Computer Security Activities
Computer Security Activities
William C. Barker
April 2009
2
Information Technology Laboratory
(ITL)
7
ITL Cybersecurity Organization
ITL
Director
Deputy ITL Cyber Security
Director Advisor
7
Computer Security Division 893
8
Community Engagement
• Industry
- Accessing Expertise and Leveraging Resources
- Coordinating Standards and Initiatives
• Academia
- Accessing Expertise and Leveraging Resources
- Representative Institutions and Consortia
• International
- Formal Standards Groups
- Accessing Expertise and Leveraging Resources
• Federal, State, and Local Government
- Interdepartmental
- Department of Commerce
- State and Local Governments
9
Community Engagement Examples
● Chief Information Officers (CIO) Council
● Federal Systems Security Governance Board Member
● National Cyber Study Group (NCSG) Member
● Cyber Security and Information Assurance Interagency Working Group
● Information Security Research Council
● Common Terrorism Information Security Standards Working Group
● Committee for National Security Systems (Observer)
● Information Sharing Environment Enterprise Architecture Security Working Group
● Supply Chain Risk Management Working Group
● Federal Information Systems Security Educators' Association
● Software Assurance Forum
● IT Entrepreneurs' Forum
● Governance Coordinating Council
● Federal Enterprise Architecture Security and Privacy Profile Working Group
● Interagency C&A Transformation Working Group
● Internet Engineering Task Force (IETF) Security Chair
● International Organization for Standardization (Chair/Convener several
Committees, Work Groups, and Task Forces)
● American National Standards Institute
● International Committee for Information Technology Standards (Biometrics
Chair)
● Biometrics Consortium Co-Chair
●National Science &Technology Council Committee on Biometrics and Identity
10 Management (Co-Chair)
NIST Basis for Information Security
Activities
7
NIST Responsibilities for Cyber Security
• NIST is responsible for developing standards and guidelines, including minimum
requirements, that provide adequate information security for all agency operations and
assets in furtherance of its statutory responsibilities under the Federal Information
Security Management Act (FISMA) of 2002, Public Law 107-347, but such standards and
guidelines shall not apply to national security systems.
• Under FISMA NIST shall “conduct research, as needed, to determine the nature and
extent of information security vulnerabilities and techniques for providing cost-effective
information security.”
• NIST develops guidelines consistent with the requirements of the Office of Management
and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems,
as analyzed in A-130, Appendix IV: Analysis of Key Sections. Supplemental information
is provided in A-130, Appendix III.
• In accordance with the Cyber Security Research and Development Act, The National
Institute of Standards and Technology develops, and revises as necessary, checklists
setting forth settings and option selections that minimize the security risks associated
with each computer hardware or software system that is, or is likely to become, widely
used within the Federal Government.
7
NIST Information Technology Standards
• Information Technology (IT) Standards and Guidelines for
the Federal Government
– Public Information
– Coordinated in a Public Forum
– IT Security Standards Mandatory for Non-National Security
Agencies
– Harmonized With National Security Community to Support
Information Sharing
– Voluntary for States, Localities, Industry, and Consensus
Standards Organizations
• Public and Industry “Buy-in” to Foster Widespread
Implementation
• Technical Source of IT Security Expertise for Federal
Agencies
• Collaborative Access to International IT Security Expertise
in Industry, Academia, and Standards Organizations
• Government-wide vs Community-specific Focus
11
Examples of Standards Applicability
12
Some Recent NIST Standards
(See csrc.nist.gov for latest publications)
7
Key Security Initiatives
• Executive Initiatives
– Comprehensive National Cybersecurity Initiative
and 60 Day NSC Study
– SmartGrid
– Healthcare IT
• Other Executive Priorities
– Cloud Computing
– Citizen Facing Authentication
– Automated Security Configuration Compliance
Determination
• Industry/Security Community Initiatives
– Product Assurance Reform
– Government-wide Security Controls and Processes
13
Some Other Key Security Projects and
Initiatives
• Research
– Technical Cyber Security Mechanisms
– Secure Network Protocols
– Biometrics Technologies and Metrics
• Standards
– Technical Cyber Security Guidelines
– Secure Network Protocol Standards and Guidelines
– FISMA and Executive Policy Conformance Standards and Guidelines
– Biometrics and Identity Management Standards and Guidelines
• Implementation Support
– FISMA Implementation Support
– Executive Policy Implementation Support
– Technical Support to Homeland Security Programs and Initiatives
• Test and Evaluation
– Biometrics Performance and Interoperability Testing
– Cryptographic Conformance Testing
– IT System Security Configuration & Conformance Tool Test & Validation
– Identity Management Interoperability Conformance Determination
13
Future and Ongoing Challenges
18
Identity Management Activities
19
Product Assurance
• Criteria/Requirements/Controls
– Standards
– Profiles
– Claims
– Derived Test Requirements
– Documentation Requirements
• Conformance Demonstration Process
– Assertion with Procurement Enforcement
– Independent Testing (Qualification or Acceptance)
– Third Party Validation
• Reciprocity
– Interagency
– NSS/Non-NSS Federal
– National Cross-Jurisdictional (E.g., States, Localities)
– International
• Life Cycle Considerations
– Development Environment
– Installation and Configuration
– Life Cycle Configuration Management
20
Some Additional
Cyber Security Projects
• NIST
http://www.nist.gov/
• NIST’s Information Technology Lab
http://www.itl.nist.gov/
• Computer Security Resource Center
– http://[email protected]
• National Vulnerability Database
– http://nvd.nist.gov
• Biometrics Resource Center
– http://www.itl.nist.gov/div893/biometrics
• Biometrics Research
– Finger: http://fingerprint.nist.gov
– Face: http://face.nist.gov
– Iris: http://iris.nist.gov
22
Thank You!
William C. Barker
Chief Cyber Security Advisor
100 Bureau Drive
Gaithersburg, MD 20899-8930
Telephone: 301-975-8443
E-Mail: [email protected]
19