Presentation

Transcription

Presentation
*Managing
Global
Supply Chain
Risk:
Carrots & Sticks
Discussion
(Government Panel)
.
Mr. Donald Davidson,
Chief, Outreach, Science & Standards
Trusted Mission Systems & Networks
TMSN / DoD CIO
[email protected]
Globalization is good, but it brings challenges
 The government has
suppliers that it may not
know and may never see
 Less insight into suppliers’
security practices
 Less control over business
practices
 Increased vulnerability to
adversaries
“Scope of Supplier Expansion and Foreign Involvement” graphic in DACS
www.softwaretechnews.com Secure Software Engineering, July 2005 article “Software
Development Security: A Risk Management Perspective” synopsis of May 2004 GAO-04-678
report “Defense Acquisition: Knowledge of Software Suppliers Needed to Manage Risks”
Globalization is good, but it brings challenges
People
Acquirers
 The government has
suppliers that it may not
know and may never see
Systems
Integrators
Suppliers
 Less insight into suppliers’
security practices
 Less control over business
practices
 Increased vulnerability to
adversaries
(measures)
Technology
“Scope of Supplier Expansion and Foreign Involvement” graphic in DACS
www.softwaretechnews.com Secure Software Engineering, July 2005 article “Software
Development Security: A Risk Management Perspective” synopsis of May 2004 GAO-04-678
report “Defense Acquisition: Knowledge of Software Suppliers Needed to Manage Risks”
Supply Chain: PERSPECTIVES
Air Gateways
Supply Chain SECURITY
•Nodes of
storage & throughput
•Lines of
transport (& communication)
Exports
Land Gateways
Imports
Port of Blaine
$68 Billion
Exports
Imports
Imports
$64 Billion
Seattle-Tacoma International
Port of Seattle
Exports Port Gateways
$81 Billion
Port of Sweetgrass
Port of Pembina
Port of Tacoma
Port of Champlain-Rouses Pt.
Port of Portland
Port of Alexandria Bay
Port of Buffalo-Niagara FallsBoston Logan Airport
Port of Huron
Chicago
JFK International Airport
Port of Detroit Cleveland
Port of New York
San Francisco International Airpor
Port of Philadelphia
Port of Oakland
Port of Baltimore
Port of Norfolk Harbor
Los Angeles International Airport
Atlanta
Port of Los AngelesPort of Calexico-East
Port of Otay Mesa Station
Port of Nogales
Port of El Paso
Dallas-Fort Worth
Port of Charleston
Port of Long Beach
New Orleans
Port of Morgan City
Port of Laredo
Port of Savannah
Port of Jacksonville
Port of Beaumont Port of New Orleans
Port of Houston
Miami International Airport,
Port of Corpus Christi
Port of Brownsville-Cameron
Port of Port EvergladesPort of Miami
Port of Hidalgo
New 2012 US National
Supply Chain
SECURITY
Strategy
Supply Chain: PERSPECTIVES
Supply Chain RESILIENCE
•Multi-sources
•Multi-nodes
•Multi-routes
Tacoma
Los Angeles
Hampton Roads
New York/New Jersey
Oakland
Charleston
Long Beach
Jeddah
San Juan
Dubai
Salalah Nhava Sheva
Colombo
Less than 2 million TEU
2 to 4 million TEU
4 to 7 million TEU
7 to 10 million TEU
•fix-on-the-fly
(while doing ,
w/ no pause)
… to continue
to move &
deliver product.
Melbourne
More than 10 million TEU
Pacific Asia
Tianjin
Dalian
Laem Chabang
Hong Kong
Port Kalang
Tanjung Pelepas
Singapore
Europe
Antwerp
LeHavre
Quingdao
Ningbo Shanghai
Keelung
Kaohsiung
Busan
Osaka
Nagoya
Genoa
Barcelona
Kobe
Tokyo
Manila
Valencia
Algeciras
Tanjung Perak
Dubai Ports World
Hutchison Port Holdings
Peninsular and Oriental Ports
Port of Singapore Authority
Pacific Asia
Hamburg
Rotterdam Bremen/Bremerhafen
Guangzhou
Shenzhen Xiamen
Tanjung Priok
APM Terminals
Felixstowe
Europe
Gioia Tauro
Piraeus
Supply Chain: PERSPECTIVES
Product INTEGRITY
How do we improve our trust & confidence
in HW, SW & Services we source from a
global supply chain?
What is ICT?
Images extracted from a presentation on actual counterfeit IT products incidents
and use of company names, labels do not indicate preference or problem area.
From The World Is Flat by Thomas Friedman
Dell Inspiron 600m Notebook: Key Components and Suppliers
JSF Extended Team – U.S.
HOTAS
• Essex
RIUs
VMC
Lift Fan
Alt Engine
• BAE Systems Controls
• Rolls Royce Allison • Smiths Aerospace • GE
Canopy Actuator
ICP
LGS
EPGS • MPC
• LM Owego
• Goodrich
• Hamilton Sundstrand
Ext. Lighting
Anti Ice
ICP
• LSI
•
Goodrich
• LMTS
EHAS
CNI -Components
• Rockwell Collins
MFD
• Rockwell Collins
(Kaiser)
• Moog
Gun System
• General Dynamics
Landing Aid Antennas
• EDO
EW/CM
• BAE IEWS
Driveshaft
• Goodrich
Engine
• Pratt & Whitney
HMD
• VSI
RF Cables
• Times Microwave
Stores & Rel. Sys
TRS
• McCormick Selph
• EDO
TDE
• Smiths Aerospace
Radar, EO-DAS
• NG ES
EW/CM components
• NG
Edges
• LM Aero- Palmdale
Rudder Pedal
• Pacific Scientific
Transparency
• ATK
Center Fuse
• NG
ADS
• Avionics Specialties, Inc.
Forebody Test Sled Articles
• Advanced Technologies
AME
• Marvin
Raytheon
• GPS
LEFD, Wing Fold
• Moog
Fuel System
• Parker Aerospace
CNI
• Northrop Grumman RS
ICP Panel
• L3 Comm
CNI Apertures
• Ball
PTMS
Supply Chain
• Honeywell
• Honeywell/Cat Alliance
Raytheon
• Weapons
Source: Lockheed Martin Aeronautics Company
Final Assy, Fwd Fuse, Wing
• LM Aero-Ft Worth
HPGS
• Eaton
NDB
• MTI
Boeing
• Weapons
CNI
• Components SCI
ICP Components
• Raytheon Systems
LEFAS
• Curtiss Wright
Fire Protection
• Kidde
Radome
• General Dynamics Marion
INS
• Honeywell
T&S
• LMIS
EOTS
• LM Missiles & Fire Control
Harris
• Common Components
F-35 Extended Team - International
Industrial Participation
Turkey
U.K.
Gate Elektronic
TAI
BAE SYSTEMS
ALP Aviation
Ayesas
Goodrich Adv. Sys
Aselsan
Havelsan
Helmet
AYESAS
KaleKalip
Integrated Sys.
Gate Elektronic
TAI
Martin Baker
Havelsan
Aselsan
Hambles Sturc.
Hema/Alp
MIKES
Smiths +Others
Kale Kalip
Hema
Beaufort
Marconi
KaleKalip
Smiths
Mikes
ALP
GKN
Parsan Steel
Parsans
Microfiltrex
Forging
HS Claverham
TAI
HS Marston
TEI
QinetiQ
+ Others
Didsbury Engr
Kennard
Netherlands
+ Others
ATS Kleizen
Fokker Elmo, Aero, Defense
Sun Electronic
Philips Aerospace
SP Aerospace
Thales Cyrogenics
DAP
Thales Optronics
Sun Electronic
Phillips Aerospace
Thales Cyrogenics + Others
Axxiflex
Senior Aerospace Bosman
PHM Group
Urenco
+ Others
Norway
Kongsberg
Metronor
Techni
NERA
Kongsberg
Kitron
3D Perception
Applica
Ericsson
Kitron
Metronor
Nammo
Natech
NERA
Presens
SensoNor AS
SINTEF
T & G Elektro
Thales Comm.
+Others
Australia
Micro LTD
Ferra Engineering
Hovitt
Cablex
Varley
Production Parts
Calytrix Technologies
+ Others
Micreo
Cablex
Lovitt + Others
Compucat
Rosebank Eng
+ Others
Denmark
Terma AS
GPV
SSE
IFAD
HiQ Wise
Corena
Terma
SSE
GPV
E.Falk Schmidt
Maersk Data Def
Elbo Production
Danish Aerotech
Hamann Electronics
+ Others
Italy
Alenia
Marconi Sirio Panel
Galileo
Piaggio
Moog- Caselle
UOP
Secondo Mona
Samputensilli
Marconi Selenia
York
+Others
Global Development and Production
Source: Lockheed Martin Aeronautics Company
Canada
Herovx-Devtek
Magellan-Chicopee
Honeywell Eng. Sys
DY4
Mindready
Howmet
Virtek +Others
Mustang Surv. Co
Bristol Aerospace
Graphico
Novatronics
DMG + Othes
Bombardier
Air Data Inc
CMC Electronics
Noranco + Others
OMA
Mecaer
Aerea
Aermacchi
Galileo
ASE
Forgital
Inossman
Logic
+ Others
Focus Area 3
Focus Area 2 Focus Area 1
Comprehensive National
Cybersecurity Initiative (CNCI)
Deploy Passive
Sensors Across
Federal Systems
Trusted Internet
Connections
Pursue Deployment of
Intrusion Prevention
System
Coordinate and
Redirect R&D Efforts
(Dynamic Defense)
Establish a front line of defense
Connect Current
Centers to Enhance
Cyber Situational
Awareness
Develop a Government
Wide Cyber
Counterintelligence
Plan
Increase the Security of
the Classified Networks
Expand Education
Demonstrate resolve to secure U.S. cyberspace & set conditions for long-term success
Define and Develop
Enduring Leap Ahead
Technology, Strategies
& Programs
Define and Develop
Enduring Deterrence
Strategies & Programs
Develop Multi-Pronged
Approach for Global
Supply Chain Risk
Management
Define the Federal
Role for Extending
Cybersecurity into
Critical Infrastructure
Domains
Shape the future environment to demonstrate resolve to secure
U.S. technological advantage and address new attack and defend vectors
Product Assurance
TRADESPACE
Higher COST can buy Risk Reduction
$
Unique
Requirements
Slippery Slope /
Unmeasurable Reqts
Acquirers
Systems
Integrators
Suppliers
SCRM Standardization and Levels of Assurance
will enable Acquirers to better communicate
requirements to Systems Integrators & Suppliers,
so that the “supply chain” can demonstrate
good/best practices and enable better overall
risk measurement and management.
COTS
products
Lower Cost usually means Higher RISK
Risk
SCRM Stakeholders
US has vital interest in the global supply chain.
Other Users
CIP
SCRM “commercially
acceptable global
standard(s)”
must be derived from
Commercial Industry
Best Practices.
DoD
DHS & IA
Commercial
Industry
COTS
SCRM Standardization Requires Public-Private Collaborative Effort
ICT- “Elephants in the Room”
US has vital interest in the global supply chain.
Other Users
CIP
SCRM believes
“commercially acceptable
global standard(s)”
must be derived from
Commercial Industry Best
Practices.
DoD
Commercial
Industry
DHS & IA
Software
Assurance
Counterfeits
COTS
SCRM Standardization Requires Public-Private Collaborative Effort
Government Panel
Managing
Global
Supply Chain
Risk:
Carrots & Sticks
Discussion
15
Government Panelists
•Mitch Komaroff, Director, Trusted Mission
Systems & Networks (TMSN) in the DoD CIO
(covering DoD, NSS & CNCI-SCRM, etc…)
•Jon Boyens, Senior Advisor,
Computer Security Division at NIST
(covering Interagency Policy & Standards… UMD Study, -7622, 800-53, etc…)
•Lisa Kaiser, Director, Control Systems Cybersecurity
Strategic Planning, Control Systems Security Program at DHS
(covering Critical Infrastructure Control Systems, etc…)
16
Mitch Komaroff
(DoD, NSS & CNCI-SCRM …)
US has vital interest in the global supply chain.
Other Users
CNCISCRM
CIP
NSS
SCRM believes
“commercially acceptable
global standard(s)”
must be derived from
Commercial Industry Best
Practices.
DoD
DoD
DHS & IA
Commercial
Industry
COTS
SCRM Standardization Requires Public-Private Collaborative Effort
Jon Boyens
(InterAgency & Standards …)
US has vital interest in the global supply chain.
Other Users
NIST
UMD Study
IR-7622
800-53
CIP
WG2
AdHoc
WG
CCDB
SCRM believes
“commercially acceptable
global standard(s)”
must be derived from
Commercial Industry Best
Practices.
TOGOTTF
DoD
DHS & IA
Commercial
Industry
COTS
SCRM Standardization Requires Public-Private Collaborative Effort
Lisa Kaiser
(Critical Infrastructure Control Systems …)
US has vital interest in the global supply chain.
Other Users
CIP
CIP
SCRM believes
“commercially acceptable
global standard(s)”
must be derived from
Commercial Industry Best
Practices.
DoD
DHS & IA
Commercial
Industry
COTS
SCRM Standardization Requires Public-Private Collaborative Effort
Government Panelists
•Mitch Komaroff, Director, Trusted Mission
Systems & Networks (TMSN) in the DoD CIO
(covering DoD, NSS & CNCI-SCRM, etc…)
•Jon Boyens, Senior Advisor,
Computer Security Division at NIST
(covering Interagency Policy & Standards… UMD Study, -7622, 800-53, etc…)
•Lisa Kaiser, Director, Control Systems Cybersecurity
Strategic Planning, Control Systems Security Program at DHS
(covering Critical Infrastructure Control Systems, etc…)
20
Background
INFO
Globalization impact
 IT Supply Chain is global, no longer under US (or any other nation’s)
control and is increasingly not trusted
 IT communications connects nearly all DoD IT functionality
together and with the functionality of the rest of the world
Including our adversaries (Information Assurance)
 Commercial IT functionality has penetrated nearly every
aspect of our Mission Critical Functionality
(Systems Assurance / Mission Assurance / Readiness)
 In this converged environment we compete with sophisticated
nation-state adversaries, terrorists and criminal organizations
-- Competitors and adversaries actively participating in the
same / shared global supplier chain
DoD weapons and command and control systems must be robust
against a full spectrum of attacks to achieve mission assurance
Things that can go wrong…
 IF, we practice this Behavior: integrating (untrusted) technologies without
regard to the criticality and risk levels of the parent system or network
 Our Vulnerabilities: All ICT (incl. systems, networks, applications) are vulnerable to:
─ Intentionally implanted logic (e.g., back doors, logic bombs, spyware)
─ Unintentional vulnerabilities maliciously exploited (e.g., poor quality or fragile code)
─ Counterfeit components/products prematurely degrade / otherwise disrupt operations
 Adversaries will have increased access and opportunity to infiltrate otherwise
closed-off technologies and services
 THEN, we suffer these Consequences: Stolen critical data & technology;
corruption, denial of critical functionality…or more simply,
degraded / lost Mission Assurance
Addressing the
Globalization Challenge
 2003
DSD signs out Defense Trusted Integrated Circuits (IC) Strategy Memo
 2004-2006
Operational risk to DoD networks and systems from globally
sourced ICT assessed as high
─ NII sponsored 2004 Johns Hopkins study
─ NII led 2006 CNSS Global IT Report
─ NII/AT&L Software Assurance Tiger Team
─ DSB microelectronics (2006), software (2007) studies
 Sept 2006
DoD calls Deputy’s Committee on globalization risks to ICT
─ Leads to interagency effort, co-chaired by NII/CIO to develop
strategic approach to supply chain risk management (SCRM)
─ DSD establishes the Globalization Task Force
 Sept 2007
Interagency SCRM effort integrated into Initiative 11 of the
Comprehensive National Cyber Initiative (CNCI)
─ Budget request includes funds to begin implementing SCRM in DoD
 Sept 2008
DoD continues to drive interagency and develop internal tools and
policies
─ CNCI SCRM Strategy and Implementation Plan completed
─ DODI 5200.39 “Critical Program Information Protection Within the
DoD”
─ NII / AT&L (NDIA): “Engineering for Systems Assurance”
2009… 2010 Trusted Mission Systems & Networks … 2011… 2012
Findings, Strategy and Direction
• National Security Presidential Directive-54/Homeland Security Presidential
Directive-23, paragraph 45 Tasking to DoD and DHS:
• Initiative 11: Develop Multi-Pronged Approach for Global Supply Chain Risk
Management (SCRM)
• Significant gaps exist in USG policy regarding supply chain risk management
– No mandate to address supply chain risk
– Limited tools to manage risk
– and an overall … Lack of guidance & governance for SCRM
• Strategy:
– Provide investment in SCRM for high priority systems
– Maximize use of -informed technical mitigations and engineering
– Where technical mitigation is not sufficient, utilize procurement tools
What are the problems and gaps we are trying to address?
 Information and Communication Technology (ICT) products are assembled,
built, and transported by multiple vendors around the world before they are
acquired (often) without the knowledge of the acquirer
 Abundant opportunities exist for malicious actors to tamper with and
sabotage products, ultimately compromising system integrity and operations
evidenced by multiple recently publicized incidents (counterfeit
hardware sold to government agencies)
 Organizations acquiring hardware, software, and services are (often) not
able to understand and/or manage the security risks associated with the use
of these products and services
 Challenges range from poor acquirer practices to lack of transparency
into the supply chain
 Substantial number of organizations or people can “touch” an ICT product without being identified
 No standardized methodology or lexicon exists for managing ICT supply chain risks
 Poor ICT products and services acquisition practices contribute to acquirers’ lack of understanding what is in
their supply chain
 Counterfeit hardware and software proliferate
 Acquirers do not have a framework to help enforce security and assurance compliance for vendors
Courtesy of Nadya Bartol (BAH)
SCRM Guiding Principles
 Defense-in-breadth: Mitigate risk across the entire lifecycle
 Understand risk management problem from a systems perspective
 Response should be commensurate with risk and system/network
criticality
 Need to understand levels of vulnerability and threat relative to each
system
 Drive higher assurance characteristics into commercial products where we
have leverage
 Continued access to global ICT is critical to DoD mission
To meet tomorrow’s threat we must develop protection measures across
product lifecycle and reinforce these measures through USG acquisition
processes and effective implementation of agency security practices
SCRM Key Components
 Supply Chain Information Sharing
• DoD.mil, InterAgency.gov & Industry.com
 Engineering
• Develop acquisition and engineering guidance enabling SCRM
• Utilize global sourcing risk management standards and best
practices from industry
 Procurement Tools
• Supply chain -informed procurement remains challenge
Engineering for Systems Assurance
 Developed by AT&L and NII through NDIA Systems
Assurance Committee
 Intent of the Guidebook: Provide practical guidance
augmenting systems engineering with systems
assurance practices
“SYSTEM ASSURANCE
IN NATO PROGRAMMES”
(AEP-67)
 Provide knowledge for applying technical assurance
measures within ISO 15288 systems engineering technical
process
Key Practices
 Encompass overall program and project management
 Integrate systems assurance into the acquisition lifecycle
 Guidance developed using DOD Lifecycle Framework
 Guidance for each technical review within the lifecycle
 “Proto-checklist” level of detail
 Built IA, program protection, Anti-tamper into lifecycle, as
they pertain to and enforce system assurance
 Scope
“NIST-IR 7622”
 Management of risk
 Assurance of security
 All within the context of system and software lifecycles
Guide
DoD Supporting Policy
 DoDI 5000.02, dated Dec 2008
 Operation of the Defense Acquisition System
 Regulatory Requirement for Program Protection Plan at MS B/C
 References DoDI 5200.39
• DoDI 5200.39, dated Dec 2010
– Critical Program Information (CPI) Protection Within the DoD
– Assigns responsibility for Counterintelligence, Security, and System
Engineering support for the ID and protection of CPI
– Expands definition of CPI to include degradation of mission
effectiveness
– Technology, information, elements, or components
• Directive-Type Memorandum (DTM) 09-016, dated 20 Aug 2011
– Supply Chain Risk Management to Improve the Integrity of Components
Used in DoD Systems
– Establishes policy and defense-in-breadth strategy for managing Supply
Chain Risk to information and communications technology
ICT Supply Chain Risk Management requires contributions and
collaboration among many disciplines with recognized
standards
•ISO/IEC a27005 (Risk
Management: Information
Security)
•ISO/IEC 16085
(Risk Management: Life
Cycle Processes )
•ISO/IEC 31000 (Risk
Management: Principles and
Guidelines)
•ISO/IEC 20000
(IT Service
Management)
•Resiliency
Management Model
(RMM)
•ISO/IEC/IEEE 15288 (Systems)
•ISO/IEC15026 (Systems Assurance)
•IEEE 1062 (Software Acquisition)
•Capability Maturity Model Integration
(CMMI)
Systems
Engineering
ICT Supply
Chain
Assurance
Supply Chain
&
Logistics
•ISO/IEC 28000 (Supply
Chain Resiliency)
•ISO/IEC 27036
(Information Security for
Supplier Relationships)
•ISO/IEC 27000 Family
(Information Security
Management Systems)
•Common Criteria
•OSAMM
•BSIMM
•Microsoft Secure Development
Lifecycle
•ISO/IEC 27034 (Guidelines for
Application Security)
•ISO/IEC TR 24772
(Programming Language
Vulnerabilities)