leveraging federal procurement to improve cyber security

21
Leveraging Federal Procurement to Improve Cyber Security Coalition for Government Procurement Security Committee Meeting John M. Gilligan August 5, 2009 1

Upload: john-gilligan

Post on 12-Feb-2017

71 views

Category:

Technology


4 download

TRANSCRIPT

Page 1: Leveraging Federal Procurement to Improve Cyber Security

Leveraging Federal Procurement to Improve Cyber Security

Coalition for Government Procurement Security Committee Meeting

John M. Gilligan

August 5, 2009

1

Page 2: Leveraging Federal Procurement to Improve Cyber Security

Topics

• Cyber Security—Current Situation• Opportunities to Leverage Procurement

Processes and Automation1. “20 Critical Controls”2. Locked down configurations3. Security Content Automation Protocol (SCAP)

• Final thoughts

2

Page 3: Leveraging Federal Procurement to Improve Cyber Security

Cyber Security Today—A New “Ball Game”

• Our way of life and economic prosperity depend on a reliable cyberspace

• Intellectual property is being downloaded at an alarming rate

• Cyberspace is now a key warfare domain• Attacks are increasing at an exponential rate

Cyber Security is a National Security Crisis!3

Page 4: Leveraging Federal Procurement to Improve Cyber Security

Analogy of Current FISMA Implementation

• An ambulance shows up at a hospital emergency room with a bleeding patient

• Hospital gives inoculations for flu, tetanus, shingles, and vaccination updates

• Hospital tests for communicable diseases, high blood pressure, sends blood sample for cholesterol check, gives eye exam and checks hearing

• At some point, doctors address the cause of the bleeding

4OMB Policy Regarding FISMA Results in a Checklist Approach

Page 5: Leveraging Federal Procurement to Improve Cyber Security

Meanwhile, the patient is bleeding to death!!

5

We Need Triage--Not Comprehensive Medical Care

Page 6: Leveraging Federal Procurement to Improve Cyber Security

6

An “Aha” Moment!

• Scene: 2002 briefing by NSA regarding latest penetration assessment of DoD systems

• Objective: Embarrass DoD CIOs for failure to provide adequate security.

• Subplot: If CIOs patch/fix current avenues of penetration, NSA would likely find others

• Realization: Let’s use NSA’s offensive capabilities to guide security investments

Let “Offense Inform Defense”!

Page 7: Leveraging Federal Procurement to Improve Cyber Security

Procurement-Related Cyber Security Initiatives

• 20 Critical Controls (Consensus Audit Guidelines-CAG)

• Locked-down Configurations• Security Content Automation Protocol (SCAP)

7

Page 8: Leveraging Federal Procurement to Improve Cyber Security

“20 Critical Controls”: The Philosophy

• Assess cyber attacks to inform cyber defense – focus on high risk technical areas first

• Ensure that security investments are focused to counter highest threats — pick a subset

• Maximize use of automation to enforce security controls — negate human errors

• Define metrics for critical controls• Use consensus process to collect best ideas

8Focus investments by letting cyber offense

inform defense!

Page 9: Leveraging Federal Procurement to Improve Cyber Security

Approach for developing 20 Critical Controls

• NSA “Offensive Guys”• NSA “Defensive Guys”• DoD Cyber Crime Center (DC3)• US-CERT (plus 3 agencies that were hit

hard)• Top Commercial Pen Testers

• Top Commercial Forensics Teams• JTF-GNO• AFOSI• Army Research Laboratory• DoE National Laboratories• FBI and IC-JTF

9

Prioritize controls to match successful attacks—mitigate critical risks

Identify automation/verification methods and measures Engage CIOs, CISOs, Auditors, and Oversight organizations Align 20 Critical Controls with NIST 800-53 Coordinate with Congress regarding FISMA updates

Engage the best security experts:

Page 10: Leveraging Federal Procurement to Improve Cyber Security

Example--Critical Control #1 Inventory of Authorized and Unauthorized Devices

• Attacker Exploit: Scan for new, unprotected systems• Control:

– QW: Automated asset inventory discovery tool– Vis/Attrib: On line asset inventory of devices with net address,

machine name, purpose, owner– Config/Hygiene: Develop inventory of information assets (incl. critical

information and map to hardware devices)• Automated Support: Employ products available for asset

inventories, inventory changes, network scanning against known configurations

• Evaluation: Connect fully patched and hardened machine to measure response from tools and staff

10

Page 11: Leveraging Federal Procurement to Improve Cyber Security

20 Critical Controls for Effective Cyber Defense (1 of 2)

Critical Controls Subject to Automated Collection, Measurement, and Validation:1. Inventory of Authorized and Unauthorized Devices2. Inventory of Authorized and Unauthorized Software3. Secure Configurations for Hardware and Software on Laptops, Workstations, and

Servers4. Secure Configurations for Network Devices such as Firewalls, Routers, and Switches5. Boundary Defense 6. Maintenance, Monitoring, and Analysis of Security Audit Logs 7. Application Software Security8. Controlled Use of Administrative Privileges9. Controlled Access Based on Need to Know10. Continuous Vulnerability Assessment and Remediation11. Account Monitoring and Control12. Malware Defenses 13. Limitation and Control of Network Ports, Protocols, and Services 14. Wireless Device Control15. Data Loss Prevention

11

Page 12: Leveraging Federal Procurement to Improve Cyber Security

20 Critical Controls for Effective Cyber Defense (2 of 2)

Additional Critical Controls (not directly supported by automated measurement and validation):

16. Secure Network Engineering17. Penetration Tests and Red Team Exercises 18. Incident Response Capability19. Data Recovery Capability20. Security Skills Assessment and Appropriate Training to Fill Gaps

12

Page 13: Leveraging Federal Procurement to Improve Cyber Security

“20 Critical Controls”: Next Steps

• Continue pilots (State, NRC, TSA, Comptroller of the Currency, private sector)

• Establish requirements for automation of controls– Solicit input from tool vendors

• Encourage policy endorsement of 20 Critical Controls (rapid, measurable way to improve security)

• Encourage GSA to award contracts for tools13

Page 14: Leveraging Federal Procurement to Improve Cyber Security

Procurement-Related Cyber Security Initiatives

• 20 Critical Controls (CAG)• Locked-down Configurations• Security Content Automation Protocol (SCAP)

14

Page 15: Leveraging Federal Procurement to Improve Cyber Security

(Partial) Cyber Security Commission Recommendations

• Develop National Strategy for Cyberspace and publish National Cyberspace Doctrine

• Elevate and consolidate authorities for cyberspace (to White House)

• Enhance partnership with private sector• Use federal acquisition authorities to change industry model

• Mandate “locked down” configurations• Require product vendors to self certify compliance with

guidelines• Modernize legal and policy framework• Emphasize strong authentication of identity• Eliminate split between civilian and national security systems• Revise FISMA to use performance-based measures 15

Page 16: Leveraging Federal Procurement to Improve Cyber Security

Procurement-Related Cyber Security Initiatives

• 20 Critical Controls (CAG)• Locked-down Configurations• Security Content Automation Protocol (SCAP)

16

Page 17: Leveraging Federal Procurement to Improve Cyber Security

CIOs are concerned about enterprise IT management

• Cost of poorly managed IT is growing rapidly• Cyber attacks are exploiting weak enterprise

management– Weakest link becomes enterprise “Achilles Heel”– Cyber exploitation now a National Security issue

• High quality IT support requires effective enterprise management

17

SCAP enables effective enterprise IT management and security

Page 18: Leveraging Federal Procurement to Improve Cyber Security

Current SCAP Standards

18

CVECVSS

OVALCCECPE

XCCDF

Software vulnerability management

Configurationmanagement

Compliance management

Assetmanagement

SCAP supports foundational IT management functions

Page 19: Leveraging Federal Procurement to Improve Cyber Security

Specific SCAP Standards

19

CVECVSS

OVAL

CCECPE

XCCDF

Software vulnerability management

Configurationmanagement

Compliance management

Assetmanagement

Identifies vulnerabilitiesScores vulnerability severity Criteria to check presence of

vulnerabilities, configurations, assets

Identifies configuration controls

Language to express configuration guidancefor both automatic and manual vetting

Identifies packages and platforms

SCAP enables enterprise-wide, cross-vendor interoperability and aggregation of data produced by separate tools

Page 20: Leveraging Federal Procurement to Improve Cyber Security

Final Thoughts

• Federal government with industry support can lead global change

• In the near-term we must focus our efforts to make measurable progress

• Automation of security control implementation and enforcement is essential

• A well managed system is a harder target and costs less to operate

20We Need to Stop the Bleeding—Now!

Page 21: Leveraging Federal Procurement to Improve Cyber Security

Contact Information

21

John M. Gilligan

[email protected]

www.gilligangroupinc.com