NIST Cybersecurity Framework

Slides:



Advertisements
Similar presentations
Tenace FRAMEWORK and NIST Cybersecurity Framework Block IDENTIFY.
Advertisements

NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholde r to insert your own image. Cybersecurity.
Overview of Priorities and Activities: Shared Services Canada Presentation to the Information Technology Infrastructure Roundtable June 17, 2013 Liseanne.
<<Date>><<SDLC Phase>>
U.S. General Services Administration Presentation to: Software and Supply Chain Assurance Forum Improving Cybersecurity through Acquisition December 17,
U.S. General Services Administration Presentation to: ACT-IAC Cybersecurity SIG Improving Cybersecurity through Acquisition Emile Monette Senior Advisor.
Strategy 2022: A Holistic View Tony Hayes International President ISACA © 2012, ISACA. All rights reserved.
National Infrastructure Protection Plan
The U.S. Coast Guard’s Role in Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity NIST Feb 2014.
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
The NIST Framework for Cybersecurity
Cybersecurity Framework October 7, 2014
project management office(PMO)
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
Procurement Functions - Service Service Function - Provides client department with procurement services so clients can focus on their core responsibilities.
Complying With The Federal Information Security Act (FISMA)
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
A Security Training Program through Transformational Leadership and Practical Approaches Tanetta N. Isler Federal Information Systems Security Educators’
1 Module 4: Designing Performance Indicators for Environmental Compliance and Enforcement Programs.
Continual Service Improvement Process
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
DOE ASSET MANAGEMENT PLAN
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Proventures reconnect session on Project Portfolio Management (PPM)
FFIEC Cyber Security Assessment Tool
Cyber Risk Management Solutions Fall 2015 Thomas Compliance Associates, Inc
FFIEC Cybersecurity Assessment Tool Maine Credit Union League September 23, 2015 Patrick Truett, Information Systems Officer National Credit Union Administration.
Federal Information Security Management Act (F.I.S.M.A.) [ Justin Killian ]
Financial Services Sector Coordinating Council (FSSCC) 2011 KEY FSSCC INITIATIVES 2011 Key FSSCC Initiatives Project Name: Project Description: All-Hazards.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
SEC 480 assist Expect Success/sec480assistdotcom FOR MORE CLASSES VISIT
Working Group 6: Secure Hardware and Software – Security by Design Deliverable 2 Status Update June 22, 2016 Joel Molinoff, Co-Chair (CBS) Brian Scarpelli,
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
Framework for Improving Critical Infrastructure Cybersecurity
Michael J. Novak ASQ Section 0511 Meeting, February 8, 2017
Proposed Updates to the Framework for Improving Critical Infrastructure Cybersecurity (Draft Version 1.1) March 2017
Article by Caroline Moser
Security Operations Update
BruinTech Vendor Meet & Greet December 3, 2015
Information Security Program
The Cybersecurity Framework
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Cyber Risk Presentation to the Board of Directors
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Data Architecture World Class Operations - Impact Workshop.
Integrated Management System and Certification
Leverage What’s Out There
Cybersecurity Policies & Procedures ICA
HUMAN RESOURCE GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE
TSMO Program Plan Development
Cyber defense management
I have many checklists: how do I get started with cyber security?
8 Building Blocks of National Cyber Strategies
2017 Health care Preparedness and Response Draft Capabilities
I/O Career Development David Hamill November 6, 2018
By Jeff Burklo, Director
Continuity Guidance Circular Webinar
Cybersecurity ATD technical
Data Security and Privacy Techniques for Modern Databases
IT Management Services Infrastructure Services
Security Policies and Implementation Issues
The state of digital supplier risk management: In partners we trust
Presentation transcript:

NIST Cybersecurity Framework Overview and proposed changes in V1.1

About Will Bechtel Director, Technical Services at Online Business Systems Oversee technical security assessment consulting services Background Application development, security consulting, product management Verisign Global Security Consulting, ATT Security Consulting, Qualys, PrevSec Customers: SDGE, SAIC, Scripps, Apple, Microsoft, Nvidia, BofA, Home Depot

NIST Cybersecurity Framework Overview of version 1.0

Audience Technical Practitioners? Managers? Educational? Other? Use NIST CF? Audience

NIST Cybersecurity Framework Established with a 2013 executive order issued by President Obama Voluntary development of a risk-based cybersecurity framework Goal of improving critical infrastructure cybersecurity Apply the principles and best practices of risk management Improving the security and resilience of critical infrastructure *Above is taken directly from NIST

What NCF can do for your organization? #1 #3 Describe your current & desired cybersecurity posture Assess progress toward the desired state #2 #4 Identify and prioritize areas that require improvement Communicate among stakeholders about cybersecurity risk

Why NCF? Easy to understand Concise Many organizations are using it Maps to other standards

Framework Implementation Tiers Framework has 3 parts Framework Core Framework Implementation Tiers Framework Profiles

Framework Categories

NCF Core Concepts Understand your assets and resources IDENTIFY Understand your assets and resources PROTECT Develop and implement the appropriate safeguards DETECT Identify the occurrence of a cybersecurity event Functions provide a high-level, strategic view of the lifecycle of an organization’s management of cybersecurity risk RESPOND Take action for detected cybersecurity event RECOVER Activities to maintain plans for resilience NIST FRAMEWORK RESPOND RECOVER DETECT IDENTIFY PROTECT

NCF Categories and Subcategories INDENTIFY ID: ID.AM Asset Management The data, personnel, devices, systems, and facilities that enable the organization to achieve business purposes are identified and managed consistent with their relative importance to business objectives and the organization’s risk strategy. ID.AM-1: Physical devices and systems within the organization are inventoried. ID.AM-2: Software platforms and applications within the organization are inventoried. ID.AM-3: Organizational communication and data flows are mapped. ID.AM-4: External information systems are catalogued. ID.AM-5: Resources (e.g., hardware, devices, data, time and software) are prioritized based on their classification, criticality, and business value. ID.AM-6: Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established. ID.BE Business Environment The organization’s mission, objectives, stakeholders, and activities are understood and prioritized; this information is used to inform cybersecurity roles, responsibilities, and risk management decisions. ID.BE-1: The organization’s role in the supply chain is identified and communicated. ID.BE-2: The organization’s place in critical infrastructure and its industry sector is identified and communicated. ID.BE-3: Priorities for organizational mission, objectives, and activities are established and communicated. ID.BE-4: Dependencies and critical functions for delivery of critical services are established. ID.BE-5: Resilience requirements to support delivery of critical services are established for all operating states (e.g. under duress/attack, during recovery, normal operations).

NCF Implementation Tiers Provides Context How organization views cybersecurity risk Processes in place to manage risk Characterize an organization’s practices Partial, Risk Informed, Repeatable, Adaptive

NCF Implementation Tiers Tier chosen should: Meet organizations goals Is feasible to implement Reduces risk to acceptable levels As high as “would reduce cybersecurity risk and be cost effective” Partial Risk Informed Repeatable Adaptive

NCF Profiles Alignment of standards, guidelines, and practices to the Framework Core in a particular implementation scenario. Assess current state (profile) Set target state (target profile) Measure progress (from current profile to target profile)

NCF Manage to Target INDENTIFY ID: Categories Score Target % of Target Function Categories Subcategories Score Target % of Target INDENTIFY ID: ID.AM Asset Management The data, personnel, devices, systems, and facilities that enable the organization to achieve business purposes are identified and managed consistent with their relative importance to business objectives and the organization’s risk strategy. ID.AM-1: Physical devices and systems within the organization are inventoried. 4 7 57.14% ID.AM-2: Software platforms and applications within the organization are inventoried. 6 85.71% ID.AM-3: Organizational communication and data flows are mapped. 2 28.57% ID.AM-4: External information systems are catalogued. ID.AM-5: Resources (e.g., hardware, devices, data, time and software) are prioritized based on their classification, criticality, and business value. 5 71.43% ID.AM-6: Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established. 9 100.00%

NCF Cycle Prioritize and Scope Orient Create Current Profile Conduct Risk Assessment Create Target Profile Determine, Analyze, Prioritize Gaps Implement Action Plan NCF Cycle

NIST Cybersecurity Framework Proposed changes for V1.1

NCF Proposed v1.1 A new section on cybersecurity measurement Greatly expanded cyber supply chain risk management Refinements for authentication, authorization, and identity proofing A better explanation of the relationship between implementation tiers and profiles

NCF Proposed v1.1 - Measurement Measuring state and trends over time Metrics communicate performance and improve accountability Measures are observable data used to support the metrics Connect cybersecurity with business objectives to understand and quantify cause and effect

NCF v1.1 - Measurement

NCF v1.1 Supply Chain Risk Management ID.SC-1: Cyber supply chain risk management processes are identified, established, assessed, managed… ID.SC-2: Identify, prioritize and assess suppliers… ID.SC-3: Suppliers and partners are required by contract… ID.SC-4: Suppliers and partners are monitored … ID.SC-5: Response and recovery planning and testing…

NCF Proposed v1.1 – Auth, Identity ”Access Control” becomes “Identity Management, Authentication and Access Control” PR.AC-6: Identities are proofed and bound to credentials… Several tweaks to protect subcategories wording

Future of NCF “The Trump administration has announced that it will impose new metrics on federal agencies related to cybersecurity.  Agencies and departments will be required to comply with the framework developed by the National Institute of Standards and Technology (NIST) and report back to the Department of Homeland Security (DHS), the Office of Management and Budget (OMB), and the White House.” http://www.natlawreview.com/article/government-agencies-to-be-rated-cybersecurity-using-nist-framework

3 Things to Remember: It is a framework, you build the structure You can customize it as needed Something doesn’t apply? Don’t use it! It is a great way to be sure you are covering the bases

References https://www.nist.gov/cyberframework NCF Overview Page https://www.nist.gov/sites/default/files/documents////draft -cybersecurity-framework-v1.1-with-markup1.pdf Markup of proposed changes in v1.1 https://www.linkedin.com/pulse/evaluate-your- cybersecurity-program-latest-framework-from-bechtel (LinkedIn article on changes) http://scorecard1-1.prevsec.com/ Scorecard Spreadsheet

Will Bechtel 858.598.4657 wbechtel@obsglobal.com Director, Technical Services Online Business Systems 858.598.4657 wbechtel@obsglobal.com