Document 13214157

advertisement
Cyber Defence Data Exchange and
Collaboration Infrastructure (CDXI)
Luc Dandurand
NATO C3 Agency
luc.dandurand@nc3a.nato.int
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
2
NATO C3 Agency
Mission:

Enable NATO’s success through the unbiased provision of
comprehensive C4ISR capabilities
NC3A mainly provides acquisition and scientific support
to NATO and NATO Nations
Key player at helping Nations achieve interoperability
CDXI is sponsored by NATO Allied Command
Transformation (ACT, Norfolk, VA)
http://www.nc3a.nato.int/
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
3
What is the CDXI?
Ultimately, the goal of CDXI is to
 transport
cyber defence data between organisations
 through a resilient, global infrastructure
 structure the data for machine processing
 feed it directly into automated applications
 provide assurance of its origin and quality
 provide access controls for confidentiality
 provide tools to collaborate on improving the data
 enable commercial exploitation
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
4
Cyber Defence Data
Reference Information
 Vulnerabilities
 Software
(Applications and Operating Systems)
 Hardware
 Malware
 Patches and Fixes
 Verification Tests (e.g. IDS signatures & VA tests)
 Protocol specifications
 Certifications
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
5
Cyber Defence Data
Operational Information
 Events
 Incidents
 IP
addresses
 Implicated parties
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
6
What problems does it solve?
Beyond the basic need to exchange data
 Lots



of data sources saying different things
Errors & Discrepancies
Different focus and taxonomies
→ No simple way to fix known errors and collaborate
 Limited


ability to automate CD applications
Importing from the Web is often “manual”
Limited quality assurance → THIS IS A MAJOR PROBLEM
 No
resilience → Need a local copy of all data!
 No automated implementation/enforcement of
sharing policies
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
7
Examples of Discrepancies
CVE 2010-2941
18 Nov 2010
Possibly execute
arbitrary code via a
crafted packet
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
8
CVE 2010-2941
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
9
CVE 2010-2941
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
10
CVE 2010-2941
[…]
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
11
CVE 2010-2941
?
[…]
?
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
12
CVE 2010-2941
[…]
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
13
How do we fix this?
“Support dissension to reach consensus”
 Easily
modify the data and send back to community
 “Multiple truths” co-exist until further research
uncovers the “ultimate truth”
 Reject or block erroneous data coming into own
automated systems
Custom Quality Assurance Processes
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
14
Structured Cyber Defence Data
Strategy of CDXI is currently based on
 Pure


Single identifier for each element (e.g. “CVE-ID”)
Used to create all links to other data
 Agile


enumerations for the specified topics
Data Model
User-defined taxonomies
User-defined relationships
CDXI could implement most, if not all, standards
in CYBEX X.1500.
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
15
Confidentiality
Limited sharing is a reality
 User-based
and role-based access controls
 Organisational sharing policies


Can limit user actions
Can automate sharing
 Multiple
security labels and mappings
 Instances of CDXI exist at every security level
(Unclassified, Secret and Top Secret)
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
16
Commercial Exploitation
Required since Industry has lots of data,
but more importantly, the resources to refine it
Proposed strategy is to encrypt records
 Sell keys
to decrypt the data through contract
Industry can resell
 Tools
that use the CDXI
 Content
 Quality assurance of content
 Data-mining
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
17
CDXI Architecture
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
18
Relation to CYBEX
Similar to CYBEX in that use/acquisition of the data is out of scope
Implements the following CYBEX functions




Structuring cybersecurity information for exchange purposes
Identifying and discovering cybersecurity information and entities
Establishment of trust and policy agreement between exchanging entities
Providing assured cybersecurity information exchange
Adds support for




Dissension to reach consensus, collaboration mechanisms
Custom quality assurance processes
Commercial exploitation
Provides Resilience
CDXI tackles the problem from a prototype implementation pointof-view, rather than the CYBEX standards-based approach
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
19
CDXI Way Ahead
Concept, high-level requirements and proposed
architecture will be completed Q1 2011
We plan to build and test a prototype in 2011
We plan to continue prototype development/testing
in 2012 and beyond
We hope for: Implementation by Industry?

Concept valid for any knowledge centric community!
For further information: luc.dandurand@nc3a.nato.int
Geneva, 6-7 December 2010
Addressing security challenges on a global scale
20
Download