an overview of the nist’s cyber security program donna f. dodson deputy chief cyber advisor...

16
An Overview of the NIST’s Cyber Security Program Donna F. Dodson Deputy Chief Cyber Advisor October 2009

Upload: asher-patrick

Post on 24-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: An Overview of the NIST’s Cyber Security Program Donna F. Dodson Deputy Chief Cyber Advisor October 2009

An Overview of the NIST’s Cyber Security Program

Donna F. DodsonDeputy Chief Cyber Advisor

October 2009

Page 2: An Overview of the NIST’s Cyber Security Program Donna F. Dodson Deputy Chief Cyber Advisor October 2009

NIST’s MissionNIST’s Mission• To promote U.S.

innovation and industrial competitiveness by

advancing measurement science, standards, and

technology …

… in ways that enhance economic security and improve our quality of life.

©Geoffrey Wheeler

©Robert Rathe

Page 3: An Overview of the NIST’s Cyber Security Program Donna F. Dodson Deputy Chief Cyber Advisor October 2009

NIST At A Glance• 2,800 employees

(Gaithersburg, Maryland; Boulder, Colorado; Charleston, South Carolina)

• 1,800 guest researchers

• NIST Laboratories

• Advanced Technology Program

• Hollings Manufacturing Extension Partnership Program

• Baldrige National Quality Program

©R

ober

t R

athe

Ph

oto

by

Bar

ry G

ard

ner

Page 4: An Overview of the NIST’s Cyber Security Program Donna F. Dodson Deputy Chief Cyber Advisor October 2009

The NIST Laboratories

NIST’s work enables

• Science

• Technology innovation

• Trade

• Public benefit

NIST works with

• Industry

• Academia

• Government agencies

• Measurement laboratories

• Standards organizations

Page 5: An Overview of the NIST’s Cyber Security Program Donna F. Dodson Deputy Chief Cyber Advisor October 2009

Information Technology Laboratory

ITLDirector

ComputerSecurityDivision

DirectorITL

Programs

Deputy ITLDirector

Cyber SecurityAdvisor

Cryptographic Technology Group

Security Research & Emerging Tech Group

Security Management and Assurance Group

Enabling Scientific Discovery Pervasive Computing Complex Systems Identity Management Cyber and Network Security Trustworthy Computing Virtual MeasurementInformation Discovery, Use, & Sharing

Software And

SystemsDivision

AdvancedNetworksDivision

Mathematics Division

InformationAccess

Division

Page 6: An Overview of the NIST’s Cyber Security Program Donna F. Dodson Deputy Chief Cyber Advisor October 2009

Responsibilities for Cyber Security• NIST is responsible for developing standards and guidelines, including minimum requirements,

that provide adequate information security for all agency operations and assets in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347, but such standards and guidelines shall not apply to national security systems.

• Under FISMA NIST shall “conduct research, as needed, to determine the nature and extent of information security vulnerabilities and techniques for providing cost-effective information security.”

• NIST develops guidelines consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems, as analyzed in A-130, Appendix IV: Analysis of Key Sections. Supplemental information is provided in A-130, Appendix III.

• In accordance with the Cyber Security Research and Development Act, The National Institute of Standards and Technology develops, and revises as necessary, checklists setting forth settings and option selections that minimize the security risks associated with each computer hardware or software system that is, or is likely to become, widely used within the Federal Government.

• Homeland Security Presidential Directive 7; “The Department of Commerce will work with private sector, research, academic, and government organizations to improve technology for cyber systems and promote other critical infrastructure efforts, including using its authority under the Defense Production Act to assure the timely availability of industrial products, materials, and services to meet homeland security requirements.”

• Homeland Security Presidential Directive 12: “The Secretary of Commerce shall promulgate in accordance with applicable law a Federal standard for secure and reliable forms of identification (the "Standard")”

Page 7: An Overview of the NIST’s Cyber Security Program Donna F. Dodson Deputy Chief Cyber Advisor October 2009

Development Model• Research

– Internal– Collaborations

• Development – Prototypes– Test beds

• Standards and Guidelines• Metrics• Testing and Validations• Education and Outreach

Page 8: An Overview of the NIST’s Cyber Security Program Donna F. Dodson Deputy Chief Cyber Advisor October 2009

Core Focus Areas• Research, Development, and Specification

– Security Mechanisms (e.g. protocols, cryptographic, access control, auditing/logging)

– Security Mechanism Applications• Confidentiality• Integrity• Availability• Authentication• Non-Repudiation

• Secure System and Component configuration• Assessment and assurance of security properties of

products and systems

Page 9: An Overview of the NIST’s Cyber Security Program Donna F. Dodson Deputy Chief Cyber Advisor October 2009

• Risk Management Framework and FISMA - Federal Information Processing Standard (FIPS) 199 and FIPS 200 are standards that specify minimum security requirements for Federal information and information systems– Ongoing research and outreach efforts to keep SP 800-53, which contains

the detailed requirements, up-to-date

• Security Automation Tools– Support for Vulnerability Management through automation

specifications and automated checklists in support of continuous system monitoring

– Includes work related to the National Vulnerability Database and Secure Content Automation Protocol

• Internet Protocol Version 6 (IPv6)– Providing test and measurement tools for hardening existing Internet

protocols: Standards, deployment, and testing of Internet Protocol (IPv6)– Published the U.S. Government IPv6 Profile, and developed strategies for

conformance and interoperability testing

9

Page 10: An Overview of the NIST’s Cyber Security Program Donna F. Dodson Deputy Chief Cyber Advisor October 2009

• Seamless and Secure Mobility– Standards and tools to provide users with ubiquitous connectivity and the ability

to roam seamlessly and securely across networks of different types – Collaborating on IEEE 802.21 Media Independent Handover standards, IETF

mobility optimization specification

• Cryptography and Cryptographic Mechanisms– Provides cryptographic algorithms and protocols to support confidentiality,

integrity, authentication and digital signatures– Develop specifications for tools and establish testing methodology– Currently, running an international competition of a new Cryptographic Hash

Algorithm

• Key Management – Developing a key management framework to include scalable, usable and secure

key management technologies– Foster better use of established technologies; explore emerging techniques– SP 800-56 Key Management Guidelines

10

Page 11: An Overview of the NIST’s Cyber Security Program Donna F. Dodson Deputy Chief Cyber Advisor October 2009

• Usability of Security– Performing groundwork research to define factors that enable

usability in the area of multifactor authentication and developing a framework for determining metrics that are critical to the success of usability

• Usability of Biometric Systems– Standardize and improve usability of user interfaces of biometric

systems to enhance performance and user satisfaction– Developing a methodology and guidelines for capturing user

requirements and transforming them into a design appropriate for small platforms

• Identity Management Systems– Standards development work in biometrics, smart cards, identity

management, and privacy framework. – R&D: Personal Identity Verification, Match-On-Card, ontology for

identity credentials, development of a workbench– ID Credential Interoperability

11

© P

eto

Zvo

nar

| Dre

amst

ime.

com

© G

raem

e D

awes

| D

ream

stim

e.co

m

Page 12: An Overview of the NIST’s Cyber Security Program Donna F. Dodson Deputy Chief Cyber Advisor October 2009

• Security for emerging virtualization technologies

– Research for viable security isolation techniques including platform virtualization, process sandboxes, virtual networks and encrypted storage

• Voting security– Foster the development of voluntary consensus

guidelines on implementing election-related technologies

– Establish accreditation program for voting system testing

12

© L

isa

F.

You

ng/D

ream

stim

e.co

m

Page 13: An Overview of the NIST’s Cyber Security Program Donna F. Dodson Deputy Chief Cyber Advisor October 2009

• Smart grid security– Coordinate development of cybersecurity elements of a framework of

protocols and model standards; continuously coordinated with networking standards and guidance

– Selecting use cases from existing sources, e.g., IntelliGrid, Electric Power Research Institute (EPRI), and Southern California Edison (SCE)

– Use cases provide a common framework for performing the risk assessment, developing the security architecture, and selecting and tailoring the security requirements

• Healthcare information technology– NIST provides security specifications for enabling communicating parties

to transmit health information securely and to ensure privacy and confidentiality

– Developing guidelines for HIPAA Security Rule and Security Architecture Design Process for Health Information Exchanges

– Leveraging prior cybersecurity efforts

13

©S

hutt

erst

ock

© A

ndrz

ej T

okar

ski |

Dre

amst

ime.

com

Page 14: An Overview of the NIST’s Cyber Security Program Donna F. Dodson Deputy Chief Cyber Advisor October 2009

• Quantum Communications– Demonstrate and test secure, commercial-grade

communication components, systems and protocols for the quantum era

• Foundations of Measurement Science for Information Systems – Large-scale systems (e.g., the Internet, power grid) deployed

without fundamental understanding of their range of behaviors, security; Information systems lack same foundations as physical sciences

– Basic research program: mathematical foundations underlying development of a measurement science for information systems; Initial Focus: Abstract models of information systems structure, dynamics

14

ISP

con

nect

ion

topo

logy

.

Sou

rce:

cai

da.o

rg

Page 15: An Overview of the NIST’s Cyber Security Program Donna F. Dodson Deputy Chief Cyber Advisor October 2009

Future and Ongoing Challenges• Long Term Research

– Advanced Cryptography (e.g., hash, public key, quantum, light footprint)

– Inherently Secure, High Assurance, and Provably Secure Systems and Architectures

– Composable and Scalable Secure Systems– Autonomic Systems– Ad-hoc Networks and Wireless Security– Network Measurement and Visualization Tools– Secure Distributed Systems– Infrastructure for Information Security R&D

18

Page 16: An Overview of the NIST’s Cyber Security Program Donna F. Dodson Deputy Chief Cyber Advisor October 2009

For Additional Information

• NIST http://www.nist.gov/

• NIST’s Information Technology Lab http://www.itl.nist.gov/

• Computer Security Resource Center– http://[email protected]

• National Vulnerability Database– http://nvd.nist.gov

• Biometrics Resource Center– http://www.itl.nist.gov/div893/biometrics

• Biometrics Research– Finger: http://fingerprint.nist.gov– Face: http://face.nist.gov– Iris: http://iris.nist.gov

22