=Paper=
{{Paper
|id=Vol-2057/Paper4
|storemode=property
|title= Federated Cybersecurity Policy Arbitration
|pdfUrl=https://ceur-ws.org/Vol-2057/Paper4.pdf
|volume=Vol-2057
|authors=Gregory Wehner,James Rowell,Joseph Langley,Joseph Mathews
}}
== Federated Cybersecurity Policy Arbitration==
IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defense and Resilience Federated Cybersecurity Policy Arbitration Gregory Wehner, James Rowell, Joseph Langley, Joseph Mathews US Naval Research Laboratory Center for High Assurance Computer Systems 4555 Overlook Ave SW Washington, DC 20375 Phone: 202.404.0592 Fax: 202.404.7942 gregory.wehner@nrl.navy.mil, james.rowell@nrl.navy.mil, joseph.langley@nrl.navy.mil, joseph.mathews@nrl.navy.mil Abstract - Federation promotes a strong cybersecurity upon this notion to define Federation as a method to arbitrate posture for inherently decentralized networks. Dictating among independent enclaves of a distributed network. cybersecurity policy through traditional top-down approaches has engendered stagnation in network In enterprise technologies evolved from manager/sensor defense as cybersecurity personnel become preoccupied architectures, policy is created at the top of the organization with compliance rather than the intent of the policy. and subordinate enclaves are limited to redistribution and Permitting variations of policy among network enclaves consumption. If a conflict occurs between a policy and protects local mission function and increases the subordinate mission function, a network enclave has few potential for innovation across the organization when options. The enclave can isolate themselves from the policy integrated into cybersecurity baselines. Federation gives creators or apply the policy and accept the degraded function network enclaves the freedom to exercise their authority until the policy or the mission is altered. to respond to local threats and promotes ownership of their network, without diminishing the benefits of GLOBAL cybersecurity baselines. This federated model paves the ENCLAVE way for an automated defense matrix in which independent, autonomous agents evaluate network data to create actionable cybersecurity policy to be shared, LOCAL ENCLAVE modified, and deployed among a web of other agents in near real time. Federated security policies promote a resilient posture through heterogeneous defense in breadth, while creating an internal mechanism for continuous adaptation and innovation in security ACCEPT DEGRADED approaches. Federation should be a core design tenet for ISOLATE FROM MISSION FUNCTION GLOBAL POLICY cybersecurity technology. OR LOCAL RISK I. INTRODUCTION A MISSION CONFLICT OR A LOCAL THREAT NOT ADDRESSED BY THE GLOBAL POLICY Networks are not under attack; they are under siege. Industry Figure 1: Policy flow in traditional network defense paradigm limits enclaves. trends towards orchestration and automation challenge large organizations that are effectively a patchwork of diffuse Federation supports the authority of the enclave. When a networks. For such organizations, strategies that rely on conflict with a policy within a cybersecurity baseline occurs, unified enterprise solutions run the risks of micromanaging a federated enclave can discretely reject the policy, modify network enclaves and creating a weak homogeneous the policy, or accept the policy. cybersecurity posture [1]. At the same time, such strategies are critical to securing the network by providing baseline GLOBAL policies: rules for network access, secure configuration ENCLAVE guidance, common defense architecture, acceptable software and hardware offerings, and continuous updates to known vulnerabilities. The practical expression of this tension LOCAL ENCLAVE occurs when global security policy degrades local mission function or when a global policy fails to address a discrete localized risk. A federated approach to network defense resolves these conflicts. REJECT MODIFY ACCEPT CREATE GLOBAL GLOBAL GLOBAL LOCAL POLICY POLICY POLICY POLICY II. FEDERATION A MISSION CONFLICT OR A LOCAL THREAT NOT ADDRESSED BY THE GLOBAL POLICY Recently, Federation has been regarded as the notion of Figure 2: Federated policy flow supports jurisdiction and encourages adaptation. creating interoperability between disparate information systems [2], [3]. With respect to cybersecurity, we expand 1 The enclave may also create new policy to address local risks boundaries invisible to the client does not remove them. Risk not covered by the baseline. This shift returns focus to local deferred is still risk, and a federated approach applies to ownership, without diminishing the relevance of Cloud and SECaaS providers alike. Wherever an cybersecurity baselines. organization has internal policy conflicts, Federation will be a viable strategy. III. ADAPTATION Extending more responsibility to local enclaves requires Cybersecurity personnel at network enclaves spend time and resources for training and specialized talent, outside of those effort implementing cybersecurity baseline requirements required to create cybersecurity baselines. An untrained (i.e. checking boxes). However, local attributes such as cyber workforce at one network enclave threatens the mission, location, personnel, asset value, and external security of the whole network. Yet, with billions spent partnerships are all unique factors that contribute to risk at annually on cyber defense [4], cybersecurity incidents an enclave. These factors change frequently, making it continue to rise at an alarming rate [5], [6]. The current difficult for an organization to address every risk with a approach to cybersecurity has become stagnant, and without cybersecurity baseline. Yet rather than creating policy a shift, the return on investment on cybersecurity will aligned to the risk profile at their enclave, cybersecurity diminish. personnel are preoccupied with administrative tasks. This has promoted stagnation, with cybersecurity personnel Adaptations are only relevant if they are vetted, presenting a disengaged from active defense. strain on the global creators and potentially introducing as many failures as successes – if they are implemented at all. Federation resolves stagnation through promotion of While this culture shift will doubtless come with a learning innovation and adaptation. When a network enclave curve, sourcing innovation from all levels of an organization encounters a mission conflict or a localized risk, Federation has proven successful at technology companies such as supports the enclave’s authority to modify or create new Google [7] and Amazon [8]. As the Federation is refined at policy. Given the breadth of talent within the enclaves, it is an organization, best practices will emerge to optimize the likely that a solution to a local conflict will provide benefits method and format of communicating policy, streamlining throughout the organization. While not all adaptations will the vetting process and shortening the time to distribute new be relevant beyond the local enclave, analysis of this ideas. feedback provides a heterogeneous source of innovation that engages cybersecurity personnel in defending their enclaves A federated organization is harder to direct from a central and fosters resilience throughout the organization. governing body, as each enclave exercises their independent authority. A homogenous network is simpler to manage than IV. JURISDICTION one where each enclave has a unique defense policy. To the former, the organization determines how much authority the Federation enables network enclaves to defend themselves federated enclaves have. However, if an enclave has according to their authority. This extension of responsibility authority, they should be trusted to exercise it. To the latter, to the enclave reinforces accountability amongst being simpler to manage does not translate into being cybersecurity personnel as attributable successes and simpler to secure. "Just like genetic diversity, which failures invests all in creating a strong defensive posture. prevents an epidemic from wiping out a whole species at Federation does not infringe on the benefits of cybersecurity once, diversity in software is a good thing." [9] baselines. Enclaves without the resources to tailor baseline policy to their unique risk profile would simply implement VI. LOOKING AHEAD it as-is. The cybersecurity marketspace is becoming increasingly Federation is not a call for anarchy, nor are we advocating automated [10], with artificial intelligence and machine that each operator or enclave have blanket authority to learning techniques being introduced into anomaly detection change or reject policy. Federation does not grant authority. and predictive analytic applications across the spectrum of Organizations under Federation will continue to structure cybersecurity solutions. Future autonomous agents will their networks as strictly or loosely as their guiding bodies analyze data from throughout the enclave: network traffic, determine. For example, a federated network may behave vulnerability scans, log files, behavior models, etc. Agents similar to a judicial appeals process; challenges to global law will search the data for indicators of attacks and weaknesses are heard by local authorities, work their way up to regional in the enclave's cyber defense posture. As the agents become bodies, and eventually may be integrated as global trusted in identifying attack vectors, they will be deployed to amendments. author cybersecurity policy to quickly pivot resources and strengthen the cyber defense posture. Such policy will be an V. CHALLENGES invaluable source of threat intelligence and shared with designated enclaves throughout the organization. These Our assertions about Federation are open to several relevant enclaves will correlate the intelligence with their own data – concerns. Solutions such as security as a service (SECaaS) weighted on factors such as proximity, network similarity, and deployment in the Cloud may reduce security cost, defer organizational relation, and source authority. This will form risk, and blur the boundaries of network enclaves, calling a resilient, symbiotic defense matrix. into question the utility of Federation. In rebuttal, making the 2 Federation paves the way for these defense matrices to share policy with the organization. As autonomous cybersecurity solutions become more prevalent, the concerns about Federation will become less relevant and the benefits more apparent. In order to promote persistent resilience in network defense and to prepare for the reality of autonomous cybersecurity, Federation must become a core design tenant in cybersecurity technologies and organizational structures going forward. VII. REFERENCES [1] J. Cobb, “Centralized Execution, Decentralized Chaos: How the Air Force IS Poised to Lose a Cyber War,” Air & Space Power Journal, Summer 2011, pp. 81-86 [2] N. Suri et al., “A Dynamic and Policy-Controlled Approach to Federating Information Systems,” Proc. 2010 Military Communciations Conference (MILCOM 2010), 2010, DOI: 10.1109/MILCOM.2010.5680377 [3] M. Brannsten et al, “Toward Federated Mission Networking in the Tactical Domain,” IEEE Communications Magazine, vol. 53, no. 10, 2015, pp. 52-58 [4] Gartner, Inc., “Gartner Says Worldwide Information Security Spending Will Grow 7.9 Percent to Reach $81.6 Billion in 2016,” Aug. 2016; www.gartner.com/newsroom/id/3404817 [5] “Federal Information Security: Actions Needed to Address Challenges,” US Government Accountability Office report GAO-16-885T, 19 Sept 2016. [6] Verizon 2016 Data Breach Investigations Report, tech. report, Verizon, 2016. [7] A. Steiber and S. Alänge, “A corporate system for continuous innovation: the case of Google, Inc.,”, European Journal of Innovation Management, vol. 16, no. 2, 2013, pp 243-264 [8] J. Dyer and H. Gregersen, “The Secret To Unleashing Genius,” Forbes, Sept 2nd, 2013. [9] C. Stoll, The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage, Pocket Books, 1990, p. 58 [10] State of Security Operations: 2016 report of capabilities and maturity of cyber defense organizations, business white paper, Hewlett Packard Enterprise, 2016. [11] E. Rzeszutko and W. Mazurczyk, “Insights from Nature for Cybersecurity,” Health Security, vol. 13(2), 2015, pp. 82-87. [12] “The DoD Cyber Strategy,” US Department of Defense, April 2015. [13] P. Small, Defense in Depth: An Impractical Strategy for a Cyber World, CreateSpace Independent Publishing Platform, 2011. 3