DFARS Cybersecurity Compliance

Slides:



Advertisements
Similar presentations
BENEFITS OF SUCCESSFUL IT MODERNIZATION
Advertisements

Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Summer IAVA1 NATIONAL INFORMATION ASSURANCE TRAINING STANDARD FOR SYSTEM ADMINISTRATORS (SA) Minimum.
Security Controls – What Works
Information Security Policies and Standards
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Stephen S. Yau CSE , Fall Security Strategies.
Session 3 – Information Security Policies
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
SEC835 Database and Web application security Information Security Architecture.
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
Evolving IT Framework Standards (Compliance and IT)
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
DFARS & What is Unclassified Controlled Technical Information (UCTI)?
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Applied Technology Services, Inc. Your Partner in Technology Applied Technology Services, Inc. Your Partner in Technology.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Information Systems Security Operations Security Domain #9.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Managing Risk in New Computing Paradigms Applying FISMA Standards and Guidelines to Cloud Computing Workshop.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Information Security tools for records managers Frank Rankin.
The NIST Special Publications for Security Management By: Waylon Coulter.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
OFFICE OF VA ENTERPRISE ARCHITECTURE VA EA Cybersecurity Content Line of Sight Report April 29, 2016.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
© ITT Educational Services, Inc. All rights reserved. IS4680 Security Auditing for Compliance Unit 1 Information Security Compliance.
Proactive Incident Response
Special Publication Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations Patricia Toth NIST MEP.
Safeguarding CDI - compliance with DFARS
Information Security Policy
3 Do you monitor for unauthorized intrusion activity?
Got DoD Contracts in Your Supply Chain
WSU IT Risk Assessment Process
Safeguarding Covered Defense Information
Team 1 – Incident Response
Information Technology Sector
Introduction to the Federal Defense Acquisition Regulation
Special Publication Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations Dr. Ron Ross Computer Security.
Safeguarding Covered Defense Information
San Francisco IIA Fall Seminar
IS4550 Security Policies and Implementation
I have many checklists: how do I get started with cyber security?
IS4550 Security Policies and Implementation Unit 5 User Policies
Supplier Information Session Safeguarding Covered Defense Information and Cyber Incident Reporting, DFARS August 16, 2016 Christian Ortego.
UConn NIST Compliance Project
DFARS Cybersecurity Requirements
NCHER Knowledge Symposium Federal Contractor/TPS Session
National Cyber Security
County HIPAA Review All Rights Reserved 2002.
MBUG 2018 Session Title: NIST in Higher Education
EDUCAUSE Security Professionals Conference 2018 Jason Pufahl, CISO
Continuous Monitoring
Cybersecurity Threat Assessment
Discussion points for Interpretation Document on Cybersecurity
IT Management Services Infrastructure Services
Presentation transcript:

DFARS Cybersecurity Compliance Adam Austin, MSIA, CISM, Sec+ Cybersecurity Lead Haight Bey & Associates (SVOB) www.VIBNetwork.org

Agenda What is the DFARS requirement? Who is affected? What is cybersecurity? How do I report cyber incidents? What are the cyber security requirements? What do I need to do to meet the requirement? How will this affect my business? What are challenges unique to small businesses? Questions and answers

DoD Federal Acquisition Regulation Supplement (DFARS) “Covered contractor information system”: an unclassified IT system owned, or operated by or for, a contractor that processes, stores, or transmits covered defense information, e.g.: Controlled Unclassified Information (CUI): research and engineering data engineering drawings, and associated lists specifications standards process sheets manuals technical reports technical orders catalog-item identifications data sets studies and analyses and related information computer software executable code and source code CDRLs

Many (most?) DoD contractors are “covered” If the contract specifies Contract Deliverable Requirements Lists (CDRL), your organization is likely covered Only the IT systems that process CUI E.g. CAD systems, MS Office systems used to develop Tech Manuals Includes “cloud”-based IT systems—need FedRAMP approval Example of IT system not covered: G-suite tools (e.g. Google Drive) used only for corporate communications

DFARS clause 252.204-7012 Adequate security:  The Contractor shall implement NIST SP 800-171, as soon as practical, but not later than December 31, 2017. Operational, managerial, and technical cybersecurity requirements for IT system Cyber incident reporting: Rapidly report cyber incidents to DoD at https://dibnet.dod.mil. Access to site requires ECA medium-assurance certificate (purchased by contractor), or CAC card

Cybersecurity = Risk Management Business owners do risk management everyday Think Profit/Loss If Profit/Loss ratio <=1, then something has to change Cybersecurity is the same mindset

What is common to all three? Cyber Risk Equation Assets (Impact): Vulnerabilities: Threats: What is common to all three? PEOPLE! People Information Corporate Customer IT systems, facilities Finances RISK Hacking Disasters Misuse Intentional Unintentional People Insecure configuration Lack of Ps: Policy Process Plans

Cyber Risk Equation (2) Threat + vulnerability = probability of compromise Probability x Impact = Risk is typically first calculated qualitatively, e.g: High Medium Low However, for meaningful action, we must calculate risk in terms of value of lost assets ($) If Asset/Risk ratio <=1, something has to change RISK

DoD Supply Chain Risk DoD has (correctly) determined its supply chain is a source of unacceptable risk Many of the notorious breaches of late were a result of a compromised contractor e.g. Target (2013), OPM (2014), and ongoing DoD-info exfiltration via contractor breaches Therefore, the DoD has levied general cybersecurity requirements on its contractors via DFARS

Configuration Management is Paramount If you don’t know who/what’s on your network, how do you know where your weaknesses are? If you don’t know who/what’s changed on your network, how do you know where to start troubleshooting? The goal is to securely configure: Processes Systems People

Cyber Incidents Incident: Phases of incident response: Suspected or confirmed cyber-related issue Ransomware attack Physical intrusion to facility DNS queries to strange or newly-registered domains Unknown device plugged into workstation Phases of incident response: Follow-up Recovery Containment / Response Detection / Analysis Preparation

https://dibnet.dod.mil

.mil site requires ECA or CAC certificate DISA ECA information: https://iase.disa.mil/pki/eca/Pages/index.aspx

Cyber Incident Report Elements US CERT guidelines: https://www.us-cert.gov/incident-notification-guidelines CMS has IR report template that can be modified for use with CUI: https://www.cms.gov/Research-Statistics-Data-and-Systems/CMS-Information-Technology/InformationSecurity/Info-Security-Library-Items/RMH-Chapter-08-Incident-Response-Appendix-K-Incident-Report-Template.html

311 Assessment Objectives* SP 800-171 and 800-171A 14 Families 110 Controls 311 Assessment Objectives* *We refer to Assessment Objectives as “Organizational Actions”

Control Families Access Control Awareness and Training Audit and Accountability Configuration Management Identification and Authentication Incident Response Maintenance Media Protection Personnel Security Physical Protection Risk Assessment Security Assessment System and Communications Protection System and Information Integrity

Example Controls Control Family Control ID Control Text Access Control 3.1.4 Separate the duties of individuals to reduce the risk of malevolent activity without collusion. Configuration Management 3.4.3 Track, review, approve/disapprove, and audit changes to information systems. Personnel Security 3.9.1 Screen individuals prior to authorizing access to information systems containing CUI. Security Assessment 3.12.2 Develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational information systems. 3.12.4 Develop, document, and periodically update system security plans that describe system boundaries, system environments of operation, how security requirements are implemented, and the relationships with or connections to other systems.

Deep Dive into a 800-171A Control

Deep Dive into a 800-171A Control (2)

DoD Contractors w/CUI need to implement a cybersecurity program: Gather existing system security plans (SSP) Perform gap assessment against 800-171 Modify SSP accordingly; develop new policies/processes, written documentation for N/A controls Develop and execute a Plan of Action and Milestones (POA&M) to fix residual gaps Create and engage a continuous monitoring process Develop and implement a capability to report cyber incidents

DON’T PANIC DFARS Cybersecurity Compliance means “Implementing” 3 things: Develop and Approve a 800-171-based System Security Plan (SSP) Develop and Execute a Plan of Actions and Milestones (POA&M) Develop and Implement a Cyber Incident Reporting Capability

How does this affect my business? Cybersecurity is an additional cost DoD is not going to fund contractors to get healthy Cybersecurity is a business enabler, not an end to itself: Increased overhead rates Cybersecurity risk is one of many types of risk Where to start? User training Robust configuration management process

Small Business Challenges Smaller overhead absorption ability How to continue to keep rates competitive No enterprise IT capability and reach back “Here’s Jim, the IT guy” Employees perform multiple roles Separation of duties ?! Decentralized processes “The policies exist…in my head”

Good News Free and/or open-source tech options You create your SSP Create sensible custom policies Lots of policy resources to draw from US Gov’t SANS ASD Free and/or open-source tech options NetMon Freemium Security Onion GoPhish

Not sure what to do? We’re happy to talk; we’re in the same boat… Haight Bey & Associates 1972W 2550S Suite A West Haven, UT 84401 (888) 379-0509 https://haightbey.com @haightbey https://www.linkedin.com/company/haight-bey-&-associates/ Cybersecurity Empowerment SM

Questions?