SlideShare a Scribd company logo
Leveraging Purchase Power and Standards to Improve Security in the IT Supply Chain John M. Gilligan Gilligan Group, Inc. December 10, 2008
Topics Background The “Good Old Days”—Status Quo The “Aha” Moment Standard Desktop becomes Federal Desktop Next steps Cyber Security Commission Recommendation Evolving Standards Summary (c) 2008, All Rights Reserved.  Gilligan Group Inc.
Relevant Background Air Force  700,000 Unclassified Desktops 60,000 Classified Desktops IT Spending $7B; Security Spending of $700 M Federal Government Approximately 4 million desktops IT Spending $60B; Security spending of $5B National Institutes of Standards and Technology (NIST) Provides IT Security Standards/Guidance (c) 2008, All Rights Reserved.  Gilligan Group Inc.
Air Force CIO Observations Regarding Software Security Spending more to “patch and fix” software systems than to purchase them SW vendor contract terms—no warranties, no standards, and no legal precedents for remedy AF IT purchasing is ad hoc (and expensive) Air Force is largest enterprise buyer for many vendors COTS software business model is fundamentally broken! (c) 2008, All Rights Reserved.  Gilligan Group Inc.
From National Institute of Standards and Technology  briefing--http://nvd.nist.gov/scap.cfm NIST provides  a lot  of guidance in security—is it addressing the right problem? (c) 2008, All Rights Reserved.  Gilligan Group Inc.
The Cyber Security Dilemma There are only so many resources available to be allocated against  all  IT priorities There is no such thing as perfect cyber security Finding flaws in cyber security implementation is a “target rich” environment How much security is enough, and where should investments be applied? (c) 2008, All Rights Reserved.  Gilligan Group Inc.
How to Assess Effective Security GAO Reports? Congressional FISMA Grades? Percentage of Systems Certified? Number of Systems with Contingency Plans? Agency Auditor Reports? The threat is increasing!  Are we focusing on the right things? "Pentagon Shuts Down Systems After  Cyber - Attack " Malicious scans of DoD increase 300%! (c) 2008, All Rights Reserved.  Gilligan Group Inc.
An “Aha” Moment! Scene :  2002 briefing by NSA regarding latest penetration assessment of DoD systems Objective:   Embarrass DoD CIOs for failure to provide adequate security. Subplot : If CIOs patch/fix current avenues of penetration, NSA would likely find others Realization : Let’s use NSA’s offensive capabilities to guide security investments Let “Offense Inform Defense”!  (c) 2008, All Rights Reserved.  Gilligan Group Inc.
AF Standard Desktop Concept NSA “Offensive Team” briefings to Air Force on attack patterns and vulnerabilities exploited ~80% of vulnerabilities tied to  incorrectly configured COTS software Joint effort by NSA, NIST, DISA, DHS, CIS, Microsoft to create Standard Desktop Configuration (SDC) for Microsoft Windows/Office/IE Address the source of the biggest problem—and do it in the supply chain! (c) 2008, All Rights Reserved.  Gilligan Group Inc.
Secure Desktop Configuration Defined ~ 600 security configuration settings for Windows XP and VISTA (out of 4477) Leveraged prior work by MS, NIST, CIS, NSA, DISA Protocols and software tools to validate implementation – CVE/OVAL  Phased Implementation (2005-2007) Senior-level governance process Software delivered from hardware vendors in “locked down” configuration (c) 2008, All Rights Reserved.  Gilligan Group Inc.
AF Standard Desktop Configuration Results Improved Security Drop in security events Reduced Patching time 57 days to 72 hours Reduced Costs of Operation and Ownership Hundreds of millions saved to date* Improved System Performance Common platform for COTS/GOTS applications * SDC Linked with Enterprise License Agreement and Commodity Purchasing Efforts (c) 2008, All Rights Reserved.  Gilligan Group Inc.
Security As Part of IT Commodity Life Cycle Management Enterprise Client PC Hardware Step 1:  USAF Quarterly Enterprise Buy (QEB) Standards – 700K purchased since Aug 2003;  $200M+ avoidance Enterprise Licensing and Services Step 2:  USAF Enterprise License Agreements – Implemented in Jul – Sep 2004 $100M+ savings by 2010 Enterprise Client, Server, and Active Directory Configurations Step 3:  USAF Standard Desktop Configuration – AF wide implementation in 2006; Servers 2008 Enterprise Configuration and Patch Management Step 4:  USAF Enterprise Configuration Management processes – Implementation 2006-2008 Comply and Connect Enforcement Step 5:  USAF Comply, Connect and Remediate policy and processes – Incremental improvements 2006-2009 (c) 2008, All Rights Reserved.  Gilligan Group Inc. Incremental Improvements in End Point and Server Capability and Security
AF Standard Desktop Configuration  FDCC Adopt AF-validated standard desktop concept OMB mandate for Federal Desktop Core Configuration (FDCC)—March 2007 Security Content Automation Protocol (SCAP) Validate configuration Check/remediate patching Asset management Standard vulnerability list Expanded across Federal government and extended automation support (c) 2008, All Rights Reserved.  Gilligan Group Inc. ( XCCDF-CCE-OVAL) (CVE-OVAL) ( CPE) (NVD-CVE-CVSS)
Next Steps--Cyber Security Commission Recommendation Mandate “Locked-down” configurations for all software delivered to the government  Build on existing efforts (e.g., NIST, BITS, FERC, NIAP, CIS) Public-private partnership to develop guidelines Self-certification by software vendors Satisfy security guidelines Do not “unlock” security of other software Expand FDCC Concept to all Software Products (c) 2008, All Rights Reserved.  Gilligan Group Inc.
Security Standards Efforts: Security Content Automation Protocol (SCAP) (c) 2008, All Rights Reserved.  Gilligan Group Inc.
Security Standards Efforts: Next Steps* *  Making Security Measurable –  The MITRE Corporation (c) 2008, All Rights Reserved.  Gilligan Group Inc.
Summary Need to fundamentally change business model for buying COTS software Vendors deliver “secure” configuration of products Use automated tools to validate security Integrate security with improved commodity supply chain management (planning, purchase, operations, disposal) Advancement of Standards and related Tools holds great promise for dramatic improvements to the IT Supply Chain (c) 2008, All Rights Reserved.  Gilligan Group Inc.
Contact Information John Gilligan [email_address] 703-503-3232 www.gilligangroupinc.com Making Security Measurable Bob Martin—MITRE Corporation [email_address] (c) 2008, All Rights Reserved.  Gilligan Group Inc.

More Related Content

PDF
Cybersecurity Application Installation with no Shutdown Required webinar Slides
PPT
Ensuring Effective Security The CIOs Dilemma 11 17 08
PPT
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
PDF
Robert Carey, Principal Deputy CIO, DOD Insight session
PPT
GSA's Presentation on Improving Cyber Security Through Acquisition
PDF
Securing the Supply Chain
PPTX
Prioritizing an audit program using the 20 critical controls
Cybersecurity Application Installation with no Shutdown Required webinar Slides
Ensuring Effective Security The CIOs Dilemma 11 17 08
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Robert Carey, Principal Deputy CIO, DOD Insight session
GSA's Presentation on Improving Cyber Security Through Acquisition
Securing the Supply Chain
Prioritizing an audit program using the 20 critical controls

What's hot (12)

PPTX
NIST IT Standards for Local Governments 2010
DOCX
The NIST Cybersecurity Framework
PDF
Implementing ID Governance in Complex Environments-HyTrust & CA Technologies
PPTX
OneAudit™ - Assess Once, Certify to Many
PDF
Helping Utilities with Cybersecurity Preparedness: The C2M2
PDF
Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...
PDF
Evolution of Security Management
PDF
Securing Networked Infrastructure for the Energy Sector
PDF
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
PDF
Process_to_Produce_Secure_Software-DHS_White-House_Geoff-Shively
PDF
White Paper Aaci Data Center Physical Security Mc Donald
PDF
TrustedAgent GRC for Vulnerability Management
NIST IT Standards for Local Governments 2010
The NIST Cybersecurity Framework
Implementing ID Governance in Complex Environments-HyTrust & CA Technologies
OneAudit™ - Assess Once, Certify to Many
Helping Utilities with Cybersecurity Preparedness: The C2M2
Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...
Evolution of Security Management
Securing Networked Infrastructure for the Energy Sector
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
Process_to_Produce_Secure_Software-DHS_White-House_Geoff-Shively
White Paper Aaci Data Center Physical Security Mc Donald
TrustedAgent GRC for Vulnerability Management
Ad

Similar to Security In The Supply Chain (20)

