Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
NSA revamps processes to more quickly approve commercial technology
Wednesday - 7/2/2014, 4:35am EDT
Federal officials say they've turned over a new leaf in a program that was originally intended to let agencies rapidly incorporate commercial hardware and software into national security systems, but so far has failed to keep up with the pace of commercial innovation.
The National Information Assurance Partnership first got off the ground 14 years ago as a way to let agencies make use of a then-still-maturing crop of commercial information assurance products, rather than having to rely on expensive, government-specific IT designed and developed by the National Security Agency.
But NIAP has been widely criticized for falling well short of its intentions. Commercial companies that wanted to get their products certified as secure enough to be incorporated into national security systems routinely waited years. According to a 2004 report by the Cyber Security Industry Alliance, getting a single product through the process cost hundreds of thousands to millions of dollars.
As a result, the list of NIAP-approved products is very short and overwhelmingly dominated by large IT firms.
"Agility is one of the things we've struggled with. I often joke that NIAP spelled backwards is 'PAIN,'" said Janine Pedersen, the NIAP program's director. "A lot of what we've gone through has involved a lot of growing pains, as anyone who's been involved in the program will tell you. But we've made some changes that have made us more agile and allow us to be more relevant to our end users and provide them with some reasonable products."
NIAP, which originated as a partnership between the National Security Agency and the National Institute of Standards and Technology, now is managed by NSA.
Changes to the program including abandoning the practice of assigning "evaluation assurance levels" based on the testing a given product goes through at a NIAP-certified lab. Officials determined that scheme resulted in approval language that was esoteric and difficult to apply in the real world, and also too subjective. Two different labs could evaluate the same product and come up with vastly different results, depending on precisely what they decided to measure.
Instead, NIAP, which is the U.S. government's implementation of a 26-nation approach called the Common Criteria Evaluation and Validation Scheme (CCEVS), has moved to a system of "protection profiles" that are tailored to specific groups of technologies, and should, in theory, set up a more objective set of security parameters for private labs to test against. Technical working groups made up of members of industry, agency officials, academia and end users build these profiles.
NIAP now uses them to measure the security of commercial products, including firewalls, gateways, mobile devices, virtual private networking systems, wireless networking and several categories of technology.
"We develop these profiles collaboratively, and from an industry perspective, the benefit of participating in those communities is that it gives them a heads-up look at what the requirements are going to eventually be for a given technology," Pedersen said at AFCEA's annual cyber symposium in Baltimore in June. "We're no longer looking at evaluation assurance levels, because we found that they were trying to be a generic one-size-fits-all for any technology. We recognized that doesn't make sense and it doesn't lead to efficient evaluations. It ended up being much more of a paperwork exercise than actually testing the product in front of you."
The NIAP program also is combining its own process with a separate government IT approval gauntlet for commercial products that fall within the authority of the Defense Information Systems Agency.
While the NIAP attempts to verify that it's possible to make a commercial product safe enough for government work, DISA's security technical implementation guides tell agency-level security officers exactly how to configure that product so that it performs the same way it did when it received the original NIAP approval.
NIAP and DISA, Pedersen said, have reached an agreement that will ensure that each product that makes it through NIAP will receive a STIG at about the same time.
"To use an analogy, NIAP is the organization that makes sure that when you turn your car's air conditioner to blue, cold air comes out. DISA, on the other hand, gives you the owner's manual that tells you which knobs and switches to turn to get your air conditioner to work," she said.
Approved before it hit the streets
Since the NIAP program revamped its processes, it's achieved only one major success, though it is a significant one: It paved the way for a modern commercial mobile device to make its way into use for secret-level data within the military and the intelligence community for the first time.