IT Security Management Risk Analysis and Controls
|
|
|
- Robert Russell
- 10 years ago
- Views:
Transcription
1 IT Security Management Risk Analysis and Controls Steven Gordon Document No: Revision December Introduction This document summarises several steps of an IT security risk analysis and subsequent implementation of security controls. Most of the material is based on the following sources: Stallings and Brown, Computer Security: Principles and Practice, 2nd Edition, Pearson Education, Specifically chapters 14 and 15. NIST, Standards for Security Categorization of Federal Information and Information Systems, FIPS PUB 199, February NIST, Guidelines for Conducting Risk Assessments, Special Publication Revision 1, September NIST, Security and Privacy Controls for Federal Information Systems and Organizations, Special Publication , Revision 4, April The above sources (as well as the other standards that they refer to) describe detailed methodologies for IT security risk analysis and implementing security controls. This document selects parts from these methodologies that are suitable for performing a simplified risk analysis for IT security students. Most of the figures, tables and text are copied directly from the original NIST standards (which as US Government works, are in the public domain). 2 IT Security Management Figure 1, taken from Stallings and Brown, presents an overview of IT security management. From the top, an IT security policy and aspects of the organisation are initial inputs to a risk analysis. The risk analysis can be performed in several ways: baseline, informal, formal, or combined. From the risk analysis a set of security controls should 1
2 2 Thammasat University Figure 1: An Overview of IT Security Management [Figure 14.1 from Stallings and Brown] be selected for the organisation and a plan and procedure for implementing the controls prepared. The selected controls are implemented, employees made aware of the security issues and given appropriate training. There are several follow-up steps which may lead to further risk analysis and implementation changes. This document focusses on three parts: 1. The inputs to the risk analysis, specifically a categorization of the information systems in an organisation based on their security objectives (Section 3). 2. The formal risk analysis (Section 4). 3. The security controls that are available for selection and implementation (Section 5). 3 Security Categorization NIST, in FIPS 199, present a method for categorizing information and information systems based on security objectives. The three security objectives defined are: 3 December 2013 (r770)
3 Sirindhorn International Institute of Technology 3 Confidentiality: Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. A loss of confidentiality is the unauthorized disclosure of information. Integrity: Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity. A loss of integrity is the unauthorized modification or destruction of information. Availability: Ensuring timely and reliable access to and use of information. A loss of availability is the disruption of access to or use of information or an information system. There are three levels of potential impact on organisations and individuals if a security breach occurs: Low: The loss of confidentiality, integrity, or availability could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. Moderate: The loss of confidentiality, integrity, or availability could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. High: The loss of confidentiality, integrity, or availability could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. A security category, SC, is applied for different information types, which assigns a potential impact to each of the objectives for that information type. The general format is: SC informationtype = {(confidentialty, impact), (integrity, impact), (availability, impact)} Examples of information types include: user data on a website, student records, financial records, personnel information. Examples of categorizations are given in FIPS 199. An information system may have multiple types of information. From the security categorization of the different information types, a security categorization of the information system can be specified: SC informationsystem = {(confidentialty, impact), (integrity, impact), (availability, impact)} The potential impact for the information system is the highest (maximum) value from the set of information types in the system for that objective. For example, consider a student management system that contains two information types with categorizations: SC grades = {(confidentialty, moderate), (integrity, high), (availability, low)} SC contactinfo = {(confidentialty, moderate), (integrity, low), (availability, low)} IT Security Management Risk Analysis and Controls
4 4 Thammasat University For the confidentiality objective, both impacts are moderate, giving the highest value of moderate. Hence the potential impact for the information system is moderate. For integrity, although one impact is low, the other is high, so the highest value, high, is the potential impact for the information system. SC studentsystem = {(confidentialty, moderate), (integrity, high), (availability, low)} Further examples are in FIPS Risk Analysis A simplified risk analysis consists of: 1. Identify assets that need protection. Assets include computer and communications hardware, software, data, documentation, and the people who manage these systems. 2. Identify threats and vulnerabilities. Threats come from particular sources. Table 1 classifies typical threat sources. Sources and threats may be adversarial (i.e. others trying to gain advantage from an attack) or non-adversarial (e.g. due to your own mistakes). A list of adversarial threat events (attacks), split across five tables (Tables 2 to 6), is given. Non-adversarial threat events are listed in Table Determine the likelihood of threat events occuring. The likelihood depends on many factors, but a simple view is to give each threat event a ranking from Very Low to Very High in terms of likelihood of it being initiated (see Tables 8 and 9), and then ranking the likelihood that if it occurs, it will have adverse impacts (see Table 10). From the likelihood of occurring and likelihood of having adverse impacts, an overall likelihood can be determined (see Tables 11). 4. Calculate the level of risk for each event. The overall likelihood from the previous step is used, as well as a rating (from Very Low to Very High) if the impact on the organisation if the threat event occurs. Table 12 lists examples of impacts, while Table 13 gives the rating levels for impact. The risk level can then be determined using Table 14. The risk levels are further described in Table 15. Once the risk analysis has been performed a security plan can be designed. The security plan should identify possible mechanisms that can be used to remove/minimize the risk from the set of threats. These mechanisms are referred to as security controls. Once the set of security controls are know, the threats should be ranked based upon the level of risk and the cost of implementing the controls. The ranking is used to determine which controls will be implemented. Ideally threats with highest risk will be addressed with security controls first, however the cost of implementing the controls must also be considered. Section 5 lists some of the security controls available. 3 December 2013 (r770)
5 Sirindhorn International Institute of Technology 5 Table 1: Taxonomy of Threat Sources [Table D2 from SP800-30] IT Security Management Risk Analysis and Controls
6 6 Thammasat University Table 2: Adversarial Threat Events a [Table E2 from SP800-30] 3 December 2013 (r770)
7 Sirindhorn International Institute of Technology 7 Table 3: Adversarial Threat Events b [Table E2 from SP800-30] IT Security Management Risk Analysis and Controls
8 8 Thammasat University Table 4: Adversarial Threat Events c [Table E2 from SP800-30] 3 December 2013 (r770)
9 Sirindhorn International Institute of Technology 9 Table 5: Adversarial Threat Events d [Table E2 from SP800-30] IT Security Management Risk Analysis and Controls
10 10 Thammasat University Table 6: Adversarial Threat Events e [Table E2 from SP800-30] 3 December 2013 (r770)
11 Sirindhorn International Institute of Technology 11 Table 7: Non-Adversarial Threat Events [Table E3 from SP800-30] Table 8: Likelihood of Threat Event Initiation [Table G2 from SP800-30] IT Security Management Risk Analysis and Controls
12 12 Thammasat University Table 9: Likelihood of Threat Event Occurrence [Table G3 from SP800-30] Table 10: Likelihood of Threat Event Resulting in Overall Impact [Table G4 from SP800-30] Table 11: Overall Likelihood [Table G5 from SP800-30] 3 December 2013 (r770)
13 Sirindhorn International Institute of Technology 13 Table 12: Examples of Adverse Impacts [Table H2 from SP800-30] IT Security Management Risk Analysis and Controls
14 14 Thammasat University Table 13: Impact of Threat Events [Table H3 from SP800-30] Table 14: Level of Risk [Table I2 from SP800-30] Table 15: Description of Levels of Risk [Table I3 from SP800-30] 3 December 2013 (r770)
15 Sirindhorn International Institute of Technology 15 5 Security Controls From SP (page 1): Security controls are the safeguards/countermeasures prescribed for information systems or organizations that are designed to: (i) protect the confidentiality, integrity, and availability of information that is processed, stored, and transmitted by those systems/organizations; and (ii) satisfy a set of defined security requirements. A risk analysis identifies areas that need fixing and should select suitable controls to address the problems. In SP NIST list a set of security controls classified into 18 families as shown in Table 16. The controls in each family are summarised in Appendix D of SP800-53, and then further demcomposed into the specific controls. Appendix F of SP provides a catalog of the controls, covering about 300 pages. The approach is an organisation should choose from the controls in the catalog; guidance is given as to which controls are more appropriate depending on the level of protection required (low, moderate, high). Consult Appendix D and Appendix F of SP for the details ID Family ID Family AC Access Control MP Media Protection AT Awareness and Training PE Physical and Environmental Protection AU Audit and Accountability PL Planning CA Security Assessment and Authorization PS Personnel Security CM Configuration Management RA Risk Assessment CP Contingency Planning SA System and Services Acquisition IA Identification and Authentication SC System and Communications Protection IR Incident Response SI System and Information Integrity MA Maintenance PM Program Management Table 16: Security Control Identifiers and Family Values [Table 1 from SP800-53] 6 Documenting Risks and Controls The results of a risk analysis should be documented, e.g. in a risk register. A plan for selecting and implementing security controls should also be developed, e.g. a security implementation plan. Table 14.5 from Stallings and Brown gives an example risk register with the following fields: Asset: name or description of the item/information that is of value to the organisation Threat/Vulnerability: description of the threat/vulnerability of the asset, examples are in Tables 2 to 7. Existing Controls: security controls that are currently used (Section 5). Likelihood: A rating from Very Low, Low, Moderate, High, Very High of the overall likelihood of the threat. This is determined by first determining the likelihood of occurrence (Tables 8 and 9), then the level of impact (Table 10), and finally looking up Table 11. IT Security Management Risk Analysis and Controls
16 16 Thammasat University Consequence: A rating from Very Low, Low, Moderate, High, Very High of the impact on the organisation if the threat event occurs. See Table 13. Level of Risk: A rating from Very Low, Low, Moderate, High, Very High of the level of risk, determine using the likelihood and consequence using Table 14. Risk Priority: A ranking of the risk (integer) that considers both the risk level and the cost of treatment. Table 15.4 from Stallings and Brown gives an example implementation plan with the following fields: Risk: Name/description of the asset and threat Level of Risk: From the risk register Recommended Controls: A set of security controls that ideally would be used to reduce the risk Priority: From the risk register Selected Controls: A set of security controls selected to reduce the risk. The selection of the recommended controls needs to take into account the cost of implementing the controls and the benefit they bring. Required Resources: The resources (personnel, time, financial, equipment) required to implement the selected controls. Responsible Persons: List of people responsible for this risk item. Start to End Date: Dates for when the controls will be implemented. 3 December 2013 (r770)
Get Confidence in Mission Security with IV&V Information Assurance
Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving
Security Compliance In a Post-ACA World
1 Security Compliance In a Post-ACA World Security Compliance in a Post-ACA World Discussion of building a security compliance framework as part of an ACA Health Insurance Exchange implementation. Further
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
CTR System Report - 2008 FISMA
CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control
HHS Information System Security Controls Catalog V 1.0
Information System Security s Catalog V 1.0 Table of Contents DOCUMENT HISTORY... 3 1. Purpose... 4 2. Security s Scope... 4 3. Security s Compliance... 4 4. Security s Catalog Ownership... 4 5. Security
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems Samuel R. Ashmore Margarita Castillo Barry Gavrich CS589 Information & Risk Management New Mexico Tech Spring 2007
System Security Certification and Accreditation (C&A) Framework
System Security Certification and Accreditation (C&A) Framework Dave Dickinson, IOAT ISSO Chris Tillison, RPMS ISSO Indian Health Service 5300 Homestead Road, NE Albuquerque, NM 87110 (505) 248-4500 fax:
Security Controls Assessment for Federal Information Systems
Security Controls Assessment for Federal Information Systems Census Software Process Improvement Program September 11, 2008 Kevin Stine Computer Security Division National Institute of Standards and Technology
Altius IT Policy Collection Compliance and Standards Matrix
Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy
Minimum Security Requirements for Federal Information and Information Systems
FIPS PUB 200 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Minimum Security Requirements for Federal Information and Information Systems Computer Security Division Information Technology Laboratory
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-510 GENERAL (Office of Origin: IRM/IA) 5 FAH-11 H-511 INTRODUCTION 5 FAH-11 H-511.1 Purpose a. This subchapter implements the policy
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
Security Control Standard
Department of the Interior Security Control Standard Risk Assessment January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information
Security and Privacy Controls for Federal Information Systems and Organizations
NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems JOINT TASK FORCE TRANSFORMATION INITIATIVE This document contains excerpts from NIST Special Publication
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
Standards for Security Categorization of Federal Information and Information Systems
FIPS PUB 199 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Standards for Security Categorization of Federal Information and Information Systems Computer Security Division Information Technology
COORDINATION DRAFT. FISCAM to NIST Special Publication 800-53 Revision 4. Title / Description (Critical Element)
FISCAM FISCAM 3.1 Security (SM) Critical Element SM-1: Establish a SM-1.1.1 The security management program is adequately An agency/entitywide security management program has been developed, An agency/entitywide
CMS POLICY FOR THE INFORMATION SECURITY PROGRAM
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS POLICY FOR THE INFORMATION SECURITY PROGRAM FINAL Version 4.0 August 31, 2010 Document Number: CMS-CIO-POL-SEC02-04.0
ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT
INTERNATIONAL CIVIL AVIATION ORGANIZATION ASIA AND PACIFIC OFFICE ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT DRAFT Second Edition June 2010 3.4H - 1 TABLE OF CONTENTS 1.
Requirements For Computer Security
Requirements For Computer Security FTA/IRS Safeguards Symposium & FTA/IRS Computer Security Conference April 2, 2008 St. Louis 1 Agenda Security Framework Safeguards IT Security Review Process Preparing
Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper
Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &
Security Control Standards Catalog
Security Control Standards Catalog Version 1.2 Texas Department of Information Resources April 3, 2015 Contents About the Security Control Standards Catalog... 1 Document Life Cycle... 1 Revision History...
AF Life Cycle Management Center
AF Life Cycle Management Center Avionics Weapon Systems Cybersecurity Risk Management Framework Assessment & Authorization Update Harrell Van Norman AFLCMC/EZAS Cybersecurity Technical Expert [email protected]
Information Security for Managers
Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize
Selecting RMF Controls for National Security Systems
SANDIA REPORT SAND2015-6770 Unlimited Release Printed August 2015 Selecting RMF Controls for National Security Systems Edward L. Witzke Prepared by Sandia National Laboratories Albuquerque, New Mexico
Security Self-Assessment Tool
Security Self-Assessment Tool State Agencies Receiving FPLS Information, 7/15/2015 Contents Overview... 2 Access Control (AC)... 3 Awareness and Training (AT)... 8 Audit and Accountability (AU)... 10 Security
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014 Revision History Update this table every time a new edition of the document is published Date Authored
CMS SYSTEM SECURITY PLAN (SSP) PROCEDURE
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS SYSTEM SECURITY PLAN (SSP) PROCEDURE August 31, 2010 Version 1.1 - FINAL Summary of Changes in SSP
Security Control Standard
Department of the Interior Security Control Standard Maintenance January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information Officer
FISMA Implementation Project
FISMA Implementation Project The Associated Security Standards and Guidelines Dr. Ron Ross Computer Security Division Information Technology Laboratory 1 Today s Climate Highly interactive environment
Security Language for IT Acquisition Efforts CIO-IT Security-09-48
Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Office of the Senior Agency Information Security Officer VERSION HISTORY/CHANGE RECORD Change Number Person Posting Change Change Reason
Dr. Ron Ross National Institute of Standards and Technology
Managing Enterprise Risk in Today s World of Sophisticated Threats A Framework for Developing Broad-Based, Cost-Effective Information Security Programs Dr. Ron Ross National Institute of Standards and
A Taxonomy of Operational Cyber Security Risks
A Taxonomy of Operational Cyber Security Risks James J. Cebula Lisa R. Young December 2010 TECHNICAL NOTE CMU/SEI-2010-TN-028 CERT Program Unlimited distribution subject to the copyright. http://www.sei.cmu.edu
Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013
Audit Report The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013 A-14-13-13086 November 2013 MEMORANDUM Date: November 26,
Compliance Overview: FISMA / NIST SP800 53
Compliance Overview: FISMA / NIST SP800 53 FISMA / NIST SP800 53: Compliance Overview With Huntsman SIEM The US Federal Information Security Management Act (FISMA) is now a key element of the US Government
Bellingham Control System Cyber Security Case Study
Bellingham Control System Cyber Security Case Study Marshall Abrams Joe Weiss Presented at at 2007 Annual Computer Security Applications Conference Case Study Synopsis Examine actual control system cyber
CONTINUOUS MONITORING
CONTINUOUS MONITORING Monitoring Strategy Part 2 of 3 ABSTRACT This white paper is Part 2 in a three-part series of white papers on the sometimes daunting subject of continuous monitoring (CM) and how
CRR-NIST CSF Crosswalk 1
IDENTIFY (ID) Asset Management (AM): The data, personnel, devices, systems, and facilities that enable the organization to achieve business purposes are identified and managed consistent with their relative
Cloud Security for Federal Agencies
Experience the commitment ISSUE BRIEF Rev. April 2014 Cloud Security for Federal Agencies This paper helps federal agency executives evaluate security and privacy features when choosing a cloud service
DIVISION OF INFORMATION SECURITY (DIS)
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Information Systems Acquisitions, Development, and Maintenance v1.0 October 15, 2013 Revision History Update this table every time a new
Guideline for Mapping Types of Information and Information Systems to Security Categorization Levels SP 800-60 AP-2/03-1
Guideline for Mapping Types of Information and Information Systems to Security Categorization Levels SP 800-60 FISMA Legislation Overview (Public Law 107-347) Framework for ensuring effectiveness of Federal
Understanding HITRUST s Approach to Risk vs. Compliance-based Information Protection
Understanding Compliance vs. Risk-based Information Protection 1 Understanding HITRUST s Approach to Risk vs. Compliance-based Information Protection Why risk analysis is crucial to HIPAA compliance and
Cybersecurity Throughout DoD Acquisition
Cybersecurity Throughout DoD Acquisition Tim Denman Cybersecurity Performance Learning Director DAU Learning Capabilities Integration Center [email protected] [email protected] Cybersecurity
Introduction to Security
2 Introduction to Security : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 25 October 2013 its335y13s2l01, Steve/Courses/2013/s2/its335/lectures/intro.tex,
FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL
FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL Clifton Gunderson LLP s Independent Audit of the Federal Housing Finance Agency s Information Security Program - 2011 Audit Report: AUD-2011-002
SECURITY CATEGORIZATION AND CONTROL SELECTION FOR NATIONAL SECURITY SYSTEMS
1 CNSSI No. 1253 15 March 2012 SECURITY CATEGORIZATION AND CONTROL SELECTION FOR NATIONAL SECURITY SYSTEMS Version 2 THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER
Risk-Based Assessment and Scoping of IV&V Work Related to Information Assurance Presented by Joelle Spagnuolo-Loretta, Richard Brockway, John C.
Risk-Based Assessment and Scoping of IV&V Work Related to Information Assurance Presented by Joelle Spagnuolo-Loretta, Richard Brockway, John C. Burget September 14, 2014 1 Agenda Information Assurance
Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program
U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Information Technology Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program Report.
The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -
45 min Webinar: November 14th, 2014 The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - www.cunesoft.com Rainer Schwarz Cunesoft Holger Spalt ivigilance 2014 Cunesoft GmbH PART
Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance
WHITE paper Complying with the Federal Information Security Management Act How Tripwire Change Auditing Solutions Help page 2 page 3 page 3 page 3 page 4 page 4 page 5 page 5 page 6 page 6 page 7 Introduction
AUDITING TECHNIQUES TO ASSESS FRAUD RISKS IN ELECTRONIC HEALTH RECORDS
AUDITING TECHNIQUES TO ASSESS FRAUD RISKS IN ELECTRONIC HEALTH RECORDS OBJECTIVE Increase your IT vocab so that you can assess the risks related to your audits of EHRs and/or EHR related data AGENDA What
Industrial Security Field Operations
Defense Security Service Industrial Security Field Operations NISP Authorization Office (NAO) (Formerly Office of the Designated Approving Authority) NISPOM to NIST (800-53r4) Security Control Mapping
Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer
IPSWITCH FILE TRANSFER WHITE PAPER Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer www.ipswitchft.com Adherence to United States government security standards can be complex to plan
Compliance and Industry Regulations
Compliance and Industry Regulations Table of Contents Introduction...1 Executive Summary...1 General Federal Regulations and Oversight Agencies...1 Agency or Industry Specific Regulations...2 Hierarchy
COMMONWEALTH OF VIRGINIA
COMMONWEALTH OF VIRGINIA Information Technology Resource Management Information Security Standard Virginia Information Technologies Agency (VITA) Page i ITRM Publication Version Control ITRM Publication
VIRGINIA DEPARTMENT OF MOTOR VEHICLES IT SECURITY POLICY. Version 2.
VIRGINIA DEPARTMENT OF MOTOR VEHICLES IT SECURITY POLICY Version 2., 2012 Revision History Version Date Purpose of Revision 2.0 Base Document 2.1 07/23/2012 Draft 1 Given to ISO for Review 2.2 08/15/2012
Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat
Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat Centers for Disease and Prevention National Center for Chronic Disease Prevention and Health
Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview
Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve
NIST National Institute of Standards and Technology
NIST National Institute of Standards and Technology Lets look at SP800-30 Risk Management Guide for Information Technology Systems (September 2012) What follows are the NIST SP800-30 slides, which are
TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7
PART 2006 - MANAGEMENT Subpart Z - Information Systems Security TABLE OF CONTENTS Sec. 2006.1251 Purpose. 2006.1252 Policy. 2006.1253 Definitions. 2006.1254 Authority. (a) National. (b) Departmental. 2006.1255
INFORMATION TECHNOLOGY SECURITY POLICY 60-702. Table of Contents
Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE INSTRUCTION 60-702 December 21, 2009 Information Technology INFORMATION TECHNOLOGY
Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples The
NIST Special Publication 800-60 Version 2.0 Volume I: Guide for Mapping Types of Information and Information Systems to Security Categories
NIST Special Publication 800-60 Version 2.0 Volume I: Guide for Mapping Types of Information and Information Systems to Security Categories William C. Barker I N F O R M A T I O N S E C U R I T Y Computer
HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
WRITTEN INFORMATION SECURITY PROGRAM (WISP) ACME Consulting Services, Inc.
WRITTEN INFORMATION SECURITY PROGRAM (WISP) ACME Consulting Services, Inc. Copyright 2016 Table of Contents WRITTEN INFORMATION SECURITY PROGRAM (WISP) OVERVIEW 10 INTRODUCTION 10 PURPOSE 10 SCOPE & APPLICABILITY
Government of Canada Managed Security Services (GCMSS) Appendix D: Security Control Catalogue ITSG-33 - Annex 3 DRAFT 3.1
Government of Canada Managed Security Services (GCMSS) Appendix D: Security Control Catalogue ITSG-33 - Annex 3 DRAFT 3.1 Date: June 15, 2012 Information Technology Security Guidance Guide to Managing
Written Information Security Program (WISP)
Your Logo Will Be Placed Here Written Information Security Program (WISP) ACME Consulting, LLC Copyright 2014 Table of Contents WRITTEN INFORMATION SECURITY PROGRAM (WISP) OVERVIEW 10 INTRODUCTION 10 PURPOSE
FISMA NIST 800-53 (Rev 4) Audit and Accountability: Shared Public Cloud Infrastructure Standards
FISMA NIST 800-53 (Rev 4) Audit and Accountability: Shared Public Cloud Infrastructure Standards Standard Requirement per NIST 800-53 (Rev. 4) CloudCheckr Action AU-3/ AU3(1) AU-3 CONTENT OF AUDIT RECORDS
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is
INFORMATION TECHNOLOGY POLICY
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT OF PUBLIC WELFARE INFORMATION TECHNOLOGY POLICY Name Of : DPW Information Security and Privacy Policies Domain: Security Date Issued: 05/09/2011 Date Revised: 11/07/2013
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments
SECURELINK.COM COMPLIANCE AND INDUSTRY REGULATIONS
COMPLIANCE AND INDUSTRY REGULATIONS INTRODUCTION Multiple federal regulations exist today requiring government organizations to implement effective controls that ensure the security of their information
FISMA: Securing National Infrastructure
FISMA: Securing National Infrastructure Using a Holistic Approach to Lower Total Cost of Ownership (TCO) of FISMA Compliance by 50% or More an eiqnetworks White Paper by John Linkous Security and Compliance
Privacy Impact Assessment
For: Great Lakes Computer System (GLCS) Great Lakes Educational Loan Services, Inc. (GOALS) Date: June 18, 2013 Point of Contact: Gregory Plenty (202) 377-3253 [email protected] System Owner: Keith
EPA Classification No.: CIO-2150.3-P-09.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM MAINTENANCE PROCEDURES V1.8 JULY 18, 2012 1. PURPOSE The purpose of this procedure
UF Risk IT Assessment Guidelines
Who Should Read This All risk assessment participants should read this document, most importantly, unit administration and IT workers. A robust risk assessment includes evaluation by all sectors of an
Security Features in Password Manager
Security Features in Written by Einar Mykletun, Ph.D. security and compliance architect for research and development at Dell Introduction Information system security is a priority for every organization,
BUDGET LETTER 05-03 PEER-TO-PEER FILE SHARING 4841.1, 4841.2, EXECUTIVE ORDER S-16-04
BUDGET LETTER SUBJECT: PEER-TO-PEER FILE SHARING REFERENCES: STATE ADMINISTRATIVE MANUAL SECTIONS 4819.2, 4840.4, 4841.1, 4841.2, EXECUTIVE ORDER S-16-04 NUMBER: 05-03 DATE ISSUED: March 7, 2005 SUPERSEDES:
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
Understanding changes to the Trust Services Principles for SOC 2 reporting
Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Understanding changes to the Trust Services Principles for SOC 2 reporting
Federal Highway Administration (FHWA) Cybersecurity Program (CSP) Handbook
For Official Use Only Version 1 Federal Highway Administration (FHWA) Cybersecurity Program (CSP) Handbook OFFICE OF INFORMATION TECHNOLOGY SERVICES Information Technology Strategic Objective APRIL 2014
Managing Security and Privacy Risk in Healthcare Applications
Managing Security and Privacy Risk in Healthcare Applications 5 th Annual OCR / NIST HIPAA Security Rule Conference June 6, 2012 Dr. Ron Ross Computer Security Division Information Technology Laboratory
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
Security Certification & Accreditation of Federal Information Systems A Tutorial
29 Jun 2009 Security Certification & Accreditation of Federal Information Systems A Tutorial An Introduction to NIST s 800-37 Dr. Vijay Madisetti Professor, Georgia Tech - ECE [email protected] Tutorial Outline
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
John Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
Publication 4812. Contractor Security Controls
Publication 4812 Handling and Protecting Information or Information Systems ***This Publication Pertains to IT Assets Owned and Managed at Contractor Sites*** July 2014 Highlights of Publication 4812
DEPARTMENT OF DEFENSE (DoD) CLOUD COMPUTING SECURITY REQUIREMENTS GUIDE (SRG) Version 1, Release 1. 12 January 2015
DEPARTMENT OF DEFENSE (DoD) CLOUD COMPUTING SECURITY REQUIREMENTS GUIDE (SRG) Version 1, Release 1 12 January 2015 Developed by the Defense Information Systems Agency (DISA) for the Department of Defense
Enforcement of Health Information Privacy & Security Standards Federal Enforcement Through Recent Cases and Tools to Measure Regulatory Compliance
Enforcement of Health Information Privacy & Security Standards Federal Enforcement Through Recent Cases and Tools to Measure Regulatory Compliance Iliana Peters, JD, LLM, HHS Office for Civil Rights Kevin
A Draft List of Software Assurance (SwA) Related NIST SP 800-53 Revision 4 Controls*
!!!!!!!!!!!!! A Draft List of Software Assurance (SwA) Related NIST SP 800-53 Revision 4 Controls* Technical Report: UNO-TGRS-20131121-1 Robin Gandhi, Harvey Siy, Sayonnha Mandal The University of Nebraska
Publication 4812. Contractor Security Controls. ***This Publication Pertains to IT Assets Owned and Managed at Contractor Sites***
Information Technology CYBERSECURITY Publication 4812 Handling and Protecting Information or Information Systems ***This Publication Pertains to IT Assets Owned and Managed at Contractor Sites*** Publicationn
FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS
TABLE OF CONTENTS General Topics Purpose and Authorities Roles and Responsibilities Policy and Program Waiver Process Contact Abbreviated Sections/Questions 7.1 What is the purpose of this chapter? 7.2
Audit of the Department of State Information Security Program
UNITED STATES DEPARTMENT OF STATE AND THE BROADCASTING BOARD OF GOVERNORS OFFICE OF INSPECTOR GENERAL AUD-IT-15-17 Office of Audits October 2014 Audit of the Department of State Information Security Program
Security Control Standard
Department of the Interior Security Control Standard Security Assessment and Authorization January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,
NIST Special Publication (SP) 800-64, Revision 2, Security Considerations in the System Development Life Cycle
THE SYSTEM DEVELOPMENT LIFE CYCLE (SDLC) Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The most effective way to protect
