DSSA Update Costa Rica – March, 2012. Goals for today Update you on our progress Raise awareness Solicit your input.

Slides:



Advertisements
Similar presentations
ICANN Strategic planning process Draft key priorities for the July 2006 – June 2009 Plan for community comment November 2005.
Advertisements

ICANN Plan for Enhancing Internet Security, Stability and Resiliency.
DNS Security and Stability Analysis Working Group (DSSA) DSSA Update Prague – June, 2012.
DNS Security and Stability Analysis Working Group (DSSA)
DNS Security and Stability Analysis Working Group (DSSA) DSSA Update Prague – June, 2012.
Policies and Procedures for Civil Society Participation in GEF Programme and Projects presented by GEF NGO Network ECW.
OCTAVESM Process 4 Create Threat Profiles
DSSA Update Costa Rica – March, Goals for today Update you on our progress Raise awareness Solicit your input 2.
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
Predisposing Conditions Security Controls Vulnerabilities A Non- Adversarial Threat Source (with a range of effects) In the context of… (with varying pervasiveness)
Chapter 5: Asset Classification
S2-1 © 2001 Carnegie Mellon University OCTAVE SM Process 2 Identify Operational Area Management Knowledge Software Engineering Institute Carnegie Mellon.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Joint SSR-RT/DSSA meeting DSSA Progress Update Dakar – October 2011.
Securing the Border Gateway Protocol (S-BGP) Dr. Stephen Kent Chief Scientist - Information Security.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Administrivia Lifecycle Architecture (LCA) group assignment will go out later today. Informal feedback meetings with LCO groups EasyShare: Mon, 2:45pm-3:15pm,
1 R&D SDM 1 Software Project Management Capability Maturity Model 2009 Theo Schouten.
Critical Infrastructure Protection and Higher Education: University of California Hazard Vulnerability Assessment Kristine Hafner University of California.
Predisposing Conditions Security Controls Vulnerabilities A Non- Adversarial Threat Source (with a range of effects) In the context of… (with varying pervasiveness)
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Introduction to Network Defense
Revised Draft Strategic Plan 4 December 2010.
Nick Wildgoose 8 March 2012 BCI Workshop DELETE THIS TEXT AND PUT COMPANY LOGO IN THIS WHITE SPACE Understanding Risk within your Supply Chain SC1(V1)Jul/05/10GC/ZCA.
Session 16: Distribution of Geospatial Data 1 Distribution of Geospatial Data in the Public Environment Hazard Mapping and Modeling.
Greg Rattray ICANN Chief Internet Security Advisor
DSSA-WG Progress Update Dakar – October Charter: Background At their meetings during the ICANN Brussels meeting the At-Large Advisory Committee.
Impact assessment framework
October 27, 2005 Contra Costa Operational Area Homeland Security Strategic and Tactical Planning and Hazardous Materials Response Assessment Project Overview.
Update report on GNSO- requested Whois studies Liz Gasster Senior Policy Counselor 7–12 March 2010.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Consumer Trust, Consumer Choice & Competition Presenter: Steve DelBianco Chair: Rosemary Sinclair.
David N. Wozei Systems Administrator, IT Auditor.
DSSA Update Costa Rica – March, Goals for today Update you on our progress Raise awareness Solicit your input.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
CcNSO Update for APTLD New Delhi February 2012 Keith Davidson, ccNSO Councillor.
ICANN COMMUNITY STRATEGIC PLANNING DISCUSSION Brussels, June
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Update from ICANN staff on SSR Activities Greg Rattray Tuesday 21 st 2010.
Are you prepared if so WHY, if not WHY not? What have you prepare for?
JIG (Joint ccNSO-GNSO IDN Group) Update APTLD | New Delhi Feb 23, 2012.
AREVA T&D Security Focus Group - 09/14/091 Security Focus Group A Vendor & Customer Collaboration EMS Users Conference September 14, 2009 Rich White AREVA.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
DSSA Update Costa Rica – March, Goals for today Update you on our progress Raise awareness Solicit your input 2.
DSSA Update Costa Rica – March, Goals for today Update you on our progress Raise awareness Solicit your input 2.
Ch 10 - Risk Management Learning Objectives You should be able to: List and describe risk management processes, inputs, outputs, and tools List and describe.
1 ICANN... update Pablo Hinojosa Manager, Regional Relations Global and Strategic Partnerships 2007 Caribbean Internet Forum St. Lucia, 5 November 2007.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
ENISA efforts for securing European Internet Infrastructure
Policies and Procedures for Civil Society Participation in GEF Programme and Projects presented by GEF NGO Network ECW.
Introduction to Hazards Risk Management
DSSA-WG Progress Update Singapore – June Charter: Background At their meetings during the ICANN Brussels meeting the At-Large Advisory Committee.
Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1.
Governmental Advisory Committee Public Safety Working Group 1.
Fostering Multi-Stakeholder Internet Governance Models in the Region Bill Graham, Director, ICANN Board.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Risk Management Process Frame = context, strategies Assess = determine.
Update on Consumer Choice, Competition and Innovation (CCI) WG Rosemary Sinclair.
1 27Apr08 Some thoughts on Internet Governance and expansion of the Domain Name space Paul Twomey President and CEO 9 August 2008 Panel on Internet Governance.
Internal Audit Quality Assessment Guide
Business Continuity Planning 101
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
SELF-GUIDED SECURITY ASSESSMENT
SELF-GUIDED SECURITY ASSESSMENT
Group Meeting Ming Hong Tsai Date :
Taking the STANDARDS Seriously
DSC Contract Management Committee Meeting
DSC Contract Management Committee Meeting
Presentation transcript:

DSSA Update Costa Rica – March, 2012

Goals for today Update you on our progress Raise awareness Solicit your input

Charter: Background At their meetings during the ICANN Brussels meeting the At-Large Advisory Committee (ALAC), the Country Code Names Supporting Organization (ccNSO), the Generic Names Supporting Organization (GNSO), the Governmental Advisory Committee (GAC), and the Number Resource Organization (NROs) acknowledged the need for a better understanding of the security and stability of the global domain name system (DNS). This is considered to be of common interest to the participating Supporting Organisations (SOs), Advisory Committees (ACs) and others, and should be preferably undertaken in a collaborative effort.

Goals and Objectives Report to respective participating SO’s and AC’s on: – Actual level, frequency and severity of threats to the DNS – Current efforts and activities to mitigate these threats to the DNS – Gaps (if any) in the current response to DNS issues – Possible additional risk mitigation activities that would assist in closing those gaps (if considered feasible and appropriate by the WG)

Where we are… Approach and status Launch Identify Threats & Vulnerabilities Analyze Threats & Vulnerabilities Analyze Threats & Vulnerabilities Report We are here – just getting started with this phase of the work We are hoping to have a substantial portion of this done by Prague

Methodology – NIST Rationale The DSSA realized that using a predefined methodology would save time and improve our work product We selected NIST after reviewing several dozen alternatives The reasons we selected this one include: – It’s available at no cost – It’s being actively supported and maintained – It’s widely known and supported in the community – It’s likely to be consistent with the needs of other parts of ICANN (and thus our pioneering may produce something that can be “repurposed” elsewhere in the organization) – It’s available in English

The methodology presumes a tiered approach to the work DSSA is chartered to look at the broadest, most general tier However we feel it may be useful to pursue one or two deeper, narrower analyses of specific threats once our “survey” work is complete Methodology – NIST Risk Management Hierarchy

Methodology – NIST Adversarial Risk Model An example of the model – risks from “adversarial” events (which differs from “non-adversarial” threats such as errors, accidents, etc.) Benefits: Consistent terminology Shared model Structured work Sample deliverables world

Where we’re going Analysis phase – based on NIST methods Assess threat sources and events Assess vulnerabilities and predisposing conditions Determine likelihood Determine level of impact Determine risk Threat sources – broad range of impact, high capability, strong intent, targeting the DNS? Threat events – relevant to the DNS? Vulnerabilities – severe? Predisposing conditions – pervasive? High likelihood that a threat-event will be initiated? High likelihood that a threat-event will result in an adverse impact? Broad harm/consequence from a threat-event – operations, assets, individuals, other organizations, world? Severe impact of a threat-event? Given all of the above – what are the high-risk scenarios?

Problem: the evaluation per NIST methodology does not scale It’s all about choices Threat tree could easily grow to over 1000 permutations Prune the tree along the way, in order to focus on the highest risks Leave a framework that can be used to address: – New things – Changes – Greater detail

Possible solution: re-sequence the work Start with consequences Evaluate the severity Concentrate on the most severe (e.g. loss of trust in DNS routing) Evaluate only those branches of the threat tree that lead to those outcomes Assess threat sources and events Assess vulnerabilities and predisposing conditions Determine likelihood Determine level of impact Determine risk Threat sources – broad range of impact, high capability, strong intent, targeting the DNS? Threat events – relevant to the DNS? Vulnerabilities – severe? Predisposing conditions – pervasive? High likelihood that a threat-event will be initiated? High likelihood that a threat-event will result in an adverse impact? Broad harm/consequence from a threat-event – operations, assets, individuals, other organizations, world? Severe impact of a threat-event? Given all of the above – what are the high-risk scenarios? Start with consequences…

Activity since Singapore The working group has: – Developed a protocol for handling confidential information – Selected a methodology to structure the remaining work – Begun the detailed analysis of the risk assessment

Confidential information Note: Sensitivity, attribution and release to public are determined by info-provider SensitiveNot sensitive Not attributed to source (transmitted through trusted 3 rd party or summaries of Type 1 developed by sub-group) Type 2: Distributed to sub- groups only. (Info-providers determine ultimate distribution) Info-provider authorizes release Type 3: Distributed to DSSA and public (“sanitized” info from sub- groups and other non- attributed information) Attributed to sourceType 1: Distributed to sub- groups only (under NDA, most- protected) Confidential info must never pass through this path. This is the exposure of information we’re trying to prevent. Type 4: Distributed to DSSA and public

Architecture

Non-adversarial threat events (Question: relevance to “the DNS”) NATE-10 Disrupts a "major" zone file (.COM/.NET/.UK/.DE etc.) NATE-20 Disrupts a "lesser" zone file (that is not outsourced to a major provider) NATE-30Root zone -- is published incorrectly NATE-40Root zone -- is not published NATE-50Disrupts the IANA zone file NATE-60Disrupts DNSSEC from a "Major" DNSSEC provider NATE-70Disrupts DNSSEC for a TLD zone NATE-80Disrupts Critical DNS support files NATE-90 Disrupts provisioning systems between registries and registrars (the result being that registrars can't add/change/delete zones from the TLD) Scale: Table E-4 -- Relevance to the organization Confirmed -- Seen by the organization 8 -- Expected -- Seen by the organization's peers or partners 5 -- Anticipated -- Reported by a trusted source 3 -- Predicted -- Predicted by a trusted source 1 -- Possible -- Described by a somewhat credible source 0 -- N/A -- Not currently applicable

Non-adversarial threat sources (Question: what is the range of impact?) NATS - 10Configuration errors by privaleged users NATS - 20Business failure of a key provider NATS - 30 Nation state -- interventions with accidental or unintended consequences NATS - 40 Key storage, processing or network hardware failure NATS - 50 Key networking or operating-system software failure NATS - 60General-purpose application software failure NATS - 70 Mission-specific software failure (WHOIS, EPP/RPP, Billing) NATS - 80Root scaling NATS - 90Natural disaster (flood, tsunami, earthquake NATS Widespread telecommunications infrastructure failure NATS - 110Widespread power infrastructure failure Scale: Table D-6 -- Range of impact sweeping, involving almost all of the cyber resources of the DNS 8 -- extensive, involving most of the cyber resources of the DNS 5 --wide-ranging, involving a significant portion of the cyber resources of the DNS 3 --limited, involving some of the cyber resources of the DNS 1 -- minimal, involving few if any of the cyber resources of the DNS

How we work (design credit -- CLO) Live chat Voting Definitions Agenda Participants Shared document

Questions?