NIST - SP.800-214 - 2020 Cybersecurity and Privacy Annual Report 2018
NIST - SP.800-214 - 2020 Cybersecurity and Privacy Annual Report 2018
CO-EDITORS:
Larry Feldman
Greg Witte
G2, Incorporated (“G2”)
a Huntington Ingalls Company
Annapolis Junction, Maryland
JANUARY 2020
TRADEMARK INFORMATION
All names are trademarks or registered trademarks of their respective owners.
II
“The more things change, the more they stay the same.” (From a French proverb)
Ten years ago, the National Institute of Standards and Technology (NIST) annual
report on cybersecurity featured accomplishments and challenges in quantum
computing, encryption, identity management, personal identity verification,
vulnerability measurements, assessing the security controls in federal information
systems, mobile devices, international standardization, and addressing the needs of
small and medium-sized businesses, all of which were among the many pressing topics
of the day. Sound familiar?
Reviewing those topics in the NIST Fiscal Year 2008 report on computer security
activities and accomplishments might lead some to conclude that the old French
proverb is true when it comes to cybersecurity. But in this case, a more appropriate
statement might be, “The more things appear to stay the same, the more quickly they
actually change.”
That certainly is true for the threat environment in which we function today. New attack
surfaces, new vulnerabilities, and new attackers emerge constantly. The creativity,
the dramatically increased frequency of attacks, and the ready availability of new
technologically enhanced modes of attack are even more difficult to identify—much
less protect, detect, respond to, and recover from—before they inflict great harm to U.S.
organizations and our economy, security, and society in general.
A decade later, these changes have enormous implications in a world that is so much
more dependent on digital devices, systems, and connectivity for carrying out both the
specialized and ordinary activities that drive our economy and safeguard our security.
They create thorny challenges as we seek balance in battling attacks and attackers while
preserving our intellectual property, privacy, civil rights, and liberties.
The speed with which our cybersecurity risks change means that everyone involved in
managing those risks needs to pick up the pace. That is what NIST is doing with the help
of many partners and through varied programs and approaches.
In Fiscal Year 2018, we received and worked on new cybersecurity-related assignments
from Congress and the President. Those have led us to focus our attention on assisting
small businesses, forging practical solutions to address security concerns raised by the
Internet of Things, and updating our guidance on risk management and security controls
for federal agencies and others. We also launched major new initiatives, including the
development of a voluntary framework for privacy risk management, standards for
III
Donna F. Dodson
NIST Chief Cybersecurity Advisor
2
NIST Cybersecurity, https://www.nist.gov/topics/cybersecurity
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
3
harter of the Information Security and Privacy Advisory Board (ISPAB), https://csrc.nist.gov/CSRC/media/
C
Projects/ISPAB/documents/ispab_charter_2016-2018.pdf
4
ederal Advisory Committee Act, https://uscode.house.gov/view.xhtml?path=/prelim@title5/title5a/
F 1
node2&edition=prelim
3 3
During FY18, NIST staff actively contributed to and held leadership positions in various
SDOs, including the American National Standards Institute (ANSI), the International
Organization for Standardization (ISO), the International Electrotechnical Commission
(IEC), the Institute of Electrical and Electronics Engineers (IEEE), the Internet
Engineering Task Force (IETF), the T Trusted Computing Group (TCG), the World Wide
Web Consortium (W3C), and the 3rd Generation Partnership Project (3GPP). Many of the
international SDOs have domestic counterparts. Figure 1, on the previous page; indicates
the SDOs in which NIST is actively engaged.
NIST staff have been actively participating in ISO standards bodies to raise awareness
and influence the development of privacy standards, including a new family of
ISO standards (developed primarily in ISO/IEC Joint Technical Committee (JTC 1)/
Subcommittee (SC) 27) that is aligned with the principles of the NIST Cybersecurity
Framework. Notably, NIST staff participates in the Technical Committee ISO/Program
Committee (PC) 317 – Consumer Protection: Privacy by Design for Consumer Goods
and Services, which focuses on developing ISO 31700 Consumer protection: Privacy by
Design for Consumer Goods and Services. NIST staff has also been engaged with several
privacy standards activities of the ITC 1/SC 27/Working Group (WG) 5. By participating,
NIST aims to sustain and promote the development and use of the NIST Privacy
Framework and its principles in the international arena.
NIST participation has also grown considerably in Internet of Things (IoT)
standardization activities, including JTC 1/SC 41 (IoT architecture and vocabulary,
IoT Interoperability, and IoT Applications), JTC 1/SC 27 (IoT aspects of Security and
Privacy), IETF – SW Updates for IoT, and the International Telecommunications
Union–Telecommunication Standardization Sector (ITU-T): Sector Joint Coordination
Activity on IoT and “IoT and Smart Cities.” NIST has been instrumental in promoting
and participating in the development of a family of voluntary ISO standards that align
with NIST’s cryptographic module validation standard and related specifications.
NIST serves as the project editor for nine of those standards. FIPS 140-3, Security
Requirements for Cryptographic Modules, points to ISO/IEC 19790, Security
Requirements for Cryptographic Modules. Testing for these requirements will be
performed in accordance with ISO/IEC 24759, Test Requirements for Cryptographic
Modules. This is an ongoing effort and will continue over the next several years to
support a smooth transition path to those using FIPS 140-3 specifications.
In FY19, NIST staff will continue to lead and participate in cybersecurity and privacy
standardization efforts with an increased focus on cybersecurity, privacy, and
cryptography, as well as on new and emerging areas such as Artificial Intelligence and
the Internet of Things. NIST will continue to provide thoughtful leadership in many SDOs
by actively participating in those organizations and contributing publications and papers.
• Update of the NIST Risk Management Framework (RMF). For years, the RMF
has been a mainstay for federal agencies and others to use in assessing and
managing cybersecurity needs and challenges. Two drafts of the new version
were produced in FY18—NIST Special Publication (SP) 800-37, Revision 25—
before becoming final in early FY19. Updates included significant new guidance
in addressing privacy risks and integrating security and privacy into the
design of systems. The RMF also references NIST systems security engineering
guidance at appropriate points, including NIST SP 800-160,6 which addresses the
engineering of trustworthy secure systems.
The revised RMF also offers additional guidance on:
• Better preparing an organization’s senior leaders to execute the RMF, as well
as how to communicate their protection plans and risk management strategies
to system implementers and operators.
• Incorporating supply chain risk management considerations. The RMF now
addresses growing supply chain concerns, such as counterfeit components,
tampering, theft, insertion of malicious software and hardware, poor
manufacturing and development practices, and other potentially harmful
activities that can impact an organization’s systems and systems components.
• Supporting security and privacy safeguards. The RMF update provides
organizations with a disciplined and structured process to select controls
from the newly developed consolidated security and privacy control catalog
in NIST’s SP 800-53 Revision 5.7 This should be valuable to companies and
organizations beyond the federal government, considering how high profile the
subject of privacy has become as of late.
Importantly, the revised RMF clarifies its relationship to the Cybersecurity Framework.
Aligning the RMF with other NIST guidance and publications will help federal agencies
which are required to implement multiple frameworks. While adhering to the CSF is
voluntary for private companies, its use for the federal government is not optional
under Executive Order 13800.8 Use of the RMF is mandatory for federal agencies in
accordance with the Federal Information Security Modernization Act (FISMA9). The RMF
is also required and in widespread use in the Department of Defense and the intelligence
5
Special Publication (SP) 800-37, Rev. 2, Risk Management Framework for Information Systems and Organizations: A
System Life Cycle Approach for Security and Privacy, https://csrc.nist.gov/publications/detail/sp/800-37/rev-2/final
6
SP
800-160, Vol. 2, Developing Cyber Resilient Systems: A Systems Security Engineering Approach, https://csrc.
nist.gov/publications/detail/sp/800-160/vol-2/draft
7
SP
800-53, Rev. 5, Security and Privacy Controls for Information Systems and Organizations, https://csrc.nist.gov/
publications/detail/sp/800-53/rev-5/draft
8
Presidential
Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure,
https://www.whitehouse.gov/presidential-actions/presidential-executive-order-strengthening-cybersecurity-
6 federal-networks-critical-infrastructure/
9
Federal
Information Security Modernization Act (FISMA), https://www.dhs.gov/fisma
community. That alignment of the Cybersecurity Framework and the RMF is still a work
in progress with NIST committed to producing improved guidance in 2019.
• Systems Security Engineering: Considerations for a Multidisciplinary Approach
in the Engineering of Trustworthy Secure Systems. The FY18 update of this
publication addresses the engineering-driven perspective and actions necessary to
develop more defensible and survivable systems, including the machine, physical,
and human components that compose the systems as well as the capabilities and
services delivered by those systems. It builds upon well-established international
standards for systems and software and fuses systems security engineering
methods, practices, and techniques. The objective is to address security
issues from the perspective of stakeholder protection needs, concerns, and
requirements using established engineering processes to ensure that those needs
are addressed with appropriate fidelity and rigor early on and in a sustainable
manner throughout the life cycle of the system. NIST also published a draft of the
first in a series of specialty publications developed to support the flagship NIST
Systems Security Engineering guideline. Volume 2 addresses cyber resiliency
considerations for two important yet distinct communities of interest represented
by organizations: those conducting new development of IT component products,
systems, and services; and those with legacy systems (installed base) currently
carrying out day-to-day missions and business functions.
• Privacy Framework: An Enterprise Risk Management Tool. There is growing
concern regarding privacy issues across the country and throughout the
world. Government organizations are putting into place multiplying privacy
requirements that cross borders in their implementation. That is why in FY18,
NIST laid the groundwork for developing a risk management-driven approach
that could be used by any organization that chooses to do so. The Privacy
Framework project, announced in September 2018 and expected to result in a
final Framework by late 2019, is being carried out based on the same type and
degree of extensive private-public sector collaboration that led to the widely
regarded Cybersecurity Framework.
Other risk management-focused NIST cybersecurity accomplishments in FY18 included
an update of NIST’s recommendations for protecting the confidentiality of controlled,
unclassified information (CUI) in non-federal systems and organizations. Safeguarding
that CUI is of paramount importance and can directly affect the ability of federal
agencies to successfully conduct their assigned missions and business operations.
NIST SP 800-171 Revision 110 recommends security requirements to those agencies. The
FY18 update included editorial changes to select CUI security requirements, additional
references and definitions, and an expanded discussion about each CUI requirement.
10
SP
800-171, Rev. 1, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations, 7
https://csrc.nist.gov/publications/detail/sp/800-171/rev-1/final
8 11
NIST
Asks Public to Help Future-Proof Electronic Information, https://www.nist.gov/news-events/news/2016/12/
nist-asks-public-help-future-proof-electronic-information
12
Lightweight
Cryptography Project, https://csrc.nist.gov/projects/lightweight-cryptography
13
SP
800-90B, Recommendation for the Entropy Sources Used for Random Bit Generation, https://csrc.nist.gov/
news/2018/nist-announces-the-release-of-sp-800-90b
14
NIST
Randomness Beacon, Version 2.0 Beta, https://beacon.nist.gov/home
15
SP
800-131A, Rev. 2, Transitioning the Use of Cryptographic Algorithms and Key Lengths, https://csrc.nist.gov/
publications/detail/sp/800-131a/rev-2/archive/2018-07-19
16
Automated
Cryptographic Validation (ACV) Testing, https://csrc.nist.gov/publications/detail/itl-bulletin/2018/09/
automated-cryptographic-validation-testing/final
Threshold Cryptography, https://csrc.nist.gov/projects/threshold-cryptography 9
17
18
Circuit
Complexity, https://csrc.nist.gov/projects/circuit-complexity
19
The
Economic Impact of the Advanced Encryption Standard, 1996-2017, https://csrc.nist.gov/publications/detail/
10 white-paper/2018/09/07/economic-impacts-of-the-advanced-encryption-standard-1996-2017/final
20
FIPS
197, https://csrc.nist.gov/publications/detail/fips/197/final
11
21
NIST
Cloud Computing Program (NCCP), https://www.nist.gov/programs-projects/nist-cloud-computing-
program-nccp
22
SBIR
Success Story: InfoBeyond Technology LLC, https://www.nist.gov/tpo/sbir-success-story-infobeyond-
technology-llc
23
NIST
Cloud Security Architecture Tool (CSAT), https://www.fbcinc.com/e/fitsc/presentations/Iorga-fitsc-csat_
with_rmfoscal.pdf
12 24
SP
1800-4, Mobile Device Security: Cloud and Hybrid Builds, https://www.nccoe.nist.gov/projects/building-
blocks/mobile-device-security/cloud-hybrid
able to receive sensor data from devices located 5 miles away from the receptor.
Potential security weaknesses and possible mitigations arising out of this
experience with LPWAN technology are now being investigated. Researchers
have learned that WiFi and Bluetooth do not naturally apply to some IoT/CPS
deployment scenarios, particularly when deployment is outside, requires battery
operation for extended periods, or must operate over a long range. In FY18, the
team also deployed an LPWAN Infrastructure that was integrated with NIST’s
internal network, NIST-Net, satisfying all security policies required by NIST. In
FY19, the NIST Engineering Laboratory (EL), NIST/ITL, and National Institute of
Metrology, Standardization and Industrial Quality (INMETRO) team will study
the implementation of LPWAN on the Smart Grid and investigate LPWAN in the
context of Smart Grid cybersecurity guidelines.
• Open Security Controls Assessment Language (OSCAL). Today, concepts like
security controls and profiles are largely represented in proprietary ways, making
it more difficult for many organizations to move forward as quickly as they need
to in order to take advantage of these approaches. Organizations also often
struggle with information systems that have many different components. To help
address these problems, NIST is developing OSCAL—a standard for representing
different categories of information about the publication, implementation, and
assessment of security controls. In FY18, NIST completed a control catalog
and profile schemas and began developing an implementation schema for
representing system security plans (SSP) in OSCAL. The team validated the
approach with several use cases. In FY19, NIST will continue to develop other
approaches involving the Cybersecurity Framework as well as assessments and
assessment results.
• Combating Ransomware. NIST has placed a high priority on identifying and
demonstrating tools for identifying, protecting against, detecting, responding
to, and recovering from ransomware attacks and other events that are
destructive to systems and operations. In FY18, NIST released Data Integrity:
Recovering from Ransomware and Other Destructive Events (SP 1800-11)25 for
public comment and initiated two other ransomware projects, Data Integrity:
Identifying and Protecting Against Ransomware and Other Destructive
Events26 and Detecting and Responding to Ransomware and Other Destructive
Events.27 Finalization of SP 1800-11 and development of practice guides for
the identification and protection and the detection and response projects are
planned for FY 2019.
25
SP
1800-11, Data Integrity: Recovering from Ransomware and Other Destructive Events, https://www.nccoe.nist.
gov/projects/building-blocks/data-integrity/recover
26
Data
Integrity: Identifying and Protecting Assets Against Ransomware and Other Destructive Events, https://
www.nccoe.nist.gov/projects/building-blocks/data-integrity/identify-protect
27
Data
Integrity: Detecting and Responding to Ransomware and Other Destructive Events, https://www.nccoe.nist. 13
gov/projects/building-blocks/data-integrity/detect-respond
14
28
SP
800-193, Platform Firmware Resiliency Guidelines, https://csrc.nist.gov/publications/detail/sp/800-193/final
People are often the most underappreciated ingredient in the people, process, and
technology formula that determines an organization’s readiness to understand and deal
with cybersecurity challenges. This includes gaps in users’ and providers’ awareness
about how to access cybersecurity guidelines and tools that apply to their own
operations and environments along with a shortage of people who have the needed
cybersecurity education, training, and experience.
In FY18, NIST placed a greater emphasis on improving the public availability of information
resources by providing them to small businesses in the form of briefings, advancing
awareness and understanding of human factors contributing to cybersecurity challenges,
and recommendations for steps to address workforce shortage and training issues.
FY18 web-accessible information resources included: the Computer Security Resource
Center (CSRC),29 National Software Reference Library (NSRL),30 Security Automation
Reference Data and the National Vulnerability Database (NVD),31 National Checklist
Program (NCP) repository,32 Software Assurance and Quality Software Assurance
Reference Dataset (SARD),33 and Computer Forensics Tool Testing Project tool
catalog34 and reference data sets.35 Ongoing federal outreach efforts include the
Software and Supply Chain Assurance (SSCA) Forum,36 the Federal Computer Security
Managers’ (FCSM) Forum,37 and the Federal Information Systems Security Educators’
Association (FISSEA).38
• Cybersecurity for Small Businesses. Small and medium-sized businesses (SMBs)
represent approximately 95 % of all businesses and are often considered to be the
backbone of the U.S. economy. Typically faced with limited budgets, SMBs need
practical resources that enable them to understand and cost-effectively address
their cybersecurity risks. NIST has been working on behalf of SMBs for many years,
29
Computer Security Resource Center (CSRC), https://csrc.nist.gov
30
National
Software Reference Library (NSRL), https://www.nist.gov/software-quality-group/national-software-
reference-library-nsrl
31
National
Vulnerability Database (NVD), https://nvd.nist.gov/
32
National
Checklist Program (NCP) Repository, https://nvd.nist.gov/ncp/repository
33
NIST
Software Assurance Reference Dataset (SARD) Project, https://samate.nist.gov/sard/
34
Computer
Forensics Tools and Techniques Catalog, https://toolcatalog.nist.gov/
35
Computer Forensic Reference Data Sets (CFReDS), https://www.cfreds.nist.gov/
36
Software
and Supply Chain Assurance (SSCA) Forum, https://csrc.nist.gov/projects/cyber-supply-chain-risk-
management/ssca
37
Federal
Computer Security Managers’ Forum, https://csrc.nist.gov/events/2018/federal-computer-security-
managers-forum-2-day 15
38
Federal
Information Security Educators (FISSEA), https://csrc.nist.gov/projects/fissea
together with interagency and industry partners and collaborators. The NIST
Small Business Cybersecurity Act, which became law on August 14, 2018, codified
the Institute’s focus on small businesses. Specifically, the statute directed NIST to
“disseminate clear and concise resources to help small business concerns identify,
assess, manage, and reduce their cybersecurity risks.” During FY18, the NIST Small
Business Outreach Program began updating the Small Business Cybersecurity
Corner website to make resources easier to find and use. In FY19, those training
materials and accompanying resources will be expanded based on contributed
cybersecurity resources and feedback received from federal partners and the public.
• National Initiative for Cybersecurity Education (NICE). Hosted by NIST, NICE
seeks to help equip, promote, and energize a robust network of organizations
that address cybersecurity education, training, and workforce development.
Efforts to achieve this goal include: 1) accelerating learning and skills development,
2) nurturing a diverse learning community, and 3) guiding career development and
workforce planning to achieve each of the objectives identified in the NICE
Cybersecurity Workforce Framework.39
In FY18, fulfilling a directive in Executive Order 13800,40 NICE joined with the
Department of Homeland Security to prepare a report to the President41 that
made a series of recommendations. In their transmittal to the President, the
Commerce and Homeland Security Secretaries noted that “in both the private
and public sectors, cybersecurity practitioners and educators are vital to our
national security—especially since other nations are paying greater attention
to their cybersecurity workforce needs and the cybersecurity weaknesses of
their adversaries.” The report was based on an analysis of available data and
the information and views shared by businesses, educational organizations,
training and certification providers, government agencies at multiple levels,
and individuals. Findings and specific, forward-thinking, and actionable
39
NICE
Cybersecurity Workforce Framework, https://www.nist.gov/itl/applied-cybersecurity/nice/resources/nice-
cybersecurity-workforce-framework
40
Executive
Order (EO) 13800, Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure,
https://www.whitehouse.gov/presidential-actions/presidential-executive-order-strengthening-cybersecurity-
federal-networks-critical-infrastructure/
41
A
Report to the President: Supporting the Growth and Sustainment of the Nation’s Cybersecurity Workforce:
16 Building the Foundation for a More Secure American Future, https://csrc.nist.gov/publications/detail/white-
paper/2018/05/30/supporting-growth-and-sustainment-of-the-cybersecurity-workforce/final
recommendations addressed both public and private sector needs (see Text Box
#4). In FY19, the President issued another executive order42 directing agencies to
implement those recommendations
In FY18, the NICE program worked to enhance CyberSeek.45 This tool was
developed in partnership with industry to help employers, job seekers, policy
makers, training providers and guidance counselors find information on the supply
42
Executive
Order on America’s Cybersecurity Workforce, https://www.whitehouse.gov/presidential-actions/
executive-order-americas-cybersecurity-workforce/
43
Federal
Cybersecurity Workforce Strategy, https://chcoc.gov/content/federal-cybersecurity-workforce-strategy
Federal Cybersecurity Workforce Assessment Act, https://www.congress.gov/bill/114th-congress/senate-bill/2007 17
44
45
CyberSeek, https://www.nist.gov/itl/applied-cybersecurity/nice/cyberseek
18
46
International
Organization for Standardization (ISO), https://www.iso.org/home.html
47
Internet
Engineering Task Force (IETF), https://www.ietf.org/about/
48
Fast
IDentity Online Alliance (FIDO), https://fidoalliance.org/
49
Kantara
Initiative, https://kantarainitiative.org/
50
Authentication
for Law Enforcement Vehicle Systems, https://www.nccoe.nist.gov/projects/project-concepts/
authentication-law-enforcement-vehicle-systems
51
SP
1800-3, Attribute Based Access Control, https://www.nccoe.nist.gov/projects/building-blocks/attribute-based-
access-control
52
SP
1800-13, Mobile Application Single Sign-On, https://www.nccoe.nist.gov/projects/use-cases/mobile-sso
53
SP
1800-17, Multifactor Authentication for E-Commerce, https://www.nccoe.nist.gov/projects/use-cases/ 19
multifactor-authentication-ecommerce
54
Personal
Identity Verification of Federal Employees and Contractors, https://csrc.nist.gov/projects/piv
55
FIPS
201-2, https://csrc.nist.gov/publications/detail/fips/201/2/final
56
SP
800-116, Rev. 1, Guidelines for the Use of PIV Credentials in Facility Access, https://csrc.nist.gov/publications/
detail/sp/800-116/rev-1/final
57
SP
1800-12, Derived PIV Credentials Practice Guide, https://www.nccoe.nist.gov/library/derived-piv-credentials-
nist-sp-1800-12-practice-guide
58
SP
1800-9, Access Rights Management for Financial Services Sector, https://www.nccoe.nist.gov/projects/use-
cases/access-rights-management
20 59
SP 1800-18, Privileged Account Management for Financial Services Sector, https://www.nccoe.nist.gov/projects/
use-cases/privileged-account-management
NIST is focusing on three major national critical infrastructure programs where effective
cybersecurity is a vital element: the internet infrastructure, Energy Infrastructure
Cybersecurity, and cybersecurity aspects of electronic voting.
• Internet Infrastructure Protection (IIP). NIST works with industry to develop the
measurement science, new standards, and standards implementation capabilities
necessary to ensure the resilience and security of the global Internet. In FY18,
research focused on developing measurement and modeling techniques necessary
to understand, predict, and control the behavior of internet-scale networked
information systems, especially foundational routing and communications
protocols. This includes the internet’s Domain Name System (DNS), Border
Gateway Protocol (BGP), and electronic mail and messaging infrastructures. In
addition, NIST has been giving special attention to systemic vulnerabilities in
core internet technologies such as those that enable distributed denial-of-service
(DDoS) attacks on a massive scale.
In FY18, multiple NIST publications contributed to showing how to remedy serious
security and robustness vulnerabilities in network infrastructures. Cybersecurity
practice guides were developed with step-by-step example solutions using
commercially available technologies. These included SP 1800-6,60 which shows
how to combat spear phishing by improving assurance of the correctness of email
sources, destinations, and cryptographic protection of email, and SP 1800-14,61
which explains how service providers can better control routing of internet traffic.
NIST also initiated a network infrastructure project to illustrate how to better
manage cryptographic certificates in order to reduce system outage and security
breach risks (SP 1800-16).62 In addition to completing ongoing network security
activities in FY19, NIST plans to collaborate with government and private industry
on a major feasibility demonstration effort for transitioning systems and services
from IPv4 to improved IPv6 information transfer protocols.
60
SP
1800-6, Domain Name System-Based Electronic Mail Security, https://www.nccoe.nist.gov/projects/building-
blocks/secured-email
61
SP
1800-14, Protecting the Integrity of Internet Routing Practice Guide, https://www.nccoe.nist.gov/projects/
building-blocks/secure-inter-domain-routing
62
SP
1800-16, Securing Web Transactions Practice Guide, https://www.nccoe.nist.gov/projects/building-blocks/tls- 21
server-certificate-management
63
Energy
Independence and Security Act of 2007, https://www.congress.gov/bill/110th-congress/house-bill/6
64
SmartGrid,
https://www.smartgrid.gov/
65
Smart Grid Framework, https://www.nist.gov/engineering-laboratory/smart-grid/smart-grid-framework
66
SP
1800-2, Identity and Access Management (IdAM), https://www.nccoe.nist.gov/projects/use-cases/idam
22 67
SP
1800-7, Situational Awareness for Electric Utilities, https://www.nccoe.nist.gov/projects/use-cases/
situational-awareness
NIST also began to incorporate cybersecurity risk management into the next
version of the Smart Grid Interoperability Framework. In FY19, NIST will continue
to develop the next version of the Smart Grid Interoperability Framework 2.0,
chair the Smart Electric Power Alliance (SEPA)68 Smart Grid Cybersecurity
Committee, support the Department of Energy’s Cyber Resilient Energy Delivery
Consortium (CREDC) program,69 finalize SP 1800-7,70 and undertake capability
demonstration and documentation activities for an Energy Sector Asset
Management71 project.
68
Smart
Electric Power Alliance (SEPA), https://sepapower.org/
69
Cyber Resilient Energy Delivery Consortium (CREDC), https://cred-c.org/
70
SP
1800-7, Situational Awareness for Electric Utilities, https://www.nccoe.nist.gov/projects/use-cases/
situational-awareness
71
SP 1800-23, Energy Sector Asset Management Practice Guide, https://www.nccoe.nist.gov/projects/use-cases/
energy-sector/asset-management
72
Help America Vote Act of 2002 (HAVA), https://www.law.cornell.edu/wex/hava
73
U.S. Election Assistance Commission, https://www.eac.gov/
74
echnical Guidelines Development Committee, https://www.eac.gov/about/technical-guidelines-
T
development-committee/ 23
75
Voluntary Voting System Guidelines, https://www.eac.gov/voting-equipment/voluntary-voting-system-guidelines/
76
NISTIR 8228, Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks, https://csrc.
nist.gov/publications/detail/nistir/8228/final
77
Identity and Access Management for Smart Home Devices, https://www.nccoe.nist.gov/projects/project-
concepts/idam-smart-home-devices
78
SP 1800-15, Securing Small Business and Home Internet of Things (IoT) Devices: Mitigating Network-Based
Attacks Using Manufacturer Usage Description (MUD), https://www.nccoe.nist.gov/projects/building-blocks/
mitigating-iot-based-ddos
24 79
NISTIR 8200, Interagency Report on Status of International Cybersecurity Standardization for the Internet of
Things (IoT), https://csrc.nist.gov/publications/detail/nistir/8200/archive/2018-02-14
Figure 3: IoT for the GSA Smart Building, from NISTIR 8200
25
BOTNET REPORT
A Report to the President on Enhancing the Resilience of the Internet and
Communications Ecosystem Against Botnets and Other Automated, Distributed
Threats,80 released on May 30, 2018, outlines government and the private sector
actions that would reduce the threat of botnets and similar cyberattacks. It
responds to the May 11, 2017, Executive Order on Strengthening the Cybersecurity
of Federal Networks and Critical Infrastructure.81 That order directed the
Secretaries of Commerce and Homeland Security to lead “an open and
transparent process to identify and promote action by appropriate stakeholders”
with the goal of “dramatically reducing threats perpetrated by automated and
distributed attacks (e.g., botnets).” In the course of the year-long effort launched
by the Executive Order, the Departments determined that the opportunities and
challenges of working toward dramatically reducing threats from automated,
distributed attacks can be summarized in six principal themes:
1. Automated, distributed attacks are a global problem.
2. Effective tools exist but are not widely used.
3. Products should be secured during all stages of the lifecycle.
4. Awareness and education are needed.
5. Market incentives should be more effectively aligned.
6. Automated, distributed attacks are an ecosystem-wide challenge
Five complementary and mutually supportive goals were identified that, if
realized, would dramatically reduce the threat of automated, distributed attacks
and improve the resilience and redundancy of the ecosystem:
Goal 1: Identify a clear pathway toward an adaptable, sustainable, and secure
technology marketplace.
Goal 2: Promote innovation in the infrastructure for dynamic adaptation to
evolving threats.
Goal 3: Promote innovation at the edge of the network to prevent, detect, and
mitigate automated, distributed attacks.
Goal 4: Promote and support coalitions between the security, infrastructure,
and operational technology communities domestically and around the world.
Goal 5: Increase awareness and education across the ecosystem.
80
Report to the President on Enhancing the Resilience of the Internet and Communications Ecosystem
A
Against Botnets and Other Automated, Distributed Threats, https://csrc.nist.gov/publications/detail/white-
paper/2018/05/30/enhancing-resilience-against-botnets--report-to-the-president/final
26 81
xecutive Order (EO) 13800, Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure,
E
https://csrc.nist.gov/topics/laws-and-regulations/executive-documents/eo-13800
83
SP
500-325, Fog Computing Conceptual Model, https://csrc.nist.gov/publications/detail/sp/500-325/final
28
84
NISTIR 8219, Securing Manufacturing Industrial Control Systems: Behavioral Anomaly Detection, https://csrc.nist.
gov/publications/detail/nistir/8219/draft
85
Enhancing Resilience Through Cyber Incident Data Sharing and Analysis, https://www.cisa.gov/sites/default/files/ 29
publications/Overcoming%20Perceived%20Obstacles%20White%20Paper_1.pdf
to services from NIST’s NVD and DHS’s Automated Indicator Sharing (AIS)86 tool.
The research effort’s output will be an initial proposed set of cyber incident data
points with associated metrics. A common lexicon is being explored through
collaboration with the Department of Defense and its DoD Cybersecurity Analysis
and Review (DoDCAR)87 program to incorporate the Open Security Controls
Assessment Language (OSCAL) to support the automation of reporting for
cybersecurity assessment-related information.
• Asset Management. One of the immediate challenges most frequently cited by
organizations is how they can establish and maintain complete records of their
hardware, software, and information assets. Without knowing what hardware
and software assets are in their inventories, they cannot effectively ascertain
and monitor the security status of systems. NIST is collaborating with industry
partners to promote the adoption of ISO/IEC 19770-2:2015,88 which establishes
a specification for representing software identification and management
information, and with DHS to produce guidelines for interoperable software
identification (SWID) tags (NISTIR 8060).89 In FY18, NIST worked with the
IETF to integrate SWID tags into the Network Endpoint Assessment (NEA)90
protocol (RFC 8412),91 helped to develop a draft software inventory message and
attributes (SWIMA) specification,92 and released project webpages93 to provide
information on tagging. In FY18, NIST also finalized a guide that shows healthcare
organizations how to protect electronic health records from being exploited in a
manner that endangers patient health or compromises identity and privacy (SP
1800-1).94 NIST also released a guide that shows financial service organizations a
way to more securely and efficiently monitor and manage their many information
technology hardware and software assets (SP 1800-5).95 In FY19, NIST plans to
continue its SWID standardization activity and begin work on a Practice Guide
for using cybersecurity mechanisms to protect systems from exploitation from
internal and external network access.
86
Automated
Indicator Sharing (AIS), https://www.dhs.gov/cisa/automated-indicator-sharing-ais
87
DoD Cybersecurity Analysis and Review, https://csrc.nist.gov/CSRC/media/Projects/cyber-supply-chain-risk-
management/documents/SSCA/Fall_2018/WedPM2.2-STARCAR%20SCRM%20FINAL%20508.pdf
88
ISO/IEC 19770-2:2015, https://www.iso.org/standard/65666.html
89
NISTIR 8060, Guidelines for the Creation of Interoperable Software Identification (SWID) Tags, https://csrc.nist.
gov/publications/detail/nistir/8060/final
90
Network Endpoint Assessment (NEA), https://tools.ietf.org/html/rfc5209
91
Software Inventory Message and Attributes (SWIMA) for PA-TNC, https://tools.ietf.org/html/rfc8412
92
Software Inventory Message and Attributes (SWIMA), https://datatracker.ietf.org/doc/rfc8412/
93
Software Identification (SWID) Tagging, https://csrc.nist.gov/projects/software-identification-swid
94
SP 1800-1, Securing Electronic Health Records on Mobile Devices, https://www.nccoe.nist.gov/projects/use-cases/
health-it/ehr-on-mobile-devices
95
SP 1800-5, IT Asset Management, https://www.nccoe.nist.gov/projects/use-cases/financial-services-sector/it-
30 asset-management
96
Automated
Combinatorial Testing for Software, https://csrc.nist.gov/projects/automated-combinatorial-testing- 31
for-software