Cyber Security Information Sharing Oscar Serrano NCI Agency Cyber - - PowerPoint PPT Presentation

cyber security information sharing
SMART_READER_LITE
LIVE PREVIEW

Cyber Security Information Sharing Oscar Serrano NCI Agency Cyber - - PowerPoint PPT Presentation

Cyber Security Information Sharing Oscar Serrano NCI Agency Cyber Security Service Line DeepSec 2014, Vienna, 21 November 2014 NATO UNCLASSIFIED Cyber Security In NATO NATO in a nutshell: Collective defence Interoperable


slide-1
SLIDE 1

Cyber Security Information Sharing

Oscar Serrano NCI Agency Cyber Security Service Line

DeepSec 2014, Vienna, 21 November 2014

NATO UNCLASSIFIED

slide-2
SLIDE 2
  • NATO in a nutshell:

– Collective defence – Interoperable capabilities – Policies for sharing information – NATO has its own systems to protect – NATO relies on National systems for its missions and operations

  • NATO’s 2010 Strategic concept

– Cyber security is a key concern

  • NATO Computer Incident Response

Capability (NCIRC)

– Coordination Centre (CC) – Technical Centre (TC)

  • Annual Cyber Coalition Exercise
  • Many ongoing initiatives on cyber

security information sharing

Cyber Security In NATO

2 20 March 2014 NATO UNCLASSIFIED

slide-3
SLIDE 3

02/12/14 NATO UNCLASSIFIED 3

Cyber Security Data Overload

slide-4
SLIDE 4
  • Strategic drivers

– CCDCOE’s National Cyber Security Strategy Manual – NATO’s new Cyber Defence Policy – U.S. Executive Order on Improving Critical Infrastructure Cybersecurity – UK’s Cyber Security Information Sharing Partnership

4

Drivers for Information Sharing

20 March 2014

  • Operational drivers

– Common systems, threats and vulnerabilities – Trusted communities – Too few qualified personnel

  • Enablers

– Standardization efforts – Commercial and open source software

NATO UNCLASSIFIED

slide-5
SLIDE 5
  • Standards:

– US Govt / MITRE's “Making Security Measurable” program – ITU-T’s X.1500 CYBEX – IETF’s Incident Object Description and Exchange Format (IODEF) and Real- time Inter-network Defence (RID) – Vendor Formats

  • Proprietary or Open source
  • Most are interoperable!

Standardization Efforts

5 20 March 2014 NATO UNCLASSIFIED

slide-6
SLIDE 6
  • Platforms / Systems / Services /

Organizations: – FS-ISAC Avalanche / Soltra Edge – Multinational Alliance for Collaborative Cyber Situational Awareness (MACCSA) – Microsoft’s Interflow – Collective Intelligence Framework (CIF) – ITU’s IMPACT – NATO’s Malware Information Sharing Platform (MISP)

  • Many efforts in other domains

(e.g. bioinformatics)

Existing Capabilities

6 20 March 2014 NATO UNCLASSIFIED

slide-7
SLIDE 7
  • Policy and legal issues
  • Many data sources available
  • Timeliness requirement competes with quality requirement
  • Multi-lateral, differentiated sharing is a requirement
  • Sensitive data requires dissemination controls
  • Current processes and technologies do not support well

burden-sharing collaboration and outsourcing

  • Managing uncertainly
  • No direct financial benefit

Challenges !

Ongoing efgorts must be continued, but they must also be complemented !

7 20 March 2014 NATO UNCLASSIFIED

slide-8
SLIDE 8
  • Previous efforts have looked the formats for

expressing the information to be exchanged and the transport mechanism…

  • In cyber security, there are many challenges in

the management and exploitation of exchanged data…

  • In cyber security, these challenges are mostly

common to all…

Addressing the Challenges…

Shouldn’t we aim for a common platform?

8 20 March 2014 NATO UNCLASSIFIED

slide-9
SLIDE 9

02/12/14 NATO UNCLASSIFIED 9

Manage, Share, Automate

  • Collaboration is key
  • Timely, high-quality

information is critical

  • Well-defined exchange

policies

  • Wide-scale sharing
slide-10
SLIDE 10
  • Identifies 11 High-Level

Requirements

– Both necessary and sufficient

  • Is publically available on

request

02/12/14 NATO UNCLASSIFIED 10

CDXI Capability Definition Document

slide-11
SLIDE 11

High-Level Requirements (HLRs)

HLR #1: Provide a fmexible, scalable, secure and decentralized infrastructure based on freely available software

HLR #2: Provide for the controlled evolution

  • f the syntax and semantics of multiple

independent data models and their correlation HLR #3: Securely store both shared and private data HLR #4: Provide for customizable, controlled multilateral sharing HLR #5: Enable the exchange of data across non-connected domains HLR #6: Provide human and machine interfaces HLR #7: Provide collaboration tools that enable burden sharing on the generation, refjnement, and vetting of data HLR #8: Provide customizable quality-control processes HLR #9: Expose dissension to reach consensus HLR #10: Support continuous availability

  • f data

HLR #11: Enable commercial activities

11 20 March 2014 NATO UNCLASSIFIED

slide-12
SLIDE 12

02/12/14 NATO UNCLASSIFIED 12

Deployment and integration

A A

CS App CS App CS App CS App CS App CS App CDXI CDXI Core Services (authentication, data storage) Core Services (authentication, data storage) Networking Networking CDX I UI CDX I UI User facing Application s User facing Application s Services / Infrastructu re Services / Infrastructu re

Integration Integration

Organisation B Organisation B

CS App CS App CS App CS App CS App CS App CDXI CDXI Core Services (authentication, data storage) Core Services (authentication, data storage) Networking Networking CDX I UI CDX I UI

Integration Integration

Internet CDXI Communication Channel

Organisation A Organisation B

slide-13
SLIDE 13
  • Created at any organizational level
  • For a data set or individual item
  • Approved by legal departments
  • Machine-readable encoding

Information Exchange Policies

  • 1. Scope
  • 2. Participants
  • 3. Joining rules
  • 4. Data quality/confidence
  • 5. Handling requirements
  • 6. Exchange mechanisms
  • 7. Intellectual property
  • 8. Retention
  • 9. Anonymization

NATO UNCLASSIFIED

slide-14
SLIDE 14

02/12/14 NATO UNCLASSIFIED 14

Knowledge markets

KM 2 KM 1 Organisation A Organisation A Organisation C Organisation C Organisation B Organisation B

Data Ofgerin g 1

Publish

Data Ofgerin g 2

Publish Subscribe Subscribe

A A B B

Z Z

slide-15
SLIDE 15

02/12/14 NATO UNCLASSIFIED 15

Knowledge markets

Subscribe KM 1 Organisation A Organisation A Organisation C Organisation C Organisation B Organisation B KM 2

Data Ofgerin g 1

Publish

Data Ofgerin g 2

Publish Subscribe

A A B B

Z Z Data Ofgerin g 2

slide-16
SLIDE 16

02/12/14 NATO UNCLASSIFIED 16

Ontologies

  • Multiple, overlapping,

evolving ontologies

  • Aiming for one ontology is

impractical

  • Evolving size, scope, and

depth of ontologies must be supported

slide-17
SLIDE 17

02/12/14 NATO UNCLASSIFIED 17

Agile data model

Producer’s Initial Data Ofgering

Org A Org A Org B Org B Org C Org C

Intrusion Detection Intrusion Detection Vulnerability Assessment Vulnerability Assessment Risk Assessment Risk Assessment Policy Compliance Policy Compliance APT Detection APT Detection

Consumers CD Applications: Business Logic for Difgerent Uses Producer’s Improved Ofgering Emerging Market!

Org Z Org Z

Version Control Version Control

Data Sync

slide-18
SLIDE 18

02/12/14 NATO UNCLASSIFIED 18

Enabling automation

CDXI at Organisation A

Data Ofgerin g 1 Data Ofgerin g 2

API API Alerting System Alerting System Fully Automated Response System Fully Automated Response System API API

CDXI at Partner CDXI at Vendor

QCP 1 QCP 2 QCP 2 QCP 2

API API Semi- Automated Response System Semi- Automated Response System Correlation Correlation

slide-19
SLIDE 19

Anonymisation

  • Attribute sanitation

Management of uncertainty

  • Attribution, attacker

motivation, etc

  • Multiversioned DBs

02/12/14 NATO UNCLASSIFIED 19

Other features

slide-20
SLIDE 20
  • There is a need for a knowledge management

platform specifically designed to address the information sharing issues of the Cyber Security domain

  • NATO is seeking feedback
  • CDXI implementation will be considered by

NATO Nations in 2015

  • Possible collaboration on refining use cases:

– NCIA: Manisha Parmar (Manisha.Parmar@ncia.nato.int)

02/12/14 NATO UNCLASSIFIED 20

Conclusion

slide-21
SLIDE 21

02/12/14 NATO UNCLASSIFIED 21

Questions

slide-22
SLIDE 22

Cyber Security Information Sharing

Oscar Serrano NCI Agency Cyber Security Service Line

DeepSec 2014, Vienna, 21 November 2014 NATO UNCLASSIFIED

1

slide-23
SLIDE 23
  • NATO in a nutshell:

– Collective defence – Interoperable capabilities – Policies for sharing information – NATO has its own systems to protect – NATO relies on National systems for its missions and operations

  • NATO’s 2010 Strategic concept

– Cyber security is a key concern

  • NATO Computer Incident Response

Capability (NCIRC)

– Coordination Centre (CC) – Technical Centre (TC)

  • Annual Cyber Coalition Exercise
  • Many ongoing initiatives on cyber

security information sharing

Cyber Security In NATO

2 20 March 2014 NATO UNCLASSIFIED

2

slide-24
SLIDE 24 02/12/14 NATO UNCLASSIFIED 3

Cyber Security Data Overload

we are overloaded with data. governments that need to coordinate on cyber defense information industry sectors working to protect themselves from cybercrime threats We have law enforcement following criminal networks And we have large military organizations that must maintain a strong cyber defense posture. while we gather so much data, we still wonder what we are missing, and we find we want

  • more. The irony is that there is too much data

but there is not enough data at the same time.

3

slide-25
SLIDE 25
  • Strategic drivers

– CCDCOE’s National Cyber Security Strategy Manual – NATO’s new Cyber Defence Policy – U.S. Executive Order on Improving Critical Infrastructure Cybersecurity – UK’s Cyber Security Information Sharing Partnership

4

Drivers for Information Sharing

20 March 2014
  • Operational drivers

– Common systems, threats and vulnerabilities – Trusted communities – Too few qualified personnel

  • Enablers

– Standardization efforts – Commercial and open source software

NATO UNCLASSIFIED

4

slide-26
SLIDE 26
  • Standards:

– US Govt / MITRE's “Making Security Measurable” program – ITU-T’s X.1500 CYBEX – IETF’s Incident Object Description and Exchange Format (IODEF) and Real- time Inter-network Defence (RID) – Vendor Formats

  • Proprietary or Open source
  • Most are interoperable!

Standardization Efforts

5 20 March 2014 NATO UNCLASSIFIED

5

slide-27
SLIDE 27
  • Platforms / Systems / Services /

Organizations: – FS-ISAC Avalanche / Soltra Edge – Multinational Alliance for Collaborative Cyber Situational Awareness (MACCSA) – Microsoft’s Interflow – Collective Intelligence Framework (CIF) – ITU’s IMPACT – NATO’s Malware Information Sharing Platform (MISP)

  • Many efforts in other domains

(e.g. bioinformatics)

Existing Capabilities

6 20 March 2014 NATO UNCLASSIFIED

6

slide-28
SLIDE 28
  • Policy and legal issues
  • Many data sources available
  • Timeliness requirement competes with quality requirement
  • Multi-lateral, differentiated sharing is a requirement
  • Sensitive data requires dissemination controls
  • Current processes and technologies do not support well

burden-sharing collaboration and outsourcing

  • Managing uncertainly
  • No direct financial benefit

Challenges !

Ongoing efgorts must be continued, but they must also be complemented !

7 20 March 2014 NATO UNCLASSIFIED

7

slide-29
SLIDE 29
  • Previous efforts have looked the formats for

expressing the information to be exchanged and the transport mechanism…

  • In cyber security, there are many challenges in

the management and exploitation of exchanged data…

  • In cyber security, these challenges are mostly

common to all…

Addressing the Challenges…

Shouldn’t we aim for a common platform?

8 20 March 2014 NATO UNCLASSIFIED

8

slide-30
SLIDE 30 02/12/14 NATO UNCLASSIFIED 9

Manage, Share, Automate

  • Collaboration is key
  • Timely, high-quality

information is critical

  • Well-defined exchange

policies

  • Wide-scale sharing

Organizations have identified the partners with whom they want to share Need internally and external information to have the full picture. collaboration usually plays out with time consuming, manual processes, using ad hoc exchange mechanisms – for example, phone calls or emails within small groups. We can see, that more fluent information sharing is a major requirement and research area for the cyber security community. To examine proposed solutions to these problems, we have considered what people

9

slide-31
SLIDE 31
  • Identifies 11 High-Level

Requirements

– Both necessary and sufficient

  • Is publically available on

request

02/12/14 NATO UNCLASSIFIED 10

CDXI Capability Definition Document

10

slide-32
SLIDE 32

High-Level Requirements (HLRs)

HLR #1: Provide a fmexible, scalable, secure and decentralized infrastructure based on freely available software

HLR #2: Provide for the controlled evolution

  • f the syntax and semantics of multiple

independent data models and their correlation HLR #3: Securely store both shared and private data HLR #4: Provide for customizable, controlled multilateral sharing HLR #5: Enable the exchange of data across non-connected domains HLR #6: Provide human and machine interfaces HLR #7: Provide collaboration tools that enable burden sharing on the generation, refjnement, and vetting of data HLR #8: Provide customizable quality-control processes HLR #9: Expose dissension to reach consensus HLR #10: Support continuous availability

  • f data

HLR #11: Enable commercial activities

11 20 March 2014 NATO UNCLASSIFIED

11

slide-33
SLIDE 33 02/12/14 NATO UNCLASSIFIED 12

Deployment and integration

A A

CS App CS App CS App CS App CS App CS App CDXI CDXI Core Services (authentication, data storage) Core Services (authentication, data storage) Networking Networking CDX I UI CDX I UI User facing Application s User facing Application s Services / Infrastructu re Services / Infrastructu re

Integration Integration

Organisation B Organisation B

CS App CS App CS App CS App CS App CS App CDXI CDXI Core Services (authentication, data storage) Core Services (authentication, data storage) Networking Networking CDX I UI CDX I UI

Integration Integration

Internet CDXI Communication Channel

Organisation A Organisation B

slide-34
SLIDE 34
  • Created at any organizational level
  • For a data set or individual item
  • Approved by legal departments
  • Machine-readable encoding

Information Exchange Policies

  • 1. Scope
  • 2. Participants
  • 3. Joining rules
  • 4. Data quality/confidence
  • 5. Handling requirements
  • 6. Exchange mechanisms
  • 7. Intellectual property
  • 8. Retention
  • 9. Anonymization

NATO UNCLASSIFIED

Our proposal, then, is to manage and enforce legal and policy requirements and sharing agreements through the use of “Information Exchange Policies (IEPs)”. These would be

  • Created at any organizational level and could specify sharing complete

data sets or a specific data item

  • Specify things like the scope of an information sharing agreement, the

participants and joining rules, handling requirements, whether data can be modified and redistributed, etc.

  • Have approval from the legal responsibilities of an organization.
  • Encoded in a machine readable format and linked to the data in the

cyber sharing system, to enable automated sharing in accordance with legal frameworks and organizational policies for auditing, enforcement, and correlation. To the best of our knowledge, IEP concepts are not in use by cyber security sharing systems. Most likely, organizations see the complexity

  • f designing and implementing such a solution and may be skeptical

about the resulting benefits. We see solving this problem as important for addressing the legal impediment to information sharing.

13

slide-35
SLIDE 35 02/12/14 NATO UNCLASSIFIED 14

Knowledge markets

KM 2 KM 1 Organisation A Organisation A Organisation C Organisation C Organisation B Organisation B

Data Ofgerin g 1

Publish

Data Ofgerin g 2

Publish Subscribe Subscribe

A A B B

Z Z

slide-36
SLIDE 36 02/12/14 NATO UNCLASSIFIED 15

Knowledge markets

Subscribe KM 1 Organisation A Organisation A Organisation C Organisation C Organisation B Organisation B KM 2

Data Ofgerin g 1

Publish

Data Ofgerin g 2

Publish Subscribe

A A B B

Z Z Data Ofgerin g 2

slide-37
SLIDE 37 02/12/14 NATO UNCLASSIFIED 16

Ontologies

  • Multiple, overlapping,

evolving ontologies

  • Aiming for one ontology is

impractical

  • Evolving size, scope, and

depth of ontologies must be supported

slide-38
SLIDE 38 02/12/14 NATO UNCLASSIFIED 17

Agile data model

Producer’s Initial Data Ofgering

Org A Org A Org B Org B Org C Org C

Intrusion Detection Intrusion Detection Vulnerability Assessment Vulnerability Assessment Risk Assessment Risk Assessment Policy Compliance Policy Compliance APT Detection APT Detection

Consumers CD Applications: Business Logic for Difgerent Uses Producer’s Improved Ofgering Emerging Market!

Org Z Org Z

Version Control Version Control

Data Sync

NoSSQL: Hadoop based system

17

slide-39
SLIDE 39 02/12/14 NATO UNCLASSIFIED 18

Enabling automation

CDXI at Organisation A

Data Ofgerin g 1 Data Ofgerin g 2

API API Alerting System Alerting System Fully Automated Response System Fully Automated Response System API API

CDXI at Partner CDXI at Vendor

QCP 1 QCP 2 QCP 2 QCP 2

API API Semi- Automated Response System Semi- Automated Response System Correlation Correlation

slide-40
SLIDE 40

Anonymisation

  • Attribute sanitation

Management of uncertainty

  • Attribution, attacker

motivation, etc

  • Multiversioned DBs
02/12/14 NATO UNCLASSIFIED 19

Other features

slide-41
SLIDE 41
  • There is a need for a knowledge management

platform specifically designed to address the information sharing issues of the Cyber Security domain

  • NATO is seeking feedback
  • CDXI implementation will be considered by

NATO Nations in 2015

  • Possible collaboration on refining use cases:

– NCIA: Manisha Parmar (Manisha.Parmar@ncia.nato.int)

02/12/14 NATO UNCLASSIFIED 20

Conclusion

slide-42
SLIDE 42 02/12/14 NATO UNCLASSIFIED 21

Questions