NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 FISMA Next Generation Managing Risk in an Environment of Advanced Persistent Cyber Threats NASA IT Summit.

Slides:



Advertisements
Similar presentations
Defending the United States in the Digital Age Information Security Transformation for the Federal Government OWASP APPSEC DC 2010 November 11, 2010.
Advertisements

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Health IT Standards Committee Meeting Security Risk Management For Health IT Systems and Networks.
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
Near Real Time Risk Management Transforming the Certification and Accreditation Process ISSA-Baltimore Chapter Meeting May 28, 2008 Dr. Ron Ross.
National Infrastructure Protection Plan
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
National Institute of Standards and Technology 1 NIST Guidance and Standards on System Level Information Security Management Dr. Alicia Clay Deputy Chief.
Security Controls – What Works
Managing Risks from Information Systems Building Effective Information Security Programs Data Management Association-National Capital Region January.
Information Security Policies and Standards
Planning and Managing Information Security Randall Sutton, President Elytra Enterprises Inc. April 4, 2006.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Federal Information Security Management Act Applying NIST Information Security Standards and Guidelines Presented to the State of California April.
Stephen S. Yau CSE , Fall Security Strategies.
Risk Assessment Frameworks
Risk Management Framework
NIST SP , Revision 1 Applying Risk Management to Information Systems (Transforming the Certification and Accreditation Process) A Tutorial February.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Dr. Ron Ross Computer Security Division
Complying With The Federal Information Security Act (FISMA)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Systems Under Attack Managing Enterprise Risk in Today's World of Sophisticated Threats and.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Dr. Ron Ross Computer Security Division Information Technology Laboratory Defending the United States.
Panel: Moderator: Michele Iversen Guest Experts: Dr. Ron Ross, Rod Beckstrom, Bob Wandell.
NHTSA Cyber Security Best Practices Study Tim Weisenberger December 7, 2011.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Dr. Ron Ross Computer Security Division Information Technology Laboratory Evolving Cybersecurity Strategies.
Information Security Technological Security Implementation and Privacy Protection.
SEC835 Database and Web application security Information Security Architecture.
Building More Secure Information Systems A Strategy for Effectively Applying the Provisions of FISMA Ron Ross Project Manager FISMA Implementation Project.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Security Standards Promoting Trust, Transparency, and Due Diligence E-Gov Washington Workshop.
1 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Federal Government Perspectives on Secure Information Sharing Technology Leadership Series August 14,
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Building More Secure Information Systems A Strategy for Effectively Applying the Provisions of FISMA Presented to the FISSEA Conference March 23, 2005.
TEL2813/IS2820 Security Management
1 Information System Security Assurance Architecture A Proposed IEEE Standard for Managing Enterprise Risk February 7, 2005 Dr. Ron Ross Computer Security.
NIST Special Publication Revision 1
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Protecting Critical Information Assets and Records FIRM Forum.
National Institute of Standards and Technology 1 The Federal Information Security Management Act Reinforcing the Requirements for Security Awareness Training.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
VERSION 1.2 National Institute of Standards and Technology 1 Building More Secure Information Systems A Strategy for Effectively Applying the Provisions.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Managing Risk in New Computing Paradigms Applying FISMA Standards and Guidelines to Cloud Computing Workshop.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Organization, Mission, and Information Systems View 2009 Workshop.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Enterprise Cybersecurity Strategy
CategorizeSelectImplementAssessAuthorizeMonitor.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Risk Management Process Frame = context, strategies Assess = determine.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
The NIST Special Publications for Security Management By: Waylon Coulter.
National Institute of Standards and Technology 1 Information Systems Under Attack Managing Enterprise Risk in Today's World of Sophisticated Threats and.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Computer Security Division Information Technology Laboratory
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Introduction to the Federal Defense Acquisition Regulation
Special Publication Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations Dr. Ron Ross Computer Security.
Federal Information Security Management Act Applying NIST Information Security Standards and Guidelines Presented to the State of California April.
An Urgent National Imperative
How to Mitigate the Consequences What are the Countermeasures?
Cybersecurity ATD technical
Presentation transcript:

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 FISMA Next Generation Managing Risk in an Environment of Advanced Persistent Cyber Threats NASA IT Summit August 16, 2010 Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 2 The Perfect Storm  Explosive growth and aggressive use of information technology.  Proliferation of information systems and networks with virtually unlimited connectivity.  Increasing sophistication of threat including exponential growth rate in malware (malicious code). Resulting in an increasing number of penetrations of information systems in the public and private sectors…

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 3 The Cyber Threat Situation Continuing serious cyber attacks on public and private sector information systems, large and small; targeting key operations and assets…  Attacks are organized, disciplined, aggressive, and well resourced; many are extremely sophisticated.  Adversaries are nation states, terrorist groups, criminals, hackers, and individuals or groups with intentions of compromising federal information systems.  Effective deployment of malicious software causing significant exfiltration of sensitive information (including intellectual property) and potential for disruption of critical information systems/services.

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 4 Risk and Security  What is the difference between risk and security?  Information Security The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.  Risk A measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of: (i) the adverse impacts that would arise if the circumstance or event occurs; and (ii) the likelihood of occurrence.  Types of Threats Purposeful attacks, environmental disruptions, and human errors.

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 5 Information technology is our greatest strength and at the same time, our greatest weakness …

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 6 We expend far too many resources on back-end security… (chasing the latest vulnerabilities and patching systems) and far too few resources on front-end security… (building information security into IT products and systems)

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 7 Enterprise-Wide Risk Management TIER 3 Information System (Environment of Operation) TIER 2 Mission / Business Process (Information and Information Flows) TIER 1 Organization (Governance) STRATEGIC RISK FOCUS TACTICAL RISK FOCUS  Multi-tiered Risk Management Approach  Implemented by the Risk Executive Function  Enterprise Architecture and SDLC Focus  Flexible and Agile Implementation

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 8 Risk Management Framework Security Life Cycle Determine security control effectiveness (i.e., controls implemented correctly, operating as intended, meeting security requirements for information system). ASSESS Security Controls Define criticality/sensitivity of information system according to potential worst-case, adverse impact to mission/business. CATEGORIZE Information System Starting Point Continuously track changes to the information system that may affect security controls and reassess control effectiveness. MONITOR Security Controls AUTHORIZE Information System Determine risk to organizational operations and assets, individuals, other organizations, and the Nation; if acceptable, authorize operation. Implement security controls within enterprise architecture using sound systems engineering practices; apply security configuration settings. IMPLEMENT Security Controls SELECT Security Controls Select baseline security controls; apply tailoring guidance and supplement controls as needed based on risk assessment.

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 9 Characteristics of Risk-Based Approaches (1 of 3)  Integrates information security more closely into the enterprise architecture and system development life cycle.  Provides equal emphasis on the security control selection, implementation, assessment, and monitoring, and the authorization of information systems.  Promotes near real-time risk management and ongoing system authorization through the implementation of robust continuous monitoring processes.

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 10 Characteristics of Risk-Based Approaches (2 of 3)  Links risk management activities at the organization, mission, and information system levels through a risk executive (function).  Establishes responsibility and accountability for security controls deployed within organizational information systems and inherited by those systems.

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 11 Characteristics of Risk-Based Approaches (3 of 3)  Encourages the use of automation to:  Increase consistency, effectiveness, and timeliness of security control implementation and functionality; and  Provide senior leaders the necessary information to take credible, risk-based decisions with regard to the information systems supporting their core missions and business functions.

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 12 Cyber Preparedness THREAT LEVEL 5 CYBER PREP LEVEL 5 THREAT LEVEL 4CYBER PREP LEVEL 4 THREAT LEVEL 3CYBER PREP LEVEL 3 THREAT LEVEL 2 CYBER PREP LEVEL 2 THREAT LEVEL 1 CYBER PREP LEVEL 1 Adversary Capabilities and Intentions Defender Security Capability HIGH LOW HIGH LOW An increasingly sophisticated and motivated threat requires increasing preparedness…

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 13 Dual Protection Strategies  Boundary Protection Primary Consideration: Penetration Resistance Adversary Location: Outside the Defensive Perimeter Objective: Repelling the Attack  Agile Defense Primary Consideration: Information System Resilience Adversary Location: Inside the Defensive Perimeter Objective: Operating while under Attack

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 14 Agile Defense  Boundary protection is a necessary but not sufficient condition for Agile Defense  Examples of Agile Defense measures:  Compartmentalization and segregation of critical assets  Targeted allocation of security controls  Virtualization and obfuscation techniques  Encryption of data at rest  Limiting of privileges  Routine reconstitution to known secure state Bottom Line: Limit damage of hostile attack while operating in a (potentially) degraded mode…

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 15 Defense-in-Depth Adversaries attack the weakest link…where is yours? Risk assessment Security planning, policies, procedures Configuration management and control Contingency planning Incident response planning Security awareness and training Security in acquisitions Physical security Personnel security Security assessments and authorization Continuous monitoring Access control mechanisms Identification & authentication mechanisms (Biometrics, tokens, passwords) Audit mechanisms Encryption mechanisms Boundary and network protection devices (Firewalls, guards, routers, gateways) Intrusion protection/detection systems Security configuration settings Anti-viral, anti-spyware, anti-spam software Smart cards Links in the Security Chain: Management, Operational, and Technical Controls

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 16 Strategic Risk Management Focus Tactical Risk Management Focus Top Level Risk Management Strategy Informs Operational Elements Enterprise-Wide Security Assessment Report Security Plan Plan of Action and Milestones Security Assessment Report Plan of Action and Milestones Security Plan Core Missions / Business Processes Security Requirements Policy Guidance RISK EXECUTIVE FUNCTION Organization-wide Risk Governance and Oversight Security Assessment Report Security Plan Plan of Action and Milestones INFORMATION SYSTEM System-specific Controls Ongoing Authorization Decisions RISK MANAGEMENT FRAMEWORK (RMF) COMMON CONTROLS Security Controls Inherited by Organizational Information Systems Hybrid Controls INFORMATION SYSTEM System-specific Controls Hybrid Controls Managing Complex Risk Activities

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 17 Federal Government Transformation The newly emerging information security publications begin an historic government-wide transformation for risk management and information security driven by…  Increasing sophistication and operations tempo of cyber attacks.  Convergence of national and non-national security interests within the federal government.  Convergence of national security and economic security interests across the Nation.  Need for a unified framework in providing effective risk-based cyber defenses for the federal government and the Nation.

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 18 Joint Task Force Transformation Initiative A Broad-Based Partnership —  National Institute of Standards and Technology  Department of Defense  Intelligence Community  Office of the Director of National Intelligence  16 U.S. Intelligence Agencies  Committee on National Security Systems

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 19 Unified Information Security Framework The Generalized Model Common Information Security Requirements Unique Information Security Requirements The “Delta” National security and non national security information systems Foundational Set of Information Security Standards and Guidance Risk management (organization, mission, information system) Security categorization (information criticality/sensitivity) Security controls (safeguards and countermeasures) Security assessment procedures Security authorization process Intelligence Community Department of Defense Federal Civil Agencies Private Sector State/Local Govt CNSSCNSS

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 20 Joint Task Force Transformation Initiative Core Risk Management Publications  NIST Special Publication , Revision 3 Recommended Security Controls for Federal Information Systems and Organizations  NIST Special Publication , Revision 1 Applying the Risk Management Framework to Federal Information Systems: A Security Lifecycle Approach  NIST Special Publication A, Revision 1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans Completed

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 21 Joint Task Force Transformation Initiative Core Risk Management Publications  NIST Special Publication Enterprise-Wide Risk Management: Organization, Mission, and Information Systems View Projected November 2010  NIST Special Publication , Revision 1 Guide for Conducting Risk Assessments Projected November 2010

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Focus Areas and Initiatives  Common Security Standards and Guidance  Joint Task Force Transformation Initiative (DoD, IC, NIST, CNSS)  Unified Information Security Framework  Core risk management and information security publications  Additional publications for partnership collaboration  Privacy Appendix for SP , Revision 3 (privacy controls)  Threat Appendix for SP , Revision 3 (Cyber Prep Initiative)  Developmental Security  Systems and Security Engineering Guideline  Application Security Guideline

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Focus Areas and Initiatives  Operational Security  S-CAP Initiative and future extensions (network devices, mainframes)  Continuous Monitoring Guideline  Configuration Management and Control Guideline  Education, Training, and Awareness  FISMA Phase II Training Modules  Automated support tools  Outreach program to State and local governments; private sector  Prototypes and Use Cases  Industrial Control Systems

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 24 Trust through Transparency Determining risk to the organization’s operations and assets, individuals, other organizations, and the Nation; and the acceptability of such risk. The objective is to achieve transparency of prospective partner’s information security programs and processes…establishing trust relationships based on common, shared risk management principles. Organization One INFORMATION SYSTEM Plan of Action and Milestones Security Assessment Report Security Plan Mission / Business Information Flow Risk Management Information Plan of Action and Milestones Security Assessment Report Security Plan Organization Two INFORMATION SYSTEM Determining risk to the organization’s operations and assets, individuals, other organizations, and the Nation; and the acceptability of such risk.

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 25 Need Broad-Based Security Solutions  Over 90% of critical infrastructure systems/applications owned and operated by non federal entities.  Key sectors:  Energy (electrical, nuclear, gas and oil, dams)  Transportation (air, road, rail, port, waterways)  Public Health Systems / Emergency Services  Information and Telecommunications  Defense Industry  Banking and Finance  Postal and Shipping  Agriculture / Food / Water / Chemical

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 26 Contact Information 100 Bureau Drive Mailstop 8930 Gaithersburg, MD USA Project LeaderAdministrative Support Dr. Ron RossPeggy Himes (301) (301) Senior Information Security Researchers and Technical Support Marianne Swanson Kelley Dempsey (301) (301) Pat TothArnold Johnson (301) (301) Web: csrc.nist.gov/sec-cert Comments: