Cybersecurity Throughout DoD Acquisition
|
|
|
- Colin Sparks
- 9 years ago
- Views:
Transcription
1 Cybersecurity Throughout DoD Acquisition Tim Denman Cybersecurity Performance Learning Director DAU Learning Capabilities Integration Center Cybersecurity Throughout DoD Acquisition
2 Outline Current State of Cybersecurity in the DoD DoD Cyber Strategy Communications and Cybersecurity Cybersecurity A Team Sport Leadership/ Program Management Logistics Contracts Engineering Test and Evaluation (T&E) Risk Management Framework Concepts Process Transition DAU and Cybersecurity
3 The DoD Cyber Strategy (April 2015)
4 Five Strategic Goals for DoD Cyberspace Missions 1. Build and maintain ready forces and capabilities to conduct cyberspace operations; 2. Defend the DoD information network, secure DoD data, and mitigate risks to DoD missions; 3. Be prepared to defend the U.S. homeland and U.S. vital interests from disruptive or destructive cyberattacks of significant consequence; 4. Build and maintain viable cyber options and plan to use those options to control conflict escalation and to shape the conflict environment at all stages; 5. Build and maintain robust international alliances and partnerships to deter shared threats and increase international security and stability. For DoD to succeed in its mission of defending the United States and its interests in cyberspace, leaders from across the Department must take action to achieve the objectives outlined in this document. They must also hold their organizations accountable.
5 DoD Communications What has changed in the last 8 years? 5
6 Cybersecurity A Team Sport Who should be involved and how? Cybersecurity in the DoD acquisition workforce requires vigilance from everyone who communicates information digitally. It is a true team sport that affects everyone s job and it is the responsibility of the entire DoD workforce.
7 Leadership and Cybersecurity Professionals Leadership must lead the way Be accountable and hold others accountable Understand and prioritize cybersecurity Involve cybersecurity professionals throughout the acquisition process Cybersecurity professionals must lead Educate and communicate Work as a team to enable cybersecurity and IT PMs, under the supervision of Program Executive Officer (PEOs) and Component Acquisition Executives (CAEs), are expected to: Design acquisition programs Prepare programs for decisions Execute approved program plans PM - The individual with responsibility and accountability for the implementation of DoD security requirements IAW DoDI The most critical component in any organization is trust. Vinny Boles, Leadership 7
8 Cybersecurity Implementation into Acquisition Programs 3 Sub-processes Requirements Generation The PM team and requirements developers must be cognizant of the mandatory System Survivability KPP, which includes cyber survivability requirements. PMs will need to deliver systems that are able to operate and complete their missions in a cyber-contested environment. Acquisition and Program Management PMs must address cybersecurity in program reviews, including Deep Dives, In-Process Reviews, and Overarching Integrated Product Team (OIPT) meetings The PM needs to build an IPT structure that includes cybersecurity expertise. Systems Engineering and Test and Evaluation Implementation of a disciplined systems engineering process that includes cybersecurity is required from requirements analysis through design, test and evaluation, fielding, sustainment, and decommissioning. The PM must develop a cybersecurity Test and Evaluation (T&E) strategy, allocate resources for cybersecurity T&E, and ensure they are described in the TEMP. DoD Program Manager s Guidebook for Integrating the Cybersecurity Risk Management Framework (RMF) into the System Acquisition Lifecycle, May 2015, Version 1.0
9 Logistics - Supply Chain Risk Management The Chinese government has adopted new regulations requiring companies that sell computer equipment to Chinese banks to turn over secret source code, submit to invasive audits and build socalled back doors into hardware and software In 2013 a Defense Science Board report accused China of using cyber attacks to access information from almost 40 Pentagon weapons programs Contractors may be removed from information technology procurements supporting national security systems for failure to satisfy standards related to supply chain risk, and in some cases they will be unable to protest their removal. DoD rules governing Information Relating to Supply Chain Risk, 78 Fed. Register 69,268 (Nov. 18, 2013), NDAA Section 806 Supply Chain Risk -the risk that an adversary may sabotage, maliciously introduce unwanted function, or otherwise subvert the design, integrity, manufacturing, production, distribution, installation, operation, or maintenance of a covered system so as to surveil, deny, disrupt, or otherwise degrade the function, use, or operation of such system. 9
10 SCRM Sample Contract Language (Section C) [SOWxxx4] The contractor shall demonstrate that the contractor has mechanisms in place to effectively monitor the supply chain for critical components, understands how supply chain risk can be introduced through those components, and has implemented or plans to implement countermeasures to mitigate such risks. [SOWxxx5] The contractor shall plan for and implement countermeasures that mitigate the risk of foreign intelligence or foreign influence, technology exploitation, supply chain and battlefield threats, and vulnerabilities that result in Level I and Level II protection failures of the system; countermeasures include the following: 1. The application of supply chain risk management best practices, 2. The enumeration of potential suppliers of critical components, as they are identified, [SOWxxx7] The contractor shall ensure that updated assumptions, rationale, and results related to the criticality analyses, vulnerability assessments, risk assessments, supply chain risk information, and risk mitigations are made available for Government review at each Systems Engineering Technical Review (SETR). From Suggested SSE Language for TSN in DoD RFPs, Jan
11 Engineering Design - Software Assurance Software Assurance (SwA)- the level of confidence that software functions as intended and is free of vulnerabilities, either intentionally or unintentionally designed or inserted as part of the software throughout the life cycle. CNSS Instruction 4009 National Information Assurance Glossary, Apr 26, 2010 The key to gaining assurance about your software is to make incremental improvements when you develop it, when you buy it, and when others create it for you. No single remedy will absolve or mitigate all of the weaknesses in your software, or the risk. However, by blending several different methods, tools, and change in culture, one can obtain greater confidence that the important functions of the software will be there when they are needed and the worst types of failures and impacts can be avoided. 11
12 Cybersecurity T&E Phases and the Acquisition Life Cycle Cybersecurity T&E phases are Iterative - Activities may be repeated several times due to changes in the system architecture, new or emerging threats, and changes to the system environment. Primarily support DT&E Support OT&E DoDI clearly provides direction to integrate cybersecurity T&E early and continuously in the acquisition life cycle.
13 T&E Phases Cybersecurity Test and Evaluation Guidebook, July 1, 2015 Phase Purpose D T & E O T & E Understand Cybersecurity Requirements Characterize the Cyber- Attack Surface Cooperative Vulnerability Identification Adversarial Cybersecurity DT&E Cooperative Vulnerability & Penetration Assessment Adversarial Assessment Understand the program s cybersecurity requirements and develop an initial approach and plan for conducting cybersecurity T&E. Identify the opportunities an attacker may use to exploit the system in order to plan testing that evaluates whether those opportunities continue to allow exploitation. Identify vulnerabilities that may be fed back to systems designers, developers, and engineers so that mitigations can be implemented to improve resilience. Discover critical vulnerabilities and determine their impacts. Provide a comprehensive characterization of the cybersecurity status of a system in a fully operational context, and to substitute for reconnaissance activities in support of adversarial testing. Attempt to induce mission effects by exploiting vulnerabilities to support evaluation of operational mission risks.
14 Cybersecurity Defined Information Assurance (IA) - Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities. Department of Defense Directive (DoDD) E, April 23, 2007 Cybersecurity - Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation. Department of Defense Instruction (DoDI) , March 14, 2014 DoDI adopts the term cybersecurity to be used throughout the DoD instead of the term information assurance (IA). 14
15 DoD Risk Management Framework (RMF) Policy DoD Instruction Cybersecurity Signed March 14, 2014 DoD Instruction Risk Management Framework (RMF) for DoD Information Technology (IT) Signed March 12, 2014 Cybersecurity RMF steps and activities, as described in DoD Instruction , should be initiated as early as possible and fully integrated into the DoD acquisition process including requirements management, systems engineering, and test and evaluation. DoDI , January 7,
16 Key RMF Documents NIST Special Publications (SP) Guide for Applying the RMF Managing Information Security Risks Security and Privacy Controls A - Guide for Assessing the Security Controls Guide for Mapping Types of Information and Information Systems to Security Categories Information Security Continuous Monitoring Committee on National Security Systems (CNSS) Instruction Security Categorization and Control Selection for National Security Systems Instruction 4009 Information Assurance Glossary Policy 11 - National Policy Governing the Acquisition of IA and IA- Enabled IT Products DoD participates in CNSS and NIST policy development as a vested stakeholder with the goals of a more synchronized cybersecurity landscape and to protect the unique requirements of DoD Missions and warfighters 16
17 RMF and the Acquisition Life Cycle Cybersecurity requirements must be identified and included throughout the lifecycle of systems to include acquisition, design, development, developmental testing, operational testing, integration, implementation, operation, upgrade, or replacement of all DoD IT supporting DoD tasks and missions. 17
18 RMF - Operational Resilience, Integration, and Interoperability Operational Resilience 1. Information and computing services are available to authorized users whenever and wherever needed 2. Security posture is sensed, correlated, and made visible to mission owners, network operators, and to the DoD Information Enterprise 3. Hardware and software have the ability to reconfigure, optimize, self-defend, and recover with little or no human intervention Integration and Interoperability 1. Cybersecurity must be fully integrated into system life cycles and will be a visible element of IT portfolios. 2. Interoperability will be achieved through adherence to DoD architecture principles 3. All interconnections of DoD IT will be managed to minimize shared risk 18
19 RMF and Cybersecurity Reciprocity Definition: Mutual agreement among participating enterprises to accept each other s security assessments in order to reuse information system resources and/or to accept each other s assessed security posture in order to share information. If applied appropriately, reciprocity will reduce: Redundant testing Redundant assessment and documentation Overall costs in time and resources 19
20 RMF and Continuous Monitoring Information System Continuous Monitoring - maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions. Continuous monitoring capabilities will be implemented to the greatest extent possible. 20
21 NIST SP Security and Privacy Controls Security controls are the safeguards/countermeasures prescribed for information systems or organizations that are designed to: Protect the confidentiality, integrity, and availability of information that is processed, stored, and transmitted by those systems/organizations; and Satisfy a set of defined security requirements Key questions What security controls are needed to satisfy the security requirements and to adequately mitigate risk incurred by using information and information systems in the execution of organizational missions and business functions? Have the security controls been implemented, or is there an implementation plan in place? What is the desired or required level of assurance that the selected security controls, as implemented, are effective in their application? The answers to these questions are not given in isolation but rather in the context of an effective risk management process for the organization that identifies, mitigates as deemed necessary, and monitors on an ongoing basis, risks arising from its information and information systems. 21
22 NIST SP Security and Privacy Controls Security Control Structure Each family contains security controls related to the general security topic of the family Security controls may involve aspects of policy, oversight, supervision, manual processes, actions by individuals, or automated mechanisms implemented by information systems/devices There are 18 security control families and over 900 controls included in NIST SP ID Family ID Family AC Access Control MP Media Protection AT Awareness & Training PE Physical & Environmental Protection AU Audit & Accountability PL Planning CA Security Assessment & Authorization PS Personnel Security CM Configuration Management RA Risk Assessment CP Contingency Planning SA System & Services Acquisition IA Identification & Authentication SC System & Communications Protection IR Incident Response SI System & Information Integrity MA Maintenance PM Program Management Security Control Identifiers and Family Names 22
23 Changes to Cybersecurity Roles & Responsibilities DIACAP role DODI , 2007 Designated Accrediting Authority (DAA) Certifying Authority No explicit role Information Assurance Manager (IAM) Information Assurance Officer RMF role DODI Authorizing Official (AO) Security Control Assessor (SCA) Information System Owner (ISO) Information System Security Manager (ISSM) Information System Security Officer (ISSO) Responsibilities (Reference DoDI for a complete definition of roles and responsibilities) The AO ensures all appropriate RMF tasks are initiated and completed, with appropriate documentation, for assigned ISs and PIT systems, monitor and track overall execution of system-level POA&Ms, Promote reciprocity. The SCA is the senior official with authority and responsibility to conduct security control assessments. In coordination with the information owner (IO), the ISO categorizes systems and documents the categorization in the appropriate JCIDS document (e.g., CDD). The ISSM maintains and reports IS and PIT systems assessment and authorization status and issues, provides ISSO direction, and coordinates with the security manager to ensure issues affecting the organization's overall security are addressed appropriately. The ISSO is responsible for maintaining the appropriate operational security posture for an information system or program. 23
24 RMF 6 Step Process
25 RMF Authorizations Authorization Type Decision Criteria Authorization Period Authorization to Operate (ATO) Overall risk is determined to be acceptable, and there are no NC controls with a level of risk of Very High or High. Must specify an Authorization Termination Date (ATD) that is within 3 years of the authorization date unless the IS or PIT system has a system-level, DoD policy compliant,continuous monitoring program. ATO with conditions (Only with permission of the DoD Component Chief Information Officer (CIO)) NC controls with Very High or High risk that can t be corrected or mitigated immediately, but overall system risk is determined to be acceptable due to mission criticality Should specify an AO review period that is within 6 months of the authorization date. If the system still requires operation with a level of risk of Very High or High after 1 year, the DoD Component CIO must again grant permission for continued operation of the system. Interim Authority To Test (IATT) Risk determination is being made to permit testing of the system in an operational information environment or with live data, and the risk is acceptable, Should expire at the completion of testing (normally for a period of less than 90 days ) Denial of Authorization to Operate (DATO) Risk is determined to be unacceptable Immediate or in concert with a system decommissioning strategy 25
26 RMF Knowledge Service The Knowledge Service is the authoritative source for information, guidance, procedures, and templates on how to execute the DIACAP and Risk Management Framework 26
27 RMF Transition Timeline (per RMF Knowledge Service) Completed DIACAP Package Submitted to AO for Signature Present through May 31, 2015 June 1, 2015 through February 1, 2016 February 2, 2016 through October 1, 2016 ATO Date Determined by AO Signature Date Maximum Duration of ATO under DIACAP 2.5 years from AO signature date 2 years from AO signature date 1.5 years from AO signature date What this means: The longer you stay with DIACAP, the shorter the ATO. DIACAP certified systems should be almost extinct by mid-year
28 DAU and Cybersecurity Cybersecurity and DoD Acquisition CLE hour on-line course Tim Denman POC Deployed March 31, 2015 RMF Implementer s Course ISA to 4 day on-line course Steve Mills POC Deployment Program Protection Planning (PPP) Courses are also being developed (Online and classroom) ENG 160 and ENG 260 DAU Cybersecurity Activities Training, Consulting, Curriculum Development and subject matter expertise Currently seven people are doing this work DAU-wide. This will double by August Ongoing mission assistance/ consulting work at Eglin Air Force Base, SPAWAR, Redstone Arsenal (AMRDEC), Wright Patterson AFB, Central POC: Tim Denman DAU Cybersecurity Performance Learning Director [email protected] Phone: [email protected]
Tim Denman Systems Engineering and Technology Dept Chair/ Cybersecurity Lead DAU South, Huntsville [email protected]
Tim Denman Systems Engineering and Technology Dept Chair/ Cybersecurity Lead DAU South, Huntsville [email protected] Current State of Cybersecurity in the DoD Current Needs Communications focus Changing
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS Steve Mills DAU-South 1 Overview Questions Cybersecurity Owners and Stakeholders Cybersecurity Why It Matters to DoD Program Managers Defense Science
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology [email protected] 256.922.
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS 1 Steve Mills Professor of Information Technology [email protected] 256.922.8761 Overview Cybersecurity Policy Overview Questions Challenge #1 -
Get Confidence in Mission Security with IV&V Information Assurance
Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving
AF Life Cycle Management Center
AF Life Cycle Management Center Avionics Weapon Systems Cybersecurity Risk Management Framework Assessment & Authorization Update Harrell Van Norman AFLCMC/EZAS Cybersecurity Technical Expert [email protected]
1 July 2015 Version 1.0
1 July 2015 Version 1.0 Cleared for Open Publication June 26, 2015 DoD Office of Prepublication and Security Review Cybersecurity T&E Guidebook ii July 1, 2015 Version 1.0 Table of Contents 1 INTRODUCTION...
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.44 November 5, 2012 DoD CIO/USD(AT&L) SUBJECT: Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN) References: See Enclosure
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 NOV 1 0 2015 CHIEF INFORMATION OFFICER MEMORANDUM FOR ASSISTANT SECRETARY OF THE ARMY FOR ACQUISITION, LOGISTICS AND TECHNOLOGY ASSIST
RMF. Cybersecurity and the Risk Management. Framework UNCLASSIFIED
Cybersecurity and the Risk Management Framework Wherewe ve been and where we re going Information Assurance DoD Instruction 8500.01,Para 1(d),adoptsthe term cybersecurity as it is defined in National Security
System Security Certification and Accreditation (C&A) Framework
System Security Certification and Accreditation (C&A) Framework Dave Dickinson, IOAT ISSO Chris Tillison, RPMS ISSO Indian Health Service 5300 Homestead Road, NE Albuquerque, NM 87110 (505) 248-4500 fax:
IT Security Management Risk Analysis and Controls
IT Security Management Risk Analysis and Controls Steven Gordon Document No: Revision 770 3 December 2013 1 Introduction This document summarises several steps of an IT security risk analysis and subsequent
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION Directive Current as of 19 November 2014 J-8 CJCSI 8410.02 DISTRIBUTION: A, B, C, JS-LAN WARFIGHTING MISSION AREA (WMA) PRINCIPAL ACCREDITING AUTHORITY
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
Security Control Standard
Department of the Interior Security Control Standard Security Assessment and Authorization January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,
Security and Privacy Controls for Federal Information Systems and Organizations
NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems JOINT TASK FORCE TRANSFORMATION INITIATIVE This document contains excerpts from NIST Special Publication
Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals
Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals JANUARY 2014 Deputy Assistant Secretary of Defense for Systems
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8510.01 March 12, 2014 DoD CIO SUBJECT: Risk Management Framework (RMF) for DoD Information Technology (IT) References: See Enclosure 1 1. PURPOSE. This instruction:
System Security Engineering
A Critical Discipline of SE Ms. Kristen Baldwin Director, Systems Analysis DDR&E/Systems Engineering 12th Annual NDIA Systems Engineering Conference 28 October 2009 10/28/09 Page-1 Defense Research & Engineering
Cybersecurity is one of the most important challenges for our military today. Cyberspace. Cybersecurity. Defending the New Battlefield
Cybersecurity Defending the New Battlefield Steven J. Hutchison, Ph.D. Cybersecurity is one of the most important challenges for our military today. Cyberspace is a new warfighting domain, joining the
HHS Information System Security Controls Catalog V 1.0
Information System Security s Catalog V 1.0 Table of Contents DOCUMENT HISTORY... 3 1. Purpose... 4 2. Security s Scope... 4 3. Security s Compliance... 4 4. Security s Catalog Ownership... 4 5. Security
Cloud Security for Federal Agencies
Experience the commitment ISSUE BRIEF Rev. April 2014 Cloud Security for Federal Agencies This paper helps federal agency executives evaluate security and privacy features when choosing a cloud service
OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700
OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700 OPERATIONAL TEST AND EVALUATION AUG 0 1 2014 MEMORANDUM FOR COMMANDER, ARMY TEST AND EVALUATION COMMAND COMMANDER, AIR
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-510 GENERAL (Office of Origin: IRM/IA) 5 FAH-11 H-511 INTRODUCTION 5 FAH-11 H-511.1 Purpose a. This subchapter implements the policy
Security Controls Assessment for Federal Information Systems
Security Controls Assessment for Federal Information Systems Census Software Process Improvement Program September 11, 2008 Kevin Stine Computer Security Division National Institute of Standards and Technology
CTR System Report - 2008 FISMA
CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control
Building Security In:
#CACyberSS2015 Building Security In: Intelligent Security Design, Development and Acquisition Steve Caimi Industry Solutions Specialist, US Public Sector Cybersecurity September 2015 A Little About Me
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems Samuel R. Ashmore Margarita Castillo Barry Gavrich CS589 Information & Risk Management New Mexico Tech Spring 2007
An Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
Risk Management Framework (RMF): The Future of DoD Cyber Security is Here
Risk Management Framework (RMF): The Future of DoD Cyber Security is Here Authors: Rebecca Onuskanich William Peterson 3300 N Fairfax Drive, Suite 308 Arlington, VA 22201 Phone: 571-481-9300 Fax: 202-315-3003
CMS POLICY FOR THE INFORMATION SECURITY PROGRAM
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS POLICY FOR THE INFORMATION SECURITY PROGRAM FINAL Version 4.0 August 31, 2010 Document Number: CMS-CIO-POL-SEC02-04.0
Guidelines for Cybersecurity DT&E v1.0
Guidelines for Cybersecurity DT&E v1.0 1. Purpose. These guidelines provide the means for DASD(DT&E) staff specialists to engage and assist acquisition program Chief Developmental Testers and Lead DT&E
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
Security Compliance In a Post-ACA World
1 Security Compliance In a Post-ACA World Security Compliance in a Post-ACA World Discussion of building a security compliance framework as part of an ACA Health Insurance Exchange implementation. Further
EPA Classification No.: CIO-2150.3-P-04.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM SECURITY ASSESSMENT AND AUTHORIZATION PROCEDURES V2 JULY 16, 2012 1. PURPOSE The
DoD Software Assurance (SwA) Overview
DoD Software Assurance (SwA) Overview Tom Hurt Office of the Deputy Assistant Secretary of Defense for Systems Engineering NDIA Program Protection Summit / Workshop McLean, VA May 19, 2014 May 19, 2014
U.S. FLEET CYBER COMMAND U.S. TENTH FLEET DoD RMF Transition
U.S. FLEET CYBER COMMAND U.S. TENTH FLEET DoD RMF Transition Dr. Charles Kiriakou, Ms. Kate Cunningham, Mr. Kevin Winters, & Mr. Carl Rice September 3, 2014 UNCLASSIFIED 1 Bottom Line Up Front (BLUF) The
Information Security for Managers
Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize
Out with. AP, In. with. (C&A) and (RMF) LUNARLINE, INC.. 571-481-9300
Out with the DIACA AP, In with the DIARMF Say Goodbye to Certificatio n and Accreditation (C&A) and Hello to the Risk Management Framework (RMF) Author: Rebecca Onuskanich Program Manager, Lunarline LUNARLINE,
Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview
Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve
Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples The
DIACAP Presentation. Presented by: Dennis Bailey. Date: July, 2007
DIACAP Presentation Presented by: Dennis Bailey Date: July, 2007 Government C&A Models NIST SP 800-37 - Guide for the Security Certification and Accreditation of Federal Information Systems NIACAP - National
Overview. FedRAMP CONOPS
Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.2 9/28/11 INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A) I. PURPOSE This directive
ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT
INTERNATIONAL CIVIL AVIATION ORGANIZATION ASIA AND PACIFIC OFFICE ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT DRAFT Second Edition June 2010 3.4H - 1 TABLE OF CONTENTS 1.
Review of the SEC s Systems Certification and Accreditation Process
Review of the SEC s Systems Certification and Accreditation Process March 27, 2013 Page i Should you have any questions regarding this report, please do not hesitate to contact me. We appreciate the courtesy
Information System Security Officer (ISSO) Guide
Information System Security Officer (ISSO) Guide Office of the Chief Information Security Officer Version 10 September 16, 2013 DEPARTMENT OF HOMELAND SECURITY Document Change History INFORMATION SYSTEM
How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives
How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives DON IT Conference // AFCEA West 2015 Presented by: RDML John Ailes Chief Engineer SPAWAR
Selecting RMF Controls for National Security Systems
SANDIA REPORT SAND2015-6770 Unlimited Release Printed August 2015 Selecting RMF Controls for National Security Systems Edward L. Witzke Prepared by Sandia National Laboratories Albuquerque, New Mexico
Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System
Department of Defense INSTRUCTION NUMBER 8580.1 July 9, 2004 SUBJECT: Information Assurance (IA) in the Defense Acquisition System ASD(NII) References: (a) Chapter 25 of title 40, United States Code (b)
Security Language for IT Acquisition Efforts CIO-IT Security-09-48
Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Office of the Senior Agency Information Security Officer VERSION HISTORY/CHANGE RECORD Change Number Person Posting Change Change Reason
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
BPA Policy 434-1 Cyber Security Program
B O N N E V I L L E P O W E R A D M I N I S T R A T I O N BPA Policy Table of Contents.1 Purpose & Background...2.2 Policy Owner... 2.3 Applicability... 2.4 Terms & Definitions... 2.5 Policy... 5.6 Policy
Implementing Program Protection and Cybersecurity
