Supply-Chain Risk Management Framework



Similar documents
2012 CyberSecurity Watch Survey

Exploring the Interactions Between Network Data Analysis and Security Information/Event Management

Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience

How To Ensure Security In A System

Risk Management Framework

Applying Software Quality Models to Software Security

Overview. CMU/SEI Cyber Innovation Center. Dynamic On-Demand High-Performance Computing System. KVM and Hypervisor Security.

Extending AADL for Security Design Assurance of the Internet of Things

Cyber Intelligence Workforce

Monitoring Trends in Network Flow for Situational Awareness

A Study of Systems Engineering Effectiveness. Building a Business Case for Systems Engineering

SOA for Healthcare: Promises and Pitfalls

Operationally Critical Threat, Asset, and Vulnerability Evaluation SM (OCTAVE SM ) Framework, Version 1.0

Building Resilient Systems: The Secure Software Development Lifecycle

Assurance Cases for Design Analysis of Complex System of Systems Software

Information Asset Profiling

Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division

Architectural Implications of Cloud Computing

Contracting Officer s Representative (COR) Interactive SharePoint Wiki

Network Analysis with isilk

Network Monitoring for Cyber Security

Moving Target Reference Implementation

CMMI for SCAMPI SM Class A Appraisal Results 2011 End-Year Update

Common Testing Problems: Pitfalls to Prevent and Mitigate

Getting Started with Service- Oriented Architecture (SOA) Terminology

Interpreting Capability Maturity Model Integration (CMMI ) for Business Development Organizations in the Government and Industrial Business Sectors

Deriving Software Security Measures from Information Security Standards of Practice

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud

The CERT Top 10 List for Winning the Battle Against Insider Threats

Department of Homeland Security Cyber Resilience Review (Case Study) Matthew Butkovic Technical Manager - Cybersecurity Assurance, CERT Division

The Key to Successful Monitoring for Detection of Insider Attacks

Interpreting Capability Maturity Model Integration (CMMI ) for Service Organizations a Systems Engineering and Integration Services Example

CMMI: What do we need to do in Requirements Management & Engineering?

ISO 27001: Information Security and the Road to Certification

Sustaining Operational Resiliency: A Process Improvement Approach to Security Management

CERT Virtual Flow Collection and Analysis

Buyer Beware: How To Be a Better Consumer of Security Maturity Models

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Software Security Engineering: A Guide for Project Managers

Service Measurement Index Framework Version 2.1

An Application of an Iterative Approach to DoD Software Migration Planning

Incident Management Capability Metrics Version 0.1

Software Assurance Competency Model

Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience

Introduction to the OCTAVE Approach

A Framework for Categorizing Key Drivers of Risk

UFO: Verification with Interpolants and Abstract Interpretation

How To Manage A Privileged Account Management

Proven LANDesk Solutions

Third Party Security Requirements Policy

Information Security Managing The Risk

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

Applying the Principle of Least Privilege to Windows 7

Streamlining Web and Security

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

emontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge

Reference Architecture: Enterprise Security For The Cloud

Service Schedule for CLOUD SERVICES

ISO Controls and Objectives

Penetration Testing Tools

Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals

Abuse of CPE Devices and Recommended Fixes

Version Provance Technologies, Inc. All rights reserved. Provance Technologies Inc. 85 Bellehumeur Gatineau, Quebec CANADA J8T 8B7

Central Agency for Information Technology

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

Domain 1 The Process of Auditing Information Systems

VoIP in Flow A Beginning

Privacy + Security + Integrity

How To Use Elasticsearch

DIVISION OF INFORMATION SECURITY (DIS)

The Business Case for Security Information Management

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Contact: Henry Torres, (870)

Terms and Conditions for Visma Solutions ISV Partner Programs and usage of API of Netvisor, Severa, Maventa and Navita solutions

Security Touchpoints When Acquiring Software. Dr Carsten Huth Nadim Barsoum Dawid Sroka

Oil & Gas Inventory Management System

Supplier IT Security Guide

A GOOD PRACTICE GUIDE FOR EMPLOYERS

Supplier Information Security Addendum for GE Restricted Data

A Systematic Method for Big Data Technology Selection

Transcription:

Supply-Chain Risk Management Framework Carol Woody March 2010

Scope of SEI Work Context Significantly reduce the risk (any where in the supply chain) that an unauthorized party can change the behavior of software in a way that adversely affects the security properties of the deployed product Proposed Approach Identify the supply chain and the controls in place to monitor software Document supply chain security risks that need to be mitigated, possible mitigation actions, and potential evidence needed to determine whether the mitigations are being implemented effectively Build an acquisition and deployment plan to address critical risks 2

System Acquisition Security Process Lifecycle Step Initiation Development Deployment Operations/Maintenance Disposal Sample Supply Chain Security Risk Management Activities Initial risk assessment Develop Request for Proposal Plans for monitoring supplier Select suppliers Manage acquisition Maintain awareness of supplier security management Assess delivered products Configure/Integrate User guidance Incident handling Review operational readiness Monitor component/supplier Evaluate disposal risks Mitigate risks during disposal 3

How do we know supply chain risk has been addressed? The supply chain is well understood and documented. Available evidence indicates that identified risks have been adequately reduced. For gaps in evidence, the impact of associated supply-chain risks have been evaluated. 4

Areas of Supply Chain Risk Review Evaluate a supplier s security commitment Evaluate a product s threat resistance Evaluate impact of supply-chain risks on product deployment and operations Evaluate product delivery mechanisms License control Chain of custody Maintain attack resistance during use 5

Evaluate a Supplier s Security Commitment How do we know that a vendor is seriously considering security? Organizational policies and practices support security Employee education in security engineering practices Good processes are used to support development of secure products Good practices are applied for responding to security problems Good practices and policies are used for evaluating the security capabilities of its suppliers 6

Supplier Security Commitment Evidence Supplier employees are educated as to security engineering practices Documentation for each engineer of training and when trained/retrained Revision dates for training materials Lists of acceptable credentials for instructors Names of instructors and their credentials Supplier follows suitable security design practices Documented design guidelines Provides evidence that design and coding weaknesses that affect security have been addressed (Common Weakness Enumeration (CWE)) Has analyzed attack patterns appropriate to the design such as those that are included in Common Attack Pattern Enumeration and Classification (CAPEC) 7

Evaluate a Product s Threat Resistance What product characteristics minimize opportunities to enter and change the product s security characteristics? Exploitable features have been identified and eliminated where possible (attack surface) Access controls Input/output channels Attack enabling applications email, Web Targets Design and coding weaknesses associated with exploitable features have been identified and mitigated (CWE) Independent validation and verification of threat resistance Supplier and acquirer responsibilities are clearly assigned? Development and Integration Deployment and Operations 8

Maintain Attack Resistance Who assumes responsibility for preserving product attack resistance with product deployment? Patching and version upgrades Expanded distribution of usage Expanded integration How are usage changes identified and addressed? Change in feature usage or risks (threat environment) Are supplier risk mitigations adequate for desired usage? Effects of vendor upgrades/patches and local configuration changes Effects of integration into operations (compositions and system of systems) 9

Cx 1c Security risk: the risk that an unauthorized party changes the behavior of a product or system in a way that adversely affects its security properties Cx 1a Products can be supplied by 1) an organization's internal development organization, 2) an external supplier, or 3) an external supplier's suppliers Cx 1b Supplier: an organization involved in providing a product or system to another organization (includes distributors, transporters, and storage facilities as well as the organization directly responsible for creating product or system content) C 1 Supply chain security risks for product <P> have been reduced ALARP Cx 1d Supply chain security risk: security risk introduced through the supply chain, i.e., security risk introduced by a supplier who either contributes to the content of a product or system, or who has the opportunity to modify such content A 1a Acquiring organization understands importance of security, understands supply chain risks and impacts, and understands how to translate the value of security into cost, schedule, and contractual obligations A C 1.1 Level 1 supplier <S> follows practices that reduce supply chain risk C 1.2 Delivered/updated product is acceptably secure C 1.3 Methods of transmitting the product to its user guard against introduction of malware while in transit C 1.4 The product is used in a secure manner Created w ith ASCE Educational licence - valid for non-commercial teaching and research purposes only 10

Findings from Pilot - 1 No widely accepted standards specifying what constitutes proper training software engineers developers using code generators need specifics on how to produce secure products within the limitations of these tools Insight into vendor handling of subcontractors will require careful consideration subcontractors will reveal security issues to the government but not to the contracting vendor (potential competitor on future bids) Security considerations are not primary in acquisition decisions for: Choice of vendor proposed solutions (except for specific security features such as PKI, certificates, encryption, etc.) Choice of program language Life cycle development practices 11

Findings from Pilot - 2 Products must be well behaved but no monitoring for specific threats or vulnerabilities no formal acceptance criteria for COTS or code generated from COTS frameworks review is performed by Quality Control personnel with limited security expertise Focus on software engineering principles isolation of interfaces to minimize data visibility and maximize information hiding isolation of performance-sensitive software encapsulation of COTS components Operational product monitoring relying on logging which may be turned off for performance needs 12

Summary Current acquisition security focus is on infrastructure components and not applications Lack of appropriate contractual requirements makes it difficult for a program office to determine if key supply chain security risk management practices are being followed Acquisition practices are currently weak in assuring that deployment practices and operational practices are adequate to maintain security against supply chain security risks 13

Next Steps Developing a supply chain risk assessment Easy to learn and use Planning for future self-assessment Seeking government agencies and contractors interested in piloting the assessment see Bob Ellison to volunteer 14

NO WARRANTY THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. Use of any trademarks in this presentation is not intended in any way to infringe on the rights of the trademark holder. This Presentation may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other use. Requests for permission should be directed to the Software Engineering Institute at permission@sei.cmu.edu. This work was created in the performance of Federal Government Contract Number FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. The Government of the United States has a royalty-free government-purpose license to use, duplicate, or disclose the work, in whole or in part and in any manner, and to have or permit others to do so, for government purposes pursuant to the copyright license under the clause at 252.227-7013. 15

Back-up Slides 16

Definitions Supplier: an organization involved in providing a product or system to another organization (includes distributors, transporters, and storage facilities as well as the organization directly responsible for creating product or system content) Supply chain (SC): all suppliers, direct or indirect, having opportunity to modify the content of a product or system (includes those contributing to the content) Supply chain security risk: security risk introduced by a supplier who either contributes to the content of a product or system, or who has the opportunity to modify such content 17

Supply Chain Security Risk - 1 Apply to the acquiring organizations and their suppliers Require good security practices by their suppliers Assess the security of delivered products Address the additional risks associated with using the product in their context Recognize that supply chain risks are accumulated Subcontractor/COTS-product supply chain risk is inherited by those that use that software, tool, system, etc. 18

Supply Chain Security Risks - 2 Incorporate supply chain security risks considerations into the existing acquisition processes What aspects of supply chain security risks have been considered? For many acquisitions, a significant portion of supply chain security risk management has to be delegated to the prime contractor. What aspects of supply-chain risk management have been assigned to the prime contractor? Does this include requirements for managing supply-chain risks for subcontractors? 19

Contact Information Carol Woody (412) 268-9137 cwoody@cert.org Robert Ellison (412) 268-7705 cellison@sei.cmu.edu Web Resources (CERT/SEI) http://www.cert.org/ http://www.sei.cmu.edu/ 20