530 likes | 714 Views
Certification and Accreditation CS-7493-01 Unit 4:RISK MANAGEMENT. Jesus Gonzalez Kalpana Bahunoothula Jocelyne Farah. Acknowledgement. DOD 5200.40, DoD Information Technology Security Certification and Accreditation Process (DITSCAP) DOD 8510.1-M, DITSCAP Application Manual
E N D
Certification and AccreditationCS-7493-01Unit4:RISK MANAGEMENT Jesus Gonzalez Kalpana Bahunoothula Jocelyne Farah
Acknowledgement • DOD 5200.40, DoD Information Technology Security Certification and Accreditation Process (DITSCAP) • DOD 8510.1-M, DITSCAP Application Manual • Risk Management Guide for IT Systems by NIST • Basic Risk Management For DOD • E-commerce Risk Management slides (Dr. Hale CS-slides) • Risk Management within an IT system environment by Communication Security Establishment CSE, Canada.
Overview • General definitions • Risk Management Process • C&A
What is Threat? • Threat is any circumstance or event with the potential to cause harm to an IS through: • Unauthorized access. • Destruction. • Disclosure. • Modification of data. • Denial of service.
What is a Vulnerability? • Vulnerability is a weakness in an IS system security procedures, internal controls, or implementation that could be exploited.
So, What is Risk? Risk is the combined notion of . . . The harm caused by specific events (threats) AND The likelihood that HARM will happen (using vulnerabilities)
What is Residual Risk? • Residual risk is the portion of risk remaining after security measures have been applied
Risk Management • Definition: process of • Identifying risk, • Assessing risk • Taking steps to reduce risk to an acceptable level (residual risk)
Risk Management Cycle Understand Mission Objectives Understand Security Needs (Services) Implement Decided Actions Characterize Risk Posture (Threat Analysis) Risk Management Cycle Characterize What Can Be Done (Countermeasures) Decide What Will Be Done
Mission Is Everything… • Mission defines component values • People • Equipment • Information systems • Facilities • Mission is the guiding force for determining risk • Organization mission must be understood by the risk management team • Information Systems(IS) play a critical role in supporting the mission
Information System -- Definition • Discrete set of information resources organized for the • collection • processing • maintenance • use • sharing • dissemination • disposition of information NTISSI No. 4009
Information System Assets • Hardware - PCs, servers, cables, disk drives, routers • Software - programs, utilities, O/S • Data and Information - created, processed, stored, databases, in transit, and removed • People - users, people needed to run systems • Documentation - programs, hardware, systems, local administrative procedures, on entire system • Supplies - paper, forms, ribbons, magnetic media
Risk Management Cycle Understand Mission Objectives Understand Security Needs (Services) Risk Management Cycle
ITSEC ClassificationMission Reliance on IS • The degree that mission success depends on the system operation, data, or infrastructure (Mission Reliance Factor) • None--mission not dependent on specific aspect. • Cursory--mission incidentally dependent on specific aspect • Partial--mission partially dependent on specific aspect • Total--mission is totally dependent on the specific aspect Risk management plays a critical role in protecting an organization’s information assets, and therefore its mission, from IS-related risk.
ITSEC ClassificationSecurity Characteristics Security CharacteristicMission Reliance Alternative CONFIDENTIALITY Sensitive, Classified, Special Access AVAILABILITY Reasonable, Soon, ASAP, Immediate INTEGRITY ACCURACY NA, Approximate, Exact ACCOUNTABILITY ATTRIBUTION None, Rudimentary, Basic, Comprehensive
Mission Trees Develop Equipment Performance Characteristics Equipment Patentable Characteristics C C C C I I I I A A A A Deploy Missions Warning Order Movement Order
Risk Management Cycle Understand Mission Objectives Understand Security Needs (Services) Characterize Risk Posture (Threat Analysis) Risk Management Cycle
Threat AnalysisSources • Threat agent: Individual/thing responsible • Adversarial (hackers & spies) • Non-adversarial (rec. hackers & accidents) • Disasters (floods & power outages) • Attack: Sequence of steps taken to cause an event • Finding Vulnerabilities
Threat AnalysisBasic Process • Identify/define mission • Determine required security services • Theory of adversarial behavior • Identify potential adversaries • Determine adversary intentions/characteristics • Determine adversary strategies • Identify attack scenarios • Match adversary behavior w/ attack scenarios
Threat Analysis Mission Security Requirements • Threat: Potential for harm • 3 dimensions; confidentiality, integrity & availability • Confidentiality • Information valuable to adversaries? • Consequences of leak? • Within 1 minute, 1 hour, 1 day, 1 weak • Integrity • Mission dependency on accuracy of data? • Consequences of integrity breach? • Availability • Mission dependency on access to data/services? • Consequences for unavailability (over time)? • Alternative modes of operation?
Risk Management Cycle Understand Mission Objectives Understand Security Needs (Services) Characterize Risk Posture (Threat Analysis) Risk Management Cycle Characterize What Can Be Done (Countermeasures)
Countermeasure Characterize Options • What is the impact of specific attacks on mission ? • Which vulnerabilities may permit successful attacks? • Where should resources be expended to achieve the greatest reduction in risk? • Avoid tendency to view vulnerabilities in isolation
Countermeasure Selection • Countermeasure possibilities • Characterize countermeasure options • Compare countermeasure options • Determine changes to risk • Determine costs vs. benefit
Countermeasures Factors to be considered • Security mechanisms • Physical security • Personnel security • Administrative security • Media security • Life cycle controls • A Countermeasure may change the initial Design\Mission?
Risk Management Cycle Understand Mission Objectives Understand Security Needs (Services) Characterize Risk Posture (Threat Analysis) Risk Management Cycle Characterize What Can Be Done (Countermeasures) Decide What Will Be Done
Risk Analysis Options/Decisions • Overriding goal – Mission Success • Weighted in terms of cost versus benefits • Identify +/- for each course of action • Decision options: • Reduce Risk • Accept Risk • Avoid Risk • Transfer Risk Risk avoidance Risk acceptance
Countermeasures: Costs/Benefits (1A) (1B) (option1) (option 2) (1) High M i s s i o I n m p a c t (before countermeasures) COSTS Vs. BENEFITS BENEFITS Improve mission success COSTS Dollars Additional people resources Lost system functionality Time Low High LIKELIHOOD OF SUCCESSFUL ATTACK
What is acceptable? • Will we have 100 % effectiveness? • Vulnerabilities eliminated • Vulnerabilities reduced • Vulnerabilities remaining • What are they? • Why are they still there? • Is risk acceptable? (Residual Risk)
Security Risk Management Process Government of Canada, Communication Security Establishment CSE
Overview • Definitions • Risk Management (RM) Process • RM in C&A process • Phase 1 • Phase 2 • Phase 3 • Phase 4 • Conclusion
Certification is the comprehensive evaluation of the technical and non-technical security features of an IS and other safeguards made in support of the accreditation process, to establish the extent to which a particular design and implementation meets a set of specified security requirements. Certification
Accreditation • Accreditation is the formal declaration by a Designated Approving Authority (DAA) that an IS is approved to operate in a particular security mode using a prescribed set of safeguards at an acceptable level of risk.
Risk Management Cycle Understand Mission Objectives Understand Security Needs (Services) Implement Decided Actions Characterize Risk Posture (Threat Analysis) Risk Management Cycle Characterize What Can Be Done (Countermeasures) Decide What Will Be Done
Security Risk Management Process Government of Canada, Communication Security Establishment CSE
SSAA • System Security Authorization Agreement (SSAA). • The SSAA is a formal agreement among the DAA(s), the Certifier, user representative, and program manager. • It is used throughout the entire DITSCAP to guide actions, document decisions, specify IA requirements, document certification tailoring and level-of-effort, identify potential solutions, and maintain operational systems security.
Who are players of the C&A? • They are: • The Designated Approving Authority (DAA) • Certification Authority • Program Manager(PM) • User Representative • Information system security officers (ISSO)
Certification Authority (certifier) • Certifier is the individual responsible for making a technical judgment of • the system’s compliance with stated requirements, • identifying and assessing the risks associated with operating the system, • coordinating the certification activities, and • consolidating the final certification and accreditation package. • Certifier recommends one of four levels • Level 1 – Basic Security Review • Level 2 – Minimum Analysis • Level 3 – Detailed Analysis • Level 4 – Comprehensive Analysis
Designated Approving Authority (Accreditor) Accreditor is the official with the authority to formally assume responsibility for operating a system at an acceptable level of risk. .
Phase-1Definition Document Mission Need Preparation Registration Negotiation No Agreement? Yes SSAA
Phase 1Risk Management • Preparation: The document is reviewed to understand the mission objectives. • Registration: • Potential threats are described and the points where the failure affects the C,I,A are stated. • System criticality and the acceptable risk for the system in meeting the mission responsibilities are defined. • System criticality should consider the impact if the system were not operational (the impact of loss of life from system failure, inability to meet contingencies, impact to credibility, and danger to national security). System criticality will affect the level of risk that is acceptable. • The certifier reviews this and upon the agreement of the players develops the draft and gives to DAA.
Phase 1Risk Management • Negotiation: • Certification Requirements Review is performed and the players agree on the security requirements , the level of effort and schedule • Finally after DAA approval, the system is checked if it is ready for Phase 2
Phase 2Verification System Development Certification Analysis No Yes Ready for Certification? No Pass? A Phase 1 Definition Yes SSAA Phase 3 Validation
Phase 2 Risk Management • SSAA refinement :If there has been a significant time delay since the completion of Phase 1 or if new people are involved in the C&A process, the SSAA should be reviewed in detail • System Development: Verifies that the requirements in the SSAA are met in the evolving system before it is integrated into the operating environment
Phase 2(contd) • Certification Analysis: • Vulnerability Assessment:The security vulnerabilities, residual risk are evaluated and counter measures are recommended by the certifier • Output:vulnerability assessment report is prepared by the program manger • Certifier checks if it is ready for certification • DAA reviews the system for compliance with the SSAA
Phase 3Validation Certification Evaluation Of Integrated System No Certify System? Yes Develop Recommendation No A Accreditation Granted? Yes Phase 1 Definition Phase 4: Post Accreditation SSAA
Phase 3Risk Management • Security test and Evaluation: ST&E is done by the certifier to provide the sufficient evidence of the amount of residual risk • Risk Management overview: • Assessing the overall system • security design and threats • Ensuring that risks to C,I,A are acceptable • For each risk, statement is made by the certifier to accept the risk, reject the risk or perform any modifications • Certifier issues system certification
Phase-3Risk Management • Certifier may do one of the following: • Recommend that the IS not be accredited • Recommend the IS to be accredited • May uncover security deficiencies, but • continue to believe that the short-term system • operation is within the bounds of acceptable risk • *****The Certifier may recommend an Interim Approval to Operate (IATO) with the understanding that deficiencies will be corrected in a time period specified by the DAA
Phase 4 Post Accreditation System Operation No Validation Req’d? Yes Compliance Validation No Change Required? Yes Phase 1: Definition SSAA
Phase-4Risk Management • System operations: Analyze known threats and new threats to see if system still protects against all • The User representative oversees the system operation and reports threats, vulnerabilities or any security incidents • Program manager reports the changes in threats • Compliance Validation: Ensures that IS complies with security requirements and threat assessment