<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Federated Cybersecurity Policy Arbitration</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Gregory Wehner</string-name>
          <email>gregory.wehner@nrl.navy.mil</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>James Rowell</string-name>
          <email>james.rowell@nrl.navy.mil</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Joseph Langley</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Joseph Mathews</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>US Naval Research Laboratory Center for High Assurance Computer Systems 4555 Overlook Ave SW Washington</institution>
          ,
          <addr-line>DC 20375 Phone: 202.404.0592 Fax: 202.404.7942</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>- Federation promotes a strong cybersecurity posture for inherently decentralized networks. Dictating cybersecurity policy through traditional top-down approaches has engendered stagnation in network defense as cybersecurity personnel become preoccupied with compliance rather than the intent of the policy. Permitting variations of policy among network enclaves protects local mission function and increases the potential for innovation across the organization when integrated into cybersecurity baselines. Federation gives network enclaves the freedom to exercise their authority to respond to local threats and promotes ownership of their network, without diminishing the benefits of cybersecurity baselines. This federated model paves the way for an automated defense matrix in which independent, autonomous agents evaluate network data to create actionable cybersecurity policy to be shared, modified, and deployed among a web of other agents in near real time. Federated security policies promote a resilient posture through heterogeneous defense in breadth, while creating an internal mechanism for continuous adaptation and innovation in security approaches. Federation should be a core design tenet for cybersecurity technology.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>INTRODUCTION</title>
      <p>
        Networks are not under attack; they are under siege. Industry
trends towards orchestration and automation challenge large
organizations that are effectively a patchwork of diffuse
networks. For such organizations, strategies that rely on
unified enterprise solutions run the risks of micromanaging
network enclaves and creating a weak homogeneous
cybersecurity posture [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. At the same time, such strategies
are critical to securing the network by providing baseline
policies: rules for network access, secure configuration
guidance, common defense architecture, acceptable software
and hardware offerings, and continuous updates to known
vulnerabilities. The practical expression of this tension
occurs when global security policy degrades local mission
function or when a global policy fails to address a discrete
localized risk. A federated approach to network defense
resolves these conflicts.
      </p>
      <p>II.</p>
    </sec>
    <sec id="sec-2">
      <title>FEDERATION</title>
      <p>
        Recently, Federation has been regarded as the notion of
creating interoperability between disparate information
systems [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. With respect to cybersecurity, we expand
upon this notion to define Federation as a method to arbitrate
among independent enclaves of a distributed network.
In enterprise technologies evolved from manager/sensor
architectures, policy is created at the top of the organization
and subordinate enclaves are limited to redistribution and
consumption. If a conflict occurs between a policy and
subordinate mission function, a network enclave has few
options. The enclave can isolate themselves from the policy
creators or apply the policy and accept the degraded function
until the policy or the mission is altered.
A MISSION CONFLICT OR A LOCAL THREAT NOT ADDRESSED BY THE GLOBAL POLICY
The enclave may also create new policy to address local risks
not covered by the baseline. This shift returns focus to local
ownership, without diminishing the relevance of
cybersecurity baselines.
Cybersecurity personnel at network enclaves spend time and
effort implementing cybersecurity baseline requirements
(i.e. checking boxes). However, local attributes such as
mission, location, personnel, asset value, and external
partnerships are all unique factors that contribute to risk at
an enclave. These factors change frequently, making it
difficult for an organization to address every risk with a
cybersecurity baseline. Yet rather than creating policy
aligned to the risk profile at their enclave, cybersecurity
personnel are preoccupied with administrative tasks. This
has promoted stagnation, with cybersecurity personnel
disengaged from active defense.
      </p>
      <p>Federation resolves stagnation through promotion of
innovation and adaptation. When a network enclave
encounters a mission conflict or a localized risk, Federation
supports the enclave’s authority to modify or create new
policy. Given the breadth of talent within the enclaves, it is
likely that a solution to a local conflict will provide benefits
throughout the organization. While not all adaptations will
be relevant beyond the local enclave, analysis of this
feedback provides a heterogeneous source of innovation that
engages cybersecurity personnel in defending their enclaves
and fosters resilience throughout the organization.</p>
      <p>IV.</p>
    </sec>
    <sec id="sec-3">
      <title>JURISDICTION</title>
      <p>Federation enables network enclaves to defend themselves
according to their authority. This extension of responsibility
to the enclave reinforces accountability amongst
cybersecurity personnel as attributable successes and
failures invests all in creating a strong defensive posture.
Federation does not infringe on the benefits of cybersecurity
baselines. Enclaves without the resources to tailor baseline
policy to their unique risk profile would simply implement
it as-is.</p>
      <p>Federation is not a call for anarchy, nor are we advocating
that each operator or enclave have blanket authority to
change or reject policy. Federation does not grant authority.
Organizations under Federation will continue to structure
their networks as strictly or loosely as their guiding bodies
determine. For example, a federated network may behave
similar to a judicial appeals process; challenges to global law
are heard by local authorities, work their way up to regional
bodies, and eventually may be integrated as global
amendments.
boundaries invisible to the client does not remove them. Risk
deferred is still risk, and a federated approach applies to
Cloud and SECaaS providers alike. Wherever an
organization has internal policy conflicts, Federation will be
a viable strategy.</p>
      <p>
        Extending more responsibility to local enclaves requires
resources for training and specialized talent, outside of those
required to create cybersecurity baselines. An untrained
cyber workforce at one network enclave threatens the
security of the whole network. Yet, with billions spent
annually on cyber defense [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], cybersecurity incidents
continue to rise at an alarming rate [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The current
approach to cybersecurity has become stagnant, and without
a shift, the return on investment on cybersecurity will
diminish.
      </p>
      <p>
        Adaptations are only relevant if they are vetted, presenting a
strain on the global creators and potentially introducing as
many failures as successes – if they are implemented at all.
While this culture shift will doubtless come with a learning
curve, sourcing innovation from all levels of an organization
has proven successful at technology companies such as
Google [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] and Amazon [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. As the Federation is refined at
an organization, best practices will emerge to optimize the
method and format of communicating policy, streamlining
the vetting process and shortening the time to distribute new
ideas.
      </p>
      <p>
        A federated organization is harder to direct from a central
governing body, as each enclave exercises their independent
authority. A homogenous network is simpler to manage than
one where each enclave has a unique defense policy. To the
former, the organization determines how much authority the
federated enclaves have. However, if an enclave has
authority, they should be trusted to exercise it. To the latter,
being simpler to manage does not translate into being
simpler to secure. "Just like genetic diversity, which
prevents an epidemic from wiping out a whole species at
once, diversity in software is a good thing." [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]
      </p>
      <p>VI.</p>
    </sec>
    <sec id="sec-4">
      <title>LOOKING AHEAD</title>
      <p>
        The cybersecurity marketspace is becoming increasingly
automated [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], with artificial intelligence and machine
learning techniques being introduced into anomaly detection
and predictive analytic applications across the spectrum of
cybersecurity solutions. Future autonomous agents will
analyze data from throughout the enclave: network traffic,
vulnerability scans, log files, behavior models, etc. Agents
will search the data for indicators of attacks and weaknesses
in the enclave's cyber defense posture. As the agents become
trusted in identifying attack vectors, they will be deployed to
author cybersecurity policy to quickly pivot resources and
strengthen the cyber defense posture. Such policy will be an
invaluable source of threat intelligence and shared with
designated enclaves throughout the organization. These
enclaves will correlate the intelligence with their own data –
weighted on factors such as proximity, network similarity,
organizational relation, and source authority. This will form
a resilient, symbiotic defense matrix.
