390 likes | 746 Views
Management Class. Security Control Families. Security Controls Overview. XX-1 Policy and Procedures. NIST Doc Review Strategy:. Table Summaries. Graphic Summaries. Bulleted Summaries. Executive Summaries, Overviews, Introductions. XX-1 Policy & Procedures. SP 800-12 The Handbook
E N D
Management Class Security Control Families
Security Controls Overview • XX-1 Policy and Procedures
NIST Doc Review Strategy: Table Summaries Graphic Summaries Bulleted Summaries Executive Summaries, Overviews, Introductions
XX-1 Policy & Procedures • SP 800-12The Handbook • SP 800-100Manager’s Handbook
Security Assessment & Authorization • Core RMF Documents • 800-47 (SLA) • 800-137 (CM)
Planning Family & Family Plans • 800-18 (RMF) • 800-100 (PM) • OMB M-03-22 (Privacy)
Program Management • 800-30 • 800-37 (RMF) • 800-39 (RMF) • 800-100 • 800-55 - Performance • 800-60 • 800-65 - CPIC • FIPS 199 • HSPD 7 – Critical Infrastructure • OMB 02-01 - SSP
Program Management Overview • Information Security Program Plan (PM) • Critical Infrastructure Plan (HSPD 7) • Capital Planning and Investment Control (SP 800-65) • Measures of Performance (SP 800-55) • Enterprise Architecture and Mission/Business Process Definition
Information Security Program Plan • Defines Security Program Requirements • Documents Management and Common Controls • Defines Roles, Responsibilities, Management Commitment and Coordination • Approved by Senior Official (AO) • Appoint Senior Information Security Officer
Critical Infrastructure Plan • HSPD-7 Critical Infrastructure Identification, Prioritization, and Protection • Essential Services That Underpin American Society • Protection from Terrorist Attacks • Prevent Catastrophic Health Effects or Mass Casualties • Maintain Essential Federal Missions • Maintain Order • Ensure Orderly Functioning of Economy • Maintain Public's Morale and Confidence in Economic and Political Institutions • Strategic Improvements in Security
Capital Planning & Investment Control • Investment Life Cycle • Integrating Information Security into the CPIC Process • Roles and Responsibilities • Identify Baseline • Identify Prioritization Criteria • Conduct System- and Enterprise-Level Prioritization • Develop Supporting Materials • IRB and Portfolio Management • Exhibits 53 and 300 and Program Management
Knowledge Check • If the interconnecting systems have the same authorizing official, an Interconnection Security Agreement is not required. True or False? • Which NIST SP, provides a seven-step process for integrating information security into the capital planning process? • This directive establishes a national policy for Federal departments and agencies to identify and prioritize United States critical infrastructure and key resources and to protect them from terrorist attacks. • The corrective action and cost information contained in which document, serve as inputs to the Exhibit 300s and are then rolled into the Exhibit 53?
Measures of Performance • Metric Types • Metrics Development and Implementation Approach • Metrics Development Process • Metrics Program Implementation • Prepare for Data Collection • Collect Data and Analyze Results • Identify Corrective Actions • Develop Business Case and Obtain Resources • Apply Corrective Actions
Metric Types • “Am I implementing the tasks for which I am responsible?” • “How efficiently or effectively am I accomplishing those tasks?” • “What impact are those tasks having on the mission?”
Federal Enterprise Architecture Business Service Performance Information Type (SP 800-60) Technical Data
Core Principles of the FEA • Business-driven • Proactive and collaborative across the Federal government • Architecture improves the effectiveness and efficiency of government information resources
Defining Mission/Business Processes • Defines mission/business processes with consideration for information security and the resulting risk to the organization; • Determines information protection needs arising from the defined mission/business processes and revises the processes as necessary, until an achievable set of protection needs is obtained.
Risk Assessment • 800-30r1 (draft) • 800-37 • 800-40 -Patch Management • 800-70 - Checklists • 800-115 - Assessments
Patch and Vulnerability Management Program • Create a System Inventory • Monitor for Vulnerabilities, Remediations, and Threats • Prioritize Vulnerability Remediation • Create an Organization-Specific Remediation Database • Conduct Generic Testing of Remediations • Deploy Vulnerability Remediations • Distribute Vulnerability and Remediation Information to Local Administrators • Perform Automated Deployment of Patches • Configure Automatic Update of Applications Whenever Possible and Appropriate. • Verify Vulnerability Remediation Through Network and Host Vulnerability Scanning • Vulnerability Remediation Training
In which NIST special publication might you find guidance for the performance measurement of information systems? • Which FEA reference model was used to create the guide for mapping information types to security categories, in support of the first step of the Risk Management Framework? • What is the name of the security control, represented by the control ID RA-3, must be partially implemented prior to the implementation of other controls in order to complete the first two steps in the Risk Management Framework? • Where can information about vulnerabilities be found?
System & Services Acquisition • 800-23 – Acquisition Assurance • 800-35 – Security Services • 800-36 – Security Products • 800-53a • 800-64 - SDLC • 800-65 - CPIC • 800-70 - Checklists
General Considerations for Security Services • Strategic/Mission • Budgetary/Funding • Technical/ Architectural • Organizational • Personnel • Policy/Process
Security Product Testing • Identification and Authentication • Access Control • Intrusion Detection • Firewall • Public Key Infrastructure • Malicious Code Protection • Vulnerability Scanners • Forensics • Media Sanitizing • Common Criteria Evaluation and Validation Scheme • NIST Cryptographic Module Validation Program
Considerations for Selecting Information Security Products • Organizational • Product • Vendor • Security Checklists for IT Products • Organizational Conflict of Interest
Management Security Controls Key Concepts & Vocabulary • XX-1 Policy & Procedures • CA - Security Assessment and Authorization • PL – Planning Family & Family Plans • Information Security Program Plan (PM) • Critical Infrastructure Plan (HSPD 7) • PM - Program Management • Capital Planning and Investment Control (SP 800-65) • Measures of Performance (SP 800-55) • Enterprise Architecture (FEA BRM) • RA - Risk Assessment • Security Categorization • Risk & Vulnerability Assessments • SA - System and Services Acquisition