cyber defence situational awareness · 2019-08-09 · nato unclassified act industry day 2010...

Post on 11-Mar-2020

8 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

NATO UNCLASSIFIED

Cyber Defence

Situational Awareness

HQ SACT, ACT Office of Security

NC3A, CAT-2

1

ACT Industry Day 2010NATO UNCLASSIFIED

Objectives of the

Workshop

Communicate and clarify the context of Cyber

Defence within NATO

Present ACT’s Cyber Defence R&D Strategy

Review the technical challenges associated

with three areas:

Consolidated Information Assurance Picture

(CIAP)

Dynamic Risk Assessment (DRA)

Remote Data Aggregation Capability (RDAC)

Gather feedback from Industry and establish

a dialogue

2

ACT Industry Day 2010NATO UNCLASSIFIED

Industry Charge

You are here for a reason. Our reason for this

forum, however is for you (Industry) to assist

us (NATO) to ensure our priorities are

coherent with Industry and for you (Industry)

to assist us (NATO) to overcome our

capability development challenges.

NATO challenges you to step up!

3

ACT Industry Day 2010NATO UNCLASSIFIED

Next Steps...

Continuous dialogue and collaboration

through:

Further development of the CD/IA framework

Distributed Networked Battle Lab (DNBL)Testing

activities

Others?

4

ACT Industry Day 2010NATO UNCLASSIFIED

Context

5

ACT Industry Day 2010NATO UNCLASSIFIED

Afghan Mission Network

ISAF SECRET

CENTRIXS ISAF OVERTASK

(UK)

CAESAR

(ITALY)

LCSS

CANADA

OTHER

NATIONS

ANSF

NATO SECRET

NATIONAL

NETWORKs

6

ACT Industry Day 2010NATO UNCLASSIFIED

Context

Extract from NATO 2020 : New strategic Concept for NATO

NATO should recognize that cyber attacks are a growing threat to the security of the Alliance and its members. Accordingly:

A major effort should be undertaken to increase the monitoring of NATO’s critical network and to assess and furnish remedies to any vulnerabilities that are identified.

Allies should expand early warning capabilities in the form of a NATO-wide network of monitoring nodes and sensors.

Over time, NATO should plan to mount a fully adequate array of cyber defence capabilities, including passive and active elements.

7

ACT Industry Day 2010NATO UNCLASSIFIED

Context: NATO Computer Incident

Response Capability (NCIRC)

NCIRC Technical Centre (FOC) (Mons, Belgium)

CD Co-ordination and Support Centre

(Brussels, Belgium)

NATO Cyber Defence Management Board(Senior Management)

NATO Computer Networks (~70,000 computers in 58 Locations in 31 Countries )

8

ACT Industry Day 2010NATO UNCLASSIFIED

Context : NCIRC Activities

9

ACT Industry Day 2010NATO UNCLASSIFIED

Context: NCIRC Services

10

ACT Industry Day 2010NATO UNCLASSIFIED

Context : NCIRC FOC

NCIRC FOC design will:

Support Federated Operations

Be implemented with a COTS strategy

Employ a standards based approach

Incorporate a service oriented paradigm

Have a Scalable infrastructure

Be transparent to end-users

11

ACT Industry Day 2010NATO UNCLASSIFIED

2002 2006 2009Programme

established

Initial

Operating

Capability

Final

Operating

Capability

4Q 2010: Cost estimate.

2Q 2011: Invitations for Bids

4Q 2012: Implementation accomplished

Increment #1 (Core)

Ticketing

Storage

Consolidated Information Assurance Picture v1

Security Incident & Event Management v1

Central Management of all NCIRC functional services

Reference System

Context : NCIRC FOC

12

ACT Industry Day 2010NATO UNCLASSIFIED

Increment #2 (spiral development)

Intrusion Detection / Prevention

Full Packet Capture

Online Vulnerability Assessment

Forensics capabilities

Increment #3 (maturing capabilities)

Dynamic Risk Assessment

Forensics Evidence Management

Alternate capability

Context : NCIRC FOC

13

ACT Industry Day 2010NATO UNCLASSIFIED

Research Strategy

14

ACT Industry Day 2010NATO UNCLASSIFIED

Research Strategy

Sponsored by ACT

Develops and validates concepts and specifications

Done in cooperation with other national entities:

Defence Research and Development Canada

(DRDC)

Délégation Générale pour l‘Armement (DGA)

MITRE (US)

Seeks synergy with other POW:

NCIRC Scientific POW

Cooperative Cyber Defence Centre of Excellence

(CCD COE) POW

15

ACT Industry Day 2010NATO UNCLASSIFIED

Orient Decide

ActObserve

NC3A Cyber Defence R&D

Activities

Existing Management Systems

16

ACT Industry Day 2010NATO UNCLASSIFIED

NC3A Cyber Defence R&D

Activities

Data Collection and

Aggregation

Connections to

external systems

Normalization and

Standardization

Sensing &

Fusion

Existing Management Systems

17

ACT Industry Day 2010NATO UNCLASSIFIED

NC3A Cyber Defence R&D

Activities

Advanced Detection

Consolidated IA

Picture

Dynamic Risk

Assessment

VisualizationProcessing, Analysis &

Visualization

18

ACT Industry Day 2010NATO UNCLASSIFIED

NC3A Cyber Defence R&D

Activities

Recommendation

Engine

Course of Action

Analysis

Decision Processes

Decision Support

19

ACT Industry Day 2010NATO UNCLASSIFIED

NC3A Cyber Defence R&D

Activities

Authorization System

Active Defence

Automated Counter-

measures

DefensiveResponse

Existing Management Systems

20

ACT Industry Day 2010NATO UNCLASSIFIED

CD Capabilities Framework

Detect Cyber Incidents

and Attacks

ID42

Correlate[level 1]

ID43

Estimate Attributes[level 1]

ID44

Normalize Sensor Data[level 1]

ID45

Estimate Identity[level 1]

ID46

Locate Technical

Source of Attack[attribution]

ID19

Aggregate[level 2]

ID47

Visualize[analysis]

ID48

Interpret Activity[level 2]

ID49

Interpret Context[level 2]

ID50

Collect Sensor Data[level 1]

ID51

Data alignment[data fusion level 1]

ID68

Situation refinement[data fusion level 2]

ID69

Detect Cyber Incidents

and Attacks

ID42

Correlate[level 1]

ID43

Estimate Attributes[level 1]

ID44

Normalize Sensor Data[level 1]

ID45

Estimate Identity[level 1]

ID46

Locate Technical

Source of Attack[attribution]

ID19

Aggregate[level 2]

ID47

Interpret Activity[level 2]

ID49

Interpret Context[level 2]

ID50

Data alignment[data fusion level 1]

ID68

Data alignment[data fusion level 1]

ID68

INTEROPERABILITY

INTERFACE

INTEROPERABILITY

INTERFACE

Situation refinement[data fusion level 2]

ID69

Situation refinement[data fusion level 2]

ID69

21

ACT Industry Day 2010NATO UNCLASSIFIED

Challenges

22

ACT Industry Day 2010NATO UNCLASSIFIED

Challenges : CIAP

Proliferation of source of information that

could be potentially useful to derive

situational awareness.

NIDS

Antivirus

HIDS

Firewall

Web

Proxy

SIEM

(events

correlation)

Vulnerability

Scanner

E-mail

Gateway

Network

Management

System

Logs

Web

Server

Database

Server23

ACT Industry Day 2010NATO UNCLASSIFIED

Challenges : CIAP

Network topology with

vulnerable and compromised

hosts

Geographical view with cyber

layer

Treemaps

to

prioritize

issues

A few examples:

24

ACT Industry Day 2010NATO UNCLASSIFIED

Challenges : CIAP

Displaying large computer networks is a

challenge:

Scalability

Should handle hundreds of thousands of nodes and edges

Layout algorithm

Graph layout has to be automated, but part of the graph

must be anchored, leading to stable or fixed layout after

small changes

Dynamic views

Overview, pan & zoom are mandatory features.

Ability to click on objects to get more details or fold groups.

Ability to move objects manually.

25

ACT Industry Day 2010NATO UNCLASSIFIED

Challenges: DRA

Objective of the DRA capability:

For the CIS users: give them an indication whether a CIS can be relied upon to perform its functions in the environment in which it is used.

For the CIS operators: assist them in the prioritization of the issues related to a change in the risk assessment (e.g., newly discovered vulnerabilities, configuration changes, and active threats detected in the CIS), provide a measure of the urgency of each issue, and assist in determining the proper response.

For other stakeholders: provide them with risk-related information captured throughout the operational lifecycle of a CIS to be used to improve CIS design and implementation, as well as risk management systems and processes for the specific CIS, other NATO CIS, and future CIS.

26

ACT Industry Day 2010NATO UNCLASSIFIED 27

DRA-Hybrid prototype overview

1

2

3

4

ACT Industry Day 2010NATO UNCLASSIFIED

DRA Market Survey (2009)

Criteria of evaluation grouped into 5 topics:

Risk Model, value calculation and characterization

Vulnerability and threats characterization

Remediation and recommendation features

Interfaces

Other considerations

No product was found fully compliant.

28

ACT Industry Day 2010NATO UNCLASSIFIED

Limitations of the current (centralized) model;

Requirement for an intermediate aggregation

and filtering layer

RDAC prototype developed in 2010 aims at

demonstrating the concept by capturing and

aggregating traffic and logs.

Challenges : RDAC

29

ACT Industry Day 2010NATO UNCLASSIFIED

Collaboration with

Industry

30

ACT Industry Day 2010NATO UNCLASSIFIED

Workshop Objectives

Continuous dialogue and collaboration

through:

Further development of the CD/IA framework

Distributed Networked Battle Lab (DNBL)Testing

activities

Others?

31

ACT Industry Day 2010NATO UNCLASSIFIED

Ideas!

Questions?

Next Steps...

Over To You

32

ACT Industry Day 2010NATO UNCLASSIFIED

ACT

Alex SCOTT

alex.scott@act.nato.int

+1(757)747-3239

LTC Ross SNOW

ross.snow@act.nato.int

+1(757)747-3299

NC3A

Frederic JORDAN

frederic.jordan@nc3a.nato.int

+31 703743486

Luc Dandurand

luc.dandurand@nc3a.nato.int

+31 703743485

33

top related