19
© 2014 TASC, Inc. | Proprietary Improving Cybersecurity Through the Implementation of the DoD Risk Management Framework Presented by Gerald Blondeaux October 8, 2014

Improving Cybersecurity Through the Implementation of the ...itea.org/images/pdf/conferences/2014_Symposium/Proceedings/Blon… · mission and business process level, and information

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Improving Cybersecurity Through the Implementation of the ...itea.org/images/pdf/conferences/2014_Symposium/Proceedings/Blon… · mission and business process level, and information

© 2014 TASC, Inc. | Proprietary

Improving Cybersecurity Through the Implementation of the DoD Risk Management FrameworkPresented by Gerald BlondeauxOctober 8, 2014

Page 2: Improving Cybersecurity Through the Implementation of the ...itea.org/images/pdf/conferences/2014_Symposium/Proceedings/Blon… · mission and business process level, and information

© 2014 TASC, Inc. | Proprietary

2

Improving Cybersecurity Through the Implementation of the DoD RMF

Risk Management Framework (RMF) Overview

DoDI 8500.01: Cybersecurity

DoDI 8510.01: RMF

DoD Information Technology (IT) Overview

RMF Lifecycle

RMF Governance: Three Tier Approach

RMF Alignment with DoD Acquisition Process

Closing: Improve Cybersecurity Through RMF

References

Page 3: Improving Cybersecurity Through the Implementation of the ...itea.org/images/pdf/conferences/2014_Symposium/Proceedings/Blon… · mission and business process level, and information

© 2014 TASC, Inc. | Proprietary

3

• Receiving• Processing• Storing

• Displaying• Transmitting

DoDI 8500.01: Cybersecurity

Applicable to every DoDorganization and all DoDinformation regardless of where information resides.

No AnonymityCybersecurity ApplicabilityEnsures Mission Risk and Mission Resilience are Central to Program and operational decisions.

Gain efficiencies through “build once, use many” cybersecurity approach through centrally built, hosted, and authorized capabilities in DoD networks.

Aligns DoD with federal government by adopting NIST and CNSS standards.

DoD AlignmentEnterprise-Wide Cybersecurity Solutions

Vendors may now build products once in accordance with NIST guidelines. This improves deployment across all government agencies saving development time and costs and fosters reciprocity between agencies.

Similar products across agencies improves operating knowledge base while promoting interoperability and information sharing.

Promote SharingIncreased Product Availability

Applicable to all IT that interacts with DoD information by:

Including weapons systems and industrial control systems.

Page 4: Improving Cybersecurity Through the Implementation of the ...itea.org/images/pdf/conferences/2014_Symposium/Proceedings/Blon… · mission and business process level, and information

© 2014 TASC, Inc. | Proprietary

4

Implements a three-tiered approach to risk management that address risk-related concerns at the enterprise level, mission and business process level, and information level.

DoDI 8510.01: RMF

Three-tier approach to cybersecurity risk management synchronizes and integrates across all levels and phases of IT.

SynchronizeTiered Approach to Risk ManagementEmphasizes Information Security & Continuous Monitoring with timely correction of deficiencies.

Provides organizations an accurate status of vulnerabilities caused by non-compliant controls with relation to other risk factors including threat, impact, and likelihood.

Focuses on risks incurred by missions and how to buy down cybersecurity risks through applying the most effective and appropriate mitigations.

Buy Down Cybersecurity Risk

Risk Management Methods

Organizes system authorization reciprocity, enabling agencies to accept approvals by other agencies for interconnection or reuse of IT without retesting.

Reciprocity reduces the schedule and financial impacts associated with testing and retesting systems that otherwise have minimal impact to security.

Reduce CostEstablish Reciprocity

Page 5: Improving Cybersecurity Through the Implementation of the ...itea.org/images/pdf/conferences/2014_Symposium/Proceedings/Blon… · mission and business process level, and information

© 2014 TASC, Inc. | Proprietary

5

Assess OnlyFull RMF Process: Assess & Authorize

DoD Information Technology Overview

DoD Information Technology

Information Systems

Platform IT (PIT)

Services Products

Major Applications

Enclaves PIT Systems PIT Internal

External

Software

Hardware

Applications

RMF Applies to All Information Technology

Page 6: Improving Cybersecurity Through the Implementation of the ...itea.org/images/pdf/conferences/2014_Symposium/Proceedings/Blon… · mission and business process level, and information

© 2014 TASC, Inc. | Proprietary

6

RMF Lifecycle

Step 1

CATEGORIZE

System NIST SP 800-60

Step 2

SELECT

Security ControlsNIST SP 800-53

Step 3

IMPLEMENT

Security ControlsNIST SP 800-160

Step 4

ASSESS

Security ControlsNIST SP 800-53A

Step 5

AUTHORIZE

SystemNIST SP 800-37

Step 6

MONITOR

Security ControlsNIST SP 800-137

Page 7: Improving Cybersecurity Through the Implementation of the ...itea.org/images/pdf/conferences/2014_Symposium/Proceedings/Blon… · mission and business process level, and information

© 2014 TASC, Inc. | Proprietary

7

RMF Lifecycle Step 1: Categorize System

Step 1

CATEGORIZE

System

Step 2

SELECT

Security Controls

Step 3

IMPLEMENT

Security Controls

Step 4

ASSESS

Security Controls

Step 5

AUTHORIZE

System

Step 6

MONITOR

Security Controls

Early cybersecurity consideration determine impact:

- For information processed, stored, transmitted, or protected by the information system

- For the information system

NIST SP800-60 V. II provides impact values for various information types.

Security objectives include:

- Confidentiality

- Integrity

- Availability

Impact values applied to each security objective are:

- Low

- Moderate

- High

Categorize System

• Categorize system in accordance with CNSSI 1253

• Initiate Security Plan• Assign qualified

personnel to RMF roles

Page 8: Improving Cybersecurity Through the Implementation of the ...itea.org/images/pdf/conferences/2014_Symposium/Proceedings/Blon… · mission and business process level, and information

© 2014 TASC, Inc. | Proprietary

8

RMF Lifecycle Step 2: Select Security Controls

Step 1

CATEGORIZE

System

Step 2

SELECT

Security Controls

Step 3

IMPLEMENT

Security Controls

Step 4

ASSESS

Security Controls

Step 5

AUTHORIZE

System

Step 6

MONITOR

Security Controls

Select the initial security controls

- Select baseline controls from CNSSI 1253 based on the security category

- Apply overlays identified during security categorization

Tailor the initial security controls

- Identify and designate common controls, apply scoping considerations, select compensation controls, assign specific parameter values, and supplement baselines based on risk assessment

- Determine if additional assurance–related controls are required to increase the level of trustworthiness in the information system and supplement as needed

Select Security Controls

• Common Control Identification

• Select security controls• Review and approve

Security Plan• Apply overlays and

tailor

Page 9: Improving Cybersecurity Through the Implementation of the ...itea.org/images/pdf/conferences/2014_Symposium/Proceedings/Blon… · mission and business process level, and information

© 2014 TASC, Inc. | Proprietary

9

RMF Lifecycle Step 3: Implement Security Controls

Step 1

CATEGORIZE

System

Step 2

SELECT

Security Controls

Step 3

IMPLEMENT

Security Controls

Step 4

ASSESS

Security Controls

Step 5

AUTHORIZE

System

Step 6

MONITOR

Security Controls

Implement security controls from security plan following DoDguidance found on the RMFKnowledge Service.

