DSSA Update Costa Rica – March, 2012 1. Goals for today Update you on our progress Raise awareness Solicit your input 2.

Slides:



Advertisements
Similar presentations
Whois Task Force GNSO Public Forum Wellington March 28, 2006.
Advertisements

DNS Security and Stability Analysis Working Group (DSSA) DSSA Update Prague – June, 2012.
DNS Security and Stability Analysis Working Group (DSSA)
DNS Security and Stability Analysis Working Group (DSSA) DSSA Update Prague – June, 2012.
State of Indiana Business One Stop (BOS) Program Roadmap Updated June 6, 2013 RFI ATTACHMENT D.
Ninth Lecture Hour 8:30 – 9:20 pm, Thursday, September 13
1 Pipeline Security Presented to: Pipeline Safety Trust New Orleans, Louisiana November 5, 2010.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Predisposing Conditions Security Controls Vulnerabilities A Non- Adversarial Threat Source (with a range of effects) In the context of… (with varying pervasiveness)
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Chapter 5: Asset Classification
Joint SSR-RT/DSSA meeting DSSA Progress Update Dakar – October 2011.
ISO General Awareness Training
Chapter 3: The Project Management Process Groups
Risk Assessment Frameworks
Predisposing Conditions Security Controls Vulnerabilities A Non- Adversarial Threat Source (with a range of effects) In the context of… (with varying pervasiveness)
Introduction to Network Defense
Information Asset Classification
Information Security Governance 25 th June 2007 Gordon Micallef Vice President – ISACA MALTA CHAPTER.
Nick Wildgoose 8 March 2012 BCI Workshop DELETE THIS TEXT AND PUT COMPANY LOGO IN THIS WHITE SPACE Understanding Risk within your Supply Chain SC1(V1)Jul/05/10GC/ZCA.
Session 16: Distribution of Geospatial Data 1 Distribution of Geospatial Data in the Public Environment Hazard Mapping and Modeling.
EOSC Generic Application Security Framework
Project Risk Management. The Importance of Project Risk Management Project risk management is the art and science of identifying, analyzing, and responding.
Audits & Assessments: What are the Differences and How Do We Learn from the Results? Brown Bag March 12, 2009 Sal Rubano – Director, Office of the Vice.
DSSA-WG Progress Update Dakar – October Charter: Background At their meetings during the ICANN Brussels meeting the At-Large Advisory Committee.
Basics of OHSAS Occupational Health & Safety Management System
Working Group #4: Network Security – Best Practices March 6, 2013 Presenters: Rod Rasmussen, Internet Identity Tony Tauber, Comcast WG #4.
1 Introduction to Security Chapter 5 Risk Management: The Foundation of Private Security.
Update report on GNSO- requested Whois studies Liz Gasster Senior Policy Counselor 7–12 March 2010.
Consumer Trust, Consumer Choice & Competition Presenter: Steve DelBianco Chair: Rosemary Sinclair.
David N. Wozei Systems Administrator, IT Auditor.
DSSA Update Costa Rica – March, Goals for today Update you on our progress Raise awareness Solicit your input.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
CcNSO Update for APTLD New Delhi February 2012 Keith Davidson, ccNSO Councillor.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
Text. #ICANN49 Data & Metrics for Policy Making Working Group Thursday 27 March 2014 – 08:00.
DSSA Update Costa Rica – March, Goals for today Update you on our progress Raise awareness Solicit your input 2.
DSSA Update Costa Rica – March, Goals for today Update you on our progress Raise awareness Solicit your input 2.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
ENISA efforts for securing European Internet Infrastructure
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Conficker Update John Crain. What is Conficker? An Internet worm  Malicious code that is self-replicating and distributed over a network A blended threat.
Introduction to Hazards Risk Management
DSSA-WG Progress Update Singapore – June Charter: Background At their meetings during the ICANN Brussels meeting the At-Large Advisory Committee.
An Update of COSO’s Internal Control–Integrated Framework
Fostering Multi-Stakeholder Internet Governance Models in the Region Bill Graham, Director, ICANN Board.
DSSA Update Costa Rica – March, Goals for today Update you on our progress Raise awareness Solicit your input.
The Objectives of the Seminar. The Seminar Objectives 1. The ASEAN Committee on Disaster Management (ACDM) launched the ASEAN Regional Program on Disaster.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Risk Management Process Frame = context, strategies Assess = determine.
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
Update on Consumer Choice, Competition and Innovation (CCI) WG Rosemary Sinclair.
Software Packaging for Reuse James Marshall (INNOVIM), Code 614.5, NASA GSFC The Software Packaging for Reuse document (version 1.0), developed and recently.
1 27Apr08 Some thoughts on Internet Governance and expansion of the Domain Name space Paul Twomey President and CEO 9 August 2008 Panel on Internet Governance.
Internal Audit Quality Assessment Guide
Business Continuity Planning 101
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
IS&T Project Reviews September 9, Project Review Overview Facilitative approach that actively engages a number of key project staff and senior IS&T.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
Headquarters U.S. Air Force
The Sendai Framework Data Readiness Review 2017
RISK MANAGEMENT An Overview: NIPC Model
Operations Security (OPSEC)
Cybersecurity ATD technical
Group Meeting Ming Hong Tsai Date :
Taking the STANDARDS Seriously
Effective Risk Management in Decision Making Process
Baseline Expectations for Trust in Federation
DSC Contract Management Committee Meeting
Data Security and Protection Toolkit Assurance 2018/19
Presentation transcript:

DSSA Update Costa Rica – March,

Goals for today Update you on our progress Raise awareness Solicit your input 2

Charter: Goals and Objectives Report to respective participating SO’s and AC’s on: – Actual level, frequency and severity of threats to the DNS – Current efforts and activities to mitigate these threats to the DNS – Gaps (if any) in the current response to DNS issues – Possible additional risk mitigation activities that would assist in closing those gaps (if considered feasible and appropriate by the WG) 3

Unpacking some terms Our charter speaks to “Threats” Threat-events (what happens) should not be confused with: Adverse impact - things that may result from the threat-event Vulnerabilities - things that allow it to happen Predisposing conditions - things that help prevent it from happening Adversarial threat-sources – people initiating it Non-adversarial threat-sources - non-adversarial events that initiate it Controls and mitigation - actions to reduce likelihood and impact 4

Activity since Singapore The working group has: – Developed a protocol for handling confidential information (and would be happy to share it) – Selected, and begun to tailor, a methodology to structure the remaining work – Begun the detailed analysis of the risk assessment 5

Methodology – NIST Rationale The DSSA realized that using a predefined methodology would save time and improve our work product We selected NIST after reviewing several dozen alternatives The reasons we selected this one include: – It’s available at no cost – It’s being actively supported and maintained – It’s widely known and supported in the community – It’s likely to be consistent with the needs of other parts of ICANN (and thus our pioneering may produce something that can be “repurposed” elsewhere in the organization) 6

Methodology – NIST Example – Adversarial Risk Model 7 An example of the model – risks from “adversarial” events (which differs from “non-adversarial” threats such as errors, accidents, etc.) Benefits: Consistent terminology Shared model Structured work Sample deliverables world

Where we are… Approach 8 Launch Identify Threats & Vulnerabilities Analyze Threats & Vulnerabilities Analyze Threats & Vulnerabilities Report We are here – getting started with this phase of the work We are hoping to have a high-level version of this done by Prague

Where we are… Status 9 We’ve been at this for 43 weeks We’ve developed substantial (and reusable) – Data – Methods Given our resources, pick any 2 of 3 going forward – Detail (identify vs. analyze high-risk scenarios) – Speed (6 months vs. 36) – Accuracy

Where we are… Analysis phase – based on tailored NIST methods 10 Assess threat events Determine level of impact We have concluded that there are three threat-events: Zone does not resolve Zone is incorrect Zone security is compromised In the worst case there would be broad harm/consequence/impact to operations, assets, individuals, other organizations and the world if any of these threat-events occur. And in all cases there would be significant problems for registrants and users in the zone. Determine nature of impact Damage to or incapacitation of a critical infrastructure sector. Relational harms (damage to trust relationships or reputation) Harm to individuals (Injury or loss of life, damage to image or reputation) Harm to assets (physical facilities, information systems, networks, information assets) Harm to operations, e.g.: Inability to perform current missions/business functions. Direct financial costs. Harms (e.g., financial costs, sanctions) due to noncompliance with laws, contracts or regulations.

Where we are going Analysis phase – based on tailored NIST methods 11 Assess vulnerabilities, controls and predisposing conditions Determine likelihood Determine risk Vulnerabilities – are they severe and widespread? Predisposing conditions – are they pervasive? Controls and mitigation – are they effective and deployed? Threat sources – how broad is range of impact, what are their capabilities, how strong is their intent, are they targeting the DNS? Initiation – what is the likelihood that a threat-event will happen? Given all of the above – what are the high-risk scenarios?

Questions? 12

How we work (design credit -- CLO) 13 Live chat Polling Definitions Agenda Participants Shared document

Charter: Background At their meetings during the ICANN Brussels meeting the At-Large Advisory Committee (ALAC), the Country Code Names Supporting Organization (ccNSO), the Generic Names Supporting Organization (GNSO), the Governmental Advisory Committee (GAC), and the Number Resource Organization (NROs) acknowledged the need for a better understanding of the security and stability of the global domain name system (DNS). This is considered to be of common interest to the participating Supporting Organisations (SOs), Advisory Committees (ACs) and others, and should be preferably undertaken in a collaborative effort. 14

The methodology presumes a tiered approach to the work DSSA is chartered to look at the broadest, most general tier However we feel it may be useful to pursue one or two deeper, narrower analyses of specific threats once our “survey” work is complete Methodology – NIST Risk Management Hierarchy 15

Problem: the evaluation per NIST methodology does not scale It’s all about choices Threat tree could easily grow to over 1000 permutations Prune the tree along the way, in order to focus on the highest risks Leave a framework that can be used to address: – New things – Changes – Greater detail 16

Architecture 17

Confidential information 18 Note: Sensitivity, attribution and release to public are determined by info-provider SensitiveNot sensitive Not attributed to source (transmitted through trusted 3 rd party or summaries of Type 1 developed by sub-group) Type 2: Distributed to sub- groups only. (Info-providers determine ultimate distribution) Info-provider authorizes release Type 3: Distributed to DSSA and public (“sanitized” info from sub- groups and other non- attributed information) Attributed to sourceType 1: Distributed to sub- groups only (under NDA, most- protected) Confidential info must never pass through this path. This is the exposure of information we’re trying to prevent. Type 4: Distributed to DSSA and public