In the Discover Information Protection Needs activity of the ISSE process, the information systems security engineer must document all elements of the activity.. These elements include:
Trang 2Mission/Business Function Information Management Functions
Mission/
Business Threats
Information Threats
Information Protection Policy Information Management Policy
Figure 11-5: Discover Information
Protection Needs activity (from IATF document, Release 3.1, September 2002)
The information systems security engineer should use any reliable sources of infor
mation to learn about the customer’s mission and business operations, including areas such as human resources, finance, command and control, engineering, logis
tics, and research and development This knowledge can be used to generate a con
cept of operations (CONOPS) document or a mission needs statement (MNS) Then, with this information in hand, an information management model (IMM) should be developed that ultimately defines a number of information domains Information
management is defined as:
agement model should take into account:
✦ The information being processed
✦ Processes being used
Trang 3The principle of least privilege should be used in developing the model by permit
ting users to access only the information required for them to accomplish their assigned tasks
The IMM is illustrated in Figure 11-6
Process InformationUser
Figure 11-6: Graphic of the information management model
(from IATF document, Release 3.1, Appendix H, September 2002)
A short example of an IMM is given in Table 11-1
Information Management Model
Table 11-1
President Read/Write Corporate Finance Policy Treasurer Read/Write Corporate Finance Policy Senior V.P Read Corporate Finance Policy
Trang 4A similar example of the output domains of the IMM is given in Table 11-2
Table 11-2
IMM Information Domain Example
Human Resources Director Read/Write Corporate Finance Financial Reports,
Salaries Human Resources Benefits Staff Read Corporate Finance Financial Reports,
rity engineer to evaluate the types of potential threats to a domain and the impact
of a threat realized upon a domain As part of the Discover Information Protection
Needs activity, metrics are assigned to threats, or potentially harmful events (PHE), and to the level of harm to information (HTI) for each domain The information sys
tem security principles of confidentiality, integrity, and availability (C.I.A.) are applied to estimate the HTI This process is illustrated in Figure 11-7
RISK
Information Threat
Likelihood of Harm
Potentially Harmful EventsHarm to Information
Disclosure Motivation to Attack
Adversaries Accidents Nature
System System Vulnerabilities
Figure 11-7: The PHE and HTI process (from IATF document, Release 3.1,
Appendix H, September 2002)
Trang 5For example, the metrics could be numbers ranging from 0 to 3 for the PHE and HTI, and they could be displayed as shown in Figure 11-8
Figure 11-8: A PHE-HTI combination matrix (from IATF document,
Release 3.1, Appendix H, September 2002)
In the Discover Information Protection Needs activity of the ISSE process, the information systems security engineer must document all elements of the activity These elements include:
Define System Security Requirements
In this ISSE activity, the information systems security engineer identifies one or more solution sets that can satisfy the information protection needs of the IPP This subprocess is illustrated in Figure 11-9
Trang 6INFORMATION PROTECTION POLICY
In selecting a solution set, the information systems security engineer must also con
sider the needs of external systems such as Public Key Infrastructure (PKI) or other cryptographic-related systems, as shown in Figure 11-10
NEEDS
SYSTEM
SYSTEM INFORMATION PROTECTION POLICY
Figure 11-10: Mapping of needs to solution
set components
Trang 7A solution set consists of a preliminary security CONOPS, the system context, and the system requirements In close cooperation with the customer and based on the IPP,
the information systems security engineer selects the best solution among the solution sets The information protection functions and the information management functions are delineated in the preliminary security CONOPS, and the dependencies among the organization’s mission and the services provided by other entities are identified In developing the system context, the information systems security engineer uses systems engineering techniques to identify the boundaries of the system
to be protected and allocates security functions to this system as well as to exter
nal systems The information systems security engineer accomplishes this alloca
tion by analyzing the flow of data among the system to be protected and the external systems and by using the information compiled in the IPP and IMM
The third component of the solution set — the system security requirements — is generated by the information systems security engineer in collaboration with the systems engineers Requirements should be unambiguous, comprehensive, and concise, and they should be obtained through the process of requirements analysis The functional requirements and constraints on the design of the information security components include regulations, the operating environment, targeting internal
as well as external threats, and customer needs
At the end of this process, the information systems security engineer reviews the security CONOPS, the security context, and the system security requirements with the customer to ensure that they meet the needs of the customer and are accepted
by the customer As with all activities in the ISSE process, documentation is very important and should be generated in accordance with the C&A requirements
Design System Security Architecture
The requirements generated in the Define System Security Requirements activity of the ISSE process are necessarily stated in functional terms, indicating what is needed, but not how to accomplish what is needed In Design System Security Architecture,
the information systems security engineer performs a functional decomposition of the
requirements that can be used to select the components required to implement the designated functions Some aids that are used to implement the functional decomposition are timeline analyses, flow block diagrams, and a requirements allocation
sheet The result of the functional decomposition is the functional architecture of the
information security systems, shown schematically in Figure 11-11
In the decomposition process, the performance requirements at the higher level are mapped onto the lower level functions to ensure that the resulting system performs
as required Also as part of this activity, the information systems security engineer determines, at a functional level, the security services that should be assigned to the system to be protected as well as to external systems Such services include encryption, key management, and digital signatures Because implementations are not specified in this activity, a complete risk analysis is not possible General risk analysis, however, can be done by estimating the vulnerabilities in the classes of components that are likely to be used
Trang 8SECURITY COMPONENTS
INTERNAL
SECURITY DESIGN ELEMENTS
SECURITY SYSTEM ELEMENTS
INFORMATION
INTERFACES
INFORMATION
INFORMATION
Figure 11-11: Design system security architecture
As always, documentation in accordance with requirements of the C&A process should be performed
Develop Detailed Security Design
The information protection design is achieved through continuous assessments of risks and the comparison of these risks with the information system security requirements by the ISSE personnel The design activity is iterative, and it involves both the SE and ISSE professionals The design documentation should meet the requirements of the C&A process It should be noted that this activity specifies the system and components but does not specify products or vendors
The tasks performed by the information systems security engineer include:
✦ Mapping security mechanisms to system security design elements
✦ Cataloging candidate commercial off-the-shelf (COTS) products
✦ Cataloging candidate government off-the-shelf (GOTS) products
✦ Cataloging custom security products
✦ Qualifying external and internal element and system interfaces
✦ Developing specifications such as Common Criteria protection profiles
Some characteristics of this effort are:
✦ The design documents should be under configuration control
✦ The design must meet the customer’s design constraints
✦ The components in the design must address both technical and nontechnical information security mechanisms
✦ The interdependency and interaction among security mechanisms must be included in the risk analysis process
Trang 9✦ The information systems security engineer must take into account trade-offs that might have to be made among cost, priorities, performance, schedule, and remaining security risks
✦ The security requirements should map onto the security design
✦ Any failures to meet the security requirements must be reported to the C&A authorities
✦ The design should produce a revised security CONOPS
✦ The design should take into account the effects and costs of long-lead-time items and life cycle support requirements
Implement System Security
This activity moves the system from the design phase to the operational phase
The steps in this process are shown in Figure 11-12
DESIGN ACQUIRE CONFIGURE TEST DOCUMENT TRAIN INTEGRATE
OPERATIONS
Figure 11-12: The path from design to
operations in the Implement System Security activity
The Implement System Security activity concludes with a system effectiveness assessment that produces evidence that the system meets the requirements and needs of the mission Security accreditation usually follows this assessment
The assessment is accomplished through the following actions of the information systems security engineer:
✦ Verifying that the implemented system does address and protect against the threats itemized in the original threat assessment
✦ Providing inputs to the C&A process
✦ Application of information protection assurance mechanisms related to sys
tem implementation and testing
✦ Providing inputs to and reviewing the evolving system life cycle support plans
Trang 10✦ Providing inputs to and reviewing the operational procedures
✦ Providing inputs to and reviewing the maintenance training materials
✦ Taking part in multidisciplinary examinations of all system issues and concerns
An important part of the Implement System Security activity is the determination of the specific components of the information system security solution Some of the factors that have to be considered in selecting the components include:
✦ Availability now and in the future
✦ Cost
✦ Form factor
✦ Reliability
✦ Risk to system caused by substandard performance
✦ Conformance to design specifications
✦ Compatibility with existing components
✦ Meeting or exceeding evaluation criteria (Typical evaluation criteria include the Commercial COMSEC Evaluation Program [CCEP], National Information Assurance Partnership [NIAP], Federal Information Processing Standards [FIPS], NSA criteria, and NIST criteria.)
In some cases, components might have to be built and customized to meet the requirements if no suitable components are available for purchase or lease The information systems security engineer is responsible for configuring the security components to provide the specified security controls and services
Additional tasks related to the Implement System Security activity conducted by the systems and design engineers in cooperation with the information systems security engineer include:
✦ Conducting unit testing of components
✦ Developing test procedures to ensure that the designed system performs as required; these procedures should incorporate:
• Test planning, to include facilities, schedule, personnel, tools, and required resources
• Integration testing
• Functional testing to ensure that systems and subsystems operate properly
• Generation of test reports
• Tests of all interfaces, as feasible
Trang 11✦ Developing documentation and placing documentation under version control; the documentation should include:
• Installation procedures
• Operational procedures
• Support procedures
• Maintenance procedures
• Defects discovered in the procedures
✦ Using documentation for training of administrators and users
The information systems security engineer will perform the following information security–related tasks as part of the ISSE process:
✦ Developing test plans and procedures, to include:
• Tools
• Hardware
• Test cases
• Required software
✦ Taking part in the testing of information protection mechanisms and operations
✦ Coordinating the application of information protection assurance mechanisms with their counterparts in the systems implementation and testing effort
✦ Continuation of the risk management effort
✦ Contributing to life cycle security planning, including:
✦ Ensuring that the security design is properly implemented
✦ Ensuring that proper and adequate material is available for the conduct of training
Assess Information Protection Effectiveness
In order to assess the effectiveness of the information protection mechanisms and services effectively, this activity must be conducted as part of all the activities of
Trang 12the complete ISSE and SE process Table 11-3, with information taken from the IATF document, Release 3.1, September 2002, lists the tasks of the Assess Information Protection activity that correspond to the other activities of the ISSE process
Obtain customer agreement on the conclusions of this activity as
a basis for determining the system security effectiveness Define System Security Ensure that the selected solution set meets the mission or Requirements business security needs
Coordinate the system boundaries Present security context, security CONOPS, and system security requirements to the customer and gain customer concurrence Ensure that the projected security risks are acceptable to the customer
Design System Begin the formal risk analysis process to ensure that the Security Architecture selected security mechanisms provide the required security
services and explain to the customer how the security architecture meets the security requirements
Develop Detailed Review how well the selected security services and Security Design mechanisms counter the threats by performing an interdependency
analysis to compare desired to effective security service strengths Once completed, the risk assessment results, particularly any mitigation needs and residual risk, will be documented and shared with the customer to obtain their concurrence
Identify possible mission impacts and advise the customer and Security
The risk analysis will be conducted/updated Strategies will be developed for the mitigation of identified risks
the customer’s Certifiers and Accreditors Implement System
Trang 13Summary Showing the Correspondence
of the SE and ISSE Activities
As discussed in the descriptions of the SE and ISSE processes, there is a respondence of activities in the ISSE process to those in the SE process Table 11-4, taken from IATF document, Release 3.1, September 2002, summarizes those activi
one-to-cor-ties in the ISSE process that correspond to activione-to-cor-ties in the SE process
Table 11-4
Corresponding SE and ISSE Activities
Discover Needs Discover Information Protection Needs
The systems engineer helps the customer The information systems security engineer understand and document the information helps the customer understand the management needs that support the information protection needs that support the business or mission Statements about mission or business Statements about information needs may be captured in information protection needs may be captured
an information management model (IMM) in an Information Protection Policy (IPP)
Define System Requirements Define System Security Requirements
The systems engineer allocates identified The information systems security engineer needs to systems A system context is allocates information protection needs to developed to identify the system environ- systems A system security context, a prelim
ment and to show the allocation of system inary system security CONOPS, and baseline functions to that environment A prelim- security requirements are developed
inary system concept of operations (CONOPS) is written to describe opera
tional aspects of the candidate system (or systems) Baseline requirements are established
Design System Architecture Design System Security Architecture
The systems engineer performs functional The information systems security engineer analysis and allocation by analyzing ` works with the systems engineer in the areas candidate architectures, allocating require- of functional analysis and allocation by ments, and selecting mechanisms The analyzing candidate architectures, allocating systems engineer identifies components, security services, and selecting security
or elements, allocates functions to those mechanisms The information systems security elements, and describes the relationships engineer identifies components, or elements, between the elements allocates security functions to those elements,
and describes the relationships between the elements
Trang 14SE Activities ISSE Activities
Develop Detailed Design Develop Detailed Security Design
The systems engineer analyzes design The information systems security engineer constraints, analyzes trade-offs, does analyzes design constraints, analyzes trade- detailed system design, and considers life offs, does detailed system and security design, cycle support The systems engineer traces and considers life cycle support The informa
all of the system requirements to the elements tion systems security engineer traces all of the until all are addressed The final detailed system security requirements to the elements design results in component and interface until all are addressed The final detailed specifications that provide sufficient informa- security design results in component and tion for acquisition when the system is
implemented
Implement System
The systems engineer moves the system from specifications to the tangible The main activities are acquisition, integration, configuration, testing, documentation, and training Components are tested and evaluated to ensure that they meet the specifications After successful testing, the individual components — hardware, software, and firmware — are integrated, properly configured, and tested as a system
interface specifications that provide sufficient information for acquisition when the system is implemented
Implement System Security
The information systems security engineer participates in a multidisciplinary examination
of all system issues and provides inputs to C&A process activities, such as verification that the system as implemented protects against the threats identified in the original threat assessment; tracking of information protection assurance mechanisms related to system implementation and testing practices; and providing inputs to system life cycle support plans, operational procedures, and
maintenance training materials
Assess Effectiveness Assess Information Protection Effectiveness
ensure that the system will meet the users’ focuses on the effectiveness of the information
protection — whether the system can provide
to the required quality standard in the
authentication and nonrepudiation for the neer examines how well the system meets information it is processing that is required for the needs of the mission mission success
The results of each activity are evaluated to The information systems security engineer
needs by performing the required functions
the confidentiality, integrity, availability, intended environment The systems engi
ISSE and Its Relationship to C&A Processes
The ISSE process provides input to the C&A process in the form of evidence and documentation Thus, the information systems security engineer has to consider the requirements of the DAA The Defense Information Technology Security Certification and Accreditation Process (DITSCAP) certifies that the information system meets the defined system security requirements and the system assurance
Trang 15requirements It is not a design process Details of DITSCAP are presented in Chapter 12 of this text The SE/ISSE process also benefits by receiving information back from the C&A process that might result in modifications to the SE/ISSE pro
cess activities Figure 11-13 illustrates the relationship of the SE/ISSE process to the C&A process
In summary, the outputs of the SE/ISSE process are the implementation of the sys
tem and the corresponding system documentation The outputs of the C&A process are Certification documentation, Certification recommendations, and an
Accreditation decision
Another means of specifying information system assurance requirements are through Common Criteria protection profiles Protection profiles, which are inde
pendent of implementation, comprise:
✦ Security-related functional requirements
Under the ISSE Assess Effectiveness
FeedbackEvidence &
there is a continuous risk assessment being performed
Figure 11-13: Relationship of the SE/ISSE process to the C&A process
(from IATF document, Release 3.1, September 2002)
Trang 16Many protection profiles are available on the IATF Web site at www.iatf.net/
protection_profiles/ Protection profiles that are provided include:
Principles of Defense in Depth
The strategy of Defense in Depth is aimed at protecting U.S federal and defense information systems and networks from the various types and classes of attacks
The technology focus areas of the Defense in Depth strategy are:
✦ Defending the network and infrastructure
✦ Defending the enclave boundary
✦ Defending the computing environment
✦ Defending the supporting infrastructures
The second item in this list refers to an enclave In DoD Directive 8500.1, “Information
Assurance (IA),” October 24, 2002, an enclave is defined as a “collection of computing environments connected by one or more internal networks under the control of a sin
gle authority and security policy, including personnel and physical security Enclaves always assume the highest mission assurance category and security classification of the Automated Information System (AIS) applications or outsourced IT-based pro
cesses they support, and derive their security needs from those systems They pro
vide standard IA capabilities such as boundary defense, incident detection and response, and key management, and also deliver common applications such as office automation and electronic mail Enclaves are analogous to general support systems
as defined in OMB A-130 Enclaves may be specific to an organization or a mission, and the computing environments may be organized by physical proximity or by func
tion independent of location Examples of enclaves include local area networks and the applications they host, backbone networks, and data processing centers.”
