1 Securing U.S. Federal Information Systems and Beyond: NIST Activities and Other Government Initiatives Ed Roback Chief, Computer Security Division April.

Slides:



Advertisements
Similar presentations
June 27, 2005 Preparing your Implementation Plan.
Advertisements

NISTs Role in Securing Health Information AMA-IEEE Medical Technology Conference on Individualized Healthcare Kevin Stine, Information Security Specialist.
Status of U.S. Smart Card Deployment Jim Dray Porvoo 7/ World eID Meeting May 2005.
Unit 1: Introductions and Course Overview Administrative Information  Daily schedule  Restroom locations  Breaks and lunch  Emergency exit routes 
15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
1 1 A Synopsis of Federal Information Processing Standard (FIPS) 201 for Personal Identity Verification (PIV) of Federal Employees and Contractors Presentation.
1 NIST, FIPS, and you... Bob Grill Medi-Cal ISO July 16, 2009.
Federal Risk and Authorization Management Program (FedRAMP) Lisa Carnahan, Computer Scientist National Institute of Standards & Technology Standards Coordination.
Department of Health and Human Services Personal Identity Verification Training APPLICANT.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
“Personal Identity Verification (PIV) of Federal Employees and Contractors” October 27, 2005 Homeland Security Presidential Directive 12 (HSPD-12)
Department of Labor HSPD-12
National Infrastructure Protection Plan
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Summer IAVA1 NATIONAL INFORMATION ASSURANCE TRAINING STANDARD FOR SYSTEM ADMINISTRATORS (SA) Minimum.
National Institute of Standards and Technology 1 NIST Guidance and Standards on System Level Information Security Management Dr. Alicia Clay Deputy Chief.
Security Controls – What Works
NLRB: Information Security & FISMA Daniel Wood, Chief IT Security February 19, 2004.
Information Security Policies and Standards
Federal Information Processing Standard (FIPS) 201, Personal Identity Verification for Federal Employees and Contractors Tim Polk May.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Introduction to the State-Level Mitigation 20/20 TM Software for Management of State-Level Hazard Mitigation Planning and Programming A software program.
Update on Interoperability Roadmap Comments Sections E, F, and G Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
1 July 08, 2010 Information Security Officer Meeting.
Risk Assessment Frameworks
RC14001 ® Update GPCA Responsible Care Committee September 23, 2013.
Dr. Ron Ross Computer Security Division
Complying With The Federal Information Security Act (FISMA)
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Continuity of Operations Planning COOP Overview for Leadership (Date)
Information Security Framework & Standards
HSPD-12 and FIPS-201 Overview v Learning Objectives At the end of this course, you will be able to: Describe Homeland Security Presidential Directive.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
NIST Special Publication Revision 1
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
NAPHSIS REAL ID Overview June 6, 2007 In support of this key requirement,
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Protecting Critical Information Assets and Records FIRM Forum.
Business and Systems Aligned. Business Empowered. TM Federal Identity Management Handbook May 5, 2005.
The Value of Common Criteria Evaluations Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology 100 Bureau Drive;
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
HSPD-12 Identity Management Initiative Carol Bales Senior Policy Analyst United States Office of Management and Budget North American Day 2006.
NIST and Computer Security Competencies and Resources to Support E-Voting and Security Ed Roback Chief, Computer Security Division Information Technology.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
DOC Web Policies & Best Practices Jennifer Hammond NOAA Research WebShop 2002 August 7, 2002.
Security Checklists for IT Products. Agenda Overview of Checklist Program Discussion of Operational Procedures Current Status Next Steps.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
NIST HIPAA Security Rule Toolkit Kevin Stine Computer Security Division Information Technology Laboratory National Institute of Standards and Technology.
Presented by Eliot Christian, USGS Accessibility, usability, and preservation of government information (Section 207 of the E-Government Act) April 28,
NATIONAL INCIDENT MANAGEMENT SYSTEM Department of Homeland Security Executive Office of Public Safety.
The NIST Special Publications for Security Management By: Waylon Coulter.
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
1 Presented by David Thompson, TIA December 14, 2005 NFPA 1600 and Emergency Communications.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
Security Checklists for IT Products
Computer Security Division Information Technology Laboratory
Improving Mission Effectiveness By Exploiting the Command’s Implementation Of the DoD Enterprise Services Management Framework - DESMF in the [name the.
VERMONT INFORMATION TECHNOLOGY LEADERS
Matthew Christian Dave Maddox Tim Toennies
NERC Critical Infrastructure Protection Advisory Group (CIP AG)
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Group Meeting Ming Hong Tsai Date :
Continuity of Operations Planning
Performance based planning and programming
Presentation transcript:

1 Securing U.S. Federal Information Systems and Beyond: NIST Activities and Other Government Initiatives Ed Roback Chief, Computer Security Division April 4, 2005

2 Agenda Topics NIST Statutory Responsibilities & Other Key Assignments Overview of Current Projects High Visibility Projects New Projects

3 NIST Statutory Security Mandates Federal Information Security Management Act of 2002 Federal security standards and guidelines Minimum requirements; categorization standards, incident handling, NSS identification, … Advisory Board support Cyber Security Research and Development Act of 2002 Extramural research support Fellowships Intramural research Checklists NRC study support Non-national security systems

4 Other Key Security Assignments HAVA – Security of Voting Systems Homeland Security Presidential Directive #12

5 Federal Security Roles Classified Systems A. National Security Systems – “Committee on National Security Systems” B. Intelligence Systems – Director of Central Intelligence Unclassified Systems NIST – standards, guidelines, security research (in-house and academic-industry partnerships) Federal Information Security Management Act of 2002 Cyber Security Research and Development Act of 2002 DHS – Day-to-day security alerts, operations, etc. National Cyber Security Division in IAIP NSF – Academic research support Cyber Security Research and Development Act of 2002 Congress/ OMB – Government-wide policy/oversight role

6 No Standard Terminology Standards –Performance vs. interoperability –Market Dominant product “standards” –Voluntary Industry Consensus Standards (“formal”) –What’s a FIPS? (“Federal”) Applicability… Guidelines … Applicability of NIST Guidelines… “Best” Practices Procedures Policies

7 ISOIEC ISOTC 68 ISO/IEC JTC1 ITU IETF Internet Area Opns & Mgmt Area Routing Area Security Area Transport Area SC 2 SC 6 International ETSI EESSI eEuropeNESSIEEurosmart BSIJIS Japan’s Cryptographic Technology Evaluation Committee ANSI National Regional X9, Inc. INCITS M1B10T3T4X9F SC 17SC 27SC 37 IEEE ICAO Key Standards Organizations

8 NIST-CSD Research Projects Cryptography / E-Auth –Cryptographic Standards and Applications –Cryptographic Standards Toolkit –E-Authentication Security Testing –Cryptographic Module Validation Program –800-53A Validation Guideline Security Management and Guidance –Industry and Federal Security Standards –Security Management Guidelines –Agency Program Reviews Emerging Technologies –Checklists –Technical Security Guidelines –Government Smart Card Program –Mobile Device Security –Forensics –Access Control and Authorization Management –ICAT

9 Recent Federal Security Standards FIPS 201, Personal Identity Verification for Federal Employees and Contractors FIPS 199, Standards for Security Categorization of Federal Information and Information Systems FIPS 198, Keyed-Hash Message Authentication Code FIPS 197, Advanced Encryption Standard Coming Soon… FIPS 200, Minimum Requirements for All Federal Systems* * Exact title TBD

10 Recently Completed NIST Security Guidelines Draft , Cryptographic Algorithms and Key Sizes for Personal Identity Verification Draft , Guide to IPsec VPNs Draft , Biometric Data Specification for Personal Identity Verification Draft , Integrated Circuit Card for Personal Identity Verification , Guidelines on PDA Forensics November , Draft , The NIST Security Configuration Checklists Program , Draft , Guidance for Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist , Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, May , An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule, March 2005 Available at

11 Recently Completed NIST Security Guidelines , Integrating Security into the Capital Planning and Investment Control Process, January , Security Considerations in the Information System Development Life Cycle,October 2003 (publication original release date)(revision 1 released June 2004) , Electronic Authentication Guideline: Recommendations of the National Institute of Standards and Technology, June 2004 (publication original release date) (revision released September 2004) , Computer Security Incident Handling Guide, January , Guide for Mapping Types of Information and Information Systems to Security Categories, June , Guideline for Identifying an Information System as a National Security System, August , Security Considerations for Voice Over IP Systems, January 2005 DRAFT Recommendation on Key Management , Security Metrics Guide for Information Technology Systems,July , Recommended Security Controls for Federal Information Systems, February 2005 DRAFT , Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations Available at

12

13

14

15 Future Guidelines* Checklists and Configuration/Hardening Guides (DHS) Media Destruction/Sanitization (DHS) Risk Management (DHS) Incident Exercises (DHS) Malware (DHS) VOIP Forensics Handbook Sensor Deployment Penetration Testing & Vulnerability Management Technical Security Metrics Web Services IP/Telephony Convergence Trust frameworks RFID Embedded Systems Governance *funding permitting, except as noted

16

17

18 Please consider submitting any practices you may have for inclusion in our site!

19

20 Tested Products / Modules

21

22

23 3 High Visibility Projects FISMA Trilogy - #3 - Minimum Standards for all Federal Systems CSRDA - Checklists HSPD #12 - Personal Identity Verification

24 Key NIST Tasks to Implement FISMA

25 Categorization Standards FISMA Requirement  Develop standards to be used by federal agencies to categorize information and information systems based on the objectives of providing appropriate levels of information security according to a range of risk levels  Publication status: Federal Information Processing Standards (FIPS) Publication 199, “ Standards for Security Categorization of Federal Information and Information Systems ” Final Publication: December 2003 * * FIPS Publication 199 was signed by the Secretary of Commerce in February 2004.

26 FIPS Publication 199  FIPS 199 is critically important to enterprises because the standard —  Requires prioritization of information systems according to potential impact on mission or business operations  Promotes effective allocation of limited information security resources according to greatest need  Facilitates effective application of security controls to achieve adequate information security  Establishes appropriate expectations for information system protection

27 FIPS 199 Applications  FIPS 199 should guide the rigor, intensity, and scope of all information security-related activities within the enterprise including —  The application and allocation of security controls within information systems  The assessment of security controls to determine control effectiveness  Information system authorizations or accreditations  Oversight, reporting requirements, and performance metrics for security effectiveness and compliance

28 Security Categorization FIPS Publication 199 LowModerateHigh Confidentiality The loss of confidentiality could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. The loss of confidentiality could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. The loss of confidentiality could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. Integrity The loss of integrity could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. The loss of integrity could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. The loss of integrity could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. Availability The loss of availability could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. The loss of availability could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. The loss of availability could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. Guidance for Mapping Types of Information and Information Systems to FIPS Publication 199 Security Categories SP

29 Security Categorization FIPS Publication 199 LowModerateHigh Confidentiality The loss of confidentiality could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. The loss of confidentiality could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. The loss of confidentiality could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. Integrity The loss of integrity could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. The loss of integrity could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. The loss of integrity could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. Availability The loss of availability could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. The loss of availability could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. The loss of availability could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. Guidance for Mapping Types of Information and Information Systems to FIPS Publication 199 Security Categories SP Minimum Security Controls for High Impact Systems

30 Mapping Guidelines FISMA Requirement  Develop guidelines recommending the types of information and information systems to be included in each category  Publication status: NIST Special Publication , “ Guide for Mapping Types of Information and Information Systems to Security Categories ” Final Publication: June 2004

31 Minimum Security Requirements FISMA Requirement  Develop minimum information security requirements (management, operational, and technical security controls) for information and information systems in each such category  Publication status: Federal Information Processing Standards (FIPS) Publication 200, “ Minimum Security Controls for Federal Information Systems ” * NIST Deadline: December 2005 * NIST Special Publication , “ Recommended Security Controls for Federal Information Systems, ” February 2005, will provide interim guidance until completion of standard.

32 Security Control Assessment FISMA Requirement  Conduct periodic testing and evaluation of the effectiveness of information security policies, procedures, and practices (including management, operational, and technical security controls)  Publication status: NIST Special Publication A, “ Guide for Assessing the Security Controls in Federal Information Systems ” Initial Public Draft: 2005

33 Certification and Accreditation Supporting FISMA Requirement  Conduct periodic testing and evaluation of the effectiveness of information security policies, procedures, and practices (including management, operational, and technical security controls)  Publication status: NIST Special Publication , “ Guide for the Security Certification and Accreditation of Federal Information Systems ” Final Publication: May 2004

34 Personal Identity Verification For Federal Employees and Contractors Meeting the Requirements of HSPD #12…

35 General Objectives Common reliable identification verification for Government employees and contractors Reliable Identification Verification Government-wide - Interoperability - Basis for reciprocity

36 Personal Identity Verification Requirements HSPD-12: Policy for a Common Identification Standard Secure and reliable forms of personal identification: Based on sound criteria to verify an individual employee’s identity Is strongly resistant to fraud, tampering, counterfeiting, and terrorist exploitation Personal identity can be rapidly verified electronically Identity tokens issued only by providers whose reliability has been established by an official accreditation process

37 Personal Identity Verification Requirements Applicable to all government organizations and contractors To be used to grant access to Federally-controlled facilities and logical access to Federally-controlled information systems, to the maximum extent practicable Graduated criteria from least secure to most secure to ensure flexibility in selecting the appropriate security level for each application Not applicable to identification associated with national security systems To be implemented in a manner that protects citizens’ privacy

38 Personal Identity Verification Requirements HSPD:Policy for a Common Identification Standard Departments and agencies shall have a program in place to ensure conformance within 4 months after issuance of FIPS Departments and agencies to identify applications important to security that would benefit from conformance to the standard within 6 months after issuance Compliance with the Standard is required in applicable Federal applications within 8 months following issuance

39 Phased-Implementation Approach Two Parts to PIV Standard Part I – Common Identification and Security Requirements - HSPD #12 Control Objectives Examples: Identification shall be issued based on strong Government-wide criteria for verifying an individual employee’s identity The identification shall be capable of being rapidly authenticated electronically Government-wide - Identity Proofing Requirements (revised from October draft) - Effective October 2005 Part II – Common Interoperability Requirements - Specifications - No set deadline for implementation in PIV standard Migration Timeframe (i.e., Part I  II) - IAW HSPD #12, Implementation Plans for OMB before July OMB approves agency plans and/or develops schedule directive - OMB developing implementation guidance for public review and comment

40 Affiliation Civilian Doe John, G. United States Government Agency/Department Department of Homeland Security Issued 01/01/05 Expires 01/01/08 Pay O15 Federal Emergency Response Official Color Photograph Contact Chip Zone 2 – Name Arial 10pt Bold Reserved area. No printing is permitted in this area unless verified as printable area by card and/or printer manufacturers. Area for additional optional data. Agency- specific data may be printed in this area. See other examples for required placement of additional optional data elements. Note: In this example, Zone 9,11, and 13 are optional but shall be placed as depicted and therefore are not in the blue shaded area. Area likely to be needed by card manufacturer. Optional data may be printed in this area but may be subject to restrictions imposed by card and/or printer manufacturers. Zone 9 – Header

41 The NIST Security Configuration Checklists Program for IT Products

42 What is a Checklist? Often called lockdown guides, configuration guides, security guides, benchmark, hardening guides, STIGs, other terms A document or list of procedures to secure a system or application Implementation guides used to provide security controls to the information system Could include scripts, add-on templates, or executables

43 Why Checklists Most products are insecure out of the box Most users need assistance in configuring security controls due to complexity of the technology Demand for easy-to-understand checklists for improving security Demand for checklists tailored to different environments, such as home, small office, enterprise, or higher security Checklists can have a large impact on security with relatively small upfront investment

44 Tasking to NIST Cyber Security Research and Development Act of 2002 directs NIST to: –Develop, and revise as necessary, a checklist setting forth settings and option selections that minimize the security risks associated with each computer hardware or software system that is, or is likely to become widely used within the Federal Government. NIST would set priorities for development

45 FISMA Legislation FISMA (section 3534(b)(2)(D)(iii)) requires each agency to determine minimally acceptable system configuration requirements and ensure compliance with them NIST is expected to assist agencies in guidance for developing configuration checklists and for sharing them

46 NIST’s Response: Write guideline for developers and users Build the repository; populate with current checklists from NIST, NSA, DISA, CIS Get participation agreements from major developers Assist agencies in using the repository to share and acquire configuration checklists Work with vendors to begin including checklists with their products

47 How Does the Program Work? Developers follow NIST guidance in creating checklists, e.g., targeted operational environments After submission to NIST and initial screening, checklists are publicly reviewed Issues are addressed, checklist is listed in repository and maintained by developer Developers can use our logo on their products Users can provide feedback to NIST and developers

48 Operational Environments

49 Security Checklists for Commercial IT Products About Checklists Search the Security Checklist Database Under the Cyber Security Research and Development Act, NIST is charged with developing security checklists. These checklists describe security settings for commercial IT products. Operational Environment Each security checklist describes the operational environment for which it is intended to be used. These generally specify levels consistent with the government wide security categorizations for information systems. Partners The checklists provided on this website are provided by a wide variety of vendors, government agencies, consortia, non-profit organizations, and user organizations. For a complete list, click here. NIST gratefully acknowledges their contributions and assistance in providing this security service. Disclaimer The contents of each checklist is the responsibility of the submitting organization. We encourage users to send comments on specific checklists to the appropriate author. Search By specific product name Microsoft Windows 2000 By security environment Enterprise By product type Operating System Results (list of checklists) NIST Windows 2000 Special Publication NSA Windows 2000 Security Guide DISA Windows 2000 Security Configuration Guide CIS Windows 2000 Guide – Level 2

50 Developer Steps Overview Please consider submitting any checklists you may have for inclusion in our repository!

51 Screening Checklists Prior to Public Review NIST screens for applicability, technical merit based on established criteria NIST posts candidates for public review Comments are provided to the developer Issues addressed by the developer before final posting of the checklist As necessary, NIST uses independent qualified reviewers

52 Final Listing of Checklists on Repository After all issues get addressed, checklist is listed on repository NIST continues to receive user feedback, passes on to developer Checklist owner can use the logo on product material with conditions Users get advised to test and back up before applying checklists

53 Checklist Maintenance NIST schedules a periodic review of the checklist with developer – typically 1 year If major update, then checklist is rescreened/resubmitted for public review NIST or checklist owner can decide to “delist” the checklist Or, checklist can be frozen, i.e., archived, but remain on repository

54 NIST Checklist Program Logo To show participation in NIST Checklist Program and ownership of a checklist on repository Available to checklist producers who meet the NIST program requirements Producer must provide end-user checklist-related support Does not convey NIST endorsement

55 CSRC.NIST.GOV

56 Other Government Activities OMB Policy –Annual FISMA reporting –Policy on Implementation of New ID cards OMB – Security Line of Business DHS – NCSD –National Strategy to Secure Cyberspace DHS – S&T – Cyber NITRD Congress NSA – Educational Centers of Excellence PITAC report, “Cyber Security: A Crisis of Prioritization” CRS – “Creating a National Framework for Cybersecurity: An Analysis of Issues and Options” NIAP Review CNSS

57 Conclusions Security is key to protecting the Homeland, cyberspace, critical infrastructures and Government/Private information and systems Division has critical national-level statutory responsibilities Division has proven track record in delivering needed/useful standards, testing programs and guidelines; High demand: Expectations on our program are considerable, particularly among Federal community for leadership and guidelines/standards NIST’s security role in standards, guidelines, testing, education can make a real difference!

58 Contact Info Ed Roback Chief, Computer Security Division, NIST E- : Tel: Web site: csrc.nist.gov