ISFO – ODAA Defense Security Service Industrial Security Field Operations (ISFO) Office of the Designated Approving Authority (ODAA) Nov 2013 1 Nov 2013.

Slides:



Advertisements
Similar presentations
Digital Certificate Installation & User Guide For Class-2 Certificates.
Advertisements

For Security Professionals
OMB Circular A133 Audits of States, Local Governments, and Non-Profit Organizations 1 Departmental Research Administrators Training Track.
Digital Certificate Installation & User Guide For Class-2 Certificates.
A-133 Compliance & Audit Readiness Presented By: Tracy Jackson and Susan Cook.
Audit Requirements  A-133 Gov't, Education and Non-Profit  Thresholds $500K or more expended during the FY - Single Audit required  Audit Report - due.
Nick Vennaro, NHIN Team (Contractor), Office of the National Coordinator for Health IT Michael Torppey, CONNECT Health IT Security Specialist (Contractor)
Section Six: Foreign Ownership, Control, or Influence (FOCI)
Defense Security Service. DSS Update DSS Changing With A Changing Security Environment.
ODAA Workshop December 2012 Charles Duchesne, DSS Tiffany Snyder, DSS
What’s the path to a SSP? Information System Profile Contractor: Lockheed Martin, Missiles and Fire Control Address: 1701 W. Marshall Dr. Grand Prairie,
1 Office of the Designated Approving Authority (ODAA) April 2008.
Contractor Business System Rule Revision #, Date (of revision) Presented By: Kendrick Dickerson, PA, DCMA Property Group May 3, 2013.
DoD Information Assurance Certification and Accreditation Process (DIACAP) August 2011.
Summer IAVA1 NATIONAL INFORMATION ASSURANCE TRAINING STANDARD FOR SYSTEM ADMINISTRATORS (SA) Minimum.
Industrial Security Field Operations (ISFO) Office of the Designated Approving Authority (ODAA) August 2010.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
Justin Walsh FOCI Program Manager Industrial Security Field Operations.
Public Vouchers Further information is available in the Information for Contractors Manual under Enclosure 5 The views expressed in this presentation are.
1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
ODAA Update Agenda ODAA Business Management System (OBMS) Deployment
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Defense Security Service. DSS Update DSS Changing With A Changing Security Environment.
Session 6: Data Integrity and Inspection of e-Clinical Computerized Systems May 15, 2011 | Beijing, China Kim Nitahara Principal Consultant and CEO META.
C-TPAT Security Link Portal Online Application. Online C-TPAT Application - Part 1. Part 1 of the Online C-TPAT Application process: Complete the Company.
From the Kitchens of : Eileen Keller, CPA, Salmon Sims Thomas & Jared Sanders, CPA, Lightheart|Sanders Recipe for: Audit Success.
Contractor SIPRNet Process
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Debra A. Schuchert Director of Network Operations & Compliance.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil March 20, 2015 UNCLASSIFIED Industrial Security.
HIPAA COMPLIANCE WITH DELL
PwC Internal Control Reports: Facts, Myths and Best Practices FIRMA National Risk Management Training Conference – San Francisco, CA Wednesday March 31,
1 American Recovery and Reinvestment Act (ARRA) Reporting Requirements Presented by: Darryl Grant Procurement Analyst Division of Acquisition Policy &
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil August 12, 2014 UNCLASSIFIED NISPOM Update.
Section Five: Security Inspections and Reviews Note: All classified markings contained within this presentation are for training purposes only.
Move over DITSCAP… The DIACAP is here!
National Infrastructure Protection Plan (NIPP) Sector Specific Plan (SSP) AFDO Annual Meeting June 7, 2005 LeeAnne Jackson, Ph.D. Center for Food Safety.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Matching Grants. Address humanitarian conditions that benefit a community in need Direct Rotarian involvement Match at least two countries (host and international)
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
UNCLASSIFIED DITSCAP Primer. UNCLASSIFIED 1/18/01DITSCAP Primer.PPT 2 DITSCAP* Authority ASD/C3I Memo, 19 Aug 92 –Develop Standardized C&A Process DODI.
Jewuan Davis DSN Voice Connection Approval Office 18 May 2006 DSN Connection Approval Process (CAP)
DEPARTMENT OF HEALTH CARE SERVICES Audits & Investigations – Financial Audits Branch.
Company Confidential Registration Management Committee (RMC) AS9104/2A Presentation San Diego, CA January 17, 2013 Tim Lee The Boeing Company 1 Other Party.
Submitting Course Outlines for C-ID Designation Training for Articulation Officers Summer 2012.
DEPARTMENT OF HEALTH CARE SERVICES
Defense Security Service Contractor SIPRNet Process June 2013
Managing a “Data Spill”
Blue Cross and Blue Shield of Nebraska is an Independent Licensee of the Blue Cross and Blue Shield Association. Timely Filing and Corrected Claims October.
MS Invoice E-Invoice Solution Overview March 2016.
1 Welcome to Magnys Authorized Agent Access. 2 Contact Information Vendor Subordinate –For all Login, technical, sales id and commission content information,
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
ISSM 101 Break-Out Session
Defense Security Service
Defense Security Service Risk Management Framework (RMF)
Regional Skills Forum 2016:
Reportable Events & Other IRB Updates February 2017
Josh Thompson Classified Information Systems – Western Region
Defense Security Service Risk Management Framework (RMF)
AN OVERVIEW OF THE INDUSTRIAL SECURITY PROGRAM
Installation & User Guide
Defense Security Service Top 10 Vulnerabilities
Contractor Business System Rule
Resolving Audit Findings: Guidance for the Non-CPA
Presentation transcript:

ISFO – ODAA Defense Security Service Industrial Security Field Operations (ISFO) Office of the Designated Approving Authority (ODAA) Nov Nov 2013

ISFO – ODAA Defense Security Service Overview: Security Plan Reviews –Security Plan Processing Timeliness –Top Ten Deficiencies Identified in Security Plans System Onsite Validations –Timeliness –Top Ten Vulnerabilities 2 Nov 2013

ISFO – ODAA Defense Security Service Certification & Accreditation DSS is the primary government entity responsible for approving cleared contractor information systems to process classified data. Work with industry partners to ensure information system security controls are in place to limit the risk of compromising national security information. Ensures adherence to national industrial security standards. 3 Nov 2013

ISFO – ODAA Performance: Metrics reflect excellent performance across the C&A program nationwide. Improvements have been made in the number of systems processed straight ATO and reducing the number of days systems operate on an IATO when compared to six months ago. Common reasons for second IATOs are Host Based Security System (HBSS) not installed, Onsite validation rescheduled due to ISSP and/or ISSM availability, Administrative reasons after the system is certified (MOUs, etc.). Security Plan Review Results from Nov Oct System security plans (SSPs) were accepted and reviewed during the preceding 12 months Interim approvals to operate (IATOs) were issued during the preceding 12 month period, it took an average of 21 days to issue an IATO after a plan was submitted “Straight to ATO (SATO)” were processed during the preceding 12 months, it took an average of 21 days to issue the ATO. 923 of the SSPs (25%) required some level of correction prior to conducting the onsite validation. 546 of the SSPs (15%) were granted IATO with corrections required. 104 of the SSPs (3%) that went SATO required some level of correction. Denials: 273 of the SSPs (7%) were received and reviewed, but denied IATO until corrections were made to the plan. Rejections: 123 of the SSPs (3%) were not submitted in accordance with requirements and were not entered into the ODAA process. These SSPs were returned to the ISSM with guidance for submitting properly and processed upon resubmission. Last Months Snapshot: Oct IATOs were granted with an average turnaround time of 24 days 107 SATOs were granted with an average turnaround time of 27 days 4 Nov 2013

Common Deficiencies in Security Plans from Nov Oct Top 10 Deficiencies 1.SSP Is incomplete or missing attachments 2.SSP Not Tailored to the System 3.Inaccurate or Incomplete Configuration diagram or system description 4.Sections in General Procedures contradict Protection Profile 5.Missing certifications from the ISSM 6.Missing variance waiver risk acknowledgement letter 7.Incorrect or missing ODAA UID in plan submission 8.Integrity & Availability not addressed completely 9.Inadequate anti-virus procedures 10.Inadequate trusted download procedures ISFO – ODAA Nov 2013

ISFO – ODAA Performance: Metrics reflect excellent performance across the C&A program nationwide. Improvements have been made in the number of systems processed straight ATO and reducing the number of days systems operate on an IATO when compared to six months ago. We are averaging over 45% of all ATOs being straight to ATO. On Site Review Results from Nov Oct completed validation visits we completed during the preceding 12 months 1574 systems were processed from IATO to ATO status during the preceding 12 months, it took 98 days on average to process a system from IATO to ATO 1334 systems were processed Straight to ATO status during the preceding 12 months, it took 21 days on average to process a system Straight to ATO Across the 12 months, (46%) of ATOs were for systems processed Straight to ATO 2075 systems (74%) had no vulnerabilities identified. 669 systems (24%) had minor vulnerabilities identified that were corrected while onsite. 55 systems (2%) had significant vulnerabilities identified, resulting in a second validation visit to the site after corrections were made Last Months Snapshot: Oct ATOs were granted with an average turnaround time of 105 days 107 SATOs were granted with an average turnaround time of 27 days 6 Nov 2013

Common Vulnerabilities found during System Validations from Nov Oct 2013 Top 10 Vulnerabilities 1.Security Relevant Objects not protected. 2.Inadequate auditing controls 3.SSP does not reflect how the system is configured 4.Improper session controls: Failure to have proper user activity/inactivity, logon, system attempts enabled. 5.Bios not protected 6.Topology not correctly reflected in (M)SSP 7.Inadequate configuration management 8.Physical security controls 9.Inadequate Anti-virus procedures 10.Identification & authentication controls 7 ISFO – ODAA Nov 2013

ISFO – ODAA Defense Security Service Summary and Takeaways: Security Plans are Being Processed and Reviewed in a Timely Manner –Most Common Deficiencies in SSPs Include Missing Attachments, Documentation Errors, Integrity and Availability Requirements –Need More Emphasis on Reducing Deficiencies Onsite Validations are Being Completed in a Timely Manner –Most Common Vulnerabilities Identified During System Validation Include Auditing Controls, Configuration Management, Not Protecting Security Relevant Objects More Straight to ATO (Where Practical) to Reduce Risk and Increase Efficiency 8 Nov 2013

ISFO – ODAA Defense Security Service 9 Questions Nov 2013