Jamie Miller, CEO August 6-7, 2019
This document contains Mission Innovate Proprietary and Confidential Business Information
Dashboard Discussion Document Jamie Miller, CEO August 6-7, 2019 - - PowerPoint PPT Presentation
MI:COP Risk Scoring Dashboard Discussion Document Jamie Miller, CEO August 6-7, 2019 This document contains Mission Innovate Proprietary and Confidential Business Information Common Operating Picture The Whole is Greater than Common
This document contains Mission Innovate Proprietary and Confidential Business Information
2
Military term used to describe a command and control solution that aggregates important operational information (e.g., the position of soldiers, supplies, etc.) all in one picture
First coined by the philosopher Aristotle, this phrase aptly defines the importance of a consolidated view/solution
3
A common operational picture (COP) for cyberspace facilitates C2 of CO and real-time comprehensive Situational Awareness. A cyberspace COP should include the ability to rapidly fuse, correlate, and display data from global network sensors to deliver a reliable picture of friendly, neutral, and adversary networks, including their physical locations and activities. In addition, the cyberspace COP should support real-time threat and event data from myriad sources (i.e., DOD, IC, interagency, private industry, and international partners) and improve commanders’ abilities to identify, monitor, characterize, track, locate, and take action in response to cyberspace activity as it occurs both globally for USSTRATCOM/ USCYBERCOM and within the AOR for the GCC. Joint Publication 3-12(R), “Cyberspace Operations”, dated 5 February 2013
4
C-Suite / CISO
Organizations/ Roles/ People / Geographies
Technology
Chains/Missions
Architectures
Business Unit A Business Unit B Business Unit C Business Unit D Business Unit E
Value Chain Value Chain Value Chain Value Chain
Types
5
risk profile
−
Inconsistent performance metrics are being collected and examined
−
Nearly impossible to have complete visibility of environment
because of incomplete data sets
−
Data collected is often “stale” and not current/real-time
invariably high
−
Resources are not effectively prioritized
C-Suite / CISO
Organizations/ Roles/ People / Geographies
Technology
Chains/Missions
Architectures
Business Unit A Business Unit B Business Unit C Business Unit D Business Unit E
Value Chain Value Chain Value Chain Value Chain
Types
▪Example data sources could include asset management, patch management, incident management, event (malware) management, and threat management data feeds
SCAP Content Tool / Data Source
Vulnerability Scan Systems IT Asset
System Configurations System Remediations Configuration
Manual Checklists Vulnerability Remediation
CVE Extract CPE Extract CCE Extract CRE Extract XCCDF / OVAL Extract OCIL Extract XCCDF / OVAL Extract
Information Data Scans
Regional Hub (Aggregated Data) Executive Dashboard Risk Threshold Events & Alerts Risk Threshold Risk Threshold Email
▪ Sensor controller automatically monitors the enterprise risk level based on real-time vulnerabilities and threats (i.e., key risk indicators)
6
Reports Business Process Inputs Business Process #1 Business Process #2 Business Process #3 Business Process …
7
1.
Focus the Cyber COP solution on what’s important to your organization (i.e., on the “key effectiveness measures”)
2.
Identify/Employ “The Right” Tools and Technology
3.
Set-up an effective architecture
4.
Create the “Secret Sauce”
− Develop the custom algorithms/scripts 5.
Develop a well thought out dashboard
6.
Place significant energy on maintenance and tuning of the overall solution
▪E x a m p le d a ta s
rc e s c
ld in c lu d e a s s e t m a n a g e m e n t, p a tc h m a n a g e m e n t, in c id e n t m a n a g e m e n t, e v e n t (m a lw a re ) m a n a g e m e n t, a n d th re a t m a n a g e m e n t d a ta fe e d s
SCAP Content Tool / Data Source Vulnerability Scan Systems IT Asset Management Systems System Configurations System Remediations Configuration Management Systems Manual Checklists Vulnerability Remediation CVE Extract CPE Extract CCE Extract CRE Extract XCCDF / OVAL Extract OCIL Extract XCCDF / OVAL Extract
Information Data Scans
Cyber COP Solution Concept
R e g io n a l H u b (A g g re g a te dD a ta ) E x e c u tiv e D a s h b
rd R is k T h re s h
E v e n ts & A le rts R is k T h re s h
R is k T h re s h
E m a il
▪ S e n s
tro lle r a u to m a tic a lly m
ito rs th e e n te rp ris e ris k le v e l b a s e d
re a l-tim e v u ln e ra b ilitie s a n d th re a ts (i.e ., k e y ris k in d ic a to rs )
R e p
Business Process Inputs Business Process #1 Business Process #2 Business Process #3 Business Process …
1 2 4 5 6 3
8
9
10
# Implications Resolutions 1. Difficult to manage to standard risk profile
− Inconsistent performance metrics are being
collected and examined
− Nearly impossible to have complete visibility
Defined “key effectiveness measures” allows leadership/management to track and monitor what it most cares about 2. Decisions are based on “gut feel” because of incomplete data sets
− Data collected is often “stale” and not
current/real-time Use of automated tools, ensures close to near real-time capture of the defined “high- priority” metrics – acknowledging that not all data is created equal 3. Competing interests create “political push- pull” Implementation of “risk economy” and incentive structure based on risk scoring motivates security practitioners to implement fixes based on priority. 4. The cost to manage environment are invariably high
− Resources are not effectively prioritized
Leadership’s access to dynamic risk scoring dashboard enables quick and easy risk decision-making, and more effective allocation of resources where they matter most
11
Jamie Miller President / CEO
256-829-8859 (Mobile) jmiller@missionmultiplier.com www.missionmultiplier.com
12
13
1
Business Prospective Security Prospective
Which processes in your business are vital to your
Which information is the most important/ sensible into your enterprise Ranking by the impact the disruption of these processes would have on your business Ranking by impact for the loss of availability, confidentiality, integrity that information would have on your business
Most important Assets / Functions
Key Effectiveness Measure Definition
Metrics Formation (Relative to Key Assets)
▪E x a m p le d a ta s
rc e s c
ld in c lu d e a s s e t m a n a g e m e n t, p a tc h m a n a g e m e n t, in c id e n t m a n a g e m e n t, e v e n t (m a lw a re ) m a n a g e m e n t, a n d th re a t m a n a g e m e n t d a ta fe e d s
SCAP Content Tool / Data Source Vulnerability Scan Systems IT Asset Management Systems System Configurations System Remediations Configuration Management Systems Manual Checklists Vulnerability Remediation CVE Extract CPE Extract CCE Extract CRE Extract XCCDF / OVAL Extract OCIL Extract XCCDF / OVAL Extract
Information Data Scans
Cyber COP Solution Concept
R e g io n a l H u b (A g g re g a te dD a ta ) E x e c u tiv e D a s h b
rd R is k T h re s h
E v e n ts & A le rts R is k T h re s h
R is k T h re s h
E m a il
▪ S e n s
tro lle r a u to m a tic a lly m
ito rs th e e n te rp ris e ris k le v e l b a s e d
re a l-tim e v u ln e ra b ilitie s a n d th re a ts (i.e ., k e y ris k in d ic a to rs )
R e p
Business Process Inputs Business Process #1 Business Process #2 Business Process #3 Business Process …
Key Focus Areas / Metrics
14
1
Establish Timeliness, Accuracy, Coverage Continuous Operational Risk Response Implement Monitoring and Essential Controls / Threat Data
Controls / Threat Data Security Program Capability Measures Security Program Effectiveness Measures
Goal Efficiency/Effectiveness
▪ Controls are selected based on risk
see if each produce the desired
individual control does not mean that overall security is effective in protecting mission. ▪ Capability Measures quantify the timeliness and validate coverage
interdependent set of controls are employed. ▪ Effectiveness Measures quantify the extent to which the interdependent set of security controls actually increases security.
The organization has a process to remove unauthorized hardware (It might not be used) When the audit group puts unauthorized machines on the network they are found and removed within 24 hours The probability that a compromise is caused by unauthorized hardware is within control limits (All are found and addressed)
Monitoring Compliance
Monitoring Effectiveness
(But are all found?)
15
2
Key Focus Areas / “Effectiveness Measure”
technology; so that you have the capability to capture the information you need and want to monitor
accuracy that you need
workload and integrate with and support existing IT business processes Validate Tool Suite
16
3
data you collect and extract can be effectively collected, aggregated, and transmitted across the network to a central location or database
flows, which often necessitates customized middleware (where data feeds and technologies don’t easily talk to each other)
design that supports the normalization, parsing, and processing of information collected – such as a Hadoop Cluster Deployment – is of critical importance
Organizational Network
17
4
captured in a central database, customized algorithms (or scripts) will need to be developed to query (and organize) the dataset
algorithms (combined with the actual database design) are where the “secret sauce” of the COP program resides
is based on the design of the queries.
−
To “get this right” takes some experimenting. Ultimately, though, the right queries will enable access to actionable data and improved risk decision- making, and depending on the set frequency of the scanning, the results could be provided in near real- time
18
5
results of custom queries (based on the key effectiveness measures) to different
− Executive/Commander level − Business owner level − IT system owner level
data they need to make decisions, change behaviors, or validate performance
change of security stakeholders/practitioners to focus on mitigating risks to the mission in priority
−
The scoring algorithm can include a behavioral-science-based heuristic the promotes the desired behavior/actions
accessible, be easy to understand, support day-to-day
dataflow.
19
6
processes, and new organizational priorities arise, the different components of the Cyber COP solution architecture (e.g., metrics, tools, analytics/data queries) will need to be adjusted
management and implementation is no small undertaking
▪E x a m p le d a ta s
rc e s c
ld in c lu d e a s s e t m a n a g e m e n t, p a tc h m a n a g e m e n t, in c id e n t m a n a g e m e n t, e v e n t (m a lw a re ) m a n a g e m e n t, a n d th re a t m a n a g e m e n t d a ta fe e d s
SCAP Content Tool / Data Source Vulnerability Scan Systems IT Asset Management Systems System Configurations System Remediations Configuration Management Systems Manual Checklists Vulnerability Remediation CVE Extract CPE Extract CCE Extract CRE Extract XCCDF / OVAL Extract OCIL Extract XCCDF / OVAL Extract
Information Data Scans
Cyber COP Solution Concept
R e g io n a l H u b (A g g re g a te dD a ta ) E x e c u tiv e D a s h b
rd R is k T h re s h
E v e n ts & A le rts R is k T h re s h
R is k T h re s h
E m a il
▪ S e n s
tro lle r a u to m a tic a lly m
ito rs th e e n te rp ris e ris k le v e l b a s e d
re a l-tim e v u ln e ra b ilitie s a n d th re a ts (i.e ., k e y ris k in d ic a to rs )
R e p
Business Process Inputs Business Process #1 Business Process #2 Business Process #3 Business Process …