Cybersecurity: Executive order 13636 and the nist framework

26
CYBERSECURITY: EXECUTIVE ORDER 13636 AND THE NIST FRAMEWORK Telecommunications Industry Association

description

Cybersecurity: Executive order 13636 and the nist framework. Telecommunications Industry Association. Topics. Part I – Executive Order 13636 Part II – Framework Development History and TIA Involvement Part III – The Framework Part IV – Issues and Next Steps. - PowerPoint PPT Presentation

Transcript of Cybersecurity: Executive order 13636 and the nist framework

Page 1: Cybersecurity:  Executive order 13636 and the  nist  framework

CYBERSECURITY: EXECUTIVE ORDER 13636 AND THE NIST FRAMEWORK

Telecommunications Industry Association

Page 2: Cybersecurity:  Executive order 13636 and the  nist  framework

Topics

• Part I – Executive Order 13636• Part II – Framework Development History

and TIA Involvement• Part III – The Framework• Part IV – Issues and Next Steps

Page 3: Cybersecurity:  Executive order 13636 and the  nist  framework

Part I – Executive Order 13636

Page 4: Cybersecurity:  Executive order 13636 and the  nist  framework

Executive Order 13636

• Issued on February 12, 2013– Followed in wake of failure of comprehensive cyber

legislation in the Senate (late 2012)• Required NIST to develop a voluntary Cybersecurity

Framework– Agencies are supposed to review the Framework

against their current regulations for gaps (Sec. 10)• DHS establishes voluntary critical infrastructure program– Notification to private sector owners & operators

• Includes limited measures to improve information sharing

Page 5: Cybersecurity:  Executive order 13636 and the  nist  framework

EO – InformationSharing (Sec. 4)

• Requires agencies to produce timely, unclassified reports & that “identify a specific targeted entity”

• Facilitates transmission of classified information to critical infrastructure entities that are “authorized to receive them”

• Does nothing to improve sharing FROM the private sector• The government recognizes that legislation is still needed

to improve real-time, bi-directional information sharing

Page 6: Cybersecurity:  Executive order 13636 and the  nist  framework

EO – CriticalInfrastructure Definition

• Definition (Sec. 3)– “systems and assets, whether physical or virtual, so vital

to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.”

• IT Limitation (Sec. 9a)– When designating critical infrastructure at greatest risk,

DHS may not “identify any commercial information technology products or consumer information technology services” within the program

Page 7: Cybersecurity:  Executive order 13636 and the  nist  framework

EO – CriticalInfrastructure Program

• DHS Identification (Sec. 9)– Requires agency to use a “risk-based approach to

identify critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security.”

• Incentives (Sec. 8c)– DHS must “coordinate establishment of a set of

incentives designed to promote participation in the Program”

– Not yet clear what these will be– Liability protection requires statutory authority

Page 8: Cybersecurity:  Executive order 13636 and the  nist  framework

EO – Agency Adoptionof Framework

• Review– “Agencies with responsibility for regulating the security of critical

infrastructure shall … review the preliminary Cybersecurity Framework and determine if current cybersecurity regulatory requirements are sufficient….”

• Action– “If current regulatory requirements are deemed to be insufficient …

agencies … shall propose prioritized, risk-based, efficient, and coordinated actions … to mitigate cyber risk.”

• Independent Agencies (FCC etc.)– “encouraged … to consider prioritized actions to mitigate cyber

risks for critical infrastructure consistent with their authorities”

Page 9: Cybersecurity:  Executive order 13636 and the  nist  framework

Part II – Framework Development History and

TIA Involvement

Page 10: Cybersecurity:  Executive order 13636 and the  nist  framework

Development Process

• Kick-started by EO (Sec. 7) in February• Series of workshops with industry• Preliminary Framework released by NIST

on October 22, 2013– Delayed two weeks from original due date to

government shutdown

• Final version released on February 12, 2014• NIST will keep updating it after that

Page 11: Cybersecurity:  Executive order 13636 and the  nist  framework

TIA Involvement

• Written comments to NIST• Three meetings with NIST staff– Aug. 1 2013– Aug. 27 2013– Jan. 7 2014

• Participation of NIST staff in TIA events

Page 12: Cybersecurity:  Executive order 13636 and the  nist  framework

TIA Input / Concerns

• Maintaining the flexibility and ability to innovate• Deference to successful public-private partnerships• The necessity of international approaches and standards• What “adoption” means• Framework’s fixation on “advanced threats” rather than

“cyber hygiene”• Framework’s problematic approach to privacy• NIST’s designation of “undeveloped” areas for future work,

importantly including supply chain

Page 13: Cybersecurity:  Executive order 13636 and the  nist  framework

TIA Evaluation ofFinal Framework

• Many TIA concerns have been addressed• NIST has emphasized the voluntary nature of the

Framework• Framework reflects the need to incorporate and rely on

existing standards and best practices• Reflects TIA’s advocacy that flexibility and technology

neutrality are critical• Reflects TIA’s advocacy that a business case is a key driver

for increasing private-sector cyber resiliency• Framework embraces the concept that an international

approach should not be country-specific

Page 14: Cybersecurity:  Executive order 13636 and the  nist  framework

Part III – The Framework

Page 15: Cybersecurity:  Executive order 13636 and the  nist  framework

Components

• Framework Core– Set of cybersecurity functions and references– Big table

• Framework Profile– Tool to help organizations establish a roadmap

for reducing cybersecurity risk

• Framework Implementation Tiers– How well an organization manages its cyber

risk

Page 16: Cybersecurity:  Executive order 13636 and the  nist  framework

Framework Core

• Five Functions– Identify, Protect, Detect, Respond,, Recover

• Categories– Examples: “Asset Management,” “Access Control,” and

“Detection Processes.”• Subcategories (high-level outcomes)– Examples: “Physical devices and systems within the

organization are catalogued,” “Data-at-rest is protected,” and “Notifications from the detection system are investigated.”

• Informative references (standards – ISO etc.)

Page 17: Cybersecurity:  Executive order 13636 and the  nist  framework

The Chart

Page 18: Cybersecurity:  Executive order 13636 and the  nist  framework

Framework Profile

• Alignment of two things:– Functions, Categories, Subcategories and industry

standards and best practices, with– Business requirements, risk tolerance, and resources of

the organization

Page 19: Cybersecurity:  Executive order 13636 and the  nist  framework

Framework Tiers

• Describe an “increasing degree of rigor and sophistication in cybersecurity risk management practices and the extent to which cybersecurity risk management is integrated into an organization’s overall risk management practices”– Tier 1: Partial– Tier 2: Risk-Informed– Tier 3: Repeatable– Tier 4: Adaptive

Page 20: Cybersecurity:  Executive order 13636 and the  nist  framework

ExampleTier 1: Partial

• Risk Management Process– Organizational cybersecurity risk management practices are not formalized and risk

is managed in an ad hoc and sometimes reactive manner. Prioritization of cybersecurity activities may not be directly informed by organizational risk objectives, the threat environment, or business/mission requirements.

• Integrated Program– There is a limited awareness of cybersecurity risk at the organizational level and an

organization-wide approach to managing cybersecurity risk has not been established. The organization implements cybersecurity risk management on an irregular, case-by-case basis due to varied experience or information gained from outside sources. The organization may not have processes that enable cybersecurity information to be shared within the organization.

• External Participation– An organization may not have the processes in place to participate in coordination

or collaboration with other entities.

Page 21: Cybersecurity:  Executive order 13636 and the  nist  framework

ExampleTier 4: Adaptive

• Risk Management Process– The organization adapts its cybersecurity practices based on lessons learned and

predictive indicators derived from previous cybersecurity activities. Through a process of continuous improvement, the organization actively adapts to a changing cybersecurity landscape and responds to emerging/evolving threats in a timely manner.

• Integrated Program– There is an organization-wide approach to managing cybersecurity risk that uses

risk-informed policies, processes, and procedures to address potential cybersecurity events. Cybersecurity risk management is part of the organizational culture and evolves from an awareness of previous activities, information shared by other sources, and continuous awareness of activities on their systems and networks.

• External Participation– The organization manages risk and actively shares information with partners to

ensure that accurate, current information is being distributed and consumed to improve cybersecurity before an event occurs.

Page 22: Cybersecurity:  Executive order 13636 and the  nist  framework

Part IV – Issues & Next Steps

Page 23: Cybersecurity:  Executive order 13636 and the  nist  framework

Potential Issues

• Incentives for adoption– Cost is a factor

• Regulation– How will agencies respond?

• Liability– Does the Framework establish a “duty of care?” – Tier 4 implementation “or else”?

• What will Congress do?

Page 24: Cybersecurity:  Executive order 13636 and the  nist  framework

The Next Version:NIST Roadmap

• Authentication• Automated Indicators• Conformity Assessment• Cybersecurity Workforce• Data Analysis• Federal Agency Cybersecurity Alignment• International Aspects, Impacts, and Alignment• Supply Chain Risk Management• Technical Privacy Standards• Bottom Line – More To Come in Future Versions

Page 25: Cybersecurity:  Executive order 13636 and the  nist  framework

Cyber TopicsMissing from EO

• Cybercrime• R&D efforts• Cyber hygiene & education• Data breach notification• FISMA reform• These things may require legislation

Page 26: Cybersecurity:  Executive order 13636 and the  nist  framework

Conclusion / Contacts

Dileep Srihari – [email protected] (703)-907-7715

Brian Scarpelli – [email protected] (703)-907-7714

Telecommunications Industry Association