02.05.2019 Views

Cyber Defense eMagazine May 2019

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

“Standards-based cybersecurity risk management will continue to be a major factor in the trustworthiness<br />

of IoT applications and devices.” IoT is unique and will require tailoring existing standards as well as<br />

creating new standards to address the wide array of IoT devices. Without these standards it would be<br />

nearly impossible to harden IoT devices across the board and across various sectors, while maintaining<br />

their functionality (NIST, 2018 Internet). In addition, the report states, “… the adoption of IoT brings<br />

cybersecurity risks that pose a significant threat to the nation.”<br />

In September 2018, NIST release a draft of their internal report (NISTIR) 8222 Internet of Things (IoT)<br />

Trust Concerns. In it, they break down 17 trust concerns that impact the security of IoT devices and<br />

services and is derived from their SP 800-183 (“Networks of Things”). They identify actions for mitigation<br />

and push additional areas for further exploration and study. As of the publication date of this article, the<br />

current draft has been withdrawn from the web, “to synchronize with other pending documents on this<br />

topic, and to ensure time for stakeholders to review and comment.” NIST adds that, “Once the draft<br />

document has been re-posted, the comment period will be extended” (NIST, 2018 Interagency).<br />

To expand upon this, we feel a NIST Risk Management Framework (RMF) approach may be used to<br />

secure IoT devices. The RMF is a common information security framework used by the federal<br />

government to improve information security and risk management processes. Simply stated, the RMF<br />

provides a review of an information system’s security against established baselines. Identified risks are<br />

either fixed, mitigated, or deemed acceptable, in accordance with their usage. Once the system has gone<br />

through the testing phase of the RMF, the security and risk level of the system is vetted to the owner of<br />

the system. The designated “owner” may then accept the risk and grant the system an Authorization to<br />

Operate (ATO) on their network. The six-step process, involves 1) categorization of information systems<br />

based on impact due to loss of Confidentiality, Integrity, and Availability (CIA), 2) selection of security<br />

controls in accordance with a baseline and categorization results, 3) implementation of NIST security<br />

controls, 4) assessment of security controls addressing objectives and methods verifying compliance,<br />

schedule and procedures/validation and assessment with remediation as necessary, 5) authorization of<br />

information systems results in submittal and review of the package to the System Owner (SO) who will<br />

accept any residual risk and 6) monitoring of security controls to detect changes, their impact and<br />

updating of documentation to reflect current status. The cycle is typically three years before<br />

reassessment, unless other continuous monitoring strategies are in place.<br />

93

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!