Loading...
HomeMy WebLinkAboutAgreement_General_7/14/2021_CISA Cyber InfrastructureDHS CISA A .TAf _w 'AND 5� Dated: 07/14/2021 CISA CYBER+INFRASTRUCTURE CYBERSECURITY ASSESSMENTS RULES OF ENGAGEMENT Between the CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY And The Village of Tequesta April 23, 2020 Version — SLTT 4.03 Prepared By: U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency THE ATTACHED MATERIALS MAY CONTAIN DEPARTMENT OF HOMELAND SECURITY INFORMATION THAT IS "FOR OFFICIAL USE ONLY", OR OTHER TYPES OF SENSITIVE BUT UNCLASSIFIED INFORMATION REQUIRING PROTECTION AGAINST UNAUTHORIZED DISCLOSURE, INCLUDING CONFIDENTIAL AND LEGALLY PRIVELEGED INFORMATION UNDER FEDERAL AND STATE LAW. THE ATTACHED MATERIALS MUST BE HANDLED AND SAFEGUARDED IN ACCORDANCE WITH APPROPRIATE PROTECTIONS FOR SUCH INFORMATION. Page 1 of 11 CISA CYRER-INFRASTRUCTURE SAND SE�y DHS CISA Dated: 07/14/2021 THIS PAGE INTENTIONALLY LEFT BLANK. ^F Page 2 of 11 J cqCISA � CYBEfl.INFRASTRUCNflE DHS CISA Table of Contents Dated: 07/14/2021 1 Introduction.......................................................................................................................................... 4 2 Procedures and Authorizations Prior to Service.................................................................................4 3 Site Preparation....................................................................................................................................5 4 Assessment...........................................................................................................................................8 5 Post-Assessment.................................................................................................................................. 8 6 Dispute Resolution.............................................................................................................................10 7 Amendment........................................................................................................................................10 8 Termination........................................................................................................................................ 10 9 Approval.............................................................................................................................................10 Page 3 of 11 CISA CYBEB-INFB STNUMRE DHS CISA Dated: 07/14/2021 1 Introduction 1.1 Purpose organization This document establishes the Rules Of Engagement (ROE) for cybersecurity assessments requested by The Village ofTequesta ( VOT ) from the Cybersecurity and Infrastructure Security Agency (CISA). 1.2 Scope This ROE applies to VOT and CISA for all services documented through the procedures described herein. In addition, it applies to all CISA personnel who may access data obtained or generated under this ROE. This ROE does not include services for any classified computer, system or network nor access to any classified information. 1.3 Background CISA utilizes a defined strategy and methodology for testing, assessing and analyzing target systems with state-of-the-art tools and highly trained security experts to conduct Vulnerability and Threat Assessments. The purpose of these Assessments is to assist VOT in developing a strategy for improving cybersecurity posture and aligning it with enterprise architecture and mission objectives. CISA conducts comprehensive assessments of federal and non-federal networks, including critical infrastructure networks, under authority of Title XXII of the Homeland Security Act (6 U.S.C. § 651 et seq., see especially section 2209 (6 U.S.C. § 659)) and the Federal Information Security Modernization Act (FISMA) (44 U.S.C. §§ 3551 et al.). CISA teams assess unclassified networks to evaluate the security posture when compared to best practices, regulations, policies and standards relating to cybersecurity. CISA team services include various cybersecurity assessment activities such as network mapping, vulnerability scanning, host based assessment, database and web application scanning, phishing, red teaming, and rogue wireless access point detection. The CISA teams include both federal government employees and contractor support personnel. All contractors serving on CISA teams have signed valid DHS 11000-6 Non Disclosure Agreements. Insert Establishment Background (Optional) 2 Procedures and Authorizations Prior to Service 2.1 This ROE is effective when signed by the VOT CIO or equivalent authorized official and the CISA Assessments Branch Chief. 2.2 Pursuant to this ROE, VOT may request CISA team services by completing an Appendix A in advance, each time service is requested. The CISA team will only perform those services specifically selected by VOT in the Appendix A and will only access systems and/or IP addresses identified by VOT in the Appendix A, during the period of time agreed upon in that Appendix A. Each new _E Page 4 of it U CISA � CYBEB�INFNASTRUCNBE DHS CISA Dated: 07/14/2021 Appendix A will be sequentially marked, e.g., Appendix A-1, Appendix A-2, Appendix A-3. The Appendix A is complete and becomes part of this ROE when all relevant information has been provided, including the selection of the Site Monitor, and Appendix A is signed by both the Site Authority (either the Site Monitor or the relevant CIO/authorized official) and the CISA Team Lead. Prior to the start of CISA team services, the voT Site Monitor shall provide signed copies of the complete Appendix A to the voT CIO or equivalent authorized official and the CISA Team Lead shall provide the same to the CISA Assessments Branch Chief. 2.3 In the event that any site/IP address proposed to be in -scope of requested CISA team services is operated by a voT sub -entity whose CIO or equivalent authorized official has unique or exclusive authority over that site/IP address, the sub -entity CIO or equivalent authorized official must complete and sign a separate Appendix A authorizing CISA to conduct requested services within that site/IP address range. 2.4 In the event that any site/IP address identified by voT in an Appendix A is operated or maintained by a third party (e.g. contractor or cloud -service provider) on behalf of voT , voT will ensure that the third party provides authorization for testing by either filling out and signing the form at Appendix B or completing the third party's authorization process and providing proof of authorization to the CISA team. Appendix B is complete and becomes part of this ROE when signed by an authorized representative of the third party. Each new Appendix B will be labeled with the corresponding Appendix A number and a sequential alpha character. For example, an Appendix B for two third parties under voT 's fourth request for services would involve Appendix A-4 and Appendix B-4a and Appendix B-4b, respectively. Prior to the start of CISA team services, signed copies of each complete Appendix B will be provided by the Site Authority to the voT CIO or equivalent authorized official and by the CISA Team Lead to the CISA Assessments Branch Chief. 2.5 Services provided by the CISA team are described in the Services Catalogue at Appendix C. The Services Catalogue may be updated at any time by notice to voT . Correspondingly, the template for Appendix A may be updated by notice to voT to reflect new or changed services offered by the CISA team in an updated Services Catalogue. 2.6 Some CISA services described in the Appendix C Services Catalogue may require use of one or more of voT 's unique seal, trademark, name, or insignia in phishing emails. voT hereby grants CISA the right to use such seal, trademark, name, or insignia. voT is responsible for obtaining any internal authorizations necessary for CISA use of its seal, trademark, name, or insignia, consistent with applicable law and procedures. CISAPage 5 of it CYSEP.INFRASTHUCTUNE DHS CISA Dated: 07/14/2021 2.7 Some CISA services described in the Appendix C Services Catalogue will involve scanning or other network traffic originating from IP addresses or similar identifiers belonging to CISA or entities that CISA has contracted with, including cloud service providers. Such IP addresses or similar identifiers will be made known to the Site Monitor, when appropriate. CISA will also notify the Site Monitor should the IP addresses or other identifiers change. 2.8 voT certifies that its log -on consent banners or notices; terms -of -use policies or user agreements; computer training programs; and any other mechanisms used to notify users and obtain their consent to the terms and conditions of computer use clearly demonstrate to voT computer users and obtain their consent that: "Users have no reasonable expectation of privacy regarding communications or data transiting, stored on or traveling to or from this network/system. Any communications or data transiting, stored on or traveling to or from this network/system will be monitored and may be disclosed to third parties, including other governmental entities, or used for any lawful government purpose." 3 Site Preparation The voT Site Monitor identified in Appendix A is an voT authorized representative responsible for preparing the site, serving as voT 's primary point of contact for the CISA team, and monitoring CISA team services at that site for the agreed upon time and services identified in the Appendix A. Prior to the start of any CISA team services: 3.1 The Site Monitor and the CISA Team Lead will review the Appendix A and ensure that either an additional Appendix A and/or a completed Appendix B have been provided, if applicable, for all sub - entities or third parties. 3.2 The Site Monitor will coordinate and ensure, as appropriate, the involvement of voT officials and adherence to voT policies and standard operating procedures that could have an impact on the scanning activities and the information systems being assessed. 3.3 The Site Monitor will identify to the CISA team potentially sensitive voT devices prior to testing. 3.4 The Site Monitor is responsible for ensuring system backups have been performed and restore processes are validated prior to the start of external or internal CISA team services. 3.5 The Site Monitor will provide the CISA team with information about the internal IT environment. 3.6 Certain CISA team services may require administrator or other specific user access to the networks or systems being tested. The Site Monitor is responsible for ensuring access for the CISA team. If administrator provisions are required, access will be granted by either (1)Either voT or CISA establishing a separate administrative account for testing (e.g., "CISATeam"), or (2) through the use, CISAPage 6 of it 1 " CYBER-INFRASTRUCTURE � A'0 Sf .h DHS CISA Dated: 07/14/2021 under voT supervision and control, of an existing administrator account. It is recommended that separate testing accounts will be established prior to the arrival of the CISA team. 3.7 The Site Monitor, on behalf of voT and in coordination with other voT officials as appropriate, will use best efforts to identify to CISA in advance any categories of data, which may be encountered by CISA during the selected services, that are sensitive in nature or protected from disclosure by statute, regulation, or other authority, including personally identifiable information, and will provide CISA instructions on how to identify and handle such data if encountered by the CISA team. The Site Monitor and CISA Team Lead will work together to structure the engagement to ensure that the CISA team does not come into contact with such data to the maximum extent possible or that appropriate data handling requirements have been put into place. The Site Monitor and CISA Team Lead will also discuss in advance what initial actions should be taken in the event that unforeseen sensitive data is encountered during CISA team services. 3.8 For assessments conducted onsite at the voT facility, the Site Monitor may request and is permitted to authorize voT IT staff or security personnel to scan the CISA team assessment equipment for vulnerabilities prior to network connection using agreed upon vulnerability scanning tools. However, assessment equipment contains code and technical references, which are not to be viewed, distributed or evaluated by external organizations. Under no circumstances will the CISA team's Government Funded Equipment (GFE) be relinquished from the control of the CISA team. 3.9 The Site Monitor may request that the CISA team conduct scanning activities on -site or remotely through a virtual private network. 3.10 For assessments conducted on -site at the voT facility, the Site Monitor will ensure that office or conference room -type workspace with AC power and a minimum four internal network jacks/drops with a live connection at the identified facility is available and provided to the CISA team. Personnel from voT IT staff or security personnel are encouraged to observe the CISA team on -site. 3.11 For assessments conducted remotely, voT is responsible for providing a virtual private network connection. The Site Monitor will provide any information and support necessary for the CISA team to connect remotely. 3.12 In order to prepare for and conduct certain assessments, the CISA team may passively compile data from publicly -available and commercially -available resources, including information regarding voT 's employees, network (e.g., registered network ranges and applications), and organization. Page 7 of 11 CISA 1/Y�j CYBER+INFRASTRUCNRE 3A^^\I DHS CISA Dated: 07/ 14/2021 This information, to the degree that it is not incorporated into the final report, will be deleted upon completion of the selected assessment(s). 4 Assessment During the assessment: 4.1 The CISA team will use GFE, Government Off -The -Shelf (GOTS), Commercial Off -The -Shelf (COTS) and open -sourced software and hardware. Use of any particular software or hardware by the CISA team is not a government endorsement or sponsorship of any product, service or company. A brief description of any software or hardware used by the CISA team can be furnished in advance upon request. 4.2 The CISA team will conduct any external assessment selected in Appendix A during the dates specified in Appendix A. 4.3 The CISA team will conduct any internal assessment selected in Appendix A by connecting GFE to voT 's network, either on -site or through a virtual private network provided by voT as determined by the Site Monitor, during the dates selected in Appendix A. 4.4 The CISA team will collect and analyze data from voT systems, networks, and processes to assess capability gaps in order to identify a road map for an enterprise -level risk based mitigation strategy. 4.5 For on -site assessments, the CISA team will provide to the Site Monitor a brief overview of daily activities and an outbrief at the conclusion of the assessment. 4.6 The CISA Team Lead will notify the voT Site Monitor if a perceived significant event occurs during the assessment. The Site Monitor is responsible for having appropriate knowledge and understanding of the voT networks and systems, identification and/or confirmation of a significant event, and taking appropriate action, which may include suspension and/or termination of the assessment. In the event a significant event occurs that warrants termination of the assessment, the CISA Team Lead and the Site Monitor will promptly provide to the voT CIO or equivalent authorized official, the voT Site Authority, and the CISA Assessments Branch Chief a written account of the conditions and actions that led to the termination of the assessment. If the CISA Team Lead and Site Monitor cannot agree on the account, both accounts will be provided. 4.7 In the event a disagreement arises between voT and the CISA team during the assessment, best efforts will be made to resolve such a disagreement at the lowest level possible. 5 Data Protection Page 8 of 11 °'� CYBER-INFRASTRUCTURE DHS CISA Dated: 07/14/2021 5.1 Consistent with 5 U.S.C. § 552(b), CISA will not disclose under the Freedom of Information Act ("FOIA") any information provided by voT under this request that is exempt from disclosure, including: Exemption (b)(3) as matters specifically exempt from disclosure by statute, Exemption (b)(4) as trade secrets and commercial or financial information that is privileged or confidential, and Exemption (b)(7)(A)-(F) as records or information compiled for law enforcement purposes. 5.2 Without limiting the previous sentence, voT understands that this obligation will apply to any written CISA notes of observations of voT facilities and equipment (including computer screens), that CISA will make determinations regarding FOIA requests on a case by case basis consistent with its obligations under FOIA, CISA FOIA regulations, and its own internal guidance, and that any determinations regarding specific FOIA exemptions will be made at the time that the responsive records are processed. CISA shall provide voT an opportunity to object to disclosure as provided by applicable law. 5.3 voT understands that information provided by voT that meets the definition of cyber threat indicator or defensive measure as defined in the Cybersecurity Information Sharing Act of 2015 (the "2015 Act"), 6 U.S.C. § 1501-1510, and that is provided in accordance with the 2015 Act's requirements, will be protected as provided by the 2015 Act (including protection from release under FOIA). See the Non -Federal Entity Sharing Guidance under the Cybersecurity Information Sharing Act of 2015 published by the Department of Homeland Security and the Department of Justice, available at https://www.us-cert.gov/ais. 5.4 Further, the 2015 Act may offer disclosure protection for the final report when in voT 's possession, as the 2015 Act provides a basis in federal law for state, local, and territorial (SLT) governments to exempt vulnerability information received from CISA from disclosure under any STL freedom of information law, open government law, open meetings law, open records law, sunshine law, or similar law requiring disclosure of information or records. See 6 U.S.C. 1503(d)(4)(B). This exemption applies to a "cyber threat indicator or defensive measure;" the 2015 Act explicitly defines "cyber threat indicator" to include "a security vulnerability" (See 6 U.S.C. § 1501(6)(C)) and defines "defensive measure" to include any action, procedure, technique, or other measure to prevent or mitigate a known or suspected cybersecurity threat. See 6 U.S.C. § 1501(7)). STL governmental entities, rather than CISA, are responsible for asserting this basis for withholding in response to any such requests under their own STL disclosure laws. Page 9 of 11 °'� CYBER -INFRASTRUCTURE DHS CISA Dated: 07/14/2021 5.5 Collected data and assessment results may be anonymized and used to support government -wide trending analysis. Any data or assessment results used in trending status reports will be non - attributable to voT 5.6 CISA will not share voT 's specific data and final report except as may be required by law. 6 Post -Assessment 6.1 The CISA team will provide voT with a final report within 30 days. The final report is provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in the final report or otherwise. Further dissemination of the final report may be governed by a Traffic Light Protocol (TLP) marking in the header, if present. For more information about TLP, see http://www.us-cert.gov/tlp/. 6.2 voT understands that it is under no obligation to implement any changes to its information systems that CISA may recommend. 7 Dispute Resolution Disputes will be resolved at the lowest level possible. 8 Amendment Unless otherwise specified, this ROE may be amended by the mutual written agreement of the voT CIO or equivalent authorized official and the CISA Assessments Branch Chief at anytime. 9 Termination This ROE may be terminated either bilaterally by the mutual written agreement of the voT CIO or equivalent authorized official and the CISA Assessments Branch Chief at any time or unilaterally with thirty (30) days written notice. 10 Approval By signing below, the approving voT official certifies the following: • voT authorizes the CISA team to provide services on voT networks and systems in each Appendix A; • voT agrees to obtain and provide to CISA a written authorization using the form at Appendix B from every third party that operates or maintains voT networks/systems listed in each Appendix A; • voT agrees to ensure that voT network users have received notice and consent in accordance with this ROE; • voT accepts that, while the CISA team will use its best efforts to conduct its activities in a way that minimizes risk to voT systems and networks, all of the tests described above, CIQ w Page 10 of 11 oy r � CYBER-INFRASTRUCTURE DHS CISA Dated: 07/14/2021 and especially penetration testing or a red team assessment (if selected) create some risk to VOT systems and networks; • VOT accepts the risks to VOT systems and networks that may occur as a result of activities described in this ROE; • VOT acknowledges that CISA provides no warranties of any kind relating to any aspect of the assistance provided under this ROE; • VOT accepts the risk of any damage that may result from implementing any guidance provided by DHS; and • VOT has authorized you to make the above certifications on its behalf. Jeremy Allen Dgrtaliy&gnedby J,remy All� owe 202107,41100.05-0400 7/14/2021 (Signature, Chief Information Officer or Equivalent) (Date) Jeremy Allen, Village Manager Jallen@tequesta.org 561-768-0465 (Print Name and Title) (Email and Telephone Number) CISA Assessments Branch Chief For CISA Use Only — ROE S/N: (Date) C14ZA Page 11 of 11 Ji m CYBERHNFRASTRUCNRE DOCUMENT VERSION 5-05/22/2020 CYBER HYGIENE Authorization to Conduct Continuous Scans of Public -Facing Networks and Systems The Cybersecurity and Infrastructure Security Agency (CISA) of the Department of Homeland Security (DHS), under authority of Title XXII of the Homeland Security Act (6 U.S.C. § 651 et seq., esp. 6 U.S.C. § 659) would like to gain authorization from The village of Tequesta voT to conduct continuous network and vulnerability scanning of voT 's publicly accessible networks and systems. The goals of these activities are to: 1. Catalog your organization's publicly accessible networks and systems, including services running and version/patch levels 2. Identify vulnerabilities on your organization's publicly accessible networks and systems 3. Identify potential configuration issues with your organization's public facing networks and systems 4. Maintain tactical awareness of the operational risks and cyber health of individual entities 5. Inform the government's common operational view of cyberspace 6. Integrate relevant information, analysis, and vulnerability assessments, in order to identify priorities for protective and support measures regarding potential or actual threats 7. Provide "early warning" of specific, actionable vulnerabilities to your organization CISA activities will originate from IP addresses or other identifiers that will be made known to your organization. Scanning will be openly attributable to the authorized scanning source, and should be detected by your organization's network monitoring solutions. Data will be sent to your organization's networks and systems corresponding to the public facing IP addresses, domain names, or other identifiers provided by your organization for scanning. The process has been designed to be as unobtrusive as possible: scheduling, intensity and frequency have been carefully planned to minimize the possibility of service disruption. Activities under this authorization will be limited to scanning; no attempts to connect to your organization's internal network, penetrate your organization's systems, or monitor your organization's network traffic will be made under this authorization. �4JP�tY & INFg4�rgG U F�ORm AO�� Page 1 of 5 DOCUMENT VERSION 5 - 05/22/2020 If a third -party, such as a cloud service provider, operates or maintains your networks or systems to be scanned pursuant to this authorization, your organization will ensure compliance with any notification or authorization requirement that such third party may impose on external vulnerability scanning services. If your organization is informed that any such third party prohibits external vulnerability scans, you will promptly notify the CISA point of contact listed below. In a separate appendix to this authorization please provide the following information: the point of contact for activities performed under this authorization; an email address for the delivery of reports; identification information for your organization's networks and systems to be scanned pursuant to this authorization; and any other relevant information. Your organization may provide updates to this information from time to time, in writing, using an updated appendix or other method. Your organization must promptly update CISA of changes to the identifying information used to scan your networks and systems pursuant to this authorization. CISA acknowledges that this authorization may be withdrawn at any time for any reason. The CISA Point of Contact for this activity can be reached at vulnerability info@cisa.dhs.gov. All notifications, updates, or other communications regarding this authorization and any related activity should be sent to this CISA Point of Contact. By signing below, you agree to the following: • You have authority to authorize scanning of the networks and systems submitted pursuant to this authorization; • You authorize CISA to conduct the scanning activities described above; • You agree to promptly update CISA of changes to the information used to identify the networks and systems to be scanned pursuant to this authorization; • You agree to comply with any notification or authorization requirement that any third - party that operates or maintains your networks or systems may impose on external vulnerability scanning services, notifying CISA if external scanning is later prohibited; • You accept that, while CISA teams will use their best efforts to conduct scans in a way that minimizes risk to your organization's systems and networks, the scanning activities described above create some risk of degradation in performance to your organization's systems and networks; • You acknowledge that CISA provides no warranties of any kind relating to any aspect of the assistance provided under this authorization; and • You are authorized to make the above certifications on your organization's behalf. Wy�4Jp�(Y & INFg4slgG� C f�ORlfY AD�� Page 2 of 5 DOCUMENT VERSION 5-05122/2020 Jeremy Allen Digitally signed by Jeremy Allen Signature: Date: 2021.07.14 10:58:48-04'00' Name: Jeremy Allen Date: 07/14/2021 Title: Village Manager Email: fallen@tequesta.org Phone: 561-768-0465 Entity: The Village of Tequesta City: Tequesta county: Palm Beach Country: United States of America �4J0.�SV 81NFg4�rgG i C U FO�am a� � State: F L Page 3 of 5 DOCUMENT VERSION 5-05/22/2020 AppendixA Authorization to Conduct Continuous Scans of Public -Facing Networks and Systems V OT provides the following information to facilitate the authorized scanning activities: Please provide a technical point of contact at VOT for the CISA team to follow-up with: Name: grad Gomberg Email: bgomberg@tequesta.org Phone: 561-768-0554 Optional secondary technical point of contact: Name: Email: Phone: Name of Technical POC 2 Email Address for Technical POC 2 Phone Number for Technical POC 2 We recommend your organization create/use a distribution list email address to receive our reports. This allows your organization to manage the recipients of our report. We will only deliver reports to a single address. Distro email: infosec@teguesta.org Your report will be encrypted with a password which we will provide to you. How would you like this password delivered (select one)? Email @► �✓ Tech POC �Distro POC I 61NFR�l9`A c SFCGRm P6cM`a Page 4 of 5 DOCUMENT VERSION 5-05/22/2020 When should scans begin? (e.g., as soon as possible, or time, Eastern @ mm/dd/yyyy) ASAP Identification of Your Public -Facing Networks and Systems: Enter your organization's internet-facing, static IN4 addresses to be vulnerability scanned in one of the following formats: CIDR notation (e.g. x.x.x.0/24), IP range (e.g. x.x.x.l-x.x.x.200), or individual IPs (e.g. x.x.x.1) with one entry per line: 12.229.132.128/27 ��`JP\tY & INFR�fGJ 9 c a (CURRY AO�O Page 5 of 5