28
Michael Smith, SecTor 2009 Massively Scaled Security Solutions for Massively Scaled IT

Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

Embed Size (px)

DESCRIPTION

The US Federal Government is the world's largest consumer of IT products and, by extension, one of the largest consumers of IT security products and services. This talk covers some of the problems with security on such a massive scale; how and why some technical, operational, and managerial solutions are working or not working; and how these lessons can be applied to smaller-scale security environments.

Citation preview

Page 1: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

Michael Smith, SecTor 2009

Massively Scaled Security Solutions for Massively Scaled IT

Page 2: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

Who is Michael Smith?

• 8 years active duty army• Graduate of Russian basic course,

Defense Language Institute, Monterey, CA

• DotCom survivor• Infantryman, deployed to Afghanistan

(2004)• CISSP #50247 (2003), ISSEP (2005)• Former CISO, Unisys Federal Service

Delivery Center• Currently a Manager in a Big Four Firm 2

Page 3: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

$75B IT Budget

That’s a lot ofgreen stuff!

Photo by The Lizard Queen

Page 4: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

Caveat!

Elephants don’t turn on a dime, neither does the US

Federal Government!

4

Page 5: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

Federal Information Security Management Act

Roles & Responsibilities

•Agency Head

•CIO

•Agency Security Officer

Security Program

1. Periodic risk assessments

2. Policies and procedures

3. Security plans

4. Security awareness training

5. Periodic testing & evaluation

6. Remediation activities

7. Incident response capabilities

8. Continuity of operations

Annual Security Review

•Determine sufficiency of security program

•Independent Evaluation (e.g., IG)

•Safeguard evaluation data

Annual Reporting

•Reports from CIO & IG

•Report material weaknesses

•Provide performance plans

§3544(a)

§3544(b)

§§ 3544(c), 3545 (e)§§

3544(c), 3545 (e)

5

Page 6: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

The Standard Approach

Break the elephant down into “bite-sized pieces”

Group commonalities (common controls)

Assess each piece—criticality, requirements, resulting risk

Manage each piece individually Get better at securing each piece Caveat: each piece incurs overhead

6

Page 7: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

Certification and Accreditation:IT Security in the SDLC

2 3 4 5

1 - 1

1 - 1

· Security Categorization

· Preliminary Risk Assessment

· Perception of a need

· Linkage to mission and performance objectives

· Assessment of alternatives to capital assets

· Preparing for investment review and budgeting

Needs Determination

SD

LC

Sec

uri

ty C

on

sid

erat

ion

s

3 - 43 - 4 3 - 4 4 - 5 4 - 54 - 5 4 - 5 4 - 5

· Fun. Stmt of Need· Market Research· Feasibility Study· Req. Analysis· Alt. Analysis· Cost Ben. Analysis· Software

Conversion Study· Cost Analysis· RM Plan· Acquisition

Planning

· Risk Assessment· Sec. Funct. Req.

Analysis· Sec. Assurance

Req. Analysis· Cost

Considerations and Reporting

· Sec. Control Dev.· Dev. ST&E· Other Planning

· Inspection and Acceptance

· System Integration· Security

Certification· Security

Accreditation

· Configuration Management and Control

· Continuous Monitoring

· Information Preservation

· Media Sanitization· Hardware and

Software Disposal

· Installation· Inspection· Acceptance Testing· Initial User Training· Documentation

· Appropriateness of Disposal

· Exchange and sale· Internal

Organization screening

· Transfer and Donation

· Contract Closeout

· Performance Measurement

· Contract Modification

· Operations· Maintenance

InitiationAcquisition/

Development ImplementationOperations/ Maintenance Disposition

--NIST SP 800-64

Page 8: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

HSPD-12

“Standard” Smartcard for federal employees

Cards used for 2-factor authentication Set of standards for PKI, issuance,

clearances, etc

Think “Reduced sign-on and dual-factor identification federated throughout 50+

enterprises 8

Page 9: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

Federal Desktop Core Configuration—FDCC

Based on Air Force desktop configurations

Attempts to be a Government-wide Security Technical Implementation Guide (STIG)

Needs automated evaluation tools Part of the Federal Acquisition

Regulation http://fdcc.nist.gov/

9

Page 10: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

Security Control Automation Protocol—SCAP XML and protocols to exchange technical

security information between products “Glue Code” between the following data sets:

Common Vulnerabilities and Exposures (CVE) Common Configuration Enumeration (CCE) Common Platform Enumeration (CPE) Common Vulnerability Scoring System (CVSS) Extensible Configuration Checklist Description

Format (XCCDF) Open Vulnerability and Assessment Language

(OVAL) More products certified weekly

10

Page 11: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

Trusted Internet Connections—TIC Reduce Government Internet

connections to 50 Lowers the demand for skilled

personnel Uses models from DoD and DHS Agencies share Internet connections In theory: simplifies protecting Internet

connections Government-wide http://www.whitehouse.gov/omb/memor

anda/fy2008/m08-05.pdf

11

Page 12: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

EINSTEIN

Run by DHS and US-CERT National-Level Security Incident and

Event Monitoring System Provides alerting and Government-

wide threat trends Offered as a service to other agencies

12

Page 13: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

Standard Convergence

One Government-wide standard for security management

DCID 6/3 retired in favor of SP 800-37 and 800-53

DoDI 8500.2 still in place but “bridged” to new convergent standards

Transparent transition of people and process between civilian agencies, DoD components, and intelligence organizations 13

Page 14: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

“Azimuth Check”

Nobody knows where we’re going! Merging towards the center from

regulation and technical solutions Enterprise gets the squeeze What about the pieces above the

enterprise? We’re operating beyond the scope of

traditional IT security doctrine, research, and products

14

Page 15: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

My View of the World

15

•Each layer only knows the one above and below it•Traditional IT security focuses on the Enterprise and Project layers

Page 16: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

Existing Models of Management

History Lesson Time: thought you were just

here to learn about security?

16

Page 17: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

United Nations

17Photo by Wikimedia

Page 18: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

Public Accounting

Photo by Wikimedia

Page 19: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

Fast Food Franchises

Photo by ebruli

Page 20: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

Bolshevism

Photo by Wikimedia

Page 21: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

Stalingrad

21Photo by Wikimedia

Page 22: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

Counterinsurgency/LIC/OOTW/SASO

Photo by rybolov

Page 23: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

Observations and Truthinesses

Control v/s audit burdens Skill of the constituency Need a security professional at each

layer

Is it all just a matter of centralized v/s decentralized?

23

Page 24: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

The Models Begat More Questions…

24

•At what layer do you address a specific problem?•Can a specific solution “scale up” to the Federation/ Community Layer?•How do I get “clueful” people at each layer?•How do I communicate between layers?

Page 25: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

The Cybertastic Future: Management Use the Enterprise, Project, and

Integration Layers Start in bite-sized pieces and

consolidate wherever possible Need “clueful” people at all layers Organization at the Federation Layer

for self-regulation—some people are already doing it

25

Page 26: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

The Cybertastic Future: Process

How do you keep from getting squeezed in the middle?

If it’s a pain for you, it probably is for others and can be scaled up

How do we get information up to the higher layers so they can make a decision?

26

Page 27: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

The Cybertastic Future: Vendors

Support multiple 10-dot networks Products that tier between layers Federation and data import/export

between products Compatibility with initiatives

27

Page 28: Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09

28

Questions, Comments, or War Stories?

http://www.guerilla-ciso.com/ rybolov(a)ryzhe.ath.cx