© Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam 2018
Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams and Abdul AslamEnterprise Cybersecurity Study Guidehttps://doi.org/10.1007/978-1-4842-3258-3_2

2. Meeting the Cybersecurity Challenge

Scott E. Donaldson, Stanley G. Siegel2, Chris K. Williams3 and Abdul Aslam3
(1)
Falls Church, Virginia, USA
(2)
Potomac, Maryland, USA
(3)
San Diego, California, USA
 

Overview

  • This chapter describes
    • how an enterprise successfully defends itself against cyberattacks;
    • the challenges in building an effective cyberdefense;
    • some of the current major approaches to address these challenges;
    • some of the difficulties with these approaches; and
    • a different technique for dealing with these challenges.
  • What makes up an effective enterpris e cybersecurity program?
    • Not just about technology
    • Not just about defenses
    • Not just about compliance frameworks, checklists, or simply a passing grade on an audit
  • The graphic depicts a combination of factors required to protect an enterprise.
    A458720_1_En_2_Figa_HTML.jpg
  • An effective enterprise cybersecurity program protects the enterprise in a cost-effective manner that balances technology, processes, people, organization, budgets and external compliance requirements, all while supporting the business mission as much as possible.
  • People, organization, and budgets are the foundation of a successful cybersecurity program.
    • Everything begins with people because they make the program succeed or fail.
    • CISO organizes cybersecurity people so individuals and teams clearly understand their responsibilities.
      • Control Objectives for Information and Related Technology (COBIT)
      • Information Technology Infrastructure Library (ITIL)
      • Responsible, Accountable, Consulted, and Informed (RACI)
    • CISO makes the business case for the cybersecurity budget; if an enterprise does not fund cybersecurity, then it is not important.
  • Processes and technologies work together, but they can also be opposed to each other.
    • Deployed processes should account for how technology is going to be (re-)configured.
      • Processes deployed without technology seldom endure.
      A458720_1_En_2_Figb_HTML.jpg
    • Deployed technology should account for how people are going to operate it.
      • Technology deployed without processes seldom stays working for long.
  • Compliance requirements are a double-edged sword.
    • Requirement: There is external validation that security measures are in place and working.
    • Reality: There is only a loose connection between compliance and security.
    • Compliance is good, but must not be the only cyberdefense objective.

Topics

  • Cybersecurity Frameworks
  • The Cybersecurity Process
  • Cybersecurity Challenges
  • The Risk Management Process
  • Cybersecurity Controls
  • Cybersecurity Capabilities
  • Cybersecurity and Enterprise IT
  • An Enterprise Cybersecurity Architecture

Cybersecurity Frameworks

Representative Frameworks

  • There are a number of excellent cybersecurity frameworks that
    • provide a methodology for talking about cybersecurity; and
    • help ensure important elements of protection and defense are considered for incorporation into an enterprise’s cybersecurity efforts.
      A458720_1_En_2_Figc_HTML.jpg

Commonalities of Cybersecurity Frameworks

  • Functional Areas
    • Frameworks divide the enterprise and its protection into a number of functional areas (also known as domains, families, control areas, and control objectives).
    • Generally, there are between 10 and 20 functional areas.
  • Risk Management
    • Allows enterprise to identify what protections are needed.
    • Based on an objective evaluation of its assets, threat s against those assets, vulnerabilities in the protection of those assets, and risks resulting from the threats being analyzed against vulnerabilities.
    • Considers risk mitigations, either reducing risk probability or risk severity.
  • Security Controls
    • Purpose is to reduce the probability or the severity of a risk.
    • Some security controls can also serve to detect the exploitation of the risk or to collect forensic data to support later investigations.
  • Mechanism for Audits, Evaluations, and Validations
    • Mechanism helps to determine the presence or absence of controls described in the framework.
    • Sometimes mechanism is done through documented standards for evaluation.
    • Sometimes mechanism is done through checklists for auditing.
    • Many frameworks contain evaluation guidance.

The Cybersecurity Process

  • Major frameworks contain some method of a cybersecurity process that practitioners can use to implement their organization’s cybersecurity program.
  • The graphic depicts the National Institute of Standards and Technology (NIST) process .1
    • It is one of the more comprehensive documented processes for implementing an enterprise cybersecurity program .
    • It is freely available.
    • Each process step lists corresponding references that provide additional detail and guidance.
      A458720_1_En_2_Figd_HTML.jpg
  • Step 1—Categorizes the information systems according to the “potential impact of loss”
  • Step 2—Selects the security controls for each information system
  • Step 3—Implements the security controls and security configurations for enterprise systems
  • Step 4—Assesses the security controls to ensure controls
    • Were implemented correctly
    • Operate as intended
    • Meet the security objectives and requirements
  • Step 5—Authorizes the information systems for operation based on
    • Validation of the security controls
    • An overall risk assessment considering the benefits of the system against its potential risks
  • Step 6—Monitors the security controls to ensure they remain effective over time
    A458720_1_En_2_Fige_HTML.jpg
  • CNNS Instruction 1253: Security Categorization and Control Selection for National Security Systems
  • FIPS 199: Standards for Security Categorization of Federal Information and Information Systems
  • SP 800-60: Guide for Mapping Types of Information and Information Systems to Security Categories
  • FIPS 200: Minimum Security Requirement for Federal Information Systems
  • SP 800-53: Security and Privacy Controls for Federal Information Systems and Organizations
  • SP 800-160: Systems Security Engineering
  • SP 800-53A: Guide for Assessing the Security Controls in Federal Information Systems and Organizations
  • SP 800-37: Guide for the Security Certification and Accreditation of Federal Information
  • SP 800-137: Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations

Cybersecurity Challenges

NIST Special Publication 800-53 Revision 42

  • 1 st Challenge— Scalability
    • The six-step process is fine for a single computer, but what happens when a single IT system has a hundred computers in it?
    • How is a single systems administrator, who is trying to get everything set up, going to get all the paperwork done, especially when that person is already over budget and behind schedule on the deployment project?
    • Often, the security process languishes until management ends up exempting the security process simply to get things operational in time.
    • The cybersecurity industry needs a streamlined security process that
      • actually gets implemented, especially for modern, complex IT environments; and
      • abstracts the security process above the level of single computers and single servers to “systems” and “systems of systems.”
  • 2 nd Challenge—Judgment Calls
    • How does an enterprise select which controls are appropriate?
    • How does an enterprise determine what is good enough?
    • Many people may agree to
      • protect IT systems against unknown, but anticipated, attacks; and
      • anticipate how attackers are going to operate.
    • However, frameworks give the industry little or no guidance on what to do to achieve protection.
      • Frameworks provide a “kitchen sink” approach where the smallest and least critical system is required to have the most onerous of security controls applied to it … don’t want to skimp on security.
      • Often, these controls are arbitrarily applied and then incompletely implemented.
        • Produces crucial control protection gaps
        • Hard to identify, prioritize, and remediate gaps
  • 3 rd Challenge—Detective Controls
    • There is significant effort describing control measures to prevent attacks from being successful.
    • There is relatively little effort talking about detecting and responding to attacks when they occur.
    • Preventive controls are good, but they will not actually stop a determined attack.
      • It is like having a good lock on your doors.
      • A determined attacker will spend about five minutes playing with the lock, and then simply go and break a window.
    • Greater attention needs to be paid to what happens after the window has been broken, instead of simply installing all of the different types of locks that can be put on the door.
  • 4 th Challenge—Security Operations
    • Control monitoring addresses some security operations aspects.
    • The primary process focuses on maintaining preventive controls, not monitoring detective controls to catch attacks in real time.
    • At the time of writing, a few mainstream frameworks focus on security operations to
      • monitor security controls;
      • capture events;
      • detect incidents;
      • investigate those incidents; and
      • respond to incidents and repel the attackers.
    • Recognizing the importance of monitoring and detective controls is a transition that is still “in progress” for major frameworks.
  • 5 th Challenge—Unfulfillable Requirements
    • Security control frameworks frequently place requirements on products and technologies that simply “cannot be fulfilled.”
    • Meetings with product vendors often result with hemming and hawing about how the product “can” be placed into a secure configuration, which may result in useful features being disabled.
    • Cybersecurity personnel then conduct investigations of third-party products to address the gap by enhancing the original product with additional protections, logging, or monitoring features.
    • Investigation may find third-party products, but solutions may be overkill for the need, excessively complex to maintain, and unaffordable.
    • Finally, there will be an effort to negotiate the security requirement in order to do the paperwork to pass an audit.
    • Reality is the control is not effective as it needs to be.
  • General Comments
    • Mainstream security architectures represent an excellent body of work.
    • The five cybersecurity challenges presented leave room for some new ideas and a more pragmatic approach.

The Risk Management Process

  • The graphic depicts a simplified risk management process that can be adapted for specific enterprise needs.
  • The process involves a systematic analysis to determine
    • where an enterprise may have compromises;
    • consequences of those compromises; and
    • ways to reduce the probability or severity of those compromises.
    A458720_1_En_2_Figf_HTML.jpg
  • Assets
    • Personnel are people in the organization who bring their own knowledge and abilities.
    • Facilities are the locations where people work, along with their the tools and equipment.
    • Processes are the procedures whereby the organization operates and the systems it uses to accomplish its goals .
    • Information is the proprietary, customer, or business data held by the enterprise.
    • All assets must be protected.
      A458720_1_En_2_Figg_HTML.jpg
  • Vulnerabilities
    • Vulnerabilities are ways the assets can be compromised.
      • For example, a facility vulnerability may be where one side of the facility is adjacent to an abandoned building.
      • For example, a vulnerability for a business process may be that it relies on an extremely unreliable IT system.
    • IT systems vulnerabilities can be further characterized in terms of CIA:
      • Confidentiality protects the secrecy of data.
      • Integrity protects data from unauthorized changes.
      • Availability makes IT systems and the data the systems host available to those who need the data when it is needed.
  • Threats
    • Threats are ways in which vulnerabilities can be exploited to cause damage to the asset.
    • They can be natural or man-made, accidental or deliberate, random or deterministic.
    • Considering threats is one of the most creative steps in the process.
      • Involves a lot of Murphy’s Law thinking (What can possibly go wrong?)
      • Helpful to think about threats in terms of how they would affect the CIA of the enterprise’s information and information systems
      A458720_1_En_2_Figh_HTML.jpg
  • Risks
    • By combining vulnerabilities with threats, risks can be identified.
    • Threats against well -protected areas generally produce a low level of risk.
    • Threats against not-well-protected areas generally produce a risk that must be considered.
    • Identifying and evaluating risks is fundamentally a judgment call with challenges.
      • Underestimating a risk because vulnerability is underestimated
      • Missing a risk because a particular threat scenario is not considered
    • As will be discussed, identifying and evaluating risk challenges can be simplified by using security scopes to group risks and handle them in aggregate.
  • Risk Treatments
    • Avoid risk by eliminating the vulnerability or the threat.
    • Mitigate risk by reducing the probability that it will occur or the impact when it does occur.
    • Share the risk by introducing a third party—such as an insurance company—that will compensate the enterprise in the event the risk occurs.
    • Retain risk where the enterprise simply accepts the possibility the risk may occur and deals with consequences when they happen; self-insurance is a good example.
      A458720_1_En_2_Figi_HTML.jpg
  • Controls
    • Can reduce the probability the risk will occur or make it more difficult for attackers to execute on the risk
    • Can reduce the impact when the risk does occur, perhaps limiting the amount of damage that occurs
    • Can detect the occurrence of the risk happening
      • Allows for active responses to contain the damage
      • Helps reduce the potential exposure
    • Can collect evidence
      • Shows the operation of security controls
      • Detects failures of the controls
      • Supports investigations after an incident has occurred

Vulnerabilities, Threats, and Risks

  • The graphic depicts the next level of detail of the risk management process.
    • Note that the CIA factors span vulnerabilities, threats, and risks.
  • For information assets, the enterprise should consider vulnerabilities, threats, and risks in terms of the CIA factors, rather than considering each one separately.
  • Confidentiality is the protection of data that should be access-controlled and not widely disseminated.
    • What vulnerabilities are there?
    • How can confidentiality be breached?
    • What would be the resulting data loss?
    • What threats (accidental or deliberate) could cause data loss?
    • When combining vulnerabilities and threats, what are the risks regarding confidentiality?
      A458720_1_En_2_Figj_HTML.jpg
  • Integrity involves data being consistent from the time it is entered into a system to the time it is later retrieved.
    • Does not sound very interesting, except when the data being modified is about money or a transaction involving money
      A458720_1_En_2_Figjj_HTML.jpg
    • Risk analysis surrounding integrity identifies
      • where integrity is important;
      • consequences of an integrity violation; and
      • threats that could result in those consequences
  • Availability involves information and information systems being available when needed. Threats to availability include the following:
    • Systems being temporarily unavailable, but otherwise unimpaired
    • Systems being completely destroyed or corrupted beyond recovery
    • Generally, availability concerns are driven by business considerations of negative financial impacts vs. availability maintenance and recovery costs

