National Cybersecurity Center of Excellence (NCCoE) Protecting Information and System Integrity in Industrial Control System Environments for the Manufacturing Sector, 7286-7287 [2020-02436]
Download as PDF
7286
Federal Register / Vol. 85, No. 26 / Friday, February 7, 2020 / Notices
252. White River Forest Products L.P.
253. Winton Homes Ltd.
254. Woodline Forest Products Ltd.
255. Woodstock Forest Products
256. Woodtone Specialties Inc.
257. Yarrow Wood Ltd.
[FR Doc. 2020–02471 Filed 2–6–20; 8:45 am]
BILLING CODE 3510–DS–P
DEPARTMENT OF COMMERCE
Michael Powell via email at
michael.powell@nist.gov; by telephone
301–975–0310; or by mail to National
Institute of Standards and Technology,
NCCoE; 9700 Great Seneca Highway,
Rockville, MD 20850. Additional details
about the Manufacturing sector program
are available at https://
www.nccoe.nist.gov/projects/use-cases/
Manufacturing.
Interested
parties must contact NIST to request a
letter of interest template to be
[Docket No. 200113–0014]
completed and submitted to NIST.
Letters of interest will be accepted on a
National Cybersecurity Center of
first come, first served basis. When the
Excellence (NCCoE) Protecting
use case has been completed, NIST will
Information and System Integrity in
post a notice on the NCCoE
Industrial Control System
Manufacturing sector program website
Environments for the Manufacturing
at https://www.nccoe.nist.gov/projects/
Sector
use-cases/manufacturing/integrity-ics
AGENCY: National Institute of Standards
announcing the completion of the use
and Technology, Department of
case and informing the public that it
Commerce.
will no longer accept letters of interest
ACTION: Notice.
for this use case.
Background: The NCCoE, part of
SUMMARY: The National Institute of
NIST, is a public-private collaboration
Standards and Technology (NIST)
for accelerating the widespread
invites organizations to provide
adoption of integrated cybersecurity
products and technical expertise to
tools and technologies. The NCCoE
support and demonstrate security
brings together experts from industry,
platforms for Protecting Information and government, and academia under one
System Integrity in Industrial Control
roof to develop practical, interoperable
System Environments for the
cybersecurity approaches that address
Manufacturing sector. This notice is the the real-world needs of complex
initial step for the National
Information Technology (IT) systems.
Cybersecurity Center of Excellence
By accelerating dissemination and use
(NCCoE) in collaborating with
of these integrated tools and
technology companies to address
technologies for protecting IT assets, the
cybersecurity challenges identified
NCCoE will enhance trust in U.S. IT
under the Manufacturing sector
communications, data, and storage
program. Participation in the use case is systems; reduce risk for companies and
open to all interested organizations.
individuals using IT systems; and
DATES: Collaborative activities will
encourage development of innovative,
commence as soon as enough completed job-creating cybersecurity products and
and signed letters of interest have been
services.
returned to address all the necessary
Process: NIST is soliciting responses
components and capabilities, but no
from all sources of relevant security
earlier than March 9, 2020.
capabilities (see below) to enter into a
ADDRESSES: The NCCoE is located at
CRADA to provide products and
9700 Great Seneca Highway, Rockville,
technical expertise to support and
MD 20850. Letters of interest must be
demonstrate security platforms for the
submitted to Manufacturing_nccoe@
Protecting Information and System
nist.gov or via hardcopy to National
Integrity in Industrial Control System
Institute of Standards and Technology,
Environments project for the
NCCoE; 9700 Great Seneca Highway,
Manufacturing sector. The full use case
Rockville, MD 20850. Organizations
can be viewed at: https://
whose letters of interest are accepted in
www.nccoe.nist.gov/projects/use-cases/
accordance with the process set forth in manufacturing/integrity-ics.
Interested parties should contact NIST
the SUPPLEMENTARY INFORMATION section
using the information provided in the
of this notice will be asked to sign a
consortium Cooperative Research and
FOR FURTHER INFORMATION CONTACT
Development Agreement (CRADA) with section of this notice. NIST will then
NIST. An NCCoE consortium CRADA
provide each interested party with a
template can be found at: https://
letter of interest template, which the
www.nccoe.nist.gov/library/nccoeparty must complete, certify that it is
consortium-crada-example.
