Improving Systems Engineering through Operational Risk Management



Similar documents
A Taxonomy of Operational Risks

GAO MAJOR AUTOMATED INFORMATION SYSTEMS. Selected Defense Programs Need to Implement Key Acquisition Practices

How To Write A Cybersecurity Framework

EASPI EASPI. The Integrated CMMI-based Improvement Framework for Test and Evaluation. Jeffrey L. Dutton Principal Consultant

Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Cyber Security and Privacy - Program 183

Cybersecurity Awareness for Executives

The Comprehensive National Cybersecurity Initiative

A Report on The Capability Maturity Model

Middle Class Economics: Cybersecurity Updated August 7, 2015

Cybersecurity. Are you prepared?

Cloud Computing. Key Initiative Overview

Business resilience: The best defense is a good offense

Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.

Cisco Security Optimization Service

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

Developing CMMI in IT Projects with Considering other Development Models

Cloud Security Benchmark: Top 10 Cloud Service Providers Appendix A E January 5, 2015

Lessons from Defending Cyberspace

RETHINKING CYBER SECURITY

CONTINUITY OF OPERATIONS AUDIT PROGRAM EVALUATION AND AUDIT

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

NASA OFFICE OF INSPECTOR GENERAL

Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Framework, Version 1.0

SOLUTION BRIEF. Next Generation APT Defense for Healthcare

April 28, Ms. Hada Flowers Regulatory Secretariat Division General Services Administration 1800 F Street, NW, 2 nd Floor Washington, DC

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Application Security in the Software Development Lifecycle

SAS. Fraud Management. Overview. Real-time scoring of all transactions for fast, accurate fraud detection. Challenges PRODUCT BRIEF

Audit of NRC s Network Security Operations Center

Measuring Success Service Desk Evaluation Guide for the Midsized Business: How to Choose the Right Service Desk Solution and Improve Your ROI

Cybersecurity: Mission integration to protect your assets

The Advantages of ISO 9001 Certification

Cybersecurity in the States 2012: Priorities, Issues and Trends

Cyber Security Evolved

Security Services. A Solution for Providing BPM of Security Services within the Enterprise Environment.

Enterprise Security Tactical Plan

EMERGENCY PREPAREDNESS PLAN Business Continuity Plan

PRIORITIZING CYBERSECURITY

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

FFIEC Cybersecurity Assessment Tool

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Measuring Software Security

Cyber Security Risk Management: A New and Holistic Approach

How ERM programs evolve

S 2 ERC Project: A Review of Return on Investment for Cybersecurity. Author: Joe Stuntz, MBA EP 14, McDonough School of Business.

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Security Engineering Best Practices. Arca Systems, Inc Boone Blvd., Suite 750 Vienna, VA

Achieve Economic Synergies by Managing Your Human Capital In The Cloud

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

Overcoming Five Critical Cybersecurity Gaps

Board oversight of risk: Defining risk appetite in plain English

The Role of Business Capabilities in Strategic Planning. Sneaking up on Quality Using Business Architecture in a learning corporation

INFORMATION SECURITY STRATEGIC PLAN

Developing and Implementing a Strategy for Technology Deployment

Introduction to the CMMI Acquisition Module (CMMI-AM)

ICBA Summary of FFIEC Cybersecurity Assessment Tool

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

A Risk Assessment Methodology (RAM) for Physical Security

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

Advancing the U.S. Air Force Mission

Enterprise Risk Management in Colleges and Universities

Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center

NIST Cybersecurity Framework & A Tale of Two Criticalities

The 5 Cybersecurity Concerns You Can t Overlook

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

Advanced Risk Analysis for High-Performing Organizations

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

Threat Intelligence is Like Three Day Potty Training

Cybersecurity Capability Maturity Model

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION

Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm

THE CHALLENGES OF CYBERSECURITY TRAINING

Cybersecurity Management Programs

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

Integrating Continuity of Operations (COOP) into the Enterprise Architecture

ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE

ISO, CMMI and PMBOK Risk Management: a Comparative Analysis

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

Information Security Management System for Microsoft s Cloud Infrastructure

Transcription:

Improving Systems Engineering through Operational Risk Management Brian Gallagher SVP, Operational Excellence CACI, Inc. Dr. Ken Nidiffer Dir. of Strategic Plans for Government Programs Carnegie Mellon University Software Engineering Institute INFORMATION DEPLOYED. SOLUTIONS ADVANCED. MISSIONS ACCOMPLISHED.

Problem Statement Many programs fail to address the real operational need when fielding new capabilities resulting in a gap between business and mission needs and operational capabilities. Two major root causes Requirements failed to capture true mission and business needs The mission and business needs evolve during development and project team fails to evolve as quickly Gaps between need and capability increases operational risk. 2

Example: ECSS Air Force Expeditionary Combat Support System (ECSS) began development in 2004 Program had vague set of objectives Lack of clarity in operational need and what mission and business needs were being addressed Major disconnect between solving critical operational threats and risks versus solving strategic needs (cost reduction, affordability, consolidation, etc.) Result: $1.1B in wasted funding and a system that was not deployable The Air Force s Expeditionary Combat Support System, or ECSS., is a prime example of how a system designed to save money can actually waste billions of taxpayer dollars without producing any usable capability. Sen. John McCain 3

Example: Improvised Explosive Device (IED) Defeat During Operation Iraqi Freedom, IEDs posed a new and real threat Existing capabilities couldn t detect or defeat the threat The military urgently needed new capabilities fast Army created the Joint IED Defeat Organization (JIEDDO) with the sole purpose of defeating this new operational risk Ability to bypass traditional acquisition process Fielded less mature, but effective solutions Lives were saved Quickly fielded systems lacked certain quality attributes such as robustness, evolvability, and maintainability Tactical mission risks mitigated yet strategic business risks ignored: Total Cost of Ownership and Logistical Complexity Increased 4

Operational Risk to Balance the Need The purpose of any new system, component or capability development should be to mitigate operational risk During development, operational risk changes Systems engineering activities during the project lifecycle should evolve through operational risk considerations 5

Typical Risk Management Acquisition Risk Management During Acquisition Planning and Execution Focus is on programmatic risk Program and Engineering Risk Management During Development Identify and mitigate risks associated with cost and schedule Identify and mitigate technical risks associated with technical approach Concept of Operational Risk is Lacking 6

The More Effective Approach 7

Operational Risk-Driven Engineering Requirements/ Engineering Development (ORDERED) 8

ORDERED Steps 9

ORDERED Risk Taxonomy 10

Example: Cyber Security Operations Center* The purpose of the CSOC is to ensure that cybersecurity incidents do not impact agency operations. *Case study is fictitious and any resemblance to a real program or agency is not intended 11

Example: CSOC Identify Operational Risks Risks identified by operational users during a facilitated workshop using the ORDERED taxonomy Risk ID CSOC001 CSOC002 CSOC003 CSOC004 CSOC005 Risk Statement Incident occurance is unpredictable; may not have adequate resources to respond during crisis Heavy compliance and oversight make processes rigid; may not be able to adjust quickly to new events Current intrusion detection system is proprietary and vendor is not responsive when changes are needed; system may not detect newer threats, cost of support is high We hire new operators with little experience; Lower mission effectiveness 80% of operator time is spent responding to incidents; may not see trends or understand root cause of indidents 12

Example: CSOC Analyze Operational Risks Risks characterized by probability and impact and sorted into Top 5 Top "N" Risk ID Risk Statement Prob Imp Risk Exposure 1 CSOC004 We hire new operators with little experience; Lower mission effectiveness 4 4 16 2 CSOC003 Current intrusion detection system is proprietary and vendor is not responsive when changes are needed; system may not 4 4 16 detect newer threats, cost of support is high 3 CSOC005 80% of operator time is spent responding to incidents; may not see trends or understand root cause of indidents 4 2 8 4 CSOC001 Incident occurance is unpredictable; may not have adequate resources to respond during crisis 4 2 8 5 CSOC002 Heavy compliance and oversight make processes rigid; may not be able to adjust quickly to new events 2 3 6 13

Example: CSOC Identify Risk Attributes Most important risks further clarified by identifying the attribute and attribute concern. Risk Attribute: a characteristic of the operational mission or business which will be judged negatively by stakeholders unless the operational risk is mitigated Top "N" Risk ID Risk Statement Risk Attributes Attribute Concern 1 CSOC004 2 CSOC003 We hire new operators with little experience; Lower mission effectiveness Current intrusion detection system is proprietary and vendor is not responsive when changes are needed; system may not detect newer threats, cost of support is high 1. Operator: Training, Skill Level 2. Mission Execution: Effectiveness 1. Operational Systems: Flexibility 2. Mission Execution: Affordability Assimilation of new staff and planned growth in mission Mission expansion and attack sophistication 14

Example: CSOC Develop Risk Scenarios Scenarios are simply expressions of real-world interactions Used in engineering to express expectedbehavior of systems, components or capabilities Operational Risk Scenarios describe the unwantedbehavior of the system that would cause mission or business impact to the operational organization. 15

Example: CSOC Develop Risk Scenarios CSOC Risks and Risk Scenarios Top "N" Risk ID Risk Statement Risk Attributes Attribute Concern 1 CSOC004 We hire new operators with little experience; Lower mission effectiveness 1. Operator: Training, Skill Level 2. Mission Execution: Effectiveness Assimilation of new staff and planned growth in mission Operational Risk Scenarios 1. New operator joins organization and fails to be completely certified and capable within 2 weeks 2. OPs staff grows by 200% increasing number of teams performing the mission. New teams not fully capable of supporting operations within 1 month 2 CSOC003 Current intrusion detection system is proprietary and vendor is not responsive when changes are needed; system may not detect newer threats, cost of support is high 1. Operational Systems: Flexibility 2. Mission Execution: Affordability Mission expansion and attack sophistication Operational Risk Scenarios 1. New mission tasking requires additional intrusion detection across new agency locations. Current system fails to scale and vendor is unresponsive in making required system changes 2. A new hacker group uses alternative means to access closed system and uses technology not detected by current system. Complete redesign of detection system required to implement new detection algorithms. 16

Example: CSOC Prioritizing Risk Scenarios Mission or Business Criticality HIGH Serious mission or business impact MEDIUM Moderate mission or business impact LOW Low mission or business impact Plan Gap HIGH No accommodation based on current operations or engineering plan (requirements, design, implementation, testing, deployment) MEDIUM Some accommodation based on current operations or engineering plan (requirements, design, implementation, testing, deployment) LOW Accommodated in current operations or engineering plan (requirements, design, implementation, testing, deployment) 17

Example: CSOC Prioritized Risk Scenarios Based on inputs from operational staff Scenario Number Operational Risk Scenario Criticality Gap CSOC003-1 CSOC004-2 New mission tasking requires additional intrusion detection across new agency locations. Current system fails to scale and vendor is unresponsive in making required system changes OPs staff grows by 200% increasing number of teams performing the mission. New teams not fully capable of supporting operations within 1 month HIGH HIGH HIGH MEDIUM CSOC003-2 A new hacker group uses alternative means to access closed system and uses technology not detected by current system. Complete re-design of detection system required to implement new detection algorithms. MEDIUM HIGH CSOC004-1 New operator joins organization and fails to be completely certified and capable within 2 weeks MEDIUM MEDIUM 18

Influencing the Engineering Process Continuous operational risk identification and risk scenario evolution used to influence every aspect of the systems engineering process 19

Example: CSOC Influencing the Engineering Process Potential activities identified: CSOC003-1: Non-functional requirements of scalability, flexibility and evolvability were ignored. ECP issued to add additional architectural trade-studies with the goal of maximizing the non-functional requirements. CSOC004-2: Lack of a separate training environment identified. Change request initiated to add the requirement for an operationally relevant training environment. CSOC003-1: The architecture team had failed to consider structural and behavioral patterns that would help avoid the risk scenario. Team revised their approach and selected additional architectural patterns to increase the scalability, flexibility and evolvability of the solution. 20

Summary By using a structured approach to incorporate operational risk considerations into the engineering process, evolving mission and business risks are considered and mitigated increasing the likelihood of fielding an operationally effective system, component or capability 21

Next Steps Use of ORDERED process and/or concepts of operational risk management on critical programs Evaluation of results Evolution of the ORDERED process based on use and learning 22

Interested in Advancing Research in Applying Operational Risk Concepts to Systems Engineering? Looking for individuals, programsor organizationsinterested in applying the ORDERED process and sharing results Characteristics of Individuals: Interested in exploring operational risk management concepts Characteristics of Programs: Software-intensive or complex service delivery Operational uncertainty during development Characteristics of Organizations: Operational organizations looking for structure operational risk identification process to influence system development Contact: Brian Gallagher brian.gallagher@colostate.edu 23

Questions? 24

Selected References Aronin, B.S., et al., Expeditionary Combat Support System: Root Cause Analysis. 2011, DTIC Document. Carney, David J., and David Biber. The Adventures of Ricky & Stick: Fables in Software Acquisition. Carnegie Mellon University, Software Engineering Institute, 2006 Carr, M.J., et al., Taxonomy-based risk identification. 1993, DTIC Document. Ellis, R.F., R.D. Rogers, and B.M. Cochran, Joint Improvised Explosive Device Defeat Organization (JIEDDO): Tactical Successes Mired in Organizational Chaos; Roadblock in the Counter-IED Fight. 2007, DTIC Document. Gallagher, B.P., et al., A Taxonomy of Operational Risks. 2005. Gallagher, B.P., Interpreting Capability Maturity Model Integration (CMMI) for Operational Organizations. 2002. Gallagher, B., et al., CMMI for Acquisition: Guidelines for Improving the Acquisition of Products and Services. 2011: Addison- Wesley Professional. McCain, J. FLOOR REMARKS BY SENATOR JOHN MCCAIN ON THE AIR FORCE S ECSS PROGRAM. 2014 [cited 2015 2 August, 2015]; Available from: http://www.mccain.senate.gov/public/index.cfm/2014/7/floor-remarks-by-senator-john-mccain-onthe-air-force-s-ecss-program. 25