The U.S. national security "Insider Threat Score" is on it's way as a
result of the aftermath of the Office of Personnel Management (OPM) hack.
The National Background Investigation Bureau (NBIB) is now standing up
operations within the Pentagon umbrella. Operational Risk Management
(ORM) professionals are tracking this closely for good reason. Social
media activities such as this one, could one day be a factor in that
score.
Simultaneously, the NIST Special Publication 800-160 2nd Draft has been released. This document entitled: Systems Security Engineering "Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems" addresses a key component in the national security mosaic.
So if the goal of creating the "Insider Threat Score" is to help automate and maintain the process for better understanding trustworthiness, then the NIST publication should be at the center of the table at the National Background Investigation Bureau. Why? Definitions in Appendix B of the SP 800-160 Second Draft:
Simultaneously, the NIST Special Publication 800-160 2nd Draft has been released. This document entitled: Systems Security Engineering "Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems" addresses a key component in the national security mosaic.
So if the goal of creating the "Insider Threat Score" is to help automate and maintain the process for better understanding trustworthiness, then the NIST publication should be at the center of the table at the National Background Investigation Bureau. Why? Definitions in Appendix B of the SP 800-160 Second Draft:
Trustworthiness: An attribute associated with an entity that reflects confidence that the entity will meet its requirements.
Note: Trustworthiness, from the security perspective, reflects confidence that an entity will meet its security requirements while subjected to disruptions, human errors, and purposeful attacks that may occur in the environments of operation.
Trust: A belief that an entity will behave in a predictable manner in specified circumstances.
The degree to which the user of a system component depends upon the trustworthiness of another component.
Note 1: The entity may be a person, process, object, or any combination thereof and can be of any size from a single hardware component or software module, to a piece of equipment identified by make and model, to a site or location, to an organization, to a nation-state.
Note 2: Trust, from the security perspective, is the belief that a security- relevant entity will behave in a predictable manner while enforcing security policy. Trust is also the degree to which a user or a component depends on the trustworthiness of another component (e.g., component A trusts component B, or component B is trusted by component A).
Note 3: Trust is typically expressed as a range (e.g., levels or degrees) that reflects the measure of trustworthiness associated with the entity.
The future of the
automation of the clearance process, continuous monitoring of "Insider
Threat Scores" and the trustworthy secure systems software engineering
for accomplishing this remains mission critical. The "Cleared
Community" of private sector "Defense Industrial Base" (DIB) contractors
will also be impacted by the convergence of both.
So who are the personnel who could be impacted by these two converging initiatives:
So who are the personnel who could be impacted by these two converging initiatives:
- Individuals with systems engineering, architecture, design, development, and integration responsibilities;
- Individuals with software engineering, architecture, design, development, integration, and software maintenance responsibilities;
- Individuals with security governance, risk management, and oversight responsibilities;
- Individuals with independent security verification, validation, testing, evaluation, auditing, assessment, inspection, and monitoring responsibilities;
- Individuals with system security administration, operations, maintenance, sustainment, logistics, and support responsibilities;
- Individuals with acquisition, budgeting, and project management responsibilities;
- Providers of technology products, systems, or services; and
- Academic institutions offering systems security engineering and related programs.
As the
government moves towards more trustworthy secure computing systems the
private sector will be there to assist. Yet the future of our trusted
environments will depend on how often we perform and how well we perform
without error.
Software is continuously changing and the fear of changing it too often, has been one of our greatest downfalls. That fear of change has created our largest exposures to continued exploits and attacks, by our most sophisticated adversaries. Remember, Edward Snowden worked for a private sector contractor.
Software is continuously changing and the fear of changing it too often, has been one of our greatest downfalls. That fear of change has created our largest exposures to continued exploits and attacks, by our most sophisticated adversaries. Remember, Edward Snowden worked for a private sector contractor.
There
are a few trustworthy organizations that have realized this fact and
are now on an accelerating path for reaching a higher level of trust.
With their software systems and their people. However, they did this
with a leap of faith and the understanding that the speed to reach more
trusted computing environments, was absolutely vital.
Look around the Nations Capital beltway and you will find a few examples of the ideal innovation architecture strategy that will propel us into that next level of trustworthiness. An affirmative decision to trust is now before us and the time we take to make that trust decision is our greatest challenge. Will it be hours, minutes, seconds or nanoseconds? Marcel Lettre, undersecretary of Defense for Intelligence has this perspective:
Look around the Nations Capital beltway and you will find a few examples of the ideal innovation architecture strategy that will propel us into that next level of trustworthiness. An affirmative decision to trust is now before us and the time we take to make that trust decision is our greatest challenge. Will it be hours, minutes, seconds or nanoseconds? Marcel Lettre, undersecretary of Defense for Intelligence has this perspective:
"The intelligence community’s role in what Pentagon planners call “the third offset”—the search for continuing technological advantage over enemies—will feature robotics, artificial intelligence, machine learning and miniaturization. They will be applied in the areas of “pressing for global coverage capabilities, anti-access/area denial, counterterrorism and counter-proliferation, cybersecurity and countering insider threats,” Lettre said.
He said Defense is reaching out to obtain the expertise of its industrial partners, including Silicon Valley, while workforce planners are focused on “bringing in another generation skilled at innovating in the technology sector.”