Assessment Frameworks Methodologies
Assessment Frameworks Methodologies
CATEGORIZE
Information System
Define criticality/sensitivity of information system according to potential worst-case, adverse impact to mission/business.
MONITOR
Security Controls
Continuously track changes to the information system that may affect security controls and reassess control effectiveness.
SELECT
Security Controls
Select baseline security controls; apply tailoring guidance and supplement controls as needed based on risk assessment.
AUTHORIZE
Information System
Determine risk to organizational operations and assets, individuals, other organizations, and the Nation; if acceptable, authorize operation.
IMPLEMENT
Security Controls
Implement security controls within enterprise architecture using sound systems engineering practices; apply security configuration settings.
ASSESS
Security Controls
Determine security control effectiveness (i.e., controls implemented correctly, operating as intended, meeting security requirements for information system).
Security Controls
The management, operational, and technical controls (i.e., safeguards or countermeasures) prescribed for an information system to protect the confidentiality, integrity, and availability of the system and its information. Selecting and Tailoring in terms of the Risk Management Framework.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Authorization Package
INFORMATION SYSTEM
CATEGORIZE
Information System
MONITOR
Security Controls
SELECT
Security Controls
AUTHORIZE
Information System
IMPLEMENT
Security Controls
Security Plan Security Assessment Report Plan of Action and Milestones Security Authorization Information
Determining risk to the organizations operations and assets, individuals, other organizations, and the Nation; and the acceptability of such risk.
Determining risk to the organizations operations and assets, individuals, other organizations, and the Nation; and the acceptability of such risk.
The objective is to achieve transparency of prospective partners information security authorization processesestablishing trust relationships based on common, shared risk management principles.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
SP 800-53 Fundamentals
Catalog of security controls Security control structure
Classes:
Management Operational Technical
Families (17):
Access Control Awareness and Training .
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
SP 800-53 Process
Categorize information system based on FIPS 199 and SP 800-60:
Low Impact; Moderate Impact; or High Impact.
Selecting initial security control baseline (starting point). Tailoring (Scope and Compensate) initial security control baseline. Supplement tailored baseline.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Tailoring
(Scoping and Supplementing)
For each security control baseline (low, moderate, or high) identified in NIST Special Publication 800-53, apply the tailoring guidance to modify the set of controls to meet the specific operational requirements of the agency.
Rationale: Application of the tailoring guidance in Special Publication 800-53 can eliminate unnecessary security controls, incorporate compensating controls when needed, and specify agency-specific parameters. Tailoring activities and associated tailoring decisions should be well documented with appropriate justification capable of providing reasoned arguments to auditors.
Scoping Guidance
Physical Infrastructure-related considerations
Security controls that refer to organizational facilities (e.g., physical controls such as locks and guards, environmental controls for temperature, humidity, lighting, fire, and power) are applicable only to those sections of the facilities that directly provide protection to, support for, or are related to the information system.
Scoping Guidance II
Technology-related considerations
Security controls that refer to specific technologies (e.g., wireless, cryptography, public key infrastructure) are applicable only if those technologies are employed or are required to be employed within the information system. Security controls are applicable only to the components of the information system that provide or support the security capability addressed by the control and are sources of potential risk being mitigated by the control. Security controls that can be either explicitly or implicitly supported by automated mechanisms, do not require the development of such mechanisms if the mechanisms do not already exist or are not readily available in commercial or government off-the-shelf products.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Scoping Guidance II
Policy/regulatory-related considerations
Security controls that address matters governed by applicable laws, Executive Orders, directives, policies, standards, or regulations (e.g., privacy impact assessments) are required only if the employment of those controls is consistent with the types of information and information systems covered by the applicable laws, Executive Orders, directives, policies, standards, or regulations.
Supplement
For each tailored security control baseline, supplement the security controls with additional controls and/or control enhancements based on the results of an organizational assessment of risk.
Rationale: The tailored baseline represents the starting point for determining the needed level of security due diligence to be demonstrated by an organization toward the protection of its operations and assets. In many cases, additional security controls or control enhancements will be needed to address specific threats to and vulnerabilities in an information system or to satisfy the requirements of applicable laws, Executive Orders, directives, policies, standards, or regulations.
Results In
Set of security controls for the information system that is deemed to provide adequate protection for the particular organization and information system environment.
CATEGORIZE
Information System
Define criticality/sensitivity of information system according to potential worst-case, adverse impact to mission/business.
MONITOR
Security Controls
Continuously track changes to the information system that may affect security controls and reassess control effectiveness.
SELECT
Security Controls
Select baseline security controls; apply tailoring guidance and supplement controls as needed based on risk assessment.
AUTHORIZE
Information System
Determine risk to organizational operations and assets, individuals, other organizations, and the Nation; if acceptable, authorize operation.
IMPLEMENT
Security Controls
Implement security controls within enterprise architecture using sound systems engineering practices; apply security configuration settings.
ASSESS
Security Controls
Determine security control effectiveness (i.e., controls implemented correctly, operating as intended, meeting security requirements for information system).
FISMA Phase II
Trustworthiness
Information System
IT Product IT Product IT Product
Trustworthiness
Trust Relationship Information System Information System
IT Product IT Product IT Product
Operational Environment
Operational Environment
Producing evidence that supports the grounds for confidence in the design, development, implementation, and operation of information systems.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Training Initiatives
Information security training initiative underway to provide increased support to organizations using FISMA-related security standards, guidelines, programs and services. Training initiative includes three components
Frequently Asked Questions Publication Summary Guides (Quickstart Guides) Formal Curriculum and Training Courses
Categorize FAQs
General Categorize Categorization Fundamentals Organizational Support for the Categorization Process System-specific Application of the Categorization Process
Provide a general understanding Provided from management, systems and organization perspectives
Training Courses
RMF Foundation Course
1 day high level overview Pilot course held Dec 08
RMF Course
3 day detailed overview Course date TBD
Wed-based Training
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Contact Information
100 Bureau Drive Mailstop 8930 Gaithersburg, MD USA 20899-8930
Project Leader
Dr. Ron Ross (301) 975-5390 [email protected]
Administrative Support
Peggy Himes (301) 975-2489 [email protected]