Election Infrastructure Security: The How and Why of It
Minnesota ta County ty A Auditor E Election Training Conference
May ay 3, 2 2018
Election Infrastructure Security: The How and Why of It Minnesota - - PowerPoint PPT Presentation
Election Infrastructure Security: The How and Why of It Minnesota ta County ty A Auditor E Election Training Conference May ay 3, 2 2018 Contents Elect ction I Infr fras astructure Se Secu curity O Overview Cy Cyber ber a
Minnesota ta County ty A Auditor E Election Training Conference
May ay 3, 2 2018
2
“Given the vital role elections play in this country, it is clear that certain systems and assets of election infrastructure meet the definition of critical infrastructure, in fact and in law.” – DHS Election Infrastructure Designation Statement, Jan. 6, 2017
“Systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.”
4
Unique designation that provides for a basis for the Department of Homeland Security and other federal agencies to:
infrastructure,
private sector coordinating councils, and
responsible who attack these systems as violating international norms.
5
Securing election infrastructure is a national priority and no one entity can be successful working alone ― it takes a “whole of nation” approach.
Federal Agencies Ac Academi mia Stat ate an e and Local Go Gov Private Secto tor
Just as most critical infrastructure is not federally owned or managed, election infrastructure is outside federal control. DHS values and builds partnerships based on a foundation of trust and information sharing.
6
(ECIWG) that brought together key federal, state, county, and local
identify and mitigate risk to election infrastructure.
to partner and collaborate with all election community members and established multiple standing coordination meetings with
partnership formation questions and recommendations.
7
8
Feder ederal, state, e, and local g gover ernmen ent p partners formed med the e Election Infrastructure Subsec ector GCC (EIS S GCC) ) and met et f for the e first time me in Atlan lanta, Oc October 2017.
bolstered election infrastructure security and resiliency.
EIS G GCC: CC:
products, resources, and capabilities; and collective expertise.
Secretary of State; a state election director; and a local election director) which meets bi-weekly.
9
10
11
12
DHS offers a broad range of services and programs to help secure election infrastructure. Services and programs are free, and all are voluntary and provided upon request. Contact Cybersecurit ity A y Advisors ( s (CSAs) s) or Pr Protec ective S e Secur ecurity Adviso sors ( s (PSAs As) to identify a CSA or PSA for you, and to discuss how to select, prioritize, and sequence available services and educational programs based on specific needs.
14
24/7 cybersecurity operations centers that maintain close coordination among the private sector, government officials, the intelligence community, and law enforcement to provide situational awareness and incident response, as appropriate.
Conta tact t Information
For more information on DHS cyber programs, visit www.dhs.gov/cyber For access to the full range of DHS cyber resources, email SLTTCyber@hq.dhs.gov To become an EI-ISAC member, visit https://learn.cisecurity.org/ei-isac-registration
15
Needs DH DHS S Servi vices Summa mmary
Iden enti tify a and L Limit t Vulnerabi bili lities Cybe ber H Hygiene S Scan anning Broadly assess Internet-accessible systems for known vulnerabilities and configuration errors on a persistent basis. As potential issues are identified DHS works with impacted stakeholders to mitigate threats and risks to their systems prior to their exploitation. Risk and V Vulnerab abili lity Assessme sment (RVA)
Phishing C g Campa paign gn Assessme sment
Su Summar ary of
DHS S Service ces: s:
16
Needs DH DHS S Servi vices Summa mmary
Cyber R Ris isk a and IT Secu curity P y Program Assessme sment Cybe ber R Resili lience R Review (CRR CRR) One-day, onsite engagement conducted on an enterprise- wide basis to give insight on areas of strength and weakness, guidance on increasing organizational cybersecurity posture, preparedness, and ongoing investment strategies. External D al Dependencies Manageme ment A Assess ssme ment Assesses activities and practices used by an organization to manage risk arising from external dependencies that constitute the information and communication technology service supply chain. Cyber I Infrastructure S Survey y (C (CIS IS) Assesses an organization’s implementation and compliance with more than 80 cybersecurity controls.
Su Summar ary of
DHS S Service ces: s:
17
Needs DH DHS S Servi vices Summa mmary
Physical S al Security IP A Active ve Shoote ter Prepare redness P Pro rogram Provides a comprehensive set of resources to position public and private sector organizations to reduce the impacts of an active shooter event. Includes in-person training, online training, and educational resources. For
mor
information, c con
hop@hq hq.d .dhs hs.g .gov or
visi sit www.d .dhs hs.g .gov/active-sho hooter-pr prepa paredne ness IP Un Unman anned A Aircraf aft System ( (UAS) I Initiative Addresses threats posed to critical infrastructure from emergent adversary use of UAS. Offers policies and risk mitigation solutions for safe, secure, and beneficial use of UAS, associated countermeasures, and cyber/physical emerging technology analysis. For
mor
information, c con
IP-UAS@h @hq.d .dhs.g .gov
Su Summar ary of
DHS S Service ces: s:
18
Needs DH DHS S Servi vices Summa mmary
Physical S al Security IP S P Soft Target S Secu curity y Initiat ative Provides national leadership on technology, standards, and best practices to demonstrably reduce the risk of successful attacks on soft targets. Serves as a foundation for DHS-wide resources available to support the critical infrastructure community in securing soft targets. For m more i inf nformation, n, c cont ntact IP IP-SoftTargetSecurity@hq @hq.dhs hs.g .gov
Su Summar ary of
DHS S Service ces: s:
19
Needs DH DHS S Servi vices Summa mmary
Iden enti tify a and L Limit t Vulnerabi bili lities Assi ssist V Visit (A (AV) On-site engagement to inform and educate owners and
their facilities, and available Office of Infrastructure Protection (IP) and DHS resources. Infrastruct cture Survey T Tool ( (IST) T) Facilitated survey to identify and document critical infrastructure overall security and resilience, and provide information for protective measures planning and resource allocation. Hometown S Secu curity y Source for providing tools and resources to protect public-gathering venues.
Su Summar ary of
DHS S Service ces: s:
To learn more about our products and services, please visit https://www.dhs.gov/ecip and https://www.dhs.gov/hometown-security.
20
Needs DH DHS S Servi vices Summa mmary
Detect Network rk Threats Cybe ber T Threat H Hunting Utilizes advanced hunting capabilities to identify adversary presence in a network that evades traditional security controls. For
mor
information, c call (888 888) 282 282-0870 Enhance N Network rk Protectio ion Enhan anced C Cybe ber S Services (ECS CS) Intrusion prevention service to augment, not replace, existing cybersecurity capabilities. Leverages sensitive and classified cyber threat indicators to block malicious traffic from entering customer networks. Service
service providers, include:
For
mor
information, v vis isit www.d .dhs hs.g .gov/enha hanced-cyb cybersecurity-services
Su Summar ary of
DHS S Service ces: s:
21
Needs DH DHS S Servi vices Summa mmary
Cybe ber A Alerts a and Advisor
National al C Cybe ber A Awar areness Sys System (NCAS) S) Timely information about security topics and threats subscription to a mailing list. NCCIC provides current activity, alerts, bulletins, and security tips to stakeholders. For
mor
information, v vis isit www. w.us-cert/go gov/nc ncas Collab llabor
ation
Homela land S Security Infor
ation
Networ
(HSIN IN) The NCCIC portal provides stakeholders a platform to securely collaborate and share cybersecurity information, threat analysis and products within trusted communities
For
mor
information, c con
HSIN.O .Outreach@ h@hq hq.d .dhs.g s.gov Con
to
at https://au auth.dhs.gov/oam am/hsinlog login/HSINL NLogin
Su Summar ary of
DHS S Service ces: s:
22
Needs DH DHS S Servi vices Summa mmary
Analysi sis o s of Mali licious C Code Advanced M Malw lwar are Anal alysis C Center Provides 24/7 dynamic analyses of malicious code. Stakeholders submit samples via an online website and receive a technical document outlining the results of the analysis. Experts will detail recommendations for malware removal and recovery activities. This service can be performed in concert with Incident Response services, should the incident warrant the need. To s
malw lwar are f for a analy alysis, v visit www.ma .malware.u .us-cert.go gov Mitigat ation a and Recovery Incident Response Provides 24/7 intrusion analysis in response to a cyber incident Dispatches skilled personnel when a cyber incident occurs to assist in identifying malicious actors, technical analysis, containment, mitigation guidance, and post-incident recovery. Report t an i incident, t, a at www. w.us-cert.go gov/forms/repo port For
mor
information, v vis isit www www.us-cert.gov
Su Summar ary of
DHS Service ces: s:
23
warnings of cyber threats to SLTT governments.
an n el elec ections-specific threa eat warning c cen enter, t the E e Elec ection Infrastr tructu ture-ISAC
the E e EI-ISAC, C, go t
AC R Registration
For more information, visit https://www.cisecurity.org/ms-isac.
24
Glenn Sanders – DHS PSA Minnesota Glenn.Sanders@hq.dhs.gov Mike Christianson – DHS PSA Minnesota Michael.Christianson@hq.dhs.gov Tony Enriquez – DHS CSA – Region 5 Antonio.Enriquez@hq.dhs.gov
See also: https://www.dhs.gov/topic/election-security