System Security Certification and Accreditation (C&A) Framework



Similar documents
Security Controls Assessment for Federal Information Systems

IT Security Management Risk Analysis and Controls

Get Confidence in Mission Security with IV&V Information Assurance

NIST A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich

Security Compliance In a Post-ACA World

Looking at the SANS 20 Critical Security Controls

5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE

CTR System Report FISMA

HHS Information System Security Controls Catalog V 1.0

CMS POLICY FOR THE INFORMATION SECURITY PROGRAM

Security and Privacy Controls for Federal Information Systems and Organizations

Security Language for IT Acquisition Efforts CIO-IT Security-09-48

ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT

COORDINATION DRAFT. FISCAM to NIST Special Publication Revision 4. Title / Description (Critical Element)

Security Self-Assessment Tool

AF Life Cycle Management Center

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

Review of the SEC s Systems Certification and Accreditation Process

CMS SYSTEM SECURITY PLAN (SSP) PROCEDURE

Industrial Security Field Operations

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance

Altius IT Policy Collection Compliance and Standards Matrix

CONTINUOUS MONITORING

Requirements For Computer Security

National Information Assurance Certification and Accreditation Process (NIACAP)

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

Compliance Risk Management IT Governance Assurance

Bellingham Control System Cyber Security Case Study

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

Minimum Security Requirements for Federal Information and Information Systems

Cloud Security for Federal Agencies

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)

Information Security for Managers

Selecting RMF Controls for National Security Systems

FISMA: Securing National Infrastructure

CMS INFORMATION SECURITY (IS) CERTIFICATION & ACCREDITATION (C&A) PACKAGE GUIDE

POSTAL REGULATORY COMMISSION

VIRGINIA DEPARTMENT OF MOTOR VEHICLES IT SECURITY POLICY. Version 2.

FISMA Implementation Project

NOTICE: This publication is available at:

Compliance Overview: FISMA / NIST SP800 53

Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat

Government of Canada Managed Security Services (GCMSS) Appendix D: Security Control Catalogue ITSG-33 - Annex 3 DRAFT 3.1

Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)

Lots of Updates! Where do we start?

Understanding HITRUST s Approach to Risk vs. Compliance-based Information Protection

DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE

Cybersecurity Throughout DoD Acquisition

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014

Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program

Security Control Standard

Security Control Standard

WRITTEN INFORMATION SECURITY PROGRAM (WISP) ACME Consulting Services, Inc.

Automate Risk Management Framework

Privacy Impact Assessment

FedRAMP Master Acronym List. Version 1.0

Continuous Monitoring Strategy & Guide

Department of Veterans Affairs VA Handbook Information Security Program

AODR Role-Based Training. Name Title Division Name U.S. Department of Energy Office of the Associate CIO for Cyber Security

INFORMATION TECHNOLOGY SECURITY POLICY Table of Contents

Security Control Standards Catalog

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper

FSIS DIRECTIVE

Dr. Ron Ross National Institute of Standards and Technology

Information Security. Rick Aldrich, JD, CISSP Booz Allen Hamilton

Final Audit Report. Report No. 4A-CI-OO

Written Information Security Program (WISP)

Information Technology Security Certification and Accreditation Guidelines

Privacy Impact Assessment. For Person Authentication Service (PAS) Date: January 9, 2015

Security Control Standard

SECURITY CATEGORIZATION AND CONTROL SELECTION FOR NATIONAL SECURITY SYSTEMS

Publication Contractor Security Controls

FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL

Federal Highway Administration (FHWA) Cybersecurity Program (CSP) Handbook

FedRAMP Standard Contract Language

IT Security and Compliance Program Plan for Maxistar Medical Supplies Company

Publication Contractor Security Controls. ***This Publication Pertains to IT Assets Owned and Managed at Contractor Sites***

Security Control Standard

Cybersecurity Risk Management Activities Instructions Fiscal Year 2015

Information Security Program Management Standard

NIST Cyber Security Activities

CMS Information Security Risk Assessment (RA) Methodology

United States Patent and Trademark Office

ACA System Security Plan Procedures

Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia

Report of Evaluation OFFICE OF INSPECTOR GENERAL. OIG 2014 Evaluation of the Farm Credit OIG 2014 Administration s. Management Act.

Tim Denman Systems Engineering and Technology Dept Chair/ Cybersecurity Lead DAU South, Huntsville

DIACAP Presentation. Presented by: Dennis Bailey. Date: July, 2007

IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO TABLE OF CONTENTS

COMMONWEALTH OF VIRGINIA

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA Office: Fax:

THE UNIVERSITY OF IOWA INFORMATION SECURITY PLAN

Overview. FedRAMP CONOPS

Policy on Information Assurance Risk Management for National Security Systems

Transcription:

System Security Certification and Accreditation (C&A) Framework Dave Dickinson, IOAT ISSO Chris Tillison, RPMS ISSO Indian Health Service 5300 Homestead Road, NE Albuquerque, NM 87110 (505) 248-4500 fax: (505) 248-4115 1

Overview Security Certification Security Accreditation Terminology Managing Enterprise Risk Security Categorization Security Control Selection Security Control Refinement Security Control Documentation Security Control Implementation Security Control Assessment System Authorization Security Control Monitoring The C&A Process Basic C&A Documents 2

Question? What is Certification? 3

Security Certification The comprehensive evaluation of the management, operational, and technical security controls in an information system Evaluation supports the security accreditation process Evaluation performed by security expert (may be contractor) Assesses the effectiveness of the implemented security controls in a particular environment of operation Are the controls an acceptable set? Are the controls operating as intended? Determines remaining vulnerabilities in the information system based on the assessment. 4

Question? What is Accreditation? 5

Security Accreditation The official management decision to authorize operation of an IT system Residual risk is one factor in decision Authorization: Is given by a senior agency official (RPMS Designated Accrediting Authority (DAA) is Phyllis Eddy) Is applicable to a particular environment of operation of the IT system Explicitly accepts the level of residual risk to agency operations (including mission, functions, image or reputation), assets, & individuals that remain after the implementation of an agreed upon set of security controls in the IT system. 6

Terminology Security certification: Assessing/verifying effectiveness of implemented security controls Security accreditation: Approval/authorization to operate IT system 7

Managing Enterprise Risk The Framework FIPS 200 / SP 800-53 Security Control Selection Starting Point Selects minimum security controls (i.e., safeguards and countermeasures) planned or in place to protect the information system FIPS 199 / SP 800-60 Security Categorization Defines category of information system according to potential impact of loss SP 800-37 Security Control Monitoring Continuously tracks changes to the information system that may affect security controls and assesses control effectiveness SP 800-53 / FIPS 200 / SP 800-30 Security Control Refinement Uses risk assessment to adjust minimum control set based on local conditions, required threat coverage, and specific agency requirements SP 800-18 Security Control Documentation In system security plan, provides a an overview of the security requirements for the information system and documents the security controls planned or in place SP 800-70 Security Control Implementation Implements security controls in new or legacy information systems; implements security configuration checklists SP 800-37 System Authorization Determines risk to agency operations, agency assets, or individuals and, if acceptable, authorizes information system processing SP 800-53A / SP 800-26 / SP 800-37 Security Control Assessment Determines extent to which the security controls are implemented correctly, operating as intended, and producing desired outcome with respect to meeting security requirements 8

FIPS Security 199 Categorization & SP 800-60Information 9

Security Categorization Information FIPS 199 (Standards for Security Categorization of Federal Information and Information Systems) SP 800-60 (Guide for Mapping Types of Information and Information Systems to Security Categories) Security Objectives: Confidentiality Integrity Availability Levels of Impact: Low = Limited adverse effect on organizational operations Moderate = Serious adverse effect on organizational operation High = Severe or catastrophic adverse effect on organizational operations Security Category = {(confidentiality, impact), (integrity, impact), (availability, impact)} 10

Security Categorization Cont. FIPS Publication 199 Low Moderate High Guidance for Mapping Types of Information and Information Systems to FIPS Publication 199 Security Categories SP 800-60 Confidentiality Integrity Availability The loss of confidentiality could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. The loss of integrity could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. The loss of availability could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. The loss of confidentiality could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. The loss of integrity could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. The loss of availability could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. Example: An Enterprise Information System The loss of confidentiality could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. The loss of integrity could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. The loss of availability could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. 11

Security Categorization Cont. EXAMPLE 1: IHS RPMS Information System Impact Levels and Categorization Step 1: Review Information System Provisional Impact Levels Security Category = {( Confidentiality, MODERATE ),( Integrity, HIGH ),( Availablity, MODERATE )} (Info System) Step 2: Adjust Information System Impact Levels Security Category = {( Confidentiality, HIGH ),( Integrity, HIGH ),( Availablity, MODERATE )} (Info System) Step 3: Finalized Information System Impact Levels Security Category = {( Confidentiality, HIGH ),( Integrity, HIGH ),( Availablity, MODERATE )} (Info System) IHS RPMS Security Categorization is rated (HIGH) Step 3: Finalized Information System Impact Levels (IOAT) System Security Category = {( Confidentiality, HIGH ),( Integrity, HIGH ),( Availablity, MODERATE )} (Info System) Step 3: Finalized Information System Impact Levels (NPIRS) System Security Category = {( Confidentiality, MODERATE ),( Integrity, LOW ),( Availablity, LOW )} (Info System) IHS IOAT & NPIRS Security Categorization 12

Security Control Selection Management Controls Risk Assessment (RA) Planning (PL) (RA-2) Security Categorization L, M, H (PL-2) System Security Plan L, M, H System and Service Acquisition (SA) (SA-7) User Installed Software L, M, H Certification, Accreditation, and Security Assessments (CA) (CA-5) Plan of Action and Milestones - L, M, H 13

Security Control Selection Operational Controls Personnel Security (PS) (PS-3) Personnel Screening L, M, H Physical and Environmental Protection (PE) (PE-17) Alternate Worksite M, H Contingency Planning (CP) (CP-3) Contingency Training M, H(1) Configuration Management (CM) (CM-7) Least Functionality M, H(1) Maintenance (MA) (MA-6) Timely Maintenance M, H System and Information Integrity (SI) (SI-8) Spam and Spyware Protection M, H Media Protection (MP) (MP-5) Media Transport M, H Incident Response (IR) (IR-6) Incident Reporting L, M, H Awareness and Training (AT) (AT-3) Security Training - L, M, H 14

Security Control Selection Technical Controls Identification and Authentication (IA) (IA-6) Authentication Feedback L, M, H Access Control (AC) (AC-9) Previous Logon Notification Not Selected Audit and Accountability (AU) (AU-8) Time Stamps M, H System and Communications Protection (SC) (SC-14) Public Access Protections L, M, H 15

Security Control Refinement FIPS 200 (Minimum Security Requirements for Federal Information and Information Systems ) NIST SP 800-30 (Risk Management Guide for Information Technology Systems) NIST SP 800-53 (Recommended Security Controls for Federal Information System) Starting Point Initial Coverage Security Control Catalog Complete Set Basic, Enhanced, and Strong Security Controls 1 4 Minimum Security Controls Moderate Impact Information Systems Additional Security Controls 2 5 Estimated Threat Coverage Additional Threat Coverage 3 3 Risk Assessment Process Incorporates Local Conditions and Specific Agency Requirements to Adjust Initial Set of Security Controls 3 16

Security Control Documentation NIST 800-18 (Guide for Developing Security Plans for Federal Information Systems) 17

Security Control Documentation Security Plan Risk Assessment Contingency Plan System Specifications Architecture and Design User Manuals Operating Procedures Network Diagrams Configuration Mgmt. 18

Security Control Documentation Management Controls (CA-5) Plan of Action and Milestones - L, M, H This is an enterprise common security control. Ref: NIST 800-65 Integrating IT Security into the Capital Planning and Investment Control Process HHS Plan of Actions and Milestone Guide July 19, 2005 HHS Certification and Accreditation Guide HHS Information Security Program Handbook 01 December 2005 IHS OIT Certification and Accreditation Guide (SOP 05-15) In Place Controls: Plan of actions and milestones (POA&Ms) are submitted into the HHS portfolio management software for the RPMS. POA&M s are maintained continuously and a quarterly status report is generated. 19

Security Control Documentation Operational Controls (AT-3) Security Training - L, M, H Ref: HHS Information Security Program Policy 19 July 2005 HHS IT Security Handbook 01 December 2005 IHS Providing Security Training (SOP 05-38) In Place Controls: Staff that has information security duties as a major portion of their position will receive additional training annually. The training will be documented in the employees file and with the supervisor. 20

Security Control Documentation Technical Controls (AC-9) Previous Logon Notification Ref: Kernel Systems Manual v8.0 July 1995 In Place Control: RPMS displays previous login date and time as well as login failures. 21

Security Control Implementation SP 800-70 (Security Configuration Checklist for IT Products Guidance for Checklist Users and Developers) A security configuration checklist is sometimes referred to as a lockdown guide, hardening guide, security guide, or a security technical implementation guide. You may find a list of NIST Provided Checklist s at http://checklists.nist.gov/repository/index.html. Product Categories: Application Servers Antivirus Software Database Systems DNS Servers Firewalls 22

Security Control Assessment NIST SP 800-37 (Guide for the Security Certification and Accreditation of Federal Information Systems) NIST SP 800-26 (Guide for Information Security Program Assessments and System Reporting Form) NIST SP 800-53A (Guide for Assessing the Security Controls in Federal Information Systems) Security Testing and Evaluation, Self Assessment, Risk Assessment Documenting and supporting materials Reuse of assessment results Methods and procedures Security assessment Security assessment report Evaluate the security controls may include penetration testing 23

System Authorization NIST SP 800-37 (Guide for the Security Certification and Accreditation of Federal Information Systems) Authorization to Operate The authorizing official deems that the risk to agency operations, agency assets, or individuals is acceptable, acceptable, an authorization to operate is issued for the information system. Interim Authorization to Operate The authorizing official deems that the risk to agency operations, agency assets, or individuals is unacceptable, but there is an overarching mission necessity to place the information system into operation or continue its operation, an interim authorization to operate may be issued. Denial of Authorization to Operate The authorizing official deems that the risk to agency operations, agency assets, or individuals is unacceptable, the authorization to operate the information system is denied. 24

Security Control Monitoring NIST SP 800-37 (Guide for the Security Certification and Accreditation of Federal Information Systems) 3 Tasks of Security Monitoring: 1) Configuration Management and Control a) Track changes to the information system 2) Security Control Monitoring a) Analyze the security impact of those changes 3) Status Report and Documentation a) Make appropriate adjustments to the security controls and the System Security Plan 25

Basic C&A Documents System Security Plan Provide an overview of security requirements for the IT system and describe planned security controls (management, operational and technical). Risk Assessment Report Documents the results of risk assessment activities, threats, vulnerabilities, control effectiveness and trade-offs (performance impact and cost). Security Test and Evaluation Reports Document the results of verifying compliance to security requirements and that security controls are correctly implemented and effective. Certifier s Statement Overview of security status. 26

SUMMARY Develop a System Security Plan (SSP) Have a Risk Assessment (RA) performed System Test & Evaluation (Annually) Continuous Monitoring 27

Questions? Dave Dickinson, IOAT ISSO David.Dickinson@ihs.gov Chris Tillison, RPMS ISSO Chris.Tillison@ihs.gov Indian Health Service 5300 Homestead Road, NE Albuquerque, NM 87110 (505) 248-4500 fax: (505) 248-4115 28