SlideShare a Scribd company logo
1 of 15
Download to read offline
Steering Committee

      Working Group 2A

Cyber Security Best Practices

       March 14, 2011

  Presented By: Phil Agcaoili, Co‐Chair
               Gary Toretti
Executive Summary

 A refresh of the 2004 Network Reliability and Interoperability 
  Council (NRIC) Cyber Security Best Practices (187)
 Working Group 2A structured into 5 vertical subgroups 
  (Wireless, IP Services, Network, People, and Legacy Services) and 4 horizontal 
  subgroups (Identity Management, Encryption, Vulnerability Management, and 
   Incident Response)
 397 Cyber Security Best Practices from Working Group 2A for 
  2011 (41% of the 397 are new, 41% are modified NRIC VII best practices, and 
   only 18% of the NRIC VII best practices remained the same)
 Service Providers, Network Operators, and Equipment 
  Suppliers are encouraged to review and implement these 
  Cyber Security Best Practices
Working Group Participants




                             3
Problem / Deliverable

Problem
   – Rapidly evolving and complex technologies in the communication 
     industry are increasingly under attack from insiders, hackers, cyber 
     criminals, and nation‐states seeking economic advantage.    
     Compromised technology or process controls can severely impact a
     company’ brand and prowess impacting financials and shareholder 
     value for many years.  


Deliverable
   – Updated Cyber Security Best Practices reflective of the current 
     technology environment within the Communications’ Industry, and 
     related references
Methodology
          Wireless                        IP Services                 Network                            People                     Legacy Services
               (1)                               (2)                        (3)                                (4)                              (5)




               WIFI                           Broadband               Access Control                       Awareness                      Media Gateways
            Bluetooth                      Cloud Computing               Availability                        SPAM                   Communication Assisted Law
         Mobile Devices                          IPV6                  Confidentiality           Social Engineering Data Loss /         Enforcement (CALEA)
   Mobile Devices Application                Voice over IP                Integrity                       Data Leakage               Signal Control Points (SCP)
             Security                                         Security Mgmt Security Audit &                Phishing                Gateway to Gateway Protocol
        Emerging Devices                                                   Alarm                         Security Policy                        SS7
  Wireless 3G, 4G, Microwave, &                                 Security Policy & Standard
             Satellite                                                   Recovery
                                                                    Intrusion Detection




Rodney Buie                       Chris Garner               John Knies                        Fred Fletcher                      Robin Howard

Micah Maciejewski                 Jim Payne                  Doug Peck                         Ramesh Sepehrrad                   Doug Davis

Gary Toretti                      Ray Singh                  Rajeev Gopal                      Allison Growney                    Uma Chandrashekhar

Bill Garret                       Barry Harp                 Ron Mathis                        John Coleman

                                  Bill Garret                Jeremy Smith
Methodology (cont.)
Identity Mgmt              (6)             Martin Dolly
Idm Lifecycle                               Jim Payne
Access Control                              Brian Moir
Strong Authentication                      Rajeev Gopal
Certificates                                Ray Singh
SAML
Policy
Password
Role Base Access Control
Systems Administration




Encryption          (7)                     Dan Hurley
Encryption Keys                             Ron Mathis
Cellular Networks                        John Rittinghouse
Device Encryption                         Tim Thompson
Voice Encryption                           Jim Ransome
Data Encryption
                                          Anthony Grieco
Key Management
Key Recovery                                Annie Sokol
Cloud                                     Bob Thornberry
Standards




Vulnerability Mgmt                (8)   Micah Maciejewski
Alerting                                     John Knies
Risk & Vulnerability Assessment            Jeremy Smith
Mitigation                              Fernandez Francisco
Asset Inventory                             Rodney Buie
Patch Mgmt




Incident Response                 (9)   John Rittinghouse
Policy & Plan                              Barry Harp
Prevention                                Robin Howard
Attack Detection                           Myrna Soto
Response & Mitigation                     Fred Fletcher
Findings
 Wireless ‐ Rapid changes in technology continue to evolve in the 
  Wireless space, e.g. 3G to 4G, home cell towers (Femto), smart 
  phones, and wireless “everything”. This is a key focus area that will 
  continue to evolve.
     47 new Best Practices (BPs), while modifying only 3 existing BPs and 
      leaving 2 NRIC VII BPs unchanged

 IP Services ‐ High speed broadband has expanded rapidly to the 
  home and small business. Voice over IP has also grown dramatically 
  as most service providers offer reliable and integrated products
  with their broadband and IP TV offerings. Additionally, the newest 
  platform service being offered under the title of “Cloud Computing”
  is quickly redefining the terms “network” and “perimeter”.   
     21 new Best Practices in this area, while modifying 7 existing BPs and 
      leaving 2 NRIC VII BPs unchanged
Findings
 Network ‐ The existing NRIC Best Practices are valid and should 
  remain in effect, however with the proliferation of the above 
  mentioned portable devices new best practices have been 
  identified and should become a part of the CSRIC Best Practices 
  documentation. 
    23 new Best Practices in this area, while modifying 66 existing BPs and 
     leaving 32 NRIC VII BPs unchanged.

 People – SPAM, Social Engineering, Data Loss / Data Leakage, and 
  Phishing continue to grow; creating havoc among Service Providers, 
  Network Operators, and Government. Security Awareness 
  continues to spread, however, with limited effectiveness.  These
  areas have been, and continue to be critical areas that must be 
  addressed.
    20 new Best Practices in this area, while modifying 9 existing BPs and 
     leaving 7 NRIC VII BPs unchanged.
Findings
 Legacy – Best practices specifically documented for the SS7 
  network access control, authentication, DoS protection, network 
  design, and link diversity need to be modernized.  Media Gateways, 
  CALEA, and Signal Control Points existing Best Practices were 
  reviewed and replaced with new Best Practices.
     23 new Best Practices in this area, while modifying 66 existing BPs and 
      leaving 32 NRIC VII BPs unchanged.

 Identity Mgmt – A critical area across all networks and systems and 
  made more difficult with the spread of key stroke capturing 
  Botnets.   With Cloud Services and the inter‐operable environments 
  with vendor partners, Federation of Identities is occurring at a rapid 
  pace, although basic identity management principles still apply.
     8 new Best Practices in this area, while modifying 12 existing BPs and 
      leaving 9 NRIC VII BPs unchanged.
Findings
 Encryption – Data at rest / data in transit across data and 
  cellular networks requires protection of the PII information.  
  Key Management is critical for validation and authentication . 
    8 new Best Practices in this area, while modifying 7 existing BPs and 
     leaving 4 NRIC VII BPs unchanged

 Vulnerability Mgmt ‐ Vulnerability Management continues to 
  be a very challenging area due to the proliferation of zero‐day 
  exploitation of vulnerabilities, extensive malware infections 
  from websites and spam mail and the general availability of 
  Botnet tool kit targeted to “entry‐level” hackers from the 
  sophisticated attackers. 
    9 new Best Practices in this area, while modifying 15 existing BPs and 
     leaving 9 NRIC VII BPs unchanged.
Findings
 Incident Response ‐ All organizations face interruptions to 
  normal business processes. The ability to accurately forecast 
  and budget for outages caused by security breaches 
  continues to be a much desired business tool that has grown 
  in importance as the reliance on information technology 
  systems has grown
    7 new Best Practices in this area, while modifying 35 existing best 
     practices and leaving 7 NRIC VII BPs unchanged
Recommendation
 CSRIC Working Group 2A recommends the new set of 397 
  best practices across the 9 focus areas to the FCC for 
  consideration of adopting the best practices for general use 
  by the communication industry.
    As threats become increasingly complex and persistent, network 
     providers, operators, and equipment suppliers must work together
     within increased diligence to secure the network infrastructure.
Future Considerations
 Service Provider Network Protection
    Trojans, Botnets, viruses, etc. continue to plague many of these devices 
     and re‐infecting them and other devices that communicate with the 
     infected hosts.  These devices normally connect to the internet via an 
     Internet Service Provider (ISP). Working Group 8 examined this area and 
     made recommendations for Best Practices.  Working Group 2A believes 
     this subject needs additional analysis since it is constantly evolving and 
     recommends a new group should be formed with industry subject matter 
     experts in malware detection, and remediation to assess other ideas and 
     recommendations (such as a central clearing house for Blacklisted URLs).

 Border Gateway Protocol
    BGP’s primary function is the exchange of network reachability 
     information between networks (called autonomous systems), to allow 
     each AS on an internetwork to send messages efficiently to every other 
     interconnected network.  Most (if not all) public IP space is 
     interconnected with BGP.  It is our recommendation that a new sub‐
     group be formed with industry subject matter experts in BGP and inter‐
     networking to formally address the needs of this vital part of our 
     infrastructure.
Future Considerations
 Service Provider Network Protection
    Video on Demand allows users to select and watch video or audio 
     content on demand.   Working Group 2A recommends future Councils
     analyze Best Practices in these areas as the mature in the coming 
     years.
Conclusion
The CSRIC Working Group 2A spent more than nine months researching, analyzing, and 
evaluating Cyber Security Best Practices.  During this time members participated in 
dozens of conference calls, met in various cities, identified gaps, and researched new 
Best Practices, plus dedicated countless hours editing and revising the final report. 

In conclusion, members feel this Final Report is a fair and accurate representation of 
their collective view‐points and perspectives and hopes this will help to improve Cyber 
Security through these Best Practices.

More Related Content

More from Phil Agcaoili

2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philAPhil Agcaoili
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber SecurityPhil Agcaoili
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Phil Agcaoili
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Phil Agcaoili
 
Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say? Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say? Phil Agcaoili
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidPhil Agcaoili
 
2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?Phil Agcaoili
 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...Phil Agcaoili
 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Phil Agcaoili
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityPhil Agcaoili
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13Phil Agcaoili
 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityPhil Agcaoili
 
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsPhil Agcaoili
 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryPhil Agcaoili
 
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312Phil Agcaoili
 
Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...
Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...
Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...Phil Agcaoili
 
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final ReportPhil Agcaoili
 
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterRSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterPhil Agcaoili
 

More from Phil Agcaoili (18)

2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6
 
Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say? Data Breaches. Are you next? What does the data say?
Data Breaches. Are you next? What does the data say?
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
 
2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?
 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber Security
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13
 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber Security
 
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 February
 
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
 
Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...
Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...
Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...
 
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
 
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterRSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

2011 FCC CSRIC Working Group 2A Cyber Security Best Practices Read Out

  • 1. Steering Committee Working Group 2A Cyber Security Best Practices March 14, 2011 Presented By: Phil Agcaoili, Co‐Chair Gary Toretti
  • 2. Executive Summary  A refresh of the 2004 Network Reliability and Interoperability  Council (NRIC) Cyber Security Best Practices (187)  Working Group 2A structured into 5 vertical subgroups  (Wireless, IP Services, Network, People, and Legacy Services) and 4 horizontal  subgroups (Identity Management, Encryption, Vulnerability Management, and  Incident Response)  397 Cyber Security Best Practices from Working Group 2A for  2011 (41% of the 397 are new, 41% are modified NRIC VII best practices, and  only 18% of the NRIC VII best practices remained the same)  Service Providers, Network Operators, and Equipment  Suppliers are encouraged to review and implement these  Cyber Security Best Practices
  • 4. Problem / Deliverable Problem – Rapidly evolving and complex technologies in the communication  industry are increasingly under attack from insiders, hackers, cyber  criminals, and nation‐states seeking economic advantage.     Compromised technology or process controls can severely impact a company’ brand and prowess impacting financials and shareholder  value for many years.   Deliverable – Updated Cyber Security Best Practices reflective of the current  technology environment within the Communications’ Industry, and  related references
  • 5. Methodology Wireless IP Services Network People Legacy Services (1) (2) (3) (4) (5) WIFI Broadband Access Control Awareness Media Gateways Bluetooth Cloud Computing Availability SPAM Communication Assisted Law Mobile Devices IPV6 Confidentiality Social Engineering Data Loss / Enforcement (CALEA) Mobile Devices Application Voice over IP Integrity Data Leakage Signal Control Points (SCP) Security Security Mgmt Security Audit & Phishing Gateway to Gateway Protocol Emerging Devices Alarm Security Policy SS7 Wireless 3G, 4G, Microwave, & Security Policy & Standard Satellite Recovery Intrusion Detection Rodney Buie Chris Garner John Knies Fred Fletcher Robin Howard Micah Maciejewski Jim Payne Doug Peck Ramesh Sepehrrad Doug Davis Gary Toretti Ray Singh Rajeev Gopal Allison Growney Uma Chandrashekhar Bill Garret Barry Harp Ron Mathis John Coleman Bill Garret Jeremy Smith
  • 6. Methodology (cont.) Identity Mgmt (6) Martin Dolly Idm Lifecycle Jim Payne Access Control Brian Moir Strong Authentication Rajeev Gopal Certificates Ray Singh SAML Policy Password Role Base Access Control Systems Administration Encryption (7) Dan Hurley Encryption Keys Ron Mathis Cellular Networks John Rittinghouse Device Encryption Tim Thompson Voice Encryption Jim Ransome Data Encryption Anthony Grieco Key Management Key Recovery Annie Sokol Cloud Bob Thornberry Standards Vulnerability Mgmt (8) Micah Maciejewski Alerting John Knies Risk & Vulnerability Assessment Jeremy Smith Mitigation Fernandez Francisco Asset Inventory Rodney Buie Patch Mgmt Incident Response (9) John Rittinghouse Policy & Plan Barry Harp Prevention Robin Howard Attack Detection Myrna Soto Response & Mitigation Fred Fletcher
  • 7. Findings  Wireless ‐ Rapid changes in technology continue to evolve in the  Wireless space, e.g. 3G to 4G, home cell towers (Femto), smart  phones, and wireless “everything”. This is a key focus area that will  continue to evolve.  47 new Best Practices (BPs), while modifying only 3 existing BPs and  leaving 2 NRIC VII BPs unchanged  IP Services ‐ High speed broadband has expanded rapidly to the  home and small business. Voice over IP has also grown dramatically  as most service providers offer reliable and integrated products with their broadband and IP TV offerings. Additionally, the newest  platform service being offered under the title of “Cloud Computing” is quickly redefining the terms “network” and “perimeter”.     21 new Best Practices in this area, while modifying 7 existing BPs and  leaving 2 NRIC VII BPs unchanged
  • 8. Findings  Network ‐ The existing NRIC Best Practices are valid and should  remain in effect, however with the proliferation of the above  mentioned portable devices new best practices have been  identified and should become a part of the CSRIC Best Practices  documentation.   23 new Best Practices in this area, while modifying 66 existing BPs and  leaving 32 NRIC VII BPs unchanged.  People – SPAM, Social Engineering, Data Loss / Data Leakage, and  Phishing continue to grow; creating havoc among Service Providers,  Network Operators, and Government. Security Awareness  continues to spread, however, with limited effectiveness.  These areas have been, and continue to be critical areas that must be  addressed.  20 new Best Practices in this area, while modifying 9 existing BPs and  leaving 7 NRIC VII BPs unchanged.
  • 9. Findings  Legacy – Best practices specifically documented for the SS7  network access control, authentication, DoS protection, network  design, and link diversity need to be modernized.  Media Gateways,  CALEA, and Signal Control Points existing Best Practices were  reviewed and replaced with new Best Practices.  23 new Best Practices in this area, while modifying 66 existing BPs and  leaving 32 NRIC VII BPs unchanged.  Identity Mgmt – A critical area across all networks and systems and  made more difficult with the spread of key stroke capturing  Botnets.   With Cloud Services and the inter‐operable environments  with vendor partners, Federation of Identities is occurring at a rapid  pace, although basic identity management principles still apply.  8 new Best Practices in this area, while modifying 12 existing BPs and  leaving 9 NRIC VII BPs unchanged.
  • 10. Findings  Encryption – Data at rest / data in transit across data and  cellular networks requires protection of the PII information.   Key Management is critical for validation and authentication .   8 new Best Practices in this area, while modifying 7 existing BPs and  leaving 4 NRIC VII BPs unchanged  Vulnerability Mgmt ‐ Vulnerability Management continues to  be a very challenging area due to the proliferation of zero‐day  exploitation of vulnerabilities, extensive malware infections  from websites and spam mail and the general availability of  Botnet tool kit targeted to “entry‐level” hackers from the  sophisticated attackers.   9 new Best Practices in this area, while modifying 15 existing BPs and  leaving 9 NRIC VII BPs unchanged.
  • 11. Findings  Incident Response ‐ All organizations face interruptions to  normal business processes. The ability to accurately forecast  and budget for outages caused by security breaches  continues to be a much desired business tool that has grown  in importance as the reliance on information technology  systems has grown  7 new Best Practices in this area, while modifying 35 existing best  practices and leaving 7 NRIC VII BPs unchanged
  • 12. Recommendation  CSRIC Working Group 2A recommends the new set of 397  best practices across the 9 focus areas to the FCC for  consideration of adopting the best practices for general use  by the communication industry.  As threats become increasingly complex and persistent, network  providers, operators, and equipment suppliers must work together within increased diligence to secure the network infrastructure.
  • 13. Future Considerations  Service Provider Network Protection  Trojans, Botnets, viruses, etc. continue to plague many of these devices  and re‐infecting them and other devices that communicate with the  infected hosts.  These devices normally connect to the internet via an  Internet Service Provider (ISP). Working Group 8 examined this area and  made recommendations for Best Practices.  Working Group 2A believes  this subject needs additional analysis since it is constantly evolving and  recommends a new group should be formed with industry subject matter  experts in malware detection, and remediation to assess other ideas and  recommendations (such as a central clearing house for Blacklisted URLs).  Border Gateway Protocol  BGP’s primary function is the exchange of network reachability  information between networks (called autonomous systems), to allow  each AS on an internetwork to send messages efficiently to every other  interconnected network.  Most (if not all) public IP space is  interconnected with BGP.  It is our recommendation that a new sub‐ group be formed with industry subject matter experts in BGP and inter‐ networking to formally address the needs of this vital part of our  infrastructure.
  • 14. Future Considerations  Service Provider Network Protection  Video on Demand allows users to select and watch video or audio  content on demand.   Working Group 2A recommends future Councils analyze Best Practices in these areas as the mature in the coming  years.