Open Group - Vulnerability Management (OG-VM)...

23
Open Group - Vulnerability Management (OG-VM) Initiative an integrated approach to strengthening continuity of mission critical system services and protecting against catastrophic losses by assessing and mitigating system dependability, security and safety vulnerabilities gem

Transcript of Open Group - Vulnerability Management (OG-VM)...

Page 1: Open Group - Vulnerability Management (OG-VM) Initiativearchive.opengroup.org/public/member/proceedings/q403/evm_robinson.pdf · Open Group - Vulnerability Management (OG-VM) Initiative

Open Group - Vulnerability Management (OG-VM) Initiative

an integrated approach to strengthening continuity of mission critical system services and protecting against catastrophic losses

byassessing and mitigating system dependability, security and

safety vulnerabilities

gem

Page 2: Open Group - Vulnerability Management (OG-VM) Initiativearchive.opengroup.org/public/member/proceedings/q403/evm_robinson.pdf · Open Group - Vulnerability Management (OG-VM) Initiative

Background Notes:

• Interest generated by earlier, proprietary, S/TDC presentations on “Enterprise Vulnerability Management” led to current Open Group interest in developing an Open, non proprietary, approach to the problem that will facilitate cooperative government, industry and academia participation in addressing critical System Vulnerability Management issues

• While we have tentatively called this an Open Group Vulnerability Management (OG-VM) Initiative, suggestions for other names are welcome - e.g. Open System Vulnerability Management; Open Architecture Vulnerability Management, etc. Could be characterized as a subset of System Risk Management

Page 3: Open Group - Vulnerability Management (OG-VM) Initiativearchive.opengroup.org/public/member/proceedings/q403/evm_robinson.pdf · Open Group - Vulnerability Management (OG-VM) Initiative

The Weakest Link

• As Government and Industrial Systems evolve to remain competitive, changes focused on improving productivity are often accompanied by substantial, hidden, increases in system dependability, security and safety vulnerabilities

• Vulnerabilities are introduced both within organizations and in the organization’s increasing dependence on chains of supporting, distributed, application and communication services

Evolving Systems Need Open, Holistic, End to End, Vulnerability Management!

Page 4: Open Group - Vulnerability Management (OG-VM) Initiativearchive.opengroup.org/public/member/proceedings/q403/evm_robinson.pdf · Open Group - Vulnerability Management (OG-VM) Initiative

Need for Both Vulnerability Management and Adaptivity in Each Link of the End-to-End Chain Supporting Mission Critical System Services

Remot e Cust omers and Support

Personnel

Internet/Intranets

O M I O M I O M I O M I

ActuatorActuatorActuator

O M I

Mission Applicat ions

O M I O M I O M I O M I

O M I O M I O M I O M I

ActuatorActuatorActuator

O M I

Mission Applicat ions

O M I O M I O M I O M I

O M I O M I O M I O M I

ActuatorActuatorActuator

O M I

Mission Applicat ions

O M I O M I O M I O M I

O M I

O M I O M I O M I O M I

ActuatorActuatorActuator

O M I

Mission Applicat ions

O M I O M I O M I O M I

O M I

O M IO M I

• Global assignment of critical tasks to best available resources

• Global designation of user, application and protocol priorities

• Prioritization of critical traffic on networks • Global visibility and control over specification and

measurement of both required end to end QoS and QoS required from each critical site and network link

• Capability of using redundant links to enhance end to end performance, availability and survivability

• Prioritization of users and applications within sites• Site resource management and control based on specification and monitoring of required QoS

Page 5: Open Group - Vulnerability Management (OG-VM) Initiativearchive.opengroup.org/public/member/proceedings/q403/evm_robinson.pdf · Open Group - Vulnerability Management (OG-VM) Initiative

Vulnerability Management Solutions Are Likely to Require Extensive Redundancy in Both Computing and Communications Services Links

Page 6: Open Group - Vulnerability Management (OG-VM) Initiativearchive.opengroup.org/public/member/proceedings/q403/evm_robinson.pdf · Open Group - Vulnerability Management (OG-VM) Initiative

Need to Contend With Multiple Applications With Varying Security Requirements and Current System Benefit/Value, Competing for System

Hardware, Software and Human Resources

O M I O M I O M I O M I

ActuatorActuatorActuator

O M I

Mission Applicat ions

O M I O M I O M I O M I

Safety

Dependability

Safety

SystemVulnerability Management

Interdependent elements of End-to-End System Vulnerability Management!

ProcessTechnology

People

Security

Page 7: Open Group - Vulnerability Management (OG-VM) Initiativearchive.opengroup.org/public/member/proceedings/q403/evm_robinson.pdf · Open Group - Vulnerability Management (OG-VM) Initiative

Supporting Wide Area System Services

YourInfrastructure

TradingPartners

Delivery ofProducts Services

CommerceTransactions

InternetApplications

Business ProcessesOutsourcing

End-to-end services are only as strong as the weakest link in the chain!

Typical Linked Mission Critical System Services

Page 8: Open Group - Vulnerability Management (OG-VM) Initiativearchive.opengroup.org/public/member/proceedings/q403/evm_robinson.pdf · Open Group - Vulnerability Management (OG-VM) Initiative

New System

Conventional System Upgrade Processes Often Do Not Address Important Vulnerability Management Issues

System Requirements

System Architecture &

Design Methodologies

System Design & Development

Upgraded System Verif icat ion and Validat ion, Transit ioning to System

Operat ions & Maintenance

System Pre-Deployment

Testing

Operat ions & Maintenance of Legacy System During Development of System Upgrades

Systems Engineering

Time Phased Transit ion to

Upgraded System

Upgrade Requirements Driven by Evolving Organizat ion Needs and Legacy System

Experience

Typical upgrades focus on increasing profits and productivity by increasing demands on:• Web Enabling• Collaboration• Distributed Commerce Transactions• Outsourcing• Usually, without adequately addressing critical vulnerability management issues!

Page 9: Open Group - Vulnerability Management (OG-VM) Initiativearchive.opengroup.org/public/member/proceedings/q403/evm_robinson.pdf · Open Group - Vulnerability Management (OG-VM) Initiative

Additional Processes Enable System Vulnerability Management

System Requirements

System Assessment

Stress Test ing

Operational Error and Failure Data

System Architecture &

Design Methodologies

System Design & Development

System Operat ions & Maintenance

System Pre-Deployment

Testing

Dependability,Security &

Safety Growth Modeling

Dependability, Security & Safety

Stresses & Stress Ef fects

Dependability, Security & Safety

Growth Data Analyses

Addit ional Tasks

Systems Engineering

Convent ional Tasks

System Vulnerability Management requires additional processes focused on assessing and mitigating the combined effects of system dependability, security, and safety stresses

Page 10: Open Group - Vulnerability Management (OG-VM) Initiativearchive.opengroup.org/public/member/proceedings/q403/evm_robinson.pdf · Open Group - Vulnerability Management (OG-VM) Initiative

Feedback Enables Detection and Correction of System Vulnerability Management Deficiencies

System Requirements

System Assessment

Stress Test ing

Operational Error and Failure Data

System Architecture &

Design Methodologies

System Design & Development

System Operat ions & Maintenance

System Pre-Deployment

Testing

Dependability,Security &

Safety Growth Modeling

Dependability, Security & Safety

Stresses & Stress Ef fects

Dependability, Security & Safety

Growth Data Analyses

Addit ional Tasks

Systems Engineering

Convent ional Tasks

Feedback from additional processes enables assessment and mitigation of system vulnerability deficiencies

Page 11: Open Group - Vulnerability Management (OG-VM) Initiativearchive.opengroup.org/public/member/proceedings/q403/evm_robinson.pdf · Open Group - Vulnerability Management (OG-VM) Initiative

Feedback Also Enables Improvements in System Architecture and Design Methodologies

System Requirements

System Assessment

Stress Test ing

Operational Error and Failure Data

System Architecture &

Design Methodologies

System Design & Development

System Operat ions & Maintenance

System Pre-Deployment

Testing

Dependability,Security &

Safety Growth Modeling

Dependability, Security & Safety

Stresses & Stress Ef fects

Dependability, Security & Safety

Growth Data Analyses

Addit ional Tasks

Systems Engineering

Convent ional Tasks

Feedback from additional processes also enables improvements in fundamental system architecture and design methodologies

Page 12: Open Group - Vulnerability Management (OG-VM) Initiativearchive.opengroup.org/public/member/proceedings/q403/evm_robinson.pdf · Open Group - Vulnerability Management (OG-VM) Initiative

Feedback Also Enables Detection and Correction of System Requirements Deficiencies

System Requirements

System Assessment

Stress Test ing

Operational Error and Failure Data

System Architecture &

Design Methodologies

System Design & Development

System Operat ions & Maintenance

System Pre-Deployment

Testing

Dependability,Security &

Safety Growth Modeling

Dependability, Security & Safety

Stresses & Stress Ef fects

Dependability, Security & Safety

Growth Data Analyses

Addit ional Tasks

Systems Engineering

Convent ional Tasks

Feedback from additional processes also enables detection and correction of deficiencies in system vulnerability management requirements

Page 13: Open Group - Vulnerability Management (OG-VM) Initiativearchive.opengroup.org/public/member/proceedings/q403/evm_robinson.pdf · Open Group - Vulnerability Management (OG-VM) Initiative

Evolving Government Standards Support The Open Group’s Vulnerability Management Framework

System Requirements

System Assessment

Stress Test ing

Operational Error and Failure Data

System Architecture &

Design Methodologies

System Design & Development

System Operat ions & Maintenance

System Pre-Deployment

Testing

Dependability,Security &

Safety Growth Modeling

Dependability, Security & Safety

Stresses & Stress Ef fects

Dependability, Security & Safety

Growth Data Analyses

Addit ional Tasks

Systems Engineering

Evolving Government Certification & Accreditation Processes Support the Development of

Authoritative Organization Dependability, Security and Safety Vulnerability Management Processes

Convent ional Tasks

Government Dependability Certification & Accreditation Processes

Government Safety Certification & Accreditation Processes

Government Security Certification & Accreditation Processes

Page 14: Open Group - Vulnerability Management (OG-VM) Initiativearchive.opengroup.org/public/member/proceedings/q403/evm_robinson.pdf · Open Group - Vulnerability Management (OG-VM) Initiative

• Initial risk of losses due to events that defeat dependability, security or safety defenses, plus• Second risk of additional losses due to litigations claiming that Organization management failed to provide adequate system vulnerability defenses• Lessons learned in the development of system safety cases can be extended to the development of vulnerability management cases that provide the foundation for protecting management against litigation liabilities

The best legal defense is proof that Management has implemented Vulnerability Management Best Practices!

Profit

Loss

Event risks likely to cause initial losses

Litigation risks have the potential for greatly increasing overall Organization losses

Must Face Two Levels of Organization Risks

Page 15: Open Group - Vulnerability Management (OG-VM) Initiativearchive.opengroup.org/public/member/proceedings/q403/evm_robinson.pdf · Open Group - Vulnerability Management (OG-VM) Initiative

Developing Open Group Vulnerability Management Cases

Safety Case: “A documented body of evidence that provides a demonstrable and valid argument that a system is adequately safe for a given application and environment over its lifetime.” (Adelard - Bloomfield)

• Case approach evolved to modify costly and complex safety processes initially required by the nuclear industry

• Extended by The Open Group to dependability, security and safety to support overall vulnerability management of Organization mission critical system services

Page 16: Open Group - Vulnerability Management (OG-VM) Initiativearchive.opengroup.org/public/member/proceedings/q403/evm_robinson.pdf · Open Group - Vulnerability Management (OG-VM) Initiative

Elements of Safety Case Methodology

Provides mechanisms for participation by major system stakeholders (e.g. system/subsystem developers, end

users, procuring and certification authorities).

Evolves from initial estimates of system hazards and hazard

handling mechanisms through both pre-

deployment and post deployment system

validation. Includes Safety Case as an integral part of

system life cycle processes.

Top level system safety case, with subsidiary safety cases for subsystems and traceability between subsystem and system levels. Safety case links system

Safety case links system design, development, operations and maintenance documentation into a unified whole,

supporting system safety claims.

Page 17: Open Group - Vulnerability Management (OG-VM) Initiativearchive.opengroup.org/public/member/proceedings/q403/evm_robinson.pdf · Open Group - Vulnerability Management (OG-VM) Initiative

Vulnerability Management Cases Supported by System Assessment and Mitigation Processes

Define Scope/Identify Assets

Government Dependability Certification & Accreditation Processes

Government Safety Certification & Accreditation Processes

Government Security Certification & Accreditation Processes

Tools for Customization and Documentation of Organization Vulnerability Management Processes

Vulnerability Management Case Database

Define Vulnerability Management Requirements

Evolving Government Dependability, Security, and Safety Processes Support the Development of Authoritative System Vulnerability Management Cases

Initial steps involve adapting government Certification and Accreditation guidelines to System constraints

Page 18: Open Group - Vulnerability Management (OG-VM) Initiativearchive.opengroup.org/public/member/proceedings/q403/evm_robinson.pdf · Open Group - Vulnerability Management (OG-VM) Initiative

To Certify and Accredit Each Link in the End-to-End Chain Supporting Mission Critical System Services, Each Link’s Boundaries Have to be Defined

Remot e Cust omers, Mobile Support

Personnel, Cyber At t acks

Internet/Intranets

O M I O M I O M I O M I

ActuatorActuatorActuator

O M I

Mission Applicat ions

O M I O M I O M I O M I

O M I O M I O M I O M I

ActuatorActuatorActuator

O M I

Mission Applicat ions

O M I O M I O M I O M I

O M I O M I O M I O M I

ActuatorActuatorActuator

O M I

Mission Applicat ions

O M I O M I O M I O M I

O M I

O M I O M I O M I O M I

ActuatorActuatorActuator

O M I

Mission Applicat ions

O M I O M I O M I O M I

O M I

O M IO M I

• For example, boundaries of computing Enclaves

•Boundaries of Enclave to Enclave Communications

Vulnerability assessments and certifications need to also address security, safety and dependability issues associated with Mobile Support Personnel and their interactions with wireless networks

• Personnel supporting a given Enclave are part of its assessment, but may also support other Enclaves and/or move physically between Enclaves • Personnel within Enclaves may also be sources of Cyber attacks

Page 19: Open Group - Vulnerability Management (OG-VM) Initiativearchive.opengroup.org/public/member/proceedings/q403/evm_robinson.pdf · Open Group - Vulnerability Management (OG-VM) Initiative

Assessment Process Then Identifies Current System Vulnerabilities

Define Scope/Identify Assets

Acquired Testing

Evidence

Select Testing Tools From Tool Data

Bases

Identify Critical Enterprise Assets

Technical Assessments

Government Dependability Certification & Accreditation Processes

Government Safety Certification & Accreditation Processes

Government Security Certification & Accreditation Processes

Tools for Customization and Documentation of Organization Vulnerability Management Processes

