首页> 外文会议>AIAA space forum >Tailoring NIST Security Controls for the Ground System: Selection and Implementation - Recommendations for Information System Owners
【24h】

Tailoring NIST Security Controls for the Ground System: Selection and Implementation - Recommendations for Information System Owners

机译:为地面系统量身定制NIST安全控制:选择和实施-信息系统所有者的建议

获取原文

摘要

The National Aeronautics and Space Administration (NASA) invests millions of dollars in spacecraft and ground system development, and in mission operations in the pursuit of scientific knowledge of the universe. In recent years, NASA sent a probe to Mars to study the Red Planet's upper atmosphere, obtained high resolution images of Pluto, and it is currently preparing to find new exoplanets, rendezvous with an asteroid, and bring a sample of the asteroid back to Earth for analysis. The success of these missions is enabled by mission assurance. In turn, mission assurance is backed by information assurance. The information systems supporting NASA missions must be reliable as well as secure. NASA -like every other U.S. Federal Government agency - is required to manage the security of its information systems according to federal mandates, the most prominent being the Federal Information Security Management Act (FISMA) of 2002 and the legislative updates that followed it. Like the management of enterprise information technology (IT), federal information security management takes a "one-size fits all" approach for protecting IT systems. While this approach works for most organizations, it does not effectively translate into security of highly specialized systems such as those supporting NASA missions. These systems include command and control (C&C) systems, spacecraft and instrument simulators, and other elements comprising the ground segment. They must be carefully configured, monitored and maintained, sometimes for several years past the missions' initially planned life expectancy, to ensure the ground system is protected and remains operational without any compromise of its confidentiality, integrity and availability. Enterprise policies, processes, procedures and products, if not effectively tailored to meet mission requirements, may not offer the needed security for protecting the information system, and they may even become disruptive to mission operations. Certain protective measures for the general enterprise may not be as efficient within the ground segment. This is what the authors have concluded through observations and analysis of patterns identified from the various security assessments performed on NASA missions such as MAVEN, OSIRIS-REx, New Horizons and TESS, to name a few. The security audits confirmed that the framework for managing information system security developed by the National Institute of Standards and Technology (NIST) for the federal government, and adopted by NASA, is indeed effective. However, the selection of the technical, operational and management security controls offered by the NIST model - and how they are implemented -does not always fit the nature and the environment where the ground system operates in even though there is no apparent impact on mission success. The authors observed that unfit controls, that is, controls that are not necessarily applicable or sufficiently effective in protecting the mission systems, are often selected to facilitate compliance with security requirements and organizational expectations even if the selected controls offer minimum or non-existent protection. This paper identifies some of the standard security controls that can in fact protect the ground system, and which of them offer little or no benefit at all. It offers multiple scenarios from real security audits in which the controls are not effective without, of course, disclosing any sensitive information about the missions assessed. In addition to selection and implementation of controls, the paper also discusses potential impact of recent legislation such as the Federal Information Security Modernization Act (FISMA) of 2014 - aimed at the enterprise - on the ground system, and offers other recommendations to Information System Owners (ISOs).
机译:美国国家航空航天局(NASA)在追求宇宙科学知识方面投资了数百万美元,用于航天器和地面系统的开发以及任务运行。近年来,美国国家航空航天局(NASA)向火星发射了探测器,以研究红色行星的高层大气,获得了冥王星的高分辨率图像,并且目前正准备寻找与小行星会合的新系外行星,并将小行星的样本带回地球。进行分析。这些任务的成功取决于任务的保证。反过来,任务保证得到信息保证的支持。支持NASA任务的信息系统必须可靠且安全。与其他所有美国联邦政府机构一样,NASA也必须根据联邦法规来管理其信息系统的安全性,其中最突出的是2002年的《联邦信息安全管理法》(FISMA)和随之而来的立法更新。像企业信息技术(IT)的管理一样,联邦信息安全管理采用“一刀切”的方法来保护IT系统。尽管这种方法适用于大多数组织,但不能有效地转化为高度专业化系统(例如支持NASA任务的系统)的安全性。这些系统包括命令与控制(C&C)系统,航天器和仪器模拟器以及构成地面部分的其他元素。必须精心配置,监视和维护它们,有时要在任务最初计划的预期寿命之后数年,以确保地面系统得到保护并保持运行状态,而不会损害其机密性,完整性和可用性。企业策略,过程,过程和产品,如果不能有效地满足任务要求,可能无法提供保护信息系统所需的安全性,甚至可能破坏任务的运行。在地面部分,针对一般企业的某些保护措施可能没有那么有效。这是作者通过观察和分析从NASA任务(例如MAVEN,OSIRIS-REx,New Horizo​​ns和TESS等)进行的各种安全评估中确定的模式得出的结论。安全审计证实,由美国国家标准技术研究院(NIST)为联邦政府开发,并由NASA采纳的管理信息系统安全的框架确实有效。但是,NIST模型提供的技术,操作和管理安全控制的选择以及如何实施,尽管对任务成功没有明显影响,但并不总是适合地面系统运行的自然和环境。 。作者观察到,通常选择不适当的控制措施,即在保护任务系统方面不一定适用或足够有效的控制措施,以促进遵守安全要求和组织期望,即使所选择的控制措施提供的保护最少或根本不存在。本文确定了一些实际上可以保护地面系统的标准安全控制措施,以及其中哪些措施几乎没有益处或根本没有益处。它从真实的安全审核中提供了多种方案,在这些方案中,如果不公开有关所评估任务的任何敏感信息,这些控制措施将是无效的。除了选择和实施控制措施之外,本文还讨论了诸如针对企业的2014年《联邦信息安全现代化法案》(FISMA)之类的最新法规对地面系统的潜在影响,并向信息系统所有者提供了其他建议。 (ISO)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号