SBIR-STTR Award

IoT Situational Awareness and Cyber Risk Identification
Award last edited on: 9/11/2022

Sponsored Program
SBIR
Awarding Agency
DOD : AF
Total Award Amount
$49,981
Award Phase
1
Solicitation Topic Code
AF203-CSO1
Principal Investigator
Kriston Kenific

Company Information

The Kenific Group Inc

3975 Fair Ridge Drive Suite 250n
Fairfax, VA 22033
   (646) 584-5014
   N/A
   www.kenificgroup.com
Location: Single
Congr. District: 10
County: Fairfax

Phase I

Contract Number: FA8649-21-P-0449
Start Date: 2/4/2021    Completed: 5/5/2021
Phase I year
2021
Phase I Amount
$49,981
Our team aims to help our customers proactively identify IoT/ICS security vulnerabilities by providing our SACRI solution (Figure 2.0-1, below) that is comprised of several distinct components working together to deliver real-time, actionable device-specific vulnerability data. We strive to become subject matter experts (SME) on any customer-specific/proprietary IoT/ICS technologies that may exist for monitoring and improving our asset catalog accordingly. SACRI, in conjunction with KGI professional engineering services, aims to help USAF understand asset relationship to overall enterprise architecture, proactively highlighting information assurance (IA) challenges and vulnerabilities. Our experience in software development, integration, and O&M ensures a dynamic offering that can be tailored and supported to suit the needs of our customer. KGI will work closely with the USAF customer to customize their SACRI installation, identify any IoT/ICS devices specific to the environment, and provide additional consulting services as needed. The components (Figure 2.0-2, below) of the KGI solution can be summarized as follows. Asset Catalog. A fundamental issue with today’s constantly evolving IoT/ICS networks is the baseline identification and tracking of the devices themselves. It is quite common for network owners to allow their connected technology count to outgrow manageable expectations, often resulting in a scattered mess of assets. Our self-discovering catalog component will provide administrators the ability to automatically derive insight into IoT/ICS technologies across their network, giving them a necessary overview of all connected devices -- their operating system, firmware version, IP address, and geolocation (when applicable), etc. Using device forensics, this asset catalog component will help customers achieve a sense of what they have to manage, providing a foundation upon which they can build better security. Dynamic Vulnerability Database. Behind the scenes, our solution will continuously aggregate CVEs (Common Vulnerabilities and Exposures), manufacturer-supplied security recommendations, and other threat data into a centralized repository that will be used as a basis for identifying concerns applicable to the customer’s device catalog. Industry-standard repositories from NIST and Mitre will be complimented by customized data feeds specific to the technologies in use on the customer’s network. The solution will cross- reference assets in the device catalog with the dynamic vulnerability database to provide real-time alerts and guidance to the customer when threats are identified and/or action is recommended. If federal legislation like the IoT Cybersecurity Improvement Act of 2020 becomes law, KGI will interface with device compliance requirements set forth by DHS, NIST, and OMB.

Phase II

Contract Number: ----------
Start Date: 00/00/00    Completed: 00/00/00
Phase II year
----
Phase II Amount
----