Cybersecurity Framework 101 Webinar 20170301 v2
Cybersecurity Framework 101 Webinar 20170301 v2
Infrastructure Cybersecurity
March 2017
[email protected]
Improving Critical Infrastructure Cybersecurity
Collect,
Categorize, Post
Completed – April 2013
RFI Responses
Ongoing Engagement:
Identify
Framework
3rd Workshop – July 2013
Elements 4th Workshop – Sept 2013
Open public comment/
review encouraged
throughout the Prepare and
Publish
5th Workshop – Nov 2013
process…
and to this day Framework Published – Feb 12, 2014
4
The Framework Is for Organizations…
7
Key Properties of Cyber Risk Management
Risk Management
Process External
Participation
8
Implementation Tiers
1 2 3 4
Partial Risk Repeatable Adaptive
Informed
Risk
The functionality and repeatability of cybersecurity risk
Management management
Process
Integrated Risk
The extent to which cybersecurity is considered in broader
Management risk management decisions
Program
External The degree to which the organization benefits my sharing or
Participation receiving information from outside parties
9
9
Core
Cybersecurity Framework Component
Senior
Executives
• Broad enterprise Implementation/
considerations Operations
• Abstracted risk
vocabulary
• Deep technical
considerations
• Highly
Specialists specialized
in Other vocabulary
Fields
• Specific focus
outside of
cybersecurity
• Specialized or no risk
vocabulary 10
Core
Cybersecurity Framework Component
Function Category ID
Asset Management ID.AM
Business Environment ID.BE
What processes and
Governance ID.GV
assets need Identify Risk Assessment ID.RA
protection?
Risk Management Strategy ID.RM
Access Control PR.AC
Awareness and Training PR.AT
Data Security PR.DS
What safeguards are
Protect
available? Information Protection Processes & Procedures PR.IP
Maintenance PR.MA
Protective Technology PR.PT
Anomalies and Events DE.AE
What techniques can
identify incidents? Detect Security Continuous Monitoring DE.CM
Detection Processes DE.DP
Response Planning RS.RP
What techniques can Communications RS.CO
contain impacts of Respond Analysis RS.AN
incidents? Mitigation RS.MI
Improvements RS.IM
Recovery Planning RC.RP
What techniques can
restore capabilities? Recover Improvements RC.IM 11
Communications RC.CO
Core Subcategory Informative References
ID.BE-1: The COBIT 5 APO08.04, APO08.05,
Cybersecurity Framework Component organization’s role in APO10.03, APO10.04, APO10.05
Function Category ID the supply chain is ISO/IEC 27001:2013 A.15.1.3,
Asset Management ID.AM identified and A.15.2.1, A.15.2.2
Business Environment ID.BE communicated NIST SP 800-53 Rev. 4 CP-2, SA-12
Governance ID.GV ID.BE-2: The COBIT 5 APO02.06, APO03.01
Identify organization’s place in NIST SP 800-53 Rev. 4 PM-8
Risk Assessment ID.RA critical infrastructure
Risk Management and its industry sector
Strategy ID.RM is identified and
Access Control PR.AC communicated
ID.BE-3: Priorities for COBIT 5 APO02.01, APO02.06,
Awareness and Training PR.AT organizational APO03.01
Data Security PR.DS mission, objectives, ISA 62443-2-1:2009 4.2.2.1,
Protect Information Protection and activities are 4.2.3.6
PR.IP established and NIST SP 800-53 Rev. 4 PM-11, SA-
Processes & Procedures
communicated 14
Maintenance PR.MA
ID.BE-4: ISO/IEC 27001:2013 A.11.2.2,
Protective Technology PR.PT Dependencies and A.11.2.3, A.12.1.3
Anomalies and Events DE.AE critical functions for NIST SP 800-53 Rev. 4 CP-8, PE-9,
delivery of critical PE-11, PM-8, SA-14
Detect Security Continuous
Monitoring DE.CM services are
established
Detection Processes DE.DP ID.BE-5: Resilience COBIT 5 DSS04.02
Response Planning RS.RP requirements to ISO/IEC 27001:2013 A.11.1.4,
Communications RS.CO support delivery of A.17.1.1, A.17.1.2, A.17.2.1
Respond Analysis RS.AN critical services are NIST SP 800-53 Rev. 4 CP-2, CP-11,
established SA-14
Mitigation RS.MI
Improvements RS.IM
Recovery Planning RC.RP
Recover Improvements RC.IM
12
Communications RC.CO 12
Profile
Cybersecurity Framework Component
14
Framework 7-Step Process
15
Building a Profile
A Profile Can be Created in Three Steps
Mission
1 Objectiv
e
A
B
C
Subcategory
1
Cybersecurity 2 Operating
2 Requirements Methodologies 3
3
Legislation … Guidance and methodology
Regulation 98 on implementing,
16
Conceptual Profile
Value Proposition
Cybersecurity Operating
2 Requirements Subcategory 1 Priority 3 Methodologies
A 1 moderate I
II
B 2 high III
C
D 3 moderate IV
E V
F … … VI
VII
G 98 moderate VIII
Year 1 Year 2
As-Is
To-Be To-Be
NIST Organization or
Community
Community
23
Examples of State & Local Use
Texas, Department of Information Resources
• Aligned Agency Security Plans with Framework
• Aligned Product and Service Vendor Requirements with Framework
New Jersey
• Developed a cybersecurity framework that aligns controls and
procedures with Framework 24
NIST Baldrige Excellence Builders
Baldrige Cybersecurity Excellence Builder
Manufacturing
Service
Small Business
Education
Healthcare
Non-profit
Cybersecurity (2017)
www.tiger-global.co.uk
26
USCG Maritime Bulk Liquids Transfer
(BLT) Framework Profile
• NCCoE and United States Coast Guard (USCG) worked together to
draft a USCG Maritime Profile, based on the Cybersecurity
Framework
• Aligns the USCG’s cyber strategy with cybersecurity activities of the
maritime bulk liquid transport operations of the oil & natural gas
industry, utilizing standards and best practices guided by the
Framework
• The profile can help individual companies clarify how cybersecurity
fits into their mission priorities and how best to allocate resources to
secure their information and operational systems.
The profile is available at: https://www.uscg.mil/hq/cg5/cg544/docs/Maritime_BLT_CSF.pdf
27
Resources
Where to Learn More and Stay Current