Foreword |
|
xi | |
Preface |
|
xiii | |
Authors |
|
xxi | |
1 It's Time for a New Paradigm |
|
1 | (42) |
|
|
1 | (1) |
|
Why Cyber Resilience Is Critically Important |
|
|
2 | (2) |
|
Infrastructure Is the Target |
|
|
4 | (1) |
|
A New Paradigm for Ensuring Our Way of Life |
|
|
4 | (1) |
|
Operationalizing Cyber Resilience: Saltzer and Schroeder's Principles |
|
|
5 | (4) |
|
Tactics One and Two: Economy of Mechanism and Work Factor |
|
|
7 | (1) |
|
Tactic Three: Least Common Mechanism |
|
|
7 | (1) |
|
Tactic Four: Compromise Recording and Strategic Recovery Planning |
|
|
8 | (1) |
|
Cyber Resilience versus Cybersecurity |
|
|
9 | (1) |
|
Changing the Culture of Information Protection |
|
|
10 | (1) |
|
Ensuring Optimum Use of Resources |
|
|
11 | (3) |
|
Designing for Cyber Resilience |
|
|
14 | (1) |
|
The Specific Example of SCADA |
|
|
15 | (1) |
|
Creating a Cyber-Resilient Architecture |
|
|
15 | (3) |
|
Presidential Policy Directive-21: The Government Weighs In |
|
|
18 | (2) |
|
The Seven Steps to Cyber Resilience |
|
|
20 | (10) |
|
Identification and Classification |
|
|
20 | (3) |
|
Threat Identification and Risk Assessment |
|
|
23 | (1) |
|
Threat Understanding and Prioritization |
|
|
24 | (2) |
|
|
26 | (2) |
|
|
28 | (2) |
|
|
30 | (1) |
|
The Important Role of Strategic Planning |
|
|
30 | (2) |
|
Creating Practical Cyber-Resilient Controls |
|
|
32 | (3) |
|
|
35 | (4) |
|
|
39 | (1) |
|
|
40 | (3) |
2 Asset Identification and Classification |
|
43 | (34) |
|
|
43 | (1) |
|
Putting Asset Management into Cyber Resilience Context |
|
|
44 | (2) |
|
Asset Management Planning |
|
|
46 | (1) |
|
Obtain Support for Asset Planning |
|
|
47 | (1) |
|
|
48 | (2) |
|
|
50 | (1) |
|
Establish a Definition of Assets |
|
|
51 | (4) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
55 | (1) |
|
Assign Responsibility for Identifying Assets that Support Critical Services |
|
|
55 | (2) |
|
|
57 | (1) |
|
Identify and Classify Information Assets |
|
|
58 | (3) |
|
Information Asset Identification |
|
|
58 | (2) |
|
Information Asset Classification |
|
|
60 | (1) |
|
Identify Technology Assets |
|
|
61 | (3) |
|
|
62 | (2) |
|
Standardizing Software Asset Management |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
65 | (1) |
|
Create an Asset Inventory |
|
|
66 | (1) |
|
Document the Relationships between Assets and Critical Services |
|
|
67 | (1) |
|
Analyze Dependencies between Assets Supporting Multiple Services |
|
|
68 | (1) |
|
Update the Asset Inventory |
|
|
68 | (1) |
|
|
69 | (2) |
|
|
71 | (1) |
|
Establish a Change Schedule |
|
|
72 | (1) |
|
Manage Changes to Assets and Inventories |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
75 | (2) |
3 Establishing the Risk Status of the Corporate Infrastructure |
|
77 | (40) |
|
|
77 | (1) |
|
|
78 | (1) |
|
Approaches to Threat Modeling |
|
|
79 | (3) |
|
|
79 | (1) |
|
Software Application Approach |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
82 | (1) |
|
Intel Threat Agent Library |
|
|
83 | (1) |
|
Diagrams Using the Unified Modeling Language |
|
|
83 | (6) |
|
Threat Modeling Methodologies |
|
|
89 | (10) |
|
|
89 | (2) |
|
|
91 | (1) |
|
|
92 | (2) |
|
|
94 | (2) |
|
|
96 | (2) |
|
Components of a Sample Threat Model |
|
|
98 | (1) |
|
Section 1: Threat Model Project Information |
|
|
99 | (14) |
|
Section 2: External Dependencies |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
101 | (2) |
|
|
103 | (1) |
|
Section 6: Data Flow Diagrams |
|
|
103 | (1) |
|
Section 7: Threat Categorization |
|
|
104 | (1) |
|
Section 8: Security Controls |
|
|
104 | (4) |
|
Section 9: Threat Analysis |
|
|
108 | (1) |
|
Section 10: Use/Misuse Cases |
|
|
109 | (1) |
|
Section 11: Risk Ranking of Threats Using DREAD |
|
|
110 | (1) |
|
Section 12: Countermeasure Currently in Place |
|
|
111 | (1) |
|
Section 13: Document Risk Mitigation Strategies |
|
|
111 | (2) |
|
|
113 | (2) |
|
|
115 | (2) |
4 Prioritization of Assets and Establishing a Plan for Resilient Change |
|
117 | (34) |
|
Setting Prioritization into Context |
|
|
117 | (2) |
|
Resilience Requirements Elicitation and Definition |
|
|
119 | (4) |
|
Identify Organizational Resilience Requirements |
|
|
123 | (3) |
|
Identify Service Resilience Requirements |
|
|
126 | (2) |
|
Establish Asset Resilience Requirement Priorities |
|
|
128 | (1) |
|
Prioritizing People Assets |
|
|
128 | (2) |
|
Prioritizing Information Assets |
|
|
130 | (3) |
|
Prioritize Technology and Software Assets |
|
|
133 | (2) |
|
Prioritize Facility Assets |
|
|
135 | (1) |
|
Analyze and Validate Resilience Requirements |
|
|
136 | (1) |
|
Establish Resiliency through Change Management |
|
|
137 | (1) |
|
What Is Configuration Sustainment? |
|
|
138 | (1) |
|
Who Participates in Configuration Sustainment? |
|
|
139 | (1) |
|
What Are the Roles within Configuration Sustainment? |
|
|
139 | (1) |
|
Control of Configuration Change |
|
|
140 | (1) |
|
Implement Access Restrictions for Change |
|
|
141 | (1) |
|
Implement the Configuration Change Control Process |
|
|
142 | (2) |
|
|
144 | (1) |
|
Resilience Configuration Management Monitoring |
|
|
145 | (1) |
|
|
146 | (3) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
5 Control Design and Deployment |
|
151 | (36) |
|
Designing and Deploying an Effective Control Architecture |
|
|
151 | (2) |
|
Setting the Protection Boundaries |
|
|
153 | (3) |
|
Conceptualizing the Cyber Resilience Control Architecture |
|
|
156 | (1) |
|
Setting Up the Architectural Plan |
|
|
157 | (1) |
|
Formulating the Protected Item List |
|
|
158 | (1) |
|
Creating a Control Architecture from Best Practice Models |
|
|
159 | (1) |
|
Making Asset Valuation Real |
|
|
160 | (1) |
|
The Cyber Resilience Architectural Design Process |
|
|
161 | (1) |
|
Designing Substantive Control Measures |
|
|
162 | (5) |
|
The Cyber Resilience Detailed Design Process |
|
|
167 | (1) |
|
Designing the Individual Controls |
|
|
167 | (1) |
|
|
168 | (1) |
|
Finalization of the Control Architecture |
|
|
169 | (1) |
|
A Footnote: Handling Exceptions |
|
|
170 | (1) |
|
Communicating Organizational and Technical Direction |
|
|
171 | (1) |
|
Implementing and Sustaining the Solution |
|
|
172 | (3) |
|
Sustaining the Assurance Infrastructure |
|
|
175 | (1) |
|
|
176 | (2) |
|
Sustaining the Control Architecture over Time |
|
|
178 | (2) |
|
Translating Monitoring Information into Action |
|
|
180 | (1) |
|
|
181 | (4) |
|
|
185 | (2) |
6 Control Assessment and Assurance |
|
187 | (36) |
|
The Need for Reliable Assurance |
|
|
187 | (2) |
|
Evaluating Control Behavior |
|
|
189 | (1) |
|
Operational Assurance of the Control Architecture |
|
|
190 | (2) |
|
Establishing a Regular Organizational Testing Process |
|
|
192 | (2) |
|
The Control Testing Process |
|
|
194 | (1) |
|
Control Testing Documentation |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
196 | (2) |
|
|
198 | (1) |
|
Ensuring the Reliability of the Control Architecture |
|
|
198 | (1) |
|
Using Fault Trees to Enhance Understandability |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
201 | (2) |
|
The Control Architectural Review and Audit Processes |
|
|
203 | (1) |
|
|
204 | (2) |
|
|
206 | (2) |
|
Review Types: Inspections |
|
|
208 | (1) |
|
Inspection Procedures: When to Conduct an Inspection |
|
|
209 | (1) |
|
Inspection Procedures: Follow-Up |
|
|
210 | (1) |
|
|
211 | (2) |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
215 | (6) |
|
|
221 | (2) |
7 Recovering the Non-Priority Assets |
|
223 | (34) |
|
|
223 | (1) |
|
|
224 | (2) |
|
Noncritical Asset Recovery Management |
|
|
226 | (1) |
|
The Role of Policy and Best Practice in the Process |
|
|
227 | (1) |
|
The Role of Perimeter Control |
|
|
227 | (1) |
|
The Role of People in the Process |
|
|
228 | (1) |
|
Developing and Implementing a Noncritical Asset Recovery Strategy |
|
|
229 | (1) |
|
Developing and Maintaining an Effective Response |
|
|
230 | (1) |
|
|
231 | (1) |
|
Risk Assessment and Preparedness Planning |
|
|
232 | (1) |
|
Developing an Effective Preparedness Plan |
|
|
232 | (1) |
|
|
233 | (1) |
|
Step Two: Priorities and Strategy |
|
|
233 | (1) |
|
|
234 | (1) |
|
Documenting a Recovery Plan |
|
|
235 | (1) |
|
Elements of the Asset Recovery Plan |
|
|
236 | (1) |
|
Identification and Prioritization of Protected Functions |
|
|
237 | (2) |
|
Executing the Asset Recovery Process |
|
|
239 | (1) |
|
|
239 | (2) |
|
Elements of the Backup/Restoration Solution |
|
|
241 | (2) |
|
Making the Noncritical Asset Recovery Process Real |
|
|
243 | (1) |
|
Specification of Recovery Actions |
|
|
243 | (1) |
|
Identification and Documentation of the Solution |
|
|
243 | (1) |
|
Ensuring that Everybody Knows What to Do |
|
|
244 | (1) |
|
Operational Considerations: Trading Off the Two Factors |
|
|
245 | (1) |
|
Evaluating the Noncritical Asset Recovery Process |
|
|
246 | (1) |
|
Factors that Affect the Noncritical Asset Assurance Operation |
|
|
247 | (1) |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
248 | (1) |
|
Ensuring the Continuing Effectiveness of the Response |
|
|
249 | (2) |
|
|
251 | (4) |
|
|
255 | (2) |
8 Ensuring a Continuously Cyber-Resilient Organization |
|
257 | (32) |
|
It All Starts with Infrastructure |
|
|
257 | (1) |
|
Embedding the Cyber Resilience Process in Day-to-Day Business |
|
|
258 | (2) |
|
|
260 | (1) |
|
|
261 | (1) |
|
|
261 | (3) |
|
Building the Practical Infrastructure |
|
|
264 | (4) |
|
The Detailed Cyber Resilience Control System |
|
|
268 | (1) |
|
Constructing the Process Model for a Particular Application |
|
|
269 | (2) |
|
Making Data-Based Decisions about Performance |
|
|
271 | (2) |
|
|
273 | (1) |
|
|
274 | (1) |
|
Assigning Investment Priorities |
|
|
274 | (2) |
|
Rolling Out the Solution to the Stakeholders |
|
|
276 | (2) |
|
|
278 | (1) |
|
Maintaining the Cyber Resilience Control System over Time |
|
|
279 | (3) |
|
|
282 | (3) |
|
|
285 | (4) |
Index |
|
289 | |