® CYBER(15)004016r1 TC CYBER#4 25-26 Jun 2015 Developments related to DTR/CYBER-009, TR 103331, Structured threat information sharing Tony Rutkowski, mailto:tony@yaanatech.co.uk EVP, Standards & Regulatory Affairs Rapporteur, DTR/CYBER-009 ® Current status of the DTR/CYBER-009 work item • DTR/CYBER-009 was tasked at TC CYBER#3 (4 Feb 2015) for producing a Technical Report on means for describing and exchanging cyber threat information in a standardized and structured manner – Such information includes include technical indicators of adversary activity, contextual information, exploitation targets, and courses of action – Modelled after established U.S. DHS/MITRE community efforts • STIX - Structured Threat Information eXpression • TAXII - Trusted Automated eXchange of Indicator Information • Version 0.0.1 of the draft was uploaded 6 Feb 2015 – Contains Technical Report skeleton 2 ® New OASIS Cyber Threat Intelligence Technical Committee • On 20 April, a New committee (CTI) was established in OASIS with essentially an identical remit as DTR/CYBER-009 • Initial specifications were transferred from MITRE/DHS to CTI for evolution and development • MITRE github will continue to host running code and documents until a transition is effected • Has been months in the making – Approval within the USG (DHS/White House, etc.) – Announcing in stages (development community, RSA, OASIS) • First meeting (teleconference) held virtually 18 June among 100 participants • Subsequent meetings will occur monthly • Elected chair is Rich Struse, DHS Chief Advanced Technology Officer, with intent to expand to possible co-chair • Active global outreach is considered essential • Tumblr feeds continuously – http://stixproject.tumblr.com/ 3 TC CTI Roster (18 Jun 2015) Aetna Australia and New Zealand Banking Group (ANZ Bank) Bank of America Intel Corporation Intelworks BV Johns Hopkins University Applied Physics Laboratory Bloomberg JPMorgan Chase Bank, N.A. Blue Coat Systems, Inc. Lumeta Corporation Center for Internet Security (CIS) Mitre Corporation Cisco Systems MTG Management Consultants, LLC. Citrix Systems National Council of ISACs (NCI) Comilion (mobile) Ltd. National Security Agency Cyber Threat Intelligence Network, Inc. (CTIN) NEC Corporation Dell New Context Services, Inc. DHS Office of Cybersecurity and NIST Communications (CS&C) Depository Trust & Clearing Corporation Nomura Research Institute, Ltd. (NRI) EMC North American Energy Standards Board Ericsson Object Management Group Fujitsu Limited Oracle Georgetown University Palo Alto Networks Hewlett-Packard Queralt, Inc. IBM Raytheon Company-SAS Internet Identity (IID) Retail Cyber Intelligence Sharing Center (RCISC) Integrated Networking Technologies, Inc. Securonix Siemens AG Soltra TELUS The Boeing Company Threat Intelligence Pty Ltd ThreatConnect, Inc. ThreatQuotient, Inc. ThreatStream U.S. Bank United Kingdom Cabinet Office ViaSat, Inc. Yaana Technologies, LLC *Jerome Athias *Peter Brown *Elysa Jones *Terry MacDonald *Alex Pinto *Andrew Schoka *Michael Schwartz 54 organizations and 7 Individuals 4 ® CTI TC charter • Phase One – STIX 1.2, TAXII 1.1, and CybOX 2.1 will be contributed to the OASIS CTI TC by DHS – Each will form the basis for a subcommittee – Contributions are the basis for corresponding OASIS Standards Track Work Products • A key objective of the TC will be to limit changes to the input specifications in order to minimize impacts on existing implementations • Phase Two – Evolve the specifications • Further work related to information representations for codifying, analyzing, or sharing of cyber threat intelligence that was not included in the input specifications is also in scope – Produce supporting documentation, open source tooling, and any other materials deemed necessary to encourage the adoption of the specifications 5 ® STIX, TAXII, & CybOX • Conceived by US CERT developer community to meet critical needs for real-time actor tailored traffic/behavior acquisitions, analysis, and remediation • Development led by notable MITRE staff and entwined with other MITRE best-of-breed platforms • Considerable freely-available running code exists • Constitutes the foundation for the White House Executive Order 13691 (13 Feb 2015) on threat information sharing – Foundation platforms for Information Sharing and Analysis Organizations (ISAOs) (http://www.dhs.gov/isao) • Extensible for a broad array of other compliance obligations – Already being used by banking/financial community and emergency/disaster warning segment 6 ® Similar work • *IETF IODEF/RID/RID-T (RFC 5070, RFC 6545, RFC 6546) – – IETF specifications (https://tools.ietf.org/wg/mile/) to describe and share incident information and used by many CERTs More narrow scope than proposed CTI platforms • *FireEye OpenIOC (http://www.openioc.org) – – FireEys specification to describe Indicators of Compromise and available for public use Addresses a narrow use case (observable patterns for Indicators of Compromise) and represents a partial solution to part of the overall cyber threat information problem, but does not fully address the needs of a holistic cyber threat intelligence information model • *VERIS (http://veriscommunity.net) – – – A set of metrics designed to provide a common language for describing security incidents Addresses a narrow use case and represents a partial solution to part of the overall cyber threat information problem but does not fully address the needs of a holistic cyber threat intelligence information model Published format available on GitHub, developed at the sole discretion of the VERIS community • *OMG Threat Modeling Working Group (http://www.omg.org/hot-topics/threat-modeling.htm) – – A proposal for a combined risk-threat information model that incorporates STIX (among other things) Expected to cover a broader scope (cyber and physical, threat and risk) in order to coordinate across these domains but does not seek to re-define a model within the domain to the low level that STIX and CybOX do • EU Advanced Cyber Defence Centre (ACDC) (http://acdc-project.eu/) – – – EU funded project from early 2013 to mid-2015 – evolving into a sustainable European centre for cyber defence, building on 8 networked support centres and 1 clearing house deployed during the project and enlarging the cyber-protection scope beyond botnets ACDC unites a community of 28 organisations from 14 countries, including Internet Service Providers, CERTs, law enforcement agencies, IT providers, National Research and Education Networks (NRENs), academia and critical infrastructure operators Many platforms leveraged (http://acdc-project.eu/acdc-deliverables/) • NATO Abuse Helper (http://abusehelper.be/) – An open-source project initiated by CERT.FI and CERT.EE with Clarified Networks to automatically process incidents notifications • ITU-T SG17 X.nessa, Access control models for incidents exchange networks (http://www.itu.int/itut/workprog/wp_item.aspx?isn=10477) (Ref TD 1792r2) – Initiative by Russian government to produce a Recommendation to “identify incidents exchange entities for facilitation of implementation of access control policies” 7 ® Formation of ISAOs (Information Sharing and Analysis Organizations) • The operational side of structured threat information sharing is enhanced through ISAOs • Explicitly treated by White House Executive Order 13691. • Some unknown number of ISAO-like entities presently exist – largely as industry ISACs (Information Sharing and Analysis Centers) • Promotion is currently subject of two U.S. DHS initiatives – Consultative proceeding (Docket No. DHS–2015–0017) • Comments submitted – Funding RFP (DHS-15-NPPD-128-001) 8 ® Known ISACs A-ISAC DIM-ISAC DNG-ISAC EMR-ISAC ES-ISAC FS-ISAC ICS-ISAC IT-ISAC Maritime ISAC MS-ISAC NC-ICSAC NCC NEI NH-ISAC ONG-ISAC PT-ISAC RE-ISAC REN-ISAC SC-ISAC ST-ISAC Water ISAC Aviation Information Sharing and Analysis Center ISAC Defense Industrial Base ISAC Downstream Natural Gas ISAC Emergency Management & Response ISAC Electric Sector ISAC Financial Services ISAC Industrial Control System ISAC Information Technology ISAC Maritime Security ISAC Multi-State ISAC National Council of ISACs Communications ISAC Nuclear Energy Institute ISAC National Health ISAC Oil and Gas ISAC Public Transit ISAC Real Estate ISAC Research & Education ISAC Supply Chain ISAC Surface Transportation ISAC Water Information Sharing and Analysis Center ISAC 9 ® For discussion and guidance • How to evolve DTR/CYBER-009 work item – Collaborate closely with OASIS CTI – Replicate OASIS CTI specifications – Enumerate other discoverable threat intelligence sharing activities as a generic report – Facilitate some further ETSI roles, e.g., ISAO formation • What role should ETSI play concerning Information Sharing and Analysis Organizations (ISAOs) – Facilitate specialized community ISAOs around ETSI technology platforms (NFV, LI/RD, ESI, DECT, …) – Facilitate mobile ISAOs around 3GPP/GSMA or one M2M platforms – Provide a global registry for ISAOs – Develop ISAO certification requirements 10