470 likes | 679 Views
OMG Technical Meeting - March 2013 Presentation to UPDM Group Security View. Introduction Presentation Objectives Background Overview Security View Details Next Steps Q&A. Agenda. Introduce DRAFT Security View For each sub-view: Purpose, Description, Concepts
E N D
OMG Technical Meeting - March 2013 Presentation to UPDM Group Security View
Introduction Presentation Objectives Background Overview Security View Details Next Steps Q&A Agenda 2
Introduce DRAFT Security View For each sub-view: Purpose, Description, Concepts Conceptual Architecture & Deliverables Sample attribution template Convey essence and flow of security lifecycle; Our road ahead for SecV Presentation Objectives 3
Background Drivers • “Security at the front” not as an afterthought • Information & IT Security Capability • confidentiality, integrity, availability, non-repudiation, and audit-ability • of defence information and the supporting systems and networks. • Pan-enterprise Security
Background Collaborators • Security is “special” • normally involves Specialists • has unique perspectives • IM & IT Security at the forefront • Key Collaborators: • IM & IT Security (D IM Secur) • IT Engineering & Integration (DIMEI)
Background Outcome • Redesign and partitioning of SecV-1 into 1a and 1b • No change to existing SecV-2 and 3 • Discovery of new business requirements leading to SecV-4, 5, 6 & 7
Overview Draft Sub-views SecV-1a: Asset Security Domain & Valuation Rating SecV-1b: Asset-at-Node Security Strength Requirement SecV-2: Data Element Security Matrix SecV-3: Aggregated Information Security Matrix SecV-4: Security Control Specification SecV-5: Security Control Profile SecV-6: Security Control Service Profile SecV-7: Asset-At-Node Threat Mitigation
Security Methodology (1/1) SecV-1a Asset Security Domain & Valuation Rating SecV-1b Asset-at-Node Security Strength Requirement SecV-2 Data Element Security Matrix SecV-3 Aggregated Information Security Matrix Conduct Asset Sensitivity; Assign Security Domain & Valuation Rating Conduct TRA; Assign Security Strength Requirement Assess IERs and SDEs; Assign Security Classification Register Classified Data Element Combinations Asset Classification and Valuations Lists TRA Results and Security Strength Requirements Resource Flow & IER & SDE Assessments Data Element Combinations Risk Register 8
Security Methodology (2/2) SecV-4 Security Control Specification SecV-5 Security Control Profile SecV-6 Security Control Service Profile SecV-7 Asset-at-Node Threat Mitigation Define Security Controls (CSEC & DND) Establish Security Control Profile for Asset (FoS) & Asset-at-Node Define Security Services; Establish Security Control Service Profile Establish Security Services to address Asset-at-Node Security Needs Security Control Taxonomy Security Control Profile for Asset & Asset-at-Node Security Service Taxonomy & Service Profiles Asset-at-Node Threat Mitigation Specification 9
SecV-1a : Asset Security Domain and Valuation Rating The Asset (typically a member at some level of abstraction within the Asset FoS – Family of Systems) would undergo an AssetSensitivity Analysis; the resulting Statement of Sensitivity is described and referenced in SecV-1a. Based on the sensitivity analysis, the Security Officer determines and assigns a Security Domain to the Asset. The DND Security Officer is also able to assign a Valuation Rating (Very Low to Very High) to the Asset. SecV-1a Purpose 10
Asset within FoS Structure Asset Materiel System Personnel Cash Weapons IT System e.g. SAP Communications SAP Sub-System A/R SAP Sub-System G/L SAP Sub-System Payroll SAP Application Module G/L 01 SAP Application Module G/L 02 SAP Application Module 03 11
Security Classification Taxonomy Security Domain (e.g.) UNCLASSIFIED PROTECTED A PROTECTED B PROTECTED C CONFIDENTIAL SECRET TOP SECRET … Security Caveat (e.g.) CANUK NATO AUSCANNZUKUS CANUS FOUR EYES FIVE EYES …
SecV-1a Conceptual Model Recommends Asset Statement of Sensitivity Determines Results in Valuation Rating Asset (FoS) Security Domain Values Classifies Information Systems Cash Equipment INCLUDES Resource Sub Types Personnel Real Property 13
SecV-1a Attribution Template Example: Data Collection Dialog for Asset Valuation and Security Classification
SecV-1b: Asset-At-Node Security Strength Requirement The logical Asset classified & valued via SecV-1a “deployed” (assigned) to a Node (OV-2) Initiates a Threat Risk Assessment (TRA) being now referred to as Asset-At-Node. SecV-1b enables the capture of relevant information from the TRA, including links to threats, vulnerabilities, impacts, and control objectives. The TRA enables the DND Security Officer to assign a Security Strength Requirement Rating to the Asset at Node. SecV-1b Purpose 15
SecV-1b Conceptual Model Security Strength Requirement Matrix Exposure Impact Node Asset Asset-at-Node Threat Risk Assessment (TRA) Recommends Determines Assignment of Asset to Node Initiates Security Control Objectives Assigned to Operational Node Refer OV-2 16
SecV-1b Attribution Template Example: Data Collection Dialog for Asset@Node TRA and Security Strength Requirement
SecV-2 – Data Element Security Matrix The OV-3 and SV-6 sub-views require that the security parameters of each Information Exchange Requirement (IER) and System Data Exchange (SDE) be analyzed and documented. The security classification of an IER or SDE is based on the fact that it contains one or more data elements of that security level. SecV-2 enables the security classification and requirements of the set of data elements that comprise the IER or SDE. Covers both privacy and national security issues. SecV-2 Purpose 18
SecV-3 Purpose SecV-3 – Aggregated Information Security Matrix Aggregation of Data can result in higher classified Information Registration of Data Element Combinations Potential for security issues is captured “Some analysis required” 20
SecV-4 Purpose SecV-4 Security Control Specification • SecV-4 enables definition and maintenance of Security Controls in a taxonomy • Security Controls • reusable objects that can be shared • and associated to Assets; • Allows Security Control XREF to policies, legislation and regulations, standards, other knowledge artifacts, e.g.: • ITSG 33 Annex 3 (CSEC) • NIST 800-53 Rev 3 22
SecV-4 Conceptual Model INCLUDES: Management Technical Operational Security Control Class Comprises For Example: Access Control Awareness and Training Personnel Security Security Control Family Organizes XREF links to Knowledge Artifacts in Corporate Memory, Web or elsewhere Security Control Links For Example: AC 17 – Remote Access 23
SecV-4 Attribution Template Example: Data Collection Dialog for Security Control Specification
SecV-5: Security Control Profile SecV-5 enables the association of Security Controls that are applicable to an Asset (FoS). This is referred to as the AssetSecurity Control Profile. SecV-5 further allows the Security Officer to create and maintain a similar Profile for the Asset-At-Node; The Asset-at-Node would automatically inherit (as default) the Asset Security Control Profile as a starting point. The end result is titled the Asset-At-Node Security Control Profile. SecV-5 Purpose 25
SecV-5 Conceptual Model Node Asset Asset (FoS) Asset Security Control Profile Refers Identifies Security Control Deployed to Asset-At-Node Security Control Profile Selects Requires 26
SecV-5 Attribution Template Example: Data Collection Dialog for Security Control Profile
Sec V-6: Security Control Service Profile SecV-6 does two distinct things: enables the specification and maintenance of the Security Service links a subset of Security Services to a Security Control; this is referred to as the Security Control Service Profile. Security Services reusable security mitigation mechanisms. can be automated or manual automated security services can be further defined in terms of its hardware and software components. SecV-6 Purpose 28
SecV-6 Conceptual Model (1/2) Security Service Sub-Type Automated Security Service Non-Automated Security Service Comprises Security Service Software Component Security Service Hardware Component 29
SecV-6(1) Attribution Template Example: Data Collection Dialog for Security Service Specification
SecV-6 Conceptual Model (2/2) Security Control (SecV-4) Manages Security Control Service Profile Mitigated By Security Service 31
SecV-6(2) Attribution Template Example: Data Collection Dialog for Service Control Service Profile
SecV-7: Asset-At-Node Threat Mitigation SecV-7 enables creation and maintenance of an Asset-At-Node Threat Mitigation Package: comprises a subset of Security Services needed by the Security Controls to protect the Asset-at-Node. Selection is influenced by the Strength Requirement Rating SecV-7 Purpose 33
SecV-7 Conceptual Model Node Asset Asset-At-Node Security Control Profile Refer SecV-5 Security Control Service Profile Refer SecV-4 Security Control Requires Refer SecV-6 Asset-at-Node Threat Mitigation Package Selects Security Service Mitigation Security Control Service Comprises Refer SecV-1b Asset-At-Node Security Strength Requirement Influences 34
SecV-7 Attribution Template Example: Data Collection Dialog for Threat Mitigation Package
Asset-At-Node Mitigation Lifecycle Deployed to Asset Refer SecV-1a has Asset-at-Node Security Control Profile Asset-At-Node Security Strength Requirement Determines TRA Refer SecV-5 Establishes Refer SecV-1b has Security Control Objectives Security Control Refer SecV-4 Required by Influences Node Asset Security Control Service Profile Asset-at-Node Threat Mitigation Pkg Security Control Service Mitigated By Refer SecV-6 (2) Refer SecV-6 (1) Refer SecV-7 Asset
Theoretical product, at this point Much work remains ensure responsive to needs Confirm concepts are valid, not redundant Validation effort initiated Update at next meeting in June. Road Ahead 37
Security View Road Map 15 Mar EA IOC FOC Today 2012 2013 2014 ACTIVITY S O N D J F M A M J J A S O N D J F M A M J J A S O N D Preliminary Development Work Presentation of Draft to OMG Testing and validation Finalize Security Views Presentation of Final to OMG Publish SecV in DNDAF Implement SecV in Qualiware
Looking for Feedback and Encouraging Wider Collaboration Contacts: VINCENT.QUESNEL@forces.gc.a EA Programme Support (613) 993-6164 GREG.ERICKSON@forces.gc.ca EA Development (613) 990-8341 Q&A 39