integration spiral results
play

Integration Spiral Results Wende Peters, JH-APL - PowerPoint PPT Presentation

Integrated Adaptive Cyber Defense: Integration Spiral Results Wende Peters, JH-APL wende.peters@jhuapl.edu iacd@jhuapl.edu September 2015 Integrated Adaptive Cyber Defense Cybersecurity Reality in the Greater Cyber Ecosystem We arent


  1. Integrated Adaptive Cyber Defense: Integration Spiral Results Wende Peters, JH-APL wende.peters@jhuapl.edu iacd@jhuapl.edu September 2015 Integrated Adaptive Cyber Defense

  2. Cybersecurity Reality in the Greater Cyber Ecosystem We aren’t controlling the space or the outcomes Source: Verizon 2014 Data Breach Investigation Report Source: M-Trends 2015: A View From the Front Lines, FireEye/Mandiant We’re getting worse at this 2 Integrated Adaptive Cyber Defense

  3. What Does Success Look Like? Secure integration and automation across a diverse, changeable array of cyber defense capabilities DOD CIKR Private Sector SLTT Fed/Civ Sector Coordinate National-level operations National and support cross-enterprise cyber response Enable collaborative, ‘beyond -line- Regional of- sight’ defense Local Enable participants to defend themselves 3 Integrated Adaptive Cyber Defense

  4. What Does Success Look Like? Secure integration and automation across a diverse, changeable array of cyber defense capabilities • Dramatically change timeline and effectiveness • Enable consistent effects in cyber-relevant time • Provide operational and acquisition freedom to take advantage of advances • Support use of existing and emerging standards to enable commercial-based solutions • Ensure control and action that can be achieved under network owners’ authorities and capabilities Integrated Adaptive Cyber Defense (IACD) is our initiative to address these challenges 4 Integrated Adaptive Cyber Defense

  5. IACD Spiral Approach Using an Agile Approach – Requirements and Capability Elicitation and Efficiency and Security Improvement Demonstration 0 Make it Real IACD Spirals 1 Heterogeneity, Scalability and Auto-Indicator Sharing 2 Risk- and Mission-based Decision Complexity Robust Controls for COA Sharing 3 Today 4 Message Fabric Integration and Trust-based Access 5 Integrated Adaptive Cyber Defense

  6. First: Every Defender Brings Their Own Enterprise Their own profile, priorities, capabilities, and risk tolerance Perimeter/Boundary Protections How do we maximize Email Guard Deep Malicious Web IDS/ Trusted Packet Behavior Content the effectiveness of our IPS Sensors Email Content Inspection Prediction Filtering Filtering current and future Repositories cyber defense and Analytic Clouds capabilities? Network/Infrastructure Protections Big Data Discovery SIEM Behavior Malicious NIDS/ Malware Based Behavior Predictive NIPS Detonation Detection Prediction Analytics How do we Host-based Protections interconnect our Continuous Human Behavior capabilities to ‘ move HIDS/ Malware App Monitoring// Input Based HIPS Detonation Whitelisting Cont Diag & left of boom ’? Detection Mitigations 6 Integrated Adaptive Cyber Defense

  7. Challenge: Integrate and Automate Across What They Bring Perimeter/Boundary Protections Email Guard Deep Malicious Web ACTING IDS/ Trusted Packet Behavior Content IPS Sensors Email Content Inspection Prediction Filtering Filtering Repositories and Analytic Clouds DECISION- Network/Infrastructure Protections Big Data MAKING Discovery SIEM Behavior Malicious NIDS/ Malware Based Behavior Predictive NIPS Detonation Detection Prediction Analytics SENSE-MAKING Host-based Protections SENSING Continuous Human Behavior HIDS/ Malware App Monitoring// Input Based HIPS Detonation Whitelisting Cont Diag & Detection Mitigations 7 Integrated Adaptive Cyber Defense

  8. IACD Functionality Inside the Enterprise • What core interoperable, flexible Presentation and Ops Services Presentation and Ops Services services need to exist to integrate and Visualization automate across our defenses? Analytics/Workflow Development • What will it take to create, manage, and Management Interface control this integration Response Actuator IFs • What content needs to be available and Actions Boundary Orchestration, Management Response Protections exchangeable? Controllers Control, Secure COAs Repositories Bus Rules DM Engine Network • How will we interconnect the capabilities Protections inside the enterprises? SM Analytic Analytics Framework Host Protections Data Feeds • Will performance or security drive Sensing I/F separate control needs? Services Defense Services Content • What tools must be provided to the Control Message Infrastructure analysts and operators? Information Sharing Infrastructure • What trust, identity, and security needs Sharing Infrastructure to be in place to assure mission? Trust Services: Security, Identity, Access Control 8 Integrated Adaptive Cyber Defense

