V & V of Enterprise Safety and Information Security



Similar documents
To All Users: Air Traffic Organization Safety and Technical Training

FAA WILLIAM J. HUGHES TECHNICAL CENTER ATLANTIC CITY INTERNATIONAL AIRPORT, NEW JERSEY 08405

Human Error and Safety Federal Aviation Human Error and Safety Administration Risk Analysis HESRA

Federal Aviation Administration

U.S. DEPARTMENT OF TRANSPORTATION FEDERAL AVIATION ADMINISTRATION. Air Traffic Organization Policy

System Wide Information Management (SWIM) Service Lifecycle Management Processes Guide

How To Write A Cybersecurity Framework

FAA Cloud Computing Strategy

Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

To All Users: Air Traffic Organization Safety and Technical Training

Air Traffic Organization Safety Management System Manual - Version 2.1

AF Life Cycle Management Center

Cybersecurity in Test & Evaluation. James S. Wells Deputy Director, Cyberspace & HSE Programs Office of Test & Evaluation

Cybersecurity for Medical Devices

CONTENTS. Preface. Acknowledgements. 1. Introduction and Overview 1 Introduction 1 Whatis the CMMI"? 2 What the CMMI* is Not 3 What are Standards?

Aviation Safety Policy. Aviation Safety (AVS) Safety Management System Requirements

FREQUENTLY ASKED QUESTIONS

IG ISCM MATURITY MODEL FOR FY 2015 FISMA FOR OFFICIAL USE ONLY

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

Suzanne B. Schwartz, MD, MBA Director Emergency Preparedness/Operations & Medical Countermeasures (EMCM Program) CDRH/FDA

Safety Management Challenges for Aviation Cyber Physical Systems

An Architectural Approach for Command, Coordination, and Communications Capabilities Assessment

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

Concept of Operations for Line of Business Initiatives

FAA Cloud Computing Strategy

Enterprise Security Architecture for Cyber Security. M.M.Veeraragaloo 5 th September 2013

Risk Management and Cybersecurity for Devices that Contain Software. Seth D. Carmody, Ph.D. 12 th Medical Device Quality Congress March 18, 2015

Requirements Management John Hrastar

Project Plan for <project name>

Get Confidence in Mission Security with IV&V Information Assurance

A Guide to Successfully Implementing the NIST Cybersecurity Framework. Jerry Beasley CISM and TraceSecurity Information Security Analyst

National Cyber Security Framework and Protocol. for securing digital information in networked critical infrastructures and communications

SCADA Business Continuity and Disaster Recovery. Presented By: William Biehl, P.E (mobile)

How To Protect Your Data From Being Hacked

Project Type Guide. Project Planning and Management (PPM) V2.0. Custom Development Version 1.1 January PPM Project Type Custom Development

Regulatory Compliance Management for Energy and Utilities

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

NICE and Framework Overview

Reduce Medical Device Compliance Costs with Best Practices.

Enterprise Security Tactical Plan

Practice Overview. REQUIREMENTS DEFINITION Issue Date: <mm/dd/yyyy> Revision Date: <mm/dd/yyyy>

Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order Improving Critical Infrastructure Cybersecurity

Overview of the System Engineering Process. Prepared by

Overview. FedRAMP CONOPS

IoT & SCADA Cyber Security Services

PHASE 5: DESIGN PHASE

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C

Chapter 10. System Software Safety

13. Lifeline utilities

Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) Project

From Chaos to Clarity: Embedding Security into the SDLC

MKS Integrity & CMMI. July, 2007

CS 2 SAT: The Control Systems Cyber Security Self-Assessment Tool

ITSM Maturity Model. 1- Ad Hoc 2 - Repeatable 3 - Defined 4 - Managed 5 - Optimizing No standardized incident management process exists

National Initiative for Cyber Security Education

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC

FAA Office of Airports Safety Management System (SMS)

Department of Management Services. Request for Information

Threat and Hazard Identification and Risk Assessment

Supplemental Tool: Executing A Critical Infrastructure Risk Management Approach

CMS Information Security Risk Assessment (RA) Methodology

AIR TRAFFIC CONTROL. FAA Needs a More Comprehensive Approach to Address Cybersecurity As Agency Transitions to NextGen

Lessons from Defending Cyberspace

COLLABORATIVE APPROACHES IN DEVELOPING ENVIRONMENTAL AND SAFETY MANAGEMENT SYSTEMS FOR COMMERCIAL SPACE TRANSPORTATION

Nuclear Regulatory Commission Computer Security Office CSO Office Instruction

National Airspace System Security Cyber Architecture

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

Investment Analysis using the Portfolio Analysis Machine (PALMA 1 ) Tool by Richard A. Moynihan 21 July 2005

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

10. Lifeline utilities

U.S. Nuclear Regulatory Commission

FAA Air Traffic Organization Program Management Organization (PMO) and Program Control

Which cybersecurity standard is most relevant for a water utility?

Cyber Security and Privacy - Program 183

INFORMATION SECURITY

Instructor Guide. Train-the-Trainer

How To Understand And Manage Cybersecurity Risk

Lecture 20: Software Evolution

CDC UNIFIED PROCESS PRACTICES GUIDE

For: Safety Management System (SMS) Pilot Project Participants and Voluntary Implementation of SMS Programs

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology

Schedule of Construction. Project Management and Control

FFIEC Cybersecurity Assessment Tool

Defining a Secure Mobile Framework Architecture at DHA

Critical Infrastructure Security and Resilience

Ohio Homeland Security Strategic Plan

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South

Cyber Education triangle clarifying the fog of cyber security through targeted training

Federal Aviation Administration Standard Work Breakdown Structure (WBS) Version 3.1

NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

FTA Technology 2009 IT Modernization and Business Rules Extraction

Transcription:

V & V of Enterprise Safety and Information Security Presented to 9th Annual Verification & Validation Summit September 17-18, 2014 James Daum Safety and Information Security Division Mgr, ANG-B3 NAS Systems Engineering

My Lesson in V&V 2

Current State Implementation of The Safety Management System has increased the awareness of SRM AMS requirements for SRMDs have improved the identification of hazards and the mitigations that have the potential to reduce safety risk With few exceptions SRMDs become shelf ware that have limited effect on reducing NAS safety risk Traceability of safety requirements to SRMDs is required to conduct V&V that results in accurate assessment of system residual risk Automation is required to provide associative links and relationships to V&V Enterprise Requirements

Integrated NAS Capability NAS OIs COs Capabilities Concepts Legacy Systems (NCPs) Programs (AMS) Policies Procedures (DCPs) FARs Rules (Rule Making) Etc 4

Integrated Safety Risk Management (ISRM) Hazard Pyramid NAS Hazards OI Hazards Capability Hazards System Hazards Program Hazards Operational Hazards System Hazards Etc 5

Integrated Safety Risk Management Requirements Pyramid NAS Requirements (NAS RD) OI Requirements Mission Assurance Capability Requirements System Requirements Program Requirements Operational Requirements Functional Requirements Etc V&V 6

NAS Simplified Architecture 7

Integrated Safety in a Complex NAS Vertical HTVs EA NPE NSIP Horizontal HTVs EA Meta-Model Temporal HTVs HESRA 8 ISAM ISSAs

Enhanced EA Safety Products Safety Meta-Model: Establishes needed relationship between NAS EA elements and safety data. NAS EA is central to supporting integrated SRM. Safety Meta-Model implementation/instantiation is key to developing HTVs. Hazard Traceability View (HTV): System safety tool to graphically depict hazard information to stakeholders as input to planned safety analysis efforts. Conveys identified safety issues across associative, dependent, and/or interacting systems that may eventually be categorized as hazards. Conveys potential gaps in safety analysis by integrating across three planes: Vertical Hierarchical. Enterprise level system-of-systems safety risk and requirements allocated down to programs. Horizontal Across organizations, programs, systems, and functions. Temporal Across program/system implementation timelines. 9

Enhanced EA Safety Products Integrated System Safety Assessment (ISSA): A broad look at safety issues to ensure Integrated Safety Risk Management (ISRM) accountability within system acquisitions as well as other planned NAS changes Early and iterative identification of crossorganizational safety hazards at all implementation levels Improves the ability to manage, minimize or eliminate safety risk, strengthening the overall safety process for system acquisitions as well as for other planned NAS changes (e.g. procedural or rulemaking) Basis for Administrator's Strategic Initiative of Risk Based Decision Making (RBDM) for Planned Changes 10

Safety Hazards V&V Flow Diagram (current linkages in black) IARD CRD IID FID IA SI Gaps in Red ISD SMS CONOPS ISSA OSA CSA PHA SRMTS PSP -SHA -SSHA -OSHA SAR -SSAR doc NAS RD pprd Updated PRD fprd SIR Spec Sys/ Service IOA ACQUISITION Functional Analysis Updates Functional Analysis APS FAA Spec PIR Shortfall Analysis BCA R ISPD New Hazards TEST TEMP Test Plans Test Conduct/ reporting

V&V for Enterprise Safety Hazards that effect integrated capabilities must be mitigated via enterprise safety requirements are allocated to multiple systems, services, and operations Traceability of allocated requirements is necessary to be able to V&V enterprise requirements (Hazard to Performance) Techniques and processes are needed to V & V enterprise requirements and assess the ability of the integrated capabilities to provide mission assurance 12

State of NextGen Security Environment NextGen introduces higher cyber security risk environment to NAS Incident occurrence is increasing at an alarming rate 13

State of Legacy NAS Information System Security (ISS) 14

State of Aviation Information System Security (ISS) 15

Enterprise Information System Security 16

Enterprise ISS Architecture PROTECT DETECT IDENTIFY Secured NAS 0 1 0 1 0 1 0 1 1 R& D RECOVER RESPOND 17

NextGen Cyber Test Facility (CyTF) 18

CyTF Objectives Provide security evaluation and research services strengthening NextGen information security in a Research and Development (R&D) environment Provide an extensible and flexible cybersecurity R&D environment to evaluate NAS enhancements Establish the cybersecurity test facility without effecting the availability and safety of operating NAS services Provide cost-effective, state-of-the-art cyber-test facility 19

V&V for Enterprise Security Cyber security requirements are implemented as system, hybrid, or common controls A descriptive security architecture is needed to identify implementation of security controls and existence of security vulnerabilities Techniques and processes are needed to V & V security requirements and assess the resiliency and mission assurance of NAS Information Security 20

How do we achieve success Continue to identify enterprise requirements and develop traceability from source of the requirements to operational performance metrics Collaborate to develop techniques and processes to V&V enterprise requirements and assess NAS mission assurance Questions: James Daum James.Daum@faa.gov 21