SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
Using Cisco’s VMDC to Facilitate FISMA Compliance
Using Cisco’s
VMDC to
Facilitate FISMA
Compliance
July 23, 2014
Jason P. Broz
1
Using Cisco’s VMDC to Facilitate FISMA Compliance
2
Synopsis
This whitepaper discusses how Cisco’s Virtualized Multiservice Data Center (VMDC) validated architecture
can facilitate compliance with the Federal Information Security Management Act (FISMA) (NIST 800-53
Revision 4 moderate control set).
Table of Contents
Introduction..............................................................................................................................................3
VMDC ................................................................................................................................................................3
SecureState........................................................................................................................................................4
Who Needs to be FISMA Compliant? .........................................................................................................4
What are the Current Challenges?.............................................................................................................5
FISMA Control Areas .................................................................................................................................6
How VMDC Can Help.................................................................................................................................7
Access Control (AC) ............................................................................................................................................7
Audit and Accountability (AU).............................................................................................................................7
Security Assessment and Authorization (CA) .......................................................................................................7
Configuration Management (CM)........................................................................................................................7
Identification and Authentication (IA).................................................................................................................8
Media Protection (MP) .......................................................................................................................................8
Personnel Security (PS).......................................................................................................................................8
Risk Assessment (RA)..........................................................................................................................................8
System and Services Acquisition (SA) ..................................................................................................................8
System and Communications Protection (SC) ......................................................................................................9
System and Information Integrity (SI)..................................................................................................................9
Achieving FISMA Compliance ..................................................................................................................10
Using Cisco’s VMDC to Facilitate FISMA Compliance
Introduction
Cisco’s Virtualized Multiservice Data Center (VMDC) is a scalable network topology that service providers and large
organizations can implement in order to provide a secure multi-tenant solution to their clients. The architecture that
VMDC utilizes greatly assists service providers in creating a network which meets the various security needs of clients.
In order to evaluate the ability of Cisco’s VMDC network topology to facilitate Federal Information Security Management
Act (FISMA) compliance on behalf of the clients that implement this blueprint, Cisco requested SecureState analyze the
VDMC topology against the NIST 800-53 Revision 4 control set. Previously, SecureState evaluated earlier versions of the
VMDC topology against NIST 800-53 Revision 3. Cisco’s VMDC architecture provides a number of controls which can be
implemented in order to help fulfill a particular component of the overall control.
VMDC
The Cisco VMDC is a tested and validated reference architecture for the Cisco Unified Data Center. It provides a set of
guidelines and best practices for the creation and deployment of a scalable, secure, and resilient infrastructure in the
data center. The Cisco VMDC architecture demonstrates how to bring together the latest Cisco routing and switching
technologies, network services, data center and cloud security, automation, and integrated solutions with those of
Cisco's ecosystem of partners to develop a trusted approach to data center transformation. Specific benefits include:
 Demonstrated solutions to critical technology-related problems in evolving IT infrastructure: Provides support for cloud
computing, applications, desktop virtualization, consolidation and virtualization, and business continuance
 Reduced time to deployment: Provides best-practice recommendations based on a fully tested and validated
architecture, helping enable technology adoption and rapid deployment
 Reduced risk: Enables enterprises and service providers to deploy new architectures and technologies with confidence
 Increased flexibility: Enables rapid, on-demand, workload deployment in a multitenant environment using a
comprehensive automation framework with portal-based resource provisioning and management capabilities
 Improved operating efficiency: Integrates automation with a multitenant pool of computing, networking, and storage
resources to improve asset use, reduce operation overhead, and mitigate operation configuration errors
The Cisco VMDC architecture, consisting of the Cisco Unified Data Center and Cisco Data Center Interconnect (DCI)
together with other architectural components such as infrastructure abstraction, orchestration and automation,
assurance, and integrated services and applications, as shown below, provide comprehensive guidelines for deployment
of cloud infrastructure and services at multiple levels.
3
Using Cisco’s VMDC to Facilitate FISMA Compliance
4
SecureState
SecureState is a management consulting company specializing in information security and compliance services. We
believe in a different approach to security which guides our clients as partners, from their CurrentState (CS) to their
DesiredState (DS) and ultimately their SecureState. As shown in the graph below, SecureState begins working with
clients at the CS, performing assessments to understand the security posture of the organization as it is constructed
today. Once SecureState identifies the CS, we then construct tactical and strategic methods to move from the CS to the
DS and ultimately a managed SecureState (SS).
SecureState provides services to public and private organizations that operate within the Governmental Sector, assisting
organizations in identifying their CurrentState of FISMA compliance. SecureState then provides a roadmap and assistance
as desired with tactical and strategic items them to achieve their DesiredState and SecureState. Types of
assistance include validation of NIST 800-53 controls, secure system configuration, and policy development and strategic
security solutions that align with operational goals.
SecureState’s team of resources is consistently looked upon as thought leaders in information security, presenting at
conferences such as InfoSec World, DefCon, BlackHat, and SecureWorld Expo. The team is also sought after by
journalists for publications such as SC Magazine, InformationWeek, and Federal CIO Magazine.
Who Needs to be FISMA Compliant?
All federal agencies and contracted private entities who support operations such as providing protection, administration
or maintenance of federal assets as they pertain to information systems security are required to comply with FISMA.
Requirements vary based on the categorization level of the asset as defined in Federal Information Processing Standard
(FIPS 199). The goal is to provide a holistic, risk based information security program, including implementation of
administrative and technical components to support the program.
Using Cisco’s VMDC to Facilitate FISMA Compliance
5
What are the Current Challenges?
1. Agency Size. Based on Government Accountability Office (GAO) report 14-344, released June 2014, agency size
plays a role in achieving FISMA compliance. While some controls found not to be in place are administrative,
lack of assessing risk or implementing policies and procedures does not provide the structure to implement
