About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Politics
Anarchism
Central Intelligence Agency (CIA)
Corporatarchy - Rule by the Corporations
Economic Documents
Federal Bureau of Investigation (FBI)
Foreign Military & Intelligence Agencies
Green Planet
International Banking / Money Laundering
Libertarianism
National Security Agency (NSA)
Police State
Political Documents
Political Spew
Right to Keep and Bear Arms
Terrorists and Freedom Fighters
The Nixon Project
The World Beyond the U.S.A.
U.S. Military
Technology
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Statement by Daniel Wolf, National Security Agency

Statement by Mr. Daniel G. Wolf, Information Assurance Director, National Security Agency Before the House Committee On Government Reform, Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations and the Subcommittee for Technology and Procurement Policy Joint Hearing on H.R. 3844: The Federal Information Security Reform Act of 2002 2 May 2002 For Official Use Only Until Released by the U.S. House of Representatives

Committee on Government Reform

Good morning Chairman Horn, Chairman Davis, and distinguished members of both Subcommittees¾thank you for inviting the National Security Agency to provide comments on H.R. 3844, “The Federal Information Security Reform Act of 2002”.

I also would like to thank the Members of both Subcommittees for their consistently strong interest and attention to this vital area over the past few years. Your leadership is providing a genuine public service in raising the visibility of the serious security challenges we all face in an age of interconnected, inter-dependent digital networks.

My name is Daniel Wolf and I am NSA’s Information Assurance Director. My comments to H.R. 3844, “The Federal Information Security Management Act of 2002,” are provided from NSA’s perspective. NSA’s Information Assurance Directorate is responsible for providing information assurance technologies, services, processes and policies that protect national security information systems. While some may suggest that NSA’s perspective is too narrow due to our focus on the stringent requirements of national security systems, I would like to note that NSA’s Information Assurance Directorate and its predecessor organizations have had policymaking and implementation responsibility regarding the protection of national security telecommunications and information processing systems across the Executive Branch since 1953.

During our nearly 50 years of producing not only security policies but also in the hard work of deploying security products and services that implement those policies, we have learned—and in this we agree with many members of this committee—that successful information security demands aggressive management oversight, extensive sharing of best practices, and a bedrock foundation of proven security standards. Accordingly, the National Security Agency generally supports passage of the Federal Information Security Management Act of 2002. While we believe that the proposed legislation provides the necessary next step in the continuing process of enhancing the protection afforded critical federal information systems, we offer a number of suggestions for your consideration for improving the act in the following areas:

1. Defining and identifying national security and mission critical systems

2. Risk assessment and system interconnection management

3. Conducting annual evaluations

4. Coordinating policies

5. Coordinating incident detection and consequences management

6. Sharing vulnerability information

I believe it is useful to provide a brief description of the responsibilities and scope of NSA in the area of Information Assurance (IA) and NSA’s policymaking functions and authorities before providing additional details regarding the specific suggestions we offer to H.R. 3844.

NSA Information Assurance Background

When I began working at NSA some 33 years ago, the “security” business we were in was called Communications Security, or COMSEC. It dealt almost exclusively with providing protection for classified information against disclosure to unauthorized parties when that information was being transmitted or broadcasted from point to point. We accomplished this by building the most secure “black boxes” that could be made, employing high-grade encryption to protect the information. In the late 1970s, and especially in the early 1980s with the advent of the personal computer, a new discipline we called Computer Security, or COMPUSEC, developed. It was still focused on protecting information from unauthorized disclosure, but brought with it some additional challenges and threats, e.g., the injection of malicious code, or the theft of large amounts of data on magnetic media. With the rapid convergence of communications and computing technologies, we soon realized that dealing separately with COMSEC on the one hand, and COMPUSEC on the other, was no longer feasible, and so the business we were in became a blend of the two, which we called Information Systems Security, or INFOSEC. The fundamental thrust of INFOSEC continued to be providing protection against unauthorized disclosure, or confidentiality, but it was no longer the exclusive point of interest. The biggest change came about when these computer systems started to be interconnected into local and wide area networks, and eventually to Internet Protocol Networks, both classified and unclassified. We realized that in addition to confidentiality, we needed to provide protection against unauthorized modification of information, or data integrity. We also needed to protect against denial-of-service attacks and to ensure data availability. Positive identification, or authentication, of parties to an electronic transaction had been an important security feature since the earliest days of COMSEC, but with the emergence of large computer networks data and transaction authenticity became an even more important and challenging requirement. Finally, in many types of network transactions it became very important that parties to a transaction not deny their participation, so that data or transaction non-repudiation joined the growing list of security services often needed on networks. Because the term “security” had been so closely associated, for so long, with providing confidentiality to information, within the Department of Defense we adopted the terms Information Assurance, or IA, to encompass the five security services of confidentiality, integrity, availability, authenticity and non-repudiation. I should emphasize here that not every IA application requires all five security services, although most IA applications for national security systems – and all applications involving classified information – continue to require high levels of confidentiality.

Another point worth noting is that there is an important dimension of Information Assurance that is operational in nature and often time-sensitive. Much of the work of Information Assurance in providing an appropriate mix of security services is not operational or time-sensitive, i.e., education and training, threat and vulnerability analysis, research and development, assessments and evaluations, and tool development and deployment. In an age of constant probes and attacks of on-line networks, however, an increasingly important element of protection deals with operational responsiveness in terms of detecting and reacting to these time-sensitive events. This defensive operational capability is closely allied and synergistic with traditional Information Assurance activities, but in recognition of its operational nature is generally described as Defensive Information Operations, or DIO.

NSA’s responsibilities and authorities in the area of information assurance are specified in or derived from a variety of Public Laws, Executive Orders, Presidential Directives, and Department of Defense Instructions and Directives. Chief among them is the July 1990 “National Policy for Security of National Security Telecommunications and Information Systems” (NSD-42).

This National Security Directive designates the Secretary of Defense as the Executive Agent for National Security Telecommunications and Information Systems Security (NSTISS), and further designates the Director of NSA as the “National Manager” for NSTISS. The Directive assigns the Director, NSA, broad responsibilities for the security of information systems processing classified or unclassified national security information, including:

· Evaluating systems vulnerabilities

· Acting as the focal point for cryptography and Information Systems Security

· Conducting research and development in this area

· Reviewing and approving standards

· Conducting foreign liaison

· Operating printing and fabrication facilities

· Assessing overall security posture

· Prescribing minimum standards for cryptographic materials

· Contracting for information security products provided to other Departments and Agencies

· Coordinating with the National Institute of Standards and Technology (NIST); providing NIST with technical advice and assistance

NSD-42, in addition to defining NSA’s responsibilities for information systems security, established the Executive Branch’s formal policymaking mechanism for national security information systems security. This body, the National Security Telecommunications and Information Systems Security Committee (NSTISSC), is comprised of 21 Members from Executive Branch Departments and Agencies. Although there are 11 official observers, over 50 government organizations regularly participate in various NSTISSC activities, subcommittees, and working groups.

The President redesignated the NSTISSC as the Committee on National Security Systems (CNSS) by signing Executive Order 13231, Critical Infrastructure Protection in the Information Age, on October 16, 2001. The CNSS was also made a standing committee of the President’s Critical Infrastructure Protection Board.

The incumbent Assistant Secretary of Defense for Command, Control, Communications and Intelligence (ASD/C3I) chairs the CNSS. The Committee performs a number of important functions, including approving the release of information systems security equipment and information to foreign governments and organizations – usually for military interoperability purposes – through a careful assessment and voting process. The Committee’s primary function, however, is to issue, implement, and maintain Information Assurance policies, directives, instructions, and advisory memoranda.

The CNSS currently has over 100 of these policy issuances in effect, and many of them directly relate to the important details of achieving assurance in classified and national security information systems. It is important to note that the three predecessor organizations of the NSTISSC (United States Communications Security Board, National Communications Security Committee, and National Telecommunications and Information Systems Security Committee), going back to 1953, had policymaking responsibility for national systems across the Executive Branch.

NSA has several key roles in the CNSS. As noted above, the Director of NSA is the “National Manager” for National Security Telecommunications and Information Systems Security, and as such signs the CNSS’ issuances. NSA also provides day-to-day support to and management of CNSS activities by providing a senior official to act as the organization’s Executive Secretary. Most importantly, NSA provides a permanent Secretariat of full-time staff personnel, facilities, and other necessary support such as funding, printing and distributing documents, sponsoring a Web site, managing voting processes, maintaining official records, developing policy and doctrine proposals, and organizing committee, subcommittee, and working group meetings, as well as an annual conference.

Specific Comments to H.R. 3844

1. Defining and identifying national security and mission critical systems We suggest that the modified definition found in the amended Section 3532 may possibly add confusion to the already complex process of identifying ‘national security systems’ by adding another source rather than citing an existing source for defining the term as was done in the original GISRA language. We also believe that that there are significant parallels found in identifying, characterizing and protecting mission critical systems and national security systems as we learned by our collective efforts to determine critical dependencies between computer systems during the Y2K crisis. Therefore we suggest returning to the language as specified in the original GI SRA Section 3532 (b)(2).

In a related matter, we suggest that the ‘guidelines for identifying an information system as a national security system’ in the amended Section 20 (b)(3) of the National Institutes of Standards and Technology Act (15 U.S.C. 278g-3) be changed. We believe that the Director, NSA, as National Manager of National Security Telecommunications and Information Systems Security should be assigned the responsibility for developing specific guidance for identifying national security systems. We further suggest that the CNSS is the appropriate forum to coordinate this guidance and, after approval by the committee, to issue it.

2. Risk assessments and system interconnection management processes There are a number of references throughout H.R. 3844 where the concepts of risk assessment and risk management are included. It has been our experience that comprehensive and useful risk assessments are extremely difficult to initially complete and even harder to maintain throughout a system’s lifetime. This problem gets potentially dangerous when you consider that systems that are independently assessed for risk are soon interconnected. One organization’s calculation for acceptable risk may be very different from another’s. But in the richly interconnected world of federal systems—a risk taken by one system is ultimately borne by all the others.

We suggest that the committee consider assigning a high priority to the development of a comprehensive standard for federal system risk assessment and management. The standard should describe¾not only the assessment process and documentation requirements¾but also include standard methods for characterizing adversarial threats and capabilities, determining categories for mission impact and offer a method for ensuring that the assumptions used in the risk assessment are adjusted as appropriate over time.

A risk assessment—in an interconnected world—cannot be simply completed at the time a system is certified and then filed away. It must become a living document, a sort of trusted calling card that is used when two systems are negotiating their interconnection. The quality of the risk assumptions, calculations and decision thresholds cannot be safely left to chance or independent decisions. There must also be a common method throughout the federal government for managing system interconnection based on a standardized approach to risk assessment. Otherwise, the weakest link in the chain will most certainly break.

3. Conducting annual evaluations We suggest that Section 3535(b) as amended by HR 3844, mandating that annual evaluations for each agency with an Inspector General be performed by the Inspector General or by an independent external auditor, as determined by the Inspector General be reconsidered. It is our experience that the necessary technical competence to either conduct the evaluation or to specify the terms for an information system security effectiveness assessment may not always reside with the Inspector General. We recommend that subsection (b) be deleted, and that it be replaced by subsection ©, amended to provide that in all cases the department or agency head shall determine what internal or external body will perform an annual evaluation.

4. Coordinating policies Section 3533(a)(3) encourages the coordinated development of standards and guidelines with agencies and offices operating national security systems. We suggest that additional efficiencies could be gained by requiring the Director in cooperation with the CNSS, to annually conduct a complete review of all related ‘national security systems’ policies, practices, guidelines, and standards to identify and report on those that are most relevant and prioritize a complementary publication schedule.

5. Coordinating incident detection and consequences management The Federal Information Security Incident Center described in Section 3536 has confused us. We offer no comment if this section is intended to provide authorizing language for the existing Federal Computer Incident Response Center (FedCIRC) operated by the General Services Administration. However, if this section were intended to propose an additional federal incident management center then we would respectfully ask the committee to reconsider.

The defense of both the National Information Infrastructure (NII) and the Defense Information Infrastructure (DII) requires a robust and time-sensitive Defense-in-Depth approach. To help meet this challenge, NSA’s National Security Incident Response Center (NSIRC) provides near real-time reporting of cyber attack incidents, forensic cyber attack analysis, and threat reporting relevant to information systems. Through round-the-clock, seven-days-a-week operations, the NSIRC provides the Departments of Defense, the Intelligence Community, Federal Law Enforcement and other Government organizations with information valuable in assessing current threats or defining recent cyber intrusions.

The NSIRC at NSA has established a trusted relationship and a proven set of analytical and reporting processes with the FedCIRC. Moreover, we have similar relationships with the National Infrastructure Protection Center (NIPC) and the Department of Defense’s Incident Center (DODCERT) that were created over the past 3 years.

We believe that adding a new federal incident management center would add unnecessary redundancy and decrease both the efficiency and effectiveness of the community and the NSIRC.

6. Sharing vulnerability information We agree that it is extremely important for all federal agencies and departments to develop effective procedures for the timely dissemination of information system security vulnerability information. However, we also believe that this information must be controlled and disseminated with the utmost care and only after thorough consideration regarding the possible consequences not just to an organization’s local systems—but to all related federal systems.

Today’s information technology is a veritable monoculture. There is very little diversity in the underlying technology and therefore the security vulnerabilities found in national security systems as compared with other federal systems. Section 3535©(2) of the proposed amendment requires appropriate protection of information security vulnerability information. However, we would encourage the committee to consider adding language that provides for the appropriate protection of this type of information regardless of the system from which it was derived.

This concludes my testimony and Statement for the Record. Once again, I thank you both, and the Members of these Subcommittees for the opportunity to comment on H.R. 3844. I will be pleased to answer any questions you may have.

 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Ed & Elaine Brown * Shots Fired *
george galloway what do you think of him?
Hinchey Amendment
why UK accepts US subjugation and infiltration?
George galloway suspended from HP
Why Marxism IS Economically Exploitive...
Situation in Turkey
Putin not playing nicely
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS