use the DHS FISMA reporting process to report progress on the

1 http://www.whitehouse.gov/sites/default/files/omb/memoranda/2012/m-12-20.pdf 2 As stated in the GPRA Modernization Act of 2010 Sec. 1121. Quarterly priority progress reviews and use of performance information, the cybersecurity CAP Goal progress will be reviewed to assess whether agencies are making progress towards milestones as planned.

Page 7: Png f41 cybersecurity update

Cross-Agency Priority Goal: Cybersecurity – FY2013 Q1 Update 7

Administration’s priority cybersecurity capabilities. Whenever possible, reporting on the CAP milestones should use an automated reporting system.

NSS and OMB will schedule a CyberStat meeting or other appropriate action for those agencies at risk of not achieving the planned level of cybersecurity capability performance. Such meetings will focus on identifying prospects and strategies to improve cybersecurity performance. DHS facilitates the CyberStat process, and it will document performance improvement plans, follow up with each department or agency at risk, and report progress back to the Cybersecurity CAP Goal leadership.

1. Longer-term Milestones Milestone All Deputy Secretaries meet at least annually with PIOs and CIOs to review Cybersecurity CAP goal progress. All PIOs and CIOs meet at least quarterly to review Cybersecurity CAP goal progress. All departments and agencies report continuous diagnostics data to DHS and DHS integrates to reporting dashboard. All Departments and Agencies meet the OMB requirements for ongoing authorization through continuously monitoring security controls. All Departments and Agencies support at least 90% of employees to have the option to use Personal Identity Verification (PIV) Card to authenticate. All PIOs and CIOs send a PIV-signed email to DHS to validate they have their PIV card, reader, and software. All CIOs use mandatory PIV authentication by end of FY13. ISIMC, CNSS, and other interagency working groups propose recommendations to align information security initiatives between national and non-national security systems. The Joint Continuous Monitoring Working Group provides guidance for the provisional frequency of and activities associated with monitoring the security controls from National Institute of Standards and Technology (NIST) SP 800-53 and CNSSI 1253 baselines to support the OMB requirements for ongoing authorization. DHS rolls out a federal-wide continuous diagnostics program over the next three-years. DHS collects all cybersecurity priority metrics through automated reporting mechanisms. DHS proposes a risk-based framework for addressing the maturity of continuous monitoring capabilities including the effectiveness of security controls and progressive improvement of FISMA implementation. DHS updates TIC program to support cloud computing and mobile technology. DHS works with NIST and General Services Administration (GSA) to develop lower cost Managed Trusted Internet Protocol Services (MTIPS) alternatives using new scoring criteria. NIST releases final version of FIPS 201-2 and related PIV documentation. FedRAMP obtains Joint Authorization Board provisional Authorizations to Operate for Cloud Service Providers.

Page 8: Png f41 cybersecurity update

Cross-Agency Priority Goal: Cybersecurity – FY2013 Q1 Update 8

2. Milestones for the Upcoming Quarter (FY2013 Q2) Milestone Status Q2FY13: DHS and NIST sign formal Memorandum of Agreement for coordination on Continuous Monitoring.

Completed

Q2FY13: NIST: Finalize NIST Interagency Report 7511 Rev. 3. Security Content Automation Protocol (SCAP) Version 1.2 Validation Program Test Requirements. This defines the requirements that must be met by products to achieve SCAP 1.2 Validation. Validation is awarded based on a defined set of SCAP capabilities by independent laboratories that have been accredited for SCAP testing by the NIST National Voluntary Laboratory Accreditation Program.

Completed

January 4 & February 19, 2013: DHS to update the Federal stakeholders on the DHS Continuous Monitoring and Diagnostics (CDM) program status.

Completed

March 31, 2013: NIST: Post SP 800-63-2 for public comment. This recommendation provides technical guidelines for Federal agencies implementing electronic authentication and is not intended to constrain the development or use of standards outside of this purpose. The recommendation covers remote authentication of users (such as employees, contractors, or private individuals) interacting with government IT systems over open networks.

Completed

March 31, 2013: GSA will develop, in consultation with DHS and NIST, an education and awareness document focused on communicating the value of PIV card usage.

