Developing a Framework To Improve Critical Infrastructure Cybersecurity: On February 12, 2013, the White House announced the “Improving Critical Infrastructure Cybersecurity” Executive Order. Subsequently, on February 26, 2013, the National Institute of Standards and Technology (NIST) published in the Federal Register a Request For Information (RFI).

NIST takes its definition of “critical infrastructure” from the 42 U.S.C. 5195c(e)  which states that it is all “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.”

As such, the NIST RFI requests comments to specific questions in three sections:

  • Current Risk Management Practices
  • Use of Frameworks, Standards, Guidelines, and Best Practices
  • Specific Industry Practice

Tripwire’s perspective is such that four general truths exist in our common industry:

  1. Threat agents have evolved: The people behind today’s breaches are no longer simply making statements; they’re stealing intellectual property or money.
  2. Systems complexity continues to increase over time: Not five years ago the “cloud” was just forming, and not two years ago “BYOD” wasn’t a really big deal.
  3. Dynamism of situational awareness is increasing: Motivated and resourceful threat agents take advantage of systems complexity and change tactics often. We must defend against many attacks, when the threat agent need only realize one. This makes situational awareness more fluid than it used to be.
  4. Our qualified resources are scarce: We simply do not have enough qualified information security resources to combat our collective adversary.

Consequently, we believe that the strategy and tactics we use as defenders must necessarily focus on operational loss minimization using processes that rely on tools that:

  • Act as force multipliers: Enable information security personnel to act as more than one
  • Embed information security domain knowledge: Let a few do common work, then put that knowledge into the tools to be leveraged appropriately
  • Automated: Wherever possible, automation must be used to decrease our reaction time and the adversary’s window of opportunity
  • Share information: Tools should interoperate and cooperate as much as possible out of the box, and they should be configured to share information with partners and appropriate authorities (i.e. ISAC, CERT, CSIRT, a user community)

Present Control Frameworks are incapable of supporting our evolved needs. Therefore,Tripwire proposes that the current Framework model evolve into one that focuses on three main concepts.

  1. Persona Definition: A persona provides a “face” to your users beyond role and responsibility. From Agile Software Requirements: “user personas provide a means of further refining the approach to the user to make sure that the needs of different types of users are met.”. Given a specific business process, who interacts with this process? Who are the stakeholders? What roles do they play? What are their personal and professional goals and aspirations? From this information a primary persona can be discovered along with secondary personas. These personas inform the Control Framework in terms of what it needs to deliver.
  2. Business Process Identification and Description: Current Control Frameworks take a “security objective” perspective, such as “maintain the confidentiality of information,” but what is needed is a statement of “how confidentiality is achieved in operational terms, such as physical and logical access control, user enrollment, and audit trail.” [1] Put another way, Control Frameworks should increase their focus on business processes.
  3. Controls Overlay: Given that the appropriate business processes have been defined in step two, then each process can be examined for control applicability.

Does a given control apply to the business process? How? What steps in the process need to be changed? What tools might be required? How can the process be measured? How can the process be made efficient?

We have been slicing the bread the same way we always have – vertically. To get real value from Control Frameworks, we should start slicing the bread horizontally as well, so we can see how each control relates to existing business processes. By seeking out these business processes, enumerating them, diagramming them, and identifying the boundaries where they work together, we can then lay control objectives on top to provide more meaningful guidance to organizations of all sizes.

Why is this important? Because business processes can be described visually and, in some cases, translated directly into an executable language. Points of clarification can be made in succinct prose. Abstract business processes can be provided to be adapted. Patterns of adaptation could be returned to the community. Once these are done, checklists can be created and segmented for varying degrees of enterprise resilience.

It is time to abandon Control Frameworks as we know them and move forward to a more effective, pragmatic, and efficient future – and it is Tripwire’s hope that NIST agrees and is able to navigate the tumultuous waters of change over the course of these next several months.

Author’s note: Special thanks to Adam Montville (@adammontville) for his contributions to this article.

 

[1] “Open Information Security Management Maturity Model (OISM3),” The Ope Group, 2011. ISBN: 1931624860

Image courtesy of ShutterStock

Categories IT Security and Data Protection, ,

Tags , , , , , , , ,


Dwayne Melancon

Dwayne Melancon has contributed 139 posts to The State of Security.

View all posts by Dwayne Melancon >