RMF. Cybersecurity and the Risk Management. Framework UNCLASSIFIED



Similar documents
Department of Defense INSTRUCTION

Risk Management Framework (RMF): The Future of DoD Cyber Security is Here

Tim Denman Systems Engineering and Technology Dept Chair/ Cybersecurity Lead DAU South, Huntsville

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South

Department of Defense INSTRUCTION

Cybersecurity Throughout DoD Acquisition

RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW. Version 1, Release July 2015

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology

1 July 2015 Version 1.0

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION

U.S. FLEET CYBER COMMAND U.S. TENTH FLEET DoD RMF Transition

Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System

FREQUENTLY ASKED QUESTIONS

Department of Defense INSTRUCTION

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C

Department of Defense DIRECTIVE

Out with. AP, In. with. (C&A) and (RMF) LUNARLINE, INC

Policy on Information Assurance Risk Management for National Security Systems

SECURITY CATEGORIZATION AND CONTROL SELECTION FOR NATIONAL SECURITY SYSTEMS

Department of Defense INSTRUCTION

DEPARTMENT OF DEFENSE (DoD) CLOUD COMPUTING SECURITY REQUIREMENTS GUIDE (SRG) Version 1, Release January 2015

Department of Defense INSTRUCTION

Interim Department of Defense (DoD) Certification and Accreditation (C&A) Process Guidance

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION

Building Security In:

Advancing Access to Restricted Data: Regulations, Compliance, Continuous Monitoring. OH MY!!!

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC

Security Authorization Process Guide

Information Security for Managers

DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO

AF Life Cycle Management Center

NICE and Framework Overview

System Security Engineering

Information System Security Officer (ISSO) Guide

POLICY ON WIRELESS SYSTEMS

PREPARED BY: DOD JOINT SAP CYBERSECURITY (JSCS) WORKING GROUP

NOV q11. DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTOr D.C

2014 Audit of the Board s Information Security Program

Subj: DEPARTMENT OF THE NAVY CYBERSECURITY/INFORMATION ASSURANCE WORKFORCE MANAGEMENT, OVERSIGHT, AND COMPLIANCE

SECURITY CATEGORIZATION AND CONTROL SELECTION FOR NATIONAL SECURITY SYSTEMS

DoDI , November 25, 2014

Department of Defense DIRECTIVE

Department of Defense Net-Centric Services Strategy

Department of Defense INSTRUCTION

Security Control Standard

Introduction to NICE Cybersecurity Workforce Framework

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

Data- Centric Enterprise Approach to Risk Management Gregory G. Jackson, Sr. Cyber Analyst Cyber Engineering Division Dynetics Inc.

Department of Defense INSTRUCTION

DoD Strategy for Defending Networks, Systems, and Data

Department of Defense. SUBJECT: Interoperability and Supportability of Information Technology (IT) and National Security Systems (NSS)

Department of Defense INSTRUCTION

Baseline Cyber Security Program

DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE

Department of Defense NetOps Strategic Vision

Department of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise

Section 37.1 Purpose Section 37.2 Background Section 37.3 Scope and Applicability Section 37.4 Policy... 5

Department of Defense INSTRUCTION

Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT

HHS Information System Security Controls Catalog V 1.0

Information Security Risk and Compliance Series Risking Your Business

CMS POLICY FOR THE INFORMATION SECURITY PROGRAM

Information System Security Officer (ISSO) Guide

Seeing Though the Clouds

Risk Management Guide for Information Technology Systems. NIST SP Overview

Overview. FedRAMP CONOPS

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

2015 Security Training Schedule

Statement. Mr. Paul A. Brinkley Deputy Under Secretary of Defense for Business Transformation. Before

MD 12.5 NRC CYBER SECURITY PROGRAM DT-13-15

DOD Medical Device Cybersecurity Considerations

NIST Cybersecurity Framework Manufacturing Implementation

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

Department of Defense INSTRUCTION

Cloud Security for Federal Agencies

DIACAP Presentation. Presented by: Dennis Bailey. Date: July, 2007

BPA Policy Cyber Security Program

How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives

DEPARTMENT OF THE NAVY DOD INFORMATION ASSURANCE CERTIFICATION AND ACCREDITATION PROCESS (DIACAP) HANDBOOK. Version 1.0

Department of Defense INSTRUCTION

Directives and Instructions Regarding Security and Installation of Wireless LAN in DoD Federal Facilities

Continuous Monitoring in a Risk Management Framework. US Census Bureau Oct 2012

SECTION A: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT

DoD ENTERPRISE CLOUD SERVICE BROKER CLOUD SECURITY MODEL

DoD CIO ITSM Overview Enterprise Architecture Conference

Security Control Standard

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

Department of Defense

SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Introduction This contract is intended to provide IT solutions and services as

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014

Industrial Control Systems Security Guide

Department of Defense DIRECTIVE

Department of Veterans Affairs VA Directive 6004 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS

Department of Defense INSTRUCTION

Human Resources Management. Portfolio Management Concept of Operations

Cloud Computing Strategy

Transcription:

Cybersecurity and the Risk Management Framework

Wherewe ve been and where we re going Information Assurance DoD Instruction 8500.01,Para 1(d),adoptsthe term cybersecurity as it is defined in National Security Presidential Directive-54/Homeland Security Presidential Directive-23 to be used throughout the DoD instead of the term information assurance (IA). Cybersecurity Defined Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation.

DoD Cybersecurity Policy and the DoD Cybersecurity Policies provide clear, adaptable Cybersecurity Policy processes for stakeholders thatsupport andsecure missions and align with Federal requirements DoDI 8500.01 DoDI 8510.01 Automated Tools such as the Enterprise Mission DoD Cybersecurity Assurance Support Service The Knowledge Service is Policy the authoritative source for (emass) and the Ports, Protocols, and Services information, guidance, procedures, and templates on Implementation how to execute the Risk Guidance Automated Management Framework Management (PPSM) Implementation registry enable agile Guidance deployment Knowledge Service emass CS105-1-3

Cybersecurity Policy Update DoDI 8500.01 Cybersecurity DoDI 8510.01 Risk Management Framework () for DoD Extends applicability to all IT processing DoD information, Emphasizes operational resilience, integration, and interoperability Adopts NIST s Risk ManagementFramework Aligns with Joint Task Force Transformation Initiative (DoD, NIST, IC, Clarifieswhat IT should undergo the process and CNSS) Strengthens and supports enterprise-wide IT governance andauthorization of Catalog Moves from acheckliststo a risk based approach Adopts common Federal cybersecurity terminology so we are all steps and activities are embedded indod Acquisition Lifecycle speaking the same language Promotes DT&E and OT&E integration Leverages and builds upon numerous existing Federal policies and Implementscybersecurity via securitycontrols vice numerous policies and Incorporates security early and continuously within the acquisition lifecycle IT systems and services Transitions to the newly revised NIST SP 800-53 Security Control standards so there is less DoD policy to write and maintain Information Technology (IT) Facilitates multinational information sharing efforts memos Adopts reciprocityandcodifies reciprocity tenets Emphasizescontinuous monitoring and timely correction ofdeficiencies Supports and encourages use of automated tools

Cybersecurity Applicability All DoD-owned IT or DoD-controlled IT that receives, processes, stores, displays, or transmits DoD information All DoD information in electronic format Special Access Program (SAP) information technology, other than SAP IS handling sensitive compartmented information (SCI) IT supporting research, development, test and evaluation (T&E), and DoD-controlled IT operated by a contractor or other entity on behalf of the DoD DoD information technology (IT) is broadly grouped as DoD information systems (ISs), platform IT (PIT), IT services, and products

DoD Information Technology DoD InformationTechnology PIT Information Systems Major Applications Enclaves IT Services PIT Systems PIT Assess & Authorize Internal External Products Software Hardware Applications Assess Cybersecurity requirements must be identified and included in the design, development, acquisition, installation, operation, upgrade, or replacement of all DoD Information Systems

Cybersecurity Applicability Managing cybersecurity risks is complex and requires the involvement of the entire organization including Senior leaders planning and managing DoD operations Developers, implementers, and operators of IT supporting operations Cybersecurity risk management is a subset of the overall risk management process for all DoD acquisitions and includes Cost, performance, and schedule risk for programs of record All other acquisitions of the DoD The risk assessment process extends to the logistics support of fielded equipment and the need to maintain the integrity of supply sources

Cybersecurity Risk Management Roles DoD Chief Information Officer (CIO) Coordinates with Under Secretary of Defense for Acquisition, Technology, and Logistics (USD[AT&L]) to ensure that cybersecurity is integrated into processes for DoD acquisition programs, including research and development Coordinates with the Director of Operational Test and Evaluation (DOT&E) to ensure that cybersecurity responsibilities are integrated into the operational testing and evaluation for DoD acquisition programs USD(AT&L) Integrates cybersecurity policies and supporting guidance into acquisition policy, regulations, and guidance Ensures the DoD acquisition process incorporates cybersecurity planning, implementation, testing, and evaluation Ensures acquisition community personnel with IT responsibilities are qualified DoD Component Heads Ensure system security engineering and trusted systems and networks processes, tools and techniques are used in the acquisition of all applicable IT

Promotes DT&E and OT&E Integration DoD CIO, incoordination with thedeputy Assistant Secretary of Defense for Developmental Test and Evaluation DASD(DT&E) and DOT&E,ensures developmental and operational test and evaluation activities and findings are integrated into the

Integrated DoD-Wide Risk Management strategic risk Traceability and Transparency of Risk- Inter-Tierand Intra- BasedDecisions TierCommunications DoDCIO/SISO, DoD ISRMC Organization-Wide Risk Awareness TIER 1 Feedback Loop for Continuous Improvement organization WMA, TIER 2 BMA,EIEMA, DIMA PAOs DoDComponent CIO/SISO mission / business processes Authorizing Official (AO) TIER 3 SystemCybersecurity Program platform it information systems tactical risk

Tier 1 Risk Management Roles DoD CIO(Chief Information Officer)developsand establishes DoDCybersecuritypolicy and guidanceconsistent with applicablestatute or Federal regulations SISO (SeniorInformationSecurityOfficer)directsand coordinates the DefenseCybersecurity Program and,asdelegated,carries out the DoD CIO sresponsibilities DoDRISK EXECUTIVEFUNCTION(Defined in National Institute of Standards and Technology (NIST) Special Publication 800-37)is performed by thedodinformation Security Risk ManagementCommittee (DoD ISRMC)

Tier 2 Risk Management Roles DoDPrinciple Authorizing Official (PAO) assigned for each DoD Mission Areas (MA) Warfighter Business Enterprise Information Environment Defense Intelligence Component Chief Information Officer (CIO) Senior Information Security Officer (SISO)

Tier 3 Risk Management Roles System Cybersecurity Program Authorizing Official (AO) Information System Owners (ISO) of DoD IT Information Owner (IO) Information System Security Manager (ISSM) Information System Security Officer (ISSO)

Operational Cybersecurity Operational Resilience Information resources are trustworthy Missions are ready for information resources degradation or loss Network operations have the means to prevail in the face of adverse events Operational Integration Cybersecurity must be fully integrated into system life cycles and is a visible element of organizational, joint, and DoD Component IT portfolios Interoperability Adherence to DoD architecture principles Utilizing a standards-based approach Manage the risk inherent in interconnecting systems

Aligning Cybersecurity Policy DoD aligns cybersecurity and risk management policies, procedures, and guidance with Joint Transformation NIST documents, the basis for aunified information security framework for the Federal government. Before After

Cybersecurity Policy Partnerships DoD leverages CNSS DoD participates in and NIST policies and development of CNSS filters requirements to and NIST documents meet DoD needs ensuring DoD equities are met DoD participates in CNSS and NIST policy development as a vested stakeholder with the goals of a more standardized approach to cybersecurity and to protect the unique requirements of DoD missions and warfighters

Alignment Documents and Guidance NIST National Institute of Standards and Technology NSS National Security Systems

Security Control Catalog (NIST SP 800-53) Risk Management Framework () providesa built-in compliance process is integrated into the DoD acquisition process, which enables policy enforcement

Implementing Cybersecurity Policies The Risk Management Framework implements cybersecurity technical policiesthrough the application of security controls, not by numerous standalone policies, memos, and checklists

Moving to the Risk Management Framework DIACAP Compliance Check Risk Management Framework Are you compliant with these controls? Are you compliant with these controls? Yes No Yes What is the Risk? No Vulnerability level (includes STIG findings) What is the vulnerability level (Severity Category/code) Associated Threats? Likelihood of Exploitation Impact level (CIA) CAT I Finding Compensating Controls and Mitigations What is the Residual Risk? What is my organi-zation s risk tolerance? What is my STOP risk tolerance? Risk Accepted

DoD Process Adopts NISTs

Enterprise-wide Authorization ISs & Services Common Control Security control that is inherited by one or more organizational information systems Security Control Inheritance Information system or application receives protection from security controls (or portions of security controls) that are developed, authorized, and monitored by another organization, either internal or external, to the organization where the system or application resides Of the 900+ controls and enhancements in the NIST SP 800-53 Rev. 4 Catalog, about 400 typically apply to an IS. Of the 400, many are common controls inherited from the hosting environment; this is great use of the build once/use many approach.

Encourages Use of Automated Tools Some security controls, baselines, Security Requirements Guides (SRGs), Security Technical Implementation Guides (STIGs), Control Correlation Identifiers (CCIs), implementationand assessmentprocedures, overlays, common controls, etc.,may possiblybe automated Automated systems are being developed to manage the workflow process, to identify key decision points, and to generate control lists needed in implementation An example of such an automated system is the DoD-sponsored Enterprise Mission Assurance Support Service (emass)

Promotes ISCM setsthe baseline for the initialis authorization. Developing ongoingauthorizationmay be accomplished byleveragingan Information Security ContinuousMonitoring(ISCM) Program,with jointprocesses to adopt reciprocity for cybersecurity acrossdod,theintelligence Community,and FederalAgencies.

Built into DoD Acquisition Lifecycle

Questions