The Defense in Depth strategy promotes application of the following information assurance principles:
✦ Defense in multiple places — deployment of information protection mecha
nisms at multiple locations to protect against internal and external threats
✦ Layered defenses — deployment of multiple information protection and detec
tion mechanisms so that an adversary or threat will have to negotiate multiple barriers to gain access to critical information
Trang 17✦ Security robustness — based on the value of the information system component
to be protected and the anticipated threats, estimation of the robustness of each information assurance components Robustness is measured in terms of assurance and strength of the information assurance component
✦ Deploy KMI/PKI — deployment of robust key management infrastructures
(KMI) and public key infrastructures
✦ Deploy intrusion detection systems — deployment of intrusion detection
mechanisms to detect intrusions, evaluate information, examine results, and,
if necessary, to take action
Types and Classes of Attack
IATF document 3.1 lists the following types of attacks:
These attacks and their characteristics, taken from IATF document 3.1, September
2002, are given in Table 11-5
Classes of Attack
Table 11-5
Passive Passive attacks include traffic analysis, monitoring of unprotected
communications, decrypting weakly encrypted traffic, and capture of authentication information (such as passwords) Passive intercept of network operations can give adversaries indications and warnings of impending actions
Passive attacks can result in disclosure of information or data files to an attacker without the consent or knowledge of the user Examples include the disclosure
of personal information such as credit card numbers and medical files
Active Active attacks include attempts to circumvent or break protection features,
introduce malicious code, or steal or modify information These attacks may be mounted against a network backbone, exploit information in transit,
electronically penetrate an enclave, or attack an authorized remote user during
an attempt to connect to an enclave Active attacks can result in the disclosure
or dissemination of data files, denial of service, or modification of data
Trang 18Attack Description
Close-In Close-in attack consists of individuals attaining close physical proximity to
networks, systems, or facilities for the purpose of modifying, gathering, or denying access to information Close physical proximity is achieved through surreptitious entry, open access, or both
Insider Insider attacks can be malicious or nonmalicious Malicious insiders
intentionally eavesdrop, steal, or damage information; use information in a fraudulent manner; or deny access to other authorized users Nonmalicious attacks typically result from carelessness, lack of knowledge, or intentional circumvention of security for such reasons as “getting the job done.”
Distribution Distribution attacks focus on the malicious modification of hardware or
malicious code into a product, such as a back door to gain unauthorized access to information or a system function at a later date
software at the factory or during distribution These attacks can introduce
The enclaves in the U.S federal and defense computing environments can be cate
The Defense in Depth Strategy
The Defense in Depth strategy is built upon three critical elements: people, technol
ogy, and operations
People
To implement effective information assurance in an organization, there must be a high-level commitment from management to the process This commitment is mani
fested through the following items and activities:
✦ Development of information assurance policies and procedures
✦ Assignment of roles and responsibilities
Trang 19✦ Training of critical personnel
✦ Enforcement of personal accountability
✦ Commitment of resources
✦ Establishment of physical security controls
✦ Establishment of personnel security controls
✦ Penalties associated with unauthorized behavior
Figure 11-14: Relationships of the classes of attacks to computing environment
enclaves (from IATF document, Release 3.1, September 2002)
Local Computing Environment
Local Computing Environment
Local Computing Environment
PBX Facility
Classified Networks
USER
Private Networks
Telecommunications Service Providers (TSPs)
Remote Users
Supporting Infrastructures: • Detect & Respond• KMI/PKI
Insider
Enclave Boundaries Boundary Protection (Guard, Firewall, etc.) Remote Access Protection (Communications Servers, Encryption, etc.)
Passive Close-in Distribution Active Classes of Attacks
Via TSPs
A
Via TSPs Public Network
(Internet)
Public Telephone Network
A
A
A
P P
Internet Service Provider
Trang 20✦ System level information assurance architectures
✦ System level information assurance standards
✦ Information assurance principles
✦ Specification criteria for the required information assurance products
✦ Acquisition of reliable, third-party, validated products
✦ Configuration recommendations
✦ Risk assessment processes for the integrated systems
Operations
Operations emphasize the activities and items that are necessary to maintain an
organization’s effective security posture on a day-to-day basis These activities and
items include:
✦ A visible and up-to-date security policy
✦ Enforcement of the information security policy
✦ Certification and accreditation
✦ Information security posture management
✦ Key management services
✦ Readiness assessments
✦ Protection of the infrastructure
✦ Performing systems security assessments
✦ Monitoring and reacting to threats
✦ Attack sensing, warning, and response (ASW&R)
✦ Recovery and reconstitution
The Defense in Depth approach has become widely accepted and has been incorpo
rated into a number of federal and DoD policies and guidelines One example is the
DoD Global Information Grid (GIG) Information Assurance Policy and Implementation
Guidance (www.c3i.osd.mil/org/cio/doc/gigia061600.pdf) Figure 11-15 illustrates the
embodiment of the Defense in Depth strategy as shown in the GIG Policy and
Implementation Guidance
Trang 21GIG IA Policy and Implementation Guidance
Operations People
GIG Policy
Defend the Computing Environment
Defend the Enclave Boundary
Defend the Network
Supporting Infrastructure KMI/
PKI Detect &
Respond
DITSCAP Certification and Accreditation Process
Technology
Information Assurance Technical Framework
• Testing
Figure 11-15: Defense in Depth as applied in the GIG Information Assurance
Policy and Implementation Guidance (from IATF document, Release 3.1, September 2002)
The Approach to Implementing the Defense in Depth Strategy
From the previous discussion of the Defense in Depth strategy, it is clear that large investments of time and resources are required for an effective strategy implementation In order to maximize the productivity of the resources available and mini
mize the various costs associated with the implementation of the Defense in Depth strategy, the following guidelines are offered by the IATF document 3.1, Chapter 2:
✦ Make information assurance decisions based on risk analysis and keyed to the organization’s operational objectives
✦ Use a composite approach, based on balancing protection capability against cost, performance, operational impact, and changes to the operation itself considering both today’s and tomorrow’s operations and environments
Trang 22✦ Draw from all three facets of Defense in Depth — people, operations, and tech
nology Technical mitigations are of no value without trained people to use them and operational procedures to guide their application
✦ Establish a comprehensive program of education, training, practical experi
ence, and awareness Professionalization and certification licensing provide a validated and recognized expert cadre of system administrators
✦ Exploit available commercial off-the-shelf (COTS) products and rely on in
house development for those items not otherwise available
✦ Plan and follow a continuous migration approach to take advantage of evolv
ing information processing and network capabilities, both functional and security related, and ensure adaptability to changing organizational needs and operating environments
✦ Periodically assess the IA posture of the information infrastructure
Technology tools, such as automated scanners for networks, can assist in vulnerability assessments
✦ Take into account not only the actions of those with hostile intent, but also inadvertent or unwitting actions that may have ill effects and natural events that may affect the system
✦ Adhere to the principles of commonality, standardization, and procedures, to interoperability, and to policies
✦ Judiciously use emerging technologies, balancing enhanced capability with increased risk
✦ Employ multiple means of threat mitigation, overlapping protection approaches to counter anticipated events so that loss or failure of a single barrier does not compromise the overall information infrastructure
✦ Implement and hold to a robust IA posture, that is, one that can cope with the unexpected
✦ Ensure that only trustworthy personnel have physical access to the system
Methods of providing such assurance include appropriate background investigations, security clearances, credentials, and badges
✦ Monitor vulnerability listings and implementation of fixes, ensuring that secu
rity mechanisms are interoperable, keeping constant watch over the security situation and mechanisms, properly employing and upgrading tools and techniques, and dealing rapidly and effectively with issues
✦ Use established procedures to report incident information provided by intrusion detection mechanisms to authorities and specialized analysis and response centers
Trang 23Sample U.S Government User Environments
The target systems of a Defense in Depth strategy can be put in perspective byexamining two U.S government computing environments — the Department ofEnergy (DoE) and Department of Defense information systems
The DoE interconnects its laboratories and other facilities through wide area works (WANs), including the Energy Science Network (ESN) ESN supports classi-fied and unclassified DoE networking for research and mission-critical applications.The DoE computing environment is shown in Figure 11-16
net-The DoD Defense Information Infrastructure (DII) provides networking and tion services to more than 2 million primary users and 2 million extension users
informa-The DII enclaves typically comprise more than 20,000 local networks and 300,000secure telephone users The DII also includes worldwide networks such as the JointWorldwide Intelligence Communications System (JWICS), the Secret InternetProtocol Router Network (SIPRNet), and the Non-Secure Internet Protocol RouterNetwork (NIPRNet) An example DII site is shown in Figure 11-17
Figure 11-16: The DoE computing environment (from IATF document, Release 3.1,
Via TSPs
USER Via
TSPs
Via TSPs
Internet Service Provider
Public Network (Internet)
Telecommunications Service Providers (TSP)
Public Telephone Network
Classified Site (Red Network)
Classified Enclave
SBU/No Foreign (Yellow Network)
Site DMZ
Public Site (Green Network)
VPN Tunnel
Private
Department of Energy
ESNet (DoE WAN)
Trang 24Figure 11-17: A typical DII site (from IATF document, Release 3.1, September 2002).
Implementing Information Assurance in the System Life Cycle
The documents providing the basis for material in this section are Generally Accepted Principles and Practices for Securing Information Technology Systems, SP 800-14, National Institute of Standards and Technology, September 1996; Engineering Principles for Information Technology Security (A Baseline for Achieving Security), SP 800-27, National Institute of Standards and Technology, June 2001; and Security Considerations in the Information System Development Life Cycle, SP 800-64, National
Institute of Standards and Technology, September–October 2003 In some tions, the System Life Cycle is also referred to as the System Development LifeCycle (SDLC)
publica-Document SP 800-14 defines eight system security principles and 14 practices
Publication 800-27 develops another set of 33 engineering principles for informationtechnology security (EP-ITS) that provide a system-level perspective of informationsystem security These 33 principles incorporate the concepts developed in theeight principles and 14 practices detailed in SP 800-14 With this foundation, the fivesystem life cycle phases are then defined and each of the 33 EP-ITS principles are
Boundary Protection (Guard, Firewall, etc.)
Via TSPs
Via TSPs
Via TSPs
Enclave Boundaries
Top Secret Enclave
Secret Enclave
Unclassified (Sensitive) Enclave
Public Enclave, DMZ
Networks & Infrastructures
Coalition Enclave Internet GatewayDoD NIPRNET to
Via TSPs
Internet Service Provider
Public Network (Internet)
Public Telephone Network PBX
Remote Access Protection (Communications Servers, Encryption, etc.)
Trang 25for Securing Information Technology
NIST Special Publication 800-14 used the Organization for Economic Cooperation and Development (OECD) guidelines (www.oecd.org) for the security of information systems as a foundation for its eight information security principles In addition, SP 800-14 provides 14 common IT security practices that are in general use today
These practices are specific applications of the eight information security princi
ples These principles and practices are also presented in NIST SP 800-14 in a checklist form that can be used by federal agencies for self-evaluation
The NIST SP 800-14 Generally Accepted Principles and Practices for Securing Information Technology Systems
The eight principles are:
1 Computer security supports the mission of the organization
2 Computer security is an integral element of sound management
3 Computer security should be cost-effective
6 Computer security requires a comprehensive and integrated approach
7 Computer security should be periodically reassessed
8 Computer security is constrained by societal factors
Common IT Security Practices
The 14 security practices listed in SP 800-14 are:
1 Policy — Have in place the following three types of policies:
• A Program policy to create and define a computer security program
• An Issue Specific policy to address specific areas and issues
• A System Specific policy to focus on decisions made by management
These policies are sometimes referred to as plans, procedures, or directives
Trang 262 Program Management — Management of computer security at appropriate mul
tiple levels with centralized enforcement and oversight
3 Risk Management — The process of assessing risk, taking steps to reduce risk
to an acceptable level, and maintaining that level of risk
4 Life Cycle Planning — Managing security by planning throughout the system life
cycle A security plan should be developed prior to initiation of the life cycle activities so that it can be followed during the life cycle process The IT system life cycle as defined in SP 800-14 is comprised of the following five phases:
• Initiation
• Development/Acquisition
• Implementation
• Operation/Maintenance
6 Preparing for Contingencies and Disasters — Planning to ensure that the organi
zation can continue operations in the event of disasters and disruptions
7 Computer Security Incident Handling — Reacting quickly and effectively in
response to malicious code and internal or external unauthorized intrusions
8 Awareness and Training — Providing computer security awareness training to
all personnel interacting with the IT systems
9 Security Considerations in Computer Support and Operations — Applying infor
mation system security principles to the tasks performed by system adminis
trators and to external system support activities
10 Physical and Environmental Security — Implementing environmental and physi
cal security controls
11 Identification and Authentication — Implementing the access control measures
of identification and authentication to ensure that unauthorized personnel do not have privileges to access the resources of an IT system
12 Logical Access Control — Technical means of enforcing the information system
security policy to limit access to IT resources to authorized personnel
Trang 2713 Audit Trails — Recording system activity and providing the capability to
accomplish individual accountability, detection of intrusions, reconstruction
of past events, and identification of problems
14 Cryptography — Providing security services, including protecting the confiden
tiality and integrity of information and implementing electronic signatures
NIST 800-27 Engineering Principles for Information Technology Security
The EP-ITS system-level information security principles are:
1 Establish a sound security policy as the “foundation” for design
2 Treat security as an integral part of the overall system design
3 Clearly delineate the physical and logical security boundaries governed by
associated security policies
4 Reduce risk to an acceptable level
5 Assume that external systems are insecure
6 Identify potential trade-offs between reducing risk and increased costs and
decrease in other aspects of operational effectiveness
7 Implement layered security (ensure no single point of vulnerability)
9 Strive for simplicity
10 Design and operate an IT system to limit vulnerability and to be resilient in
response
11 Minimize the system elements to be trusted
12 Implement security through a combination of measures distributed physically
and logically
13 Provide assurance that the system is, and continues to be, resilient in the face
of unexpected threats
14 Limit or contain vulnerabilities
16 Isolate public access systems from mission-critical resources (for example,
data, processes)
Trang 2819 Use common language in developing security requirements
20 Design and implement audit mechanisms to detect unauthorized use and to
support incident investigations
21 Design security to allow for regular adoption of new technology, including a
secure and logical technology upgrade process
23 Use unique identities to ensure accountability
24 Implement least privilege
25 Do not implement unnecessary security mechanisms
26 Protect information while it is being processed, in transit, and in storage
27 Strive for operational ease of use
28 Develop and exercise contingency or disaster recovery procedures to ensure
appropriate availability
29 Consider custom products to achieve adequate security
30 Ensure proper security in the shutdown or disposal of a system
31 Protect against all likely classes of attacks
32 Identify and prevent common errors and vulnerabilities
33 Ensure that developers are trained in how to develop secure software
The System Life Cycle Phases
NIST SP 800-14 defines the system life cycle phases as follows:
✦ Initiation — The need for the system and its purpose are documented A sensi
tivity assessment is conducted as part of this phase A sensitivity assessment evaluates the sensitivity of the IT system and the information to be processed
✦ Development/Acquisition — Comprises the system acquisition and develop
ment cycles In this phase, the system is designed, developed, programmed, and acquired
✦ Implementation — Installation, testing, security testing, and accreditation are
conducted
Trang 29✦ Operation/Maintenance — The system performs its designed functions This
phase includes security operations, modification/addition of hardware and/or software, administration, operational assurance, monitoring, and audits
✦ Disposal — Disposition of system components and products, such as hard
ware, software, and information; disk sanitization; archiving files; and moving equipment
Application of EP-ITS Principles
to the Phases of the System Life Cycle
The EP-ITS principles can be applied during each phase of the system life cycle
Some principles are critical to certain phases, whereas others can be considered optional or not necessary Table 11-6, taken from NIST SP 800-27, indicates which principles should be used for a specified life cycle phase In Table 11-6, a single check, ✔, indicates that the principle can be applied to a particular life cycle phase, and two checks, ✔✔, indicate that the principle must be applied to successfully
complete the life cycle phase
Table 11-6
Application of EP-ITS Principles to System Life Cycle Phases
Life Cycle Applicability
Trang 30Principle Initiation Deve/Acquis Implement Oper/Maint Disposal
Trang 31and Evaluation Other Planning Components
Inspection and Acceptance Security Control Integ
Trang 32A detailed description of these steps is provided in NIST SP 800-64 as follows:
An organization will either use the general SDLC described in this document
or will have developed a tailored SDLC that meets its specific needs In either case, NIST recommends that organizations incorporate the associated IT secu
rity steps of this general SDLC into their development process:
✦ Initiation Phase:
• Security Categorization — defines three levels (low, moderate, or high) of
potential impact on organizations or individuals should there be a breach of security (a loss of confidentiality, integrity, or availability)
Security categorization standards assist organizations in making the appropriate selection of security controls for their information systems
• Preliminary Risk Assessment — results in an initial description of the
basic security needs of the system A preliminary risk assessment should define the threat environment in which the system will operate
✦ Acquisition/Development Phase:
• Risk Assessment — analysis that identifies the protection requirements
for the system through a formal risk assessment process This analysis builds on the initial risk assessment performed during the Initiation phase, but will be more in-depth and specific
• Security Functional Requirements Analysis — analysis of requirements that
may include the following components: (1) system security environment (that is, enterprise information security policy and enterprise security architecture) and (2) security functional requirements
• Assurance Requirements Analysis Security — analysis of requirements that
address the developmental activities required and assurance evidence needed to produce the desired level of confidence that the information security will work correctly and effectively The analysis, based on legal and functional security requirements, will be used as the basis for deter
mining how much and what kinds of assurance are required
• Cost Considerations and Reporting — determines how much of the devel
opment cost can be attributed to information security over the life cycle
of the system These costs include hardware, software, personnel, and training
• Security Planning — ensures that agreed-upon security controls, planned
or in place, are fully documented The security plan also provides a com
plete characterization or description of the information system as well
as attachments or references to key documents supporting the agency’s information security program (e.g., configuration management plan, con
tingency plan, incident response plan, security awareness and training plan, rules of behavior, risk assessment, security test and evaluation results, system interconnection agreements, security authorizations/
accreditations, and plan of action and milestones)
Trang 33• Security Control Development — ensures that security controls described in
the respective security plans are designed, developed, and implemented For information systems currently in operation, the security plans for those systems may call for the development of additional security con
trols to supplement the controls already in place or the modification of selected controls that are deemed to be less than effective
• Developmental Security Test and Evaluation — ensures that security con
trols developed for a new information system are working properly and are effective Some types of security controls (primarily those controls
of a non-technical nature) cannot be tested and evaluated until the information system is deployed — these controls are typically management and operational controls
• Other Planning Components — ensures that all necessary components of
the development process are considered when incorporating security into the life cycle These components include selection of the appropri
ate contract type, participation by all necessary functional groups within
an organization, participation by the certifier and accreditor, and devel
opment and execution of necessary contracting plans and processes
✦ Implementation Phase:
• Inspection and Acceptance — ensures that the organization validates and
verifies that the functionality described in the specification is included
in the deliverables
• Security Control Integration — ensures that security controls are inte
grated at the operational site where the information system is to be deployed for operation Security control settings and switches are enabled in accordance with vendor instructions and available security implementation guidance
• Security Certification — ensures that the controls are effectively imple
mented through established verification techniques and procedures and gives organization officials confidence that the appropriate safeguards and countermeasures are in place to protect the organization’s information system Security certification also uncovers and describes the known vulnerabilities in the information system
• Security Accreditation — provides the necessary security authorization of
an information system to process, store, or transmit information that is required This authorization is granted by a senior organization official and is based on the verified effectiveness of security controls to some agreed-upon level of assurance and an identified residual risk to agency assets or operations
Trang 34✦ Operations/Maintenance Phase:
• Configuration Management and Control — ensures adequate consideration
of the potential security impacts due to specific changes to an informa
tion system or its surrounding environment Configuration management and configuration control procedures are critical to establishing an ini
tial baseline of hardware, software, and firmware components for the information system and subsequently controlling and maintaining an accurate inventory of any changes to the system
• Continuous Monitoring — ensures that controls continue to be effective in
their application through periodic testing and evaluation Security con
trol monitoring (that is, verifying the continued effectiveness of those controls over time) and reporting the security status of the information system to appropriate agency officials is an essential activity of a com
prehensive information security program
✦ Disposition Phase:
• Information Preservation — ensures that information is retained, as neces
sary, to conform to current legal requirements and to accommodate future technology changes that may render the retrieval method obsolete
• Media Sanitization — ensures that data is deleted, erased, and written
over as necessary
• Hardware and Software Disposal — ensures that hardware and software is
disposed of as directed by the information system security officer After discussing these phases and the information security steps in detail, the guide provides specifications, tasks, and clauses that can be used in an RFP to acquire information security features, procedures, and assurances
The ISSEP candidate should also understand the relationship between the SDLC phases and the acquisition process for the corresponding information system This relationship is illustrated in Table 11-8, also taken from NIST SP 800-64
Table 11-8
Relationship between Information Systems Acquisition Cycle Phases and the SDLC
Acquisition Cycle Phases
Mission and Acquisition Acquisition Contract Disposal and Business Planning Performance Contract Close-Out Planning
Initiation Acquisition/ Implementation Operation/ Disposition
Development Maintenance
SDLC Phases
Trang 35NIST SP 800-64 also defines the following acquisition-related terms:
✦ Acquisition includes all stages of the process of acquiring property or ser
vices, beginning with the process for determining the need for the property or services and ending with contract completion and closeout
✦ The acquisition initiator is the key person who represents the program office
in formulating information technology requirements and managing presolicitation activities
✦ The acquisition technical evaluation is a component of the selection process
and is defined as the examination of proposals to determine technical acceptability and merit
An additional, valuable tool in the acquisition process is the spiral model of the acquisition management process This approach is known as an evolutionary acquisi
tion strategy This model depicts the acquisition management process as a set of phases and decision points in a circular representation The model illustrates the concept that a mission need is defined and translated into a solution that undergoes
a continuous circle of improvement and evolution until it is no longer required
NIST SP 800-64 also lists the key personnel associated with system acquisition and development as follows:
✦ Chief information officer (CIO) — The CIO is responsible for the organization’s
information system planning, budgeting, investment, performance and acquisition As such, the CIO provides advice and assistance to senior organization personnel in acquiring the most efficient and effective information system to fit the organization’s enterprise architecture
✦ Contracting officer — The contracting officer is the person who has the author
ity to enter into, administer, or terminate contracts and make related determinations and findings
✦ Contracting officer’s technical representative (COTR) — The COTR is a qualified
employee appointed by the contracting officer to act as his or her technical representative in managing the technical aspects of a particular contract
✦ Information Technology Investment Board (or equivalent) — The Information
Technology (IT) Investment Board, or its equivalent, is responsible for managing the capital planning and investment control process defined by the Clinger-Cohen Act of 1996 (Section 5)
✦ Information security program manager — The information security program
manager is responsible for developing enterprise standards for information security This individual plays a leading role in introducing an appropriate, structured methodology to help identify, evaluate, and minimize information security risks to the organization Information security program managers coordinate and perform system risk analyses, analyze risk mitigation alterna
Trang 36tives, and build the business case for the acquisition of appropriate security solutions that help ensure mission accomplishment in the face of real-world threats They also support senior management in ensuring that security management activities are conducted as required to meet the organization’s needs
✦ Information system security officer — The information system security officer is
responsible for ensuring the security of an information system throughout its life cycle
✦ Program manager (owner of data)/acquisition initiator/program official — This
person represents programmatic interests during the acquisition process The program manager, who has been involved in strategic planning initiatives of the acquisition, plays an essential role in security and is, ideally, intimately aware of functional system requirements
✦ Privacy officer — The privacy officer is responsible for ensuring that the ser
vices or system being procured meet existing privacy policies regarding pro
tection, dissemination (information sharing and exchange), and information disclosure
✦ Legal advisor/contract attorney — This individual is responsible for advising
the team on legal issues during the acquisition process
ISSEP candidates who are interested in additional information contained in NIST SP 800-64 can obtain the document from the NIST Web site: http://csrc.nist.gov/
publications/nistpubs/
Risk Management and the System Development Life Cycle
The risk management process minimizes the impact of threats realized and pro
vides a foundation for effective management decision making Thus, it is very important that risk management be a part of the system development life cycle
As defined in NIST SP 800-30, risk management is comprised of three processes:
✦ Risk assessment
✦ Risk mitigation
✦ Evaluation and assessment
These processes should be performed during each of the five phases of the SDLC
Table 11-9, taken from NIST SP 800-30, details the risk management activities that should be performed for each SDLC phase
Trang 37Table 11-9
Risk Management in the SDLC Cycle
Phase 1 — Initiation The need for an IT system
is expressed and the purpose and scope of the
or Acquisition
The IT system is designed, purchased, programmed, developed, or otherwise constructed
The risks identified during this phase can be used to support the security analyses
of the IT system that may lead
to architecture and design tradeoffs during system development
Phase 3 — Implementation The system security features
should be configured, enabled, tested, and verified
The risk management process supports the assessment of the system implementation against its requirements and within its modeled operational environment Decisions regarding risks identified must be made prior to system operation Phase 4 — Operation
or Maintenance
The system performs its functions Typically the system is being modified
on an ongoing basis through the addition of hardward and software and
by changes to organizational processes, policies, and procedures
Risk management activities are performed for periodic system reauthorization (or reaccreditation) or whenever major changes are made to an
IT system in its operational, production environment (e.g., new system interfaces)
Phase 5 — Disposal Risk management activities
disposition of information, hardware, and software components that will be Activities may include disposed of or replaced to moving, archiving, discarding, ensure that the hardware and
or destroying information software are properly disposed and sanitizing the hardware
and software priately handled, and that system
secure and systematic manner
This phase may involved the
are performed for system
of, that residual data is
appro-migration is conducted in a
Trang 38Roles of Key Personnel in the Risk Management Process
To be effective, risk management must be supported by management and informa
tion system security practitioners Some of the key personnel that should actively participate in the risk management activities are:
✦ Senior management — Provide the required resources and meet responsibili
ties under the principle of due care
✦ Chief information officer (CIO) — Considers risk management in IT planning,
budgeting, and meeting system performance requirements
✦ System and information owners — Ensure that controls and services are
implemented to address information system confidentiality, integrity, and availability
✦ Business and functional managers — Make trade-off decisions regarding busi
ness operations and IT procurement that affect information security
✦ Information system security officer (ISSO) — Participates in applying method
ologies to identify, evaluate, and reduce risks to the mission-critical IT systems
✦ IT security practitioners — Ensure the correct implementation of IT system
information system security requirements
The Risk Assessment Process
As defined in NIST SP 800-30, “Risk is a function of the likelihood of a given source’s exercising a particular potential vulnerability, and the resulting impact of that adverse event on the organization.” Risk assessment comprises the following steps:
Trang 398 Control recommendations
9 Results documentation
Each of these steps will be summarized in the following sections
System Characterization
This step characterizes and defines the scope of the risk assessment process
During this step, information about the system has to be gathered This information includes:
✦ Criticality of the system and data
✦ System and data sensitivity
✦ Functional system requirements
✦ System security policies
✦ System security architecture
✦ Network topology
✦ Information storage protection
✦ System information flow
✦ Technical security controls
✦ Physical security environment
✦ Environmental security
This information can be gathered using questionnaires, on-site interviews, review of documents, and automated scanning tools The outputs from this step are:
✦ Characterization of the assessed IT system
✦ Comprehension of the IT system environment
✦ Delineation of the system boundary
Trang 40Threat Identification
This step identifies potential sources and compiles a statement of the
threat-sources that relate to the IT system under evaluation A threat is defined in NIST SP
800-30 as “the potential for a threat-source to exercise (accidentally trigger or inten
tionally exploit) a specific vulnerability A threat-source is defined in the same docu
ment as “either (1) intent and method targeted at the intentional exploitation of a vulnerability or (2) a situation and method that may accidentally trigger a vulnera
bility.” Common threat-sources include natural threats such as storms and floods, human threats such as malicious attacks and unintentional acts, and environmental threats such as power failure and liquid leakage A vulnerability is defined as “a flaw
or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach or a violation of the system’s security policy.”
Sources of threat information include the Federal Computer Incident Response Center (FedCIRC), intelligence agencies, mass media, and Web-based resources
The output from this step is a statement that provides a list of threat-sources that could exploit the system’s vulnerabilities
Vulnerability Identification
This activity results in a list of system vulnerabilities that might be exploited by potential threat-sources Vulnerabilities can be identified through vulnerability anal
yses, including information from previous information assessments; audit reports;
the NIST vulnerability database (http://icat.nist.gov/icat.cfm); FedCIRC and DoE security bulletins; vendor data; commercial computer incident response teams; and system software security analyses Testing of the IT system will also yield impor
tant results This testing can be accomplished using penetration-testing techniques, automated vulnerability scanning tools, and security test and evaluation (ST&E) procedures
This phase also involves determining whether the security requirements identified during system characterization are being met Usually, the security requirements are listed in a table with a corresponding statement about how the requirement is
or is not being met The checklist addresses management, operational, and techni
cal information system security areas The result of this effort is a security require
ments checklist Some useful references for this activity are the Computer Security
Act of 1987, the Privacy Act of 1974, the organization’s security policies, industry
best practices, and NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems
The output from this step is a list of system vulnerabilities/observations that could
be exploited by the potential threat-sources
Control Analysis
The control analysis step analyzes the controls that are in place or in the planning stage to minimize or eliminate the probability that a threat will exploit vulnerability
in the system