Introducing RESILIA: Cyber-Resilience for the 21st Century

Transcription

Introducing RESILIA: Cyber-Resilience for the 21st Century
Session 610 Introducing RESILIA:
Cyber-Resilience for the 21st Century
David Moskowitz
RESILIA Practitioner
ITIL Expert
Agile Mentor & Coach
Additional Information
• Membership (CODE: HDI16)
http://www.itsmmentorstore.com/videotraining.asp
• RESILIA Foundation:
http://www.careeracademy.com/?RESILIAFd_Series
• RESILIA Practitioner:
http://www.careeracademy.com/?RESILIAPr_Series
• Executive overview (30 minute):
https://www.youtube.com/watch?v=xjmaZhVc7KY
It Can’t Happen Here!
Recent Small Sample
•
•
•
•
•
•
•
types of companies.
US Government OPM: 21.5 million Two
The ones that have been
hacked and ones that
T-Mobile: 15 million applicants
don’t know it.
Premera Blue Cross: 11 million
(In 2015) new account
Anthem: 80 million
(CC) fraud more than
doubled over 2014.
Ashley Madison: 32 million
2016 Identity Fraud
Study, Javelin Strategy &
Sony: terabytes of data
Research
Home Depot: 56 million payment, 53 million
email addresses
• JP Morgan: 83 million
• Target: 110 million
Getting Worse, Not Better!!
The Pace of Change
www.glasbergen.com ― ©2006 Randy Glasbegen
What is Cyber Security?
• Security is not a preventative!
• Purpose: keep them out long enough
– Delay tactic!!!
– When they get in…
• Whatever you’re trying to protect
• No longer sensitive, valuable or meaningful
• Not enough!
– Need capability to detect & correct
– Average time to detect breech???
Reported
hacks/month outside
of government
• More than 50
• 83% financial
companies
• 44% retail
Average time to
detect more than 6
months
http://www.zdnet.co
m/article/businessestake-over-six-monthsto-detect-databreaches/ May, 2015
Report: Property & Casualty 360
What’s Wrong with This Pikture
When Bad Things Happen to Good People
• It’s not if, but when you will experience an…
–
–
–
–
Information breach
Malicious software
Cyber attack
Accident !!!!
• Prevention alone is not a realistic strategy
– You have to be right all the time
– … they only have to be right once
• Loss of trust & Loss of reputation,
• Financial loss & … careers
• Cyber Resilience controls (3-legged stool)
– Prevention
– Detection
– Correction
Missing a leg?
Now what?
Shift of Paradigm
• Change thinking from
– Security to resilience
– Analytical thinking to systems thinking
• Analytical  Independent variables
• Systems  Interdependent variables
• Use new thinking to find proper balance
– Start where you are  accept where you are
– Focus on value balance
• Prevent: what you can
• Detect: what you missed
• Correct: business impact & improve
Cyber Resilience (CR)
• Cyber Resilience
– “The ability to prevent, detect & correct any
impact that incidents have on the information
required to do business.”
• RESILIA™ = CR best practice framework
– Adopt & adapt similar to ITIL®
– Uses ITSM lifecycle
• …and ITSM and a management system
Critical Elements of Effective CR
• Board-level ownership & responsibility for CR
• Adopt tailored learning & development for all staff
• Leads to:
– Clear understanding of critical (information) assets
– Clear view of organizational key threats & vulnerabilities
• Customers
• Partners
• Supply chain
– Adopting a common language,
• Used by all stakeholders
– Assessment of the organizations CR maturity
– Appropriate balance of controls
Benefits of Cyber Resilience
• Aligned to business outcomes
• Implement balanced controls
– Prevent CR incidents you can
– Detect CR incidents not prevented
– Correct to protect business
• Builds trust within value network
– Optimize the value created
– Increase competitive advantage
– Improve operational efficiency
“Recognizing that 100% risk
mitigation is not possible on any
complex system, the overarching
goal of a risk-based approach to
cyber security is system resilience to
survive and quickly recover from
attacks and accidents.” Partnering
for Cyber Resilience, World
Economic Forum, January, 2013
• Balance
– Protection of assets
– Ability to innovate
• Requires single, coherent risk-based strategy
– Must align with organization’s risk appetite
• Delivered via a management systems
Prevent
Detect & Correct
Risk? Really??
