250 likes | 534 Views
US Department of State Jay Coplon. My Commitment. You will get a sense for how we do C&A You will find value in being here All of your questions will be answered. Key Points. Quantitative Metrics Toolkits, Tools and Templates Continuous Monitoring Questions and Answers.
E N D
My Commitment You will get a sense for how we do C&A You will find value in being here All of your questions will be answered
Key Points Quantitative Metrics Toolkits, Tools and Templates Continuous Monitoring Questions and Answers
Decision Memo Authorization to Operate • When the Control Limits have not been exceeded.
Decision Memo Authorization to Operate • When the Control Limits have been exceeded.
System Owner will manage their systems iPost Risk Score which is represent by an average over a 30 day period. Risk Score in iPost • Specification Limit6 -15% Medium Risk • Control Limit • 5% or Less Medium Risk
System Owner will maintain a high level of hosts fully reporting (to iPost) within the accreditation boundary. Fully means current reporting on hardware, software, patch, vulnerability, and compliance Fully Reporting in iPost • Specification LimitFalls below 70% • Control Limit • Falls below 90%
Little or No Medium Traditional Risk • The System Owner will maintain a level or state of low or no Medium business risk as determined by traditional C&A. • Specification Limit6 -15% Medium Risk • Control Limit • 5% or Less Medium Risk
Notifications of Change When risk is above the specification limit notifications of change will not be considered. • Specification Limit<3 consecutive months • Control Limit • 3 or more consecutive months
C&A – How we communicate with our customers. SharePoint Website Policy, Procedure, Standard Document Center Organized by categories Alert Notifications Page and/or Document Workshops Tools
Get Ready Get Set STOP! • Exceed any specification limit • Readiness to Start C&A Checklist
FIPS 199 and OMB M-04-04 • Categorize your System • Determine the Assurance Level
Control Selection Tool • Identify which controls have been implemented • How each control has been implemented • C&A and Annual Security Control Assessments • Manage controls over the systems lifecycle
POA&M Tester Database Tool • Linked to the system FIPS 199 categorization • Import Open Findings from previous assessments • Finding and Recommended remediation • Failed Controls are identified • Standardizes the risk is calculated for each finding • Risk Scoping