AF Life Cycle Management Center

Size: px
Start display at page:

Download "AF Life Cycle Management Center"

Transcription

1 AF Life Cycle Management Center Aircraft Cybersecurity Risk Management Framework Harrell J. Van Norman Cybersecurity Tech Expert Engineering Directorate AFMC/AFLCMC/EZAS DISTRIBUTION A. Approved for public release: distribution unlimited Case Number: 88ABW May

2 Cybersecurity... so I connected the unclassified black & classified red wires for ONE com & data channel...

3 What is Cybersecurity? Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation. Source: DoDI Cybersecurity replaced Information Assurance (IA) Requires independent assessment & authorization Cybersecurity required by law, DoD & USAF instruction AFLCMC mandatory process 3

4 Terminology Confidentiality Assurance that information is not disclosed to unauthorized persons Integrity Data, processes, material is what is expected Availability Timely, reliable access to data and information services for authorized users 4

5 Applicability All DoD IT that receive, process, store, display, or transmit DoD information. DoD IT is defined as DoD Information Systems Platform IT (PIT) IT services IT products IT supporting research, development, test and evaluation (T&E), DoD-controlled IT operated by a contractor or other entity on behalf of the DoD. Source: DoDI

6 PIT Examples weapons systems Aircraft Armament Command and Control training simulators diagnostic test and maintenance equipment calibration equipment R&D equipment medical devices buildings and associated control systems utility distribution systems (such as electric and water) telecommunications systems for industrial control systems including control devices and advanced metering data transport mechanisms (e.g., data links, dedicated networks) Source: DoDI

7 Securing Different Types of Systems 7

8 Platform Information Technology (PIT) PIT - Both hardware and software, that is physically part of, dedicated to, or essential in real time to the mission performance of special purpose systems. PIT system - A collection of PIT within an identified boundary under the control of a single authority and security policy. The systems may be structured by physical proximity or by function, independent of location. 8

9 Program Manager Ensure the system has a current authorization Develop Cybersecurity risk management documents for newly acquired PIT systems and legacy systems without current authorizations PIT Determination Package Architecture Analysis Document and/or supporting design artifacts Implementation and Verification Planning SRTM and/or program verification data, traceability, and reports Risk Assessment Report and or Risk Assessment Briefing Ensure Cybersecurity requirements are placed on contract, scheduled and resourced Ensure Cybersecurity is integrated into acquisition, upgrade/modification programs, including initial design, development, testing, fielding and operations Ensure Risk Mitigations are coordinated across appropriate levels of the program Ensure Cybersecurity Plan of Action and Milestones (POA&M) is developed and executed to reduce overall system risk Ensure all changes go through configuration management, are assessed for Cybersecurity impacts and reported to the SCA if applicable Report security incidents to cognizant organizations. Conduct root cause analysis for incidents and develop corrective action plan. Engineering is normally the program office lead for Cybersecurity 9

10 Cybersecurity Policy 10

11 DoD Policy Transformation Highlights Published Versions DoDD , DoDI , DoDI Updated Versions DoDI , DoDI Information Assurance Cybersecurity Mission Assurance Category (MAC) / Confidentiality Level (CL) DoD Specific IA Definitions Joint Taskforce Transformation Initiative Security Objective: Confidentiality, Integrity, Availability Impact Value: Low Moderate High CNSSI 4009 glossary for cybersecurity terms DoD Security Controls C&A Process NIST SP security control catalog. Uses CNSSI 1253 to categorize and select controls Risk Management Framework Lifecycle

12 Summary of Changes Change from Directive to Instruction Information Assurance renamed Cybersecurity DAA=AO; SIAO=SISO; CA=SCA PIT specifically called-out Implements CNSSI 1253 and NIST Cybersecurity fully integrated into system acquisition life cycle Implemented through Risk Management Framework DoDI

13 DoDI Risk Management Framework for DoD Information Technology Rescinds DIACAP NIST s Risk Management Framework, Defines what systems should undergo the full RMF lifecycle Applies to both IT and PIT Requires CNSSI 1253 for Security Control Categorization and Selection, and use of overlays Promotes DT&E and OT&E integration Codifies reciprocity Strengthens risk management governance Emphasizes continuous monitoring and timely correction of deficiencies 13

14 Contractor Laptop Removable Media Boundary Example IFF UHF/VHF comm HF comm Data Links UHF/VHF comm SATCOM Simple Key Loader Mission Planning Depot SW Development Flightline Laptop LRUs Various LRUs 1553 Bus Caps Bus Data Recorder NIPR/ SIPR Equipment Memory Loader Data Recorder Backshop Test Station Legend Classified Unclassified

15 Weapon System Security Requirements Design Requirements Tng Sys Cybersecurity Integrity Confidentiality Availability Mx Sys Cybersecurity Operational Requirements Platform IT Sys Cybersecurity Msn Pln Sys Cybersecurity Depot Sys Cybersecurity Systems 15

16 Process and Artifacts PIT Determination Package PIT Determination Memo EITDR Registration Architecture Analysis CRTM System Security Plan Risk Assessment Authorization Memo Plan of Action & Milestones Impact Assessment Incident Reports 16

17 Architecture Understand System CONOPS Operating environments Classification level Users and system access Criticality Accreditation boundary Interfaces Components --HW, SW, firmware, networking, ports protocols & services Data flows Logistics process Upgrade process Supply Chain HW & SW process Determine potential System Vulnerabilities 17

18 Cybersecurity Systems Engineering Approach PIT Cybersecurity Risk Management Framework Systems Engineering Process SRR SFR PDR Cybersecurity Requirements Cybersecurity Functional Requirements Cybersecurity Design Verification SCA AO SCA SCA Concur? Assessment Assessment CDR TRR Cybersecurity Design Verification IATT Test Plan SCA SCA Verify Concur? SVR Review SCA Certify / Approval? AO Decision - ATO 18

