Key System Engineering Processes for (Cost) Effective Cyber Security in a Dynamic Threat Environment. Kevin Stoffell September 11, 2015
Introduction Cyber Environment Challenges Cyber Engineering as a Specialty Effectiveness of Cyber Security Measures High value return SE activities Summary Resources Questions
Cyber Environment Challenges Speed/Flexibility of change requirements are generated by the dynamic Cyber environment. Complexity of system/component interactions Frequency of component refresh/update Time/Resource constraints for security requirements in software/IT development Inherent limitations in end-user operator skills
Cyber Engineering as a Specialty Cyber Security vs. Information Assurance vs. Computer Security Information System Security Engineering Often incorrectly applied to System Administrators and technicians. “Cyber Security Engineering is simply System Engineering with a healthy does of paranoia.”
Effectiveness of Cyber Security Measures Confidentiality, Integrity, Availability Common Trade-off decision conflicts Confidentiality vs. cost/schedule/performance Availability vs. cost/schedule/performance Security requirements as functional requirements Security requirements as design constraints
High Value Return SE Activities
Human Resource Management Quality Cyber Security Professionals are costly Continuous Training/Education is required Individual skills are inherently constrained Grow your own customized skill sets Intellectual engagement is critical for retention
Configuration Management Configuration Item selection can be challenging NOT asset management Change process must allow for rapid changes Impact Analysis prior to change is critical Post-Change follow-up and testing Audit, Audit, Audit
Risk Management Critical for cost management Avoid the ‘solid gold wall’ Requires intelligence input to be effective Critical tie-ins to: Human Resource Management Configuration Management Requirements Analysis Architectural Design Maintenance
Requirement Analysis/Architectural Design Careful allocation of functional requirements is critical Challenge: Avoiding overlaps and gaps. Must support and coordinate with: Rapid Configuration Management Verification/Validation Maintenance Human Resource Management
Verification/Validation Documented test procedures are critical Must be highly automated Must Support Rapid Verification/Validation after change Configuration Management Audits Human Resource capabilities Continuous Monitoring during Maintenance phases
Maintenance “Sustain a Capability to Provide a Service” Cyber maintenance is distinctly different from physical world maintenance Continuous Monitoring Challenge: Overburdening of Maintenance (monitoring) requirements on staff results in degradation of capability Personnel discipline during troubleshooting/repair activities to support Configuration Management Access to appropriate human skill sets critical
Summary Cyber Environment Challenges Cyber Engineering as a Specialty Effectiveness of Cyber Security Measures
Resources INCOSE Systems Engineering Handbook version National Institute of Standards and Technology Special Publication Rev 1, “Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach” National Institute of Standards and Technology Special Publication Rev 3, “Recommended Security Controls for Federal Information Systems and Organizations” Department of Defense Instruction , “Information Assurance Implementation” Project Management Institute, “Project Management Body of Knowledge (PMBOK)” Fourth Edition. Information Assurance Technical Framework ver 3.1, National Security Agency
QUESTIONS?