Federal Communications Commission



Similar documents
How To Protect The Internet From Natural Disasters

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Computer System Security Updates

Eight Ingredients of Communications Infrastructure: A Systematic and Comprehensive Framework for Enhancing Network Reliability and Security

FCC HOMELAND SECURITY LIAISON ACTIVITIES

National Cybersecurity & Communications Integration Center (NCCIC)

Evolving Optical Transport Network Security


Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

HACKING RELOADED. Hacken IS simple! Christian H. Gresser

Homeland Security Perspectives: Cyber Security Partnerships and Measurement Activities

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Defending Against Data Beaches: Internal Controls for Cybersecurity

Subject: Critical Infrastructure Identification, Prioritization, and Protection

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Recommended IP Telephony Architecture

External Supplier Control Requirements

National Communications System. December 6, 2007

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, February 12, 2013

Cybersecurity Strategic Talent Management. March, 2012

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

External Supplier Control Requirements

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Quelle sécurité dans une banque? " Sécurité des transactions électroniques sur Internet et KYC"

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

INFORMATION TECHNOLOGY SECURITY STANDARDS

SCADA/Business Network Separation: Securing an Integrated SCADA System

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

(Instructor-led; 3 Days)

NETWORK SECURITY ASPECTS & VULNERABILITIES

How To Ensure The C.E.A.S.A

Business Continuity White Paper

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

ICANWK406A Install, configure and test network security

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

Network Security Administrator

Simplify Your Network Security with All-In-One Unified Threat Management

El Camino College Homeland Security Spring 2016 Courses

Security Policy JUNE 1, SalesNOW. Security Policy v v

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Introduction to Cyber Security / Information Security

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Securing VoIP Networks using graded Protection Levels

Office of Inspector General

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

DEPARTMENT OF HOMELAND SECURITY

BlackRidge Technology Transport Access Control: Overview

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

SCADA SYSTEMS AND SECURITY WHITEPAPER

Fundamentals of Network Security - Theory and Practice-

Information Technology Career Cluster Advanced Cybersecurity Course Number:

Jort Kollerie SonicWALL

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Guideline on Auditing and Log Management

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Cisco Advanced Services for Network Security

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

Remote Access Security

How Much Cyber Security is Enough?

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

Chapter 7 Information System Security and Control

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

ISO Controls and Objectives

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Domain 1 The Process of Auditing Information Systems

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Loophole+ with Ethical Hacking and Penetration Testing

Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies

Qualification Specification. Level 4 Certificate in Cyber Security and Intrusion For Business

Bellevue University Cybersecurity Programs & Courses

Security Whitepaper: ivvy Products

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Innovative Defense Strategies for Securing SCADA & Control Systems

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

CMPT 471 Networking II

Update On Smart Grid Cyber Security

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

TUSKEGEE CYBER SECURITY PATH FORWARD

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Section 12 MUST BE COMPLETED BY: 4/22

Transcription:

Homeland Security Policy Council Federal Communications Commission Amal Abdallah Senior Attorney International Bureau Federal Communications Commission 1

Homeland Security Sectors Agriculture Banking and Finance Chemical Industry Defense Industrial Base Emergency Services Energy Food Government Information and Postal and Shipping Telecommunications Transportation Public Health Water All other sectors rely on the Information and Telecommunications sector 2

FCC s s Homeland Security Mission Evaluate and strengthen measures for protecting the Nation s s communications infrastructure. Facilitate rapid restoration of that infrastructure in the event of disruption. Develop policies that promote access to effective communications services by public safety, public health, and other emergency personnel in emergency situations. 3

FCC s s Homeland Security Focus Interagency and Industry Partnerships Infrastructure Protection Communications Reliability Public Safety Communications Spectrum Policy New Technologies 4

FCC s s Homeland Security Partnerships Executive Office of the President Sister Agencies State and Local Governments Federal Advisory Committees Industry and Trade Organizations 5

