Top Banner
FISMA 2.0: Continuous Monitoring Case Study Update John Streufert ( [email protected] ) Deputy Chief Information Officer for Information Security US Department of State February 14, 2011
24

FISMA 2.0: Continuous Monitoring Case Study Update · Continuous Monitoring Case Study ... continuously monitor the classified network to detect anomalies that would not otherwise

Jun 04, 2018

Download

Documents

phungkien
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: FISMA 2.0: Continuous Monitoring Case Study Update · Continuous Monitoring Case Study ... continuously monitor the classified network to detect anomalies that would not otherwise

FISMA 2.0:  Continuous Monitoring Case Study  Update

John Streufert  ( [email protected]

)Deputy Chief Information Officer for Information Security 

US Department of StateFebruary 14,  2011

Page 2: FISMA 2.0: Continuous Monitoring Case Study Update · Continuous Monitoring Case Study ... continuously monitor the classified network to detect anomalies that would not otherwise

Nature of Attacks 

80% of attacks leverage  known vulnerabilities and  configuration management  setting weaknesses

2

Page 3: FISMA 2.0: Continuous Monitoring Case Study Update · Continuous Monitoring Case Study ... continuously monitor the classified network to detect anomalies that would not otherwise

TICKET S

TYPEThreats Further Escalate 

Year Tickets

2008 2104

2009 3085

2010 7,998 

2%

1

51%

5%

39%

1%

2%

9%

9%

2%

2008

2010

84%

Page 4: FISMA 2.0: Continuous Monitoring Case Study Update · Continuous Monitoring Case Study ... continuously monitor the classified network to detect anomalies that would not otherwise
Page 5: FISMA 2.0: Continuous Monitoring Case Study Update · Continuous Monitoring Case Study ... continuously monitor the classified network to detect anomalies that would not otherwise

5

Page 6: FISMA 2.0: Continuous Monitoring Case Study Update · Continuous Monitoring Case Study ... continuously monitor the classified network to detect anomalies that would not otherwise
Page 7: FISMA 2.0: Continuous Monitoring Case Study Update · Continuous Monitoring Case Study ... continuously monitor the classified network to detect anomalies that would not otherwise

7

Page 8: FISMA 2.0: Continuous Monitoring Case Study Update · Continuous Monitoring Case Study ... continuously monitor the classified network to detect anomalies that would not otherwise

Continuous C&A 2.0a.Once in 3 year study of 110 technical, 

managerial and operational controls  (NIST 800‐53)

– 25‐2000 pages; $30K ‐

$+2.5M

Library cost: $130M in 6 years• 95,000 pages @ $1400 per page

Changes:  150 ‐

200 a week; • 24,000 programs changed in 3 years 

8

ROI?

Page 9: FISMA 2.0: Continuous Monitoring Case Study Update · Continuous Monitoring Case Study ... continuously monitor the classified network to detect anomalies that would not otherwise

Objectives:

9

Page 10: FISMA 2.0: Continuous Monitoring Case Study Update · Continuous Monitoring Case Study ... continuously monitor the classified network to detect anomalies that would not otherwise

Results First 12 Months

0.0

200.0

400.0

600.0

800.0

1,000.0

1,200.0

6/1/2008 7/21/2008 9/9/2008 10/29/2008 12/18/2008 2/6/2009 3/28/2009 5/17/2009 7/6/2009 8/25/2009

Domestic Sites

Foreign Sites

89% Reduction

90% Reduction

10

Personal Computers and Servers

Page 11: FISMA 2.0: Continuous Monitoring Case Study Update · Continuous Monitoring Case Study ... continuously monitor the classified network to detect anomalies that would not otherwise

Status today

11

16  points 

perdevice

Page 12: FISMA 2.0: Continuous Monitoring Case Study Update · Continuous Monitoring Case Study ... continuously monitor the classified network to detect anomalies that would not otherwise

2nd Year by the

Numbers

Page 13: FISMA 2.0: Continuous Monitoring Case Study Update · Continuous Monitoring Case Study ... continuously monitor the classified network to detect anomalies that would not otherwise

1325366093133

Page 14: FISMA 2.0: Continuous Monitoring Case Study Update · Continuous Monitoring Case Study ... continuously monitor the classified network to detect anomalies that would not otherwise

1/3 of Remaining Risk  Removed

14

[Year 2:  PC’s/Servers]

Page 15: FISMA 2.0: Continuous Monitoring Case Study Update · Continuous Monitoring Case Study ... continuously monitor the classified network to detect anomalies that would not otherwise

15

Page 16: FISMA 2.0: Continuous Monitoring Case Study Update · Continuous Monitoring Case Study ... continuously monitor the classified network to detect anomalies that would not otherwise

Operation Aurora Attack

16

Call a Problem 40x Worse

Page 17: FISMA 2.0: Continuous Monitoring Case Study Update · Continuous Monitoring Case Study ... continuously monitor the classified network to detect anomalies that would not otherwise

17

.

when charging 40 points0 ‐

84% in seven (7) days

0 ‐

93% in 30 days

Page 18: FISMA 2.0: Continuous Monitoring Case Study Update · Continuous Monitoring Case Study ... continuously monitor the classified network to detect anomalies that would not otherwise

18

Page 19: FISMA 2.0: Continuous Monitoring Case Study Update · Continuous Monitoring Case Study ... continuously monitor the classified network to detect anomalies that would not otherwise

Brody’s Best 5 

1.

Know boundaries of the enterprise 

2.

Devices on the network 

3.

Configurations Settings

Are:

Checked every 36‐72 hours (PC’s

and Servers)

Assigned to 1 of 400+ teams for remediation

Patching coverage 0‐84% in 7 days

Page 20: FISMA 2.0: Continuous Monitoring Case Study Update · Continuous Monitoring Case Study ... continuously monitor the classified network to detect anomalies that would not otherwise

Brody’s Best 5 4.  Who is accessing the systems; 5.What those individuals are doing when 

accessing those systemsSystem users or incidents are:

– Recorded in logs and access control lists– Continuously assessed for intrusions– Watched for data exfiltration– Penalized for violations– Trained annually and tested daily for rules in 6 mo– Monitored for elevated privileges (improved in 6 

months)

Page 21: FISMA 2.0: Continuous Monitoring Case Study Update · Continuous Monitoring Case Study ... continuously monitor the classified network to detect anomalies that would not otherwise

Insider threat

“The Department has continued to work on the  deployment of an automated tool that will 

continuously monitor the classified network  to detect anomalies that would not otherwise 

be apparent.”

Page 22: FISMA 2.0: Continuous Monitoring Case Study Update · Continuous Monitoring Case Study ... continuously monitor the classified network to detect anomalies that would not otherwise

20 Year old commercial said

“The quality goes in, before the name goes on”

22

Page 23: FISMA 2.0: Continuous Monitoring Case Study Update · Continuous Monitoring Case Study ... continuously monitor the classified network to detect anomalies that would not otherwise

23

Page 24: FISMA 2.0: Continuous Monitoring Case Study Update · Continuous Monitoring Case Study ... continuously monitor the classified network to detect anomalies that would not otherwise

Conclusions• Risk Scoring and Continuous Monitoring is 

scalable to large complex public and private  sector organizations

• Higher ROI for continuous monitoring of  technical controls as a substitute for paper 

reports

• Summarized risk estimates could be fed to  enterprise level reporting

24