Framework for Improving Critical Infrastructure Cybersecurity

Similar documents
Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity

Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order Improving Critical Infrastructure Cybersecurity

Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

Cybersecurity Framework Security Policy Mapping Table

CRR-NIST CSF Crosswalk 1

Framework for Improving Critical Infrastructure Cybersecurity

How To Write A Cybersecurity Framework

Improving Critical Infrastructure Cybersecurity Executive Order Preliminary Cybersecurity Framework

Framework for Improving Critical Infrastructure Cybersecurity

Happy First Anniversary NIST Cybersecurity Framework:

Automation Suite for NIST Cyber Security Framework

Cybersecurity Framework: Current Status and Next Steps

Framework for Improving Critical Infrastructure Cybersecurity

Critical Manufacturing Cybersecurity Framework Implementation Guidance

Framework for Improving Critical Infrastructure Cybersecurity

Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014

NIST Cybersecurity Framework & A Tale of Two Criticalities

Applying IBM Security solutions to the NIST Cybersecurity Framework

NIST Cybersecurity Framework Sean Sweeney, Information Security Officer 5/20/2015

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

Applying Framework to Mobile & BYOD

Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework

NIST Cybersecurity Framework. ARC World Industry Forum 2014

Building Security In:

Health Industry Implementation of the NIST Cybersecurity Framework

Discussion Draft of the Preliminary Cybersecurity Framework

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

NIST Cybersecurity Initiatives. ARC World Industry Forum 2014

Appendix B: Mapping Cybersecurity Assessment Tool to NIST

Intel Security Professional Services Leveraging NIST Cybersecurity Framework (CSF): Complexity is the enemy of security

HITRUST Common Security Framework Summary of Changes

The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013.

The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session

Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, 2014 Utilities Telecom Council

Welcome! Designing and Building a Cybersecurity Program

PROTIVITI FLASH REPORT

ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE

Business Continuity for Cyber Threat

Westlaw Journal. What is the Cybersecurity Framework? Risk Management Process And Pathway to Corporate Liability? Expert Analysis

ACCESS RIGHTS MANAGEMENT Securing Assets for the Financial Services Sector

A Guide to Successfully Implementing the NIST Cybersecurity Framework. Jerry Beasley CISM and TraceSecurity Information Security Analyst

Which cybersecurity standard is most relevant for a water utility?

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

Weak (1.0) Limited (2.0) Effective (3.0) Strong (4.0) Very Strong (5.0)

Understanding the NIST Cybersecurity Framework September 30, 2014

NIST Cybersecurity Framework What It Means for Energy Companies

CRR Supplemental Resource Guide. Volume 5. Incident Management. Version 1.1

How To Understand And Manage Cybersecurity Risk

Implementing the U.S. Cybersecurity Framework at Intel A Case Study

The NIST Framework for Improving Critical Infrastructure Cybersecurity - An Executive Guide

The NIST Cybersecurity Framework

Envisioning Collaboration for Medical Device and Healthcare Cybersecurity

FY 2016 Inspector General Federal Information Security Modernization Act of 2014 Reporting Metrics V1.0

Get Confidence in Mission Security with IV&V Information Assurance

Why you should adopt the NIST Cybersecurity Framework

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP HP ENTERPRISE SECURITY SERVICES

NIST CYBERSECURITY FRAMEWORK IMPLEMENTATION: ENERGY SECTOR APPROACH

70% of US Business Will Be Impacted by the Cybersecurity Framework: Are You Ready?

National Institute of Standards and Technology Smart Grid Cybersecurity

IG ISCM MATURITY MODEL FOR FY 2015 FISMA FOR OFFICIAL USE ONLY

IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope

No. 33 February 19, The President

CForum: A Community Driven Solution to Cybersecurity Challenges

Security Controls Assessment for Federal Information Systems

DATA INTEGRITY. Reducing the impact of an attack BUILDING BLOCK WHITE PAPER

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

Publication Number: Third Draft Special Publication Revision 1. A Role Based Model for Federal Information Technology / Cyber Security Training

CONCEPTS IN CYBER SECURITY

Ed McMurray, CISA, CISSP, CTGA CoNetrix

5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance

Altius IT Policy Collection Compliance and Standards Matrix

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

NIST A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich

Cybersecurity as a Risk Factor in doing business

Italy. EY s Global Information Security Survey 2013

Risk Management in Practice A Guide for the Electric Sector

April 8, Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

April 28, Ms. Hada Flowers Regulatory Secretariat Division General Services Administration 1800 F Street, NW, 2 nd Floor Washington, DC

Bridging the HIPAA/HITECH Compliance Gap

NIST Unveils Preliminary Cybersecurity Framework

Transcription:

Framework for Improving Critical Infrastructure Cybersecurity April 2016 cyberframework@nist.gov

Pre-Cybersecurity Framework Threat Landscape 79% of reported victims were targets of opportunity 96% of reported attacks in 2012 were NOT difficult 85% of reported breaches took weeks or more to discover 97% of reported breaches were avoidable through simple or intermediate controls Sta9s9cs are from the 2012 Verizon Data Breach Inves9ga9ve Report

Improving Critical Infrastructure Cybersecurity It is the policy of the United States to enhance the security and resilience of the Nation s critical infrastructure and to maintain a cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties President Barack Obama Executive Order 13636, 12 February 2013 3

Based on the Executive Order, the Cybersecurity Framework Must... Include a set of standards, methodologies, procedures, and processes that align policy, business, and technological approaches to address cyber risks Provide a prioritized, flexible, repeatable, performancebased, and cost-effective approach, including information security measures and controls, to help owners and operators of critical infrastructure identify, assess, and manage cyber risk Identify areas for improvement to be addressed through future collaboration with particular sectors and standards-developing organizations Be consistent with voluntary international standards 4

Development of the Framework Engage the Framework Stakeholders EO 13636 Issued February 12, 2013 NIST Issues RFI February 26, 2013 1 st Framework Workshop April 03, 2013 Collect, Categorize, and Post RFI Responses Completed April 08, 2013 Identify Common Practices/Themes May 15, 2013 Analyze RFI Responses 2 nd Framework Workshop at CMU May 2013 Draft Outline of Preliminary Framework June 2013 Ongoing Engagement: Open public comment and review encouraged and promoted throughout the process and to this day Identify Framework Elements 3 rd Workshop at UCSD July 2013 4 th Workshop at UT Dallas Sept 2013 Prepare and Publish Framework 5 th Workshop at NC State Nov 2013 Published Framework Feb 2014 5

The Cybersecurity Framework Is for Organizations Of any size, in any sector in (and outside of) the critical infrastructure That already have a mature cyber risk management and cybersecurity program That don t yet have a cyber risk management or cybersecurity program With a mission of helping keep up-to-date on managing risk and facing business or societal threats 6

Cybersecurity Framework Components Aligns industry standards and best practices to the Framework Core in a particular implementation scenario Supports prioritization and measurement while factoring in business needs Framework Profile Framework Core Cybersecurity activities and informative references, organized around particular outcomes Enables communication of cyber risk across an organization Framework Implementation Tiers Describes how cybersecurity risk is managed by an organization and degree the risk management practices exhibit key characteristics 7

Implementation Tiers Cybersecurity Framework Component Par)al Risk Informed Repeatable None Adap)ve Allow for flexibility in implementation and bring in concepts of maturity models Reflect how an organization implements the Framework Core functions and manages its risk Progressive, ranging from Partial (Tier 1) to Adaptive (Tier 4), with each Tier building on the previous Tier Characteristics are defined at the organizational level and are applied to the Framework Core to determine how a category is implemented. 8

Implementation Tiers Cybersecurity Framework Component Risk Management Process Integrated Risk Management Program External Par)cipa)on 1 2 3 4 Par)al Risk Informed Repeatable Adap)ve The func)onality and repeatability of cybersecurity risk management The extent to which cybersecurity is considered in broader risk management decisions The degree to which the organiza)on benefits my sharing or receiving informa)on from outside par)es 9

Taxonomy Value Proposi)on Plant classification is the placing of known plants into groups or categories to show some relationship. Scientific classification follows a system of rules that standardizes the results, and groups successive categories into a hierarchy. For example, the family to which lilies belong is classified as: Kingdom: Plantae Phylum: Magnoliophyta Class: Liliopsida Order: Liliales Family: Liliaceae Genus:... Species:...

Core Cybersecurity Framework Component What processes and assets need protec)on? What safeguards are available? What techniques can iden)fy incidents? What techniques can contain impacts of incidents? What techniques can restore capabili)es? Func)on Category ID Asset Management ID.AM Business Environment ID.BE Governance ID.GV Iden)fy Risk Assessment ID.RA Risk Management Strategy ID.RM Protect Detect Respond Recover Access Control PR.AC Awareness and Training PR.AT Data Security PR.DS Informa)on Protec)on Processes & Procedures PR.IP Maintenance PR.MA Protec)ve Technology PR.PT Anomalies and Events DE.AE Security Con)nuous Monitoring DE.CM Detec)on Processes DE.DP Response Planning RS.RP Communica)ons RS.CO Analysis RS.AN Mi)ga)on RS.MI Improvements RS.IM Recovery Planning RC.RP Improvements RC.IM Communica)ons RC.CO 11

Core Cybersecurity Framework Component Func)on Category ID Asset Management ID.AM Business Environment ID.BE Iden)fy Governance ID.GV Risk Assessment ID.RA Risk Management Strategy ID.RM Access Control PR.AC Awareness and Training PR.AT Data Security PR.DS Protect Informa)on Protec)on Processes & Procedures PR.IP Maintenance PR.MA Protec)ve Technology PR.PT Anomalies and Events DE.AE Detect Security Con)nuous Monitoring DE.CM Detec)on Processes DE.DP Response Planning RS.RP Communica)ons RS.CO Respond Analysis RS.AN Mi)ga)on RS.MI Improvements RS.IM Recovery Planning RC.RP Recover Improvements RC.IM Communica)ons RC.CO Subcategory ID.BE-1: The organiza)on s role in the supply chain is iden)fied and communicated ID.BE-2: The organiza)on s place in cri)cal infrastructure and its industry sector is iden)fied and communicated ID.BE-3: Priori)es for organiza)onal mission, objec)ves, and ac)vi)es are established and communicated ID.BE-4: Dependencies and cri)cal func)ons for delivery of cri)cal services are established ID.BE-5: Resilience requirements to support delivery of cri)cal services are established Informative References COBIT 5 APO08.04, APO08.05, APO10.03, APO10.04, APO10.05 ISO/IEC 27001:2013 A.15.1.3, A. 15.2.1, A.15.2.2 NIST SP 800-53 Rev. 4 CP-2, SA-12 COBIT 5 APO02.06, APO03.01 NIST SP 800-53 Rev. 4 PM-8 COBIT 5 APO02.01, APO02.06, APO03.01 ISA 62443-2-1:2009 4.2.2.1, 4.2.3.6 NIST SP 800-53 Rev. 4 PM-11, SA-14 ISO/IEC 27001:2013 A.11.2.2, A. 11.2.3, A.12.1.3 NIST SP 800-53 Rev. 4 CP-8, PE-9, PE-11, PM-8, SA-14 COBIT 5 DSS04.02 ISO/IEC 27001:2013 A.11.1.4, A. 17.1.1, A.17.1.2, A.17.2.1 NIST SP 800-53 Rev. 4 CP-2, 12 CP-11, SA-14 12

Profile Cybersecurity Framework Component Ways to think about a Profile: A customiza)on of the Core for a given sector, subsector, or organiza)on A fusion of business/mission logic and cybersecurity outcomes Iden)fy Protect Detect Respond Recover An alignment of cybersecurity requirements with opera)onal methodologies A basis for assessment and expressing target state A decision support tool for cybersecurity risk management 13

Building a Profile A Profile Can be Created in Three Steps 1 Mission Priority Objective 1 A 2 B 3 C Cybersecurity Requirements Legisla)on Regula)on Internal & External Policy Best Prac)ce Subcategory 1 2 3 98 Opera)ng Methodologies 2 3 Guidance and methodology on implemen)ng, managing, and monitoring 14

Supporting Risk Management with Framework 15

Key Attributes It s a framework, not a prescription It provides a common language and systematic methodology for managing cyber risk It is meant to be adapted It does not tell a company how much cyber risk is tolerable, nor does it claim to provide the one and only formula for cybersecurity Having a common lexicon to enable action across a very diverse set of stakeholders will enable the best practices of elite companies to become standard practices for everyone The framework is a living document It is intended to be updated over time as stakeholders learn from implementation, and as technology and risks change That s one reason why the framework focuses on questions an organization needs to ask itself to manage its risk. While practices, technology, and standards will change over time principals will not 16

Where Should I Start? (1) Business Environment (ID.BE): The organization s mission, objectives, stakeholders, and activities are understood and prioritized; this information is used to inform cybersecurity roles, responsibilities, and risk management decisions. Framework Version 1.0, Section 3.2, Step 1: Prioritize and Scope. The organization identifies its business/mission objectives and high-level organizational priorities. With this information, the organization makes strategic decisions regarding cybersecurity implementations and determines the scope of systems and assets that support the selected business line or process. The Framework can be adapted to support the different business lines or processes within an organization, which may have different business needs and associated risk tolerance. (2a) Governance (ID.GV): The policies, procedures, and processes to manage and monitor the organization s regulatory, legal, risk, environmental, and operational requirements are understood and inform the management of cybersecurity risk (2b) Risk Management Strategy (ID.RM): The organization s priorities, constraints, risk tolerances, and assumptions are established and used to support operational risk decisions. Operate & Maintain 17

Industry Use The Framework is designed to complement existing business and cybersecurity operations, and has been used to: Self-Assessment, Gap Analysis, Budget & Resourcing Decisions Standardizing Communication Between Business Units Harmonize Security Operations with Audit Communicate Requirements with Partners and Suppliers Describe Applicability of Products and Services Identify Opportunities for New or Revised Standards Categorize College Course Catalogs As a Part of Cybersecurity Certifications Categorize and Organize Requests for Proposal Responses Consistent dialog, both within and amongst countries Common platform on which to innovate, by identifying market opportunities where tools and capabilities may not exist today 18

Framework One Year After Release August 26, 2014 Request for Information: Experience with the Cybersecurity Framework Questions focused on: awareness, experiences, and roadmap areas Oct. 29-30, 2014 Florida Center for Cybersecurity 6 th Cybersecurity Framework Workshop Goal: Raise awareness, encourage use as a tool, highlight examples of sector-specific efforts, implementation efforts, gather feedback December 5, 2014 Update on the Cybersecurity Framework Summary posted that includes analysis of RFI responses, feedback from the 6 th workshop, an update on Roadmap areas, and next steps February 12, 2015 February 13, 2015 White House Releases Fact Sheet on Cybersecurity and Consumer Protection 1 Year Anniversary of the Release NIST Cybersecurity Framework site update to include: FAQs, Upcoming Events, and Industry Resources. Ongoing, targeted outreach continues

Examples of Industry Resources Cybersecurity Guidance for Small Firms The Cybersecurity Framework in Action: An Intel Use Case Cybersecurity Risk Management and Best Prac)ces Working Group 4: Final Report Energy Sector Cybersecurity Framework Implementation Guidance 20

Examples of U.S. State & Local Use Texas, Department of Information Resources Aligned Agency Security Plans with Framework Aligned Product and Service Vendor Requirements with Framework North Dakota, Information Technology Department Allocated Roles & Responsibilities using Framework Adopted the Framework into their Security Operation Strategy National Association of State CIOs 2 out of 3 CIOs from the 2015 NASCIO Awards cited Framework as a part of their award-winning strategy Houston, Greater Houston Partnership Integrated Framework into their Cybersecurity Guide Offer On-Line Framework Self-Assessment New Jersey Developed a cybersecurity framework that aligns controls and procedures with Framework 21

Framework Roadmap Items Authentication Automated Indicator Sharing Conformity Assessment Cybersecurity Workforce Data Analytics Federal Agency Cybersecurity Alignment International Aspects, Impacts, and Alignment Supply Chain Risk Management Technical Privacy Standards 22

Framework Roadmap Items Authentication Automated Indicator Sharing Conformity Assessment Cybersecurity Workforce Data Analytics Federal Agency Cybersecurity Alignment International Aspects, Impacts, and Alignment Supply Chain Risk Management Technical Privacy Standards 23

Standards/Guidelines for FISMA & RM FIPS - Federal Information Processing Standards FIPS 199 Standards for Security Categorization FIPS 200 Minimum Security Requirements SPs Special Publications SP 800-18 Guide for System Security Plan development SP 800-30 Guide for Conducting Risk Assessments SP 800-34 Guide for Contingency Plan development SP 800-37 Guide for Applying the Risk Management Framework SP 800-39 Managing Information Security Risk SP 800-53/53A Security controls catalog/assessment procedures SP 800-60 Mapping Information Types to Security Categories SP 800-128 Security-focused Configuration Management SP 800-137 Information Security Continuous Monitoring Many others for operational and technical implementations

Recent Framework Related Policy and Legislation Cybersecurity Enhancement Act of 2014 Codified NIST s on-going role facilitating Framework evolution Asked NIST to facilitate less redundancies in regulation OMB Memorandum M-16-03 & 04 M-16-03: FY 2015-16 Guidance on Federal Information Security and Privacy Management Requirements M-16-04: Cybersecurity Strategy and Implementation Plan Circular A-130 Update Provides generalized guidance for use of pre-existing FISMA-based guidance like Risk Management Framework with Cybersecurity Framework NIST publishing guidance on using Risk Management Framework and Cybersecurity Framework together 25

Tailoring SP 800-53 Security Controls Use Case #3 for Risk Management Framework & Cybersecurity Framework CSF Core customize CSF Profile 26

Framework Roadmap Items Authentication Automated Indicator Sharing Conformity Assessment Cybersecurity Workforce Data Analytics Federal Agency Cybersecurity Alignment International Aspects, Impacts, and Alignment Supply Chain Risk Management Technical Privacy Standards 27

International Dialogs Twenty eight (28) countries have participated in discussion with NIST, including dialog with: The European Union, and 14 out of 28 Member States 4 out of 5 of the Five Eyes 6 countries in Asia 5 countries in the Middle East 28

Emerging International Use - Italy Italy s National Framework for Cybersecurity: http://www.cybersecurityframework.it/ Adopted 100% of the NIST Cybersecurity Framework Extended NIST Cybersecurity Framework Created with industry and academia Published in both Italian and English 29

Resources Where to Learn More and Stay Current The National Institute of Standards and Technology Web site is available at http://www.nist.gov NIST Computer Security Division Computer Security Resource Center is available at http://csrc.nist.gov/ The Framework for Improving Critical Infrastructure Cybersecurity and related news and information are available at www.nist.gov/cyberframework For additional Framework info and help cyberframework@nist.gov