Manage cyber resilience
• Manage risks
• Identify what might happen
• Assess likelihood & impact
• Decide on action
• Select risk approach
• ISO 31000
• M_O_R™
• RESILIA™
Management Systems
• Management systems exist everywhere
– Formal & informal
• Driven by strategic goals
• Provides basis for governance & management
– Processes, roles, organizational design, metrics (CSF & KPI)
– Directing, leading & reporting
• AXELOS Cyber Resilience uses the ITSM Lifecycle
–
–
–
–
–
Strategy
Design
Transition
Operation
Continual Improvement
• Defined by the ITIL®
– Service Management Lifecycle
CR, People, Process & Technology
• Avoid overreliance on technology
• Strike a balance
– People
– Process
– … & technology
• Cyber Resilience requires
– Well informed & educated people
– Well designed processes
• People, Process & Technology
– Must fit together without gaps
– Act in a complementary manner
– Include physical & personnel
• … to ensure completeness
What is a Process?
• Structured set of activities designed to
accomplish a specific objective. ITIL Glossary
– Established plan and set of activities
– Produces a measurable outcome for a stakeholder
• Revise the definition: Process is a structure set
of activities… with the necessary controls
– RESILIA adds CR controls to ITSM
RESILIA Adds CR Controls to ITSM
• Take lifecycle approach
• Already doing something
• Start where you are
– Improve what you have
– Start with CSI (continual improvement)
– Determine which controls are needed
• Modify or add processes
• Examine existing business strategy
– Add CR considerations
– Set stage for governance & management
•
•
•
•
Design to meet strategy
Transition to verify & validate accomplishment
Operate CR (IT operations)
Get better at it (CSI – keep momentum going)
– CR constant moving target
Don’t limit thinking!
ITSM isn’t just for IT!
Why RESILIA & ITSM
• CISO gets alert on IP address
– Without good configuration
management…
– Where it is?
– What data is on it?
– How sensitive is the data?
– What flows through it?
• Service desk gets a report
– Transaction that worked, doesn’t
– Without
• Change management et al
• Incident & problem management
• Known error database (KEDB)
Planning CR initiative consider:
• RESILIA best-practice approach
for implementing Cyber
Resilience
• Includes practical guidance
• Based on something you
already know: ITIL/ITSM
• NIST Cybersecurity Framework
• Defines cybersecurity
capability
• Describes practice of
cybersecurity
• NOT how
• Creates cybersecurity profiles
• Current state
• Future state
What Happens in Each Lifecycle Stage
• Strategy
– Ensure CR objectives clearly understood
– Identify critical assets, associated vulnerabilities & risks
• Design
– Design management systems & controls
– Design/select controls, training & RACI
• Transition
– Verify & validate expectations met
– Move output of design into operation
• Operations
– Operate the controls (include continual testing)
– Detect & manage CR events & incidents
• CR continual improvement
– Ensure CR evolves to meet changing threats
– Learn from experience & improve
RESILIA Steps to Be Cyber Resilience
• Identify information assets
– Where they live (may be more than single source)
– How they move
– Who has access & how
• Ownership, too
• Classify & prioritize assets for CR
– Threats, vulnerabilities & risks for each type
• Determine
– Type & level of protection needed
– Appropriate controls
• Make Continual improvement an organizational
capability
Strategy CR Control Objectives
•
•
•
•
•
•
•
Evaluate need & expectations of the stakeholders
Provide direction to management
Define who makes Cyber Resilience decisions & how
Ensure Cyber Resilience risk is addressed
Monitor performance & outcomes
Segregation of Duties & Dual Controls
Cyber Resilience activities
–
–
–
–
–
–
Define overall strategy to create value
Identify stakeholders
Understand business requirements & set expectations
Define high-level priorities, goals, balance & CSFs
Define roles & responsibilities
Provide funding
• … & exploit opportunities
Design CR Control Objectives
• Human Resources Security
– Joiners, movers & leavers (JML)
• Supplier & 3rd Party Security Management
– System Acquisition, Development Architecture &
Design
• Endpoint Security
• Cryptography
• Business Continuity Management
Transition CR Control Objectives
• Asset & Configuration Management
– What & where
– Classification & Handling
• Data Transportation & Removable Media
• Change Management
– Include CR considerations
• Testing
– Test CR capabilities for detection
• Training
– See something, say something
• Document Management
• Information Retention
• Information Disposal
Operation CR Control Objectives
• Ensure risks that disrupt operational service are managed
• Operation controls objectives include
– Access Control
• JML, business requirements & access policy
• Identity verification (authentication, access & non-repudiation)
–
–
–
–
Network Security Management
Physical Security
Operation Security
Incident Management
• Incident response
– Formal response team?
