Cyber Security Controls Assessment : A Critical Discipline of Systems Engineering



Similar documents
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

A Systems Engineering Approach to Developing Cyber Security Professionals

John Essner, CISO Office of Information Technology State of New Jersey

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Big Data, Big Risk, Big Rewards. Hussein Syed

Cyber Security for SCADA/ICS Networks

Security Controls What Works. Southside Virginia Community College: Security Awareness

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

SECURITY. Risk & Compliance Services

Information Security Services

Network Security Administrator

Passing PCI Compliance How to Address the Application Security Mandates

Enterprise Computing Solutions

Fortinet Solutions for Compliance Requirements

Security Management. Keeping the IT Security Administrator Busy

Looking at the SANS 20 Critical Security Controls

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Department of Management Services. Request for Information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Security for Process Automation

Chapter 1 The Principles of Auditing 1

Get Confidence in Mission Security with IV&V Information Assurance

Protecting Critical Infrastructure

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

SCADA Security Training

NIST Cyber Security Activities

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

New IBM Security Scanning Software Protects Businesses From Hackers

Critical Controls for Cyber Security.

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Information Security Policy

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

CRYPTUS DIPLOMA IN IT SECURITY

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Cisco Advanced Services for Network Security

ensuring security the way how we do it

Cyber Security and Privacy - Program 183

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT

The Protection Mission a constant endeavor

Designing a security policy to protect your automation solution

SCAC Annual Conference. Cybersecurity Demystified

Web App Security Audit Services

Models for Cyber Security Analysis

Understanding Cyber Defense A Systems Architecture Approach

This is a preview - click here to buy the full publication

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

CompTIA Security+ (Exam SY0-410)

Altius IT Policy Collection Compliance and Standards Matrix

Certified Ethical Hacker (CEH)

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

The Business Case for Security Information Management

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Protecting Organizations from Cyber Attack

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

Dr. György Kálmán

I n f o r m a t i o n S e c u r i t y

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

PRINCIPLES AND PRACTICE OF INFORMATION SECURITY

Principles of Information Assurance Syllabus

The State of Industrial Control Systems Security and National Critical Infrastructure Protection

13 Ways Through A Firewall

Privacy and Security in Healthcare

Introduction p. 2. Introduction to Information Security p. 1. Introduction

External Supplier Control Requirements

Practical Guidance for Auditing IT General Controls. September 2, 2009

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Security Testing. Claire L. Lohr, CSQE, CSDP, CTAL F. Scot Anderson, CISSP April 7, 2009 V 1.

Information Technology Career Cluster Advanced Cybersecurity Course Number:

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, CASE: Implementation of Cyber Security for Yara Glomfjord

Cybersecurity: What CFO s Need to Know

future data and infrastructure

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CIP Supply Chain Risk Management (RM ) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016

Cybersecurity in a Mobile IP World

GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT

Digi Device Cloud: Security You Can Trust

External Supplier Control Requirements

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

A Concise Model to Evaluate Security of SCADA Systems based on Security Standards

Feature. SCADA Cybersecurity Framework

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Exam 1 - CSIS 3755 Information Assurance

Application Security Testing

CYBER SECURITY GUIDANCE

Cloud Security and Managing Use Risks

Computer System Security Updates

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Transcription:

Cyber Controls : A Critical Discipline of Systems 14 th Annual NDIA Systems San Diego, CA October 24-28, 2011 Bharat Shah Lockheed Martin IS&GS bharat.shah@lmco.com

Purpose Provide an overview on integrating Controls (SCA) phases with Systems Life Cycle (SELC) phases to protect against threats to the security principles of enterprise infrastructure assets, information, related services and processes

Session Learning Objectives Introduction to Cyber Understand the challenges and issues related to the cyber security Understand applicable cyber security standards Explore cyber security assessment integrated with systems engineering life cycle Review the assessment process, and tools for vulnerability assessment

INTRODUCTION

Securing Cyber Infrastructure The revolution in communications and information technologies have given birth to a virtual world Cyberspace is real and so are the risks that come with it. It s the great irony of our Information Age the very technologies that empower us to create and build also empower those who would disrupt and destroy. President Obama Remarks by the President on Securing our Nation s Cyber Infrastructure May 29, 2009 http://www.whitehouse.gov/the_press_office/remarks-by-the-president-on-securing- Our-Nations-Cyber-Infrastructure/

For Enterprise Domains With facilities, systems, and equipments if destroyed, would have a debilitating impact on security, safety and survivability essential for functioning of enterprise information systems

What is Cyber? Cyber Space is the non-physical terrain created by computer systems. Anything related to the Internet also falls under the cyber category. http://www.webopedia.com/term/c/cyber.html Cyber System Is composed of interconnected computers, servers, routers, switches and fiber optic cables in which online communications takes place using Internet technologies Cyber Determines that the security features of the cyber system infrastructure components are designed, implemented and adequate for proposed system environment. Cyber Eng. A discipline that uses a systems engineering approach to determine the total protection for a system including physical, technical, operational, environmental, administrative, and personnel controls Cyber = Enabling of Internet Technologies

CYBER SECURITY ISSUES AND CHALLENGES EMERGING TRENDS

Cyber Environment Growth Emerging Trends - 1 Using SOA Cloud Centric Web 2.0/3.0 Storage Virtualization Broadband Networking Collaboration Social Networking Content Management And Increasing..

Emerging Trends - 2 Emerging Threats attacks, software vulnerabilities, and hardware failure can all lead to security threats

Emerging Trends - 3 Caused By Increase in Hackers Criminals Terrorist Employees Business Partners Sub-Contractors Threat Agents Software Components Network Components Technology Advances State Sponsored Natural Disasters Industry Regulations There are many different agents and with varying motivations in the cyber security domain.

Emerging Trends - 4 Causing loss of control and disruption in Transport Media Routers, Switches, Antenna, Towers, Protocols Standard, Proprietary Gateways Proxy Servers, Firewalls Systems Cyber Systems, Industrial Control Systems Storage Multiple formats of Text, Audio, Video data Facilities Local, International Growth of cyber technologies have changed threat environment forever..

Emerging Trends - 5 Creating Impacts. Legal Liabilities National System Destruction Customer Confidence Improper Data Disclosure Loss of Revenue Delays and Denial of Services Loss of Productivity Economic Uncertainty High Cost of Maintenance And Numerous Cascading Effect because of Domain Interdependencies

Emerging Trends - 6 Having Statistics http://webobjects.cdw.com/webobjects/medi a/pdf/newsroom/2009-cdwg-federal- Cybersecurity-Report-1109.pdf http://www.ponemon.org/local/upload/fckjail/generalcontent/18/fil e/ca%20%20mega%20trends%20white%20paper%20final %202%20%282%29.pdf Incident related to Cyber Crimes are on rise

Emerging Trends - 7 Because of Gaps in Technology Knowledge of attack vectors used by attackers Ability to identify the actual perpetrator Skills to perform security controls assessments Integration with Systems Life Cycle controls assessment guidelines Measurement guidelines for security assessment Organizational uniformity in security assessment planning Investing in is NOT an Option BUT a Necessity

CYBER SECURITY REQUIREMENTS AND CONTROLS

Principles Cyber Requirements To Ultimately Support Confidentiality Enterprise Networks Integrity Availability Authentication Authorization Auditing Enterprise Services Enterprise Information Enterprise Systems Enterprise Domains Non-Repudiation Nation s Economy and And Build Trust and Confidence in system environment

Cyber Standards &Regulations For Applicable Enterprise Domain Federal FISMA DIACAP NIST <more > Industry HIPAA PCI SOX <more > Critical Infrastructure NERC FERC CFATS NIST Cyber-Grid ISA-99 <more > International ISO ITU <more > Private SANS - CAG OASIS OWASP <more > And Growing Day by Day..

Cyber Controls Management Technical Operational Monitoring Maintenance Risk Business Continuity Planning Disaster Recovery Planning Incident Management Awareness & Training C&A Identification Authentication Access Control Accounting Auditing System Protection Communication Protection Encryption and Key Management Physical Protection Environmental Protection Personnel Communication Protection Configuration Management Media Protection Incident Response Risk Physical Access Media Access Remote Access Environmental Controls Suspicious Activities IDS and IPS Patch Management Change Management Controls are action or procedure that provide CIA of system environment

CYBER SECURITY ASSESSMENT FRAMEWORK

Objectives Cyber The test and evaluation of the cyber environment security controls to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system 1 Ensure protection against security vulnerabilities and threats 2 Ensure compliance to legislative and regulatory Standards 3 Ensure the confidentiality, integrity and availability of the data 4 Identify problem areas and provide reasonable options 5 Ensure enterprise infrastructure is reliable, recoverable and resilient Develop the business case for cyber security assessment that will enhance infrastructure security.

Systems Life Cycle Cyber Requirements Design Implementation Test Deploy Disposition Cyber Input Applicable Standards Applicable Regulations Enterprise Domain Specific Policies Objectives Threat Vectors Threats System Risk Cyber Planning Identify Applicable Controls Management Technical Operational Monitoring Maintenance System Plan Cyber Phases Requirements Architecture Controls Integration Test and Evaluation must be a key part of the life cycle processes for any system: Monitoring Decommission

Cyber Plan Plan 1 Select/Obtain sponsorship 1 Select/Define Process 2 Define objectives 2 Select Tools 3 Select policy and guideline for assessment 3 Define measurement metrics and reports 4 Define roles and responsibilities 4 Identify and gather documentation Controls Plan Plan and Gain an understanding of security needs

Cyber Systems Life Cycle Requirements Design Implementation Test Deploy Disposition Cyber Phases Identify Inspect Investigate Test Monitor Disposition Activities Review Require ments Review Documents Review Controls Integration Conduct Testing Monitor Operation Dispositi on Assets Activity Elements Policies Standards Regulations Requirements Architecture Design Functions DR/COOP Static Analysis Controls Integration Configuration Procedures Redundancy & Recoverability User Interface Test Black Box Testing Vulnerability Test Penetration Test Configuration Management Patch Management Incident Management Performance Management Disposal Process Critical Assets Disposal Sensitive Data Disposal Media Disposal Activity Reports Requirements Analysis Report Design Review Report Integration Report Testing Report State Report Assets Disposition Report ------------- Risk Throughout---------------

Cyber Process Define System Mission Threads Identify Cyber Services Used Identify Functions Executed Identify Information Flow Setup Environment Develop Cases Generate Data Define Possible Threat Scenarios Identify Members Identify Tools Execute Cases Analyze and Report Results Actively managing the security process is a key part of achieving security

Cyber Controls Verification Validation Web Services Specific Vulnerability Testing Penetration Testing Plan Access Control External Users Hidden Fields Manipulation IP Attacks Risk Accountability Internal Users Invalid Input ICMP Attacks Physical Protection Auditing Key Management SQL Injection TCP Attacks Environmental Protection Identification Cloud-to- Cloud Buffer Overflow Routing Attacks Media Protection Authentication Cross Site Scripting DoS Attacks Contingency Planning System Protection Session Hijacking Spam Attacks Incident Response Communicatio n Protection Error Handling Social Attacks Awareness and Training Routine Maintenance Parameter Tempering Gain an understanding of State of System

Cyber Testing Tools Network Network Mapping Wireless Network Analysis Host Configuration Analysis Traffic Analysis Access Control Foundstone NMap AirSnort Solarwinds EtherReal GetAdmin Nessus NetsTumbler SuperScan Sniffer Pwdump2 Web Application Scan Web Services Scan Database Scan Data Retrieval Password Cracking File Integrity AppScan SOAPUI WebInspect Planning Crack 5 TripWire WebInspect Internet Scanner L0pht LANGuard Plan and Gain an understanding of security needs

REFERENCES & ACRONYMS

References 1. Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) at http://www.dhs.gov/xlibrary/assets/nipp-ssp-energy-redacted.pdf 2. 2009 CDW-G Federal Cybersecurity Report: Danger on the Front Lines, November 2009 at http://webobjects.cdw.com/webobjects/media/pdf/newsroom/2009-cdwg-federal-cybersecurity-report-1109.pdf 3. Cyber Market Update http://www.prweb.com/releases/2009/06/prweb2513744.htm 4. Twenty Most Important Controls and Metrics for Effective Cyber Defense and Continuous FISMA Compliance at http://csis.org/files/media/csis/pubs/090223_cag_1_0_draft4.1.pdf 5. Cyber Mega Trends - Study of IT leaders in the U.S. federal government at http://www.ponemon.org/local/upload/fckjail/generalcontent/18/file/ca%20%20mega%20trends%20white%20paper%20fi NAL%202%20%282%29.pdf 6. A Summary of Control System Standards Activities in the Energy Sector at http://www.oe.energy.gov/documentsandmedia/summary_of_cs_standards_activities_in_energy_sector.pdf 7. NIST SP 800-82, Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems - http://csrc.nist.gov/publications/drafts/800-82/draft-sp800-82.pdf 8. NIST SP 800-53 Rev. 3, Recommended Controls for Federal Information Systems and Organizations, August 2009, http://csrc.nist.gov/publications/nistpubs/800-53-rev3/sp800-53-rev3-final_updated-errata_05-01-2010.pdf 9. NIST SP 800-82, DRAFT Guide to Industrial Control Systems, September 2008, http://csrc.nist.gov/publications/drafts/800-82/draft_sp800-82-fpd.pdf 10. NERC Critical Infrastructure Protection Standards 002-009, at http://www.nerc.com/page.php?cid=2 20

Acronyms 1. CAG Consensus Audit Guidelines (SANS 20 security controls) 2. CFATS Chemical facility Anti-terrorism Standards 3. CIA Confidentiality, Integrity, Availability 4. CIP Critical Infrastructure Protection 5. COTS Commercial Off The Shelf 6. DIACAP - DoD Information Assurance Certification and Accreditation Process 7. DCS Distributed Control System 8. FERC Federal Energy regulatory Commission 9. FISMA Federal Information Management Act 10. HIPAA - Health Insurance Portability and Accountability Action 11. ICS Infrastructure Control System 12. IEC International Electrochemical Commission 13. IEEE Institute of Electrical and Electronics Engineers 14. ISA Industrial Society for Automation 15. ISO International Standards Organization 16. IS&GS Information Systems and Global Solutions 17. IT Information Technology 18. ITU International Telecommunication Union 19. NERC - North American Electric Reliability Corporation 20. NIST National Institute of Science and Technology 21. OASIS - Organization for the Advancement of Structured Information Standards 22. OWASP - Open Web Application Project 23. PCI Payment Card Industry 24. PCS Process Control System 25. SANS - SysAdmin, Audit, Network, 26. SCADA Supervisory Control and Data Acquisition System 27. SOX - Sarbanes-Oxley Act