Capabilities for Cybersecurity Resilience



Similar documents
Capabili'es for Strengthening Cybersecurity Resilience

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

Office of Cybersecurity and Communications (CS&C)

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Effective Information Sharing and Analysis Process

Defending Against Data Beaches: Internal Controls for Cybersecurity

Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

CYBERSPACE SECURITY CONTINUUM

Actions and Recommendations (A/R) Summary

IT Networking and Security

Keyfort Cloud Services (KCS)

Securing the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy.

Microsoft s cybersecurity commitment

Cybersecurity for the C-Level

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

POLICIES TO MITIGATE CYBER RISK

External Supplier Control Requirements

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Securing the Internet of Things

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

Security Issues in Cloud Computing

An Overview of Large US Military Cybersecurity Organizations

SCAC Annual Conference. Cybersecurity Demystified

Cyber Security Metrics Dashboards & Analytics

Critical Controls for Cyber Security.

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Protecting Organizations from Cyber Attack

NATIONAL CYBER SECURITY AWARENESS MONTH

TUSKEGEE CYBER SECURITY PATH FORWARD

DoD Strategy for Defending Networks, Systems, and Data

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

How To Write A Cybersecurity Framework

Data Security Concerns for the Electric Grid

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense

Top 5 Global Bank Selects Resolution1 for Cyber Incident Response.

The Protection Mission a constant endeavor

How To Protect Your Endpoints From Attack

Cybersecurity Enhancement Account. FY 2017 President s Budget

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

DeltaV System Cyber-Security

IT Networking and Security

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks. Alex Leemon, Sr. Manager

RESILIENCE AGAINST CYBER ATTACKS Protecting Critical Infrastructure Information

Verve Security Center

SANS Top 20 Critical Controls for Effective Cyber Defense

Cloud Computing Technologies Achieving Greater Trustworthiness and Resilience

Cybersecurity: What CFO s Need to Know

National Cyber Security Framework and Protocol. for securing digital information in networked critical infrastructures and communications

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Internet threats: steps to security for your small business

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Securing the Network: Cybersecurity Recommendations for Critical Infrastructure and the Global Supply Chain Telecommunications Industry Association

ITL BULLETIN FOR SEPTEMBER 2012 REVISED GUIDE HELPS ORGANIZATIONS HANDLE SECURITY-RELATED INCIDENTS

Today s Cybersecurity Technology: Is Your Business Getting Full Protection?

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Office of Emergency Communications (OEC) Mobile Applications for Public Safety (MAPS)

Program Overview and 2015 Outlook

Cybersecurity for Medical Devices

Cybersecurity: Mission integration to protect your assets

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

How to Secure Your Environment

What Cloud computing means in real life

Incident Response. Six Best Practices for Managing Cyber Breaches.

BlackRidge Technology Transport Access Control: Overview

Enterprise Cybersecurity: Building an Effective Defense

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Eliminating Cybersecurity Blind Spots

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

CYBER SECURITY GUIDANCE

Cyber Security and Privacy - Program 183

Civil Aviation and CyberSecurity Dr. Daniel P. Johnson Honeywell Aerospace Advanced Technology

Exploring the Landscape of Philippine Cybersecurity

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

How are we keeping Hackers away from our UCD networks and computer systems?

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

Is Your IT Environment Secure? November 18, Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting

Nokia Networks. security you can rely on

Practical Steps To Securing Process Control Networks

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

Applying IBM Security solutions to the NIST Cybersecurity Framework

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Supplier Vigilance: A Critical Layer of Defense

Brainloop Cloud Security

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

IG ISCM MATURITY MODEL FOR FY 2015 FISMA FOR OFFICIAL USE ONLY

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Legislative Language

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

SECURITY CONSIDERATIONS FOR LAW FIRMS

Transcription:

Capabilities for Cybersecurity Resilience In the Homeland Security Enterprise May 2012

DHS Cybersecurity Strategy A cyberspace that: Is Secure and Resilient Enables Innovation Protects Public Advances Economic Interests and National Security Resilience Fostering individual, community, and system robustness, adaptability, and capacity for rapid response and recovery Be prepared to maintain critical operations in a degraded environment Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise Focus Area: Strengthening the Cyber Ecosystem 2

What is the Cyber Ecosystem? The cyber ecosystem is global, evolving and includes government and private sector information infrastructure; the interacting persons, processes, data, information and communications technologies; and the environment and conditions that influence their cybersecurity 3

DHS Cyber Ecosystem White Paper The paper explores the idea of a future cyberspace that is: Healthy Resilient Fundamentally more secure Resilience Improve the reliability and resilience of critical infrastructures Sustain agreed upon service levels Automated configuration adjustments in response to trust choices would offer increased reliability and resilience Enabling Distributed Security in Cyberspace: Building a Healthy and Resilient Cyber Ecosystem with Automated Collective Action 4

Physical and Cyber Resiliency Components of the Cyber Ecosystem Physical Supporting Infrastructure (i.e., power, water, etc) Communications Hardware Software Human organizational Cybersecurity Supporting Infrastructure (i.e., power, water, etc) Communications Hardware Software Human organizational Data confidentiality integrity, and availability More Capability Less Capability 5

Strengthening the Cyber Ecosystem Today Many unknown vulnerabilities Incidents propagate at machine speeds and Defenses are manual Many intrusions are undetected Each system is defended independently Inconsistent security policies Users don t follow best practices Attacks increasing in number and virulence Future Security is built in, reducing vulnerabilities Many attacks but less impact Unauthorized activity more quickly identified Automated defenses used appropriately Information sharing; collaborative defense used when appropriate Consistent security practices Near real time responses Ability to learn and adapt defenses in near real time Adversaries will continue to have robust and evolving capabilities 6

Cyber Attacks, Targets, Effects ATTACKS TARGETS EFFECTS Insider Attacks; Social engineering Data and policy Corruption Code Manipulation Malware Worms, viruses Flooding Human Organization Mission Layer App/Session Layer OS/Network Layer Fear & Doubt Confusion Dollar losses Reputation loss Alter Behaviors Inaccuracies Induced Failures Denial of Service Data Exfiltration Backdoor Implants Physical Destruction; Supply Chain HW/Systems Layer Devices & Linkages Malfunctions Performance loss Lost Comms Modified From AF SAB Cyber Report, 2008 7

Cyber Attacks, Targets, Effects PROTECT RESPOND ATTACKS TARGETS EFFECTS Insider Attacks; Social engineering Data and policy Corruption Code Manipulation Malware Worms, viruses Flooding Human Organization Mission Layer App/Session Layer OS/Network Layer Fear & Doubt Confusion Dollar losses Reputation loss Alter Behaviors Inaccuracies Induced Failures Denial of Service Data Exfiltration Backdoor Implants Physical Destruction; Supply Chain DETECT HW/Systems Layer Devices & Linkages Modified From AF SAB Cyber Report, 2008 RECOVER Malfunctions Performance loss Lost Comms 8

Desired Capabilities Protect Security is built in Increased information sharing and collaboration, vertically and horizontally Risk based data management Automated collective protection action when appropriate Tailored trustworthy spaces Moving target Authentication appropriate to use case Increased user awareness and education 9

Desired Capabilities Detect Information sharing & collaboration, vertically and horizontally Continuous monitoring Authentication Built in security Awareness and Education Business rules based Behavior monitoring Situational Awareness 10

Desired Capabilities Respond Increased information sharing, vertically and horizontally Automated collective response action when appropriate Moving Target Attribution Machine learning and evolution Assessment, forensics, and remediation Feedback and Lessons Learned 11

Desired Capabilities Recover Situation awareness, information sharing and collaboration Privacy Machine learning and evolution Interoperability Automated recovery Authentication 12

Desired Cyber Ecosystem Capabilities Automated Identification, Selection, and Assessment of Defensive Actions Authentication Business Rules Based Behavior Monitoring General Awareness and Education Interoperability Machine Learning and Evolution Moving Target Privacy Risk Based Data Management Security Built in Situational Awareness Tailored Trustworthy Spaces 13

Resiliency Must Address these Trends Supply Chain Vulnerabilities Cloud Computing Mobile technologies Bring Your Own Devices (BYOD) Others 14

Common Suppliers of Laptop Components Liquid Crystal Display China, Czech Republic, Japan, Poland, Singapore, Slovak Republic, South Korea, Taiwan Memory China, Israel, Italy, Japan, Malaysia, Philippines, Singapore, South Korea, Taiwan, United States Processor Canada, China, Costa Rica, Ireland, Israel, Malaysia, Singapore, United States, Vietnam Motherboard Taiwan Hard Disk Drive China, Ireland, Japan, Malaysia, Philippines, Singapore, Thailand, United States Source: GAO Report GAO 12 361 15

Threats to the IT Supply Chain Installation of hardware or software containing malicious logic Installation of counterfeit hardware or software Failure or disruption in the production or distribution of critical products Reliance on a malicious or unqualified service provider for the performance of technical services Installation of hardware or software that contains unintentional vulnerabilities Source: GAO Report GAO 12 361 16

Cloud Computing Trends Gartner projects cloud computing to grow 20 percent annually Some estimate 30 percent annually for the next few years Global market for cloud computing services is expected to reach $42 billion by end of 2012 Gartner estimates growth to be $150 billion in 2013 Sources: FCW and Federal News Radio 17

Growth in Mobile Phone Subscriptions Source: ITU World Telecommunications/ICT Indicators database 18

Malware on Your Mobile Phone Number of Mobile Malware Families Mobile Malware Functionality Source: Symantec 19

Bring Your Own Device BYOD Employees bring their own portable computing devices to the workplace for use, often with connectivity to the corporate network Smart phones, Laptops, Tablets, PDAs Users have purchased better technology than their employer can afford to provide Prohibiting BYOD is not necessarily the answer Allowing, but not managing, BYOD is irresponsible 20

Making BYOD Work Employers: Create Policy & Guidance for Acceptable BYOD Use Educate Employees Know when to Say No Use Applications to Lock/Wipe/Locate Devices Secure Messages Control Access Staff up to Support BYOD Source: GCN Employers (continued) Support Multiple Platforms Track Applications and Devices Control patches & updates Use Security Framework Industry: Develop Standards Security frameworks Secure operational environments 21

Next Steps Continue to Evolve Required Cyber Ecosystem Capabilities Cyber Ecosystem RFI to be jointly issued by DHS and NIST Continue automation and information sharing efforts Trusted Automated Exchange of Indicator Information (TAXII) DHS CRADAs Work with R&D communities on cyber requirements Automation Economics of Cyber Security 22

Summary Future Cyber Ecosystem Proactive, not reactive, cyber defenses Automated Collective Action when appropriate Improved resiliency Desired Cybersecurity Capabilities Trends Impacting Cyber Ecosystem Very likely to exacerbate security challenges 23

Backups 24

Define the Layers Human and Organization: The mission is executed at this layer. Mission: Includes mission capabilities such as command and control or weapon systems. Application and Session: Includes applications such as databases and web browsers. Operating System and Network: Protocols and components such as routers and firewalls, along with their associated operating software. Hardware and Systems: Central processing units (CPUs) and storage arrays. Devices and Linkages: Materials and devices that provide the underpinnings of computing devices and networks. This layer includes communication links and electronic devices such as wires, antennas, transistors, and chips. 25

Automated Collective Action The processes in a cyber ecosystem or community of interest (COI) that select (and perhaps formulate) automated courses of action that will be performed by the ecosystem or COI in response to cybersecurity events. Policies, procedures, technology, and a high level of trust are necessary to enable automated collective action. An appropriate level of human intervention might be required to ensure unintended consequences don t result from flawed courses of action. Determining which cybersecurity events are normal and which are unauthorized or malicious remains a major challenge. Cyber equivalent of the human immune system. 26

Capability Maturity at Each Layer Automation; Select ACOAs Authentication Interoperability Build Security In Machine Learning and Evolution Rules Based Behavior Monitor ing Moving Target Privacy Awareness & Education Risk Based Data Mgmt Situational Awareness Tailored Trustworthy Spaces Human Mission Session OS/Net H/W Physical More Capability Less Capability Note: Maturity Levels are Subjective 27

A Future Ecosystem Incorporates Multiple Capabilities within the three Functional Areas of Technology, Process, and People Technology Healthy cyber devices will incorporate standards based authentication, interoperability, automation Business rules based malicious behavior detection, and risk based data management Cyber devices will provide security, affordability, ease of use and administration, scalability, and interoperability Barriers to automated collaboration are based on policy, not technology limitations Process Incentives for information sharing Organize cyber defense so that machines defend against machines and people defend against people Economic based decision process risk based cybersecurity investments People The healthy cyber participants have continuing access to a range of education, training, and awareness opportunities Such as exercises, simulations, and fully immersive learning environments Have validated skills that have been codified for their occupations or positions and strongly proofed cyber identities Foundations of the Cyber Ecosystem Attributes of the Cyber Ecosystem An integrated security operating foundation that is: Cost effective Flexible Interoperable Stable Enables rapid integration of new capabilities from multiple sources Moving target 28