An Enterprise Continuous Monitoring Technical Reference Architecture



Similar documents
Applying the Continuous Monitoring Technical Reference Model to the Asset, Configuration, and Vulnerability Management Domains (DRAFT)

Continuous Monitoring

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

How To Use A Policy Auditor (Macafee) To Check For Security Issues

BMC Client Management - SCAP Implementation Statement. Version 12.0

Federal Desktop Core Configuration (FDCC)

How To Monitor Your Entire It Environment

Security Content Automation Protocol for Governance, Risk, Compliance, and Audit

An Approach to Vulnerability Management, Configuration Management, and Technical Policy Compliance

Total Protection for Compliance: Unified IT Policy Auditing

Towards security management in the cloud utilizing SECaaS

Qualys PC/SCAP Auditor

SCAP for VoIP Automating Configuration Compliance. 6 th Annual IT Security Automation Conference

Toward an Ontology Architecture for Cyber-Security Standards

Guide to Enterprise Patch Management Technologies

OVAL Developer Days. July 11-12, 2006

Automating Compliance with Security Content Automation Protocol

ARF, ARCAT, and Summary Results. Lt Col Joseph L. Wolfkiel

IG ISCM MATURITY MODEL FOR FY 2015 FISMA FOR OFFICIAL USE ONLY

The Emergence of Security Business Intelligence: Risk

CDM Vulnerability Management (VUL) Capability

Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013

CONTINUOUS MONITORING

Symantec Control Compliance Suite Standards Manager

FDCC & SCAP Content Challenges. Kent Landfield Director, Risk and Compliance Security Research McAfee Labs

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

CDM Hardware Asset Management (HWAM) Capability

AUTOMATING THE 20 CRITICAL SECURITY CONTROLS

VRDA Vulnerability Response Decision Assistance

Information Technology Risk Management

Technology Blueprint. Assess Your Vulnerabilities. Maintain a continuous understanding of assets and manage vulnerabilities in real time

Intro to QualysGuard IT Risk & Asset Management. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Pragmatic Metrics for Building Security Dashboards

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Secstate: Flexible Lockdown, Auditing, and Remediation

Continuous Network Monitoring

Management (CSM) Capability

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Vulnerability Management

Vulnerability Scanning Requirements and Process Clarification Comment Disposition and FAQ 11/27/2014

STIGs,, SCAP and Data Metrics

Security Coordination with IF-MAP

Secunia Vulnerability Intelligence Manager (VIM) 4.0

Security compliance automation with Red Hat Satellite

Continuous Diagnostics & Mitigation:

Service-Orientation and Next Generation SOA

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

Analytics and Continuous monitoring Engine (ACE) for Enterprise Risk and Compliance Management

ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17

Status Update. Jon Baker September 28, 2010

Continuous security audit automation with Spacewalk, Puppet, Mcollective and SCAP

Network Security Deployment (NSD)

Manage Vulnerabilities (VULN) Capability Data Sheet

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

Secunia Vulnerability Intelligence Manager

MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY

SOFTWARE ASSET MANAGEMENT Continuous Monitoring. September 16, 2013

rating of 5 out 5 stars

How To Improve Nasa'S Security

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

Find the needle in the security haystack

FY15 Quarter 1 Chief Information Officer Federal Information Security Management Act Reporting Metrics V1.0

Welcome to Modulo Risk Manager Next Generation. Solutions for GRC

Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education

FY 2016 Inspector General Federal Information Security Modernization Act of 2014 Reporting Metrics V1.0

AHS Flaw Remediation Standard

THE TOP 4 CONTROLS.

Transformational Vulnerability Management Through Standards. Robert A. Martin MITRE Corporation

The Value of Vulnerability Management*

Security Orchestration with IF-MAP

Common Platform Enumeration (CPE) Technical Use Case Analysis

Continuous Monitoring in a Risk Management Framework. US Census Bureau Oct 2012

Data- Centric Enterprise Approach to Risk Management Gregory G. Jackson, Sr. Cyber Analyst Cyber Engineering Division Dynetics Inc.

SOFTWARE ASSET MANAGEMENT

Open Vulnerability and Assessment Language (OVAL ) Validation Program Test Requirements (DRAFT)

9 Free Vulnerability Scanners + 1 Useful GPO Tool

Industrial Control Systems Security Guide

VCE Vision Intelligent Operations Version 2.5 Technical Overview

Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014

Simply Sophisticated. Information Security and Compliance

How To Write The Jab P-Ato Vulnerability Scan Requirements Guide


Proactively Managing Servers with Dell KACE and Open Manage Essentials

Emerging Technologies Shaping the Future of Data Warehouses & Business Intelligence

Transcription:

An Enterprise Continuous Monitoring Technical Reference Architecture 12/14/2010 Presenter: Peter Mell Senior Computer Scientist National Institute of Standards and Technology http://twitter.com/petermmell

Disclaimer and Caveats This presentation explores emerging and notional ideas for continuous monitoring technical foundations Application to existing laws, policy, and guidance is intentionally avoided (e.g., FISMA) Their exists NO implied policy or even NIST guidance in this presentation

Our CM Architecture Design Team Peter Mell, David Waltermire, Harold Booth National Institute of Standards and Technology David Minge National Security Agency Timothy McBride Department of Homeland Security Valery Feldman, Amit Mannan, Zach Ragland, Joe Debra Booz Allen Hamilton Alfred Ouyang, Mark Crouter MITRE

Continuous Monitoring (CM) Presentation Contents Section 1: Conceptual Design Level Definition, Essential Characteristics, and Enterprise Architecture Section 2: Technical Design Level Subcomponent Model Technical Architecture Section 3: Implementation Design Level Subsystem communication Interfaces Section 4: CM Maturity Models

Providing a Layered Understanding Driving from definitions to product testing requirements Definition Essential Characteristics Maturity Model Enterprise Architecture Subsystem Model Technical Architecture Interface Specifications Communication Patterns Functional specifications

Section 1: Conceptual Design Level CM Definitions Essential Characteristics Enterprise Architecture

General CM Definition Continuous monitoring is the on-going observance with the intent to provide warning. A continuous monitoring capability is the on-going observance and analysis of the operational states of systems to provide decision support regarding situational awareness and deviations from expectations. Thus CM applies to both cybersecurity and information technology domains

Domains that CM could support Asset Management Configuration Management Content Management Event Management Incident Management Information Management License Management Malware Detection Network Management Patch Management Risk Management Software Assurance Trouble Ticketing Management Vulnerability Management

Description of CM applied to Cybersecurity and for use with Technical Reference Architectures Continuous security monitoring is a risk management approach to cybersecurity that maintains an accurate picture of an organization s security risk posture, provides visibility into assets, and leverages use of automated data feeds to quantify risk, ensure effectiveness of security controls, and enable prioritization of remedies. The purpose of providing this description is to enable us to determine the technical requirements for a CM reference architecture

Derived CM Characteristics: Maintains an accurate picture of an organization s security risk posture Provides visibility into assets Leverages automated data feeds Quantifies risk Ensures continued effectiveness of security controls Informs automated or human-assisted implementation of remediation Enables prioritization of remedies

CM Enterprise Architecture This shows an enterprise architecture view, not a technology focus view Diagram derived from other government work (original diagram credit: Keith Willett, MITRE)

Ways to Achieve CM in Your Organization Create ad-hoc system Integrating vendor solutions to create a CM capability Duplicating the work and repeating the mistakes of others Procure entire CM solutions from a single vendor Locking into a solution that will be strong in some areas and weak in others Leverage a CM technical reference architecture and related security standards (e.g., SCAP) Leverage your existing security products Reduce integration costs Combine best of breed solutions

