Framework Version 1.1 Overview
Framework Version 1.1 Overview
Critical Infrastructure
Cybersecurity
April 2018
[email protected]
Objective and Agenda
Objective: Convey Cybersecurity Framework use,
while explaining features added in Version 1.1
• Charter
• Users
• Attributes, Components, &
Approaches
• Draft Roadmap Version 1.1
• Framework Focus Areas
• Web Site
• Update Process
2
National Institute of Standards and Technology
About NIST NIST Priority Research Areas
• Agency of U.S. Department of
Commerce Advanced Manufacturing
• NIST’s mission is to develop
IT and Cybersecurity
and promote measurement,
standards and technology to
enhance productivity, facilitate Healthcare
trade, and improve the quality
of life. Forensic Science
• Federal, non-regulatory agency Disaster Resilience
around since 1901
NIST Cybersecurity
Cyber-physical Systems
• Cybersecurity since the 1970s
• Computer Security Resource Advanced
Center – csrc.nist.gov Communications
3
Cybersecurity Framework Current Charter
Improving Critical Infrastructure Cybersecurity
February 12, 2013 December 18, 2014
“It
is the policy of the United States to Amends the National Institute of Standards and
Technology Act (15 U.S.C. 272(c)) to say:
enhance the security and resilience of
the Nation’s critical infrastructure and “…on an ongoing basis, facilitate and
to maintain a cyber environment that support the development of a
encourages efficiency, innovation, and voluntary, consensus-based,
economic prosperity while promoting industry-led set of standards,
safety, security, business guidelines, best practices,
confidentiality, privacy, and civil methodologies, procedures, and
liberties” processes to cost-effectively reduce
cyber risks to critical infrastructure”
5
Version 1.0 and 1.1 Are Fully Compatible
Framework for Improving Critical Infrastructure Cybersecurity
9
9
Core
A Catalog of Cybersecurity Outcomes
Function
What processes and
assets need Identify • Understandable by
protection?
everyone
What safeguards are • Applies to any type of
Protect
available? risk management
What techniques can
• Defines the entire
Detect
identify incidents? breadth of
What techniques can cybersecurity
contain impacts of Respond
incidents? • Spans both prevention
What techniques can and reaction
Recover
restore capabilities?
10
Core
A Catalog of Cybersecurity Outcomes
Function Category
Asset Management
What processes and Business Environment
assets need Governance
Identify Risk Assessment
protection?
Risk Management Strategy
Supply Chain Risk Management1.1
Identity Management, Authentication and
Access Control1.1
Awareness and Training
What safeguards are Data Security
Protect
available? Information Protection Processes & Procedures
Maintenance
Protective Technology
Anomalies and Events
What techniques can
Detect Security Continuous Monitoring
identify incidents? Detection Processes
Response Planning
What techniques can Communications
contain impacts of Respond Analysis
Mitigation
incidents?
Improvements
Recovery Planning
What techniques can
Recover Improvements
restore capabilities? Communications
11
Core – Example1.1
Cybersecurity Framework Component
12
Core – Example1.1
Cybersecurity Framework Component
13
Core – Example
Cybersecurity Framework Component
14
1.1
Profile
Customizing Cybersecurity Framework
Business
1 Objectives
Objective 1
Objective 2
Objective 3
Cybersecurity Technical
2 Requirements
Subcategory
Environment 3
1
Legislation 2 Threats
Regulation Vulnerabilities
…
Internal & External Policy 108
Operating
Methodologies
Controls Catalogs
16
Technical Guidance
Framework Seven Step Process
Gap Analysis Using Framework Profiles
Year 1 Year 2
As-Is
To-Be To-Be
18
Resource and Budget Decisioning
Framework supports operating decisions and improvement
Year 1 Year 2
As-Is
To-Be To-Be
1.1
1.1
•Internal
•Supply
Chain
20
Operate
Use Cybersecurity Framework Profiles to distribute and organize labor
21
Cyber SCRM Taxonomy1.1
Framework for Improving Critical Infrastructure Cybersecurity Version 1.1
• Simple Supplier-Buyer
model
• Technology minimally
includes IT, OT, CPS,
IoT
• Applicable for public
and private sector,
including not-for-
profits
• Aligns with Federal guidance
Supply Chain Risk
Management Practices for
Federal Information Systems
and Organizations (Special
Publication 800-161) 22
Self-Assessing Cybersecurity Risk1.1
Framework for Improving Critical Infrastructure Cybersecurity Version 1.1
23
Roadmap Concepts
Roadmap to Improving Critical Infrastructure Cybersecurity
The Roadmap:
• identifies key areas of development, alignment, and
collaboration
• provides a description of activities related to the Framework
11
Proposed Roadmap Topics
Draft Roadmap for Improving Critical Infrastructure Cybersecurity Version 1.1
CyberSecure My
Business
National Cyber Security
Alliance
Small Business
Starter Profiles
NIST Framework
26
Team
International Use
Framework for Improving Critical Infrastructure Cybersecurity
Bulk Liquid
Transport Profile
U.S. Coast Guard
31
The Framework Web Site
www.nist.gov/cyberframework
32
Self-Help Web Materials
www.nist.gov/cyberframework
33
Self-Help Web Materials
www.nist.gov/cyberframework
34
Resources
https://www.nist.gov/cyberframework/framework-resources-0
General Resources
sorted by User Group:
• Critical Infrastructure
• Small and Medium
Business
• International
• Federal
• State Local Tribal
Territorial Governments
• Academia
• Assessments & Auditing
• General
Over 150 Unique
Resources for Your
Understanding and Use! 35
Resources - State & Local
https://www.nist.gov/cyberframework/state-local-tribal-and-territorial-resources
New Jersey
• Developed a cybersecurity framework that aligns controls and
procedures with Framework 36
Recent NIST Work Products
https://www.nist.gov/cyberframework/framework-resources-0
Manufacturing Profile
NIST Discrete Manufacturing
Cybersecurity Framework Profile
Self-Assessment Criteria
Baldrige Cybersecurity
Excellence Builder
Maritime Profile
U.S. Coast Guard Bulk Liquid
Transport Profile
37
Resources
https://www.nist.gov/cyberframework/framework-resources-0
NIST Special
Publications
Computer Security
Resource Center
800 Series @ csrc.nist.gov
National Cybersecurity
Center of Excellence
1800 Series @ nccoe.nist.gov
39
Online Informative References
https://www.nist.gov/cyberframework/informative-references
40
Core – Example1.1
Cybersecurity Framework Component
41
Relationship Types
Online Informative References
F
F R F R F&R F R
Key
Framework – blue
Reference Document - red
42
Continued Improvement of Critical
Infrastructure Cybersecurity
Update Activities Engagement
Request for Information – Views on the Framework for 105 Responses
Improving Critical Infrastructure Cybersecurity – Dec 2015
7th Workshop – Apr 2016 653 Physical Attendees, 140
Online Attendees
Draft 1 – Framework Version 1.1 – Released Jan 2017 Approx. 42,000+ downloads
As of 4/27/18
Request for Comment – Proposed update to the 129 Responses
Framework for Improving Critical Infrastructure
Cybersecurity – Jan 2017
8th Workshop – May 2017 517 Physical Attendees, 1528
Online Attendees
Draft 2 – Framework Version 1.1 – Released Dec 2017 Approx. 32,000+ downloads
As of 4/27/18
Request for Comment – Cybersecurity Framework Version 89 Responses
1.1 – Draft 2 – Dec 2017
Framework Version 1.1 – Release April 2018 Approx. 27,000+ downloads
thus far 43
Continued Improvement
Living Document Process
https://www.nist.gov/cyberframework/online-learning/update-process
44
Milestones
Three Year Minimum Update Cycle
https://www.nist.gov/cyberframework/online-learning/update-process
New Version?
3 years from last
Final Update
Features List Features List Features List Draft Framework Publish Framework
(Version A) (Version B) (Version C) Update Update
Major Major Major X
Minor Minor Minor
Administrative Administrative Administrative
45
Ways to Help
Stakeholder Recommended Actions
• Additional cybersecurity
resources:
• http://csrc.nist.gov/
• Questions, comments, ideas:
• [email protected]
48
Questions?
49