National Cybersecurity Center of Excellence (NCCoE) Protecting Information and System Integrity in Industrial Control System Environments for the Manufacturing Sector, 7286-7287 [2020-02436]

Download as PDF 7286 Federal Register / Vol. 85, No. 26 / Friday, February 7, 2020 / Notices 252. White River Forest Products L.P. 253. Winton Homes Ltd. 254. Woodline Forest Products Ltd. 255. Woodstock Forest Products 256. Woodtone Specialties Inc. 257. Yarrow Wood Ltd. [FR Doc. 2020–02471 Filed 2–6–20; 8:45 am] BILLING CODE 3510–DS–P DEPARTMENT OF COMMERCE Michael Powell via email at michael.powell@nist.gov; by telephone 301–975–0310; or by mail to National Institute of Standards and Technology, NCCoE; 9700 Great Seneca Highway, Rockville, MD 20850. Additional details about the Manufacturing sector program are available at https:// www.nccoe.nist.gov/projects/use-cases/ Manufacturing. Interested parties must contact NIST to request a letter of interest template to be [Docket No. 200113–0014] completed and submitted to NIST. Letters of interest will be accepted on a National Cybersecurity Center of first come, first served basis. When the Excellence (NCCoE) Protecting use case has been completed, NIST will Information and System Integrity in post a notice on the NCCoE Industrial Control System Manufacturing sector program website Environments for the Manufacturing at https://www.nccoe.nist.gov/projects/ Sector use-cases/manufacturing/integrity-ics AGENCY: National Institute of Standards announcing the completion of the use and Technology, Department of case and informing the public that it Commerce. will no longer accept letters of interest ACTION: Notice. for this use case. Background: The NCCoE, part of SUMMARY: The National Institute of NIST, is a public-private collaboration Standards and Technology (NIST) for accelerating the widespread invites organizations to provide adoption of integrated cybersecurity products and technical expertise to tools and technologies. The NCCoE support and demonstrate security brings together experts from industry, platforms for Protecting Information and government, and academia under one System Integrity in Industrial Control roof to develop practical, interoperable System Environments for the cybersecurity approaches that address Manufacturing sector. This notice is the the real-world needs of complex initial step for the National Information Technology (IT) systems. Cybersecurity Center of Excellence By accelerating dissemination and use (NCCoE) in collaborating with of these integrated tools and technology companies to address technologies for protecting IT assets, the cybersecurity challenges identified NCCoE will enhance trust in U.S. IT under the Manufacturing sector communications, data, and storage program. Participation in the use case is systems; reduce risk for companies and open to all interested organizations. individuals using IT systems; and DATES: Collaborative activities will encourage development of innovative, commence as soon as enough completed job-creating cybersecurity products and and signed letters of interest have been services. returned to address all the necessary Process: NIST is soliciting responses components and capabilities, but no from all sources of relevant security earlier than March 9, 2020. capabilities (see below) to enter into a ADDRESSES: The NCCoE is located at CRADA to provide products and 9700 Great Seneca Highway, Rockville, technical expertise to support and MD 20850. Letters of interest must be demonstrate security platforms for the submitted to Manufacturing_nccoe@ Protecting Information and System nist.gov or via hardcopy to National Integrity in Industrial Control System Institute of Standards and Technology, Environments project for the NCCoE; 9700 Great Seneca Highway, Manufacturing sector. The full use case Rockville, MD 20850. Organizations can be viewed at: https:// whose letters of interest are accepted in www.nccoe.nist.gov/projects/use-cases/ accordance with the process set forth in manufacturing/integrity-ics. Interested parties should contact NIST the SUPPLEMENTARY INFORMATION section using the information provided in the of this notice will be asked to sign a consortium Cooperative Research and FOR FURTHER INFORMATION CONTACT Development Agreement (CRADA) with section of this notice. NIST will then NIST. An NCCoE consortium CRADA provide each interested party with a template can be found at: https:// letter of interest template, which the www.nccoe.nist.gov/library/nccoeparty must complete, certify that it is consortium-crada-example. accurate, and submit to NIST. NIST will National Institute of Standards and Technology jbell on DSKJLSW7X2PROD with NOTICES FOR FURTHER INFORMATION CONTACT: VerDate Sep<11>2014 17:42 Feb 06, 2020 Jkt 250001 SUPPLEMENTARY INFORMATION: PO 00000 Frm 00022 Fmt 4703 Sfmt 4703 contact interested parties if there are questions regarding the responsiveness of the letters of interest to the use case objective or requirements identified below. NIST will select participants who have submitted complete letters of interest on a first come, first served basis within each category of product components or capabilities listed below up to the number of participants in each category necessary to carry out this use case. However, there may be continuing opportunity to participate even after initial activity commences. Selected participants will be required to enter into a consortium CRADA with NIST (for reference, see ADDRESSES section above). NIST published a notice in the Federal Register on October 19, 2012 (77 FR 64314) inviting U.S. companies to enter into National Cybersecurity Excellence Partnerships (NCEPs) in furtherance of the NCCoE. For this demonstration project, NCEP partners will not be given priority for participation. In March 2016, NIST issued a similar call for collaboration for a Securing Manufacturing Industrial Control Systems: Behavioral Anomaly Detection use case which can be found here: https://www.nccoe.nist.gov/projects/ use-cases/manufacturing/integrity-ics. This collaborative project was originally intended to yield a NIST Cybersecurity Practice Guide, but instead resulted in the publication of NISTIR 8219, Securing Manufacturing Industrial Control Systems: Behavioral Anomaly Detection, https://www.nccoe.nist.gov/ sites/default/files/library/mf-ics-nistir8219.pdf. NIST anticipates that the collaborators who contributed to development of NISTIR 8219 will also participate in this use case. Use Case Objective: The objectives of this project are to provide a proposed approach to prevent, mitigate, and detect threats from cyber attacks or insider threats within a Manufacturing industrial control system (ICS) environment, and demonstrate how the commercially available technologies deployed in this build provide cybersecurity capabilities that Manufacturing organizations can use to secure their operational technology (OT) systems. A detailed description of the Protecting Information and System Integrity in Industrial Control System Environments is available at: https:// www.nccoe.nist.gov/projects/use-cases/ manufacturing/integrity-ics. Requirements: Each responding organization’s letter of interest should identify which security platform component(s) or capability(ies) it is offering. Letters of interest should not E:\FR\FM\07FEN1.SGM 07FEN1 jbell on DSKJLSW7X2PROD with NOTICES Federal Register / Vol. 85, No. 26 / Friday, February 7, 2020 / Notices include company proprietary information, and all components and capabilities must be commercially available. Components are listed in Section 6 of the Protecting Information and System Integrity in Industrial Control System Environments for the Manufacturing use case (for reference, please see the link in the Process section above) and include, but are not limited to: • ICS application white-listing tools • ICS behavioral anomaly detection tools • security incident and event monitoring • malware detection and mitigation • change control management • access control • file-integrity-checking mechanisms • user authentication and authorization Each responding organization’s letter of interest should identify how their products address one or more of the following desired solution characteristics in section 6 of the Protecting Information and System Integrity in Industrial Control System Environments for the Manufacturing use case (for reference, please see the link in the Process section above): 1. Tracking of approved software applications that are permitted to be present and active on the network 2. continuous monitoring of a network for unusual events or data packet trends process of identifying, monitoring, recording, and analyzing security events or incidents within a real-time OT environment 3. detection of malicious software designed to cause damage to a computer, server, or computer network 4. monitoring for unapproved changes, that all changes are documented, and that services are not unnecessarily disrupted 5. validation of access to the ICS network by authenticated users 6. validation of operating system and application software file integrity Responding organizations need to understand and, in their letters of interest, commit to provide: 1. Access for all participants’ project teams to component interfaces and the organization’s experts necessary to make functional connections among security platform components 2. Support for development and demonstration of the Protecting Information and System Integrity in Industrial Control System Environments for the Manufacturing sector use case in NCCoE facilities which will be conducted in a manner consistent with the following standards and guidance: FIPS 200, FIPS 201, and SP 800–53. VerDate Sep<11>2014 17:42 Feb 06, 2020 Jkt 250001 Additional details about the Protecting Information and System Integrity in Industrial Control System Environments for the Manufacturing sector use case are available at: https:// www.nccoe.nist.gov/projects/use-cases/ manufacturing/integrity-ics. NIST cannot guarantee that all of the products proposed by respondents will be used in the demonstration. Each prospective participant will be expected to work collaboratively with NIST staff and other project participants under the terms of the consortium CRADA in the development of the Protecting Information and System Integrity in Industrial Control System Environments for the Manufacturing sector capability. Prospective participants’ contribution to the collaborative effort will include assistance in establishing the necessary interface functionality, connection and set-up capabilities and procedures, demonstration harnesses, environmental and safety conditions for use, integrated platform user instructions, and demonstration plans and scripts necessary to demonstrate the desired capabilities. Each participant will train NIST personnel, as necessary, to operate its product in capability demonstrations to the Manufacturing community. Following successful demonstrations, NIST will publish a description of the security platform and its performance characteristics sufficient to permit other organizations to develop and deploy security platforms that meet the security objectives of the Protecting Information and System Integrity in Industrial Control System Environments for the Manufacturing sector use case. These descriptions will be public information. Under the terms of the consortium CRADA, NIST will support development of interfaces among participants’ products by providing IT infrastructure, laboratory facilities, office facilities, collaboration facilities, and staff support to component composition, security platform documentation, and demonstration activities. The dates of the demonstration of the Protecting Information and System Integrity in Industrial Control System Environments for the Manufacturing sector capability will be announced on the NCCoE website at least two weeks in advance at https://nccoe.nist.gov/. The expected outcome of the demonstration is to improve security to Manufacturing environments by demonstrating how Manufacturing organizations can take a comprehensive approach to protecting the data integrity of their industrial control systems. Participating organizations will gain from the knowledge that their products PO 00000 Frm 00023 Fmt 4703 Sfmt 4703 7287 are interoperable with other participants’ offerings. For additional information on the NCCoE governance, business processes, and NCCoE operational structure, visit the NCCoE website https:// nccoe.nist.gov/. Kevin A. Kimball, Chief of Staff. [FR Doc. 2020–02436 Filed 2–6–20; 8:45 am] BILLING CODE 3510–13–P DEPARTMENT OF COMMERCE National Oceanic and Atmospheric Administration [RTID 0648–XA029] Pacific Fishery Management Council; Public Meeting National Marine Fisheries Service (NMFS), National Oceanic and Atmospheric Administration (NOAA), Commerce. ACTION: Notice of public meeting (webinar). AGENCY: The Pacific Fishery Management Council’s (Pacific Council) Ad Hoc Ecosystem Workgroup (EWG) will hold a webinar, which is open to the public. DATES: The webinar will be held Tuesday, February 25, 2020, from 1:30 p.m. to 4:30 p.m. Pacific Standard Time, or when business for the day has been completed. ADDRESSES: A public listening station is available at the Pacific Council office (address below). To attend the webinar (1) join the meeting by using this link: https://meetings.ringcentral.com/join, (2) enter the Meeting ID provided in the meeting announcement (see https:// www.pcouncil.org) and click JOIN, (3) you will be prompted to either download the RingCentral meetings application or join the meeting without a download via your web browser, and (4) enter your name and click JOIN. NOTE: We require all participants to use a telephone or cell phone to participate. (1) You must use your telephone for the audio portion of the meeting by dialing the TOLL number provided on your screen followed by the meeting ID and participant ID, also provided on the screen. (2) Once connected, you will be in the meeting, seeing other participants and a shared screen, if applicable. Technical Information and System Requirements: PC-based attendees are required to use Windows® 10, 8; Mac®based attendees are required to use Mac OS® X 10.5 or newer; Mobile attendees are required to use iPhone®, iPad®, SUMMARY: E:\FR\FM\07FEN1.SGM 07FEN1

Agencies

[Federal Register Volume 85, Number 26 (Friday, February 7, 2020)]
[Notices]
[Pages 7286-7287]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2020-02436]


-----------------------------------------------------------------------

DEPARTMENT OF COMMERCE

National Institute of Standards and Technology

[Docket No. 200113-0014]


National Cybersecurity Center of Excellence (NCCoE) Protecting 
Information and System Integrity in Industrial Control System 
Environments for the Manufacturing Sector

AGENCY: National Institute of Standards and Technology, Department of 
Commerce.

ACTION: Notice.

-----------------------------------------------------------------------

SUMMARY: The National Institute of Standards and Technology (NIST) 
invites organizations to provide products and technical expertise to 
support and demonstrate security platforms for Protecting Information 
and System Integrity in Industrial Control System Environments for the 
Manufacturing sector. This notice is the initial step for the National 
Cybersecurity Center of Excellence (NCCoE) in collaborating with 
technology companies to address cybersecurity challenges identified 
under the Manufacturing sector program. Participation in the use case 
is open to all interested organizations.

DATES: Collaborative activities will commence as soon as enough 
completed and signed letters of interest have been returned to address 
all the necessary components and capabilities, but no earlier than 
March 9, 2020.

ADDRESSES: The NCCoE is located at 9700 Great Seneca Highway, 
Rockville, MD 20850. Letters of interest must be submitted to 
[email protected] or via hardcopy to National Institute of 
Standards and Technology, NCCoE; 9700 Great Seneca Highway, Rockville, 
MD 20850. Organizations whose letters of interest are accepted in 
accordance with the process set forth in the SUPPLEMENTARY INFORMATION 
section of this notice will be asked to sign a consortium Cooperative 
Research and Development Agreement (CRADA) with NIST. An NCCoE 
consortium CRADA template can be found at: https://www.nccoe.nist.gov/library/nccoe-consortium-crada-example.

FOR FURTHER INFORMATION CONTACT: Michael Powell via email at 
[email protected]; by telephone 301-975-0310; or by mail to 
National Institute of Standards and Technology, NCCoE; 9700 Great 
Seneca Highway, Rockville, MD 20850. Additional details about the 
Manufacturing sector program are available at https://www.nccoe.nist.gov/projects/use-cases/Manufacturing.

SUPPLEMENTARY INFORMATION: Interested parties must contact NIST to 
request a letter of interest template to be completed and submitted to 
NIST. Letters of interest will be accepted on a first come, first 
served basis. When the use case has been completed, NIST will post a 
notice on the NCCoE Manufacturing sector program website at https://www.nccoe.nist.gov/projects/use-cases/manufacturing/integrity-ics 
announcing the completion of the use case and informing the public that 
it will no longer accept letters of interest for this use case.
    Background: The NCCoE, part of NIST, is a public-private 
collaboration for accelerating the widespread adoption of integrated 
cybersecurity tools and technologies. The NCCoE brings together experts 
from industry, government, and academia under one roof to develop 
practical, interoperable cybersecurity approaches that address the 
real-world needs of complex Information Technology (IT) systems. By 
accelerating dissemination and use of these integrated tools and 
technologies for protecting IT assets, the NCCoE will enhance trust in 
U.S. IT communications, data, and storage systems; reduce risk for 
companies and individuals using IT systems; and encourage development 
of innovative, job-creating cybersecurity products and services.
    Process: NIST is soliciting responses from all sources of relevant 
security capabilities (see below) to enter into a CRADA to provide 
products and technical expertise to support and demonstrate security 
platforms for the Protecting Information and System Integrity in 
Industrial Control System Environments project for the Manufacturing 
sector. The full use case can be viewed at: https://www.nccoe.nist.gov/projects/use-cases/manufacturing/integrity-ics.
    Interested parties should contact NIST using the information 
provided in the FOR FURTHER INFORMATION CONTACT section of this notice. 
NIST will then provide each interested party with a letter of interest 
template, which the party must complete, certify that it is accurate, 
and submit to NIST. NIST will contact interested parties if there are 
questions regarding the responsiveness of the letters of interest to 
the use case objective or requirements identified below. NIST will 
select participants who have submitted complete letters of interest on 
a first come, first served basis within each category of product 
components or capabilities listed below up to the number of 
participants in each category necessary to carry out this use case. 
However, there may be continuing opportunity to participate even after 
initial activity commences. Selected participants will be required to 
enter into a consortium CRADA with NIST (for reference, see ADDRESSES 
section above). NIST published a notice in the Federal Register on 
October 19, 2012 (77 FR 64314) inviting U.S. companies to enter into 
National Cybersecurity Excellence Partnerships (NCEPs) in furtherance 
of the NCCoE. For this demonstration project, NCEP partners will not be 
given priority for participation.
    In March 2016, NIST issued a similar call for collaboration for a 
Securing Manufacturing Industrial Control Systems: Behavioral Anomaly 
Detection use case which can be found here: https://www.nccoe.nist.gov/projects/use-cases/manufacturing/integrity-ics. This collaborative 
project was originally intended to yield a NIST Cybersecurity Practice 
Guide, but instead resulted in the publication of NISTIR 8219, Securing 
Manufacturing Industrial Control Systems: Behavioral Anomaly Detection, 
https://www.nccoe.nist.gov/sites/default/files/library/mf-ics-nistir-8219.pdf. NIST anticipates that the collaborators who contributed to 
development of NISTIR 8219 will also participate in this use case.
    Use Case Objective: The objectives of this project are to provide a 
proposed approach to prevent, mitigate, and detect threats from cyber 
attacks or insider threats within a Manufacturing industrial control 
system (ICS) environment, and demonstrate how the commercially 
available technologies deployed in this build provide cybersecurity 
capabilities that Manufacturing organizations can use to secure their 
operational technology (OT) systems.
    A detailed description of the Protecting Information and System 
Integrity in Industrial Control System Environments is available at: 
https://www.nccoe.nist.gov/projects/use-cases/manufacturing/integrity-ics.
    Requirements: Each responding organization's letter of interest 
should identify which security platform component(s) or capability(ies) 
it is offering. Letters of interest should not

[[Page 7287]]

include company proprietary information, and all components and 
capabilities must be commercially available. Components are listed in 
Section 6 of the Protecting Information and System Integrity in 
Industrial Control System Environments for the Manufacturing use case 
(for reference, please see the link in the Process section above) and 
include, but are not limited to:

 ICS application white-listing tools
 ICS behavioral anomaly detection tools
 security incident and event monitoring
 malware detection and mitigation
 change control management
 access control
 file-integrity-checking mechanisms
 user authentication and authorization

    Each responding organization's letter of interest should identify 
how their products address one or more of the following desired 
solution characteristics in section 6 of the Protecting Information and 
System Integrity in Industrial Control System Environments for the 
Manufacturing use case (for reference, please see the link in the 
Process section above):
    1. Tracking of approved software applications that are permitted to 
be present and active on the network
    2. continuous monitoring of a network for unusual events or data 
packet trends process of identifying, monitoring, recording, and 
analyzing security events or incidents within a real-time OT 
environment
    3. detection of malicious software designed to cause damage to a 
computer, server, or computer network
    4. monitoring for unapproved changes, that all changes are 
documented, and that services are not unnecessarily disrupted
    5. validation of access to the ICS network by authenticated users
    6. validation of operating system and application software file 
integrity
    Responding organizations need to understand and, in their letters 
of interest, commit to provide:
    1. Access for all participants' project teams to component 
interfaces and the organization's experts necessary to make functional 
connections among security platform components
    2. Support for development and demonstration of the Protecting 
Information and System Integrity in Industrial Control System 
Environments for the Manufacturing sector use case in NCCoE facilities 
which will be conducted in a manner consistent with the following 
standards and guidance: FIPS 200, FIPS 201, and SP 800-53.
    Additional details about the Protecting Information and System 
Integrity in Industrial Control System Environments for the 
Manufacturing sector use case are available at: https://www.nccoe.nist.gov/projects/use-cases/manufacturing/integrity-ics.
    NIST cannot guarantee that all of the products proposed by 
respondents will be used in the demonstration. Each prospective 
participant will be expected to work collaboratively with NIST staff 
and other project participants under the terms of the consortium CRADA 
in the development of the Protecting Information and System Integrity 
in Industrial Control System Environments for the Manufacturing sector 
capability. Prospective participants' contribution to the collaborative 
effort will include assistance in establishing the necessary interface 
functionality, connection and set-up capabilities and procedures, 
demonstration harnesses, environmental and safety conditions for use, 
integrated platform user instructions, and demonstration plans and 
scripts necessary to demonstrate the desired capabilities. Each 
participant will train NIST personnel, as necessary, to operate its 
product in capability demonstrations to the Manufacturing community. 
Following successful demonstrations, NIST will publish a description of 
the security platform and its performance characteristics sufficient to 
permit other organizations to develop and deploy security platforms 
that meet the security objectives of the Protecting Information and 
System Integrity in Industrial Control System Environments for the 
Manufacturing sector use case. These descriptions will be public 
information.
    Under the terms of the consortium CRADA, NIST will support 
development of interfaces among participants' products by providing IT 
infrastructure, laboratory facilities, office facilities, collaboration 
facilities, and staff support to component composition, security 
platform documentation, and demonstration activities.
    The dates of the demonstration of the Protecting Information and 
System Integrity in Industrial Control System Environments for the 
Manufacturing sector capability will be announced on the NCCoE website 
at least two weeks in advance at https://nccoe.nist.gov/. The expected 
outcome of the demonstration is to improve security to Manufacturing 
environments by demonstrating how Manufacturing organizations can take 
a comprehensive approach to protecting the data integrity of their 
industrial control systems. Participating organizations will gain from 
the knowledge that their products are interoperable with other 
participants' offerings.
    For additional information on the NCCoE governance, business 
processes, and NCCoE operational structure, visit the NCCoE website 
https://nccoe.nist.gov/.

Kevin A. Kimball,
Chief of Staff.
[FR Doc. 2020-02436 Filed 2-6-20; 8:45 am]
 BILLING CODE 3510-13-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.