Cybersecuring DoD Industrial Control Systems One Year Later.
|
|
|
- Oswald Morton
- 10 years ago
- Views:
Transcription
1 Cybersecuring DoD Industrial Control Systems One Year Later. Michael Chipley, PhD GICSP PMP LEED AP President February 23,
2 Overview DoD CIO C&A Transformation NIST SP and SP , CNSSI 1253 DHS Cybersecurity Evaluation Tool (CSET) DoD RMF KS ICS PIT website emass with ICS PIT Step-By Step Manual Method Continuous Monitoring, Alerts and Advisories DHS Interagency Security Committee Converged Systems Cyber Workforce Skills and Credentials, Ranges Acquisition/Procurement Vendor Outreach and Meetings Cybersecuring ICS and BCS Workshops 2
3 DoDI and Update 3
4 Pebble Beach Class Carrier Huge Cost Savings o No more planes and choppers cluttering up the deck o Less fuel used Noise Complaints way down Morale way up Drives over 400 yards with the wind 4
5 Standards - NIST FPD 2015 Huge Cost Savings o No more planes and choppers cluttering up the deck Comments Due o Less fuel used Noise 10 Complaints way March down Morale way up Drives over 400 yards with the wind 5
6 Standards - NIST FPD 2015 While many of controls in Appendix F of NIST SP are applicable to ICS as written, many controls did require ICS-specific interpretation and/or augmentation by adding one or more of the following to the control An ICS overlay, which includes this ICS-specific guidance, is included in Appendix G of this document. Section 6 of this document also provides initial guidance on how security controls apply to ICS. Initial recommendations and guidance, if available, are provided in an outlined box for each section. In process of submitting to the CNSS the Appendix G ICS Overlay for adoption/approval 6
7 Standards - NIST FPD Other Types of Control Systems Although this guide provides guidance for securing ICS, other types of control systems share similar characteristics and many of the recommendations from this guide are applicable and could be used as a reference to protect such systems against cybersecurity threats. For example, although many building, transportation, medical, security and logistics systems use different protocols, ports and services and are configured and operate in different modes than ICS, they share similar characteristics to traditional ICS [18]. Examples of some of these systems and protocols include: Other Types of Control Systems Advanced Metering Infrastructure Building Automation System Building Management Control System CCTV Surveillance System CO2 Monitoring Digital Signage Systems etc Protocols/Ports and Services Modbus: Master/Slave - Port 502 BACnet: Master/Slave - Port LonWorks/LonTalk: Peer to Peer - Port 1679 DNP3: Master/Slave - Port IEEE 802.x - Peer to Peer Zigbee - Peer to Peer Bluetooth Master/Slave Additional DoD content accepted and incorporated into the Final Public Release Industrial is not the most desirable term, but it will work 7
8 NIST SP R2 Key Security Controls Inventory CM-8 Information System Component Inventory PM-5 Information System Inventory PL-7 Security Concept of Operations PL-8 Information Security Architecture SC-41 Port and I/O Device Access PM-5 Information System Inventory Central Monitoring AU-6 Audit Review, Analysis, and Reporting CA -7 Continuous Monitoring IR-5 Incident Monitoring IR-6 Incident Reporting PE-6 Monitoring Physical Access PM-14 Testing, Training and Monitoring RA-5 Vulnerability Scanning SC-7 Boundary Protection SI-4 Information System Monitoring SI-5 Security Alerts, Advisories, and Directives Test and Development Environment CA-8 Penetration Testing CM-4 Security Impact Analysis CP-3 Contingency Training CP-4 Contingency Plan Testing and Exercises PM-14 Testing, Training and Monitoring Critical Infrastructure CP-2 Contingency Plan CP-6 Alternate Storage Site CP-7 Alternate Processing Site CP-10 Information System Recovery and Reconstitution PE-3 Physical Access Control PE-10 Emergency Shutoff PE-11 Emergency Power PE-12 Emergency Lighting PE-13 Fire Protection PE-14 Temperature and Humidity Controls PE-17 Alternate Work Site PM-8 Critical Infrastructure Plan Acquisition and Contracts AU-6 Audit Review, Analysis, and Reporting CA -7 Continuous Monitoring SA-4 Acquisitions PM-3 Information System Resources PM-14 Testing, Training and Monitoring Inbound Protection, Outbound Detection 8
9 DHS Cyber Security Evaluation Tool (CSET) CSET 6.2 release has new DoD, CNSS, NIST and DHS references, control system dropdown lists DoD Moving to Standardized Assessments via CSET 9
10 CSET 6.2 with CNSS RMF Supported SAL as required by CNSSI 1253, NIST SP Vol 2 Data Types 10
11 CSET 6.2 CNSS SAL C-I-A and Info Types C-I-A Data Categorization with Special Factors Justification 11
12 CSET 6.2 Diagram Tool Enhancements Additional Components, Building Control System template more to come! 12
13 PIT, PIT Systems, PIT Stand-Alone DoDI Risk Management Framework for DoD IT - Provides clarity regarding what IT should undergo the RMF process and how AA = Full 6 steps of RMF, A = 4 steps of RMF 13
14 DoDI PIT Examples (b) Examples of platforms that may include PIT are: weapons systems, training simulators, diagnostic test and maintenance equipment, calibration equipment, equipment used in the research and development of weapons systems, medical devices and health information technologies, vehicles and alternative fueled vehicles (e.g., electric, bio-fuel, Liquid Natural Gas that contain car-computers), buildings and their associated control systems (building automation systems or building management systems, energy management system, fire and life safety, physical security, elevators, etc.), utility distribution systems (such as electric, water, waste water, natural gas and steam), telecommunications systems designed specifically for industrial control systems including supervisory control and data acquisition, direct digital control, programmable logic controllers, other control devices and advanced metering or sub-metering, including associated data transport mechanisms (e.g., data links, dedicated networks). Installations and Environment worked with CIO to expand definition of PIT systems, then added to NIST SP R2 3 years in the making 14
15 RMF Knowledge Service Portal ICS PIT RMF KS ICS PIT website planned released DoD wide Mar
16 emass emass updated to include the RMF process BEI created ICS PIT RMF Knowledge Service web page with instructions for: o o registering ICS in emass NIST SP / security controls to assess and authorize systems BEI conducting test cases for various ICS system types, selecting appropriate controls (ICS master list, C-I-A matrix using NIST SP data categorization) o o o NDW-ICS-PE-I-AA = Platform Enclave [ICS Transport Backbone] Interconnect-Assess and Authorize FTBEL-ICS-LSSS-NI-A = Life Safety & Security Systems [Physical Access Control, Fire Alarm Systems]-No Interconnect-Assess FA4819-ICS-UMCS-NI-A = Utility Monitoring Control Systems [Electrical, Building Automation Systems]-No Interconnect-Assess BEI conducting emass training/demos for EI&E community o o o o o o o o o Overview of DoDI 8500/8510 RMF & PIT ICS, NIST Standards, ICS Protocols Overview of Shodan, Kali Linux, Samurai STFU, Wireshark Using Shodan to Footprint ICS Break Using CSET: SAL, Network Arch Diagram, Inventory, Templates, Security Controls Evaluation, Reports, Data Aggregation & Trending, System Security Plan Working Lunch: SamuraiSTFU Modbus Pal, Wireshark Packet Captures Using emass; demonstration Using the Interim Excel files for uploading into emass Wrap Up Q&A 16
17 emass Home Page Register PE = 1.5 hours, each additional system 0.5 hours 17
18 CSET and emass Relationship System emass (ATO and IATT) DIACAP RMF Inheritance Controls AO Package System IT Enclave / IS PIT System PIT Service XML Import/Export DITPR Component Registry (APMS, DADMS, EITDR, DHP SIRT) MILCON / SRM Security Medical Logistics Weapons Existing / Legacy Systems Passive Monitoring Tools Nessus McAfee Sophia Grass Marlin CSET Tool System List Network Diagram Inventory SSP Artifacts Real Property Control System Acquisition 90% Design CSET 50-95% Construction FAT 100% Construction SAT Pen Test CSET Final 18
19 CM, Alerts and Advisories ICSA A Siemens Industrial Products OpenSSL Heartbleed Vulnerability Mitigation details for OpenSSL vulnerability in several Siemens industrial products ICSA Honeywell Falcon (XLWeb Linux/Webserver) Allows anyone (without username or password) to log in as a system administrator Known for months; multiple unpatched systems remain exposed to the Internet ICSA A Sophisticated Malware Campaign Compromising ICS Targeted HMI products: GE Cimplicity, Advantech/ Broadwin WebAccess, and Siemens WinCC; variant of BlackEnergy malware - automated tools to discover and compromise vulnerable systems Who Reviews Alerts & Mitigates Facility Engineers or IA SMEs? 19
20 ICS Monitoring and Network Attack Points Host Based Security Systems Scanning (Active) Windows, Linux HTTP, TCP, UDP Client Side Attacks Server Side Attacks Intrusion Detection Systems (Passive) PLC, RTU, Sensor Modbus, LonTalk, BACNet, DNP 3 Network Attacks Hardware Attacks 20
21 CSET 6.2 Grass Marlin Plug Working with other products to get Visio import templates 21
22 Sophia Installs/Pilots USMC Recruit Depot, San Diego Monitoring control systems networks for base facilities along with IT network that it is connected to Naval Surface Warfare (NSWCCD) Philadelphia Begin pilot testing for intrusion detection capabilities for control system networks on board vessels Testing in conjunction with two other complimentary technologies also developed at government labs CYBERCOM Installing for test and evaluation on 2/20 Working with CIO to define rules for HBSS and other passive IDS boundaries 22
