METRICS AND CONTROLS FOR DEFENSE IN DEPTH AN INFORMATION TECHNOLOGY SECURITY ASSESSMENT INITIATIVE Purpose • Provide an overview of the a DLA Information Assurance initiative entitled Metrics and Controls for Defense in Depth (McDiD) • Illustrate how McDiD applies the Federal Information Technology Security Assessment Framework within the DoD Information Technology Security Certification and Accreditation Process (DITSCAP) McDiD Impetus • Department of Defense Mandate • DoD Instruction 5200.28, Security Requirements for Automated Information Security Systems (AIS), 21 March 1988, mandates the accreditation of all AIS to include stand-alone personal computers, connected systems and networks. • DoD Instruction 5200.40, DoD Information Technology Security Certification and Accreditation Process (DITSCAP), 1 November 1999, established a four-phase process, required activities and general certification and accreditation criteria. • DoD Chief Information Officer Guidance and Policy Memorandum No. 6-8510, DoD Global Information Grid (GIG) Information Assurance (IA), June 16, 2000,directed that DoD develop an enterprise-wide IA architectural overlay to implement a strategy of layered defense (defense-indepth). • Chairman of the Joint Chiefs of Staff Instruction 6510.04, Information Assurance Metrics, 15 March 2000, establishes reporting requirements for the Chairman’s Joint Monthly Readiness Reports. • Need for Improved Security • Internetworking is increasing the business/mission impact of disruption. • Vulnerability is increasing due to the ease of access to cyber weapons and capabilities. • Agency security assessment program has revealed systemic security issues. McDiD Objectives • Leverage an existing mandatory program, DITSCAP, as the “container” and delivery mechanism for all information assurance requirements and initiatives • Shift certification and accreditation focus and resources from documentation & reporting to active security management • Improve quality and consistency of certification and accreditation efforts • Create an integrated enterprise management view to: • Support information assurance oversight • Ensure protection across accreditation boundaries • Distinguish enterprise versus local roles and responsibilities • Make policy and technical information easily accessible to DLA security professionals • Facilitate and enable information/best practices exchange and collaboration within the DLA security community • Structure information so as to: • Satisfy multiple information assurance reporting requirements • Maximize information reuse among related programs and disciplines, e.g., Architecture, Program and Budget, Asset Management, Configuration Management, Continuity Planning • Provide for continuous Information Assurance process improvement Federal Information Technology Security Assessment Framework 5 4 LEVELS 3 2 Documented Procedures & Controls 1 Documented Policy Implemented Procedures & Controls Tested and Reviewed Procedures & Controls Fully Integrated Procedures and Controls DoD Information Technology Security Certification and Accreditation Process Phase 0 [Implicit] • Department and Agency policies are established • C&A process is established Phase 3: Validation • Compliance with controls is independently tested • Authority to Operated is granted Phase 1: Definition • SSAA is drafted • Security requirements are identified • SSAA is negotiated and approved Phase 2: Verification • Security Procedures and Controls are implemented Phase 4: Post Accreditation • SSAA is updated to reflect changes in IT baseline • Security assessment is updated quarterly • Compliance with controls is periodically independently tested Certification & Accreditation Roles & Responsibilities Phase O,1 2 3 4 Action Enterprise Program Manager Identify Security Assess Enterprise Threat Requirements and Develop Assess IT Trends Corresponding Controls Assess Existing Department and Agency Governances Formulate/Update Agency Policy Develop enterprise level controls Implement Controls Provide resources and technical guidance as required Develop test procedures to validate implementation Validate Effectiveness of Conduct enterprise or agencyControls wide validation, e.g., vulnerability assessments, penetration testing Continuously Improve Assess enterprise security Security Posture, Policy and profile revealed by Phase 3 Controls Assess process feedback collected during Phases 2-3 Repeat Phase 1quarterly and as needed Repeat Phase 3 annually Network or System Manager Assess local and network or system level security governances, IT configuration, and system/network specific threats Supplement enterprise controls as required Implement security controls Conduct network or system level testing, e.g., review of plans and procedures Repeat Phase 1 quarterly Repeat Phase 3 annually Provide feedback to HQ Security Controls - Translate General Requirements into Actionable and Testable Objective Security Conditions Control Number Control Name Control Description 2.1. CONFIGURATION CONTROL BOARD. All information systems are under the control of a chartered Configuration Control Board (CCB) that meets regularly and reports to the appropriate Commander. The CCB membership includes an Information Assurance representative. A record of CCB activities is maintained. Metric Metrics C4: No CCB capability exists. C3: A CCB is being planned. C2: A CCB exists, but does not have a charter signed by the Commander. (Does not include IA membership.) C1: A chartered CCB (including IA representation) meets regularly and reports to the Commander. A record of CCB activities is maintained. Rating Explain or Justify Your Rating for this Control Controls are Derived from Many Sources National & DoD Policy DLA Policy Commercial Best Practices DLA Program Review Findings Master list of IA Controls Vulnerability Assessments IG/GAO/Other Audit Findings Agency System / Network Connection Agreements •Number •Name •Desc Local Security Policy Local Configuration Mgmt Practices DLA Wide Legend System Specific Information Category (Sensitivity and Classification) Local System / Network Connection Agreements DAA Specified Requirements A COTS Requirements Management System Maintains Controls Traceablity • Provides “provenance” or traceability to authority for or origin of each control • Ensures all policy mandates are addressed • Supports Agency level policy assessment and formulation • Enables continuous improvement of controls A COTS Free Form Database Provides a Repository for IA Reference Material • Enables research and analysis with Lexus-Nexus like functionality • Makes IA reference material widely available via web Standard Tools and Methods Improve the Quality and Consistency of Certification and Accreditation Process 1. Centralized authorship and promulgation of the enterprise portions 2. Narrative translated into “fill in the blank” DATA TYPE AND FLOW Date Last Updated: Threat Assessment Security Requirements (Controls) Security CONOPS Test & Evaluation Procedures Risk Assessment 2/19/01 User Functional Data Type Clearance Data Category [Unclassified, Level [Uncleared, [e.g., e-mail, Privacy Act, No nSensitive, network Financially No nCritical management Sensitive, Sensitive, traffic, IDS Admin/Other, Critical Sensitive, data, financial, Confidential, Co nfidential, contract, Secret, Top Secret, To p requirements, Secret, Secret, requisitions, Compartmented / Co mpartment ed/SA ] etc.] Special Access] 3. Centralized development and promulagation of standard templates for Authors, Testers, & Reviewers Data Source (Originating System, Receiving Subsytem or System or Module) Module Transm ission Mode [Intranet, Internet, Web, FTP, Telnet, Protection Stand Alone, Mechanism C&A Manual [VPN, SSL, Status of Procedure, SecureShell, Interfacing VAN, Other] Other] System 4. Centralized adminstration of a a webbased COTS Configuration Management system for SSAA document management and workflow Better, Cheaper, Faster Controls Provide an “Index” for the IA Knowledge-Base Department of Defense DIRECTIVE April 1, 2000 NUMBER xxxx.xx of Defense Subject: Computer NetworkDepartment Defense (CND) ASD(C3I) DIRECTIVE April 1, 2000 NUMBER xxxx.xx References: (a) DoD 5025.1-M, of Defense Computer NetworkDepartment Defense (CND) ASD(C3I) (b)Subject: DoD Directive S-3600-1 April 1, 2000 DIRECTIVE NUMBER xxxx.xx (c) DoD Directive 5160 References: (a) DoD 5025.1-M, 1. PURPOSE Computer Network Defense (CND) ASD(C3I) (b)Subject: DoD Directive S-3600-1 1.1. Establishes computer network defense (CND) (c) DoD Directive 5160 policy, definition, andReferences: responsibilities within the Department of Defense. (a) DoD 5025.1-M, 1. PURPOSE (b) DoD Directive S-3600-1 1.2. Authorizes the publication of DoD xxxx.xx1.1. Establishes computer network defense (CND) DoD Directive 5160 R/M/I, consistent DoD (c) 5025.1-M (reference (a)). the policy, with definition, and responsibilities within Department of Defense. 2.APPLICABILITY 1. PURPOSE 1.2. Authorizes the publication of DoD xxxx.xx1.1. Establishes computer network defense (CND) R/M/I, consistent with DoD 5025.1-M (referencewithin (a)). the andSecretary responsibilities This Directive appliespolicy, to the definition, Office of the of Department of Defense. Defense (OSD); the Military Departments; the 2.APPLICABILITY Chairman of the Joint1.2. Chiefs of Staff; the the publication Combatant of DoD xxxx.xxAuthorizes Commands; the Inspector General of thewith Department R/M/I, consistent DoD 5025.1-M (reference (a)). This Directive applies to the Office of the Secretary of of Defense IG,DoD); the Defense Agencies and DoD Defense (OSD); the Military Departments; the field activities (hereafter referred to collectively as 2.APPLICABILITY Chairman of the Joint Chiefs of Staff; the Combatant "the DoD Components"). Commands; the Inspector General of the Department This Directive applies to the Office of the Secretary of of Defense IG,DoD); the Defense Agencies and DoD Defense (OSD); the Military Departments; the field activities (hereafter referred to collectively as Chairman of the Joint Chiefs of Staff; the Combatant "the DoD Components"). Commands; the Inspector General of the Department of Defense IG,DoD); the Defense Agencies and DoD field activities (hereafter referred to collectively as "the DoD Components"). Navigation Aid to “Trace Back” to Policy & Requirements McDiD is Administered Through a Comprehensive IA Knowledge-Base (CIAK) COUNTER DIRECTIVE April 1, 2000 NUMBER xxxx.xx DIRECTIVE April 1, 2000 NUMBER xxxx.xx References: (a) DoD 5025.1-M, of Defense Computer NetworkDepartment Defense (CND) ASD(C3I) (b)Subject: DoD Directive S-3600-1 April 1, 2000 DIRECTIVE NUMBER xxxx.xx (c) DoD Directive 5160 References: (a) DoD 5025.1-M, 1. PURPOSE Computer Network Defense (CND) ASD(C3I) (b)Subject: DoD Directive S-3600-1 1.1. Establishes computer network defense (CND) (c) DoD Directive 5160 policy, definition, andReferences: responsibilities within the Department of Defense. (a) DoD 5025.1-M, 1. PURPOSE (b) DoD Directive S-3600-1 1.2. Authorizes the publication of DoD xxxx.xx1.1. Establishes computer network defense (CND) DoD Directive 5160 R/M/I, consistent DoD (c) 5025.1-M (reference (a)). the policy, with definition, and responsibilities within Department of Defense. 2.APPLICABILITY 1. PURPOSE 1.2. Authorizes the publication of DoD xxxx.xx1.1. Establishes computer network defense (CND) R/M/I, consistent with DoD 5025.1-M (reference (a)). the andSecretary responsibilities within This Directive appliespolicy, to the definition, Office of the of Department of Defense. Defense (OSD); the Military Departments; the 2.APPLICABILITY Chairman of the Joint1.2. Chiefs of Staff; the the publication Combatant of DoD xxxx.xxAuthorizes Commands; the Inspector General of thewith Department R/M/I, consistent DoD 5025.1-M (reference (a)). This Directive applies to the Office of the Secretary of of Defense IG,DoD); the Defense Agencies and DoD Defense (OSD); the Military Departments; the field activities (hereafter referred to collectively as 2.APPLICABILITY Chairman of the Joint Chiefs of Staff; the Combatant "the DoD Components"). Commands; the Inspector General of the Department This Directive applies to the Office of the Secretary of of Defense IG,DoD); the Defense Agencies and DoD Defense (OSD); the Military Departments; the field activities (hereafter referred to collectively as Chairman of the Joint Chiefs of Staff; the Combatant "the DoD Components"). Commands; the Inspector General of the Department of Defense IG,DoD); the Defense Agencies and DoD field activities (hereafter referred to collectively as "the DoD Components"). Navigation Aid for “Drill Down” to Supporting Engineering Guides and Contract Clauses ATTACKS EASURE THREAT VALUE LEVEL OF CLASS INFORMA SECURIT SERVICE ION Department of Defense of Defense Subject: Computer NetworkDepartment Defense (CND) ASD(C3I) CIAK Feeds Defense Operational Readiness Reporting System Master list of IA Controls TECHNIC NONTECH ROBUSTN L ICAL SS COUNTER COUNTER EASURES EASURES SERVICE TECHNOL TECHNOL MECHANI GY GY GAPS MS ELEMENT McDiD Implementation Schedules Drive C&A and Budget •Number •Name •Desc Each Control is Supported by Metrics Conclusion The McDiD Information Assurance initiative, while still early in its implementation, has: – Reduced SSAA preparation costs & time by an order of magnitude – Improved quality • Standard controls & metrics • Standard scope & level of effort • Infused learning & common understanding – Identified additional opportunities for collaboration and process improvement