Autonomic Security Compliance Framework Cihan Tunc and Salim Hariri - - PowerPoint PPT Presentation

autonomic security compliance framework
SMART_READER_LITE
LIVE PREVIEW

Autonomic Security Compliance Framework Cihan Tunc and Salim Hariri - - PowerPoint PPT Presentation

Autonomic Security Compliance Framework Cihan Tunc and Salim Hariri Cloud and Autonomic Computing Center at The University of Arizona Cloud and Autonomic Computing Center Semi Annual IAB Meeting, April 23-24, 2018 Tucson, Arizona Project


slide-1
SLIDE 1

Cloud and Autonomic Computing Center Tucson, Arizona Semi Annual IAB Meeting, April 23-24, 2018

Autonomic Security Compliance Framework

Cihan Tunc and Salim Hariri Cloud and Autonomic Computing Center at The University of Arizona

slide-2
SLIDE 2

p December 30, 2015, the U.S. Department of Defense (DoD)

published a three-page interim rule with the deadline of December 31, 2017

n Implement all of the requirements of NIST SP 800-171, Protecting

Controlled Unclassified Information in Nonfederal Information Systems and Organizations.

p Current Supply chain security management techniques are

n Manual and labor intensive, and not flexible n Infeasible to create a secure organization boundary

2

Project Overview

[https://www.gpo.gov/fdsys/pkg/FR-2015-12-30/pdf/2015-32869.pdf]

slide-3
SLIDE 3

3

Project Overview

p Goal: Autonomic security compliance

q

Continuous monitor of computers, systems, devices, applications, etc.

q

Compliance requirements are met based on NIST SP-800-171

q

Create a compliance report and report the critical issues

q

Suggestions to fix the problems (automated/semi-automated actions)

slide-4
SLIDE 4

4

Autonomic Cyber Security Framework

Autonomic Security Compliance Engine

Supply Chain 1

The security control requirements

Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations

NIST SP 800-171

Supply Chain 2

Physical Resource Operating System VM-1 Apps vResource Hypervisor VM-N Apps vResource

Server Systems Devices

slide-5
SLIDE 5

5

Autonomic Cyber Security Framework

NIST SP 800-171

1. Access Control 2. Awareness and Training 3. Audit and Accountability 4.

  • Conf. Mng.

5. Identification and Authentication 6. Incident Response 7. Maintenance 8. Media Protection 9. Personnel Security

  • 10. Physical Protection
  • 11. Risk Assessment
  • 12. Security Assessment
  • 13. System and Comm.

Protection

  • 14. System & Info. Integrity

United States Government

  • Conf. Baseline (USGCB)
  • Minimum password length (12

chars) à To make brute force password guessing attacks more difficult.

  • Network security: Force logoff

when logon hours expire à To prevent users from remaining connected after their logon hours have expired.

  • Inbound connections (Block)

à To minimize the risk of exploiting a vulnerable application with an inbound network port.

Metric (0-1) Report 3.1 Access Control 0.45 Security controls do not pass ý 3.1.8 Limit unsuccessful logon attempts. Failed the tests þ 3.1.9 Provide privacy and security notices consistent with applicable CUI rules. 0.9 90% of the security tests passed þ 3.2 Awareness and Training 1 PASS 3.3 Audit and Accountability 0.6 Not all the security controls are effectively applied ý 3.3.4 Alert in the event of an audit process failure. 0.3 The tests failed mostly ý 3.4 Configuration Management 0.55 The tests failed ý 3.5 Identification and Authentication 1 PASS þ 3.6 Incident Response 0.9 PASS ý 3.7 Maintenance 1 PASS þ 3.8 Media Protection 1 PASS ý 3.9 Personnel Security 0.4 More work is needed þ 3.10 Physical Protection 1 PASS þ 3.11 Risk Assessment 1 PASS þ 3.12 Security Assessment 1 PASS 3.13 System and Comm. Protection 0.7 Not all the security controls are effectively applied ý 3.13.6 Deny network communications traffic by default and allow network communications traffic by exception (i.e. deny all, permit by exception). 0.2 Failed the tests þ 3.14 System & Info. Integrity 0.95 PASS NIST SP 800-171 Security Control

Company Policy Compliance Program Configuration Report Critical Issues Compliance Report Action

slide-6
SLIDE 6

*

14 security categories

  • Access Control
  • Awareness and Training
  • Audit and Accountability
  • Configuration Management
  • Identification and Authentication
  • Incident Response
  • Maintenance
  • Media Protection
  • Personnel Security
  • Physical Protection
  • Risk Assessment
  • Security Assessment
  • System and Communications Protection
  • System and Information Integrity

NIST SP 800-171

slide-7
SLIDE 7

7

Environment Information

p 3.1.8 – Limit unsuccessful logon attempts.

n

Script name: check_login_attempts_SP800_171_3.1.8

n

Checks the auth.log to see if the number of unsuccessful attempts are beyond a limit

p

3.1.6 – Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).

n

Script name: check_open_ports_SP800_171_3.13.6

n

Checks the open ports

n

It uses a given authorized port list to compare the ports

n

If there are any unauthorized ports, it gives a critical error to the admin.

slide-8
SLIDE 8

8

Environment Information

slide-9
SLIDE 9

Access Control

slide-10
SLIDE 10

10

Access Control

slide-11
SLIDE 11

11

Vulnerability Analysis

slide-12
SLIDE 12

12

Deliverables and Benefits

p Autonomic security control framework

n

Implementing security controls on individual systems for supply chain

n

Monitoring the systems 24x7

p

Security à Continuous monitoring

n

Built a proof-of-concept testbed

slide-13
SLIDE 13

Please take a moment to fill out your L.I.F.E. forms. http://www.iucrc.com Select “Cloud and Autonomic Computing Center” then select “IAB” role. What do you like about this project? What would you change? (Please include all relevant feedback.)

LIFE Form Input