1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Update September 29, 2015
Dec 13, 2015
11
Cybersecurity : Optimal Approach for PSAPs
FCC Task Force on Optimal PSAP ArchitectureWorking Group 1 Update
September 29, 2015
22
Presentation Outline: Status Report
Draft Report StructureExecutive SummaryPSAP OverviewFederal Role and existing work in CyberPSAPs: Cybersecurity Plan For The FutureUse CasesBest Practices
Questions or Discussion
FCC Task Force on Optimal PSAP Architecture
33
Section 1: Overview of PSAP Environment
PSAP– CyberSecurity Today
Governance
Access Control
Security Controls
Internal network security and monitoring
Network entry point security
FCC Task Force on Optimal PSAP Architecture
44
Section 2: Federal Role and Existing WorkU.S. Department of Commerce
NIST: Cybersecurity Framework NIST: Cyber Physical Systems- Public Work Group Report
Relationship To PSAPs: Identify, Protect, Detect, Respond, Recover NIST/NICE Workforce Framework
Relationship of occupational specialties to PSAPs Define any new/missing occupational specialties Consider Cyber Professional Best Practices for PSAP workforce
FCC Task Force on Optimal PSAP Architecture
55
Section 2: Federal Role and Existing WorkDepartment of Homeland Security
Critical Infrastructure Cyber Community Voluntary Program (C3VP) Critical Infrastructure Cyber Information Sharing and Collaboration Program (CISCP) Cyber Reports & Recommendations Cybersecurity Products & Solutions:
Continuous Diagnostics and Mitigation (CDM) Intrusion detection sensors (IDS) Intrusion prevention sensors (IPS) Trusted Internet Connection (TIC)
National Cybersecurity and Communications Integration Center (NCCIC) NCCIC/National Coordinating Center for Communications (NCC) NCCIC/United States Computer Emergency Readiness Team (US-CERT)
FCC Task Force on Optimal PSAP Architecture
66
Section 2: Federal Role and Existing WorkGeneral Services Administration• Identity Credentialing Access Management (ICAM)• NIST Special Publication 800-63-2• FICAM Roadmap and Implementation Guidance• Identity Management• Credential Management• Access Management• ICAM Intersection• ICAM Goals and Objectives
FCC Task Force on Optimal PSAP Architecture
77
Section 3 PSAP: Cybersecurity Plan For The FutureEvaluation and Recommendations on:
Emergency Communications Cybersecurity Center (EC3)
Intrusion Detection and Prevention Systems (IDPS)
IDPS in NG9-1-1 environment
FCC Task Force on Optimal PSAP Architecture
88
FCC Task Force on Optimal PSAP Architecture
99
FCC Task Force on Optimal PSAP Architecture
1010
Section 3 PSAP: Cybersecurity Plan For The Future
PSAPs: Funding The Cybersecurity PlanFederal Funding OpportunitiesPartnerships
PSAP Cybersecurity Checklist
PSAP Cybersecurity Roadmap
FCC Task Force on Optimal PSAP Architecture
1111
Appendix A- PSAP: Cybersecurity Use Cases
Specific Use Cases Addressing: TDoS DDoS SWATTING Single PSAP Compromised, Need exists to protect Interconnected PSAPs Data Hijacked PSAP Network Compromised
FCC Task Force on Optimal PSAP Architecture
1212
Appendix B: Cybersecurity Best Practices for PSAPs
Analysis & Findings of FCC CSRIC Best Practices
Recommendations for development of 911/PSAP specific Cybersecurity Best Practices
FCC Task Force on Optimal PSAP Architecture
1313
FCC Task Force on Optimal PSAP Architecture
Questions / Discussion