Software Assurance Software Acquisition Working Group Chairs: Stan Wisseman Booz Allen Hamilton Mary L. Polydys National Defense University Information.

Slides:



Advertisements
Similar presentations
Effective Contract Management Planning
Advertisements

Identify Problems, Planning Objectives and Constraints.
State of Indiana Business One Stop (BOS) Program Roadmap Updated June 6, 2013 RFI ATTACHMENT D.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 4: Effective Integration.
Copyright (C) The Open Group 2014 Securing Global IT Supply Chains and IT Products by Working with Open Trusted Technology Provider™ Accredited Companies.
Determining CLIMASP Competencies Jerash University Development of Interdisciplinary Program on Climate Change and Sustainability Policy- CLIMASP Development.
KDP-1: Integrate supply chain knowledge into secure solutions concepts Evaluate supply chain threats with respect to the set of possible solutions under.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
U.S. General Services Administration General Services Administration Policy, the Procurement Process, the Buy Accessible Wizard, and Purchasing Section.
Maritime Security: Our Approach. Who is CUBIC?  Cubic Corporation (Amex) is an innovative supplier of products, systems and services to government and.
Dr. Julian Lo Consulting Director ITIL v3 Expert
Security Controls – What Works
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
TEMPUS ME-TEMPUS-JPHES
Managing Project Risk.
Stephen S. Yau CSE , Fall Security Strategies.
Risk Assessment Frameworks
Standards and Guidelines for Quality Assurance in the European
Internal Auditing and Outsourcing
SEC835 Database and Web application security Information Security Architecture.
EOSC Generic Application Security Framework
A Security Training Program through Transformational Leadership and Practical Approaches Tanetta N. Isler Federal Information Systems Security Educators’
Evaluation Office 1 Evaluating Capacity Development David Todd Senior Evaluation Officer GEF Evaluation Office.
Information Systems Security Computer System Life Cycle Security.
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
EARTO – working group on quality issues – 2 nd session Anneli Karttunen, Quality Manager VTT Technical Research Centre of Finland This presentation.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
SENG521 (Fall SENG 521 Software Reliability & Testing Software Product & process Improvement using ISO (Part 3d) Department.
Greening Government Operations Green Procurement Implementation Tools & Resources Canadian Public Procurement Forum October 1 st, 2007.
™ ™ © 2006, KDM Analytics Software Assurance Ecosystem and its Applications Djenana Campara Chief Executive Officer, KDM Analytics Board Director, Object.
1 Software Assurance: Mitigating Risks Attributable to Software Vulnerabilities Joe Jarzombek, PMP Deputy Director for Software Assurance Information Assurance.
CERTIFICATION In the Electronics Recycling Industry © 2007 IAER Web Site - -
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
ISO 9001:2008 to ISO 9001:2015 Summary of Changes
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Category #2 Bundling and Unbundling Workgroup September 24, 2007.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
2 William P. McNally Assistant Administrator for Procurement NASA Procurement Tenets August 4, 2008 NCMA Conference.
Delivering results that endure Delivering Results that Endure Managing Risks in the Software Acquisition Process GFIRST Conference June 2007 Stan Wisseman.
WEC MADRID 18 TH MARCH 2004 ASTRAZENECA’S APPROACH TO SUPPLIER RISK MANAGEMENT.
DOD SOFTWARE ASSURANCE INITIATIVE: Mitigating Risks Attributable to Software through Enhanced Risk Management Joe Jarzombek, PMP Deputy Director for Software.
VIETNAM CHAMBER OF COMMERCE AND INDUSTRY (VCCI) OFFICE FOR BUSINESS SUSTAINABLE DEVELOPMENT (SDforB) INTRODUCTION ANTI-CORRUPTION TOOLS IN BUSINESS.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Introduction to Project Management Chapter 9 Managing Project Risk
The common structure and ISO 9001:2015 additions
RECOMMENDATIONS OF THE GOVERNOR ’ S TASK FORCE ON CONTRACTING AND PROCUREMENT REVIEW Report Overview PD Customer Forum September 2002.
Evidence about the Benefits of CMMI ® What We Already Know and What We Need to Know Joe Jarzombek, PMP Deputy Director for Software Assurance Information.
SwA Co-Chair and Task Lead Strategy Session Agenda Technology, Tools and Product Evaluation Working Group Status Briefing Co-Chair(s) Michael Kass (NIST),
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
CNCI-SCRM STANDARDIZATION Discussion Globalization Task Force OASD-NII / DoD CIO Unclassified / FOUO.
ISO 9001:2015 Subject: Quality Management System Clause 8 - Operation
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
April 2016 RM1045 Network Services: Developing Your Invitation to Tender (ITT) / Request for Proposal (RfP) Document Set.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Security Development Lifecycle (SDL) Overview
Quality Management System Deliverable Software 9115 revision A Key changes presentation IAQG 9115 Team March 2017.
An Overview on Risk Management
Update from the Faster Payments Task Force
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Integrated Management System and Certification
Introduction to the Federal Defense Acquisition Regulation
Continuity Guidance Circular Webinar
Strategic Environmental Assessment (SEA)
Sam Catherine Johnston, Senior TA Specialist National AEM Center
Cynthia Curry, Director National AEM Center
Presentation transcript:

Software Assurance Software Acquisition Working Group Chairs: Stan Wisseman Booz Allen Hamilton Mary L. Polydys National Defense University Information Resources Management College

Software vulnerabilities jeopardize infrastructure operations, business operations & services, intellectual property, and national security Adversaries have capabilities to subvert the IT/software supply chain:  Government and businesses rely on COTS products and commercial developers using foreign and non-vetted domestic suppliers to meet majority of IT requirements  Software & IT lifecycle processes offer opportunities to insert malicious code and to poorly design and build software which enables future exploitation  Off-shoring magnifies risks and creates new threats to security, business property and processes, and individuals’ privacy – requires domestic strategies to mitigate those risks Needs for Software Assurance Strengthen operational resiliency

Today’s risk factors impact software assurance System interdependence and software dependence has software as the weakest link Software size and complexity obscures intent and precludes exhaustive test Outsourcing and use of an un-vetted software supply chain increases risk exposure Attack sophistication eases exploitation Reuse of software introduces other unintended consequences increasing the number of vulnerable targets The number of threats targeting software, coupled with the number of vulnerabilities and incidents, all contribute to the increased risk of asymmetric attacks and threats to software-enabled capabilities

Acquisition Program Supplier “Supply chain introduces risks to American society that relies on Federal Government for essential information and services.” “Scope of Supplier Expansion and Foreign Involvement” graphic in DACS Secure Software Engineering, July 2005 article “Software Development Security: A Risk Management Perspective” synopsis of May 2004 GAO report “Defense Acquisition: Knowledge of Software Suppliers Needed to Manage Risks” *

Acquisition officials have a due-diligence responsibility to factor in Software Assurance to reduce the risk exposure of exploitable software being passed to users of delivered software-intensive systems Acquiring what we want Threat modeling and analysis Requirements engineering Failsafe design and defect-free code Supply Chain Management Understanding what we acquired Production assurance evidence Comprehensive testing and diagnostics Formal methods & static analysis Using what we understand Policy/practices for use & acquisition Composition of trust Hardware support *Multiple Sources: DHS/NCSD, OASD(NII)IA, NSA, NASA, JHU/APL Knowing what it takes to “get” what we want Development/acquisition practices/process capabilities Criteria for assuring integrity & mitigating risks

DHS Software Assurance: Acquisition Collaborate with stakeholders to enhance software supply chain management through improved risk mitigation and contracting for secure software **  Collaborate with stakeholder organizations to support acquisition community to develop and disseminate: –Acquisition Managers handbook on software assurance for acquisition/procurement of software-intensive systems and services –Due-diligence questionnaire for RFI/RFP and source selection decision-making –Templates and sample statement of work / procurement language for acquisition and evaluation based on successful models  Collaborate with government and industry working groups to: –Identify needs for reducing risks associated with software supply chain –Provide acquisition training and education to develop applicable curriculum  Chair IEEE CS S2ESC WG to update of IEEE 1062, “Software Acquisition”  Collaborate with agencies implementing changes responsive to changes in the FAR that incorporated IT security provisions of FISMA when buying goods and services **NCSD Objective/Action 1.4.4

Most acquisition officials are unaware of the need to exercise due diligence for software assurance Want to convey message that managing risks during acquisition increases confidence that software is trusted to perform as expected and be more resistant to attack Target roles in the acquisition process include  Software Acquirers/Buyers (industry and government)  IA personnel supporting acquisition managers (if available)  Decision Makers for software acquisitions  Prime contractors and the subs in their supply chain  Software suppliers  Program/Project Managers  Requirements Personnel

During the Planning Phase, identification of software risk considerations is essential Determining Need and Risk Categorization Solution Alternatives, including types of software  Commercial-off-the-Shelf (COTS)  Government-off-the-Shelf (GOTS)  Freeware, shareware, open source software  Custom software  Web services High level software assurance requirements should be identified Acquisition Strategy/Procurement Plan Software Due Diligence Questionnaires are a tool that provide a means for gathering information to evaluate quantitative, qualitative, and/or “go/no-go” Software Assurance criteria

Many questions have been defined as examples acquisition officials can use to gather information about software What threat modeling process is used when designing the software? Is the software able to detect, recognize, and respond to attack patterns in input it receives from human users and external processes? Has the software been measured/assessed for its resistance to identified, relevant attack patterns? Does your company have established policies and procedures for dealing with the contractual obligations of third party developers that go out of business?

During the Contracting Phase, software risks must be addressed and mitigated through terms and conditions, evaluation factors for awarded, and risk mitigation requirements in the SOW Issuance of the solicitation or RFP  Definitions related to trustworthy software that provides a common understanding  An Assurance Case that addresses the required security requirements (functions and properties) and the arguments and evidence needed to prove the requirements are met Terms and Conditions depend on software type and should be worded in such a way to ensure that they flow down to all levels of subcontracts Evaluation of proposals submitted in response to the solicitation or RFP should include IA specialists

During the Implementation and Acceptance Phase, software risk management deliverables must be evaluated to determine compliance in accepted risk mitigation strategies as stated in the requirements of the contract Phase includes project management, assurance case management, software risk management, and acceptance of the software product or service Acquisition officials must ensure that all the Software Assurance requirements are adequately implemented  Due diligence questionnaire may be used as a tool or checklist in determining if security requirements are being met  Evaluators must ensure that software risk mitigation has been implemented and can be sustained before acceptance

During the Follow-on Phase, software risks must be managed through continued analysis of risk and readjustment of risk mitigation strategies Ensure that the assurance/security requirements implemented and accepted in previous contracts flow to follow-on contract efforts Weak change control procedures can corrupt software and introduce new security vulnerabilities Suppliers should provide updates in a secure fashion

Current Status Draft 1.0 of guide out for comment 16 May Working Group to review comments Targeting summer for broader review Positioning guide to be NIST SP Quick Reference guide to be released earlier Use of guidance can begin today

Conclusion Large numbers of vulnerable software-based systems exist today, in many cases due to acquisition of vulnerable software Rampant worldwide increase in exploitation of software vulnerabilities demands that acquisition officials not only check for acceptable functionality, but also achieve acceptable SwA Security cannot be “bolted on” after the services and products are delivered To that end, acquisition officials must become educated consumers relative to SwA needs, and each phase of the acquisition process