23 Final Draft DHS ISC CVS White Paper 2015 Technological advances in system components, coupled with the interconnection capability, moved from Recommended Standards technology (e.g., RS-232, RS-422, RS-485, etc.) to Internet Protocol (IP) telecommunications standards (e.g., IPv6). Employing state-of-the-art systems, today s security professional relies heavily upon IT infrastructure to host and interconnect the various components of a VMS, IDS, and PACS. Employing IT infrastructure to interconnect Electronic Security System (ESS) components across local area networks (LAN), wide area networks (WAN), metropolitan area networks (MAN) or the Internet requires a convergence between the traditional security community (operational management), and the IT community (enabler). Moving to a universe of Converged Systems and IoT; ICS, Weapons, Medical.. 23
24 Example: Navy Converged Systems Innovative solution to offset the DoD Sequestration budget cuts! 24
25 Preliminary Converged Systems Approach DITPR ICS PIT Guidance and Relationship to ICS PIT in emass Some ICS are hybrid between PIT ICS (controls, sensors and devices) and a Defense Business System and need to be maintained in both DITPR and emass. Examples include: - Access control/alarm systems that use badges/cac for keyless entry (PII) - Keyless entry/keypad systems (PII) - Meter data management systems that combine head-end consumption data with back-end energy controllers (PCII, PII) - Patient Monitoring Systems (PII, HIPPA) - Vehicle Fueling/Charging Stations/Pumps (PCI) These hybrid systems are categorized as "Converged Systems". (Reference the DHS ISC CVS White Paper). For converged systems, identify them as WMA or DBS and follow flow chart scenarios 3, 4, 5 or 6 to identify other systems that will need additional detail (SNAP-IT, Certified Funds, etc.). In the DITPR System Description, at the beginning of the Description enter, "This is a Converged IS and ICS PIT System." As more converged systems become interconnected, the distinction between what is IS and what is ICS PIT becomes even more challenging. Contact Tracy DeBusk ([email protected]) for assistance with DITPR and emass ICS PIT questions. Use BOTH the NIST SP R4 AND the NIST SP R2 controls 25
26 DoD 8570M IA Workforce i. Cybersecurity Workforce (1) Cybersecurity workforce functions must be identified and managed, and personnel performing cybersecurity functions will be appropriately screened in accordance with this instruction and DoD R (Reference (t)), and qualified in accordance with DoDD Changing to DoDD 8140 Cyberspace Workforce Management AO s will need Specialized Skills and Knowledge 26
27 Workforce Cyber Skills NIST NICE Collect and Analyze Data Capture cybersecurity workforce and training data to understand capabilities and needs. Recruit and Retain Incentivize the hiring and retention of highly skilled and adaptive professionals needed for a secure digital nation. Educate, Train, and Develop Expand the pipeline for and deliberately develop an unrivaled cybersecurity workforce. Engage Educate and energize all cybersecurity workforces and the American public to strengthen the nation s front lines of cybersecurity. 27
28 Workforce Challenges 28
29 Workforce Cyber Skills ICS PIT Operate and Maintain Data Administration Knowledge Management Customer Service and Technical Support Network Services System Administration Systems Security Analysis Protect and Defend Computer Network Defense (CND) Analysis Incident Response Computer Network Defense (CND) Infrastructure Support Vulnerability Assessment and Management Securely Provision Information Assurance (IA) Compliance Software Assurance and Security Engineering Systems Security Architecture Technology Research and Development Systems Requirements Planning Test and Evaluation Systems Development 29
30 DoD Cyber Ranges Work Group 30
31 ICS Cyber Ranges 31
32 Acquisition Reform Six reform recommendations: 1.Institute baseline cybersecurity requirements as a condition of contract award for appropriate acquisitions 2.Include cybersecurity in acquisition training 3.Develop common cybersecurity definitions for federal acquisitions 4.Institute a federal acquisition cyber risk management strategy 5.Include a requirement to purchase from original equipment manufacturers, their authorized resellers, or other trusted sources 6.Increase government accountability for cyber risk management 32
33 Contract Cyber Risk Management Plan (e) Order Cybersecurity Risk Management Plan (OCRMP) Submittal, Review, and Acceptance (1) Submittal. (i) When submitting a proposal in response to any task order solicitation, Contractor shall submit its approved CCRMP to the ordering contracting officer as an addendum to the proposal. (ii) If required by the task order solicitation, Contractor shall also provide an Order Cybersecurity Risk Management Plan (OCRMP) that includes additional information to address the specific security requirements of the task order solicitation. (f) Order Cybersecurity Risk Management Plan Update, Review, and Acceptance (1) Updates. (i) Contractor may update its OCRMP at any time after order award to ensure the Government is adequately assured of Contractor s continuous ability to provide appropriate cybersecurity in the deliverables it provides under the contract. CCRMP based on NIST SP R4, or can use SANS Top 20 Arlington Workshops: "How To" Workshop: Develop a Contract Cybersecurity Risk Management Plan 33
