DOCUMENT #:GSC15-GTSC-07 FOR:Presentation SOURCE:ITU-T AGENDA ITEM:4.2 An overview of the Cybersecurity Information.

Slides:



Advertisements
Similar presentations
Cyber Defence Data Exchange and Collaboration Infrastructure (CDXI)
Advertisements

Tony Rutkowski Yaana Technologies Georgia Tech Q.4/17 Rapporteur
Federal Desktop Core Configuration and the Security Content Automation Protocol Peter Mell, National Vulnerability Database National Institute of Standards.
Managed Incident Lightweight Exchange (MILE) Overview and Participation Kathleen Moriarty Global Lead Security Architect EMC Corporate CTO Office.
Cyber Security: Past and Future John M. Gilligan CERT’s 20 th Anniversary Technical Symposium Pittsburgh, PA March 10, 2009.
CYBEX - The Cybersecurity Information Exchange Framework
Security Controls – What Works
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All ITU-T Identity Management Update Bilel Jamoussi, Chief, SGD/TSB ITU Abbie Barbir, Q10/17 Rapporteur.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
Geneva, Switzerland, September 2014 ITU-T CYBEX standards for cybersecurity and data protection Youki Kadobayashi, NICT Japan Rapporteur, ITU-T Q.4/17.
Geneva, Switzerland, 4 December 2014 ITU-T Study Group 17 activities in the context of digital financial services and inclusion: Security and Identity.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
Standards for Shared ICT Jeju, 13 – 16 May 2013 Gale Lightfoot Senior Staff Program Manager, Office of the CTO, SPB Cisco ATIS Cybersecurity Standards.
Secure Systems Research Group - FAU Web Services Standards Presented by Keiko Hashizume.
© 2011 The MITRE Corporation. All rights Reserved. Approved for Public Release: Distribution Unlimited You’re Not Done (Yet) Turning Securable.
DOCUMENT #:GSC15-GTSC-05 FOR:Presentation SOURCE:ITU-T AGENDA ITEM:4.1 NGN, Testing specification and Beyond Chaesub.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All ITU-T Focus Group on Cloud Computing Olivier Colas, ITU-T FGCC Vice-Chairman Document No: GSC16-PLEN-45.
DOCUMENT #:GSC15-PLEN-29 FOR:Presentation or Information SOURCE:ITU-T AGENDA ITEM:6.4 Identity Management Jianyong.
Information Security Management – Management System Requirements, Code of Practice for Controls, and Risk Management supervision Assistant Professor Dr.
DOCUMENT #:GSC15-PLEN-29 FOR:Presentation or Information SOURCE:ITU-T AGENDA ITEM:6.4 Identity Management Jianyong.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
DOCUMENT #:GSC15-PLEN-26 FOR:Presentation SOURCE: ATIS AGENDA ITEM: PLEN 6.4 CONTACT(S): James McEachern ATIS Identity Management.
DOCUMENT #:GSC15-CL-04 FOR:Presentation SOURCE:CCSA AGENDA ITEM:Closing Plenary, 2.3 GTSC-8 Summary Report Duo Liu GTSC-8.
World Class Standards CCIF New York - April Grids, Clouds and Service Infrastructures ETSI Strategy & New Initiatives.
SALSA-NetAuth Joint Techs Vancouver, BC July 2005.
TTA activity for countering BOTNET attack and tracing cyber attacks 14 July, 2008 Heung-youl Youm TTA, Korea DOCUMENT #:GSC13-GTSC6-07 FOR:Presentation.
Fostering worldwide interoperabilityGeneva, July 2009 How to counter web-based attacks on the Internet in Korea Heung Youl YOUM Chairman of Korea.
DOCUMENT #: GSC15-GTSC8-06 FOR: Presentation SOURCE: ATIS AGENDA ITEM: GTSC8; 4.2 CONTACT(S): Art Reilly ATIS Cybersecurity.
DOCUMENT #:GSC15-PLEN-51 FOR:Presentation SOURCE:ITU AGENDA ITEM:Plenary 6.10 Conformance and Interoperability Testing.
Fostering worldwide interoperabilityGeneva, July 2009 Standardization activities on Home Networking in CCSA Duo LIU, Deputy Secretary General of.
ITU Overview Empowering global ICT development Malcolm Johnson DOCUMENT #:GSC13-XXXX-nn FOR:Presentation SOURCE:ITU AGENDA ITEM:Opening Plenary, 4.6 CONTACT(S):Malcolm.
DOCUMENT #:GSC15-PLEN-62 FOR:Presentation SOURCE:ISACC AGENDA ITEM:Opening Plenary (6.14) CONTACT(S):Jim MacFie Cloud Computing Jim MacFie Chairman, ISACC.
Security Automation May 26th, Security Automation: the challenge “Tower of Babel” – Too much proprietary, incompatible information – Costly – Error.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
November 10, 2009 SOCIAL SECURITY ADMINISTRATION-HIT SUPPORT Health IT Provider Registry IHE Proposal Overview Proposed Editor: Shanks Kande, Nitin Jain.
DOCUMENT #:GSC15-PLEN-82r2 FOR:Presentation SOURCE:ATIS AGENDA ITEM: PLEN 6.14 CONTACT(S): Andrew White ATIS’
Fostering worldwide interoperabilityGeneva, July 2009 IdM and Identification Systems Arkadiy Kremer ITU-T SG 17 Chairman Global Standards Collaboration.
OASIS Cloud Authorization TC (CloudAuthZ) Rakesh Radhakrishnan, TC Member.
ATIS Identity Management Standards Development DOCUMENT #:GSC13-PLEN-37 FOR:Presentation SOURCE:ATIS AGENDA ITEM:Plenary; IdM and Identification Systems;
Jeju Island, Korea, 13 – 16 May 2013Identity Management and Identification Systems GSC17-PLEN-43 ITU-T IDENTITY MANAGEMENT UPDATE Bilel Jamoussi, Chief,
Fostering worldwide interoperabilityGeneva, July 2009 ITU-T Telecom Security Update Arkadiy Kremer ITU-T SG 17 Chairman Global Standards Collaboration.
ITU - Empowering global ICT development Malcolm Johnson DOCUMENT #:GSC13-PLEN-44 FOR:Presentation SOURCE:ITU AGENDA ITEM:Opening Plenary, 4.6 CONTACT(S):Malcolm.
Standardization activities on Home Networking in CCSA CCSA DOCUMENT #:GSC13-GTSC6-08 FOR:Presentation or Information SOURCE:CCSA AGENDA ITEM:GTSC; 4.3.
Fostering worldwide interoperabilityGeneva, July 2009 ATIS Identity Management Standards Development James McEachern, Manager – Application Enabler.
Jeju, 13 – 16 May 2013Standards for Shared ICT Andrew White Principal Consultant Nokia Siemens Networks ATIS’ Cloud Services Activity Document No: GSC17-PLEN-64.
ITU-T CYBEX standards for cybersecurity information dissemination and exchange Youki Kadobayashi, Ph.D. NICT Japan / Rapporteur, ITU-T SG17 Q.4 ITU-T SG17.
Jeju, 13 – 16 May 2013Standards for Shared ICT Andrew White Principal Consultant Nokia Siemens Networks ATIS Identity Management (IdM) Standards Development.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
DOCUMENT #:GSC15-PLEN-82 FOR:Presentation SOURCE:ATIS AGENDA ITEM: PLEN 6.14 CONTACT(S): Andrew White ATIS’
1/27 ITU-T CYBEX standards for cybersecurity information dissemination and exchange Odessa, Ukraine, June 2016 Martin Euchner Adviser, ITU-T ITU.
Law Firm Data Security: What In-house Counsel Need to Know
ITU-T Focus Group on Cloud Computing
Update from the Faster Payments Task Force
WTSA-12 Resolutions addressing security
Security Activities in ETSI
WTSA-12 Resolutions addressing security
ATIS’ Cloud Services Activity
ATIS Cybersecurity DOCUMENT #: GSC13-GTSC6-12 FOR: Presentation
ITU-T Study Group 17 Security
I have many checklists: how do I get started with cyber security?
Glenn Parsons, GTSC-9 Chair, ISACC
Security Activities in ETSI
ATIS Identity Management (IdM) Standards Development
ITU Overview Empowering global ICT development Malcolm Johnson
ITU-T Study Group 17 Security
ATIS’ Cloud Activity Andrew White Nokia Siemens Networks
Reinhard Scholl, GTSC-7 Chairman
Microsoft Data Insights Summit
ITU-T activity in ICT security
Glenn Parsons, GTSC-9 Chair, ISACC
Presentation transcript:

DOCUMENT #:GSC15-GTSC-07 FOR:Presentation SOURCE:ITU-T AGENDA ITEM:4.2 An overview of the Cybersecurity Information Exchange Framework CYBEX Jianyong CHEN SG 17 Vice Chairman Global Standards Collaboration (GSC) GSC-15

CYBEX Focus Contractual service agreements and federations Deny resources Intergovernment al agreements and cooperation Tort & indemnification Regulatory/ administrative law Criminal law Legal remedies may also institute protective measures Data retention and auditing Identity Management Forensics & heuristics analysis Provide data for analysis Encryption/ VPNs esp. for signalling Resilient infrastructure Routing & resource constraints Network/ application state & integrity Real-time data availability Measures for protection Measures for threat detection Blacklists & whitelists Vulnerability notices Investigation & measure initiation Measures for thwarting and other remedies Legal Remedies What cybersecurity model? Capabilities Supported Information exchange Provide basis for legal remedies Patch development Provide basis for actions Reputation sanctions Provide awareness of vulnerabilities and remedies 2

Cybersecurity Information acquisition (out of scope) Cybersecurity Entities Cybersecurity Information use (out of scope) Cybersecurity Entities The basic CYBEX model  structuring information  identifying and discovering objects  requesting and responding with information  exchanging information over networks  assured cybersecurity information exchanges 3

To whom and to what does CYBEX apply?  Because the CYBEX framework provides technology neutral information exchange specifications for cybersecurity, it can be applied by any system or product using a network any vendor, service provider, or network operator any agency or organization specifying, managing, or regulating the above  The specifications are especially relevant to Computer Incident Response Teams (CIRTS) that must exchange incident information Law enforcement authorities that must receive forensics Any entity that must deal with the above 4

OVAL Open Vulnerability and Assessment Language CWE Common Weakness Enumeration CVE Common Vulnerabilities and Exposures CPE Common Platform Enumeration CVSS Common Vulnerability Scoring System SCAP Security Content Automation Protocol CWSS Common Weakness Scoring System CCE Common Configuration Enumeration XCCDF eXensible Configuration Checklist Description Format ARF Assessment Result Format CEE Common Event Expression IODEF Incident Object Description Exchange Format CAPEC Common Attack Pattern Enumeration and Classification IODEF extensions Phishing, Fraud, and Misuse Format Events, Incidents, & Heuristics Exchange Vulnerability and State Exchange MAEC Malware Attribution Enumeration and Characteriz- ation Format Plus CPE, CWE, CVE, CEE and OVAL for low- level observables 5 Highlights of current activities Specifications and Relationship Close collaboration with FIRST (Forum of Incident Response and Security Teams) FIRST becomes observer of GSC

Exchange Cluster Challenges: How to identify, enable discovery, trust, and exchange information? (1/2) Identity Assurance Cluster Authentication Assurance Methods Authentication Assurance Methods Authentication Assurance Levels Discovery Enabling Cluster for parties, standards, schema, enumerations, instances and other objects Common Namespace Discovery enabling mechanisms Request and distribution mechanisms Interaction Security Transport Security Authentication Assurance Platforms Authentication Assurance Platforms 6

Vulnerability/State Exchange ClusterEvent/Incident/Heuristics Exchange Cluster Challenges: How to identify, enable discovery, trust, and exchange information? (2/2) Evidence Exchange Cluster Handover of real time forensics Handover of retained data forensics Event Expressions Extensions for: DPI Traceback Smartgrid Phishing Extensions for: DPI Traceback Smartgrid Phishing Malware Patterns Incident and Attack Patterns Electronic Evidence Discovery Knowledge Base Weaknesses Vulnerabilities and Exposures Platforms State Assessment Results Security State Measurement Configuration Checklists Terms and conditions 7

Next Steps/Actions  Will provide three essential capabilities for any system or service: Determining cyber-integrity of systems and services in a measurable way Detecting and exchanging incident information to improve cyber-integrity Providing forensics, when necessary, to appropriate authorities  Includes Means for identifying, enumerating and exchanging knowledge about weaknesses, vulnerabilities, incidents Measurable assurance (trust) for information and parties involved  Extensible to any kinds of networks, services, or platforms – present and future Applicable to Clouds, Online Transaction Security, Smartgrids, eHealth, …  Open standards – most imported into ITU-T, published & maintained in multiple languages, and freely downloadable as X-series specifications  Excludes Specific implementations (i.e., CYBEX is technology neutral) How to implement  CYBEX Framework and some initial stable specifications ready by Dec 2010  Potentially ~20 additional in timeframe 8

Next Steps/Actions X.sisfreqCapabilities and their context scenarios for cybersecurity information sharing and exchange X.cybexCybersecurity information exchange framework X.cveCommon Vulnerabilities and Exposures X.cvssCommon vulnerability scoring system X.gopwGuideline on preventing malicious code spreading in a data communication network X.alertingProcedures for the registration of arcs under the Alerting object identifier arc X.1205 Supplement 8 Draft Supplement to X.series Recommendation - ITU-T X.1205 – Supplement on best practices against botnet threats 31 Recommendations and 1 Supplement are in development. Among them, X.1209 (X.sisfreq) and X Suppl.8 are planned to be approved and the five other Recommendations below are planned for determination in December 2010

Conclusions  Cybex can achieve enhanced cybersecurity and infrastructure protection, as well as accomplishing the principal functions performed by CIRTS and providing Law enforcement authorities.  Enable discovery, measurable assurance and enable exchange are three essential technical capabilities of Cybex.  GSC-15 should continue GSC14/11 Resolution with some necessary editorial updates

Supplementary Slides 11

Weblinks ITU-T Cybersecurity Portal - SG CYBEX web page - SG17 Q4 List of Network Forensics and Vulnerability Organisations - FIRST - ENISA

Who is involved*: it takes a global village Comparable government agencies of other countries/regions Other Bodies Vendors/Service Providers Australia, Canada, China, EU, Germany, Kenya, Korea, Japan, Netherlands, Russia, Switzerland, Syria, UK, USA (potentially 191 countries) Anatel, China Unicom, Cisco, CNRI, France Telecom, Huawei, Intel, KDDI, LAC, Microsoft, Nokia Siemens, NTT, Syrian Telecom, Telcordia, Verizon, Yaana, ZTE APWG, CA/B Forum, BIS, CCDB, CNIS, ETSI, FIRST, GSC, IEEE ICSG, IETF, ISO SC6:SC27:TC68, other ITU-T SGs, ITU-D, ITU-R, MITRE, NSTAC, OASIS * ITU-T Q4/17 participants and contributors. Does not include scores more in development communities 13