March 31, 2013: GSA and DHS, working through the CXO Councils, will charter one or more tiger teams focusing on the implementation of OMB M-11-11 for strong authentication to networks and information systems, comprised of participants from CFO Act agencies, to:

Develop a PIV Logical Access Control System (LACS) business case Develop a methodology and conduct PIV LACS-related cost and savings analysis Collect and evaluate D/A policies and implementing processes related to PIV LACS and develop policy recommendations Identify USG-enterprise systems and/or websites for priority consideration/decision to PIV-enable and mandate PIV usage. Develop standard language for use by requiring officials in acquisitions to support PIV enablement and PIV compatibility and interoperability Evaluate the need for new procurement policy and/or guidance and, if needed, provide policy recommendations to GSA and OMB Identify existing procurement vehicles and investigating new vehicles to provide PIV LACS Technical Support with input from the SLATT needs assessment.

March 31, 2013: GSA and NIST to develop a “solutions to PIV implementation barriers” document for D/As to accelerate prioritization and implementation of PIV mandatory authentication.

Page 9: Png f41 cybersecurity update

Cross-Agency Priority Goal: Cybersecurity – FY2013 Q1 Update 9

March 31, 2013: GSA, in coordination with DHS and DOC, will coordinate with the Strategic Sourcing Cross Agency Priority Goal on a roadmap of deliverables to identify commodity IT services and solutions supporting the implementation of the Administration’s priority cybersecurity capabilities.

March 31, 2013: NIST to develop a plan to work with solution providers to increase in the number and diversity of devices that support mandatory PIV authentication in use across the USG.

March 31, 2013: DHS, in coordination with the Joint Continuous Monitoring Working Group (JCMWG), define program implementation responsibilities.

March 31, 2013: DHS, in coordination with the JCMWG, develop a near, mid, and long term CDM deployment roadmap, with specific deployment milestones and actions of CDM capabilities.

March 31, 2013: DHS to perform at least three CyberStats, focusing specifically on PIV LACS mandatory authentication performance

March 31, 2013: DHS to develop a Federal Network Resilience (FNR) Risk Assessment Process overview document describing how FISMA data collected is used by NCCIC/USCERT and other D/As for risk analysis and assessment.

March 31, 2013: DHS will collect performance plans and measure performance to see if D/As will hit their targets.

Page 10: Png f41 cybersecurity update

Cross-Agency Priority Goal: Cybersecurity – FY2013 Q1 Update 10

3. Contributing Programs and Other Factors

The mission areas of the three contributing agencies (DHS, Department of Commerce, and GSA) provide support activities that enable other Federal departments and agencies to implement the Administration’s priority cybersecurity capabilities. These include the DHS National Cyber Security Division (NCSD), the DOC, NIST and the GSA Office of Citizen Services and Innovative Technologies (OCSIT), Office of Government-wide Policy (OGP), and Federal Acquisition Service (FAS).

Page 11: Png f41 cybersecurity update

Cros

s-Ag

ency

Pri

ority

Goa

l: Cy

bers

ecur

ity –

FY2

013

Q1 U

pdat

e 11

The

FY20

11 F

ISM

A pr

ogra

m in

trod

uced

the

Adm

inis

trat

ion’

s pri

ority

cyb

erse

curi

ty c

apab

ilitie

s and

repo

rted

pro

gres

s th

roug

h th

e FY

2011

FIS

MA

repo

rt3 ,

and

cont

inue

d w

ith th

e FY

2012

and

FY2

013

FISM

A m

etri

cs4 .

FI

SMA

min

imal

and

targ

et le

vels

app

ly to

eac

h in

divi

dual

Fed

eral

dep

artm

ent o

r age

ncy,

as r

epor

ted

thro

ugh

Cybe

rsco

pe. T

he

Cybe

rsec

urity

CAP

Goa

l mea

sure

s cro

ss-a

genc

y pe

rfor

man

ce a

cros

s all

U.S.

Gov

ernm

ent F

eder

al e

xecu

tive

bran

ch

depa

rtm

ents

and

age

ncie

s. T

able

1 e

stim

ates

gov

ernm

ent-

wid

e pe

rfor

man

ce to

targ

ets b

ased

on

the

FY20

12 F

ISM

A da

ta. I

n ce

rtai

n ca

ses c

yber

secu

rity

CAP

Goa

l pro

gres

s w

ill a

ccom

mod

ate

clas

sifie

d or

agg

rega

ted

repo

rtin

g, su

ch a

s des

crib

ed u

nder

FI

SMA

for n

atio

nal s

ecur

ity sy

stem

s rep

ortin

g.

