ACSAC NOAA/NESDIS Case Study. December, 2006



Similar documents
U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS. Final Audit Report

NOTICE: This publication is available at:

EPA Classification No.: CIO P-04.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: Review Date: 08/06/2015

2012 FISMA Executive Summary Report

Audit of the Board s Information Security Program

Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013

United States Patent and Trademark Office

Lots of Updates! Where do we start?

Fiscal Year 2007 Federal Information Security Management Act Report

Information Security for Managers

Final Audit Report -- CAUTION --

UNITED STATES COMMISSION ON CIVIL RIGHTS. Fiscal Year 2012 Federal Information Security Management Act Evaluation

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

Cybersecurity Risk Management Activities Instructions Fiscal Year 2015

POSTAL REGULATORY COMMISSION

SMITHSONIAN INSTITUTION

Final Audit Report. Report No. 4A-CI-OO

International Trade Administration

Compliance Risk Management IT Governance Assurance

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12

UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)

How To Review The Security Plans Of Noaa

Review of the SEC s Systems Certification and Accreditation Process

Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program

2014 Audit of the Board s Information Security Program

Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

NARA s Information Security Program. OIG Audit Report No October 27, 2014

NOTICE: This publication is available at:

OFFICE OF INSPECTOR GENERAL

Security Language for IT Acquisition Efforts CIO-IT Security-09-48

IG ISCM MATURITY MODEL FOR FY 2015 FISMA FOR OFFICIAL USE ONLY

FedRAMP Online Training Security Assessment Plan (SAP) Overview 12/9/2015 Presented by: FedRAMP PMO

DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE

Audit of the Department of State Information Security Program

OFFICIAL USE ONLY. Department of Energy. DATE: January 31, 2007 Audit Report Number: OAS-L-07-06

CMS INFORMATION SECURITY ASSESSMENT PROCEDURE

Cyber Security Assessment & Management (CSAM) CSAM C&A web

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

5 FAM 1060 INFORMATION ASSURANCE MANAGEMENT

Office of Inspector General Corporation for National and Community Service

Federal Risk and Authorization Management Program (FedRAMP)

NUMBER OF MATERIAL WEAKNESSES

FedRAMP Government Discussion Matt Goodrich, FedRAMP Director

MEMORANDUM FOR HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES

CMS SYSTEM SECURITY PLAN (SSP) PROCEDURE

How To Audit The National Security System

Federal Information Security Management Act

How To Check If Nasa Can Protect Itself From Hackers

5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

Plan of Action and Milestones (POA&M) Training Session

BPA Policy Cyber Security Program

In Brief. Smithsonian Institution Office of the Inspector General

FSIS DIRECTIVE

Automate Risk Management Framework

Department of Homeland Security

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

Office of Inspector General

Overview. FedRAMP CONOPS

Department of Veterans Affairs VA Handbook Information Security Program

United States Department of Agriculture. Office of Inspector General

Standard Operating Procedure

Office of Inspector General

NASA Information Technology Requirement

Office of the Assistant Secretary for Administration and Management Washington, D.C ELLIOT P. LEWIS Assistant Inspector General for Audit

U.S CONSUMER PRODUCT SAFTEY COMMISION OFFICE OF THE INSPECTOR GENERAL. Issued: June 4, 2012

Security Control Standard

INFORMATION SECURITY. Evaluation of GAO s Program and Practices for Fiscal Year 2012 OIG-13-2

STATEMENT BY JOHNNIE E. FRAZIER INSPECTOR GENERAL U.S. DEPARTMENT OF COMMERCE

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

Security Authorization Process Guide

In Brief. Smithsonian Institution Office of the Inspector General. Smithsonian Institution Information Security Program

Final Audit Report FEDERAL INFORMATION SECURITY MANAGEMENT ACT AUDIT FY Report No. 4A-CI Date:

AODR Role-Based Training. Name Title Division Name U.S. Department of Energy Office of the Associate CIO for Cyber Security

REPORT ON FY 2006 FISMA AUDIT OF THE SMITHSONIAN INSTITUTION S INFORMATION SECURITY PROGRAM

U.S. DEPARTMENT OF THE INTERIOR OFFICE OF INSPECTOR GENERAL Verification of Previous Office of Inspector General Recommendations September 2009

Final Audit Report FEDERAL INFORMATION SECURITY MANAGEMENT ACT AUDIT FY Report No. 4A-CI

Appendix 10 IT Security Implementation Guide. For. Information Management and Communication Support (IMCS)

FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance

Agency Security - What Are the Advantages and Disadvantages

Information System Security Officer (ISSO) Guide

The Intersection of Internal Controls and Cyber Security

How To Improve Nasa'S Security

CMS INFORMATION SECURITY (IS) CERTIFICATION & ACCREDITATION (C&A) PACKAGE GUIDE

REVIEW OF MEDICARE CONTRACTOR INFORMATION SECURITY PROGRAM EVALUATIONS FOR FISCAL YEAR 2013

FedRAMP Standard Contract Language

SECURITY CONTROLS AND RISK MANAGEMENT FRAMEWORK

INSPECTION U.S. DEPARTMENT OF THE INTERIOR WEB HOSTING SERVICES

The U.S. Department of Education s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2014 FINAL AUDIT REPORT

Get Confidence in Mission Security with IV&V Information Assurance

UCI FISMA Core Program Procedures & Processes Frequently Asked Questions (FAQs)

AR Office of Inspector General. Independent Evaluation

OFFICE OF INSPECTOR GENERAL

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report

Office of the Secretary

IBM Internet Security Systems October FISMA Compliance A Holistic Approach to FISMA and Information Security

VA Office of Inspector General

Transcription:

ACSAC NOAA/NESDIS Case Study December, 2006

History in Brief FISMA enacted in 2002 IG testimony to Congress June 2003 cited 6 OMB weaknesses and DOC response. OMB issues reporting guidance and template in August, 2004, Report due October, 2004

OMB 2004 report to congress on Implementation of FISMA March 2005, Initial FISMA report to Congress DOC IG report: Quality of C&A process Poor

U.S. DOC OIG Top Ten Management Challenges, March 2005 Departmental Material Weakness in Performance and Accountability Report for previous 4 years. OIG concluded that there were problems with conduct of Assessing risk, identifying the system components, and testing security controls. CIO issued a plan to correct the material weakness including establishing repeatable processes that produce acceptable packages.

OMB 2005 report to congress on Implementation of FISMA Again Cites DOC IG report: Quality of C&A process Poor

U.S. DOC OIG Top Ten Management Challenges, Sept 2005 NOAA had significantly improved risk assessments, security plans, and testing. OIG concluded that the C&A process did not provide adequate vulnerability data to the AO at time of decision.

US DOC OIG Top Ten Management Challenges, March 2006 Sept 2005 Findings Presented to December 2005 CIO Meeting.

OMB 2006 report to congress on Implementation of FISMA Cites DOC IG report: Quality of C&A process Showed significant improvements NOAA had significantly improved risk assessments, security plans, and testing. OIG concluded that the C&A process still did not provide adequate vulnerability data to the AO at time of decision.

Summation of Status Security was a significant problem through 2004. Processes put into place by the CIO to correct the deficiencies. Processes need improvement in identified areas. OIG September 2006 report not yet released to public.

NOAA/NESDIS Processes are in-place and improving Management support excellent at higher levels Program is still expensive and complex.

Processes are in place Standardized schedule for C&A Templates and guidelines for C&A package updated for SP 800-53 Controls Risk Assessment to include vulnerability and control testing results Testing Updated to SP 800-53A

Standardized Schedule for C&A Addresses events from initial meeting to signing of the approval. Has undergone significant upgrade over two years of experience Incorporates QA reviews, management reviews Portrays a 9 month Legacy process assuming everyone delivers on schedule

Templates and Guidelines for C&A package SSP (Template and Guide) System Topology (Guidance in SSP Guide) MOU/A or ISA (Template) Risk Assessment Report (Process, Template, Guide) Test Reports (Plan, Template) Contingency Plan (Template) Contingency Test Report (Template) Certification Validation Test (Template) Security Assessment Report (Template)

Risk Assessment Multiple Pass Process defined. Facilitate Risk Assessment Scan Vulnerabilities Internal ST&E (Penetration Testing) POA&M Maintained

Testing Internal Control Testing (ST&E) NIST SP 800-53A Every Variant tested Vulnerability scans Harris STAT tool Nesses Certification Validation Testing (CVT) Independent Control Verification Vulnerability Scanning Inventory Verification Report Template

Key Constraints Strict Conformance to NIST guidelines Inventory, topology and scans must totally match System descriptions must explain each component in logical sequence. Full FIPS 199 Information analysis Personal Information Assessment

Submission Security Assessment Report to AO Every vulnerability must have risk assessment and POA&M Summarizes package. Template

Conclusion NOAA/NESDIS has significantly improved the process under FISMA by using NIST SP guidance and DOC OIG comments to improve the process.