34 Procurement Challenges Initially likely to pay a premium, then becomes industry standard LEED is a good corollary, took a few years.but now a green is gold 34
35 ICS and BCS Cybersecurity Workshops 1 FFC is hosting a half-day workshop on March XX 2015 focused on generating awareness of cyber security vulnerabilities, current and forthcoming guidance and protection strategies relevant to federal facility stakeholders. Agenda: Introductions, Purpose, Expected Outcome (FFC Cameron Oskvig) Facility control systems Vulnerability, Alert and Advisories Overview (OSD Daryl Haegley / ODNI Dave Retland) Exploiting controls systems demonstration using Shodan, DB Exploit, Google Hacking, Diggity, Kali Linux (OSD Michael Chipley) Break NIST SP Industrial Control Systems Security Guide R2 (NIST Keith Stouffer) DHS ICS-CERT and DHS Cyber Security Evaluation Tool (CSET) demonstration (INL Barry Hanson) GSA / DoD control systems Cyber Policy and Strategy (GSA Josh Mordin / OSD Daryl Haegley) 35
36 ICS and BCS Cybersecurity Workshops Overview of DoDI 8500/8510 RMF and PIT ICS, NIST Standards & Drivers, ICS Protocols Overview of Shodan, Kali Linux, Samurai STFU, Wireshark Using Shodan to Footprint ICS Break Using CSET: SAL, Network Arch Diagram, Inventory, Templates, Security Controls Evaluation, Reports, Data Aggregation & Trending, System Security Plan Working Lunch: SamuraiSTFU Modbus Pal, Wireshark Packet Captures Using emass; demonstration Using the Interim Excel files for uploading into emass Wrap Up Q&A 36
37 SANS Control Systems Poster 2013 DoD Reference Architecture 2012 Coincidence? 37
38 DoD ICS Systems 2012 Internet ICS Operations Center Airfield Lighting Buildings ICS PIT Electrical NOC Natural Gas Pier POL Rail Test and Development Environment Test and Development Environment Tools Kali Linux SamuraiSTFU CSET Shodan Steam Traffic Management System Water Waste Water 38
39 SANS Control Systems Poster 2014 Coincidence?! 39
40 SANS Control Systems Poster 2015? If history holds any indication We said we need Model Ops Centers, We need to address all Control Systems, We need to see the whole picture, We need the culture to change.. 40
41 Navy Shore Operations Concept H Quality of Life Logistics Operations / Ops Support CWC Operations USW / Strike Facility Management Public Safety Shore Operations Center Strike Operations / C2 AAW /BMD Enablers ASW / AAW Regional Shore Operations Center ~ Combined Warfare Commander Operations DEC
42 Navy Shore Operations Center (ShOC) Shore Operations Center Shore Integrator Alarms / Alerts on Emergencies Regional Dispatch Center (RDC) Shore Facilities Engineering Command Alarms / Alerts on Building & Utility Operations Public Works Department (PWD) Quality Assurance on Shore Operations: Contract Execution, Maintenance Support; Event Close-out, etc. Public Works Department, Regional Dispatch Center Trouble Calls and Service Requests from Installation personnel to the Regional Desk Public Works Department Establish integrated center and provide quality assurance of the Navy's shore operations; Provide situational awareness and preliminary assessment to enable stakeholder effectiveness. DEC DEC 2014
43 Navy Shore Operations Center (SHoC) Integrated Model Operations Center, not just a dream 43
44 NAVFAC We are all Cyber Warriors 44
45 NAVFAC Cyber Security RMF 45
46 Vendor Outreach Meeting with vendors to initiate information sharing Most now have test and development environments, IA Cyber Most are using Secure Software Development Lifecycle Exchanging inventory, known systems, integrators Exploring SME support for Fly-Away teams Moving from reactive to proactive, CYBERCOM and NSA support Providing emass and CSET hands on demos - suppliers, vendors, contractors, operations & maintenance staff are the eyes and ears, intrinsic part of the cyber solution 46
47 Cybersecuring DoD ICS Workshop Cybersecuring DoD Industrial Control Systems Overview of DoDI 8500/8510 RMF and PIT ICS, NIST Standards & Drivers, ICS Protocols Overview of Shodan, Kali Linux, Samurai STFU, Wireshark Using Shodan to Footprint ICS Break Using CSET 6.2: SAL, Network Arch Diagram, Inventory, Templates, Security Controls Evaluation, Reports, Data Aggregation & Trending, System Security Plan Lunch Using emass; hands on demonstration Using the RMF KS ICS PIT website Step-By-Step instructions and Interim Excel files for uploading into emass Wrap Up Q&A 47
48 Cybersecuring Building Control Systems Introduction to Cybersecuring Building Control Systems Classroom: Overview of Control Systems and Protocols Classroom: Drivers, Standards, Guides, Publications Break Classroom: Defense in Depth, Enclaves, System Boundaries, Model Operations Center, Test and Development Environment, Continuous Monitoring Lab: Using the DHS CSET and network mapping tools to create an Enclave, Network Diagram, and System Security Plan Lunch Classroom: System Security Plan, Security Assessment Report, Plan of Action and Milestone, CONOPS, Incident Response Report Lab: Introduction to Google Search & Hacking, Shodan, VMWare, Kali Linux, SamuraiSTFU tools Break Classroom: Attacking and Defending, Response and Recovery, Incident Reporting Advanced Cybersecuring Building Control Systems Hacker Methodology Footprinting using Google Hacking, Google Earth, BING, Shodan, Kali Linux and SamuraiSTFU Scanning and Enumeration using NMAP, WireShark, Sophia, SCAP and STIGS Break Advanced Meter Infrastructure Attack Methodology, AMI Penetration Testing Using SamuraiSTFU ModbusPal Emulator, Packet Capture for Control System Analysis Lunch Exploitation using Metasploit, SamuraiSTFU Privilege Escalation, Post Exploitation, Break Mitigation and Defense, Auditing, and Wrap Up Control-Systems.htm 48
49 Army Mobile Weapons Platform Truly air gapped.slight problem when firing in the forward position Point is maintain some level of manual operation, automation breaks! 49
50 Questions Michael Chipley President, The PMC Group LLC Cell:
Exploiting controls systems demonstration using Shodan, DB Exploit, Google Hacking, Diggity, Kali Linux
Exploiting controls systems demonstration using Shodan, DB Exploit, Google Hacking, Diggity, Kali Linux Michael Chipley, PhD GICSP PMP LEED AP President March 24, 2015 [email protected] Control Systems
Cybersecurity of Buildings Workshop OT and IT Convergence A New Paradigm. Marriott Wardman Park January 6, 2014
Cybersecurity of Buildings Workshop OT and IT Convergence A New Paradigm Marriott Wardman Park January 6, 2014 1 Agenda Overview of Building Control Systems and Cybersecurity Efforts Cybersecurity Initiatives
Federal Facilities Council Workshop: Cyber Resilience of Building Control Systems-----Nov 17-19, 2015-----Washington, DC
Day 1, Nov 17, 2015 8:00 a.m. 9:00 a.m. Check in/setup 9:00 a.m. 9:10 a.m. Welcome and Introductions 9:10 a.m. 9:30 a.m. Federal Perspective Keynote Global/National Landscape: Former Congressman Steve
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
Risk Management Framework (RMF): The Future of DoD Cyber Security is Here
Risk Management Framework (RMF): The Future of DoD Cyber Security is Here Authors: Rebecca Onuskanich William Peterson 3300 N Fairfax Drive, Suite 308 Arlington, VA 22201 Phone: 571-481-9300 Fax: 202-315-3003
Security and Privacy Controls for Federal Information Systems and Organizations
NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems JOINT TASK FORCE TRANSFORMATION INITIATIVE This document contains excerpts from NIST Special Publication
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
Cybersecurity Throughout DoD Acquisition
Cybersecurity Throughout DoD Acquisition Tim Denman Cybersecurity Performance Learning Director DAU Learning Capabilities Integration Center [email protected] [email protected] Cybersecurity
AF Life Cycle Management Center
AF Life Cycle Management Center Avionics Weapon Systems Cybersecurity Risk Management Framework Assessment & Authorization Update Harrell Van Norman AFLCMC/EZAS Cybersecurity Technical Expert [email protected]
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
Access FedVTE online at: fedvte.usalearning.gov
FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at [email protected]. To speak with a Help Desk
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN
Independent Security Operations Oversight and Assessment Captain Timothy Holland PM NGEN 23 June 2010 Independent Security Operations Oversight and Assessment Will Jordan NGEN Cyber Security 23 June 2010
Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute
Wasting Money on the Tools? Automating the Most Critical Security Controls Bonus: Gaining Support From Top Managers for Security Investments Mason Brown Director, The SANS Institute The Most Trusted Name
Get Confidence in Mission Security with IV&V Information Assurance
Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving
NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives
NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives Center of excellence for secure integration, deployment and sustainment of Industrial Control Systems and Operational Technology
Security Testing in Critical Systems
Security Testing in Critical Systems An Ethical Hacker s View Peter Wood Chief Executive Officer First Base Technologies Who is Peter Wood? Worked in computers & electronics since 1969 Founded First Base
CTR System Report - 2008 FISMA
CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control
Altius IT Policy Collection Compliance and Standards Matrix
Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy
OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700
OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700 OPERATIONAL TEST AND EVALUATION AUG 0 1 2014 MEMORANDUM FOR COMMANDER, ARMY TEST AND EVALUATION COMMAND COMMANDER, AIR
1 July 2015 Version 1.0
1 July 2015 Version 1.0 Cleared for Open Publication June 26, 2015 DoD Office of Prepublication and Security Review Cybersecurity T&E Guidebook ii July 1, 2015 Version 1.0 Table of Contents 1 INTRODUCTION...
Building Insecurity Lisa Kaiser
Building Insecurity Lisa Kaiser Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Insecurity How do I Specify it Buy it Test it Deploy it Regret it Apologize for it Specifying Insecurity
U.S. FLEET CYBER COMMAND U.S. TENTH FLEET DoD RMF Transition
U.S. FLEET CYBER COMMAND U.S. TENTH FLEET DoD RMF Transition Dr. Charles Kiriakou, Ms. Kate Cunningham, Mr. Kevin Winters, & Mr. Carl Rice September 3, 2014 UNCLASSIFIED 1 Bottom Line Up Front (BLUF) The
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Industrial Control Systems Security Guide
Industrial Control Systems Security Guide Keith Stouffer, Engineering Lab National Institute of Standards and Technology NIST SP 800-82, Rev 2 and ICS Cybersecurity Testbed Keith Stouffer Project Leader,
N-Dimension Solutions Cyber Security for Utilities
AGENDA ITEM NO.: 3.A. MEETING DATE; 08/18/2014 N-Dimension Solutions Cyber Security for Utilities Cyber Security Protection for Critical Infrastructure Assets The cyber threat is escalating - Confidential
Security Content Automation Protocol for Governance, Risk, Compliance, and Audit
UNCLASSIFIED Security Content Automation Protocol for Governance, Risk, Compliance, and Audit presented by: Tim Grance The National Institute of Standards and Technology UNCLASSIFIED Agenda NIST s IT Security
Tim Denman Systems Engineering and Technology Dept Chair/ Cybersecurity Lead DAU South, Huntsville [email protected]
Tim Denman Systems Engineering and Technology Dept Chair/ Cybersecurity Lead DAU South, Huntsville [email protected] Current State of Cybersecurity in the DoD Current Needs Communications focus Changing
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
EC-Council Certified Security Analyst (ECSA)
EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for
CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric
CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric Challenges What challenges are there for Cyber Security in Industrial
Cyber Security for SCADA/ICS Networks
Cyber Security for SCADA/ICS Networks GANESH NARAYANAN HEAD-CONSULTING CYBER SECURITY SERVICES www.thalesgroup.com Increasing Cyber Attacks on SCADA / ICS Systems 2 What is SCADA Supervisory Control And
RMF. Cybersecurity and the Risk Management. Framework UNCLASSIFIED
Cybersecurity and the Risk Management Framework Wherewe ve been and where we re going Information Assurance DoD Instruction 8500.01,Para 1(d),adoptsthe term cybersecurity as it is defined in National Security
Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples The
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8551.01 May 28, 2014 DoD CIO SUBJECT: Ports, Protocols, and Services Management (PPSM) References: See Enclosure 1 1. PURPOSE. In accordance with the authority
The Importance of Cybersecurity Monitoring for Utilities
The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION Directive Current as of 19 November 2014 J-8 CJCSI 8410.02 DISTRIBUTION: A, B, C, JS-LAN WARFIGHTING MISSION AREA (WMA) PRINCIPAL ACCREDITING AUTHORITY
Operationally Focused CYBER Training Framework
Operationally Focused CYBER Training Framework Deputy Director, Field Security Operations 9 May 2012 Agenda DISA Cyber Workforce Training Vision Basic Tenets Role-based Educational/Assessment implementation
Industrial Control System Cyber Situational Awareness. Robert M. Lee* June 10 th, 2015
Industrial Control System Cyber Situational Awareness Robert M. Lee* June 10 th, 2015 Executive Summary Cyber situational awareness is the concept of understanding and visualizing the networked environment
Security Controls Assessment for Federal Information Systems
Security Controls Assessment for Federal Information Systems Census Software Process Improvement Program September 11, 2008 Kevin Stine Computer Security Division National Institute of Standards and Technology
Security Language for IT Acquisition Efforts CIO-IT Security-09-48
Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Office of the Senior Agency Information Security Officer VERSION HISTORY/CHANGE RECORD Change Number Person Posting Change Change Reason
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
Cloud Security for Federal Agencies
Experience the commitment ISSUE BRIEF Rev. April 2014 Cloud Security for Federal Agencies This paper helps federal agency executives evaluate security and privacy features when choosing a cloud service
Seven Strategies to Defend ICSs
INTRODUCTION Cyber intrusions into US Critical Infrastructure systems are happening with increased frequency. For many industrial control systems (ICSs), it s not a matter of if an intrusion will take
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems Samuel R. Ashmore Margarita Castillo Barry Gavrich CS589 Information & Risk Management New Mexico Tech Spring 2007
How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives
How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives DON IT Conference // AFCEA West 2015 Presented by: RDML John Ailes Chief Engineer SPAWAR
National Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
API Cybersecurity Conference Industrial Control Systems Workshop. Sponsored by Alpine Security
API Cybersecurity Conference Industrial Control Systems Workshop Sponsored by Alpine Security www.alpinesecurity.com Intro Incidents ICS Overview Lab Environment ICS Discovery ICS Vulnerability Scanning
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff
Compliance Overview: FISMA / NIST SP800 53
Compliance Overview: FISMA / NIST SP800 53 FISMA / NIST SP800 53: Compliance Overview With Huntsman SIEM The US Federal Information Security Management Act (FISMA) is now a key element of the US Government
DIACAP Presentation. Presented by: Dennis Bailey. Date: July, 2007
DIACAP Presentation Presented by: Dennis Bailey Date: July, 2007 Government C&A Models NIST SP 800-37 - Guide for the Security Certification and Accreditation of Federal Information Systems NIACAP - National
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
SECURITY CONTROL OVERLAYS FOR INDUSTRIAL CONTROL SYSTEMS Version 1 January 2013
Committee on National Security Systems Instruction (CNSSI) No. 1253 SECURITY CONTROL OVERLAYS FOR INDUSTRIAL CONTROL SYSTEMS Version 1 January 2013 This Draft version of the Overlay is for informational
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
NIST Cybersecurity Framework Manufacturing Implementation
NIST Cybersecurity Framework Manufacturing Implementation Keith Stouffer Project Leader, Cybersecurity for Smart Manufacturing Systems Engineering Lab, NIST Manufacturing Cybersecurity Research at NIST
Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat
Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat Centers for Disease and Prevention National Center for Chronic Disease Prevention and Health
Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013
Security Architecture: From Start to Sustainment Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013 Security Architecture Topics Introduction Reverse Engineering the Threat Operational
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments
Review of the SEC s Systems Certification and Accreditation Process
Review of the SEC s Systems Certification and Accreditation Process March 27, 2013 Page i Should you have any questions regarding this report, please do not hesitate to contact me. We appreciate the courtesy
Data- Centric Enterprise Approach to Risk Management Gregory G. Jackson, Sr. Cyber Analyst Cyber Engineering Division Dynetics Inc.
Data- Centric Enterprise Approach to Risk Management Gregory G. Jackson, Sr. Cyber Analyst Cyber Engineering Division Dynetics Inc. May 2012 (Updated) About the Author Gregory G. Jackson is a senior cyber
A Systems Approach to HVAC Contractor Security
LLNL-JRNL-653695 A Systems Approach to HVAC Contractor Security K. M. Masica April 24, 2014 A Systems Approach to HVAC Contractor Security Disclaimer This document was prepared as an account of work sponsored
Department of Homeland Security Federal Government Offerings, Products, and Services
Department of Homeland Security Federal Government Offerings, Products, and Services The Department of Homeland Security (DHS) partners with the public and private sectors to improve the cybersecurity
Assessing the Effectiveness of a Cybersecurity Program
Assessing the Effectiveness of a Cybersecurity Program Lynn D. Shiang Delta Risk LLC, A Chertoff Group Company Objectives Understand control frameworks, assessment structures and scoping of detailed reviews
Security-as-a-Service (Sec-aaS) Framework. Service Introduction
Security-as-a-Service (Sec-aaS) Framework Service Introduction Need of Information Security Program In current high-tech environment, we are getting more dependent on information systems. This dependency
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Introduction to NICE Cybersecurity Workforce Framework
Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,
The Premier IA & Cyber Security Training Specialist
The Premier IA & Cyber Security Training Specialist ISO 9001: 2008 Certified Maturity Level 2 of CMMI Top 2% D&B Rating VA Certified Service Disabled Veteran Owned Small Business SDVOSB DCAA Approved Accounting
Cyber Security Implications of SIS Integration with Control Networks
Cyber Security Implications of SIS Integration with Control Networks The LOGIIC SIS Project Standards Certification Education & Training Publishing Conferences & Exhibits Presenter Zach Tudor is a Program
ACCESS RIGHTS MANAGEMENT Securing Assets for the Financial Services Sector
ACCESS RIGHTS MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments
Security Self-Assessment Tool
Security Self-Assessment Tool State Agencies Receiving FPLS Information, 7/15/2015 Contents Overview... 2 Access Control (AC)... 3 Awareness and Training (AT)... 8 Audit and Accountability (AU)... 10 Security
New Era in Cyber Security. Technology Development
New Era in Cyber New Era in Cyber Security Security Technology Technology Development Development Combining the Power of the Oil and Gas Industry, DHS, and the Vendor Community to Combat Cyber Security
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group
10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group Presented by: Michael Flavin and Stan Stahl Saalex Information Technology Overview Saalex Information
Roger W. Kuhn, Jr. Advisory Director Education Fellow Cyber Security Forum Initiative
Roger W. Kuhn, Jr. Advisory Director Education Fellow Cyber Security Forum Initiative November 2014 Disclaimer Current SCADA Vulnerability Factors Industrial Control Systems 101 Proposed Countermeasures
UNCLASSIFIED. Trademark Information
SAMSUNG KNOX ANDROID 1.0 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 1 3 May 2013 Developed by Samsung Electronics Co., Ltd.; Fixmo, Inc.; and General Dynamics C4 Systems,
Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 [email protected] 866-605- 6328 www.redhawksecurity.
Planning Guide for Penetration Testing John Pelley, CISSP, ISSAP, MBCI Long seen as a Payment Card Industry (PCI) best practice, penetration testing has become a requirement for PCI 3.1 effective July
Information Security for Managers
Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize
System Security Certification and Accreditation (C&A) Framework
System Security Certification and Accreditation (C&A) Framework Dave Dickinson, IOAT ISSO Chris Tillison, RPMS ISSO Indian Health Service 5300 Homestead Road, NE Albuquerque, NM 87110 (505) 248-4500 fax:
CONTINUOUS MONITORING
CONTINUOUS MONITORING Monitoring Strategy Part 2 of 3 ABSTRACT This white paper is Part 2 in a three-part series of white papers on the sometimes daunting subject of continuous monitoring (CM) and how
LUNARLINE: School of Cyber Security. Dedicated to providing excellence in Cyber Security Training Certifications. ISO 9001: 2008 Certified
LUNARLINE: School of Cyber Security Dedicated to providing excellence in Cyber Security Training Certifications ISO 9001: 2008 Certified Maturity Level 2 of CMMI Top 2% D&B Rating VA Certified Service
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Hosted by Lunarline: School of Cyber Security
Hosted by Lunarline: School of Cyber Security Please Fax Government Purchase Orders and SF 182s To (22) 315-33 Cybersecurity is one of the hottest issues for today s Federal and DOD Agencies and commercial
Department of Management Services. Request for Information
Department of Management Services Request for Information Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 Submitted By: Carlos Henley
Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense
Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense John M. Gilligan Information systems Security Association National Capital Chapter January 19, 2010 1 Topics Background
Turbine Controls Update
Turbine Controls Update David Cicconi, Business Development Manager Emerson Process Management Power & Water Solutions Define Project Scope and Objectives Address obsolescence Best solution for new operational
Security Management. Keeping the IT Security Administrator Busy
Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching
Hackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services
4937 Fargo Street North Charleston SC 29418 Phone 843.266.2330 Fax 843.266.2333 w w w. c o d e l y n x. c o m Request for Information: Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring,
Improving SCADA Control Systems Security with Software Vulnerability Analysis
Improving SCADA Control Systems Security with Software Vulnerability Analysis GIOVANNI CAGALABAN, TAIHOON KIM, SEOKSOO KIM Department of Multimedia Hannam University Ojeong-dong, Daedeok-gu, Daejeon 306-791
U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems
U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)
IDS and Penetration Testing Lab ISA656 (Attacker)
IDS and Penetration Testing Lab ISA656 (Attacker) Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible
