A comparison of Systems Engineering and Security Engineering practices and professionals Or maybe a commercial for the INCOSE working group!

Slides:



Advertisements
Similar presentations
PROJECT RISK MANAGEMENT
Advertisements

Chapter 7: Key Process Areas for Level 2: Repeatable - Arvind Kabir Yateesh.
More CMM Part Two : Details.
Near Real Time Risk Management Transforming the Certification and Accreditation Process ISSA-Baltimore Chapter Meeting May 28, 2008 Dr. Ron Ross.
ITIL: Service Transition
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
Information Assurance (IA) - Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication,
Presented By: Thelma Ameyaw Security Management TEL2813 4/18/2008Thelma Ameyaw TEL2813.
Adaptive Processes Comparing CMMI 1.2 vs. CMMI 1.1 LN Mishra Adaptive Processes Consulting.
Systems Engineering Management
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Risk Assessment Frameworks
Risk Management Framework
Federal IT Security Professional - Manager FITSP-M Module 1.
NIST SP , Revision 1 Applying Risk Management to Information Systems (Transforming the Certification and Accreditation Process) A Tutorial February.
Handouts Software Testing and Quality Assurance Theory and Practice Chapter 11 System Test Design
Security Assessments FITSP-M Module 5. Security control assessments are not about checklists, simple pass-fail results, or generating paperwork to pass.
2014 Workshop and Plenary Sandra Hoskins, I.S.P, ITCP, PMP, MBA CIPS – Canada’s IT Professional Organization IIBA – International Institute of Business.
INCOSE 1 st reactions. One other area that struck me has the sheer number of levels of proficiency—in ours we are going with 5 and the first one is limited.
Complying With The Federal Information Security Act (FISMA)
What is Business Analysis Planning & Monitoring?
Panel: Moderator: Michele Iversen Guest Experts: Dr. Ron Ross, Rod Beckstrom, Bob Wandell.
The Key Process Areas for Level 2: Repeatable Ralph Covington David Wang.
Key System Engineering Processes for (Cost) Effective Cyber Security in a Dynamic Threat Environment. Kevin Stoffell September 11, 2015.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Security Standards Promoting Trust, Transparency, and Due Diligence E-Gov Washington Workshop.
Security Assessments FITSP-A Module 5
Cybersecurity: Engineering a Secure Information Technology Organization, 1st Edition Chapter 7 Software Supporting Processes and Software Reuse.
Organize to improve Data Quality Data Quality?. © 2012 GS1 To fully exploit and utilize the data available, a strategic approach to data governance at.
NIST Special Publication Revision 1
Demystifying the Business Analysis Body of Knowledge Central Iowa IIBA Chapter December 7, 2005.
Federal IT Security Professional - Auditor
Roles and Responsibilities
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Software Engineering Lecture # 17
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
『华东师范大学』 课程名称: 软件开发实践 Software Development Practice 课程类型: 实践课 第二讲: 项目管理 Lect_02: Manage the Project 主讲 : 软件学院 周勇 副 教授 日期 :
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Protecting Critical Information Assets and Records FIRM Forum.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Georgia Institute of Technology CS 4320 Fall 2003.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Managing Risk in New Computing Paradigms Applying FISMA Standards and Guidelines to Cloud Computing Workshop.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
It is imperative that leaders and managers at all levels understand their responsibilities and are held accountable for managing information security risk.
Rational Unified Process Fundamentals Module 5: Implementing RUP.
Search Engine Optimization © HiTech Institute. All rights reserved. Slide 1 What is Solution Assessment & Validation?
Authorizing Information Systems FITSP-A Module 6.
NCSX Systems Engineering Management Plan Peer Review Bob Simmons May 15, 2003.
SOLUTION What kind of plan do we need? How will we know if the work is on track to be done? How quickly can we get this done? How long will this work take.
Software Engineering Lecture # 1.
Configuration Management Romuald Duperrier Head of Systems Engineering Division April 22, 2015.
CategorizeSelectImplementAssessAuthorizeMonitor.
Purpose: The purpose of CMM Integration is to provide guidance for improving your organization’s processes and your ability to manage the development,
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
Collaborating for Quality Quality Assurance (QA) & Quality Control (QC) in the Accelerator Project (ACCSYS) Matthew Conlon ACCSYS QA/QC
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
The Project Management Process Groups
Collaborating for Quality through the Project Quality Plan Matthew Conlon ESS ACCSYS QA/QC Quality Learning & Planning.
Acquisition Support New Horizons Consulting Services, LLC’s, premier business unit is an offering of a full range of services and support for acquisition.
The Risk Management Framework (RMF)
ITIL: Service Transition
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Applying the Risk Management Framework
TechStambha PMP Certification Training
Improving Mission Effectiveness By Exploiting the Command’s Implementation Of the DoD Enterprise Services Management Framework - DESMF in the [name the.
INCOSE – North Texas Chapter
Introduction to Software Engineering
Following Up on Internal Audit Reports Workshop on IIA Standard 2500
Ray Hentzschel Standardising International SE Certification (ISO/IEC 24773) on the INCOSE SE Competency Framework.
CAF Quarterly Meeting Measuring the Value of an EA Practice
PSS verification and validation
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Presentation transcript:

A comparison of Systems Engineering and Security Engineering practices and professionals Or maybe a commercial for the INCOSE working group!

BIO 35 Engineering Experience 27 in Systems Engineering 20+ in Security Engineering BSCS, MBA, ABD PhD (IST) CDP, GSEC, CISSP, ISSEP, DTM SE (adult ed certified) trainer Process Champion (IPPD, CMMI)

Outline Issues Possible Causes Comparing the Cycles SDLC/RMF Lust to Dust (all dust no lust) Comparing the Professionals Next Steps

So what the issue? Security Engineering struggling Consistent complaint of lack of involvement! Active INCOSE WG New Standards evolving Extremely broad BOK (very little build focus) CISSP – 10 categories from physical to crypto ISSEP – 4 categories Discipline struggles to maintain currency

Possible causes and is systems engineering the cure? Incomplete Models? No V No Gates Continuous monitor mentality Technician/Manager focus BOK is Broke

Comparing the Cycles The familiar one(s)

Comparing the Cycles In a simpler form Design Operations Retirement Definition Development Deployment

Comparing the Cycles The Security Engineering forms Regardless – it is all about Risk Management Viewed by many models/frameworks – IATF – RMF – ISO – Custom Lets look at NIST

Comparing the Cycles The RMF CATEGORIZE Information System SELECT Security Controls IMPLEMENT Security Controls MONITOR Security Controls AUTHORIZE Information System ASSESS Security Controls Starting Point Define criticality/sensitivity of information system according to potential worst-case, adverse impact to mission/business. Select baseline security controls; apply tailoring guidance and supplement controls as needed base on risk assessment Implement security controls within enterprise architecture using sound systems engineering practices; apply security configuration settings Determine security control effectiveness (i.e., controls implemented correctly, operating as intended, meeting security for information systems). Determine risk to organizational operations and assets, individuals, other organizations, and the Nation; if acceptable, authorize operation. Continuously track changes to the information system that may affect security controls and reassess control effectiveness.

Comparing the Cycles Both CATEGORIZE Information System SELECT Security Controls IMPLEMENT Security Controls MONITOR Security Controls AUTHORIZE Information System ASSESS Security Controls Starting Point Define criticality/sensitivity of information system according to potential worst-case, adverse impact to mission/business. Select baseline security controls; apply tailoring guidance and supplement controls as needed base on risk assessment Implement security controls within enterprise architecture using sound systems engineering practices; apply security configuration settings Determine security control effectiveness (i.e., controls implemented correctly, operating as intended, meeting security for information systems). Determine risk to organizational operations and assets, individuals, other organizations, and the Nation; if acceptable, authorize operation. Continuously track changes to the information system that may affect security controls and reassess control effectiveness. Design Operations Retirement Definition Development Deployment

From Concept to Creation WITH GATES AND REVIEWS !!! MISSION and Real World ICDs CONOPS Specs Docs Conceptual Model SY ST EM Captured in Built as Used to Create

Comparing the Cycles Wheres the gates? Wheres the focus? CATEGORIZE Information System SELECT Security Controls IMPLEMENT Security Controls MONITOR Security Controls AUTHORIZE Information System ASSESS Security Controls Starting Point Define criticality/sensitivity of information system according to potential worst-case, adverse impact to mission/business. Select baseline security controls; apply tailoring guidance and supplement controls as needed base on risk assessment Implement security controls within enterprise architecture using sound systems engineering practices; apply security configuration settings Determine security control effectiveness (i.e., controls implemented correctly, operating as intended, meeting security for information systems). Determine risk to organizational operations and assets, individuals, other organizations, and the Nation; if acceptable, authorize operation. Continuously track changes to the information system that may affect security controls and reassess control effectiveness. Post SDR Post PDR Post CDR Before TRR Before AT O&M

Comparing the Cycles Recap SSE has a cycle but no feedback In theory yes, in practice – mostly no SSE has a cycle but no real gates In practice triage, IATT, some form of AO SSE is driven by the CDLC The SSE cycle is stuck in Monitor most of the time

Comparing the professionals Some common ground Scientist: A scientist is one engaging in a systematic activity to acquire knowledge. Scientists perform research toward increasing understanding of nature, including physical, mathematical and social realms. Scientists use empirical methods to study things. Engineer: An engineer is applies knowledge of applied science and applied mathematics to develop solutions for technical problems. Engineers design materials, structures, technology, inventions, machines and systems. Engineers use ingenuity to create things. Technician: A technician is a worker in a field of technology who is proficient in the relevant skills and techniques of that technology. Technicians apply methods and skill to build, operate and maintain things. Manager: One who handles, controls, or directs an activity or other enterprise, including allocation of resources and expenditures. A manager uses qualitative methods to control the build, operation, and maintenance of things.

Comparing the Professionals A sampling of SE - notice the mix Chief Engineer/LSE Systems Architect/Designer Requirements Engineer Functional Analyst Systems Analyst IV&V engineer O&M Support Engineers Specialty Engineers Notice the feedbacks

Comparing the Professionals (The RMF/ICD 503) CATEGORIZE Information System SELECT Security Controls IMPLEMENT Security Controls MONITOR Security Controls AUTHORIZE Information System ASSESS Security Controls Starting Point Define criticality/sensitivity of information system according to potential worst-case, adverse impact to mission/business. Select baseline security controls; apply tailoring guidance and supplement controls as needed base on risk assessment Implement security controls within enterprise architecture using sound systems engineering practices; apply security configuration settings Determine security control effectiveness (i.e., controls implemented correctly, operating as intended, meeting security for information systems). Determine risk to organizational operations and assets, individuals, other organizations, and the Nation; if acceptable, authorize operation. Continuously track changes to the information system that may affect security controls and reassess control effectiveness. Information System Owner Information Owner/Steward Risk Executive (Function) Authorizing Official AO Designated Representative Chief Information Officer Senior Information Security Officer Information System Security Officer Information Security Architect Common Control Provider Information System Security Engineer Security Control Assessor

ISSE per ICD 503 (RMF) Information System Security Engineer (ISSE) (or Information Security Architect) Identify security controls that are provided by the organization as common controls for organizational informational systems and document the controls in a Security Plan. Select security controls for the IS.

ISO per ICD 503 (RMF) Information System Owner (or Program Manager) Categorize the IS and document the results in the Security Plan. Describe the IS in the Security Plan. Register the IS with the appropriate organizational program management offices. Select security controls for the IS and document the controls in the Security Plan. Develop a strategy for the continuous monitoring of security control effectiveness and any proposed or actual changes to the IS and its operational environment. Implement the security controls specified in the Security Plan. Document the security control implementation in the Security Plan. Provide a functional description of the control implementation. Conduct initial remedial actions on security controls based on the findings and recommendations of the SAR and reassess remediated controls as appropriate. Prepare the POA&M based on the findings and recommendations of the SAR excluding any remedial actions taken. Assemble the Security Authorization artifacts and submit to the Authorizing Official for adjudication. Determine the security impact of proposed or actual changes to the IS and its operational environment. Conduct remedial actions based on the results of ongoing monitoring activities, risk assessment, and outstanding items in the POA&M. Update the Security Plan, security assessment report, and plan of action and milestones based on the results of the continuous monitoring process. Report the security status of the information system (including the effectiveness of security controls employed within and inherited by the system) to the AO and other appropriate organizational officials on an ongoing basis in accordance with the monitoring strategy. Implement an information system decommissioning strategy, when needed, which executes required actions when a system, or system component, is removed from service or transferred to another system.

Comparing the Professionals RECAP Incomplete Models? No V No Gates Continuous monitor mentality Technician/Manager focus BOK is Broke In systems engineering, there is active leadership from the engineers In SSE, the ISSEs are primarily advisor SEs are pro-active SSEs react SEs are builders, SSEs are advisors to passive risk managers Risk managers should be pro-active

Next steps? NIST SP800 series evolving (leads the way) INCOSE WG is creating handbook NICE QUESTIONS?