Adding a Security Assurance Dimension to Supply Chain Practices



Similar documents
Supply Chain Risk Management. Operating ahead of the threat, not behind the vulnerabilities

Piloting Supply Chain Risk Management Practices for Federal Information Systems

Department of Defense INSTRUCTION

Software Assurance in Acquisition and Contract Language

Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes

Implementing Program Protection and Cybersecurity

How To Protect Your Data From Being Hacked

Combating Cyber Risk in the Supply Chain

NICE and Framework Overview

Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals

System Security Engineering and Program Protection Integration into SE

Supply Chain Risk Management and the Software Supply Chain. Karen Mercedes Goertzel, CISSP Lead Associate Booz Allen Hamilton OWASP AppSec DC 2010

Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework

Cybersecurity Throughout DoD Acquisition

April 28, Ms. Hada Flowers Regulatory Secretariat Division General Services Administration 1800 F Street, NW, 2 nd Floor Washington, DC

Obtaining Enterprise Cybersituational

Missile Defense Agency Small Business Conference Supply Chain Risk Management (SCRM) Information Briefing

ICT Supply Chain Risk Management

System Security Engineering

DoD Software Assurance (SwA) Overview

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

September 24, Mr. Hogan and Ms. Newton:

National Initiative for Cyber Security Education

SAFECode Security Development Lifecycle (SDL)

System Security Engineering and Comprehensive Program Protection

Capabilities for Cybersecurity Resilience

Cyber-Security. FAS Annual Conference September 12, 2014

I N T E L L I G E N C E A S S E S S M E N T

Managing Risk in Global ICT Supply Chains

Cyber Supply Chain Risk Management Portal

Reducing risks in the Software Acquisition Life Cycle

The Software Supply Chain Integrity Framework. Defining Risks and Responsibilities for Securing Software in the Global Supply Chain.

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT

Critical Controls for Cyber Security.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW. Version 1, Release July 2015

Risk Management Framework (RMF): The Future of DoD Cyber Security is Here

Supply Chain Attack Patterns: Framework and Catalog

DoD Software Assurance Initiative. Mitchell Komaroff, OASD (NII)/DCIO

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS

Introduction to NICE Cybersecurity Workforce Framework

Security Touchpoints When Acquiring Software. Dr Carsten Huth Nadim Barsoum Dawid Sroka

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

Towards a standard approach to supply chain integrity. Claire Vishik September 2013

GAO. IT SUPPLY CHAIN Additional Efforts Needed by National Security- Related Agencies to Address Risks

Notional Supply Chain Risk Management Practices for Federal Information Systems

PCI DSS Overview and Solutions. Anwar McEntee

An Overview of Large US Military Cybersecurity Organizations

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT

GAO IT SUPPLY CHAIN. National Security- Related Agencies Need to Better Address Risks. Report to Congressional Requesters

Software Assurance: Enabling Enterprise Resilience through Security Automation and Software Supply Chain Risk Management

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C October 30, 2015

Piloting Supply Chain Risk Management Practices for Federal Information Systems

The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.

FREQUENTLY ASKED QUESTIONS

The Comprehensive National Cybersecurity Initiative

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

Cybersecurity Awareness for Executives

Supply Chain Risk Management: Background Information Version March 2014

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

How To Write A Cybersecurity Framework

Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

POLICY ON WIRELESS SYSTEMS

White Paper on Financial Institution Vendor Management

GAO Information Security Issues

Third Party Security Requirements Policy

Logging In: Auditing Cybersecurity in an Unsecure World

IT AUDIT WHO WE ARE. Current Trends and Top Risks of /9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski

Understanding changes to the Trust Services Principles for SOC 2 reporting

Policy on Information Assurance Risk Management for National Security Systems

AS9100 B to C Revision

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Information Security Awareness Training

KLC Consulting, Inc. All Rights Reserved. 1 THIRD PARTY (VENDOR) SECURITY RISK MANAGEMENT

Vulnerability Analysis Techniques to Support Trusted Systems and Networks (TSN) Analysis

NICE Cybersecurity Workforce Framework Tutorial

Developing Secure Software in the Age of Advanced Persistent Threats

National Security & Homeland Security Councils Review of National Cyber Security Policy. Submission of the Business Software Alliance March 19, 2009

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Committee on Energy and Commerce

Transcription:

Adding a Security Assurance Dimension to Supply Chain Practices John Whited, CISSP, CSSLP Randall Brooks, CISSP, CSSLP Raytheon Company Session ID: GRC-401 Session Classification: Intermediate

Agenda What is the Supply Chain Problem? Legacy Supply Chain Practices Acquisition Subcontract management Best Practices Industry Government Academia An Approach for Cyber Supply Chain Assurance Key Takeaways Q&A

What is the Supply Chain Problem? Key Takeaways Vulnerabilities exist within one s supply chain A system's risk has many factors Systems and Software Assurance (SSwA) evaluation of both supplier and product may be required SSwA should be in all 3rd party contracts Observe the next level supplier principle

What is the Supply Chain Problem? From the Headlines Most counterfeit parts are intentionally put into the supply chain to make a profit However Malicious actors also embed malware The Navy Bought Fake Chinese Microchips That Could Have Disarmed U.S. Missiles Excerpts Last year, the U.S. Navy bought 59,000 microchips were counterfeits Could have rendered missiles useless Derived from Software Assurance in Acquisition: Mitigating Risks to the Enterprise, Software Assurance Acquisition Group. Retrieved on August 19, 2011, from https://buildsecurityin.uscert.gov/bsi/dhs/908 BSI.html http://articles.businessinsider.com/2011-06-27/news/30048253_1_microchips-missiles-foreign-chip-makers

What is the Supply Chain Problem? From the Headlines Most counterfeit parts are intentionally put into the supply chain to make a profit However Malicious actors also embed malware The Navy Bought Fake Chinese Microchips That Could Have Disarmed U.S. Missiles Excerpts Last year, the U.S. Navy bought 59,000 microchips were counterfeits Could have rendered missiles useless Derived from Software Assurance in Acquisition: Mitigating Risks to the Enterprise, Software Assurance Acquisition Group. Retrieved on August 19, 2011, from https://buildsecurityin.uscert.gov/bsi/dhs/908 BSI.html http://articles.businessinsider.com/2011-06-27/news/30048253_1_microchips-missiles-foreign-chip-makers

What is the Supply Chain Problem? US Govt. recognition: Comprehensive National Cybersecurity Initiative (CNCI) CNCI White House initiatives to help secure the United States in cyberspace Initiative 11 An approach for global cyber supply chain risk management Focused on a robust toolset to better manage and mitigate supply chain risk

What is the Supply Chain Problem? US Govt. recognition: Ike Skelton 2011 National Defense Authorization Act (NDAA) NDAA Section 806: Requirements for Information Relating to Supply Chain Risk: The exclusion of a source that fails to meet qualification standards exclusion of a source that fails to meet qualification established in accordance with the requirements of section 2319 of standards for the purpose of reducing supply title 10, United States Code, for the purpose of reducing supply chain risk in the acquisition of covered systems chain risk in the acquisition of covered systems*. The exclusion of a source that fails to achieve an acceptable rating exclusion of a source that fails to achieve an with regard to an evaluation factor providing for the consideration of acceptable rating for the consideration of supply supply chain risk in the evaluation of proposals for the award of a chain risk in the evaluation of proposals contract or the issuance of a task or delivery order. The decision to withhold consent for a contractor to subcontract with a particular withhold source consent or for to a direct contractor a contractor to subcontract for a covered system* with to exclude a particular a particular source source or to direct from a consideration contractor for a subcontract under the contract. * COVERED SYSTEM The term covered system means a national security system, as that term is defined in section 3542(b) of title 44, United States Code.

What is the Supply Chain Problem? US Govt. recognition: Ike Skelton 2011 National Defense Authorization Act (NDAA) Other Gotcha s Supplier can be banned without notification Without ability to appeal decision Other DoD agencies will be notified!

Legacy Supply Chain Practices Acquisition Common Acquisition Questions about Vendors: Preferred vendor list? Banned vendor list? Foreign country? Financially stable? Prior experience? On-time delivery? High quality?

Legacy Supply Chain Practices Subcontract Management Common Contract Points: Description and quantity of product to be delivered Delivery schedule Payment schedule, including possible penalty for late delivery Quality requirements All Well and Good But What s Missing? Product security requirements Anti-counterfeit measures Software assurance Measurable or demonstratable evidence of vendor compliance

Best Practices (Industry) Managing Risks Through Contracts A contract can only cover two levels removed: The supplying entity That supplier s next level of supply chain One must require that their suppliers ensure that each supplier s next level of supply following sound Cyber Supply Chain practices.

Best Practices (Government) Systems and Software Assurance System Assurance (SA) provides the justified confidence that the system functions as intended and is free of exploitable vulnerabilities, either intentionally or unintentionally designed or inserted as part of the system at any time during the life cycle. Source: National Defense Industrial Association Guidebook (Oct 2008) Source: http://www.safecode.org/ Software assurance is the level of confidence that software is free from vulnerabilities, either intentionally designed into the software or accidentally inserted at anytime during its life cycle, and the software functions in the intended manner Source: CNSS Instruction No. 4009, National IA Glossary

Best Practices (Government) SwA Addresses Conformance Planned and systematic set of multi disciplinary activities that ensure software processes and products conform to requirements, standards / procedures Justifiable confidence that software, when executed, functions as intended Predictable Execution Trustworthiness No exploitable vulnerabilities exist, either maliciously or unintentionally inserted DHS Software Assurance Forum Build Security In https://buildsecurityin.us-cert.gov

Best Practices (Government) NISTIR 7622 Piloting Supply Chain Risk Management for Federal Information Systems Supply Chain Risk Management promotes integrity, security, and reliability in hardware and software code development. Source: http://csrc.nist.gov/publications/drafts/nistir-7622/draft-nistir-7622.pdf

Best Practices (Government) Controls and Guidance NIST 800-53 NIST 800-37 NIST 800-30 NIST 800-39 NIST 800-27 NIST 800-64

An Approach for Cyber Supply Chain Assurance Top-Level SCRM Process Flow Planning Supplier or Source Contracting Supplier Risk Levels Minimal Risk 0 15 Low Risk 16 25 Moderate Risk 25 50 Marginal Risk 51 75 High Risk 76 100 Product - A Version 2 Supply Chain Artifacts Monitoring & Acceptance Sustainment Ensuring Software Assurance Process Maturity http://www.crosstalkonline.org/storage/issuearchives/2011/201103/201103-wotring.pdf (Software Assurance Checklist) Software Supply Chain Risk Management & Due-Diligence: Software Assurance Pocket Guide Series: Acquisition & Outsourcing, Volume II (Questionnaires) Disposal Software Assurance in Acquisition: Mitigating Risks to the Enterprise https://buildsecurityin.us-cert.gov/swa/downloads/swa_in_acquisition_102208.pdf

An Approach for Cyber Supply Chain Assurance Recommendations Common to Both Software and Hardware Supplier business assessment Supplier secure development assessment Supplier or source Product model / version Acquirer business risk End customer mission criticality and mission assurance Subcontract management Supplier management practices for their suppliers

An Approach for Cyber Supply Chain Assurance Recommendations Specific to Hardware Quality vs. counterfeiting vs. malicious alteration ASICS, FPGAs, and microprocessors Information storage in volatile memory and permanent storage Nano tagging

An Approach for Cyber Supply Chain Assurance Recommendations Specific to Software Recognize applicable steps to type of software COTS: Source code scans not generally possible Contracted software: Require 3rd party to escrow source Open source and freeware, a.k.a. Free &Open Source (FOSS): Cannot impose contractual terms Watch for EULA and copyright issues (license management) Common concern for all types of software supply Software pedigree: where did it come from? What do I know about the original source of supply? How can I authenticate the original software source of supply? Software provenance: where has it been? How do I know what I m getting is what the original source produced?

Apply Slide How to Apply What You Have Learned Today? Over the next month one should: Read SwA Pocket Guides Review your existing corporate supply chain practices Review your existing subcontract language Watch for SSwA assessment within those processes Within three months you should: Develop a plan to close identified gaps Within six months you should: Implement the plan Pilot application of the plan to a candidate acquisition 20

What is the Supply Chain Problem? Key Takeaways Vulnerabilities exist within one s supply chain A system's risk has many factors Systems and Software Assurance (SSwA) evaluation of both supplier and product may be required SSwA should be in all 3rd party contracts Observe the next level supplier principle

Questions and Answers John Whited john.whited@raytheon.com Randall Brooks brooks@raytheon.com http://rtncyberjobs.com TDSP-11-0113