Interagency Efforts: View from the FCC Executive Office of the President Information Analysis and Infrastructure Protection Science and Technology CIAO NIPC NIAC FedCIRC NCS COP / COR NCC National Security Telecommunications Advisory Council National Security Council CNSS Office of Homeland Security Office of Science and Technology Policy JTRB National Security Agency Department of Justice FBI Department of Homeland Security Bureau of Citizenship and Immigration Services Secret Service Border and Transportation Security Chief Information Officer Customs & Border Protection Immigration & Customs Enforcement FCC SIOC Department of Commerce NTIA Department of Defense OASD/C 3 I Coast Guard Emergency Preparedness and Response FEMA COOP IAG ESF#2 CDRG Department of Transportation FAA 6

FCC Partnership with NCS/NCC The National Communications System (NCS) continues to be our strongest partner in our efforts to coordinate industry response to a network outage or attack. FCC is assisting NCS in promoting its efforts to improve emergency communications through the Telecommunications Service Priority (TSP), Government Emergency Telecommunications System (GETS) and Wireless Priority Access (WPAS) programs. 7

Infrastructure Protection FCC rechartered our Network Reliability and Interoperability Council (NRIC VI) federal advisory committee in January 2002 to focus on homeland security issues. (www.nric.org) FCC created a new Media Security and Reliability Council (MSRC) federal advisory committee in March 2002 to address broadcast, cable and satellite homeland security issues. (www.mediasecurity.org) 8

Network Reliability and Interoperability Council First chartered in 1993. NRIC has a 10-year history of improving network reliability. Expanded membership in 2001 charter. December 2002 - Delivered best practices for securing the physical and cyber networks. March 2002 - Delivered best practices for service restoration and disaster recovery. 9

NRIC VI Charter Establish industry Best Practices to address external threats to communications infrastructure. Build on the reliability and interoperability work of previous NRICs by expanding membership to include more industry segments. 10

Principles for Developing Best Practices 1. People Implement Best Practices" 2. Do not endorse commercial or specific "pay for" documents, products or services 3. Address classes of problems 4. Already implemented 5. Developed by industry consensus 6. Best Practices are verified by a broader set of industry members 7. Sufficient rigor and deliberation 11

Principles for Implementing and Maintaining Best Practices (See( See, www.nric nric.org) Current list of best practices (BPs( BPs) ) are constrained by what can be implemented Not all BPs are appropriate for all service providers or architectural implementations The BPs are not intended for mandatory regulatory efforts This is a moving target that will require continual refinement, additions and improvement 12

NRIC VI Focus Group Structure Focus Group 1 Homeland Security A. Physical Security B. Cyber Security C. Public Safety D. Disaster Recovery and Mutual Aid Focus Group 2 Network Reliability Focus Group 3 Network Interoperability Focus Group 4 Broadband 13

NRIC VI Physical Security Focus Group

Big Picture of Process Flow OVERSIGHT Council Charter Coordination NRIC FGs Stakeholders INPUTS Assemble Vulnerabilities Assemble Threats Assemble BPs Vulnerabilities Threats Existing BPs Steering Committee Focus Group 1A SMEs $ Recommendations P & R Reports Survey C o u n c i l FCC & OUTPUTS Industry Council Broader Industry 15

The Need for Physical Security Best Practices Communications Infrastructure is HIGH Level of Impact Vast Very Complex LOW Vital Spectrum of Threats to National Security & Emergency Preparedness Nuclear War Strategic Cyber War Conventional War Theater Cyber War Mobilization Special Operations Terrorism (includes Cyber) Civil Disorder Floods Probability of Occurrence EarthquakesHurricanes Power Tornados Cable Cut Outage NCS HIGH High Level of Security Low Market Place Demand Low Security Gap Need for Incentives Government Support Cost of Security Terrorist Threats Exist Target Train plan patient persistent National Security Need High 16

Environment Environment includes buildings, trenches where cables are buried, space where satellites orbit, the ocean where submarine cables reside FINANCIAL TRANSPORTATION PUBLIC HEALTH C OMMUNICATIONS INFRASTRUCTURE Power Software Payload Human Environment Hardware Networks Policy Other Infrastructures LAW ENFORCEMENT ENERGY Areas for Attention 1. Need for Periodic Re-Assessment 2. Any Environment Can Be Destroyed 3. Unique Circumstances Require Special Consideration 4. Overall Security Plan Example Best Practice (6-P-5190) Access to critical areas within Telecom Hotels where Service Providers and Network Operators share common space should be restricted to personnel with a jointly agreed upon need for access. 17

Power Power includes the internal power infrastructure, batteries, grounding, high voltage and other cabling, fuses, back-up emergency generators and fuel FINANCIAL TRANSPORTATION PUBLIC HEALTH COMMUNICATIONS II NFRASTRUCTURE Power Software Payload Human Environment Hardware Networks Policy Other Infrastructures LAW ENFORCEMENT ENERGY Areas for Attention 1. Internal Power Infrastructure Is Often Overlooked 2. Rules Permitting Access to Internal Power Systems Increase Risk Priorities for Good Power Systems Management Compete with Environmental Concerns 3. Power System Competencies Needs to Be Maintained Example Best Practice (6-P-5207): Service Providers and Network Operators should take appropriate precautions at critical installations to ensure that fuel supplies and alternate sources are available in the event of major disruptions in a geographic area (e.g., hurricane, earthquake, pipeline disruption). 18

Hardware Hardware includes the hardware frames, electronics circuit packs and cards, metallic and fiber optic transmission cables and semiconductor chips FINANCIAL TRANSPORTATION PUBLIC HEALTH C OMMUNICATIONS INFRASTRUCTURE Power Software Payload Human Environment Hardware Networks Policy Other Infrastructures LAW ENFORCEMENT ENERGY Areas for Attention 1. Nuclear Attack 2. Hardness to Radiation 3. Solar Flares and Coronal Mass Ejection Example Best Practice (6-P-5118) Equipment Suppliers of critical network elements should test electronic hardware to ensure its compliance with appropriate electromagnetic energy tolerance criteria for electromagnetic energy, shock, vibration, voltage spikes, and temperature. 19

Software Software includes the physical storage of software releases, development and test loads, version control and management, chain of control delivery FINANCIAL TRANSPORTATION PUBLIC HEALTH C OMMUNICATIONS INFRASTRUCTURE Power Software Payload Human Environment Hardware Networks Policy Other Infrastructures LAW ENFORCEMENT ENERGY Areas for Attention 1. Physical Security of Software (*Cyber Security) Example Best Practice (6-P-5167) Equipment Suppliers should provide secured methods, both physical and electronic, for the internal distribution of software development and production materials. 20

Networks Networks includes the configuration of nodes, various types of networks, technology, synchronization, redundancy, and physical and logical diversity FINANCIAL TRANSPORTATION PUBLIC HEALTH C OMMUNICATIONS INFRASTRUCTURE Power Software Payload Human Environment Hardware Networks Policy Other Infrastructures LAW ENFORCEMENT ENERGY Areas for Attention 1. Network Redundancy and Diversity 2. Existing NRIC Best Practices Effectively Address Networks Vulnerabilities Example Best Practice (6-P-5107) Service Providers and Network Operators should develop a comprehensive plan to evaluate and manage risks (e.g., alternate routing, rapid response to emergencies) associated with the concentration of infrastructure components. 21

Payload Payload includes the information transported across the infrastructure, traffic patterns and statistics, information interception and information corruption FINANCIAL TRANSPORTATION PUBLIC HEALTH C OMMUNICATIONS INFRASTRUCTURE Power Software Payload Human Environment Hardware Networks Policy Other Infrastructures LAW ENFORCEMENT ENERGY Areas for Attention 1. Physical Aspects of Securing Network Payload (*Cyber Security) Example Best Practice (6-P-5173) Network Operators and Equipment Suppliers should design wireless networks (e.g., terrestrial microwave, free-space optical, satellite, point-to-point, multi-point, mesh) to minimize the potential for interception. 22

Policy Policy includes the industry standards, industry cooperation, industry interfaces with governments (local, state, federal), and various legal issues FINANCIAL TRANSPORTATION PUBLIC HEALTH C OMMUNICATIONS INFRASTRUCTURE Power Software Payload Human Environment Hardware Networks Policy Other Infrastructures LAW ENFORCEMENT ENERGY Areas for Attention 1. Inadvertent Negative Impact of Government Regulations 2. FCC Effects on Vulnerabilities and Best Practices Example Best Practice (6-P-5157) Appropriate corporate personnel (within Service Providers, Network Operators, Equipment Suppliers and the Government organizations) should implement a process for reviewing government, state, local filings and judicial proceeding for impact on revealing vulnerabilities of critical infrastructure. 23

Human Human includes intentional and unintentional behaviors, limitations, and education and training, human-machine interfaces, and ethics FINANCIAL TRANSPORTATION PUBLIC HEALTH C OMMUNICATIONS INFRASTRUCTURE Power Software Payload Human Environment Hardware Networks Policy Other Infrastructures LAW ENFORCEMENT ENERGY Areas for Attention 1. Complex Interactions Example Best Practice (6-P-5176) Service Providers, Network Operators and Equipment Suppliers should consider establishing an employee awareness training program to ensure that employees who create, receive or transfer proprietary information are aware of their responsibilities for compliance with proprietary information protection policy and procedures. 24

NRIC VI Cybersecurity Focus Group

Charter of Cybersecurity Focus Group Generate Best Practices for cybersecurity (see, http://www.nric nric.org/.org/fg/nricvifg.html) Telecommunications sector Internet services Deliverables December 2002 prevention March 2003 recovery New team, limited baseline material 26

Security is Very Complex PKI Manager Certificate Authority Interface Virus Interception & Correction VPN Session or Tunnel Manager VPN IPSec and VPN Connection Manager Intrusion Detection Stateful Inspection Centralized Security Policy Manager Digital Signature Interface Security Policy Distributor Connection Manager and Logging Security Traffic Event Analyzer Security Event Logging Packet Inspection Token Card Manager OS Security Management Tools Cyberwall/Firewall Rule Base Application Proxy Implementations Application Logging Facility Security Integrity Manager Frame Inspection Other Security Entity Manager Single Sign-on Tools Security Event Report Writer(s) Encryption Facilities for Network Connections Intrusion Logging Intrusion Prevention Application Inspection Network Host-based Application-based Authentication Cryptography Anti-Virus Intrusion Detection Auditing Security Management Security is currently where networking was 15 years ago Many parts & pieces Complex parts Lack of expertise in the industry (60% vacancy with no qualified personnel) Lack of standards Attacks are growing Customers require security from providers Security Filter Engine Network Access Control Interception and Enforcement Facility Real-time Frame Management 27

As Systems Get Complex, Attackers are Less Sophisticated HIGH CROSS SITE SCRIPTING INTRUDER KNOWLEDGE STEALTH /ADVANCED SCANNING TECHNIQUES PACKET SPOOFING SNIFFERS DENIAL OF SERVICE WWW ATTACKS STAGED ATTACK DISTRIBUTED ATTACK TOOLS BACK DOORS SWEEPERS GUI NETWORK MANAGEMENT DIAGNOSIS AUTOMATED PROBES/SCANS DISABLING AUDITS ATTACK SOPHISTICATION HIJACKING SESSIONS BURGLARIES LOW EXPLOITING KNOWN VULNERABILITIES PASSWORD CRACKING SELF-REPLICATING CODE PASSWORD GUESSING 1980 1985 1990 1995 2000 28

Security Must Make Business Sense to Be Adopted OPTIMAL LEVEL OF SECURITY AT MINIMUM COST COST ($) TOTAL COST COST OF SECURITY COUNTERMEASURES COST OF SECURITY BREACHES 0% SECURITY LEVEL 100% 29

Driving Principles in Cyber Security Best Practices Capability Minimization Allow only what is needed re: services, ports, addresses, users, etc. Disallow everything else Partitioning and Isolation Defense in Depth KISS Aka belt & suspenders Application, host and network defenses Complexity makes security harder General IT Hygiene Backups, change control, privacy, architectures, processes, etc. Avoid Security by Obscurity A proven BAD IDEA 30

Highlights of General Issues Current infrastructures built on total trust model, which makes security very complex and difficult Need investment and R&D to secure infrastructures Potential NRIC work items on infrastructure long-term planning for security inclusion in future architecture Convergence of network types will lead to weakened security of traditionally difficult to access networks (e.g. analog voice converges to VoIP on a data network; CDMA cellular converges to 3G on shared IP infrastructure) Corporate investment in security needs to be continued priority and reality 31

Conclusion The FCC is just one component of a complex network of public and private partnerships dedicated to improving the security and reliability of the Nation s telecommunications infrastructure. 32

Contacting The FCC Amal.Abdallah@fcc.gov at the FCC, International Bureau, Strategic Analysis and Negotiations Division. www.fcc.gov Thank you! 33