Risk Analysis and Mitigation

Reducing the Probability and/or Impact of an Incident

A458720_1_En_2_Figk_HTML.jpg
  • Once the CIA risks have been identified, risk mitigation can be considered and often gets the most attention of the risk treatments.
  • Risk analysis is needed before risk mitigation can be implemented.
  • Risk is characterized in terms of magnitude— high, medium, or low.
    • Can be broken out into more gradations
    • Can be broken into a numeric scale
    • Can be thought of in terms of probability of occurring and the impact if the risk occurs
  • The simplified risk matrix above shows how the probability and impact of an incident combine to generate an overall risk level.
    A458720_1_En_2_Figkk_HTML.jpg
    • If probability and impact are both high, then the overall risk level is probably also high.
    • If the probability and impact are both low, then the overall risk level is probably also low.
    • If the probability of risk is low, but the impact is high, the overall risk level is most likely medium.
    • If the probability of risk is high, but the impact is low, the overall risk is most likely medium.

Cybersecurity Controls

Context

  • Controls help mitigate enterprise confidentiality, integrity, or availability risks.
    • Reduce risk probability and risk impact
    • Detect occurrences of incidents involving the risk
    • Collect evidence to support evaluations and incident investigations related to the risk
  • This study guide defines a security control as “consisting of security capabilities or audit activities that are applied to an IT system or business process to prevent, detect, or investigate specific activities that are undesirable, and respond to those activities when they occur.”
    A458720_1_En_2_Figl_HTML.jpg
  • The graphic shows types of cybersecurity controls.
    • Preventive Controls: Block the threat and prevent incidents from occurring altogether
    • Detective Controls: Detect when the risk has transpired and generate alerts that can then be acted upon
    • Forensic Controls : Collect records of activities related to the risk; can be used to produce artifacts to support the operation of detective controls, investigations of incidents, and audits of controls to verify their operation and effectiveness
    • Audit Controls: Investigate for the presence of the risk, incidents associated with the risk, and the operation of controls that mitigate the risk
  • Traditionally, enterprises have given disproportional consideration to preventive controls—for example, firewalls that block unwanted protocols—at the expense of other controls.
  • However, modern threats such as Advanced Persistent Threats (APTs) are designed to get around preventive controls and turn the enterprise against itself.
  • Responding to threats of APT attacks by enacting more and more preventive controls can bring about its own set of problems.
    A458720_1_En_2_Figz_HTML.jpg
  • The graphic compares the security control types by showing how each type of control represents a trade-off among multiple factors including cost of deployment, operation, and impact on continuing operations.
  • Preventive Cybersecurity Controls
    • Get lots of attention because they block attacks and incidents—preventing successful attacks
    • Unless configured in conjunction with corresponding detective controls, not generally good at detecting attacks
    • Can have a high operational impact (costs) because they may also prevent legitimate users from doing their jobs
      A458720_1_En_2_Figm_HTML.jpg
    • While generally inexpensive to operate once they are operational, can be expensive to implement because of their complexity
    • Can be difficult to modify in response to rapidly changing situations
  • Detective Cybersecurity Controls
    • Generally get shortchanged, but their importance is trending upward
    • Unlike preventive controls, cheap to implement and have little operational impact on the enterprise
    • Can be expensive to operate as alerts have to be investigated
    • Can be significantly less expensive overall than the lost productivity from aggressive preventive controls
    • Essentially is cheaper overall to allow people do whatever they want, alert them when they do wrong, and then deal with it
      • A real-world analogy is law enforcement trying to prevent crimes.
      • Only a small range of potential crimes are actively prevented.
      • Law enforcement is aggressive in pursuing and punishing crimes after they actually occur.
      A458720_1_En_2_Fign_HTML.jpg
  • Forensic Cybersecurity Controls
    • Not very good at actively detecting or blocking attacks
    • Absolutely critical to investigating attacks successfully after they have occurred
    • Relatively cheap to operate once they are in place
    • Provide economical way to implement parts of the security equation without significant investments
  • Audit Cybersecurity Controls
    • Almost the exact opposite of preventive controls
      • Preventive controls are effective at stopping attacks, albeit with considerable operational impact.
      • Audit controls have almost no operational impact, but they also don’t stop much in the way of attacks.
    • Low-cost, unobtrusive, and agile
    • Frequently the only way to find attacks that have defeated the preventive controls
    • Not “exotic” but deserve respect and consideration in an enterprise’s security architecture
    • A simple audit can often find problems that have been lurking for months or years, despite all the other controls
      A458720_1_En_2_Figo_HTML.jpg
  • General Comments
    • The graphic provides a partial list of evaluation factors to consider.
    • When looking at security technologies, it is useful to evaluate them
      • in terms of what types of control functionality they primarily provide; and
      • to understand how the different control objectives are going to be achieved.
    • Ideally, all four control types are designed and operated in parallel, thus supporting each other.

Cybersecurity Capabilities

  • NIST describes the idea of security capability as an abstraction.3
    • “Security capabilities can address a variety of areas that can include, for example, technical means, physical means, procedural means, or any combination thereof …”
    • “It is important for organizations to have the ability to describe key security capabilities needed to protect core organizational missions/business functions …”
    • “This [security capability construct] simplifies how the protection problem is viewed conceptually …”
    • “In essence, using the construct of security capability provides a shorthand method of grouping security controls that are employed for a common purpose or to achieve a common objective …”
    • “This [security capability construct] becomes an important consideration, for example, when assessing security controls for effectiveness …”
  • This study guide defines, in part, a security capability as “a process or technology that enables the organization to perform a specific security control.”
    • For example, a firewall capability makes it possible to implement
      • preventive controls for network access control;
      • detective controls for network traffic alerting;
      • forensic controls for network traffic logging; and
      • audit controls for validating network security and looking for intrusions.
  • An enterprise’s security capabilities , both procedural and technological, form the foundation for its cybersecurity program.
  • Security Capability
    • Is as simple as a person following a procedure on a set schedule or in response to a predefined event
    • Is as complex as a sophisticated technology component that spans the enterprise and provides many features in support of many different controls
    • Can be further defined, in part, as “providing for the auditing, logging, detection, or prevention of a particular type of malicious behavior”
    • Can be either procedural or technological
  • Procedural Security Capabilities
    • Are capabilities that are delivered by having a person follow a procedure on a set schedule or in response to an action
    • Are most likely an enterprise’s most powerful capabilities
    • Don’t scale like a piece of technology due to the limits of human skills and abilities
    • Actual security against a professional attacker is almost entirely dependent on people, not technology
  • Technological Security Capabilities
    • Are provided by technologies that are installed into the enterprise’s infrastructure
    • May be provided by a single technology (“block” an attack and “alert” on attack)
    • May provide security capabilities across multiple functional areas
    • Are powerful because once they are deployed, they tend to “just work” (until they break or stop)
    • Involve “buying stuff” and deploy “neat technology”
    • Need to be engineered, deployed, managed, and monitored carefully to live up to their potential

Cybersecurity and Enterprise IT

Context

  • Regardless of the specific technologies, enterprise IT provides services to deliver information to support the business whether
    • the business is large or small;
    • services are delivered using mainframes, microcomputers, servers, or cloud services; or
    • information delivery is from a single room, over a private network, over dial-up terminals, or over the Internet.
  • General IT architecture involves the Internet, which complicates cybersecurity protection.
  • Every host on the Internet is only one hop away from every other host, including malicious hosts operated by potential attackers.
  • From architectural and strategic perspectives, the graphic illustrates the various enterprise IT components and how they are generally connected to the Internet.
    • Endpoint devices consist of customer, Internet organization, and internal organization devices.
    • Enterprise infrastructure consists of application servers, database servers, and systems administration and monitoring.
      A458720_1_En_2_Figp_HTML.jpg

Endpoints

  • Customer Devices
    • If a business involves interacting with customers over a network, then their devices are an important part of the overall IT architecture.
    • Why worry about customer devices?
    • What if every single customer device is malicious and can attack the enterprise?
    • From a cybersecurity perspective, how would an enterprise interact with their customers?
    • If a customer’s computer is actively using the enterprise’s data to attack the enterprise, would the enterprise trust the customer?
    • Many people say, “It depends.”
    • Customer devices need to be considered when an enterprise implements its cybersecurity controls and capabilities.
      A458720_1_En_2_Figq_HTML.jpg
  • Organization Devices
    • Devices that connect to the enterprise over a public network—for example, the Internet
      • Depending upon enterprise policies, these devices may be company-owned computers, personal computers, mobile devices, or Bring Your Own Device (BYOD) .
      • The reality is the majority of organizations are going to allow some of their employees to connect to enterprise resources over an open network.
    • Devices that connect to the enterprise over an internal network—for instance, enterprise intranet
      • Good news—the enterprise likely has more control over these devices than the myriad of customer and organizational devices connecting over an open network.
        A458720_1_En_2_Figq_HTML.jpg
      • Bad news—unless the enterprise tolerates a lot of operational headaches, control is likely spotty due to personal, customer, vendor, and other devices occasionally connecting to the enterprise network.
      • These potential connections jeopardize the enterprise’s efforts to control and protect the integrity of what is internal.

IT Infrastructure

  • Enterprise IT infrastructure consists of three components that should all work together as a coherent and coordinated system:
    • Application servers deliver business applications enabling the generation of business value.
    • Database servers contain the business’s data.
    • Systems administration and monitoring channels manage and monitor the infrastructure.
  • In some cases, the data and the applications may actually be hosted on a single component, but most often the two are separate.
  • Systems administration and monitoring provides IT personnel with the ability to monitor and manage the enterprise; without this capability the enterprise may be unmanageable.
    A458720_1_En_2_Figr_HTML.jpg
  • It is helpful to consider these IT functionalities when considering the various ways that attackers seek to penetrate the infrastructure and accomplish their goals.
  • Protections can be applied around the networks, endpoints, applications, databases, and systems administration functionalities.

Emplacing Cyberdefenses

  • Enterprise cybersecurity involves hardening the various components and connections so each component is more difficult to compromise.
  • It sounds simple, but it isn’t.
    • The more complex the enterprise is, the more complex the security is.
    • Complexity begets complexity.
  • The graphic illustrates a notional enterprise and shows how security hardening can be applied to each enterprise IT component, including accounts, hosts, inter-host communications, and the organization network perimeter.
    • Internet organization devices should be protected from compromise even while they are connected to the Internet and other trusted networks.
    • The line connecting the Internet to the organization network is another security boundary where cybersecurity protections should be applied.
      A458720_1_En_2_Figs_HTML.jpg
    • Inside the organization network, the internal organization devices, which are already inside the network, can be powerful attack vectors if they are compromised by an attacker.
    • Systems administration and monitoring is probably the most important element to be protected as its compromise can be used to disable or bypass most of the other cybersecurity defenses.
  • Database servers are where the enterprise data resides and they must be protected.
    • Confidentiality protects the secrecy of data.
    • Integrity protects data from unauthorized changes.
    • Availability makes IT systems and the data they host available when and where they are needed.
  • Application servers provide enterprise services and they must be protected.
    • Servers must be externally facing while also providing access to enterprise data for legitimate and authorized users.
  • Customer devices that access enterprise resources are almost impossible to protect.
    • Security status must always be considered in an enterprise’s security architecture.
      A458720_1_En_2_Figt_HTML.jpg
  • General Comments
    • The graphic illustrates a basic architecture— applications, databases, servers, clients—used by an enterprise’s security infrastructure.
    • An actual architecture will end up containing more components than this basic architecture example.

How Cyberdefenses Interconnect

  • The graphic illustrates an enterprise attack graph that shows
    • how different cybersecurity components interact with each other; and
    • how individual cybersecurity component defenses depend on each other.
  • An enterprise can use the attack graph methodology to envision conceptually what these interdependencies look like.
  • Following is an example attack scenario statement:
    To compromise organizational data, an attacker can compromise the (1) network and steal the data, (2) cryptography and steal the data in transit, (3) systems administration and take control of the servers hosting the data, or (4) applications hosting the data and use them to obtain the data.
  • Attack scenario statements cause the enterprise to step back and examine the big picture of how an enterprise really works.
    A458720_1_En_2_Figu_HTML.jpg
  • The example attack graph represents an attack scenario statement for an entire enterprise.
    • Although the graph looks somewhat like “spaghetti ball,” it shows that all the enterprise security components connect with and depend on each other.
    • Every aspect of the enterprise’s security ultimately depends on every other aspect.
    • Consequently, a breach anywhere in the enterprise can eventually be exploited to compromise the entire enterprise
  • Due to the interdependency of enterprise IT and cybersecurity components,
    • attackers can start with an exploit almost anywhere; and
    • eventually attackers expand the initial exploit to get compete control.
      A458720_1_En_2_Figu_HTML.jpg
  • While disconcerting, this connectivity and dependency should not be dismaying.
  • An enterprise
    • needs to appreciate the complexity of enterprise security as a system; and
    • understand how enterprise defenses actually stop attacks.
  • Enterprise cybersecurity defenses
    • slow the attack down;
    • add steps to the attack;
    • increase the enterprise’s chances of catching the attack before it is completely successful;
    • make the attack process more difficult, expensive, and time-consuming; and
    • give defenders time to detect and respond to the intrusion.
      A458720_1_En_2_Figu_HTML.jpg

An Enterprise Cybersecurity Architecture

Context

  • To be effective, a cybersecurity architecture should achieve the following objectives:
    • Cover the full breadth of cybersecurity so nothing is left out
    • Align people, processes, budgets, and controls into a single framework so they are well-coordinated
    • Organize cybersecurity capabilities and controls into functional areas so they can be managed more easily
    • Account for the interdependence of controls and capabilities on each other across functional areas
    • Be simple enough so it can be managed and briefed at a high level
  • The graphic represents a new enterprise cybersecurity architecture.
    • Defined by cybersecurity functional areas covering the technical and operational breadth of enterprise cybersecurity
      A458720_1_En_2_Figv_HTML.jpg
  • Cybersecurity Functional Areas
    • Relatively independent from each other
    • Align well with how staff, expertise, and responsibilities are distributed in an organization utilizing the IT management frameworks such as the following:
      • ITIL (IT Infrastructure Library)
      • COBIT (Control Objectives for Information and Related Technology)
    • Enable IT leadership to unify technologies, staff, and corresponding budget into a coherent cybersecurity program
  • Overall cybersecurity posture depends equally on the performance of all the functional areas.
  • This new enterprise cybersecurity architecture
    • manages the capabilities that deliver preventive, detective, audit, and forensic controls to the enterprise;
    • provides for consistent management of security capabilities;
    • assists in prioritizing security capability deployment, maintenance, and upgrades over time;
    • provides strong accountability and good alignment of strategy, staffing, budget, and technology to meet the organizational security needs;
    • is designed to be flexible and scalable from a small enterprise up to a large enterprise; and
    • provides an extensible mechanism for adjusting cyberdefenses over time in response to changing cyberthreats.
      A458720_1_En_2_Figw_HTML.jpg
  • Cybersecurity Functional Areas
    • Systems Administration provides for secure administration of enterprise infrastructure and security systems, and protects systems administration channels from compromise.
    • Network Security provides for security of enterprise networks, their services, and access to them from the Internet and internally connected devices.
  • Cybersecurity Functional Areas (continued)
    • Application Security provides for the security of enterprise applications using security technologies that are appropriate to and tailored for the protection of those applications and their communications.
    • Endpoint, Server, and Device Security provides for the protection of endpoints, servers, and devices that access enterprise data, and protects them from compromise.
    • Identity, Authentication, and Access Management provides for identification, authentication, and access control throughout the identity life cycle including provisioning, re-certification, and de-provisioning.
    • Data Protection and Cryptography provides for the protection of data stored in the enterprise and the use of cryptographic technologies to perform that protection. It also supports other operations such as authentication, non-repudiation, and data integrity.
      A458720_1_En_2_Figx_HTML.jpg
    • Monitoring, Vulnerability, and Patch Management provides for the regular monitoring of security infrastructure, scanning, and analysis of vulnerabilities in that infrastructure, and management of patches and workarounds to address those vulnerabilities.
  • Cybersecurity Functional Areas (continued)
    • High Availability, Disaster Recovery, an d Physical Protection provides for the protection of availability in the enterprise, including making systems highly available, recovering from disasters, and physically protecting facilities, people, systems, and data.
    • Incident Response provides for the investigation, response, and recovery of incidents that are identified through monitoring of the enterprise.
    • Asset Management and Supply Chain provides for the accounting of enterprise assets, procurement information associated with them, their life cycles, changes, and ensuring orderly and secure disposal without compromise of enterprise data or security.
      A458720_1_En_2_Figy_HTML.jpg
    • Policy, Audit, E-Discovery, and Training provides for policy oversight of controls and audit of their effectiveness, support for legal e-discovery activities, and training of staff in proper security policies and practices
Footnotes
1
Graphic taken from Special Publication 800-53 Revision 4, National Institute of Standards and Technology, 2013.
 
2
SSP 800-53r4 Security and Privacy Controls for Federal Information Systems and Organizations
 
3
Adapted from NIST SP 800-53 Revision 4
 
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
52.15.74.25