National Cybersecurity Center of Excellence (NCCoE) Critical Cybersecurity Hygiene: Patching the Enterprise Building Block, 5420-5421 [2019-02977]
Download as PDF
5420
Federal Register / Vol. 84, No. 35 / Thursday, February 21, 2019 / Notices
Faecke, tina.faecke@nist.gov by 5:00
p.m. Eastern Time, Wednesday, March
6, 2019. Speakers who wish to expand
upon their oral statements, those who
had wished to speak but could not be
accommodated on the agenda, and those
who were unable to participate are
invited to submit written statements to
ACEHR, National Institute of Standards
and Technology, Mail Stop 8604, 100
Bureau Drive, Gaithersburg, MD 20899,
via fax at (301) 975–4032, or
electronically by email to tina.faecke@
nist.gov.
All participants in the meeting are
required to pre-register. Anyone wishing
to participate must register by 5:00 p.m.
Eastern Time, Wednesday, March 6,
2019. Please submit your first and last
name, email address, and phone number
to Tina Faecke at tina.faecke@nist.gov or
(301) 975–5911. After pre-registering,
participants will be provided with
detailed instructions on how to join the
webinar.
Kevin A. Kimball,
Chief of Staff.
[FR Doc. 2019–02978 Filed 2–20–19; 8:45 am]
BILLING CODE 3510–13–P
DEPARTMENT OF COMMERCE
National Institute of Standards and
Technology
[Docket No.: 190204061–9061–01]
National Cybersecurity Center of
Excellence (NCCoE) Critical
Cybersecurity Hygiene: Patching the
Enterprise Building Block
National Institute of Standards
and Technology, Department of
Commerce.
ACTION: Notice.
AGENCY:
The National Institute of
Standards and Technology (NIST)
invites organizations to provide
products and technical expertise to
support and demonstrate security
platforms for the Critical Cybersecurity
Hygiene: Patching the Enterprise
Building Block. This notice is the initial
step for the National Cybersecurity
Center of Excellence (NCCoE) in
collaborating with technology
companies to address cybersecurity
challenges identified under the Critical
Cybersecurity Hygiene: Patching the
Enterprise Building Block. Participation
in the building block is open to all
interested organizations.
DATES: Collaborative activities will
commence as soon as enough completed
and signed letters of interest have been
returned to address all the necessary
amozie on DSK3GDR082PROD with NOTICES1
SUMMARY:
VerDate Sep<11>2014
17:08 Feb 20, 2019
Jkt 247001
components and capabilities, but no
earlier than March 25, 2019.
ADDRESSES: The NCCoE is located at
9700 Great Seneca Highway, Rockville,
MD 20850. Letters of interest must be
submitted to cyberhygiene@nist.gov or
via hardcopy to National Institute of
Standards and Technology, NCCoE;
9700 Great Seneca Highway, Rockville,
MD 20850. Organizations whose letters
of interest are accepted in accordance
with the process set forth in the
SUPPLEMENTARY INFORMATION section of
this notice will be asked to sign a
consortium Cooperative Research and
Development Agreement (CRADA) with
NIST. An NCCoE consortium CRADA
template can be found at: https://
www.nccoe.nist.gov/sites/default/files/
library/nccoe-consortium-cradaexample.pdf.
FOR FURTHER INFORMATION CONTACT:
Alper Kerman and Murugiah Souppaya
via email to cyberhygiene@nist.gov; by
telephone 301–975–0226 and 301–975–
8443; or by mail to National Institute of
Standards and Technology, NCCoE;
9700 Great Seneca Highway, Rockville,
MD 20850. Additional details about the
Critical Cybersecurity Hygiene: Patching
the Enterprise Building Block are
available at https://www.nccoe.nist.gov/
sites/default/files/library/projectdescriptions/ch-pe-project-descriptiondraft.pdf.
SUPPLEMENTARY INFORMATION: Interested
parties must contact NIST to request a
letter of interest template to be
completed and submitted to NIST.
Letters of interest will be accepted on a
first come, first served basis. When the
building block has been completed,
NIST will post a notice on the NCCoE
Critical Cybersecurity Hygiene: Patching
the Enterprise Building Block website at
https://www.nccoe.nist.gov/sites/
default/files/library/projectdescriptions/ch-pe-project-descriptiondraft.pdf announcing the completion of
the building block and informing the
public that it will no longer accept
letters of interest for this building block.
Background: The NCCoE, part of
NIST, is a public-private collaboration
for accelerating the widespread
adoption of integrated cybersecurity
tools and technologies. The NCCoE
brings together experts from industry,
government, and academia under one
roof to develop practical, interoperable
cybersecurity approaches that address
the real-world needs of complex
Information Technology (IT) systems.
By accelerating dissemination and use
of these integrated tools and
technologies for protecting IT assets, the
NCCoE will enhance trust in U.S. IT
communications, data, and storage
PO 00000
Frm 00017
Fmt 4703
Sfmt 4703
systems; reduce risk for companies and
individuals using IT systems; and
encourage development of innovative,
job-creating cybersecurity products and
services.
Process: NIST is soliciting responses
from all sources of relevant security
capabilities (see below) to enter into a
Cooperative Research and Development
Agreement (CRADA) to provide
products and technical expertise to
support and demonstrate security
platforms for the Critical Cybersecurity
Hygiene: Patching the Enterprise
Building Block. The full building block
can be viewed at: https://www.nccoe.
nist.gov/sites/default/files/library/
project-descriptions/ch-pe-projectdescription-draft.pdf.
Interested parties should contact NIST
using the information provided in the
FOR FURTHER INFORMATION CONTACT
section of this notice. NIST will then
provide each interested party with a
letter of interest template, which the
party must complete, certify that it is
accurate, and submit to NIST. NIST will
contact interested parties if there are
questions regarding the responsiveness
of the letters of interest to the building
block objective or requirements
identified below. NIST will select
participants who have submitted
complete letters of interest on a first
come, first served basis within each
category of product components or
capabilities listed below up to the
number of participants in each category
necessary to carry out this building
block. However, there may be
continuing opportunity to participate
even after initial activity commences.
Selected participants will be required to
enter into a consortium CRADA with
NIST (for reference, see ADDRESSES
section above). NIST published a notice
in the Federal Register on October 19,
2012 (77 FR 64314) inviting U.S.
companies to enter into National
Cybersecurity Excellence Partnerships
(NCEPs) in furtherance of the NCCoE.
For this demonstration project, NCEP
partners will not be given priority for
participation.
Building Block Objective: The
objective of this building block is to
demonstrate a proposed approach for
improving enterprise patching practices
for general IT systems. A detailed
description of the Critical Cybersecurity
Hygiene: Patching the Enterprise
Building Block is available at: https://
www.nccoe.nist.gov/sites/default/files/
library/project-descriptions/ch-peproject-description-draft.pdf.
Requirements: Each responding
organization’s letter of interest should
identify which security platform
component(s) or capability(ies) it is
E:\FR\FM\21FEN1.SGM
21FEN1
amozie on DSK3GDR082PROD with NOTICES1
Federal Register / Vol. 84, No. 35 / Thursday, February 21, 2019 / Notices
offering. Letters of interest should not
include company proprietary
information, and all components and
capabilities must be commercially
available. Components are listed in
section 3 of the Critical Cybersecurity
Hygiene: Patching the Enterprise
Building Block (for reference, please see
the link in the PROCESS section above)
and include, but are not limited to:
• Personal computers (PCs) and mobile
devices, including operating systems,
firmware, and apps
• Unified endpoint management (UEM),
enterprise mobility management
(EMM), mobile device management
(MDM), and mobile application
management (MAM) solutions
• Firewalls and intrusion detection/
protection systems
• Routers/switches
• Network-based storage
• Update sources
• Privilege access management (PAM)
system and privileged access
workstation
• Configuration management system
• Vulnerability management system
• On-premises datacenter and cloud
infrastructure, including servers,
virtual machine (VM) hosts, VMs,
containers, apps, and firmware
Each responding organization’s letter
of interest should identify how their
products address one or more of the
following desired solution
characteristics in section 2 of the
Critical Cybersecurity Hygiene: Patching
the Enterprise Building Block (for
reference, please see the link in the
PROCESS section above):
1. Free or commercial tools will be
harnessed to enable inventory
capabilities so that the assets in the form
of firmware, operating systems, and
applications across the environment can
be discovered, identified, classified for
different impact levels and then
prioritized for the order of remediation.
2. Patches will be deployed on
scheduled intervals as part of regular
release cycles, as well as on demand
upon active patching emergencies in
crisis situations to endpoint firmware,
OS, and applications hosted onpremises or in the cloud (e.g.,
Infrastructure as a Service), as well as
‘‘network devices’’ like firewalls,
Storage Area Network (SAN) devices,
routers, network switches, and other
network appliances.
3. A cloud delivery model will be
used as the mechanism for patching,
such as a mobile device or a ‘‘Windows
as a Service (WaaS)’’ model with
Windows operating systems, Apple
Software Update, and mobile software
updates for Android and iOS devices
VerDate Sep<11>2014
17:08 Feb 20, 2019
Jkt 247001
provided by device manufacturers or
mobile operators.
4. Vulnerabilities will be identified
and categorized across the assets so that
the appropriate patches can be deployed
in a prioritized order for optimum
effectiveness.
5. There will be implementation
procedures for isolation methods in
place for assets that cannot be easily
patched such as legacy unsupported
systems or systems with very high
operational availability requirements.
6. There will be stringent security
practices in place to safeguard the patch
management systems and any associated
components used to support the patch
management activities.
Responding organizations need to
understand and, in their letters of
interest, commit to provide:
1. Access for all participants’ project
teams to component interfaces and the
organization’s experts necessary to make
functional connections among security
platform components.
2. Support for development and
demonstration of the Critical
Cybersecurity Hygiene: Patching the
Enterprise Building Block in NCCoE
facilities which will be conducted in a
manner consistent with the following
standards and guidance: FIPS 200, FIPS
201, SP 800–53, SP 800–40, SP 800–184
and NIST, Framework for Improving
Critical Infrastructure Cybersecurity.
Additional details about the Critical
Cybersecurity Hygiene: Patching the
Enterprise Building Block are available
at: https://www.nccoe.nist.gov/sites/
default/files/library/projectdescriptions/ch-pe-project-descriptiondraft.pdf.
NIST cannot guarantee that all of the
products proposed by respondents will
be used in the demonstration. Each
prospective participant will be expected
to work collaboratively with NIST staff
and other project participants under the
terms of the consortium CRADA in the
development of the Critical
Cybersecurity Hygiene: Patching the
Enterprise Building Block. Prospective
participants’ contribution to the
collaborative effort will include
assistance in establishing the necessary
interface functionality, connection and
set-up capabilities and procedures,
demonstration harnesses, environmental
and safety conditions for use, integrated
platform user instructions, and
demonstration plans and scripts
necessary to demonstrate the desired
capabilities. Each participant will train
NIST personnel, as necessary, to operate
its product in capability
demonstrations. Following successful
demonstrations, NIST will publish a
description of the security platform and
PO 00000
Frm 00018
Fmt 4703
Sfmt 4703
5421
its performance characteristics sufficient
to permit other organizations to develop
and deploy security platforms that meet
the security objectives of the Critical
Cybersecurity Hygiene: Patching the
Enterprise Building Block. These
descriptions will be public information.
Under the terms of the consortium
CRADA, NIST will support
development of interfaces among
participants’ products by providing IT
infrastructure, laboratory facilities,
office facilities, collaboration facilities,
and staff support to component
composition, security platform
documentation, and demonstration
activities.
The dates of the demonstration of the
Critical Cybersecurity Hygiene: Patching
the Enterprise Building Block capability
will be announced on the NCCoE
website at least two weeks in advance
at https://nccoe.nist.gov/. The expected
outcome of the demonstration is to
improve enterprise patching practices
for general IT systems as part of a
crucial effort in maintaining a highly
effective Critical Cybersecurity Hygiene
within the enterprise. Participating
organizations will gain from the
knowledge that their products are
interoperable with other participants’
offerings.
For additional information on the
NCCoE governance, business processes,
and NCCoE operational structure, visit
the NCCoE website https://
nccoe.nist.gov/.
Kevin A. Kimball,
NIST Chief of Staff.
[FR Doc. 2019–02977 Filed 2–20–19; 8:45 am]
BILLING CODE 3510–13–P
DEPARTMENT OF COMMERCE
National Oceanic and Atmospheric
Administration
RIN 0648–XG828
Pacific Fishery Management Council;
Public Meetings
National Marine Fisheries
Service, National Oceanic and
Atmospheric Administration,
Commerce.
ACTION: Notice of public meetings.
AGENCY:
The Pacific Fishery
Management Council (Pacific Council)
and its advisory entities will hold
public meetings.
DATES: The Pacific Council and its
advisory entities will meet April 9–16,
2019. The Pacific Council meeting will
begin on Thursday, April 11, 2019 at 9
a.m. Pacific Daylight Time (PDT),
SUMMARY:
E:\FR\FM\21FEN1.SGM
21FEN1
Agencies
[Federal Register Volume 84, Number 35 (Thursday, February 21, 2019)]
[Notices]
[Pages 5420-5421]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2019-02977]
-----------------------------------------------------------------------
DEPARTMENT OF COMMERCE
National Institute of Standards and Technology
[Docket No.: 190204061-9061-01]
National Cybersecurity Center of Excellence (NCCoE) Critical
Cybersecurity Hygiene: Patching the Enterprise Building Block
AGENCY: National Institute of Standards and Technology, Department of
Commerce.
ACTION: Notice.
-----------------------------------------------------------------------
SUMMARY: The National Institute of Standards and Technology (NIST)
invites organizations to provide products and technical expertise to
support and demonstrate security platforms for the Critical
Cybersecurity Hygiene: Patching the Enterprise Building Block. This
notice is the initial step for the National Cybersecurity Center of
Excellence (NCCoE) in collaborating with technology companies to
address cybersecurity challenges identified under the Critical
Cybersecurity Hygiene: Patching the Enterprise Building Block.
Participation in the building block is open to all interested
organizations.
DATES: Collaborative activities will commence as soon as enough
completed and signed letters of interest have been returned to address
all the necessary components and capabilities, but no earlier than
March 25, 2019.
ADDRESSES: The NCCoE is located at 9700 Great Seneca Highway,
Rockville, MD 20850. Letters of interest must be submitted to
cyberhygiene@nist.gov or via hardcopy to National Institute of
Standards and Technology, NCCoE; 9700 Great Seneca Highway, Rockville,
MD 20850. Organizations whose letters of interest are accepted in
accordance with the process set forth in the SUPPLEMENTARY INFORMATION
section of this notice will be asked to sign a consortium Cooperative
Research and Development Agreement (CRADA) with NIST. An NCCoE
consortium CRADA template can be found at: https://www.nccoe.nist.gov/sites/default/files/library/nccoe-consortium-crada-example.pdf.
FOR FURTHER INFORMATION CONTACT: Alper Kerman and Murugiah Souppaya via
email to cyberhygiene@nist.gov; by telephone 301-975-0226 and 301-975-
8443; or by mail to National Institute of Standards and Technology,
NCCoE; 9700 Great Seneca Highway, Rockville, MD 20850. Additional
details about the Critical Cybersecurity Hygiene: Patching the
Enterprise Building Block are available at https://www.nccoe.nist.gov/sites/default/files/library/project-descriptions/ch-pe-project-description-draft.pdf.
SUPPLEMENTARY INFORMATION: Interested parties must contact NIST to
request a letter of interest template to be completed and submitted to
NIST. Letters of interest will be accepted on a first come, first
served basis. When the building block has been completed, NIST will
post a notice on the NCCoE Critical Cybersecurity Hygiene: Patching the
Enterprise Building Block website at https://www.nccoe.nist.gov/sites/default/files/library/project-descriptions/ch-pe-project-description-draft.pdf announcing the completion of the building block and informing
the public that it will no longer accept letters of interest for this
building block.
Background: The NCCoE, part of NIST, is a public-private
collaboration for accelerating the widespread adoption of integrated
cybersecurity tools and technologies. The NCCoE brings together experts
from industry, government, and academia under one roof to develop
practical, interoperable cybersecurity approaches that address the
real-world needs of complex Information Technology (IT) systems. By
accelerating dissemination and use of these integrated tools and
technologies for protecting IT assets, the NCCoE will enhance trust in
U.S. IT communications, data, and storage systems; reduce risk for
companies and individuals using IT systems; and encourage development
of innovative, job-creating cybersecurity products and services.
Process: NIST is soliciting responses from all sources of relevant
security capabilities (see below) to enter into a Cooperative Research
and Development Agreement (CRADA) to provide products and technical
expertise to support and demonstrate security platforms for the
Critical Cybersecurity Hygiene: Patching the Enterprise Building Block.
The full building block can be viewed at: https://www.nccoe.nist.gov/sites/default/files/library/project-descriptions/ch-pe-project-description-draft.pdf.
Interested parties should contact NIST using the information
provided in the FOR FURTHER INFORMATION CONTACT section of this notice.
NIST will then provide each interested party with a letter of interest
template, which the party must complete, certify that it is accurate,
and submit to NIST. NIST will contact interested parties if there are
questions regarding the responsiveness of the letters of interest to
the building block objective or requirements identified below. NIST
will select participants who have submitted complete letters of
interest on a first come, first served basis within each category of
product components or capabilities listed below up to the number of
participants in each category necessary to carry out this building
block. However, there may be continuing opportunity to participate even
after initial activity commences. Selected participants will be
required to enter into a consortium CRADA with NIST (for reference, see
ADDRESSES section above). NIST published a notice in the Federal
Register on October 19, 2012 (77 FR 64314) inviting U.S. companies to
enter into National Cybersecurity Excellence Partnerships (NCEPs) in
furtherance of the NCCoE. For this demonstration project, NCEP partners
will not be given priority for participation.
Building Block Objective: The objective of this building block is
to demonstrate a proposed approach for improving enterprise patching
practices for general IT systems. A detailed description of the
Critical Cybersecurity Hygiene: Patching the Enterprise Building Block
is available at: https://www.nccoe.nist.gov/sites/default/files/library/project-descriptions/ch-pe-project-description-draft.pdf.
Requirements: Each responding organization's letter of interest
should identify which security platform component(s) or capability(ies)
it is
[[Page 5421]]
offering. Letters of interest should not include company proprietary
information, and all components and capabilities must be commercially
available. Components are listed in section 3 of the Critical
Cybersecurity Hygiene: Patching the Enterprise Building Block (for
reference, please see the link in the PROCESS section above) and
include, but are not limited to:
Personal computers (PCs) and mobile devices, including
operating systems, firmware, and apps
Unified endpoint management (UEM), enterprise mobility
management (EMM), mobile device management (MDM), and mobile
application management (MAM) solutions
Firewalls and intrusion detection/protection systems
Routers/switches
Network-based storage
Update sources
Privilege access management (PAM) system and privileged access
workstation
Configuration management system
Vulnerability management system
On-premises datacenter and cloud infrastructure, including
servers, virtual machine (VM) hosts, VMs, containers, apps, and
firmware
Each responding organization's letter of interest should identify
how their products address one or more of the following desired
solution characteristics in section 2 of the Critical Cybersecurity
Hygiene: Patching the Enterprise Building Block (for reference, please
see the link in the PROCESS section above):
1. Free or commercial tools will be harnessed to enable inventory
capabilities so that the assets in the form of firmware, operating
systems, and applications across the environment can be discovered,
identified, classified for different impact levels and then prioritized
for the order of remediation.
2. Patches will be deployed on scheduled intervals as part of
regular release cycles, as well as on demand upon active patching
emergencies in crisis situations to endpoint firmware, OS, and
applications hosted on-premises or in the cloud (e.g., Infrastructure
as a Service), as well as ``network devices'' like firewalls, Storage
Area Network (SAN) devices, routers, network switches, and other
network appliances.
3. A cloud delivery model will be used as the mechanism for
patching, such as a mobile device or a ``Windows as a Service (WaaS)''
model with Windows operating systems, Apple Software Update, and mobile
software updates for Android and iOS devices provided by device
manufacturers or mobile operators.
4. Vulnerabilities will be identified and categorized across the
assets so that the appropriate patches can be deployed in a prioritized
order for optimum effectiveness.
5. There will be implementation procedures for isolation methods in
place for assets that cannot be easily patched such as legacy
unsupported systems or systems with very high operational availability
requirements.
6. There will be stringent security practices in place to safeguard
the patch management systems and any associated components used to
support the patch management activities.
Responding organizations need to understand and, in their letters
of interest, commit to provide:
1. Access for all participants' project teams to component
interfaces and the organization's experts necessary to make functional
connections among security platform components.
2. Support for development and demonstration of the Critical
Cybersecurity Hygiene: Patching the Enterprise Building Block in NCCoE
facilities which will be conducted in a manner consistent with the
following standards and guidance: FIPS 200, FIPS 201, SP 800-53, SP
800-40, SP 800-184 and NIST, Framework for Improving Critical
Infrastructure Cybersecurity.
Additional details about the Critical Cybersecurity Hygiene:
Patching the Enterprise Building Block are available at: https://www.nccoe.nist.gov/sites/default/files/library/project-descriptions/ch-pe-project-description-draft.pdf.
NIST cannot guarantee that all of the products proposed by
respondents will be used in the demonstration. Each prospective
participant will be expected to work collaboratively with NIST staff
and other project participants under the terms of the consortium CRADA
in the development of the Critical Cybersecurity Hygiene: Patching the
Enterprise Building Block. Prospective participants' contribution to
the collaborative effort will include assistance in establishing the
necessary interface functionality, connection and set-up capabilities
and procedures, demonstration harnesses, environmental and safety
conditions for use, integrated platform user instructions, and
demonstration plans and scripts necessary to demonstrate the desired
capabilities. Each participant will train NIST personnel, as necessary,
to operate its product in capability demonstrations. Following
successful demonstrations, NIST will publish a description of the
security platform and its performance characteristics sufficient to
permit other organizations to develop and deploy security platforms
that meet the security objectives of the Critical Cybersecurity
Hygiene: Patching the Enterprise Building Block. These descriptions
will be public information.
Under the terms of the consortium CRADA, NIST will support
development of interfaces among participants' products by providing IT
infrastructure, laboratory facilities, office facilities, collaboration
facilities, and staff support to component composition, security
platform documentation, and demonstration activities.
The dates of the demonstration of the Critical Cybersecurity
Hygiene: Patching the Enterprise Building Block capability will be
announced on the NCCoE website at least two weeks in advance at https://nccoe.nist.gov/. The expected outcome of the demonstration is to
improve enterprise patching practices for general IT systems as part of
a crucial effort in maintaining a highly effective Critical
Cybersecurity Hygiene within the enterprise. Participating
organizations will gain from the knowledge that their products are
interoperable with other participants' offerings.
For additional information on the NCCoE governance, business
processes, and NCCoE operational structure, visit the NCCoE website
https://nccoe.nist.gov/.
Kevin A. Kimball,
NIST Chief of Staff.
[FR Doc. 2019-02977 Filed 2-20-19; 8:45 am]
BILLING CODE 3510-13-P