NCCoE TRUSTED CLOUD: A SECURE SOLUTION

Similar documents
National Cybersecurity Center of Excellence

The Road Ahead for Healthcare Sector: What to Expect in Cybersecurity Session CS6, February 19, 2017 Donna F. Dodson, Chief Cybersecurity Advisor,

The NIST Cybersecurity Framework

National Cybersecurity Center of Excellence (NCCoE) Mobile Application Single Sign

Securing Wireless Medical Infusion Pumps A Use Case

National Cybersecurity Center of Excellence

National Institute of Standards and Technology

National Cybersecurity Challenges and NIST. Matthew Scholl Chief Computer Security Division

Track 4A: NIST Workshop

National Cybersecurity Center of Excellence (NCCoE) Energy Sector Asset Management

Cloud Customer Architecture for Securing Workloads on Cloud Services

standards and frameworks and controls oh my! Mike Garcia Senior Advisor for Elections Best Practices

Information Security Continuous Monitoring (ISCM) Program Evaluation

Cybersecurity Risk Management:

Smart Manufacturing and Standards: The NIST Role

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

Framework for Improving Critical Infrastructure Cybersecurity

Mitigating Cybersecurity Risk with Hyper-Segmentation

NW NATURAL CYBER SECURITY 2016.JUNE.16

Security and Privacy Governance Program Guidelines

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

CHALLENGES GOVERNANCE INTEGRATION SECURITY

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Accelerate Your Enterprise Private Cloud Initiative

NCSF Foundation Certification

Cybersecurity Roadmap: Global Healthcare Security Architecture

Federal Continuous Monitoring Working Group. March 21, DOJ Cybersecurity Conference 2/8/2011

Government IT Modernization and the Adoption of Hybrid Cloud

Secure Technology Alliance Response: NIST IoT Security and Privacy Risk Considerations Questions

Why you should adopt the NIST Cybersecurity Framework

Your Trusted Partner in Europe European Business Reliance Centre

Transforming IT: From Silos To Services

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

NIST Cybersecurity Testbed for Transportation Systems. CheeYee Tang Electronics Engineer National Institute of Standards and Technology

hosting Hosting Simplified

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Enterprise Risk Management (ERM) and Cybersecurity. Na9onal Science Founda9on March 14, 2018

Welcome to the Second Annual Intelligence & National Security Forum

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE

The NIS Directive and Cybersecurity in

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

EU General Data Protection Regulation (GDPR) Achieving compliance

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

DEFENSE LOGISTICS AGENCY AMERICA S COMBAT LOGISTICS SUPPORT AGENCY. Cyber Security. Safeguarding Covered Defense Information.

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Federal Mobility: A Year in Review

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

Cybersecurity Risk Management

Supporting the Cloud Transformation of Agencies across the Public Sector

NIST Special Publication

A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

Sales Presentation Case 2018 Dell EMC

Safelayer's Adaptive Authentication: Increased security through context information

GlobalPlatform Trusted Execution Environment (TEE) for Mobile

Achieving a Secure and Resilient Cyber Ecosystem: A Way Ahead

GDPR Update and ENISA guidelines

Transforming Security Part 2: From the Device to the Data Center

Cloud Services. Infrastructure-as-a-Service

FPM-IT-420B: FAC-P/PM-IT Planning & Acquiring Operations of IT Systems Course Details

Securing the Cloud Today: How do we get there?

Seagate Supply Chain Standards and Operational Systems

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

IMPROVING MOBILE AUTHENTICATION FOR PUBLIC SAFETY AND FIRST RESPONDERS

[NEC Group Internal Use Only] IoT Security. - Challenges & Standardization status. Sivabalan Arumugam.

The Windstream Enterprise Advantage for Healthcare

The Challenge of Cloud Security

Protecting the Nation s Critical Assets in the 21st Century

Cybersecurity and Data Protection Developments

TD01 - Enabling Digital Transformation Through The Connected Enterprise

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS

Cybersecurity & Privacy Enhancements

CYBERSECURITY FOR STARTUPS AND SMALL BUSINESSES OVERVIEW OF CYBERSECURITY FRAMEWORKS

Security Program Guide Security is designed from the outside in.

Software & Supply Chain Assurance: Enabling Enterprise Resilience through Security Automation, Software Assurance and Supply Chain Risk Management

Mitigating Risk with Ongoing Cybersecurity Risk Assessment. Scott Moser CISO Caesars Entertainment

IoT & SCADA Cyber Security Services

Who Goes There? Access Control in Water/Wastewater Siemens AG All Rights Reserved. siemens.com/ruggedcom

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education

Health Information Technology - Supporting Joint Readiness

NIST Cloud Computing Security Working Group

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

Designing a Day 1 Operating Model for Rapid Adoption of Converged Systems GLOBAL SPONSORS

Verizon Software Defined Perimeter (SDP).

Poor PAM processes and policies leave the crown jewels susceptible to security breaches Global Survey of IT Security Professionals

Federal Civilian Executive branch State, Local, Tribal, Territorial government (SLTT) Private Sector (PS) Unclassified / Business Networks

Introduction to AWS GoldBase

NCSF Foundation Certification

1560: Storage Management & Business Continuity Strategy and Futures

Security

Section One of the Order: The Cybersecurity of Federal Networks.

MITIGATE CYBER ATTACK RISK

BUSINESS CONTINUITY MANAGEMENT

Designing and Building a Cybersecurity Program

Twilio cloud communications SECURITY

Transcription:

SESSION ID: SPO1-W14 NCCoE TRUSTED CLOUD: A SECURE SOLUTION Donna Dodson Associate Director Chief Cyber Security Advisor of the Information Technology Laboratory, Chief Cybersecurity Advisor for the National Institute of Standards and Technology and Director of NIST s National Cybersecurity Center of Excellence (NCCoE). Zulfikar Ramzan, PhD Chief Technology Officer RSA

Mission Accelerate adoption of secure technologies: collaborate with innovators to provide real-world, standards-based cybersecurity capabilities that address business needs

Foundations Collaborative Hub The NCCoE assembles experts from businesses, academia, and other government agencies to work on critical national problems in cybersecurity. This collaboration is essential to exploring the widest range of concepts. As a part of the NIST cybersecurity portfolio, the NCCoE has access to a wealth of prodigious expertise, resources, relationships, and experience.

NCCoE Principles Standards-based Commercially available Modular Open Repeatable Usable and Transparent

Portfolio Attribute Based Access Control (SP 1800-3) CONSUMER/RETAIL Consumer/Retail: Multifactor Authentication for e-commerce Multifactor Authentication for e-commerce Data Integrity: Identifying and Protecting Data Integrity: Detecting and Responding Data Integrity: Recovering (SP 1800-11) Derived PIV Credentials (SP 1800-12) DNS-Based Email Security (SP 1800-6) Energy: Identity and Access Management (SP 1800-2) Energy: Situational Awareness (SP 1800-7) Financial Services: Access Rights Management (SP 1800-9) Financial Services: IT Asset Management (SP 1800-5) FINANCIAL SERVICES Privileged Account Management Financial Services: Privileged Account Management Healthcare: Securing Electronic Health Records on Mobile Devices (SP 1800-1) Healthcare: Securing Picture Archiving and Communication Systems Healthcare: Securing Wireless Infusion Pumps (SP 1800-8) Hospitality: Securing Property Management Systems Mitigating IoT-Based DDoS Manufacturing: Capabilities Assessment for Securing Manufacturing Industrial Control Systems Mobile Device Security: Cloud and Hybrid Builds (SP 1800-4) BUILDING BLOCK Attribute Based Access Control Mobile Device Security: Enterprise Builds Mobile Threat Catalogue BUILDING BLOCK Trusted Cloud Privacy-Enhanced Identity Federation Public Safety/First Responder: Mobile Application SSO Secure Inter-Domain Routing TLS Server Certificate Mgmt Transportation: Maritime: Oil & Natural Gas Trusted Geolocation in the Cloud (NISTIR 7904) Trusted Cloud

SP 1800 Series: Cybersecurity Practice Guides Volume A: Executive Summary Volume B: Approach, Architecture, and Security Characteristics Volume C: How-To Guide

NCCOE TRUSTED CLOUD PROJECT Helping businesses and the government unleash the power of the cloud

Opportunity with Cloud Technology Cloud Characteristics Flexible Available Resilient Scalable Benefits to an Organization Security Efficiency Innovation Competitiveness

Challenge with Cloud Technology Organizational Requirements Comply with applicable laws Who owns the information? What type of information? Where is the information? Meet organization's cybersecurity risk-management policies

Two Paths to the Cloud

Security Objectives CONSISTENCY VISIBILITY FLEXIBILITY

Overview of Trusted Cloud Project NCCoE Trusted Geolocation in the Cloud (aka as Trusted Cloud) project Trusted Cloud security capabilities across different cloud service models NIST Special Publication (SP) 1800

Current Implementations Hybrid Cloud IaaS Lift and shift a multi-tier workload between the NCCoE data center and the IBM cloud and maintain a connected management plane across the Internet Private Cloud IaaS Protect a sensitive high-value workload like an authentication/authorization system that interfaces with an application container workload supporting cloud native applications

Trusted Hybrid Cloud Architecture

What s Next? 1 2 3 4 Review NCCoE Projects Sign-up for NCCoE Updates Submit a Project Idea to NCCoE Collaborate and Share Best Practices