Dtic Ada596047 PDF

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

REAL-TIME INFORMATION ASSURANCE

Integrating Information Assurance into


Agile and Rapid Technology Development

Agile IA
Typically, legacy certification and accreditation practices as-
sess IA requirements after a system has been designed and
developed, generally through serial processes that prolong the
development schedule. This results in reactionary implementa-
tion of security configurations and creates a cascading effect
of schedule slips and unplanned costs. This traditional approach
can leave both technical and administrative security require-
ments inadequately addressed. It frequently overlooks opera-
tions security—even core requirements such as ensuring that
Kathy McGinn, Marine Corps Systems Command personnel are properly cleared.
Monica Nelson, Marine Corps Systems Command Legacy processes involve cycles of configuration known as
Dale Daigle, Space and Naval Warfare Systems Command system “hardening.” The cycle consists of scanning, remediat-
Abstract. In this paper we present a method for integrating information assur- ing, rescanning and reconfiguration, in multiple iterations whose
ance requirements into agile and rapid technology development. This integrated goal is to minimize vulnerability. The baseline must be main-
approach advocates involvement of the information assurance expert at the tained while the system is documented and formal, Independent
onset of system development and design—building requirements in proactively. Verification and Validation (IV&V) is conducted. IV&V likewise
The focus is on collaboration, continuous monitoring, and leveraging automated involves cycles of activity that must occur while other processes
testing for formal validation. are accomplished for Certification and Accreditation (C&A). The
combined process of hardening and IV&V can take anywhere
Introduction from 12 to 24 months—occasionally even longer.
As “agile” software development becomes more common Figure 1 depicts the average legacy serial process of prepar-
in government and industry, it poses a challenge: integrating ing a system for obtaining authority to operate. Typically, the IA
Information Assurance (IA) into system requirements and the subject matter expert, such as the information-system security
development process. How do we take a gate-styled serial manager or information system security engineer, is called into
process, segment it into increments, and then integrate it? How the effort at step 3.
do we move IA requirements from right to left in the develop- The goal of system development is to deliver a capabil-
ment schedule, instead of tacking them onto the end? How do ity to an end user—in the case of the U.S. Marine Corps, to
we document that process incrementally and obtain acceptance the warfighter. But legacy practices delay delivery, and for
of the security posture by the approval authority? At Marine some systems—such as intelligence sensor systems—delay is
Corps Systems Command, the Information Assurance Manage- itself a security risk. As stated in a recent paper by the SEI
ment Team supporting Program Manager Marine Intelligence at Carnegie Mellon University, “the information assurance ac-
has developed an integrated information-assurance process, creditation delay is so extensive (often months to a year) that
called “agile IA,” to address these issues and better support agile [the gated implementation method of] the DIACAP process
software development. almost negates the benefits gained through rapid development
methods.”1
System
C&A package
Development
1 (Concept, design,
6 documentation is
developed
Collaborate, Integrate, Automate
implementation)
The integrated or “agile IA” approach encourages a rapid,
Repeat 3,4,5
Security flexible response to vulnerabilities that emerge as the system
Configurations Final scans
2 aka “system 7 completed for ATO is developed. The key difference between agile IA and the
hardening” plus package
“regression testing” legacy approach is the integration of security at the onset of
Step Step system development, allowing proactive attention to require-
Audit System 5 3 ments. The IA subject-matter expert is involved in develop-
Technical IV&V Conducted /
3 Configuration
8
IV&V Results
(scans)
ment from day one, and is part of the agile development team,
Step
4 Repeat 3,4,5 which addresses and prioritizes IA requirements during sprint
Scan results planning. Automated scanning, which includes automated
(findings) provided Finalize IT Security
4 to development
9
POAM code-review tools, allows the expert to monitor the system
team
continuously as it is being developed. As security requirements
Development team
are identified, they are reported in the information-technology
5
remediates findings
and tests
10
Submit ATO security plan of actions and milestones. By “baking” security
package
functionality into the product, agile IA reduces security risk at any point
in development and minimizes redundancy in the hardening
process. Figure 2 reflects the cycle of continuous monitoring
Figure 1: Legacy serial process of system development and preparation and proactive remediation and tracking.

4 CrossTalk—November/December 2013
Form Approved
Report Documentation Page OMB No. 0704-0188

Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and
maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information,
including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington
VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it
does not display a currently valid OMB control number.

1. REPORT DATE 3. DATES COVERED


2. REPORT TYPE
DEC 2013 00-00-2013 to 00-00-2013
4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER
Integrating Information Assurance into Agile and Rapid Technology 5b. GRANT NUMBER
Development: Agile IA
5c. PROGRAM ELEMENT NUMBER

6. AUTHOR(S) 5d. PROJECT NUMBER

5e. TASK NUMBER

5f. WORK UNIT NUMBER

7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION


REPORT NUMBER
517 SMXS/MXDED,6022 Fir Ave,Hill AFB,UT,84056-5820
9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S)

11. SPONSOR/MONITOR’S REPORT


NUMBER(S)

12. DISTRIBUTION/AVAILABILITY STATEMENT


Approved for public release; distribution unlimited
13. SUPPLEMENTARY NOTES

14. ABSTRACT
In this paper we present a method for integrating information assurance requirements into agile and rapid
technology development. This integrated approach advocates involvement of the information assurance
expert at the onset of system development and design?building requirements in proactively. The focus is on
collaboration, continuous monitoring, and leveraging automated testing for formal validation.
15. SUBJECT TERMS

16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF 18. NUMBER 19a. NAME OF
ABSTRACT OF PAGES RESPONSIBLE PERSON
a. REPORT b. ABSTRACT c. THIS PAGE Same as 3
unclassified unclassified unclassified Report (SAR)

Standard Form 298 (Rev. 8-98)


Prescribed by ANSI Std Z39-18
REAL-TIME INFORMATION ASSURANCE

Electrical Engineers and Computer Scientists


Be on the Cutting Edge of Software Development
T he Software Maintenance Group at Hill Air Force Base is recruiting civilians (U.S. Citizenship Required).
Benefits include paid vacation, health care plans, matching retirement fund, tuition assistance, and
time paid for fitness activities. Become part of the best and brightest!
Hill Air Force Base is located close to the Wasatch and Uinta
mountains with many recreational opportunities available. Send resumes to:
309SMXG.SODO@hill.af.mil
www.facebook.com/309SoftwareMaintenanceGroup or call (801) 775-5555

C&A also poses the usual timeline challenges. In the agile


approach, artifacts are created incrementally as the system de-
System  Baseline   velops. IA controls are documented as the information becomes
Change available. Documentation is limited to the minimum required to
satisfy the approving authority requirement to depict the system
security posture.
Vulnerability   Lastly, and more significantly, a certified validator is engaged
Automated  
Remediated    
Vulnerability  Scans to leverage the results of the continuous monitoring already oc-
or  Logged
curring during each sprint. This enables the validator to leverage
the test results for formal validation and verification, and perform
a shortened “hybrid” style of IV&V. The formal IV&V event is
Vulnerability   Vulnerability   reduced to minimally disruptive administrative checks and audits,
Reported/Tracked Identified obviating the intensive auditing that typically interrupts system
development. System development is allowed to continue during
  the IV&V audit.
Figure 3 depicts how continuous monitoring can be tracked to
Figure 2 – Continuous monitoring and remediation reflect the changing baseline of a system given its vulnerability
tracking process findings. Note that in the beginning of the monitoring, the number
of findings is high. As the system is developed and remediation
occurs, findings are reduced. However, fluctuations in the base-
line should be expected as system requirements are added.

CrossTalk—November/December 2013 5
REAL-TIME INFORMATION ASSURANCE

ABOUT THE AUTHORS


Kathy McGinn is the lead Information
System Security Manager for the Marine
Intelligence program office at the Marine
Corps Systems Command in Quantico, Vir-
ginia. She currently serves as an IA subject
matter expert; managing certification and
accreditation requirements for multiple
programs. She has extensive knowledge
and experience in information assurance
process development and certification and
accreditation. She is a certified information
systems security professional (CISSP).

Figure 3 – Continuous monitoring scan results example E-mail: kathy.mcginn@usmc.mil

Conclusion Monica S. Nelson is an Information System


Integration of security configuration requirements at initial Security Manager for the Marine Intel-
stages of system development eliminates the legacy practice ligence program office at the Marine Corps
of reactionary IA implementation. Introducing IA expertise at Systems Command in Quantico, Virginia.
the onset of development provides a more holistic approach to She currently serves as the “agile IA”
identifying and implementing security requirements. The agile subject matter expert for her team. She has
IA approach can be implemented within other development extensive knowledge and experience with
methods and should not be practiced for agile development agile software development and is a mem-
alone. It allows an incremental and controlled approach for IA ber of the team that developed the first
implementation and ensures a more secure posture of a capa- integrated information assurance process
bility or product release. Figure 4 depicts a sprint timeline with using Agile methodologies. She holds the
concurrent activities per sprint to include security configuration, CompTIA Security+ certification and has a
functional testing, continuous monitoring, formal auditing, and Bachelor’s degree in Decision Science and
incremental C&A package creation. Management Information Systems from
Integrated IA will reduce the schedule slippage and un- George Mason University.
planned costs that are inherent when IA is bolted on at the
end of system development. It will also reduce redundancy E-mail: monica.nelson@usmc.mil
in system-hardening processes, leverage auditing activity for
multiple purposes, and produce an artifact package that more Dale Daigle is the lead Information System
quickly depicts the system’s security posture. More importantly, Security Engineer (ISSE) for Distributed
it will ensure that capabilities or products provided to the Common Ground/Surface System - Marine
warfighter are less vulnerable to exploitation. Corps (DCGS-MC) at Space and Naval
Warfare Systems Command (SPAWAR)
NOTES in Charleston, South Carolina. He cur-
rently serves as a subject matter expert on
1. Bellomo, Stephany; Woody, Carol, Software Engineering Institute at Carnegie Information Assurance (IA) and “Agile IA”
Mellon, Paper: DOD Information Assurance and Agile: Challenges and Recommen for DCGS-MC. He has extensive knowl-
dations Gathered through Interviews with Agile Program Managers and DOD edge and experience with IA and agile
Accreditation Reviewers, Technical note CMS/SEI-2012-TN-024 software development and led efforts to
develop the first integrated IA process us-
Up to four months ing Agile methodologies. He is a Certified
Information Systems Security Professional
Activities per SPRINT (1-4 weeks) 1 week 1 Month
Implement/configure IA Requirements
(CISSP).
Build IA in Test System Functionality
Integrated IA Hybrid IV&V ATO
during system IA Audits / Scans Maintain Decommission
Process
development Certified Validator Auditing
(Administrative) Issuance
E-mail: dale.daigle@navy.mil
Initiate C&A Documentation Incrementally

SPRINT SPRINT SPRINT Release

Ø Deliverable product to user


Ø Security posture assessed
Ø Accredited to field/operate
Figure 4 – Sprint example with concurrent integrated activity

6 CrossTalk—November/December 2013

You might also like