1 NIST, FIPS, and you... Bob Grill Medi-Cal ISO July 16, 2009.

Slides:



Advertisements
Similar presentations
1 IT Risk Management in Government Jonathan Smith Sr. Risk Manager Commonwealth Security and Risk Management October 1,
Advertisements

IT Security Law for Federal Agencies As of: 30 December 2002.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
Lecture 1: Overview modified from slides of Lawrie Brown.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
National Institute of Standards and Technology 1 NIST Guidance and Standards on System Level Information Security Management Dr. Alicia Clay Deputy Chief.
Security Controls – What Works
Information Security Policies and Standards
Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Computer Security: Principles and Practice
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Federal IT Security Professional - Manager FITSP-M Module 1.
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
Dr. Ron Ross Computer Security Division
Complying With The Federal Information Security Act (FISMA)
Ensuring Information Security
C OMPUTER S ECURITY C ONCEPTS By: Qubilah D’souza TE computer.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Panel: Moderator: Michele Iversen Guest Experts: Dr. Ron Ross, Rod Beckstrom, Bob Wandell.
Information Security Framework & Standards
Information Security Update CTC 18 March 2015 Julianne Tolson.
1 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Federal Government Perspectives on Secure Information Sharing Technology Leadership Series August 14,
 Computer security policy ◦ Defines the goals and elements of an organization's computer systems  Definition can be ◦ Highly formal ◦ Informal  Security.
1 Information System Security Assurance Architecture A Proposed IEEE Standard for Managing Enterprise Risk February 7, 2005 Dr. Ron Ross Computer Security.
NIST Special Publication Revision 1
Federal IT Security Professional - Auditor
PRIVACY AND INFORMATION SECURITY ESSENTIALS Information Security Policy Essentials Melissa Short, IT Specialist Office of Cyber Security- Policy.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Protecting Critical Information Assets and Records FIRM Forum.
VULNERABILITY ASSESSMENT FOR THE POLICE DEPARTMENT’S NETWORK.
National Institute of Standards and Technology 1 The Federal Information Security Management Act Reinforcing the Requirements for Security Awareness Training.
Security is not just… 1 A Compliance Exercise Certification and Accreditation FISMA.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
NIST / URAC / WEDi Health Care Security Workgroup Presented by: Andrew Melczer, Ph.D. Illinois State Medical Society.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
NIST Computer Security Framework and Grids Original Slides by Irwin Gaines (FNAL) 20-Apr-2006 Freely Adapted by Bob Cowles (SLAC/OSG) for JSPG 13-Mar-2007.
FISMA 101.
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
CST 312 Pablo Breuer. measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
Information Security tools for records managers Frank Rankin.
US Department of State Jay Coplon. My Commitment You will get a sense for how we do C&A You will find value in being here All of your questions will be.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
OFFICE OF VA ENTERPRISE ARCHITECTURE VA EA Cybersecurity Content Line of Sight Report April 29, 2016.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
DOE S&S Audit and Tune IT Up Campaign Mark Leininger August 26, 2009.
Information Security KRISHNAKUMAR RAGHAVAN (KK) NASWA's Information Technology Support Center 1.
CS457 Introduction to Information Security Systems
Computer Security Division Information Technology Laboratory
COMPUTER SECURITY CONCEPTS
Introduction to the Federal Defense Acquisition Regulation
Matthew Christian Dave Maddox Tim Toennies
FOIA, Privacy & Records Management Conference 2009
NCHER Knowledge Symposium Federal Contractor/TPS Session
EDUCAUSE Security Professionals Conference 2018 Jason Pufahl, CISO
Group Meeting Ming Hong Tsai Date :
Mohammad Alauthman Computer Security Mohammad Alauthman
What is Cybersecurity Office of Information Technology
Presentation transcript:

1 NIST, FIPS, and you... Bob Grill Medi-Cal ISO July 16, 2009

2 NIST FIPS FISMA NIST OMB A-130

3 Security Characteristics Dynamic  Definition of security changing continuously.  Extremely expensive and does not increase productivity.  Not visible to daily operations -- unless something bad happens.  Can’t fix it immediately.  Define “Risk” to Avoid “Cost”.  Have to know immediately. Governance  Set Standards, change standard continuously. NIST  Security has been legislated and made mandatory. (OMB A-130)  Continuous Monitoring to address volatile controls.  Manual or Rapidly Changing Env.  Control Change – Security Risk Assessment Process  Periodic independent Security Certification and Accreditation.  Plan of Action and Milestones  Set Baseline Standards.  Host Intrusion Detection  Logging and Monitoring

4 FISMA Federal Information Security Management Act of 2002 ("FISMA", 44 U.S.C. § 3541, et seq.)  U.S. federal law enacted in 2002 as Title III of the E- Government Act of 2002 ~(Pub.L , 116 Stat. 2899).  The act was meant to bolster computer and network security within the federal government and affiliated parties (such as government contractors) by mandating yearly audits.