Vulnerability Management Case Database

Define Vulnerability Management Requirements

Customize Processes & Assess

Vulnerabilities

Page 20: Open Group - Vulnerability Management (OG-VM) Initiativearchive.opengroup.org/public/member/proceedings/q403/evm_robinson.pdf · Open Group - Vulnerability Management (OG-VM) Initiative

Identified Vulnerabilities Drive Development of Vulnerability Mitigation Roadmap Plans

Define Scope/Identify Assets

Acquired Testing

Evidence

Select Testing Tools From Tool Data

Bases

Identify Critical Enterprise Assets

Technical Assessments

Plan Product Trade Offs

Create Roadmap

Desired/CurrentStates

Government Dependability Certification & Accreditation Processes

Government Safety Certification & Accreditation Processes

Government Security Certification & Accreditation Processes

Tools for Customization and Documentation of Organization Vulnerability Management Processes

Vulnerability Management Case Database

Vulnerability Management

Roadmap Planning

Define Vulnerability Management Requirements

Customize Processes & Assess

Vulnerabilities

Page 21: Open Group - Vulnerability Management (OG-VM) Initiativearchive.opengroup.org/public/member/proceedings/q403/evm_robinson.pdf · Open Group - Vulnerability Management (OG-VM) Initiative

Roadmap Plans Drive Implementation of Vulnerability Management Capabilities

Define Scope/Identify Assets

Acquired Testing

Evidence

Select Testing Tools From Tool Data

Bases

Identify Critical Enterprise Assets

Technical Assessments

Plan Product Trade Offs

Create Roadmap

Desired/CurrentStates

Implement OG-VM Roadmap

CustomizePolicies &Procedures

Customize &Integrate SelectedProducts &Tools

Government Dependability Certification & Accreditation Processes

Government Safety Certification & Accreditation Processes

Government Security Certification & Accreditation Processes

Tools for Customization and Documentation of Organization Vulnerability Management Processes

Vulnerability Management Case Database

Vulnerability Management

Roadmap Planning

Define Vulnerability Management Requirements

Customize Processes & Assess

Vulnerabilities

Implementation of System Vulnerability Management Defenses follows Roadmap Plan

Page 22: Open Group - Vulnerability Management (OG-VM) Initiativearchive.opengroup.org/public/member/proceedings/q403/evm_robinson.pdf · Open Group - Vulnerability Management (OG-VM) Initiative

Open, Standards Based, OG-VM Processes Include Provisions for Continuous Organization Vulnerability Management Monitoring and Control

Define Scope/Identify Assets

Acquired Testing

Evidence

Select Testing Tools From Tool Data

Bases

Identify Critical Enterprise Assets

Technical Assessments

Plan Product Trade Offs

Create Roadmap

Desired/CurrentStates

Implement OG-VM Roadmap

CustomizePolicies &Procedures

Customize &Integrate SelectedProducts &Tools

Operations & Maintenance

Event Monitoring, Logging & Analyses

Government Dependability Certification & Accreditation Processes

Government Safety Certification & Accreditation Processes

Government Security Certification & Accreditation Processes

Tools for Customization and Documentation of Organization Vulnerability Management Processes

Vulnerability Management Case Database

Vulnerability Management

Roadmap Planning

Define Vulnerability Management Requirements

Customize Processes & Assess

Vulnerabilities

Upgraded Systems Provide Monitoring & Control For Detection & Management Of Evolving Threats

Page 23: Open Group - Vulnerability Management (OG-VM) Initiativearchive.opengroup.org/public/member/proceedings/q403/evm_robinson.pdf · Open Group - Vulnerability Management (OG-VM) Initiative

An interesting point of departure for Open Group Vulnerability Management discussions could be provided by a review of NIST Special Publication 800-26, “Security Self-Assessment Guide for Information Technology Systems”.

While our understanding is that this guide will be updated to include changes being introduced in SP 800-53, SP 800-53A and SP 800-37, the System Questionnaire in Appendix A provides interesting insights into the classes of self assessment questions that are being considered.