cis14: nstic - identity and access management collaborative approaches to novel use cases

23
Identity and Access Management: Collaborative Approaches to Novel Use Cases Nate Lesser, Deputy Director National Cybersecurity Center of Excellence Cloud Identity Summit 2014 July 20, 2014

Upload: cloudidsummit

Post on 18-May-2015

351 views

Category:

Technology


1 download

DESCRIPTION

Nate Lesser

TRANSCRIPT

Page 1: CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Novel Use Cases

Identity and Access Management: Collaborative Approaches to Novel Use Cases Nate Lesser, Deputy Director National Cybersecurity Center of Excellence

Cloud Identity Summit 2014 July 20, 2014

Page 2: CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Novel Use Cases

ENERGY SECTOR USE CASE: IDENTITY AND ACCESS MANAGEMENT

Page 3: CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Novel Use Cases

3 Cloud Identity Summit 2014

OVERVIEW

Goals

‣ Authenticate individuals and systems

‣ Enforce authorization control policies

‣ Unify IdAM services

‣ Protect generation, transmission and distribution

Business value

‣ Reduce costs

‣  Increase efficiency

Page 4: CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Novel Use Cases

Cloud Identity Summit 2014 4

SILOS

IT network OT network Physical system

Page 5: CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Novel Use Cases

Cloud Identity Summit 2014 5

THE IT-OT DIVIDE

Page 6: CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Novel Use Cases

Cloud Identity Summit 2014 6

HIGH-LEVEL ARCHITECTURE

Page 7: CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Novel Use Cases

Cloud Identity Summit 2014 7

COLLABORATORS

Page 8: CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Novel Use Cases

ABOUT THE NCCOE

Page 9: CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Novel Use Cases

Cloud Identity Summit 2014 9

STRATEGY

Vision

‣ A secure cyber infrastructure that inspires technological innovation and fosters economic growth

Mission

‣ Collaborate with innovators to provide real-world, standards-based cybersecurity capabilities that address business needs

Page 10: CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Novel Use Cases

10 Cloud Identity Summit 2014

TENETS

Standards-based

Modular

Usable

Repeatable

Open and transparent

Commercially available

Page 11: CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Novel Use Cases

Cloud Identity Summit 2014 11

REALIZED SECURITY

Realized security = security controls + security gains from ease of use  

Page 12: CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Novel Use Cases

Cloud Identity Summit 2014 12

APPROACH

We seek problems that are:

‣ Broadly relevant

‣ Technology-based

‣ Addressable with multiple commercially available technologies

Page 13: CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Novel Use Cases

Cloud Identity Summit 2014 13

REFERENCE DESIGNS

Use cases

‣ Sector-specific challenges

‣  Identified through industry engagement

Building blocks

‣ Technology-specific challenges ‣  Identified through public engagement

Page 14: CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Novel Use Cases

Cloud Identity Summit 2014 14

MODEL

Engage ‣ Work with community of interest to define problem

Explore

‣ Map security characteristics to standards, controls and best practices

‣ Circulate drafts and incorporate feedback

Partner ‣  Invite technology vendors to collaborate in our labs

Build ‣ Collaborate on design components

‣  Incorporate feedback from experts in technology community Show ‣ Demonstrate reference designs

Page 15: CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Novel Use Cases

Cloud Identity Summit 2014 15

MODEL

Form small community of interest

Provide input and feedback to NCCoE

Expand community of interest

Submit feedback on use cases to

NCCoE

Offer insights on use cases

Community Of Interest

Support deployment, revision and maintenance of products as part of the

practice guide

Collaborate to develop reference designs

Evangelize on behalf of reference design and practice guide

Deploy, test and provide feedback on the reference design

Provide regular feedback on use case builds

Technology Partners Submit letters

of interest

Speak at sector-

specific events

Work with COI to identify cybersecurity challenges

Host sector-specific

workshop

Review & circulate

pre-release use cases

Revise & publish

draft use cases

Revise use cases &

invite participation

from technology

partners

Receive technology

partners letters

of interest

Demonstrate reference designs

Discuss improvements &

modifications

Publish reference

design and practice guide

Develop composed reference

design

Form build

teams Sign

CRADAs Host

partner day

Page 16: CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Novel Use Cases

Cloud Identity Summit 2014 16

CORE PARTNERS

Page 17: CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Novel Use Cases

BUILDING BLOCK: ATTRIBUTE BASED ACCESS CONTROL

Page 18: CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Novel Use Cases

18 Cloud Identity Summit 2014

OVERVIEW

Goals

‣ Enterprise to enterprise identity federation

‣ Enable access control decisions for previously unknown users

‣ Demonstrate security capabilities that support a wide range of enterprise risk postures

Business value

‣ Simplified identity management

‣ Shared IT resources across multiple enterprises

‣ Reduced risk through granular access control

Page 19: CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Novel Use Cases

Cloud Identity Summit 2014 19

HIGH-LEVEL WORKFLOW

Page 20: CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Novel Use Cases

Cloud Identity Summit 2014 20

HIGH-LEVEL WORKFLOW

Page 21: CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Novel Use Cases

Cloud Identity Summit 2014 21

DEFINITIONS

Sources

‣ Authorization and Attribute Services Committee Glossary

‣ FICAM

‣ FIPS 201

‣ NCCoE

‣ NIST SP 800-37-1 ‣ NIST SP 800-63-2

‣ OMB M-04-04

‣ RFC 4949

Page 22: CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Novel Use Cases

Cloud Identity Summit 2014 22

HIGH-LEVEL ARCHITECTURE

Page 23: CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Novel Use Cases

Next

[email protected]  240-­‐314-­‐6800  

9600  Gudelsky  Drive  Rockville,  MD  20850  

hCp://nccoe.nist.gov