PPTX
Cyber Security: Threats and Needed Actions
PPTX
Cyber Security: Past and Future
PPT
Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09
PPTX
Cyber Security: Past and Future
PDF
New Solutions for Security and Compliance in the Cloud
PDF
Good-cyber-hygiene-at-scale-and-speed
PPTX
Life & Work Online Protecting Your Identity
DOC
Jennings it security overview 1 2
PPTX
Cybersecurity: Challenges, Initiatives, and Best Practices
DOCX
Resume -Resume -continous monitoring
DOCX
Resume -Resume -continous monitoring
PPTX
DojoSec FISMA Presentation
DOC
Jennings it security overview 1 2
PDF
Rothke - A Pragmatic Approach To Purchasing Information Security Products
PPT
Secure Financial Intelligence System
PPTX
Building a database security program
PPTX
Security best practices
PPTX
LIS3353 SP12 Week 9
PDF
Windows Server 2008 Security Overview Short
PDF
Windows Server 2008 Security Overview Short
Cyber Security: Threats and Needed Actions
Cyber Security: Past and Future
Massively Scaled Security Solutions for Massively Scaled IT:SecTor 09
Cyber Security: Past and Future
New Solutions for Security and Compliance in the Cloud
Good-cyber-hygiene-at-scale-and-speed
Life & Work Online Protecting Your Identity
Jennings it security overview 1 2
Cybersecurity: Challenges, Initiatives, and Best Practices
Resume -Resume -continous monitoring
Resume -Resume -continous monitoring
DojoSec FISMA Presentation
Jennings it security overview 1 2
Rothke - A Pragmatic Approach To Purchasing Information Security Products
Secure Financial Intelligence System
Building a database security program
Security best practices
LIS3353 SP12 Week 9
Windows Server 2008 Security Overview Short
Windows Server 2008 Security Overview Short
Ad

More from John Gilligan (6)

PPT
Understanding Technology Stakeholders
PPTX
Cyber Security: Threats and Needed Actions
PPTX
Automating Enterprise IT Management
PPTX
Solving the CIO’s Cybersecurity Dilemma
PPT
Cyber Security - the 21st Century Domain
PPT
Consensus Audit Guidelines 2008
Understanding Technology Stakeholders
Cyber Security: Threats and Needed Actions
Automating Enterprise IT Management
Solving the CIO’s Cybersecurity Dilemma
Cyber Security - the 21st Century Domain
Consensus Audit Guidelines 2008

Recently uploaded (20)

PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
project resource management chapter-09.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Hybrid model detection and classification of lung cancer
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Getting Started with Data Integration: FME Form 101
PDF
August Patch Tuesday
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Mushroom cultivation and it's methods.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Encapsulation_ Review paper, used for researhc scholars
Hindi spoken digit analysis for native and non-native speakers
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Programs and apps: productivity, graphics, security and other tools
Enhancing emotion recognition model for a student engagement use case through...
MIND Revenue Release Quarter 2 2025 Press Release
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
project resource management chapter-09.pdf
cloud_computing_Infrastucture_as_cloud_p
1 - Historical Antecedents, Social Consideration.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Hybrid model detection and classification of lung cancer
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
TLE Review Electricity (Electricity).pptx
Getting Started with Data Integration: FME Form 101
August Patch Tuesday
WOOl fibre morphology and structure.pdf for textiles
Mushroom cultivation and it's methods.pdf

