arcgis in a cybersecurity environment · 2017-06-29 · major arcgis plugin developer over 70,000...

48
ArcGIS in a Cybersecurity Environment GIS in Defense and Intelligence Ronald Moore and Robert “Glenn” Carr

Upload: others

Post on 12-Mar-2020

17 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

ArcGIS in a Cybersecurity EnvironmentGIS in Defense and Intelligence

Ronald Moore and Robert “Glenn” Carr

Page 2: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Agenda

Presentation Abstract and Presentation Objectives

Our Modeling and Simulation (M&S) Program

− What we do with geospatial data, and how we use ArcGIS

Esri ArcGIS in Our M&S Program

− What we use of the Esri products and tools

Our M&S Program in our Cybersecurity controlled Computing

Environment (CE)

− An introduction to Risk Management Framework (RMF)

Esri ArcGIS in our Cybersecurity controlled CE

− Our ArcGIS Cybersecurity experience

Our Final Products

Questions

2

Page 3: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Presentation Abstract

This paper presents the processes and tools, successes and

challenges in the installation and maintenance of ArcGIS in a U.S.

DoD Risk Management Framework (RMF) cybersecurity-enabled

computing environment (CE). RMF provides security controls within

the enterprise CE and a framework to assess the security posture of

the CE. These controls provide guidelines that can be used by all

ArcGIS users to ensure their systems and data are protected from

malicious activities, even if RMF is not required.

3

Page 4: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Presentation Objectives

Share our experience using ArcGIS in a Cybersecurity controlled

Computing Environment (CE)

− SE Core is a large U.S. Department of Defense contract

− National Institute of Standards and Technology (NIST) Risk Management

Framework (RMF) Cybersecurity accreditation is required

Looking for others with similar geospatial challenges

− Desire to leverage other experiences

− Potential collaboration

Offer to share what we have done

− All of our program products are available to U.S. DoD programs

− Potential collaboration

4

Page 5: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

Our Modeling and Simulation

(M&S) ProgramArcGIS in a Cybersecurity Environment

Page 6: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Page 7: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Synthetic Environment Core (SE Core) Geospatial Focus

Virtual Training Systems

Gaming Training Systems

Constructive Training Systems

Geospatial Source Data

Collect and process geospatial

source data to create runtime

terrain databases for mission

training systems

Page 8: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Geospatial Terrain Generation Process

Terrain Database Content Requirements

Source Data Collection,

Standardization, and Conflation

Vector Data Processing

3D Model Generation

Airfield Vector Creation

Master Terrain Database Population

Map Generation

Dataset Specialization

Runtime Terrain Database Generation

Runtime Terrain Database Integration & Test

Product Delivery

8

Requirements

Source Collection

Vector Data Processing

Populate Master Database

Dataset Specialization

Map Generation

Runtime Database

Generation

3D Model Generation

Airport Vector

Creation

Integration & Test

Delivery

Page 9: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Geospatial Terrain Generation Process

Terrain Database Content Requirements

Source Data Collection,

Standardization, and Conflation

Vector Data Processing

3D Model Generation

Airfield Vector Creation

Master Terrain Database Population

Map Generation

Dataset Specialization

Runtime Terrain Database Generation

Runtime Terrain Database Integration & Test

Product Delivery

9

Requirements

Source Collection

Vector Data Processing

Populate Master Database

Dataset Specialization

Map Generation

Runtime Database

Generation

3D Model Generation

Airport Vector

Creation

Integration & Test

Delivery

ArcGIS is used in

six of our eight

major processing

steps

Deferred

model

creation

Page 10: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Source Data Collection, Standardization, and

Conflation

10

Requirements

Source Collection

Vector Data Processing

Populate Master Database

Dataset Specialization

Map Generation

Runtime Database

Generation

3D Model Generation

Airport Vector

Creation

Integration & Test

Delivery

Raw Source

Data

Single Source

Data

Obtain (ship or

download)

source data for

training location

FACCNFDD

EDCS

Translate data model

and dictionary;

project to coordinate

system

Conflation feature

geometry and

attributes to single

source

Over 100

approved

sources

Page 11: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Vector Data Processing

11

Point AlignmentLinear Alignment

Correct

Incorrect

Areal

Alignment

Vector Editing

includes

cleaning,

aligning and

digitizing

features to

match reference

aerial imagery

Requirements

Source Collection

Vector Data Processing

Populate Master Database

Dataset Specialization

Map Generation

Runtime Database

Generation

3D Model Generation

Airport Vector

Creation

Integration & Test

Delivery

Our ArcGIS

plugins provide

error detection,

reporting, and

some automated

correction of

feature data

Using Spatial Analyst

3D Analyst

Page 12: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Airfield Vector Creation (1/2)

12

Raw

Sourc

e Requirements

Source Collection

Vector Data Processing

Populate Master Database

Dataset Specialization

Map Generation

Runtime Database

Generation

3D Model Generation

Airport Vector

Creation

Integration & Test

Delivery

We enhance raw

source data with airport

specific information

Page 13: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Airfield Vector Creation (2/2)

13

Enhanced S

ourc

e Requirements

Source Collection

Vector Data Processing

Populate Master Database

Dataset Specialization

Map Generation

Runtime Database

Generation

3D Model Generation

Airport Vector

Creation

Integration & Test

Delivery

Includes runway and

taxiway lights and 3D

model signage placement

Page 14: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Master Terrain Database

(MDB) Population

14

Requirements

Source Collection

Vector Data Processing

Populate Master Database

Dataset Specialization

Map Generation

Runtime Database

Generation

3D Model Generation

Airport Vector

Creation

Integration & Test

Delivery

The Master Database is

the SE Core program’s

data repository of all

cleaned source data,

simulation intensified

source data, and

specialized for customer

(confederate) source

data – using folder, files,

and Esri SDE and

FileGeoDatabase User One

User Two

Source

Page 15: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Map Generation

15

Requirements

Source Collection

Vector Data Processing

Populate Master Database

Dataset Specialization

Map Generation

Runtime Database

Generation

3D Model Generation

Airport Vector

Creation

Integration & Test

Delivery

Produce Topographic Line

Map (TLM) 1:50K scale and

1:100K and Joint Operations

Graphic (JOG) 1:250K scale

Distributed in

GeoTIFF,

JPEG2000 and

CADRG

formats

Using Defense Mapping

and Production Mapping

Page 16: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Missing Buildings

Dataset Specialization (1/2)

16

Requirements

Source Collection

Vector Data Processing

Populate Master Database

Dataset Specialization

Map Generation

Runtime Database

Generation

3D Model Generation

Airport Vector

Creation

Integration & Test

Delivery

Synthetic ImageryScatter and Intensification

Automatically

populate

building

footprints in

areas missing

extracted

buildings

Material MapColor Map

Create

correlated

aerial

imagery

from

feature data

Adding simulation

specific information

Page 17: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Dataset Specialization (2/2)

17

Requirements

Source Collection

Vector Data Processing

Populate Master Database

Dataset Specialization

Map Generation

Runtime Database

Generation

3D Model Generation

Airport Vector

Creation

Integration & Test

Delivery

Tunnel CreationAutomated Modelization

From feature

footprint, height,

roof type, and

building function

procedurally

generate

3D models

with interiors

Footprint

Generate

tunnels from

linear

features and

3D model

with couplers

Subway station and

tunnels

Page 18: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Terrain Databases Produced for Training Systems (1/4)

18

Delivered terrain

databases for active

shooter response

training

Elementary School

Hospital

Page 19: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Terrain Databases Produced for Training Systems (2/4)

19

Delivered terrain

databases for military

operation in urban terrain

training

Walls and Compounds

Enterable Building

Page 20: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Terrain Databases Produced for Training Systems (3/4)

20

Undamaged Damaged Cleared

Cockpit View of UH-60L/M Flight Simulator

Required

Street

Addresses

EURONAV®

Cleaned Marking Required

Required

Multi-state

models

Delivered terrain databases for

natural disaster response training

Page 21: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Terrain Databases Produced for Training Systems (4/4)

21

Delivered terrain

databases for maneuver,

collective, gunnery and

artillery training

Fighting Position

Driver Trainer

Page 22: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

Esri ArcGIS in Our M&S

ProgramArcGIS in a Cybersecurity Environment

Page 23: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

SE Core Esri ArcGIS Products

ArcGIS Desktops

− (~75) ArcGIS Desktop Advanced

− (~20) ArcGIS Spatial Analyst for Desktop

− (~20) ArcGIS 3D Analyst for Desktop

− (~15) ArcGIS Defense Mapping Concurrent

− (~75) ArcGIS Pro

ArcGIS Servers

− (2) ArcGIS for Server Enterprise Advanced

• Image Extension for Server Enterprise Advanced

• Esri Defense Mapping for Server Enterprise Advanced

• Esri Production Mapping for Server Enterprise Advanced

• Web Adapter

− (1) ArcGIS License Manager

Page 24: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Major ArcGIS Plugin Developer

Over 70,000 lines of code in our ArcGIS Utilities

− 60% C#

− 30% C++

− 10% Python

Over 200 specific ArcGIS add-on tools, for example

− EDM Translations tools

− Attributes cleanup tools

− Content and quality geometry check and correct tools

− Content and quality attributes check and correct tools

− Map production automation tools

− Quality Control (QC) tools

− SDE Create, Merge and Split tools

− Layer and delayering tools

− Conflation tools

Page 25: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

SE Core ArcGIS Plugin Tools

XML To Points

Video Browser

Vector Field Populator Tool

VCDR:Find Dangling Lines

VCDR: Z Fighting Intersections

VCDR: Vert Count Report

VCDR: Unique Attributes Report

VCDR: Unclosed Areal Features

VCDR: T-Vertex Fixer

VCDR: Trim All String Attributes

VCDR: Too Small Between Intersections

VCDR: Too Many Vertices

VCDR: Too Close to Intersection

VCDR: Switchback Roads

VCDR: Steep Bridge

VCDR: STAT Topology Errors Report

VCDR: Snapping

VCDR: Simplify Geometry

VCDR: Shrink Overlapping Hydro Buffers

VCDR: Sharp Angles Between Linears and

Areals

VCDR: Sharp Angles Between Linears

VCDR: Self Intersecting

VCDR: Scale JOG Sheets North and East

VCDR: Sawtooth Bridge

VCDR: Road Vertices in Hydro

VCDR: Road Processor for Maps

VCDR: Road Ending In Hydro

VCDR: Road Above Minimum Elevation

VCDR: Road & Rail Merger

VCDR: Reports Vertices Too Close

VCDR: Report Powerline Overlaps

VCDR: Report Close Neighboring Points

VCDR: Report Bad Lane Changes

VCDR: Report Attributes with Bad

Characters

VCDR: Remove Unclosed Areal Features

VCDR: Remove Point Peaks from Hydro

VCDR: Remove Null Geometry

VCDR: Remove Neighboring Vertices

Within Tolerance

VCDR: Remove Near Duplicates

VCDR: Remove Features With Duplicate

Geometry And Attributes

VCDR: Remove Features with Duplicate

Geometry

VCDR: Remove Dangling lines

VCDR: Remove Collinear Vertices

VCDR: Remove Close Vertices

VCDR: Remove Areals Containing Areals

VCDR: Rdgt_thinning Field Value Report

VCDR: Problem Ramp Finder

VCDR: Populate building_interior Field

VCDR: Populate bridge_over_water Field

VCDR: Overlapping

VCDR: Nullify Empty Strings

VCDR: Null Geometry Report

VCDR: Non Trimmed Strings Report

VCDR: Non Simple Geometry Report

VCDR: Near Duplicates

VCDR: Multipart Report

VCDR: Layer Level Validator

VCDR: JOG Sheet Purifier

VCDR: Isolated Geometry Report

VCDR: Generate Label From Feature

Class Name

VCDR: Fix Labels With Bad Characters

VCDR: Fix Attributes With Bad Characters

VCDR: Find Overlaps Across Areals

VCDR: Find Incorrectly Split Transportaiton

VCDR: Find Gaps Across Areals

VCDR: Find Crossing Linears

VCDR: Find Areal Within Areals

VCDR: Filter Bullseye Contours

VCDR: Features Without Label Report

VCDR: Features with Zs Report

VCDR: Features with Slivers

VCDR: Features with Duplicate Geometry

Report

VCDR: Features with Duplicate Geometry

and Attributes Report

VCDR: Features with Bad Width Report

VCDR: Features with Bad Characters

Report

VCDR: Feature Validator

VCDR: Feature Count

VCDR: Extend Line

VCDR: ESRI Check Geometry Report

VCDR: Empty Strings Report

VCDR: EDM Validator

VCDR: Cut Areal Holes

VCDR: Count Areal Holes

VCDR: Convert Accidental Nulls to Real

Nulls

VCDR: Clear all rdgt_thinning fields

VCDR: Clean Z Values

VCDR: Bridge Vertices

VCDR: Bridge Tunnel Lane Intersection

VCDR: Bridge Road Elbow Junctions

VCDR: Bridge Intersection

VCDR: Bridge Clearance

VCDR: Attribute Case Fixer

VCDR: Add Runway Attributes to Point

Aerodrome

VCDR: Accidental Nulls Report

VCDR (Vector Correction, Detection, and

Report)

UIDGenerator

Thin BUA

Spot Elevation Creator

Source Map Reproject Tool

Snap Checker

Sketch Halo

Skeletor

Site Video Tool

Simplify Areal

Show Verts

Set Deletion Attribution

SECore Arc Tools GP Function Factory

SDE Management Tools

SDE Importer

SDE Exporter

Schema Validator

Scatter

Scale Spec Scale Calculator

Scale Calulcator

Roads - Thin Road Network

Roads - Display

Road Prep

Road Label Editor

Removed BUA to Points

Removed BUA Points to PNML

Remove Unk and UNK from name fields

QA Tool Bar

Projected Rectangle Tool

Projected Polygon Tool

Points (Spot Height/Obstructions)

Point Peak Elevations

Point Named Map Location

Point Models To Grid

Point Aerodrome Prep

Photo Browser

Overlap

Null Delete

Merger Tool

Merge Features

MEF Points

Mask Processor

Maps SDE Nav Aids

Maps Aggregator

Map Utilities

Map Tools

Map Production Tools toolbox

Map Grid Generator

MAP DEM Processor

MADV

Populate Layer Level

Index Statistics Generator

GP Simplify Road Network Tool

GP Populate Road Linear Widths

GP Populate Linear Widths from Areals

Tool

GP Populate Layer Level Tool

GP Point Obstruction Thinning Tool

GP Nav File Generator

GP Feature Attribution Analysis Tool

GP Delete Vertices in Buffers

GP Calculate Stream Order Tool

GP Address Assignment Tool

Google Earth Plugin

GeoTIFF Auto Export

GDB Domain Fixer

GDB Creator

EDM Translation

EDM Ruleset Editor

EDM Processing

Edit Session Tracker

Duplicate Anno Remover

Drop Empty Feature Classes

DEM Processor

Database Splitter

Conflation

Confederate Differentiation Tool

CADRG Batch Reproject

By Name Loader

Building Footprint Adjustment

Buffer Linear

BUA Power Line

BUA Buildings (areal)

BUA Buildings

Browse Features

Batch Geotiff Export

Batch Annotation Merge

Auto Snapper

Auto Redraw Tools

Attributor

Attribution Wizard

Attribute Field Populator Tool

ArcGIS Spatial Analyst

ArcGIS Server

ArcGIS Image Server

ArcGIS Desktop

ArcGIS Data Reviewer

ArcGIS 3D Analyst

Arc Catalog

AOI Calculator

Airport Wizard FLT to GDB

Maps Aggregator

ADIZ to GOLDEN

ADI Identifier

Add Point Peak Elev Fields

25

Page 26: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

Our M&S Program in our

Cybersecurity controlled

Computing Environment (CE)ArcGIS in a Cybersecurity Environment

Page 27: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Why do we need Cybersecurity?

For our program it is a requirement of our contract

Regardless of contractual requirements, adequate cybersecurity:

− Protects data (geospatial)

- Data may contain sensitive information

- Integrity of data is crucial

− Protects the investment

- Value of hours spent creating data

- Potential schedule risk if data lost

− Protects the equipment

- Maintain positive control of computer assets

- Liability if equipment is utilized for cyber attack

− Protects the users

- User and account name

- Contact information

27

Page 28: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

What is a Security Framework?

A series of documented processes that are used to create policies and

procedures around the implementation and ongoing management of

information security controls in an enterprise computing environment

− Guides the implementation

− Manages the security controls

A "blueprint" for building an information security program to manage

risk and reduce vulnerabilities

Numerous Frameworks available

ISO / IEC 27001 (International Standard)

OCTAVE (Operationally Critical Threat, Asset, and Vulnerability

Evaluation)

NIST Cybersecurity Framework (CSF)

NIST Risk Management Framework (RMF) (DoD required)

28

Page 29: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

National Institute of Standards and Technology (NIST)

Risk Management Framework (RMF)

29

U.S. Army Information Systems Engineering Command (USAISEC)

reviewed and determined security controls effectiveness

(FIPS SP 800-53A)

Select security controls;

applied tailoring guidance

and controls based on risk

assessment

(FIPS 200/SP 800-53)

Implement security

controls using engineering

practices; applied security

configuration settings

(FIPS SP 800-70)

Authoring Official (AO), determine

risk; authorize operation

(FIPS SP 800-37)

Continuously monitor and track

changes that affect security

controls, execute life cycle

(FIPS SP 800-37/SP 800-53A)

Defined network critical/sensitive according

to worst-case adverse impact to mission

(FPIS 199/SP 800-60)

Security

Scans and

Analysis

IAVM

Updates

Continuous

AuditDaily

Operation

New

STIGs

System

Changes

Security

Life

Cycle

NIST Special Publication 800-37 "Guide for

Applying the Risk Management Framework

to Federal Information Systems"

Page 30: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Resources

Information Assurance Support Environment (IASE) -

http://iase.disa.mil/Pages/index.aspx

RMF Knowledge Service - https://rmfks.osd.mil/default.aspx

eMASS Training -

https://disa.deps.mil/ext/cop/iase/emass/Pages/training.aspx

eMASS Portal - https://emass-army.csd.disa.mil/

NIST SP 800-53 - http://csrc.nist.gov/publications/ Currently REV4

NIST SP 800-53A - http://csrc.nist.gov/publications/ Currently REV4

DoDI 8500.1 – Cybersecurity -

http://www.dtic.mil/whs/directives/corres/pdf/850001_2014.pdf

To use eMASS, you must have access to a .mil network segment. It

is not reachable by commercial internet

30

Page 31: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

Esri ArcGIS in our

Cybersecurity controlled CEArcGIS in a Cybersecurity Environment

Page 32: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Our SE Core Computing Environment

32

Development Resources

IT

Quarant ine

HBSS

Printers

Terrain Users RDGT UsersData Backup

ServicesTerrain Generation Resources

Constructive Training System

Virtual Training System

Switches SwitchesOne-Way

Server

I&T Segment DMZTerrain Generation and Software Development

Game Based Training

Live Training SystemConsolePrinters(3)

Plotters

Users(6)

Tape

BackupMMBs(4/24)TV Master(4)

Storage

Server (5)Arc

SDE

Dev Users(45)

SDE

SQL

KVM

Arc

SDESDE

SQL

SW Build

Print

ServerNPS(2)

Arc

Portal

Storage

Servers(5)

Proxy

Security

Mngt

Tool and Database

Verification Equipment

Severs(2)

Storage Servers(6)

TV Master(2) MMBs(2/24)

Virtualization(4)

Console(5)

Development Users

Users(70) Users(16)

Internet

Connection

Virtual Local Area Networks (VLANs)

Firewall

Firewall

SANSAN

Console

KVM

Storage

Server(10)License/

Control(11)

IT

SQL

Firewall

Page 33: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Implement Cybersecurity - Network, Servers,

Workstations and Applications (1/2)

Overarching – Application of tested security updates within DoD

Information Assurance Vulnerability Management (IAVM) published

timelines, continuous monitoring of audit logs from all systems,

reoccurring system wide discovery and vulnerability scans, implement

access controls to restrict user access to only approved areas

Network – [Network Switches and Routers, Firewall] Access control

restricted, only approved protocols enabled, all ports, protocols, and

services are documented and registered, encryption algorithm

restricted to FIPS 140-2

Servers – Disabled unproved and unused services, no elevated user

access, Host Based Security System (HBSS) deployed with virus

protection, file integrity monitoring, on-access scan, Host intrusion

Prevention System (HIPS), Public Key Infrastructure with token based

logon, and firewall deployment

33

Page 34: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Implement Cybersecurity - Network, Servers,

Workstations and Applications (2/2)

Workstation – Disabled unproved and unused services, limited

elevated user access, Host Based Security System (HBSS) deployed

with virus protection, file integrity monitoring, on-access scan, Host

intrusion Prevention System (HIPS), Public Key Infrastructure with

token based logon, and firewall deployment

Applications – Restricted to Commercial (COTS) and Government

(GOTS) products that are vulnerability scanned and Configuration

Control Board (CCB) approved, internally develop products that

comply with development standards, Open Source products that are

treated with the same level of scrutiny as internally developed tools,

apply all applicable DoD-provided security technical implementation

guidelines (STIG)

34

Page 35: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Terrain Generation Network

• No administrative privilege

• Internet access restricted to

approved sites to support source

data exploitation

• Security configuration is tightly

managed as focus for this

environment is on controlled

repeatable processes

• Compliant with DoD Security

Requirements

Software Development Network

• Administrative privileges required

• Internet access restricted - blocked

software downloads

• Security configuration changes for

development network serve as a test

and validation of configurations

before they are applied to the terrain

generation network

• Security settings can be adjusted in

a controlled manner to facilitate

testing as needed

Segmented Network Design

35

• Enclave Test & Development STIG requires segmented environment

• Both terrain generation and software development environments are

required to be configured IAW DoD technical guidelines

Page 36: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Additional Development Network Requirements

Additional requirements for Development Environment and Activities

Adhere to industry recognized coding standards

− Documented development standards and coding guidelines

− Enforced through code peer review

Requires use of approved automated Static Code Analyzer (SCA)

− HP Fortify

Requiring FIPS 140-2 compliant encryption algorithms

− Broke some internally developed tools

− Required code correction to resolve

Open Source Tools / Products are required to go through the same

scrutiny as internally developed products

− Open Source Product source code must be run through SCA

− Any identified insecure coding practices must be corrected

36

Page 37: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Development Resources

IT

Quarant ine

HBSS

Printers

Terrain Users RDGT UsersData Backup

ServicesTerrain Generation Resources

Constructive Training System

Virtual Training System

Switches SwitchesOne-Way

Server

I&T Segment DMZTerrain Generation and Software Development

Game Based Training

Live Training SystemConsolePrinters(3)

Plotters

Users(6)

Tape

BackupMMBs(4/24)TV Master(4)

Storage

Server (5)Arc

SDE

Dev Users(45)

SDE

SQL

KVM

Arc

SDESDE

SQL

SW Build

Print

ServerNPS(2)

Arc

Portal

Storage

Servers(5)

Proxy

Security

Mngt

Tool and Database

Verification Equipment

Severs(2)

Storage Servers(6)

TV Master(2) MMBs(2/24)

Virtualization(4)

Console(5)

Development Users

Users(70) Users(16)

Internet

Connection

Virtual Local Area Networks (VLANs)

Firewall

Firewall

SANSAN

Console

KVM

Storage

Server(10)License/

Control(11)

IT

SQL

Firewall

Our SE Core ArcGIS Computing Environment

37

Development Resources

Terrain Users RDGT UsersData Backup

ServicesTerrain Generation Resources

Switches

DMZTerrain Generation and Software Development

Tape

Backup

Arc

SDE

Dev Users(45)

SDE

SQL

Arc

SDESDE

SQL

SW Build

Arc

Portal

Development Users

Users(70) Users(16)

Internet

Connection

Virtual Local Area Networks (VLANs)

Firewall

Firewall

License/

Control(11)

Our ArcGIS deployment

segmented into Terrain

Generation and Development

networks, with daily backup

and internet access

Page 38: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Our SE Core ArcGIS Computing Environment

ArcGIS deployment is also segmented between Terrain Generation

and Software Development

SQL servers and ArcGIS servers required on separate physical

hardware per SQL STIG

Development cannot use ArcGIS Online Community Resources

− Controlled distribution of SE Core data products prohibits sharing our

tools and data products to the public

− Cannot download or use plugins that haven’t gone through our required

extensive review and approval process

• Code analysis required

• Secure coding practice must be ensured

Esri ArcGIS Server has applied DoD approved STIG

Esri ArcGIS for desktop currently does not have a STIG

38

Page 39: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

ArcGIS for Server 10.3 Security Technical

Implementation Guideline

Developed by Esri and DISA for the DoD and published 2/26/16

Configured on both Software Development and Terrain Generation

ArcGIS implementations

Consists of multiple configurations that are audited with 22 checks

39

IIS - 5 checks

• SSL requirement

• Windows

Authentication enabled

• Anonymous

Connection disabled

• Client certs required

(CAC login)

ArcGIS Srvr - 14 checks

• HTTPS only

• Authentication Tier =

Web Tier

• Log levels = Verbose

• Update *.json files to

have isolation level of

HIGH

OS – 4 checks

• Audit file and directory

permissions

• FIPS algorithms

• Encryption (if

required)

• All other applicable

STIGS to the OS

Page 40: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

RMF Implementation Impacts to ArcGIS

Security and Functionality

− Implementation of technical security controls related to RMF resulted in

no failures of Esri Products in our facility

− SE Core plugins required update

Security and Performance

− Implementing technical controls, as required by RMF, impacted user

performance negatively, both directly and indirectly

− Direct Impact: McAfee Antivirus implementation

• On-Access Scanning impacted data access speeds at workstations

• Established exceptions for identified file types and locations, and

only these types and these locations

− Indirect Impact: Logging and Auditing

• Logging at the network, servers, workstations and applications, to

support auditing requirements, impacted user performance

• Tailored hardware configurations to compensate for increased

logging burden40

Page 41: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

Our Final ProductsArcGIS in a Cybersecurity Environment

Page 42: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Examples of Terrain Products (1/6)

42

Page 43: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Examples of Terrain Products (2/6)

43

Page 44: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Examples of Terrain Products (3/6)

44

Page 45: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Examples of Terrain Products (4/6)

45

Page 46: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Examples of Terrain Products (5/6)

46

Page 47: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

©2017 LEIDOS. ALL RIGHTS RESERVED.

Examples of Terrain Products (6/6)

47

Page 48: ArcGIS in a Cybersecurity Environment · 2017-06-29 · Major ArcGIS Plugin Developer Over 70,000 lines of code in our ArcGIS Utilities − 60% C# − 30% C++ − 10% Python Over

Questions (and Answers)ArcGIS in a Cybersecurity Environment