technical safeguards. As depicted in the graph below, which is included in GAO report 14-344 with data supplied
by US-CERT, incidents such as unauthorized access and active or passive reconnaissance are steadily increasing.
2. Access Controls/Authentication Management. As evidenced in the graph provided in the GAO report above,
many organizations are struggling with unauthorized access. Through the use of Active Directory (AD), Windows
domain accounts are easily managed. Accounts such for devices that provide network infrastructure, Linux
and/or Unix system accounts or local machine administrator accounts still can remain a challenge (e.g.,
password length and/or complexity and length, password history, session timeouts, device lockout.). Application
of consistent security controls becomes time consuming and unmanageable.
3. Device Hardening. All systems and applications are required to be securely configured as defined in
configuration management (CM) control area of FISMA. Common systems that must be securely configured
include databases (Oracle, MS-SQL, MySQL, etc.), servers (Windows 2003, Windows 2008, Red Hat, etc.), web
servers (IIS, Apache, WebLogic, etc.), and network infrastructure (firewalls, routers, switches, etc.). If there are
not standard operating procedures in place or baseline configurations implemented, standard hardening
practices can become inconsistent.
4. Monitoring and Log aggregation-Log aggregation is easily achieved with Windows devices, however,
aggregating all outlying devices such as network components can be a challenge. This requires additional
resources to implement appropriate log controls and anomaly reporting from such devices.
Using Cisco’s VMDC to Facilitate FISMA Compliance
6
FISMA Control Areas
FISMA consists of seventeen control areas that must be applied dependent upon categorization of device:
1. Access Control (AC)- Assesses processes as they pertain to account management including role based access, least
priviledge, remote access, priviledged accounts and revokation processes, including wireless network and mobile
device access.
2. Awareness and Training (AT)- Assesses process, frequency and methods as they pertain to security awareness and
training. Additionally, controls as they pertain to role based traing (e.g., developers) and training verification and
tracking are also assessed.
3. Audit and Accountability (AU)- Assesses administrative and technical controls around logging access and events,
audit log storage capacity, log review and reporting and protection of audit trails from modification. Non-
repudiation, log generation and log retention are also included.
4. Security Assessment and Authorization (CA)- Assesses testing of security defenses as implemented (e.g.,
penetration testing). Additionally, system interconnections, segmentation, continous monitoring, authorization are
addressed as are remediation plans for vulnerabilities.
5. Configuration Management (CM)- Assesses processes as they pertain to system hardening standards, including
authoritative and supporting documentation pertaining to configuration management. Change control methods
and mechnanisms and asset inventory are also addressed.
6. Contingency Planning (CP)- Assesses processes regarding planning efforts in case of a natural disaster, continuity of
operations and recovery efforts. Training, testing, after action reviews, and plan improvement are also assessed.
7. Identification and Authentication (IA)- Assesses organizational processes as they pertain to the management of
users and components identity and proper authorization for access and authentication.
8. Incident Response (IR)- Assesses processes and procedures as they pertain to incident repsonse methods and
mechanisms involving information system components and data, including training of individuals, testing and
continual improvement of the plan.
9. Maintanance (MA)- Assesses management of system maintenance activities, documentation. Additionally, tools,
remote vendor access, and maintenance personnel management are included.
10. Media Protection (MP)- Assesses protection mechanisms and management processes as they pertain to physical
and electronic media throughout their lifecycle. Areas such as proper chain of custody and inventroy management
are also assessed.
11. Physical and Environmental Protection (PE)- Assesses phyiscal controls and access management processes as they
pertain to system components. Areas such as monitoring and visitor managment, emergency procedures and
management of the environment (e.g., temperature, humidity and damage protection) are included.
12. Planning (PL)- Assesses administrative processes regarding items such as security plans and codes of conduct, as
they pertain to security and privacy.
13. Personnel Security (PS)- Assesses management processes as they pertain to individuals with access to information
systems. Items assessed include validity of qualifications, criminal history and termination/transfer processes, third-
party access management and sanctions.
14. Risk Assessment (RA)- Assesses the risk management processes within the agency or organization including
categorization rationale, risk assessment reporting and vulnerability management.
15. System and Services Acquisition (SA)- Assesses the management of the acquisition process. Additionally, Systems
Development Lifecycle (SDLC), supply chain management and analysis are included.
16. System and Communications Protection (SC)- Assesses data in transit methods to ensure confidentiality and
integrity. Key management , shared resources, operational security, and availability are included.
17. System and Information Integrity (SI)- Assesses data integrity management. Processes such as code flaw
remediation , malicious code protection, third party security alerts, functionality testing and input validation are
included.
7
Using Cisco’s VMDC to Facilitate FISMA Compliance
How VMDC Can Help
While FISMA is a holistic governance model addressing administrative and technical controls, VMDC can be utilized to
facilitate compliance in several control areas. Keeping in mind, control families contain both administrative and technical
controls, VMDC facilitates an overall eighty six (86) controls with the balance being administrative controls that would
need to be implemented by the agency or organization. Four control areas not addressed, Awareness and Training,
Maintenance, Physical and Environmental Protection, and Planning are the responsibility of the organization to
implement as they are process driven.
Access Control (AC)
Cisco’s Access Control Server (ACS) provides capability to integrate with RADIUS/TACACS or LDAP servers such as Active
Directory (AD) providing strong access controls for data store devices and network components within the VMDC
solution. While performing the review of the VMDC network architecture, SecureState verified that ACS is capable of
integrating each of the core pieces of network infrastructure into AD. Roles can be configured in ACS, which limit the
types of commands a particular account can run on a particular device. Furthermore, roles can be created which grant
access to only a subset of network devices in the network. The VMDC solution facilitates nineteen (19) applicable
controls, with the balance being the responsibility of the organization.
Audit and Accountability (AU)
Introduction of Splunk into the VMDC solution provides an agency or organization with the ability to aggregate logging
into a powerful Security Information and Event Management (SIEM). Splunk facilitates many of the attributes required
for compliance (e.g., date/time stamp, source, user identity). Additionally, VMDC allows organizations to not only input
Windows logs, but also logs from network components in order to continuously monitor all systems. Anomaly alerting
can also be configured to report from one central source. Lancope StealthWatch provides additional audit information
from a network monitoring perspective. Sourcefire provides the capability to provide intrusion detection, adding
another layer of security and provide early detection of irregularities. VMDC facilitates ten (10) applicable controls
required for FISMA compliance in this control area.
Security Assessment and Authorization (CA)
Incorporating Sourcefire, Splunk, and Lancope StealthWatch into the overall VMDC solution facilitates continuous
monitoring requirements from a systems and network infrastructure perspective. VMDC provides robust network
infrastructure which can be used in order to segment operational areas from areas containing confidential data thereby
maintaining confidentiality of information. These technologies include ACLs, VLANs, and virtual firewalls. . VMDC
facilitates two (2) applicable controls, with the balance being the responsibility of the organization.
Configuration Management (CM)
The BMC configuration tool can be incorporated into the VMDC architecture to streamline configuration management.
This powerful tool drives efficiency as hardening baselines can be implemented using this tool. Additionally, features of
the BMC tool facilitate synchronization of devices, and provides the ability to update or rollback configurations as
needed. Use of Cisco’s ASA firewalls permits organizations the ability to implement restrictions as needed to meet
operational requirements while still maintaining a secure posture. Cisco has developed configuration guides for each
8
Using Cisco’s VMDC to Facilitate FISMA Compliance
component which can be used be used to apply specific controls. SecureState reviewed each device in order to verify
that they could be hardened in such a way as to meet FISMA compliance requirements. The VMDC solution facilitates
seven (7) applicable controls, with the balance being the responsibility of the organization.
Contingency Planning (CP)
VMDC cannot directly meet FISMA controls pertaining to contingency planning as these are administrative in nature. The
VMDC solution can provide agencies or organizations with the ability to implement as a Disaster Recovery site
maintained in an off-site facility at a Cisco or other data center of their choice.
Identification and Authentication (IA)
As with the AC control area, Cisco’s Access Control Server can be integrated with RADIUS/TACACS or LDAP servers such
as Active Directory (AD) to facilitate authentication controls, applying them to both systems and network components
within the VMDC solution; driving efficiency and reducing the amount of time required for administrative tasks.
Additionally, capability to incorporate two-factor authentication as required by FISMA is available. The VMDC solution
facilitates thirteen (13) applicable controls, with the balance being the responsibility of the organization.
Incident Response (IR)
Anomaly Reporting provided by Splunk, Sourcefire, and Lancope StealthWatch can be used to detect incidents and force
activation of the Incident Response Plan in the early stages of the incident. This can save time resources and limit the
severity of the incident. Additionally, if alerts are acted upon early enough, data confidentiality and integrity potentially
maintained and system downtime can potentially be minimized.
Media Protection (MP)
Cisco can provide disk level encryption as an added service incorporated into the VMDC architecture as a way to provide
data confidentiality when stored on electronic media. One (1) applicable FISMA control can be facilitated using the
VMDC solution.
Personnel Security (PS)
Splunk can provide logical access control review as a part of the VMDC solution. This would facilitate one (1) applicable
control required for FISMA compliance.
Risk Assessment (RA)
The use of Cisco’s ACS integrated into RADIUS/TACACS or LDAP servers facilitate role based access and elevated
privileges as they pertain to this control area. The VMDC solution facilitates one (1) applicable control in this control
area.
System and Services Acquisition (SA)
This control area covers many process and administrative controls as they pertain to the management of the Systems
Development Lifecycle (SDLC). While VMDC can only facilitate one (1) applicable control in this control area, secure areas
can be configured to logically separated environments (e.g., development, test, sandbox, production) and through use of
Cisco’s ACS separation of duties can be facilitated, providing technical support for administrative controls.
9
Using Cisco’s VMDC to Facilitate FISMA Compliance
System and Communications Protection (SC)
Integration of Lancope StealthWatch network monitoring can provide early detection of potential denial of service
attacks and send alerts to resources in order to preserve system availability. Information leakage can be minimized
through VMDC’s solution of VLANs and virtual firewalls to logically segment business units into separate containers. ASA
firewalls, routers and switches provide defense against external leakage in conjunction with the BMC configuration tool,
which can be used to properly configure all components securely. Sourcefire Intrusion Prevention provides an added
layer of defense alerting on suspicious activity within the internal network. Disk level encryption is available as an
additional service, which would further facilitate controls in this control family. Data in transit is also secured through
the use of the VMDC solution and the ability to provide secure communication channels (e.g,. SSL, SSH) and support the
use of key certificates.
Cisco’s ACS provides strong access controls and use of virtual firewalls and VLANS for segmentation provides several
layers of protection for data at rest. The VMDC facilitates seventeen (17) applicable controls in this control area.
System and Information Integrity (SI)
Through the integration of Splunk SIEM, Sourcefire IPS, and Lancope StealthWatch network performance tool into the
overall VMDC solution, agencies and organizations are provided with the ability to monitor activities from several
different perspectives, providing a more complete view into network events and performance; providing the ability to
adjust fire as needed and continually improve, maintaining confidentiality and integrity of data, while maintaining the
high levels of availability and network performance. Additionally, Sourcefire’s ability to provide real-time alerting of
events allows for quicker response times and potential incident resolution; allowing organizations to potentially meet or
exceed recovery time objectives (RTO).
All Cisco devices contained within the VMDC solution have gone through security testing to protect memory from
unauthorized code execution. The VMDC solution facilitates eight (8) applicable controls, with the balance being the
responsibility of the organization.
1
0
Using Cisco’s VMDC to Facilitate FISMA Compliance
Achieving FISMA Compliance
As FISMA is a holistic governance approach based on risk. Administrative documentation, processes, and device
categorization is required prior to selection and implementation and assessment of technical controls. Additionally,
continued monitoring of the administrative and technical controls is required to ensure consistency of process as it
pertains to confidentiality, integrity, and availability of data stored on federal information systems.
The process starts with NIST SP 800-30 Revision 1 Guide for Conducting Risk
Assessments as defined in NIST SP 800-37 Revision 1 Guide for Applying the
Risk Management Framework to Federal Information Systems. This enables
an agency or supporting organization accurately categorize and information
system in accordance with FIPS 199 Standards for Security Categorization of
Federal Information and Information Systems.
NIST 800-37 Rev 1 provides guidance for in the specific areas as they pertain
to federal information systems to include activities such as “security
categorization, security control selection, and implementation, security
control assessment, information system authorization and security control
monitoring.” per the documented definition. It addresses risk from three levels, the organization, business process, and
information system level.
FIPS 199 requires information to be categorized based on potential impact to the agency or organization if
confidentiality, integrity or availability is lost. Low impact is defined as having a limited adverse effect, where moderate
impact would be defined as a serious effect, and high would be defined as severe or catastrophic effect. NIST SP 800-30
provides risk management framework for assessing the risks associated with federal information systems in order to
provide appropriate levels in accordance with FIPS 199. NIST SP 800-37 Rev 1 Guide for Applying the Risk Management
Framework to Federal Information Systems is the guidance document for assessing associated risks.
After implementation of administrative and technical safeguards, a NIST SP 800-53 assessment is performed, as defined
by category, in accordance with FIPS 200 Minimum Security Requirements for Federal Information and Information
Systems in order to assess compliance
NIST SP 800-53 Revision 4 is the most current control framework used to assess administrative and technical safeguards
implemented in order to authorize an information system as being FISMA compliant.
Upon achievement of FISMA compliance, authorization to operate is granted from a Certifying Authority (agency
official).
NIST SP 800-137 Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations
provides guidance on implementation and management of an overall continuous monitoring program.
For further information, refer to the VMDC Cloud Security 1.0 Design guide
at: http://www.cisco.com/c/en/us/solutions/enterprise/data-center-designs-cloud-computing/landing_vmdc.html

Weitere ähnliche Inhalte

Mehr von Cisco Service Provider

Operator Drives Bandwidth Efficiency and Optimizes Satellite Link Performance
Operator Drives Bandwidth Efficiency and Optimizes Satellite Link PerformanceOperator Drives Bandwidth Efficiency and Optimizes Satellite Link Performance
Operator Drives Bandwidth Efficiency and Optimizes Satellite Link PerformanceCisco Service Provider
 
Application Engineered Routing Segment Routing and the Cisco WAN Automation ...
Application Engineered Routing  Segment Routing and the Cisco WAN Automation ...Application Engineered Routing  Segment Routing and the Cisco WAN Automation ...
Application Engineered Routing Segment Routing and the Cisco WAN Automation ...Cisco Service Provider
 
Research Highlight: Independent Validation of Cisco Service Provider Virtuali...
Research Highlight: Independent Validation of Cisco Service Provider Virtuali...Research Highlight: Independent Validation of Cisco Service Provider Virtuali...
Research Highlight: Independent Validation of Cisco Service Provider Virtuali...Cisco Service Provider
 
Cisco Policy Suite for Service Providers
Cisco Policy Suite for Service ProvidersCisco Policy Suite for Service Providers
Cisco Policy Suite for Service ProvidersCisco Service Provider
 
Deploy New Technologies Quickly with Cisco Managed Services for Service Provi...
Deploy New Technologies Quickly with Cisco Managed Services for Service Provi...Deploy New Technologies Quickly with Cisco Managed Services for Service Provi...
Deploy New Technologies Quickly with Cisco Managed Services for Service Provi...Cisco Service Provider
 
Segment Routing: Prepare Your Network For New Business Models
Segment Routing:  Prepare Your Network For New Business ModelsSegment Routing:  Prepare Your Network For New Business Models
Segment Routing: Prepare Your Network For New Business ModelsCisco Service Provider
 
Cisco Virtual Managed Services: Transform Your Business with Cloud-based Inn...
Cisco Virtual Managed Services:  Transform Your Business with Cloud-based Inn...Cisco Virtual Managed Services:  Transform Your Business with Cloud-based Inn...
Cisco Virtual Managed Services: Transform Your Business with Cloud-based Inn...Cisco Service Provider
 
Cisco Virtual Managed Services Solution
Cisco Virtual Managed Services SolutionCisco Virtual Managed Services Solution
Cisco Virtual Managed Services SolutionCisco Service Provider
 
Cisco cBR-8 Evolved CCAP: Deliver Scalable Network and Service Growth at a Lo...
Cisco cBR-8 Evolved CCAP: Deliver Scalable Network and Service Growth at a Lo...Cisco cBR-8 Evolved CCAP: Deliver Scalable Network and Service Growth at a Lo...
Cisco cBR-8 Evolved CCAP: Deliver Scalable Network and Service Growth at a Lo...Cisco Service Provider
 
Cisco Service Provider Vision and Strategy: Business Transforming Through Inn...
Cisco Service Provider Vision and Strategy: Business Transforming Through Inn...Cisco Service Provider Vision and Strategy: Business Transforming Through Inn...
Cisco Service Provider Vision and Strategy: Business Transforming Through Inn...Cisco Service Provider
 
 Network Innovations Driving Business Transformation
 Network Innovations Driving Business Transformation Network Innovations Driving Business Transformation
 Network Innovations Driving Business TransformationCisco Service Provider
 
Introducing Application Engineered Routing Powered by Segment Routing
Introducing Application Engineered Routing Powered by Segment RoutingIntroducing Application Engineered Routing Powered by Segment Routing
Introducing Application Engineered Routing Powered by Segment RoutingCisco Service Provider
 
Independent Validation of Cisco’s Multi Vendor Support
Independent Validation of Cisco’s Multi Vendor SupportIndependent Validation of Cisco’s Multi Vendor Support
Independent Validation of Cisco’s Multi Vendor SupportCisco Service Provider
 
Fostering the Evolution of Network Based Cloud Service Providers.
Fostering the Evolution of Network Based Cloud Service Providers.Fostering the Evolution of Network Based Cloud Service Providers.
Fostering the Evolution of Network Based Cloud Service Providers.Cisco Service Provider
 
Accelerating Enterprise Small Cell Deployments
Accelerating Enterprise Small Cell DeploymentsAccelerating Enterprise Small Cell Deployments
Accelerating Enterprise Small Cell DeploymentsCisco Service Provider
 
Application Engineered Routing Enables Applications and Network Infrastructur...
Application Engineered Routing Enables Applications and Network Infrastructur...Application Engineered Routing Enables Applications and Network Infrastructur...
Application Engineered Routing Enables Applications and Network Infrastructur...Cisco Service Provider
 

Mehr von Cisco Service Provider (20)

Simplify Operations
Simplify OperationsSimplify Operations
Simplify Operations
 
Expand Your Market Opportunities
Expand Your Market OpportunitiesExpand Your Market Opportunities
Expand Your Market Opportunities
 
Orchestrated Assurance
Orchestrated Assurance Orchestrated Assurance
Orchestrated Assurance
 
Operator Drives Bandwidth Efficiency and Optimizes Satellite Link Performance
Operator Drives Bandwidth Efficiency and Optimizes Satellite Link PerformanceOperator Drives Bandwidth Efficiency and Optimizes Satellite Link Performance
Operator Drives Bandwidth Efficiency and Optimizes Satellite Link Performance
 
Application Engineered Routing Segment Routing and the Cisco WAN Automation ...
Application Engineered Routing  Segment Routing and the Cisco WAN Automation ...Application Engineered Routing  Segment Routing and the Cisco WAN Automation ...
Application Engineered Routing Segment Routing and the Cisco WAN Automation ...
 
Research Highlight: Independent Validation of Cisco Service Provider Virtuali...
Research Highlight: Independent Validation of Cisco Service Provider Virtuali...Research Highlight: Independent Validation of Cisco Service Provider Virtuali...
Research Highlight: Independent Validation of Cisco Service Provider Virtuali...
 
Cisco Policy Suite for Service Providers
Cisco Policy Suite for Service ProvidersCisco Policy Suite for Service Providers
Cisco Policy Suite for Service Providers
 
Deploy New Technologies Quickly with Cisco Managed Services for Service Provi...
Deploy New Technologies Quickly with Cisco Managed Services for Service Provi...Deploy New Technologies Quickly with Cisco Managed Services for Service Provi...
Deploy New Technologies Quickly with Cisco Managed Services for Service Provi...
 
Segment Routing: Prepare Your Network For New Business Models
Segment Routing:  Prepare Your Network For New Business ModelsSegment Routing:  Prepare Your Network For New Business Models
Segment Routing: Prepare Your Network For New Business Models
 
Cisco Virtual Managed Services: Transform Your Business with Cloud-based Inn...
Cisco Virtual Managed Services:  Transform Your Business with Cloud-based Inn...Cisco Virtual Managed Services:  Transform Your Business with Cloud-based Inn...
Cisco Virtual Managed Services: Transform Your Business with Cloud-based Inn...
 
Cisco Virtual Managed Services Solution
Cisco Virtual Managed Services SolutionCisco Virtual Managed Services Solution
Cisco Virtual Managed Services Solution
 
Cisco cBR-8 Evolved CCAP: Deliver Scalable Network and Service Growth at a Lo...
Cisco cBR-8 Evolved CCAP: Deliver Scalable Network and Service Growth at a Lo...Cisco cBR-8 Evolved CCAP: Deliver Scalable Network and Service Growth at a Lo...
Cisco cBR-8 Evolved CCAP: Deliver Scalable Network and Service Growth at a Lo...
 
IPv6: Unleashing The Power
IPv6: Unleashing The PowerIPv6: Unleashing The Power
IPv6: Unleashing The Power
 
Cisco Service Provider Vision and Strategy: Business Transforming Through Inn...
Cisco Service Provider Vision and Strategy: Business Transforming Through Inn...Cisco Service Provider Vision and Strategy: Business Transforming Through Inn...
Cisco Service Provider Vision and Strategy: Business Transforming Through Inn...
 
 Network Innovations Driving Business Transformation
 Network Innovations Driving Business Transformation Network Innovations Driving Business Transformation
 Network Innovations Driving Business Transformation
 
Introducing Application Engineered Routing Powered by Segment Routing
Introducing Application Engineered Routing Powered by Segment RoutingIntroducing Application Engineered Routing Powered by Segment Routing
Introducing Application Engineered Routing Powered by Segment Routing
 
Independent Validation of Cisco’s Multi Vendor Support
Independent Validation of Cisco’s Multi Vendor SupportIndependent Validation of Cisco’s Multi Vendor Support
Independent Validation of Cisco’s Multi Vendor Support
 
Fostering the Evolution of Network Based Cloud Service Providers.
Fostering the Evolution of Network Based Cloud Service Providers.Fostering the Evolution of Network Based Cloud Service Providers.
Fostering the Evolution of Network Based Cloud Service Providers.
 
Accelerating Enterprise Small Cell Deployments
Accelerating Enterprise Small Cell DeploymentsAccelerating Enterprise Small Cell Deployments
Accelerating Enterprise Small Cell Deployments
 
Application Engineered Routing Enables Applications and Network Infrastructur...
Application Engineered Routing Enables Applications and Network Infrastructur...Application Engineered Routing Enables Applications and Network Infrastructur...
Application Engineered Routing Enables Applications and Network Infrastructur...
 

Kürzlich hochgeladen

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Using Cisco’s Vmdc to Facilitate FISMA Compliance

  • 1. Using Cisco’s VMDC to Facilitate FISMA Compliance Using Cisco’s VMDC to Facilitate FISMA Compliance July 23, 2014 Jason P. Broz 1
  • 2. Using Cisco’s VMDC to Facilitate FISMA Compliance 2 Synopsis This whitepaper discusses how Cisco’s Virtualized Multiservice Data Center (VMDC) validated architecture can facilitate compliance with the Federal Information Security Management Act (FISMA) (NIST 800-53 Revision 4 moderate control set). Table of Contents Introduction..............................................................................................................................................3 VMDC ................................................................................................................................................................3 SecureState........................................................................................................................................................4 Who Needs to be FISMA Compliant? .........................................................................................................4 What are the Current Challenges?.............................................................................................................5 FISMA Control Areas .................................................................................................................................6 How VMDC Can Help.................................................................................................................................7 Access Control (AC) ............................................................................................................................................7 Audit and Accountability (AU).............................................................................................................................7 Security Assessment and Authorization (CA) .......................................................................................................7 Configuration Management (CM)........................................................................................................................7 Identification and Authentication (IA).................................................................................................................8 Media Protection (MP) .......................................................................................................................................8 Personnel Security (PS).......................................................................................................................................8 Risk Assessment (RA)..........................................................................................................................................8 System and Services Acquisition (SA) ..................................................................................................................8 System and Communications Protection (SC) ......................................................................................................9 System and Information Integrity (SI)..................................................................................................................9 Achieving FISMA Compliance ..................................................................................................................10
  • 3. Using Cisco’s VMDC to Facilitate FISMA Compliance Introduction Cisco’s Virtualized Multiservice Data Center (VMDC) is a scalable network topology that service providers and large organizations can implement in order to provide a secure multi-tenant solution to their clients. The architecture that VMDC utilizes greatly assists service providers in creating a network which meets the various security needs of clients. In order to evaluate the ability of Cisco’s VMDC network topology to facilitate Federal Information Security Management Act (FISMA) compliance on behalf of the clients that implement this blueprint, Cisco requested SecureState analyze the VDMC topology against the NIST 800-53 Revision 4 control set. Previously, SecureState evaluated earlier versions of the VMDC topology against NIST 800-53 Revision 3. Cisco’s VMDC architecture provides a number of controls which can be implemented in order to help fulfill a particular component of the overall control. VMDC The Cisco VMDC is a tested and validated reference architecture for the Cisco Unified Data Center. It provides a set of guidelines and best practices for the creation and deployment of a scalable, secure, and resilient infrastructure in the data center. The Cisco VMDC architecture demonstrates how to bring together the latest Cisco routing and switching technologies, network services, data center and cloud security, automation, and integrated solutions with those of Cisco's ecosystem of partners to develop a trusted approach to data center transformation. Specific benefits include:  Demonstrated solutions to critical technology-related problems in evolving IT infrastructure: Provides support for cloud computing, applications, desktop virtualization, consolidation and virtualization, and business continuance  Reduced time to deployment: Provides best-practice recommendations based on a fully tested and validated architecture, helping enable technology adoption and rapid deployment  Reduced risk: Enables enterprises and service providers to deploy new architectures and technologies with confidence  Increased flexibility: Enables rapid, on-demand, workload deployment in a multitenant environment using a comprehensive automation framework with portal-based resource provisioning and management capabilities  Improved operating efficiency: Integrates automation with a multitenant pool of computing, networking, and storage resources to improve asset use, reduce operation overhead, and mitigate operation configuration errors The Cisco VMDC architecture, consisting of the Cisco Unified Data Center and Cisco Data Center Interconnect (DCI) together with other architectural components such as infrastructure abstraction, orchestration and automation, assurance, and integrated services and applications, as shown below, provide comprehensive guidelines for deployment of cloud infrastructure and services at multiple levels. 3
  • 4. Using Cisco’s VMDC to Facilitate FISMA Compliance 4 SecureState SecureState is a management consulting company specializing in information security and compliance services. We believe in a different approach to security which guides our clients as partners, from their CurrentState (CS) to their DesiredState (DS) and ultimately their SecureState. As shown in the graph below, SecureState begins working with clients at the CS, performing assessments to understand the security posture of the organization as it is constructed today. Once SecureState identifies the CS, we then construct tactical and strategic methods to move from the CS to the DS and ultimately a managed SecureState (SS). SecureState provides services to public and private organizations that operate within the Governmental Sector, assisting organizations in identifying their CurrentState of FISMA compliance. SecureState then provides a roadmap and assistance as desired with tactical and strategic items them to achieve their DesiredState and SecureState. Types of assistance include validation of NIST 800-53 controls, secure system configuration, and policy development and strategic security solutions that align with operational goals. SecureState’s team of resources is consistently looked upon as thought leaders in information security, presenting at conferences such as InfoSec World, DefCon, BlackHat, and SecureWorld Expo. The team is also sought after by journalists for publications such as SC Magazine, InformationWeek, and Federal CIO Magazine. Who Needs to be FISMA Compliant? All federal agencies and contracted private entities who support operations such as providing protection, administration or maintenance of federal assets as they pertain to information systems security are required to comply with FISMA. Requirements vary based on the categorization level of the asset as defined in Federal Information Processing Standard (FIPS 199). The goal is to provide a holistic, risk based information security program, including implementation of administrative and technical components to support the program.
  • 5. Using Cisco’s VMDC to Facilitate FISMA Compliance 5 What are the Current Challenges? 1. Agency Size. Based on Government Accountability Office (GAO) report 14-344, released June 2014, agency size plays a role in achieving FISMA compliance. While some controls found not to be in place are administrative, lack of assessing risk or implementing policies and procedures does not provide the structure to implement technical safeguards. As depicted in the graph below, which is included in GAO report 14-344 with data supplied by US-CERT, incidents such as unauthorized access and active or passive reconnaissance are steadily increasing. 2. Access Controls/Authentication Management. As evidenced in the graph provided in the GAO report above, many organizations are struggling with unauthorized access. Through the use of Active Directory (AD), Windows domain accounts are easily managed. Accounts such for devices that provide network infrastructure, Linux and/or Unix system accounts or local machine administrator accounts still can remain a challenge (e.g., password length and/or complexity and length, password history, session timeouts, device lockout.). Application of consistent security controls becomes time consuming and unmanageable. 3. Device Hardening. All systems and applications are required to be securely configured as defined in configuration management (CM) control area of FISMA. Common systems that must be securely configured include databases (Oracle, MS-SQL, MySQL, etc.), servers (Windows 2003, Windows 2008, Red Hat, etc.), web servers (IIS, Apache, WebLogic, etc.), and network infrastructure (firewalls, routers, switches, etc.). If there are not standard operating procedures in place or baseline configurations implemented, standard hardening practices can become inconsistent. 4. Monitoring and Log aggregation-Log aggregation is easily achieved with Windows devices, however, aggregating all outlying devices such as network components can be a challenge. This requires additional resources to implement appropriate log controls and anomaly reporting from such devices.
  • 6. Using Cisco’s VMDC to Facilitate FISMA Compliance 6 FISMA Control Areas FISMA consists of seventeen control areas that must be applied dependent upon categorization of device: 1. Access Control (AC)- Assesses processes as they pertain to account management including role based access, least priviledge, remote access, priviledged accounts and revokation processes, including wireless network and mobile device access. 2. Awareness and Training (AT)- Assesses process, frequency and methods as they pertain to security awareness and training. Additionally, controls as they pertain to role based traing (e.g., developers) and training verification and tracking are also assessed. 3. Audit and Accountability (AU)- Assesses administrative and technical controls around logging access and events, audit log storage capacity, log review and reporting and protection of audit trails from modification. Non- repudiation, log generation and log retention are also included. 4. Security Assessment and Authorization (CA)- Assesses testing of security defenses as implemented (e.g., penetration testing). Additionally, system interconnections, segmentation, continous monitoring, authorization are addressed as are remediation plans for vulnerabilities. 5. Configuration Management (CM)- Assesses processes as they pertain to system hardening standards, including authoritative and supporting documentation pertaining to configuration management. Change control methods and mechnanisms and asset inventory are also addressed. 6. Contingency Planning (CP)- Assesses processes regarding planning efforts in case of a natural disaster, continuity of operations and recovery efforts. Training, testing, after action reviews, and plan improvement are also assessed. 7. Identification and Authentication (IA)- Assesses organizational processes as they pertain to the management of users and components identity and proper authorization for access and authentication. 8. Incident Response (IR)- Assesses processes and procedures as they pertain to incident repsonse methods and mechanisms involving information system components and data, including training of individuals, testing and continual improvement of the plan. 9. Maintanance (MA)- Assesses management of system maintenance activities, documentation. Additionally, tools, remote vendor access, and maintenance personnel management are included. 10. Media Protection (MP)- Assesses protection mechanisms and management processes as they pertain to physical and electronic media throughout their lifecycle. Areas such as proper chain of custody and inventroy management are also assessed. 11. Physical and Environmental Protection (PE)- Assesses phyiscal controls and access management processes as they pertain to system components. Areas such as monitoring and visitor managment, emergency procedures and management of the environment (e.g., temperature, humidity and damage protection) are included. 12. Planning (PL)- Assesses administrative processes regarding items such as security plans and codes of conduct, as they pertain to security and privacy. 13. Personnel Security (PS)- Assesses management processes as they pertain to individuals with access to information systems. Items assessed include validity of qualifications, criminal history and termination/transfer processes, third- party access management and sanctions. 14. Risk Assessment (RA)- Assesses the risk management processes within the agency or organization including categorization rationale, risk assessment reporting and vulnerability management. 15. System and Services Acquisition (SA)- Assesses the management of the acquisition process. Additionally, Systems Development Lifecycle (SDLC), supply chain management and analysis are included. 16. System and Communications Protection (SC)- Assesses data in transit methods to ensure confidentiality and integrity. Key management , shared resources, operational security, and availability are included. 17. System and Information Integrity (SI)- Assesses data integrity management. Processes such as code flaw remediation , malicious code protection, third party security alerts, functionality testing and input validation are included.
  • 7. 7 Using Cisco’s VMDC to Facilitate FISMA Compliance How VMDC Can Help While FISMA is a holistic governance model addressing administrative and technical controls, VMDC can be utilized to facilitate compliance in several control areas. Keeping in mind, control families contain both administrative and technical controls, VMDC facilitates an overall eighty six (86) controls with the balance being administrative controls that would need to be implemented by the agency or organization. Four control areas not addressed, Awareness and Training, Maintenance, Physical and Environmental Protection, and Planning are the responsibility of the organization to implement as they are process driven. Access Control (AC) Cisco’s Access Control Server (ACS) provides capability to integrate with RADIUS/TACACS or LDAP servers such as Active Directory (AD) providing strong access controls for data store devices and network components within the VMDC solution. While performing the review of the VMDC network architecture, SecureState verified that ACS is capable of integrating each of the core pieces of network infrastructure into AD. Roles can be configured in ACS, which limit the types of commands a particular account can run on a particular device. Furthermore, roles can be created which grant access to only a subset of network devices in the network. The VMDC solution facilitates nineteen (19) applicable controls, with the balance being the responsibility of the organization. Audit and Accountability (AU) Introduction of Splunk into the VMDC solution provides an agency or organization with the ability to aggregate logging into a powerful Security Information and Event Management (SIEM). Splunk facilitates many of the attributes required for compliance (e.g., date/time stamp, source, user identity). Additionally, VMDC allows organizations to not only input Windows logs, but also logs from network components in order to continuously monitor all systems. Anomaly alerting can also be configured to report from one central source. Lancope StealthWatch provides additional audit information from a network monitoring perspective. Sourcefire provides the capability to provide intrusion detection, adding another layer of security and provide early detection of irregularities. VMDC facilitates ten (10) applicable controls required for FISMA compliance in this control area. Security Assessment and Authorization (CA) Incorporating Sourcefire, Splunk, and Lancope StealthWatch into the overall VMDC solution facilitates continuous monitoring requirements from a systems and network infrastructure perspective. VMDC provides robust network infrastructure which can be used in order to segment operational areas from areas containing confidential data thereby maintaining confidentiality of information. These technologies include ACLs, VLANs, and virtual firewalls. . VMDC facilitates two (2) applicable controls, with the balance being the responsibility of the organization. Configuration Management (CM) The BMC configuration tool can be incorporated into the VMDC architecture to streamline configuration management. This powerful tool drives efficiency as hardening baselines can be implemented using this tool. Additionally, features of the BMC tool facilitate synchronization of devices, and provides the ability to update or rollback configurations as needed. Use of Cisco’s ASA firewalls permits organizations the ability to implement restrictions as needed to meet operational requirements while still maintaining a secure posture. Cisco has developed configuration guides for each
  • 8. 8 Using Cisco’s VMDC to Facilitate FISMA Compliance component which can be used be used to apply specific controls. SecureState reviewed each device in order to verify that they could be hardened in such a way as to meet FISMA compliance requirements. The VMDC solution facilitates seven (7) applicable controls, with the balance being the responsibility of the organization. Contingency Planning (CP) VMDC cannot directly meet FISMA controls pertaining to contingency planning as these are administrative in nature. The VMDC solution can provide agencies or organizations with the ability to implement as a Disaster Recovery site maintained in an off-site facility at a Cisco or other data center of their choice. Identification and Authentication (IA) As with the AC control area, Cisco’s Access Control Server can be integrated with RADIUS/TACACS or LDAP servers such as Active Directory (AD) to facilitate authentication controls, applying them to both systems and network components within the VMDC solution; driving efficiency and reducing the amount of time required for administrative tasks. Additionally, capability to incorporate two-factor authentication as required by FISMA is available. The VMDC solution facilitates thirteen (13) applicable controls, with the balance being the responsibility of the organization. Incident Response (IR) Anomaly Reporting provided by Splunk, Sourcefire, and Lancope StealthWatch can be used to detect incidents and force activation of the Incident Response Plan in the early stages of the incident. This can save time resources and limit the severity of the incident. Additionally, if alerts are acted upon early enough, data confidentiality and integrity potentially maintained and system downtime can potentially be minimized. Media Protection (MP) Cisco can provide disk level encryption as an added service incorporated into the VMDC architecture as a way to provide data confidentiality when stored on electronic media. One (1) applicable FISMA control can be facilitated using the VMDC solution. Personnel Security (PS) Splunk can provide logical access control review as a part of the VMDC solution. This would facilitate one (1) applicable control required for FISMA compliance. Risk Assessment (RA) The use of Cisco’s ACS integrated into RADIUS/TACACS or LDAP servers facilitate role based access and elevated privileges as they pertain to this control area. The VMDC solution facilitates one (1) applicable control in this control area. System and Services Acquisition (SA) This control area covers many process and administrative controls as they pertain to the management of the Systems Development Lifecycle (SDLC). While VMDC can only facilitate one (1) applicable control in this control area, secure areas can be configured to logically separated environments (e.g., development, test, sandbox, production) and through use of Cisco’s ACS separation of duties can be facilitated, providing technical support for administrative controls.
  • 9. 9 Using Cisco’s VMDC to Facilitate FISMA Compliance System and Communications Protection (SC) Integration of Lancope StealthWatch network monitoring can provide early detection of potential denial of service attacks and send alerts to resources in order to preserve system availability. Information leakage can be minimized through VMDC’s solution of VLANs and virtual firewalls to logically segment business units into separate containers. ASA firewalls, routers and switches provide defense against external leakage in conjunction with the BMC configuration tool, which can be used to properly configure all components securely. Sourcefire Intrusion Prevention provides an added layer of defense alerting on suspicious activity within the internal network. Disk level encryption is available as an additional service, which would further facilitate controls in this control family. Data in transit is also secured through the use of the VMDC solution and the ability to provide secure communication channels (e.g,. SSL, SSH) and support the use of key certificates. Cisco’s ACS provides strong access controls and use of virtual firewalls and VLANS for segmentation provides several layers of protection for data at rest. The VMDC facilitates seventeen (17) applicable controls in this control area. System and Information Integrity (SI) Through the integration of Splunk SIEM, Sourcefire IPS, and Lancope StealthWatch network performance tool into the overall VMDC solution, agencies and organizations are provided with the ability to monitor activities from several different perspectives, providing a more complete view into network events and performance; providing the ability to adjust fire as needed and continually improve, maintaining confidentiality and integrity of data, while maintaining the high levels of availability and network performance. Additionally, Sourcefire’s ability to provide real-time alerting of events allows for quicker response times and potential incident resolution; allowing organizations to potentially meet or exceed recovery time objectives (RTO). All Cisco devices contained within the VMDC solution have gone through security testing to protect memory from unauthorized code execution. The VMDC solution facilitates eight (8) applicable controls, with the balance being the responsibility of the organization.
  • 10. 1 0 Using Cisco’s VMDC to Facilitate FISMA Compliance Achieving FISMA Compliance As FISMA is a holistic governance approach based on risk. Administrative documentation, processes, and device categorization is required prior to selection and implementation and assessment of technical controls. Additionally, continued monitoring of the administrative and technical controls is required to ensure consistency of process as it pertains to confidentiality, integrity, and availability of data stored on federal information systems. The process starts with NIST SP 800-30 Revision 1 Guide for Conducting Risk Assessments as defined in NIST SP 800-37 Revision 1 Guide for Applying the Risk Management Framework to Federal Information Systems. This enables an agency or supporting organization accurately categorize and information system in accordance with FIPS 199 Standards for Security Categorization of Federal Information and Information Systems. NIST 800-37 Rev 1 provides guidance for in the specific areas as they pertain to federal information systems to include activities such as “security categorization, security control selection, and implementation, security control assessment, information system authorization and security control monitoring.” per the documented definition. It addresses risk from three levels, the organization, business process, and information system level. FIPS 199 requires information to be categorized based on potential impact to the agency or organization if confidentiality, integrity or availability is lost. Low impact is defined as having a limited adverse effect, where moderate impact would be defined as a serious effect, and high would be defined as severe or catastrophic effect. NIST SP 800-30 provides risk management framework for assessing the risks associated with federal information systems in order to provide appropriate levels in accordance with FIPS 199. NIST SP 800-37 Rev 1 Guide for Applying the Risk Management Framework to Federal Information Systems is the guidance document for assessing associated risks. After implementation of administrative and technical safeguards, a NIST SP 800-53 assessment is performed, as defined by category, in accordance with FIPS 200 Minimum Security Requirements for Federal Information and Information Systems in order to assess compliance NIST SP 800-53 Revision 4 is the most current control framework used to assess administrative and technical safeguards implemented in order to authorize an information system as being FISMA compliant. Upon achievement of FISMA compliance, authorization to operate is granted from a Certifying Authority (agency official). NIST SP 800-137 Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations provides guidance on implementation and management of an overall continuous monitoring program. For further information, refer to the VMDC Cloud Security 1.0 Design guide at: http://www.cisco.com/c/en/us/solutions/enterprise/data-center-designs-cloud-computing/landing_vmdc.html