Page 185 - ITU KALEIDOSCOPE, ATLANTA 2019
P. 185

ICT for Health: Networks, standards and innovation




           Integrated  Adaptive  Cyber  Defense  (IACD)  is  a  research   Threat sharing has not been as effective as envisioned and
                                                                                                    TM
           effort  jointly  funded  by  the  US  Department  of  Homeland   has  run  into  obstacles  [44].  The  initial  STIX   version  1
           Security (DHS) and the US National Security Agency (NSA),  specification was not readily accepted by industry. Version
           in collaboration with The Johns Hopkins University Applied   2 is now available with significant improvements addressing
           Physics  Lab  (JHU/APL)  and  industry.  IACD  seeks  "to   many  of  the  industry  concerns  and  is  gaining  broader
           revolutionize  cybersecurity  ...  through  the  universal   adoption.  In  the  US,  the  passage  of  the  Cybersecurity
           automation  and  interoperability  of  cyber  defenses"  [40].   Information  Sharing  Act  [45]  incentivized  sharing  by
           IACD is an effort to get humans from ‘in the loop’ to ‘on the   removing  certain  liabilities.  Significant  progress  has  been
           loop’.  The  focus  is  product  agnostic  interoperability by   made  in  this  area,  particularly  in  certain  industry  groups
           decoupling  functions  and  standardizing  interfaces.  IACD   working  with  their  Information  Sharing  and  Analysis
           seeks  to  create  an  adaptable,  extensible  ecosystem  “to   Centers (ISACs).
           dramatically change the timeline and effectiveness of cyber
           defense  via  integration,  automation,  and  information   To  maximize  the  benefit  of  STIX   involves  not  only
                                                                                            TM
           sharing.”  This  can  be  accomplished  by  decoupling  the   sharing  ‘what  happened’  but  also  deciding  ‘what  to  do’,
           functions and standardizing the interfaces between functions.   called Courses of Action (CoAs). To effectively share CoAs,
           IACD categorizes security functionality into:      standards  for  both  atomic  actions  and  for  a  playbook
                                                              including  the  decision  points  and  the  flow  of  the  atomic
               •  sensing: gathering all the data             actions are required.
               •  sense-making:  correlating  and  analyzing  data,
                  transforming  into  information,  knowledge  and  Another  IACD  objective  is  the  standardization  of  the
                  intelligence                                command  and  control  (C2)  language  for  security
               •  decision-making: deciding what to do        technologies,  the  atomic  actions  in  a  CoA.  For  example,
               •  acting: sending the actual commands.        firewalls have existed for over 25 years yet the ‘word’ used
                                                              to prevent a packet passing through the firewall could be:
                                                              ‘drop’, ‘deny’, ‘reject’, ‘block’, ‘blacklist’, etc. depending on
           Gap analysis of the IACD work has led to standards activities   which implementation is used. This is compounded across
           in sharing threat intelligence, sharing courses of action, and   many  security  technologies  with  new  ones  being
           in a common command and control (C2) language.     continuously added. This poses several problems for the user
                                                              community. It is hard to share CoAs when two organizations
           One  of  the  IACD  objectives  is  the  sharing  of  threat  data   use  different  vendor  products.  The  cost  of  retooling
           among interested, trusted parties. DHS started an industry   disincentivizes  changing  vendors  or  adding  alternative
           forum on threat sharing that evolved and moved into OASIS,   vendor  products.  This  was  less  of  an  issue  when  security
           a  non-profit  standards  development  organization.  The   technology  was  physical  appliances.  In  today’s  cloud/IoT
           OASIS  Cyber  Threat  Intelligence  (CTI)  Technical   environment,  switching  vendors  and/or  adding  new
           Committee  (TC)  [41]  created  the  Structured  Threat   technologies should be quicker and easier.
           Information  Expression  (STIX )  [42]  and  the  Trusted
                                     TM
           Automated Exchange of Intelligence Information (TAXII TM )   The  OASIS  Open  Command  and  Control  (OpenC2)
           specifications [43] to address the need to model, analyze and   Technical Committee was founded to standardize machine-
           share cyberthreat intelligence. Figure 3 shows an example of   to-machine  command-and-control  to  enable  cyber  defense
           STIX TM  ontology.                                 system  interoperability  at  machine  speed  [46,47].  Just  as
                                                              automation has a fundamental impact on attacker economics,
                                                              OpenC2  will  have  a  fundamental  impact  on  defender
                                                              economics [48,49].

                                                              The  OASIS  Collaborative  Automated  Course  of  Action
                                                              Operations  (CACAO)  for  Cyber  Security  Technical
                                                              Committee [50] develops standards for implementing CoAs
                                                              including  the  decision  points  and  playbooks  mentioned
                                                              earlier.
                  Figure 3 – Example of STIX  Ontology
                                          TM
                                                              Figure  4  shows  an  automation  flow  including  STIX TM ,
                                                              TAXII , OpenC2 and CACAO.
                                                                   TM
















                                                          – 165 –
   180   181   182   183   184   185   186   187   188   189   190