+ All Categories
Home > Documents > Framework for Improving Critical Infrastructure Cybersecurity€¦ · Core s Level 2 Mission/...

Framework for Improving Critical Infrastructure Cybersecurity€¦ · Core s Level 2 Mission/...

Date post: 03-Jul-2020
Category:
Upload: others
View: 3 times
Download: 0 times
Share this document with a friend
19
Framework for Improving Critical Infrastructure Cybersecurity June 2017 [email protected]
Transcript

Framework for Improving Critical Infrastructure Cybersecurity

June 2017

[email protected]

CharterImproving Critical Infrastructure Cybersecurity

February 12, 2013

“It is the policy of the United States to enhance the security and resilience of the Nation’s critical infrastructure and to maintain a cyber environment that

encourages efficiency, innovation, and economic prosperity while promoting

safety, security, business confidentiality, privacy, and civil

liberties”

Executive Order 136362

December 18, 2014Amends the National Institute of Standards and

Technology Act (15 U.S.C. 272(c)) to say:

“…on an ongoing basis, facilitate and support the development of a

voluntary, consensus-based, industry-led set of standards,

guidelines, best practices, methodologies, procedures, and

processes to cost-effectively reduce cyber risks to critical infrastructure”

Cybersecurity Enhancement Act of 2014 (P.L. 113-274)

Key AttributesIt’s meant to be customizedIt’s a framework, not a prescriptive standard• Provides a common language and systematic methodology for

managing cyber risk. • Does not tell an organization how much cyber risk is tolerable, nor

provide “the one and only” formula for cybersecurity.• Enable best practices to become standard practices for everyone via

common lexicon to enable action across diverse stakeholders.It’s a living document• Can be updated as stakeholders learn from implementation

• Can be updated as technology and threats changes.

3

Cybersecurity Framework Components

Describes how cybersecurity risk is managed by an organization and degree the risk management

practices exhibit key characteristics

Aligns industry standards and best practices to the Framework Core in a particular implementation scenario

Supports prioritization and measurement while factoring in business needs

Cybersecurity activities and informative references,

organized around particular outcomes

Enables communication of cyber risk across an

organization

Core

Implementation Tiers

Profile

4

Implementation TiersCybersecurity Framework Component

5

1 2 3 4Partial Risk

InformedRepeatable Adaptive

RiskManagement

Process

Thefunctionalityandrepeatabilityofcybersecurity riskmanagement

IntegratedRiskManagement

Program

The extenttowhichcybersecurityisconsideredinbroaderriskmanagementdecisions

ExternalParticipation

Thedegree towhichtheorganizationbenefitsmysharingorreceivinginformationfromoutsideparties

5

CoreCybersecurity Framework Component

Function Category ID

Whatprocessesandassetsneedprotection?

Identify

AssetManagement ID.AMBusinessEnvironment ID.BEGovernance ID.GVRiskAssessment ID.RA

RiskManagementStrategy ID.RM

Whatsafeguardsareavailable? Protect

AccessControl PR.ACAwarenessandTraining PR.ATDataSecurity PR.DS

InformationProtectionProcesses&Procedures PR.IP

Maintenance PR.MAProtectiveTechnology PR.PT

Whattechniquescanidentifyincidents? Detect

AnomaliesandEvents DE.AE

SecurityContinuousMonitoring DE.CM

DetectionProcesses DE.DP

Whattechniquescancontainimpactsof

incidents?Respond

ResponsePlanning RS.RPCommunications RS.COAnalysis RS.ANMitigation RS.MIImprovements RS.IM

Whattechniquescanrestorecapabilities? Recover

RecoveryPlanning RC.RPImprovements RC.IMCommunications RC.CO

6

7

Core – ExampleCybersecurity Framework Component

Function SubcategoryCategory InformativeReference

ProfileCybersecurity Framework Component

8

Identify

Protect

Detect

Respond

Recover

WaystothinkaboutaProfile:• AcustomizationoftheCoreforagivensector,subsector,ororganization.

• Afusionofbusiness/missionlogicandcybersecurity outcomes.

• Analignmentofcybersecurityrequirementswithoperationalmethodologies.

• Abasisforassessmentandexpressingtargetstate.• Adecisionsupporttoolforcybersecurityriskmanagement.

Framework 7-Step Process

• Step 1: Prioritize and Scope• Step 2: Orient• Step 3: Create a Current Profile• Step 4: Conduct a Risk Assessment• Step 5: Create a Target Profile• Step 6: Determine, Analyze, and Prioritize Gaps• Step 7: Implementation Action Plan

9

Work in Progress: Framework RoadmapAuthentication

Automated Indicator Sharing

Conformity Assessment

Cybersecurity Workforce

Data Analytics

Federal Agency Cybersecurity Alignment

International Aspects, Impacts, and Alignment

Supply Chain Risk Management

Technical Privacy Standards10

Cybersecurity Executive OrderStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Risk Management:(ii) “…agency head shall use The Framework” and

“…provide a risk management report within 90 days containing a description of the “…agency's action plan to implement the Framework.”

11

SpecialPub

lication800-39

Level1Org

Level2Mission/BusinessProcesses

Level3System

12

Proposed Federal UsageNIST IR 8170 The Cybersecurity Framework: Implementation Guidance for Federal Agencies

SpecialPub

lication800-39

Level1Org

1.Integrateenterpriseandcybersecurityriskmanagement

Core CybersecurityFramew

orkComponents

Level2Mission/BusinessProcesses

2.Managecybersecurityrequirements Profile(s)3.Integrateandaligncybersecurityandacquisition

processesProfile(s)

4.Evaluateorganizationalcybersecurity Imp.Tiers5.Managethecybersecurityprogram Profile(s)6.Maintainacomprehensiveunderstandingof

cybersecurityrisksupports RMFAuthorize

Core

7.Reportcybersecurityriskssupports RMFMonitor

Core

Level3System

8.InformthetailoringprocesssupportsRMFSelect

Profile(s)

13

Proposed Federal UsageNIST IR 8170 The Cybersecurity Framework: Implementation Guidance for Federal Agencies

14

CSFCore CSFProfilepriorities

customize

Inform the Tailoring ProcessExample of Use 8 of 8

15

CSFCore CSFProfilepriorities

customize

Inform the Tailoring ProcessExample of Use 8 of 8

Categorize Select Implement Assess Authorize Monitor

Predominant RMF Activity

Considerriskstateandmakeoperatingdecision

Communicateriskstatusforcontinuousauthorization

Finalizecontrolsbaselineusing

stakeholderinput

Deploycontrolsbaseline

Determine,analyze,and

documentriskstate

Determinesystemmission/businessimpact

123

Categorize Select Implement Assess Authorize Monitor

Predominant Tier Flow

Considerriskstateandmakeoperatingdecision

Communicateriskstatusforcontinuousauthorization

Finalizecontrolsbaselineusing

stakeholderinput

Deploycontrolsbaseline

Determine,analyze,and

documentriskstate

Determinesystemmission/businessimpact

“Tier”SP800-39

“Roles”SP800-39

”Stakeholders”CybersecurityFramework

“Core”Cybersecurity Framework

Level1Organization … SeniorExecutives

Identify, Protect,Detect,Respond,Recoveras“Functions”

22CategoriesLevel2Mission/BusinessProcesses

… BusinessProcessPersonnel

98Subcategories

SP800-53controlsas “InformativeReferences”Level3

System… Implementation

Personnel

Workflow&Translation

Summarize/Abstract

Detail/Expand

Cybersecurity Framework Helps When Spanning Tiers

Framework for Improving Critical Infrastructure Cybersecurity and related news, information: www.nist.gov/cyberframework

Additional cybersecurity resources: http://csrc.nist.gov/

Questions, comments, ideas:[email protected]

ResourcesWhere to Learn More and Stay Current


Recommended