The Risk Management Framework (RMF)

Slides:



Advertisements
Similar presentations
A comparison of Systems Engineering and Security Engineering practices and professionals Or maybe a commercial for the INCOSE working group!
Advertisements

Risk Management Framework Implementation
Nick Vennaro, NHIN Team (Contractor), Office of the National Coordinator for Health IT Michael Torppey, CONNECT Health IT Security Specialist (Contractor)
Corporate Headquarters: 1010 Wayne Avenue, Suite 1150 Silver Spring, Maryland Telephone Facsimile Satellite.
Federal Risk and Authorization Management Program (FedRAMP) Lisa Carnahan, Computer Scientist National Institute of Standards & Technology Standards Coordination.
CSF Support for HIPAA and NIST Implementation and Compliance Presented By Bryan S. Cline, Ph.D. Presented For HITRUST.
PAGE Agency ATO Quick Guide 1 December 23,
NIH Security, FISMA and EPLC Lots of Updates! Where do we start? Kay Coupe NIH FISMA Program Coordinator Office of the Chief Information Officer Project.
DoD Information Assurance Certification and Accreditation Process (DIACAP) August 2011.
Near Real Time Risk Management Transforming the Certification and Accreditation Process ISSA-Baltimore Chapter Meeting May 28, 2008 Dr. Ron Ross.
Cybersecurity and the Risk Management Framework
Tenacity Solutions Incorporated
Information Assurance (IA) - Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication,
Presented By: Thelma Ameyaw Security Management TEL2813 4/18/2008Thelma Ameyaw TEL2813.
National Institute of Standards and Technology 1 NIST Guidance and Standards on System Level Information Security Management Dr. Alicia Clay Deputy Chief.
NLRB: Information Security & FISMA Daniel Wood, Chief IT Security February 19, 2004.
Christopher P. Cabuzzi CS 591 DEFENSE INFORMATION ASSURANCE CERTIFICATION & ACCREDITATION PROCESS (DIACAP) Chris Cabuzzi, DIACAP, 12/8/10 1.
Information Security Governance
Risk Management Framework
NIST SP , Revision 1 Applying Risk Management to Information Systems (Transforming the Certification and Accreditation Process) A Tutorial February.
Complying With The Federal Information Security Act (FISMA)
An overview of the NIST Risk Management Framework ISA 652 Fall 2010
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Panel: Moderator: Michele Iversen Guest Experts: Dr. Ron Ross, Rod Beckstrom, Bob Wandell.
CDS CERTIFICATION AND ACCREDITATION PROCESS
Security Control Families Management Class.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Security Standards Promoting Trust, Transparency, and Due Diligence E-Gov Washington Workshop.
N-Wave Shareholders Meeting May 23, 2012 N-Wave Security Update Lisa
NIST Special Publication Revision 1
Roles and Responsibilities
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
UNCLASSIFIED DITSCAP Primer. UNCLASSIFIED 1/18/01DITSCAP Primer.PPT 2 DITSCAP* Authority ASD/C3I Memo, 19 Aug 92 –Develop Standardized C&A Process DODI.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Protecting Critical Information Assets and Records FIRM Forum.
PAGE Agency ATO Quick Guide 1 September 21,
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Shift Left Feb 2013 Page-1 DISTRIBUTION STATEMENT A – Cleared for Open Publication by OSR on January 17 th, 2013 – SR case number 13-S-0851 Dr. Steven.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Authorizing Information Systems FITSP-A Module 6.
Defense Security Service Contractor SIPRNet Process June 2013
Assessment and Authorization– Module 5 (combined with Module 6)
SecSDLC Chapter 2.
CategorizeSelectImplementAssessAuthorizeMonitor.
Assessment and Authorization– Module 5 (combined with Module 6)
1515 N. Courthouse Road Suite 310 Arlington, VA Integrating Security into the SDLC Eric Silberman,
Collaborating for Quality Quality Assurance (QA) & Quality Control (QC) in the Accelerator Project (ACCSYS) Matthew Conlon ACCSYS QA/QC
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
© 2016 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited Jenn Fabius Christina Sames Applying the.
Cybersecurity & Acquisition Lifecycle Integration Tool (CALIT)
ISSM 101 Break-Out Session
© ITT Educational Services, Inc. All rights reserved. IS4680 Security Auditing for Compliance Unit 1 Information Security Compliance.
Collaborating for Quality through the Project Quality Plan Matthew Conlon ESS ACCSYS QA/QC Quality Learning & Planning.
Agency ATO Quick Guide September 21, 2015
Cybersecurity and Acquisition Lifecycle Tool (CALIT)
Cybersecurity Pre-work Assignment Please read these slides as pre-work TST 204 Pre-work Reading Assignment March, 2014 version          
Defense Security Service
Defense Security Service Risk Management Framework (RMF)
Defense Security Service Risk Management Framework (RMF)
Cybersecurity and the Risk Management Framework
Applying the Risk Management Framework
These slides used to be a Cybersecurity Pre-work Assignment (No longer a Pre-work Assignment) TST 204 Pre-work Reading Assignment March, 2014 version.
Josh Thompson Classified Information Systems – Western Region
Matthew Christian Dave Maddox Tim Toennies
Following Up on Internal Audit Reports Workshop on IIA Standard 2500
Defense Security Service Risk Management Framework (RMF)
About The Federal Data Architecture Subcommittee (DAS) 2008
RMF Process in the NISP eMASS
Security Policies and Implementation Issues
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Presentation transcript:

The Risk Management Framework (RMF) Key Players Decision Authorities Element Head Authorizing Official (AO) Designated Authorizing Official (DAO) Implementer & Operations Support Information System Owner (ISO) Information System Security Officer (ISSO)/Information System Security Manager (ISSM) Common Control Provider (CCP) Information System Security Engineer (ISSE) Advisors to AO/DAO Risk Executive Function (REF) Chief Information Office (CIO) Chief Information Security Officer (CISO) DAO Rep Assessors & Mission Data Owners Certification Agent (CA) Delegated Certification Agent (DCA) Security Control Assessor (SCA) Information Steward/ PSO NRO Documents 1 Identify system, its boundaries and purpose; categorize info type; conduct initial threat and risk assessment. 4 Determine security control effectiveness. NI 52-5-1: NRO implementation of RMF IASD: NRO controls Key Players: CA/DCA/SCA, ISSE, ISSO, ISSM, PSO Deliverables: CTP, SSP (v4), SAP (final), RMM, SAR Policy Documents Key Players: ISO, PSO, DAO/DAO Rep, DCA/SCA, ISSO, ISSE, ISSM Deliverables: Cat. Wrksht or SSP (v1) , RMM ICD 503: IC Directive to use RMF CNSSP 22: High level policy on Risk Management CNSSI 1253: Categorization for NSS NIST SP 800-53: Controls catalog NIST SP 800-37: RMF NIST SP 800-53A: Guide for Assessment procedures NIST SP 800-30: Guide for how to do Risk Management NIST SP 800-39: Overall Risk Management guide NIST SP 800-47: Interconnection guidance NIST SP 800-60: Information types CNSSI 4009: IA Glossary NIST SP 800-137: Continuous Monitoring 5 Determine risk to NRO operations & assets, other organizations, and the Nation; if acceptable risk, authorize operation. 2 Select security controls; apply tailoring guidance and supplemental controls as needed based on risk assessment. Key Players: AO/DAO/DAO Rep, ISO, ISSO, PSO Deliverables (Final): POA&M, SAR, SSP Key Players: ISO, AO/DAO/DAO Rep, DCA/SCA, ISSE, ISSO Deliverables: SSP (v2), Continuous Monitoring Strategy, RMM, SAP (draft) 6 Continuously track changes to IS that may affect security controls and reassess control effectiveness. 3 Implement security controls; apply security configuration settings. Key Players: ISO, CCP, PSO, ISSO, AO/DAO/DAO Rep, CA/DCA/SCA Deliverables: Updating Key Players: ISO, ISSO, ISSE, ISSM, PSO, SCA Deliverables: CTP, RMM, SSP (v3)

The Risk Management Framework (RMF) A&A: Assessment and Authorization AO: Authorizing Official ATO: Authorization to Operate A IA: Information Assurance IASD: Information Assurance Standards Document IATT: Interim Approval to Test ICD: Intelligence Community Directive IS: Information System ISA: Interconnection Security Agreement ISA: Information System Architect ISAP: Integrated Security Assessment Program ISO: Information System Owner ISSE: Information System Security Engineer ISSM: Information System Security Manager ISSO: Information System Security Officer IT: Information Technology I Q REF: Risk Executive Function RMF: Risk Management Framework RMM: Risk Management Matrix R B SAISO: Senior Agency Information Security Officer SAP: Security Assessment Plan SAR: Security Assessment Report SAT: Site Acceptance Testing SCA: Security Control Assessor SDLC: System Development Lifecycle SRTM: Security Requirements Traceability Matrix SSP: System Security Plan S CA: Certification Agent CCP: Common Control Provider CIO: Chief Information Office CIA: Confidentiality, Integrity, Availability CIAO: Composite Information Assurance Office CISO: Chief Information Security Officer CNSSI: Committee on National Security Systems Instruction CTP: Certification Test Plan C J TRR: Test Readiness Review TSB: Technical Security Branch T K DAO: Designated Authorizing Official DCA: Delegated Certification Agent DRP: Disaster Recovery Plan D L U M E V NIST: National Institute of Standards and Technology N FAT: Factory Acceptance Testing F W X O G Y POA&M: Plan of Actions and Milestones PSO: Program Security Officer P H Z