14
© 2012 Utilities Telecom Council ICT Supply Chain Risk Management Nadya Bartol, CISSP, CGEIT UTC Senior Cybersecurity Strategist

Nadya Bartol, CISSP, CGEIT UTC Senior Cybersecurity Strategist Nadya.pdf · SAE Counterfeit Electronic Parts Avoidance series (SAE AS5553, SAE AS6081, etc.) DHS Vendor Procurement

  • Upload
    others

  • View
    10

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Nadya Bartol, CISSP, CGEIT UTC Senior Cybersecurity Strategist Nadya.pdf · SAE Counterfeit Electronic Parts Avoidance series (SAE AS5553, SAE AS6081, etc.) DHS Vendor Procurement

© 2012 Utilities Telecom Council

ICT Supply Chain Risk Management Nadya Bartol, CISSP, CGEIT UTC Senior Cybersecurity Strategist

Page 2: Nadya Bartol, CISSP, CGEIT UTC Senior Cybersecurity Strategist Nadya.pdf · SAE Counterfeit Electronic Parts Avoidance series (SAE AS5553, SAE AS6081, etc.) DHS Vendor Procurement

© 2012 Utilities Telecom Council

What is ICT Supply Chain Risk Management?

• Information and Communication Technology (ICT) products are

assembled, built, and transported by geographically extensive supply

chains of multiple suppliers

• Acquirer does not always know how that happens, even with the

primary supplier

• Not all suppliers are ready to articulate their cybersecurity and cyber

supply chain practices

• Abundant opportunities exist for malicious actors to tamper with and

sabotage products, ultimately compromising system integrity,

reliability, and safety

Acquirers need to be able

to understand and manage associated risks

2

Source: Nadya Bartol, ACSAC Case Study, December 2010

Page 3: Nadya Bartol, CISSP, CGEIT UTC Senior Cybersecurity Strategist Nadya.pdf · SAE Counterfeit Electronic Parts Avoidance series (SAE AS5553, SAE AS6081, etc.) DHS Vendor Procurement

© 2012 Utilities Telecom Council

From The World Is Flat by Thomas Friedman Dell Inspiron 600m Notebook: Key Components and Suppliers

3

Source: Booz Allen Hamilton and DoD

Page 4: Nadya Bartol, CISSP, CGEIT UTC Senior Cybersecurity Strategist Nadya.pdf · SAE Counterfeit Electronic Parts Avoidance series (SAE AS5553, SAE AS6081, etc.) DHS Vendor Procurement

© 2012 Utilities Telecom Council

How is ICT SCRM Different from Traditional Supply

Chain Risk Management

Traditional Supply Chain Risk

Management

ICT SCRM

Will my physical product get to me

on time?

Will my product (physical or logical)

or get to me as it was shipped and

as I ordered?

Is my supply chain resilient and will it

continue delivering what I need in

case of disaster?

Is my supply chain infiltrated by

someone who is inserting extra

features into my hardware and

software to exploit my systems and

get to my information now or later?

What is the risk TO my supply chain

that delivers critical products and

services that I need to mitigate?

What is the risk TO AND THROUGH

my supply chain to my business and

mission that I need to mitigate?

4

Page 5: Nadya Bartol, CISSP, CGEIT UTC Senior Cybersecurity Strategist Nadya.pdf · SAE Counterfeit Electronic Parts Avoidance series (SAE AS5553, SAE AS6081, etc.) DHS Vendor Procurement

© 2012 Utilities Telecom Council

What are the risks?

• Intentional insertion of malicious functionality

• Counterfeit electronics

• Poor practices upstream

5

Page 6: Nadya Bartol, CISSP, CGEIT UTC Senior Cybersecurity Strategist Nadya.pdf · SAE Counterfeit Electronic Parts Avoidance series (SAE AS5553, SAE AS6081, etc.) DHS Vendor Procurement

© 2012 Utilities Telecom Council

Solutions Are Multidisciplinary

6

Source: NISTIR 7622

Page 7: Nadya Bartol, CISSP, CGEIT UTC Senior Cybersecurity Strategist Nadya.pdf · SAE Counterfeit Electronic Parts Avoidance series (SAE AS5553, SAE AS6081, etc.) DHS Vendor Procurement

© 2012 Utilities Telecom Council

Existing and Emerging Practices

7

2008

Comprehensive National

Cybersecurity Initiative

Stood Up

Go

ve

rnm

en

t In

du

str

y

DoD ICT SCRM Key

Practices Document

2009 2010 2011 2012 2013

NIST IR 7622, Notional Supply

Chain Risk Management Practices

for Federal Information Systems

SAFECode

Software Supply

Chain Integrity

papers

Open Trusted Technology

Framework

Common Criteria Technical

Document

ISF Supplier Assurance

Framework

IEC 62443-2-4 – Industrial-

process measurement, control

and automation

ISO/IEC 27036 – Guidelines for Information Security in Supplier Relationships

SAE Counterfeit Electronic Parts Avoidance series (SAE AS5553, SAE AS6081, etc.)

DHS Vendor

Procurement

Language

NIST SP 800-161

PMOs developed

in DOJ and DOE

DHS ICT Supply Chain

Exploits Frame of

Reference GAO Report

Cyberspace Policy Review

The

President’s

International

Strategy for

Cyberspace

DHS

Procurement

Language

Revision

Page 8: Nadya Bartol, CISSP, CGEIT UTC Senior Cybersecurity Strategist Nadya.pdf · SAE Counterfeit Electronic Parts Avoidance series (SAE AS5553, SAE AS6081, etc.) DHS Vendor Procurement

© 2012 Utilities Telecom Council

Existing and Emerging Practices

8

2008

Comprehensive National

Cybersecurity Initiative

Stood Up

Go

ve

rnm

en

t In

du

str

y

DoD ICT SCRM Key

Practices Document

2009 2010 2011 2012 2013

NIST IR 7622, Notional Supply

Chain Risk Management Practices

for Federal Information Systems

SAFECode

Software Supply

Chain Integrity

papers

Open Trusted Technology

Framework

Common Criteria Technical

Document

ISF Supplier Assurance

Framework

IEC 62443-2-4 – Industrial-

process measurement, control

and automation

ISO/IEC 27036 – Guidelines for Information Security in Supplier Relationships

SAE Counterfeit Electronic Parts Avoidance series (SAE AS5553, SAE AS6081, etc.)

DHS Vendor

Procurement

Language

NIST SP 800-161

PMOs developed

in DOJ and DOE

DHS ICT Supply Chain

Exploits Frame of

Reference GAO Report

Cyberspace Policy Review

The

President’s

International

Strategy for

Cyberspace

DHS

Procurement

Language

Revision

Page 9: Nadya Bartol, CISSP, CGEIT UTC Senior Cybersecurity Strategist Nadya.pdf · SAE Counterfeit Electronic Parts Avoidance series (SAE AS5553, SAE AS6081, etc.) DHS Vendor Procurement

© 2012 Utilities Telecom Council

Existing and Emerging Practices

9

2008

Comprehensive National

Cybersecurity Initiative

Stood Up

Go

ve

rnm

en

t In

du

str

y

DoD ICT SCRM Key

Practices Document

2009 2010 2011 2012 2013

NIST IR 7622, Notional Supply

Chain Risk Management Practices

for Federal Information Systems

SAFECode

Software Supply

Chain Integrity

papers

Open Trusted Technology

Framework

Common Criteria Technical

Document

ISF Supplier Assurance

Framework

IEC 62443-2-4 – Industrial-

process measurement, control

and automation

ISO/IEC 27036 – Guidelines for Information Security in Supplier Relationships

SAE Counterfeit Electronic Parts Avoidance series (SAE AS5553, SAE AS6081, etc.)

DHS Vendor

Procurement

Language

NIST SP 800-161

PMOs developed

in DOJ and DOE

DHS ICT Supply Chain

Exploits Frame of

Reference GAO Report

Cyberspace Policy Review

The

President’s

International

Strategy for

Cyberspace

DHS

Procurement

Language

Revision

Page 10: Nadya Bartol, CISSP, CGEIT UTC Senior Cybersecurity Strategist Nadya.pdf · SAE Counterfeit Electronic Parts Avoidance series (SAE AS5553, SAE AS6081, etc.) DHS Vendor Procurement

© 2012 Utilities Telecom Council

Existing and Emerging Practices

10

2008

Comprehensive National

Cybersecurity Initiative

Stood Up

Go

ve

rnm

en

t In

du

str

y

DoD ICT SCRM Key

Practices Document

2009 2010 2011 2012 2013

NIST IR 7622, Notional Supply

Chain Risk Management Practices

for Federal Information Systems

SAFECode

Software Supply

Chain Integrity

papers

Open Trusted Technology

Framework

Common Criteria Technical

Document

ISF Supplier Assurance

Framework

IEC 62443-2-4 – Industrial-

process measurement, control

and automation

ISO/IEC 27036 – Guidelines for Information Security in Supplier Relationships

SAE Counterfeit Electronic Parts Avoidance series (SAE AS5553, SAE AS6081, etc.)

DHS Vendor

Procurement

Language

NIST SP 800-161

PMOs developed

in DOJ and DOE

DHS ICT Supply Chain

Exploits Frame of

Reference GAO Report

Cyberspace Policy Review

The

President’s

International

Strategy for

Cyberspace

Energy

Delivery

Systems ICS

Procurement

Language

Page 11: Nadya Bartol, CISSP, CGEIT UTC Senior Cybersecurity Strategist Nadya.pdf · SAE Counterfeit Electronic Parts Avoidance series (SAE AS5553, SAE AS6081, etc.) DHS Vendor Procurement

© 2012 Utilities Telecom Council

Existing and Emerging Practices

11

2008

Comprehensive National

Cybersecurity Initiative

Stood Up

Go

ve

rnm

en

t In

du

str

y

DoD ICT SCRM Key

Practices Document

2009 2010 2011 2012 2013

NIST IR 7622, Notional Supply

Chain Risk Management Practices

for Federal Information Systems

SAFECode

Software Supply

Chain Integrity

papers

Open Trusted Technology

Framework

Common Criteria Technical

Document

ISF Supplier Assurance

Framework

IEC 62443-2-4 – Industrial-

process measurement, control

and automation

ISO/IEC 27036 – Guidelines for Information Security in Supplier Relationships

SAE Counterfeit Electronic Parts Avoidance series (SAE AS5553, SAE AS6081, etc.)

DHS Vendor

Procurement

Language

NIST SP 800-161

PMOs developed

in DOJ and DOE

DHS ICT Supply Chain

Exploits Frame of

Reference GAO Report

Cyberspace Policy Review

The

President’s

International

Strategy for

Cyberspace

DHS

Procurement

Language

Revision

Page 12: Nadya Bartol, CISSP, CGEIT UTC Senior Cybersecurity Strategist Nadya.pdf · SAE Counterfeit Electronic Parts Avoidance series (SAE AS5553, SAE AS6081, etc.) DHS Vendor Procurement

© 2012 Utilities Telecom Council

How do these standards help?

By answering the following key question:

• How should an organization manage security risks

associated with acquiring ICT products and services?

AND

By providing a rich menu of items to chose from to

• Define your own processes for supplier management

• Ask your suppliers about their processes

12

Page 13: Nadya Bartol, CISSP, CGEIT UTC Senior Cybersecurity Strategist Nadya.pdf · SAE Counterfeit Electronic Parts Avoidance series (SAE AS5553, SAE AS6081, etc.) DHS Vendor Procurement

© 2012 Utilities Telecom Council

In Summary

• The problem is real

• Practices are available to make things better

• Solutions come from multiple disciplines

• This is complex – start somewhere and improve

13

Summary and Questions

Page 14: Nadya Bartol, CISSP, CGEIT UTC Senior Cybersecurity Strategist Nadya.pdf · SAE Counterfeit Electronic Parts Avoidance series (SAE AS5553, SAE AS6081, etc.) DHS Vendor Procurement

© 2012 Utilities Telecom Council

Contact Information

• Nadya Bartol

[email protected]

11/22/2013 14