Saturday, June 1, 2013

NIST Info on 2nd Framework Workshop

Earlier this week the National Institute of Standards and Technology held their second workshop on the development of the Cybersecurity Framework required by the President’s cybersecurity executive order (EO 13636). According to various news reports the workshop drew a couple of hundred participants from various industries and cybersecurity vendors. NIST has published two of their presentations on their Cybersecurity Framework web site.

Initial Analysis

According to the workshop agenda the discussions this week were supposed to be focused on the results of the request for information (RFI) that NIST published back February. The week before the workshop NIST published their initial analysis of the results of that RFI and one of the two NIST presentations given at the workshop addressed that analysis.

The presentation initially explains the methodology that NIST used to extract, classify and collate the information provided in the over 200 responses to the RFI. Even if nothing else comes out of this framework process, NIST should develop this process into a formal tool that OMB should require to be used by all federal agencies when analyzing responses to the publication of proposed regulations when there are a large number of responses. It looks like a very effective tool and I urge NIST to publish the resulting database they developed for this RFI.

The presentation goes on to examine the results of the response analysis in some detail. The slide presentation does not provide any more information than is found in the initial analysis document. Fortunately, NIST web cast these two presentations for those of us who could not attend the workshop and a copy of that web cast will be available on the internet within the coming week for those of us who could not take time off of work to watch the live version.

Framework Development Schedule

One of the things that everyone is concerned about is how NIST intends to go about the process of developing the Framework. The other NIST presentation at the Workshop generally dealt with that topic. After providing a very generic overview of what NIST expects the framework to be they provide a time-scale for their portion of the development process (slide 6). The future dates of interest provided in that time-line include:

• Draft Initial Framework – June 2013
• 3rd Framework Workshop – July 2013
• 4th Framework Workshop – September 2013
• Publish Preliminary Framework – October 2013

This is a very aggressive schedule for any federal agency particularly one without any regulatory experience. I know that the Cybersecurity Framework is not intended to be a regulation, but it will certainly have very quasi-regulatory components. Preparing a framework that will hold up to regulatory scrutiny will be very important in the long run.

Presumably the gap between the 3rd and 4th workshops will include the development of the final draft of the Preliminary Framework and the 4th workshop will massage that draft somewhat before the final preliminary version is published in October.

NIST Framework Process

After rehashing some of the information about how NIST analyzed the RFI responses, the presentation starts to look at the process that NIST intends to use to develop the Framework. They start with a discussion of how NIST will select the components of the Framework. Slide 15 describes the selection process.




The most interesting thing about this slide (for the control system community) is found in paragraph b;

“If a candidate practice, method, or measure does not operate in support of core a EO objective then it is not considered for inclusion in the framework.”

Since the cybersecurity EO is IT-centric and does not mention control systems in any part of its discussion of the Cybersecurity Framework in paragraph 7 (presumably where the ‘core EO objective’ would be found), I wonder if this will be used by NIST as a method to avoid including control system security measures in the Framework. I certainly hope that that is not the case; a Cybersecurity Framework that does not specifically address control system security issues will provide no protections against catastrophic attacks on critical infrastructure.

Moving Forward


It will be interesting to see how the initial draft of the Cybersecurity Framework deals with control system security issues. At this point we will just have to wait and see.

1 comment:

Anonymous said...

Of course the NISTCSF will deal with control systems issues. :) It's being developed (among other things) in support of the executive order's outcome-based perspective on cybersecurity (which, also of course, would naturally consider control systems since their failure tends to create significantly bad outcomes).

I'm curious what in the EO made you think it was EO-centric?

The level in the security stack at which both the EO and the CSF operate at is higher than the level at which the distinctions between IT/ICS happen and so are inclusive of both without the need to distinguish between the two in policy statements.

 
/* Use this with templates/template-twocol.html */