- Apply STIGs or SRGs when STIGs are not available

- Early and consistent involvement with security engineers

- Address system security design in preliminary and critical design reviews

- Document security control implementation in the security plan with implementation description per RMF KS

- Identify and associate compliance for security controls that are inherited by IS and PIT from hosting or connected system

Implement Security Controls

• Implement solutions consistent with DoDComponent Cybersecurity architectures

• Document security control implementation

Page 10: Improving Cybersecurity Through the Implementation of the ...itea.org/images/pdf/conferences/2014_Symposium/Proceedings/Blon… · mission and business process level, and information

© 2014 TASC, Inc. | Proprietary

10

RMF Lifecycle Step 4: Assess Security Controls

Step 1

CATEGORIZE

System

Step 2

SELECT

Security Controls

Step 3

IMPLEMENT

Security Controls

Step 4

ASSESS

Security Controls

Step 5

AUTHORIZE

System

Step 6

MONITOR

Security Controls

Develop and approve a security control assessment plan.

- Coordinate security control assessment with all other acquisition process test events

- Document coordination to maximize synergy support reciprocity and reduce retesting

Assess security controls per assessment plan.

- Record security control compliance status

- Assign vulnerability severity value for security controls

- Determine risk level for security controls

- Assess and characterize aggregate level of risk to the system

Conduct remediation actions on noncompliant security controls.

Assess Security Controls

• Develop and approve Security Assessment Plan

• Assess security controls• Conduct initial

remediation actions

Page 11: Improving Cybersecurity Through the Implementation of the ...itea.org/images/pdf/conferences/2014_Symposium/Proceedings/Blon… · mission and business process level, and information

© 2014 TASC, Inc. | Proprietary

11

RMF Lifecycle Step 5: Authorize System

Step 1

CATEGORIZE

System

Step 2

SELECT

Security Controls

Step 3

IMPLEMENT

Security Controls

Step 4

ASSESS

Security Controls

Step 5

AUTHORIZE

System

Step 6

MONITOR

Security Controls

Prepare POA&M based on vulnerabilities identified during security control assessment.

- Identifies tasks

- Specifies resources required

- Includes milestones

POA&Ms are maintained throughout the life cycle.

- Inherited vulnerabilities addressed in POA&Ms

- AOs monitor and track execution of POA&Ms

Compile/Submit security authorization package

Determine risk to organizational operations including:

- Mission, functions, image, reputation

- Organizational assets, individuals, other organizations, or the Nation

Authorize System

• Prepare POA&M• Submit Security

Authorization Package• Authorizing Official

(AO) conducts final risk determination

• AO makes authorization decision

Page 12: Improving Cybersecurity Through the Implementation of the ...itea.org/images/pdf/conferences/2014_Symposium/Proceedings/Blon… · mission and business process level, and information

© 2014 TASC, Inc. | Proprietary

12

RMF Lifecycle Step 6: Monitor Security Controls

Step 1

CATEGORIZE

System

Step 2

SELECT

Security Controls

Step 3

IMPLEMENT

Security Controls

Step 4

ASSESS

Security Controls

Step 5

AUTHORIZE

System

Step 6

MONITOR

Security Controls

Determine security impact of proposed/actual changes to the system and environment.

- Continuously monitor system for relevant security events

- Periodic assessment of security controls and quality of implementation

- Report significant changes in security posture

Assess security controls employed and inherited by system per continuous monitoring strategy.

- Provide signed annual report on security posture

- Authorization decision may be revoked or downgraded at anytime

Implement decommissioning strategy at the end of system service lifecycle

Monitor Security Controls

• Determine impact of changes to system

• Assess selected controls• Update Security Plan,

SAR and POA&M• Report Status to AO

Page 13: Improving Cybersecurity Through the Implementation of the ...itea.org/images/pdf/conferences/2014_Symposium/Proceedings/Blon… · mission and business process level, and information

© 2014 TASC, Inc. | Proprietary

13

RMF Governance: Three Tier Approach

Tier 1Organization

Tier 2Mission/Business Process

Tier 3IS/PIT Systems

Strategic level addresses risks at the enterprise level.

- Directs/oversees cybersecurity risk management of DoD IT

- Defense IA Security Accreditation Working Group provides guidance to AOs.

- DoD Cybersecurity Architecture

- Planning and execution of RMFKnowledge Service

Tier 1RMF governance Synchronizes and Integrates RMFActivities with a three-tiered approach.

Page 14: Improving Cybersecurity Through the Implementation of the ...itea.org/images/pdf/conferences/2014_Symposium/Proceedings/Blon… · mission and business process level, and information

© 2014 TASC, Inc. | Proprietary

14

RMF Governance: Three Tier Approach

Tier 1Organization

Tier 2Mission/Business Process

Tier 3IS/PIT Systems

PAO appointed to each MA

- Warfighting Mission Area

- Business Mission Area

- Enterprise Information Environment Mission Area

- DoD Portion of Intelligence Mission Area

DoD Component CIO

DoD Component SISO

Tier 2Each level is responsible for addressing the Risk of a System Penetration according to their hierarchical perspective.

Page 15: Improving Cybersecurity Through the Implementation of the ...itea.org/images/pdf/conferences/2014_Symposium/Proceedings/Blon… · mission and business process level, and information

© 2014 TASC, Inc. | Proprietary

15

RMF Governance: Three Tier Approach

Tier 1Organization

Tier 2Mission/Business Process

Tier 3IS/PIT Systems

AOs are assigned by senior leadership and are responsible for their respective IS and PIT.

- Ensure RMF tasks are completed

- Track execution of POA&Ms

- Promote reciprocity

Tier 3Promoting strong governance with the Right Knowledge Expertise and Influence to advance cybersecurity.

Page 16: Improving Cybersecurity Through the Implementation of the ...itea.org/images/pdf/conferences/2014_Symposium/Proceedings/Blon… · mission and business process level, and information

© 2014 TASC, Inc. | Proprietary

16

RMF Alignment with DoD Acquisition Process

Consistently applied across the acquisition life cycle.

Page 17: Improving Cybersecurity Through the Implementation of the ...itea.org/images/pdf/conferences/2014_Symposium/Proceedings/Blon… · mission and business process level, and information

© 2014 TASC, Inc. | Proprietary

17

Closing: Improve Cybersecurity Through RMF

Aligns defense and federal civilian cybersecurity guidance

Applicable to all IT

Early and consistent approach to cybersecurity

Common framework, security controls

Clearly defined milestones within the acquisition process

Enables and supports reciprocity

Reduce time and costs associated with redundant testing

Page 18: Improving Cybersecurity Through the Implementation of the ...itea.org/images/pdf/conferences/2014_Symposium/Proceedings/Blon… · mission and business process level, and information

© 2014 TASC, Inc. | Proprietary

18

Policy References

Title Purpose Link

Knowledge Service DoDI 8510, Authoritative Guidance https://rmfks.osd.mil/

DISA IA Support Environment STIGs, CCIs, SRGs, DAA/AO Training https://iase.disa.mil/index2.html

CNSS Policies CNSSI 1253, Security Control Categorization and Selection

https://www.cnss.gov/policies.html

NIST Publications NIST SP 800-53 Rev. 4 Security Controls, NIST SP 800-37, Guide to implementing RMF

https://csrc.nist.gov/publications/PubsSPs.html

Risk Management Framework for DoD Information Technology

DoDI 8510.01 http://www.dtic.mil/whs/directives/corres/pdf/851001_2014.pdf

Cybersecurity DoDI 8500.01 http://www.dtic.mil/whs/directives/corres/pdf/850001_2014.pdf

Page 19: Improving Cybersecurity Through the Implementation of the ...itea.org/images/pdf/conferences/2014_Symposium/Proceedings/Blon… · mission and business process level, and information

© 2014 TASC, Inc. | Proprietary

Thank you

For more information, contact

Gerald [email protected] 275 0557