Information System Security Control Architecture (ISSCA) Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology.

Slides:



Advertisements
Similar presentations
1 NIST, FIPS, and you... Bob Grill Medi-Cal ISO July 16, 2009.
Advertisements

IT Security Law for Federal Agencies As of: 30 December 2002.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information System Security Association-Washington D.C. NIST Special Publication Protecting Controlled.
Software Quality Assurance Plan
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Near Real Time Risk Management Transforming the Certification and Accreditation Process ISSA-Baltimore Chapter Meeting May 28, 2008 Dr. Ron Ross.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
Presented By: Thelma Ameyaw Security Management TEL2813 4/18/2008Thelma Ameyaw TEL2813.
National Institute of Standards and Technology 1 NIST Guidance and Standards on System Level Information Security Management Dr. Alicia Clay Deputy Chief.
Security Controls – What Works
NLRB: Information Security & FISMA Daniel Wood, Chief IT Security February 19, 2004.
Introduction to the State-Level Mitigation 20/20 TM Software for Management of State-Level Hazard Mitigation Planning and Programming A software program.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Information Systems Security Officer
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Office of Inspector General (OIG) Internal Audit
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Risk Assessment Frameworks
Risk Management Framework
Purpose of the Standards
NIST SP , Revision 1 Applying Risk Management to Information Systems (Transforming the Certification and Accreditation Process) A Tutorial February.
Dr. Ron Ross Computer Security Division
Security Assessments FITSP-M Module 5. Security control assessments are not about checklists, simple pass-fail results, or generating paperwork to pass.
Control environment and control activities. Day II Session III and IV.
Complying With The Federal Information Security Act (FISMA)
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Information Security Framework & Standards
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Security Standards Promoting Trust, Transparency, and Due Diligence E-Gov Washington Workshop.
1 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Federal Government Perspectives on Secure Information Sharing Technology Leadership Series August 14,
Security Assessments FITSP-A Module 5
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Applied Technology Services, Inc. Your Partner in Technology Applied Technology Services, Inc. Your Partner in Technology.
Building More Secure Information Systems A Strategy for Effectively Applying the Provisions of FISMA Presented to the FISSEA Conference March 23, 2005.
1 Information System Security Assurance Architecture A Proposed IEEE Standard for Managing Enterprise Risk February 7, 2005 Dr. Ron Ross Computer Security.
NIST Special Publication Revision 1
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Protecting Critical Information Assets and Records FIRM Forum.
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
National Institute of Standards and Technology 1 The Federal Information Security Management Act Reinforcing the Requirements for Security Awareness Training.
Crosswalk of Public Health Accreditation and the Public Health Code of Ethics Highlighted items relate to the Water Supply case studied discussed in the.
The Value of Common Criteria Evaluations Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology 100 Bureau Drive;
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Managing Risk in New Computing Paradigms Applying FISMA Standards and Guidelines to Cloud Computing Workshop.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Environmental Management Plan (EMP) Required for: Full EIA based on Palestinian EIA Policy Category A projects based on World Bank Policy.
NIST / URAC / WEDi Health Care Security Workgroup Presented by: Andrew Melczer, Ph.D. Illinois State Medical Society.
University of Maryland University College (UMUC) 3/11/2004 POA&M and FISMA What does it really mean? FISSEA Annual Conference.
NIST Computer Security Framework and Grids Original Slides by Irwin Gaines (FNAL) 20-Apr-2006 Freely Adapted by Bob Cowles (SLAC/OSG) for JSPG 13-Mar-2007.
Evaluate Phase Pertemuan Matakuliah: A0774/Information Technology Capital Budgeting Tahun: 2009.
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
The NIST Special Publications for Security Management By: Waylon Coulter.
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
National Institute of Standards and Technology 1 Information Systems Under Attack Managing Enterprise Risk in Today's World of Sophisticated Threats and.
Federal Information Security Management Act (F.I.S.M.A.) [ Justin Killian ]
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Security Methods and Practice Principles of Information Security, Fourth Edition CET4884 Planning for Security Ch5 Part I.
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
EIAScreening6(Gajaseni, 2007)1 II. Scoping. EIAScreening6(Gajaseni, 2007)2 Scoping Definition: is a process of interaction between the interested public,
AUDIT STAFF TRAINING WORKSHOP 13 TH – 14 TH NOVEMBER 2014, HILTON HOTEL NAIROBI AUDIT PLANNING 1.
Computer Security Division Information Technology Laboratory
Introduction to the Federal Defense Acquisition Regulation
Special Publication Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations Dr. Ron Ross Computer Security.
Matthew Christian Dave Maddox Tim Toennies
Cybersecurity ATD technical
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Presentation transcript:

Information System Security Control Architecture (ISSCA) Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology 100 Bureau Drive; Stop 8930 Gaithersburg, MD 20899 (301) 975-4768 skatzke@nist.gov fax: (301) 975-4964

Presentation Contents Background/motivation System security C&A (historical perspective) OMB A-130; Appendix III Federal Information Security Management Act 2002 (FISMA) NIST FISMA implementation project ISSCA Significance of NIST’s activities to the commercial sector ----------------------------------------------- Supporting detail

Background/Motivation NIST’s system security C&A guidance aging (FIPS 102--1983) OMB A-130Appendix III: Security of Federal Information Resources (1996) Proliferation of C&A guidance FIPS 102 (NIST) DITSCAP (DoD) NIACAP (NSTISSC/NSS) Federal Information Security Management Act 2002 (FISMA)

OMB A-130, Management of Federal Information Resources Requires Federal agencies to: Plan for security Implement controls commensurate with the risk and magnitude of harm resulting from the loss, misuse, or unauthorized access to or modification of information (called adequate security) Ensure that appropriate officials are assigned security responsibility Authorize system processing prior to operations and periodically, thereafter. Consistent with FISMA

Federal Information Security Management Act (FISMA) Title III of E-Government Act of 2002 (Public Law 107-347)

FISMA Requirements Federal agency information security (IS) program requirements NIST requirements Others (not to be addressed today)

Federal Agency Information Security Programs Must Include (1): Periodic assessments of the risk Policies and procedures that are: Risk-based Cost-effective Reduce IS risks to an acceptable level Ensure IS is addressed throughout the system life cycle Plans for providing adequate IS for networks, facilities, & information systems (i.e., security planning) Security awareness training to inform personnel (including contractors and other users of information systems) of the IS risks and their responsibilities

Federal Agency Information Security Programs Must Include (2): Periodic testing and evaluation of the effectiveness of information security policies, procedures, and practices with a frequency depending on risk, but no less than annually Plans and procedures to ensure continuity of operations Procedures for detecting, reporting, and responding to security incidents including: Mitigating risks before substantial damage is done Notifying/consulting with the Federal IS incident response center , law enforcement agencies, IG, other agency or office, in accordance with law or as directed by the President A process for planning, implementing, evaluating, and documenting remedial action to address any deficiencies in the information security policies, procedures and practices of the agency

FISMA Tasks for NIST Standards to be used by Federal agencies to categorize information and information systems based on the objectives of providing appropriate levels of information security according to a range of risk levels Guidelines recommending the types of information and information systems to be included in each category Minimum information security requirements (management, operational, and technical security controls) for information and information systems in each such category

FISMA Implementation Project Phase I: To develop standards and guidelines for: Categorizing Federal information and information systems Selecting minimum security controls for Federal information systems Assessing the security controls in Federal information systems Phase II: To create a national network of accredited organizations capable of providing cost effective, quality security assessment services based on the NIST standards and guidelines

FISMA Implementation Project Standards and Guidelines FIPS Publication 199 (Security Categorization) NIST Special Publication 800-37 (C&A) NIST Special Publication 800-53 (Security Controls) NIST Special Publication 800-53A (Assessment) NIST Special Publication 800-59 (National Security) NIST Special Publication 800-60 (Category Mapping) FIPS Publication 200 (Minimum Security Controls)

Information System Security Control Architecture (ISSCA) Key activities in managing risk to agency operations, agency assets, or individuals resulting from the operation of an information system— Categorize the information system Select set of minimum (baseline) security controls Refine the security control set based on risk assessment Document agreed upon security controls in security plan Implement the security controls in the information system Assess the security controls Determine agency-level risk and risk acceptability Authorize information system operation Monitor security controls on a continuous basis

Information System Security Control Architecture Defines category of information system according to potential impact of loss FIPS 199 SP 800-60 Security Categorization Selects minimum security controls (i.e., safeguards and countermeasures) planned or in place to protect the information system SP 800-53 FIPS 200 Security Control Selection In system security plan, provides a an overview of the security requirements for the information system and documents the security controls planned or in place SP 800-18 Security Control Documentation Determines extent to which the security controls are implemented correctly, operating as intended, and producing desired outcome with respect to meeting security requirements SP 800-53A SP 800-37 Security Control Assessment Security Control Implementation Implements security controls in new or legacy information systems Security Control Refinement Uses risk assessment to adjust minimum control set based on local conditions, required threat coverage, and specific agency requirements SP 800-37 System Authorization Determines risk to agency operations, agency assets, or individuals and, if acceptable, authorizes information system processing Security Control Monitoring Continuously tracks changes to the information system that may affect security controls and assesses control effectiveness

Significance of NIST’s activities to the commercial sector (1) ISSCA applicable to both government and commercial sector organizations NIST is contributing its standards/guidelines to IEEE as candidates for common industry-government standards/guidelines NIST Minimum control sets/baselines incorporate security controls from many public and private sector sources: CC Part 2 ISO/IEC 17799 COBIT GAO FISCAM NIST SP 800-26 Self Assessment Questionnaire CMS (healthcare) D/CID 6-3 Requirements DoD Policy 8500 BITS functional packages

Significance of NIST’s activities to the commercial sector (2) Control sets mapped to threat coverage Can be adjusted to widen/reduce threat coverage Can be adjusted based on risk analytic process Unique, ambitious attempt by NIST to do control mapping Control sets adaptable and adoptable by other communities Control catalogue provides a rich set of controls to meet many needs Communities can tailor control sets/baselines according to their needs Healthcare (to demonstrate HIPPA compliance) Other communities

Significance of NIST’s activities to the commercial sector (3) Based on expectations of wide adoption by US government agencies, NIST standards/guidelines may become de facto “due diligence” for commercial sector Will result in accredited individuals/organizations competent to perform system security evaluations NIST invites industry review and comment on applicability of NIST standards/guidelines to commercial sector systems NIST and IEEE invite participation in security standardization activities

Contact Information 100 Bureau Drive Mailstop 8930 Gaithersburg, MD USA 20899-8930 Project Manager Assessment Program Dr. Ron Ross Arnold Johnson (301) 975-5390 (301) 975-3247 rross@nist.gov arnold.johnson@nist.gov Special Publications Assessment Methodologies Joan Hash Annabelle Lee (301) 975-3357 (301) 975-2941 joan.hash@nist.gov annabelle.lee@nist.gov Gov’t and Industry Outreach Technical Advisor Dr. Stu Katzke Gary Stoneburner (301) 975-4768 (301) 975-5394 skatzke@nist.gov gary.stoneburner@nist.gov Organizational Accreditations Administrative Support Pat Toth Peggy Himes (301) 975-5140 (301) 975-2489 patricia.toth@nist.gov peggy.himes@nist.gov Comments to: sec-cert@nist.gov World Wide Web: http://csrc.nist.gov/sec-cert

Security Certification (of an IT system) The comprehensive assessment of the management, operational, and technical security controls in an information system Assessment supports the security accreditation process Assessment performed by security expert (may be contractor) Assesses (in a particular environment of operation) the extent to which the implemented security controls are: Correctly implemented? Operating as intended? Producing the desired outcome with respect to meeting the system’s security requirements

Security Certification (of an IT system) (continued) Determines remaining vulnerabilities in the information system based on the assessment. The results of a security certification are used to reassess the risks and update the system security plan Provides the factual basis for an authorizing official to render a security accreditation decision

Security Accreditation (of an IT system) Official management decision to authorize operation of a system : Made by a senior agency official Is applicable to a particular environment of operation of the IT system Explicitly accepts the level of residual risk to agency: Operations (including mission, functions, image or reputation), Assets, & Individuals that remain after the implementation of an agree upon set of security controls in the IT system.

Security Accreditation (of an IT system) (continued) Authorizing agency official accepts: Responsibility for system’s security Accountability for adverse impacts of security breaches

C: Assess residual vulnerabilities; A: Assess residual risk C = Certification A = Accreditation Initiation Development/Acquisition Disposal Categorize System Security Planning Determine Security Requirements Select Security Controls Risk Assessment Development/Acquisition Configuration Management and control Information Security Activities Security Control Development Continuous Monitoring of Security Control Effectiveness Operation/ Maintenance Developmental Security Test & Evaluation Develop Security Test Plan Test & Evaluate Security Controls Security Control Integration Security Accreditation Implementation C: Determine control effectiveness; Determine & document residual vulnerabilities; A: Assess residual risk; Make accreditation determination System Security Activities (Inside) within the System Development Life Cycle (Outside)

Security Controls: Special Publication 800-53

Special Publication 800-53 The purpose of SP 800-53 is to provide— Guidance on how to use a FIPS Publication 199 security categorization to identify minimum security controls (baseline) for an information system Minimum (baseline) sets of security controls for low, moderate, and high impact information systems Estimated threat coverage for each baseline A catalog of security controls for information systems requiring additional threat coverage

Applicability Applicable to all Federal information systems other than those systems designated as national security systems as defined in 44 U.S.C., Section 3542 Broadly developed from a technical perspective to complement similar guidelines issued by agencies and offices operating or exercising control over national security systems Provides guidance to Federal agencies until the publication of FIPS Publication 200, Minimum Security Controls for Federal Information Systems

Special Publication 800-53 Special Publication 800-53 is not a tutorial on the security control selection process or a security engineering handbook. An additional guidance document is needed that addresses: Relationship of minimum security controls (baselines) to threat coverage Relationships among basic, enhanced, and strong controls How to select additional security controls from the control catalogue

Document Architecture Main Body Catalog of Security Controls (complete set) Minimum Security Controls for Low Impact Systems (subset of controls from catalog) Minimum Security Controls for Moderate Impact Systems (subset of controls from catalog) Minimum Security Controls for High Impact Systems (subset of controls from catalog) Estimated Threat Coverage

Security Categorization Potential Impact FIPS Publication 199 Low Moderate High Confidentiality The loss of confidentiality could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. The loss of confidentiality could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. The loss of confidentiality could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. Integrity The loss of integrity could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. The loss of integrity could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. The loss of integrity could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. Availability The loss of availability could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. The loss of availability could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. The loss of availability could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. Security Objective

Security Categorization Example: Law Enforcement Witness Protection Information System FIPS Publication 199 Low Moderate High Confidentiality The loss of confidentiality could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. The loss of confidentiality could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. The loss of confidentiality could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. Integrity The loss of integrity could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. The loss of integrity could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. The loss of integrity could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. Availability The loss of availability could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. The loss of availability could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. The loss of availability could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. Guidance for Mapping Types of Information and Information Systems to FIPS Publication 199 Security Categories SP 800-60

Security Categorization Example: Law Enforcement Witness Protection Information System FIPS Publication 199 Low Moderate High Confidentiality The loss of confidentiality could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. The loss of confidentiality could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. The loss of confidentiality could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. Integrity The loss of integrity could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. The loss of integrity could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. The loss of integrity could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. Availability The loss of availability could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. The loss of availability could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. The loss of availability could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. Guidance for Mapping Types of Information and Information Systems to FIPS Publication 199 Security Categories Minimum Security Controls for High Impact Systems SP 800-60

Why High Water Mark Strong dependencies among security objectives of confidentiality, integrity, and availability In general, the impact values for all security objectives must be commensurate—a lowering of an impact value for one security objective might affect all other security objectives Example: A lowering of the impact value for confidentiality and the corresponding employment of weaker security controls may result in a breach of security due to an unauthorized disclosure of system password tables—thus, causing a subsequent integrity loss and denial of service…

Minimum Security Controls Minimum security controls and associated threat coverage in each of the designated baselines: Provide a starting point for organizations and communities of interest in their security control selection process Are used in the within the context of the agency’s ongoing risk management process

Terminology Security control strength or goodness rating defined in the control catalog as: Basic Enhanced Strong Appropriate security controls from the catalog are selected to populate the sets of minimum security controls (baselines) for: Low impact information systems Moderate impact information systems High impact information systems No direct correlation between strength/goodness rating and impact level—select the controls best suited to do the job…

Minimum Security Controls Sets Baselines Provided by Special Publication 800-53 Low Impact Information Systems High Impact Moderate Impact Information Systems Security Control Catalog Complete Set of Basic, Enhanced, and Strong Security Controls Baseline #1 Selection of a subset of security controls from the catalog—all basic level controls Baseline #2 Selection of a subset of security controls from the catalog—combination of basic and enhanced controls Baseline #3 Selection of a subset of security controls from the catalog—combination of basic, enhanced, and strong controls

Estimated Threat Coverage Provided by Special Publication 800-53 Minimum Security Controls Low Impact Information Systems High Impact Moderate Impact Information Systems Security Control Catalog Complete Set of Basic, Enhanced, and Strong Security Controls Estimated Threat Coverage Low Baseline Moderate Baseline High Baseline

Security Control Refinement Agency-level Activity Guided by Risk Assessment Security Control Catalog Complete Set Basic, Enhanced, and Strong Security Controls Risk Assessment Process Incorporates Local Conditions and Specific Agency Requirements to Adjust Initial Set of Security Controls 3 Starting Point Minimum Security Controls Moderate Impact Information Systems Additional Security Controls Estimated Threat Coverage Additional Threat Coverage Initial Coverage 1 4 2 5

Tagging of Security Controls Why aren’t security controls partitioned by security objectives (e.g., C, I, A)? In general, it is difficult to assign proper security objectives (i.e., confidentiality, integrity, or availability) to individual security controls In many cases, multiple security objectives apply to a single security control Availability may be the exception due to the potential for downgrading availability impact values during FIPS 199 security categorizations

Cost Effective Implementation: Common Security Controls

Common Security Controls Common security controls are those controls that can be applied to one or more agency information systems and have the following properties: The development, implementation, and assessment of common security controls can be assigned to responsible officials or organizational elements (other than the information system owner) The results from the assessment of the common security controls can be reused in security certifications and accreditations of agency information systems where those controls have been applied

Common Security Controls Identification of common security controls is an agency-level activity in collaboration with Chief Information Officer, authorizing officials, information system owners, system security managers, and system security officers Potential for significant cost savings for the agency in security control development, implementation, and assessment

Common Security Controls Common security controls can be applied agency-wide, site-wide, or to common subsystems and assessed accordingly— For example: Contingency planning Incident response planning Security training and awareness Physical and personnel security * Common hardware, software, or firmware ** * Related to the concept of site certification in certain communities ** Related to the concept of type certification in certain communities

Common Security Controls Example: Moderate Impact Agency Information Systems Responsibility of Information System Owners Common Security Controls System Specific Security Controls Responsibility of Designated Agency Official Other Than Information System Owner (e.g., Chief Information Officer, Facilities Manager, etc.) Common security controls developed, implemented, and assessed one time by designated agency official(s) Development and implementation cost amortized across all agency information systems Results shared among all information system owners and authorizing officials where common security controls are applied Maximum re-use of assessment evidence during security certification and accreditation of information systems Security assessment reports provided to information system owners to confirm the security status of common security controls Assessments of common security controls not repeated; only system specific aspects when necessary

Certification & Accreditation: Special Publication 800-37

C: Assess residual vulnerabilities; A: Assess residual risk C = Certification A = Accreditation Initiation Development/Acquisition Disposal Categorize System Security Planning Determine Security Requirements Select Security Controls Risk Assessment Development/Acquisition Configuration Management and control Information Security Activities Security Control Development Continuous Monitoring of Security Control Effectiveness Operation/ Maintenance Developmental Security Test & Evaluation Develop Security Test Plan Test & Evaluate Security Controls Security Control Integration Security Accreditation Implementation C: Determine control effectiveness; Determine & document residual vulnerabilities; A: Assess residual risk; Make accreditation determination System Security Activities (Inside) within the System Development Life Cycle (Outside)

Key Roles Authorizing Official Authorizing Official Designated Representative Chief Information Officer Senior Agency Information Security Officer Information System Owner Information System Security Officer Certification Agent User Representatives

Authorizing Official Reviews and approves the security categorizations of information systems Reviews and approves system security plans Determines agency-level risk from information generated during the security certification Makes accreditation decisions and signs associated transmittal letters for accreditation packages (authorizing official only) Reviews security status reports from continuous monitoring operations; initiates reaccreditation actions

Designated Representative Selected by the authorizing official to coordinate and carry out the necessary activities required during the security certification and accreditation process Empowered to make certain decisions with regard to the: Planning and resourcing of the security certification and accreditation activities Acceptance of the system security plan Determination of risk to agency operations, assets, and individuals Prepares accreditation decision letter Obtains authorizing official’s signature on the accreditation decision letter and transmits accreditation package to appropriate agency officials

Chief Information Officer Designates a senior agency information security officer Develops and maintains information security policies, procedures, and control techniques to address all applicable requirements Trains and oversees personnel with significant responsibilities for information security Assists senior agency officials concerning their security responsibilities Coordinates with other senior agency officials, reporting annually to the agency head on the effectiveness of the agency information security program

Senior Agency Information Security Officer Serves in a position with primary responsibilities and duties related to information security Carries out the Chief Information Officer responsibilities under FISMA Possesses professional qualifications required to administer information security program functions Heads an office with the mission and resources to assist in ensuring agency compliance with FISMA

Information System Owner Procures, develops, integrates, modifies, operates or maintains an information system. Prepares system security plan and conducts risk assessment Informs agency officials of the need for certification and accreditation; ensures appropriate resources are available Provides necessary system-related documentation to the certification agent Prepares plan of action and milestones to reduce or eliminate vulnerabilities in the information system Assembles final accreditation package and submits to authorizing official

Information System Security Officer Serves as principal staff advisor to the system owner on all matters involving the security of the information system Manages the security aspects of the information system and, in some cases, oversees the day-to-day security operations of the system Assists the system owner in: Developing and enforcing security policies for the information system Assembling the security accreditation package Managing and controlling changes to the information system and assessing the security impacts of those changes

Certification Agent Provides an independent assessment of the system security plan Assesses the security controls in the information system to determine the extent to which the controls are: Implemented correctly; Operating as intended; and Producing the desired outcome with respect to meeting the security requirements of the system Provides recommended corrective actions to reduce or eliminate vulnerabilities in the information system

User Representatives Represent the operational interests and mission needs of the user community Identify mission and operational requirements Serve as liaisons for the user community throughout the system development life cycle Assist in the security certification and accreditation process, when needed

Other Supporting Roles Information Owner Operations Manager Facilities Manager System Administrator

Accreditation Boundaries Uniquely assigning information resources to an information system defines the security accreditation boundary for that system Agencies have great flexibility in determining what constitutes an information system and the resulting accreditation boundary that is associated with that system

Accreditation Boundaries If a set of information resources is identified as an information system, the resources should generally be under the same direct management control Consider if the information resources being identified as an information system— Have the same function or mission objective and essentially the same operating characteristics and security needs Reside in the same general operating environment (or in the case of a distributed information system, reside in various locations with similar operating environments)

Large and Complex Systems Accreditation Boundary Subsystem Component Local Area Network Alpha System Guard Bravo Agency General Support System System security plan reflects information system decomposition with adequate security controls assigned to each subsystem component Security assessment methods and procedures tailored for the security controls in each subsystem component and for the combined system level Security certification performed on each subsystem component and on system-level controls not covered by subsystem certifications Security accreditation performed on the information system as a whole

Common Security Controls Common security controls are those controls that can be applied to one or more agency information systems and have the following properties: The development, implementation, and assessment of common security controls can be assigned to responsible officials or organizational elements (other than the information system owner) The results from the assessment of the common security controls can be reused in security certifications and accreditations of agency information systems where those controls have been applied

Common Security Controls Identification of common security controls is an agency-level activity in collaboration with Chief Information Officer, authorizing officials, information system owners, system security managers, and system security officers Potential for significant cost savings for the agency in security control development, implementation, and assessment

Common Security Controls Common security controls can be applied agency-wide, site-wide, or to common subsystems and assessed accordingly— For example: Contingency planning Incident response planning Security training and awareness Physical and personnel security * Common hardware, software, or firmware ** * Related to the concept of site certification in certain communities ** Related to the concept of type certification in certain communities

Common Security Controls Example: Moderate Impact Agency Information Systems Responsibility of Information System Owners Common Security Controls System Specific Security Controls Responsibility of Designated Agency Official Other Than Information System Owner (e.g., Chief Information Officer, Facilities Manager, etc.) Common security controls developed, implemented, and assessed one time by designated agency official(s) Development and implementation cost amortized across all agency information systems Results shared among all information system owners and authorizing officials where common security controls are applied Maximum re-use of assessment evidence during security certification and accreditation of information systems Security assessment reports provided to information system owners to confirm the security status of common security controls Assessments of common security controls not repeated; only system specific aspects when necessary

Accreditation Decisions Full Authorization To Operate Interim Approval To Operate Denial of Authorization to Operate

Full Authorization to Operate Risk to agency operations, agency assets, or individuals is deemed fully acceptable to the authorizing official Information system is accredited without any significant restrictions or limitations on its operation Authorizing officials may recommend specific actions be taken to reduce or eliminate identified vulnerabilities, where it is cost effective to do so

Interim Approval To Operate Risk to agency operations, agency assets, or individuals is not deemed fully acceptable to the authorizing official, but there is an overarching mission necessity to place the information system into operation or continue its operation Limited authorization to operate the information system under specific terms and conditions Acknowledges greater risk to the agency for a limited period of time

Interim Approval To Operate Terms and conditions, established by the authorizing official, convey limitations on information system operations Information system is not considered accredited during the period of limited authorization to operate Maximum allowable timeframe for an interim approval to operate should generally not exceed one year including all extensions

Interim Approval To Operate At the end of the period of limited authorization, the information system should either meet the requirements for being fully authorized or not be authorized for further operation Renewals or extensions to interim approvals to operate should be discouraged and approved by authorizing officials only under the most extenuating circumstances Security control effectiveness should be monitored during the period of limited authorization

Denial of Authorization to Operate The residual risk to the agency’s operations or assets is deemed unacceptable to the authorizing official Information system is not accredited and should not be placed into operation—or for an information system currently in operation, all activity should be halted Major deficiencies in the security controls in the information system—corrective actions should be initiated immediately

Accreditation Package Approved system security plan Security assessment report Plan of action and milestones

Accreditation Package Documents the results of the security certification Provides the authorizing official with the essential information needed to make a credible risk-based decision on whether to authorize operation of the information system Uses inputs from the information system security officer and the certification agent

System Security Plan Prepared by the information system owner Provides an overview of the security requirements for the information system and describes the security controls in place or planned for meeting those requirements Contains (either as supporting appendices or as references) other key security-related documents for the information system (e.g., risk assessment, contingency plan, incident response plan, system interconnection agreements)

Security Assessment Report Prepared by the certification agent Provides the results of assessing the security controls in the information system to determine the extent to which the controls are: Implemented correctly Operating as intended Producing the desired outcome with respect to meeting the system security requirements Contains a list of recommended corrective actions

Plan of Action and Milestones Prepared by the system owner Describes the measures that have been implemented or planned to: Correct any deficiencies noted during the assessment of the security controls Reduce or eliminate known vulnerabilities in the information system

Accreditation Decision Letter Constructed from information provided by the information system owner in the accreditation package Consists of: Accreditation decision Supporting rationale for the decision Specific terms and conditions imposed on the system owner The contents of security certification and accreditation-related documentation (especially information dealing with system vulnerabilities) should be marked and protected appropriately in accordance with agency policy.

The C&A Process Initiation Phase Security Certification Phase Security Accreditation Phase Continuous Monitoring Phase

Initiation Phase Major Tasks and Subtasks Task 1: Preparation Subtask 1.1: Information System Description Subtask 1.2: Security Categorization Subtask 1.3: Threat Identification Subtask 1.4: Vulnerability Identification Subtask 1.5: Security Control Identification Subtask 1.6: Initial Risk Determination Task 2: Notification and Resource Identification Subtask 2.1: Notification Subtask 2.2: Planning and Resources

Initiation Phase Major Tasks and Subtasks Task 3: System Security Plan Analysis, Update, and Acceptance Subtask 3.1: Security Categorization Review Subtask 3.2: System Security Plan Analysis Subtask 3.3: System Security Plan Update Subtask 3.4: System Security Plan Acceptance

Security Certification Phase Major Tasks and Subtasks Task 4: Security Control Assessment Subtask 4.1: Documentation and Supporting Materials Subtask 4.2: Reuse of Assessment Results Subtask 4.3: Methods and Procedures Subtask 4.4: Security Assessment Subtask 4.5: Security Assessment Report Task 5: Security Certification Documentation Subtask 5.1: Findings and Recommendations Subtask 5.2: System Security Plan Update Subtask 5.3: Accreditation Package Assembly

Security Accreditation Phase Major Tasks and Subtasks Task 6: Accreditation Decision Subtask 6.1: Final Risk Determination Subtask 6.2: Risk Acceptability Task 7: Accreditation Documentation Subtask 7.1: Accreditation Package Transmission Subtask 7.2: System Security Plan Update

Continuous Monitoring Phase Major Tasks and Subtasks Task 8: Configuration Management and Control Subtask 8.1: Documentation of System Changes Subtask 8.2: Security Impact Analysis Task 9: Security Control Monitoring Subtask 9.1: Security Control Selection Subtask 9.2: Selected Security Control Assessment Task 10: Status Reporting and Documentation Subtask 10.1: System Security Plan Update Subtask 10.2: Status Reporting

Certification and Accreditation For Low Impact Information Systems Incorporates the use of self-assessment activities Reduces the associated level of supporting documentation and paperwork Decreases the time spent conducting assessment-related activities Significantly reduces costs to the agency without increasing agency-level risk or sacrificing the overall security of the information system.

Summary

The Bottom Line Standardized security controls facilitate— More consistent, comparable specifications of security controls for information systems Comparability of security plans among business/mission partners A better understanding of the effectiveness of business/mission partner’s security controls and the vulnerabilities in their information systems Greater insights into business/mission partner’s due diligence with regard to security and tolerance for agency-level, mission-related risk

NIST Standards and Guidelines Are intended to promote and facilitate— More consistent, comparable specifications of security controls for information systems More consistent, comparable, and repeatable system assessments of information systems More complete and reliable security-related information for authorizing officials A better understanding of complex information systems and associated risks and vulnerabilities Greater availability of competent security assessment services

FISMA Implementation Project Standards and Guidelines FIPS Publication 199 (Security Categorization) NIST Special Publication 800-37 (C&A) NIST Special Publication 800-53 (Security Controls) NIST Special Publication 800-53A (Assessment) NIST Special Publication 800-59 (National Security) NIST Special Publication 800-60 (Category Mapping) FIPS Publication 200 (Minimum Security Controls)

Contact Information 100 Bureau Drive Mailstop 8930 Gaithersburg, MD USA 20899-8930 Project Manager Assessment Program Dr. Ron Ross Arnold Johnson (301) 975-5390 (301) 975-3247 rross@nist.gov arnold.johnson@nist.gov Special Publications Assessment Methodologies Joan Hash Annabelle Lee (301) 975-3357 (301) 975-2941 joan.hash@nist.gov annabelle.lee@nist.gov Gov’t and Industry Outreach Technical Advisor Dr. Stu Katzke Gary Stoneburner (301) 975-4768 (301) 975-5394 skatzke@nist.gov gary.stoneburner@nist.gov Organizational Accreditations Administrative Support Pat Toth Peggy Himes (301) 975-5140 (301) 975-2489 patricia.toth@nist.gov peggy.himes@nist.gov Comments to: sec-cert@nist.gov World Wide Web: http://csrc.nist.gov/sec-cert