SlideShare ist ein Scribd-Unternehmen logo
1 von 52
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
NIST SP 800-37, Revision 1
Applying Risk Management to Information Systems
(Transforming the Certification and Accreditation Process)
A Tutorial
February 2010
Dr. Ron Ross
Computer Security Division
Information Technology Laboratory
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Introduction
2
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
A Unified Framework
For Information Security
The Generalized Model
Common
Information
Security
Requirements
Unique
Information
Security
Requirements
The “Delta”
National security and non national security information systems
Foundational Set of Information Security Standards and Guidance
• Standardized risk management process
• Standardized security categorization (criticality/sensitivity)
• Standardized security controls (safeguards/countermeasures)
• Standardized security assessment procedures
• Standardized security authorization process
Intelligence
Community
Department
of Defense
Federal Civil
Agencies
Private Sector
State and Local Govt
3
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Enterprise-Wide Risk Management
4
TIER 3
Information System
(Environment of Operation)
TIER 2
Mission / Business Process
(Information and Information Flows)
TIER 1
Organization
(Governance)
STRATEGIC RISK
FOCUS
TACTICAL RISK
FOCUS
 Multi-tiered Risk Management Approach
 Implemented by the Risk Executive Function
 Enterprise Architecture and SDLC Focus
 Flexible and Agile Implementation
NIST
SP 800-39
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Risk Management Hierarchy
NIST
SP 800-39
Risk Management Strategy
TIER 3
Information System
TIER 2
Mission / Business Process
TIER 1
Organization
 Risk Executive Function
(Oversight and Governance)
 Risk Assessment Methodologies
 Risk Mitigation Approaches
 Risk Tolerance
 Risk Monitoring Approaches
 Linkage to ISO/IEC 27001
5
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Risk Management Hierarchy
NIST
SP 800-39
Risk Management Strategy
TIER 3
Information System
TIER 2
Mission / Business Process
TIER 1
Organization
 Mission / Business Processes
 Information Flows
 Information Categorization
 Information Protection Strategy
 Information Security Requirements
 Linkage to Enterprise Architecture
6
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Risk Management Hierarchy
NIST
SP 800-37
TIER 3
Information System
TIER 2
Mission / Business Process
TIER 1
Organization
 Linkage to SDLC
 Information System Categorization
 Selection of Security Controls
 Security Control Allocation
and Implementation
 Security Control Assessment
 Risk Acceptance
 Continuous Monitoring
Risk Management Framework
7
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Risk Management Framework
Security Life Cycle
Determine security control effectiveness
(i.e., controls implemented correctly,
operating as intended, meeting security
requirements for information system).
ASSESS
Security Controls
Define criticality/sensitivity of
information system according to
potential worst-case, adverse
impact to mission/business.
CATEGORIZE
Information System
Starting Point
Continuously track changes to the
information system that may affect
security controls and reassess
control effectiveness.
MONITOR
Security Controls
AUTHORIZE
Information System
Determine risk to organizational
operations and assets, individuals,
other organizations, and the Nation;
if acceptable, authorize operation.
Implement security controls within
enterprise architecture using sound
systems engineering practices; apply
security configuration settings.
IMPLEMENT
Security Controls
SELECT
Security Controls
Select baseline security controls;
apply tailoring guidance and
supplement controls as needed
based on risk assessment.
8
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Common Risk Management Process
 NIST Special Publication 800-37, Revision 1
Guide for Applying the Risk Management Framework to Federal Information
Systems: A Security Life Cycle Approach
 Developed by Joint Task Force Transformation
Initiative Working Group
 Office of the Director of National Intelligence
 Department of Defense
 Committee on National Security Systems
 National Institute of Standards and Technology
 Final Public Draft (November 2009)
 Final Publication (February 2010)
9
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Purpose
 Provide guidelines for applying the Risk Management
Framework to federal information systems—
 To ensure that managing risk from information systems is consistent with
mission/business objectives and the overall risk strategy established by
the senior leadership through the risk executive (function).
 To ensure that information security requirements, including necessary
security controls, are integrated into the organization’s enterprise
architecture and system development life cycle processes.
 To support consistent, well-informed, and ongoing security authorization
decisions (through continuous monitoring), transparency of security and
risk-related information, and reciprocity of authorization results.
 To achieve more secure information and information systems through the
implementation of appropriate risk mitigation strategies.
10
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Applicability
 Federal information systems other than those systems
designated as national security systems as defined in
44 U.S.C., Section 3542.
 National security systems with the approval of federal
officials exercising policy authority over such systems.
State, local, and tribal governments, as well as private
sector organizations are encouraged to consider using
these guidelines, as appropriate.
11
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Target Audience
 Individuals with mission/business ownership responsibilities or
fiduciary responsibilities.
 Individuals with information system development and integration
responsibilities.
 Individuals with information system and/or security
management/oversight responsibilities.
 Individuals with information system and security control
assessment and monitoring responsibilities.
 Individuals with information security implementation and
operational responsibilities.
12
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Characteristics of RMF-Based Process
(1 of 3)
 Promotes near real-time risk management and ongoing
system authorization through the implementation of
robust continuous monitoring processes.
 Integrates information security more closely into the
enterprise architecture and system development life
cycle.
 Provides equal emphasis on the security control
selection, implementation, assessment, and monitoring,
and the authorization of information systems.
13
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Characteristics of RMF-Based Process
(2 of 3)
 Links risk management processes at the information
system level to risk management processes at the
organization level through a risk executive (function).
 Establishes responsibility and accountability for security
controls deployed within organizational information
systems and inherited by those systems.
14
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Characteristics of RMF-Based Process
(3 of 3)
 Encourages the use of automation to:
 Increase consistency, effectiveness, and timeliness of
security control implementation and functionality; and
 Provide senior leaders the necessary information to
take credible, risk-based decisions with regard to the
information systems supporting their core missions and
business functions.
15
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
The Fundamentals
16
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Mainstreaming Information Security
 Information security requirements must be considered
first order requirements and are critical to mission and
business success.
 An effective organization-wide information security
program helps to ensure that security considerations
are specifically addressed in the enterprise architecture
for the organization and are integrated early into the
system development life cycle.
17
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
System Development Life Cycle
(1 of 2)
 RMF steps are carried out within the five phases of the
SDLC.
 System Initiation Phase
 System Development / Acquisition Phase
 System Implementation Phase
 System Operation / Maintenance Phase
 System Disposal Phase
 Flexibility on types of SDLC models employed by the
organization (e.g., spiral, waterfall, agile development).
18
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
System Development Life Cycle
(2 of 2)
 Integrating information security requirements into the
SDLC provides the most efficient and cost-effective
method for an organization to ensure that:
 Cost, schedule, and performance requirements are satisfied.
 Missions and business operations supported by the information
system are adequately protected.
 Security-related activities are carried out as early as possible and
not repeated unnecessarily.
 Risk management activities are not isolated or decoupled from the
management processes employed to develop, implement, operate,
and maintain the information system.
19
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Applying the Risk Management Framework to Information Systems
20
Risk Management
Framework
Near Real Time Security
Status Information
Output from Automated
Support Tools
Authorization
Package
SECURITY PLAN
including updated
Risk Assessment
SECURITY
ASSESSMENT
REPORT
PLAN OF ACTION
AND
MILESTONES
INFORMATION SYSTEM
CATEGORIZE
Information System
ASSESS
Security Controls
AUTHORIZE
Information System
IMPLEMENT
Security Controls
MONITOR
Security Controls
SELECT
Security Controls
Risk Executive
(Function) Inputs
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Information System Boundaries
 Define the scope of protection for information systems
(i.e., what the organization agrees to protect under its
direct control or within the scope of its responsibilities).
 Include the people, processes, and technologies that
are part of the systems supporting the organization’s
missions and business processes.
 Need to be established before information system
security categorization and the development of security
plans.
21
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Large and Complex Systems
 From a centralized development, implementation, and
operations perspective—
 The organization examines the purpose of the information system and
considers the feasibility of decomposing the complex system into more
manageable components, or subsystems.
 From a distributed development, implementation, and
operations perspective—
 The organization recognizes that multiple entities, possibly operating
under different policies, may be contributing to the development,
implementation, and/or operations of the subsystems that comprise the
overall information system.
22
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Large and Complex Systems
(Including System of Systems)
- Security plan reflects information system decomposition with security controls
assigned to each subsystem component.
- Security assessment procedures tailored for the security controls in each subsystem
component and for the combined system level.
- Security control assessment performed on each subsystem component and on
system-level controls not covered by subsystem security control assessments.
- Security authorization conducted on the information system as a whole.
ORGANIZATIONAL INFORMATION SYSTEM
DYNAMIC EXTERNAL
SUBSYSTEM
SUBSYSTEM
LAN ONE
SUBSYSTEM
LAN TWO
SUBSYSTEM
GUARD
SUBSYSTEM
GUARD / GATEWAY
DYNAMIC SUBSYSTEM
STATIC EXTERNAL
SUBSYSTEM
DYNAMIC SUBSYSTEM
(Sub) System Boundary
23
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Security Control Allocation
 Security controls are defined to be system-specific,
hybrid, or common.
 Security controls are allocated to specific components
of organizational information systems as system-
specific, hybrid, or common controls.
 Security control allocations are consistent with the
organization’s enterprise architecture and information
security architecture.
24
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Security Control Accountability
Strategic Risk
Management
Focus
Tactical Risk
Management
Focus
Top Level Risk
Management
Strategy Informs
Operational
Elements
Enterprise-Wide
Security
Assessment
Report
Security
Plan
Plan of Action
and Milestones
Security
Assessment
Report
Plan of Action and
Milestones
Security
Plan
Core Missions / Business Processes
Security Requirements
Policy Guidance
RISK EXECUTIVE FUNCTION
Organization-wide Risk Governance and Oversight
Security
Assessment
Report
Security
Plan
Plan of Action
and Milestones
INFORMATION
SYSTEM
System-specific
Controls
Ongoing
Authorization
Decisions
Ongoing
Authorization
Decisions
Ongoing Authorization Decisions
RISK
MANAGEMENT
FRAMEWORK
(RMF)
COMMON CONTROLS
Security Controls Inherited by Organizational Information Systems
Hybrid
Controls
INFORMATION
SYSTEM
System-specific
Controls
Hybrid
Controls
25
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
The Process
26
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
RMF Task Structure
(1 of 2)
 Task Section
 Describes the specific RMF task within the appropriate step in the Risk
Management Framework.
 Primary Responsibility Section
 Lists the individual or group within the organization having primary responsibility for
executing the RMF task.
 Supporting Roles Section
 Lists the supporting roles within the organization that may be necessary to help the
individual or group with primary responsibility for executing the RMF task.
 SDLC Phase Section
 Lists the particular phase of the SDLC when the RMF task is typically executed.
27
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
RMF Task Structure
(2 of 2)
 Supplemental Guidance Section
 Provides supplemental guidance for executing the RMF task including additional
information from relevant supporting security policies, instructions, standards, and
guidelines.
 References Section
 Provides general references to NIST security standards and guidelines that should
be consulted for additional information with regard to executing the RMF task.
 Provides specific national security system references to CNSS policies and
instructions that should be consulted for additional information with regard to
executing the RMF task when the general references are either insufficient or
inappropriate for national security application.
28
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
RMF Step 1 Tasks
Categorize Information System
 Security Categorization
 Task 1-1: Categorize the information system and document the results of the
security categorization in the security plan.
 Information System Description
 Task 1-2: Describe the information system (including system boundary) and
document the description in the security plan.
 Information System Registration
 Task 1-3: Register the information system with appropriate organizational
program/management offices.
29
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Milestone Checkpoint #1
 Has the organization completed a security categorization of the information
system including the information to be processed, stored, and transmitted by
the system?
 Are the results of the security categorization process for the information
system consistent with the organization’s enterprise architecture and
commitment to protecting organizational mission/business processes?
 Do the results of the security categorization process reflect the organization’s
risk management strategy?
 Has the organization adequately described the characteristics of the
information system?
 Has the organization registered the information system for purposes of
management, accountability, and oversight?
30
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
RMF Step 2 Tasks
Select Security Controls
 Common Control Identification
 Task 2-1: Identify the security controls that are provided by the organization as
common controls for organizational information systems and document the controls
in a security plan (or equivalent document).
 Security Control Selection
 Task 2-2: Select the security controls for the information system and document
the controls in the security plan.
 Monitoring Strategy
 Task 2-3: Develop a strategy for the continuous monitoring of security control
effectiveness and any proposed/actual changes to the information system and its
environment of operation.
 Security Plan Approval
 Task 2-4: Review and approve the security plan.
31
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Milestone Checkpoint #2
(1 of 3)
 Has the organization allocated all security controls to the information system
as system-specific, hybrid, or common controls?
 Has the organization used its risk assessment (either formal or informal) to
inform and guide the security control selection process?
 Has the organization identified authorizing officials for the information
system and all common controls inherited by the system?
 Has the organization tailored and supplemented the baseline security
controls to ensure that the controls, if implemented, adequately mitigate risks
to organizational operations and assets, individuals, other organizations, and
the Nation?
32
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Milestone Checkpoint #2
(2 of 3)
 Has the organization addressed minimum assurance requirements for the
security controls employed within and inherited by the information system?
 Has the organization consulted information system owners when identifying
common controls to ensure that the security capability provided by the
inherited controls is sufficient to deliver adequate protection?
 Has the organization supplemented the common controls with system-
specific or hybrid controls when the security control baselines of the common
controls are less than those of the information system inheriting the controls?
 Has the organization documented the common controls inherited from
external providers?
33
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Milestone Checkpoint #2
(3 of 3)
 Has the organization developed a continuous monitoring strategy for the
information system that reflects the organizational risk management strategy
and commitment to protecting critical missions and business functions?
 Have appropriate organizational officials approved security plans containing
system-specific, hybrid, and common controls?
34
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
RMF Step 3 Tasks
Implement Security Controls
 Security Control Implementation
 Task 3-1: Implement the security controls specified in the security plan.
 Security Control Documentation
 Task 3-2: Document the security control implementation, as appropriate, in the
security plan, providing a functional description of the control implementation
(including planned inputs, expected behavior, and expected outputs).
35
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Milestone Checkpoint #3
(1 of 2)
 Has the organization allocated security controls as system-specific, hybrid, or
common controls consistent with the enterprise architecture and information
security architecture?
 Has the organization demonstrated the use of sound information system and
security engineering methodologies in integrating information technology
products into the information system and in implementing the security controls
contained in the security plan?
 Has the organization documented how common controls inherited by
organizational information systems have been implemented?
36
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Milestone Checkpoint #3
(2 of 2)
 Has the organization documented how system-specific and hybrid security
controls have been implemented within the information system taking into
account specific technologies and platform dependencies?
 Has the organization taken into account the minimum assurance
requirements when implementing security controls?
37
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
RMF Step 4 Tasks
Assess Security Controls
 Assessment Preparation
 Task 4-1: Develop, review, and approve a plan to assess the security controls.
 Security Control Assessment
 Task 4-2: Assess the security controls in accordance with the assessment
procedures defined in the security assessment plan.
 Security Assessment Report
 Task 4-3: Prepare the security assessment report documenting the issues,
findings, and recommendations from the security control assessment.
 Remediation Actions
 Task 4-4: Conduct initial remediation actions on security controls based on the
findings and recommendations of the security assessment report and reassess
remediated control(s), as appropriate..
38
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Milestone Checkpoint #4
(1 of 2)
 Has the organization developed a comprehensive plan to assess the security
controls employed within or inherited by the information system?
 Was the assessment plan reviewed and approved by appropriate
organizational officials?
 Has the organization considered the appropriate level of assessor
independence for the security control assessment?
 Has the organization provided all of the essential supporting assessment-
related materials needed by the assessor(s) to conduct an effective security
control assessment?
 Has the organization examined opportunities for reusing assessment results
from previous assessments or from other sources?
39
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Milestone Checkpoint #4
(2 of 2)
 Did the assessor(s) complete the security control assessment in
accordance with the stated assessment plan?
 Did the organization receive the completed security assessment report with
appropriate findings and recommendations from the assessors)?
 Did the organization take the necessary remediation actions to address the
most important weaknesses and deficiencies in the information system and its
environment of operation based on the findings and recommendations in the
security assessment report?
 Did the organization update appropriate security plans based on the findings
and recommendations in the security assessment report and any subsequent
changes to the information system and its environment of operation?
40
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
RMF Step 5 Tasks
Authorize Information System
 Plan of Action and Milestones
 Task 5-1: Prepare the plan of action and milestones based on the findings and
recommendations of the security assessment report excluding any remediation
actions taken.
 Security Authorization Package
 Task 5-2: Assemble the security authorization package and submit the package to
the authorizing official for adjudication.
 Risk Determination
 Task 5-3: Determine the risk to organizational operations (including mission,
functions, image, or reputation), organizational assets, individuals, other
organizations, or the Nation.
 Risk Acceptance
 Task 5-4: Determine if the risk to organizational operations, organizational assets,
individuals, other organizations, or the Nation is acceptable.
41
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Milestone Checkpoint #5
(1 of 2)
 Did the organization take the necessary remediation actions to address the
most important weaknesses and deficiencies in the information system and its
environment of operation based on the findings and recommendations in the
security assessment report?
 Did the organization develop an appropriate authorization package with all
key documents including the security plan, security assessment report, and
plan of action and milestones (if applicable)?
42
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Milestone Checkpoint #5
(2 of 2)
 Did the final risk determination and risk acceptance by the authorizing
official reflect the risk management strategy developed by the organization
and conveyed by the risk executive (function)?
• Was the authorization decision conveyed to appropriate organizational
personnel including information system owners and common control
providers?
43
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
RMF Step 6 Tasks
Monitor Security Controls
 Information System and Environment Changes
 Task 6-1: Determine the security impact of proposed or actual changes to the
information system and its environment of operation.
 Ongoing Security Control Assessments
 Task 6-2: Assess a selected subset of the technical, management, and
operational security controls employed within and inherited by the information
system in accordance with the organization-defined monitoring strategy.
 Ongoing Remediation Actions
 Task 6-3: Conduct selected remediation actions based on the results of ongoing
monitoring activities, assessment of risk, and the outstanding items in the plan of
action and milestones.
 Key Updates
 Task 6-4: Update the security plan, security assessment report, and plan of action
and milestones based on the results of the continuous monitoring process.
44
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
RMF Step 6 Tasks
Monitor Security Controls
 Security Status Reporting
 Task 6-5: Report the security status of the information system (including the
effectiveness of security controls employed within and inherited by the system) to
appropriate organizational officials on an ongoing basis in accordance with the
organization-defined monitoring strategy.
 Ongoing Risk Determination and Acceptance
 Task 6-6: Review the reported security status of the information system (including
the effectiveness of security controls employed within and inherited by the system)
on an ongoing basis in accordance with the monitoring strategy to determine
whether the risk to organizational operations, organizational assets, individuals,
other organizations, or the Nation remains acceptable.
 Information System Removal and Decommissioning
 Task 6-7: Implement an information system decommissioning strategy, when
needed, which executes required actions when a system is removed from service.
45
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Milestone Checkpoint #6
(1 of 2)
 Is the organization effectively monitoring changes to the information system
and its environment of operation including the effectiveness of deployed
security controls in accordance with the continuous monitoring strategy?
 Is the organization effectively analyzing the security impacts of identified
changes to the information system and its environment of operation?
 Is the organization conducting ongoing assessments of security controls in
accordance with the monitoring strategy?
 Is the organization taking the necessary remediation actions on an ongoing
basis to address identified weaknesses and deficiencies in the information
system and its environment of operation?
46
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Milestone Checkpoint #6
(2 of 2)
 Does the organization have an effective process in place to report the
security status of the information system and its environment of operation to
the authorizing officials and other designated senior leaders within the
organization on an ongoing basis?
 Is the organization updating critical risk management documents based on
ongoing monitoring activities?
 Are authorizing officials conducting ongoing security authorizations by
employing effective continuous monitoring activities and communicating
updated risk determination and acceptance decisions to information system
owners and common control providers?
47
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Summary
48
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Supporting Appendices
 References
 Glossary
 Acronyms
 Roles and Responsibilities
 Summary of RMF Tasks
 Security Authorization
 Continuous Monitoring
 Operational Scenarios
 Security Controls in External Environments
49
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Recognition of Authorization Results
Determining risk to the organization’s
operations and assets, individuals, other
organizations, and the Nation; and the
acceptability of such risk.
The objective is to achieve transparency of prospective partner’s information security
authorization processes…establishing trust relationships based on common, shared
risk management principles.
Organization One
INFORMATION
SYSTEM
Plan of Action and Milestones
Security Assessment Report
Security Plan
Business / Mission
Information Flow
Security Authorization
Information
Plan of Action and Milestones
Security Assessment Report
Security Plan
Organization Two
INFORMATION
SYSTEM
Determining risk to the organization’s
operations and assets, individuals, other
organizations, and the Nation; and the
acceptability of such risk.
50
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Milestone Schedule
 NIST Special Publication 800-37, Revision 1
Guide for Applying the Risk Management Framework to Federal
Information Systems: A Security Life Cycle Approach
 Initial Public Draft: August 2008
 Final Public Draft: November 2009
 Final Publication: February 2010
 Download Publication from NIST Web Site
http://csrc.nist.gov/publications/PubsDrafts.html
 Comments
sec-cert@nist.gov
51
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Contact Information
100 Bureau Drive Mailstop 8930
Gaithersburg, MD USA 20899-8930
Project Leader Administrative Support
Dr. Ron Ross Peggy Himes
(301) 975-5390 (301) 975-2489
ron.ross@nist.gov peggy.himes@nist.gov
Senior Information Security Researchers and Technical Support
Marianne Swanson Kelley Dempsey
(301) 975-3293 (301) 975-2827
marianne.swanson@nist.gov kelley.dempsey@nist.gov
Pat Toth Arnold Johnson
(301) 975-5140 (301) 975-3247
patricia.toth@nist.gov arnold.johnson@nist.gov
Web: csrc.nist.gov/sec-cert Comments: sec-cert@nist.gov
52

Weitere ähnliche Inhalte

Ähnlich wie 5757912.ppt

Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Understanding the NIST Risk Management Framework: 800-37 Rev. 2Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Understanding the NIST Risk Management Framework: 800-37 Rev. 2Denise Tawwab
 
E’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docxE’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docxmydrynan
 
Ise viii-information and network security [10 is835]-solution
Ise viii-information and network  security [10 is835]-solutionIse viii-information and network  security [10 is835]-solution
Ise viii-information and network security [10 is835]-solutionVivek Maurya
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security TutorialNeil Matatall
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionchristophefeltus
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...abhichowdary16
 
Information Security Identity and Access Management Administration 07072016
Information Security   Identity and Access Management Administration 07072016Information Security   Identity and Access Management Administration 07072016
Information Security Identity and Access Management Administration 07072016Leon Blum
 
Security Level Analysis of Academic Information Systems Based on Standard ISO...
Security Level Analysis of Academic Information Systems Based on Standard ISO...Security Level Analysis of Academic Information Systems Based on Standard ISO...
Security Level Analysis of Academic Information Systems Based on Standard ISO...IJCSIS Research Publications
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organizationMohammed Mahfouz Alhassan
 
L1_Introduction.pptx
L1_Introduction.pptxL1_Introduction.pptx
L1_Introduction.pptxStevenTharp2
 
L11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxL11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxStevenTharp2
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comphanleson
 
Information Security
Information SecurityInformation Security
Information Securitychenpingling
 
A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Riskamiable_indian
 

Ähnlich wie 5757912.ppt (20)

Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...Multi agents system service based platform in telecommunication security inci...
Multi agents system service based platform in telecommunication security inci...
 
E1804012536
E1804012536E1804012536
E1804012536
 
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Understanding the NIST Risk Management Framework: 800-37 Rev. 2Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
 
E’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docxE’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docx
 
Ise viii-information and network security [10 is835]-solution
Ise viii-information and network  security [10 is835]-solutionIse viii-information and network  security [10 is835]-solution
Ise viii-information and network security [10 is835]-solution
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security Tutorial
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reaction
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reaction
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
ISACA Cybersecurity Audit course brochure
ISACA Cybersecurity Audit course brochureISACA Cybersecurity Audit course brochure
ISACA Cybersecurity Audit course brochure
 
Information Security Identity and Access Management Administration 07072016
Information Security   Identity and Access Management Administration 07072016Information Security   Identity and Access Management Administration 07072016
Information Security Identity and Access Management Administration 07072016
 
Security Level Analysis of Academic Information Systems Based on Standard ISO...
Security Level Analysis of Academic Information Systems Based on Standard ISO...Security Level Analysis of Academic Information Systems Based on Standard ISO...
Security Level Analysis of Academic Information Systems Based on Standard ISO...
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organization
 
820 1961-1-pb
820 1961-1-pb820 1961-1-pb
820 1961-1-pb
 
L1_Introduction.pptx
L1_Introduction.pptxL1_Introduction.pptx
L1_Introduction.pptx
 
L11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxL11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptx
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.com
 
Information Security
Information SecurityInformation Security
Information Security
 
A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Risk
 
Ijetr042329
Ijetr042329Ijetr042329
Ijetr042329
 

Mehr von Muhammad Mazhar

Compliance & Auditing (UBL).pptx
Compliance & Auditing (UBL).pptxCompliance & Auditing (UBL).pptx
Compliance & Auditing (UBL).pptxMuhammad Mazhar
 
Central Depository Committee of Pakistan.pptx
Central Depository Committee of Pakistan.pptxCentral Depository Committee of Pakistan.pptx
Central Depository Committee of Pakistan.pptxMuhammad Mazhar
 
NISTSP80037rev2-by Beruos.pptx
NISTSP80037rev2-by Beruos.pptxNISTSP80037rev2-by Beruos.pptx
NISTSP80037rev2-by Beruos.pptxMuhammad Mazhar
 

Mehr von Muhammad Mazhar (7)

Compliance & Auditing (UBL).pptx
Compliance & Auditing (UBL).pptxCompliance & Auditing (UBL).pptx
Compliance & Auditing (UBL).pptx
 
Reference_Template.pptx
Reference_Template.pptxReference_Template.pptx
Reference_Template.pptx
 
NISTSP80037rev2.pptx
NISTSP80037rev2.pptxNISTSP80037rev2.pptx
NISTSP80037rev2.pptx
 
DSS RMF Training.pptx
DSS RMF Training.pptxDSS RMF Training.pptx
DSS RMF Training.pptx
 
Central Depository Committee of Pakistan.pptx
Central Depository Committee of Pakistan.pptxCentral Depository Committee of Pakistan.pptx
Central Depository Committee of Pakistan.pptx
 
NISTSP80037rev2-by Beruos.pptx
NISTSP80037rev2-by Beruos.pptxNISTSP80037rev2-by Beruos.pptx
NISTSP80037rev2-by Beruos.pptx
 
CDC (1).pptx
CDC (1).pptxCDC (1).pptx
CDC (1).pptx
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Kürzlich hochgeladen (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

5757912.ppt

  • 1. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY NIST SP 800-37, Revision 1 Applying Risk Management to Information Systems (Transforming the Certification and Accreditation Process) A Tutorial February 2010 Dr. Ron Ross Computer Security Division Information Technology Laboratory
  • 2. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Introduction 2
  • 3. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY A Unified Framework For Information Security The Generalized Model Common Information Security Requirements Unique Information Security Requirements The “Delta” National security and non national security information systems Foundational Set of Information Security Standards and Guidance • Standardized risk management process • Standardized security categorization (criticality/sensitivity) • Standardized security controls (safeguards/countermeasures) • Standardized security assessment procedures • Standardized security authorization process Intelligence Community Department of Defense Federal Civil Agencies Private Sector State and Local Govt 3
  • 4. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Enterprise-Wide Risk Management 4 TIER 3 Information System (Environment of Operation) TIER 2 Mission / Business Process (Information and Information Flows) TIER 1 Organization (Governance) STRATEGIC RISK FOCUS TACTICAL RISK FOCUS  Multi-tiered Risk Management Approach  Implemented by the Risk Executive Function  Enterprise Architecture and SDLC Focus  Flexible and Agile Implementation NIST SP 800-39
  • 5. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Risk Management Hierarchy NIST SP 800-39 Risk Management Strategy TIER 3 Information System TIER 2 Mission / Business Process TIER 1 Organization  Risk Executive Function (Oversight and Governance)  Risk Assessment Methodologies  Risk Mitigation Approaches  Risk Tolerance  Risk Monitoring Approaches  Linkage to ISO/IEC 27001 5
  • 6. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Risk Management Hierarchy NIST SP 800-39 Risk Management Strategy TIER 3 Information System TIER 2 Mission / Business Process TIER 1 Organization  Mission / Business Processes  Information Flows  Information Categorization  Information Protection Strategy  Information Security Requirements  Linkage to Enterprise Architecture 6
  • 7. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Risk Management Hierarchy NIST SP 800-37 TIER 3 Information System TIER 2 Mission / Business Process TIER 1 Organization  Linkage to SDLC  Information System Categorization  Selection of Security Controls  Security Control Allocation and Implementation  Security Control Assessment  Risk Acceptance  Continuous Monitoring Risk Management Framework 7
  • 8. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Risk Management Framework Security Life Cycle Determine security control effectiveness (i.e., controls implemented correctly, operating as intended, meeting security requirements for information system). ASSESS Security Controls Define criticality/sensitivity of information system according to potential worst-case, adverse impact to mission/business. CATEGORIZE Information System Starting Point Continuously track changes to the information system that may affect security controls and reassess control effectiveness. MONITOR Security Controls AUTHORIZE Information System Determine risk to organizational operations and assets, individuals, other organizations, and the Nation; if acceptable, authorize operation. Implement security controls within enterprise architecture using sound systems engineering practices; apply security configuration settings. IMPLEMENT Security Controls SELECT Security Controls Select baseline security controls; apply tailoring guidance and supplement controls as needed based on risk assessment. 8
  • 9. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Common Risk Management Process  NIST Special Publication 800-37, Revision 1 Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach  Developed by Joint Task Force Transformation Initiative Working Group  Office of the Director of National Intelligence  Department of Defense  Committee on National Security Systems  National Institute of Standards and Technology  Final Public Draft (November 2009)  Final Publication (February 2010) 9
  • 10. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Purpose  Provide guidelines for applying the Risk Management Framework to federal information systems—  To ensure that managing risk from information systems is consistent with mission/business objectives and the overall risk strategy established by the senior leadership through the risk executive (function).  To ensure that information security requirements, including necessary security controls, are integrated into the organization’s enterprise architecture and system development life cycle processes.  To support consistent, well-informed, and ongoing security authorization decisions (through continuous monitoring), transparency of security and risk-related information, and reciprocity of authorization results.  To achieve more secure information and information systems through the implementation of appropriate risk mitigation strategies. 10
  • 11. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Applicability  Federal information systems other than those systems designated as national security systems as defined in 44 U.S.C., Section 3542.  National security systems with the approval of federal officials exercising policy authority over such systems. State, local, and tribal governments, as well as private sector organizations are encouraged to consider using these guidelines, as appropriate. 11
  • 12. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Target Audience  Individuals with mission/business ownership responsibilities or fiduciary responsibilities.  Individuals with information system development and integration responsibilities.  Individuals with information system and/or security management/oversight responsibilities.  Individuals with information system and security control assessment and monitoring responsibilities.  Individuals with information security implementation and operational responsibilities. 12
  • 13. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Characteristics of RMF-Based Process (1 of 3)  Promotes near real-time risk management and ongoing system authorization through the implementation of robust continuous monitoring processes.  Integrates information security more closely into the enterprise architecture and system development life cycle.  Provides equal emphasis on the security control selection, implementation, assessment, and monitoring, and the authorization of information systems. 13
  • 14. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Characteristics of RMF-Based Process (2 of 3)  Links risk management processes at the information system level to risk management processes at the organization level through a risk executive (function).  Establishes responsibility and accountability for security controls deployed within organizational information systems and inherited by those systems. 14
  • 15. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Characteristics of RMF-Based Process (3 of 3)  Encourages the use of automation to:  Increase consistency, effectiveness, and timeliness of security control implementation and functionality; and  Provide senior leaders the necessary information to take credible, risk-based decisions with regard to the information systems supporting their core missions and business functions. 15
  • 16. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY The Fundamentals 16
  • 17. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Mainstreaming Information Security  Information security requirements must be considered first order requirements and are critical to mission and business success.  An effective organization-wide information security program helps to ensure that security considerations are specifically addressed in the enterprise architecture for the organization and are integrated early into the system development life cycle. 17
  • 18. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY System Development Life Cycle (1 of 2)  RMF steps are carried out within the five phases of the SDLC.  System Initiation Phase  System Development / Acquisition Phase  System Implementation Phase  System Operation / Maintenance Phase  System Disposal Phase  Flexibility on types of SDLC models employed by the organization (e.g., spiral, waterfall, agile development). 18
  • 19. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY System Development Life Cycle (2 of 2)  Integrating information security requirements into the SDLC provides the most efficient and cost-effective method for an organization to ensure that:  Cost, schedule, and performance requirements are satisfied.  Missions and business operations supported by the information system are adequately protected.  Security-related activities are carried out as early as possible and not repeated unnecessarily.  Risk management activities are not isolated or decoupled from the management processes employed to develop, implement, operate, and maintain the information system. 19
  • 20. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Applying the Risk Management Framework to Information Systems 20 Risk Management Framework Near Real Time Security Status Information Output from Automated Support Tools Authorization Package SECURITY PLAN including updated Risk Assessment SECURITY ASSESSMENT REPORT PLAN OF ACTION AND MILESTONES INFORMATION SYSTEM CATEGORIZE Information System ASSESS Security Controls AUTHORIZE Information System IMPLEMENT Security Controls MONITOR Security Controls SELECT Security Controls Risk Executive (Function) Inputs
