21
Mission Based Cyber Risk Assessments (MBCRA) Lesson and all discussions are UNCLASSIFIED! Briefs & References can be found at: https ://www.milsuite.mil/book/groups/cyberacq https ://intelshare.intelink.gov/sites/atlcoi/cyberTableTops/SitePages/Caution-Home.aspx

Mission Based Cyber Risk Assessments (MBCRA) Sponsored Documents/3. MBCRA.pdfReduce the likelihood and cost of cyber vulnerability discovery . during operational testing and deployment

  • Upload
    others

  • View
    41

  • Download
    5

Embed Size (px)

Citation preview

Page 1: Mission Based Cyber Risk Assessments (MBCRA) Sponsored Documents/3. MBCRA.pdfReduce the likelihood and cost of cyber vulnerability discovery . during operational testing and deployment

Mission Based Cyber Risk Assessments (MBCRA)

Lesson and all discussions are UNCLASSIFIED!

Briefs & References can be found at:https://www.milsuite.mil/book/groups/cyberacqhttps://intelshare.intelink.gov/sites/atlcoi/cyberTableTops/SitePages/Caution-Home.aspx

Page 2: Mission Based Cyber Risk Assessments (MBCRA) Sponsored Documents/3. MBCRA.pdfReduce the likelihood and cost of cyber vulnerability discovery . during operational testing and deployment

Cyber Risk Assessments

2*Comparison of Cybersecurity Risk MethodologiesRhiannon Hutton, Institute for Defense Analyses

[email protected]

*

SCA-V TTP

Page 3: Mission Based Cyber Risk Assessments (MBCRA) Sponsored Documents/3. MBCRA.pdfReduce the likelihood and cost of cyber vulnerability discovery . during operational testing and deployment

Category – Methodology Mapping

Control-Focused

Capabilities-BasedCollaborativeRisk-Only Modeling for

Simulation

SCA-V TTPCIAM STPA

CJA + TARABluGen MORDA

OCTAVECTT

BlueBookTMCRA

CRA SWP CSRA

CVRALCRIT

NMAMIRA MAAP

CyMRisk

8

Page 4: Mission Based Cyber Risk Assessments (MBCRA) Sponsored Documents/3. MBCRA.pdfReduce the likelihood and cost of cyber vulnerability discovery . during operational testing and deployment

Each MBCRA Category Has Strengths And Weaknesses

• Time/$$ investment required • Expertise required • Information available • Inherent assumptions (uncertainty)

Capabilities-BasedCollaborative Modeling for

Simulation

Uncertainty in attack selection and vulnerability identification Depends on knowledge in the room and mission/system scoping

Uncertainty in threat characterization Depends on accurate knowledge (or prediction) of attacker capabilities

Uncertainty in model representation Accuracy of simulation results depends on fidelity of underlying models

14

Page 5: Mission Based Cyber Risk Assessments (MBCRA) Sponsored Documents/3. MBCRA.pdfReduce the likelihood and cost of cyber vulnerability discovery . during operational testing and deployment

NETCOM Operational Risk Assessment

• IDA reports SCA-V-TTP risk method “Security Control Focused“whereas the CTT / CRA would be more "Collaborative“

• Strongly linked to STIGs, CCIs and scans

• Numerical Vulnerability = (Severity x Impact x Countermeasure) / 10

• Modifies NIST 800-30/39 Risk Tables by • Aggregate Risk

– If > 12 non-compliant controls & > 1/3 at high watermark level, aggregate risk increases

5A consistent control focused process

Page 6: Mission Based Cyber Risk Assessments (MBCRA) Sponsored Documents/3. MBCRA.pdfReduce the likelihood and cost of cyber vulnerability discovery . during operational testing and deployment

MBCRA in the Cyber T&E Process

6*Reference: DoD Cybersecurity T&E Guidebook

Six phases of cyber

T&E*

Cleared for open publication 23 July 2018, CASE # 18-S-1842 Department of Defense Office of Prepublication and Security Review

Page 7: Mission Based Cyber Risk Assessments (MBCRA) Sponsored Documents/3. MBCRA.pdfReduce the likelihood and cost of cyber vulnerability discovery . during operational testing and deployment

MBCRAs: A Part of the Larger Cybersecurity Effort

7

MBCRAs Cooperative VulnerabilityIdentification

Cooperative Vulnerability and Penetration Assessment

Risk Management Framework

Cyber portion of theDevelopmental Evaluation Framework

CybersecurityArchitecture Analysis

Adversarial AssessmentAdversarial Cyber DT

Supply Chain Risk Management Resiliency Design

Attack Path AnalysisCriticality Analysis

Requirements Analysis Threat Assessment

Cleared for open publication 23 July 2018, CASE # 18-S-1842 Department of Defense Office of Prepublication and Security Review

Page 8: Mission Based Cyber Risk Assessments (MBCRA) Sponsored Documents/3. MBCRA.pdfReduce the likelihood and cost of cyber vulnerability discovery . during operational testing and deployment

What is a Cyber Table Top?• Lightweight, low cost, intellectually intensive wargame exercise

– Verbal execution – no actual cyber attacks on systems• Introduce and explore through dialogue the effects of cyber offensive

operations on the capability of systems to continue to carry out or support military missions

• Two-sided wargame focusing on two opposing missions• Provide program managers, engineers, and testers with actionable

information on cyber threats to mission execution – Risks tied to mission impact as assessed by operational experts

• Testing priorities• Mitigation priorities

8Cleared for open publication 23 July 2018, CASE # 18-S-1842 Department of Defense Office of Prepublication and Security Review

CTTs identify risks that the Risk Management Framework (RMF) does not typically identify – and CTTs can assist with RMF risk assessment reporting requirements for

RMF identified findings

Page 9: Mission Based Cyber Risk Assessments (MBCRA) Sponsored Documents/3. MBCRA.pdfReduce the likelihood and cost of cyber vulnerability discovery . during operational testing and deployment

Goals and value-proposition of the CTT• Pragmatic, affordable method to implement elements of the DT/OT six cybersecurity

phases• Generate actionable information on high priority/high mission impact cyber threats

– Inform analysis for the system survivability Key Performance Parameter (KPP)• Define specific high-value follow-on analysis and testing to verify and quantify actual

risks• Provide the Program Manager’s engineering and test team opportunities for risk

reduction throughout the life cycle • Reduce the likelihood and cost of cyber vulnerability discovery during operational

testing and deployment• Socialize the concepts of cybersecurity for program office and operators, bridging the

gaps between systems engineering, testing, and operating

9

CTTs identify risks that the Risk Management Framework (RMF) does not typically identify – and CTTs can assist with RMF risk assessment reporting requirements for RMF identified findings

Cleared for open publication 23 July 2018, CASE # 18-S-1842 Department of Defense Office of Prepublication and Security Review

Page 10: Mission Based Cyber Risk Assessments (MBCRA) Sponsored Documents/3. MBCRA.pdfReduce the likelihood and cost of cyber vulnerability discovery . during operational testing and deployment
Page 11: Mission Based Cyber Risk Assessments (MBCRA) Sponsored Documents/3. MBCRA.pdfReduce the likelihood and cost of cyber vulnerability discovery . during operational testing and deployment

The Four Step CTT Process

11

Planning Knowledge Elicitation

Normalization & Analysis

Risk Synthesis & Recommendations Risk

Management

Accept

Test

In depth analysis

Office Work• Select leads & team

members• Define mission &

scenario• Collect & distribute

reconnaissance • Generate candidate

attack vectors

Select System & Scope

War Gaming Seminar• Teams complete

planning & brief participants

• Working meetings & discussions to evaluate various attacks

Working Meetings• Extract key data from

seminar notes & populate analysis table

• Fill in gaps• Document likelihood,

& impact of cyber attacks

Working Meetings• Categorize attacks • Consider existing /

possible mitigation• Develop risk matrices &

recommendations• Brief out technical results

& recommendations• Schedule leadership brief

The CTT process bridges “Mission Assurance” to “Risks from Cyber Threats” through proven, disciplined war-gaming methods

Exercise Preparation ReportingExercise Execution Post Exercise Analysis

Cleared for open publication 23 July 2018, CASE # 18-S-1842 Department of Defense Office of Prepublication & Security Review

3-5 Days30-60 Days 30-90 Days Varies

Program Actions• Mitigation

planning• Evolved CTT

scope

ReportingExercise Execution

Page 12: Mission Based Cyber Risk Assessments (MBCRA) Sponsored Documents/3. MBCRA.pdfReduce the likelihood and cost of cyber vulnerability discovery . during operational testing and deployment

Exercise Execution & Analysis

Establish:• Purpose• Goals• Expected output• Team missions

Present:• Operational Team brief• OPFOR Mission brief• System under evaluation brief

Team Breakouts

Day 1Day 2 Day 3

Develop Mission Plan

Examine Attack Surface

Data collection and review

Analysis Participants

Document:Discussions, clarificationsData review and verificationFollow on actions for SMEsLessons learned, feedback

Exercise ExecutionPost Exercise

Analysis

Cleared for open publication 23 July 2018, CASE # 18-S-1842Department of Defense Office of Prepublication and Security Review

Page 13: Mission Based Cyber Risk Assessments (MBCRA) Sponsored Documents/3. MBCRA.pdfReduce the likelihood and cost of cyber vulnerability discovery . during operational testing and deployment

Plan ahead for Post Exercise Analysis Key Products

• Analysis table documents attacks

13

Post Exercise Analysis

Cleared for open publication 23 July 2018, CASE # 18-S-1842 Department of Defense Office of Prepublication & Security Review

Exercise Execution

• Risk matrices

Page 14: Mission Based Cyber Risk Assessments (MBCRA) Sponsored Documents/3. MBCRA.pdfReduce the likelihood and cost of cyber vulnerability discovery . during operational testing and deployment

Plan Ahead for Impact & Likelihood Method

14

Post Exercise Analysis

Operational / OPFOR Teams may begin to develop during breakout & during the CTT Execution The final methodology is refined & finalized during analysis

Cleared for open publication 23 July 2018, CASE # 18-S-1842 Department of Defense Office of Prepublication & Security Review

Exercise Execution

Page 15: Mission Based Cyber Risk Assessments (MBCRA) Sponsored Documents/3. MBCRA.pdfReduce the likelihood and cost of cyber vulnerability discovery . during operational testing and deployment

OPFOR Objectives

• Access and Pivot: Insert a cyber weapon/payload onto a computing system and move weapons between connected systems

• Command and Control (C2): Trigger the cyber weapon within the system

• Effect and Exfiltrate: Generate system effects to impact system or human behavior disrupting the video or platform

Cleared for open publication 23 July 2018, CASE # 18-S-1842Department of Defense Office of Prepublication and Security Review

Page 16: Mission Based Cyber Risk Assessments (MBCRA) Sponsored Documents/3. MBCRA.pdfReduce the likelihood and cost of cyber vulnerability discovery . during operational testing and deployment

16

MISSIO

N

PLAN/O

PS

DIRECTCONNECT

Apply critical thinking

Wheel of AccessA.K.A.

