Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.

Slides:



Advertisements
Similar presentations
Environmental Management Systems Refresher
Advertisements

FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL DATA PROTECTION AND PRIVACY COMMISSIONERS.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
IS 700.a NIMS An Introduction. The NIMS Mandate HSPD-5 requires all Federal departments and agencies to: Adopt and use NIMS in incident management programs.
Tax Risk Management Keeping Up with the Ever-Changing World of Corporate Tax March 27, 2007 Tax Services Bryan Slone March 27, 2007.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Audit Guidance Using the Federal Information System Controls Audit Manual (FISCAM) to Achieve Audit Objectives in Financial and Performance Audits Mickie.
Presented By: Thelma Ameyaw Security Management TEL2813 4/18/2008Thelma Ameyaw TEL2813.
National Institute of Standards and Technology 1 NIST Guidance and Standards on System Level Information Security Management Dr. Alicia Clay Deputy Chief.
SOX and IT Audit Programs John R. Robles Thursday, May 31, Tel:
Environmental Management Systems An Overview With Practical Applications.
Security Controls – What Works
NLRB: Information Security & FISMA Daniel Wood, Chief IT Security February 19, 2004.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Environmental Management Systems Refresher
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Office of Inspector General (OIG) Internal Audit
Computer Security: Principles and Practice
First Practice - Information Security Management System Implementation and ISO Certification.
Risk Assessment Frameworks
Risk Management Framework
Supplier Ethics: Program Checklist
Federal IT Security Professional - Manager FITSP-M Module 1.
Dr. Ron Ross Computer Security Division
Complying With The Federal Information Security Act (FISMA)
Chicagoland IASA Spring Conference
US Federal Industrial Control System (ICS) Security Standards and Guidelines Keith Stouffer National Institute of Standards and Technology (NIST) June.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
Information Security Framework & Standards
An Educational Computer Based Training Program CBTCBT.
Laboratory Biorisk Management Standard CWA 15793:2008
1 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Federal Government Perspectives on Secure Information Sharing Technology Leadership Series August 14,
Applied Technology Services, Inc. Your Partner in Technology Applied Technology Services, Inc. Your Partner in Technology.
NIST Special Publication Revision 1
Federal IT Security Professional - Auditor
1 DOE IMPLEMENTATION WORKSHOP ASSESSING MY EMS Steven R. Woodbury
2008 New York - Member Forum Council for Responsible Jewellery Practices, Ltd. Overview of CRJP.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Roadmap to Maturity FISMA and ISO 2700x. Technical Controls Data IntegritySDLC & Change Management Operations Management Authentication, Authorization.
National Institute of Standards and Technology 1 The Federal Information Security Management Act Reinforcing the Requirements for Security Awareness Training.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
The Value of Common Criteria Evaluations Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology 100 Bureau Drive;
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Managing Risk in New Computing Paradigms Applying FISMA Standards and Guidelines to Cloud Computing Workshop.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
NIST / URAC / WEDi Health Care Security Workgroup Presented by: Andrew Melczer, Ph.D. Illinois State Medical Society.
University of Maryland University College (UMUC) 3/11/2004 POA&M and FISMA What does it really mean? FISSEA Annual Conference.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Internal Control Systems
ISMS Implementation Workshop Adaptive Processes Consulting Pvt. Ltd.
NIST Computer Security Framework and Grids Original Slides by Irwin Gaines (FNAL) 20-Apr-2006 Freely Adapted by Bob Cowles (SLAC/OSG) for JSPG 13-Mar-2007.
NIST HIPAA Security Rule Toolkit Kevin Stine Computer Security Division Information Technology Laboratory National Institute of Standards and Technology.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Risk Management Process Frame = context, strategies Assess = determine.
Policy, Standards and Guidelines Breakout Co-Chairs Victor Hazlewood OCIO Cyber Security, ORNL Kim Milford ISO, University of Rochester.
The NIST Special Publications for Security Management By: Waylon Coulter.
Federal Information Security Management Act (F.I.S.M.A.) [ Justin Killian ]
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
NIST SP800 53R4 WMISACA Conferance April 2016 By Dean E Brown CISSP, ISSMP, CSSLP, MCSD Owner – ITSecurityAxioms.com 262 Barrington Cir Lansing, MI
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
Presenter: Mohammed Jalaluddin
Computer Security Division Information Technology Laboratory
Introduction to the Federal Defense Acquisition Regulation
Matthew Christian Dave Maddox Tim Toennies
Group Meeting Ming Hong Tsai Date :
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Presentation transcript:

Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter

Samuel BowerCraft, MIS, CISA Consulting Manager

Preliminary Items Ask and you shall receive. –Questions? –Thoughts? –Focus! We will all get a break. Get coffee when you need it…I will.

FISMA Federal Information Security Management Act of 2002 Places requirements on government agencies to improve the security of federal information and information systems. Who has ever done SOX work?

Purpose of FISMA Provide a consistent framework for protecting information at the federal level. Provide effective management of risks to information security. Provide for the development of adequate controls to protect information and systems. Provides a mechanism for effective oversight of federal security programs.

FISMA Summary Federal agencies are required to establish an integrated, risk-based information security program that adheres to high-level requirements governing how information security is conducted within their agency. Agencies are required to: –assess the current level of risk associated with their information and information systems –define controls to protect those systems –implement policies and procedures to cost-effectively reduce risk –periodically test and evaluate those controls –train personnel on information security policies and procedures –and manage incidents (incident response plan/process).

FISMA Dictates… Responsibilities of chief security officers. Actions required to assess risk. Actions required to mitigate risk. Security awareness training. Testing of security practices and controls. Procedures for responding to security issues. Procedures for business continuity.

NIST National Institute of Standards and Technology Mission: to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.

FISMA and NIST Provides guidance on FISMA that is detailed and in-depth, and how! Vision includes: Standards for categorizing information and information systems by mission impact. Standards for minimum security requirements for information and information systems. Guidance for selecting appropriate security controls for information systems. Guidance for assessing security controls in information systems and determining security control effectiveness. Guidance for certifying and accrediting information systems.

NIST & FISMA Goals Include: The implementation of cost-effective, risk-based information security programs. The establishment of a level of security due diligence for federal agencies and contractors supporting the federal government. More consistent and cost-effective application of security controls across the federal information technology infrastructure. More consistent, comparable, and repeatable security control assessments. A better understanding of enterprise-wide mission risks resulting from the operation of information systems. More complete, reliable, and trustworthy information for authorizing officials- -facilitating more informed security accreditation decisions. More secure information systems within the federal government including the critical infrastructure of the United States.

FISMA Implementation Timeline Phase 1: Standards and Guidelines Dev. –Focuses on the development of the security standards and guidance required to effectively implement the provisions of the legislation. –The implementation of the NIST standards and guidance will help agencies create robust information security programs and effectively manage risk –

FISMA Implementation Timeline Phase 2: Credentialing Program –Focus on the development of a program for credentialing public and private sector organizations to provide security assessment services for federal agencies. –Security services involve the comprehensive assessment of the management, operational, and technical security controls in federal information systems to determine the extent to which the controls are implemented correctly. –

Compliance Deadlines Legacy Systems: within one (1) year of publication of NIST security standards. Systems under development: upon deployment.

Effective Security Program Periodic Assessment of Risk Policies and procedures based on risk. Plans for providing adequate security. Security awareness training. Periodic testing of controls, at least annually. A formal remediation process. Security incident response process. Business continuity procedures.

FISMA: Risk Assessment 1.Categorize the information system. 2.Select an initial set of security controls. 3.Supplement controls based on risk. 4.Document the controls in the security plan. 5.Implement the security controls. 6.Assess the controls (test). 7.Authorize systems based on risk. 8.Monitor and continually assess controls.

FISMA Risk Assessment Reference… RA Category 1.Categorize 2.Select 3.Supplement 4.Document 5.Implement 6.Assess 7.Authorize 8.Monitor Publication Reference 1.FIPS 199, NIST SP FIPS 200, NIST SP NIST SP , SP NIST SP It depends… 6.NIST SP A 7.NIST SP NIST SP , SP A

Security Planning I/O

Publication Summary FIPS 199 Standards for Security Categorization of Federal Information and Information Systems –Categorization of information and/or information systems. –Based on potential impact based on certain events being experienced by the organization.

Publication Summary SP Guide for Mapping Types of Information and Information Systems to Security Categories –Assists in mapping information and information systems to impact levels for: Confidentiality, Integrity, & Availability. –Volume 1: Relevant to multiple agencies. –Volume 2: Agency and mission specific.

Publication Summary SP Guide for Assessing the Security Controls in Federal Information Systems –Guide to establish common methods and to assess the effectiveness of controls (test). –Designed to foster standardization, and consistent and comparable assessments of information systems.

Publication Summary SP Recommended Security Controls for Federal Information Systems –Provides guidelines for selecting controls for information systems. –For ISACA and CISA and CoBIT lovers…

SP Security Control Topic Areas Risk assessment Certification, Accreditation and Security Assessments System Services and Acquisition Security Planning Configuration Mgmt. System and Communications Protection Incident Response Identification and Authorization Personnel Security Awareness and Training Physical and Environmental Protection Media Protection Contingency Planning Maintenance System and Information Integrity Access Control Accountability and Audit

Publication Summary SP Guide for the Security Certification and Accreditation of Federal Information Systems –Provides guidelines for the certification of information systems to enable consistent, comparable and repeatable evaluations of security controls. –Help achieve more secure systems.

Publication Summary SP Guide for Developing Security Plans for Federal Information Systems –Provides background and a structure for developing a security plan. –Has Information System Security Plan Template!

FISMA Summary FISMA is about information security and a formalized process to attest to the security The process flow is standard audit framework. NIST provides clear guidelines on how to document and proceed. Check out: