ECE579S/8 #1 Spring 2011 © 2000-2011, Richard A. Stanley ECE579S Computer and Network Security 8: Certification & Accreditation; Red/Black Professor Richard.

Slides:



Advertisements
Similar presentations
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
Advertisements

1 NIST, FIPS, and you... Bob Grill Medi-Cal ISO July 16, 2009.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
DoD Information Assurance Certification and Accreditation Process (DIACAP) August 2011.
© 2005, QEI Inc. all characteristics subject to change. For clarity purposes, some displays may be simulated. Any trademarks mentioned remain the exclusive.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Lecture 1: Overview modified from slides of Lawrie Brown.
Security Controls – What Works
NLRB: Information Security & FISMA Daniel Wood, Chief IT Security February 19, 2004.
Information Security Policies and Standards
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Christopher P. Cabuzzi CS 591 DEFENSE INFORMATION ASSURANCE CERTIFICATION & ACCREDITATION PROCESS (DIACAP) Chris Cabuzzi, DIACAP, 12/8/10 1.
Information Systems Security Officer
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Stephen S. Yau CSE , Fall Security Strategies.
Complying With The Federal Information Security Act (FISMA)
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
SEC835 Database and Web application security Information Security Architecture.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil March 20, 2015 UNCLASSIFIED Industrial Security.
Information Systems Security Computer System Life Cycle Security.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Presented to President’s Cabinet. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an.
Federal Cyber Policy and Assurance Issues Dwayne Ramsey Computer Protection Program Manager Berkeley Lab Cyber Security Summit September 27, 2004.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil August 12, 2014 UNCLASSIFIED NISPOM Update.
Move over DITSCAP… The DIACAP is here!
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Certification and Accreditation CS Unit 1: Background LTC Tim O’Hara Ms Jocelyne Farah Mr Clinton Campbell.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
UNCLASSIFIED DITSCAP Primer. UNCLASSIFIED 1/18/01DITSCAP Primer.PPT 2 DITSCAP* Authority ASD/C3I Memo, 19 Aug 92 –Develop Standardized C&A Process DODI.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Certification and Accreditation CS Syllabus Ms Jocelyne Farah Mr Clinton Campbell.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
T.A 2013/2014. Wake Up Call! Malware hijacks your , sends death threats. Found in Japan (Oct 2012) Standford University Recent Network Hack May Cost.
ISO/IEC 27001:2013 Annex A.8 Asset management
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
1 Certification and Accreditation CS Unit 4:RISK MANAGEMENT Jesus Gonzalez Kalpana Bahunoothula Jocelyne Farah.
The Art of Information Security: A Strategy Brief Uday Ali Pabrai, CISSP, CHSS.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Information Security tools for records managers Frank Rankin.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
OFFICE OF VA ENTERPRISE ARCHITECTURE VA EA Cybersecurity Content Line of Sight Report April 29, 2016.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
CS457 Introduction to Information Security Systems
Team 1 – Incident Response
Introduction to the Federal Defense Acquisition Regulation
I have many checklists: how do I get started with cyber security?
DFARS Cybersecurity Requirements
How to Mitigate the Consequences What are the Countermeasures?
IS4680 Security Auditing for Compliance
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

ECE579S/8 #1 Spring 2011 © , Richard A. Stanley ECE579S Computer and Network Security 8: Certification & Accreditation; Red/Black Professor Richard A. Stanley, P.E.

ECE579S/8 #2 Spring 2011 © , Richard A. Stanley Last time…SSL/TLS Summary SSL/TLS provides a means for secure transport layer communications in TCP/IP networks SSL is a commonly used protocol, developed by Netscape, but ubiquitously used in browsers, etc. The key element of SSL is the handshake protocol

ECE579S/8 #3 Spring 2011 © , Richard A. Stanley Formal Evaluation Summary Formal security evaluation techniques are academically interesting, but have until recently failed to provide significant practical improvement in fielded systems security Emphasis is shifting to new evaluation schemes and empirical, policy-based security evaluation for trusted systems Both approaches offer opportunities for exploitation by malefactors and for real improvement in systems security

ECE579S/8 #4 Spring 2011 © , Richard A. Stanley IDS Summary IDS’s can be useful in monitoring networks for intrusions and policy violations Up-to-date attack signatures and policy implementations essential Many types of IDS available, at least one as freeware Serious potential legal implications Automated responses to be avoided

ECE579S/8 #5 Spring 2011 © , Richard A. Stanley SRA Proprietary5 Cyber Threat: Real & Damaging… Undermining both our national security and our economic leadership in the world marketplace –Threat started as nuisance activities by isolated bad actors –Threat is now coming from nation states, commercial espionage, terrorist organizations, organized crime groups, and ‘for-hire’ cyber organizations—it’s a business—and often in concert –Our intellectual property is the target F22 Oil exploration Google The extent of the damage is only beginning to be publicly acknowledged; >$1T and years and years of technology leadership

ECE579S/8 #6 Spring 2011 © , Richard A. Stanley SRA Proprietary6 Advanced Persistent Threats Step 1 - Reconnaissance Step 2 - Initial Intrusion into the Network Step 3 - Establish a Backdoor into the Network Step 4 - Obtain User Credentials Step 5 - Install Various Utilities Step 6 - Privilege Escalation / Lateral Movement / Data Exfiltration Step 7 - Maintain Persistence Exploitation Life Cycle

ECE579S/8 #7 Spring 2011 © , Richard A. Stanley SRA Proprietary7 Vulnerability –External and Internal Vulnerabilities at all layers -Internet connections - -Software (malware, botnets) -Hardware -Firmware -Web pages/banners/pop-ups -Databases (SQL injection)

ECE579S/8 #8 Spring 2011 © , Richard A. Stanley SRA Proprietary8 The future wave of access vulnerability It won’t get any easier! The internet of things…

ECE579S/8 #9 Spring 2011 © , Richard A. Stanley SRA Proprietary9 IT Security Roles Designated Approving Authority (DAA) Accepts risk, issues ATO for IS Certifying Authority (CA)Certifies IS Information Assurance (IA) Manager (IAM) Responsible for the IA program for IS or organization IA Officer (IAO)Implements IA program for IAM User Representative (UR)Represents users in DIACAP Privileged User with IA responsibilities System Administrator (for example) Authorized User Any appropriately authorized individual

ECE579S/8 #10 Spring 2011 © , Richard A. Stanley SRA Proprietary10 IT Security Situation

ECE579S/8 #11 Spring 2011 © , Richard A. Stanley SRA Proprietary11 Terms and Definitions Cyber Security –Protection of computer systems, computer networks, and electronically stored and transmitted information; network and Internet security Information Security –Protection of information and information systems, provideng confidentiality, integrity (including authentication and non-repudiation), and availability. –Includes cyber security plus non-computer issues physical security of buildings personnel security security of paper files

ECE579S/8 #12 Spring 2011 © , Richard A. Stanley SRA Proprietary12 Terms and Definitions Information Assurance –Superset of information security, emphasizes strategic risk management over tools and tactics. –Also includes: Privacy Compliance Audits Business continuity Disaster recovery

ECE579S/8 #13 Spring 2011 © , Richard A. Stanley SRA Proprietary13 Information Security Cyber-Security plus protection for non-electronic Information Ensures: Confidentiality Integrity Availability Information Assurance Information Security Plus: Strategic Risk Management Privacy Compliance Audits Business Continuity Disaster Recovery Note : For SRA, Cyber Security = Information Assurance Cyber Security Defense-in-Depth for computers, networks, and electronic information

ECE579S/8 #14 Spring 2011 © , Richard A. Stanley SRA Proprietary14 THREAT - entity, circumstance, event producing intentional or accidental harm by: –Unauthorized access, destruction, disclosure, modification of data –Denial of Service (DoS) affecting mission performance VULNERABILITY – exploitable weakness in: –Computing, telecommunications system, or network system security procedures –Internal controls or implementation ASSET - personnel, hardware, software, or information that may possess vulnerabilities and are being protected against threats Threats, Vulnerabilities, Assets

ECE579S/8 #15 Spring 2011 © , Richard A. Stanley SRA Proprietary15 RISK - measure of the extent that an entity is threatened by potential circumstance/event, a function of likelihood of circumstance/ event occurring and resulting adverse impacts RISK can be thought of as where threats, vulnerabilities and assets overlap Risk

ECE579S/8 #16 Spring 2011 © , Richard A. Stanley SRA Proprietary16 References DoDD E- Information Assurance (IA) –Establishes policy and assigns responsibilities to achieve Department of Defense (DoD) information assurance (IA) DoDI Information Assurance (IA) Implementation –Implements policy, assigns responsibilities, and prescribes procedures for applying integrated, layered protection of the DoD information systems DoDI DoD Information Assurance Certification and Accreditation Process (DIACAP) –Establishes the DIACAP for authorizing the operation of DoD Information Systems DoD M - Information Assurance Workforce Improvement Program –provides guidance and procedures for the training, certification, and management of the DoD workforce conducting Information Assurance (IA) functions in assigned duty positions DoDI Information Assurance (IA) in the Defense Acquisition System –Implements policy, assigns responsibilities, and prescribes procedures to integrate IA into the Defense Acquisition System DoD M - National Industrial Security Program Manual (NISPOM) –Provides baseline standards for the protection of classified information released or disclosed to industry in connection with classified contracts under the NISP

ECE579S/8 #17 Spring 2011 © , Richard A. Stanley SRA Proprietary17 DoDD E applies to… All DoD owned or controlled information systems Includes systems covered under National Industrial Security Program (NISP) Does not apply to weapons systems with no platform IT interconnection

ECE579S/8 #18 Spring 2011 © , Richard A. Stanley SRA Proprietary18 National Security System (NSS) Definition National security systems are information systems operated by the U.S. Government, its contractors or agents that contain classified information or that –involve intelligence activities –involve cryptographic activities related to national security –involve command and control of military forces –involve equipment that is an integral part of a weapon or weapons system –are critical to the direct fulfillment of military or intelligence missions (not including routine administrative and business applications)

ECE579S/8 #19 Spring 2011 © , Richard A. Stanley SRA Proprietary19 Cyber Security Considerations What type of data ? –At rest –Transmitted –Processed –Encrypted Systems that store, process, transmit government data –What is the information flow? Upstream Downstream –Interconnections –Input/output –Information sharing –Mobile media

ECE579S/8 #20 Spring 2011 © , Richard A. Stanley SRA Proprietary20 Mission Assurance Category/Confidentiality Level Mission Assurance Category (MAC 1, 2, 3) –Importance of information and information systems –Availability and integrity Confidentiality Levels –Information classification level and need-to-know All DoD systems assigned MAC and Confidentiality Level Required security controls based on MAC and Confidentiality Level

ECE579S/8 #21 Spring 2011 © , Richard A. Stanley SRA Proprietary21 MAC 1,2,3 Compared

ECE579S/8 #22 Spring 2011 © , Richard A. Stanley SRA Proprietary22 Confidentiality Levels Classified - Official information that has been determined to require, in the interests of national security, protection against unauthorized disclosure –Confidential –Secret –Top Secret –Top Secret SCI, etc Sensitive - Loss, misuse, unauthorized access, or modification could adversely affect: –National interest –Conduct of Federal programs –Privacy of individuals Public - Official DoD information that has been reviewed and approved for public release by the information owner

ECE579S/8 #23 Spring 2011 © , Richard A. Stanley SRA Proprietary23 Information System Categories Enclaves Automated information system (AIS) application Outsourced IT-based process Platform IT interconnection

ECE579S/8 #24 Spring 2011 © , Richard A. Stanley SRA Proprietary24 System Boundary DoDD only mentions enclave boundary, does not define system boundary From NIST SP rev.1, a set of information resources –Same direct management control –Same function or mission objective –Same operating characteristics –Same information security needs –Same general operating environment (or if distributed, similar operating environments) In NIST this is security authorization boundary DIACAP refers to it as accreditation boundary Applies to production, test, and development

ECE579S/8 #25 Spring 2011 © , Richard A. Stanley SRA Proprietary25 IA Control Subject Areas

ECE579S/8 #26 Spring 2011 © , Richard A. Stanley SRA Proprietary26 IA Control Examples

ECE579S/8 #27 Spring 2011 © , Richard A. Stanley SRA Proprietary27 DIACAP Overview DoDI DoD Information Assurance Certification and Accreditation Process (DIACAP) –“Establishes a C&A process to manage the implementation of IA capabilities and services and provide visibility of accreditation decisions regarding the operation of DoD ISs, including core enterprise services- and Web services-based software systems and applications”.

ECE579S/8 #28 Spring 2011 © , Richard A. Stanley SRA Proprietary28 DIACAP Applicability DoD-owned/controlled Information Systems with DoD information –receive –process –store –display –transmit Any classification or sensitivity Must meet the definition of a DoD Information System (enclave, AIS, outsourced IT-based process, or platform IT interconnection) from DoD Directive E

ECE579S/8 #29 Spring 2011 © , Richard A. Stanley SRA Proprietary29 DIACAP Team Designated Approving Authority – DAA –Incorporates IA in information system life-cycle management processes –Grants Authorization to Operate Certifying Authority – CA –DoD Component Senior Information Assurance Officer (SIAO) (or designee) –Makes certification determination

ECE579S/8 #30 Spring 2011 © , Richard A. Stanley SRA Proprietary30 DIACAP Team IS Program or System Manager - ISPM/SM –Implement DIACAP –Develop, track, resolve, and maintain the DIACAP Implementation Plan (DIP) –Ensure IT Security POA&M development, tracking, and resolution –Ensure that IS has a IA manager (IAM)

ECE579S/8 #31 Spring 2011 © , Richard A. Stanley SRA Proprietary31 DIACAP Implementation All IT has some information assurance requirements –DoDD E requires C&A for all DoD information systems –DoDI implements the requirements of DoDD E and defines controls –DoDI defines and implements the DIACAP process for C&A of DoD information systems DoD Information Systems are: –Enclave –Automated Information System (AIS) application –Outsourced IT-based processes –Platform IT with GIG interconnections

ECE579S/8 #32 Spring 2011 © , Richard A. Stanley SRA Proprietary32 DIACAP Implementation Development and test systems –Create full ATO package with IA Controls based on MAC and CL within development/testing environment –Send ATO package to the field with the completed system –The field organization Determines MAC and CL in their environment Reviews development/testing ATO package Determines which IA Controls are still valid and which must be newly implemented

ECE579S/8 #33 Spring 2011 © , Richard A. Stanley SRA Proprietary33 DIACAP Packages Comprehensive package –Includes all the information resulting from the DIACAP process –Used for the CA recommendation Executive package –Minimum information –Used for an accreditation decision –Provided to others in support of accreditation or other decisions, such as connection approval

ECE579S/8 #34 Spring 2011 © , Richard A. Stanley SRA Proprietary34 DIACAP Packages

ECE579S/8 #35 Spring 2011 © , Richard A. Stanley SRA Proprietary35 DIACAP Activities

ECE579S/8 #36 Spring 2011 © , Richard A. Stanley SRA Proprietary36 FISMA E- Government Act of 2002 Recognized the importance of information security to the economic and national security interests of the United States Title III of the E-Government Act: FISMA FISMA is the Federal Information Security Management Act Requires federal organizations to provide security for the information and information systems that support the agency

ECE579S/8 #37 Spring 2011 © , Richard A. Stanley SRA Proprietary37 FISMA Requirements Applies to all federal agencies, DoD and civil Periodic assessments of the risk Policies and procedures based on risk assessment Component-level plans for providing IT security for networks, facilities, and systems or groups of IT systems IT security awareness training Testing and evaluation of IT security policies, procedures, and practices at least annually Process for planning, implementing, evaluating, and documenting remedial action Procedures for detecting, reporting, responding to security incidents Plans and procedures to ensure continuity of operations for IT systems supporting the operations and assets of the organization

ECE579S/8 #38 Spring 2011 © , Richard A. Stanley Red/Black Well, OK, that isn’t really the Red/Black we are going to study, but do I have your attention now?

ECE579S/8 #39 Spring 2011 © , Richard A. Stanley Red/Black Red –Circuits carrying classified information that is not encrypted –Often used to refer to classified information itself Black –Circuits carrying information that is encrypted –Often used to refer to unclassified information Nomenclature comes from the TEMPEST program –A series of government-led approaches to minimize the effects of information leakage through covert channels as a result of signal coupling

ECE579S/8 #40 Spring 2011 © , Richard A. Stanley Red/Black Separation Owing to the laws of physics, physical separation between Red circuits and Black circuits is required to ensure no (or, in practice, minimal possible) signal leakage. Requirements can be found in, inter alia, –NSTISSAM TEMPEST 2-95, 12 December 1995, RED/BLACK INSTALLATION GUIDANCE –MIL-HDBK-232A, 24 October 2000, RED/BLACK ENGINEERING - INSTALLATION GUIDELINES –NSTISSI No.7003, 13 December 1996, Protective Distribution Systems Red and Black circuits CANNOT be interconnected, as we do not how to avoid covert channels in that circumstance

ECE579S/8 #41 Spring 2011 © , Richard A. Stanley Summary If you are involved with information assurance on government systems, you will be involved with many differing regulations and requirements Engineering information systems that carry classified information must deal with Red/Black standards

ECE579S/8 #42 Spring 2011 © , Richard A. Stanley Student Research Presentations