Federal Plan for Cyber Security and Information Assurance
Total Page:16
File Type:pdf, Size:1020Kb
About the National Science and Technology Council The National Science and Technology Council (NSTC) was established by Executive Order on November 23, 1993. This Cabinet-level Council is the principal means for the President to coordinate science and technology across the diverse parts of the Federal research and development enterprise. Chaired by the President, the NSTC membership consists of the Vice President, the Science Advisor to the President, Cabinet secretaries, agency heads with significant science and technology responsibilities, and other White House officials. An important objective of the NSTC is the establishment of clear national goals for Federal science and technology investments in areas ranging from information technologies and health research, to improving transportation systems and strengthening fundamental research. The Council prepares research and development strategies that are coordinated across Federal agencies to form investment packages aimed at accomplishing multiple national goals. About this Report This report was developed by the Interagency Working Group (IWG) on Cyber Security and Information Assurance (CSIA), an organization under the NSTC. The CSIA IWG reports jointly to the Subcommittee on Infrastructure of the NSTC’s Committee on National and Homeland Security, and the Subcommittee on Networking and Information Technology Research and Development (NITRD) of the NSTC’s Committee on Technology. The report is published by the National Coordination Office for Networking and Information Technology Research and Development (NCO/NITRD). The NCO/NITRD supports overall planning, budget, and assessment activities for the multiagency NITRD Program under the auspices of the NSTC’s NITRD Subcommittee. To Request Additional Copies To request additional copies of the Federal Plan for Cyber Security and Information Assurance Research and Development or other NITRD Program publications, please contact: NCO/NITRD, Suite II-405, 4201 Wilson Boulevard, Arlington, Virginia 22230; (703) 292-4873; fax: (703) 292-9097; e-mail: [email protected]. Electronic versions of this report and other NITRD documents are also available on the NITRD Web site: http://www.nitrd.gov. Copyright Information This is a work of the U.S. Government and is in the public domain. It may be freely distributed, copied, and translated; acknowledgement of publication by the National Coordination Office for Networking and Information Technology Research and Development is requested. Any translation should include a disclaimer that the accuracy of the translation is the responsibility of the translator and not the NCO/NITRD. It is requested that a copy of any translation be sent to the NCO/NITRD at the above address. NATIONAL SCIENCE AND TECHNOLOGY COUNCIL FEDERAL PLAN FOR CYBER SECURITY AND INFORMATION ASSURANCE RESEARCH AND DEVELOPMENT A Report by the Interagency Working Group on Cyber Security and Information Assurance Subcommittee on Infrastructure and Subcommittee on Networking and Information Technology Research and Development April 2006 page intentionally left blank EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF SCIENCE AND TECHNOLOGY POLICY WASHINGTON, D.C. 20502 Dear colleague: The Nation’s information technology (IT) infrastructure – the seamless fabric of interconnected computing and storage systems, mobile devices, software, wired and wireless networks, and related technologies – has become indispensable to public- and private-sector activities throughout our society and around the globe. Pervasive, cost-effective communication enables a vast, constant flow of information that has transformed work environments and processes in government, business and industry, and advanced research, health care, and many other fields. This IT infrastructure also supports other critical U.S. infrastructures, such as those that supply our food, water, energy, financial transactions, and transportation, as well as public health, emergency response, and other vital services. The interconnectivity that makes seamless delivery of essential information and services possible, however, also exposes many previously isolated critical infrastructures to the risk of cyber attacks mounted through the IT infrastructure by hostile adversaries. The exposure of critical infrastructure to cyber-based attacks is expected to increase, as convergence of network and device technologies accelerates, and as systems increasingly connect to the Internet to provide added functionality or greater efficiency. Safeguarding the Nation’s IT infrastructure and critical infrastructure sectors for the future is a matter of national and homeland security. Developed by the Cyber Security and Information Assurance Interagency Working Group under the auspices of the National Science and Technology Council, this Federal Plan for Cyber Security and Information Assurance Research and Development presents a coordinated interagency framework for addressing critical gaps in current cyber security and information assurance capabilities and technologies. The Plan focuses on interagency research and development (R&D) priorities and is intended to complement agency-specific prioritization and R&D planning efforts in cyber security and information assurance. The Plan also describes the key Federal role in supporting R&D to strengthen the overall security of the IT infrastructure through development of fundamentally more secure next-generation technologies. I commend this Plan as an important step in addressing the Administration’s national and cyber security priorities, and I look forward to working with Federal agencies and the private sector to develop the research roadmap called for in the Plan. Sincerely, John H. Marburger, III Director TABLE OF CONTENTS EXECUTIVE SUMMARY . .ix PART I: Federal Plan for Cyber Security and Information Assurance R&D OVERVIEW . .1 Technology Trends . .1 The Federal Role . .2 The Federal Plan in Summary . .3 Plan Background . .3 VULNERABILITIES, THREATS, AND RISK . .5 Types of Threats and Threat Agents . .5 Attackers’ Asymmetric Advantages . .6 Malicious Hackers . .7 Organized Crime . .7 Terrorists . .7 Nation States . .7 Threat and Vulnerability Trends . .8 Insiders . .8 Outsourcing . .8 Supply Chain Attacks . .8 Industrial Espionage . .8 State-Sponsored Espionage . .8 Other Trends . .9 Immediate Concerns . .9 Industrial Process Control Systems . .10 Banking and Finance Sector . .11 ANALYSIS AND PLAN FRAMEWORK . .13 Recent Calls for Cyber Security and Information Assurance R&D . .13 OSTP/OMB Memorandum on FY 2007 Administration R&D Budget Priorities . .13 PITAC Cyber Security Report . .13 The National Strategy to Secure Cyberspace . .14 Cyber Security Research and Development Act . .14 INFOSEC Research Council (IRC) Hard Problem List . .14 Strategic Federal Objectives . .14 Development of Baseline Information . .15 Cyber Security and Information Assurance R&D Categories and Technical Topics . .15 Prioritization of Technical Topics . .15 v Investment Analysis . .16 R&D Technical Topic Perspectives . .16 R&D Technical and Funding Priorities . .16 Commentary on Analysis of Priorities . .16 Table 1: Top Technical and Funding Priorities . .18-19 Cyber Security and Information Assurance R&D Priorities: Comparison with PITAC and IRC . .20 FINDINGS AND RECOMMENDATIONS . .23 CONCLUSIONS . .27 PART II: Technical Perspectives on Cyber Security and Information Assurance R&D 1. Functional Cyber Security and Information Assurance . .31 1.1 Authentication, Authorization, and Trust Management . .31 1.2 Access Control and Privilege Management . .33 1.3 Attack Protection, Prevention, and Preemption . .35 1.4 Large-Scale Cyber Situational Awareness . .37 1.5 Automated Attack Detection, Warning, and Response . .38 1.6 Insider Threat Detection and Mitigation . .39 1.7 Detection of Hidden Information and Covert Information Flows . .41 1.8 Recovery and Reconstitution . .42 1.9 Forensics, Traceback, and Attribution . .43 2. Securing the Infrastructure . .46 2.1 Secure Domain Name System . .46 2.2 Secure Routing Protocols . .48 2.3 IPv6, IPsec, and Other Internet Protocols . .50 2.4 Secure Process Control Systems . ..