LESSONS LEARNED
FROM THE
FEDCIRC PILOT
 
 
 





Fran Nielsen, National Institute of Standards and Technology (NIST)
Marianne Swanson, National Institute of Standards and Technology (NIST)

August 1998

ABSTRACT

In less than two years, the Federal Computer Incident Response Capability (FedCIRC), initially a Government Information Technology Services (GITS) Board pilot project, has demonstrated the need for coordinated incident handling government-wide and the success of a virtual team approach. Formally announced in October, 1996, FedCIRC will transition to an operational program administered by the Office of Information Security of the General Services Administration on October 1, 1998. The GITS Board sponsored the FedCIRC pilot for 18 months and six Federal organizations subscribed to the FedCIRC services during the pilot experience. This paper describes the pilot and the lessons learned from it.

BACKGROUND

The need for an incident handling capability that crosses Federal government agency and organizational boundaries has never been greater. Both in the private and public sectors, organizations are becoming more dependent on information technology (IT). In fact, the IT explosion is demonstrated by the complexity of today's computer systems and on the increasing dependency to internetwork these systems. An effect of the IT explosion is the increased frequency of computer security related incidents affecting almost every organization relying on IT to conduct its business. Federal agencies dependence on networking and their rapid and expanding involvement in the use of the Internet and other related technologies lends a sense of urgency to addressing the problem of incident handling. Diverse sources, from the General Accounting Office to congressional hearings to the Presidential Commission on Critical Infrastructure Protection, describe the insecurity of Federal Government information technology (IT) infrastructures as illustrated by the dramatic increase in electronic break-ins in the public and private sectors. The Department of Defense alone had 250,000 hacker attempts on its computer systems last year. Newspapers and television report that computer hackers, computer viruses, and threats imposed on the Nation's computer systems are escalating. At a recent Chief Executive Officer's conference, attendees were told that government and corporate computer break-ins by hackers is a $10 billion-a-year problem.

The FedCIRC pilot was designed to address the near- and long-term incident handling needs of the Federal civilian community, by providing incident handling services to civilian agencies and by building agency competence and self-reliance in incident handling. The military incident handling coordination service is provided by the Department of Defense's ASSIST team and numerous industry teams serve private sector constituencies.

The use of information technology is integral to President Clinton's plan of re-engineering the Federal Government to make its services more accessible, more efficient, and easier to use. In 1993, President Clinton formed the Information Infrastructure Task Force (IITF) to deploy the National Information Infrastructure and Vice President Gore established the Government Information Technology Services (GITS) working group under the IITF "to improve the application of information technology by government agencies." The task of the GITS working group was to implement the IT initiatives outlined in the National Performance Review. The working group published its accomplishments in June 1996 and Executive Order 13011 codified their activities and established the GITS Board in July of that year. Currently, the GITS Board meets monthly and administers the IT Innovation Fund. The Fund was established in fiscal year 1995 using funds from the FTS-2000 long distance telecommunication program. Approximately one percent (1%) of the projected FTS-2000 income goes into the Fund. The Fund's purpose is to "seed" money for innovative IT projects in the Federal community. To be selected as a pilot, projects must demonstrate more efficient and effective delivery of services to the public and should provide cross agency benefits. Additionally, projects should become self-sustaining after two years. Projects are selected by the Innovation Fund Committee, comprised of GITS Board members.

FEDCIRC SELECTED AS GITS PROJECT

Initially proposed to GITS in March of 1996, the idea to establish a government-wide Incident Response Capability (IRC) was not a new one; however, the National Institute of Standards and Technology's (NIST) proposal offered a rich blend of experiences and the promise of immediate incident response capabilities through the use of two existing, well-recognized teams, the Department of Energy's Computer Incident Advisory Capability (CIAC) and the Department of Defense's CERT(SM) Coordination Center (CERT/CC). The proposal envisioned an IRC equivalent to the Department of Defense incident handling team, ASSIST, and recommended a close relationship between the IRC and ASSIST to ensure that all national systems, including support for national security related systems.

On June 3, 1996, GITS granted $2,796,000 to the National Institute of Standards and Technology (NIST) to establish a Federal Computer Incident Response Capability (FedCIRC). The capability would assist Federal civilian agencies in their incident handling efforts by providing proactive and reactive computer security related services. By combining the experience and expertise of NIST's Computer Security Division, CERT/CC, and CIAC, FedCIRC could provide agencies with cost reimbursable, direct technical assistance and incident handling support. NIST planned to subcontract the operational incident handling capability to the CERT/CC and CIAC, keeping the responsibility for operational management and for facilitating the development of incident handling standards and guidelines by utilizing the vulnerability data collected by FedCIRC. NIST also planned to use vulnerability information in the analysis and testing of software and other products.

FEDCIRC OBJECTIVES

The goal of the FedCIRC project was to develop a self-sustaining response capability that met the need of the federal civilian agencies. To that end, the FedCIRC objectives included:

FEDCIRC OPERATIONS

One of the most challenging aspects of FedCIRC was the need to quickly create a virtual, seamless organization that spanned the Nation and offered a focal point for incident response around the clock. NIST's role was the overall management of FedCIRC, while CERT and CIAC performed the more traditional operational roles. Prior to the start of the FedCIRC collaboration, each entity had its own operating procedures and methods of conducting business. To perform as a virtual coast-to-coast team, however, the three FedCIRC collaborators agreed to a set of common procedures for coordinated activities and NIST produced an Operations Manual to describe them.

During the pilot experience, the energies and resources of the FedCIRC team (NIST, FedCIRC-East (CERT/CC), and FedCIRC-West (CIAC)) focused on handling incidents, on educating agencies about the need for incident handling, and on soliciting sponsorship for the continuance of the project.

The cornerstone activity of the FedCIRC pilot was incident handling. The availability of the incident response hotline support (i.e., 5 days a week x 12 business hours -- Monday through Friday, 8:30 a.m. to 9:00 p.m. east coast time -- for immediate response and 24 hours x 7 days a week for emergencies) as well as the collection, analysis, and publication of threat, vulnerability, and other security related data was accomplished by an underlying infrastructure of FedCIRC activities consisting of the following:

In the first year of the pilot, FedCIRC handled 244 incidents affecting thousands of sites. In the first half of fiscal year 1998, FedCIRC responded to 400 incidents affecting tens of thousands of sites. In 1997, eighty-four FedCIRC advisories were produced and as of August 7, 1998, seventy-one FedCIRC advisories have been distributed. The FedCIRC Web site (http://fedcirc.llnl.gov) has been accessed more than 370,000 times. The FedCIRC team gave twenty-one courses, trained thousands of Federal employees and their contractors, and visited scores of organizations to raise their awareness about the need for increased IT security measures, including incident response.

SUBSCRIBERS

The funding model used for the FedCIRC pilot was subscription based. Three yearly subscription fees, paralleling three service levels, were offered: platinum ($250,000 per year), gold ($110,000 per year), and silver ($50,000 per year). The philosophy behind the use of subscription levels was that organizations needing more service (e.g., more hours of dedicated incident handling, assistance to develop an organic incident handling capability, evaluation of particular systems or subsystems) could acquire it, while agencies and organizations requiring less service or merely wishing back-up for "hard to handle" incidents could be covered at a reduced cost to them. Six organizations signed on as FedCIRC subscribers during its pilot phase and over three-quarters of a million dollars of subscription funds help sponsor the FedCIRC pilot after the first year.

The subscribers of the FedCIRC pilot are to be applauded as part of the successful collaboration that demonstrated the feasibility of an incident handling capability crossing agency boundaries. The subscribers were the Bureau of Alcohol, Tobacco and Firearms; the Federal Supply Service of the General Services Administration; the National Finance Center of the Department of Agriculture; the Department of Justice; the Department of State; and the U.S. Customs Service. These organizations recognized the importance of incident response as an integral part of a good IT security program.

FEDCIRC ACCOMPLISHMENTS

The FedCIRC pilot provided computer security incident handling services and support to the Federal civilian sector; promoted sharing of threat and vulnerability information across agency boundaries; provided training and awareness; produced advisories, guidance, and tools for preventing and/or mitigating attacks on vital public IT systems; and assisted victimized agencies in response to incidents and attacks.

FedCIRC's virtual team approach has saved the taxpayer arguably millions of dollars in direct and indirect savings. FedCIRC, much like the insurance companies, must project savings based on preventive measures taken and the small amount of data from actual incidents. By augmenting existing agency teams, FedCIRC reduces the need to develop redundant full function incident response teams. As examples, full function incident response teams for NASA and for the Department of Energy are estimated at one million dollars each for each year. It can then be argued that given the eleven departments within the U.S. Government which do not have full function incident response teams, FedCIRC potentially saves the taxpayer roughly eleven million dollars each year by providing this service to them. Also, it can be presumed that some benefits are achieved via avoidance costs when future attacks are deterred by those notified of a vulnerability or threat and by those who have received a FedCIRC product (e.g., training, tools, threat advisory, web site visit for a security patch).

During the course of the pilot, the FedCIRC team responded to nearly a thousand calls for information and has handled almost 500 incidents affecting tens of thousands of sites. Thousands of Federal IT users, managers, and technical support staff have been exposed to FedCIRC's prescriptive IT security training, such as how to establish an incident handling capability; connecting to the Internet securely; practical intrusion detection for NT, UNIX and other host-based systems; web security; current trends with regard to threats, hackers, and vulnerabilities; information security for managers; and establishing a computer security forensics analysis program. FedCIRC's first annual conference, held after a year of operation, engendered extremely favorable attendee responses based on its low cost and high quality. Indeed, the accomplishments of FedCIRC during its brief pilot experience, and the lessons learned from it, tell an extraordinary success story.

LESSONS LEARNED

Several key lessons were learned from the FedCIRC pilot and they are summarized in the points below. FedCIRC is needed. The Federal civilian community needs assistance and guidance now in handling computer security related incidents. And, a coordinated approach to incident handling is extremely preferable.

FUTURE OF FEDCIRC

The project described in this paper was a pilot, funded by GITS. The pilot phase will soon be over and FedCIRC will become a fully operational activity as of October 1, 1998. The pilot demonstrated the need for coordinated incident handling government-wide and the success of a virtual-team approach; however, the problem of obtaining continued and continuous funding using the subscription model remained problematical. The Chief Information Officers (CIO) Council championed the project and facilitated its transition from proof-of-concept to a mature information security service.

Under the auspices of the Office of Information Security at the General Services Administration, the new FedCIRC will continue to be a collaborative partnership of computer incident response and security professionals who work together to handle computer security incidents and to provide both proactive and reactive security services for the Federal government. While FedCIRC will not replace existing agency or organizational response teams, it will serve as the focal point for Federal civilian agencies when dealing with computer related security incidents.

 
 
Return to Previous Page  Return to Incident Handling Homepage
Return to CSRC Homepage
Please send comments or suggestions to webmaster-csrc@nist.rip
Last Modified: December 2, 1998.