Northrop Grumman Corporation Operating Safely in a Cyber Dense Environment – the Good, the Bad, and the Ugly. World Air Traffic Management Congress March 2016 Dr. Dennis McCallam, DIA. Northrop Grumman Fellow
Who we are • Leading global security company • $24 billion sales in 2014 • $38.2 billion total backlog • Leading capabilities in: – Unmanned Systems – Cyber – C4ISR – Logistics Focus on Performance 2 Approved For Public Release # 16-0385; Unlimited Distribution
Agenda • Lets put a context on the cyber threat from a capability standpoint • The cyber environment out there….ugly • Understanding that our environment has both enterprise and platform information systems • Some thoughts on security engineering and resilience • Some ways ahead (and some good news) Approved For Public Release # 16-0385; Unlimited Distribution
Looking at the Threat Landscape - Capabilities 1 Use existing malicious code and known exploits The Known - Develop tools to use known exploits against publically 2 Known known vulnerabilities Develop and use unknown malicious code against known 3 The vulnerabilities Known- Unknown Criminal or state actors who discover new vulnerabilities 4 and develop exploits against known vulnerabilities State actors who create vulnerabilities and impact products The 5 in the supply chain to enable exploitation of networks and systems of interest Unknown - Unknown States with the ability to successfully execute full spectrum 6 cyber operations * Defense Science Board Task Force Report: Resilient Military Systems and the Advanced Cyber Threat January 2013 4 Approved For Public Release # 16-0385; Unlimited Distribution
So….How vulnerable are things • Some factual attacks or alerts – Computer researcher hacked into aircraft control system (masquerading as a passenger): May 2015 • Contention between safety and security – Johnson, C. (2016). Why We Cannot (Yet) Ensure the Cyber-Security of Safety- Critical Systems. – Need to address the difference between platform (sensor, etc) systems and enterprise systems • Some urban legend attacks – Was it a virus or a bad maintenance computer? 5 Approved For Public Release # 16-0385; Unlimited Distribution
Cyber resilience impacts a lot of things Enterprise IT System of Systems Platform IT The traditional IP based IT Combination of platform and The IT residing within and on infrastructure: HW/SW and all enterprise IT systems (their platforms that it touches sensors and components) that make up the mission KEY CHARACTERISTICS KEY CHARACTERISTICS KEY CHARACTERISTICS • More homogenous and known • Hybrid – multiple interfaces • Some non-Internet operating • Infrastructure dependent across enterprise and systems, protocols and transport • Designed to manage large platform • Proprietary components volumes of critical data • Huge attack surface • Some legacy systems, • Events are played out in • Risk of “Pearl Harbor” if pre-“cyber era” massive scale in public “jump the gap” events • Solutions must be safety-centric • Vast array of COTS cyber tools of varying effectiveness Not everything is the same. 6 Derived from DoDD 8500.1, Paragraph E2.1.16.4 Approved For Public Release # 16-0385; Unlimited Distribution
Security Engineering: Simplified • Continuously improve your C4ISR architecture with security in mind – Think: “Secure by Design” • The Internet of Things (and a lesson for us) 192.168.0.63 …and I just hacked a bank. Where Should We Protect From? 7 Approved For Public Release # 16-0385; Unlimited Distribution
Cyber Threats…Are They Really Everywhere? Performance Data Recorder Supply Chain Bluetooth/4G/OnStar Keyless Entry Remote Start Security Engineering and Vulnerability Analysis Enable Successful Cyber Design and Test 8 Approved For Public Release # 16-0385; Unlimited Distribution
The Resilience Lifecycle Start Secure. Stay Secure. Return Secure. ™ TRUSTED BASELINE RESILIENT OPERATIONS SECURE RE-BASELINING Operations & Support Upgrade & Modernize Design, Acquire, Build & Field • Detect/prevent loss of sensitive information • Maintain supply chain • Avoid supply chain intrusion integrity • Operate through attacks • Continually assess security • Preserve software integrity posture • Respond to attacks across the board, not just on IP-based connections • Prevent malware injection • Detect & reject built-in malware and undocumented features • Detect RF links & code insertion • Prevent security mitigation bypass • Design holistically • Prevent mission critical function alteration • Detect non-intentional S/W • Follow software assurance • Monitor for mission load compromise modifications processes • Review & protect diagnostic • Ensure software provenance equipment injection points • Detect & reject counterfeit parts Attack Vectors Resilience Approaches • Ensure software/data • Prevent contract process flaws Data integrity Start Secure Code • Secure related environments Infrastructure Communications Stay Secure People Return Secure Mission Assurance 9 Approved For Public Release # 16-0385; Unlimited Distribution
Some good news • The enterprise IT side is well understood – Build on the shoulders of giants • The safety and operational demands on ATC Platform IT is a GREAT start towards cyber protection – Code evaluations – Secure CM and patch control • We can and should get into two rhythms – Start secure, Stay secure, Seturn secure™ to help with the development and architecture of the next generation systems – Secure it, Optimize it, Evolve it ™ to make sure we always know where we are and know where we are going • Secure the design data of your system – it is critical 10 Approved For Public Release # 16-0385; Unlimited Distribution
Final thoughts - maintain your vision with education • The development of processes around E System Security Engineering is a natural extension of the formal Systems Engineering 20 1 100 process • Engineering a solid system to protect the D U 20 integrity of the supply chain is necessary 50 2 • Educate application developers about risks to 20 C A T E 3 20 the supply chain and what to watch for Information Supply Chain Security Security Standards Policy and Regulations Systems and Vendors 11 Approved For Public Release # 16-0385; Unlimited Distribution
Recommend
More recommend