AF Life Cycle Management Center
|
|
|
- Hubert Perry
- 10 years ago
- Views:
Transcription
1 AF Life Cycle Management Center Aircraft Cybersecurity Risk Management Framework Harrell J. Van Norman Cybersecurity Tech Expert Engineering Directorate AFMC/AFLCMC/EZAS DISTRIBUTION A. Approved for public release: distribution unlimited Case Number: 88ABW May
2 Cybersecurity... so I connected the unclassified black & classified red wires for ONE com & data channel...
3 What is Cybersecurity? Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation. Source: DoDI Cybersecurity replaced Information Assurance (IA) Requires independent assessment & authorization Cybersecurity required by law, DoD & USAF instruction AFLCMC mandatory process 3
4 Terminology Confidentiality Assurance that information is not disclosed to unauthorized persons Integrity Data, processes, material is what is expected Availability Timely, reliable access to data and information services for authorized users 4
5 Applicability All DoD IT that receive, process, store, display, or transmit DoD information. DoD IT is defined as DoD Information Systems Platform IT (PIT) IT services IT products IT supporting research, development, test and evaluation (T&E), DoD-controlled IT operated by a contractor or other entity on behalf of the DoD. Source: DoDI
6 PIT Examples weapons systems Aircraft Armament Command and Control training simulators diagnostic test and maintenance equipment calibration equipment R&D equipment medical devices buildings and associated control systems utility distribution systems (such as electric and water) telecommunications systems for industrial control systems including control devices and advanced metering data transport mechanisms (e.g., data links, dedicated networks) Source: DoDI
7 Securing Different Types of Systems 7
8 Platform Information Technology (PIT) PIT - Both hardware and software, that is physically part of, dedicated to, or essential in real time to the mission performance of special purpose systems. PIT system - A collection of PIT within an identified boundary under the control of a single authority and security policy. The systems may be structured by physical proximity or by function, independent of location. 8
9 Program Manager Ensure the system has a current authorization Develop Cybersecurity risk management documents for newly acquired PIT systems and legacy systems without current authorizations PIT Determination Package Architecture Analysis Document and/or supporting design artifacts Implementation and Verification Planning SRTM and/or program verification data, traceability, and reports Risk Assessment Report and or Risk Assessment Briefing Ensure Cybersecurity requirements are placed on contract, scheduled and resourced Ensure Cybersecurity is integrated into acquisition, upgrade/modification programs, including initial design, development, testing, fielding and operations Ensure Risk Mitigations are coordinated across appropriate levels of the program Ensure Cybersecurity Plan of Action and Milestones (POA&M) is developed and executed to reduce overall system risk Ensure all changes go through configuration management, are assessed for Cybersecurity impacts and reported to the SCA if applicable Report security incidents to cognizant organizations. Conduct root cause analysis for incidents and develop corrective action plan. Engineering is normally the program office lead for Cybersecurity 9
10 Cybersecurity Policy 10
11 DoD Policy Transformation Highlights Published Versions DoDD , DoDI , DoDI Updated Versions DoDI , DoDI Information Assurance Cybersecurity Mission Assurance Category (MAC) / Confidentiality Level (CL) DoD Specific IA Definitions Joint Taskforce Transformation Initiative Security Objective: Confidentiality, Integrity, Availability Impact Value: Low Moderate High CNSSI 4009 glossary for cybersecurity terms DoD Security Controls C&A Process NIST SP security control catalog. Uses CNSSI 1253 to categorize and select controls Risk Management Framework Lifecycle
12 Summary of Changes Change from Directive to Instruction Information Assurance renamed Cybersecurity DAA=AO; SIAO=SISO; CA=SCA PIT specifically called-out Implements CNSSI 1253 and NIST Cybersecurity fully integrated into system acquisition life cycle Implemented through Risk Management Framework DoDI
13 DoDI Risk Management Framework for DoD Information Technology Rescinds DIACAP NIST s Risk Management Framework, Defines what systems should undergo the full RMF lifecycle Applies to both IT and PIT Requires CNSSI 1253 for Security Control Categorization and Selection, and use of overlays Promotes DT&E and OT&E integration Codifies reciprocity Strengthens risk management governance Emphasizes continuous monitoring and timely correction of deficiencies 13
14 Contractor Laptop Removable Media Boundary Example IFF UHF/VHF comm HF comm Data Links UHF/VHF comm SATCOM Simple Key Loader Mission Planning Depot SW Development Flightline Laptop LRUs Various LRUs 1553 Bus Caps Bus Data Recorder NIPR/ SIPR Equipment Memory Loader Data Recorder Backshop Test Station Legend Classified Unclassified
15 Weapon System Security Requirements Design Requirements Tng Sys Cybersecurity Integrity Confidentiality Availability Mx Sys Cybersecurity Operational Requirements Platform IT Sys Cybersecurity Msn Pln Sys Cybersecurity Depot Sys Cybersecurity Systems 15
16 Process and Artifacts PIT Determination Package PIT Determination Memo EITDR Registration Architecture Analysis CRTM System Security Plan Risk Assessment Authorization Memo Plan of Action & Milestones Impact Assessment Incident Reports 16
17 Architecture Understand System CONOPS Operating environments Classification level Users and system access Criticality Accreditation boundary Interfaces Components --HW, SW, firmware, networking, ports protocols & services Data flows Logistics process Upgrade process Supply Chain HW & SW process Determine potential System Vulnerabilities 17
18 Cybersecurity Systems Engineering Approach PIT Cybersecurity Risk Management Framework Systems Engineering Process SRR SFR PDR Cybersecurity Requirements Cybersecurity Functional Requirements Cybersecurity Design Verification SCA AO SCA SCA Concur? Assessment Assessment CDR TRR Cybersecurity Design Verification IATT Test Plan SCA SCA Verify Concur? SVR Review SCA Certify / Approval? AO Decision - ATO 18
19 RMF within the Acquisition System MS A MS B MS C FRP / FDD Strategic Guidance (OSD/JCS) Joint Concepts (COCOMs) CBA ICD MDD Materiel Solution Analysis Technology Development CDD Engineering & Manufacturing Development CPD Production and Deployment O&S Systems Engineering ASR SRR SFR PDR CDR TRR IAS IATT ATO ATO OTRR Cybersecurity Categorize Select Implement Assess Authorize Monitor 19
20 SE Steps Criticality Analysis Identify mission essential function and dependencies; Tailor system requirements, Capture in SRD, SOW & PPP PIT Determination Initial Categorization & Control Selection MDD Addressing Cyber Vulnerabilities in Future Systems Materiel Solution Analysis Integrate CS/IA requirement specs into lower level subsystem specifications SRR: Evaluate reqt coverage& flow down MS A Conduct PDR, ensuring CS/IA Requirements integration PDR Conduct risk assessment Pre-EMD Review MS B Decompose CS/IA Req s. Component Specs. for Product Baseline and System Design IATT Conduct CDR, ensuring System Mission Assurance Integration CDR Conduct risk assessment ATO Engineering & Technology Manufacturing AOA ICD Development CDD Development CPD MS C Fabricate, Assemble related HW and SW to Build To Documentation (control Implementation) Full Rate Production Decision Review Production and Deployment Conduct SVR, PRR, and FCA Integrating CS/IA Sustainment security engineering Continuing vulnerability assessment and remediation O&S ASR Full-up SRR SFR PDR CDR TRR DT&E SVR DT&E OTRR IOT&E Assessment T&E Steps Understand CS/IA requirements; they maybe specified, implied or mission essential Develop approach for T&E CS/IA Characterize the attack surface in an integrated environment determine possible threat vectors. Analyze potential vulnerabilities to determine measures to improve resilience Cybersecurity DT&E Realistic mission environment. Cyber threat representation DT&E Assessment Requirements assessment Operational Cybersecurity and Vulnerability Evaluation Remediation of findings Operational Evaluation of Protect, Detect, React, Restore (including penetration testing) Selected programs evaluated for COOP Treat cyber requirements like other design requirements 20
21 Risk Based Approach RMF replacing DIACAP 21
22 Threats Insider Threat (Often under-estimated) Disgruntled personnel Unintentional actions of user Trusted insider Hacker/Cracker Malicious Code/Viruses/Worms Via link or HW/SW upgrades State Sponsored Cyber Attack DOS (Denial of Service) Attacks Self imposed Deliberate actions of others 22
23 Real World Environment (SCRM) Counterfeit Components Malicious Logic Embedded in Chip Software Industry process to validate integrity of vendor products 23
24 Cybersecurity Case Scenarios Radar System Backdoor (reference IEEE Spectrum, May 2008, The Hunt for the Kill Switch) Stuxnet worm (reference Wikipedia) Flame (skywiper); screen shot, remote deletion capability, etc. Back-door discovered by U.K. researchers in U.S. Microsemi chip; allows remote access to memory 24
25 Components of Risk Risk Analysis Cause Effect Threat Likelihood Vulnerability Impact Means & Opportunity of the threat Severity of vulnerability & Criticality of the system/subsystem 25
26 Risk Assessment Likelihood Oportunity Risk Likelihood O-5 L-2 L-3 L-4 L-5 L-5 O-4 L-2 L-3 L-4 L-5 L-5 O-3 L-1 L-2 L-3 L-4 L-5 O-2 L-1 L-2 L-3 L-4 L-4 O-1 L-1 L-1 L-2 L-3 L-3 M-1 M-2 M-3 M-4 M-5 Likelihood Means Risk Likelihood L Near Certainty L Probable L Occasional L Remote L Improbale Likelihood Impact Risk LIKELIHOOD Overall Risk Factor Matrix L-5 L-4 L-3 X L-2 L-1 I-1 I-2 I-3 I-4 I-5 Impact IMPACT Vulnerability Severity S-5 I-2 I-3 I-4 I-5 I-5 S-4 I-2 I-3 I-3 I-4 I-5 S-3 I-1 I-2 I-3 I-4 I-5 S-2 I-1 I-1 I-2 I-3 I-4 S-1 I-1 I-1 I-1 I-2 I-3 C-1 C-2 C-3 C-4 C-5 System Criticality Risk Impact I Catastrophic I Major I Moderate I Minor I Negligible
27 Example Risk Reporting Template Component Control / Requirement Risk # Control name Initial risk level High Threat: Any circumstance or event with potential to intentionally or unintentionally exploit one or more vulnerabilities in a system, resulting in a loss of confidentiality, integrity, or availability. Examples of threat agents are malicious hackers, organized crime, insiders, terrorists, and nation states. Vulnerability: Flaw or weakness in design or implementation of hardware, software, networks, or computer-based systems, including security procedures and controls associated with the systems. Be specific Risk: Combination of the likelihood that a particular vulnerability in an organization s systems will be either intentionally or unintentionally exploited by a particular threat agent and the magnitude of the potential harm (consequence) to the organization s operations, assets, or personnel that could result from the loss of confidentiality, integrity, or availability. Likelihood: (Highly Likely) Explain the probability of occurrence due to mission parameters. Make sure this category designation matches the Matrix category designations. Impact: (High) Explain the consequence to data, mission, operation, or life in quantifiable terms. Make sure designation matches consequence column headers on Risk Matrix. In terms of confidentiality, integrity & availability, Mitigation/Countermeasures: List actions that are that are implemented and documented relevant to the risk. Residual Risk: After mitigation/countermeasure have been applied what is the risk level? Why should the AO accept the risk Current Residual Risk: Moderate Additional countermeasures needed for Low residual risk: What is needed to meet the requirement or mitigate to a low risk 27
28 Risk Analysis Summary Template IMPACT LOW MINOR MEDIUM SIGNIFICANT HIGH Level 5 Impact % Most Likely Level 4 Initial R5 Ʃ= Likelihood Risk LIKELIHOOD 61-90% Probable Level % Somewhat likely Level 2 By design R % Remote Level % Unlikely By Test R5 28
29 Terminology Authorizing Official (AO) Formerly referred to as Designated Accrediting Authority (DAA) Authorized to accept cybersecurity measured risk Ensure cybersecurity integrated into programs Review/Approve accreditation package with cybersecurity risk assessment and mitigation approach Accredit/Deny system for test or operation Independent Authorization Official Security Control Assessor (SCA) Formerly referred to as Certifying Authority (CA) Approve requirements Review cybersecurity technical assessments Certify cybersecurity implementation and risk assessment Make risk recommendations to AO (DAA) Independent assessment authority *Delegated IAW AFPD
30 Terminology Decisions Platform IT Determination - A determination made by an AO that a system meets the criteria of Platform IT Interim Authority to Test (IATT) - An IATT is a special type of authorization decision allowing a Platform IT system to operate for the purpose of testing in order to complete specific test objectives Authority to Operate (ATO) - An ATO is a decision issued once all risks have been reduced to acceptable levels or proper mitigation is in place and the Platform IT AO is willing to accept the residual risk as assessed Denial of Authority to Operate (DATO) - A DATO is a decision issued when risks are not acceptable to the Platform IT AO. This may result due to unauthorized changes to the system, new threats or system vulnerabilities, insufficient progress on the POA&M Authority to Connect (ATC) A decision by another AO to allow a connection to an accredited system See PIT Guidebook for complete definition 30
31 Software Pedigree Understand the Source of software GOTS, MOTS, COTS Concern with uncleared personnel writing critical software for weapons systems Concern with freeware/shareware Need approval to use COTS software not previously analyzed Independent V&V of software code Utilize software tools to check for malicious code Software scanned for vulnerability 2013 NDAA SEC. 933 includes requirement to develop DoD software assurance policy applicable to weapons systems 31
32 Software Assurance (SwA) Assessment Benefits: Security & Quality Significantly reduces cost of reliable, secure software Compliments existing testing approaches Boosts overall development productivity Promotes adherence to key industry standards Security Buffer overflow Un-validated user input SQL injection Path injection File injection Cross-site scripting Information leakage Vulnerable coding practices Reliability Memory and resource leaks Concurrency violations Infinite loops Dereferencing NULL pointers Usage of uninitialized data Resource management Memory allocation errors Coding Standards & Maintainability MISRA, DISA, CWE, CERT, etc. Dead code Unreachable code Calculated values that are never used Unused function parameters
33 Supply Chain Counterfeit Hardware Supply Chain Risk Management Impacts Reliability Concern over potential malware or backdoors Extra concern for ICT components Software Assurance (SwA) Design of the code Embedded malicious code Software development and assessment See DoDI ICT = Information Communications Technology 33
34 Supply Chain Risk Management (SCRM) Concerns Counterfeit Hardware Impacts Reliability Concern over potential malware or backdoors Extra concern for ICT components Software Concerns Design of the code Embedded malicious code ICT= Information Communications Technology 34
35 Source of software GOTS, MOTS, COTS Software Pedigree Concern with uncleared personnel writing critical software Concern with freeware/shareware Need approval to use COTS software not previously analyzed Independent V&V of software code Software tools utilized to check for malicious code 35
36 SwA tool Comparison Study Important Issue Types Score (%) Scan Results Score (%) Environment Integration Score (%) Performance Score (%) Presentation Score (%) Support Score (%) Cost Clarity Score (%) Final Score Coverity SAVE C/C++ Test Insight Palamida Enterprise Edition Fortify CodeSonar CxInvestigate PC-lint AppScan FxCop Fakebust
37 Technology Challenges No automated aircraft system architecture vulnerability identification tools No aircraft cyber threat modeling tool No quick way to V&V software supply chain integrity No automated criticality assessment tool No technology to test cyber resiliency of aircraft system No technology to measure cyber resiliency 37
38 Summary Cybersecurity Requirements adapted for Weapon System Requirements Cybersecurity part of the system engineering review process Risk assessment accomplished on all requirements Independent Certification and Accreditation (risk taking authority)
39 Backup 39
40 Cybersecurity Requirement 44 USC Chapter 35 Subchapter III INFORMATION SECURITY DoDI Cybersecurity DoDI Risk Management Framework for DoD IT Interim DoDI Cybersecurity RMF integrated into Systems Engineering and Acquisition AFI USAF C&A Process AFI Guidance Memo: guidance for C&A of PIT Directs assessment of legacy PIT systems Requires Risk Management and Authorization of PIT Systems USAF Platform IT Guidebook AFLCMC Platform IT C&A Process Mandatory AFLCMC Standard Process Metrics briefed quarterly to AFLCMC/CC, PEOs and Functionals 40
41 System Security Plan (SSP) The organization: a. Develops a security plan for the information system that: - Explicitly defines the authorization boundary for the system; - Describes the operational context of the information system in terms of missions and business processes; - Provides the security categorization of the information system including supporting rationale; - Describes the operational environment for the information system; - Describes relationships with or connections to other information systems; - Provides an overview of the security requirements for the system; - Describes the security controls in place or planned for meeting those requirements including a rationale for the tailoring and supplementation decisions; and - Is reviewed and approved by the authorizing official or designated representative prior to plan implementation; b. Reviews the security plan for the information system [Assignment: organizationdefined frequency]; and c. Updates the plan to address changes to the information system/environment of operation or problems identified during plan implementation or security control assessments. The intent is covered by CRTM and architecture analysis report. However, processes and procedures used to meet requirements or mitigate risk must be documented in an SSP or technical order. 41
42 Data Flow Example Prime Contractor Aircraft Data Portable device Download CD USAF Analysis CD Conversion Legend Entity Process Storage Data Flow 42
43 Roots of DoD Policy 43
44 Architecture Subsystems Example Guidance Computer Functional description Include criticality, classification, storage media, external/internal interfaces and protocols, and hardware & software Device Name Manufacturer Model Guidance Computer Acme Guider 200A Part# 423 Sub- System (A/N/G) Class Level (U/S/TS) Non- Volatile Storage Media Removable Media A S Hard Drive Yes Front-Panel Interface USB, E-net Maintenance Interface 1533, ARINC 429 Purpose Guidance Processing Description Guidance Computer Guidance Computer Guidance Computer LRU/Model Number O/S License required Application Software 1623 Some RTOS Y CPC LCOS control software 1623 Y Interface control software 1623 Y Other control software Developer ABC Comments Evaluated by NSA 123 Contains foreign dev software XYZ Scanned with Fortify For each component the architecture analysis document should have this level of detail. This becomes the HW/SW baseline. 44
45 Cybersecurity Requirements Traceability Matrix (CRTM) Reqt CONTROL NAME Control Text Armament Guidance Supplemental Guidance Applicable Compliant Method of Verification Verification Result Supporting Artifact Comments Yes/No Yes/No Requirement PE-19 Requirement text Emissions and TEMPEST Control Text The organization employs cryptographic mechanisms to prevent unauthorized disclosure and modification of information at rest unless otherwise protected by alternative physical measures. Armament Guidance Rationale for tailoring or why the requirement is nonapplicable Applicable Yes Compliant No Method of Verification Verification Result Supporting Artifact Comments TEMPEST Tests IAW AFI 700. Discuss test specifics Summarize Name and section of the test report. Use this to discuss if this drives a risk. Also use this area for rationale for Technical controls verified with demonstration, analysis or test. Process & operational controls validated with inspection. 45
46 CNSS 1253 Cybersecurity Requirements IDENTIFIER FAMILY CLASS AC Access Control Technical AT Awareness and Training Operational AU Audit and Accountability Technical CA Security Assessment and Authorization Management CM Configuration Management Operational CP Contingency Planning Operational IA Identification and Authentication Technical IR Incident Response Operational MA Maintenance Operational MP Media Protection Operational PE Physical and Environmental Protection Operational PL Planning Management PS Personnel Security Operational RA Risk Assessment Management SA System and Services Acquisition Management SC System and Communications Protection Technical SI System and Information Integrity Operational PM Program Management Management 46
47 Requirements IDENTIFIER AC Access Control AT Awareness and Training AU Audit and Accountability CA Security Assessment and Authorization CM Configuration Management CP Contingency Planning IA Identification and Authentication IR Incident Response MA Maintenance MP Media Protection PE Physical and Environmental Protection PL Planning PS Personnel Security RA Risk Assessment Management SA System and Services Acquisition SC System and Communications Protection SI System and Information Integrity PM Program Management Tailored Requirements that apply to the system 47
48 Biographical Sketch Harrell J. Van Norman is the Cybersecurity Technical Expert for AFLCMC Engineering Directorate, US Air Force, WPAFB, supporting Platform IT systems as the Certifying Authority Representative and as an Adjunct Professor with the Institute of Defense Studies and Education at Wright State University and with the Management Information Systems Department/MBA Department at the University of Dayton. Previously, Harrell served as the Information System Security Manager (ISSM) for unmanned aerial system SIGINT sensors, supporting the US Air Force at WPAFB. Harrell also served as the Cybersecurity and Workforce Development Program Coordinator at ATIC. With over 30 years experience in cybersecurity, system design, implementation, optimization, management, and training, Harrell is a skilled and certified engineering research staff member (CISSP, Security+, e-biz+, Network+, CCNA, CCDA, CCDP, CCNP). Harrell has a balanced background of engineering design and optimization, information assurance, anti-tamper, program protection, remote sensing intelligence systems, communications protocol standards, training and education, simulation modeling and analysis, program management, and network infrastructure support. He is the author of LAN/WAN Optimization Techniques, and his work has been published in Data Communications Magazine, Communications News, Faulkner Information Services, and The Communications Handbook. He currently serves on the Board of Directors for the Dayton, Ohio, Information Systems Security Association chapter. 48
AF Life Cycle Management Center
AF Life Cycle Management Center Avionics Weapon Systems Cybersecurity Risk Management Framework Assessment & Authorization Update Harrell Van Norman AFLCMC/EZAS Cybersecurity Technical Expert [email protected]
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 NOV 1 0 2015 CHIEF INFORMATION OFFICER MEMORANDUM FOR ASSISTANT SECRETARY OF THE ARMY FOR ACQUISITION, LOGISTICS AND TECHNOLOGY ASSIST
Get Confidence in Mission Security with IV&V Information Assurance
Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving
Cybersecurity Throughout DoD Acquisition
Cybersecurity Throughout DoD Acquisition Tim Denman Cybersecurity Performance Learning Director DAU Learning Capabilities Integration Center [email protected] [email protected] Cybersecurity
DoD Software Assurance (SwA) Overview
DoD Software Assurance (SwA) Overview Tom Hurt Office of the Deputy Assistant Secretary of Defense for Systems Engineering NDIA Program Protection Summit / Workshop McLean, VA May 19, 2014 May 19, 2014
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
Tim Denman Systems Engineering and Technology Dept Chair/ Cybersecurity Lead DAU South, Huntsville [email protected]
Tim Denman Systems Engineering and Technology Dept Chair/ Cybersecurity Lead DAU South, Huntsville [email protected] Current State of Cybersecurity in the DoD Current Needs Communications focus Changing
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems Samuel R. Ashmore Margarita Castillo Barry Gavrich CS589 Information & Risk Management New Mexico Tech Spring 2007
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
System Security Certification and Accreditation (C&A) Framework
System Security Certification and Accreditation (C&A) Framework Dave Dickinson, IOAT ISSO Chris Tillison, RPMS ISSO Indian Health Service 5300 Homestead Road, NE Albuquerque, NM 87110 (505) 248-4500 fax:
CTR System Report - 2008 FISMA
CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control
1 July 2015 Version 1.0
1 July 2015 Version 1.0 Cleared for Open Publication June 26, 2015 DoD Office of Prepublication and Security Review Cybersecurity T&E Guidebook ii July 1, 2015 Version 1.0 Table of Contents 1 INTRODUCTION...
HHS Information System Security Controls Catalog V 1.0
Information System Security s Catalog V 1.0 Table of Contents DOCUMENT HISTORY... 3 1. Purpose... 4 2. Security s Scope... 4 3. Security s Compliance... 4 4. Security s Catalog Ownership... 4 5. Security
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS Steve Mills DAU-South 1 Overview Questions Cybersecurity Owners and Stakeholders Cybersecurity Why It Matters to DoD Program Managers Defense Science
Cybersecurity is one of the most important challenges for our military today. Cyberspace. Cybersecurity. Defending the New Battlefield
Cybersecurity Defending the New Battlefield Steven J. Hutchison, Ph.D. Cybersecurity is one of the most important challenges for our military today. Cyberspace is a new warfighting domain, joining the
Security Controls Assessment for Federal Information Systems
Security Controls Assessment for Federal Information Systems Census Software Process Improvement Program September 11, 2008 Kevin Stine Computer Security Division National Institute of Standards and Technology
System Security Engineering and Comprehensive Program Protection
System Security Engineering and Comprehensive Program Protection Melinda Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering 16th Annual NDIA Systems Engineering Conference
RMF. Cybersecurity and the Risk Management. Framework UNCLASSIFIED
Cybersecurity and the Risk Management Framework Wherewe ve been and where we re going Information Assurance DoD Instruction 8500.01,Para 1(d),adoptsthe term cybersecurity as it is defined in National Security
Implementing Program Protection and Cybersecurity
Implementing Program Protection and Cybersecurity Melinda Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering Mark Godino Office of the Deputy Assistant Secretary of Defense
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
Information Security for Managers
Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700
OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700 OPERATIONAL TEST AND EVALUATION AUG 0 1 2014 MEMORANDUM FOR COMMANDER, ARMY TEST AND EVALUATION COMMAND COMMANDER, AIR
System Security Engineering
A Critical Discipline of SE Ms. Kristen Baldwin Director, Systems Analysis DDR&E/Systems Engineering 12th Annual NDIA Systems Engineering Conference 28 October 2009 10/28/09 Page-1 Defense Research & Engineering
Risk Management Framework (RMF): The Future of DoD Cyber Security is Here
Risk Management Framework (RMF): The Future of DoD Cyber Security is Here Authors: Rebecca Onuskanich William Peterson 3300 N Fairfax Drive, Suite 308 Arlington, VA 22201 Phone: 571-481-9300 Fax: 202-315-3003
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-510 GENERAL (Office of Origin: IRM/IA) 5 FAH-11 H-511 INTRODUCTION 5 FAH-11 H-511.1 Purpose a. This subchapter implements the policy
National Information Assurance Certification and Accreditation Process (NIACAP)
NSTISSI No. 1000 April 2000 National Information Assurance Certification and Accreditation Process (NIACAP) THIS DOCUMENT PROVIDES MINIMUM STANDARDS. FURTHER INFORMATION MAY BE REQUIRED BY YOUR DEPARTMENT
Security and Privacy Controls for Federal Information Systems and Organizations
NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems JOINT TASK FORCE TRANSFORMATION INITIATIVE This document contains excerpts from NIST Special Publication
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology [email protected] 256.922.
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS 1 Steve Mills Professor of Information Technology [email protected] 256.922.8761 Overview Cybersecurity Policy Overview Questions Challenge #1 -
U.S. FLEET CYBER COMMAND U.S. TENTH FLEET DoD RMF Transition
U.S. FLEET CYBER COMMAND U.S. TENTH FLEET DoD RMF Transition Dr. Charles Kiriakou, Ms. Kate Cunningham, Mr. Kevin Winters, & Mr. Carl Rice September 3, 2014 UNCLASSIFIED 1 Bottom Line Up Front (BLUF) The
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION Directive Current as of 19 November 2014 J-8 CJCSI 8410.02 DISTRIBUTION: A, B, C, JS-LAN WARFIGHTING MISSION AREA (WMA) PRINCIPAL ACCREDITING AUTHORITY
CONTINUOUS MONITORING
CONTINUOUS MONITORING Monitoring Strategy Part 2 of 3 ABSTRACT This white paper is Part 2 in a three-part series of white papers on the sometimes daunting subject of continuous monitoring (CM) and how
Cyber R &D Research Roundtable
Cyber R &D Research Roundtable 2 May 2013 N A T I O N A L S E C U R I T Y E N E R G Y & E N V I R O N M E N T H E A L T H C Y B E R S E C U R I T Y Changing Environment Rapidly Evolving Threat Changes
Security Control Standard
Department of the Interior Security Control Standard Risk Assessment January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information
ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT
INTERNATIONAL CIVIL AVIATION ORGANIZATION ASIA AND PACIFIC OFFICE ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT DRAFT Second Edition June 2010 3.4H - 1 TABLE OF CONTENTS 1.
Minimum Security Requirements for Federal Information and Information Systems
FIPS PUB 200 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Minimum Security Requirements for Federal Information and Information Systems Computer Security Division Information Technology Laboratory
IT Security Management Risk Analysis and Controls
IT Security Management Risk Analysis and Controls Steven Gordon Document No: Revision 770 3 December 2013 1 Introduction This document summarises several steps of an IT security risk analysis and subsequent
Security Control Standard
Department of the Interior Security Control Standard Security Assessment and Authorization January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,
Selecting RMF Controls for National Security Systems
SANDIA REPORT SAND2015-6770 Unlimited Release Printed August 2015 Selecting RMF Controls for National Security Systems Edward L. Witzke Prepared by Sandia National Laboratories Albuquerque, New Mexico
FISMA / NIST 800-53 REVISION 3 COMPLIANCE
Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security
Security Language for IT Acquisition Efforts CIO-IT Security-09-48
Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Office of the Senior Agency Information Security Officer VERSION HISTORY/CHANGE RECORD Change Number Person Posting Change Change Reason
DIACAP Presentation. Presented by: Dennis Bailey. Date: July, 2007
DIACAP Presentation Presented by: Dennis Bailey Date: July, 2007 Government C&A Models NIST SP 800-37 - Guide for the Security Certification and Accreditation of Federal Information Systems NIACAP - National
COORDINATION DRAFT. FISCAM to NIST Special Publication 800-53 Revision 4. Title / Description (Critical Element)
FISCAM FISCAM 3.1 Security (SM) Critical Element SM-1: Establish a SM-1.1.1 The security management program is adequately An agency/entitywide security management program has been developed, An agency/entitywide
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing Introduction ManTech Project Manager Mark Shaw, Senior Executive Director Cyber Security Solutions Division
Review of the SEC s Systems Certification and Accreditation Process
Review of the SEC s Systems Certification and Accreditation Process March 27, 2013 Page i Should you have any questions regarding this report, please do not hesitate to contact me. We appreciate the courtesy
CMS POLICY FOR THE INFORMATION SECURITY PROGRAM
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS POLICY FOR THE INFORMATION SECURITY PROGRAM FINAL Version 4.0 August 31, 2010 Document Number: CMS-CIO-POL-SEC02-04.0
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
System Security Engineering and Program Protection Integration into SE
System Security Engineering and Program Protection Integration into SE Melinda Reed Deputy Director for Program Protection Office of the Deputy Assistant Secretary of Defense for Systems Engineering 17
Requirements For Computer Security
Requirements For Computer Security FTA/IRS Safeguards Symposium & FTA/IRS Computer Security Conference April 2, 2008 St. Louis 1 Agenda Security Framework Safeguards IT Security Review Process Preparing
Guidelines for Cybersecurity DT&E v1.0
Guidelines for Cybersecurity DT&E v1.0 1. Purpose. These guidelines provide the means for DASD(DT&E) staff specialists to engage and assist acquisition program Chief Developmental Testers and Lead DT&E
Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat
Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat Centers for Disease and Prevention National Center for Chronic Disease Prevention and Health
Bellingham Control System Cyber Security Case Study
Bellingham Control System Cyber Security Case Study Marshall Abrams Joe Weiss Presented at at 2007 Annual Computer Security Applications Conference Case Study Synopsis Examine actual control system cyber
Information Security. Rick Aldrich, JD, CISSP Booz Allen Hamilton [email protected]
Information Security Rick Aldrich, JD, CISSP Booz Allen Hamilton [email protected] Overview (Fed Info Sys) From NIST SP 800-60, Vol 1, Guide for Mapping Types of Information Systems to Security Categories
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8551.01 May 28, 2014 DoD CIO SUBJECT: Ports, Protocols, and Services Management (PPSM) References: See Enclosure 1 1. PURPOSE. In accordance with the authority
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.2 9/28/11 INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A) I. PURPOSE This directive
Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN
Independent Security Operations Oversight and Assessment Captain Timothy Holland PM NGEN 23 June 2010 Independent Security Operations Oversight and Assessment Will Jordan NGEN Cyber Security 23 June 2010
Security Self-Assessment Tool
Security Self-Assessment Tool State Agencies Receiving FPLS Information, 7/15/2015 Contents Overview... 2 Access Control (AC)... 3 Awareness and Training (AT)... 8 Audit and Accountability (AU)... 10 Security
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.44 November 5, 2012 DoD CIO/USD(AT&L) SUBJECT: Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN) References: See Enclosure
SECURITY CATEGORIZATION AND CONTROL SELECTION FOR NATIONAL SECURITY SYSTEMS
1 CNSSI No. 1253 15 March 2012 SECURITY CATEGORIZATION AND CONTROL SELECTION FOR NATIONAL SECURITY SYSTEMS Version 2 THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER
Altius IT Policy Collection Compliance and Standards Matrix
Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy
Cloud Security for Federal Agencies
Experience the commitment ISSUE BRIEF Rev. April 2014 Cloud Security for Federal Agencies This paper helps federal agency executives evaluate security and privacy features when choosing a cloud service
FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL
FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL Clifton Gunderson LLP s Independent Audit of the Federal Housing Finance Agency s Information Security Program - 2011 Audit Report: AUD-2011-002
DEPARTMENT OF DEFENSE (DoD) CLOUD COMPUTING SECURITY REQUIREMENTS GUIDE (SRG) Version 1, Release 1. 12 January 2015
DEPARTMENT OF DEFENSE (DoD) CLOUD COMPUTING SECURITY REQUIREMENTS GUIDE (SRG) Version 1, Release 1 12 January 2015 Developed by the Defense Information Systems Agency (DISA) for the Department of Defense
FedRAMP Standard Contract Language
FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8510.01 March 12, 2014 DoD CIO SUBJECT: Risk Management Framework (RMF) for DoD Information Technology (IT) References: See Enclosure 1 1. PURPOSE. This instruction:
Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance
WHITE paper Complying with the Federal Information Security Management Act How Tripwire Change Auditing Solutions Help page 2 page 3 page 3 page 3 page 4 page 4 page 5 page 5 page 6 page 6 page 7 Introduction
DoDI 8500-2 IA Control Checklist - MAC 2-Sensitive. Version 1, Release 1.4. 28 March 2008
DoDI 8500-2 IA Control Checklist - MAC 2-Sensitive Version 1, Release 1.4 Developed by DISA for the DOD UNTILL FILLED IN CIRCLE ONE FOR OFFICIAL USE ONLY (mark each page) CONFIDENTIAL and SECRET (mark
The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -
45 min Webinar: November 14th, 2014 The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - www.cunesoft.com Rainer Schwarz Cunesoft Holger Spalt ivigilance 2014 Cunesoft GmbH PART
2015 Security Training Schedule
2015 Security Training Schedule Risk Management Framework Course (RMF) / $1,950.00 Per Student Dates June 1-4 Location 4775 Centennial Blvd., Suite 103 / Colorado Springs, CO 80919 July 20 23 444 W. Third
CMS SYSTEM SECURITY PLAN (SSP) PROCEDURE
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS SYSTEM SECURITY PLAN (SSP) PROCEDURE August 31, 2010 Version 1.1 - FINAL Summary of Changes in SSP
Vulnerability Analysis Techniques to Support Trusted Systems and Networks (TSN) Analysis
Vulnerability Analysis Techniques to Support Trusted Systems and Networks (TSN) Analysis Melinda Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering 17th Annual NDIA Systems
Out with. AP, In. with. (C&A) and (RMF) LUNARLINE, INC.. 571-481-9300
Out with the DIACA AP, In with the DIARMF Say Goodbye to Certificatio n and Accreditation (C&A) and Hello to the Risk Management Framework (RMF) Author: Rebecca Onuskanich Program Manager, Lunarline LUNARLINE,
Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes
Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes Joe Jarzombek, PMP, CSSLP Director for Software & Supply Chain Assurance Stakeholder
Final Audit Report -- CAUTION --
U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Audit of the Information Technology Security Controls of the U.S. Office of Personnel Management
Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System
Department of Defense INSTRUCTION NUMBER 8580.1 July 9, 2004 SUBJECT: Information Assurance (IA) in the Defense Acquisition System ASD(NII) References: (a) Chapter 25 of title 40, United States Code (b)
WRITTEN INFORMATION SECURITY PROGRAM (WISP) ACME Consulting Services, Inc.
WRITTEN INFORMATION SECURITY PROGRAM (WISP) ACME Consulting Services, Inc. Copyright 2016 Table of Contents WRITTEN INFORMATION SECURITY PROGRAM (WISP) OVERVIEW 10 INTRODUCTION 10 PURPOSE 10 SCOPE & APPLICABILITY
Deriving Software Security Measures from Information Security Standards of Practice
Deriving Software Measures from Standards of Practice Julia Allen Christopher Alberts Robert Stoddard February 2012 2012 Carnegie Mellon University Copyright 2012 Carnegie Mellon University. This material
Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals
Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals JANUARY 2014 Deputy Assistant Secretary of Defense for Systems
Dr. Ron Ross National Institute of Standards and Technology
Managing Enterprise Risk in Today s World of Sophisticated Threats A Framework for Developing Broad-Based, Cost-Effective Information Security Programs Dr. Ron Ross National Institute of Standards and
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.40 December 30, 1997 SUBJECT: DoD Information Technology Security Certification and Accreditation Process (DITSCAP) ASD(C3I) References: (a) DoD Directive
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is
Security Control Standard
Department of the Interior Security Control Standard Maintenance January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information Officer
HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY
POLICY ON WIRELESS SYSTEMS
Committee on National Security Systems CNSSP No. 17 January 2014 POLICY ON WIRELESS SYSTEMS THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION CHAIR
DoDI 8500-2 IA Control Checklist - MAC 3-Public. Version 1, Release 1.4. 28 March 2008
DoDI 8500-2 IA Control Checklist - MAC 3-Public Version 1, Release 1.4 Developed by DISA for the DOD UNTILL FILLED IN CIRCLE ONE FOR OFFICIAL USE ONLY (mark each page) CONFIDENTIAL and SECRET (mark each
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
DEPARTMENT OF THE AIR FORCE HEADQUARTERS AERONAUTICAL SYSTEMS CENTER (AFMC) WRIGHT-PATTERSON AIR FORCE BASE OHIO
DEPARTMENT OF THE AIR FORCE HEADQUARTERS AERONAUTICAL SYSTEMS CENTER (AFMC) WRIGHT-PATTERSON AIR FORCE BASE OHIO BULLETIN AWB 002A 17 May 2011 ((supersedes AWB-002) United States Air Force (USAF) Airworthiness
CMS Information Security Risk Assessment (RA) Methodology
DEPARTMENT OF HEALTH & HUMAN SERVICES Centers for Medicare & Medicaid Services 7500 Security Boulevard, Mail Stop N2-14-26 Baltimore, Maryland 21244-1850 CENTERS FOR MEDICARE & MEDICAID SERVICES (CMS)
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec
Introduction Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec More than 20 years of experience in cybersecurity specializing
Security Compliance In a Post-ACA World
1 Security Compliance In a Post-ACA World Security Compliance in a Post-ACA World Discussion of building a security compliance framework as part of an ACA Health Insurance Exchange implementation. Further
DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK 6500.5 INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE
DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK 6500.5 Washington, DC 20420 Transmittal Sheet March 22, 2010 INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE 1. REASON FOR ISSUE: This
Final Audit Report. Report No. 4A-CI-OO-12-014
U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report Subject: AUDIT OF THE INFORMATION TECHNOLOGY SECURITY CONTROLS OF THE U.S. OFFICE OF PERSONNEL MANAGEMENT'S
Industrial Security Field Operations
Defense Security Service Industrial Security Field Operations NISP Authorization Office (NAO) (Formerly Office of the Designated Approving Authority) NISPOM to NIST (800-53r4) Security Control Mapping
FSIS DIRECTIVE 1306.3
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS
