Title: SOFTWARE ENGINEERING
1Federal Aviation Administration (FAA) RD in
Information Assurance RD Strategy for a
Dependable Information Society Workshop EU-US
Collaboration 1-2 December 2001 Düsseldorf (D)
Ernest R. Lucier Technical Advisor on High
Confidence Systems FAA/AIO-4 800 Independence
Avenue SW Washington, DC 20591
ernest.lucier_at_faa.gov 202 493-5269
2Office of the Assistant Administrator for
Information Services and Chief Information
Officer (AIO)
- Office established spring of 1999
- Assistant Administrator for Information Services
and Chief Information Officer for the FAA - Dr. Dan Mehan
- Chief Scientist for Information Technology in AIO
- Marshall Potter
3FAA Environment
4CIOs Security Mission
Protect the FAAs information infrastructure and
help the aviation industry reduce security risks
through leadership in innovative information
assurance initiatives
5FAAs 5 Layers of System ProtectionCYBER
Perspective
Authentication
Integrity
Awareness and Execution
Architecture and Engineering
6Impact of Goals on Architecture
- DoD has historically ranked Confidentiality and
Access Control as their first and second goals - They accomplish these goals by using encryption
and techniques such as passwords that are
normally also encrypted - The FAAs two highest goals are integrity and
availability - In contrast to DoD, the banking industry, etc.,
FAA data and systems are open and visible and
encryption may be a poor solution method due to
impacts on latency/performance as well as the
need to have a world-wide standard - FAA system goals of safety, security and
efficiency need to be met and are times impacted
by ISS requirements - These decisions have a major impact on the NAS
system architecture
7FAAs Information Systems Security Approach
8RD Technical Approach
- Analyze potential attack scenarios and future NAS
architectural traffic proposals (Understand the
nature of the FAA unique problems) - Evaluate and Assess new FAA programs against
threats being investigated within the RD
community - Experiment with potential scenarios at the Tech
Center to evaluate how well new RD
(Detect/Protect/Respond/Recover) tools work
within a NAS environment - Develop engineering recommendations for
detection, protection, response and recovery
mechanisms and experiment with them at the CSIRC - Evaluate leveraged RD products from other
Government partners for potential use in the NAS - Develop Future ISS Guidelines and Procedures as
potential straw man policies based on the results
of the above assessments - Grow NAS knowledgeable ISS Gurus
9Accomplishments
- Computer Security Incident Response Center
(CSIRC) - Information Systems Security Architecture (ISSA)
- Technology Program Plan
- National Airspace System (NAS) Protection Profile
based on Common Criteria - Education/Training
- New Information Systems Security (ISS) RD (There
is RD in the FAA but not ISS yet) - ISS status display
- Establish RD projects with FAA project teams
10Computing and Software Technology FAA Needs
Supported
RD Focus Areas
FAA Operational Goals
Technology Needs
Safety
Real Time Intrusion Detection, Monitoring
Recovery
- Situational understanding
- Intrusion Detection Isolation
- Malicious code protection
- Indicators and Warnings
- Vulnerability Assessments
- Cryptography
- Adaptive Survivable Infrastructure
- Security of mobile systems
- Dynamic Virtual Private Networks
- Composable Trust
- Mobile code integrity
- Protective Mechanisms
Security
Public Key Infrastructure (PKI)
Efficiency
Trustworthy System from Untrustworthy Components
Performance
11Linkage to Other Federal Initiatives
- Joint work with Defense Advanced Research
Agency (DARPA) National Science Foundation
(NSF) National Information Assurance
Partnership (NIAP) Naval Research
Laboratory Air Force Research Laboratory NASA - Collaboration with standards-setting
organizations (e.g., NIST) - Review of ISS Architecture, Version 1.1, by
Industry Advisory Council and Naval Research Lab
12FY 2002 Objectives
- Continue certification and authorization of
critical systems - Continue aggressive training and awareness
programs - Augment monitoring for policy conformance
- Expand Computer Security Incident Response
Capability - Improve boundary protection and security on new
telecom acquisitions - Expand ISS Architecture to cover non-NAS in
version 2.0 of ISSA - Nurture RD program to FAA unique needs
- Conduct an Integrated Facility Certification
prototype. - Implement an outreach program to coordinate with
industry, airports, and other partners