5 FISMA Says Follow FIPS Federal Information Processing Standards Publications (FIPS PUBS)  Issued by the NIST after approval by the Secretary of Commerce ~Pursuant to Section 5131 of the Information Technology Management Reform Act of 1996 (PL ) and the FISMA of 2002 (PL ). Summary  15 FIPS PUBS  Security Essentials: ~FIPS 199Standards for Security Categorization of Federal Information and Information Systems ~FIPS 200Minimum Security Requirements for Federal Information and Information Systems ~FIPS 140-3Security Requirements for Cryptographic Modules

6 FIPS 199 Standards for Security Categorization of Federal Information and Information Systems  Determines methodology for determining the impact of the loss of confidentiality, integrity and availability.  Assess impact ~Impact makes Risk Acceptance not an option. ~Impact never changes. ~Mitigating controls are only option.

7 Potential Impact Security ObjectiveLOWMODERATEHIGH Confidentiality Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. [44 U.S.C., SEC. 3542] The unauthorized disclosure of information could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. The unauthorized disclosure of information could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. The unauthorized disclosure of information could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. Integrity Guarding against improper information modification or destruction, and includes ensuring information non- repudiation and authenticity. [44 U.S.C., SEC. 3542] The unauthorized modification or destruction of information could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. The unauthorized modification or destruction of information could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. The unauthorized modification or destruction of information could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. Availability Ensuring timely and reliable access to and use of information. [44 U.S.C., SEC. 3542] The disruption of access to or use of information or an information system could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. The disruption of access to or use of information or an information system could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. The disruption of access to or use of information or an information system could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. Source: FIPS 199, Standards for Security Categorization of Federal Information and Information Systems

8 FIPS 200 Minimum Security Requirements for Federal Information and Information Systems  This is just a document for legal reasons that give NIST the authority to make standards.  Defines Control Families ~Controls entity must follow is in NIST – An Index to Controls

9 FIPS 140 Security Requirements for Cryptographic Modules  Specifies the security requirements for encryption. ~Computer and telecommunication systems (including voice systems).  FIPS ~Adds an additional security level and incorporates extended and new security features

10 NIST Compliance National Institute of Standards and Technology.  The standards-defining agency of the U.S. government, that fall under the Technology Administration ( a branch of the U.S. Commerce Department Next Steps  President Orders Federal Government to Follow NIST  OMB A-130 Appendix III  2006 – CMS orders DHCS to follow NIST  2006 – DHCS order EDS to follow NIST ~Key NIST standards only 2 years old at the time and still being vetted by community.

11 Relationship Between Publications Source: NIST SP , Managing Risk from Information Systems: An Organizational Perspective

12 NIST Special Publications  NIST SP ~Guide for Security Authorization of Federal Information Systems: A Security Lifecycle Approach  NIST SP ~Managing Risk from Information Systems: An Organizational Perspective  NIST SP A ~Recommended Security Controls for Federal Information Systems  NIST SP ~Guide for Mapping Types of Information and Information Systems to Security Categories  NIST SP ~Security Configuration Checklists Program for IT Products

13 Monitoring Change After Certification Create a Baseline Design Securely Conduct Independent Reviews Conduct Annual Risk Assessment Monitor Volatile Controls RatingWindowsUNIXOracle Overall Environment Process in place Process functioning as intended Management Commitment Improvement Strategy

14 Plan of Action & Milestones (Continuous Improvement) Remediation Validation  Document vulnerabilities that can’t be fixed right away. ~Get a sample – screenshot, file, video, , etc. ~Set scope, roles and responsibilities. ~Assess risk impact.  Make a corrective plan: ~Incorporate into an existing project. ~Start a new project. ~Estimate cost.  Get owner approval and track to correction. ~Keep a scorecard. Verification  Retest for the vulnerability after correction.  Use an independent review. Source: NIST SP , Guide for Security Authorization of Federal Information Systems: A Security Lifecycle Approach

15 Real Time Monitoring - HIDS CSA Audit Score Card Incident Response Critical or above DateResponse time Comments IP Source Filtering 1/1/1999Same dayThe process 'C:\WINDOWS\system32\svchost.exe' (as user NT AUTHORITY\SYSTEM) attempted to accept a connection as a server on TCP port The operation was denied. Resolved: Added IP address to the block list.

16 Typical Deliverables (Prove You Did Work) Create a Baseline Monitor Change Monitor Drift Real Time Monitoring Maintain a POA&M

17 Recap NIST & FIPS required by law Prepare deliverables to prove compliance Monitor change, drift and volatile controls Annual assessment to plan compliance reviews Independent review to verify compliance

18 Questions