Software Assurance: a Strategic Initiative of the U.S. Department Of
Total Page:16
File Type:pdf, Size:1020Kb
SoftwareSoftware Assurance:Assurance: AA StrategicStrategic InitiativeInitiative ofof thethe U.S.U.S. DepartmentDepartment ofof HomelandHomeland SecuritySecurity toto PromotePromote Integrity,Integrity, Security,Security, andand ReliabilityReliability inin SoftwareSoftware InfoSec/Privacy Considerations for Software in Advancing National Strategy to Secure Cyberspace March 21 , 2005 Joe Jarzombek, PMP Director for Software Assurance National Cyber Security Division US Department of Homeland Security National Strategy for Homeland Security "We will lead the unified national effort to secure America. We will prevent and deter terrorist attacks and protect against and respond to threats and hazards to the nation. We will ensure safe and secure borders, welcome lawful immigrants and visitors, and promote the free- flow of commerce." KeyKey ObjectiveObjective II KeyKey ObjectiveObjective IIII KeyKey ObjectiveObjective IIIIII PreventPrevent terroristterrorist ReducReducee America’sAmerica’s MinimizeMinimize thethe attacksattacks withinwithin thethe vulnerabilityvulnerability toto damagedamage andand UnitedUnited StatesStates terrorismterrorism recoverrecover fromfrom attacksattacks thatthat dodo occuroccur Authorization: Homeland Security Act of 2002 at Title 6, U.S. Code 2 Cyberspace & physical space are increasingly intertwined and software controlled/enabled Chemical Industry Transportation 66,000 chemical plants 120,000 miles of railroad Banking and Finance 590,000 highway bridges 26,600 FDIC institutions 2M miles of pipeline Agriculture and Food 300 ports 1.9M farms Telecomm 87,000 food processing plants 2B miles of cable Water Energy 1,800 federal reservoirs 2,800 power plants 1,600 treatment plants 300K production sites Public Health Key Assets 5,800 registered hospitals 104 nuclear power plants Postal and Shipping 80K dams 137M delivery sites 5,800 historic buildings 3,000 government facilities commercial facilities / 460 skyscrapers An Asymmetric Target-rich Environment 3 Cyberspace & physical space are increasingly intertwined and software controlled/enabled Agriculture and Food Energy Transportation Chemical Industry Postal and Shipping rs to ec Water Public Health Telecommunications Banking and Finance Key Assets S Critical Infrastructure / Key Resources Farms Power Plants Railroad Tracks Chemical Plants Delivery Sites Food Processing Plants Production Sites Highway Bridges s Pipelines et ss Ports Nuclear Power Plants A al Reservoirs Cable Government facilities ic ys Treatment Plants Hospitals Fiber FDIC institutions Dams Ph Physical Infrastructure Internet Hardware • Domain Name System • Database Servers s Control Systems • Web Hosting • Networking Equipment et ss • SCADA Services Software A er • PCS • Managed Security yb • Financial System C • DCS • Information Services • Human Resources Cyber Infrastructure Need for secure software applications 4 Cyber-related Disruptions and the Economy ¾ Network disruptions lead to loss of: • Money • Time • Products • Reputation • Sensitive information • Potential loss of life through cascading effects on critical systems and infrastructure BusinessBusiness LossesLosses andand DamagesDamages CoCodede Red:Red: LLooveve BuBug:g: $1.2B$1.2B iinn Slammer:Slammer: Blaster:Blaster: Zotob:Zotob: $15B$15B inin damages;damages; MyMy Doom:Doom: damages;damages; $1B$1B inin damagesdamages $50B$50B inin damagesdamages DamagDamageess TBDTBD 3.9M3.9M systesystemmss $38B$38B inin damagesdamages $740M$740M forfor 20022002 20032003 20052005 infecteinfectedd 20042004 recovrecoveeryry effortsefforts 20002000 20012001 Impact of Spyware not fully known 5 Government plays key cyber security roles Cyber Law Enforcement Information Sharing and Intelligence with the States FBI/DOJ Multi-State ISAC Homeland Security/ Secret Service Cyber Preparedness, Cyber Infrastructure Response, Recovery, Protection Homeland Security Consumer Protection Information Security Cyber Fraud Prevention Standards and Guidelines FTC NIST 6 DHS and the National Cyber Security Division SecrSecretetararyy UnderUnder UnderUnder UnderUnder AsAssistantsistant SecretarySecretary forfor SecretarySecretary forfor SecretarySecretary forfor SecretarySecretary forfor ScienceScience && ManagemeManagemenntt PreparePreparednednessss PolicPolicyy TechTechnolognologyy Assistant AAsssistsistaannt t Assistant AAsssistsistaannt t NNaationaltional Secretary for SSeecretcretaryary f oforr CChhieief fM Meeddicaical l Secretary for FireFire SSeecretcretaryary f oforr CaCapitpitaal l Grants and CyCybbeerr S Seeccuuritrityy & & OfficerOfficer Grants and AdAdmmininisistrattrationion InfrastrucInfrastructuturere ReRegigoionn Training TelTelee-- Training ProProttecectiontion DirecDirectortor CommCommununicationsications NationNationaal l NationNationaal lCy Cybeberr CommuniCommuniccaationstions SSeecucurityrity Div Divisionision SySystemstem 7 National Strategy to Secure Cyberspace Outlines a framework for organizing and prioritizing efforts Provides direction to federal government departments and agencies Identifies steps to improve our collective cyber security Highlights role of public-private engagement Outlines Strategic Objectives 1 2 3 Prevent cyber attacks Reduce national Minimize damage against America’s vulnerability to cyber and recovery time critical infrastructures attacks from cyber attacks that do occur 8 Cyber Preparedness TheThe NationalNational CyberCyber SecuritySecurity DivisionDivision (NCSD)(NCSD) missionmission isis toto workwork collaborativelycollaboratively withwith public,public, private,private, andand internationalinternational entitiesentities toto securesecure cyberspacecyberspace andand America’sAmerica’s cybercyber assets.assets. Mission components include: Implementation of the National Strategy to Secure Cyberspace and Homeland Security Presidential Directive #7 (HSPD#7) Implementation of priority protective measures to secure cyberspace and to reduce the cyber vulnerabilities of America’s critical infrastructures Overarching Priorities: National Cyber Security Response System Cyber Risk Management 9 National Cyber Security Division (NCSD) goals are strategically aligned to four frameworks Mandates NCSD GOALS I. National Cyberspace Security 1. Establish a National Cyber Security Response Response System System to prevent, detect, respond to, and reconstitute rapidly after cyber incidents. II. National Cyberspace Threat and Vulnerability Reduction Program 2. Work with public and private sectors to reduce National vulnerabilities and minimize the severity of III. Nation Cyberspace Security Strategy to cyber attacks. Awareness and Training Secure Program 3. Promote a comprehensive national awareness program to empower all Americans ─ Cyberspace IV. Securing Governments businesses, the general workforce, and the Cyberspace general population ─ to secure their own parts V. International Cyberspace of cyberspace. Security Cooperation 4. Foster adequate training and education “…maintain an organization to serve as a programs to support the Nation’s cyber HSPD-7 focal point for the security of security needs. cyberspace..” 5. Coordinate with the intelligence and law Provides a consistent, unifying structure NIPP for integrating the current multitude of enforcement communities to identify and CIP efforts into a single national program reduce threats to cyberspace. NRP “Cyber Describes framework for Federal cyber 6. Build a world-class organization that incident response coordination among aggressively advances its cyber security Annex” Federal departments and agencies mission and goals in partnership with its public and private stakeholders. 10 HSPD-7: A national policy to protect our nation’s infrastructure Maintain an organization to serve as a focal point for the security of cyberspace Facilitate interactions and collaborations between and among federal departments and agencies, state and local governments, the private sector, academia, and international organizations Execute a mission including analysis, warning, information sharing, vulnerability reduction, mitigation, and aiding national recovery efforts for critical information systems 11 The NIPP outlines a unifying structure Allows all levels of government to collaborate with the appropriate private sector entities Encourages the development of information sharing and analysis mechanisms and continues to support existing sector-coordinating mechanisms Broken down into 17 sector-specific plans to cover all areas of critical infrastructure, including the Information Technology (IT) sector NIPP Risk Management Framework Dynamic Threat Environment Physical Assess Set Implement Risks Normalize & Measure Security Identify Protective Cyber Assets (Consequences, Prioritize Effectiveness Objectives Vulnerabilities Programs Human & Threats) Governance National Risk Profile 12 NRP Cyber Annex describes the framework for response coordination National Cyber Response Coordination Group Provide indications and warning Analyze cyber of potential threats, incidents, vulnerabilities, exploits, and attacks Information sharing and attack methodologies both inside and outside the government Conduct investigations, Provide technical forensics analysis assistance and prosecution Attribute the source Defend against the attack of the attacks Lead National Recovery Efforts 13 DHS National Cyber Security Division (NCSD) provides the framework for addressing cyber security and software assurance challenges Key Functions of the DHS Cybersecurity Partnership Program Cross-Sector: