Cybersecurity Blueprints for Cloud Computing

advertisement
Cybersecurity Blueprints
for Cloud Computing
Donna F Dodson
Division Chief, Computer Security Division
Acting Director, National Cybersecurity Center of Excellence

The U.S. economy and U.S. citizens are heavily reliant on
information technology (IT)
◦ No sector today could function without IT
◦ Energy, supply chain, finance, ecommerce, transportation, health care

Although considerable progress has been made in improving
cybersecurity capabilities to protect IT, there is much yet to
be done
◦ Determine how to mitigate new threats and secure new technologies

Cybersecurity needs to become more standards-based to
further improve quality and efficiency. Cybersecurity also
needs to become easier for people to adopt and use
◦ These changes would significantly reduce the cost of security
implementation and management, as well as the economic impact of
cybersecurity incidents

NIST is responsible for developing standards and guidelines, including minimum requirements, that provide
adequate information security for all agency operations and assets in furtherance of its statutory responsibilities
under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347, but such
standards and guidelines shall not apply to national security systems.

Under FISMA NIST shall “conduct research, as needed, to determine the nature and extent of information
security vulnerabilities and techniques for providing cost-effective information security.”

NIST develops guidelines consistent with the requirements of the Office of Management and Budget
(OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems, as analyzed in A-130, Appendix IV:
Analysis of Key Sections. Supplemental information is provided in A-130, Appendix III.

In accordance with the Cyber Security Research and Development Act, The National Institute of Standards and
Technology develops, and revises as necessary, checklists setting forth settings and option selections
that minimize the security risks associated with each computer hardware or software system that is, or is
likely to become, widely used within the Federal Government.

Homeland Security Presidential Directive 7; “The Department of Commerce will work with private sector,
research, academic, and government organizations to improve technology for cyber systems and
promote other critical infrastructure efforts, including using its authority under the Defense Production Act to
assure the timely availability of industrial products, materials, and services to meet homeland security
requirements.”

Homeland Security Presidential Directive 12: “The Secretary of Commerce shall promulgate in accordance with
applicable law a Federal standard for secure and reliable forms of identification (the "Standard")”
Core Focus Area

Research, Development, and Specification
◦ Security Mechanisms (e.g. protocols, cryptographic,
access control, auditing/logging)
◦ Security Mechanism Applications
 Confidentiality
 Integrity
 Availability
 Authentication
 Non-Repudiation

Secure System and Component configuration

Assessment and assurance of security properties of products
and systems










Standards – FIPS, Internal Consensus, National
Consensus
Guidelines – NIST SPs and IRs
Journal and Conference Papers
Reference Materials
Workshops and Conferences
Consortia and Forums
Training
Reference Implementations and Demonstrations
Tests and Tools
Standards Development Organization Participation
• Industry
- Accessing Expertise and Leveraging Resources
- Coordinating Standards and Initiatives
• Academia
- Accessing Expertise and Leveraging Resources
- Representative Institutions and Consortia
• International
- Formal Standards Groups
- Accessing Expertise and Leveraging Resources
• Federal, State, and Local Government
- Interdepartmental
- Department of Commerce
- State and Local Governments
n●










Standards – FIPS, Internal Consensus, National
Consensus
Guidelines – NIST SPs and IRs
Journal and Conference Papers
Reference Materials
Workshops and Conferences
Consortia and Forums
Training
Reference Implementations and Demonstrations
Tests and Tools
Standards Development Organization Participation
NIST Work in Cyber Security

FISMA Phase II
◦ Continue to support the Joint Task Force Transformation Initiative (DoD,
IC, NIST, CNSS) and support unified information security framework
◦ Continue support for risk management and information security
publications
◦ Potential privacy and threat appendixes for SP 800-53, Revision 3
◦ Work toward system and security engineering and application security
guidelines

US Government Configuration Baseline (USGCB)
◦ Standardized security configurations for operating systems and automated
tools to test the configurations, improving security and saving IT security
management resources

Security Automation and Vulnerability Management
◦ Continue to develop tools and specifications that address situational
awareness, conformity and vulnerability management compliance etc
NIST Work in Cyber Security

Virtualization
◦ Support for cloud special publication and standards
activities to support security, portability and
interoperability

Key Management

Next Generation Cryptography
◦ Open competition for new Hash algorithm
◦ Developing new, light weight, quantum resistant
encryption for use in current and new technologies
◦ New modes of operation
© Lisa F. Young/Dreamstime.com
◦ Foster the requirements of large-scale key
management frameworks and designing key
management systems
◦ Support transitioning of cryptographic algorithms and
key sizes
NIST Work in Cyber Security
◦ Performing groundwork research to define factors that
enable usability in the area of multifactor authentication
and developing a framework for determining metrics that
are critical to the success of usability

Identity Management Systems
◦ Standards development work in biometrics, smart cards,
identity management, and privacy framework.
◦ R&D: Personal Identity Verification, Match-On-Card,
ontology for identity credentials, development of a
workbench
◦ ID Credential Interoperability

Infrastructure support
◦ Continued support for Health IT, Smart Grid and Voting

Standards Development Organizations
◦ IETF
◦ IEEE
ANSI
ISO
© Graeme Dawes | Dreamstime.com
Usability of Security
© Peto Zvonar | Dreamstime.com



Federal IT programs have a wide range of security
requirements among them:
◦ The Federal Information Security Management Act
(FISMA) requirements that include but are not limited to
compliance with with Federal Information Processing
Standards agency specific policies
◦ Authorization to Operate requirements
◦ Vulnerability and security event monitoring, logging and
reporting
It is essential that the decision to apply a specific cloud
computing model support mission capability considers
the above requirements

Accelerate the Federal government’s adoption of
cloud computing
◦ Build a USG Cloud Computing Technology Roadmap which
focuses on the highest priority USG cloud computing
security, interoperability and portability requirements
◦ Lead efforts to develop standards and guidelines in close
consultation and collaboration with standards bodies, the
private sector, and other stakeholders
•
SP 800-144 Guidelines on Security and Privacy
•
SP 800-145 Definition of Cloud Computing
•
SP 800-145 CC Synopsis & Recommendations
•
SP 500-291 CC Standards Roadmap
•
SP 500-292 CC Reference Architecture
•
SP 500-293 USG CC Technology Roadmap Draft
The NIST Cloud Definition Framework
Hybrid
Clouds
Deployment
Models
Service
Models
Essential
Characteristics
Common
Characteristics
Private
Cloud
Software as a
Service (SaaS)
Community
Cloud
Public
Cloud
Platform as a
Service (PaaS)
Infrastructure as
a Service (IaaS)
On Demand Self-Service
Broad Network Access
Rapid Elasticity
Resource Pooling
Measured Service
Massive Scale
Resilient Computing
Homogeneity
Virtualization
Geographic Distribution
Service Orientation
Low Cost Software
Advanced Security
14
Based upon original chart created by Alex Dowbor - http://ornot.wordpress.com
Draft NIST CC Reference Architect
Cloud Provider
Cloud
Consumer
Cloud
Auditor
Security
Audit
Privacy Impact
Audit
Performance
Audit
Cloud Orchestration
Cloud Service
Management
Service Layer
SaaS
Business
Support
PaaS
Service
Intermediation
IaaS
Resource Abstraction and Control
Layer
Physical Resource Layer
Hardware
Provisioning/
Configuration
Service
Aggregation
Portability/
Interoperability
Service
Arbitrage
Facility
Cloud Carrier
Cross Cutting Concerns: Security, Privacy, etc
15
Cloud Security Standards







ISO/IEC JTC 1 Subcommittee 27 Cybersecurity
Responsible for cloud computing security standards
Early development stages
ISO/IEC 27017 – Guidelines on information security controls
for the use of cloud computing services based on ISO/IEC
27002
US International Committee for Information Technical
Standards Technical Committee Cyber Security 1 (CS 1)
U.S. Technical Advisory Group to SC 27
Chaired by NIST
16
FEDRAMP
•Maintains Security Baseline including Controls & Continuous
Monitoring Requirements
•Maintains Assessment Criteria
•Maintains Active Inventory of Approved Systems
Consistency and Quality
Trustworthy & Re-useable
Independent Assessment
•
CSP must retain an
independent
assessor from
FedRAMP accredited
list of 3PAOs
•
•
Provisional
Authorization
Joint Authorization
Board reviews
assessment
packages and grants
provisional
authorizations
Agencies issue ATOs
using a risk-based
framework
Near Real-Time Assurance
Ongoing A&A
(Continuous Monitoring)
• DHS – CyberScope
Data Feeds
• DHS – US CERT
Incident Response and
Threat Notifications
• FedRAMP PMO –
POA&Ms
17

Foster the rapid adoption and broad deployment of
integrated cybersecurity tools and techniques that
enhance consumer confidence in U.S. information
systems
◦ Disseminate new principles and mechanics underlying security
standards, metrics, and best practices for secure and privacy-preserving
information technologies
◦ Develop and test methods for composing, monitoring, and measuring the
security posture of computer and enterprise systems
◦ Achieve broad adoption of practical, affordable, and useful cybersecurity
capabilities across the full range of commercial and government sectors
Planning Phase
Business
Engagement &
Problem
Statement
Use Case
Implementation Phase
IT Industry
Components
Selection
Implement in
Operational
Environment
• Computer Security Resource Center
http://csrc.nist.gov
• NIST Cloud Computing Program
http://www.nist.gov/itl/cloud
•National Cybersecurity Center of Excellence
http://csrc.nist.gov/nccoe/
Download