accurate, and submit to NIST. NIST will
National Institute of Standards and
Technology
jbell on DSKJLSW7X2PROD with NOTICES
FOR FURTHER INFORMATION CONTACT:
VerDate Sep<11>2014
17:42 Feb 06, 2020
Jkt 250001
SUPPLEMENTARY INFORMATION:
PO 00000
Frm 00022
Fmt 4703
Sfmt 4703
contact interested parties if there are
questions regarding the responsiveness
of the letters of interest to the use case
objective or requirements identified
below. NIST will select participants
who have submitted complete letters of
interest on a first come, first served
basis within each category of product
components or capabilities listed below
up to the number of participants in each
category necessary to carry out this use
case. However, there may be continuing
opportunity to participate even after
initial activity commences. Selected
participants will be required to enter
into a consortium CRADA with NIST
(for reference, see ADDRESSES section
above). NIST published a notice in the
Federal Register on October 19, 2012
(77 FR 64314) inviting U.S. companies
to enter into National Cybersecurity
Excellence Partnerships (NCEPs) in
furtherance of the NCCoE. For this
demonstration project, NCEP partners
will not be given priority for
participation.
In March 2016, NIST issued a similar
call for collaboration for a Securing
Manufacturing Industrial Control
Systems: Behavioral Anomaly Detection
use case which can be found here:
https://www.nccoe.nist.gov/projects/
use-cases/manufacturing/integrity-ics.
This collaborative project was originally
intended to yield a NIST Cybersecurity
Practice Guide, but instead resulted in
the publication of NISTIR 8219,
Securing Manufacturing Industrial
Control Systems: Behavioral Anomaly
Detection, https://www.nccoe.nist.gov/
sites/default/files/library/mf-ics-nistir8219.pdf. NIST anticipates that the
collaborators who contributed to
development of NISTIR 8219 will also
participate in this use case.
Use Case Objective: The objectives of
this project are to provide a proposed
approach to prevent, mitigate, and
detect threats from cyber attacks or
insider threats within a Manufacturing
industrial control system (ICS)
environment, and demonstrate how the
commercially available technologies
deployed in this build provide
cybersecurity capabilities that
Manufacturing organizations can use to
secure their operational technology (OT)
systems.
A detailed description of the
Protecting Information and System
Integrity in Industrial Control System
Environments is available at: https://
www.nccoe.nist.gov/projects/use-cases/
manufacturing/integrity-ics.
Requirements: Each responding
organization’s letter of interest should
identify which security platform
component(s) or capability(ies) it is
offering. Letters of interest should not
E:\FR\FM\07FEN1.SGM
07FEN1
jbell on DSKJLSW7X2PROD with NOTICES
Federal Register / Vol. 85, No. 26 / Friday, February 7, 2020 / Notices
include company proprietary
information, and all components and
capabilities must be commercially
available. Components are listed in
Section 6 of the Protecting Information
and System Integrity in Industrial
Control System Environments for the
Manufacturing use case (for reference,
please see the link in the Process section
above) and include, but are not limited
to:
• ICS application white-listing tools
• ICS behavioral anomaly detection
tools
• security incident and event
monitoring
• malware detection and mitigation
• change control management
• access control
• file-integrity-checking mechanisms
• user authentication and authorization
Each responding organization’s letter
of interest should identify how their
products address one or more of the
following desired solution
characteristics in section 6 of the
Protecting Information and System
Integrity in Industrial Control System
Environments for the Manufacturing use
case (for reference, please see the link in
the Process section above):
1. Tracking of approved software
applications that are permitted to be
present and active on the network
2. continuous monitoring of a network
for unusual events or data packet trends
process of identifying, monitoring,
recording, and analyzing security events
or incidents within a real-time OT
environment
3. detection of malicious software
designed to cause damage to a
computer, server, or computer network
4. monitoring for unapproved
changes, that all changes are
documented, and that services are not
unnecessarily disrupted
5. validation of access to the ICS
network by authenticated users
6. validation of operating system and
application software file integrity
Responding organizations need to
understand and, in their letters of
interest, commit to provide:
1. Access for all participants’ project
teams to component interfaces and the
organization’s experts necessary to make
functional connections among security
platform components
2. Support for development and
demonstration of the Protecting
Information and System Integrity in
Industrial Control System Environments
for the Manufacturing sector use case in
NCCoE facilities which will be
conducted in a manner consistent with
the following standards and guidance:
FIPS 200, FIPS 201, and SP 800–53.
VerDate Sep<11>2014
17:42 Feb 06, 2020
Jkt 250001
Additional details about the
Protecting Information and System
Integrity in Industrial Control System
Environments for the Manufacturing
sector use case are available at: https://
www.nccoe.nist.gov/projects/use-cases/
manufacturing/integrity-ics.
NIST cannot guarantee that all of the
products proposed by respondents will
be used in the demonstration. Each
prospective participant will be expected
to work collaboratively with NIST staff
and other project participants under the
terms of the consortium CRADA in the
development of the Protecting
Information and System Integrity in
Industrial Control System Environments
for the Manufacturing sector capability.
Prospective participants’ contribution to
the collaborative effort will include
assistance in establishing the necessary
interface functionality, connection and
set-up capabilities and procedures,
demonstration harnesses, environmental
and safety conditions for use, integrated
platform user instructions, and
demonstration plans and scripts
necessary to demonstrate the desired
capabilities. Each participant will train
NIST personnel, as necessary, to operate
its product in capability demonstrations
to the Manufacturing community.
Following successful demonstrations,
NIST will publish a description of the
security platform and its performance
characteristics sufficient to permit other
organizations to develop and deploy
security platforms that meet the security
objectives of the Protecting Information
and System Integrity in Industrial
Control System Environments for the
Manufacturing sector use case. These
descriptions will be public information.
Under the terms of the consortium
CRADA, NIST will support
development of interfaces among
participants’ products by providing IT
infrastructure, laboratory facilities,
office facilities, collaboration facilities,
and staff support to component
composition, security platform
documentation, and demonstration
activities.
The dates of the demonstration of the
Protecting Information and System
Integrity in Industrial Control System
Environments for the Manufacturing
sector capability will be announced on
the NCCoE website at least two weeks
in advance at https://nccoe.nist.gov/.
The expected outcome of the
demonstration is to improve security to
Manufacturing environments by
demonstrating how Manufacturing
organizations can take a comprehensive
approach to protecting the data integrity
of their industrial control systems.
Participating organizations will gain
from the knowledge that their products
PO 00000
Frm 00023
Fmt 4703
Sfmt 4703
7287
are interoperable with other
participants’ offerings.
For additional information on the
NCCoE governance, business processes,
and NCCoE operational structure, visit
the NCCoE website https://
nccoe.nist.gov/.
Kevin A. Kimball,
Chief of Staff.
[FR Doc. 2020–02436 Filed 2–6–20; 8:45 am]
BILLING CODE 3510–13–P
DEPARTMENT OF COMMERCE
National Oceanic and Atmospheric
Administration
[RTID 0648–XA029]
Pacific Fishery Management Council;
Public Meeting
National Marine Fisheries
Service (NMFS), National Oceanic and
Atmospheric Administration (NOAA),
Commerce.
ACTION: Notice of public meeting
(webinar).
AGENCY:
The Pacific Fishery
Management Council’s (Pacific Council)
Ad Hoc Ecosystem Workgroup (EWG)
will hold a webinar, which is open to
the public.
DATES: The webinar will be held
Tuesday, February 25, 2020, from 1:30
p.m. to 4:30 p.m. Pacific Standard Time,
or when business for the day has been
completed.
ADDRESSES: A public listening station is
available at the Pacific Council office
(address below). To attend the webinar
(1) join the meeting by using this link:
https://meetings.ringcentral.com/join,
(2) enter the Meeting ID provided in the
meeting announcement (see https://
www.pcouncil.org) and click JOIN, (3)
you will be prompted to either
download the RingCentral meetings
application or join the meeting without
a download via your web browser, and
(4) enter your name and click JOIN.
NOTE: We require all participants to use
a telephone or cell phone to participate.
(1) You must use your telephone for the
audio portion of the meeting by dialing
the TOLL number provided on your
screen followed by the meeting ID and
participant ID, also provided on the
screen. (2) Once connected, you will be
in the meeting, seeing other participants
and a shared screen, if applicable.
Technical Information and System
Requirements: PC-based attendees are
required to use Windows® 10, 8; Mac®based attendees are required to use Mac
OS® X 10.5 or newer; Mobile attendees
are required to use iPhone®, iPad®,
SUMMARY:
E:\FR\FM\07FEN1.SGM
07FEN1
Agencies
[Federal Register Volume 85, Number 26 (Friday, February 7, 2020)]
[Notices]
[Pages 7286-7287]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2020-02436]
-----------------------------------------------------------------------
DEPARTMENT OF COMMERCE
National Institute of Standards and Technology
[Docket No. 200113-0014]
National Cybersecurity Center of Excellence (NCCoE) Protecting
Information and System Integrity in Industrial Control System
Environments for the Manufacturing Sector
AGENCY: National Institute of Standards and Technology, Department of
Commerce.
ACTION: Notice.
-----------------------------------------------------------------------
SUMMARY: The National Institute of Standards and Technology (NIST)
invites organizations to provide products and technical expertise to
support and demonstrate security platforms for Protecting Information
and System Integrity in Industrial Control System Environments for the
Manufacturing sector. This notice is the initial step for the National
Cybersecurity Center of Excellence (NCCoE) in collaborating with
technology companies to address cybersecurity challenges identified
under the Manufacturing sector program. Participation in the use case
is open to all interested organizations.
DATES: Collaborative activities will commence as soon as enough
completed and signed letters of interest have been returned to address
all the necessary components and capabilities, but no earlier than
March 9, 2020.
ADDRESSES: The NCCoE is located at 9700 Great Seneca Highway,
Rockville, MD 20850. Letters of interest must be submitted to
[email protected] or via hardcopy to National Institute of
Standards and Technology, NCCoE; 9700 Great Seneca Highway, Rockville,
MD 20850. Organizations whose letters of interest are accepted in
accordance with the process set forth in the SUPPLEMENTARY INFORMATION
section of this notice will be asked to sign a consortium Cooperative
Research and Development Agreement (CRADA) with NIST. An NCCoE
consortium CRADA template can be found at: https://www.nccoe.nist.gov/library/nccoe-consortium-crada-example.
FOR FURTHER INFORMATION CONTACT: Michael Powell via email at
[email protected]; by telephone 301-975-0310; or by mail to
National Institute of Standards and Technology, NCCoE; 9700 Great
Seneca Highway, Rockville, MD 20850. Additional details about the
Manufacturing sector program are available at https://www.nccoe.nist.gov/projects/use-cases/Manufacturing.
SUPPLEMENTARY INFORMATION: Interested parties must contact NIST to
request a letter of interest template to be completed and submitted to
NIST. Letters of interest will be accepted on a first come, first
served basis. When the use case has been completed, NIST will post a
notice on the NCCoE Manufacturing sector program website at https://www.nccoe.nist.gov/projects/use-cases/manufacturing/integrity-ics
announcing the completion of the use case and informing the public that
it will no longer accept letters of interest for this use case.
Background: The NCCoE, part of NIST, is a public-private
collaboration for accelerating the widespread adoption of integrated
cybersecurity tools and technologies. The NCCoE brings together experts
from industry, government, and academia under one roof to develop
practical, interoperable cybersecurity approaches that address the
real-world needs of complex Information Technology (IT) systems. By
accelerating dissemination and use of these integrated tools and
technologies for protecting IT assets, the NCCoE will enhance trust in
U.S. IT communications, data, and storage systems; reduce risk for
companies and individuals using IT systems; and encourage development
of innovative, job-creating cybersecurity products and services.
Process: NIST is soliciting responses from all sources of relevant
security capabilities (see below) to enter into a CRADA to provide
products and technical expertise to support and demonstrate security
platforms for the Protecting Information and System Integrity in
Industrial Control System Environments project for the Manufacturing
sector. The full use case can be viewed at: https://www.nccoe.nist.gov/projects/use-cases/manufacturing/integrity-ics.
Interested parties should contact NIST using the information
provided in the FOR FURTHER INFORMATION CONTACT section of this notice.
NIST will then provide each interested party with a letter of interest
template, which the party must complete, certify that it is accurate,
and submit to NIST. NIST will contact interested parties if there are
questions regarding the responsiveness of the letters of interest to
the use case objective or requirements identified below. NIST will
select participants who have submitted complete letters of interest on
a first come, first served basis within each category of product
components or capabilities listed below up to the number of
participants in each category necessary to carry out this use case.
However, there may be continuing opportunity to participate even after
initial activity commences. Selected participants will be required to
enter into a consortium CRADA with NIST (for reference, see ADDRESSES
section above). NIST published a notice in the Federal Register on
October 19, 2012 (77 FR 64314) inviting U.S. companies to enter into
National Cybersecurity Excellence Partnerships (NCEPs) in furtherance
of the NCCoE. For this demonstration project, NCEP partners will not be
given priority for participation.
In March 2016, NIST issued a similar call for collaboration for a
Securing Manufacturing Industrial Control Systems: Behavioral Anomaly
Detection use case which can be found here: https://www.nccoe.nist.gov/projects/use-cases/manufacturing/integrity-ics. This collaborative
project was originally intended to yield a NIST Cybersecurity Practice
Guide, but instead resulted in the publication of NISTIR 8219, Securing
Manufacturing Industrial Control Systems: Behavioral Anomaly Detection,
https://www.nccoe.nist.gov/sites/default/files/library/mf-ics-nistir-8219.pdf. NIST anticipates that the collaborators who contributed to
development of NISTIR 8219 will also participate in this use case.
Use Case Objective: The objectives of this project are to provide a
proposed approach to prevent, mitigate, and detect threats from cyber
attacks or insider threats within a Manufacturing industrial control
system (ICS) environment, and demonstrate how the commercially
available technologies deployed in this build provide cybersecurity
capabilities that Manufacturing organizations can use to secure their
operational technology (OT) systems.
A detailed description of the Protecting Information and System
Integrity in Industrial Control System Environments is available at:
https://www.nccoe.nist.gov/projects/use-cases/manufacturing/integrity-ics.
Requirements: Each responding organization's letter of interest
should identify which security platform component(s) or capability(ies)
it is offering. Letters of interest should not
[[Page 7287]]
include company proprietary information, and all components and
capabilities must be commercially available. Components are listed in
Section 6 of the Protecting Information and System Integrity in
Industrial Control System Environments for the Manufacturing use case
(for reference, please see the link in the Process section above) and
include, but are not limited to:
ICS application white-listing tools
ICS behavioral anomaly detection tools
security incident and event monitoring
malware detection and mitigation
change control management
access control
file-integrity-checking mechanisms
user authentication and authorization
Each responding organization's letter of interest should identify
how their products address one or more of the following desired
solution characteristics in section 6 of the Protecting Information and
System Integrity in Industrial Control System Environments for the
Manufacturing use case (for reference, please see the link in the
Process section above):
1. Tracking of approved software applications that are permitted to
be present and active on the network
2. continuous monitoring of a network for unusual events or data
packet trends process of identifying, monitoring, recording, and
analyzing security events or incidents within a real-time OT
environment
3. detection of malicious software designed to cause damage to a
computer, server, or computer network
4. monitoring for unapproved changes, that all changes are
documented, and that services are not unnecessarily disrupted
5. validation of access to the ICS network by authenticated users
6. validation of operating system and application software file
integrity
Responding organizations need to understand and, in their letters
of interest, commit to provide:
1. Access for all participants' project teams to component
interfaces and the organization's experts necessary to make functional
connections among security platform components
2. Support for development and demonstration of the Protecting
Information and System Integrity in Industrial Control System
Environments for the Manufacturing sector use case in NCCoE facilities
which will be conducted in a manner consistent with the following
standards and guidance: FIPS 200, FIPS 201, and SP 800-53.
Additional details about the Protecting Information and System
Integrity in Industrial Control System Environments for the
Manufacturing sector use case are available at: https://www.nccoe.nist.gov/projects/use-cases/manufacturing/integrity-ics.
NIST cannot guarantee that all of the products proposed by
respondents will be used in the demonstration. Each prospective
participant will be expected to work collaboratively with NIST staff
and other project participants under the terms of the consortium CRADA
in the development of the Protecting Information and System Integrity
in Industrial Control System Environments for the Manufacturing sector
capability. Prospective participants' contribution to the collaborative
effort will include assistance in establishing the necessary interface
functionality, connection and set-up capabilities and procedures,
demonstration harnesses, environmental and safety conditions for use,
integrated platform user instructions, and demonstration plans and
scripts necessary to demonstrate the desired capabilities. Each
participant will train NIST personnel, as necessary, to operate its
product in capability demonstrations to the Manufacturing community.
Following successful demonstrations, NIST will publish a description of
the security platform and its performance characteristics sufficient to
permit other organizations to develop and deploy security platforms
that meet the security objectives of the Protecting Information and
System Integrity in Industrial Control System Environments for the
Manufacturing sector use case. These descriptions will be public
information.
Under the terms of the consortium CRADA, NIST will support
development of interfaces among participants' products by providing IT
infrastructure, laboratory facilities, office facilities, collaboration
facilities, and staff support to component composition, security
platform documentation, and demonstration activities.
The dates of the demonstration of the Protecting Information and
System Integrity in Industrial Control System Environments for the
Manufacturing sector capability will be announced on the NCCoE website
at least two weeks in advance at https://nccoe.nist.gov/. The expected
outcome of the demonstration is to improve security to Manufacturing
environments by demonstrating how Manufacturing organizations can take
a comprehensive approach to protecting the data integrity of their
industrial control systems. Participating organizations will gain from
the knowledge that their products are interoperable with other
participants' offerings.
For additional information on the NCCoE governance, business
processes, and NCCoE operational structure, visit the NCCoE website
https://nccoe.nist.gov/.
Kevin A. Kimball,
Chief of Staff.
[FR Doc. 2020-02436 Filed 2-6-20; 8:45 am]
BILLING CODE 3510-13-P