Optimal Approach for Cybersecurity in PSAPs Report

Optimal Approach for Cybersecurity in PSAPs Report
Slide Note
Embed
Share

This report outlines the optimal cybersecurity approach for Public Safety Answering Points (PSAPs) to address increasing cyber threats and vulnerabilities in the 9-1-1 environment. It covers cybersecurity practices, best practices, architecture options for NG9-1-1, and methodologies for developing recommendations.

  • Cybersecurity
  • PSAPs
  • Report
  • Best Practices
  • NG9-1-1

Uploaded on Mar 16, 2025 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. HomeButton.png Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10th, 2015 1 1

  2. FCC Task Force on Optimal PSAP Architecture HomeButton.png Report Outline Objective, Scope, and Methodology Section 1 Cybersecurity Today Section 2 Best Practices Section 3 Architecture Options for NG9-1-1 Appendices 2 2

  3. FCC Task Force on Optimal PSAP Architecture HomeButton.png Objective The objective of Working Group 1 is to address the issues of increasing exposure to cyber threats and vulnerabilities that did not exist in the legacy 9-1-1 environment, and develop recommendations for PSAP-specific Cybersecurity practices 3 3

  4. FCC Task Force on Optimal PSAP Architecture HomeButton.png Scope The defined scope of this work is limited to the identification of cybersecurity issues and documentation of recommended cybersecurity practices for Public Safety Answering Points. However, in the context of this work effort, a local PSAP is much more than a stand-alone entity but rather is the connection point in a complex system of integrated networks that form the critical infrastructure necessary to enable delivery of life saving services. Therefore, as a necessity, there must be reference to other network elements outside of the local PSAP construct. 4 4

  5. FCC Task Force on Optimal PSAP Architecture HomeButton.png Methodology The reduction of any cybersecurity framework to practice is rooted in the ability to identify assets, owners of these assets, threats/risks to these assets, and methods to mitigate the threats/risks. Current and NG architectures serve as a starting point to understand the PSAP ecosystem. Forward looking issues will then be used to expand the context of the threat to the PSAP as a result of the expansion of the public safety ecosystem. Use cases are used to communicate the types of cybersecurity threats to PSAPs as an illustrative tool for demonstrated vulnerabilities or attack surfaces currently threatening PSAPs today and Finally, based on the foregoing, the Working Group developed a checklist and roadmap for PSAPs and a set of recommendations. 5 5

  6. FCC Task Force on Optimal PSAP Architecture HomeButton.png Section 1 - Cybersecurity Today Overarching Information Security Management System (ISMS) Documented Policies, Procedures and Controls in support of the ISMS Compliance Awareness Access Control Policy identifies proper approval based on access gates and ratings Physical Security Limited access and based on need to know Human Resources 6 6

  7. FCC Task Force on Optimal PSAP Architecture HomeButton.png Section 1 - Cybersecurity Today Security Controls Business Continuity Plan/Disaster Recovery (BCP/DR) Geo-diverse in Active/Active or N+1 configurations Media Handling Incident Management Vulnerability Management Internal network security and monitoring Internal network security, Private DNS (internal facing only) External network connections Network entry point security 7 7

  8. FCC Task Force on Optimal PSAP Architecture HomeButton.png Section 2 Best Practices NIST Cybersecurity Framework (NCF) Identity Credentialing Access Management (ICAM) DHS recommendations and resources NICE Workforce Framework CSRIC Best Practices Related to Public Safety 8 8

  9. FCC Task Force on Optimal PSAP Architecture HomeButton.png NIST and NICE Framework U.S. Department of Commerce NIST: Cybersecurity Framework NIST: Cyber Physical Systems- Public Work Group Report Relationship To PSAPs: Identify, Protect, Detect, Respond, Recover NICE Workforce Framework Relationship of occupational specialties to PSAPs Define any new/missing occupational specialties Consider Cyber Professional Best Practices for PSAP workforce 9 9

  10. FCC Task Force on Optimal PSAP Architecture HomeButton.png Department of Homeland Security Department of Homeland Security Critical Infrastructure Cyber Community Voluntary Program (C3VP) Critical Infrastructure Cyber Information Sharing and Collaboration Program (CISCP) Cyber Reports & Recommendations Cybersecurity Products & Solutions: National Cybersecurity and Communications Integration Center (NCCIC) NCCIC/National Coordinating Center for Communications (NCC) NCCIC/United States Computer Emergency Readiness Team (US- CERT) 10 10

  11. FCC Task Force on Optimal PSAP Architecture HomeButton.png Identity Credentialing Access Management (ICAM) General Services Administration Identity Credentialing Access Management (ICAM) NIST Special Publication 800-63-2 FICAM Roadmap and Implementation Guidance Identity Management Credential Management Access Management ICAM Intersection ICAM Goals and Objectives 11 11

  12. FCC Task Force on Optimal PSAP Architecture HomeButton.png CSRIC CSRIC IV Working Group 4 (WG4) was tasked with developing voluntary mechanismsthat give the Commission and the public assurance that communication providers are taking the necessary measures to manage cybersecurity risks across the enterprise. WG4 also was charged with providing implementation guidance to help communication providers use and adapt the NCF. WG1 supports the use of NIST CSF as recommendation as they apply in the final WG4 report. The report is available at: https://transition.fcc.gov/pshs/advisory/csric4/CSRIC_IV_WG4_Final_Report_031815.pdf 12 12

  13. FCC Task Force on Optimal PSAP Architecture HomeButton.png Section 3 Cybersecurity For The Future The threat is real and increasing TDoS and DDoS attacks have occurred, and continue to occur in a legacy environment Both criminal and Nation State actors are involved This threat will increase exponentially as we transition to IP based architectures We must think outside the box and consider unifying, information sharing based, architectures and options. 13 13

  14. FCC Task Force on Optimal PSAP Architecture HomeButton.png Section 3 - Cybersecurity Architecture Options For The Future The Emergency Communications Cybersecurity Center (EC3) Description of Intrusion Detection and Prevention Systems Proposed Approach for IDPS in the NG9-1-1 Environment The EC3 Concept Explained Cost Considerations 14 14

  15. FCC Task Force on Optimal PSAP Architecture HomeButton.png Emergency Communications Cybersecurity Center 15 15

  16. FCC Task Force on Optimal PSAP Architecture HomeButton.png Distributed Integration of EC3 Deployments 16 16

  17. FCC Task Force on Optimal PSAP Architecture HomeButton.png Cybersecurity Plan For The Future PSAPs: Funding The Cybersecurity Plan Discussion of basis for cost estimates Funding Opportunities The importance of information sharing and partnerships 17 17

  18. FCC Task Force on Optimal PSAP Architecture HomeButton.png Appendix 1- PSAP: Cybersecurity Use Cases Specific Use Cases Addressing: TDoS DDoS SWATTING Single PSAP Compromised, Need exists to protect Interconnected PSAPs 18 18

  19. FCC Task Force on Optimal PSAP Architecture HomeButton.png Appendix 2: Cybersecurity Best Practices for PSAPs PSAP Cybersecurity Checklists Roadmap to secure PSAPs Cybersecurity Life Cycle Roadmap Example Starting Activities for Basic Security Hygiene 19 19

  20. FCC Task Force on Optimal PSAP Architecture HomeButton.png Appendix 3: Cybersecurity PSAP Resources Government & Commercial Resources Reference Material for Further Study Includes Specific Documents as well as General Process/Framework Information 20 20

  21. FCC Task Force on Optimal PSAP Architecture HomeButton.png Questions 21 21

Related


More Related Content