12
Cybersecurity and Resiliency Test and Evaluation Considerations 8 March 2018 Paul Dailey, PhD [email protected] (443) 778-8684

Cybersecurity and Resiliency Test and Evaluation Considerations · 2018-03-09 · Cybersecurity and Resiliency Test and Evaluation Considerations 8 March 2018 Paul Dailey, PhD. Paul.Dailey@jhuapl

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cybersecurity and Resiliency Test and Evaluation Considerations · 2018-03-09 · Cybersecurity and Resiliency Test and Evaluation Considerations 8 March 2018 Paul Dailey, PhD. Paul.Dailey@jhuapl

Cybersecurity and Resiliency Test and Evaluation Considerations8 March 2018

Paul Dailey, [email protected](443) 778-8684

Page 2: Cybersecurity and Resiliency Test and Evaluation Considerations · 2018-03-09 · Cybersecurity and Resiliency Test and Evaluation Considerations 8 March 2018 Paul Dailey, PhD. Paul.Dailey@jhuapl

Agenda

9 March 2018 2

• Cybersecurity assessment and T&E activities overview• Some cyber T&E process recommendations• Attack surface characterization example• Cybersecurity vs. resiliency• Discussion: Requirements verification vs. vulnerability discovery

Page 3: Cybersecurity and Resiliency Test and Evaluation Considerations · 2018-03-09 · Cybersecurity and Resiliency Test and Evaluation Considerations 8 March 2018 Paul Dailey, PhD. Paul.Dailey@jhuapl

Cybersecurity Assessment & T&E Activities

Systems Engineering Management Plan

Concept of Operations

System Requirements

High-Level Design &

Subsystem Requirements

Detailed Design

Software CodingHardware Fabrication

Unit Testing

Subsystem Verification

System Verification & Deployment

System Validation

Operation & Maintenance

RMF 1: Categorize System

RMF 2: Select Cybersecurity

Controls

RMF 6: Continuously

Monitor

RMF 4: Assess Cybersecurity

Controls

RMF 5: Authorize System to Operate

RMF 3: Implement Cybersecurity

Controls

Risk Management Framework

DoD Cyber T&E Guidebook

Attack Surface Characterization

Understand Cybersecurity Requirements

Cooperative Vulnerability Detection & Penetration Testing

Adversarial Cyber Assessments

DT/OT Iteration

Inform Development

and T&ERefine / Validate

Risk Model

Cyberspace Threat Characterization

Mission-Based Cybersecurity Risk Assessment / Cyber Table Top High Fidelity

Model the Mission, System, and Threat

Low Fidelity

Cyber Testbed V&V

Other Assessment Activities

Supply Chain Risk Management

Cyberspace Instrumentation &

Operations Analysis

Malware Analysis / Digital Forensics

Formal Verification (Where Possible)

Cyber Exercises & Training

Mission Decomposition

Page 4: Cybersecurity and Resiliency Test and Evaluation Considerations · 2018-03-09 · Cybersecurity and Resiliency Test and Evaluation Considerations 8 March 2018 Paul Dailey, PhD. Paul.Dailey@jhuapl

Recommendations for Cyber T&E Practitioners• Start early, iterate during concept definition and preliminary design w/ SE

• Leverage mission-based cyber risk assessments to guide follow-on activities

• Mission decomposition -> criticality analysis -> attack surface prioritization

• Identify your test infrastructure early and integrate with model-based systems engineering (MBSE) efforts

MBCRA (e.g. CTT) Testbed Assessment (Virtualized System)

Operational System Assessment

• Evaluate design• Document

confirmed vulnerabilities

• Primary stakeholder communication mechanism

• Evaluate (hands-on) design and representative implementation

• Verify (or refute) plausible vulnerabilities

• Identify new vulnerabilities• Cooperative and

adversarial testing• Malware analysis• Cyber exercises

• Evaluate Operational implementation

• Verify (or refute) plausible vulnerabilities

• Cooperative and adversarial testing

• Operations analysis, continuous monitoring, digital forensics

Update Mission-Based Cyber Risk Assessment (MBCRA)

Page 5: Cybersecurity and Resiliency Test and Evaluation Considerations · 2018-03-09 · Cybersecurity and Resiliency Test and Evaluation Considerations 8 March 2018 Paul Dailey, PhD. Paul.Dailey@jhuapl

9 March 2018 5

Attack Surface Characterization ApproachDevelop an Attack Surface List – Map to Key Terrain

A notional example from DASD(DT&E)

Page 6: Cybersecurity and Resiliency Test and Evaluation Considerations · 2018-03-09 · Cybersecurity and Resiliency Test and Evaluation Considerations 8 March 2018 Paul Dailey, PhD. Paul.Dailey@jhuapl

9 March 2018 6

Attack Surface Characterization ApproachDecompose the mission, conduct dependency analysis, ID key terrain

A notional example from DASD(DT&E)

Page 7: Cybersecurity and Resiliency Test and Evaluation Considerations · 2018-03-09 · Cybersecurity and Resiliency Test and Evaluation Considerations 8 March 2018 Paul Dailey, PhD. Paul.Dailey@jhuapl

9 March 2018 7

Attack Surface Characterization ApproachAnalyze the attack surface – Ways to access key terrain

A Notional Example from DASD(DT&E)

Page 8: Cybersecurity and Resiliency Test and Evaluation Considerations · 2018-03-09 · Cybersecurity and Resiliency Test and Evaluation Considerations 8 March 2018 Paul Dailey, PhD. Paul.Dailey@jhuapl

9 March 2018 8

Attack Surface Characterization ApproachComplete the Attack Surface Analysis

• Complete (or update) your MBCRA- Characterize the threat

Understand your mission and what the adversaries’ objectives would be Consider the “art of the possible”

- Characterize the mission (from mission decomposition)- Characterize the system- Characterize cyber risk

• Inform development (e.g. validate cybersecurity requirements)• Inform cybersecurity T&E planning

Inform Development

and T&ERefine / Validate

Risk Model

Cyberspace Threat Characterization

Mission-Based Cybersecurity Risk Assessment / Cyber Table Top High Fidelity

Model the Mission, System, and Threat

Low Fidelity

Systems Engineering and T&E Activities

Page 9: Cybersecurity and Resiliency Test and Evaluation Considerations · 2018-03-09 · Cybersecurity and Resiliency Test and Evaluation Considerations 8 March 2018 Paul Dailey, PhD. Paul.Dailey@jhuapl

Cybersecurity and Resilience

9 March 2018 9

• Similar concerns, different emphasis

• Potential to interfere with or inhibit each other

• Awareness, evaluation, and careful trade-off

Contingency Planning

Configuration Management

Awareness and Training

Incident Response

Penetration Testing

Diversity

Vulnerability Assessment

Boundary Defense

Data and Media Protection

Risk Assessment

Access Control

Account Monitoring

Auditing

Identification and Authentication

Robustness

Redundancy

Casualty and Backup

Operations

Fast Disconnection

Situation Awareness

Modularity

ResilienceCybersecurity

Prevent Protect Respond Recover

Page 10: Cybersecurity and Resiliency Test and Evaluation Considerations · 2018-03-09 · Cybersecurity and Resiliency Test and Evaluation Considerations 8 March 2018 Paul Dailey, PhD. Paul.Dailey@jhuapl

9 March 2018 10

Resilient CapabilitiesHow will you continue to operate when you’re compromised?

Feature Description Implications for Cyber ResilienceDiversity Differently designed or implemented

modules with (nearly) the same functionality.*

Multiple techniques required to degrade a particular function; can reduce scope of an intended attack.

Modularity Functions are cleanly encapsulated and dependencies between functional modules are minimized.

Helps contain system failures and negative effects to a single or just a few modules.*

Robustness System is effective in all or most situations and conditions.

Better able to recover from cyber attacks designed to cause failures; can also be robust against cyberspace-specific conditions like malware propagation and system re-infection.*

Redundancy Duplicate components provide replacement capability when a primary component fails.*

Minimal if the redundant components are identical; if source of compromise can be removed prior to switchover, can provide rapid reconstitution and recovery.

Fast Disconnection

Ability to rapidly isolate subsystems, modules, or components while they continue to operate. Ideally, to also easily reconnect when the danger has passed.

Ability to continue operating in compromised environments, can also reduce the spread of malware and assist in diagnosing sources of infection.

Situation Awareness

Insight into the current state of the system to operators and to the system itself; includes an awareness of current threats and risks to the system.

Increases the ability to maintain and reconstitute system functions when compromised.

Casualty and Backup Operations

Ensure essential functions are still performed when the system fails or is compromised.

Appearance of a failure may prompt system-degrading actions; operator-performed casualty or backup operations may be isolated from cyber compromise.

*K.J. Hole, Anti-fragile ICT Systems, Springer, 2016, [online] Available: http://link.springer.com/book/10.1007/978-3-319-30070-2.

Page 11: Cybersecurity and Resiliency Test and Evaluation Considerations · 2018-03-09 · Cybersecurity and Resiliency Test and Evaluation Considerations 8 March 2018 Paul Dailey, PhD. Paul.Dailey@jhuapl

Discussion

9 March 2018 11

Cyber T&E: Requirements Verification vs. Vulnerability Discovery

Page 12: Cybersecurity and Resiliency Test and Evaluation Considerations · 2018-03-09 · Cybersecurity and Resiliency Test and Evaluation Considerations 8 March 2018 Paul Dailey, PhD. Paul.Dailey@jhuapl