  9. IACD Functionality Across/Among Diverse Enterprises National/Global: NCCIC, GEOC, National Cyber Centers v IACD/EASE Control Channel v Regional: Sectors, EOCs, Communities v IACD/EASE Control Channel v v v v Local: Enterprise, D/A, CIKR, B/P/C 9 Integrated Adaptive Cyber Defense

  10. Agile Approach to Capability Demonstration and Requirements/Standards Elicitation For each 90 day spiral, focus on some subset of target IACD capabilities – Within a single enterprise or across multiple enterprises with multiple roles Integrated Adaptive Cyber Defense

  11. Agile Approach to Capability Demonstration and Requirements/Standards Elicitation IACD Activity Scope IACD Use Cases Defend-the-Enterprise - Local Integration & Automation Compliance Checking/Auto-remediation Auto-enrichment/Decision Support Trusted Automated Information Sharing Reputation-based Decision Trusted Integrated Response Actions Detect/mitigate Vulnerabilities IACD Participant Scope Detect/mitigate Malware Fed/Civ Departments/Agencies Behavior-based Indications DOD Cross-enterprise Tipping Law Enforcement Automated Indicator Sharing Inter-Agency CIKR Low-Profile Response Private Sector Partners Regeneration Foreign Partners Rollback/Restoration SLTT Partners Ensure coverage of the operational space, including types of missions, user roles and authorities, and desired use cases Integrated Adaptive Cyber Defense

  12. Federated Innovation, Integration & Research Environment for IACD Spirals Reputation Sources Internet Virtualized Internet National Element Enterprise 1 Enterprise 2 Enterprise 3 Enterprise 4 Integrated Adaptive Cyber Defense

  13. Spiral 0 Emphasis: Orchestration and Automation Intra-Enterprise COA Auto-enrichment Auto-Response Decision Increasing speed of assessment, efficient use of limited analyst resources 13 Integrated Adaptive Cyber Defense

  14. Spiral 1 Emphasis: Indicator Sharing and Auto-Response Across Communities of Trust Auto-Indicator Auto- COA Auto-Response Decision Ingest enrichment Auto-Response Auto- COA enrichment Decision Auto-Indicator Sharing IACD-informed Scale across multiple, Auto-Indicator Auto- COA Human-in-loop Recomm Ingest enrichment heterogeneous environments Response Distributed use of advanced solutions 14 Integrated Adaptive Cyber Defense

  15. Spiral 2 Emphasis: Risk- and Mission-based Decision Complexity Indicator Auto- Auto- Auto- COA Indicator Indicator Decision Assessment Response Ingest Indicator 15 Integrated Adaptive Cyber Defense

  16. Spiral 2 Emphasis: Risk- and Mission-based Decision Complexity Auto-Indicator Auto- COA Auto-Response Decision Ingest enrichment Auto-Response Auto- COA Auto- Auto- Auto- enrichment COA Decision Indicator Decision enrichment Response Auto-Indicator Ingest Sharing IACD-informed Auto-Indicator Auto- COA Human-in-loop Recomm Ingest enrichment Response 16 Integrated Adaptive Cyber Defense

  17. IACD FIIRE Configuration Reputation Sources Enterprise 1 Internet Virtualized Internet National Element Represents a ‘security power user’ type enterprise with multiple security products Infrastructure Subnet • Orchestration • Domain Controller • MS Exchange • File Detonation Enterprise 1 Enterprise 2 Enterprise 3 Operations Subnet • Application User VMs (x20) Whitelisting Human Resources Subnet • AV/Host IPS User VMs (x20) • Firewall Logs • Netflow T raffic Research & Development Subnet • Indicator Storage User VMs (x20) IT Subnet • Indicator Sharing User VMs (x20) DIB Member Small CIKR/ Bus DOD 17 Integrated Adaptive Cyber Defense

  18. IACD FIIRE Configuration Reputation Sources Internet Virtualized Internet National Element Enterprise 2 Represents a smaller, cost- sensitive enterprise utilizing open source solutions Infrastructure Subnet Enterprise 1 • Enterprise 2 Enterprise 3 Orchestration • Domain Controller • IDS • MS Exchange Operations Subnet • Web Traffic Analysis User VMs (x20) • Netflow Human Resources Subnet • File Retrieval User VMs (x20) • Firewall Logs Research & Development Subnet • Netflow T raffic • Indicator Storage User VMs (x20) DIB Member • Ticketing Small CIKR/ Bus DOD IT Subnet • Indicator Sharing User VMs (x20) 18 Integrated Adaptive Cyber Defense

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend