Security Controls Assessment for Federal Information Systems



Similar documents
Get Confidence in Mission Security with IV&V Information Assurance

NIST A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich

CTR System Report FISMA

System Security Certification and Accreditation (C&A) Framework

Security Control Standard

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE

Looking at the SANS 20 Critical Security Controls

IT Security Management Risk Analysis and Controls

HHS Information System Security Controls Catalog V 1.0

CMS POLICY FOR THE INFORMATION SECURITY PROGRAM

Security Compliance In a Post-ACA World

Security Control Standard

COORDINATION DRAFT. FISCAM to NIST Special Publication Revision 4. Title / Description (Critical Element)

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

Security Control Standard

Security and Privacy Controls for Federal Information Systems and Organizations

FREQUENTLY ASKED QUESTIONS

POSTAL REGULATORY COMMISSION

Minimum Security Requirements for Federal Information and Information Systems

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper

Information Security Guide For Government Executives. Pauline Bowen Elizabeth Chew Joan Hash

An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule

Reports on Computer Systems Technology

FISMA Implementation Project

Security Language for IT Acquisition Efforts CIO-IT Security-09-48

Requirements For Computer Security

Managing Security and Privacy Risk in Healthcare Applications

Security Self-Assessment Tool

CMS SYSTEM SECURITY PLAN (SSP) PROCEDURE

Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program

Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat

FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL

Review of the SEC s Systems Certification and Accreditation Process

Dr. Ron Ross National Institute of Standards and Technology

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance

Security Control Standard

Continuous Monitoring in a Risk Management Framework. US Census Bureau Oct 2012

CONTINUOUS MONITORING

White Paper. Understanding NIST FISMA Requirements

Compliance Risk Management IT Governance Assurance

NIST Special Publication (SP) , Revision 2, Security Considerations in the System Development Life Cycle

Altius IT Policy Collection Compliance and Standards Matrix

Government of Canada Managed Security Services (GCMSS) Appendix D: Security Control Catalogue ITSG-33 - Annex 3 DRAFT 3.1

Security Control Standards Catalog

Cloud Security for Federal Agencies

DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE

2012 FISMA Executive Summary Report

MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY

Selecting RMF Controls for National Security Systems

for Information Security

United States Patent and Trademark Office

Guide for Assessing the Security Controls in Federal Information Systems and Organizations

Cybersecurity Risk Management Activities Instructions Fiscal Year 2015

Information Security for Managers

Bellingham Control System Cyber Security Case Study

EPA Classification No.: CIO P-04.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: Review Date: 08/06/2015

FedRAMP Standard Contract Language

UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)

NISTIR 7359 Information Security Guide For Government Executives

From Chaos to Clarity: Embedding Security into the SDLC

Guide for Security-Focused Configuration Management of Information Systems

FISMA NIST (Rev 4) Shared Public Cloud Infrastructure Standards

ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT

FSIS DIRECTIVE

Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12

AF Life Cycle Management Center

FISMA: Securing National Infrastructure

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

Deriving Software Security Measures from Information Security Standards of Practice

Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

Understanding HITRUST s Approach to Risk vs. Compliance-based Information Protection

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

2014 Audit of the Board s Information Security Program

SECURITY CONTROLS AND RISK MANAGEMENT FRAMEWORK

Cyber Security Risk Management: A New and Holistic Approach

Security Authorization Process Guide

IBM Internet Security Systems October FISMA Compliance A Holistic Approach to FISMA and Information Security

Guide for the Security Certification and Accreditation of Federal Information Systems

SECURITY CATEGORIZATION AND CONTROL SELECTION FOR NATIONAL SECURITY SYSTEMS

FISMA NIST (Rev 4) Audit and Accountability: Shared Public Cloud Infrastructure Standards

Office of Inspector General Corporation for National and Community Service

Security Considerations in the System Development Life Cycle

Federal Highway Administration (FHWA) Cybersecurity Program (CSP) Handbook

Compliance Overview: FISMA / NIST SP800 53

In Brief. Smithsonian Institution Office of the Inspector General

Final Audit Report. Report No. 4A-CI-OO

Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

Transcription:

Security Controls Assessment for Federal Information Systems Census Software Process Improvement Program September 11, 2008 Kevin Stine Computer Security Division National Institute of Standards and Technology

Agenda Introduction to NIST NIST Risk Management Framework Security Control Assessment Basics Security Control Assessment Process Summary 2

National Institute of Standards and Technology NIST is a non-regulatory federal agency whose mission is To promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life 3

Computer Security Division A component within the Information Technology Lab (ITL) that provides standards and technology to protect information systems against threats to the confidentiality of information, the integrity of information and processes, and the availability of information and services in order to build trust and confidence in IT systems 4

NIST Publications Security Standards and Guidelines Federal Information Processing Standards (FIPS) Developed by NIST; Approved by Secretary of Commerce Compulsory and binding for all federal agencies; not waiverable Examples: FIPS 197, FIPS 199, FIPS 200, FIPS 201 Special Publications (SP; 800-series) Series of information security publications of general interest to the security community Examples: SP 800-18, SP 800-34, SP 800-53, SP 800-53A Other security-related publications NIST Interagency Reports (NISTIRs) describe research and provide technical information of interest to a specialized audience 5

OMB on the Use of NIST Publications* For non-national security programs and information systems, agencies must follow NIST standard and guidelines For FY 2007 and beyond, agencies are required to use FIPS 200/NIST Special Publication 800-53 for the specification of security controls and NIST Special Publications 800-37 and 800-53A for the assessment of security control effectiveness * OMB M-07-19, FY 2007 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management 6

NIST Risk Management Framework Architecture Description FEA Reference Models Segment and Solution Architectures Mission and Business Processes Information System Boundaries Repeat as necessary Step 6 MONITOR Security State SP 800-37 / 800-53A Step 5 AUTHORIZE Information Systems SP 800-37 Plan of Actions & Milestones ORGANIZATIONAL VIEW Risk Executive Function Starting Point Step 1 CATEGORIZE Information Systems FIPS 199 / SP 800-60 RISK MANAGEMENT FRAMEWORK Security Life Cycle Step 4 ASSESS Security Controls SP 800-53A Organizational Inputs Laws, Directives, Policy Guidance Strategic Goals and Objectives Priorities and Resource Availability Supply Chain Considerations Step 2 SELECT Security Controls FIPS 200 / SP 800-53 Security Plan Step 3 IMPLEMENT Security Controls SP 800-70 Security Assessment Report 7

Basics: What are Security Controls? The management, operational, and technical safeguards to protect the confidentiality, integrity, and availability of a system and its information. 8

Basics: Security Control Classes and Families Management CA Certification, Accreditation, and Security Assessments PL Planning RA Risk Assessment SA System and Services Acquisition Technical AC Access Control AU Audit and Accountability IA Identification and Authentication SC System and Communications Protection Operational AT Awareness and Training CM Configuration Management CP Contingency Planning IR Incident Response MA Maintenance MP Media Protection PE Physical and Environmental Protection PS Personnel Security SI System and Information Integrity 9

Basics: Security Control Baselines Minimum security controls recommended for an information system based on its impact level (Low, Moderate, High) CNTL NO. Control Name Control Baselines LOW MOD HIGH Access Control AC-1 Access Control Policy and Procedures AC-1 AC-1 AC-1 AC-2 Account Management AC-2 AC-2 (1) (2) (3) (4) AC-2 (1) (2) (3) (4) AC-3 Access Enforcement AC-3 AC-3 (1) AC-3 (1) AC-4 Information Flow Enforcement Not Selected AC-4 AC-4 AC-5 Separation of Duties Not Selected AC-5 AC-5 10

Basics: Security Control Assessments Principle vehicle used to verify that the implementers and operators of information systems are meeting their stated security goals and objectives Results of these assessments provide: Evidence about the effectiveness of security controls; An indication of the quality of the risk management processes employed within the organization; and Information about the strengths and weaknesses of information systems supporting federal missions and applications. 11

Basics: Assessments within the SDLC 12

Basics: Organization-wide Strategy for Assessments 13

Basics: Security Controls About Assessments CA-2 Security Assessments L, M, H The organization conducts an assessment of the security controls in the information system [Assignment: organization-defined frequency, at least annually] to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system. CA-4 Security Certification L, M, H The organization conducts an assessment of the security controls in the information system to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system. CA-7 Continuous Monitoring L, M, H The organization monitors the security controls in the information system on an ongoing basis. 14

Basics: Who Conducts Assessments? System evaluators, certification agents/team, auditors, inspectors general, information system owners, information security personnel Assessor Independence Identifies the degree to which the assessor is capable of conducting an impartial assessment of an information system. An independent assessment of a security control s effectiveness must be performed for FIPS 199 Moderate and High impact systems when the assessment is supporting the system security certification. 15

Basics: Assurance for Security Control Effectiveness Compile evidence that controls are Implemented correctly, Operating as intended, and Producing the desired outcome with respect to meeting the security requirements of the system Present this evidence in a manner decision makers are able to use to make informed, risk-based decisions The evidence to support assurance starts with the specification and implementation of the security controls, and is enhanced through the assessment of that implementation 16

Basics: Assessment Procedures A set of assessment objectives and an associated set of assessment methods and assessment objects. Assessment Objectives includes set of determination statements related to the security control under assessment Assessment Objects identify the specific items being assessed; Specifications document-based artifacts (e.g., policies, procedures, plans) Mechanisms hardware, software, or firmware safeguards (including physical protection devices) Activities action safeguards that involve people (e.g., monitoring network traffic, exercising a contingency plan) Individuals people applying the specifications, mechanisms, and activities 17

Basics: Assessment Procedures, cont Assessment Methods define nature of the assessor actions; Examine review, inspect, observe, study, analyze Interview conduct discussions with individuals/groups Test exercising one or more assessment objects under specified conditions to compare actual with expected results Method Attributes Depth rigor of and level of detail (generalized, focused, detailed) Coverage scope or breadth (representative, specific, comprehensive) 18

Basics: Extended Assessment Procedures Applied to assessment as a whole Designed to work with and complement the assessment procedures Contribute to the grounds for confidence in the effectiveness of the security controls employed in the information system. Closely linked to the impact level of the information system and the assurance requirements in SP 800-53 19

Security Control Assessment Process 20

Process: Preparing for the Assessment Organization Ensure assessment policies are in place and understood Ensure earlier NIST RMF steps have been completed, and received appropriate management oversight Clearly define purpose and scope of assessment Notify, Communicate, and Allocate Collect artifacts to provide to assessor Establish processes to minimize ambiguity or misunderstandings between organization and assessor Assessor Understand the organization s operations, and how the information system supports them Understand the system architecture and the security controls being assessed Identify system personnel, and establish contacts needed to conduct the assessment Obtain necessary artifacts, including previous assessment results appropriate for reuse Meet with appropriate organization officials to ensure common understanding of assessment objectives, rigor, and scope Develop a security assessment plan 21

Process: Develop the Security Assessment Plan Provides the objectives for the Security Controls Assessment and a detailed roadmap of how to conduct the assessment Use SP 800-53A in conjunction with SP 800-53 (Security Controls Catalog) Assessors should work with organization to develop the plan Determine the type of assessment (e.g., complete, partial) Select appropriate procedures to assess the security controls Tailor the assessment procedures to the specific operating environment Assessment method and object considerations Common security control-related considerations Reuse of assessment evidence considerations External information system considerations System/platform and organization-related considerations 22

Process: Develop the Security Assessment Plan, cont Develop assessment procedures for Organization-specific security controls Additional assurance requirements Develop strategy for incorporating extended assessment procedures Optimize selected assessment procedures to ensure efficiency Finalize and obtain approval 23

Process: Conduct Assessment Execute Security Assessment Plan in accordance with agreed upon schedule and milestones Apply assessment methods to assessment objects, and compile/produce evidence necessary to make determination Satisfied - assessment objective for the control has been met, producing a fully acceptable result Other than Satisfied evidence collected may indicate potential anomalies, or may be insufficient to make determination The final output and end result of the security controls assessment is the Security Assessment Report, one of the three key documents in the security accreditation package 24

Post Assessment Process: Organization Oversight System owner and organization officials review all findings of other than satisfied Make risk-based remediation decisions based on severity/seriousness of finding Document all decisions Update key documentation System Security Plan with Risk Assessment Update to reflect remediation actions, including risk-based acceptance Plan of Actions and Milestones (POA&M) 25

Use of Automation to Support Assessments Information Security Automation Program (ISAP) and Security Content Automation Protocol (SCAP) Support and complement the SP 800-53A approach for achieving consistent, cost-effective security control assessments Improve automated application, verification, and reporting of product-specific security configurations Achieve direct linkage, where appropriate, of the SP 800-53A assessment procedures to the SCAP automated testing of information system mechanisms and associated security configurations. 26

Use of Penetration Testing Controlled pen-testing should be considered as an additional tool to assess security controls Enhance the organization s understanding of the system; Uncover weaknesses in the system Indicate the level of effort required of adversaries to breach the system safeguards. 27

Summary and Implementation Tips Rely on local IT security policies, procedures, and information security program for security control selection, implementation, and assessment details Reuse previous assessment results where possible Select only those assessment procedures that correspond to controls and enhancements in the approved security plan Procedures from 800-53A are exemplary review, tailor, and supplement as necessary Security is fluid - periodic assessment of risk is necessary to ensure adequate security control coverage Communication is key set expectations 28

Contact Information Computer Security Division National Institute of Standards and Technology 100 Bureau Drive, Mailstop 8930 Gaithersburg, MD USA 20899-8930 Kevin Stine Kevin.Stine@nist.gov CSD on the Web: http://csrc.nist.gov 29