1 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Federal Government Perspectives on Secure Information Sharing Technology Leadership Series August 14,

Slides:



Advertisements
Similar presentations
1 NIST, FIPS, and you... Bob Grill Medi-Cal ISO July 16, 2009.
Advertisements

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Health IT Standards Committee Meeting Security Risk Management For Health IT Systems and Networks.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Near Real Time Risk Management Transforming the Certification and Accreditation Process ISSA-Baltimore Chapter Meeting May 28, 2008 Dr. Ron Ross.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
National Institute of Standards and Technology 1 NIST Guidance and Standards on System Level Information Security Management Dr. Alicia Clay Deputy Chief.
Security Controls – What Works
Managing Risks from Information Systems Building Effective Information Security Programs Data Management Association-National Capital Region January.
Information Security Policies and Standards
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Federal Information Security Management Act Applying NIST Information Security Standards and Guidelines Presented to the State of California April.
Stephen S. Yau CSE , Fall Security Strategies.
Risk Assessment Frameworks
National Information Assurance Partnership NIAP 2000 Building More Secure Systems for the New Millenium sm.
Session 3 – Information Security Policies
NIST SP , Revision 1 Applying Risk Management to Information Systems (Transforming the Certification and Accreditation Process) A Tutorial February.
Dr. Ron Ross Computer Security Division
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 FISMA Next Generation Managing Risk in an Environment of Advanced Persistent Cyber Threats NASA IT Summit.
Information System Security Control Architecture (ISSCA) Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology.
Complying With The Federal Information Security Act (FISMA)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Systems Under Attack Managing Enterprise Risk in Today's World of Sophisticated Threats and.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
US Federal Industrial Control System (ICS) Security Standards and Guidelines Keith Stouffer National Institute of Standards and Technology (NIST) June.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Dr. Ron Ross Computer Security Division Information Technology Laboratory Defending the United States.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Information Security Framework & Standards
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Dr. Ron Ross Computer Security Division Information Technology Laboratory Evolving Cybersecurity Strategies.
SEC835 Database and Web application security Information Security Architecture.
Building More Secure Information Systems A Strategy for Effectively Applying the Provisions of FISMA Ron Ross Project Manager FISMA Implementation Project.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Security Standards Promoting Trust, Transparency, and Due Diligence E-Gov Washington Workshop.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Applied Technology Services, Inc. Your Partner in Technology Applied Technology Services, Inc. Your Partner in Technology.
Building More Secure Information Systems A Strategy for Effectively Applying the Provisions of FISMA Presented to the FISSEA Conference March 23, 2005.
TEL2813/IS2820 Security Management
1 Information System Security Assurance Architecture A Proposed IEEE Standard for Managing Enterprise Risk February 7, 2005 Dr. Ron Ross Computer Security.
NIST Special Publication Revision 1
The New FISMA Standards and Guidelines or Building More Secure Information Systems A Strategy for Effectively Applying the Provisions of FISMA Dr. Ron.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Protecting Critical Information Assets and Records FIRM Forum.
National Institute of Standards and Technology 1 The Federal Information Security Management Act Reinforcing the Requirements for Security Awareness Training.
VERSION 1.2 National Institute of Standards and Technology 1 Building More Secure Information Systems A Strategy for Effectively Applying the Provisions.
The Value of Common Criteria Evaluations Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology 100 Bureau Drive;
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Managing Risk in New Computing Paradigms Applying FISMA Standards and Guidelines to Cloud Computing Workshop.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Organization, Mission, and Information Systems View 2009 Workshop.
CyberDefenses Information Assurance In God we trust, in all else, CyberDefenses, Inc.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
CategorizeSelectImplementAssessAuthorizeMonitor.
NIST Computer Security Framework and Grids Original Slides by Irwin Gaines (FNAL) 20-Apr-2006 Freely Adapted by Bob Cowles (SLAC/OSG) for JSPG 13-Mar-2007.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Risk Management Process Frame = context, strategies Assess = determine.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
The NIST Special Publications for Security Management By: Waylon Coulter.
National Institute of Standards and Technology 1 Information Systems Under Attack Managing Enterprise Risk in Today's World of Sophisticated Threats and.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
NIST SP800 53R4 WMISACA Conferance April 2016 By Dean E Brown CISSP, ISSMP, CSSLP, MCSD Owner – ITSecurityAxioms.com 262 Barrington Cir Lansing, MI
Advanced Planning Brief to Industry Jerry L. Davis DAS, Office of Information Security June 9, 2011.
Computer Security Division Information Technology Laboratory
Introduction to the Federal Defense Acquisition Regulation
Special Publication Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations Dr. Ron Ross Computer Security.
Federal Information Security Management Act Applying NIST Information Security Standards and Guidelines Presented to the State of California April.
Cybersecurity ATD technical
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Presentation transcript:

1 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Federal Government Perspectives on Secure Information Sharing Technology Leadership Series August 14, 2007 Dr. Ron Ross Computer Security Division Information Technology Laboratory

2 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Current State of Affairs  Continuing serious attacks on federal information systems; targeting key federal operations and assets.  Adversaries are nation states, terrorist groups, hackers, criminals, disgruntled employees.  Attacks are organized, disciplined, aggressive, and well resourced; many are extremely sophisticated.  Significant exfiltration of critical and sensitive information and implantation of malicious software.

3 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Threats to Security Connectivity Complexity

4 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Challenges for Agencies  Large, complex information technology infrastructures; many information systems to manage.  Dynamic operational environments with changing threats, vulnerabilities, and technologies.  Obtaining adequate staffing with requisite information security skills and expertise.

5 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Changing Models of Protection  Risk Avoidance  Risk Management  Information Protection  Information Protection Information Sharing  Confidentiality  Confidentiality, Integrity, Availability

6 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY The Desired End State Security Visibility Among Business/Mission Partners Organization One Information System Plan of Action and Milestones Security Assessment Report System Security Plan Determining the risk to the first organization’s operations and assets and the acceptability of such risk Business / Mission Information Flow The objective is to achieve visibility into prospective business/mission partners information security programs BEFORE critical/sensitive communications begin…establishing levels of security due diligence and trust. Determining the risk to the second organization’s operations and assets and the acceptability of such risk Organization Two Information System Plan of Action and Milestones Security Assessment Report System Security Plan Security Information

7 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Information Security Imperatives For an Information Sharing Partnership  The need to share depends on a need to trust.  Trust cannot be conferred ; it must be earned.  Trust is earned by understanding the security state of your partner’s information system.  Understanding the security state of an information system depends on the evidence produced by organizations demonstrating the effective employment of safeguards and countermeasures. Trust but verify…

8 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Information Security Paradigm Shift  From: Policy-based compliance  Policy dictates discrete, pre-defined information security requirements and associated safeguards/countermeasures;  Minimal flexibility in implementation; and  Little emphasis on explicit acceptance of mission risk.  To: Risk-based mission protection  Enterprise missions and business functions drive security requirements and associated safeguards/countermeasures;  Highly flexible in implementation; and  Focuses on acknowledgement and acceptance of mission risk.

9 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY FISMA Strategic Vision  Building a solid foundation of information security across one of the largest information technology infrastructures in the world based on comprehensive security standards and guidelines.  Institutionalizing a comprehensive Risk Management Framework that promotes flexible, cost-effective information security programs for federal agencies and contractors.  Establishing a fundamental level of “information security due diligence” for federal agencies based on a common process to determine adequate protection for enterprise missions and business functions.

10 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Risk Management Framework  The Risk Management Framework and the associated security standards and guidelines provide a process that is:  Disciplined  Structured  Flexible  Extensible  Repeatable “Building information security into the infrastructure of the organization… so that critical enterprise missions and business functions will be protected.”

11 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Managing Enterprise Risk  Key activities in managing enterprise-level risk—risk to the enterprise and to other organizations resulting from the operation of an information system: Categorize the information system (criticality/sensitivity) Select and tailor baseline (minimum) security controls Supplement the security controls based on risk assessment Document security controls in system security plan Implement the security controls in the information system Assess the security controls for effectiveness Authorize information system operation based on mission risk Monitor security controls on a continuous basis

12 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Risk Management Framework Determine security control effectiveness (i.e., controls implemented correctly, operating as intended, meeting security requirements) SP A ASSESS Security Controls Continuously track changes to the information system that may affect security controls and reassess control effectiveness SP / SP A MONITOR Security Controls Document in the security plan, the security requirements for the information system and the security controls planned or in place SP DOCUMENT Security Controls SP AUTHORIZE Information System Determine risk to agency operations, agency assets, or individuals and, if acceptable, authorize information system operation SP / SP SUPPLEMENT Security Controls Use risk assessment results to supplement the tailored security control baseline as needed to ensure adequate security and due diligence FIPS 200 / SP SELECT Security Controls Select baseline (minimum) security controls to protect the information system; apply tailoring guidance as appropriate Implement security controls; apply security configuration settings IMPLEMENT Security Controls SP Define criticality /sensitivity of information system according to potential impact of loss FIPS 199 / SP CATEGORIZE Information System Starting Point

13 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Information Security Program Adversaries attack the weakest link…where is yours? Risk assessment Security planning Security policies and procedures Contingency planning Incident response planning Security awareness and training Security in acquisitions Physical security Personnel security Security assessments Certification and accreditation Access control mechanisms Identification & authentication mechanisms (Biometrics, tokens, passwords) Audit mechanisms Encryption mechanisms Boundary and network protection devices (Firewalls, guards, routers, gateways) Intrusion protection/detection systems Security configuration settings Anti-viral, anti-spyware, anti-spam software Smart cards Links in the Security Chain: Management, Operational, and Technical Controls

14 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY The Common Foundation For Managing Enterprise Risk The Generalized Model Common Information Security Requirements Unique Information Security Requirements The “Delta” Foundational Set of Information Security Standards and Guidance Standardized risk management framework Standardized security categorization (criticality/sensitivity) Standardized security controls and control enhancements Standardized security control assessment procedures Intelligence Community Department of Defense Federal Civil Agencies National security and non national security information systems

15 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Enterprise-wide Strategy  Facilitates enterprise-wide, mission-oriented decisions on risk mitigation activities based on organizational priorities;  Provides global view of systemic weaknesses and deficiencies occurring in information systems across the organization;  Promotes the development of enterprise-wide solutions to information security problems; and  Increases knowledge base for system owners regarding threats, vulnerabilities, and strategies for more cost-effective solutions to common problems.

16 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Defense-in-Breadth Strategy  Diversify information technology assets.  Reduce the information technology target size.  Consider vulnerabilities of new information technologies before deployment.  Apply a balanced set of management, operational, and technical security controls in a defense-in- depth approach.

17 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Key Standards and Guidelines  FIPS Publication 199 (Security Categorization)  FIPS Publication 200 (Minimum Security Requirements)  NIST Special Publication (Security Planning)  NIST Special Publication (Risk Management)  NIST Special Publication (Certification & Accreditation)  NIST Special Publication (Recommended Security Controls)  NIST Special Publication A (Security Control Assessment)  NIST Special Publication (National Security Systems)  NIST Special Publication (Security Category Mapping) Many other FIPS and NIST Special Publications provide security standards and guidance supporting the FISMA legislation…

18 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Contact Information 100 Bureau Drive Mailstop 8930 Gaithersburg, MD USA Project LeaderAdministrative Support Dr. Ron RossPeggy Himes (301) (301) Senior Information Security Researchers and Technical Support Marianne Swanson Dr. Stu Katzke (301) (301) Pat TothArnold Johnson (301) (301) Matt SchollInformation and Feedback (301) Web: csrc.nist.gov/sec-cert Comments: