Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.

Slides:



Advertisements
Similar presentations
1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Advertisements

Operating System Security
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 4: Effective Integration.
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
CIP Cyber Security – Security Management Controls
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Software Quality Assurance Plan
Access Control Methodologies
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Database Management System
Access Control Intro, DAC and MAC System Security.
Security Controls – What Works
6/2/2015B.Ramamurthy1 Security B.Ramamurthy. 6/2/2015B.Ramamurthy2 Computer Security Collection of tools designed to thwart hackers Became necessary with.
Chapter 1 – Introduction
MJ10/07041 Session 10 Accounting, Security Management Adapted from Network Management: Principles and Practice © Mani Subramanian 2000 and solely used.
Agenda Scope of Requirement Security Requirements
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Lecture 7 Access Control
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
Privacy By Design Sample Use Case Privacy Controls Insurance Application- Vehicle Data.
Engineering Security Requirement
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Inventory Management & Administration System Tourism suite What is the PCI DSS? The PCI DSS stands for Payment Card Industry Data Security Standard.
Security Policies University of Sunderland CSEM02 Harry R. Erwin, PhD.
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
Annual Certification IDEAS-PD Select your IDEAS role from the list at the right. After completing that module, be sure to take the User Preference Setup.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Information Systems Security Computer System Life Cycle Security.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
1 Boundary Control Chapter Materi: Boundary controls:  Cryptographic controls  Access controls  Personal identification numbers  Digital signatures.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Action SecWG1012:9 “Investigate how role-based access, in compliance with FIPS 140-2, can be used by flight crypto systems.” Where this question comes.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Academic Year 2014 Spring Academic Year 2014 Spring.
ISO/IEC 27001:2013 Annex A.8 Asset management
Effectively Integrating Information Technology (IT) Security into the Acquisition Process A course for the Department of Commerce contracting and contracting.
Privilege Management Chapter 22.
Design Principles and Common Security Related Programming Problems
Computer Security: Principles and Practice
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Chap5: Designing Trusted Operating Systems.  What makes an operating system “secure”? Or “trustworthy”?  How are trusted systems designed, and which.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Chapter 29: Program Security Dr. Wayne Summers Department of Computer Science Columbus State University
Slide 1 Standard Operating Procedures. Slide 2 Goal To review the standard operating procedures Creating the informed consent document Obtaining informed.
21 CFR PART 11.
Database Security and Authorization
General Data Protection Regulation
General Data Protection Regulation
County HIPAA Review All Rights Reserved 2002.
בקרה תוך שימוש ב 21CFR Part 11 / אילן שעיה סמארט לוג'יק
EDUCAUSE Security Professionals Conference 2018 Jason Pufahl, CISO
HIPAA Security Standards Final Rule
Drew Hunt Network Security Analyst Valley Medical Center
Chapter 29: Program Security
ELECTRONIC SIGNATURES
ELECTRONIC SIGNATURES
Presentation transcript:

Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls

Section 5: IT Security Controls In Systems This section addresses several security controls that can be considered during the preparation of the Statement Of Work (SOW) during the acquisition planning and acquisition phases of a procurement. The controls presented in this section are not exhaustive as there are many different controls that can be applied; but, for many systems, a combination of features will be used. The suggested language or the applicable IT security or policy document may be used in the SOW, as appropriate.

Section 5 cont’d: IT Security Controls In Systems Identification and Authentication (This control is used to enforce accountability and access control. All users or authorized groups must have a unique identifier identify and use individual passwords compliant with the DOC Policy on Password Management to authenticate themselves to the system.) Suggested SOW language… The system shall: –Include a mechanism to require users to uniquely identify themselves to the system before beginning to perform any other actions that the system is expected to mediate. –Be able to maintain authentication data that includes information for verifying the identity of individual users (e.g., passwords) –Protect authentication data so that it cannot be accessed by any unauthorized user. –Be able to enforce individual accountability by providing the capability to uniquely identify each individual computer system user. –Raise alarms when attempts are made to guess the authentication data either inadvertently or deliberately (based on a number of incorrect password attempts). See U.S. Department of Commerce IT Security Program Policy Section: 3.15

Section 5 cont’d: IT Security Controls In Systems Access Control (Access control is used to ensure that all access to IT resources is authorized at the level of least privilege where necessary. Access control protects confidentiality and integrity and supports the principles of legitimate use, least privilege, and separation of duty.) Suggested SOW language… The system shall use identification and authorization data to determine user access to information. The system shall be able to define and control access between subjects and objects in the computer system. The enforcement mechanism (e.g., self/group public controls, access control lists, roles) shall allow users to specify and control sharing of those objects by other users, or defined groups of users, or by both, and shall provide controls to limit propagation of access rights. The discretionary access control mechanism shall, either by explicit user action or by default, provide that objects are protected from unauthorized access. These access controls shall be capable of including or excluding access to the granularity of a single user. Access permission to an object by users not already possessing access permission shall be assigned by only authorized users. For further information see U.S. Department of Commerce IT Security Program Policy Section: 3.16

Section 5 cont’d: IT Security Controls In Systems Auditing (Auditing is used to provide protection by enabling organizations to record meaningful actions within the system and to hold the user accountable for each action.) Suggested SOW language… The system shall be able to create, maintain, and protect from modification or unauthorized access or destruction of an audit trail of accesses to the objects it protects. The audit data shall be protected so that read access to it is limited to those who are authorized. The system shall be able to record the following types of events: use of identification and authentication mechanisms, introduction of objects into a user's address space (e.g., file open, program initiation), deletion of objects, and actions taken by computer operators and system administrators and other security relevant events. The system shall also be able to audit any override of human-readable output markings. For each recorded event, the audit record shall be able to identify the date and time of the event, user, type of event, and success or failure of the event. For identification and authentication events, the origin of request (e.g., terminal ID) shall be included in the audit record. For events that introduce an object into a user's address space and for object deletion events, the audit record shall include the name of the object and the object's label. The system administrator shall be able to selectively audit the actions of any one or more users based on individual identity and/or object label. For further information see U.S. Department of Commerce IT Security Program Policy Section: 3.17

Section 5 cont’d: IT Security Controls In Systems Cryptography (Cryptography is a type of control for protecting sensitive unclassified information. The NIST Special Publication , Guideline for Implementing Cryptography in the Federal Government provides a comprehensive reference for government use of cryptography.) Suggested SOW language… The cryptographic module and algorithm shall be validated by a Cryptographic Module Testing laboratory through the NIST Cryptographic Module Validation Program. For further information see U.S. Department of Commerce IT Security Program Policy Section: 3.17 Digital Signature (A digital signature can be used to detect unauthorized modifications to data and to authenticate the identity of the signatory. This capability can be used in IT systems anywhere a signature is required.) Suggested SOW language… The FIPS-approved public key-based digital signature capability provided by shall be validated by the NIST Cryptographic Module Validation Program.

Section 6: Key Security Specifications & Clauses Suggested language for integrating key IT security specifications into offer or quotation documentation can be found in Appendix B of NIST : Some areas covered in the NIST publication are: (a) Control of Hardware and Software (b) Contract Administration (c) Contract/Task Closeout (d) Security Documentation

Section 6 cont’d: Key Security Specifications & Clauses Federal Acquisition Regulation (FAR) Clauses FAR , prescribes FAR , Privacy or Security Safeguards or a clause substantially the same as the clause at , Privacy or Security Safeguards, in solicitations and contracts for information technology which require security of information technology, and/or are for the design, development, or operation of a system of records using commercial information technology services or support services. For a full text version of the clause see

Section 6 cont’d: Key Security Specifications & Clauses Commerce Acquisition Regulation (CAR) Clauses As prescribed in (CAR ), the Contracting Officer shall insert CAR SECURITY REQUIREMENTS FOR INFORMATION TECHNOLOGY RESOURCES or a clause substantially the same as it in all DOC solicitations and contracts for services. As prescribed in (CAR ), the Contracting Officer shall insert CAR SECURITY PROCESSING REQUIREMENTS FOR CONTRACTORS/SUBCONTRACTOR PERSONNEL FOR ACCESSING DOC INFORMATION TECHNOLOGY SYSTEMS or a clause substantially the same as it in all DOC solicitations and contracts for services.

Module 3 Review Summary IT Security Controls In Systems Identification and Authentication Access Control Auditing Cryptography Digital Signature Key Security Specifications & Clauses Federal Acquisition Regulations (FAR) Commerce Acquisition Regulations (CAR)