Resiliency Rules: 7 Steps for Resiliency in Critical Infrastructure Protection

advertisement
Resiliency Rules:
7 Steps for Resiliency in
Critical Infrastructure
Protection
Phil Sodoma
Director, International Security Strategy
Trustworthy Computing Group
Microsoft
Resiliency Rules
Government,
infrastructure
owners/operators
can collaboratively
pursue these core
enablers of
resiliency and
infrastructure
security
7 Steps for Resiliency in
Critical Infrastructure
Protection
CIP Goals
Establishing Clear Goals
is Central to Success
Understanding Roles
Promotes Coordination
CIP Roles
Government
Define Policy and Identify Roles
“What’s the goal”
Determine Acceptable Risk Levels
Public-Private Partnership
“What’s critical”
Incidences, emerging
issues, & changing
conditions :
Infrastructure
“Prioritize Risks”
M easure
Effectiveness
Assess Risks
Implement
Controls
Identify
Controls and
M itigations
Operators
“Best control solutions”
constantly update risk
assessment
Define Roles
CIIP
Coordinator
(Executive
Sponsor)
Understanding roles and
objectives promotes trust
and efficiency
Public-Private
Partnerships
Infrastructure
Owners and
Operators
Law
Enforcement
SectorSpecific
Agency
Government
Computer
Emergency
Response Team
Shared
IT Vendors
and
Solution
Providers
Private
Identify and Prioritize
Critical Functions
Collaborate to understand
Interdependencies
y Establish an open
Critical Function
Infrastructure
Element
Supply
Chain
Supply
Chain
dialogue to
understand the
Key Resource
Supply
Chain
Critical Function
Infrastructure
Element
Critical Function
Infrastructure
Element
Supply
Chain
Supply
Chain
critical functions,
infrastructure elements,
and key resources
necessary for:
Supply
Chain
Key Resource
Supply
Chain
Supply
Chain
Key Resource
Supply
Chain
Supply
Chain
Understand
Interdependencies
y delivering essential
services,
y maintaining the orderly
operations of the
economy, and
y helping to ensure public
safety.
Continuously Assess
and Manage Risks
• Evaluate Program
Effectiveness
• Leverage Findings to
Improve Risk Management
Protection is the Continuous
Application of Risk
Management
• Identify Key Functions
• Assess Risks
• Evaluate Consequences
Incidences, emerging
issues, & changing
conditions :
constantly update risk
assessment
• Define Functional Requirements
• Evaluate Proposed Controls
• Estimate Risk Reduction/Cost Benefit
• Select Mitigation Strategy
Establish and
Exercise Emergency
plans
y
Improve Operational
Coordination
Public- and private-sector organizations alike can benefit from developing joint
plans for managing emergencies, including recovering critical functions in the
event of significant incidents, including but not limited to:
y
y
y
y
natural disasters
terrorist attacks
technological failures
accidents.
y
Emergency response plans can mitigate damage and promote resiliency.
y
Effective emergency response plans are generally short and highly actionable so
they can be readily tested, evaluated, and implemented.
y
Testing and exercising emergency response plans promotes trust,
understanding, and greater operational coordination among public- and privatesector organizations.
y
Exercises also provide an important opportunity to identify new risk factors that
can be addressed in response plans or controlled through regular risk
management functions.
Create Public-Private
Partnerships
Collaboration is key to
protecting critical
infrastructure
Build Security &
Resiliency into
Infrastructure
Building security and resiliency
into infrastructure operations
Security
Controls
Security is a continuous
process
Critical Functions
(Global, National, Local)
Infrastructure
Operations
Management
Technical
Operational
Fosters increased security and
resiliency for the critical functions
that support safety, security and
commerce at all levels
Update and Innovate
Technology/Processes
Mitigate threats by keeping
technology current and
practices innovative
Questions?
Appendix
Security Development
Lifecycle (SDL)
Security is a continuous
process
The Security
Development Lifecycle
Product
Inception
Assign
security
advisor
Identify
security
milestones
Plan
security
integration
into product
Design
Define
security
architecture
and design
guidelines
Document
elements of
software
attack
surface
Threat
Modeling
Standards,
best
practices,
and tools
Apply coding
and testing
standards
Apply
security tools
(fuzzing
tools, staticanalysis
tools, etc.)
Driving Change Across
Microsoft
Security Push
Security code
reviews
Focused
security
testing
Review
against new
threats
Meet signoff
criteria
Final Security
Review
Independent
review
conducted by
the security
team
Penetration
testing
Archiving of
compliance
info
RTM and
Deployment
Signoff
Microsoft Innovations Drive
Service
s
Edge
Ne
tw
or
k
Server
Applications
Ac
ce
ss
Pr
ot
ec
t io
n
Enc
ryp
t i ng
File
Sys
BitL
tem
ock
(EF
er™
S)
Information
Protection
Client and
Server OS
(N
AP
)
Identity
Management
Systems
Management
Active Directory
Federation Services
(ADFS)
Guidance
Developer
Tools
Download