8_Bay - CSIAC Cyber metrics

advertisement
Cyber Metrics in the DoD
or
How Do We Know What We Don’t Know?
John S. Bay, Ph.D.
Executive Director
Things People Have Asked Me
• How much money should I spend this year on cyber
defense technologies?
• How many attacks has your firewall repelled this
month?
• If I only had a dollar to spend on cyber, where
should I spend it?
• Why is cyber research such a slog?
11/12/14
2
Answers
(which did not go over well)
• How much money have you got?
• We repelled all of them … except that one you read
about in the paper
• Spend your dollar on upgrades
• Cyber research is a slog because there is no physics
theory underlying it all, liker Maxwells’ Equations
or Newton’s Laws
11/12/14
3
But really … it DEPENDS
• The “threat” factor is common in cybersecurity,
but mostly not elsewhere
• … and it IS true that there is no useful PHYSICS
for the problem
11/12/14
4
DoD Taxonomy of Threats
Tier
Description
I
Practitioners who rely on others to develop the malicious code, delivery mechanisms, and execution
strategy (use known exploits).
II
Practitioners with a greater depth of experience, with the ability to develop their own tools (from
publically known vulnerabilities).
III
Practitioners who focus on the discovery and use of unknown malicious code, are adept at installing
user and kernel mode root kits, frequently use data mining tools, target corporate executives a
key users (government and industry) for the purpose of stealing personal and corporate data with the
expressed purpose of selling the information to other criminal elements.
IV
Criminal or state actors who are organized, highly technical, proficient, well funded professionals
working in teams to discover new vulnerabilities and develop exploits.
V
State actors who create vulnerabilities through an active program to “influence” commercial products
and services during design, development or manufacturing, or with the ability to impact
products while in the supply chain to enable exploitation of networks and systems of interest
VI
States with the ability to successfully execute full spectrum (cyber capabilities in combination with
all of their military and intelligence capabilities) operations to achieve a specific outcome in political,
military, economic, etc. domains and apply at scale.
From: Defense Science Board, Resilient Military Systems and the Advanced
Cyber Threat, January 2013
11/12/14
5
And The Corresponding Criticality
11/12/14
6
What Might the COSTS Be?
11/12/14
7
So Then, What to Measure?
• Qualitative
– Capabilities
– Missions lost
• Quantitative
– Performance
– Cost
• To achieve
• Not achieving
11/12/14
8
Capabilities and Maturity
11/12/14
9
Dashboard Approach
11/12/14
10
“Stoplight Chart” Assessments
See:
11/12/14
SPIDERS JCTD
11
Costs to Us
•
•
•
•
All vulnerabilities are bugs
All code has bugs
Bugs are expensive
Exploits are cheap  the “asymmetry” problem
11/12/14
12
Mission-Assurance Approach
11/12/14
•
Helps focus attention
•
Requires a “map” o the
mission
•
Implies a prioritization
on missions (something
loses)
•
Requires reconfigurable
systems and networks
•
Is not cheap
From: DUSD(I&E) Office, HANDBOOK
For SELF-ASSESSING SECURITY VULNERABILITIES & RISKS of
INDUSTRIAL CONTROL SYSTEMS
On DOD INSTALLATIONS, December 2012
13
Just Good Enough (Incremental)
Approach
•
How long would our red team take to penetrate the
system?
– An empirical measure, at best.
– Implies a canonical red team
prob(first
vulnerability is
discovered)
Bad code
Gamma
distribution?
Better code
time
11/12/14
14
The Accountability Approach
•
NIST 800-53 guidelines
•
The “did we do everything we know how to do” approach
From: NIST Special Publication 800-53, rev. 4, Security and Privacy Controls for
Federal Information Systems and Organizations, April 2013
11/12/14
15
Conclusions: Which is Best?
•
None of them. They service somewhat orthogonal
purposes.
– But they can provide apples-to-apples comparisons
•
Can they answer the Generals’ questions?
– No
– … except maybe the one about the firewall
– There is CERTAINLY no satisfactory “physics” to guide anybody
•
Cyber Metrics is still an extremely important and highpriority problem for OSD!
11/12/14
16
Download