22
This document and the information therein are the property of Safran. They must not be copied or communicated to a third party without the prior written authorization of Safran A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS Jeff Rusincovitch Zodiac Data Systems, Inc.

A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS · 2019-05-22 · A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS ... Federal

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS · 2019-05-22 · A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS ... Federal

This document and the information therein are the property of Safran. They must not be copied or communicated to a third party without the prior written authorization of Safran

A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF

(INSTRUMENTATION) SYSTEMS

Jeff RusincovitchZodiac Data Systems, Inc.

Page 2: A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS · 2019-05-22 · A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS ... Federal

This document and the information therein are the property of Safran. They must not be copied or communicated to a third party without the prior written authorization of Safran

1. Background – Zodiac Data Systems, Inc.

2. Overview of Implementing RMF at ZDS

3. ZDS Product Lifecycle Threat and Risk Assessment Process

4. Comprehensive Security Review by Department of Security Services (DSS)

5. Summary

Agenda

Safran Aerosystems / Zodiac Data Systems2

Page 3: A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS · 2019-05-22 · A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS ... Federal

This document and the information therein are the property of Safran. They must not be copied or communicated to a third party without the prior written authorization of Safran

ZDS Product Lines

Safran Aerosystems / Zodiac Data Systems3

XMA DAU

MDR Data Recorder

Page 4: A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS · 2019-05-22 · A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS ... Federal

This document and the information therein are the property of Safran. They must not be copied or communicated to a third party without the prior written authorization of Safran

Zodiac Data Systems, Inc.■40 year legacy in Instrumentation and Telemetry

■U.S. Regional / Responsive Expertise>Expert Sales Force>Local Field Application Engineers for product training/support/sales

■Small business attached to large business resources>Small business agility and customer connection>Large engineering work force located in France and Germany

■U.S. Entity with ability to work U.S. classified contracts > Operating under Special Security Agreement (SSA)> Structured and monitored by U.S. Defense Security Service> Mitigates Foreign Ownership and Controlling Influence (FOCI)

Page 5: A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS · 2019-05-22 · A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS ... Federal

This document and the information therein are the property of Safran. They must not be copied or communicated to a third party without the prior written authorization of Safran

DFARS 252.204-7012

Protect Covered Defense Information (CDI)

ZDS compliant with NIST800-171

Federal Information Security Management Act (FISMA)

Protect Information Systems

ZDS routinely supports Authorization to Operate (ATO)

New focus area for U.S. Defense Security Services Audits for Cleared Defense Contractors

ZDS Commitment to Cyber Security

Safran Aerosystems / Zodiac Data Systems5

Page 6: A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS · 2019-05-22 · A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS ... Federal

This document and the information therein are the property of Safran. They must not be copied or communicated to a third party without the prior written authorization of SafranSafran Aerosystems / Zodiac Data Systems6

Overview of Implementing RMF at ZDS

2

Page 7: A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS · 2019-05-22 · A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS ... Federal

This document and the information therein are the property of Safran. They must not be copied or communicated to a third party without the prior written authorization of Safran

NIST SP 800-37 Guide for Applying the Risk Management Framework

NIST SP 800-53 Security and Privacy Controls for Federal Information Systems and Organizations

Challenge: Our products are used on a wide range of application each with unique RMF, risk tolerance, common controls, etc. How do vendors proactively establish RMF and Security

Controls that supports every customers’ needs?

RMF & Security Controls

Safran Aerosystems / Zodiac Data Systems7

Page 8: A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS · 2019-05-22 · A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS ... Federal

This document and the information therein are the property of Safran. They must not be copied or communicated to a third party without the prior written authorization of Safran

Approach to Implementing Security Controls

Safran Aerosystems / Zodiac Data Systems8

Lessons Learned from

Supporting ATO

Product Life Cycle Risk

AssessmentsProduct Penetration

Testing

Security Control Documentation

‘Library’

Process & Procedure

Enhancements

Product Enhancements Customer

Requirements for Product Features

Identify Security Control

Page 9: A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS · 2019-05-22 · A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS ... Federal

This document and the information therein are the property of Safran. They must not be copied or communicated to a third party without the prior written authorization of Safran

Select Implemented Security Controls

Safran Aerosystems / Zodiac Data Systems / Date / Department9

No. Security ControlRA-3 Risk AssessmentsCA-8 Penetration TestingCM-9 Configuration Management PlanRA-5 Vulnerability ScanningSA-10 Developer Configuration ManagementSA-12 Supply Chain ProtectionSA-19 Component AuthenticitySI-12 Information Handling and RetentionSI-16 Memory Retention

Page 10: A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS · 2019-05-22 · A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS ... Federal

This document and the information therein are the property of Safran. They must not be copied or communicated to a third party without the prior written authorization of Safran

Select Supporting Documents for Controls

Safran Aerosystems / Zodiac Data Systems / Date / Department10

Detailed Statement of Volatility Statement of Safety for Databus Interfaces Vulnerability and Conformity Scans Firmware/Software/FPGA Development Policy Firmware Release Policy Supply Chain Protection Policy Prevention of Counterfeit Parts Policy

Page 11: A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS · 2019-05-22 · A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS ... Federal

This document and the information therein are the property of Safran. They must not be copied or communicated to a third party without the prior written authorization of SafranSafran Aerosystems / Zodiac Data Systems / Date / Department11

PRODUCT LIFECYCLE THREAT AND RISK MANAGEMENT

3Product Life Cycle Risk

AssessmentsProduct Penetration

Testing

Page 12: A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS · 2019-05-22 · A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS ... Federal

This document and the information therein are the property of Safran. They must not be copied or communicated to a third party without the prior written authorization of Safran

Focus Areas:

From component sourcing to customer delivery

Service and repair

Firmware updates

Typical components and interconnections for instrumentation system

Priority is to protect Confidentiality

Product Lifecycle Risk Management

Safran Aerosystems / Zodiac Data Systems12

Page 13: A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS · 2019-05-22 · A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS ... Federal

This document and the information therein are the property of Safran. They must not be copied or communicated to a third party without the prior written authorization of Safran

Lifecycle Threat Assessment - Example

Safran Aerosystems / Zodiac Data Systems / Date / Department13

MDR Lifecycle and Cyber Threat Assessment V1.0

Sub-

Assy

Leve

lCo

mpo

nent

Lev

elPr

oduc

t Lev

elFi

rmw

are

US CustomerZDS Europe ZDS US

Component Sourced Receiving (Quality Control)

Manufacturing

Shipping Recieving Testing Shipping Recieving Operation Disposal

Shipping Receiving Testing

Shipping Receiving TestingQuality Control

Manufacturing

Quality Control

Repair Shipping (RMA)Receiving (RMA)

Develop Firmware Update

Upload to Customer Support Site Notify Customers Update Firmware Update Firmware

No. Threat Event Description0 Hardware design changes introduce new vulnerabilities.

1Adversary creates false front organizations with the appearance of legitimate suppliers in the critical life-cycle path that then inject corrupted/malicious information system components into the organizational supply chain.

2Adversary intercepts hardware from legitimate suppliers. Adversary modifies the hardware or replaces it with faulty or otherwise modified hardware.

3 Adversary gains physical access to product or component to install malware.4 Adversary gains physical access to product or component to steal data.5 Firmware design changes introduce new vulnerabilities.

6Adversary uses non-standard delivery mechanisms, such as email, website, instant messager, to deliver malware to users.

7Adversary creates duplicates of legitimate FTP sites to cause users to provide information or download malware.

8Adversary counterfeits or compromises a certificate authority, so that malware or connections will appear legitimate.

9 Adversary scavenges discarded products or components to obtain information.

10 Adversary gains network access to steal data. *Certain products, ex. GMDR.

1 3 3

3 3

3 3

57 6 6 7 6 7

8 8

3 33 4 4 4

93 43 43 43 4

33

33

3

3

3

9

Configuration Update

0

2

1010

Operation

3 410

3,4) Adversary gains access to product to install malware3 or steal data4

10) Adversary gains network access to steal data.

Page 14: A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS · 2019-05-22 · A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS ... Federal

This document and the information therein are the property of Safran. They must not be copied or communicated to a third party without the prior written authorization of Safran

Threat and Risk Assessment Process

Safran Aerosystems / Zodiac Data Systems / Date / Department14

Product Lifecycle Threat

Events

Risk Assessments

(CTTs)

Vulnerability Assessments

(Pen Test)

Plan of Action

• Product Enhancements

• Policy/Procedure Improvements

Page 15: A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS · 2019-05-22 · A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS ... Federal

This document and the information therein are the property of Safran. They must not be copied or communicated to a third party without the prior written authorization of Safran

Approach to Implementing Security Controls

Safran Aerosystems / Zodiac Data Systems15

Lessons Learned from

Supporting ATO

Product Life Cycle Risk

AssessmentsProduct Penetration

Testing

Security Control Documentation

‘Library’

Process & Procedure

Enhancements

Product Enhancements Customer

Requirements for Product Features

Identify Security Control

Page 16: A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS · 2019-05-22 · A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS ... Federal

This document and the information therein are the property of Safran. They must not be copied or communicated to a third party without the prior written authorization of SafranSafran Aerosystems / Zodiac Data Systems16

Comprehensive Security Review by Department of Security Services (DSS), 2018

4

Page 17: A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS · 2019-05-22 · A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS ... Federal

This document and the information therein are the property of Safran. They must not be copied or communicated to a third party without the prior written authorization of Safran

DSS Addressing Cyber Security Concerns

Safran Aerosystems / Zodiac Data Systems / Date / Department17

Page 18: A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS · 2019-05-22 · A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS ... Federal

This document and the information therein are the property of Safran. They must not be copied or communicated to a third party without the prior written authorization of Safran

Functionality – purpose and functions of FPGA in device

Suppliers – current vendors providing FPGAs

Supply chain process – supplier management, risk management and component authentication

Process integrity of firmware development

Software toolsets used for firmware development

Audit Focus – FPGA

Safran Aerosystems / Zodiac Data Systems18

Page 19: A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS · 2019-05-22 · A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS ... Federal

This document and the information therein are the property of Safran. They must not be copied or communicated to a third party without the prior written authorization of Safran

Safeguards found to in place to protect sensitive information

ZDS is in compliance with NISPOM

ZDS received favorable remarks for FPGA Supply Chain Integrity, Process Integrity and Software Toolset…BUT…

Specific feedback not provided:

Threat source and events considered

Opportunities to improve vulnerabilities and controls

Audit Process

19

Page 20: A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS · 2019-05-22 · A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS ... Federal

This document and the information therein are the property of Safran. They must not be copied or communicated to a third party without the prior written authorization of SafranSafran Aerosystems / Zodiac Data Systems20

Summary

5

Page 21: A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS · 2019-05-22 · A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS ... Federal

This document and the information therein are the property of Safran. They must not be copied or communicated to a third party without the prior written authorization of Safran

ZDS is proactively managing cyber security of products and supporting customers achieve ATO

Each application is different and vendors are challenged with anticipating security requirements

Vendors need specific Cyber Security requirements from customers to effectively support ATO

Vendors need ongoing support from customers security experts to understand emerging trends and threats

Summary

Safran Aerosystems / Zodiac Data Systems21

Page 22: A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS · 2019-05-22 · A VENDOR PERSPECTIVE IN SUPPORT OF CYBERSECURITY OF (INSTRUMENTATION) SYSTEMS ... Federal

This document and the information therein are the property of Safran. They must not be copied or communicated to a third party without the prior written authorization of SafranSafran Aerosystems / Zodiac Data Systems22