Funded by the U.S. Department of Energy and the U.S. Department of Homeland Security | cred-c.org
Summary of Breakout Sessions
and Wrap-up Discussion
CREDC Industry Workshop March 27-29, 2017
Summary of Breakout Sessions and Wrap-up Discussion CREDC Industry - - PowerPoint PPT Presentation
Summary of Breakout Sessions and Wrap-up Discussion CREDC Industry Workshop March 27-29, 2017 Funded by the U.S. Department of Energy and the U.S. Department of Homeland Security | cred-c.org Breakout Topics Cyber Supply Chain Provenance
Funded by the U.S. Department of Energy and the U.S. Department of Homeland Security | cred-c.org
CREDC Industry Workshop March 27-29, 2017
Cyber Supply Chain Provenance and Protection – Dennis Gammel, SEL Engineering Secure EDS – Zach Tudor, Idaho National Lab PKI in Current and Emerging EDS – Sean Smith, Dartmouth College
Funded by the U.S. Department of Energy and the U.S. Department of Homeland Security | cred-c.org
CREDC Industry Workshop March 27-29, 2017
Research Develop Manufacture Integrate Service Monitor
Delivery
Cyber Supply Chain Provenance and Protection – Dennis Gammel, SEL Engineering Secure EDS – Zach Tudor, Idaho National Lab PKI in Current and Emerging EDS – Sean Smith, Dartmouth College
Funded by the U.S. Department of Energy and the U.S. Department of Homeland Security | cred-c.org
Zach Tudor, INL Tim Yardley, Illinois CREDC Industry Workshop March 27-29, 2017
invention?
business)
ground
to understand as the inject vector is physical proximity, not varied like cyber is
connectivity to the system
to its deployment in a particular domain
needs to be two approaches (and they would need to be complementary)
“design tools” that assist you in designing the systems based on particular constraints
Cyber Supply Chain Provenance and Protection – Dennis Gammel, SEL Engineering Secure EDS – Zach Tudor, Idaho National Lab PKI in Current and Emerging EDS – Sean Smith, Dartmouth College
Funded by the U.S. Department of Energy and the U.S. Department of Homeland Security | cred-c.org
Breakout Session Summary:
Sean Smith, Dartmouth College www.cs.dartmouth.edu/~sws/ Scribe: Prashant Anantharaman, Dartmouth College CREDC Industry Workshop March 29, 2017
cred-c.org | 20
cred-c.org | 21
(Smith and Marchesini, The Craft of System Security)
cred-c.org | 22
(Smith and Marchesini, The Craft of System Security)
cred-c.org | 23
for everyone” always work?
the relying party all they need to know?
always be fairly static hub-and-spoke?
talked to before.
modular math
crypto?
revocation/path discovery/etc
cred-c.org | 24
for everyone” always work?
the relying party all they need to know?
always be fairly static hub-and-spoke?
talked to before.
modular math
crypto?
revocation/path discovery/etc
cred-c.org | 25
hub-and-spoke”?
handle it?)
more than one administrative domain
do what the human operators did
networks)
vendors?)
independent?
EDS
cred-c.org | 26
information?
protected physical perimeter?
be protected?
buildings
do want decentralized/remote…
reduce risk of bad messages?
setting commands
compresses
cred-c.org | 27
Sean Smith, sws@cs.dartmouth.edu
Funded by the U.S. Department of Energy and the U.S. Department of Homeland Security