resiliency rules - askcypert · resiliency rules: 7 steps for critical ... and thereby protect the...

18
Resiliency Rules: 7 Steps for Critical Infrastructure Protection

Upload: others

Post on 25-Mar-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Resiliency Rules - AskCypert · Resiliency Rules: 7 Steps for Critical ... and thereby protect the people, the economy, the essential human and government services, and the national

Resiliency Rules:7 Steps for Critical

Infrastructure Protection

Page 2: Resiliency Rules - AskCypert · Resiliency Rules: 7 Steps for Critical ... and thereby protect the people, the economy, the essential human and government services, and the national

Agenda

What are critical infrastructures?

What are the CIP policy drivers?

The differences between CIP/CIIP and

cyber security

Resiliency rules

Page 3: Resiliency Rules - AskCypert · Resiliency Rules: 7 Steps for Critical ... and thereby protect the people, the economy, the essential human and government services, and the national

What is Critical Infrastructure?

Critical infrastructures are generally thought of

as the key systems, services and functions

whose disruption or destruction would have a

debilitating impact on public health and safety,

commerce, and national security or any

combination of those matters.

These include communications, energy,

banking, transportation, public health and

safety and essential government services.

Page 4: Resiliency Rules - AskCypert · Resiliency Rules: 7 Steps for Critical ... and thereby protect the people, the economy, the essential human and government services, and the national

Natural

Disaster

Directives

Response

Plans Laws &

Regulations

Terrorism

WAR

IT

Attacks Convergence

Globalization

Dependence

CIP Policy Drivers

Page 5: Resiliency Rules - AskCypert · Resiliency Rules: 7 Steps for Critical ... and thereby protect the people, the economy, the essential human and government services, and the national

Cybersecurity

Critical Infrastructures

Critical Information InfrastructureCross-Cutting ICT interdependencies among all sectors

Non-essential IT systems

Those practices and procedures that enable the secure use and operation of cyber tools and technologies

CIP/CIIP and

Cybersecurity

Understanding the

Differences

Page 6: Resiliency Rules - AskCypert · Resiliency Rules: 7 Steps for Critical ... and thereby protect the people, the economy, the essential human and government services, and the national

Resiliency Rules

1. Define Goals and Roles

2. Identify and Prioritize Critical Functions

3. Continuously Assess and Manage Risks

4. Establish and Exercise Emergency plans

5. Create Public-Private Partnerships

6. Build Security/Resiliency into Operations

7. Update and Innovate Technology/Processes

7 Steps for Critical

Infrastructure Protection

Page 7: Resiliency Rules - AskCypert · Resiliency Rules: 7 Steps for Critical ... and thereby protect the people, the economy, the essential human and government services, and the national

CIP GoalsEstablishing Clear Goals

is Central to Success

Policy Elements Sample Statement

Critical

Infrastructure

Importance

Critical information infrastructures (CII) provide the essential services that

support modern information societies and economies. Some CII support

critical functions and essential services so vital that the incapacitation,

exploitation, or destruction, through natural disaster, technological failure,

accidents or intentional attacks could have a debilitating effect on national

security and economic well-being.

Critical

Infrastructure

Risks

CII exploitation, or destruction, through natural disaster, technological failure,

accidents or intentional attacks could have a debilitating effect on national

security and economic well-being.

CIP Policy

Goal/Statement

Prevent or minimize disruptions to critical information infrastructures, no

matter the source, and thereby protect the people, the economy, the

essential human and government services, and the national security. In the

event disruptions do occur, they should be infrequent, of minimal duration

and manageable.

Public-Private

Implementation

Implementing the National CIIP framework includes government entities, as

well as, voluntary public private partnerships involving corporate and

nongovernmental organizations.

Page 8: Resiliency Rules - AskCypert · Resiliency Rules: 7 Steps for Critical ... and thereby protect the people, the economy, the essential human and government services, and the national

CIP RolesUnderstanding Roles

Promotes Coordination

Assess Risks

Identify

Controls and

Mitigations

Implement

Controls

Measure

Effectiveness

Government

“What’s the goal”

Determine Acceptable Risk Levels

Infrastructure

“Prioritize Risks”

Public-Private Partnership“What’s critical”

Operators

“Best control solutions”

Define Policy and Identify Roles

Page 9: Resiliency Rules - AskCypert · Resiliency Rules: 7 Steps for Critical ... and thereby protect the people, the economy, the essential human and government services, and the national

Define Roles

CIIP

Coordinator

(Executive

Sponsor)

Sector

Specific

Agency

Law

Enforcement

Computer

Emergency

Response Team

Infrastructure

Owners and

OperatorsPublic-Private

Partnerships

IT Vendors

and

Solution

Providers

Government Shared Private

Page 10: Resiliency Rules - AskCypert · Resiliency Rules: 7 Steps for Critical ... and thereby protect the people, the economy, the essential human and government services, and the national

Identify and Prioritize Critical Functions

Establish an open dialogue to understand the critical functions, infrastructure elements, and key resources necessary for delivering essential

services,

maintaining the orderly operations of the economy, and

ensuring public safety.

Collaborate to understand

Interdependencies

Critical Function

Critical Function

Key Resource

Key Resource

Infrastructure

Element

Infrastructure

Element

Critical Function

Key ResourceInfrastructure

Element

Supply

Chain

Supply

ChainSupply

Chain

Supply

Chain

Supply

Chain

Supply

Chain

Supply

Chain

Supply

Chain

Supply

Chain

Supply

Chain

Understand

Interdependencies

Page 11: Resiliency Rules - AskCypert · Resiliency Rules: 7 Steps for Critical ... and thereby protect the people, the economy, the essential human and government services, and the national

Continuously Assess and Manage Risks

Protection is the Continuous

Application of Risk

Management

Assess Risks

Identify

Controls and

Mitigations

Implement

Controls

Measure

Effectiveness

• Define Functional Requirements

• Evaluate Proposed Controls

• Estimate Risk Reduction/Cost Benefit

• Select Mitigation Strategy

• Seek Holistic Approach.

• Organize by Control

Effectiveness

• Implement Defense-in Depth

• Evaluate Program Effectiveness

•Leverage Findings to Improve

Risk Management• Identify Key Functions

• Assess Risks

• Evaluate Consequences

Page 12: Resiliency Rules - AskCypert · Resiliency Rules: 7 Steps for Critical ... and thereby protect the people, the economy, the essential human and government services, and the national

Establish and Exercise Emergency plans

Public and private sector organizations can benefit from developing joint plans for managing emergencies – including recovering critical functions in the event of significant incidents, including but limited to natural disasters, terrorist attacks, technological failures or accidents.

Emergency response plans can mitigate damage and promote resiliency.

Effective emergency response plans are generally short and highly actionable so they can be readily tested, evaluated, and implemented.

Testing and exercising emergency plans promotes trust, understanding and greater operational coordination among public and private sector organizations.

Exercises also provide an important opportunity to identify new risk factors that can be addressed in response plans or controlled through regular risk management functions.

Improve Operational

Coordination

Page 13: Resiliency Rules - AskCypert · Resiliency Rules: 7 Steps for Critical ... and thereby protect the people, the economy, the essential human and government services, and the national

Create Public-Private Partnerships

Voluntary public-private partnerships

Promote trusted relationships needed for information sharing and collaborating on difficult problems,

Leverage the unique skills of government and private sector organizations, and

Provide the flexibility needed to collaboratively address today’s dynamic threat environment

Page 14: Resiliency Rules - AskCypert · Resiliency Rules: 7 Steps for Critical ... and thereby protect the people, the economy, the essential human and government services, and the national

Build Security and Resiliency into Ops

Organizational incentives

can drive security

development lifecycle

principles into all line of

business

Leveraging the security

lifecycle promotes secure

and resilient organizations

and products

Page 15: Resiliency Rules - AskCypert · Resiliency Rules: 7 Steps for Critical ... and thereby protect the people, the economy, the essential human and government services, and the national

Design

Define

security

architecture

and design

guidelines

Document

elements of

software

attack

surface

Threat

Modeling

Standards,

best

practices,

and tools

Apply coding

and testing

standards

Apply

security tools

(fuzzing

tools, static-

analysis

tools, etc)

Security Push

Security code

reviews

Focused

security

testing

Review

against new

threats

Meet signoff

criteria

Final Security

Review

Independent

review

conducted by

the security

team

Penetration

testing

Archiving of

compliance

info

RTM and

Deployment

Signoff

Security

Response

Plan and

process in

place

Feedback

loop back

into the

development

process

Postmortems

Product

Inception

Assign

security

advisor

Identify

security

milestones

Plan

security

integration

into product

The Security

Development LifecycleDriving Change

Across Microsoft

Page 16: Resiliency Rules - AskCypert · Resiliency Rules: 7 Steps for Critical ... and thereby protect the people, the economy, the essential human and government services, and the national

Update and Innovate Technology/Processes

Cyber threats are constantly evolving

Policy makers, enterprise owner and

operators can prepare for changes in threats

by

Monitoring trends

Keeping systems patched

Maintaining the latest versions of software that

have been built for the current threat environment.

Page 17: Resiliency Rules - AskCypert · Resiliency Rules: 7 Steps for Critical ... and thereby protect the people, the economy, the essential human and government services, and the national

Guidance

Developer Tools

SystemsManagementActive Directory

Federation Services (ADFS)

IdentityManagement

Service

s

Information Protection

Client and Server OS

Server Applications

Edge

Microsoft Innovations Drive

Page 18: Resiliency Rules - AskCypert · Resiliency Rules: 7 Steps for Critical ... and thereby protect the people, the economy, the essential human and government services, and the national

Questions?