Wheel of Doom

Think like a hacker

Prevent, Mitigate, Recover/Resiliency

System Security Engineering

Solutions

Page 17: Mission Based Cyber Risk Assessments (MBCRA) Sponsored Documents/3. MBCRA.pdfReduce the likelihood and cost of cyber vulnerability discovery . during operational testing and deployment

17

Red Team (Adversarial / OPFOR) vs Blue Team (Cooperative / Operational / Hunt / Defender)

Red TeamPortrays APT

• Recon

• Weaponize

• Deliver

• Exploit

• Control

• Execute

• Maintain

Advanced Persistent Threat Objectives• Exfiltrate data• Violate data availability• Corrupt data integrity

APT attemptsmultiple

attacks whileadjusting for

success or failure

Defendersattempt to

analyze attacksand determine

courses of action

Defender Objectives• Protect Against Intrusions• Detect Intrusions• React to Intrusions• Mitigate Intrusions• Determine Responses • Restore After intrusion

Blue TeamPortray Test Items

• Detect

• Deny

• Disrupt

• Degrade

• Deceive

• Destroy

• RecoverData Collection• Attacker actions• Defender detections• Defender actions• Mission activity

Source: Institute for Defense Analysis (IDA), developed for the DASD DT&E InterTEC Cyber Event (ICE) February 2013

Page 18: Mission Based Cyber Risk Assessments (MBCRA) Sponsored Documents/3. MBCRA.pdfReduce the likelihood and cost of cyber vulnerability discovery . during operational testing and deployment

18

Chaos Monkey randomly terminates virtual machine instances and containers that run inside of your productionenvironment. Exposing engineers to failures more frequently incentivizes them to build resilient services.

“Red vs Blue Teaming” is a Way of Life

Page 19: Mission Based Cyber Risk Assessments (MBCRA) Sponsored Documents/3. MBCRA.pdfReduce the likelihood and cost of cyber vulnerability discovery . during operational testing and deployment

CTT Facilitator Collaboration Sitehttps://intelshare.intelink.gov/sites/atlcoi/cyberTableTops/Register on Intelink by going to the link and using a CAC (Instructions also in your Student Syllabus)

Do not click on files to open because you will edit the file – download (right-click) to computer and then edit; you can upload files too

19

Find a Facilitator

Ask a question

Earn Certificate after you attend a CTT

Publish a CTT – find a CTT

Find example files – Click on CTT Facilitators folder, right click to download files

Share best practices

Survey the program

Cleared for open publication 23 July 2018, CASE # 18-S-1842 Department of Defense Office of Prepublication and Security Review

Page 20: Mission Based Cyber Risk Assessments (MBCRA) Sponsored Documents/3. MBCRA.pdfReduce the likelihood and cost of cyber vulnerability discovery . during operational testing and deployment

CTT Facilitator Training Path

20

Attend CTT Facilitator one-

day training

Attend a CTT as a participant, observer, or note taker

Co-facilitate your first CTT with an experienced CTT

facilitator

Certified!AND/OR

CTTFacilitator

Strongly recommend completing entire Training Path before conducting a CTT –observing/co-facilitating with an experienced facilitator is an invaluable step

Provide feedback on the process: Complete Survey on Intelink

Cleared for open publication 23 July 2018, CASE # 18-S-1842 Department of Defense Office of Prepublication and Security Review

Page 21: Mission Based Cyber Risk Assessments (MBCRA) Sponsored Documents/3. MBCRA.pdfReduce the likelihood and cost of cyber vulnerability discovery . during operational testing and deployment

DISTRIBUTION STATEMENT C: DISTRIBUTION AUTHORIZED TO U.S. GOVERNMENT AGENCIES AND THEIR CONTRACTORS ONLY; ADMINISTRATIVE OR OPERATIONAL USE, 19 DECEMBER 2008. OTHER REQUEST FOR THIS DOCUMENT SHALL BE REFERRED TO NAVAL AIR WARFARE CENTER AIRCRAFT DIVISION, AIR-5.1, PATUXENT RIVER, MD 20670-1547.

Questions?

Cleared for open publication 23 July 2018, CASE # 18-S-1842 Department of Defense Office of Prepublication and Security Review