Download Framework for Improving Critical Infrastructure Cybersecurity

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Business intelligence wikipedia , lookup

Strategic management wikipedia , lookup

Compliance and ethics program wikipedia , lookup

Internal communications wikipedia , lookup

Business process wikipedia , lookup

Transcript
Framework for Improving Critical
Infrastructure Cybersecurity
NIST Feb 2014
Lots of Cyber Security Controls Sets
(Now we have one more)
• HIPAA - Healthcare
• PCI - Credit Cards
• NIST 800-53 - US (.gov)
• PCI - Credit Industry
• ISO 27001 - International
• SAS 70/SSAE-Public Corp
• NERC-CIP - Infrastructure
• DIACAP - DoD (.mil)
• TSA - Transportation
• Cybersecurity Framework
(newest)
Framework’s Primary Functions
(A risk-based approach to managing cybersecurity risk)
The Framework Core consists of five concurrent and continuous
Functions:
• Identify
• Detect
• Protect
• Recover
• Respond
When considered together, these Functions provide a high-level,
strategic view of the lifecycle of an organization’s management
of cybersecurity risk.
Asset Management (ID.AM): The data, personnel, devices, systems, and facilities that enable the
organization to achieve business purposes are identified and managed consistent with their relative
importance to business objectives and the organization’s risk strategy.
Business Environment (ID.BE): The organization’s mission, objectives, stakeholders, and activities
are understood and prioritized; this information is used to inform cybersecurity roles,
responsibilities, and risk management decisions.
IDENTIFY
Governance (ID.GV): The policies, procedures, and processes to manage and monitor the
organization’s regulatory, legal, risk, environmental, and operational requirements are understood
and inform the management of cybersecurity risk.
Risk Assessment (ID.RA): The organization understands the cybersecurity risk to organizational
operations (including mission, functions, image, or reputation), organizational assets, and
individuals.B58
Risk Management Strategy (ID.RM): The organization’s priorities, constraints, risk tolerances, and
assumptions are established and used to support operational risk decisions.
Anomalies and Events (DE.AE): Anomalous activity is detected in a timely manner and the
potential impact of events is understood.
Detect
Security Continuous Monitoring (DE.CM): The information system and assets are monitored at
discrete intervals to identify cybersecurity events and verify the effectiveness of protective
measures.
Detection Processes (DE.DP): Detection processes and procedures are maintained and tested to
ensure timely and adequate awareness of anomalous events.
Access Control (PR.AC): Access to assets and associated facilities is B84limited to authorized users,
processes, or devices, and to authorized activities and transactions.
Awareness and Training (PR.AT): The organization’s personnel and partners are provided
cybersecurity awareness education and are adequately trained to perform their information
security-related duties and responsibilities consistent with related policies, procedures, and
agreements.
Protect
Data Security (PR.DS): Information and records (data) are managed consistent with the
organization’s risk strategy to protect the confidentiality, integrity, and availability of information.
Information Protection Processes and Procedures (PR.IP): Security policies (that address purpose,
scope, roles, responsibilities, management commitment, and coordination among organizational
entities), processes, and procedures are maintained and used to manage protection of information
systems and assets.
Maintenance (PR.MA): Maintenance and repairs of industrial control and information system
components is performed consistent with policies and procedures.
Protective Technology (PR.PT): Technical security solutions are managed to ensure the security
and resilience of systems and assets, consistent with related policies, procedures, and agreements.
Response Planning (RS.RP): Response processes and procedures are executed and maintained, to
ensure timely response to detected cybersecurity events.
Communications (RS.CO): Response activities are coordinated with internal and external
stakeholders, as appropriate, to include external support from law enforcement agencies.
Respond
Analysis (RS.AN): Analysis is conducted to ensure adequate response and support recovery
activities.
Mitigation (RS.MI): Activities are performed to prevent expansion of an event, mitigate its
effects, and eradicate the incident.
Improvements (RS.IM): Organizational response activities are improved by incorporating lessons
learned from current and previous detection/response activities.
Recovery Planning (RC.RP): Recovery processes and procedures are executed and maintained to
ensure timely restoration of systems or assets affected by cybersecurity events.
Improvements (RC.IM): Recovery planning and processes are improved by incorporating lessons
learned into future activities.
Recover
Communications (RC.CO): Restoration activities are coordinated with internal and external
parties, such as coordinating centers, Internet Service Providers, owners of attacking systems,
victims, other CSIRTs, and vendors.
References
• http://www.whitehouse.gov/the-pressoffice/2013/02/12/executive-order-improving-criticalinfrastructure-cybersecurity
• http://www.nist.gov/cyberframework/index.cfm
• http://ics-cert.us-cert.gov/Assessments