NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Protecting Critical Information Assets and Records FIRM Forum.

Slides:



Advertisements
Similar presentations
NISTs Role in Securing Health Information AMA-IEEE Medical Technology Conference on Individualized Healthcare Kevin Stine, Information Security Specialist.
Advertisements

A comparison of Systems Engineering and Security Engineering practices and professionals Or maybe a commercial for the INCOSE working group!
Defending the United States in the Digital Age Information Security Transformation for the Federal Government OWASP APPSEC DC 2010 November 11, 2010.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information System Security Association-Washington D.C. NIST Special Publication Protecting Controlled.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Health IT Standards Committee Meeting Security Risk Management For Health IT Systems and Networks.
NIH Security, FISMA and EPLC Lots of Updates! Where do we start? Kay Coupe NIH FISMA Program Coordinator Office of the Chief Information Officer Project.
Near Real Time Risk Management Transforming the Certification and Accreditation Process ISSA-Baltimore Chapter Meeting May 28, 2008 Dr. Ron Ross.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
National Institute of Standards and Technology 1 NIST Guidance and Standards on System Level Information Security Management Dr. Alicia Clay Deputy Chief.
Managing Risks from Information Systems Building Effective Information Security Programs Data Management Association-National Capital Region January.
Federal Information Security Management Act Applying NIST Information Security Standards and Guidelines Presented to the State of California April.
Risk Assessment Frameworks
Risk Management Framework
Federal IT Security Professional - Manager FITSP-M Module 1.
NIST SP , Revision 1 Applying Risk Management to Information Systems (Transforming the Certification and Accreditation Process) A Tutorial February.
1 Dan Steinberg, JD Portland, OR May 4, 2011 Speaking Notes Privacy and Security for Research Repositories Please do not reuse or republish without attribution.
Dr. Ron Ross Computer Security Division
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 FISMA Next Generation Managing Risk in an Environment of Advanced Persistent Cyber Threats NASA IT Summit.
Information System Security Control Architecture (ISSCA) Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology.
Complying With The Federal Information Security Act (FISMA)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Systems Under Attack Managing Enterprise Risk in Today's World of Sophisticated Threats and.
US Federal Industrial Control System (ICS) Security Standards and Guidelines Keith Stouffer National Institute of Standards and Technology (NIST) June.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Dr. Ron Ross Computer Security Division Information Technology Laboratory Defending the United States.
Panel: Moderator: Michele Iversen Guest Experts: Dr. Ron Ross, Rod Beckstrom, Bob Wandell.
NHTSA Cyber Security Best Practices Study Tim Weisenberger December 7, 2011.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Dr. Ron Ross Computer Security Division Information Technology Laboratory Evolving Cybersecurity Strategies.
Building More Secure Information Systems A Strategy for Effectively Applying the Provisions of FISMA Ron Ross Project Manager FISMA Implementation Project.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Security Standards Promoting Trust, Transparency, and Due Diligence E-Gov Washington Workshop.
1 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Federal Government Perspectives on Secure Information Sharing Technology Leadership Series August 14,
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Building More Secure Information Systems A Strategy for Effectively Applying the Provisions of FISMA Presented to the FISSEA Conference March 23, 2005.
N-Wave Shareholders Meeting May 23, 2012 N-Wave Security Update Lisa
TEL2813/IS2820 Security Management
1 Information System Security Assurance Architecture A Proposed IEEE Standard for Managing Enterprise Risk February 7, 2005 Dr. Ron Ross Computer Security.
NIST Special Publication Revision 1
Federal IT Security Professional - Auditor
The New FISMA Standards and Guidelines or Building More Secure Information Systems A Strategy for Effectively Applying the Provisions of FISMA Dr. Ron.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
VULNERABILITY ASSESSMENT FOR THE POLICE DEPARTMENT’S NETWORK.
National Institute of Standards and Technology 1 The Federal Information Security Management Act Reinforcing the Requirements for Security Awareness Training.
National Institute of Standards and Technology Information Technology Laboratory 1 USG Cloud Computing Technology Roadmap Next Steps NIST Mission: To promote.
VERSION 1.2 National Institute of Standards and Technology 1 Building More Secure Information Systems A Strategy for Effectively Applying the Provisions.
The Value of Common Criteria Evaluations Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology 100 Bureau Drive;
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Managing Risk in New Computing Paradigms Applying FISMA Standards and Guidelines to Cloud Computing Workshop.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Organization, Mission, and Information Systems View 2009 Workshop.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
CategorizeSelectImplementAssessAuthorizeMonitor.
NIST HIPAA Security Rule Toolkit Kevin Stine Computer Security Division Information Technology Laboratory National Institute of Standards and Technology.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Risk Management Process Frame = context, strategies Assess = determine.
Chapter 1: Security Governance Through Principles and Policies
The NIST Special Publications for Security Management By: Waylon Coulter.
National Institute of Standards and Technology 1 Information Systems Under Attack Managing Enterprise Risk in Today's World of Sophisticated Threats and.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
The Risk Management Framework (RMF)
Computer Security Division Information Technology Laboratory
JU September Stakeholder Engagement Conference Webinar #1
Special Publication Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations Dr. Ron Ross Computer Security.
Federal Information Security Management Act Applying NIST Information Security Standards and Guidelines Presented to the State of California April.
Audit Planning Presentation - Disaster Recovery Plan
An Urgent National Imperative
Cybersecurity ATD technical
Group Meeting Ming Hong Tsai Date :
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Protecting Critical Information Assets and Records FIRM Forum June 23, 2009 Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 2 The Threat Situation Continuing serious cyber attacks on federal information systems, large and small; targeting key federal operations and assets…  Attacks are organized, disciplined, aggressive, and well resourced; many are extremely sophisticated.  Adversaries are nation states, terrorist groups, criminals, hackers, and individuals or groups with intentions of compromising federal information systems.  Effective deployment of malicious software causing significant exfiltration of sensitive information (including intellectual property) and potential for disruption of critical information systems/services.

