Critical Infrastructure Cybersecurity
Critical Infrastructure Cybersecurity
Infrastructure Cybersecurity
June 2016
[email protected]
National Institute of Standards and Technology (NIST)
About NIST NIST Priority Research Areas
• NIST’s mission is to develop
and promote measurement, Advanced Manufacturing
standards, and technology to
enhance productivity, facilitate IT and Cybersecurity
trade, and improve the quality
of life. Healthcare
• 3,000 employees
Forensic Science
• 2,700 guest researchers
• 1,300 field staff in partner Disaster Resilience
organizations
• Two main locations: Cyber-physical Systems
Gaithersburg, MD and Advanced
Boulder, CO Communications
Improving Critical Infrastructure Cybersecurity
Collect,
Categorize, and Completed – April 08, 2013
Post RFI Identify Common Practices/Themes – May 15, 2013
Responses
Ongoing Engagement:
Identify 3rd Workshop at UCSD – July 2013
Framework
Elements 4th Workshop at UT Dallas – Sept 2013
Open public comment
and review encouraged
and promoted Prepare and 5th Workshop at NC State – Nov 2013
throughout the Publish
Published Framework – Feb 2014
process… Framework
and to this day
5
The Cybersecurity Framework Is for Organizations…
• Of any size, in any sector in (and outside of) the critical infrastructure
• That already have a mature cyber risk management and cybersecurity program
• That don’t yet have a cyber risk management or cybersecurity program
• With a mission of helping keep up-to-date on managing risk and facing
business or societal threats
6
Cybersecurity Framework Components
Aligns industry standards and
Cybersecurity activities and
best practices to the Framework
informative references,
Core in a particular
organized around particular
implementation scenario
outcomes
Supports prioritization and Framework
Framework Enables communication
measurement while Core
Profile of cyber risk across an
factoring in business
organization
needs
Framework
Implementation
Tiers
7
Key Properties of Cyber Risk Management
Risk
Management
Process
External
Par6cipa6on
8
Implementation Tiers
1
2
3
4
Par6al
Risk
Repeatable
Adap6ve
Informed
Risk
The
func)onality
and
repeatability
of
cybersecurity
risk
Management
management
Process
Integrated
Risk
The
extent
to
which
cybersecurity
is
considered
in
broader
Management
risk
management
decisions
Program
External
The
degree
to
which
the
organiza)on
benefits
my
sharing
or
Par6cipa6on
receiving
informa)on
from
outside
par)es
9
9
Intel Adaptation of Implementation Tiers
1
2
3
4
Par6al
Risk
Repeatable
Adap6ve
Informed
People
Whether
people
have
assigned
roles,
regular
training,
take
ini)a)ve
by
becoming
champions,
etc.
Process
NIST
Risk
Management
Process
+
NIST
Integrated
Risk
Management
Program
Technology
Whether
tools
are
implemented,
maintained,
evolved,
provide
effec)veness
metrics,
etc.
Ecosystem
NIST
External
Par9cipa9on
+
Whether
the
organiza)on
understands
its
role
in
the
ecosystem,
including
external
dependencies
with
partners
10
10
Taxonomy
Value
Proposi)on
Plant classification is the placing of known plants into groups or categories
to show some relationship. Scientific classification follows a system of
rules that standardizes the results, and groups successive categories into
a hierarchy.
Value Proposition
• Accurate communication
• Quickly categorize known
• Logically name unknown
• Inherent properties understood based on name
Core
Cybersecurity Framework Component
Func6on
Category
ID
Asset
Management
ID.AM
What
processes
and
Business
Environment
ID.BE
Governance
ID.GV
assets
need
Iden6fy
Risk
Assessment
ID.RA
protec6on?
Risk
Management
Strategy
ID.RM
Access
Control
PR.AC
Awareness
and
Training
PR.AT
Data
Security
PR.DS
What
safeguards
are
Protect
available?
Informa)on
Protec)on
Processes
&
Procedures
PR.IP
Maintenance
PR.MA
Protec)ve
Technology
PR.PT
Anomalies
and
Events
DE.AE
What
techniques
can
Detect
Security
Con)nuous
Monitoring
DE.CM
iden6fy
incidents?
Detec)on
Processes
DE.DP
Response
Planning
RS.RP
What
techniques
can
Communica)ons
RS.CO
contain
impacts
of
Respond
Analysis
RS.AN
incidents?
Mi)ga)on
RS.MI
Improvements
RS.IM
Recovery
Planning
RC.RP
What
techniques
can
Recover
Improvements
RC.IM
12
restore
capabili6es?
Communica)ons
RC.CO
Core Subcategory Informative References
Cybersecurity Framework Component ID.BE-‐1:
The
COBIT
5
APO08.04,
APO08.05,
organiza)on’s
role
in
APO10.03,
APO10.04,
APO10.05
Func6on
Category
ID
the
supply
chain
is
ISO/IEC
27001:2013
A.15.1.3,
A.
Asset
Management
ID.AM
iden)fied
and
15.2.1,
A.15.2.2
Business
Environment
ID.BE
communicated
NIST
SP
800-‐53
Rev.
4
CP-‐2,
SA-‐12
Governance
ID.GV
Iden6fy
ID.BE-‐2:
The
COBIT
5
APO02.06,
APO03.01
Risk
Assessment
ID.RA
organiza)on’s
place
in
NIST
SP
800-‐53
Rev.
4
PM-‐8
Risk
Management
ID.RM
cri)cal
infrastructure
Strategy
and
its
industry
sector
Access
Control
PR.AC
is
iden)fied
and
Awareness
and
Training
PR.AT
communicated
Data
Security
PR.DS
ID.BE-‐3:
Priori)es
for
COBIT
5
APO02.01,
APO02.06,
Protect
Informa)on
Protec)on
organiza)onal
APO03.01
PR.IP
Processes
&
Procedures
mission,
objec)ves,
ISA
62443-‐2-‐1:2009
4.2.2.1,
Maintenance
PR.MA
and
ac)vi)es
are
4.2.3.6
Protec)ve
Technology
PR.PT
established
and
NIST
SP
800-‐53
Rev.
4
PM-‐11,
Anomalies
and
Events
DE.AE
communicated
SA-‐14
Security
Con)nuous
ID.BE-‐4:
ISO/IEC
27001:2013
A.11.2.2,
A.
Detect
Monitoring
DE.CM
Dependencies
and
11.2.3,
A.12.1.3
Detec)on
Processes
DE.DP
cri)cal
func)ons
for
NIST
SP
800-‐53
Rev.
4
CP-‐8,
PE-‐9,
Response
Planning
RS.RP
delivery
of
cri)cal
PE-‐11,
PM-‐8,
SA-‐14
Communica)ons
RS.CO
services
are
Respond
Analysis
RS.AN
established
Mi)ga)on
RS.MI
ID.BE-‐5:
Resilience
COBIT
5
DSS04.02
Improvements
RS.IM
requirements
to
ISO/IEC
27001:2013
A.11.1.4,
A.
Recovery
Planning
RC.RP
support
delivery
of
17.1.1,
A.17.1.2,
A.17.2.1
Recover
Improvements
RC.IM
cri)cal
services
are
NIST
SP
800-‐53
Rev.
4
CP-‐2,
13
Communica)ons
RC.CO
established
CP-‐11,
SA-‐14
13
Profile
Cybersecurity Framework Component
15
Building a Profile
A Profile Can be Created in Three Steps
Mission
1
Objective
A
B
C
Subcategory
1
Opera6ng
Cybersecurity
2
Requirements
2
Methodologies
3
3
Guidance
and
methodology
Legisla)on
…
on
implemen)ng,
Regula)on
98
managing,
and
Internal
&
External
Policy
Best
Prac)ce
monitoring
16
Set Priorities
Use Cybersecurity Framework Profiles to determine Priorities
Subcats
Requirements
1
High
High
High
2
Mod
High
Mod
Mod
3
Low
Low
Low
...
...
...
...
...
98
Mod
Mod
Business
Law
Regula)on
Threat
Profile
Objec)ves
Sta9c
Dynamic
17
Resource and Budget Decisioning
What Can You Do with a CSF Profile
Year
1
Year
2
As-‐Is
To-‐Be
To-‐Be
19
Profile Ecosystem
TAXONOMY
REQUIREMENTS
PRIORITIES
Cybersecurity Guidance
for Small Firms
New Jersey
• Developed a cybersecurity framework that aligns controls and
procedures with Framework 26
Roadmap Items
Technical Privacy
Standards Authenication
Cybersecurity
International
Aspects, Impacts,
Framework
Conformity
Assessment
and Alignment
Data Analytics
27
Framework Roadmap Items
Authentication
Automated Indicator Sharing
Conformity Assessment
Cybersecurity Workforce
Data Analytics
Federal Agency Cybersecurity Alignment
International Aspects, Impacts, and Alignment
Supply Chain Risk Management
Technical Privacy Standards 28
Recent Framework Related Policy and Legislation
31
Recent and Near-Term Framework Events
RFI: Views on the Framework for Improving
Dec
Critical Infrastructure Cybersecurity
11, 2
Questions focused on: experiences, update,
governance, and best practice sharing
15 0
RFI Analysis
Marc
Summary posted that includes analysis of topic
h 201
trends in RFI responses and continued discussion
topics for Workshop break-out sessions
NIST
April ithersbu
Cybersecurity Framework Workshop 2016
Ga
Goal: Highlight examples of Framework use, gather
6-7, 2
feedback on timing and content of an update,
016
governance, and best practice sharing
rg
Workshop Summary
May
Publication on the topics that evoked the most
20
consensus and dissonance at Cybersecurity
16
Framework Workshop 2016
32
RFI Questions and Workshop Discussion Threads
Request
for
Informa6on
11
December
2015
–
23
February
2016
hlps://www.federalregister.gov/ar)cles/2015/12/11/2015-‐31217/views-‐on-‐the-‐framework-‐for-‐
improving-‐cri)cal-‐infrastructure-‐cybersecurity
RFI
Responses:
hlp://csrc.nist.gov/cyberframework/rfi_comments_02_09_16.html