Appendix A List of Acronyms

COI

community of interest

DI

data integrity

DSP

Directory Services Protector

ESM

Enterprise Security Manager

IT

Information Technology

ISO/IEC

International Organization for Standardization/International Electrotechnical Commission

NCCoE

National Cybersecurity Center of Excellence

NIST

National Institute of Standards and Technology

NIST IR

NIST Interagency Report

RMF

Risk Management Framework

SP

Special Publication

TLC

Tripwire Log Center

TLS

Transport Layer Security

USB

Universal Serial Bus

VM

Virtual Machine

vsftpd

Very Secure File Transfer Protocol Daemon

WORM

Write Once Read Many

WSA

Web Security Appliance

Appendix B Glossary

Access Control

The process of granting or denying specific requests to: 1) obtain and use information and related information processing services; and 2) enter specific physical facilities (e.g., federal buildings, military establishments, border crossing entrances)

SOURCE: Federal Information Processing Standard (FIPS) 201; CNSSI-4009

Architecture

A highly structured specification of an acceptable approach within a framework for solving a specific problem. An architecture contains descriptions of all the components of a selected, acceptable solution while allowing certain details of specific components to be variable to satisfy related constraints (e.g., costs, local environment, user acceptability).

SOURCE: FIPS 201-2

Audit

Independent review and examination of records and activities to assess the adequacy of system controls and ensure compliance with established policies and operational procedures

SOURCE: CNSSI 4009-2015

Backdoor

An undocumented way of gaining access to a computer system. A backdoor is a potential security risk.

SOURCE: National Institute of Standards and Technology (NIST) Special Publication (SP) 800-82 Rev. 2

Backup

A copy of files and programs made to facilitate recovery if necessary

SOURCE: NIST SP 800-34 Rev. 1

Compromise

Disclosure of information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred

SOURCE: NIST SP 800-32

Continuous Monitoring

Maintaining ongoing awareness to support organizational risk decisions

SOURCE: NIST SP 800-137

Cybersecurity

Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation

SOURCE: CNSSI 4009-2015 (NSPD-54/HSPD-23)

Data

A subset of information in an electronic format that allows it to be retrieved or transmitted

SOURCE: CNSSI-4009

Data Integrity

The property that data has not been changed, destroyed, or lost in an unauthorized or accidental manner

SOURCE: CNSSI-4009

Information Security

The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability

SOURCE: FIPS 199 (44 U.S.C., Sec. 3542)

Information Security Risk

The risk to organizational operations (including mission, functions, image, reputation), organizational assets, individuals, other organizations, and the Nation due to the potential for unauthorized access, use, disclosure, disruption, modification, or destruction of information and/or information systems

SOURCE: CNSSI 4009-2015 (NIST SP 800-30 Rev. 1)

Information System

A discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information

SOURCE: FIPS 200 (44 U.S.C., Sec. 3502)

Insider

An entity inside the security perimeter that is authorized to access system resources but uses them in a way not approved by those who granted the authorization

SOURCE: NIST SP 800-82 Rev. 2 (RFC 4949)

Kerberos

An authentication system developed at the Massachusetts Institute of Technology (MIT). Kerberos is designed to enable two parties to exchange private information across a public network.

SOURCE: NIST SP 800-47

Log

A record of the events occurring within an organization’s systems and networks

SOURCE: NIST SP 800-92

Malware

A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system

SOURCE: NIST SP 800-111

Privacy

Assurance that the confidentiality of, and access to, certain information about an entity is protected

SOURCE: NIST SP 800-130

Risk

The level of impact on organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals resulting from the operation of an information system given the potential impact of a threat and the likelihood of that threat occurring

SOURCE: FIPS 200

Risk Assessment

The process of identifying the risks to system security and determining the probability of occurrence, the resulting impact, and additional safeguards that would mitigate this impact. Part of Risk Management and synonymous with Risk Analysis

SOURCE: NIST SP 800-63-2

Risk Management Framework

The Risk Management Framework (RMF), presented in NIST SP 800-37, provides a disciplined and structured process that integrates information security and risk management activities into the system development life cycle.

 SOURCE: NIST SP 800-82 Rev. 2 (NIST SP 800-37)

Security Control

A protection measure for a system

SOURCE: NIST SP 800-123

Virtual Machine

Software that allows a single host to run one or more guest operating systems

SOURCE: NIST SP 800-115

Vulnerability

Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source SOURCE: FIPS 200 (Adapted adapted from CNSSI 4009)

Appendix C References

B1

Sedgewick, Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1, National Institute of Standards and Technology, Gaithersburg, Maryland, Apr. 2018, 55 pp. Available: https://www.nist.gov/cyberframework/framework.

B2

L. Kauffman, N. Lesser and B. Abe, Executive Technical Workshop on Improving Cybersecurity and Consumer Privacy, NISTIR 8050, National Institute of Standards and Technology, Gaithersburg, Maryland, April 2015, 155pp. Availabe: https://nccoe.nist.gov/sites/default/files/library/nistir-8050-draft.pdf.

B3

G. Stoneburner, et al., Guide for Conducting Risk Assessments, NIST Special Publication (SP), 800-30 Revision 1, National Institute of Standards and Technology, Gaithersburg, Maryland, September 2012, 95 pp. Available: http://dx.doi.org/10.6028/NIST.SP.800-30r1.

B4

R. Ross, et al., Guide for Applying the Risk Management Framework to Federal Information Systems, NIST Special Publication (SP) 800-37, National Institute of Standards and Technology, Gaithersburg, Maryland, February 2010, 101pp. Available: http://dx.doi.org/10.6028/NIST.SP.800-37r1.

B5

R. Ross et al., Managing Information Security Risk, NIST Special Publication (SP) 800-39, National Institute of Standards and Technology, Gaithersburg, Maryland, March 2011, 87pp. Available: http://dx.doi.org/10.6028/NIST.SP.800-39.

B6

M. Souppaya et al.Guide to Enterprise Patch Management Technologies, NIST Special Publication (SP) 800-40 Revision 3, National Institute of Standards and Technology, Gaithersburg, Maryland, July 2013, 25pp. Available: http://dx.doi.org/10.6028/NIST.SP.800-40r3.

B7

R. Ross et al.Security and Privacy Controls for Federal Information Systems and Organizations, NIST Special Publication (SP) 800-53 Revision 4, National Institute of Standards and Technology, Gaithersburg, Maryland, April 2013, 461pp. Available: https://doi.org/10.6028/NIST.SP.800-53r4.

B8

U.S. Department of Commerce. Security Requirements for Cryptographic Modules, Federal Information Processing Standards (FIPS) Publication 140-3, Mar. 2019, 65pp. Available: https://csrc.nist.gov/publications/detail/fips/140/3/final.

B9

K. Kent et al.Guide to Integrating Forensic Techniques into Incident Response, NIST Special Publication (SP) 800-86, National Institute of Standards and Technology, Gaithersburg, Maryland, August 2006, 121pp. Available: http://dx.doi.org/10.6028/NIST.SP.800-86.

B10

K. Kent and M. Souppaya, Guide to Computer Security Log Management, NIST Special Publication (SP) 800-92, National Institute of Standards and Technology, Gaithersburg, Maryland, September 2006, 72pp. Available: http://dx.doi.org/10.6028/NIST.SP.800-92.

B11

P. Bowen et al.Information Security Handbook: A Guide for Managers, NIST Special Publication (SP) 800-100, National Institute of Standards and Technology, Gaithersburg, Maryland, October 2006, 178pp. Available: http://dx.doi.org/10.6028/NIST.SP.800-100.

B12

M. Swanson et al., Contingency Planning Guide for Federal Information Systems, NIST Special Publication (SP) 800-34 Revision 1, National Institute of Standards and Technology, Gaithersburg, Maryland, May 2010, 148pp. Available: http://dx.doi.org/10.6028/NIST.SP.800-34r1.

B13

Office of Management and Budget (OMB), Management of Federal Information Resources, OMB Circular No. A-130, November 2000. Available: https://obamawhitehouse.archives.gov/sites/default/files/omb/assets/OMB/circulars/a130/a130revised.pdf.

B14

P. Cichonski et al.Computer Security Incident Handling Guide, NIST Special Publication (SP) 800-61 Revision 2, National Institute of Standards and Technology, Gaithersburg, Maryland, August 2012, 79pp. Available: http://dx.doi.org/10.6028/NIST.SP.800-61r2.

B15

M. Souppaya and K. Scarfone, Guide to Malware Incident Prevention and Handling for Desktops and Laptops, NIST Special Publication (SP) 800-83 Revision 1, National Institute of Standards and Technology, Gaithersburg, Maryland, July 2013, 46pp. Available: http://dx.doi.org/10.6028/NIST.SP.800-83r1.

B16

C. Johnson et al., Guide to Cyber Threat Information Sharing, NIST Special Publication (SP) 800-150, National Institute of Standards and Technology, Gaithersburg, Maryland, October 2016, 42pp. Available: http://dx.doi.org/10.6028/NIST.SP.800-150.

B17

M. Bartock et al., Guide for Cybersecurity Event Recovery, NIST Special Publication (SP) 800-184, National Institute of Standards and Technology, Gaithersburg, Maryland, December 2016, 52pp. http://dx.doi.org/10.6028/NIST.SP.800-184.

B18

J. Banoczi et al., Access Rights Management, NIST Special Publication (SP) 1800-9, National Institute of Standards and Technology, Gaithersburg, Maryland, October 2017. Available: https://www.nccoe.nist.gov/projects/use-cases/access-rights-management.

B19

B. Fisher et al., Attribute Based Access Control, NIST Special Publication (SP) 1800-3, National Institute of Standards and Technology, Gaithersburg, Maryland, September 2017. Available: https://www.nccoe.nist.gov/projects/building-blocks/attribute-based-access-control.

Appendix D Functional Evaluation

A functional evaluation of the data integrity (DI) example implementation, as constructed in our laboratory, was conducted to verify that it meets its objective of identifying assets and vulnerabilities within the enterprise. Furthermore, the project aims to protect these assets prior to an attack. The evaluation verified that the example implementation could perform the following functions:

  • discover assets on the network

  • discover and mitigate vulnerabilities in assets on the network

  • protect data from modification prior to an attack

  • provide a baseline for daily activity and asset integrity

Section D.1 describes the format and components of the functional test cases. Each functional test case is designed to assess the capability of the example implementation to perform the functions listed above and detailed in Section D.1.

D.1 Data Integrity Functional Test Plan

One aspect of our security evaluation involved assessing how well the reference design addresses the security characteristics it was intended to support. The Cybersecurity Framework Subcategories were used to provide structure to the security assessment by consulting the specific sections of each standard that are cited in reference to that Subcategory. The cited sections provide validation points that the example solution is expected to exhibit. Using the Cybersecurity Framework Subcategories as a basis for organizing our analysis allowed us to systematically consider how well the reference design supports the intended security characteristics.

This plan includes the test cases necessary to conduct the functional evaluation of the DI example implementation, which is currently deployed in a lab at the National Cybersecurity Center of Excellence. The implementation tested is described in Section 4.

Each test case consists of multiple fields that collectively identify the goal of the test, the specifics required to implement the test, and how to assess the results of the test. Table 6‑1 describes each field in the test case.

Table 6‑1 Test Case Fields

Test Case Field

Description

Parent Requirement

Identifies the top-level requirement or the series of top-level requirements leading to the testable requirement

Testable requirement

Drives the definition of the remainder of the test case fields. Specifies the capability to be evaluated.

Description

Describes the objective of the test case

Associated Cybersecurity Framework Subcategories

Lists the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 Rev. 4 controls addressed by the test case

Preconditions

The starting state of the test case. Preconditions indicate various starting state items, such as a specific capability configuration required or specific protocol and content.

Procedure

The step-by-step actions required to implement the test case. A procedure may consist of a single sequence of steps or multiple sequences of steps (with delineation) to indicate variations in the test procedure.

Expected results

The expected results for each variation in the test procedure

Actual results

The observed results

Overall result

The overall result of the test as pass/fail. In some test cases, determination of the overall result may be more involved, such as determining pass/fail based on a percentage of errors identified.

D.2 Data Integrity Use Case Requirements

Table 6‑2 identifies the DI functional requirements addressed in the test plan and associated test cases.

Table 6‑2 Capability Requirements

Capability Requirement (CR) ID

Parent Requirement

Sub requirement 1

Test Case

CR 1

The DI example implementation shall identify and protect assets against malware that encrypts files and displays notice demanding payment.

CR 1.a

Vulnerability in Active Directory server is identified.

Data Integrity IP-1

CR 1.b

User is blocked from visiting malicious site.

Data Integrity IP-1

CR 1.c

Downloads from site are blocked.

Data Integrity IP-1

CR 1.d

Vulnerability is patched.

Data Integrity IP-1

CR 1.e

Ransomware cannot send information to home server.

Data Integrity IP-1

CR 1.f

Backups are taken.

Data Integrity IP-1

CR 1.g

File integrity information is baselined.

Data Integrity IP-1

CR 2

The DI example implementation shall identify and protect assets against malware inserted via Universal Serial Bus (USB) that modifies and deletes user data.

Data Integrity IP-2

CR 2.a

Backups are taken.

Data Integrity IP-2

CR 2.b

File integrity information is baselined.

Data Integrity IP-2

CR 3

The DI example shall identify and protect virtual machines against deletion.

Data Integrity IP-3

CR 3.a

Backups of virtual machines are taken.

Data Integrity IP-3

CR 4

The DI example implementation shall identify and protect assets against malware received via phishing email.

Data Integrity IP-4

CR 4.a

Downloads from the spreadsheet are blocked.

Data Integrity IP-4

CR 4.b

Backups of configurations are taken.

Data Integrity IP-4

CR 4.c

Configuration integrity information is baselined.

Data Integrity IP-4

CR 5

The DI example implementation shall identify and protect the database against changes made through a web server vulnerability in custom code.

Data Integrity IP-5

CR 5.a

Vulnerability is identified.

Data Integrity IP-5

CR 5.b

Vulnerability is resolved.

Data Integrity IP-5

CR 5.c

Backups of database are taken.

Data Integrity IP-5

CR 5.d

Database integrity information is baselined.

Data Integrity IP-5

CR 6

The DI example implementation shall identify and protect assets against targeted modification by malicious insiders with elevated privileges.

Data Integrity IP-6

CR 6.a

Backups are taken.

Data Integrity IP-6

CR 6.b

File integrity information is baselined.

Data Integrity IP-6

CR 6.c

Backups are encrypted.

Data Integrity IP-6

CR 6.d

Backups are stored securely.

Data Integrity IP-6

CR 7

The DI example implementation shall identify and protect assets against an intrusion via compromised update server.

Data Integrity IP-7

CR 7.a

Downloads from site are temporarily blocked.

Data Integrity IP-7

CR 7.b

Backups are taken.

Data Integrity IP-7

CR 7.c

Program integrity information is baselined.

Data Integrity IP-7

CR 7.d

File integrity information is baselined.

Data Integrity IP-7

CR 8

The DI example implementation shall identify new and unmaintained assets on the network.

Data Integrity IP-8

CR 8.a

Machines that are new to the network are identified.

Data Integrity IP-8

CR 8.b

Machines that are not up-to-date are identified.

Data Integrity IP-8

D.3 Test Case: Data Integrity IP-1

Table 6‑3 Test Case ID: Data Integrity IP-1

Parent requirement

(CR 1) The DI example implementation shall identify and protect assets against malware that encrypts files and displays notice demanding payment.

Testable requirement

(CR 1.a) Vulnerability identification, (CR 1.b, 1.c, 1.e) Denylisting, (CR 1.d) Maintenance, (CR 1.f) Backups, (CR 1.g) Integrity Baselining

Description

Show that the DI solution can identify and resolve vulnerabilities and protect against ransomware.

Associated Cybersecurity Framework Subcategories

ID.AM-1, ID.AM-2, ID.RA-1, ID.RA-2, ID.RA-6, DE.CM-8, PR.IP-12, RS.MI-3, PR.IP-4, PR.DS-1, PR.DS-6, PR.PT-1, PR.MA-2

Preconditions

User navigates to a malicious website and clicks on an ad for a virus cleaner. The virus cleaner is actually ransomware, which propagates across the domain and encrypts user files.

Procedure

The denylisting capability is used to prevent access to and downloads from known malicious sites.

The inventory capability is used to identify organizational assets and devices.

The network protection capability is used to prevent the propagation of ransomware across the enterprise.

The vulnerability management capability is used to identify vulnerabilities that allow malware to propagate.

The integrity monitoring and logging collect integrity information and baseline the file system.

The backups capability is used to take backups of the file system.

Expected Results (pass)

The vulnerability that allows the ransomware to propagate is identified (CR 1.a).

The user cannot access the site when it is blocked (CR 1.b).

The user cannot download the ransomware from the site when it is blocked (CR 1.c).

The build can identify (and possibly execute) a fix for the vulnerability. When the fix is made, the ransomware is unable to propagate (CR 1.d).

The ransomware is unable to communicate with its home server when the site is blocked (CR 1.e).

The build can take backups of file systems (CR 1.f).

The build can take and log integrity baselines of file systems (CR 1.g).

Actual Results

Cisco WSA (denylisting) stops the user from accessing the site when it is blocked.

Cisco ISE (inventory) is used to identify devices on the network.

Symantec DLP (inventory) is used to identify organizational data assets on monitored machines.

CryptoniteNXT (network protection) prevents propagation of ransomware through an allowlist of approved communications in the enterprise.

Tripwire IP360 (vulnerability management) detects vulnerabilities in Active Directory that allow ransomware to propagate.

Tripwire Enterprise (integrity monitoring) and ArcSight ESM (logging) baseline critical data assets across the enterprise.

Duplicati and FileZilla (backups) create backups of organizational data as a contingency, should ransomware be able to affect any systems.

Overall Result

Pass. All requirements for this use case are met.

D.4 Test Case: Data Integrity IP-2

Table 6‑4 Test Case ID: Data Integrity IP-2

Parent requirement

(CR 2) The DI example implementation shall identify and protect assets against malware inserted via USB that modifies and deletes user data.

Testable requirement

(CR 2.a) Backups, (CR 2.b) Integrity Baselining

Description

Show that the DI solution can preemptively protect against destructive malware.

Associated Cybersecurity Framework Subcategories

PR.IP-4, PR.DS-1, PR.DS-6, PR.PT-1

Preconditions

A user inserts an unidentified USB drive into their computer. They click on a file on the drive, which immediately destroys any files on their machine.

Procedure

Backups schedules and creates backups of the user’s documents.

The integrity monitoring capability is used to take integrity baselines of the file system.

Logging collects logs and baselines system activity.

Expected Results (pass)

The build can take backups of file systems (CR 2.a).

The build can take and log integrity baselines of file systems (CR 2.b).

Actual Results

Duplicati and FileZilla (backups) are used to take and store backups of the user’s documents.

Tripwire Enterprise (integrity monitoring) is used to take an integrity baseline of the user’s file system prior to the malicious USB drive being inserted into the computer.

ArcSight ESM (logging) takes a baseline of system activity prior to the USB drive being inserted into the computer.

Overall Result

Pass. All requirements for this use case are met.

D.5 Test Case: Data Integrity IP-3

Table 6‑5 Test Case ID: Data Integrity IP-3

Parent requirement

(CR 3) The DI example implementation shall identify and protect virtual machines against deletion.

Testable requirement

(CR 3.a) Backups

Description

Show that the DI solution can preemptively protect against data integrity events that involve virtual machines (VMs).

Associated Cybersecurity Framework Subcategories

PR.IP-4, PR.DS-1

Preconditions

A routine maintenance script contains an error that accidentally deletes a VM.

Procedure

The backups capability is used to schedule and create backups of a VM.

Expected Results (pass)

The build can take backups of VMs (CR 3.a).

Actual Results

Duplicati and FileZilla (backups) take and store backups of VMs.

Overall Result

Pass. All requirements for this use case are met.

D.6 Test Case: Data Integrity IP-4

Table 6‑6 Test Case ID: Data Integrity IP-4

Parent requirement

(CR 4) The DI example implementation shall identify and protect against malware received via phishing email.

Testable requirement

(CR 4.a, CR 4.b) Denylisting, (CR 4.c) Backups, (CR 4.d) Integrity Baselining

Description

Show that the DI solution can identify phishing emails and protect against configuration changes made by malicious attachments.

Associated Cybersecurity Framework Subcategories

ID.AM-2, ID.AM-3, ID. RA-1, ID.RA-2, ID.RA-5, DE.CM-8, PR.IP-4, PR.DS-1, PR.PT-1

Preconditions

The user receives a phishing email with a malicious attached spreadsheet. The spreadsheet is downloaded and opened, causing account changes in Active Directory.

Procedure

The integrity monitoring capability is used to baseline Active Directory activity.

This information is forwarded to the logging capability, along with other available Active Directory information.

The backups capability is used to take backups of the Active Directory configuration.

The malicious web server is added to the denylisting capability to prevent downloads.

Expected Results (pass)

The spreadsheet cannot download files (CR 4.a).

The build can take backups of configurations (CR 4.c).

The build can take and log integrity baselines of configurations (CR 4.d).

Actual Results

Semperis DSP (integrity monitoring) successfully baselines Active Directory activity.

ArcSight ESM (logging) successfully logs activity from Active Directory, including log-ons and changes.

When the external web server is added to the denylist, Cisco WSA (denylisting) prevents the Excel sheet from downloading malicious files.

Semperis ADFR (backups) is used to successfully take backups of the Active Directory configuration.

Overall Result

Pass. All requirements for this use case are met.

D.7 Test Case: Data Integrity IP-5

Table 6‑7 Test Case ID: Data Integrity IP-5

Parent requirement

(CR 5) The DI example implementation shall identify and protect the database against changes made through a web server vulnerability in custom code.

Testable requirement

(CR 5.c) Backups, (CR 5.d) Integrity Baselining

Description

Show that the DI solution can protect the database against a vulnerability in the custom code of a web server.

Associated Cybersecurity Framework Subcategories

PR.IP-4, PR.DS-1, PR.PT-1, PR.DS-6

Preconditions

A vulnerability in the source code of an intranet webpage is discovered by a malicious insider. The insider exploits this vulnerability to delete significant portions of the database.

Procedure

The backups capability is used to take backups of the database.

The integrity monitoring and logging capabilities take baselines of the database, for comparison post-modification.

Expected Results (pass)

The build can take backups of the database (CR 5.c).

The build can take and log integrity baselines of the database (CR 5.d).

Actual Results

Duplicati and FileZilla (backups) successfully backs up the database.

Tripwire Enterprise (integrity monitoring) successfully detects changes in the database.

ArcSight ESM (logging) successfully logs changes to the database.

Overall Result

Pass. All requirements for this use case are met.

D.8 Test Case: Data Integrity IP-6

Table 6‑8 Test Case ID: Data Integrity IP-6

Parent requirement

(CR 6) The DI example implementation shall identify and protect assets against targeted modification by malicious insiders with elevated privileges.

Testable requirement

(CR 6.a) Backups, (CR 6.b) Integrity Baselining, (CR 6.c) Encrypted Backups, (CR 6.d) Secure Storage

Description

Show that the DI solution can protect assets and backups against targeted modification by malicious insiders.

Associated Cybersecurity Framework Subcategories

PR.IP-4, PR.DS-1, PR.PT-1, PR.DS-6

Preconditions

A malicious insider attempts to modify targeted information in both the enterprise systems and the backup systems, using elevated credentials obtained extraneously.

Procedure

The inventory capability is used to identify data assets.

The backups capability provides encrypted backups.

Secure storage prevents modification or deletion of backups.

Integrity monitoring and logging collect integrity information and baseline the file system.

Expected Results (pass)

The build can take backups of the file system (CR 6.a).

The build can take and log integrity baselines of the file system (CR 6.b).

Backups are encrypted (CR 6.c).

Backups are stored securely and cannot be modified or deleted (CR 6.d).

Actual Results

Symantec DLP (inventory) identifies critical data assets across the enterprise.

Duplicati and FileZilla (backups) provide encrypted backups of the file system.

GreenTec WORMdisks (secure storage) provide write-protection for backups, preventing them from being modified or deleted.

Tripwire Enterprise (integrity monitoring) and ArcSight ESM (logging) baseline critical data assets across the enterprise.

Overall Result

Pass. All requirements of this use case are met.

D.9 Test Case: Data Integrity IP-7

Table 6‑9 Test Case ID: Data Integrity IP-7

Parent requirement

(CR 7) The DI example implementation shall identify and protect assets against an intrusion via compromised update server.

Testable requirement

(CR 7.a) Denylisting, (CR 7.b) Backups, (CR 7.c, 7.d) Integrity Baselining

Description

Show that the DI solution can protect against compromised update server as well as intrusion made possible by vulnerable programs.

Associated Cybersecurity Framework Subcategories

ID.RA-1, ID.RA-2, ID.RA-5, DE.CM-8, PR.IP-12, RS.MI-3, PR.IP-4, PR.DS-1, PR.PT-1, PR.DS-6, PR.MA-2

Preconditions

An external update server has been compromised, and a user workstation attempts to update from this server.

Procedure

Integrity monitoring capability is used to take baselines of the integrity of both the programs and the file systems.

The backups capability is used to back up the file system.

The denylisting capability is used to prevent communication between the update server and the machine.

Expected Results (pass)

Machines cannot update from this site while it is denylisted (CR 7.a).

The build can take backups of file systems (CR 7.b).

The build can take integrity baselines of programs (CR 7.c).

The build can take integrity baselines of file systems (CR 7.d).

Actual Results

Tripwire Enterprise (integrity monitoring) successfully takes an integrity baseline of both programs and files.

Duplicati and FileZilla (backups) successfully takes backups of the file system.

Cisco WSA (denylisting) successfully prevents communication between the update server and workstations.

Overall Result

Pass. All requirements for this use case are met.

D.10 Test Case: Data Integrity IP-8

Table 6‑10 Test Case ID: Data Integrity IP-8

Parent requirement

(CR 8) The DI example implementation shall identify new and unmaintained assets on the network.

Testable requirement

(CR 8.a) Asset Identification, (CR 8.b) Vulnerability Identification

Description

Show that the DI solution can identify machines new to the network, as well as unpatched machines.

Associated Cybersecurity Framework Subcategories

ID.AM-1, ID.AM-2, ID.RA-1, ID.RA-2, ID.RA-5, DE.CM-8

Preconditions

A new machine with several critical patches missing is connected to the network for the first time.

Procedure

The inventory capability is used to identify various aspects about the machine.

The policy enforcement identifies the existence of security solutions on the machine and grants/denies access to the network, based on their presence.

The vulnerability management capability is used to scan for vulnerabilities on the new machine.

Expected Results (pass)

New machine is identified on the network (CR 8.a).

New machine is identified as unmaintained, and required fixes are identified (CR 8.b).

Actual Results

Cisco ISE (inventory) successfully logs information about new connections, including the user, date, device, and network information.

Cisco ISE (policy enforcement) successfully prevents the new machine without 50 security software from connecting to the network.

Tripwire IP360 (vulnerability management) successfully identifies vulnerabilities on the new machine.

Overall Result

Pass. All requirements for this use case are met.