Security In The Supply Chain

  • 1. Leveraging Purchase Power and Standards to Improve Security in the IT Supply Chain John M. Gilligan Gilligan Group, Inc. December 10, 2008
  • 2. Topics Background The “Good Old Days”—Status Quo The “Aha” Moment Standard Desktop becomes Federal Desktop Next steps Cyber Security Commission Recommendation Evolving Standards Summary (c) 2008, All Rights Reserved. Gilligan Group Inc.
  • 3. Relevant Background Air Force 700,000 Unclassified Desktops 60,000 Classified Desktops IT Spending $7B; Security Spending of $700 M Federal Government Approximately 4 million desktops IT Spending $60B; Security spending of $5B National Institutes of Standards and Technology (NIST) Provides IT Security Standards/Guidance (c) 2008, All Rights Reserved. Gilligan Group Inc.
  • 4. Air Force CIO Observations Regarding Software Security Spending more to “patch and fix” software systems than to purchase them SW vendor contract terms—no warranties, no standards, and no legal precedents for remedy AF IT purchasing is ad hoc (and expensive) Air Force is largest enterprise buyer for many vendors COTS software business model is fundamentally broken! (c) 2008, All Rights Reserved. Gilligan Group Inc.
  • 5. From National Institute of Standards and Technology briefing--http://nvd.nist.gov/scap.cfm NIST provides a lot of guidance in security—is it addressing the right problem? (c) 2008, All Rights Reserved. Gilligan Group Inc.
  • 6. The Cyber Security Dilemma There are only so many resources available to be allocated against all IT priorities There is no such thing as perfect cyber security Finding flaws in cyber security implementation is a “target rich” environment How much security is enough, and where should investments be applied? (c) 2008, All Rights Reserved. Gilligan Group Inc.
  • 7. How to Assess Effective Security GAO Reports? Congressional FISMA Grades? Percentage of Systems Certified? Number of Systems with Contingency Plans? Agency Auditor Reports? The threat is increasing! Are we focusing on the right things? "Pentagon Shuts Down Systems After Cyber - Attack " Malicious scans of DoD increase 300%! (c) 2008, All Rights Reserved. Gilligan Group Inc.
  • 8. An “Aha” Moment! Scene : 2002 briefing by NSA regarding latest penetration assessment of DoD systems Objective: Embarrass DoD CIOs for failure to provide adequate security. Subplot : If CIOs patch/fix current avenues of penetration, NSA would likely find others Realization : Let’s use NSA’s offensive capabilities to guide security investments Let “Offense Inform Defense”! (c) 2008, All Rights Reserved. Gilligan Group Inc.
  • 9. AF Standard Desktop Concept NSA “Offensive Team” briefings to Air Force on attack patterns and vulnerabilities exploited ~80% of vulnerabilities tied to incorrectly configured COTS software Joint effort by NSA, NIST, DISA, DHS, CIS, Microsoft to create Standard Desktop Configuration (SDC) for Microsoft Windows/Office/IE Address the source of the biggest problem—and do it in the supply chain! (c) 2008, All Rights Reserved. Gilligan Group Inc.
  • 10. Secure Desktop Configuration Defined ~ 600 security configuration settings for Windows XP and VISTA (out of 4477) Leveraged prior work by MS, NIST, CIS, NSA, DISA Protocols and software tools to validate implementation – CVE/OVAL Phased Implementation (2005-2007) Senior-level governance process Software delivered from hardware vendors in “locked down” configuration (c) 2008, All Rights Reserved. Gilligan Group Inc.
  • 11. AF Standard Desktop Configuration Results Improved Security Drop in security events Reduced Patching time 57 days to 72 hours Reduced Costs of Operation and Ownership Hundreds of millions saved to date* Improved System Performance Common platform for COTS/GOTS applications * SDC Linked with Enterprise License Agreement and Commodity Purchasing Efforts (c) 2008, All Rights Reserved. Gilligan Group Inc.
  • 12. Security As Part of IT Commodity Life Cycle Management Enterprise Client PC Hardware Step 1: USAF Quarterly Enterprise Buy (QEB) Standards – 700K purchased since Aug 2003; $200M+ avoidance Enterprise Licensing and Services Step 2: USAF Enterprise License Agreements – Implemented in Jul – Sep 2004 $100M+ savings by 2010 Enterprise Client, Server, and Active Directory Configurations Step 3: USAF Standard Desktop Configuration – AF wide implementation in 2006; Servers 2008 Enterprise Configuration and Patch Management Step 4: USAF Enterprise Configuration Management processes – Implementation 2006-2008 Comply and Connect Enforcement Step 5: USAF Comply, Connect and Remediate policy and processes – Incremental improvements 2006-2009 (c) 2008, All Rights Reserved. Gilligan Group Inc. Incremental Improvements in End Point and Server Capability and Security
  • 13. AF Standard Desktop Configuration FDCC Adopt AF-validated standard desktop concept OMB mandate for Federal Desktop Core Configuration (FDCC)—March 2007 Security Content Automation Protocol (SCAP) Validate configuration Check/remediate patching Asset management Standard vulnerability list Expanded across Federal government and extended automation support (c) 2008, All Rights Reserved. Gilligan Group Inc. ( XCCDF-CCE-OVAL) (CVE-OVAL) ( CPE) (NVD-CVE-CVSS)
  • 14. Next Steps--Cyber Security Commission Recommendation Mandate “Locked-down” configurations for all software delivered to the government Build on existing efforts (e.g., NIST, BITS, FERC, NIAP, CIS) Public-private partnership to develop guidelines Self-certification by software vendors Satisfy security guidelines Do not “unlock” security of other software Expand FDCC Concept to all Software Products (c) 2008, All Rights Reserved. Gilligan Group Inc.
  • 15. Security Standards Efforts: Security Content Automation Protocol (SCAP) (c) 2008, All Rights Reserved. Gilligan Group Inc.
  • 16. Security Standards Efforts: Next Steps* * Making Security Measurable – The MITRE Corporation (c) 2008, All Rights Reserved. Gilligan Group Inc.
  • 17. Summary Need to fundamentally change business model for buying COTS software Vendors deliver “secure” configuration of products Use automated tools to validate security Integrate security with improved commodity supply chain management (planning, purchase, operations, disposal) Advancement of Standards and related Tools holds great promise for dramatic improvements to the IT Supply Chain (c) 2008, All Rights Reserved. Gilligan Group Inc.
  • 18. Contact Information John Gilligan [email_address] 703-503-3232 www.gilligangroupinc.com Making Security Measurable Bob Martin—MITRE Corporation [email_address] (c) 2008, All Rights Reserved. Gilligan Group Inc.