ATD session 2: compliancy versus mission assurance

Slides:



Advertisements
Similar presentations
EMS Checklist (ISO model)
Advertisements

Tenace FRAMEWORK and NIST Cybersecurity Framework Block IDENTIFY.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholde r to insert your own image. Cybersecurity.
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
BENEFITS OF SUCCESSFUL IT MODERNIZATION
DHS, National Cyber Security Division Overview
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
Framework for Improving Critical Infrastructure Cybersecurity NIST Feb 2014.
National Institute of Standards and Technology 1 NIST Guidance and Standards on System Level Information Security Management Dr. Alicia Clay Deputy Chief.
Unit 8: Tests, Training, and Exercises Unit Introduction and Overview Unit objectives:  Define and explain the terms tests, training, and exercises. 
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
Computer Security: Principles and Practice
The Information Systems Audit Process
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
EASTERN MICHIGAN UNIVERSITY Continuity of Operations Planning (COOP)
Don Von Dollen Senior Program Manager, Data Integration & Communications Grid Interop December 4, 2012 A Utility Standards and Technology Adoption Framework.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
THE REGIONAL MUNICIPALITY OF YORK Information Technology Strategy & 5 Year Plan.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Protecting Critical Information Assets and Records FIRM Forum.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Shift Left Feb 2013 Page-1 DISTRIBUTION STATEMENT A – Cleared for Open Publication by OSR on January 17 th, 2013 – SR case number 13-S-0851 Dr. Steven.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Weaving Security Blankets Make your own bespoke defensive toolkit Presentation by Max Cizauskas For BSides Toronto 2015.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
The NIST Special Publications for Security Management By: Waylon Coulter.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Business Continuity Planning 101
Serving IT up with ITIL By Thane Price. IT is the laboratory’s pit crew  Goal : Make technology transparent while accomplishing valuable internal customer.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
Security and resilience for Smart Hospitals Key findings
THINK DIFFERENT. THINK SUCCESS.
Quality Management System Deliverable Software 9115 revision A Key changes presentation IAQG 9115 Team March 2017.
BruinTech Vendor Meet & Greet December 3, 2015
Information Security Program
Presenter: Mohammed Jalaluddin
Cybersecurity - What’s Next? June 2017
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Discussion of CRVS strategies
Data Architecture World Class Operations - Impact Workshop.
Cybersecurity Policies & Procedures ICA
Improving Mission Effectiveness By Exploiting the Command’s Implementation Of the DoD Enterprise Services Management Framework - DESMF in the [name the.
Introduction to the Federal Defense Acquisition Regulation
NIST Cybersecurity Framework
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Security Engineering.
HUMAN RESOURCE GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE
Cybersecurity EXERCISE (CE) ATD Scenario intro
Information Security Board
INTRODUCTION TO ISO 9001:2015 FOR IMPLEMENTATION Varinder Kumar CISA, ISO27001 LA, ISO 9001 LA, ITIL, CEH, MEPGP IT, Certificate course in PII & Privacy.
Panel Discussion Can We Handle an Advanced Cyber Threat?
Cyber defense management
I have many checklists: how do I get started with cyber security?
Making Information Security Manageable with GRC
2017 Health care Preparedness and Response Draft Capabilities
An Urgent National Imperative
Cybersecurity ATD technical
Risk Mitigation & Incident Response Week 12
Business Continuity Program Overview
Cybersecurity EXERCISE (CE) ATD Scenario questions
Define Your IT Strategy
Data Governance & Management Skills and Experience
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Data Security and Privacy Techniques for Modern Databases
Presentation transcript:

ATD session 2: compliancy versus mission assurance 17 October 2017 DAU Cybersecurity Enterprise Team

learning objectives Implement cybersecurity regulatory, statutory, and best practices to achieve mission assurance Apply Risk Management Framework (RMF) process Compliment with NIST Cybersecurity Framework Validate using Independent Operational Test

Cybersecurity problem Panelist Testimony Cybersecurity problem Testimony of Dr. Ron Ross, National Institute of Standards and Technology “… increasing complexity and attacks guarantees a number of weaknesses and vulnerabilities will continue to grow.” Available at https://www.nist.gov/sites/default/files/August_23_panelist_statements.pdf

Current strategy: Compliancy DoDI 5200.39 Critical Program Information DoDI 5200.44 Protection of Mission Critical Functions DoDI 8582.01 Security of Unclassified DoD Information on Non-Information Systems DoDI 5000.02 Defense Acquisition DoDI 8500.01 Cybersecurity DoDI 8510.01 Risk Management Framework (RMF) DoDI 5230.24 Distribution Statements on Technical Documents DFARS 252.204‐7008 – Compliance with Safeguarding Covered Defense Information Controls DFARS 252.204‐7009 – Limitations on the Use or Disclosure of Third‐Party Contractor Information DFARS 252.204‐7012 – Safeguarding Covered Defense Information and Cyber Incident Reporting DFARS 252.239‐7009 – Representation of Use of Cloud Computing DFARS 252.239‐7010 – Cloud Computing Services DFARS 252.239‐7017 – Notice of Supply Chain Risk DFARS 252.239‐7018 – Supply Chain Risk

Linkage to “secure enough” Does Compliancy equal Secure Enough? Will Compliancy achieve Mission Assurance?

Changes in Compliancy Policies … Includes Security Resiliency Mission Assurance

Transition to resiliency Make systems and networks more penetration-resistant; capable of limiting damage from cyber-attacks by reducing adversaries’ time on target or lateral movement; and sufficiently resilient to support critical missions and operations The West Top 10.

Operational resiliency DoDI 8500.01 “Operational Resilience” Operational resilience requires three conditions to be met: Information resources are trustworthy; Missions are ready for information resources degradation or loss; Network operations have the means to prevail in the face of adverse events.” (p. 31) Trustworthy, Ready for Degradation, Prevail 17

Tools to Help with Compliancy NIST Cybersecurity Framework RMF Process

Cybersecurity framework Federal agencies now are encouraged to use the Cybersecurity Framework … would bring immediate benefits, driving agencies to shift approaches away from simple compliance and toward thinking more holistically about cybersecurity risk management.” REF: https://www.nist.gov/sites/default/files/documents/2017/01/30/draft-cybersecurity-framework-v1.1.pdf

NIST Cybersecurity framework Core Function Explanation Identify Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities. Protect Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services. Detect Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event. Respond Develop and implement the appropriate activities to take action regarding a detected cybersecurity event. Recover Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event. Identify – Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities. The activities in the Identify Function are foundational for effective use of the Framework. Understanding the business context, the resources that support critical functions, and the related cybersecurity risks enables an organization to focus and prioritize its efforts, consistent with its risk management strategy and business needs. Protect – Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services. The Protect Function supports the ability to limit or contain the impact of a potential cybersecurity event. Examples of outcome Categories within this Function include: Access Control; Awareness and Training; Data Security; Information Protection Processes and Procedures; Maintenance; and Protective Technology. Detect – Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event. The Detect Function enables timely discovery of cybersecurity events. Examples of outcome Categories within this Function include: Anomalies and Events; Security Continuous Monitoring; and Detection Processes. Respond – Develop and implement the appropriate activities to take action regarding a detected cybersecurity event. The Respond Function supports the ability to contain the impact of a potential cybersecurity event. Examples of outcome Categories within this Function include: Response Planning; Communications; Analysis; Mitigation; and Improvements. • Recover – Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event. The Recover Function supports timely recovery to normal operations to reduce the impact from a cybersecurity event. Examples of outcome Categories within this Function include: Recovery Planning; Improvements; and Communications. Framework for Improving Critical Infrastructure Cybersecurity, v 1.0, NIST, February 2014

RMF: NIST Special Publications 800-53 Revision 5 Draft “… make information systems more penetration resistant to attacks; limit the damage from attacks when they occur; and make the systems resilient and survivable” “… promoting integration with different risk management … including Cybersecurity Framework” “ … determine required level of assurance that the selected security controls are effective …” “… provide a flexible catalog of security to meet current protection needs and the demands of future needs based on changing threats, requirements, and technologies”

Risk diagram “The five Functions also balance prevention and reaction, including preparatory activities to enable the best possible outcome from that reaction” (p. 28)

Ways to Validate Compliancy Independent Operational Test Simulation/Table Tops

Contested environment “Training scenarios and exercises should reflect advanced contested environments” “Maintain operational effectiveness while absorbing successful attacks” (p. 4) 13

Cybersecurity Survivability System Survivability KPP SS KPP = Kinetic, EW & Cyber - for IS and PIT Cyber Survivability Endorsement (CSE) v1.01a, 10 CSAs, JCS Guide JROCM 009-17, 27 Jan 2017

Tabletop exercises Objectives: Identification of material and non-material gaps and overlaps within the program as they relate to the successful completion of the mission Development of courses of (corrective) action (COA) based on threat and risk identification and assessment REF: Defense AT&L: November-December 2017

Formula for “Secure Enough” Compliancy = Security + Resiliency = Mission Assurance

Compliancy Check & balance Implement security controls through RMF process Implement controls that incorporate security and resiliency capabilities Uses NIST Cybersecurity Framework (Identify, Protect, Detect, Respond, and Recover) Conduct independent Operational Test Measure systems’ Operation Effectiveness, Suitability, and Security Uses System Survivability Key Performance Parameters to validate security controls

Cybersecurity Framework Integration

cybersecurity trade-space Security and Functionality - How skilled, trained and experienced do you want the Users to be? $$$ People Policy/Process Technology PPT Model When you start reviewing cybersecurity and associating with acquisition issues, the two areas of trade-space that must be considered and analyzed are functionality and security. When incorporating cybersecurity principles into networks or systems, one must determine the type and purpose of the system; whether supporting Platform or Weapons, Information Technology Communications, or Business (non-tactical) operations. The type and purpose will determine the level of functionality and security to ensure successfully mission accomplishment or mission assurance.   Safety is a critical trade-off that must be resolved. Any issues associated with potential loss of life will be mitigated. Industrial Control Systems, Weapons, and Platform Information Technology seem to lean toward availability. Information Technology Communications and Defense Business Systems seem to lean toward accessibility and interoperability.

Cost, schedule & performance trade-offs Do my measurements and analysis allow me to: Know if I am secure enough? Am I spending my money correctly? Should increase my cybersecurity spending? What is my return on investment?

Recap learning objectives Implement cybersecurity regulatory, statutory, and best practices to achieve mission assurance Apply Risk Management Framework (RMF) process Compliment with NIST Cybersecurity Framework Validate using Independent Operational Test

summary Focus on mission assurance instead of compliancy Manage outcomes and cybersecurity risk management Field cybersecurity capabilities that promote mission assurance & support operational requirements We may not get a Second Chance – when Hostilities Start!!!

Questions