Cyber Security Information Sharing
Oscar Serrano NCI Agency Cyber Security Service Line
DeepSec 2014, Vienna, 21 November 2014
NATO UNCLASSIFIED
Cyber Security Information Sharing Oscar Serrano NCI Agency Cyber - - PowerPoint PPT Presentation
Cyber Security Information Sharing Oscar Serrano NCI Agency Cyber Security Service Line DeepSec 2014, Vienna, 21 November 2014 NATO UNCLASSIFIED Cyber Security In NATO NATO in a nutshell: Collective defence Interoperable
Cyber Security Information Sharing
Oscar Serrano NCI Agency Cyber Security Service Line
DeepSec 2014, Vienna, 21 November 2014
NATO UNCLASSIFIED
– Collective defence – Interoperable capabilities – Policies for sharing information – NATO has its own systems to protect – NATO relies on National systems for its missions and operations
– Cyber security is a key concern
Capability (NCIRC)
– Coordination Centre (CC) – Technical Centre (TC)
security information sharing
Cyber Security In NATO
2 20 March 2014 NATO UNCLASSIFIED
02/12/14 NATO UNCLASSIFIED 3
Cyber Security Data Overload
– CCDCOE’s National Cyber Security Strategy Manual – NATO’s new Cyber Defence Policy – U.S. Executive Order on Improving Critical Infrastructure Cybersecurity – UK’s Cyber Security Information Sharing Partnership
4
Drivers for Information Sharing
20 March 2014
– Common systems, threats and vulnerabilities – Trusted communities – Too few qualified personnel
– Standardization efforts – Commercial and open source software
NATO UNCLASSIFIED
– US Govt / MITRE's “Making Security Measurable” program – ITU-T’s X.1500 CYBEX – IETF’s Incident Object Description and Exchange Format (IODEF) and Real- time Inter-network Defence (RID) – Vendor Formats
Standardization Efforts
5 20 March 2014 NATO UNCLASSIFIED
Organizations: – FS-ISAC Avalanche / Soltra Edge – Multinational Alliance for Collaborative Cyber Situational Awareness (MACCSA) – Microsoft’s Interflow – Collective Intelligence Framework (CIF) – ITU’s IMPACT – NATO’s Malware Information Sharing Platform (MISP)
(e.g. bioinformatics)
Existing Capabilities
6 20 March 2014 NATO UNCLASSIFIED
burden-sharing collaboration and outsourcing
Challenges !
Ongoing efgorts must be continued, but they must also be complemented !
7 20 March 2014 NATO UNCLASSIFIED
expressing the information to be exchanged and the transport mechanism…
the management and exploitation of exchanged data…
common to all…
Addressing the Challenges…
8 20 March 2014 NATO UNCLASSIFIED
02/12/14 NATO UNCLASSIFIED 9
Manage, Share, Automate
information is critical
policies
Requirements
– Both necessary and sufficient
request
02/12/14 NATO UNCLASSIFIED 10
CDXI Capability Definition Document
High-Level Requirements (HLRs)
HLR #1: Provide a fmexible, scalable, secure and decentralized infrastructure based on freely available software
HLR #2: Provide for the controlled evolution
independent data models and their correlation HLR #3: Securely store both shared and private data HLR #4: Provide for customizable, controlled multilateral sharing HLR #5: Enable the exchange of data across non-connected domains HLR #6: Provide human and machine interfaces HLR #7: Provide collaboration tools that enable burden sharing on the generation, refjnement, and vetting of data HLR #8: Provide customizable quality-control processes HLR #9: Expose dissension to reach consensus HLR #10: Support continuous availability
HLR #11: Enable commercial activities
11 20 March 2014 NATO UNCLASSIFIED
02/12/14 NATO UNCLASSIFIED 12
Deployment and integration
A A
CS App CS App CS App CS App CS App CS App CDXI CDXI Core Services (authentication, data storage) Core Services (authentication, data storage) Networking Networking CDX I UI CDX I UI User facing Application s User facing Application s Services / Infrastructu re Services / Infrastructu re
Integration Integration
Organisation B Organisation B
CS App CS App CS App CS App CS App CS App CDXI CDXI Core Services (authentication, data storage) Core Services (authentication, data storage) Networking Networking CDX I UI CDX I UI
Integration Integration
Internet CDXI Communication Channel
Organisation A Organisation B
Information Exchange Policies
NATO UNCLASSIFIED
02/12/14 NATO UNCLASSIFIED 14
Knowledge markets
KM 2 KM 1 Organisation A Organisation A Organisation C Organisation C Organisation B Organisation B
Data Ofgerin g 1
Publish
Data Ofgerin g 2
Publish Subscribe Subscribe
A A B B
Z Z
02/12/14 NATO UNCLASSIFIED 15
Knowledge markets
Subscribe KM 1 Organisation A Organisation A Organisation C Organisation C Organisation B Organisation B KM 2
Data Ofgerin g 1
Publish
Data Ofgerin g 2
Publish Subscribe
A A B B
Z Z Data Ofgerin g 2
02/12/14 NATO UNCLASSIFIED 16
Ontologies
evolving ontologies
impractical
depth of ontologies must be supported
02/12/14 NATO UNCLASSIFIED 17
Agile data model
Producer’s Initial Data Ofgering
Org A Org A Org B Org B Org C Org C
Intrusion Detection Intrusion Detection Vulnerability Assessment Vulnerability Assessment Risk Assessment Risk Assessment Policy Compliance Policy Compliance APT Detection APT Detection
Consumers CD Applications: Business Logic for Difgerent Uses Producer’s Improved Ofgering Emerging Market!
Org Z Org Z
Version Control Version Control
Data Sync
02/12/14 NATO UNCLASSIFIED 18
Enabling automation
CDXI at Organisation A
Data Ofgerin g 1 Data Ofgerin g 2
API API Alerting System Alerting System Fully Automated Response System Fully Automated Response System API API
CDXI at Partner CDXI at Vendor
QCP 1 QCP 2 QCP 2 QCP 2
API API Semi- Automated Response System Semi- Automated Response System Correlation Correlation
Anonymisation
Management of uncertainty
motivation, etc
02/12/14 NATO UNCLASSIFIED 19
Other features
platform specifically designed to address the information sharing issues of the Cyber Security domain
NATO Nations in 2015
– NCIA: Manisha Parmar (Manisha.Parmar@ncia.nato.int)
02/12/14 NATO UNCLASSIFIED 20
Conclusion
02/12/14 NATO UNCLASSIFIED 21
Questions
Cyber Security Information Sharing
Oscar Serrano NCI Agency Cyber Security Service Line
DeepSec 2014, Vienna, 21 November 2014 NATO UNCLASSIFIED1
– Collective defence – Interoperable capabilities – Policies for sharing information – NATO has its own systems to protect – NATO relies on National systems for its missions and operations
– Cyber security is a key concern
Capability (NCIRC)
– Coordination Centre (CC) – Technical Centre (TC)
security information sharing
Cyber Security In NATO
2 20 March 2014 NATO UNCLASSIFIED2
Cyber Security Data Overload
we are overloaded with data. governments that need to coordinate on cyber defense information industry sectors working to protect themselves from cybercrime threats We have law enforcement following criminal networks And we have large military organizations that must maintain a strong cyber defense posture. while we gather so much data, we still wonder what we are missing, and we find we want
but there is not enough data at the same time.
3
– CCDCOE’s National Cyber Security Strategy Manual – NATO’s new Cyber Defence Policy – U.S. Executive Order on Improving Critical Infrastructure Cybersecurity – UK’s Cyber Security Information Sharing Partnership
4Drivers for Information Sharing
20 March 2014– Common systems, threats and vulnerabilities – Trusted communities – Too few qualified personnel
– Standardization efforts – Commercial and open source software
NATO UNCLASSIFIED4
– US Govt / MITRE's “Making Security Measurable” program – ITU-T’s X.1500 CYBEX – IETF’s Incident Object Description and Exchange Format (IODEF) and Real- time Inter-network Defence (RID) – Vendor Formats
Standardization Efforts
5 20 March 2014 NATO UNCLASSIFIED5
Organizations: – FS-ISAC Avalanche / Soltra Edge – Multinational Alliance for Collaborative Cyber Situational Awareness (MACCSA) – Microsoft’s Interflow – Collective Intelligence Framework (CIF) – ITU’s IMPACT – NATO’s Malware Information Sharing Platform (MISP)
(e.g. bioinformatics)
Existing Capabilities
6 20 March 2014 NATO UNCLASSIFIED6
burden-sharing collaboration and outsourcing
Challenges !
Ongoing efgorts must be continued, but they must also be complemented !
7 20 March 2014 NATO UNCLASSIFIED7
expressing the information to be exchanged and the transport mechanism…
the management and exploitation of exchanged data…
common to all…
Addressing the Challenges…
Shouldn’t we aim for a common platform?
8 20 March 2014 NATO UNCLASSIFIED8
Manage, Share, Automate
information is critical
policies
Organizations have identified the partners with whom they want to share Need internally and external information to have the full picture. collaboration usually plays out with time consuming, manual processes, using ad hoc exchange mechanisms – for example, phone calls or emails within small groups. We can see, that more fluent information sharing is a major requirement and research area for the cyber security community. To examine proposed solutions to these problems, we have considered what people
9
Requirements
– Both necessary and sufficient
request
02/12/14 NATO UNCLASSIFIED 10CDXI Capability Definition Document
10
High-Level Requirements (HLRs)
HLR #1: Provide a fmexible, scalable, secure and decentralized infrastructure based on freely available software
HLR #2: Provide for the controlled evolution
independent data models and their correlation HLR #3: Securely store both shared and private data HLR #4: Provide for customizable, controlled multilateral sharing HLR #5: Enable the exchange of data across non-connected domains HLR #6: Provide human and machine interfaces HLR #7: Provide collaboration tools that enable burden sharing on the generation, refjnement, and vetting of data HLR #8: Provide customizable quality-control processes HLR #9: Expose dissension to reach consensus HLR #10: Support continuous availability
HLR #11: Enable commercial activities
11 20 March 2014 NATO UNCLASSIFIED11
Deployment and integration
A A
CS App CS App CS App CS App CS App CS App CDXI CDXI Core Services (authentication, data storage) Core Services (authentication, data storage) Networking Networking CDX I UI CDX I UI User facing Application s User facing Application s Services / Infrastructu re Services / Infrastructu re
Integration IntegrationOrganisation B Organisation B
CS App CS App CS App CS App CS App CS App CDXI CDXI Core Services (authentication, data storage) Core Services (authentication, data storage) Networking Networking CDX I UI CDX I UI
Integration IntegrationInternet CDXI Communication Channel
Organisation A Organisation B
Information Exchange Policies
Our proposal, then, is to manage and enforce legal and policy requirements and sharing agreements through the use of “Information Exchange Policies (IEPs)”. These would be
data sets or a specific data item
participants and joining rules, handling requirements, whether data can be modified and redistributed, etc.
cyber sharing system, to enable automated sharing in accordance with legal frameworks and organizational policies for auditing, enforcement, and correlation. To the best of our knowledge, IEP concepts are not in use by cyber security sharing systems. Most likely, organizations see the complexity
about the resulting benefits. We see solving this problem as important for addressing the legal impediment to information sharing.
13
Knowledge markets
KM 2 KM 1 Organisation A Organisation A Organisation C Organisation C Organisation B Organisation B
Data Ofgerin g 1
Publish
Data Ofgerin g 2
Publish Subscribe Subscribe
A A B BZ Z
Knowledge markets
Subscribe KM 1 Organisation A Organisation A Organisation C Organisation C Organisation B Organisation B KM 2
Data Ofgerin g 1
Publish
Data Ofgerin g 2
Publish Subscribe
A A B BZ Z Data Ofgerin g 2
Ontologies
evolving ontologies
impractical
depth of ontologies must be supported
Agile data model
Producer’s Initial Data Ofgering
Org A Org A Org B Org B Org C Org C
Intrusion Detection Intrusion Detection Vulnerability Assessment Vulnerability Assessment Risk Assessment Risk Assessment Policy Compliance Policy Compliance APT Detection APT DetectionConsumers CD Applications: Business Logic for Difgerent Uses Producer’s Improved Ofgering Emerging Market!
Org Z Org Z
Version Control Version Control
Data SyncNoSSQL: Hadoop based system
17
Enabling automation
CDXI at Organisation A
Data Ofgerin g 1 Data Ofgerin g 2
API API Alerting System Alerting System Fully Automated Response System Fully Automated Response System API API
CDXI at Partner CDXI at Vendor
QCP 1 QCP 2 QCP 2 QCP 2API API Semi- Automated Response System Semi- Automated Response System Correlation Correlation
Anonymisation
Management of uncertainty
motivation, etc
Other features
platform specifically designed to address the information sharing issues of the Cyber Security domain
NATO Nations in 2015
– NCIA: Manisha Parmar (Manisha.Parmar@ncia.nato.int)
02/12/14 NATO UNCLASSIFIED 20Conclusion
Questions