Important CM solution goals Component based approach Based on a standardized reference architecture Solutions from multiple vendors can be combined together to create a CM solution Standard-based for interoperability and scoring consistency Languages Using the same machine-readable expressions for checking and remediating machine state (e.g., FDCC policy) Metrics Using the same equations for risk calculations Nomenclatures Using the same names for vulnerabilities, assets, configuration issues, and remediation options. Mathematically rigorous scoring approach Motivational scoring is important True risk calculations are also needed

Section 2: Technical Architecture Design Level Subsystem Design Technical Models

Scoping and External System Interfaces CM systems must leverage (not replace) existing data collection repositories from diverse domains This said, existing collection systems will need to be instrumented to enable them to interface with the CM architecture

DHS Continuous Asset Evaluation, Situational Awareness, and Risk Scoring (CAESARS) Reference Architecture

Limitations of the CAESARS model 1. Lack of Interface Specifications 2. Reliance on an Enterprise Service Bus 3. Incomplete Communication Payload Specifications 4. Lack of Specifications Describing Subsystem Capabilities 5. Lack of a Multi-CM Instance Capability 6. Lack of Multi-Subsystem Instance Capability 7. CM Database Integration with Security Baseline Content 8. Lack of Detail on the Required Asset Inventory CAESARS is a good foundation. We need to expand upon its framework to address the limitations and add additional capabilities

Notional CAESARS Framework Expansion Six subsystem types Presentation / Reporting Subsystem (1 or more) Dashboards, reports, user queries Analysis / Risk Scoring Subsystem (1 or more) Data deconfliction, risk scoring Data Aggregation Subsystem (1) Central database store Content Subsystem (0 or 1) Holds machine readable security policies Task Manager Subsystem (1) Orchestrates query responses Collection Subsystem (o or more) EXTERNAL SYSTEMS Provides data feeds

Continuous Monitoring Instance Model (Organizations may have multiple CM instances) CM System Instance Model Situational Awareness Capability Collection Analysis / Risk Scoring Presentation / Reporting Scoring Engine Data Deconfliction Dashboard Engine Reporting Engine External systems instrumented for CM integration Data Aggregation Task Manager Metrics Database Database of Findings Query Orchestrator Collection Controller (notional) Metadata Repository (notional) Asset Inventory Inter-tier Reporting Inter-tier Queries (notional) Content Benchmarks, Baselines, and Enumerations

Hierarchical Federated Architecture Large organizations will have more than one CM instance CM instances are usually arranged in a logical hierarchy Aggregated reports travel up the tree Data calls and configuration requirements travel down the tree Often CM instances have a degree of autonomy resulting in a federated style of communication Each instance may have approval authority on directives from higher levels Lateral communication in the tree is also possible

Section 3: Implementation Design Level Interface Specifications Communication Models Derived Test Requirements

CM Instance Interfaces Interface and Payload Specifications: Existing Current Focus Proprietary/ Future Focus

Notional Interface Overview: I8 Interfaces: Service Oriented Architecture WSDL direct connection Enterprise Service Bus Other interfaces?? XML communication envelope: ARF XML payload options: Need to define standards-based payload(s) to support all collector types System configuration management Anti-virus Web vulnerability scanner Database vulnerability scanner Unauthenticated vulnerability scanner Authenticated vulnerability and patch scanner Authenticated configuration scanner Network configuration management tools Federal Desktop Core Configuration scanner Leverage Security Content Automation Protocol XML (e.g., XCCDF results, OVAL results) Allow vendor proprietary XML??

Multi-instance CM Interfaces This view shows the relationship between CM instances These interfaces enable the hierarchical federated CM architecture CM System Instance X I12 Content Benchmarks, Baselines, and Enumerations CM System Instance Y I10 (Predefined views) Query Orchestrator Inter-tier Reporting Task Manager Task Manager Collection Controller (notional) Inter-tier Queries (notional) I11 (Operational queries) Interface and Payload Specifications: Existing Current Focus Proprietary/ Future Focus Content Benchmarks, Baselines, and Enumerations Query Orchestrator Inter-tier Reporting Collection Controller (notional) Inter-tier Queries (notional)

Notional Interface Overview: I10 Interfaces: Service Oriented Architecture Web Services Description Language (WSDL) direct connection Enterprise Service Bus Other interfaces?? XML communication envelope: Asset Reporting Format (ARF) XML payload options: USG XML schema data (based on USG agreed upon metrics) SCAP XML (e.g., XCCDF results, OVAL results) Vendor proprietary XML Use of proprietary payloads may require additional integration and loss of plug and play compatibility

Section 4: CM Maturity Models How do we grow up? Transitioning to more effective approaches

Notional Maturity Model for Continuous Monitoring from a technical maturity perspective Level 0: Manual Assessment Level 1: Automated Scanning Level 2: Standardized Measurement Level 3: Continuous Monitoring Level 4: Adaptable Continuous Monitoring Level 5: Continuous Management

CM Maturity Levels 0-3 Level 0: Manual Assessment Security assessments lack automated solutions Level 1: Automated Scanning Decentralized use of automated scanning tools Either provided centrally or acquired per system Reports generated independently for each system Level 2: Standardized Measurement Reports generated independently for each system Enable use of standardized content (e.g., USGCB/FDCC, CVE, CCE) Level 3: Continuous Monitoring Reports generated independently for each system Federated control of automated scanning tools Diverse security measurements aggregated into risk scores Requires standard measurement system, metrics, and enumerations Comparative risk scoring is provided to enterprise (e.g., through dashboards) Remediation is motivated and tracked by distribution of risk scores

CM Maturity Levels 4-5 Maturity level 4: Adaptable Continuous Monitoring Enable plug-and-play CM components (e.g., using standard interfaces) Result formats are standardized Centrally initiated ad-hoc automated querying throughout enterprise on diverse devices (e.g., for the latest US-CERT alert) Maturity level 5: Continuous Management Risk remedy capabilities added (both mitigation and remediation) Centrally initiated ad-hoc automated remediation throughout enterprise on diverse devices (with review and approval of individual operating units) Requires adoption of standards based remediation languages, policy devices, and validated tools

Maturity Model Level Characteristics Level 0 Level 1 Level 2 Level 3 Level 4 Level 5 Interfaces Undefined Unused Unused Proprietary Standardized Standardized Security Check Content Format Prose Proprietary Some Standardization Reporting Ad hoc Proprietary and not Integrated Remedies Manual Manual or Proprietary Proprietary and not Integrated Manual or Proprietary Some Standardization Coarse integration / some standardization Manual or Proprietary Fully Standardized Standardized integration Manual or Proprietary Fully Standardized Standardized integration Standardized Automation

Closing Thoughts There exists great momentum surrounding CM (both executive level and grass roots) Dashboards, big easy buttons, aggregated reporting of technical metrics Agencies can leverage their existing security tools to evolve towards an automated CM solution Enhance their own capability and meet upcoming reporting demands Reference architectures Can reduce integration efforts Enable CM plug-and-play component capabilities Product validation and procurement programs can assist with tool adoption of necessary technical specifications Focus agencies on evolving toward the full potential of CM The long term vision will take time and effort, but significant gains are achievable today.

Acknowledgements and Credit Much of this was inspired and encouraged by others Information Security and Identity Management Committee (ISIMC) CM working group DHS Federal Network Security (Cyberscope and CAESARS) NSA Information Assurance Directorate (IAD) NIST Security Content Automation Protocol (SCAP) team MITRE McLean CAESARS team MITRE Bedford SCAP team

Summary and Questions Presenter: Peter Mell NIST Senior Computer Scientist 301-975-5572 peter.mell@nist.gov http://twitter.com/petermmell