0% found this document useful (0 votes)
46 views14 pages

Jan 24 2023 Ssca Regan

Uploaded by

tsangkay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views14 pages

Jan 24 2023 Ssca Regan

Uploaded by

tsangkay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

TIA’s SCS 9001 Cyber and Supply

Chain Security Standard - Update


BUSINESS PROCESS EXCELLENCE FOR THE ICT INDUSTRY

Mike Regan
January, 2023
TIA: THE TRUSTED INDUSTRY ASSOCIATION FOR
THE CONNECTED WORLD

GOVERNMENT AFFAIRS
§ Advocate for ICT manufacturers and suppliers (U.S. & Globally)
§ Advancement of policy positions on wide range of issues
§ Impacting ICT industry globally

STANDARDS DEVELOPMENT
§ ANSI Accredited
§ > 3,600 global standards and technical documents

TECHNOLOGY PROGRAMS
Innovative technologies for an increasingly connected world
§ Smart Buildings
§ Edge Data Centers

QuEST FORUM COMMUNITY


§ SCS 9001 Cyber and Supply Chain Security
§ TL 9000 Quality Management System
§ Sustainability, Secure Software Development, Benchmarking
SCS 9001 Introduction
A BIG STANDARD TO HELP W/ A BIG PROBLEM

WHAT IS IT?
§ The first certifiable, process-based standard with measurements and benchmarking developed
for the specific needs of the ICT industry.
§ The standard builds upon existing works and aligns with government initiatives; it adds critical
but unaddressed requirements
WHAT’S DIFFERENT ABOUT IT?
§ There was no supply chain security standard for the entire ICT industry
§ SCS 9001 is certifiable and process-based, providing measurements and benchmarking
§ Comprehensive: provides requirements and controls must cover the entire product lifecycle
including the complete supply chain of software, hardware, systems and the security practices of
the certifying organization itself

3
SCS 9001 History
• History
– Developed over nearly 2 calendar years now representing 100+ person-years of effort
– 35+ standards were reviewed from organizations such as ATIS, ISO, IAQG, NIST, CISA, CSA, ENISA, O-RAN
Alliance, MITRE, O-RAN Coalition, and others
• Work Group
– Over 60 contributing participants from 34 organizations
– Diversity of contributing organizations - manufacturers, service providers, and systems integrators
– Diversity of expertise - network operations, network architecture, product development, quality management,
security, and supply chain / logistics
• Review prior to release
– The standard was reviewed by ~100 organizations including government agencies
– The draft was sent to ~250 individuals who returned ~500 unique comments and suggestions
– Each comment was reviewed and most adopted in delivering the first release of the standard, the balance are
in the backlog for future consideration

FOOTER 4
SCS 9001 Status
• Availability
– SCS 9001 R1.0 is approved, released and available.
– SCS 9001 R2.0 targeted for H1 2023
• Certification Support
– ANSI-ASQ National Accreditation Board (ANAB) is the first Accreditation Body
– Five Certification Bodies have been trained: DNV, DQS, NQA, Schullman, TuV AM
• Training
– Omnex has developed training courses and offers formal training.
– Current courses: (1) Understanding the SCS 9001 Standard, (2) Understanding SCS 9001 Measurements,
(3) Auditor Training, (4) Implementation Training
• Pilot Program
– 5 varied organizations conducted gap-assessments through March, 2022. Essentially a beta test.
– Feedback being collected, reviewed and will be accounted for in the next iteration of the standard
• Collateral
– Large and growing amount of content: comparisons to other standards, operationalization of government
directives and EOs, review of prominent cyber breaches
FOOTER 5
SCS 9001 R2.x Update
§ Improvements through-out from lessons learned from the Pilot Program and a variety of other input
§ Increased coverage of hardware provenance, hardware development and cloud-based services
§ Increased coverage of procurement, shipping and logistics requirements
§ Enhancements in support of government initiatives such as:
o EO14028 & OMB Memo M-22-18 (secure software development)
o Baseline requirements as set by the BEAD NOFO
o U.K. Telecommunications (Security) Act 2021
§ Updated mapping to newly issued controls of CSA CCM 4.0
§ Updated mapping to newly issued controls of ISO 27002
§ Decoupling from the ISO 9001 standard while maintaining process basis
o In response to feedback of providing adoption flexibility
o Maintains the ISO Annex SL format for ease of integration with other ISO standards
§ Reorganized and reformatted to better support mapping exercises to other standards and publications

Ø Availability H1, 2023. Contact TIA for more information and availability.