•
•
•
•
Define CR communication
Determine criteria to bring in specialists
Forensic investigation
Document lessons learned
CSI Control Objectives
•
•
•
•
•
•
Audit & Review
Control Assessments
KPIs, KRIs, & Benchmarking
Business Continuity Improvements
Process Improvements
Remediation & Improvement Planning
Effective CR Dependencies
• Board-level ownership &
responsibility for CR
– Execute business strategy
– Deliver desired outcomes
– Offer services to customers
• Trust & rely
• Training & development
• Identify critical information
assets
– What hackers want
• They want it all!!!
– Identify acceptable risk levels
– Threats & vulnerabilities for
each asset type
• Clear view of key threats &
vulnerabilities
– Include customers, partners &
supply chain
• Only secure as weakest link
– Common language used by all
stakeholders
– Assessment of organizational
CR maturity
• Appropriate balance of
controls to
– Prevent
– Detect
– Correct
Prevent
Detect & Correct
CR is Really Business Resilience
• Ensure the organization can confidently
– Execute business strategy with appropriate balance
• Prevent, detect, correct
– Deliver desired business outcomes
• Provide
– Good processes & people, systems & technology
• Offer products & services to customers
– Trust & rely to do the right thing
• Keep customers in the loop
• CR key to survivability & profitability
– Requires more than IT
– Absent effective CR  bad headlines
Additional Information
• Membership (CODE: HDI16)
http://www.itsmmentorstore.com/videotraining.asp
• RESILIA Foundation:
http://www.careeracademy.com/?RESILIAFd_Series
• RESILIA Practitioner:
http://www.careeracademy.com/?RESILIAPr_Series
• Executive overview (30 minute):
https://www.youtube.com/watch?v=xjmaZhVc7KY
Thank you for attending this
session.
Please remember to complete a
session evaluation!
Twitter: DavidM2
NIST Cyber Security Framework
•
•
National Institute of Standards & Technology (NIST)
Framework published in February 2014
– U.S. Publication – appropriate for organizations worldwide
– Intended for organizations supporting critical
infrastructure
– Systems & assets; physical or virtual
– Vital to U.S. Interests
•
Incapacity or destruction results in debilitating impact on
–
–
–
•
Security
National economic security
National public health or safety
NIST Framework
– Framework Core
•
Controls described in a formal structured hierarchy
– Framework Implementation Tiers
•
4-layered model describing alignment to the framework
– Framework Profiles
•
Selection of controls from the core that is appropriate for a
particular organization or context
__________
“The framework is intended for
organizations that are responsible for
critical infrastructure, defined as ‘systems
and assets, whether physical or virtual, so
vital to the United States that the
incapacity or destruction of such systems
and assets would have a debilitating
impact on security, national economic
security, national public health or
safety…’”
__________
NIST Cybersecurity Framework
• Published by the
– National Institute of Standards & Technology (NIST)
• Department of the U.S. Department of Commerce
• Published February 2014
• Deemed appropriate for organizations worldwide
• Risk-based approach
– Manages cybersecurity risk
– Framework Core
• Describes common desired outcomes
• Expressed as functions
– Framework Implementation Tiers
• Describes how cybersecurity is practiced
• Informed by business needs
– Framework Profiles
• Aligns “core” with resources & tolerances
• Used to define current state
• … & future state
__________
“The framework is intended for
organizations that are responsible for
critical infrastructure, defined as ‘systems
and assets, whether physical or virtual, so
vital to the United States that the
incapacity or destruction of such systems
and assets would have a debilitating
impact on security, national economic
security, national public health or
safety…’”
__________
Implementation Tiers
__________
•
Describes the practice of
–
–
–
–
Cybersecurity risk management
Rigor of the practice of cybersecurity
… as define in the framework
Not intended to represent “maturity levels”
•
•
… however may be used as such
Implementation Tiers
– Tier 1 - Partial
•
•
•
Ad hoc
Limited risk awareness
No collaboration
– Tier 2 - Risk-informed
•
•
•
Approved risk management practices
Organizational awareness of risk
Role in relation to other organization
– Tier 3 - Repeatable
•
•
•
Organization-wide formal practices
Consistent processes & methods
Information sharing with other organizations
– Tier 4 - Adaptive
•
•
•
Practices based on lessons learned
Risk management part of culture
Information actively shared
The Tiers range from ‘Ad hoc’ to ‘Adaptive and
describe an increasing degree of rigor and
sophistication in cybersecurity risk management
practices and the extent to which cybersecurity risk
management is informed by business needs and is
integrated into an organization’s overall risk
management practices.
“Implementation of the framework is not judged
based on the tier level achieved, but on achieving
the outcomes described in the organization’s target
profile(s).”
__________
NIST