Implementing Program Protection and Cybersecurity Melinda Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering Mark Godino Office of the Deputy Assistant Secretary of Defense
CMS SYSTEM SECURITY PLAN (SSP) PROCEDURE
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS SYSTEM SECURITY PLAN (SSP) PROCEDURE August 31, 2010 Version 1.1 - FINAL Summary of Changes in SSP
Minimum Security Requirements for Federal Information and Information Systems
FIPS PUB 200 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Minimum Security Requirements for Federal Information and Information Systems Computer Security Division Information Technology Laboratory
Enterprise Audit Management Instruction for National Security Systems (NSS)
UNCLASSIFIED September 2013 Enterprise Audit Management Instruction for National Security Systems (NSS) THIS DOCUMENT PRESCRIBES STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION UNCLASSIFIED
COORDINATION DRAFT. FISCAM to NIST Special Publication 800-53 Revision 4. Title / Description (Critical Element)
FISCAM FISCAM 3.1 Security (SM) Critical Element SM-1: Establish a SM-1.1.1 The security management program is adequately An agency/entitywide security management program has been developed, An agency/entitywide
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
Security Control Standard
Department of the Interior Security Control Standard Risk Assessment January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information
SECURITY CONTROLS AND RISK MANAGEMENT FRAMEWORK
SECURITY CONTROLS AND RISK MANAGEMENT FRAMEWORK BACKGROUND The National Institute of Standards and Technology (NIST) Special Publication 800-53 defines a comprehensive set of controls that is the basis
Security Authorization Process Guide
Security Authorization Process Guide Office of the Chief Information Security Officer (CISO) Version 11.1 March 16, 2015 TABLE OF CONTENTS Introduction... 1 1.1 Background... 1 1.2 Purpose... 2 1.3 Scope...
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
System Security Engineering and Program Protection Integration into SE
System Security Engineering and Program Protection Integration into SE Melinda Reed Deputy Director for Program Protection Office of the Deputy Assistant Secretary of Defense for Systems Engineering 17
Understanding HITRUST s Approach to Risk vs. Compliance-based Information Protection
Understanding Compliance vs. Risk-based Information Protection 1 Understanding HITRUST s Approach to Risk vs. Compliance-based Information Protection Why risk analysis is crucial to HIPAA compliance and
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK 6500.5 INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE
DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK 6500.5 Washington, DC 20420 Transmittal Sheet March 22, 2010 INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE 1. REASON FOR ISSUE: This
Trusted Systems and Networks (TSN) Analysis
Trusted Systems and Networks (TSN) Analysis JUNE 2014 Deputy Assistant Secretary of Defense for Systems Engineering and Department of Defense Chief Information Officer Washington, D.C. Deputy Assistant
RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW. Version 1, Release 8. 24 July 2015
RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 8 24 July 2015 Developed by Red Hat, NSA, and for the DoD Trademark Information Names, products, and
Information System Security Officer (ISSO) Guide
Information System Security Officer (ISSO) Guide Information Security Office Version 8.0 June 06, 2011 DEPARTMENT OF HOMELAND SECURITY Document Change History INFORMATION SYSTEM SECURITY OFFICER (ISSO)
Industrial Security Field Operations
Defense Security Service Industrial Security Field Operations NISP Authorization Office (NAO) (Formerly Office of the Designated Approving Authority) NISPOM to NIST (800-53r4) Security Control Mapping
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014 Revision History Update this table every time a new edition of the document is published Date Authored
PLATFORM IT GUIDANCE
PLATFORM IT GUIDANCE 1. Introduction 1.1 Purpose and Scope Acquisition guidance detailed in references (a) through (c) states that Major Defense Acquisition Programs (MDAP) and Major Automated Information
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive
Compliance Risk Management IT Governance Assurance
Compliance Risk Management IT Governance Assurance Solutions That Matter Introduction to Federal Information Security Management Act (FISMA) Without proper safeguards, federal agencies computer systems
Policy on Information Assurance Risk Management for National Security Systems
CNSSP No. 22 January 2012 Policy on Information Assurance Risk Management for National Security Systems THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.39 May 28, 2015 USD(I)/USD(AT&L) SUBJECT: Critical Program Information (CPI) Identification and Protection Within Research, Development, Test, and Evaluation
Compliance Overview: FISMA / NIST SP800 53
Compliance Overview: FISMA / NIST SP800 53 FISMA / NIST SP800 53: Compliance Overview With Huntsman SIEM The US Federal Information Security Management Act (FISMA) is now a key element of the US Government
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
ICT Supply Chain Risk Management
ICT Supply Chain Risk Management Celia Paulsen Computer Security Division IT Laboratory Manager s Forum June 4, 2013 General Problem Definition Scope of Supplier Expansion and Foreign Involvement graphic
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8551.01 May 28, 2014 DoD CIO SUBJECT: Ports, Protocols, and Services Management (PPSM) References: See Enclosure 1 1. PURPOSE. In accordance with the authority
System Security Engineering and Comprehensive Program Protection
System Security Engineering and Comprehensive Program Protection Melinda Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering 16th Annual NDIA Systems Engineering Conference
Security Self-Assessment Tool
Security Self-Assessment Tool State Agencies Receiving FPLS Information, 7/15/2015 Contents Overview... 2 Access Control (AC)... 3 Awareness and Training (AT)... 8 Audit and Accountability (AU)... 10 Security
Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance
WHITE paper Complying with the Federal Information Security Management Act How Tripwire Change Auditing Solutions Help page 2 page 3 page 3 page 3 page 4 page 4 page 5 page 5 page 6 page 6 page 7 Introduction
Altius IT Policy Collection Compliance and Standards Matrix
Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy
Deriving Software Security Measures from Information Security Standards of Practice
Deriving Software Measures from Standards of Practice Julia Allen Christopher Alberts Robert Stoddard February 2012 2012 Carnegie Mellon University Copyright 2012 Carnegie Mellon University. This material
Guideline for Mapping Types of Information and Information Systems to Security Categorization Levels SP 800-60 AP-2/03-1
Guideline for Mapping Types of Information and Information Systems to Security Categorization Levels SP 800-60 FISMA Legislation Overview (Public Law 107-347) Framework for ensuring effectiveness of Federal
CRR-NIST CSF Crosswalk 1
IDENTIFY (ID) Asset Management (AM): The data, personnel, devices, systems, and facilities that enable the organization to achieve business purposes are identified and managed consistent with their relative
NOTICE: This publication is available at: http://www.nws.noaa.gov/directives/.
Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE Instruction 60-701 28 May 2012 Information Technology IT Security Assignment of Responsibilities
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat
Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat Centers for Disease and Prevention National Center for Chronic Disease Prevention and Health
SECURITY CATEGORIZATION AND CONTROL SELECTION FOR NATIONAL SECURITY SYSTEMS
1 CNSSI No. 1253 15 March 2012 SECURITY CATEGORIZATION AND CONTROL SELECTION FOR NATIONAL SECURITY SYSTEMS Version 2 THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER
Automate Risk Management Framework
Automate Risk Management Framework Providing Dynamic Continuous Monitoring, Operationalizing Cybersecurity and Accountability for People, Process and Technology Computer Network Assurance Corporation (CNA)
SYSTEMS SECURITY ENGINEERING
SYSTEMS SECURITY ENGINEERING Mission Statement Integrating Security into Every Solution We Deliver Reducing Risk and Providing Fully Reliable and Trusted Solutions Utilizing Best Practices and Rigorous
DEPARTMENT OF DEFENSE (DoD) CLOUD COMPUTING SECURITY REQUIREMENTS GUIDE (SRG) Version 1, Release 1. 12 January 2015
DEPARTMENT OF DEFENSE (DoD) CLOUD COMPUTING SECURITY REQUIREMENTS GUIDE (SRG) Version 1, Release 1 12 January 2015 Developed by the Defense Information Systems Agency (DISA) for the Department of Defense
Security Certification & Accreditation of Federal Information Systems A Tutorial
29 Jun 2009 Security Certification & Accreditation of Federal Information Systems A Tutorial An Introduction to NIST s 800-37 Dr. Vijay Madisetti Professor, Georgia Tech - ECE [email protected] Tutorial Outline
Continuous Monitoring in a Risk Management Framework. US Census Bureau Oct 2012
Monitoring in a Risk Management Framework US Census Bureau Oct 2012 Agenda Drivers for Monitoring What is Monitoring Monitoring in a Risk Management Framework (RMF) RMF Cost Efficiencies RMF Lessons Learned
