DFARS UCTI
|
|
|
- Ferdinand Kory Tucker
- 10 years ago
- Views:
Transcription
1 DFARS UCTI DFARS, SMEAFARS and NIST, OH MY! J. Chandler Hall Cyber Security Evangelist Innovate. Build. Secure. 1
2 Sentar CorporaJon Presenters: Chandler Hall, Program Manager & Cyber Evangelist Rick Koch, Sr. Analyst & SME for IA/CS IntroducJon Innovate. Build. Secure. 2
3 Our Quals Rick Koch 10 years specialized in Cyber Security design, assessment, and management & 30 years holisjc InformaJon Technology experience Cer$fica$ons: CISSP # CerJfied InformaJon Systems Security Professional from (ISC) 2 NSA IAM/IEM - NSA s INFOSEC Assessment / EvaluaJon Methodology MCSE: Security - Microso^ CerJfied Systems Engineer: Security on NT 2000/2003 MCT/MCP+IS - MS CerJfied Trainer / MS CerJfied Professional: Internet Specialist CNE/CNA - CerJfied Novell Engineer / CerJfied Novell Administrator Netware 5.0 CompTIA Linux+, Security+, A+, Network+, and Project+ Chandler Hall Co- Founded AnJ- DDoS Product Company that received Secure CompuJng Magazine s Editor s recommendajon Almost expelled from college hacking the registrajon system Has Rick s Phone Number Has stayed at Holiday Inn Express muljple Jmes Extensive reader & Internet hacker for decades Jailbreaks iphones & ipads for street cred Innovate. Build. Secure. 3
4 Security Soup Anyone? Back in the day DoD, Intel and Civil Agencies were all using different security controls DIACAP is used by DoD; ~100+ high- level security controls Intel has its own (and I can t tell you what they are HaHa) Civil agencies (NASA, etc) use NIST security guidelines and controls from NIST SP (Rev 4 added DoD/Intel controls) DIACAP includes ~200+ NIST security controls NaJonal InsJtute of Standards & Technology (NIST) has a secjon of security controls, used by RMF, etc Innovate. Build. Secure. 4
5 Risk Management Framework Maybe you ve been hearing about this DIACAP replacement called RMF: Risk Management Framework (RMF) Also being adopted by more than DoD/DIACAP contracts DoD Contracts are now adding RMF requirements (includes 800+ NIST controls) Some agencies are in transijon, such as the Army. MDA has implemented it and makes it a contractual requirement. Innovate. Build. Secure. 5
6 DIACAP, RMF, NIST & DFARS DoD Contracts that require DIACAP or RMF compliance now or will include DFARS For example, if you re issuing a contract for development of a leading edge missile system, DFARS applies ProtecJon of CUI has always been required; this ~clarifies DFARS is expected to apply to all DoD contracts and solicitajons (what about Intel ones?) Defense Federal AcquisiJon RegulaJon Supplement (DFARS) covers MANY areas DFARS requires meejng ~51 NIST Controls Innovate. Build. Secure. 6
7 Background on DFARS UCTI Clause Final Rule Issued November 18, 2013 New contracts and renewed contracts now contain compliance requirements Safeguarding of Unclassified Controlled Technical InformaJon imposed mandatory security controls and repor$ng obliga$ons on prime- and sub- contractors (DoD contracts) Innovate. Build. Secure. 7
8 What s this mean? ObligaJon: Contractors will now need to meet minimum cyber security requirements for non- classified informajon that may not have been previously controlled The DFARS requirement is expected to be in ALL DoD solicitajons and contracts going forward. SASC investigation finds Chinese intrusions into key defense contractors Report describes threats to transportation systems, gaps in reporting requirements Wednesday, September 17, 2014 WASHINGTON Hackers associated with the Chinese government successfully penetrated the computer systems of U.S. Transportation Command contractors at least 20 times in a single year, intrusions that show vulnerabilities in the military s system to deploy troops and equipment in a crisis, a Senate Armed Services Committee investigation has found. Innovate. Build. Secure. 8
9 What s GovcWiki.Org Say? EffecJve November 18, 2013 the Rule for Defense Federal AcquisiJon RegulaJon Supplement: Safeguarding Unclassified Controlled Technical InformaJon was published for inclusion into DoD contracts and Prime subcontracts [1]. With the new rule there are: DefiniJons for Controlled Technical InformaJon, Cyber Incident, & Technical InformaJon Reference to DOD InstrucJon DistribuJon Statements on Technical Documents Incident ReporJng Data Requirements Damage Assessment Process Requirements NIST Controls Inclusion of the Clause to Subcontracts Innovate. Build. Secure. 9
10 Simplified PerspecJve Requires DoD Contractors and subcontractors: Safeguard Unclassified Controlled Technical InformaJon (UCTI), somejmes called Controlled Unclassified InformaJon (CUI) Report cyber security incidents within 72 hours Issue: Prime vs Sub: Who reports what? Who polices? (Answers vary) Who is responsible? Safe Answer: The Prime Contractor Innovate. Build. Secure. 10
11 UCTI DefiniJon Controlled Technical InformaJon is defined as technical data or computer so^ware (as defined in DFARS ) with military or space applicajon, modificajon, performance, display, release, disclosure or disseminajon Contractors that have UCTI resident on, or transijng through, their unclassified systems must comply with certain safeguarding protecjons selected using risk- based processes FINAL RULING: regardless of whether or not the clause is incorporated in this solicitajon or contract. Innovate. Build. Secure. 11
12 UCTI Exposure Where do you think it may reside? On laptop, on phone; within in- house server, in Dropbox, icloud, Skydrive SNAPCHAT? Bring Your On Device (BYOD) creates exposure UCTI specificajons clarificajon is requested in ; is on phone; phone is backed- up to home computer or icloud Examples: Contracts, Cost Data, Technical reports & orders; Research & Engineering data; Computer s/w & source; Engineering drawings; SpecificaJons; Data sets; and Studies or Analyses Innovate. Build. Secure. 12
13 NIST controls The DFARS UCTI requirement is based on exisjng NaJonal InsJtute of Standards and Technology (NIST) controls What controls must be used? Contractors must meet a subset of 51 controls from NIST SP (Rev. 4) DFARS defines parts of the 51 that must be evaluated; these are the minimum requirements They do not have to do the full Risk Management Framework (RMF) exercise (such as categorizing and serng the security controls) Innovate. Build. Secure. 13
14 NIST 51 controls CNTL NO. AC-2 AC-3 AC-4 AC-6 AC-7 AC-11 AC-17 AC-18 AC-19 AC-20 AC-22 CNTL NO. ACCESS CONTROL Account Management Access Enforcement Information Flow Enforcement Least Privilege Unsuccessful Logon Attempts Session Lock Remote Access Wireless Access Access Control for Mobile Devices Use of External Information Systems Publicly Accessible Content AWARENESS & TRAINING CNTL NO. AU-2 AU-3 AU-6 AU-7 AU-8 AU-9 CNTL NO. CM-1 CM-6 CM-7 CM-8 CNTL NO. CP-9 AUDIT AND ACCOUNTABILITY Audit Events Content of Audit Records Audit Review, Analysis, and Reporting Audit Reduction and Report Generation Time Stamps Protection of Audit Information CONFIGURATION MANAGEMENT Configuration Management Policy and Procedures Configuration Settings Least Functionality Information System Component Inventory CONTINGENCY PLANNING Information System Backup CNTL NO. IR-2 IR-3 IR-4 IR-5 IR-6 CNTL NO. MA-4 MA-5 MA-6 CNTL NO. MP-4 MP-6 CNTL NO. INCIDENT RESPONSE Incident Response Training Incident Response Testing Incident Handling Incident Monitoring Incident Reporting MAINTENANCE Nonlocal Maintenance Maintenance Personnel Timely Maintenance MEDIA PROTECTION Media Storage Media Sanitization PHYSICAL AND ENVIRONMENTAL PROTECTION CNTL NO. PM-10 PROGRAM MANAGEMENT Security Authorization Process CNTL RISK ASSESSMENT NO. RA-5 VULNERABILITY SCANNING UPDATE TOOL CAPABILITY CNTL NO. SC-2 SC-4 SC-7 SC-8 SC-13 SC-15 SC-28 SYSTEM AND COMMUNICATIONS PROTECTION Application Partitioning Information in Shared Resources Boundary Protection Transmission Confidentiality and Integrity Cryptographic Protection Collaborative Computing Devices Protection of Information at Rest AT-2 Security Awareness Training CNTL NO. IA-2 IA-4 IA-5 AUTHENTICATION Identification and Authentication (Organizational Users) Identifier Management Authenticator Management PE-2 PE-3 PE-5 Physical Access Authorizations Physical Access Control Access Control for Output Devices CNTL NO. SI-2 SI-3 SI-4 SYSTEM AND INFORMATION INTEGRITY Flaw Remediation Malicious Code Protection Information System Monitoring Innovate. Build. Secure. 14
