0% found this document useful (0 votes)
66 views14 pages

Google OSCAL Presentation

This presentation document shows the Google OSCAL framework discussion. OSCAL is a NIST Framework.

Uploaded by

Mark Pineda
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views14 pages

Google OSCAL Presentation

This presentation document shows the Google OSCAL framework discussion. OSCAL is a NIST Framework.

Uploaded by

Mark Pineda
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Proprietary + Confidential

February 2023

OSCAL Adoption
For Continuous Assurance & Beyond
Google Cloud CISO
Vikram Khare - Director Continuous Assurance Engineering
Valentin Mihai - Technical Lead
Agenda

Moving Towards Continuous Assurance


Adoption Challenges
Aligning The Data
Process and Systems Overview

Aspirational: Future Plans


Proprietary + Confidential

Introductions

Vikram Khare Valentin Mihai


Continuous Assurance Engineering Technical Lead
Objective: Continuous Assurance Proprietary + Confidential

The Case for OSCAL

● OSCAL is an integral part of enabling continuous assurance.


○ Method for exchanging risk & controls data with
customers & partners
○ Comprehensive taxonomy for GRC & CCM ( Continuous
Controls Monitoring) platforms
○ Tooling ecosystem built with OSCAL support can enable
interoperability

Defining Continuous Assurance

● Continuous Assurance
○ Opinion: Continuous assurance is an umbrella term for
industry buzzwords:
■ Compliance/Privacy/Security by Design
■ Policy as Code
■ Continuous Compliance
○ Tangible: Automation of assurance activities and the
enablement of real time monitoring of controls based on
objectively defined metrics
○ Treat compliance failures like systems downtime
Proprietary + Confidential

Challenges for Adoption

Minor

● Timeline to support OSCAL automation


○ OSCAL builder tooling
○ Control on-boarding tooling
● Control data change management process
● Emerging standard
● Taxonomy adoption

Place Image Here


Major

● 3P Software Challenges
○ Performance
○ Complexity with systems integrations
● Operationalization at scale
● Technical Debt: Gaps must be remediated
immediately
Moving Towards Continuous Assurance

Templates / Scripts

Phase 1: POC OSCAL Builder


Deliver a manual driven
automation enable OSCAL
Phase 2: MVP
generation from sheets. Deliver tool that will provide a Phase 3: Data Pre-
user friendly UI, and UUID Population Phase 4: Maturation
persisted.
Data pre-populated from GRC,
asset inventory for vulnerability Two-way integration with GRC,
management, as well integration enhanced collaboration features,
of validation rules. and format support.

Additional usability Future items including external


enhancements. publication, ConMon support,
OSCAL Builder P0 etc.

OSCAL Builder P1

OSCAL Builder P2 + Future


Proprietary + Confidential

Aligning The Data

Regulatory Decomposition
● Needed to change the way that regulations are decomposed for internal consumption and
evaluation

Establishing a granular structure for defining controls


● Need the ability to draw a straight line from the regulatory requirements, through the control
implementation, down to the individual control metrics

Refining the Asset Model


● Establish an asset taxonomy that aligns with current tooling, automation and management
capabilities, but that can also align with a common data structure (how do we consume
systems and component structures with our current asset mgmt systems)

Aggregating Data From Disparate Sources


● OSCAL definition of a control requires a higher level of granularity:
○ Complete rewrite of the GRC data model
○ Population of data from external source into centralized GRC
Example Requirement Breakdown Proprietary + Confidential

Scaling Requires:

- Diffusion of responsibility
- Granularity of requirements
to facilitate automation

OSCAL Adopted Control Mapping


Anti Virus Control from FooRAMP

Requirement ID: AC-1.a.1 Requirement ID: AC-1.a.2


Requirement Hierarchy: Access Control | Access Control Requirement Hierarchy: Access Control | Access Control
Title: Policy and Procedures Policy and Procedures
[FooRamp] AC-1: Anti Virus Requirements for Cloud Service Providers
Title: Title:
CSP Has an AntiVirus Program CSP Has an AntiVirus Program

Description: Description:
Description:
The provider has an antivirus program: The provider has an antivirus program:
The provider has an antivirus program:
1. Scans are run on prod daily 1. AV findings are assessed and
1. Scans are run on prod daily remediated within 24hrs
2. AV findings are assessed and remediated within 24hrs
3. All incoming data is scanned

Requirement ID: AC-1.b.1


Requirement Hierarchy: Access Control | Access Control
Policy and Procedures

Title:
CSP Has an AntiVirus Program

Description:
The provider has an antivirus program:
1. All incoming data is scanned
Mapping to Internal Controls & Implementation Details

Control Supporting GRC Scope(Product) Control Implementation Object in Component


Control GRC Model

CONTROL-XXXX: Control-Implementation-XXXX:
CSP has an AV program CSP has an AV program that does the following:

Control-Implementation-XXXX:
In NA DC, CSP runs daily scans using Company Foo x,y,z on all Component-XXX
CONTROL-XXXX: production systems
AV scans run daily in prod Company Foo
Control-Implementation-XXXX: Endpoint Security
Cloud - US AV scan results are sent to local NA AV-Sec teams, that work with
Suite
dev, eng, and SRE to resolve any findings in 24hr, bugs are managed
in US Issue Tracking System

CONTROL-XXXX: Control-Implementation-XXXX:
All AV findings resolved in All incoming files go through a Company Foo proxy, which scans...
24 hrs

Cloud - CA
Control-Implementation-XXXX:
CONTROL-XXXX: CSP runs scans daily using Company Bar on all prod systems Component-XXX
All incoming in data DCs is
scanned daily Company Bar
AntiVirus Scanner
Control-Implementation-XXXX:
AV scan results are sent to local CA AV-Sec teams, that work with
dev, eng, and SRE to resolve any findings in 24hr, bugs are managed
in CA Issue Tracking System

Control-Implementation-XXXX:
All files are uploaded to an FTP, and are then scanned and moved to
prod. scans done by Company Bar
Measuring Continuous Assurance
CCM Metrics: % of scans,
findings & incoming data
measured based on risk
appetite

Aggregate of CCM Metrics


Determines: CONTROL-XXXX:
● Red - down AV scans run daily in
● Yellow - warning prod
Cloud - US
● Green - up

CONTROL-XXXX:
All AV findings resolved
CONTROL-XXXX:
in 24 hrs
CSP has an AV program
Cloud - CA

CONTROL-XXXX:
All incoming in data DCs
is scanned daily

● Real time monitoring at the system component level is weighted to determine the overall effectiveness.
● Risk thresholds can be defined at more granular levels:
○ Ex: 1 missed remediation of low risk AV finding in the 24hr SLO not as critical as failed AV scans
High Level Process Proprietary + Confidential

Existing Control Modified


Net New Control Created
Systems Overview
Inputs
(Control signals, policies, risk
data, third party services,
customer commitments, contracts, OSCAL Outputs
etc.)
- SSP
Immutable Data GRC, CMDB, CCM,
Visualization of Risk,
- POAM
Storage for Threat, Risk & Loss
Controls Data - Assessment Plan & Results
Retention Data
Visualizations
- Risk Assessment/ Risk
Evidence Repository Quantification
(archival + control Systems of Record Data Analytics - Upstream / Alerting
evidence) monitoring
- Control/ Threat Mapping
and Modeling

End User Outputs


Areas of Opportunity
Proprietary + Confidential

1. Audit Toil Reduction

● Adoption Beyond US Public Sector


○ Expansion of OSCAL to include CCM
○ More regulatory bodies to adopt CCM metrics in place of manual audits & assessments
○ Participation / collaboration with regulators and standards body to establish data sharing architecture

2. Reg Analysis Toil Reduction

● Adoption of machine readable formats for compliance frameworks can greatly reduce time to analyze regs.
○ Conversion of existing regulations (banking, privacy regs) into machine readable formats
○ Aligning these formats with the different regulatory bodies
■ Potential to eliminate confusion on interpreting regulatory requirements

3. Integration of Controls with Broader IT Management & Security Operations

● Develop a mechanism to integrate CCM signals into security and incident response functions
● Incorporate control effectiveness coverage metrics into threat assessment practices
Proprietary + Confidential

Thank you.

You might also like