DOD SOFTWARE ASSURANCE INITIATIVE: Mitigating Risks Attributable to Software through Enhanced Risk Management Joe Jarzombek, PMP Deputy Director for Software.

Slides:



Advertisements
Similar presentations
METRICS AND CONTROLS FOR DEFENSE IN DEPTH AN INFORMATION TECHNOLOGY SECURITY ASSESSMENT INITIATIVE.
Advertisements

Copyright (C) The Open Group 2014 Securing Global IT Supply Chains and IT Products by Working with Open Trusted Technology Provider™ Accredited Companies.
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
BENEFITS OF SUCCESSFUL IT MODERNIZATION
Links in the Chain Why Mature Systems Engineering is Needed Richard Conn Microsoft December 2003.
S2-1 © 2001 Carnegie Mellon University OCTAVE SM Process 2 Identify Operational Area Management Knowledge Software Engineering Institute Carnegie Mellon.
Conformity Assessment Practical Implications InterAgency Committee on Standards Policy June 2007 Gordon Gillerman Conformity Assessment Advisor Homeland.
DHS, National Cyber Security Division Overview
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Summer IAVA1 NATIONAL INFORMATION ASSURANCE TRAINING STANDARD FOR SYSTEM ADMINISTRATORS (SA) Minimum.
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
Security Controls – What Works
DoD Systems and Software Engineering A Strategy for Enhanced Systems Engineering Kristen Baldwin Acting Director, Systems and Software Engineering Office.
IT Governance and Management
Recent Trends in DoD Systems and Software Engineering Processes Bruce Amato Acting Deputy Director, Software Engineering and Systems Assurance Office of.
First Practice - Information Security Management System Implementation and ISO Certification.
Stephen S. Yau CSE , Fall Security Strategies.
Program Visibility, Analysis, and Reporting (PVAR)
Security Assessments FITSP-M Module 5. Security control assessments are not about checklists, simple pass-fail results, or generating paperwork to pass.
Fraud Prevention and Risk Management
Software Assurance Software Acquisition Working Group Chairs: Stan Wisseman Booz Allen Hamilton Mary L. Polydys National Defense University Information.
Unclassified. Program Management Empowerment and Accountability Mr. David Ahern Director, Portfolio Systems Acquisition AT&L(A&T) 14 April 2009 The Acquisition.
Software Assurance: A Strategic Initiative of the U.S. Department of Homeland Security to Promote Integrity, Security, and Reliability in Software Joe.
Evolving IT Framework Standards (Compliance and IT)
Security Assessments FITSP-A Module 5
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
DoD Acquisition Domain (Sourcing) (DADS) Analysis of Alternatives (AoA) E-Business/SPS Joint Users’ Conference November 15-19, 2004 Houston, TX.
© 2001 by Carnegie Mellon University PSM-1 OCTAVE SM : Senior Management Briefing Software Engineering Institute Carnegie Mellon University Pittsburgh,
Best Practices for Delivering Safe, Secure, and Dependable Mission Capabilities Paul R. Croll Chair, IEEE Software and Systems Engineering Standards Committee.
NIST Special Publication Revision 1
Why is BCL Needed? BCL addresses long-standing challenges that have impacted the delivery of business capabilities The DepSecDef directed increasing the.
Roles and Responsibilities
ESA/ESTEC, TEC-QQS August 8, 2005 SAS_05_ESA SW PA R&D_Winzer,Prades Slide 1 Software Product Assurance (PA) R&D Road mapping Activities ESA/ESTEC TEC-QQS.
1 Software Assurance: Mitigating Risks Attributable to Software Vulnerabilities Joe Jarzombek, PMP Deputy Director for Software Assurance Information Assurance.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
UNCLASSIFIED DITSCAP Primer. UNCLASSIFIED 1/18/01DITSCAP Primer.PPT 2 DITSCAP* Authority ASD/C3I Memo, 19 Aug 92 –Develop Standardized C&A Process DODI.
Information Sharing Challenges, Trends and Opportunities
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Protecting Critical Information Assets and Records FIRM Forum.
MD Digital Government Summit, June 26, Maryland Project Management Oversight & System Development Life Cycle (SDLC) Robert Krauss MD Digital Government.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Radar Open Systems Architectures
Engineering Essential Characteristics Security Engineering Process Overview.
Certification and Accreditation CS Syllabus Ms Jocelyne Farah Mr Clinton Campbell.
Enterprise Cybersecurity Strategy
DOE ASSET MANAGEMENT PLAN
Fax: (703) DoD BIOMETRICS PROGRAM DoD Biometrics Management Office Phone: (703)
Evidence about the Benefits of CMMI ® What We Already Know and What We Need to Know Joe Jarzombek, PMP Deputy Director for Software Assurance Information.
1 Innovation & Transformation: Enabling Information Superiority for the Warfighter Mr. Arthur R. Friedman OASD(NII)/DoD CIO 4 October 2006.
CNCI-SCRM STANDARDIZATION Discussion Globalization Task Force OASD-NII / DoD CIO Unclassified / FOUO.
Expedition Workshop Strategic Leadership For Networking and Information Technology Education September 16, 2008 Chris Greer Director, NCO.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
UNCLASSIFIED The Open Group 01/07/10 Page-1 Kick-off Meeting for The Open Group Acquisition Cyber Security Initiative Ms. Kristen Baldwin Director, Systems.
Department of Computer Science Introduction to Information Security Chapter 8 ISO/IEC Semester 1.
Agenda VA’s Transformation Continues
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
2012 Spring Simulation Interoperability Workshop
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
DoD Cyberspace Workforce Definitions
Improving Mission Effectiveness By Exploiting the Command’s Implementation Of the DoD Enterprise Services Management Framework - DESMF in the [name the.
Introduction to the Federal Defense Acquisition Regulation
Quality management standards
DoD Cyberspace Workforce Definitions
Digital Government Initiative Initiation Department of Information Technology Estevan Lujan, Acting Cabinet Secretary Susan Pentecost, Managing Director,
By Jeff Burklo, Director
Cybersecurity ATD technical
Workshop Session I.
IS 2620: Developing Secure Systems
Data Governance & Management Skills and Experience
Office of Health, Safety and Security
Presentation transcript:

DOD SOFTWARE ASSURANCE INITIATIVE: Mitigating Risks Attributable to Software through Enhanced Risk Management Joe Jarzombek, PMP Deputy Director for Software Assurance Information Assurance Directorate Office of the Assistant Secretary of Defense (Networks and Information Integration) UNCLASSIFIED -- FOR OVERVIEW DISCUSSIONS Countering Threats that Target Software in Systems and Networks August 10, 2004 DoD Liaison Report to IEEE CS S2ESC

UNCLASSIFIED -- FOR OVERVIEW DISCUSSIONS National Security Requires Software Assurance Assured Software is required to fulfill DoD missions and protect critical infrastructure –National capabilities dependent on software –Exploitable vulnerabilities and malicious code place critical capabilities at risk –In era of asymmetric warfare, opponents can threaten software-enabled capabilities cheaply and safely Federal Sector has software assurance responsibilities –Software dependency places assurance at core of national security –Federal core competencies must be security-focused in acquiring and procuring software

UNCLASSIFIED -- FOR OVERVIEW DISCUSSIONS Congressional Direction on Security of Sensitive Software Congressional direction: FY04 Def Authorization Conf Report , Security of Sensitive Software -- DOD must ensure that recent emphasis on procurement of COTS software will not open vulnerabilities in sensitive DOD C3I software DoD must provide IA and protection for all DOD IT assets, including: –unauthorized modifications to code in mission critical software; –insertion of malicious code into mission critical software; –reverse engineering of mission critical software. Responding to 2 Congressional Sub-Committees, GAO Review # “DoD Use of Foreign Sources for Software Development” resulted in May 2004 GAO “Defense Acquisitions: Knowledge of Software Suppliers Needed to Manage Risks” – Outsourcing, foreign development risks & insertion of malicious code –Recommendations for Executive Actions to direct DoD PMs to factor in software risks and for DoD to factor in security in risk assessments

UNCLASSIFIED -- FOR OVERVIEW DISCUSSIONS Software Protection Initiative (SPI) Software Assurance (SA)Information Assurance (IA) Anti-Tamper (AT) Trusted Foundry (TF) Defeating the Threat: DoD Protection Initiatives & Programs Primarily Hands-On THREAT ACCESS Primarily External Provide a series layered defenses to mitigate threats Each has its own merits and also provide additional layers of protection through synergies and interactions with other programs.

UNCLASSIFIED -- FOR OVERVIEW DISCUSSIONS Managed as part of the DoD Information Assurance (IA) Strategy to “Transform & Enable” IA Capabilities With oversight provided by SW Assurance Steering Committee under the IA Senior Leadership, the Initiative is organized into working groups: –WG1 - Security Process Capability (improvement & evaluation), –WG2 - Software Product Evaluation (product focused), –WG3 - Threat Analyses -- Counter Intelligence (CI) Support –WG4 - Acquisition/Procurement and Industrial Security, and –WG5 - User Identification & Prioritization of Protected Assets SW Assurance Initiative provides requisite interfaces with related initiatives: –DoD Anti-tamper and Software Protection Initiatives –Government Information Assurance initiatives –Interagency & Standards Groups on Security Assurance –Gov’t/industry Cyber Security SW development lifecycle task force Software Assurance Initiative (initial focus consistent with DoD & Congressional concerns)

UNCLASSIFIED -- FOR OVERVIEW DISCUSSIONS Response for Software Assurance October 2002, the President’s Critical Infrastructure Protection Board (PCIPB) IT Security Study Group (ITSSG) identified security shortfalls in acquisition processes and recommended security improvements DoD evaluated ITSSG report; recommending: –Integrating an enhanced risk management process into the DoD acquisition processes –Specifying lifecycle risk mitigation of software vulnerabilities: Threat analysis of suppliers in source selection Security component specification, design, build, and integration Process capabilities (performance improvement and evaluation) Product evaluation tools (test, accreditation and certification) R&D and transitioning of enabling advanced technologies Laws, policies & practices for acq/procurement, use and support –Identifying mechanisms to ensure software product integrity

UNCLASSIFIED -- FOR OVERVIEW DISCUSSIONS Program X PMO/O&S Manager Oversight Product Security Evaluation Threat Assessment Supplier Security Process Capability Evaluation Defense in Depth Threat-Informed/ Security-Aware Risk Management Decision Cost, Schedule Performance Enhanced Risk Management Process

UNCLASSIFIED -- FOR OVERVIEW DISCUSSIONS Scoping Expectations for Workshops: Software Assurance Forum Working Group 1, Security Process Capabilities (Process Improvement and Capability Evaluation -- Practice Focused) Identify criteria/practices to be used in mitigating risks associated with development/acquisition processes required to deliver secure software –Leverage work of interagency groups that identify best practices for the delivery of secure software/systems Assistance to PMs in determining capabilities of suppliers, part of: –Source selection activities & contract process monitoring –Changes in products & services Need for: –Safe & secure style guides (language sub-sets) for programming –Software-related security development guides –Software assurance guidelines within High-Assurance Systems Engineering enterprise-level and total system lifecycle dependability, high-assurance validation and verification Need for SW Assurance templates for RFPs (including Section L & M)

UNCLASSIFIED -- FOR OVERVIEW DISCUSSIONS Scoping Expectations for Workshops: Software Assurance Forum Working Group 1, Security Process Capabilities -- Leveraging Activities –IEEE CS Software and Systems Engineering Standards Committee (S2ESC) provides oversight of largest collection of IEEE standards –Safety & Security Practices for use in evaluating delivery capabilities Developed as extensions to CMMI & iCMM; can be used ‘stand-alone’ Practices traceable to 7 source standards Safety & security focus using CMMI & iCMM implementing practices –ISO/IEC JTC1/SC7 WG9 Redefined its terms of reference to software and system assurance (part of Systems Engineering System Life Cycle Processes) ISO/IEC to address management of risk and assurance of safety, security, & dependability within context of system and software life cycles –NIST Information System Security Project Producing publications on security of Federal Information System Provides standards for labs conducting software product evaluations ®Capability Maturity Model, CMM, and CMMI are registered in the U.S. Patent and Trademark Office by Carnegie Mellon University

UNCLASSIFIED -- FOR OVERVIEW DISCUSSIONS

Scoping Expectations for Workshops: Software Assurance Forum Working Group 2, Product Evaluation Product Diagnostic Capabilities Role of Executive Agent for High Assurance Software Technology & Evaluation Working Group 3, Threat Assessment Support All-Source Threat Analyses Capabilities Types of support needed to support government and industry Working Group 4, Acquisition/Procurement/Industrial Security Policy Policies and regulatory guidance for software assurance Guidance for using information to support enhanced risk management, from: –Threat assessments, –Security process capability evaluations, and –Product security evaluations Working Group 5, Prioritization of Assets Requiring High Assurance Process for specifying DoD ‘watch list’ assets requiring high assurance Sample criteria for use by PMO Systems Engineers for determining software components that require high assurance

UNCLASSIFIED -- FOR OVERVIEW DISCUSSIONS Contact Information Software Assurance Initiative Director Joe Jarzombek, PMP Deputy Director for Software Assurance Information Assurance Directorate Office of the Assistant Secretary of Defense (Networks and Information Integration) Business Ph (703) x154 Mobile Cell Ph (703) Crystal Gateway 3, Suite Jefferson Davis Highway Arlington, VA