15 Example of Assessment Access Control Audit & Accountability Iden$fica$on and Authen$ca$on Media Protec$on Program Management AC- 2 AU- 2 IA- 2 MP- 4 PM- 10 AC- 3(4) AU- 3 IA- 4 MP- 6 AC- 4 AU- 6(1) IA- 5(1) Physical and Environmental Protec$on System & Informa$on Integrity AC-3(4) means only paragraph 4 of AC-3 must be met AC- 6 AU- 7 Incident Response PE- 2 SI- 2 AC- 7 AU- 8 IR- 2 PE- 3 SI- 3 AC- 11(1) AU- 9 IR- 4 PE- 5 SI- 4 AC- 17(2) AC- 18(1) Configura$on Management IR- 5 System & Comm Protec$on IR- 6 Maintenance SC- 2 AC- 19 CM- 2 Con$ngency Planning MA- 4(6) SC- 4 AC- 20(1) CM- 6 CP- 9 MA- 5 SC- 7 AC- 20(2) CM- 7 Awareness & Training MA- 6 SC- 8(1) AC- 22 CM- 8 AT- 2 Risk Assessment SC- 13 System Interconnec$ons RA- 5 SC- 15 CA- 2(5) SC- 28 Innovate. Build. Secure. 15
16 How Hard is This? You only have to do certain secjons within each control Compliance audit takes less than a week if you have experience understanding the controls and what they mean Reminder: MeeJng this Requirement doesn t guarantee you re protected Be Ready to Report! Are you Set Up? How about the Sub- Contractors? AlternaJve Controls or ProtecJve Measures may be allowed; must be submited in wrijng Innovate. Build. Secure. 16
17 Compliance with Holes? Minimal: perform the compliance audit and idenjfy holes or weakness in a POA&M (Plan Of AcJon and Milestones) Some contracts have stronger wording, stajng they must be compliant with the controls TEAMS (MiDAESS) Industry Day stated they will require contractors that submit PROPOSALs to submit a DFARS UCTI Compliance Report included in a Cyber Security Plan We believe meejng a defined maturity level with proof points is the Best PracJces goal and beter than merely a Pass Fail score Should you request that the contractor provide evidence of compliance or audit? Can You? Its Seems You Should Be Better Safe than Sorry Innovate. Build. Secure. 17
18 Clause & Proof Examples ExisJng Contract Updated: MDA TEAMS Proposals Requirement (Feb 11, 2014): Stated at Industry Day: Bidders must provide a cyber security plan that includes DFARS UCTI Industry Day PowerPoint: TEAMS Performance Work Statements will contain specific Cybersecurity requirements (Must be flowed- down to subs) that addresses Contractor s Compliance with DFARS UCTI Innovate. Build. Secure. 18
19 Incident ReporJng Incident ReporJng is required within 72 hours of a cyber incident that affects DoD UCTI ExfiltraJon, manipulajon or compromise of UCTI resident on, or transipng through, a contractor s or its subcontractors unclassified informajon systems Set Up Your ReporJng Account before it s needed What is a reportable incident? Web server hacked? server compromised! Router is hacked! Innovate. Build. Secure. 19
20 We re an Easy Target Due to our policies and freedom, our society is much more dependent on the Internet Many of the cyber- atacking najon state sociejes could survive Internet outages for longer, it is believed Innovate. Build. Secure. 20
21 Cyber Atacks Are Rampant Nov 6, 2014 Nov 6, 2014 Oct 13, 2014 Innovate. Build. Secure. 21
22 Summary It s about NaJonal Security and the Time is Now! To be compliant with DFARS , contractors must establish repor$ng and accountability requirements and flow UCTI requirements to subcontractors. Contractors must also maintain knowledge of the company s and subcontractors current state of compliance, including gaps to the required controls and documented mijgajng controls. Finally, contractors must ac$vely monitor all systems that store, manipulate or transmit UCTI for cyber events You Have to Report within 72 Hours As a Prime, you may be held responsible for monitoring and reporjng sub- contractor breeches It s becoming a requirement for submirng bids Innovate. Build. Secure. 22
23 What to do Now? Determine if you have or expect to have any DoD contracts with this clause Will there be any UCTI residing or transijng through your IT system IF so, determine if they comply with the NIST standards, modify if not or request an excepjon Develop a process/protocol for responding to any IOC Determine what conjnuous review is required (especially if RMF will be a requirement) Innovate. Build. Secure. 23
24 Help is Available Sentar (Hey boss, here s the Shameless Plug!) Defense Industrial Base Cybersecurity & InformaJon Assurance Program (DB CS/IA) This program allows eligible DIB companies to receive U.S. Government (USG) threat informapon and to share informa6on about network intrusions that could compromise DoD programs and missions. [ ]Furthermore, the informapon sharing arrangements are memorialized in a standardized bilateral agreement, known as a Framework Agreement (FA), signed by the parpcipapng DIB company and the Government. htp://goo.gl/ixvy4b Innovate. Build. Secure. 24
25 Who You Gonna Call? Contractor shall report as much of the following informajon as can be obtained to the DoD within 72 hours of discovery: (i) Data Universal Numbering System (DUNS). (ii) Contract numbers affected unless all contracts by the company are affected. (iii) Facility CAGE code if the locajon of the event is different than the prime Contractor locajon. (iv) Point of contact if different than the POC recorded in the System for Award Management (address, posijon, telephone, ). (v) ContracJng Officer point of contact (address, posijon, telephone, ). (vi) Contract clearance (vii) Name of subcontractor and CAGE code if this was an incident on a subcontractor network. (viii) DOD programs, pla{orms or systems involved. (ix) LocaJon(s) of compromise. (x) Date incident discovered. (xi) Type of compromise (e.g., unauthorized access, inadvertent release, other). (xii) DescripJon of technical informajon compromised. (xiii) Any addijonal informajon relevant to the informajon compromise. Innovate. Build. Secure. 25
26 Is this the Org You Seek? DSIE.net is the Defense Industrial Base InformaJon Sharing & Analysis OrganizaJon (see later slide). It is now incorporated into the DIB ISAO/DSIE dibnet.dod.mil ; uses DoD- approved PKI CerJficates to exchange encrypted info (iase.dod.mil/pki/eca) DiBISAC.net: located in Huntsville; alternajve to DSIE.net Innovate. Build. Secure. 26
27 Other Resources Federal Register Final Ruling Language: htps:// 2013/11/18/ /defense- federal- acquisijon- regulajon- supplement- safeguarding- unclassified- controlled- technical pdf/523025p.pdf Nice brochure that captures the basic facts: htp://goo.gl/djvlqb (aia- aerospace.org ; look for Def & Security) Innovate. Build. Secure. 27
28 Any QuesJons? Sentar provides a DFARS UCTI compliance service. It typically takes less than four days onsite. Your report will be provided within two weeks of the on-site service. You ll be given the tools and training to perform annual compliance updates on your own. Please contact me today if you are interested in learning more: [email protected] Innovate. Build. Secure. 28
29 QuesJon: Who Decides? Another thing the clause states is if you cannot meet a required NIST control; or if it doesn t apply to you, you must submit it in wrijng to the contract officer. Are contracjng officers supposed to make a technical, informed decision on whether or not an alternate control is adequate? Do they have a guideline; or training that states how they assess an alternate control? Or is it similar to that of a DSS rep; that a system could pass under one rep? Innovate. Build. Secure. 29
30 Q: How to register for reporjng? DSIE? DIB ISAO? DIB ISAC? The Defense Security InformaJon Exchange (DSIE) is (WAS?) an NDIA membership- based cyber informajon- sharing body focused on protecjng and defending the Defense Industrial Base (DIB) crijcal cyber networks and systems, and the informajon residing thereon. For more informajon Was a sub- org under NDIA, but is now incorporated to the DIB ISAO and is now a single enjty The DFARS clause requires you to report incidents into the DOD DIB portal. RegistraJon at dibnet.dod.mil Contact: Saundra Sandee Throneberry for more info. ([email protected]) Innovate. Build. Secure. 30
31 Q: Marked Documents What about the technical data transijng around the IT system prior to the official marking of the document done when provided formally to the DoD? We believe the exposure and responsibility exists even if all the informajon isn t marked accordingly DoD Directive Withholding of Unclassified Technical Info from Public Innovate. Build. Secure. 31
32 QuesJon on NIST A quesjon regarding the 51 controls: The DFARS table somejmes specifies certain segments of the control; such as AC- 3 (4); which I read as the minimum requirement is AC- 3 (4), and AC- 3 (1), (2), etc are opjonal. For other controls, segments are not specified, such as AC- 2. My quespon is, for the unspecified control segments, are we expected to meet NIST Low, Moderate, or High; or should we assume all segments for these controls? Innovate. Build. Secure. 32
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
AF Life Cycle Management Center
AF Life Cycle Management Center Avionics Weapon Systems Cybersecurity Risk Management Framework Assessment & Authorization Update Harrell Van Norman AFLCMC/EZAS Cybersecurity Technical Expert [email protected]
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems Samuel R. Ashmore Margarita Castillo Barry Gavrich CS589 Information & Risk Management New Mexico Tech Spring 2007
Altius IT Policy Collection Compliance and Standards Matrix
Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy
COORDINATION DRAFT. FISCAM to NIST Special Publication 800-53 Revision 4. Title / Description (Critical Element)
FISCAM FISCAM 3.1 Security (SM) Critical Element SM-1: Establish a SM-1.1.1 The security management program is adequately An agency/entitywide security management program has been developed, An agency/entitywide
Security and Privacy Controls for Federal Information Systems and Organizations
NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems JOINT TASK FORCE TRANSFORMATION INITIATIVE This document contains excerpts from NIST Special Publication
CTR System Report - 2008 FISMA
CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
Security Self-Assessment Tool
Security Self-Assessment Tool State Agencies Receiving FPLS Information, 7/15/2015 Contents Overview... 2 Access Control (AC)... 3 Awareness and Training (AT)... 8 Audit and Accountability (AU)... 10 Security
Industrial Security Field Operations
Defense Security Service Industrial Security Field Operations NISP Authorization Office (NAO) (Formerly Office of the Designated Approving Authority) NISPOM to NIST (800-53r4) Security Control Mapping
Requirements For Computer Security
Requirements For Computer Security FTA/IRS Safeguards Symposium & FTA/IRS Computer Security Conference April 2, 2008 St. Louis 1 Agenda Security Framework Safeguards IT Security Review Process Preparing
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
Security Language for IT Acquisition Efforts CIO-IT Security-09-48
Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Office of the Senior Agency Information Security Officer VERSION HISTORY/CHANGE RECORD Change Number Person Posting Change Change Reason
Get Confidence in Mission Security with IV&V Information Assurance
Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving
Security Controls Assessment for Federal Information Systems
Security Controls Assessment for Federal Information Systems Census Software Process Improvement Program September 11, 2008 Kevin Stine Computer Security Division National Institute of Standards and Technology
System Security Certification and Accreditation (C&A) Framework
System Security Certification and Accreditation (C&A) Framework Dave Dickinson, IOAT ISSO Chris Tillison, RPMS ISSO Indian Health Service 5300 Homestead Road, NE Albuquerque, NM 87110 (505) 248-4500 fax:
Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN
Independent Security Operations Oversight and Assessment Captain Timothy Holland PM NGEN 23 June 2010 Independent Security Operations Oversight and Assessment Will Jordan NGEN Cyber Security 23 June 2010
Department of Defense INSTRUCTION. Security of Unclassified DoD Information on Non-DoD Information Systems
Department of Defense INSTRUCTION NUMBER 8582.01 June 6, 2012 DoD CIO SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems References: See Enclosure 1 1. PURPOSE. This Instruction:
Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat
Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat Centers for Disease and Prevention National Center for Chronic Disease Prevention and Health
The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -
45 min Webinar: November 14th, 2014 The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - www.cunesoft.com Rainer Schwarz Cunesoft Holger Spalt ivigilance 2014 Cunesoft GmbH PART
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
DIVISION OF INFORMATION SECURITY (DIS)
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Information Systems Acquisitions, Development, and Maintenance v1.0 October 15, 2013 Revision History Update this table every time a new
CONTINUOUS MONITORING
CONTINUOUS MONITORING Monitoring Strategy Part 2 of 3 ABSTRACT This white paper is Part 2 in a three-part series of white papers on the sometimes daunting subject of continuous monitoring (CM) and how
VIRGINIA DEPARTMENT OF MOTOR VEHICLES IT SECURITY POLICY. Version 2.
VIRGINIA DEPARTMENT OF MOTOR VEHICLES IT SECURITY POLICY Version 2., 2012 Revision History Version Date Purpose of Revision 2.0 Base Document 2.1 07/23/2012 Draft 1 Given to ISO for Review 2.2 08/15/2012
Security Control Standard
Department of the Interior Security Control Standard Maintenance January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information Officer
IT Security Management Risk Analysis and Controls
IT Security Management Risk Analysis and Controls Steven Gordon Document No: Revision 770 3 December 2013 1 Introduction This document summarises several steps of an IT security risk analysis and subsequent
CMS POLICY FOR THE INFORMATION SECURITY PROGRAM
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS POLICY FOR THE INFORMATION SECURITY PROGRAM FINAL Version 4.0 August 31, 2010 Document Number: CMS-CIO-POL-SEC02-04.0
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-510 GENERAL (Office of Origin: IRM/IA) 5 FAH-11 H-511 INTRODUCTION 5 FAH-11 H-511.1 Purpose a. This subchapter implements the policy
Thank You To Our Sponsors
Thank You To Our Sponsors Thank You To Our Sponsors Thank You To Our Sponsors Cybersecurity Panel Managing Risk in the Aerospace and Defense Industry Peter S. Chiou Principal Strategist and Business Development
System Security Engineering and Program Protection Integration into SE
System Security Engineering and Program Protection Integration into SE Melinda Reed Deputy Director for Program Protection Office of the Deputy Assistant Secretary of Defense for Systems Engineering 17
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments
Government of Canada Managed Security Services (GCMSS) Appendix D: Security Control Catalogue ITSG-33 - Annex 3 DRAFT 3.1
Government of Canada Managed Security Services (GCMSS) Appendix D: Security Control Catalogue ITSG-33 - Annex 3 DRAFT 3.1 Date: June 15, 2012 Information Technology Security Guidance Guide to Managing
Information Security for Managers
Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview
Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
Cyber R &D Research Roundtable
Cyber R &D Research Roundtable 2 May 2013 N A T I O N A L S E C U R I T Y E N E R G Y & E N V I R O N M E N T H E A L T H C Y B E R S E C U R I T Y Changing Environment Rapidly Evolving Threat Changes
POSTAL REGULATORY COMMISSION
POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1
Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program
U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Information Technology Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program Report.
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is
FISMA NIST 800-53 (Rev 4) Audit and Accountability: Shared Public Cloud Infrastructure Standards
FISMA NIST 800-53 (Rev 4) Audit and Accountability: Shared Public Cloud Infrastructure Standards Standard Requirement per NIST 800-53 (Rev. 4) CloudCheckr Action AU-3/ AU3(1) AU-3 CONTENT OF AUDIT RECORDS
Bellingham Control System Cyber Security Case Study
Bellingham Control System Cyber Security Case Study Marshall Abrams Joe Weiss Presented at at 2007 Annual Computer Security Applications Conference Case Study Synopsis Examine actual control system cyber
FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL
FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL Clifton Gunderson LLP s Independent Audit of the Federal Housing Finance Agency s Information Security Program - 2011 Audit Report: AUD-2011-002
HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY
Presented by Evan Sylvester, CISSP
Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information
Information Security @ Blue Valley Schools FEBRUARY 2015
Information Security @ Blue Valley Schools FEBRUARY 2015 Student Data Privacy & Security Blue Valley is committed to providing an education beyond expectations to each of our students. To support that
HHS Information System Security Controls Catalog V 1.0
Information System Security s Catalog V 1.0 Table of Contents DOCUMENT HISTORY... 3 1. Purpose... 4 2. Security s Scope... 4 3. Security s Compliance... 4 4. Security s Catalog Ownership... 4 5. Security
2015 Security Training Schedule
2015 Security Training Schedule Risk Management Framework Course (RMF) / $1,950.00 Per Student Dates June 1-4 Location 4775 Centennial Blvd., Suite 103 / Colorado Springs, CO 80919 July 20 23 444 W. Third
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.2 9/28/11 INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A) I. PURPOSE This directive
Overview of the HIPAA Security Rule
Office of the Secretary Office for Civil Rights () Overview of the HIPAA Security Rule Office for Civil Rights Region IX Alicia Cornish, EOS Sheila Fischer, Supervisory EOS Topics Upon completion of this
Security Control Standard
Department of the Interior Security Control Standard Security Assessment and Authorization January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,
Security Compliance In a Post-ACA World
1 Security Compliance In a Post-ACA World Security Compliance in a Post-ACA World Discussion of building a security compliance framework as part of an ACA Health Insurance Exchange implementation. Further
Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples The
WRITTEN INFORMATION SECURITY PROGRAM (WISP) ACME Consulting Services, Inc.
WRITTEN INFORMATION SECURITY PROGRAM (WISP) ACME Consulting Services, Inc. Copyright 2016 Table of Contents WRITTEN INFORMATION SECURITY PROGRAM (WISP) OVERVIEW 10 INTRODUCTION 10 PURPOSE 10 SCOPE & APPLICABILITY
Cyber Security for Advanced Manufacturing Next Steps
Status Update Cyber Security for Advanced Manufacturing Next Steps NDIA Manufacturing Division February 19, 2015 Michael McGrath Consultant, Analytic Services Inc. [email protected] NDIA White
Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute
Wasting Money on the Tools? Automating the Most Critical Security Controls Bonus: Gaining Support From Top Managers for Security Investments Mason Brown Director, The SANS Institute The Most Trusted Name
ForeScout CounterACT and Compliance June 2012 Overview Major Mandates PCI-DSS ISO 27002
ForeScout CounterACT and Compliance An independent assessment on how network access control maps to leading compliance mandates and helps automate GRC operations June 2012 Overview Information security
Enterprise Audit Management Instruction for National Security Systems (NSS)
UNCLASSIFIED September 2013 Enterprise Audit Management Instruction for National Security Systems (NSS) THIS DOCUMENT PRESCRIBES STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION UNCLASSIFIED
Privacy Impact Assessment
For: Great Lakes Computer System (GLCS) Great Lakes Educational Loan Services, Inc. (GOALS) Date: June 18, 2013 Point of Contact: Gregory Plenty (202) 377-3253 [email protected] System Owner: Keith
Security Control Standard
Department of the Interior Security Control Standard Risk Assessment January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information
CRR-NIST CSF Crosswalk 1
IDENTIFY (ID) Asset Management (AM): The data, personnel, devices, systems, and facilities that enable the organization to achieve business purposes are identified and managed consistent with their relative
C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)
I. Title A. Name: Information Systems Security Incident Response Policy B. Number: 20070103-secincidentresp C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
Understanding HITRUST s Approach to Risk vs. Compliance-based Information Protection
Understanding Compliance vs. Risk-based Information Protection 1 Understanding HITRUST s Approach to Risk vs. Compliance-based Information Protection Why risk analysis is crucial to HIPAA compliance and
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
Minimum Security Requirements for Federal Information and Information Systems
FIPS PUB 200 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Minimum Security Requirements for Federal Information and Information Systems Computer Security Division Information Technology Laboratory
OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700
OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700 OPERATIONAL TEST AND EVALUATION AUG 0 1 2014 MEMORANDUM FOR COMMANDER, ARMY TEST AND EVALUATION COMMAND COMMANDER, AIR
Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper
Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &
Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer
IPSWITCH FILE TRANSFER WHITE PAPER Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer www.ipswitchft.com Adherence to United States government security standards can be complex to plan
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6
to Assess Cybersecurity Preparedness 1 of 6 Introduction Long before the signing in February 2013 of the White House Executive Order Improving Critical Infrastructure Cybersecurity, HITRUST recognized
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
Information Technology Security Requirements Summary
Information Technology Security Requirements Summary 1. Background Investigation Contractor employees who will have access to federal information technology (IT) systems are subject to background investigations
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
Report of Evaluation OFFICE OF INSPECTOR GENERAL. OIG 2014 Evaluation of the Farm Credit OIG 2014 Administration s. Management Act.
OFFICE OF INSPECTOR GENERAL Report of Evaluation OIG 2014 Evaluation of the Farm Credit OIG 2014 Administration s Evaluation of the Farm Compliance Credit Administration s with the Federal Information
DoD CIO UNCLASSIFIED. DIB CS Program Value-Added
DoD CIO DoD-Defense Industrial Base Cybersecurity (DIB CS) Information Sharing Program A Public-Private Cybersecurity Partnership Ms. Vicki Michetti Director, DoD-DIB CS Program October, 2015 1 DIB CS
Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense
Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense John M. Gilligan Information systems Security Association National Capital Chapter January 19, 2010 1 Topics Background
Five keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
SUPPLIER SECURITY STANDARD
SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard
INFORMATION TECHNOLOGY SECURITY POLICY 60-702. Table of Contents
Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE INSTRUCTION 60-702 December 21, 2009 Information Technology INFORMATION TECHNOLOGY
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
SECURITY CONTROLS AND RISK MANAGEMENT FRAMEWORK
SECURITY CONTROLS AND RISK MANAGEMENT FRAMEWORK BACKGROUND The National Institute of Standards and Technology (NIST) Special Publication 800-53 defines a comprehensive set of controls that is the basis
Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance
WHITE paper Complying with the Federal Information Security Management Act How Tripwire Change Auditing Solutions Help page 2 page 3 page 3 page 3 page 4 page 4 page 5 page 5 page 6 page 6 page 7 Introduction
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
Evaluation Report. Office of Inspector General
Evaluation Report OIG-08-035 INFORMATION TECHNOLOGY: Network Security at the Office of the Comptroller of the Currency Needs Improvement June 03, 2008 Office of Inspector General Department of the Treasury
INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.
INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc. Copyright 2016 Table of Contents INSTRUCTIONS TO VENDORS 3 VENDOR COMPLIANCE PROGRAM OVERVIEW 4 VENDOR COMPLIANCE
Office of Inspector General
Office of Inspector General DEPARTMENT OF HOMELAND SECURITY U.S. Department of Homeland Security Washington, DC 20528 Office of Inspector General Security Weaknesses Increase Risks to Critical DHS Databases
External Supplier Control Requirements
External Supplier Control Requirements Cyber Security For Suppliers Categorised as High Cyber Risk Cyber Security Requirement Description Why this is important 1. Asset Protection and System Configuration
DIACAP Presentation. Presented by: Dennis Bailey. Date: July, 2007
DIACAP Presentation Presented by: Dennis Bailey Date: July, 2007 Government C&A Models NIST SP 800-37 - Guide for the Security Certification and Accreditation of Federal Information Systems NIACAP - National
