From: Gideon T. Rasmussen, CISSP, CRISC, CISA, CISM, CIPP
Sent: Saturday, March 26, 2022 7:31 PM
To: CSF-SCRM-RFI@nist.gov
Cc: Katherine MacFarland; Kevin
Stine; Mary Rasmussen
Subject: RFI: Evaluating and Improving Cybersecurity Resources: The
Cybersecurity Framework and Cybersecurity Supply Chain Risk Management
NIST Team,
Thanks for publishing and maintaining the Cybersecurity Framework! It is well-written. Here is my response to your request for information:
High-level feedback:
▪ There is
opportunity to increase the number of controls
- 108 controls are attainable for most organizations. However the InfoSec team is left to fill in the gaps
- Resources are limited, controls within risk prioritized tiers could aid with effective mitigation
- Would be helpful to have additional controls, a stop gap between 108 controls and 800-53
- Perhaps existing controls could be expanded to demonstrate levels of maturity
▪ Categories
could be enhanced for reporting purposes
- The five categories are high level
- The 23 sub-categories result in skewed reporting
-- Some categories only have two controls
-- In that scenario, one control results in 50 percent compliance
- Would be helpful to organize by or switch to 10-12 domains
▪ There is opportunity to add risk ratings
- High, moderate and low
- Would help businesses prioritize remediation
Detailed feedback to enhance CSF v1.1:
1. Add a
guidance field
The ‘NIST CSF Control Description’ field is concise, which leads to confusion and a need for interpretation. Consider adding a ‘Guidance’ field to the CSF PDF and spreadsheet. For example…
NIST
CSF # |
NIST
CSF Control Description |
Guidance |
ID.GV-4 |
Governance
and risk management processes address cybersecurity risks |
Maintain
a risk register process to provide senior leadership with transparency in the
cybersecurity domain. Risk register entries should be reserved for
cybersecurity issues that pose significant risk to the organization (risk
mitigate or risk accept). Technical vulnerabilities should only be considered
for register entries when extended remediation is proposed (e.g. 60 days or
more beyond standard). Discuss register entries in risk governance meetings
with cybersecurity and senior leaders present. Meet periodically to maintain
risk governance routines (quarterly is recommended). |
2. Add a
documents and artifacts field
Consider adding a ‘Documents and Artifacts’ field to the CSF PDF and spreadsheet. That would provide guidance for how a given requirement can be validated. For example…
NIST
CSF # |
NIST
CSF Control Description |
|
ID.GV-4 |
Governance
and risk management processes address cybersecurity risks |
• Risk
register • Risk
governance meeting minutes |
3. Enhance
the CSF with common controls [Maturity Level One]
It is necessary to implement these foundational controls:
a. Add a
requirement for patching. It is not explicitly mentioned within the CSF.
b. Flesh out the CSF to help ensure controls are in-place and effective. For example:
· ID.GV-2: Cybersecurity roles and responsibilities are coordinated and aligned with internal roles and external partners
o New:
There is appropriate separation of duties in the Cybersecurity Leader’s
reporting structure, such as reporting to the CEO, Chief Risk Officer, Chief
Legal Counsel or Board of Directors. When the cybersecurity reports to the IT
executive, that is a conflict of interest
o New:
The Cybersecurity Leader provides updates to the Board of Directors or similar
executive group
· ID.RA-2: Cyber threat intelligence is received from information sharing forums and sources
o New: An intake process
ensures each threat advisory is addressed. Options: (a) When an advisory is received,
assign a team member to process it,
(b) Have a periodic meeting to analyze threat intelligence or
(c) Enter each advisory into a log to ensure it is processed
· ID.SC-3: Contracts with suppliers and third-party partners are used to implement appropriate measures designed to meet the objectives of an organization’s cybersecurity program and Cyber Supply Chain Risk Management Plan
o New: A cybersecurity professional provides guidance when a supplier wants to redline contract security language
· PR.AC-1: Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes
o New:
Access reviews are conducted periodically (quarterly is recommended)
o New:
Access reviews are conducted when an employee or contractor changes roles.
Legacy accesses are rescinded to preserve separation of duties
o New:
Compare a current list of employees and contractors to active system and
application accounts. Immediately rescind accesses for departed personnel
o New:
Integrate Single Sign-On into web applications to facilitate systematic removal
of accesses
· PR.AT-1: All users are informed and trained
o New: Update this requirement to: “All users are informed, trained and tested to ensure comprehension”
o New: Add a requirement for a phishing test program. Annual security awareness training alone is not sufficient
· PR.DS-5: Protections against data leaks are implemented
o New: Restrict access to technology commonly used to exfiltrate data such as external storage, Internet storage and personal e-mail (e.g. USB drives, Dropbox and Gmail, respectively)
· PR.IP-4: Backups of information are conducted, maintained, and tested
o New: Store backups offline to protect from ransomware encryption
· PR.IP-10: Response and recovery plans are tested
o New: Incident response and business continuity exercises include senior executives, lines of business leaders, information technology, legal and public relations
· RC.CO-1: Public relations are managed
o New: Establish a Crisis Communications Plan and a Holding Statement template to prepare for an emergency or unexpected event
c. Add a requirement
for procedures within sub-programs such as vulnerability management, access
control and third party risk management. Procedures provide a focus on process
execution and help ensure controls are effective as you know.
- The closest control is 'ID.AM-3: Organizational
communication and data flows are mapped'
4. Address
threats and countermeasures since 2014 [Maturity Level One]
CSF v1.0 was published in 2014. Version 1.1 was made available in 2018 and is a minor release. It is necessary to add new requirements to adapt to changes in the threat landscape.
a. Consider updating the CSF with ransomware mitigation controls from this advisory:
· CISA Alert (AA21-131A): DarkSide Ransomware: Best Practices for Preventing Business Disruption from Ransomware Attacks: https://www.cisa.gov/uscert/ncas/alerts/aa21-131a
b. It is also necessary to update the CSF with recent adversarial tactics. Consider these resources from CISA and NSA for controls to identify and mitigate risk.
· CISA Alert (AA22-047A): Russian State-Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology: https://www.cisa.gov/uscert/ncas/alerts/aa22-047a
· NSA Network Infrastructure Best Practices: https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/2949885/nsa-details-network-infrastructure-best-practices
5. Expand
the data security section (PR.DS) [Maturity Level Two]
Separate the core framework into common controls that apply throughout the enterprise (e.g. security awareness) and data security controls that should be implemented where sensitive data is stored, processed or transmitted (e.g. encryption).
a. Add requirements for Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST).
b. Add a
penetration testing requirement. The use of vulnerability scanning alone may
fail to detect significant vulnerabilities. Pen testing is used to address that
gap and is commonly used in areas where sensitive data is present. Ethical
Hackers leverage suites of security tools to identify vulnerabilities and use
that information to gain access. They also use custom scripts, conduct manual tests
and strive to exploit business logic. If an organization hosts sensitive
information, it makes sense to test with hacking techniques.
c. Add a
requirement for a Security Operations Center or active monitoring by
cybersecurity personnel 24x7x365.
d. Add a
requirement for the cybersecurity program to maintain controls specific to line
of business products, services and assets.
6. Add a risk management section [Maturity Level Three]
a. One of the most significant categories is Risk Assessment (ID.RA). I've interpreted that as:
"Threat Landscape and Controls Analysis: Conduct risk analysis, resulting in a formal report. Start by considering the inherent risk of the organization. Provide an overview of potential adversaries, techniques for compromising data and the cybercrime ecosystem. Describe the potential for impact, while citing reliable sources. Reference the organization’s risk tolerance. Describe the organizations assets. Pivot into cybersecurity with protection boundaries, control framework and risk assessments. Provide fair and balanced analysis by documenting risk mitigation and recent accomplishments in that domain. Detail residual risk with recommendations for new processes and controls. Conclude with a summary statement that praises the organization’s risk culture, with recognition for conducting risk analysis." (Reference: Program Maturity - Cybersecurity and Operational Risk Management)
Hoping the CSF can be updated with a similar statement with mid-level detail.
b. Add a
Risk Mitigation Controls Menu within an appendix. Provide
a listing of optional controls, with a description of risk mitigation
properties. Reference my zero trust controls menu as an example. www.gideonrasmussen.com/zero-trust.html
Using an appendix with a list of options helps ensure the entire listing of controls is not mandated by policy or within a contractual requirement.
c. Add a requirement for cybersecurity metrics, KPIs and KRIs to be communicated to management.
7. Add a strong risk management section [Maturity Level Four]
The concept of strong risk management is typically adopted by those with a low risk tolerance such as financial institutions, government entities and pharmaceutical companies. Some organizations may decide to opt-out of this level of maturity due to their business model or cost. Therefore, the following topics are recommendations.
a. Add a recommendation for a Quality Assurance function separate from operations to validate whether critical cybersecurity controls are in place and effective.
b. Add a recommendation for operational functions and lines of business
to declare self-identified audit issues, with a metric to measure to what
extent the control environment is improving over time.
c. Add a recommendation to adopt the zero trust security model within security architecture and change management. Include mid-level detail for clarity, such as core components, data sources and variations of zero trust architecture approaches:
· Policy engine, administrator and enforcement point
· Continuous diagnostics and mitigation (CDM) system
· Industry compliance system
· Threat intelligence feeds
· Network and system activity logs
· Data access policies
· Enterprise public key infrastructure (PKI)
· ID management system
· Security information and event management (SIEM) system
· Enhanced identity governance
· Micro-segmentation
· Network infrastructure and software defined perimeters
Refer readers to NIST 800-207 for additional details. No need to reinvent the wheel.
d. Add a recommendation to maintain an insider threat program. Reference reputable practices such as Carnegie Mellon’s Common Sense Guide to Mitigating Insider Threats.
e. Add a recommendation to conduct threat hunting. Endpoint protection and SIEM security monitoring alone are not sufficient. Cybersecurity professionals should actively search for threat actors within the IT environment. It is necessary to detect adversaries quickly (dwell time and mean time to detect). Early detection can mean the difference between an incident and a data breach.
8. Implement
maturity level labeling within the CSF
Map each requirement to a maturity level within the CSF PDF and spreadsheet.
Maturity Level |
|
|
M1 |
Core cybersecurity framework |
A framework communicates the minimum controls required to protect an organization. |
M2 |
Common Controls |
Controls in this category are viewed by many as necessary and common sense in a cybersecurity context. Some may view this maturity level as filling gaps in the control framework, basic due diligence. |
M3 |
Risk management |
Communicate control framework requirements for risk assessment and risk management. It is necessary to tailor controls to the organization and to adapt to changes in the threat landscape. |
M4 |
Strong risk management |
At this level the organization begins to demonstrate ownership of the cybersecurity program from an operational risk perspective. When management communicates low risk tolerance, that is synonymous with a commitment to strong risk management. |
This approach would provide a middle ground between NIST
CSF and 800-53. Keep in mind that most civilian organizations do not have
massive funding like the federal government.
I've always loved that the CSF gives businesses options based on their risk appetite. This approach preserves that flexibility, with options to increase maturity and mitigate risk.
9. Risk
prioritize controls
Implement risk-prioritized mapping of controls within the CSF PDF and spreadsheet. Reference this research, MITRE ATT&CK versus NIST 800-53. This table displays which controls mitigate the largest number of adversary tactics and techniques.
NIST 800-53 Rev 5 Control |
# MITRE ATT&CK Mappings |
System Monitoring |
332 |
Configuration Settings |
311 |
Baseline Configuration |
253 |
Access Enforcement |
240 |
Least Privilege |
229 |
Malicious Code Protection |
198 |
Least Functionality |
196 |
Continuous Monitoring |
194 |
This is just a sampling of the highest occurrences. There are many more rows.
10. Publish
more quick start guides
The NIST
Quick Start Guide for Ransomware is a good resource.
Here are recommendations for additional guides.
· Network segmentation |
· Preventing data exfiltration |
· Threat hunting |
· Program architecture |
· Metrics, KPIs and KRIs |
· Security operations center |
· Risk assessments |
· Risk register process |
· Incident response |
· Strategic planning |
· Business continuity |
· Disaster recovery |
· Vulnerability management |
· Identity and access management |
· Third party risk management |
· Cyber threat intelligence |
NIST
Team: Thanks so much for your efforts to protect our country! Feel free to
reach out to me with questions or comments.
Gideon
Gideon T. Rasmussen | CISSP, CRISC, CISA, CISM, CIPP | Consultant
Virtual CSO, LLC
| www.virtualcso.com | www.gideonras.com
The opinions expressed here are my own and not necessarily those of my current or past employers.