Download presentation
Presentation is loading. Please wait.
Published byGilbert Patrick Modified over 9 years ago
1
© TecSec® Incorporated 2003 Threat Notification Model for Federal, State and Local Authorities Threat Notification Model for Federal, State and Local Authorities Getting Critical Information to the Homeland Security Threat-Fighter Standards-based Desktop Software provides Secure Information Sharing without Cost of New Infrastructure
2
© TecSec® Incorporated 2003 Overview President’s National Strategy Defines the Problem Sharing Threat Information Selectively, Confidentially, and on a Need-to-Know and Need-to-Share Basis
3
© TecSec® Incorporated 2003 The Problem
4
© TecSec® Incorporated 2003 President’s National Strategy Document asserts: Currently, there is no central, coordinating mechanism to assess the impact of sensitive information and ensure that it gets to all the parties with a need to know. Adding to this problem is the lack of technical communications systems to enable the secure transmittal of classified threat information to the owners and operators of concern. Source: The National Strategy for The Physical Protection of Critical Infrastructures and Key Assets, February 2003, Page 26
5
© TecSec® Incorporated 2003 One of the first steps we must take is to precisely define information sharing requirements as they pertain to the critical infrastructure and key asset protection mission. These requirements should focus on the sharing of real-time threat, vulnerability, and incident data; best practices; security guidelines; risk assessments; and operational procedures. Source: The National Strategy for The Physical Protection of Critical Infrastructures and Key Assets, February 2003, Page 26 Need to Define Information Sharing Requirements
6
© TecSec® Incorporated 2003 Threat Notification and Distribution From Federal to State & Local Or Vice-Versa
7
© TecSec® Incorporated 2003 Sample Threat Notification Enterprise State Local FR Federal FR = First Responders
8
© TecSec® Incorporated 2003 Information Sharing Flow And from the top down or the bottom up….. Information Sharing can occur……vertically or horizontally Or in a variety of other configurations depending on the Enterprise Architecture and Workflow
9
© TecSec® Incorporated 2003 Threat Analysis Threat is received at the Federal Level and analyzed Differentiated Access Control Credentials are applied to Threat Notification Threat is distributed to State and Local and First Responders and/or to other Agencies.
10
© TecSec® Incorporated 2003 Threat Notification: Credentialing and Distribution Threat Notification Federal State Local Different Credentials are Assigned to Different Parts of a Single Threat Notification. The Notification is dispersed throughout the “Enterprise”. FR FR = First Responders
11
© TecSec® Incorporated 2003 Threat Notification with Credentials Assigned Federal FR = First Responders State Local FR
12
© TecSec® Incorporated 2003 Access to the Threat Notification Access to the Threat Notification is Limited by a Recipient’s Role…and the Credentials Associated with that Role. FEDERAL ROLE Federal Credential State Credential Local Credential FR Credential STATE ROLE State Credential Local Credential FR Credential FR ROLE FR Credential Federal Role: has all Credentials & can access the entire document. State Role: can only access the State, Local, and FR portions. Local Role: can only access the Local and FR portions. FR (First Responders) Role: can only access the FR portion Threat Notification Federal State Local FR LOCAL ROLE Local Credential FR Credential FR = First Responders
13
© TecSec® Incorporated 2003 Constructive Key Management ® (CKM ® )
14
© TecSec® Incorporated 2003 CKM Enterprise Architecture Concepts Enterprise –A collection of Members, Organizational Units, Roles, Domains, Categories and Credentials that are administered as a whole. Domain –A grouping of Roles, Categories and Credentials with common security needs that defines who can communicate securely with whom within the Enterprise. Organizational Unit (OU) –A grouping of Members with common attributes
15
© TecSec® Incorporated 2003 CKM Enterprise Architecture President Director Manager Director Manager Director Manager A typical CKM Enterprise can be modeled after a standard organizational chart It consists of Organizational Units (OUs), which can be thought of as Departments. HR OUFinance OUSales OU And Domains, which can be thought of as Working Groups or Communities of Interest President Director Manager Director Manager Director Manager Domain 1Domain 2
16
© TecSec® Incorporated 2003 CKM Enterprise Administration CKM Enterprise Builder provides a Division of Labor and a Balance of Power by distributing the administration among three types of administrators for each CKM Enterprise. No one person has all the keys to the kingdom
17
© TecSec® Incorporated 2003 CKM Enterprise Administration Enterprise Authority (EA) Domain Authority (DA) Organizational Unit Authority (OUA) All Administrators are Members of the Enterprise. There are three types of Administrators in a typical CKM Enterprise
18
© TecSec® Incorporated 2003 Distribution of Labor – Balance of Power Enterprise Authority (EA) –Maintains the Enterprise Structure –Creates Domains and Organizational Units –Creates Custom Fields –Creates Top Organizational Unit Authority (who is assigned to all OUs) –Creates other EAs (optional) –A DA placeholder is automatically created when the Domain is created – this is assigned to a specific Domain. Organizational Unit Authority (OUA) – –Administers one or more Organizational Units – –Creates Members – –Assigns Roles to Members – –Creates and Distributes Tokens to Members – –Creates other OUAs (optional) Domain Authority (DA) – –Defines Domain Policy – –Administers a Domain – –Creates Categories, Credentials and Roles – –Assigns Roles to Organizational Units – –Creates other DAs (optional)
19
© TecSec® Incorporated 2003 Credentials and Roles
20
© TecSec® Incorporated 2003 Credentials and Roles Credential – a control method –Access to information is controlled by distributing appropriate Credentials to a person’s functional Role. –When distributing objects (files, emails, all or just part of documents, etc.), Members apply Credentials to define Recipients –A cryptographic value used in the key generation and regeneration process as an enforcing mechanism. Role - a person’s assigned duties –Credentials (and other Domain and Enterprise Information) are assigned to Roles based on duties and need to know. –A Project Mgr. may have several Credentials that give differential access (read and/or write) to types of information.
21
© TecSec® Incorporated 2003 Credentials are Assigned to Roles Federal Credential State Credential Local Credential Staff Credential State Credential Local Credential Staff Credential Local Credential Staff Credential Federal Role State Role Local Role Staff Credential 1 st Reponders Role
22
© TecSec® Incorporated 2003 Need to Know Roles are Assigned to Members … Federal RoleState RoleLocal Role Under Secretary Management Under Secretary Science & Technology Under Secretary Information Analysis & Infrastructure Protection Under Secretary Border & Transportation Security Under Secretary Emergency Preparedness & Response Governor State CIO State Police Chief State Medical Director State Fire ChiefSheriff Mayor County Executive EMT Director Hospital Director Local Police Chief Local Fire Chief FR Role Law Officer Fire Fighter Emergency Medical Technician Hospital Worker
23
© TecSec® Incorporated 2003 Credentials Assigned by Sender to Objects when Distributing Message Threat Notification Document Federal State Local This portion was encrypted with the Federal Credential This portion was encrypted with the State Credential This portion was encrypted with the Local Credential FR This portion was encrypted with the First Responders (FR) Credential
24
© TecSec® Incorporated 2003 CKM provides Instant Network for Homeland Security with Need to Know Information Access Transport independent, reliable, messaging Secures the data in transit and at rest Sender and Recipient Authenticated Information Confidentiality Sender Alert uses pre-assigned Credentials to need-to-know, known parties. Quick deployment and installation Low Cost, standards-based, proven products Microsoft ® Windows ® and PKI compatible + others Wireless application will be available
25
© TecSec® Incorporated 2003 IdentificationAuthenticationAuthorization
26
Identity, Authentication, and Authorization CKM Token with CKM Credentials for Authorization PKI Certificate on the CKM Token for Identity Authentication Token can be software or hardware The Member must authenticate to the Token before participating in the CKM System
27
© TecSec® Incorporated 2003 Backup Slides
28
© TecSec® Incorporated 2003 Facts About First Responders There are over 1 million firefighters in the United States, of which approximately 750,000 are volunteers. Local police departments have an estimated 556,000 full-time employees including about 436,000 sworn enforcement personnel. Sheriffs' offices reported about 291,000 full-time employees, including about 186,000 sworn personnel. There are over 155,000 nationally registered emergency medical technicians (EMT). Source: http://www.whitehouse.gov/news/releases/2002/01/print/20020124-2.htmlhttp://www.whitehouse.gov/news/releases/2002/01/print/20020124-2.html
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.