NIST’s Role in Computer Security Ed Roback Computer Security Division NIST Information Technology Laboratory November 9, 1999 1 Agenda Who we are Computer security program NIST partnerships Summary November 9, 1999 2 Promote the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure for information technology Advanced Network Technologies Computer Security Distributed Computing and Information Services High Performance Systems and Services Information Access and User Interfaces Mathematical and Computational Sciences Software Diagnostics and Conformance Testing Statistical Engineering November 9, 1999 4 NIST Mandate for Computer Security Develop standards and guidelines for the Federal government Improve the competitiveness of the American IT industry November 9, 1999 5 Computer Security Division Mission To improve the state-of-the-art in information security through: Awareness Standards, Metrics, Tests Guidance to increase effective Guidance security planning and implementation of cost-effective security in Federal systems Standards, Metrics, Tests Awareness to promote, measure, and of IT validate security vulnerabilities improvements and enable and confidence for marketplace transactions and minimum protection standards for Federal requirements systems November 9, 1999 6 Agenda Who we are Computer security program NIST partnerships Summary November 9, 1999 7 Security Program Strategy Collaboration with industry and government – Work to develop IT specifications and conformance tests to promote secure, interoperable products and systems – Develop standards in cooperation with industry and voluntary consensus standards bodies to promote and protect USG and IT industry interests Acting as “honest broker” November 9, 1999 8 Security Program Strategy (Concluded) Focus on Improving the security of products and systems – Develop standards for secure, interoperable products – Validate conformance of commercial products to selected Federal Information Processing Standards (FIPS) – Perform research and conduct studies to identify vulnerabilities and devise solutions – Develop new test methods and procedures that will make testing of security requirements/ specifications more efficient and cost effective November 9, 1999 9 Key Components of NIST’s Computer Security Program Security standards development Security testing Exploring new security technologies Assistance and guidance November 9, 1999 10 Security Standards Development Work with industry and government to develop standards for computer security – – – – – Cryptography Policies, management, and operational controls Best practices Common Criteria Public Key Infrastructure (PKI) November 9, 1999 11 Key Efforts -- Standards AES FIPS 46-3 DSS Upgrade SHA-2 FIPS 140-2 X9.82 Key Exchange ISO 15408 IETF ISO 15292/15446 FIPA PKI November 9, 1999 Advanced Encryption Standard Triple Data Encryption Standard (DES) to include RSA, Elliptic Curve Upgrade of SHA-1 Upgrade of 140-1 Random Number Generator Key Exchange/Agreement Standard(s) Common Criteria v.2 PKIX, IPSec, DNSSec, etc. Protection Profile Registration and Development Guidance Foundation for Intelligent Physical Agents Security Requirements for Certificate Issuing and Management Components (CIMCs) 12 Security Testing Develop the tests, tools, profiles, methods, and implementations for timely, cost effective evaluation and testing Validation – Cryptographic Module Validation Program (CMVP) – National Information Assurance Partnership (NIAP) Conformance and interoperability testing – MISPC – IPv6 test resource November 9, 1999 13 Key Efforts -- Testing Crypto Module Validation Program Algorithm Testing Random Number Generator Testing MISPC Testing Certificate Authority Testing Firewall Security & Evaluation Tests Telecommunications Switch Security Protection Profile Testing Automated Test Development/Generation Common Criteria Evaluation and Validation Scheme Laboratory Accreditation November 9, 1999 14 Exploring New Security Technologies Identify and use emerging technologies, especially infrastructure niches Develop prototypes, reference implementations, and demonstrations Transition new technology and tools to public & private sectors Advise Federal agencies November 9, 1999 15 Key Efforts -- New Technologies Role-Based Access Control Policy Management Intrusion Detection Mobile Agents Automated Security Test Generation IPSec/web interface testing Security Service Interfaces November 9, 1999 16 Assistance and Guidance Assist U.S. Government agencies and other users with technical security and management issues Assist in development of security infrastructures Develop or point to cost-effective security guidance Actively transfer security technology and guidance from NIST to agencies/industry Support agencies on specific security projects on a costreimbursable basis November 9, 1999 17 Key Efforts -- Assistance and Guidance NIST Special Publications: – 800-18, “Guide for Developing Security Plans for Information Technology Systems” – 800-16, “Information Technology Security Training Requirements” – “Guideline for Implementing Cryptography in the Federal Government” (Forthcoming) – “Security Incident Handling -- A Cooperative Approach” ITL Bulletins (1999): – November – September – August – May November 9, 1999 Intrusion Detection Securing Web Servers The Advanced Encryption Standard: A Status Report Computer Attacks: What They Are and How to Defend Against Them 18 Agenda Who we are Computer security program NIST partnerships Summary November 9, 1999 19 In carrying out NIST’s programs, we don’t work alone... November 9, 1999 20 Federal Agencies IT Industry Testing Labs NIST Outreach Standards Community Academia November 9, 1999 21 •ACM Workshops on Access Control •Agency Assistance Federal Computer Security Training Resource Center •Best Practice Task Force •CIO Council Security Privacy-Critical Infrastructure •Computer System Security & Privacy Advisory Board (CSSPAB) •ANSI Accredited Standards Committee X9F3 •Critical Infrastructure Protection •ANSI X9.82 Random Number Generation •American Bar Association Information Security •Department of Justice Executive Advisory Standard Ctte Team X9F, X9F1, X9F3 •ANSI •Common Criteria Mutual Recognition •Director Forum of CIO Council •ANSI-NCITS Computer Security ArrangementT4 Management Ctte •DoC/CIO Contingency Planning Affinity Group •Nat'l Committee for Information Technology •Critical Infrastructure Coordination Group •FedCIRC Partners Standards, Committee T3-Open Education &Technical Awareness Ctte •Federal Computer Security Program Managers' Distributed Processing •Federal Public Key Infrastructure Technical Forum •NIST-NSA Technical Working Group Working Group •CEAL: aInformation Cygnacom Solutions Laboratory •Federal Systems Security Educators' •IETF S/MIME V3 Working Group •Forum •Critical for Infrastructure Privacy & Security Coordination in Group •DOMUS IT Security Laboratory, A Healthcare Division of LGS Association (FISSEA) •IETF Public&Key Infrastructure Working Group •Information Education Industry Awareness Group Ctte Group, Inc. •Federal Key Infrastructure Steering (PKIX) Public •National Colloquium for •InfoGard Laboratories, Inc.Information Systems Committee & Subgroups •IETF Internet Protocol Security (IPSEC) Security Education (NCISSE) •Forum for PrivacySecure & Security in (IPSP) Healthcare •Internet Protocol Policy •National Science Foundation Career Proposal •High Performance Computing and Internet Protocol Secure Remote Access (IPSRA) Review Panel Communications •ISO/Internat'l Electrotechnical Commission Joint •Nat'l Ctte for Information Technology Standards, •Information Industry Group Technical Committee 1 T3-Open Distributed Processing •INFOSEC Research Council •ISO JTCI Security SC27 Computer Security •Network Information Exchange •National Colloquium for Information Systems •Smart Card Card Security Security Users Users Group Group •Smart Security Education (NCISSE) •Steering Ctte Member of ACM Workshop on •National Science Foundation Career Proposal Access Control Review Panel •National Security Telecommunications & Information Systems Security Committee (NSTISSC) •Network Security Information Exchange •NIST-NSA Technical Working Group •Open Source Security Working Group •Smart Card Security Users Group Key Theme: Improving Security Products How we improve security through standards and testing November 9, 1999 22 Develop security standards Therefore… Security is Improved! Test products against security standards Identify needs for security standards - industry and government Users get more secure products November 9, 1999 Vendors improve products 23 Agenda Who we are Computer security program NIST partnerships Summary November 9, 1999 24 Summary & Conclusions NIST is improving security by: Raising awareness of the need for cost-effective security Engaging in key U.S. voluntary standards activities Developing standards and guidelines to secure Federal systems (often adopted voluntarily by private sector) – Cryptographic algorithms – Policy, management, operations, and best practices guidance – PKI Providing National leadership role for security testing and evaluation – Cryptographic Module Validation Program – National Information Assurance Partnership November 9, 1999 25 Yet, there is more we could do... November 9, 1999 26 President’s 9/99 Proposal for Increasing NIST CIP Activities Establish an Expert Review Team at NIST – Assist Government-wide agencies in adhering to Federal computer security requirements – Director to consult with OMB and NSC on plans to protect and enhance computer security for Federal agencies Fund a permanent 15-member team responsible for – Helping agencies identify vulnerabilities – Plan secure systems, and 27implement CIP plans November 9, 1999 President’s 9/99 Proposal for Increasing NIST CIP Activities (Concluded) Establish an operational fund at NIST for computer security projects among Federal agencies – Independent vulnerability assessments – Computer intrusion drills – Emergency funds to cover security fixes for systems identified to have unacceptable security risks November 9, 1999 28 Questions? November 9, 1999 29