FOOTER 6
R2.0 Statistics
§ Big standard for a big problem.
§ Organized around the Annex SL document
structure from ISO/IEC with specific requirements
in Chapters 5 – 10.
§ ~ 150 pages
§ There are 116 requirements:
§ Most are multi-part
§ Provides over 750 specific touch points
§ There are 60 controls
§ There are 7 measurements

FOOTER 7
116 Categories of Requirements
5.1.1 ‒ Top management governance 7.4.2 ‒ Customer Communication Methods 8.3.16 ‒ Security Vulnerability Resolution Configuration Management
5.1.2 ‒ Customer security requirements 7.4.3 ‒ Organization Feedback 8.3.17 ‒ Component Substitutions
5.2.1 ‒ Establishing the security policies 7.5.1 ‒ General 8.4.1 ‒ Supplier Selection
5.2.2 ‒ Security Policies 7.5.2 ‒ Creating and updating 8.4.2 – Data Sub-processors
5.2.3 ‒ Media Management Policy 7.5.3 ‒ Control of documented information 8.4.3 ‒ Supply Chain Provenance
5.2.4 ‒ Human Resource (HR) Security Policy 7.5.4 ‒ Access, Distribution, and Maintenance 8.4.4 ‒ Extent of Control of Critical Supplier(s)
5.2.5 ‒ Acceptable Use of Assets Policy 7.5.5 ‒ Protection of Personally Identifiable Information (PII) 8.4.5 ‒ Verification of Externally Supplied Products
5.2.6 ‒ Workspace Policy 7.5.6 ‒ Audit Logging 8.4.6 – Verification of Externally Supplied Services
5.2.7 ‒ Access Control Policy 8.1.1 ‒ Life Cycle Model 8.5.1 ‒ Network Security Requirements Definition Process
5.2.8 ‒ Least Privilege Policy 8.1.2 ‒ Security Risk Management 8.5.2 ‒ Network Architecture Definition Process
5.2.9 ‒ Asset Management Policy 8.1.3 ‒ Technical Vulnerability Management 8.5.3 ‒ Secure Network Operations
5.2.10 ‒ Mobile Device Policy 8.1.4 ‒ Secure Network Planning 8.5.4 ‒ Secure Systems Operations
5.2.11 ‒ Bring Your Own Device (BYOD) Control Policies 8.1.5 ‒ Secure Systems Planning 8.5.5 ‒ Event and Incident Management Process
5.2.12 ‒ Cryptographic Control Policies 8.1.6 ‒ Secure Wireless Network Procedures 8.5.6 ‒ Incident Reporting
5.2.13 ‒ Fraudulent/Counterfeit Parts Mitigation Policy 8.1.7 ‒ Maintenance of Organizational Systems 8.5.7 ‒ Change Management Process
5.3.1 ‒ Management Responsibility for Supply Chain Security 8.1.8 ‒ Information Backup 8.5.8 ‒ Monitoring Access Control
5.3.2‒ Process Ownership 8.1.9 ‒ Prevention of Counterfeit Parts 8.5.9 ‒ Software Malware Protection
5.3.3 ‒ Segregation of Duties 8.2.1 ‒ Problem Escalation 8.5.10 ‒ Secure Logistics Processes
6.1.1 ‒ Security Program Planning 8.2.2 ‒ Problem Report Feedback 8.5.11 ‒ Disposal Process
6.1.2 ‒ Asset Inventory 8.2.3 ‒ Product Replacement 8.6.1 ‒ Release of products and services
6.1.3 ‒ Ownership of Assets 8.2.4 ‒ Notification About Critical Security Problems 8.7.1 ‒ Control of nonconforming outputs
6.1.4 ‒ Residual Risk Information Availability 8.2.5 ‒ Notification About Critical Service Disruption 8.7.2 ‒ Nonconformance records
6.1.5 ‒ Asset Classification 8.2.6 ‒ Identify Customer and Stakeholder Security Needs 9.1.1 ‒ General
6.1.6 ‒ Supply Chain Security Risk Identification 8.2.7 ‒ Security Contract Review 9.1.2 ‒ Security Management System Evaluation
6.1.7 ‒ Security Risk Analysis 8.2.8 ‒ Changes to requirements for products and services 9.1.3 ‒ Security Process Measurements
6.1.8 ‒ Supply Chain Security Risk Treatment 8.3.1 ‒ Secure Development Models 9.1.4 – Required Security Measurements
6.1.9 ‒ Establish the Acceptable Level of Risk 8.3.2 ‒ Development Process 9.2.1 ‒ Internal Audit Program
6.1.10 ‒ Organization’s Statement of Applicability (SoA) 8.3.3‒ Security Requirements of Project Planning 9.2.2 ‒ Internal Audits
6.1.11 ‒ Business Impact Analysis 8.3.4 ‒ Security Requirements Definition Process 9.3.1 ‒ General
6.1.12 ‒ Business Continuity Planning 8.3.5 ‒ Product or Service Architecture Definition Process 9.3.2 ‒ Corporate Governance Review inputs
6.1.13 ‒ Zero Trust Architecture (ZTA) Plan 8.3.6 ‒ Security Test Planning 9.3.3 - Corporate governance review outputs
6.1.14 ‒ Automation Planning 8.3.7 ‒ Integration Planning 10.1.1 - General ‒ Improvement Opportunities
6.2.1 ‒ Security objectives 8.3.8 ‒ Requirements Traceability 10.1.2 ‒ Employee Participation
6.2.2 – Management of security objectives 8.3.9 ‒ Security Test Verification and Validation Process Controls 10.2.1 ‒ Nonconformity and corrective action
6.3.1 – Supply chain management system changes 8.3.10 ‒ Software Provenance 10.2.2 ‒ Supplier Corrective Action
7.1.1 ‒ People, Infrastructure, and Environment 8.3.11 ‒ Software Bill of Materials (sBOM) 10.3.1 ‒ Continual improvement
7.1.2 ‒ Monitoring, verification, and validation of resources 8.3.12 – Hardware Provenance
7.2.1 ‒ Determining and Ensuring Competence 8.3.13 – Hardware Bill or Materials (BOM)
7.3.1 ‒Security Awareness Training 8.3.14 ‒ Design and Development Change Management Process
7.4.1 ‒ Internal and external Communications 8.3.15 ‒ Informing Customers of Security Design Changes

FOOTER 8
9
U.S. Govt Is Getting Serious
§ The Broadband Equity, Access & Deployment
Program (BEAD) allocates ~$42B for State
Broadband Grants
§ In the recent Notice Of Funding Opportunity
(NOFO), there are ‘baseline requirements’ stated for
Eligible Entities to receive grants with a focus on:

Cybersecurity Risk Management


– NIST Cybersecurity Framework
– EO 14028

Supply Chain Security Risk Management


– NISTIR 8276 Key Practices in Cyber Supply Chain Risk
Management
– NIST 800-161 Cybersecurity Supply Chain Risk Management
Practices for Systems and Organizations

10
BEAD Success Summit
§ TIA has organized the BEAD Success
Summit

§ The Summit is for the benefit of State


BBOs in managing to expectations of
the BEAD program as described in the
NOFO

§ Attendees will include State BBOs,


Speakers from agencies of the U.S.
Federal Government, service providers
and equipment vendors

• Wide array of topics, keynotes, vendor


displays

• Consult https://tiaonline.org/ for


additional information.
FOOTER 11
Future Focus Areas
§ Collaborations with U.S. Govt Agencies and peer SDOs
§ Submission to NIST National Online Informative References Program (OLIR)
§ MITRE System of Trust and associated collateral
§ Evaluate new Conformity Assessment Models
§ Broadening target verticals
§ Continue to track evolving challenges and continue to revise and improve as appropriate

FOOTER 12
In closing… Key take-aways
§ SCS 9001 is a certifiable, process-based Cyber and Supply Chain Security Standard
for the ICT industry
§ Built using the subject matter expertise of TIA’s diverse membership
§ Measurements & benchmarking builds on the proven success of the TL 9000 QMS
§ Potential users include all network operators; this problem is NOT unique to to SPs
§ More options for using the standard are coming
§ SCS 9001 is well aligned with initiatives from global governments and their agencies
§ SCS 9001 is well-aligned with publications from peer SDOs
§ It took A LOT of effort to develop SCS 9001… and we’re not done.

A global standard, available NOW to help solve problems that exist NOW!

FOOTER 13
THANK YOU
Mike Regan
TIA QuEST Forum - VP Business Performance
Email: [email protected]

14

You might also like