CA

P - A

ctua

l CA

P (A

ll U

SG) -

Pro

ject

ed

FISM

A (D

/A)

FY

2012

Q4

FY20

13Q

1 FY2

013Q

1 FY

2013

Q2

FY20

13Q

3 FY

2013

Q4

FY20

14Q

1 FY

2014

Q2

FY20

14Q

3 FY

2014

Q4

Min

Ta

rget

Co

ntin

uous

M

onito

ring5

79.5

3%

78.4

2%

81.4

6%

83.4

0%

85.3

3%

87.2

7%

89.2

0%

91.1

3%

93.0

7%

95.0

0%

80.0

0%

95.0

0%

Stro

ng

Auth

entic

atio

n 57

.26%

53

.72%

61

.35%

65

.45%

69

.54%

73

.63%

77

.72%

81

.82%

85

.91%

90

.00%

50

.00%

75

.00%

TIC

Cons

olid

atio

n 81

.22%

84

.00%

82

.94%

84

.67%

86

.39%

88

.11%

89

.83%

91

.56%

93

.28%

95

.00%

80

.00%

95

.00%

TIC

Capa

bilit

ies

83.8

7%

82.2

1%

85.8

9%

87.9

0%

89.9

2%

91.9

4%

93.9

5%

95.9

7%

97.9

8%

100.

00%

95

.00%

10

0.00

%

Cybe

r CAP

76

.82%

75

.87%

79

.10%

81

.37%

83

.64%

85

.91%

88

.18%

90

.46%

92

.73%

95

.00%

N

A N

A

Tabl

e 1:

Cyb

erse

curi

ty C

AP Q

uart

erly

targ

ets

3 htt

p://

ww

w.w

hite

hous

e.go

v/sit

es/d

efau

lt/fil

es/o

mb/

asse

ts/e

gov_

docs

/fy1

1__e

-gov

_act

_rep

ort.p

df

4 htt

p://

ww

w.d

hs.g

ov/x

libra

ry/a

sset

s/np

pd/c

iofis

mam

etric

sfin

al.p

df

5 Con

tinuo

us M

onito

ring

is w

eigh

ted

as it

is th

e av

erag

e of

con

tinuo

us m

onito

ring

asse

t, co

nfig

urat

ion,

and

vul

nera

bilit

y sc

ores

.

Page 12: Png f41 cybersecurity update

Cros

s-Ag

ency

Pri

ority

Goa

l: Cy

bers

ecur

ity –

FY20

13Q1

Upda

te12

Page 13: Png f41 cybersecurity update

Cross-Agency Priority Goal: Cybersecurity – FY2013 Q1 Update 13

Progress Update Based on the Q1 FY2013 Cyberscope reports on the Administration’s priority cybersecurity capabilities, agencies have made substantial progress against the Cybersecurity Cross Agency Priority (CAP) goal. Despite the drop in overall CAP score, much of it associated with adjustments and improvements to measurement methodology, the data reflect continued agency attention to the priority capabilities. At the same time, we are working to accelerate progress on the Cybersecurity CAP Goal. The chart below represents the results of the annual FY2012 and Q1 FY2013 FISMA reporting for the Administration’s priority cybersecurity capabilities.

FISMA Metrics To have meaningful measurement of progress over time the FISMA metrics must remain reasonably consistent in the security capabilities they measure. While evaluating implementation improvement requires consistency, the metrics must also be flexible enough to include additional threat vectors. From FY2012 to FY2013 there was a slight shift in the factors determining two of the Administration’s priority cybersecurity capabilities, although the focus remained the same.

Based on the recommendations of the Strong Logical Access Tiger Team (SLATT), the Strong Authentication metric changed in FY2013 to address people rather than just accounts. This metric now includes requiring two-factor PIV authentication for people logging on remotely. As the Federal Government promotes telework and increases their mobile workforce, remote access to network resources must require strong authentication mechanisms.

The TIC Capabilities metric advanced from version 1.0 to version 2.0. TIC v2.0 updates the TIC baseline security capabilities in the TIC architecture, based on evolving and increasingly sophisticated threats. It deploys EINSTEIN 2, an Intrusion Detection System (IDS) capability that alerts when a specific cyber threat is detected, and other network changes needed to support Internet Protocol version 6 (IPv6). TIC capability scores dropped slightly as federal agencies move from the 51 security requirements of TIC 1.0 to the 76 requirements of TIC 2.0.

FY2012 Q4 FY2013 Q1 Min FY2012 Target FY2014Continuous Monitoring 79.53% 78.42% 80% 95%Strong Authentication 57.26% 53.72% 50% 90%TIC Consolidation 81.22% 84.00% 80% 95%TIC Capabilities 83.87% 82.21% 95% 100%Weighted Average 76.82% 75.87% 77.50% 95%

USG-Wide CAP TargetUSG-Wide FISMA Results

Page 14: Png f41 cybersecurity update

Cross-Agency Priority Goal: Cybersecurity – FY2013 Q1 Update 14

FY2013 Q1 FISMA reporting through CyberScope erroneously omitted data necessary for computing the Cybersecurity CAP Goal quarterly progress report for Configuration Management, under the Continuous Monitoring priority capability. Unlike previous quarterly reports, CyberScope did not collect the total number of applicable assets with configuration management software. DHS sent a supplemental data call to capture the total number of assets under configuration management. For agencies that did not respond to this data call with FY2013 Q1 data, DHS used FY2012 Q4 data to calculate configuration management.

FY2013 Q1 Summary The overall Cyber CAP score decreased by 0.95% from FY12 Q4 to FY13 Q1 due to a shift to new metrics and TIC 2.0 architecture from FY12 to FY13. The new metrics and architecture establish the baseline for the two-year Cyber CAP Goal.

o The overall Continuous Monitoring score decreased by 1.11%, as new metrics provided increased fidelity for asset discovery and management, and increased detailed reporting for configuration management.

o TIC Consolidation increased by 2.78% while TIC Capabilities decreased by 1.66% as agencies moved from the TIC 1.0 to the TIC 2.0 architecture, which added an additional 25 security capability requirements.

o Strong Authentication decreased 3.54%, due to new metrics for strong authentication as recommended by a 2012 interagency Tiger Team. The recommendations of this team included focusing on strong authentication using HSPD-12 cards of persons rather than accounts, which incorporated new metrics for privileged users and remote access.

Continuous Monitoring o Eighteen agencies reached the minimum target for Automated Asset

Management of 80%, and twelve reached the FY13 target of 95%. Government-wide, automated asset management increased by 2.74%

o Half the agencies remained flat for Automated Vulnerability Management but the government-wide average decreased due to a third of agencies reporting decreases.

o Automated Configuration Management decreased by 4% in FY13Q1. Not all agencies reported for this quarter, in which case the CAP goal metric used FY12Q4 reported data.

Strong Authentication o In FY13, the use of PIV cards for Remote Access was included in the

calculation of this measure. This caused significant swings, both up and down, in the PIV scores of several agencies.

o The inclusion of Remote Access PIV was a significant portion of the increase in PIV scores for DOI, OPM, SSA, and State.

Page 15: Png f41 cybersecurity update

Cross-Agency Priority Goal: Cybersecurity – FY2013 Q1 Update 15

o The inclusion of Remote Access PIV caused a significant decrease in PIV scores for EDU.

o DOE, DOI, DOJ, NASA, OPM, Treasury, and SSA are no longer at 0% as they implemented some degree of mandatory PIV cards for network access.

o Half the agencies have 2% or less PIV implementation, with a full third still at 0%.

o DOD and GSA are currently the only agencies reporting at or above the FY2013 target.

Trusted Internet Connection (TIC) o Nineteen agencies achieved the minimum FY13 FISMA target of 80%

consolidation and fifteen of these have achieved the goal of 95% or greater TIC Traffic Consolidation. GSA, HHS, VA and DOE have not yet met the minimum target for TIC Consolidation.

o Most agencies remained relatively stable on TIC capabilities, with no agency showing any major decrease. At the same time, several agencies made noteworthy progress:

DOJ and USAID achieved the minimum capabilities for TIC 2.0 NRC and Treasury achieved full implementation of TIC 2.0 capabilities.

o Agencies using MTIPS vendors are not responsible for reporting their TIC Capability score, because MTIPS inherently provides this capability. This included DOL, GSA, NSF, and SBA.

Page 16: Png f41 cybersecurity update

16

Scor

ecar

ds

The

grap

hs b

elow

repr

esen

t tw

o ty

pes o

f sco

reca

rds.

The

first

show

s go

vern

men

t-w

ide

perf

orm

ance

tow

ards

the

Adm

inis

trat

ion’

s Pri

ority

Cyb

erse

curi

ty C

apab

ilitie

s. T

he F

Y201

3 FI

SMA

met

rics

pro

vide

s mor

e de

tails

on

the

calc

ulat

ion

of

the

gove

rnm

ent-

wid

e sc

ore.

The

rem

aini

ng sc

orec

ards

show

indi

vidu

al F

eder

al d

epar

tmen

t and

age

ncy

perf

orm

ance

tow

ards

th

e Ad

min

istr

atio

n’s P

rior

ity C

yber

secu

rity

Cap

abili

ties.

Not

e th

e FY

2013

FIS

MA

targ

ets a

re d

iffer

ent f

rom

the

gove

rnm

ent-

wid

e CA

P ta

rget

s for

FY2

014.

Gove

rnm

ent-

wid

e pe

rfor

man

ce to

war

ds th

e Ad

min

istr

atio

n’s

Prio

rity

Cyb

erse

curi

ty C

apab

iliti

es a

s of

FY1

3 Q

1

79.53%

57.26%

81.22%

83.87%

76.82%

78.42%

53.72%

84.00%

82.21%

75.87%

0.00

%

10.0

0%

20.0

0%

30.0

0%

40.0

0%

50.0

0%

60.0

0%

70.0

0%

80.0

0%

90.0

0%

100.

00%

Cont

inuo

usM

onito

ring

Stro

ngAu

then

ticat

ion

TIC

Cons

olid

atio

nTI

C Ca

pabi

litie

sCy

ber C

AP P

rogr

ess

Implementation Percentage

Adm

inist

ratio

n's P

riorit

y Cy

bers

ecur

ity C

apab

ilitie

s

FY12

Q4

FY13

Q1

CAP

Targ

et T

IC: 1

00%

FY13

Tar

get:

92%

CAP

Targ

et C

M: 9

5%FY

13 T

arge

t: 87

%CA

P Ta

rget

TIC

: 95%

FY13

Tar

get:

88%

CAP

Targ

et P

IV: 9

0%FY

13 T

arge

t: 74

%CA

P Ta

rget

: 95%

FY13

Tar

get:

85%

CAP

Targ

et T

IC: 1

00%

FY13

Tar

get:

92%

CAP

Targ

et T

IC: 9

5%FY

13 T

arge

t: 88

%CA

P Ta

rget

PIV

: 90%

FY13

Tar

get:

74%

CAP

Targ

et: 9

5%FY

13 T

arge

t: 85

%CA

P Ta

rget

TIC

: 100

%FY

13 T

arge

t: 9

2%CA

P Ta

rget

TIC

: 95%

FY13

Tar

get:

88%

CAP

Targ

et P

IV: 9

0%FY

13 T

arge

t: 74

%CA

P Ta

rget

: 95%

FY13

Tar

get:

85%

CAP

Targ

et T

IC: 1

00%

FY13

Tar

get:

92%

CAP

Targ

et T

IC: 9

5%FY

13 T

arge

t: 88

%CA

P Ta

rget

PIV

: 90%

FY13

Tar

get:

74%

CAP

Targ

et: 9

5%FY

13 T

arge

t: 86

%

FY20

13 C

AP T

arge

t

FY20

14 C

AP T

arge

t

The

Cybe

r CAP

Pro

gres

s is a

n ov

eral

l mea

sure

that

com

bine

s the

indi

vidu

al m

etric

s.

Page 17: Png f41 cybersecurity update

17

Fede

ral d

epar

tmen

t and

age

ncy

perf

orm

ance

tow

ards

the

Adm

inis

trat

ion’

s Pr

iori

ty C

yber

secu

rity

Cap

abili

ties

CAPA

BILIT

IESQ4

FY12

Q1 FY

13Q4

FY12

Q1 FY

13Q4

FY12

Q1 FY

13Q4

FY12

Q1 FY

13Q4

FY12

Q1 FY

13Q4

FY12

Q1 FY

13

Cont

inuo

us M

onito

ring

7069

*96

9076

7574

7376

8489

93Pr

iorit

yYE

LLOW

GREE

N

PIV

Logic

al Ac

cess

1019

1818

9384

02

019

07

CM80

%95

%

TIC Tr

affic

Con

solid

atio

n60

8596

96N/

AN/

A26

2398

9899

99PI

V50

%75

%

TIC 2

.0 C

apab

ilitie

s (FY

13)

7470

8080

N/A

N/A

8788

9090

9498

TIC

Traf

fic80

%95

%

TIC

Capa

bilit

ies

95%

100%

CAPA

BILIT

IESQ4

FY12

Q1 FY

13Q4

FY12

Q1 FY

13Q4

FY12

Q1 FY

13Q4

FY12

Q1 FY

13Q4

FY12

Q1 FY

13Q4

FY12

Q1 FY

13

Cont

inuo

us M

onito

ring

9094

6560

9393

3959

9595

8579

PIV

Logic

al Ac

cess

00

00

7547

00

9193

4556

TIC Tr

affic

Con

solid

atio

n32

8391

9180

8095

950

700

0TIC

2.0

Cap

abilit

ies (

FY13

)N/

AN/

A72

7285

85N/

A32

N/A

N/A

4075

CAPA

BILIT

IESQ4

FY12

Q1 FY

13Q4

FY12

Q1 FY

13Q4

FY12

Q1 FY

13Q4

FY12

Q1 FY

13Q4

FY12

Q1 FY

13Q4

FY12

Q1 FY

13

Cont

inuo

us M

onito

ring

8083

*90

8710

010

098

98*

9899

9494

PIV

Logic

al Ac

cess

00

01

100

00

026

00

TIC Tr

affic

Con

solid

atio

n10

010

098

9810

010

010

010

010

010

010

010

0TIC

2.0

Cap

abilit

ies (

FY13

)68

6885

87N/

A10

0N/

AN/

A92

92N/

AN/

A

CAPA

BILIT

IESQ4

FY12

Q1 FY

13Q4

FY12

Q1 FY

13Q4

FY12

Q1 FY

13Q4

FY12

Q1 FY

13Q4

FY12

Q1 FY

13Q4

FY12

Q1 FY

13

Cont

inuo

us M

onito

ring

8269

6767

7982

100

100

8079

*67

98

PIV

Logic

al Ac

cess

011

118

02

00

01

22

TIC Tr

affic

Con

solid

atio

n10

010

010

010

095

9510

010

010

010

098

19

TIC 2

.0 C

apab

ilitie

s (FY

13)

9191

8286

7610

0N/

A95

7373

8580

VA

HUD

NASA

NRC

NSF

OPM

SBA

SSA

STAT

ETR

EAS

USAI

DUS

DA

FY13

FISM

A Ta

rget

s

DOL

DOT

EDU

EPA

GSA

HHS

DOC

DHS

DOD

DOE

DOI

DOJ

N/A

indi

cate

s tha

t the

ag

ency

is n

ot re

spon

sible

to

repo

rt th

is TI

C sc

ore.

-DO

D do

es n

ot

repo

rt

-M

TIPS

cus

tom

ers

FY13

mea

sure

s TIC

2.0

ca

pabi

litie

s *

Indi

cate

s FY1

2 Q

4 Co

nfig

urat

ion

Man

agem

ent r

epor

ting

used

for s

ome

agen

cies

.

Page 18: Png f41 cybersecurity update

18

Fede

ral d

epar

tmen

t and

age

ncy

perf

orm

ance

tow

ards

Con

tinu

ous

Mon

itor

ing

as o

f Q1

FY20

13

100%

100%

96%

69%

89%

99%

100%

100%

92%

93%

96%

90%

100%

98%

90%

65%

91%

97%

66%

100%

42%

95%

62%

35%

0%50%

100%

% Capability Implemented

Asse

t

100%

94%

94%

100%

70%

100%

100%

100%

45%

75%

78%

83%

53%

88%

99%

74%

100%

79%

68%

97%

95%

72%

100%

99%

0%50%

100%

% Capability Implemented

Conf

igura

tion

79%

100%

96%

69%

87%

99%

100%

100%

88%

83%

96%

75%

54%

97%

90%

79%

91%

85%

72%

98%

42%

70%

39%

42%

0%50%

100%

% CapabilityImplemented

Vulne

rabil

ity

A

* In

dica

tes F

Y12

Q4

Conf

igur

atio

n M

anag

emen

t rep

ortin

g us

ed fo

r som

e ag

enci

es

Page 19: Png f41 cybersecurity update

19

Fede

ral d

epar

tmen

t and

age

ncy

perf

orm

ance

tow

ards

Str

ong

Auth

enti

cati

on w

ith

HSP

D-1

2 Ca

rds

as o

f Q1

FY20

13

PI

V Ca

rds I

ssue

d as

of S

epte

mbe

r 201

2: 5

,285

,036

(96%

) Pe

rcen

tage

of a

ccou

nts r

equi

ring

use

of P

IV c

ards

for n

etw

ork

logo

n: 5

4%

PIV

card

issu

ance

dat

a fr

om S

epte

mbe

r 201

2. P

IV ca

rd u

sage

dat

a pe

rcen

tage

s fro

m Ja

nuar

y 20

13

* Rep

rese

nts F

Y13

FISM

A Ta

rget

s. P

IV ta

rget

s are

set a

t 75%

, and

the

dott

ed li

ne o

n th

e ch

art a

bove

indi

cate

s thi

s tar

get.

18%

84%

0%

0%

0%

11%

18%

0%

56%

47%

1%

2%

93%

26%

0%

19%

2%

2%

19%

0%

1%

7%

0%

0%

82%

16%

100%

100%

100%

89%

82%

98%

40%

49%

93%

91%

65%

89%

67%

84%

82%

64%

80%

78%

52%

59%

49%

0%10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

% Smartcards Issued (Out of Total Required)

Agen

cy

PIV

Issue

d and

Req

uire

d for

Net

work

Acc

ess

PIV

Issue

d but

Not

Req

uired

for N

etwo

rk A

cces

s--

-FY13

PIV

Targ

et

----

----

----

----

----

---FY

13 F

ISM

A Ta

rget

s Pr

iorit

y Ye

llow

Gr

een

PIV

50%

75

%*

Page 20: Png f41 cybersecurity update

20

Fede

ral d

epar

tmen

t and

age

ncy

perf

orm

ance

tow

ards

Tru

sted

Inte

rnet

Con

nect

ion

(TIC

) use

and

cap

abili

ties

as

of Q

1 FY

2013

TIC

Capa

bilit

ies r

epre

sent

TIC

2.0

*

Agen

cy u

ses M

TIPS

pro

vide

r

TIC

Capa

bilit

ies:

Age

ncy

FY13

targ

et is

100

% ;

Gove

rnm

ent-

wid

e st

atus

is 8

2% (d

ecre

ased

2%

from

FY1

2 Q4

to F

Y13

Q1)

TIC

Traf

fic C

onso

lidat

ion:

Age

ncy

FY13

targ

et is

95%

; Gov

ernm

ent-

wid

e st

atus

is 8

4% (i

ncre

ased

3%

from

FY1

2 Q

4 to

FY1

3 Q1

) **

Repr

esen

ts F

Y13

FISM

A Ta

rget

s. T

IC T

raffi

c an

d TI

C Ca

pabi

litie

s tar

gets

are

set a

t 95%

and

100

%, r

espe

ctiv

ely,

and

the

dott

ed li

nes o

n th

e ch

art i

ndic

ate

thes

e ta

rget

s.

0%10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

% TIC Compliance

Agen

cy

TIC

Capa

bilit

ies

Traf

fic C

onso

lidat

ion

----

----

----

----

----

----

-FY13

TIC

Cap

ablil

ities

Tar

get

---FY

13 T

IC T

raffi

c Tar

get

----

----

----

----

----

--FY

13 F

ISM

A Ta

rget

s Pr

iorit

y Ye

llow

Gr

een

TIC

Traf

fic

80%

95

%**

TI

C Ca

pabi

litie

s 95

%

100%

**

Page 21: Png f41 cybersecurity update

21

Key

Indi

cato

rs a

nd M

etri

cs

Agen

cy p

erfo

rman

ce u

ses t

he F

Y201

3 FI

SMA

met

rics

and

targ

ets,

high

light

ed in

Tab

le 2

: FY2

013

FISM

A M

etri

cs.

Adm

inis

trat

ion

Perf

orm

ance

Are

a

Annu

al F

ISM

A M

etric

Se

ctio

n6 Pe

rfor

man

ce M

etric

M

inim

al

Leve

l Ta

rget

Le

vel

Cont

inuo

us7

Mon

itorin

g –

Asse

ts

2.2

% o

f ass

ets i

n 2.

1, w

here

an

auto

mat

ed c

apab

ility

(dev

ice

disc

over

y pr

oces

s)

prov

ides

visi

bilit

y at

the

orga

niza

tion’

s ent

erpr

ise le

vel i

nto

asse

t inv

ento

ry

info

rmat

ion

for a

ll ha

rdw

are

asse

ts.

80%

95%

Cont

inuo

us

Mon

itorin

g –

Conf

igur

atio

ns

3.1.

3

% o

f the

app

licab

le h

ardw

are

asse

ts (p

er q

uest

ion

2.1)

, of e

ach

kind

of o

pera

ting

syst

em so

ftwar

e in

3.1

, has

an

auto

mat

ed c

apab

ility

to id

entif

y de

viat

ions

from

th

e ap

prov

ed c

onfig

urat

ion

base

lines

iden

tifie

d in

3.1

.1 a

nd p

rovi

de v

isibi

lity

at

the

orga

niza

tion’

s ent

erpr

ise le

vel.

Cont

inuo

us

Mon

itorin

g –

Vuln

erab

ilitie

s 4.

2 %

of h

ardw

are

asse

ts id

entif

ied

in se

ctio

n 2.

1 th

at a

re e

valu

ated

usin

g an

au

tom

ated

cap

abili

ty th

at id

entif

ies N

IST

Nat

iona

l Vul

nera

bilit

y Da

taba

se

vuln

erab

ilitie

s (CV

Es) p

rese

nt w

ith v

isibi

lity

at th

e or

gani

zatio

n’s e

nter

prise

leve

l.

Stro

ng A

uthe

ntic

atio

n -Id

entit

y M

anag

emen

t HS

PD-1

2

5.2.

5, 5

.4.5

&

10.2

.5

% o

f ALL

peo

ple

requ

ired

to u

se P

erso

nal I

dent

ity V

erifi

catio

n (P

IV) C

ard

to

auth

entic

ate.

50

%

75%

TIC

Cons

olid

atio

n -

CNCI

8 #1

7.2

% o

f ext

erna

l net

wor

k tr

affic

pas

sing

thro

ugh

a Tr

uste

d In

tern

et C

onne

ctio

n (T

IC9 ).

80%

95

%

TIC

Capa

bilit

ies -

CN

CI #

1 &

#2

7.1

% o

f req

uire

d TI

C ca

pabi

litie

s im

plem

ente

d by

TIC

(s) u

sed

by th

e or

gani

zatio

n.

95%

10

0%

Tabl

e 2:

FY2

013

FISM

A M

etri

cs

6 Sec

tion

refe

renc

es a

re to

the

annu

al m

etric

s onl

y, a

nd d

o no

t app

ly to

the

quar

terly

met

rics.

7 C

ontin

uous

doe

s not

mea

n in

stan

tane

ous.

NIS

T SP

800

-137

says

that

the

term

“co

ntin

uous

” m

eans

that

secu

rity

cont

rols

and

orga

niza

tiona

l risk

s are

as

sess

ed a

nd a

naly

zed

at a

freq

uenc

y su

ffici

ent t

o su

ppor

t risk

-bas

ed se

curit

y de

cisio

ns to

ade

quat

ely

prot

ect o

rgan

izatio

n in

form

atio

n.

8 Com

preh

ensiv

e N

atio

nal C

yber

secu

rity

Initi

ativ

e (C

NCI

) 9 N

ot a

pplic

able

to D

epar

tmen

t of D

efen

se (D

OD)

.

Page 22: Png f41 cybersecurity update

22

Milestones Accomplished to Date (FY13Q1) Milestone Status Q1FY13: NIST: Closed public comments for FIPS 201-2. Adjudicated comments and updated Draft FIPS 201-2 for submission.

Completed

October 2012: Complete Strong Logical Access Tiger Team (SLATT) actions - GSA, Department of Defense (DOD), and Treasury led a Strong Logical Access Tiger Team (SLATT) to identify roadblocks for strong authentication. The SLATT improves strong authentication outcome metrics across agencies by focusing tiger team efforts on critical barriers to implementation and deliverables that can assist in implementation.

Completed

October 2012: Create Joint Continuous Monitoring Working Group (CMWG) - The ISIMC Continuous Monitoring Working Group (CMWG) and the Committee on National Security Systems (CNSS) CMWG combined to create the “Joint CMWG”. The Joint CMWG is the central forum for interagency continuous monitoring program coordination for both national security systems and non-national security systems.

Completed

October 2012: NIST, DHS, DOD introduced SCAP automation specifications to the Internet Engineering Task Force (IETF) to ensure industry adoption and inclusion of continuous monitoring capabilities.

Completed

October 17, 2012: NSS and OMB facilitated an interagency coordination plan for continuous monitoring to get concurrence between DHS, NIST, DOD, and agency CIOs and support alignment between National Security Systems and non-National Security Systems.

Completed

October 19, 2012: DHS worked with GSA on a Federal enterprise-wide continuous diagnostics and mitigation (CDM) solicitation announcement.

Completed

November 1, 2012: DHS to provide continuous diagnostics program details to the Joint CMWG to supplement the CONOPS

Completed

November 15, 2012: Agencies report FISMA Metrics to ensure completion of the congressional report in a timely manner.

Completed

November 27, 2012: The Joint CMWG developed a Concept of Operations (CONOPS) for the execution of continuous monitoring on a government-wide basis.

Completed

November 27, 2012: The Joint CMWG provided recommendations for a continuous monitoring program that aligns across national and non-national security domains.

Completed

November 30, 2012: DHS released FY2013 FISMA metrics Completed December 12 2012: GSA/FAS US access MSO: The HSPD-12 MSO awarded a 5-year BPA in December 2012 that reduces the wholesale cost of PIV cards by nearly 30%. The first call under that BPA for 100,000 cards will save the MSO over $400,000 as compared to the price under the core services contract.

Completed

November, 2012: DHS released Continuous Diagnostics Dashboard Request For Information (RFI)

Completed

December, 2012: DHS released Continuous Monitoring As A service (CMaaS) Blanket Purchase Agreement (BPA)

Completed