Trusted Computing in Government Networks May 16, 2007 Richard C. (Dick) Schaeffer, Jr. Information Assurance Director National Security Agency.

Slides:



Advertisements
Similar presentations
© Copyright 2007 Exempler Telecom Test Automation System Exempler - We pride ourselves with providing lightweight robust engineering solutions.
Advertisements

SETTING THE SCENE…… Video talking about desktop and problems companies have HP Confidential 25 March 2017.
Presentation Title | Date | Page 1 Extracting Value from SOA.
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
Brief-out: Isolation Working Group Topic discussion leader: Ken Birman.
The Business Significance of Upper Ontology Mills Davis Project10X
Mid-market server campaign – thru partner presentation: Slide for presenter only: do not show Speaker: Partner Title of Presentation: Giving you the power.
Agenda Small BusinessMid-market 2 Opportunity to Grow Your Business IT Transformation 4.
Technology Acceptance Model. Copyright 2007 Black & Rossi, LLC All rights reserved 10/15/05 Black & Rossi, LLC, all rights reserved Who we are Technology.
Securing Emerging Mobile Technology JOHN G. LEVINE PH.D. D/CHIEF ARCHITECTURE GROUP 13 SEP
How to commence the IT Modernization Process?
2009 – E. Félix Security DSL Toward model-based security engineering: developing a security analysis DSML Véronique Normand, Edith Félix, Thales Research.
Leverage MarkITS for agile solutions delivery that balances strategic thinking with tactical execution for “Business & Technology Convergence” MarkITS.
Trusted Ring: A Security Enhancing Software Architecture Michael DiRossi, Inventor The Johns Hopkins University Applied Physics Laboratory.
 The Citrix Application Firewall prevents security breaches, data loss, and possible unauthorized modifications to Web sites that access sensitive business.
MULTI-LEVEL SECURITY for NATO 1. OUTSIDE MARKET FORCES DELL CONFIDENTIAL 2 There are 3.4 identities stolen every 12 seconds and produces an average loss.
Prepared for: DISA September 17, 2003 Establishing a Government Information Security System Presented to the IT AND COMMUNICATIONS SYSTEMS SECURITY CONFERENCE.
1Copyright © 2005 InfoGard Laboratories Proprietary 2005 Physical Security Conference Physical Security 101 Tom Caddy September 26, 2005.
The U.S. Coast Guard’s Role in Cybersecurity
INFORMATION SYSTEMS & GLOBAL SERVICES Craig Solem, CISSP Lockheed Martin Information Systems and Global Services Program Manager, Joint Medical information.
Trusted Hardware: Can it be Trustworthy? Design Automation Conference 5 June 2007 Karl Levitt National Science Foundation Cynthia E. Irvine Naval Postgraduate.
Security Controls – What Works
Azad Madni Professor Director, SAE Program Viterbi School of Engineering Platform-based Engineering: Rapid, Risk-mitigated Development.
B&O Committee May 2015 iTRAK - Change Management An Agency Adapting to Change.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
National Information Assurance Partnership NIAP 2000 Building More Secure Systems for the New Millenium sm.
Introduction to Databases Transparencies 1. ©Pearson Education 2009 Objectives Common uses of database systems. Meaning of the term database. Meaning.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Information Technology Audit
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Motorola Mobility Services Platform
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
The Pursuit for Efficient S/C Design The Stanford Small Sat Challenge: –Learn system engineering processes –Design, build, test, and fly a CubeSat project.
Test Organization and Management
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Future Airborne Capability Environment (FACE)
Information Assurance Research Group 1 NSA Security-Enhanced Linux (SELinux) Grant M. Wagner Information Assurance.
ESA/ESTEC, TEC-QQS August 8, 2005 SAS_05_ESA SW PA R&D_Winzer,Prades Slide 1 Software Product Assurance (PA) R&D Road mapping Activities ESA/ESTEC TEC-QQS.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Panel Three - Small Businesses: Sustaining and Growing a Market Presence Open Interfaces and Market Penetration Protecting Intellectual Innovation and.
CBP National Trade Strategy Winter Presenter’s Name June 17, 2003 CBP’s Trade Vision  CBP’s trade vision is to develop a swift, safe, and secure.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
Component Technology. Challenges Facing the Software Industry Today’s applications are large & complex – time consuming to develop, difficult and costly.
An Introduction to Software Engineering. Communication Systems.
Randy Beavers CS 585 – Computer Security February 19, 2009.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Catawba County Board of Commissioners Retreat June 11, 2007 It is a great time to be an innovator 2007 Technology Strategic Plan *
ANKITHA CHOWDARY GARAPATI
March 2004 At A Glance NASA’s GSFC GMSEC architecture provides a scalable, extensible ground and flight system approach for future missions. Benefits Simplifies.
Last Updated 1/17/02 1 Business Drivers Guiding Portal Evolution Portals Integrate web-based systems to increase productivity and reduce.
Software Engineering Chapter: Computer Aided Software Engineering 1 Chapter : Computer Aided Software Engineering.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
ELECTRONIC SERVICES & TOOLS Strategic Plan
Oct 2005 page 1 The CIO of the Future – Changing the Dialogue Rolf Kubli, EDS EMEA Architects Office, CTO EDS Switzerland EGEE04 Industry Forum.
CNCI-SCRM STANDARDIZATION Discussion Globalization Task Force OASD-NII / DoD CIO Unclassified / FOUO.
The NIST Special Publications for Security Management By: Waylon Coulter.
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
SQL Database Management
Cisco Data Virtualization
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Unified Communications and Collaboration Market to grow at 9% CAGR from.
Srikanth Srigiri Magdelene Sona Amarnath Suggu
Application Lifecycle Management – Best Practices for SharePoint and Office App development November 2015.
Software Product Testing
Crypteron is a Developer-Friendly Data Breach Solution that Allows Organizations to Secure Applications on Microsoft Azure in Just Minutes MICROSOFT AZURE.
NSA Security-Enhanced Linux (SELinux)
Agenda The current Windows XP and Windows XP Desktop situation
Putting Together a DevOps Pipeline Leveraging Technology, Process, and People 1 May 2019 Mr. Patrick Bush.
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

Trusted Computing in Government Networks May 16, 2007 Richard C. (Dick) Schaeffer, Jr. Information Assurance Director National Security Agency

2 Information Assurance at NSA Information Assurance Directorate (IAD) –Provides products and services critical to protecting U.S. National Security information and Information systems National Information Assurance Research Laboratory (NIARL) –Carries out research and design of technologies needed to enable IA solutions for the National Security Community Where SELinux was created and is currently maintained

3 IA Mission Drivers Rapid introduction of new technology & services –IA solutions must be available at the speed of the IT business and customer cycles Commercial IT dominates most systems; commercial IA growing –Leveraging/influencing commercial activity is vital Global communications and connectivity expanding National IA needs are growing while resources remain fairly constant

4 Government/Industry Partnerships To meet national IA needs requires cooperative partnerships Multi-layered approach –Define System-level Solutions Operational Capability Needs Appropriate IA for Operational Environment –Determine that System Components (COTS & GOTS) provide necessary capabilities and assurance Technology Guidance Evaluation –Develop and Provide User Guidance Configuration Guides Systems Security Engineering

5 Timing IA Integration IA Activities provide benefit all along the product/system life-cycle Early in the Development (maximum affect) –Microsoft Security Design Lifecycle (SDL) –Solution and Technology IA Design Guidance Near Product/System Completion –Vulnerability Analysis –Evaluation During Operation –Appropriate Usage Guidance –Configuration Guidance (e.g., Microsoft Windows)

6 Balanced IA Not all systems require equal security functionality and assurance Operational factors dictate necessary security functions –Data sensitivity and perishability –System connectivity –Criticality of operation –Operational environment

7 The Right Security Functionality Lessons learned from Multi-Level Security (MLS) systems SELinux embodies a sound architecture for flexible Mandatory Access Control Open Source Community has helped to shape the end result Continuing to work toward further advances

8 Achieving Higher Assurance Crucial to NSA and its clients and customers Getting the right functionality with medium assurance through current efforts EAL4 is not the end of the road, just a start –Higher levels of assurance (EAL4+ and beyond) critical to meeting the needs of the National Security Community

9 High Assurance Platform (HAP) NSA program fusing advanced commercial initiatives with NSA certified trusted applications into a customizable platform security architecture Leverage COTS to maximum extent possible –Hardware assisted virtualization and security Enable solution integrators to compose a high assurance platform instance from available components that can: –Isolate and separate security domains –Provide assured information sharing across security domains

10 IA Tools Automated tools needed to counter immense product and system complexity, particularly for high assurance Tools applied across the life-cycle –Development Risk and design analysis tools Threat modeling tools –Analysis Source and binary code analysis tools –Operation Patch management tools Configuration checking and consistency tools

11 Gaining Commercial Acceptance The technical challenges facing the National Security Community are the same, the stakes are quite different Unique perspective on threats and countermeasures to share with industry Our role is to not just tell industry what to do; we must also contribute to the solution space

12 Reaching the Goal Significant progress to date! Need to keep advancing in all areas: –Enhanced Security Functionality –Increased Assurance More Robust Tools –Improved Commercial Acceptance –Expanded Partnerships