Security of Election Night Reporting

This topic is for discussions of security-related issues associated with the ElectionNightReportingUseCase

Security Considerations

Information Types:

  • (Unofficial) Results data
Security Objectives and Impact Levels
  • Confidentiality: Low
  • Integrity: Moderate
  • Availability: Moderate
Notes:
  • Threats for voting machines
    • Voting machines or EMSes that report directedly over telecommunications lines could be exposed to remote attacks
  • Threats to ENR Systems
    • A loss of integrity or available of ENR systems could disrupt election night operations and impair confidence
    • The collection point for results from multiple jurisdictions is a potential target
    • Any websites used to disseminate results could be a target
  • ENR systems may use one or more of several types of networks: e.g.,
    • State-run networks
    • Cellular data
    • Other public telecommunications lines

VVSG Security Gap Analysis

Applicability of the VVSG 1.1 and/or draft VVSG 2.0

  • VVSG 1.1: Partially addressed by Section 2.4.5 and communications security requirements
  • VVSG 2.0: Partially addressed by communications security requirements and general reporting requirements.
Estimated Level-of-Effort to Address
  • Moderate level of difficulty, depending on architectures that should be addressed
    • Risks to voting system/EMSes can be be mitigated through air-gapping
Gap Areas
  • Network security guideliens/requirements for transmitting results
  • Security guidelines for websites used to disseminate results
  • Operational security best practices for media handling

Comments



This topic: Voting > WebHome > ConstituencyGroups > CyberSecurity > UseCasesSecurity > ElectionNightReportingSecurity
Topic revision: r3 - 2016-09-12 - AndrewRegenscheid
 
This site is powered by the TWiki collaboration platform Powered by PerlPLEASE NOTE: This wiki is a collaborative website. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. All the material on this website is in the public domain, including any text, diagrams, or images, unless indicated explicitly. Don't share anything on this site that you do not want to be public. Do not pass any proprietary documents or put any on the TWiki with implied public disclosure. If you do, it shall be deemed to have been disclosed on a non-confidential basis, without any restrictions on use by anyone, except that no valid copyright or patent right shall be deemed to have been waived by such disclosure. Certain commercial equipment, instruments, materials, systems, software, and trade names may be identified throughout this site in order to specify or identify technologies adequately. Such identification is not intended to imply recommendation or endorsement by NIST, nor is it intended to imply that the systems or products identified are necessarily the best available for the purpose. Any data provided on this site is for illustrative purposes only, and does not imply a validation of results by NIST. By selecting external links, you will be leaving NIST webspace. Links to other websites are provided because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other websites that are more appropriate for your purpose.