19 RMF within the Acquisition System MS A MS B MS C FRP / FDD Strategic Guidance (OSD/JCS) Joint Concepts (COCOMs) CBA ICD MDD Materiel Solution Analysis Technology Development CDD Engineering & Manufacturing Development CPD Production and Deployment O&S Systems Engineering ASR SRR SFR PDR CDR TRR IAS IATT ATO ATO OTRR Cybersecurity Categorize Select Implement Assess Authorize Monitor 19

20 SE Steps Criticality Analysis Identify mission essential function and dependencies; Tailor system requirements, Capture in SRD, SOW & PPP PIT Determination Initial Categorization & Control Selection MDD Addressing Cyber Vulnerabilities in Future Systems Materiel Solution Analysis Integrate CS/IA requirement specs into lower level subsystem specifications SRR: Evaluate reqt coverage& flow down MS A Conduct PDR, ensuring CS/IA Requirements integration PDR Conduct risk assessment Pre-EMD Review MS B Decompose CS/IA Req s. Component Specs. for Product Baseline and System Design IATT Conduct CDR, ensuring System Mission Assurance Integration CDR Conduct risk assessment ATO Engineering & Technology Manufacturing AOA ICD Development CDD Development CPD MS C Fabricate, Assemble related HW and SW to Build To Documentation (control Implementation) Full Rate Production Decision Review Production and Deployment Conduct SVR, PRR, and FCA Integrating CS/IA Sustainment security engineering Continuing vulnerability assessment and remediation O&S ASR Full-up SRR SFR PDR CDR TRR DT&E SVR DT&E OTRR IOT&E Assessment T&E Steps Understand CS/IA requirements; they maybe specified, implied or mission essential Develop approach for T&E CS/IA Characterize the attack surface in an integrated environment determine possible threat vectors. Analyze potential vulnerabilities to determine measures to improve resilience Cybersecurity DT&E Realistic mission environment. Cyber threat representation DT&E Assessment Requirements assessment Operational Cybersecurity and Vulnerability Evaluation Remediation of findings Operational Evaluation of Protect, Detect, React, Restore (including penetration testing) Selected programs evaluated for COOP Treat cyber requirements like other design requirements 20

21 Risk Based Approach RMF replacing DIACAP 21

22 Threats Insider Threat (Often under-estimated) Disgruntled personnel Unintentional actions of user Trusted insider Hacker/Cracker Malicious Code/Viruses/Worms Via link or HW/SW upgrades State Sponsored Cyber Attack DOS (Denial of Service) Attacks Self imposed Deliberate actions of others 22

23 Real World Environment (SCRM) Counterfeit Components Malicious Logic Embedded in Chip Software Industry process to validate integrity of vendor products 23

24 Cybersecurity Case Scenarios Radar System Backdoor (reference IEEE Spectrum, May 2008, The Hunt for the Kill Switch) Stuxnet worm (reference Wikipedia) Flame (skywiper); screen shot, remote deletion capability, etc. Back-door discovered by U.K. researchers in U.S. Microsemi chip; allows remote access to memory 24

25 Components of Risk Risk Analysis Cause Effect Threat Likelihood Vulnerability Impact Means & Opportunity of the threat Severity of vulnerability & Criticality of the system/subsystem 25

26 Risk Assessment Likelihood Oportunity Risk Likelihood O-5 L-2 L-3 L-4 L-5 L-5 O-4 L-2 L-3 L-4 L-5 L-5 O-3 L-1 L-2 L-3 L-4 L-5 O-2 L-1 L-2 L-3 L-4 L-4 O-1 L-1 L-1 L-2 L-3 L-3 M-1 M-2 M-3 M-4 M-5 Likelihood Means Risk Likelihood L Near Certainty L Probable L Occasional L Remote L Improbale Likelihood Impact Risk LIKELIHOOD Overall Risk Factor Matrix L-5 L-4 L-3 X L-2 L-1 I-1 I-2 I-3 I-4 I-5 Impact IMPACT Vulnerability Severity S-5 I-2 I-3 I-4 I-5 I-5 S-4 I-2 I-3 I-3 I-4 I-5 S-3 I-1 I-2 I-3 I-4 I-5 S-2 I-1 I-1 I-2 I-3 I-4 S-1 I-1 I-1 I-1 I-2 I-3 C-1 C-2 C-3 C-4 C-5 System Criticality Risk Impact I Catastrophic I Major I Moderate I Minor I Negligible

27 Example Risk Reporting Template Component Control / Requirement Risk # Control name Initial risk level High Threat: Any circumstance or event with potential to intentionally or unintentionally exploit one or more vulnerabilities in a system, resulting in a loss of confidentiality, integrity, or availability. Examples of threat agents are malicious hackers, organized crime, insiders, terrorists, and nation states. Vulnerability: Flaw or weakness in design or implementation of hardware, software, networks, or computer-based systems, including security procedures and controls associated with the systems. Be specific Risk: Combination of the likelihood that a particular vulnerability in an organization s systems will be either intentionally or unintentionally exploited by a particular threat agent and the magnitude of the potential harm (consequence) to the organization s operations, assets, or personnel that could result from the loss of confidentiality, integrity, or availability. Likelihood: (Highly Likely) Explain the probability of occurrence due to mission parameters. Make sure this category designation matches the Matrix category designations. Impact: (High) Explain the consequence to data, mission, operation, or life in quantifiable terms. Make sure designation matches consequence column headers on Risk Matrix. In terms of confidentiality, integrity & availability, Mitigation/Countermeasures: List actions that are that are implemented and documented relevant to the risk. Residual Risk: After mitigation/countermeasure have been applied what is the risk level? Why should the AO accept the risk Current Residual Risk: Moderate Additional countermeasures needed for Low residual risk: What is needed to meet the requirement or mitigate to a low risk 27

28 Risk Analysis Summary Template IMPACT LOW MINOR MEDIUM SIGNIFICANT HIGH Level 5 Impact % Most Likely Level 4 Initial R5 Ʃ= Likelihood Risk LIKELIHOOD 61-90% Probable Level % Somewhat likely Level 2 By design R % Remote Level % Unlikely By Test R5 28

29 Terminology Authorizing Official (AO) Formerly referred to as Designated Accrediting Authority (DAA) Authorized to accept cybersecurity measured risk Ensure cybersecurity integrated into programs Review/Approve accreditation package with cybersecurity risk assessment and mitigation approach Accredit/Deny system for test or operation Independent Authorization Official Security Control Assessor (SCA) Formerly referred to as Certifying Authority (CA) Approve requirements Review cybersecurity technical assessments Certify cybersecurity implementation and risk assessment Make risk recommendations to AO (DAA) Independent assessment authority *Delegated IAW AFPD

30 Terminology Decisions Platform IT Determination - A determination made by an AO that a system meets the criteria of Platform IT Interim Authority to Test (IATT) - An IATT is a special type of authorization decision allowing a Platform IT system to operate for the purpose of testing in order to complete specific test objectives Authority to Operate (ATO) - An ATO is a decision issued once all risks have been reduced to acceptable levels or proper mitigation is in place and the Platform IT AO is willing to accept the residual risk as assessed Denial of Authority to Operate (DATO) - A DATO is a decision issued when risks are not acceptable to the Platform IT AO. This may result due to unauthorized changes to the system, new threats or system vulnerabilities, insufficient progress on the POA&M Authority to Connect (ATC) A decision by another AO to allow a connection to an accredited system See PIT Guidebook for complete definition 30

31 Software Pedigree Understand the Source of software GOTS, MOTS, COTS Concern with uncleared personnel writing critical software for weapons systems Concern with freeware/shareware Need approval to use COTS software not previously analyzed Independent V&V of software code Utilize software tools to check for malicious code Software scanned for vulnerability 2013 NDAA SEC. 933 includes requirement to develop DoD software assurance policy applicable to weapons systems 31

32 Software Assurance (SwA) Assessment Benefits: Security & Quality Significantly reduces cost of reliable, secure software Compliments existing testing approaches Boosts overall development productivity Promotes adherence to key industry standards Security Buffer overflow Un-validated user input SQL injection Path injection File injection Cross-site scripting Information leakage Vulnerable coding practices Reliability Memory and resource leaks Concurrency violations Infinite loops Dereferencing NULL pointers Usage of uninitialized data Resource management Memory allocation errors Coding Standards & Maintainability MISRA, DISA, CWE, CERT, etc. Dead code Unreachable code Calculated values that are never used Unused function parameters

33 Supply Chain Counterfeit Hardware Supply Chain Risk Management Impacts Reliability Concern over potential malware or backdoors Extra concern for ICT components Software Assurance (SwA) Design of the code Embedded malicious code Software development and assessment See DoDI ICT = Information Communications Technology 33

34 Supply Chain Risk Management (SCRM) Concerns Counterfeit Hardware Impacts Reliability Concern over potential malware or backdoors Extra concern for ICT components Software Concerns Design of the code Embedded malicious code ICT= Information Communications Technology 34

35 Source of software GOTS, MOTS, COTS Software Pedigree Concern with uncleared personnel writing critical software Concern with freeware/shareware Need approval to use COTS software not previously analyzed Independent V&V of software code Software tools utilized to check for malicious code 35

36 SwA tool Comparison Study Important Issue Types Score (%) Scan Results Score (%) Environment Integration Score (%) Performance Score (%) Presentation Score (%) Support Score (%) Cost Clarity Score (%) Final Score Coverity SAVE C/C++ Test Insight Palamida Enterprise Edition Fortify CodeSonar CxInvestigate PC-lint AppScan FxCop Fakebust

37 Technology Challenges No automated aircraft system architecture vulnerability identification tools No aircraft cyber threat modeling tool No quick way to V&V software supply chain integrity No automated criticality assessment tool No technology to test cyber resiliency of aircraft system No technology to measure cyber resiliency 37

38 Summary Cybersecurity Requirements adapted for Weapon System Requirements Cybersecurity part of the system engineering review process Risk assessment accomplished on all requirements Independent Certification and Accreditation (risk taking authority)

39 Backup 39

40 Cybersecurity Requirement 44 USC Chapter 35 Subchapter III INFORMATION SECURITY DoDI Cybersecurity DoDI Risk Management Framework for DoD IT Interim DoDI Cybersecurity RMF integrated into Systems Engineering and Acquisition AFI USAF C&A Process AFI Guidance Memo: guidance for C&A of PIT Directs assessment of legacy PIT systems Requires Risk Management and Authorization of PIT Systems USAF Platform IT Guidebook AFLCMC Platform IT C&A Process Mandatory AFLCMC Standard Process Metrics briefed quarterly to AFLCMC/CC, PEOs and Functionals 40

41 System Security Plan (SSP) The organization: a. Develops a security plan for the information system that: - Explicitly defines the authorization boundary for the system; - Describes the operational context of the information system in terms of missions and business processes; - Provides the security categorization of the information system including supporting rationale; - Describes the operational environment for the information system; - Describes relationships with or connections to other information systems; - Provides an overview of the security requirements for the system; - Describes the security controls in place or planned for meeting those requirements including a rationale for the tailoring and supplementation decisions; and - Is reviewed and approved by the authorizing official or designated representative prior to plan implementation; b. Reviews the security plan for the information system [Assignment: organizationdefined frequency]; and c. Updates the plan to address changes to the information system/environment of operation or problems identified during plan implementation or security control assessments. The intent is covered by CRTM and architecture analysis report. However, processes and procedures used to meet requirements or mitigate risk must be documented in an SSP or technical order. 41

42 Data Flow Example Prime Contractor Aircraft Data Portable device Download CD USAF Analysis CD Conversion Legend Entity Process Storage Data Flow 42

43 Roots of DoD Policy 43

44 Architecture Subsystems Example Guidance Computer Functional description Include criticality, classification, storage media, external/internal interfaces and protocols, and hardware & software Device Name Manufacturer Model Guidance Computer Acme Guider 200A Part# 423 Sub- System (A/N/G) Class Level (U/S/TS) Non- Volatile Storage Media Removable Media A S Hard Drive Yes Front-Panel Interface USB, E-net Maintenance Interface 1533, ARINC 429 Purpose Guidance Processing Description Guidance Computer Guidance Computer Guidance Computer LRU/Model Number O/S License required Application Software 1623 Some RTOS Y CPC LCOS control software 1623 Y Interface control software 1623 Y Other control software Developer ABC Comments Evaluated by NSA 123 Contains foreign dev software XYZ Scanned with Fortify For each component the architecture analysis document should have this level of detail. This becomes the HW/SW baseline. 44

45 Cybersecurity Requirements Traceability Matrix (CRTM) Reqt CONTROL NAME Control Text Armament Guidance Supplemental Guidance Applicable Compliant Method of Verification Verification Result Supporting Artifact Comments Yes/No Yes/No Requirement PE-19 Requirement text Emissions and TEMPEST Control Text The organization employs cryptographic mechanisms to prevent unauthorized disclosure and modification of information at rest unless otherwise protected by alternative physical measures. Armament Guidance Rationale for tailoring or why the requirement is nonapplicable Applicable Yes Compliant No Method of Verification Verification Result Supporting Artifact Comments TEMPEST Tests IAW AFI 700. Discuss test specifics Summarize Name and section of the test report. Use this to discuss if this drives a risk. Also use this area for rationale for Technical controls verified with demonstration, analysis or test. Process & operational controls validated with inspection. 45

46 CNSS 1253 Cybersecurity Requirements IDENTIFIER FAMILY CLASS AC Access Control Technical AT Awareness and Training Operational AU Audit and Accountability Technical CA Security Assessment and Authorization Management CM Configuration Management Operational CP Contingency Planning Operational IA Identification and Authentication Technical IR Incident Response Operational MA Maintenance Operational MP Media Protection Operational PE Physical and Environmental Protection Operational PL Planning Management PS Personnel Security Operational RA Risk Assessment Management SA System and Services Acquisition Management SC System and Communications Protection Technical SI System and Information Integrity Operational PM Program Management Management 46

47 Requirements IDENTIFIER AC Access Control AT Awareness and Training AU Audit and Accountability CA Security Assessment and Authorization CM Configuration Management CP Contingency Planning IA Identification and Authentication IR Incident Response MA Maintenance MP Media Protection PE Physical and Environmental Protection PL Planning PS Personnel Security RA Risk Assessment Management SA System and Services Acquisition SC System and Communications Protection SI System and Information Integrity PM Program Management Tailored Requirements that apply to the system 47

48 Biographical Sketch Harrell J. Van Norman is the Cybersecurity Technical Expert for AFLCMC Engineering Directorate, US Air Force, WPAFB, supporting Platform IT systems as the Certifying Authority Representative and as an Adjunct Professor with the Institute of Defense Studies and Education at Wright State University and with the Management Information Systems Department/MBA Department at the University of Dayton. Previously, Harrell served as the Information System Security Manager (ISSM) for unmanned aerial system SIGINT sensors, supporting the US Air Force at WPAFB. Harrell also served as the Cybersecurity and Workforce Development Program Coordinator at ATIC. With over 30 years experience in cybersecurity, system design, implementation, optimization, management, and training, Harrell is a skilled and certified engineering research staff member (CISSP, Security+, e-biz+, Network+, CCNA, CCDA, CCDP, CCNP). Harrell has a balanced background of engineering design and optimization, information assurance, anti-tamper, program protection, remote sensing intelligence systems, communications protocol standards, training and education, simulation modeling and analysis, program management, and network infrastructure support. He is the author of LAN/WAN Optimization Techniques, and his work has been published in Data Communications Magazine, Communications News, Faulkner Information Services, and The Communications Handbook. He currently serves on the Board of Directors for the Dayton, Ohio, Information Systems Security Association chapter. 48

AF Life Cycle Management Center

AF Life Cycle Management Center AF Life Cycle Management Center Avionics Weapon Systems Cybersecurity Risk Management Framework Assessment & Authorization Update Harrell Van Norman AFLCMC/EZAS Cybersecurity Technical Expert [email protected]

More information

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 NOV 1 0 2015 CHIEF INFORMATION OFFICER MEMORANDUM FOR ASSISTANT SECRETARY OF THE ARMY FOR ACQUISITION, LOGISTICS AND TECHNOLOGY ASSIST

More information

Get Confidence in Mission Security with IV&V Information Assurance

Get Confidence in Mission Security with IV&V Information Assurance Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving

More information

Cybersecurity Throughout DoD Acquisition

Cybersecurity Throughout DoD Acquisition Cybersecurity Throughout DoD Acquisition Tim Denman Cybersecurity Performance Learning Director DAU Learning Capabilities Integration Center [email protected] [email protected] Cybersecurity

More information

DoD Software Assurance (SwA) Overview

DoD Software Assurance (SwA) Overview DoD Software Assurance (SwA) Overview Tom Hurt Office of the Deputy Assistant Secretary of Defense for Systems Engineering NDIA Program Protection Summit / Workshop McLean, VA May 19, 2014 May 19, 2014

More information

Looking at the SANS 20 Critical Security Controls

Looking at the SANS 20 Critical Security Controls Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of

More information

Tim Denman Systems Engineering and Technology Dept Chair/ Cybersecurity Lead DAU South, Huntsville [email protected]

Tim Denman Systems Engineering and Technology Dept Chair/ Cybersecurity Lead DAU South, Huntsville Tim.Denman@dau.mil Tim Denman Systems Engineering and Technology Dept Chair/ Cybersecurity Lead DAU South, Huntsville [email protected] Current State of Cybersecurity in the DoD Current Needs Communications focus Changing

More information

NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich

NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems Samuel R. Ashmore Margarita Castillo Barry Gavrich CS589 Information & Risk Management New Mexico Tech Spring 2007

More information

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation

More information

System Security Certification and Accreditation (C&A) Framework

System Security Certification and Accreditation (C&A) Framework System Security Certification and Accreditation (C&A) Framework Dave Dickinson, IOAT ISSO Chris Tillison, RPMS ISSO Indian Health Service 5300 Homestead Road, NE Albuquerque, NM 87110 (505) 248-4500 fax:

More information

CTR System Report - 2008 FISMA

CTR System Report - 2008 FISMA CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control

More information

1 July 2015 Version 1.0

1 July 2015 Version 1.0 1 July 2015 Version 1.0 Cleared for Open Publication June 26, 2015 DoD Office of Prepublication and Security Review Cybersecurity T&E Guidebook ii July 1, 2015 Version 1.0 Table of Contents 1 INTRODUCTION...

More information

HHS Information System Security Controls Catalog V 1.0

HHS Information System Security Controls Catalog V 1.0 Information System Security s Catalog V 1.0 Table of Contents DOCUMENT HISTORY... 3 1. Purpose... 4 2. Security s Scope... 4 3. Security s Compliance... 4 4. Security s Catalog Ownership... 4 5. Security

More information

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS Steve Mills DAU-South 1 Overview Questions Cybersecurity Owners and Stakeholders Cybersecurity Why It Matters to DoD Program Managers Defense Science

More information

Cybersecurity is one of the most important challenges for our military today. Cyberspace. Cybersecurity. Defending the New Battlefield

Cybersecurity is one of the most important challenges for our military today. Cyberspace. Cybersecurity. Defending the New Battlefield Cybersecurity Defending the New Battlefield Steven J. Hutchison, Ph.D. Cybersecurity is one of the most important challenges for our military today. Cyberspace is a new warfighting domain, joining the

More information

Security Controls Assessment for Federal Information Systems

Security Controls Assessment for Federal Information Systems Security Controls Assessment for Federal Information Systems Census Software Process Improvement Program September 11, 2008 Kevin Stine Computer Security Division National Institute of Standards and Technology

More information

System Security Engineering and Comprehensive Program Protection

System Security Engineering and Comprehensive Program Protection System Security Engineering and Comprehensive Program Protection Melinda Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering 16th Annual NDIA Systems Engineering Conference

More information

RMF. Cybersecurity and the Risk Management. Framework UNCLASSIFIED

RMF. Cybersecurity and the Risk Management. Framework UNCLASSIFIED Cybersecurity and the Risk Management Framework Wherewe ve been and where we re going Information Assurance DoD Instruction 8500.01,Para 1(d),adoptsthe term cybersecurity as it is defined in National Security

More information

Implementing Program Protection and Cybersecurity

Implementing Program Protection and Cybersecurity Implementing Program Protection and Cybersecurity Melinda Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering Mark Godino Office of the Deputy Assistant Secretary of Defense

More information

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation

More information

Information Security for Managers

Information Security for Managers Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize

More information

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including

More information

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700 OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700 OPERATIONAL TEST AND EVALUATION AUG 0 1 2014 MEMORANDUM FOR COMMANDER, ARMY TEST AND EVALUATION COMMAND COMMANDER, AIR

More information

System Security Engineering

System Security Engineering A Critical Discipline of SE Ms. Kristen Baldwin Director, Systems Analysis DDR&E/Systems Engineering 12th Annual NDIA Systems Engineering Conference 28 October 2009 10/28/09 Page-1 Defense Research & Engineering

More information

Risk Management Framework (RMF): The Future of DoD Cyber Security is Here

Risk Management Framework (RMF): The Future of DoD Cyber Security is Here Risk Management Framework (RMF): The Future of DoD Cyber Security is Here Authors: Rebecca Onuskanich William Peterson 3300 N Fairfax Drive, Suite 308 Arlington, VA 22201 Phone: 571-481-9300 Fax: 202-315-3003

More information

5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE

5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-510 GENERAL (Office of Origin: IRM/IA) 5 FAH-11 H-511 INTRODUCTION 5 FAH-11 H-511.1 Purpose a. This subchapter implements the policy

More information

National Information Assurance Certification and Accreditation Process (NIACAP)

National Information Assurance Certification and Accreditation Process (NIACAP) NSTISSI No. 1000 April 2000 National Information Assurance Certification and Accreditation Process (NIACAP) THIS DOCUMENT PROVIDES MINIMUM STANDARDS. FURTHER INFORMATION MAY BE REQUIRED BY YOUR DEPARTMENT

More information

Security and Privacy Controls for Federal Information Systems and Organizations

Security and Privacy Controls for Federal Information Systems and Organizations NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems JOINT TASK FORCE TRANSFORMATION INITIATIVE This document contains excerpts from NIST Special Publication

More information

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology [email protected] 256.922.

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology Steve.mills@dau.mil 256.922. CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS 1 Steve Mills Professor of Information Technology [email protected] 256.922.8761 Overview Cybersecurity Policy Overview Questions Challenge #1 -

More information

U.S. FLEET CYBER COMMAND U.S. TENTH FLEET DoD RMF Transition

U.S. FLEET CYBER COMMAND U.S. TENTH FLEET DoD RMF Transition U.S. FLEET CYBER COMMAND U.S. TENTH FLEET DoD RMF Transition Dr. Charles Kiriakou, Ms. Kate Cunningham, Mr. Kevin Winters, & Mr. Carl Rice September 3, 2014 UNCLASSIFIED 1 Bottom Line Up Front (BLUF) The

More information

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION Directive Current as of 19 November 2014 J-8 CJCSI 8410.02 DISTRIBUTION: A, B, C, JS-LAN WARFIGHTING MISSION AREA (WMA) PRINCIPAL ACCREDITING AUTHORITY

More information

CONTINUOUS MONITORING

CONTINUOUS MONITORING CONTINUOUS MONITORING Monitoring Strategy Part 2 of 3 ABSTRACT This white paper is Part 2 in a three-part series of white papers on the sometimes daunting subject of continuous monitoring (CM) and how

More information

Cyber R &D Research Roundtable

Cyber R &D Research Roundtable Cyber R &D Research Roundtable 2 May 2013 N A T I O N A L S E C U R I T Y E N E R G Y & E N V I R O N M E N T H E A L T H C Y B E R S E C U R I T Y Changing Environment Rapidly Evolving Threat Changes

More information

Security Control Standard

Security Control Standard Department of the Interior Security Control Standard Risk Assessment January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information

More information

ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT

ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT INTERNATIONAL CIVIL AVIATION ORGANIZATION ASIA AND PACIFIC OFFICE ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT DRAFT Second Edition June 2010 3.4H - 1 TABLE OF CONTENTS 1.

More information

Minimum Security Requirements for Federal Information and Information Systems

Minimum Security Requirements for Federal Information and Information Systems FIPS PUB 200 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Minimum Security Requirements for Federal Information and Information Systems Computer Security Division Information Technology Laboratory

More information

IT Security Management Risk Analysis and Controls

IT Security Management Risk Analysis and Controls IT Security Management Risk Analysis and Controls Steven Gordon Document No: Revision 770 3 December 2013 1 Introduction This document summarises several steps of an IT security risk analysis and subsequent

More information

Security Control Standard

Security Control Standard Department of the Interior Security Control Standard Security Assessment and Authorization January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,

More information

Selecting RMF Controls for National Security Systems

Selecting RMF Controls for National Security Systems SANDIA REPORT SAND2015-6770 Unlimited Release Printed August 2015 Selecting RMF Controls for National Security Systems Edward L. Witzke Prepared by Sandia National Laboratories Albuquerque, New Mexico

More information

FISMA / NIST 800-53 REVISION 3 COMPLIANCE

FISMA / NIST 800-53 REVISION 3 COMPLIANCE Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security

More information

Security Language for IT Acquisition Efforts CIO-IT Security-09-48

Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Office of the Senior Agency Information Security Officer VERSION HISTORY/CHANGE RECORD Change Number Person Posting Change Change Reason

More information

DIACAP Presentation. Presented by: Dennis Bailey. Date: July, 2007

DIACAP Presentation. Presented by: Dennis Bailey. Date: July, 2007 DIACAP Presentation Presented by: Dennis Bailey Date: July, 2007 Government C&A Models NIST SP 800-37 - Guide for the Security Certification and Accreditation of Federal Information Systems NIACAP - National

More information

COORDINATION DRAFT. FISCAM to NIST Special Publication 800-53 Revision 4. Title / Description (Critical Element)

COORDINATION DRAFT. FISCAM to NIST Special Publication 800-53 Revision 4. Title / Description (Critical Element) FISCAM FISCAM 3.1 Security (SM) Critical Element SM-1: Establish a SM-1.1.1 The security management program is adequately An agency/entitywide security management program has been developed, An agency/entitywide

More information

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing Introduction ManTech Project Manager Mark Shaw, Senior Executive Director Cyber Security Solutions Division

More information

Review of the SEC s Systems Certification and Accreditation Process

Review of the SEC s Systems Certification and Accreditation Process Review of the SEC s Systems Certification and Accreditation Process March 27, 2013 Page i Should you have any questions regarding this report, please do not hesitate to contact me. We appreciate the courtesy

More information

CMS POLICY FOR THE INFORMATION SECURITY PROGRAM

CMS POLICY FOR THE INFORMATION SECURITY PROGRAM Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS POLICY FOR THE INFORMATION SECURITY PROGRAM FINAL Version 4.0 August 31, 2010 Document Number: CMS-CIO-POL-SEC02-04.0

More information

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication

More information

System Security Engineering and Program Protection Integration into SE

System Security Engineering and Program Protection Integration into SE System Security Engineering and Program Protection Integration into SE Melinda Reed Deputy Director for Program Protection Office of the Deputy Assistant Secretary of Defense for Systems Engineering 17

More information

Requirements For Computer Security

Requirements For Computer Security Requirements For Computer Security FTA/IRS Safeguards Symposium & FTA/IRS Computer Security Conference April 2, 2008 St. Louis 1 Agenda Security Framework Safeguards IT Security Review Process Preparing

More information

Guidelines for Cybersecurity DT&E v1.0

Guidelines for Cybersecurity DT&E v1.0 Guidelines for Cybersecurity DT&E v1.0 1. Purpose. These guidelines provide the means for DASD(DT&E) staff specialists to engage and assist acquisition program Chief Developmental Testers and Lead DT&E

More information

Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat

Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat Centers for Disease and Prevention National Center for Chronic Disease Prevention and Health

More information

Bellingham Control System Cyber Security Case Study

Bellingham Control System Cyber Security Case Study Bellingham Control System Cyber Security Case Study Marshall Abrams Joe Weiss Presented at at 2007 Annual Computer Security Applications Conference Case Study Synopsis Examine actual control system cyber

More information

Information Security. Rick Aldrich, JD, CISSP Booz Allen Hamilton [email protected]

Information Security. Rick Aldrich, JD, CISSP Booz Allen Hamilton Aldrich_Richard@bah.com Information Security Rick Aldrich, JD, CISSP Booz Allen Hamilton [email protected] Overview (Fed Info Sys) From NIST SP 800-60, Vol 1, Guide for Mapping Types of Information Systems to Security Categories

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 8551.01 May 28, 2014 DoD CIO SUBJECT: Ports, Protocols, and Services Management (PPSM) References: See Enclosure 1 1. PURPOSE. In accordance with the authority

More information

Office of Inspector General

Office of Inspector General DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,

More information

UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)

UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A) UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.2 9/28/11 INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A) I. PURPOSE This directive

More information

Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN

Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN Independent Security Operations Oversight and Assessment Captain Timothy Holland PM NGEN 23 June 2010 Independent Security Operations Oversight and Assessment Will Jordan NGEN Cyber Security 23 June 2010

More information

Security Self-Assessment Tool

Security Self-Assessment Tool Security Self-Assessment Tool State Agencies Receiving FPLS Information, 7/15/2015 Contents Overview... 2 Access Control (AC)... 3 Awareness and Training (AT)... 8 Audit and Accountability (AU)... 10 Security

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5200.44 November 5, 2012 DoD CIO/USD(AT&L) SUBJECT: Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN) References: See Enclosure

More information

SECURITY CATEGORIZATION AND CONTROL SELECTION FOR NATIONAL SECURITY SYSTEMS

SECURITY CATEGORIZATION AND CONTROL SELECTION FOR NATIONAL SECURITY SYSTEMS 1 CNSSI No. 1253 15 March 2012 SECURITY CATEGORIZATION AND CONTROL SELECTION FOR NATIONAL SECURITY SYSTEMS Version 2 THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER

More information

Altius IT Policy Collection Compliance and Standards Matrix

Altius IT Policy Collection Compliance and Standards Matrix Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy

More information

Cloud Security for Federal Agencies

Cloud Security for Federal Agencies Experience the commitment ISSUE BRIEF Rev. April 2014 Cloud Security for Federal Agencies This paper helps federal agency executives evaluate security and privacy features when choosing a cloud service

More information

FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL

FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL Clifton Gunderson LLP s Independent Audit of the Federal Housing Finance Agency s Information Security Program - 2011 Audit Report: AUD-2011-002

More information

DEPARTMENT OF DEFENSE (DoD) CLOUD COMPUTING SECURITY REQUIREMENTS GUIDE (SRG) Version 1, Release 1. 12 January 2015

DEPARTMENT OF DEFENSE (DoD) CLOUD COMPUTING SECURITY REQUIREMENTS GUIDE (SRG) Version 1, Release 1. 12 January 2015 DEPARTMENT OF DEFENSE (DoD) CLOUD COMPUTING SECURITY REQUIREMENTS GUIDE (SRG) Version 1, Release 1 12 January 2015 Developed by the Defense Information Systems Agency (DISA) for the Department of Defense

More information

FedRAMP Standard Contract Language

FedRAMP Standard Contract Language FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 8510.01 March 12, 2014 DoD CIO SUBJECT: Risk Management Framework (RMF) for DoD Information Technology (IT) References: See Enclosure 1 1. PURPOSE. This instruction:

More information

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance WHITE paper Complying with the Federal Information Security Management Act How Tripwire Change Auditing Solutions Help page 2 page 3 page 3 page 3 page 4 page 4 page 5 page 5 page 6 page 6 page 7 Introduction

More information

DoDI 8500-2 IA Control Checklist - MAC 2-Sensitive. Version 1, Release 1.4. 28 March 2008

DoDI 8500-2 IA Control Checklist - MAC 2-Sensitive. Version 1, Release 1.4. 28 March 2008 DoDI 8500-2 IA Control Checklist - MAC 2-Sensitive Version 1, Release 1.4 Developed by DISA for the DOD UNTILL FILLED IN CIRCLE ONE FOR OFFICIAL USE ONLY (mark each page) CONFIDENTIAL and SECRET (mark

More information

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - 45 min Webinar: November 14th, 2014 The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - www.cunesoft.com Rainer Schwarz Cunesoft Holger Spalt ivigilance 2014 Cunesoft GmbH PART

More information

2015 Security Training Schedule

2015 Security Training Schedule 2015 Security Training Schedule Risk Management Framework Course (RMF) / $1,950.00 Per Student Dates June 1-4 Location 4775 Centennial Blvd., Suite 103 / Colorado Springs, CO 80919 July 20 23 444 W. Third

More information

CMS SYSTEM SECURITY PLAN (SSP) PROCEDURE

CMS SYSTEM SECURITY PLAN (SSP) PROCEDURE Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS SYSTEM SECURITY PLAN (SSP) PROCEDURE August 31, 2010 Version 1.1 - FINAL Summary of Changes in SSP

More information

Vulnerability Analysis Techniques to Support Trusted Systems and Networks (TSN) Analysis

Vulnerability Analysis Techniques to Support Trusted Systems and Networks (TSN) Analysis Vulnerability Analysis Techniques to Support Trusted Systems and Networks (TSN) Analysis Melinda Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering 17th Annual NDIA Systems

More information

Out with. AP, In. with. (C&A) and (RMF) LUNARLINE, INC.. 571-481-9300

Out with. AP, In. with. (C&A) and (RMF) LUNARLINE, INC.. 571-481-9300 Out with the DIACA AP, In with the DIARMF Say Goodbye to Certificatio n and Accreditation (C&A) and Hello to the Risk Management Framework (RMF) Author: Rebecca Onuskanich Program Manager, Lunarline LUNARLINE,

More information

Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes

Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes Joe Jarzombek, PMP, CSSLP Director for Software & Supply Chain Assurance Stakeholder

More information

Final Audit Report -- CAUTION --

Final Audit Report -- CAUTION -- U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Audit of the Information Technology Security Controls of the U.S. Office of Personnel Management

More information

Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System

Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System Department of Defense INSTRUCTION NUMBER 8580.1 July 9, 2004 SUBJECT: Information Assurance (IA) in the Defense Acquisition System ASD(NII) References: (a) Chapter 25 of title 40, United States Code (b)

More information

WRITTEN INFORMATION SECURITY PROGRAM (WISP) ACME Consulting Services, Inc.

WRITTEN INFORMATION SECURITY PROGRAM (WISP) ACME Consulting Services, Inc. WRITTEN INFORMATION SECURITY PROGRAM (WISP) ACME Consulting Services, Inc. Copyright 2016 Table of Contents WRITTEN INFORMATION SECURITY PROGRAM (WISP) OVERVIEW 10 INTRODUCTION 10 PURPOSE 10 SCOPE & APPLICABILITY

More information

Deriving Software Security Measures from Information Security Standards of Practice

Deriving Software Security Measures from Information Security Standards of Practice Deriving Software Measures from Standards of Practice Julia Allen Christopher Alberts Robert Stoddard February 2012 2012 Carnegie Mellon University Copyright 2012 Carnegie Mellon University. This material

More information

Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals

Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals JANUARY 2014 Deputy Assistant Secretary of Defense for Systems

More information

Dr. Ron Ross National Institute of Standards and Technology

Dr. Ron Ross National Institute of Standards and Technology Managing Enterprise Risk in Today s World of Sophisticated Threats A Framework for Developing Broad-Based, Cost-Effective Information Security Programs Dr. Ron Ross National Institute of Standards and

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5200.40 December 30, 1997 SUBJECT: DoD Information Technology Security Certification and Accreditation Process (DITSCAP) ASD(C3I) References: (a) DoD Directive

More information

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is

More information

Security Control Standard

Security Control Standard Department of the Interior Security Control Standard Maintenance January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information Officer

More information

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY

More information

POLICY ON WIRELESS SYSTEMS

POLICY ON WIRELESS SYSTEMS Committee on National Security Systems CNSSP No. 17 January 2014 POLICY ON WIRELESS SYSTEMS THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION CHAIR

More information

DoDI 8500-2 IA Control Checklist - MAC 3-Public. Version 1, Release 1.4. 28 March 2008

DoDI 8500-2 IA Control Checklist - MAC 3-Public. Version 1, Release 1.4. 28 March 2008 DoDI 8500-2 IA Control Checklist - MAC 3-Public Version 1, Release 1.4 Developed by DISA for the DOD UNTILL FILLED IN CIRCLE ONE FOR OFFICIAL USE ONLY (mark each page) CONFIDENTIAL and SECRET (mark each

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

DEPARTMENT OF THE AIR FORCE HEADQUARTERS AERONAUTICAL SYSTEMS CENTER (AFMC) WRIGHT-PATTERSON AIR FORCE BASE OHIO

DEPARTMENT OF THE AIR FORCE HEADQUARTERS AERONAUTICAL SYSTEMS CENTER (AFMC) WRIGHT-PATTERSON AIR FORCE BASE OHIO DEPARTMENT OF THE AIR FORCE HEADQUARTERS AERONAUTICAL SYSTEMS CENTER (AFMC) WRIGHT-PATTERSON AIR FORCE BASE OHIO BULLETIN AWB 002A 17 May 2011 ((supersedes AWB-002) United States Air Force (USAF) Airworthiness

More information

CMS Information Security Risk Assessment (RA) Methodology

CMS Information Security Risk Assessment (RA) Methodology DEPARTMENT OF HEALTH & HUMAN SERVICES Centers for Medicare & Medicaid Services 7500 Security Boulevard, Mail Stop N2-14-26 Baltimore, Maryland 21244-1850 CENTERS FOR MEDICARE & MEDICAID SERVICES (CMS)

More information

Legislative Language

Legislative Language Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting

More information

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia jason.lawrence@ey.com Twitter: @ethical_infosec Introduction Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec More than 20 years of experience in cybersecurity specializing

More information

Security Compliance In a Post-ACA World

Security Compliance In a Post-ACA World 1 Security Compliance In a Post-ACA World Security Compliance in a Post-ACA World Discussion of building a security compliance framework as part of an ACA Health Insurance Exchange implementation. Further

More information

DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK 6500.5 INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE

DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK 6500.5 INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK 6500.5 Washington, DC 20420 Transmittal Sheet March 22, 2010 INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE 1. REASON FOR ISSUE: This

More information

Final Audit Report. Report No. 4A-CI-OO-12-014

Final Audit Report. Report No. 4A-CI-OO-12-014 U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Subject: AUDIT OF THE INFORMATION TECHNOLOGY SECURITY CONTROLS OF THE U.S. OFFICE OF PERSONNEL MANAGEMENT'S

More information

Industrial Security Field Operations

Industrial Security Field Operations Defense Security Service Industrial Security Field Operations NISP Authorization Office (NAO) (Formerly Office of the Designated Approving Authority) NISPOM to NIST (800-53r4) Security Control Mapping

More information

FSIS DIRECTIVE 1306.3

FSIS DIRECTIVE 1306.3 UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS

More information