  • 21. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Information System Boundaries  Define the scope of protection for information systems (i.e., what the organization agrees to protect under its direct control or within the scope of its responsibilities).  Include the people, processes, and technologies that are part of the systems supporting the organization’s missions and business processes.  Need to be established before information system security categorization and the development of security plans. 21
  • 22. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Large and Complex Systems  From a centralized development, implementation, and operations perspective—  The organization examines the purpose of the information system and considers the feasibility of decomposing the complex system into more manageable components, or subsystems.  From a distributed development, implementation, and operations perspective—  The organization recognizes that multiple entities, possibly operating under different policies, may be contributing to the development, implementation, and/or operations of the subsystems that comprise the overall information system. 22
  • 23. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Large and Complex Systems (Including System of Systems) - Security plan reflects information system decomposition with security controls assigned to each subsystem component. - Security assessment procedures tailored for the security controls in each subsystem component and for the combined system level. - Security control assessment performed on each subsystem component and on system-level controls not covered by subsystem security control assessments. - Security authorization conducted on the information system as a whole. ORGANIZATIONAL INFORMATION SYSTEM DYNAMIC EXTERNAL SUBSYSTEM SUBSYSTEM LAN ONE SUBSYSTEM LAN TWO SUBSYSTEM GUARD SUBSYSTEM GUARD / GATEWAY DYNAMIC SUBSYSTEM STATIC EXTERNAL SUBSYSTEM DYNAMIC SUBSYSTEM (Sub) System Boundary 23
  • 24. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Security Control Allocation  Security controls are defined to be system-specific, hybrid, or common.  Security controls are allocated to specific components of organizational information systems as system- specific, hybrid, or common controls.  Security control allocations are consistent with the organization’s enterprise architecture and information security architecture. 24
  • 25. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Security Control Accountability Strategic Risk Management Focus Tactical Risk Management Focus Top Level Risk Management Strategy Informs Operational Elements Enterprise-Wide Security Assessment Report Security Plan Plan of Action and Milestones Security Assessment Report Plan of Action and Milestones Security Plan Core Missions / Business Processes Security Requirements Policy Guidance RISK EXECUTIVE FUNCTION Organization-wide Risk Governance and Oversight Security Assessment Report Security Plan Plan of Action and Milestones INFORMATION SYSTEM System-specific Controls Ongoing Authorization Decisions Ongoing Authorization Decisions Ongoing Authorization Decisions RISK MANAGEMENT FRAMEWORK (RMF) COMMON CONTROLS Security Controls Inherited by Organizational Information Systems Hybrid Controls INFORMATION SYSTEM System-specific Controls Hybrid Controls 25
  • 26. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY The Process 26
  • 27. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY RMF Task Structure (1 of 2)  Task Section  Describes the specific RMF task within the appropriate step in the Risk Management Framework.  Primary Responsibility Section  Lists the individual or group within the organization having primary responsibility for executing the RMF task.  Supporting Roles Section  Lists the supporting roles within the organization that may be necessary to help the individual or group with primary responsibility for executing the RMF task.  SDLC Phase Section  Lists the particular phase of the SDLC when the RMF task is typically executed. 27
  • 28. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY RMF Task Structure (2 of 2)  Supplemental Guidance Section  Provides supplemental guidance for executing the RMF task including additional information from relevant supporting security policies, instructions, standards, and guidelines.  References Section  Provides general references to NIST security standards and guidelines that should be consulted for additional information with regard to executing the RMF task.  Provides specific national security system references to CNSS policies and instructions that should be consulted for additional information with regard to executing the RMF task when the general references are either insufficient or inappropriate for national security application. 28
  • 29. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY RMF Step 1 Tasks Categorize Information System  Security Categorization  Task 1-1: Categorize the information system and document the results of the security categorization in the security plan.  Information System Description  Task 1-2: Describe the information system (including system boundary) and document the description in the security plan.  Information System Registration  Task 1-3: Register the information system with appropriate organizational program/management offices. 29
  • 30. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Milestone Checkpoint #1  Has the organization completed a security categorization of the information system including the information to be processed, stored, and transmitted by the system?  Are the results of the security categorization process for the information system consistent with the organization’s enterprise architecture and commitment to protecting organizational mission/business processes?  Do the results of the security categorization process reflect the organization’s risk management strategy?  Has the organization adequately described the characteristics of the information system?  Has the organization registered the information system for purposes of management, accountability, and oversight? 30
  • 31. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY RMF Step 2 Tasks Select Security Controls  Common Control Identification  Task 2-1: Identify the security controls that are provided by the organization as common controls for organizational information systems and document the controls in a security plan (or equivalent document).  Security Control Selection  Task 2-2: Select the security controls for the information system and document the controls in the security plan.  Monitoring Strategy  Task 2-3: Develop a strategy for the continuous monitoring of security control effectiveness and any proposed/actual changes to the information system and its environment of operation.  Security Plan Approval  Task 2-4: Review and approve the security plan. 31
  • 32. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Milestone Checkpoint #2 (1 of 3)  Has the organization allocated all security controls to the information system as system-specific, hybrid, or common controls?  Has the organization used its risk assessment (either formal or informal) to inform and guide the security control selection process?  Has the organization identified authorizing officials for the information system and all common controls inherited by the system?  Has the organization tailored and supplemented the baseline security controls to ensure that the controls, if implemented, adequately mitigate risks to organizational operations and assets, individuals, other organizations, and the Nation? 32
  • 33. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Milestone Checkpoint #2 (2 of 3)  Has the organization addressed minimum assurance requirements for the security controls employed within and inherited by the information system?  Has the organization consulted information system owners when identifying common controls to ensure that the security capability provided by the inherited controls is sufficient to deliver adequate protection?  Has the organization supplemented the common controls with system- specific or hybrid controls when the security control baselines of the common controls are less than those of the information system inheriting the controls?  Has the organization documented the common controls inherited from external providers? 33
  • 34. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Milestone Checkpoint #2 (3 of 3)  Has the organization developed a continuous monitoring strategy for the information system that reflects the organizational risk management strategy and commitment to protecting critical missions and business functions?  Have appropriate organizational officials approved security plans containing system-specific, hybrid, and common controls? 34
  • 35. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY RMF Step 3 Tasks Implement Security Controls  Security Control Implementation  Task 3-1: Implement the security controls specified in the security plan.  Security Control Documentation  Task 3-2: Document the security control implementation, as appropriate, in the security plan, providing a functional description of the control implementation (including planned inputs, expected behavior, and expected outputs). 35
  • 36. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Milestone Checkpoint #3 (1 of 2)  Has the organization allocated security controls as system-specific, hybrid, or common controls consistent with the enterprise architecture and information security architecture?  Has the organization demonstrated the use of sound information system and security engineering methodologies in integrating information technology products into the information system and in implementing the security controls contained in the security plan?  Has the organization documented how common controls inherited by organizational information systems have been implemented? 36
  • 37. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Milestone Checkpoint #3 (2 of 2)  Has the organization documented how system-specific and hybrid security controls have been implemented within the information system taking into account specific technologies and platform dependencies?  Has the organization taken into account the minimum assurance requirements when implementing security controls? 37
  • 38. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY RMF Step 4 Tasks Assess Security Controls  Assessment Preparation  Task 4-1: Develop, review, and approve a plan to assess the security controls.  Security Control Assessment  Task 4-2: Assess the security controls in accordance with the assessment procedures defined in the security assessment plan.  Security Assessment Report  Task 4-3: Prepare the security assessment report documenting the issues, findings, and recommendations from the security control assessment.  Remediation Actions  Task 4-4: Conduct initial remediation actions on security controls based on the findings and recommendations of the security assessment report and reassess remediated control(s), as appropriate.. 38
  • 39. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Milestone Checkpoint #4 (1 of 2)  Has the organization developed a comprehensive plan to assess the security controls employed within or inherited by the information system?  Was the assessment plan reviewed and approved by appropriate organizational officials?  Has the organization considered the appropriate level of assessor independence for the security control assessment?  Has the organization provided all of the essential supporting assessment- related materials needed by the assessor(s) to conduct an effective security control assessment?  Has the organization examined opportunities for reusing assessment results from previous assessments or from other sources? 39
  • 40. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Milestone Checkpoint #4 (2 of 2)  Did the assessor(s) complete the security control assessment in accordance with the stated assessment plan?  Did the organization receive the completed security assessment report with appropriate findings and recommendations from the assessors)?  Did the organization take the necessary remediation actions to address the most important weaknesses and deficiencies in the information system and its environment of operation based on the findings and recommendations in the security assessment report?  Did the organization update appropriate security plans based on the findings and recommendations in the security assessment report and any subsequent changes to the information system and its environment of operation? 40
  • 41. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY RMF Step 5 Tasks Authorize Information System  Plan of Action and Milestones  Task 5-1: Prepare the plan of action and milestones based on the findings and recommendations of the security assessment report excluding any remediation actions taken.  Security Authorization Package  Task 5-2: Assemble the security authorization package and submit the package to the authorizing official for adjudication.  Risk Determination  Task 5-3: Determine the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation.  Risk Acceptance  Task 5-4: Determine if the risk to organizational operations, organizational assets, individuals, other organizations, or the Nation is acceptable. 41
  • 42. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Milestone Checkpoint #5 (1 of 2)  Did the organization take the necessary remediation actions to address the most important weaknesses and deficiencies in the information system and its environment of operation based on the findings and recommendations in the security assessment report?  Did the organization develop an appropriate authorization package with all key documents including the security plan, security assessment report, and plan of action and milestones (if applicable)? 42
  • 43. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Milestone Checkpoint #5 (2 of 2)  Did the final risk determination and risk acceptance by the authorizing official reflect the risk management strategy developed by the organization and conveyed by the risk executive (function)? • Was the authorization decision conveyed to appropriate organizational personnel including information system owners and common control providers? 43
  • 44. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY RMF Step 6 Tasks Monitor Security Controls  Information System and Environment Changes  Task 6-1: Determine the security impact of proposed or actual changes to the information system and its environment of operation.  Ongoing Security Control Assessments  Task 6-2: Assess a selected subset of the technical, management, and operational security controls employed within and inherited by the information system in accordance with the organization-defined monitoring strategy.  Ongoing Remediation Actions  Task 6-3: Conduct selected remediation actions based on the results of ongoing monitoring activities, assessment of risk, and the outstanding items in the plan of action and milestones.  Key Updates  Task 6-4: Update the security plan, security assessment report, and plan of action and milestones based on the results of the continuous monitoring process. 44
  • 45. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY RMF Step 6 Tasks Monitor Security Controls  Security Status Reporting  Task 6-5: Report the security status of the information system (including the effectiveness of security controls employed within and inherited by the system) to appropriate organizational officials on an ongoing basis in accordance with the organization-defined monitoring strategy.  Ongoing Risk Determination and Acceptance  Task 6-6: Review the reported security status of the information system (including the effectiveness of security controls employed within and inherited by the system) on an ongoing basis in accordance with the monitoring strategy to determine whether the risk to organizational operations, organizational assets, individuals, other organizations, or the Nation remains acceptable.  Information System Removal and Decommissioning  Task 6-7: Implement an information system decommissioning strategy, when needed, which executes required actions when a system is removed from service. 45
  • 46. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Milestone Checkpoint #6 (1 of 2)  Is the organization effectively monitoring changes to the information system and its environment of operation including the effectiveness of deployed security controls in accordance with the continuous monitoring strategy?  Is the organization effectively analyzing the security impacts of identified changes to the information system and its environment of operation?  Is the organization conducting ongoing assessments of security controls in accordance with the monitoring strategy?  Is the organization taking the necessary remediation actions on an ongoing basis to address identified weaknesses and deficiencies in the information system and its environment of operation? 46
  • 47. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Milestone Checkpoint #6 (2 of 2)  Does the organization have an effective process in place to report the security status of the information system and its environment of operation to the authorizing officials and other designated senior leaders within the organization on an ongoing basis?  Is the organization updating critical risk management documents based on ongoing monitoring activities?  Are authorizing officials conducting ongoing security authorizations by employing effective continuous monitoring activities and communicating updated risk determination and acceptance decisions to information system owners and common control providers? 47
  • 48. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Summary 48
  • 49. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Supporting Appendices  References  Glossary  Acronyms  Roles and Responsibilities  Summary of RMF Tasks  Security Authorization  Continuous Monitoring  Operational Scenarios  Security Controls in External Environments 49
  • 50. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Recognition of Authorization Results Determining risk to the organization’s operations and assets, individuals, other organizations, and the Nation; and the acceptability of such risk. The objective is to achieve transparency of prospective partner’s information security authorization processes…establishing trust relationships based on common, shared risk management principles. Organization One INFORMATION SYSTEM Plan of Action and Milestones Security Assessment Report Security Plan Business / Mission Information Flow Security Authorization Information Plan of Action and Milestones Security Assessment Report Security Plan Organization Two INFORMATION SYSTEM Determining risk to the organization’s operations and assets, individuals, other organizations, and the Nation; and the acceptability of such risk. 50
  • 51. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Milestone Schedule  NIST Special Publication 800-37, Revision 1 Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach  Initial Public Draft: August 2008  Final Public Draft: November 2009  Final Publication: February 2010  Download Publication from NIST Web Site http://csrc.nist.gov/publications/PubsDrafts.html  Comments sec-cert@nist.gov 51
  • 52. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Contact Information 100 Bureau Drive Mailstop 8930 Gaithersburg, MD USA 20899-8930 Project Leader Administrative Support Dr. Ron Ross Peggy Himes (301) 975-5390 (301) 975-2489 ron.ross@nist.gov peggy.himes@nist.gov Senior Information Security Researchers and Technical Support Marianne Swanson Kelley Dempsey (301) 975-3293 (301) 975-2827 marianne.swanson@nist.gov kelley.dempsey@nist.gov Pat Toth Arnold Johnson (301) 975-5140 (301) 975-3247 patricia.toth@nist.gov arnold.johnson@nist.gov Web: csrc.nist.gov/sec-cert Comments: sec-cert@nist.gov 52