Framework for Improving Critical Infrastructure Cybersecurity

Similar documents
Framework for Improving Critical Infrastructure Cybersecurity

CRR-NIST CSF Crosswalk 1

Framework for Improving Critical Infrastructure Cybersecurity

Happy First Anniversary NIST Cybersecurity Framework:

Automation Suite for NIST Cyber Security Framework

Framework for Improving Critical Infrastructure Cybersecurity

Improving Critical Infrastructure Cybersecurity Executive Order Preliminary Cybersecurity Framework

Cybersecurity Framework Security Policy Mapping Table

NIST Cybersecurity Framework & A Tale of Two Criticalities

Critical Manufacturing Cybersecurity Framework Implementation Guidance

Applying IBM Security solutions to the NIST Cybersecurity Framework

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

NIST Cybersecurity Framework Sean Sweeney, Information Security Officer 5/20/2015

Framework for Improving Critical Infrastructure Cybersecurity

Discussion Draft of the Preliminary Cybersecurity Framework

Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

Framework for Improving Critical Infrastructure Cybersecurity

Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

Building Security In:

Cybersecurity Framework: Current Status and Next Steps

The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013.

Appendix B: Mapping Cybersecurity Assessment Tool to NIST

Intel Security Professional Services Leveraging NIST Cybersecurity Framework (CSF): Complexity is the enemy of security

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

Applying Framework to Mobile & BYOD

Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014

HITRUST Common Security Framework Summary of Changes

NIST Cybersecurity Framework. ARC World Industry Forum 2014

Welcome! Designing and Building a Cybersecurity Program

Framework for Improving Critical Infrastructure Cybersecurity

Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity

Health Industry Implementation of the NIST Cybersecurity Framework

How To Write A Cybersecurity Framework

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, 2014 Utilities Telecom Council

CRR Supplemental Resource Guide. Volume 5. Incident Management. Version 1.1

ACCESS RIGHTS MANAGEMENT Securing Assets for the Financial Services Sector

Weak (1.0) Limited (2.0) Effective (3.0) Strong (4.0) Very Strong (5.0)

Implementing the U.S. Cybersecurity Framework at Intel A Case Study

ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE

The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP HP ENTERPRISE SECURITY SERVICES

Business Continuity for Cyber Threat

Altius IT Policy Collection Compliance and Standards Matrix

Function Category Subcategory Subcategory Informative References

The NIST Framework for Improving Critical Infrastructure Cybersecurity - An Executive Guide

PROTIVITI FLASH REPORT

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

FY 2016 Inspector General Federal Information Security Modernization Act of 2014 Reporting Metrics V1.0

Risk Management in Practice A Guide for the Electric Sector

A Guide to Successfully Implementing the NIST Cybersecurity Framework. Jerry Beasley CISM and TraceSecurity Information Security Analyst

Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division

Which cybersecurity standard is most relevant for a water utility?

Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko

NIST CYBERSECURITY FRAMEWORK IMPLEMENTATION: ENERGY SECTOR APPROACH

Westlaw Journal. What is the Cybersecurity Framework? Risk Management Process And Pathway to Corporate Liability? Expert Analysis

NIST Cybersecurity Framework Manufacturing Implementation

CForum: A Community Driven Solution to Cybersecurity Challenges

Designing & Building a Cybersecurity Program. Based on the NIST Cybersecurity Framework (CSF)

Security Controls Assessment for Federal Information Systems

Why you should adopt the NIST Cybersecurity Framework

CRR Supplemental Resource Guide. Volume 6. Service Continuity Management. Version 1.1

National Institute of Standards and Technology Smart Grid Cybersecurity

Ed McMurray, CISA, CISSP, CTGA CoNetrix

Understanding the NIST Cybersecurity Framework September 30, 2014

Get Confidence in Mission Security with IV&V Information Assurance

Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013

Compliance series Guide to the NIST Cybersecurity Framework

Envisioning Collaboration for Medical Device and Healthcare Cybersecurity

Creating an Integrated Business Continuity / Disaster Recovery (BC/DR) Program. A Hands on Workshop

C2M2 and the NIST Cyber Framework: Applying DOE's NIST Cyber Security Framework Guidance

How To Understand And Manage Cybersecurity Risk

CONCEPTS IN CYBER SECURITY

IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope

DATA INTEGRITY. Reducing the impact of an attack BUILDING BLOCK WHITE PAPER

FFIEC Cybersecurity Assessment Tool

How To Protect Virtualized Data From Security Threats

NIST Cybersecurity Initiatives. ARC World Industry Forum 2014

Legacy Archiving How many lights do you leave on? September 14 th, 2015

Obtaining CSF Certification Lessons Learned and Why Do It

Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework

Security Control Standard

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South

5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE

Main Research Gaps in Cyber Security

Transcription:

Framework for Improving Critical Infrastructure Cybersecurity January 2016 cyberframework@nist.gov

Improving Critical Infrastructure Cybersecurity It is the policy of the United States to enhance the security and resilience of the Nation s critical infrastructure and to maintain a cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties President Barack Obama Executive Order 13636, 12 February 2013

Cybersecurity Framework Components Aligns industry standards and best practices to the Framework Core in a particular implementation scenario Supports prioritization and measurement while factoring in business needs Framework Profile Framework Core Cybersecurity activities and informative references, organized around particular outcomes Enables communication of cyber risk across an organization Framework Implementation Tiers Describes how cybersecurity risk is managed by an organization and degree the risk management practices exhibit key characteristics 4

Implementation Tiers Cybersecurity Framework Component Par)al Risk Informed Repeatable None Adap)ve Allow for flexibility in implementation and bring in concepts of maturity models Reflect how an organization implements the Framework Core functions and manages its risk Progressive, ranging from Partial (Tier 1) to Adaptive (Tier 4), with each Tier building on the previous Tier Characteristics are defined at the organizational level and are applied to the Framework Core to determine how a category is implemented. 5

Core Cybersecurity Framework Component Func%on Category ID Asset Management ID.AM Business Environment ID.BE Iden%fy Governance ID.GV Risk Assessment ID.RA Risk Management Strategy ID.RM Access Control PR.AC Awareness and Training PR.AT Data Security PR.DS Protect Informa)on Protec)on Processes & Procedures PR.IP Maintenance PR.MA Protec)ve Technology PR.PT Anomalies and Events DE.AE Detect Security Con)nuous Monitoring DE.CM Detec)on Processes DE.DP Response Planning RS.RP Communica)ons RS.CO Respond Analysis RS.AN Mi)ga)on RS.MI Improvements RS.IM Recovery Planning RC.RP Recover Improvements RC.IM Communica)ons RC.CO Subcategory ID.BE-1: The organiza)on s role in the supply chain is iden)fied and communicated ID.BE-2: The organiza)on s place in cri)cal infrastructure and its industry sector is iden)fied and communicated ID.BE-3: Priori)es for organiza)onal mission, objec)ves, and ac)vi)es are established and communicated ID.BE-4: Dependencies and cri)cal func)ons for delivery of cri)cal services are established ID.BE-5: Resilience requirements to support delivery of cri)cal services are established Informative References COBIT 5 APO01.02, DSS06.03 ISA 62443-2-1:2009 4.3.2.3.3 ISO/IEC 27001:2013 A.6.1.1 NIST SP 800-53 Rev. 4 CP-2, PS-7, PM-11 COBIT 5 APO08.04, APO08.05, APO10.03, APO10.04, APO10.05 ISO/IEC 27001:2013 A.15.1.3, A. 15.2.1, A.15.2.2 NIST SP 800-53 Rev. 4 CP-2, SA-12 COBIT 5 APO02.06, APO03.01 NIST SP 800-53 Rev. 4 PM-8 COBIT 5 APO02.01, APO02.06, APO03.01 ISA 62443-2-1:2009 4.2.2.1, 4.2.3.6 NIST SP 800-53 Rev. 4 PM-11, SA-14 ISO/IEC 27001:2013 A.11.2.2, A. 11.2.3, A.12.1.3 NIST SP 800-53 Rev. 4 CP-8, PE-9, PE-11, PM-8, SA-14 6

Profile Cybersecurity Framework Component Ways to think about a Profile: A customiza)on of the Core for a given sector, subsector, or organiza)on A fusion of business/mission logic and cybersecurity outcomes Iden)fy Protect Detect Respond Recover An alignment of cybersecurity requirements with opera)onal methodologies A basis for assessment and expressing target state A decision support tool for cybersecurity risk management 7

Using Profiles to Communicate Priorities 8

Building a Profile A Profile Can be Created in Three Steps 1 Mission Priority Objective 1 A 2 B 3 C Cybersecurity Requirements Legisla)on Regula)on Internal & External Policy Best Prac)ce Subcategory 1 2 3 98 Opera%ng Methodologies 2 3 Guidance and methodology on implemen)ng, managing, and monitoring 9

Resource and Budget Decisioning What Can You Do with a CSF Profile As-Is Year 1 To-Be Year 2 To-Be Sub- Year 1 Year 2 category Priority Gaps Activities Activities 1 moderate small X 2 high large X 3 moderate medium X 98 moderate none reassess and supports on-going opera)onal decisions too 10

Examples of Industry Resources The Cybersecurity Framework in Action: An Intel Use Case Cybersecurity Guidance for Small Firms Energy Sector Cybersecurity Framework Implementation Guidance Cybersecurity Risk Management and Best Prac)ces Working Group 4: Final Report 11

Examples of State & Local Use Texas, Department of Information Resources Aligned Agency Security Plans with Framework Aligned Product and Service Vendor Requirements with Framework North Dakota, Information Technology Department Allocated Roles & Responsibilities using Framework Adopted the Framework into their Security Operation Strategy National Association of State CIOs 2 out of 3 CIOs from the 2015 NASCIO Awards cited Framework as a part of their award-winning strategy Houston, Greater Houston Partnership Integrated Framework into their Cybersecurity Guide Offer On-Line Framework Self-Assessment New Jersey Developed a cybersecurity framework that aligns controls and procedures with Framework 12

Framework Roadmap Items Authentication Automated Indicator Sharing Conformity Assessment Cybersecurity Workforce Data Analytics Federal Agency Cybersecurity Alignment International Aspects, Impacts, and Alignment Supply Chain Risk Management Technical Privacy Standards 13

Ways CSF Can Support RMF Draft Use Cases Use case 1: Supporting SP 800-39 Frame activities with CSF Categories Use case 2: Supporting the RMF Categorize step with CSF Business Environment Materials Use case 3: Supporting the RMF Select step with a CSF Profile Use case 4: Supporting RMF Assess and SP 800-30 Assess with a CSF Profile Use case 5: Assessing the State of FISMA-Based Risk Management Practices 14

Supporting the RMF Categorize Step Use Case #2 for FISMA-Cybersecurity Framework Combined Use FIPS 199/SP 800-60 SP 800-137/SP 800-53A FIPS 200/SP 800-53 SP 800-37 Many SPs SP 800-53A

Supporting the RMF Categorize Step Use Case for FISMA-Cybersecurity Framework Combined Use Profile A sector, subsector, or organization s customization of the Core for their purposes. Aligns, identifies conflicts in organizational inputs, and prioritizes cyber objectives commensurate with mission objectives FIPS 199/SP 800-60 SP 800-137/SP 800-53A FIPS 200/SP 800-53 SP 800-37 Many SPs SP 800-53A

Supporting the RMF Categorize Step Use Case #2 for FISMA-Cybersecurity Framework Combined Use Category Business Environment (ID.BE) The organization s mission, objectives, stakeholders, and activities are understood and prioritized; this information is used to inform cybersecurity roles, responsibilities, and risk management decisions. FIPS 199/SP 800-60 SP 800-137/SP 800-53A FIPS 200/SP 800-53 SP 800-37 Many SPs SP 800-53A

Tailoring SP 800-53 Security Controls Use Case #3 for Risk Management Framework & Cybersecurity Framework CSF Core customize CSF Profile 18

Industry Dialog Will it soon be time for a Framework update? What governance models do you believe will work for future Framework maintenance and evolution? If you have an opinion on these questions (and more), consider responding to our Request for Information - https://www.federalregister.gov/articles/2015/12/11/2015-31217/ views-on-the-framework-for-improving-critical-infrastructurecybersecurity Responses due by 9 February at 5PM ET

Resources Where to Learn More and Stay Current The National Institute of Standards and Technology Web site is available at http://www.nist.gov NIST Computer Security Division Computer Security Resource Center is available at http://csrc.nist.gov/ The Framework for Improving Critical Infrastructure Cybersecurity and related news and information are available at www.nist.gov/cyberframework For additional Framework info and help cyberframework@nist.gov