A Guide to Successfully Implementing the NIST Cybersecurity Framework. Jerry Beasley CISM and TraceSecurity Information Security Analyst



Similar documents
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014

Cybersecurity Framework: Current Status and Next Steps

PROTIVITI FLASH REPORT

How To Write A Cybersecurity Framework

Click to edit Master title style

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

Framework for Improving Critical Infrastructure Cybersecurity

Certified Information Security Manager (CISM)

FFIEC Cybersecurity Assessment Tool

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013.

Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order Improving Critical Infrastructure Cybersecurity

Cybersecurity Awareness for Executives

ICBA Summary of FFIEC Cybersecurity Assessment Tool

Why you should adopt the NIST Cybersecurity Framework

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

Ed McMurray, CISA, CISSP, CTGA CoNetrix

NIST Cybersecurity Framework What It Means for Energy Companies

Framework for Improving Critical Infrastructure Cybersecurity

Which cybersecurity standard is most relevant for a water utility?

Framework for Improving Critical Infrastructure Cybersecurity

The NIST Cybersecurity Framework

Enterprise Security Tactical Plan

ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE

Vendor Risk Management Financial Organizations

Applying Framework to Mobile & BYOD

NIST Cybersecurity Framework & A Tale of Two Criticalities

Applying IBM Security solutions to the NIST Cybersecurity Framework

NIST Cybersecurity Framework Sean Sweeney, Information Security Officer 5/20/2015

Continuous Network Monitoring

Framework for Improving Critical Infrastructure Cybersecurity

Business Continuity for Cyber Threat

NIST Cybersecurity Framework. ARC World Industry Forum 2014

Data Breach Response Planning: Laying the Right Foundation

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope

Address C-level Cybersecurity issues to enable and secure Digital transformation

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

Cybersecurity Strategic Consulting

Preemptive security solutions for healthcare

Cybersecurity for Medical Devices

Information Technology

The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session

Risk Management Guide for Information Technology Systems. NIST SP Overview

Understanding the NIST Cybersecurity Framework September 30, 2014

No. 33 February 19, The President

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Information Security for Managers

Governance, Risk, and Compliance (GRC) White Paper

Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework

istockphoto/ljupco 36 June 2015 practicallaw.com 2015 Thomson Reuters. All rights reserved.

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper

Designing Compliant and Sustainable Security Programs 1 Introduction

Report: An Analysis of US Government Proposed Cyber Incentives. Author: Joe Stuntz, MBA EP 14, McDonough School of Business

Why you should adopt the NIST Cybersecurity Framework

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, February 12, 2013

Regulatory Compliance Management for Energy and Utilities

Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

Westlaw Journal. What is the Cybersecurity Framework? Risk Management Process And Pathway to Corporate Liability? Expert Analysis

Intel Security Professional Services Leveraging NIST Cybersecurity Framework (CSF): Complexity is the enemy of security

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

CYBER SECURITY GUIDANCE

Cybersecurity The role of Internal Audit

NICE and Framework Overview

Intelligence Driven Security

5 TIPS FOR MAXIMIZING THE VALUE OF YOUR SECURITY ASSESSMENT

ASSESSING VENDORS USING THE NIST CYBERSECURITY FRAMEWORK

Modalities for Cyber Security and Privacy Resilience: The NIST Approach

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

Framework for Improving Critical Infrastructure Cybersecurity

Security Management. Keeping the IT Security Administrator Busy

Big Data, Big Risk, Big Rewards. Hussein Syed

Securing the Microsoft Cloud

Total Protection for Compliance: Unified IT Policy Auditing

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years

National Institute of Standards and Technology Smart Grid Cybersecurity

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

ICS-CERT Year in Review. Industrial Control Systems Cyber Emergency Response Team. National Cybersecurity and Communications Integration Center

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

Re: Request for Comments on the Preliminary Cybersecurity Framework

IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE

How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP )

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

Transcription:

TRACESECURITY WHITE PAPER GRC Simplified... Finally. A Guide to Successfully Implementing the NIST Cybersecurity Framework Jerry Beasley CISM and TraceSecurity Information Security Analyst

TRACESECURITY WHITE PAPER: A Guide to Successfully Implementing the NIST Cybersecurity Framework PAGE 2 Executive Summary By the nature of their work, information security analysts see the inherent weaknesses and growing threats to information systems as they are engaged to test the security controls of organizations via penetration tests, physical security exercises, and in-depth vulnerability assessments. The rest of the world need only read the headlines to learn of major cybersecurity breaches affecting millions of individuals across the U.S. and internationally. This recognition of very real threats was the progenitor of actions by the U.S. Federal Government to establish a common framework to manage and implement cybersecurity defense. To address the growing threat, on February 12, 2013, the President of the United States issued Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity. The purpose of the EO was to enhance the security and resilience of the Nation s critical infrastructure and to maintain a cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties. The order provided a mandate to establish a voluntary common framework for cybersecurity defense. In response to this mandate, the National Institute of Standards and Technology (NIST) was tasked with development of the Framework for Improving Critical Infrastructure Cybersecurity. This is more commonly known as the Cybersecurity Framework (CF). The CF consists of standards, guidelines, and practices to promote the protection of critical infrastructure. Much of the CF is derived from NIST Special Publication 800-53, Security and Privacy Controls for Federal Information Systems and Organizations, but the CF also encompasses many other guidelines and frameworks. This white paper provides background information on the CF guidance and explains how organizations should use the framework to better manage and reduce cybersecurity risk. Identifying the Need for Cybersecurity Guidance Despite increasing defensive efforts, the number of successful cyber attacks continues to rise. According to a 2015 Symantec report, the number of sensitive data breaches increased by 23 percent in 2014. Malicious attackers were responsible for the majority of these breaches, which were not limited to high profile companies and organizations. According to Symantec, 60 percent of all targeted attacks struck small- and medium-sized organizations. The 2013 EO directed at improving cybersecurity defense was defined as being applicable to critical infrastructure. But what does critical infrastructure refer to? The EO defined it as follows:...systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters. Before you breathe a collective sigh of relief, think about what this means. Who has an impact on national security? Based on the definition, one could certainly think of utility companies, financial institutions, healthcare organizations, emergency response agencies, and law enforcement, but what about commercial entities, research institutions, and the myriad of organizations that interface with these types of institutions? One thing is clear, it is difficult to define which organizations are critical and which are not. This is due to one nagging fact. We are interconnected. Therefore, when considering the interconnected Internet, a risk to one is truly a risk to all. The CF was designed to be technology neutral and industry agnostic. Since its inception, the CF has been adopted in many industries across the U.S. and internationally. The elements of the framework core should be applicable to any organization that creates, processes, accesses, or stores sensitive information. In fact, some industry regulatory bodies have published additional implementation guidance supporting the framework. For example, in 2015, the Federal Financial Institutions

TRACESECURITY WHITE PAPER: A Guide to Successfully Implementing the NIST Cybersecurity Framework PAGE 3 Examination Council (FFIEC) issued implementation guidance in the form of the FFIEC Cybersecurity Assessment Tool. The assessment tool provides financial institutions a means to analyze their inherent risk and the relative maturity of their cybersecurity programs. While not a replacement for an institutional framework, this industry tool provides a means for organizational leaders to obtain a high-level view of their overall risk and cybersecurity program implementation. Establishing an institutional framework takes time, but with the help of the CF, an organization can build their own roadmap for achieving an appropriate level of cyber readiness. The Primary Components of the Framework The NIST CF consists of three primary elements: implementation guidance, the framework core, and a framework profile. NIST provides guidance for implementation that includes a cyclic approach to evaluate risks, identify gaps in program implementation, and implement action plans to address any discovered gaps. Because risk management is the foundation of a cybersecurity program, the CF guidance emphasizes the integration of the CF into an organization s overall risk management program. The framework core is the meat of the CF and provides a common baseline of cybersecurity activities applicable across different industries and industry sectors. The framework core is aligned to the common cybersecurity functions of threat identification, protection mechanisms, threat detection, incident response, and incident recovery. The following is a visual representation of the common cybersecurity functions. Source: National Institute of Standards and Technology For each cybersecurity function, categories of general activities are identified that are commonly used to implement a particular function. The following is a visual representation of the categories. Source: National Institute of Standards and Technology

TRACESECURITY WHITE PAPER: A Guide to Successfully Implementing the NIST Cybersecurity Framework PAGE 4 For each category of activity, subcategories are also defined that provide the recommended implementation steps for each category. However, realizing that organizations have unique needs, NIST provides the flexibility to tailor the subcategory controls to meet individual business requirements. For instance, omitting a subcategory that is not applicable to an organization or adding additional subcategories to address unique threats in an organization. Great planners understand that it is important to know both where you are at today, as well as where you are going. The difference between the two can provide a map for achieving your goals. Enter the CF Profile. The purpose of the framework profile is to document the current status of an organization, or for a new program, the objective status of the organization. It is essentially a snapshot of an organization s prescribed and implemented controls. This snapshot is compared to the objective framework to identify any gaps, and the gaps then drive plans to address any deficiencies in the program. The final element of the CF is the definition of implementation tiers. These tiers describe the degree to which an organization s cybersecurity risk management practices exhibit the characteristics defined in the Framework. This provides a common language and criteria for determining an organization s progress at implementing the CF. However, it is important to realize that the implementation tiers are not intended to be a formal assessment or certification program. Instead, they are designed to be a tool for organizational leaders to evaluate their progress at implementing the framework. Scenarios for Framework Adoption At this point, you have hopefully garnered support from your organizational leadership and are ready to move forward with implementation of the framework. Where to start? Well, that depends on the current state of your organization s cybersecurity program. Let s consider two scenarios: integration into an existing program and establishment of a new program. The CF is intended to complement, not replace, an organization s risk management process and cybersecurity program. As a result, there is no need for organizations with an existing cybersecurity program to recreate their programs from scratch. These organizations may continue using current processes and compare their existing cybersecurity programs to the CF in order to identify opportunities for improvement. Where warranted, the elements of the CF not already addressed can be incorporated into existing programs. Alternatively, organizations without an existing cybersecurity program can use the Framework as a model to establish one. As illustrated previously, the CF is divided into cybersecurity functions, function categories, and subcategories. So a good place to start when establishing a new program is with the high-level functions of identification, protection, detection, response, and recovery. For each function, the organization should develop a high-level strategy for meeting the function objective. For example, given the cybersecurity function of identification, how does the organization envision implementation? Will it use internal resources, contracted resources, manual processes or automation? How will the function be managed? What is the required implementation timeline? What general tools, systems, or service agreements will be required? Any strategy will require securing management buy-in and dedication of the resources required. Given the approved high-level strategies to address each cybersecurity function, the organization must now drill down into the categories of function implementation. For example, the identification function is divided into the categories including, but not limited to, Asset Management, Governance, and Risk Management. The organization needs to identify who will be responsible for each category and what those responsibilities should be. They should also ask what resources will be at their disposal and what foundational policies will govern implementation. The answers to these questions may translate into duty descriptions, committee charters, organization charts, etc. that support the establishment of the program.

TRACESECURITY WHITE PAPER: A Guide to Successfully Implementing the NIST Cybersecurity Framework PAGE 5 Finally, with an established team, the organization can begin addressing the subcategories that equate to the implementation steps for each activity. This is where CF subcategories are translated into action plans. The level of detail is higher at this stage and attempts to document the specific steps, as well as who, when, where, and what resources are required for each step. At this point, we have defined most of the essential elements of the framework. The functions, roles and responsibilities, categories of activities and specific activity steps have been defined. We are done, right? Well, not quite. The last piece of the puzzle is still missing. Measuring Successful Implementation When establishing any process, a measurement of success must be defined or at the very least a measure of whether or not the process is working as designed. Ultimately, the framework is not complete without defining the means of measurement. As indicated in the NIST CF guidance, one essential measurement is risk. A risk assessment identifies the risk remaining after implementation of the framework and associated controls. As part of a cyclic process, the organization should conduct risk assessments identifying the information assets protected, the threats impacting those assets, and the mitigating controls in place to reduce the impact or likelihood of the threats. The residual risk that remains must be accepted by the organization, avoided, or further mitigated by the implementation of additional or enhanced existing security controls. In this way, risk management provides the foundation of the framework and a means to identify elements of the framework that should be strengthened. The organization may also choose to perform additional measurements to facilitate regulatory compliance or to provide additional metrics for measuring success. These can include, but are not limited to, formal audits, gap analyses, technical testing, and contingency exercises. Regardless of the specific mix of testing and assessment, the ultimate goal is to improve the organization s cybersecurity defenses. Establishing a feedback loop helps ensure that all lessons learned from regular tests and exercises are incorporated into future improvement plans. Conclusion: Effective Cybersecurity Risk Management Cybersecurity threats continue to grow and affect all organizations. The NIST CF was established to provide a common framework to strengthen cybersecurity defenses across critical infrastructure in all industries and organizations. While framework implementation is voluntary, use of the framework is gaining momentum across multiple industries. Some industries are providing additional implementation guidance, further cementing the framework in these industries. The CF may be used as a gap analysis tool for existing programs, overlaid with existing programs or serve as a model for establishing new cybersecurity programs. The CF subcategories map to the defined controls of most other standards and models to provide the glue that binds the best of those sources into a single framework. The CF is structured in a way that facilitates a modular approach to implementation, and organizations are encouraged to add additional activity subcategories (steps, controls) to meet the unique needs of their operating environment. Finally, the CF is intended to augment, rather than replace, an organization s existing risk management program, while the risk assessment process can be used as a tool to measure CF effectiveness. The most successful cybersecurity programs are those that don t simply rely on technical controls but clearly define a framework to address each of the essential cybersecurity functions: threat identification, protection mechanisms, threat detection, incident response, and incident recovery. Combined with an ongoing risk management program, the CF can help build a strong foundation for any cybersecurity program.

TRACESECURITY WHITE PAPER: A Guide to Successfully Implementing the NIST Cybersecurity Framework PAGE 6 About TraceSecurity TraceSecurity is a leader in cloud-based cybersecurity solutions that help organizations of all sizes reduce the risk of cyber breaches and demonstrate compliance. TraceSecurity s award-winning TraceCSO is a revolutionary solution that dramatically streamlines the management of IT governance, risk and compliance (GRC) programs. It accomplishes this by tightly integrating and automating all eight critical IT GRC components: Risk Management, Compliance Management, Audit Management, Vendor Management, Incident Response Management, Vulnerability Management, Policy Management and Training Management. Most important, it provides built-in security and compliance expertise that most organizations lack. Because of its unique architecture and cloud delivery, TraceCSO deploys rapidly and reduces the cost of GRC management by as much as 80%. With market experience that spans over 2,000 customers, TraceSecurity offers the insight, products, professional services and partners to support the security and risk management efforts of organizations of all sizes across all industries. To learn more about TraceSecurity, call 877-275-3009 or visit www. GRC Simplified... Finally.