      </p>
      <p>Federation paves the way for these defense matrices to share
policy with the organization. As autonomous cybersecurity
solutions become more prevalent, the concerns about
Federation will become less relevant and the benefits more
apparent. In order to promote persistent resilience in network
defense and to prepare for the reality of autonomous
cybersecurity, Federation must become a core design tenant
in cybersecurity technologies and organizational structures
going forward.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>J.</given-names>
            <surname>Cobb</surname>
          </string-name>
          , “Centralized Execution, Decentralized Chaos:
          <article-title>How the Air Force IS Poised to Lose a Cyber War,”</article-title>
          <source>Air &amp; Space Power Journal, Summer</source>
          <year>2011</year>
          , pp.
          <fpage>81</fpage>
          -
          <lpage>86</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>N.</given-names>
            <surname>Suri</surname>
          </string-name>
          et al.,
          <article-title>“A Dynamic and Policy-Controlled Approach to Federating Information Systems</article-title>
          ,
          <source>” Proc. 2010 Military Communciations Conference (MILCOM</source>
          <year>2010</year>
          ),
          <year>2010</year>
          , DOI: 10.1109/MILCOM.
          <year>2010</year>
          .5680377
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Brannsten</surname>
          </string-name>
          et al, “
          <article-title>Toward Federated Mission Networking in the Tactical Domain,” IEEE Communications Magazine</article-title>
          , vol.
          <volume>53</volume>
          , no.
          <issue>10</issue>
          ,
          <year>2015</year>
          , pp.
          <fpage>52</fpage>
          -
          <lpage>58</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Gartner</surname>
          </string-name>
          , Inc.,
          <source>“Gartner Says Worldwide Information Security Spending Will Grow</source>
          <volume>7</volume>
          .9 Percent to Reach $
          <volume>81</volume>
          .6 Billion in
          <year>2016</year>
          ,” Aug.
          <year>2016</year>
          ; www.gartner.com/newsroom/id/3404817
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5] “Federal Information Security: Actions Needed to Address Challenges,
          <source>” US Government Accountability Office report GAO-16-885T, 19 Sept</source>
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <source>[6] Verizon 2016 Data Breach Investigations Report, tech. report, Verizon</source>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
            <surname>Steiber</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Alänge</surname>
          </string-name>
          , “
          <article-title>A corporate system for continuous innovation: the case of Google, Inc</article-title>
          .,”,
          <source>European Journal of Innovation Management</source>
          , vol.
          <volume>16</volume>
          , no.
          <issue>2</issue>
          ,
          <issue>2013</issue>
          , pp
          <fpage>243</fpage>
          -
          <lpage>264</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>J.</given-names>
            <surname>Dyer</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Gregersen</surname>
          </string-name>
          , “The Secret To Unleashing Genius,” Forbes, Sept 2nd,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>C.</given-names>
            <surname>Stoll</surname>
          </string-name>
          ,
          <article-title>The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage</article-title>
          , Pocket Books,
          <year>1990</year>
          , p.
          <fpage>58</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <article-title>State of Security Operations: 2016 report of capabilities and maturity of cyber defense organizations, business white paper</article-title>
          ,
          <source>Hewlett Packard Enterprise</source>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>E.</given-names>
            <surname>Rzeszutko</surname>
          </string-name>
          and
          <string-name>
            <given-names>W.</given-names>
            <surname>Mazurczyk</surname>
          </string-name>
          , “
          <article-title>Insights from Nature for Cybersecurity,” Health Security</article-title>
          , vol.
          <volume>13</volume>
          (
          <issue>2</issue>
          ),
          <year>2015</year>
          , pp.
          <fpage>82</fpage>
          -
          <lpage>87</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>“The DoD Cyber Strategy</surname>
          </string-name>
          ,” US Department of Defense,
          <year>April 2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>P.</given-names>
            <surname>Small</surname>
          </string-name>
          ,
          <article-title>Defense in Depth: An Impractical Strategy for a Cyber World</article-title>
          ,
          <source>CreateSpace Independent Publishing Platform</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>