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 3 Risk-Based Protection  Enterprise missions and business processes drive security requirements and associated safeguards and countermeasures for organizational information systems.  Highly flexible implementation; recognizing diversity in missions/business processes and operational environments.  Senior leaders take ownership of their security plans including the safeguards/countermeasures for the information systems.  Senior leaders are both responsible and accountable for their information security decisions; understanding, acknowledging, and explicitly accepting resulting mission/business risk.

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 4 Risk Management Hierarchy NIST SP LEVEL 3 Information System LEVEL 2 Mission / Business Process LEVEL 1 Organization  Multi-tiered Risk Management Approach  Implemented by the Risk Executive Function  Enterprise Architecture and SDLC Focus  Flexible and Agile Implementation STRATEGIC RISK FOCUS TACTICAL RISK FOCUS

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 5 Risk Management Hierarchy NIST SP Risk Management Strategy LEVEL 3 Information System LEVEL 2 Mission / Business Process LEVEL 1 Organization  Risk Executive Function (Oversight and Governance)  Risk Assessment Methodologies  Risk Mitigation Approaches  Risk Tolerance  Risk Monitoring Approaches  Linkage to ISO/IEC 27001

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 6 Risk Management Hierarchy NIST SP Risk Management Strategy LEVEL 3 Information System LEVEL 2 Mission / Business Process LEVEL 1 Organization  Mission / Business Processes  Information Flows  Information Categorization  Information Protection Strategy  Information Security Requirements  Linkage to Enterprise Architecture

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 7 Risk Management Hierarchy NIST SP LEVEL 3 Information System LEVEL 2 Mission / Business Process LEVEL 1 Organization  Linkage to SDLC  Information System Categorization  Selection of Security Controls  Security Control Allocation and Implementation  Security Control Assessment  Risk Acceptance  Continuous Monitoring Risk Management Framework

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 8 Risk Management Framework Security Life Cycle SP Determine security control effectiveness (i.e., controls implemented correctly, operating as intended, meeting security requirements for information system). SP A ASSESS Security Controls Define criticality/sensitivity of information system according to potential worst-case, adverse impact to mission/business. FIPS 199 / SP CATEGORIZE Information System Starting Point Continuously track changes to the information system that may affect security controls and reassess control effectiveness. SP / SP A MONITOR Security State SP AUTHORIZE Information System Determine risk to organizational operations and assets, individuals, other organizations, and the Nation; if acceptable, authorize operation. Implement security controls within enterprise architecture using sound systems engineering practices; apply security configuration settings. IMPLEMENT Security Controls SP FIPS 200 / SP SELECT Security Controls Select baseline security controls; apply tailoring guidance and supplement controls as needed based on risk assessment.

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 9 RISK EXECUTIVE FUNCTION Enterprise-wide Oversight, Monitoring, and Risk Management Strategy INFORMATION SYSTEM INFORMATION SYSTEM Common Controls (Inherited by Information Systems) INFORMATION SYSTEM INFORMATION SYSTEM RMF RISK MANAGEMENT FRAMEWORK POAM SAR SP Authorization Decision POAM SAR SP POAM SAR SP Authorization Decision POAM SAR SP Authorization Decision POAM SAR SP Authorization Decision POAM SAR SP Authorization Decision Architecture Description Architecture Reference Models Segment and Solution Architectures Mission and Business Processes Information System Boundaries Organizational Inputs Laws, Directives, Policy Guidance Strategic Goals and Objectives Priorities and Resource Availability Supply Chain Considerations SP: Security Plan SAR: Security Assessment Report POAM: Plan of Action and Milestones

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 10 Key Risk Management Publication  NIST Special Publication , Revision 3 (Final Public Draft) Recommended Security Controls for Federal Information Systems and Organizations Published: June 2009  Updating all material from NIST Special Publication , Revision 2  Incorporating security controls from Draft CNSS Instruction 1253  Incorporating new security controls for advanced cyber threats  Incorporating information security program-level controls  Incorporating threat appendix for cyber preparedness (Separately vetted and added to SP , Revision 3 when completed) NIST SP

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 11 Key Risk Management Publication  NIST Special Publication , Revision 1 (Final Public Draft) Applying the Risk Management Framework to Federal Information Systems Projected: August 2009  Incorporating comments from Initial Public Draft  Implementing guideline for Risk Management Framework  Transforming previous certification and accreditation process  Integrating Risk Management Framework into the SDLC  Greater emphasis on ongoing monitoring of information system security state  Ongoing security authorizations informed by risk executive function  Greater accountability and assurances for common (inherited) controls  Increased use of automated support tools NIST SP

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 12 Key Risk Management Publication  NIST Special Publication (Third Public Draft) Managing Enterprise Risk: An Integrated System Life Cycle Approach Projected: September 2009  Incorporating public comments from NIST Special Publication , Second Public Draft  Incorporating three-tiered risk management approach: organization, mission/business process, and information system views  Incorporating cyber preparedness information  Providing ISO/IEC mapping to risk management publications NIST SP

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 13 Key Risk Management Publication  NIST Special Publication , Revision 1 (Initial Public Draft) Guide for Conducting Risk Assessments Projected: December 2009  Down scoping current publication from risk management focus to risk assessment focus  Providing guidance for conducting risk assessments at each step in the Risk Management Framework  Incorporating threat information for cyber preparedness NIST SP

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 14 Contact Information 100 Bureau Drive Mailstop 8930 Gaithersburg, MD USA Project LeaderAdministrative Support Dr. Ron RossPeggy Himes (301) (301) Senior Information Security Researchers and Technical Support Marianne Swanson Dr. Stu Katzke (301) (301) Pat TothArnold Johnson (301) (301) Matt SchollInformation and Feedback (301) Web: csrc.nist.gov/sec-cert Comments: