Integrated Enterprise-wide Risk Management

Transcription

Integrated Enterprise-wide Risk ManagementOrganization, Mission, and Information Systems ViewInformation System Security AssociationJune 16, 2009Dr. Ron RossComputer Security DivisionInformation Technology LaboratoryNATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY1

The Threat SituationContinuing serious cyber attacks on federal informationsystems, large and small; targeting key federal operationsand assets Attacks are organized, disciplined, aggressive, and wellresourced; many are extremely sophisticated. Adversaries are nation states, terrorist groups, criminals, hackers,and individuals or groups with intentions of compromising federalinformation systems. Effective deployment of malicious software causing significantexfiltration of sensitive information (including intellectual property)and potential for disruption of critical information systems/services.NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY2

Asymmetry of Cyber WarfareThe weapons of choice are— Laptop computers, hand-held devices, cell phones. Sophisticated attack tools and techniquesdownloadable from the Internet. World-wide telecommunication networks includingtelephone networks, radio, and microwave.Resulting in low-cost, highly destructive attack potential.NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY3

Unconventional WisdomNEW RULE: Boundary protection is no longer sufficientagainst high-end threats capable of launching sophisticatedcyber attacks. Complexity of IT products and information systems. Insufficient penetration resistance (trustworthiness)in commercial IT products. Insufficient application of information system andsecurity engineering practices. Undisciplined behavior and use of informationtechnology and systems by individuals.NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY4

The FundamentalsFighting and winning a 21st century cyber war requires21st century strategies, tactics, training, and technologies Integration of information security into enterprise architectures and system lifecycle processes. Common, shared information security standards for unified cyber command. Enterprise-wide, risk-based protection strategies. Flexible and agile selection / deployment of safeguards and countermeasures(maximum tactical advantage based on missions / environments of operation). More resilient, penetration-resistant information systems. Competent, capable cyber warriors.NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY5

Compliance vs. Risk-based Protection“We should not be consumed with countingthe number of dead bolts on the front doorwhen the back door is wide open.”-- AnonymousNATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY6

Risk-Based Protection Enterprise missions and business processes drive securityrequirements and associated safeguards and countermeasuresfor organizational information systems. Highly flexible implementation; recognizing diversity inmissions/business processes and operational environments. Senior leaders take ownership of their security plans includingthe safeguards/countermeasures for the information systems. Senior leaders are both responsible and accountable for theirinformation security decisions; understanding, acknowledging,and explicitly accepting resulting mission/business risk.NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY7

Strategic InitiativesThe Long-term View Build a unified information security framework for thefederal government and support contractors. Integrate information security and privacy requirementsinto enterprise architectures. Employ systems and security engineering techniquesto develop more secure (penetration-resistant)information systems.NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY8

Tactical InitiativesThe Short-term View Update security controls catalog and baselines. Delivery vehicle: NIST Special Publication 800-53, Revision 3 Develop enterprise-wide risk management guidance. Delivery vehicle: NIST Special Publication 800-39 Restructure the current certification and accreditationprocess for information systems. Delivery vehicle: NIST Special Publication 800-37, Revision 1 Provide more targeted guidance on risk assessments. Delivery vehicle: NIST Special Publication 800-30, Revision 1NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY9

Change the Culture Strong, top-level senior leadership commitment. Understand adversary capabilities, types of threats and attacks. Recognize information security is essential for mission success. Employ more discipline and structure in how information systemsare implemented and used. Implement least privilege, least functionality. Require corporate and individual responsibility and accountability. Develop a cyber warrior mentality. Obtain situational awareness during day-to-day agency operations. Require ongoing monitoring of people, processes, and technologies.NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY10

Risk Management Hierarchy Multi-tiered Risk Management ApproachImplemented by the Risk Executive FunctionEnterprise Architecture and SDLC FocusFlexible and Agile ImplementationSTRATEGIC RISKFOCUSLEVEL 1OrganizationNISTSP 800-39LEVEL 2Mission / Business ProcessLEVEL 3TACTICAL RISKFOCUSInformation SystemNATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY11

Risk Management Hierarchy Risk Executive Function(Oversight and Governance)Risk Management StrategyLEVEL 1Organization Risk Assessment MethodologiesRisk Mitigation ApproachesRisk ToleranceRisk Monitoring ApproachesLinkage to ISO/IEC 27001NISTSP 800-39LEVEL 2Mission / Business ProcessLEVEL 3Information SystemNATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY12

Risk Management HierarchyNISTSP 800-39LEVEL 1OrganizationRisk Management StrategyLEVEL 2Mission / Business Process Mission / Business ProcessesInformation FlowsInformation CategorizationInformation Protection StrategyInformation Security RequirementsLinkage to Enterprise ArchitectureLEVEL 3Information SystemNATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY13

Risk Management HierarchyLEVEL 1OrganizationNISTSP 800-37LEVEL 2Mission / Business ProcessRisk Management FrameworkLEVEL 3Information SystemNATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGYLinkage to SDLCInformation System CategorizationSelection of Security ControlsSecurity Control Allocationand Implementation Security Control Assessment Risk Acceptance Continuous Monitoring 14

The Central QuestionFrom Two Perspectives Security Capability PerspectiveWhat security capability is needed to defend against aspecific class of cyber threat, avoid adverse impacts,and achieve mission success? (REQUIREMENTS DEFINITION) Threat Capability PerspectiveGiven a certain level of security capability, what class ofcyber threat can be addressed and is that capabilitysufficient to avoid adverse impacts and achieve missionsuccess? (GAP ANALYSIS)NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY15

Risk Management FrameworkStarting PointFIPS 199 / SP 800-60CATEGORIZEInformation SystemSP 800-37 / SP 800-53AMONITORSecurity StateContinuously track changes to theinformation system that may affectsecurity controls and reassesscontrol effectiveness.SP 800-37Define criticality/sensitivity ofinformation system according topotential worst-case, adverseimpact to mission/business.FIPS 200 / SP 800-53SELECTSecurity ControlsSecurity Life CycleSelect baseline security controls;apply tailoring guidance andsupplement controls as neededbased on risk assessment.SP 800-39SP 800-70AUTHORIZEIMPLEMENTInformation SystemSecurity ControlsDetermine risk to organizationaloperations and assets, individuals,other organizations, and the Nation;if acceptable, authorize operation.SP 800-53AASSESSSecurity ControlsImplement security controls withinenterprise architecture using soundsystems engineering practices; applysecurity configuration settings.Determine security control effectiveness(i.e., controls implemented correctly,operating as intended, meeting securityrequirements for information system).NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY16

Security Control Selection STEP 1: Select Baseline Security Controls(NECESSARY TO COUNTER THREATS) STEP 2: Tailor Baseline Security Controls(NECESSARY TO COUNTER THREATS) STEP 3: Supplement Tailored Baseline(SUFFICIENT TO COUNTER ecurity ControlsSecurity ControlsRisk ManagementFrameworkAUTHORIZEIMPLEMENTInformation SystemSecurity ControlsASSESSSecurity ControlsNATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY17

Cyber LOWTHREAT LEVEL 5CYBER PREP LEVEL 5THREAT LEVEL 4CYBER PREP LEVEL 4THREAT LEVEL 3CYBER PREP LEVEL 3THREAT LEVEL 2CYBER PREP LEVEL 2THREAT LEVEL 1CYBER PREP LEVEL 1HIGHDefenderSecurityCapabilityLOWAn increasingly sophisticated and motivatedthreat requires increasing preparedness NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY18

Dual Protection Strategies Boundary ProtectionPrimary Consideration: Penetration ResistanceAdversary Location: Outside the Defensive PerimeterObjective: Repelling the Attack Agile DefensePrimary Consideration: Information System ResilienceAdversary Location: Inside the Defensive PerimeterObjective: Operating while under AttackNATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY19

Agile Defense Boundary protection is a necessary but not sufficientcondition for Agile Defense Examples of Agile Defense measures: Compartmentalization and segregation of critical assetsTargeted allocation of security controlsVirtualization and obfuscation techniquesEncryption of data at restLimiting of privilegesRoutine reconstitution to known secure stateBottom Line: Limit damage of hostile attack while operating in a (potentially)degraded mode NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY20

RISK EXECUTIVE FUNCTIONEnterprise-wide Oversight, Monitoring, and Risk Management StrategyArchitecture DescriptionOrganizational InputsArchitecture Reference ModelsSegment and Solution ArchitecturesMission and Business ProcessesInformation System BoundariesLaws, Directives, Policy GuidanceStrategic Goals and ObjectivesPriorities and Resource AvailabilitySupply Chain POAMCommon Controls(Inherited by Information Systems)POAMNATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGYSPSARAuthorizationDecisionPOAMSP: Security PlanSAR: Security Assessment ReportPOAM: Plan of Action and Milestones21

A Unified FrameworkFor Information SecurityThe Generalized enceCommunityDepartmentof DefenseFederal Civil AgenciesThe undational Set of Information Security Standards and Guidance Standardized risk management processStandardized security categorization (criticality/sensitivity)Standardized security controls (safeguards/countermeasures)Standardized security assessment proceduresStandardized security authorization processNational security and non national security information systemsNATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY22

Key Risk Management Publication NIST Special Publication 800-53, Revision 3 (Final Public Draft)Recommended Security Controls for Federal Information SystemsProjected: May 2009 Updating all material from NIST Special Publication 800-53, Revision 2Incorporating lessons learned from interagency assessment case projectIncorporating material from Draft CNSS Instruction 1253Incorporating new security controls for advanced cyber threatsIncorporating information security program-level controlsIncorporating threat appendix for cyber preparedness(Separately vetted and added to SP 800-53, Revision 3 when completed)NISTSP 800-53NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY23

Key Risk Management Publication NIST Special Publication 800-37, Revision 1 (Final Public Draft)Applying the Risk Management Framework to Federal Information SystemsProjected: June 2009 Incorporating comments from Initial Public DraftImplementing guideline for Risk Management FrameworkTransforming previous certification and accreditation processIntegrating Risk Management Framework into the SDLCGreater emphasis on ongoing monitoring of information system security stateOngoing security authorizations informed by risk executive functionGreater accountability and assurances for common (inherited) controlsIncreased use of automated support toolsNISTSP 800-37NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY24

Key Risk Management Publication NIST Special Publication 800-39 (Third Public Draft)Managing Enterprise Risk: An Integrated System Life Cycle ApproachProjected: August 2009 Incorporating public comments from NIST Special Publication 800-39,Second Public Draft Incorporating three-tiered risk management approach: organization,mission/business process, and information system views Incorporating cyber preparedness information Providing ISO/IEC 27001 mapping to risk management publicationsNISTSP 800-39NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY25

Key Risk Management Publication NIST Special Publication 800-30, Revision 1 (Initial Public Draft)Guide for Conducting Risk AssessmentsProjected: September 2009 Down scoping current publication from risk management focus to riskassessment focus Providing guidance for conducting risk assessments at each step in theRisk Management Framework Incorporating threat information for cyber preparednessNISTSP 800-30NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY26

Contact Information100 Bureau Drive Mailstop 8930Gaithersburg, MD USA 20899-8930Project LeaderAdministrative SupportDr. Ron Ross(301) 975-5390ron.ross@nist.govPeggy Himes(301) 975-2489peggy.himes@nist.govSenior Information Security Researchers and Technical SupportMarianne Swanson(301) 975-3293marianne.swanson@nist.govDr. Stu Katzke(301) 975-4768skatzke@nist.govPat Toth(301) 975-5140patricia.toth@nist.govArnold Johnson(301) 975-3247arnold.johnson@nist.govMatt Scholl(301) 975-2941matthew.scholl@nist.govInformation and FeedbackWeb: csrc.nist.gov/sec-certComments: sec-cert@nist.govNATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY27

Key Risk Management Publication NIST Special Publication 800-30, Revision 1 (Initial Public Draft) Guide for Conducting Risk Assessments Projected: September 2009 Down scoping current publication from risk management focus to risk assessment focus Providing guidance for conducting risk assessments at each step in the Risk Management Framework