Cybersecurity : Optimal Approach for PSAPs

Slides:



Advertisements
Similar presentations
State of Indiana Business One Stop (BOS) Program Roadmap Updated June 6, 2013 RFI ATTACHMENT D.
Advertisements

Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
CUBIC DEFENSE APPLICATIONS Security Summit Discussions Jeff Snyder Vice President, Cyber Programs Cubic Defense Applications.
International Telecommunication Union Committed to connecting the world 4 th ITU Green Standards Week Paolo Gemma WG2 Coordinator, ITU-T Focus Group on.
Federal Communications Commission Public Safety and Homeland Security Bureau Public Safety Communications Update “View from the FCC” David G. Simpson,
ESW 7 - FCC Jeff Cohen Senior Legal Counsel Public Safety Bureau FCC Interests & Policy Around Geolocation.
The U.S. Coast Guard’s Role in Cybersecurity
DHS, National Cyber Security Division Overview
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
TechSec WG: Related activities overview Information and discussion TechSec WG, RIPE-45 May 14, 2003 Yuri Demchenko.
Working Group 2: Next Generation Alerting December 16, 2011 Co-Chairs: Damon Penn, Asst. Administrator, Nat’l Continuity Programs, DHS-FEMA Scott Tollefsen,
Update on Interoperability Roadmap Comments Sections E, F, and G Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Asia Pacific Economic Cooperation Transportation Working Group ITS Experts Group Chicago, Illinois September 2002 Walter Kulyk, P.E. Director, Office of.
(Geneva, Switzerland, September 2014)
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
Standards for Shared ICT Jeju, 13 – 16 May 2013 Gale Lightfoot Senior Staff Program Manager, Office of the CTO, SPB Cisco ATIS Cybersecurity Standards.
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Cybersecurity nexus (CSX)
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
1 FCC’s Homeland Security Partnerships Executive Office of the PresidentState and Local Governments Sister Agencies Industry and Trade Organizations Federal.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Seán Paul McGurk National Cybersecurity and Communications
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Self-Assessment and Formulation of a National Cyber security/ciip Strategy: culture of security.
Federal Aviation Administration Federal Aviation Administration 1 Presentation to: Name: Date: Federal Aviation Administration AMHS Security Security Sub-Group.
Chapter 6 of the Executive Guide manual Technology.
Introduction to the National Cybersecurity & Communications Integration Center (NCCIC) “A Partnership for Strength” 1.
Idaho Cybersecurity Task Force Department of Administration 16 Sep 2015.
State Data Center Oregon Consumer Identity Theft Protection Act Information Forum October 31, 2007.
 Working Group 2: Optimal Approach to NG9-1-1 Architecture Implementation by PSAPs Status Report September 29, 2015.
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
Security is not just… 1 A Compliance Exercise Certification and Accreditation FISMA.
New River Valley Emergency Communications Regional Authority
Steve Gay - GIS Manager Mid America Regional Council Kansas City, MO.
Nov11-cesg-1 SOIS Area Report Wireless WG Primary Objectives for the fall meeting Establish lessons learned from the Asset Management (AM) Magenta Book.
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
Of XX Government Contracts Statutes, Regulations, Executive Orders & Policies Stu Nibley, Partner, K&L Gates LLP ©2015 PubKLearning. All rights reserved.1.
Governor’s Office of Homeland Security and Emergency Response State Directors Meeting February 24, 2014 Bruce A. Davis, Ph.D. Senior Program Manager Resilient.
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
Jacques Bus Head of Unit, DG INFSO-F5 “Security” European Commission FP7 launch in the New Member States Regional on-line conference 22 January 2007 Objective.
The U.S. Department of Transportation and the Next Generation Jenny Hansen – Contractor – NG9-1-1 Project Coordinator USDOT – NHTSA.
Family Engagement Framework A Tool for California School Districts September 2011
Advancing Government through Collaboration, Education and Action Cybersecurity SIG Priority Area Project/Activity Report SIG Leadership Meeting July 17,
Business Continuity Disaster Planning
The member organizations of the National Public Safety Telecommunications Council are grateful to the Department of Homeland Security’s Science and Technology.
1 Federal Emergency Management Agency Charlie Hoffman Disaster Operations Directorate Chief, DEC Programs Disaster Emergency Communications National Public.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
OFFICE OF VA ENTERPRISE ARCHITECTURE VA EA Cybersecurity Content Line of Sight Report April 29, 2016.
1 Iowa Emergency Management Association Iowa Homeland Security and Emergency Management Department Emergency Management Program Development Course EMERGENCY.
TIA Update for PRS Mark Uncapher Director, Regulatory & Government Affairs, Telecommunications Industry Association October 28,
Advanced Planning Brief to Industry Jerry L. Davis DAS, Office of Information Security June 9, 2011.
Communications Coordination Group (CCG). MISSION To facilitate interagency coordination and collaboration to provide efficient and effective pre-planning.
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
California Cybersecurity Integration Center (Cal-CSIC)
Medical Device Cybersecurity Legislative Activities - Overview
Detection and Analysis of Threats to the Energy Sector (DATES)
NIST Cybersecurity Framework
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
2017 Health care Preparedness and Response Draft Capabilities
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Next Generation 911: Making it Happen NOW!
Cybersecurity ATD technical
Introduction to: National Response Plan (NRP)
CISA: Mission, Authorities, and Capabilities
Presentation transcript:

Cybersecurity : Optimal Approach for PSAPs High level overview FCC Task Force on Optimal PSAP Architecture Working Group 1 Update September 29, 2015

Presentation Outline: Status Report FCC Task Force on Optimal PSAP Architecture Presentation Outline: Status Report Draft Report Structure Executive Summary PSAP Overview Federal Role and existing work in Cyber PSAPs: Cybersecurity Plan For The Future Use Cases Best Practices Questions or Discussion High-level overview for the FCC update Include approach to the: Analysis and Findings that will lead to Conclusions & Recommendations; Additional Notes: High level strategy recommendations  based on: Best practices Proposed architectures developed by WG2, Manageable and scalable core network elements distributed to the PSAP level, or if so desired implemented at the PSAP level. New EC3 concept takes advantage of economies of scale, allows for local, State and Federal participation along with information and cost sharing Anticipate both architecture recommendation and cost estimates in final report

Section 1: Overview of PSAP Environment FCC Task Force on Optimal PSAP Architecture Section 1: Overview of PSAP Environment PSAP– CyberSecurity Today Governance Access Control Security Controls Internal network security and monitoring Network entry point security Executive Summary PSAP Overview In this section, WG1 provides information on the current cybersecurity practices taken to protect Legacy and Next Generation PSAPs by existing commercial providers Governance With the convergence of communications capabilities, it is clear that communications interoperability and security cannot be solved by any one entity, but requires a partnership among response entities across all levels of government and functions to ensure the right information is delivered securely to the right people at the right time. Governance is pivotal to secure operable and interoperable emergency communications.  Robust governance establishes and maintains a central coordination point (or body) for efforts across the broad spectrum of public safety stakeholders, and can help to address challenges in a unified manner.  The presence of an active and transparent governance body fosters relationships, collaboration, and information sharing to better balance fiscal, technological, and policy-driven public safety needs.  Access Control - Policy - identifies proper approval based on access gates and ratings; Physical Security – Limited access and based on need to know Human Resources- HR procedures should be developed to include preventative measures such as background checks. Security Controls - Business Continuity Plan/Disaster Recovery ; Geo-diverse in Active/Active or N+1 computing element configurations; Media Handling; Incident Management ; Testing ; Vulnerability Management Internal Network Security and Monitoring - Private DNS (internal facing only); External network connections Network entry point security SS7 messaging management/filtering (protects call control components) IP data entry points (SIP for NextGen) - use Border Control Functions (BCFs), including Session Border Controllers, Firewalls, packet filtering, message type limitations, encryption and secured authenticated external interfaces. All ingress and egress paths are secured, communication occurs only between pre-authenticated entities.  All communication of sensitive data is encrypted. Transport Layer Security (TLS) must be used for transmission between network elements to encrypt the message. In addition IPSEC may be used to manage internetwork connections. Subnetworks for publicly accessible system components are implemented.

Section 2: Federal Role and Existing Work FCC Task Force on Optimal PSAP Architecture Section 2: Federal Role and Existing Work U.S. Department of Commerce NIST: Cybersecurity Framework NIST: Cyber Physical Systems- Public Work Group Report Relationship To PSAPs: Identify, Protect, Detect, Respond, Recover NIST/NICE Workforce Framework Relationship of occupational specialties to PSAPs Define any new/missing occupational specialties Consider Cyber Professional Best Practices for PSAP workforce Role of Federal Agencies / Reports NIST Framework - Identify, Protect, Detect, Respond, Recover- Discussion of NIST Framework and how to relate it directly to public safety communication. Map out the “functions” identified in the Framework to specific “levels” within public safety environment. Cyber Physical systems - A draft framework to guide the development of cyber-physical systems (CPS) has been issued for public comment by the National Institute of Standards and Technology. “Certainly, many of the cybersecurity challenges that apply to IT systems also apply to CPS.  However, some challenges may not have the same criticality in the CPS space as they do in IT systems, and CPS may pose additional challenges not present in the IT space,” Given enough time, WG1 can review and incorporate recommendations that relate to public safety. Absent additional time, this would be a recommendation for the next iteration of TFOPA should there be one. NICE Framework - Working Group members reviewed job titles to assess NICE Framework labor categories, scope of work, and Information Technology skills most closely associated with each. While PSAPs generally do not have a single consistent model for job titles, a generalized set of job titles were mapped to labor categories with identification of required skills and recommended training based on the NICE Workfroce Framework. DHS – No data provided to date

Section 2: Federal Role and Existing Work FCC Task Force on Optimal PSAP Architecture Section 2: Federal Role and Existing Work Department of Homeland Security Critical Infrastructure Cyber Community Voluntary Program (C3VP) Critical Infrastructure Cyber Information Sharing and Collaboration Program (CISCP) Cyber Reports & Recommendations Cybersecurity Products & Solutions: Continuous Diagnostics and Mitigation (CDM) Intrusion detection sensors (IDS) Intrusion prevention sensors (IPS) Trusted Internet Connection (TIC) National Cybersecurity and Communications Integration Center (NCCIC) NCCIC/National Coordinating Center for Communications (NCC) NCCIC/United States Computer Emergency Readiness Team (US-CERT) Role of Federal Agencies / Reports DHS

Section 2: Federal Role and Existing Work FCC Task Force on Optimal PSAP Architecture Section 2: Federal Role and Existing Work General Services Administration Identity Credentialing Access Management (ICAM) NIST Special Publication 800-63-2 FICAM Roadmap and Implementation Guidance Identity Management Credential Management Access Management ICAM Intersection ICAM Goals and Objectives Role of Federal Agencies / Reports ICAM - The ICAM segment architecture establishes the foundation for trust and interoperability in conducting electronic transactions both within the Federal Government and with external organizations. It encompasses the core capabilities to be able to identify, authenticate, and authorize individuals to provide appropriate access to resources, which is the lynchpin to the success of the national Cybersecurity initiative.

Section 3 PSAP: Cybersecurity Plan For The Future FCC Task Force on Optimal PSAP Architecture Section 3 PSAP: Cybersecurity Plan For The Future Evaluation and Recommendations on: Emergency Communications Cybersecurity Center (EC3) Intrusion Detection and Prevention Systems (IDPS) IDPS in NG9-1-1 environment PSAPs: CyberSecurity Plan For The Future In addition to incorporating current best practices, NIST recommendations, and current work from DHS, APCO and NENA the working group has determined that an additional layer should be introduced into the recommended future architecture.   The intent of this logical architecture recommendation is to create a centralized function, and location, for securing NG networks and systems. By centralizing certain features, including cybersecurity in general, and intrusion detection and prevention services (IDPS) specifically, public safety can take advantage of economies of scale, multiple resources, and systems and best practices which may already be in place or at a minimum readily available for deployment and use.

FCC Task Force on Optimal PSAP Architecture

FCC Task Force on Optimal PSAP Architecture

Section 3 PSAP: Cybersecurity Plan For The Future FCC Task Force on Optimal PSAP Architecture Section 3 PSAP: Cybersecurity Plan For The Future PSAPs: Funding The Cybersecurity Plan Federal Funding Opportunities Partnerships PSAP Cybersecurity Checklist PSAP Cybersecurity Roadmap PSAPs: CyberSecurity Plan For The Future In the proposed architecture for NG9-1-1 Cybersecurity, the Emergency Communications Cybersecurity Center (EC3) will take on the role of providing IDPS services to PSAPs and any other emergency communications service or system that would consider utilizing the centralized, core services architecture proposed. For example, not only PSAPs but Emergency Operations Centers (EOCs) and potentially the Nationwide Public Safety Broadband Network operated and maintained by FirstNet, could also interconnect to the EC3 service. This approach would allow public safety to build one infrastructure and use it for many clients. This provides significant economies of scale, puts multiple Federal, State, Local and Tribal resources into the same protection scheme, and allows for sharing of data, mitigation strategies, and recovery efforts across enterprise. Funding opportunities may exist and are being explored by the WG. Recommendations for consideration will be included in the final report. Potential partnerships will also be noted along with (hopefully) cost estimates at a high level for the core architecture piece.

Appendix A- PSAP: Cybersecurity Use Cases FCC Task Force on Optimal PSAP Architecture Appendix A- PSAP: Cybersecurity Use Cases Specific Use Cases Addressing: TDoS DDoS SWATTING Single PSAP Compromised, Need exists to protect Interconnected PSAPs Data Hijacked PSAP Network Compromised Use Cases

Appendix B: Cybersecurity Best Practices for PSAPs FCC Task Force on Optimal PSAP Architecture Appendix B: Cybersecurity Best Practices for PSAPs Analysis & Findings of FCC CSRIC Best Practices Recommendations for development of 911/PSAP specific Cybersecurity Best Practices Best Practices

FCC Task Force on Optimal PSAP Architecture Questions / Discussion