There are 2 things you, as a Defense Industrial Base (DIB) contractor, need to know about Iran right now:
The short answer to the question of whether the Cybersecurity Maturity Model Certification (CMMC) Program helps mitigate Iranian threats is that it absolutely does.
We analyzed 130 cyber techniques used by five Iranian cyber threat groups and found that the security requirements defense contractors have had since 2016 still punch way above their weight class. Here’s how.
National Institute of Standards and Technology (NIST) SP 800-171 does the heavy lifting in setting up rules for handling Controlled Unclassified Information (CUI). CMMC is only the system that verifies compliance. This doesn’t go to say that CMMC isn’t essential; it provides valuable assurance to the Department of War (DoW) that contractors are holding up their end of the agreement.
The controls put in place by the launch of the CUI Program in 2016 still hold up to real Iranian tradecraft. That’s why the assurance provided by CMMC is so valuable. Using MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) data from five Iranian threat groups, we’ve found:
Mapping real-world activity shows that just four core controls blunt nearly all of these techniques.
Only ~50% of the relevant NIST SP 800-53 controls that mitigate Iranian techniques make it into 800-171 and are therefore verified by CMMC. Since most organizations only do what’s required, we’ll see that minimum baseline increase with every revision to NIST SP 800-171.
CMMC is a verification program, not a set of security requirements. The security requirements verified by CMMC are imposed via contract clauses. CMMC is valuable in proving that defense contractors handling sensitive data have implemented adequate security requirements.
The real question is whether the underlying security requirements in NIST SP 800-171 are effective. To answer that question, we need to know three things:
As long as defense contractors keep up with known Iranian cyber activity, CMMC assurance is immensely valuable.
The MITRE corporation maintains MITRE ATT&CK, a knowledge base organizing cyber “techniques” used by actual cyber actors into 14 high-level “tactics”. For instance:
You can see all 250 techniques (including sub-techniques for different operating systems/technologies) organized by tactic in the ATT&CK Matrix. All of this is based on real-world observations, cyber threat intelligence reports, security research, and malware samples.
Important: Every technique and sub-technique has information about how to detect and/or prevent and mitigate the activity (if possible). That means we can get an exact picture of how even the advanced threat actors operate (China, Russia, North Korea, and Iran), and what to do about it.
We selected five Iranian threat actors known to target the U.S. DIB. In total these groups have been seen using 130 different cyber techniques.
We absolutely can. 100% of the techniques used by our selected Iranian threat actors can be detected.
For example, Tool Transfer can be detected by monitoring command execution, file creation, network connection creation, and network traffic content and flow.
We sure can: 68% of the known techniques used by our set of Iranian cyber actors can be mitigated.
89 of the 130 techniques can be mapped to specific mitigations. For example, Network Intrusion Prevention Systems can mitigate Tool Transfer techniques.
Important: Some techniques can’t be mitigated with preventative security controls because they are based on abusing system features and native utilities such as Windows Command Line or Powershell commands like “sc query,” which displays information about system services. However, we can still detect and address threats we can’t prevent. That’s why detection is greater than prevention.
The best way to detect and mitigate threats is to simply implement security controls. NIST Special Publication 800-53 is “a catalog of security controls that can be effectively used to protect information systems from traditional and advanced persistent threats”.
MITRE did incredible work with their “Mappings Explorer” between MITRE ATT&CK and NIST controls.
Turns out, there are 94 NIST controls that map to the 89 mitigatable techniques used by our selected Iranian threat actors.
50% of the mappings stem from just 10 controls:
|
Control Name |
800-53 Control ID |
|
System Monitoring |
SI-04 |
|
Configuration Settings |
CM-06 |
|
Baseline Configuration |
CM-02 |
|
Malicious Code Protection |
SI-03 |
|
Least Functionality |
CM-07 |
|
Continuous Monitoring |
CA-07 |
|
Least Privilege |
AC-06 |
|
Access Enforcement |
AC-03 |
|
Account Management |
AC-02 |
|
Information Flow Enforcement |
AC-04 |
Every one of the 89 mitigatable techniques can be mitigated to some degree by just the first four controls.
|
System Monitoring |
SI-04 |
|
Configuration Settings |
CM-06 |
|
Baseline Configuration |
CM-02 |
|
Malicious Code Protection |
SI-03 |
Yes, if you’re complying with the Defense Federal Acquisition Regulation Supplement (DFARS) clause 252.204-7012 and have implemented NIST SP 800-171 security requirements. Remember, NIST SP 800-171 is derived from NIST SP 800-53 but does not contain all controls.
Every one of the top 10 controls from NIST SP 800-53 are represented in NIST SP 800-171 revisions 2 and 3.
|
Control Name |
800-53 Control |
800-171 Requirement |
|
System Monitoring |
SI-04 |
3.14.6 |
|
Configuration Settings |
CM-06 |
3.4.2 |
|
Baseline Configuration |
CM-02 |
3.4.1 |
|
Malicious Code Protection |
SI-03 |
3.14.2 |
|
Least Functionality |
CM-07 |
3.4.6 |
|
Continuous Monitoring |
CA-07 |
3.12.3 |
|
Least Privilege |
AC-06 |
3.1.5 |
|
Access Enforcement |
AC-03 |
3.1.2 |
|
Account Management |
AC-02 |
3.1.1 |
|
Information Flow Enforcement |
AC-04 |
3.1.3 |
But only 47% of the 94 controls that mitigate our selected Iranian techniques are represented in 171 revision 2.
When we move to 171 revision 3, we’ll still sit at only 52% being represented.
Ultimately, NIST SP 800-171 as a floor is excellent, but we’re barely covering half of the controls that directly mitigate Iranian cyber activity.
This is actionable to every DoW contractor. Take your controls seriously at every turn.
Align your business with NIST SP 800-171 and pursue CMMC, if you haven’t. If you have, go the extra mile to secure client data by implementing NIST SP 800-53 controls not yet covered by 171. To learn more about CMMC compliance and mitigating threats from foreign adversaries, reach out to a Summit 7 expert.