Information Systems Security Line of Business (ISS LoB)



Similar documents
STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration

Concept of Operations for Line of Business Initiatives

Overview. FedRAMP CONOPS

GEOSPATIAL LINE OF BUSINESS PROGRAM MANAGEMENT OFFICE CONCEPT OF OPERATIONS

Migration Planning Guidance (Draft)

Cloud Security for Federal Agencies

How To Improve Federal Network Security

Small Business. Leveraging SBA IT resources to support America s small businesses

December 8, Security Authorization of Information Systems in Cloud Computing Environments

Cybersecurity in the States 2012: Priorities, Issues and Trends

Report via OMB s Integrated Data Collection (IDC), 10

DHS IT Successes. Rationalizing Our IT Infrastructure

United States Department of Health & Human Services Enterprise Architecture Program Management Office. HHS Enterprise Architecture Governance Plan

WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration

Deputy Chief Financial Officer Peggy Sherry. And. Chief Information Security Officer Robert West. U.S. Department of Homeland Security.

Seeing Though the Clouds

How To Use Cloud Computing For Federal Agencies

Building an effective stay back team to gain maximum value from an outsourcing agreement

Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications

Network Security Deployment Obligation and Expenditure Report

Validating Enterprise Systems: A Practical Guide

MEMORANDUM FOR CHIEF FINANCIAL OFFICERS. Update on the Financial Management Line of Business and the Financial Systems Integration Office

U.S. Office of Personnel Management Human Resources Line of Business. Federal Human Resources Process Model

CMS Policy for Information Technology (IT) Investment Management & Governance

Information Security Guide For Government Executives. Pauline Bowen Elizabeth Chew Joan Hash

FSIS DIRECTIVE

GOVERNMENT USE OF MOBILE TECHNOLOGY

IT Governance. What is it and how to audit it. 21 April 2009

The Comprehensive National Cybersecurity Initiative

NASA OFFICE OF INSPECTOR GENERAL

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services

5 FAM 670 INFORMATION TECHNOLOGY (IT) PERFORMANCE MEASURES FOR PROJECT MANAGEMENT

Office of the Chief Information Officer

IG ISCM MATURITY MODEL FOR FY 2015 FISMA FOR OFFICIAL USE ONLY

IT-CNP, Inc. Capability Statement

CYBER SECURITY GUIDANCE

Management and Use of Information & Information Technology (I&IT) Directive. Management Board of Cabinet

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Team A SaaS Strategy

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

AUDIT REPORT. The Department of Energy's Management of Cloud Computing Activities

Middle Class Economics: Cybersecurity Updated August 7, 2015

STATE OF MARYLAND 2017 INFORMATION TECHNOLOGY MASTER PLAN (ITMP) Department of Information Technology David Garcia; State CIO

Section 37.1 Purpose Section 37.2 Background Section 37.3 Scope and Applicability Section 37.4 Policy... 5

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration

Agency for State Technology

DEPARTMENTAL REGULATION

5 FAM 620 INFORMATION TECHNOLOGY (IT) PROJECT MANAGEMENT

Why Cybersecurity Matters in Government Contracting. Robert Nichols, Covington & Burling LLP

Mixed Life Cycle FY2002

Business Plan for the. The Geospatial Platform. September 20, 2012 REDACTED

States at Risk: Cyber Threat Sophistication, Inadequate Budget and Talent

Cloud Services The Path Forward. Mr. Stan Kaczmarczyk Acting Director - Strategic Solutions and Security Services FAS/ ITS, GSA

Amit Garg BERKELEY RESEARCH GROUP, LLC 1800 M Street, N.W. 2 nd Floor Washington, D.C Direct: agarg@thinkbrg.

Identity, Credential, and Access Management. An information exchange For Information Security and Privacy Advisory Board

Audit of NRC s Network Security Operations Center

MANAGEMENT CONSULTING ENTERPRISE SOLUTIONS IT OUTSOURCING. CAPABILITY briefing

I. U.S. Government Privacy Laws

Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

OPM System Development Life Cycle Policy and Standards. Table of Contents

Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User

FISMA Cloud GovDataHosting Service Portfolio

U.S. Department of Education Federal Student Aid

IRM FY Information Resources Management Strategic Plan

Ann Geyer Tunitas Group. CGEIT Domains

Vendor Risk Management Financial Organizations

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

Office of Inspector General

U.S. Nuclear Regulatory Commission. Plan of Action Strategic Workforce Planning

ISSA Guidelines on Master Data Management in Social Security

An Overview of Large US Military Cybersecurity Organizations

Asset management guidelines

Department of Homeland Security Federal Government Offerings, Products, and Services

APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS

How to Use the Federal Risk and Authorization Management Program (FedRAMP) for Cloud Computing

Modeling and Simulation (M&S) for Homeland Security

Introduction to NICE Cybersecurity Workforce Framework

NIST Special Publication (SP) , Revision 2, Security Considerations in the System Development Life Cycle

US Department of Education Federal Student Aid Integration Leadership Support Contractor June 1, 2007

Briefing Outline. Overview of the CUI Program. CUI and IT Implementation

How To Save Money On A Data Center

HHSN W 1 QSSI - Quality Software Services, Inc

Security Language for IT Acquisition Efforts CIO-IT Security-09-48

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

Transcription:

Information Systems Security Line of Business (ISS LoB) Information Security and Privacy Advisory Board George Washington University Washington, DC March 22, 2007

Agenda Background Status Next Steps

Background Lines of Business LoBs initiated in FY2004: Financial Management (FM) Human Resources Management (HR) Grants Management (GM) Federal Health Architecture (FHA) Case Management (CM) These LoBs have progressed: Common processes defined Shared Service Centers established Due diligence validation in FM,HR Common Common Solution Solution : : A business business process process and/or and/or technology technology based based shared shared service service made made available available to to government government agencies. agencies. Business Business Driven Driven (vs. (vs. Technology Technology Driven): Driven): Solutions Solutions address address distinct distinct business business improvements improvements that that directly directly impact impact LoB LoB performance performance goals. goals. Developed Developed Through Through Architectural Architectural Processes Processes : : Solutions Solutions are are developed developed through through a a set set of of common common and and repeatable repeatable processes processes and and tools. tools. 2

Goals of ISS LoB Support performance of the Federal government s mission through improved information systems security Establish a mechanism to acquire, distribute and support information security solutions Leverage existing workforce resources capable of leading the confidentiality, integrity and availability of federal information and information systems and attract and retain supplemental workforce resources to this end 4

Problem Statements Security Training: Lack of common ISS career path Federal-wide standards for ISS skills have not been defined Lack of common criterion for credentialing ISS professionals Agencies are individually developing and procuring baseline content and sustaining distinct infrastructure to support ISS FISMA reporting: Disparate and manual FISMA reporting processes within agencies tends to lead to inconsistent FISMA reporting to oversight organizations, and inadequate program management Gaps reflect lack of a cohesive government-wide approach to information security as well as the redundancy of existing information security processes Situational Awareness & Incident Response: Uniform and comprehensive approach lacking within the federal government Agencies lack the knowledge, skills, and abilities to identify the vulnerabilities within their IT infrastructure and the risk to their information resources Many agencies do not have technical or financial resources to mitigate these risks Lifecycle/Security Solutions: Lack of common mandatory methodology for lifecycle and security solutions and services Unnecessary demarcation of baseline requirements with respect to security solution selection for national security systems/information versus non-national security systems/information Lack of awareness of existing standards and/or guidance across the federal government for selection evaluation, testing, and acquisition of security solutions 5

What the ISS LOB does not do Transfer accountability for agencies to meet all FISMA requirements and ensure an effective and efficient information systems security program Eliminate agency/program decision-making to integrate security products and services within the fabric of the agency s information security program Transfer resources for acquiring products and services to the SSCs except in those instances where agencies have agreed 6 Intend that one solution fits all for agency security requirements

Overall Task Force Recommendations Common Solutions in the following 4 areas: Training FISMA Reporting Situational Awareness and Incident Response Emerging Security Solutions for the Lifecycle Common Solutions close security gaps by establishing Share Service Centers (SSC) that: drive better performance increase expertise through specialization reduction in cost by providing products and services common to civilian agencies, intelligence community, and DOD Governance Structure Phased Implementation 7

Governance Structure Federal Systems Security Governance Board (FSSGB) - a multi-agency, multi-function oversight body and steering committee for the Information Systems Security Line of Business. Program Management Office (PMO) - established to facilitate the day-to-day operations of the ISS Line of Business based on guidance from the Board. Shared Service Centers (SSCs) - provide security products and services that are used by Customer agencies. Federal Agencies and Departments (Customers) leverage common solutions provided by the SSCs to support their security requirements. 8

Governance Structure OMB CIO COUNCIL DHS Federal Systems Security Governance Board (FSSGB ) Configuration Control Board ISS LOB Program Office Customer Advisory Board Security Training SSC FISMA Reporting SSC Situational Awareness & Incident Response SSC Security Solutions Lifecycle SSC 9 D/A Customers

10 Program Management Office

High Level Implementation Schedule 11

Security Training Solution Common suites of ISS training products and training services for the Federal Government, to include government-wide licenses for commercial IT applications and security training products User Awareness Specialized Training Anticipated Outcomes Development of federal ISS skills standards & competencies to better align nationally recognized credentials to government ISS roles Infusion of ISS content into senior executive development & education programs Development of a repository of government sponsored/approved COTS training products and sources 12

FISMA Reporting Solution Provide agencies with shared products & services to comply with FISMA reporting requirements - using pre-existing standardized tools for this process Anticipated Outcomes Government-wide process that can produce standardized FISMA results to OMB and lower FISMA processing costs Steady progress in terms of improving security maturity Automation allows for more efficient completion of the required annual security assessments and reporting, making it easy to keep information current to be used for program management - managers would also be in a better position to respond to ad hoc queries Improved program management capabilities would result in higher levels of compliance with performance standards - managers at all levels would be able to stay better informed and assure proper and timely action Efficiencies gained through use of central, standardized tools 13

Situational Awareness & Incident Response Solution Multiple SSCs provide shared products and services for specific functional areas Provide federal enterprise situational awareness and incident response capability Start with functions providing a critical foundation for ISS, identifying others in future as Line of Business evolves Anticipated Outcomes Complements existing US-CERT/CIRT programs. Affordable alternative for smaller agencies to be served by larger agency to assist with information security without the huge cost to maintain the capability locally More uniform service approach, as the work will be mapped to a standard method for conducting the activity improving the consistency across government Aggregate requirements for tools and services, offering a choice of solutions to meet specific needs or proven practices Learn about experiences of other agencies with a particular product or service prior to making purchasing decisions Develop collection of common tools and practices that meet established standards, bringing consistency to the information systems security posture 14

Emerging Security Solutions for the Lifecycle Solution Define a standardized process to guide agency personnel in selecting the appropriate security product or service. Establish a repository containing: Information on specific COTS/GOTS security solutions Administrative procedures to be used by all agencies (to include risk management methodologies, cost benefit analyses, acquisition language, security planning tools) Anticipated Outcomes Standardized methodology will provide for interoperability of security solutions and services, repeatable implementation of product selection, providing non-repudiated means to ensure contractors and outsourcing providers follow the governments mandatory baselines 15

SSC Responsibilities Establish SSC Develop and execute detailed architecture and implementation plan for standing up SSC (SSC operational costs) Negotiate and acquire needed partnerships, tools, or other capabilities Implement/deliver Common Solutions Establish processes for operation/management of the SSCs Establish processes for communication, education and reporting to stakeholders; SSC Agency, ISS LOB, customers, other Develop and establish marketing materials and plan for signing up customer agencies Establish tracking and reporting process 16

Considerations for Migrating Agencies Migrate over time to use of SSCs. Key considerations: Service/products to migrate and associated migration schedules Impacts to end users, management, business processes, and existing contractual obligations Impacts to IT infrastructure (e.g., capacity, technology, communications, security and access controls, and help desk) Data migration Personnel transition Asset disposition Continuity of Operations Change management People Process Technology 17

Customer Agencies Responsibilities Customer D/A SSC Selection and Migration Define agency requirements for the security area (What does the agency need?) Determine strategy for meeting requirements, e.g., migrate to SSC, adopt an agency, waiver to support internally, and migration timeframe SSL, Identify SSC exit or change strategy Develop and submit business case for strategy Develop Customer Agency criteria for selecting a SSC Evaluate and select SSC to provide common services for the Security Area Coordinate and execute IAA & SLA with SSC Migrate agency to SSC according to time period Perform change management to support the migration 18

Next Steps Coordinate SSC implementation/activities Coordinate/establish MOUs with SSCs Establish action plans for work groups Establish Security Solutions Work Groups Continue coordinate with FM/HR/IOI LOBs 19

20 Questions

Michael C. Smith Department of Homeland Security National Cyber Security Division mike.c.smith@dhs.gov 21