Advancing Access to Restricted Data: Regulations, Compliance, Continuous Monitoring. OH MY!!!



Similar documents
Policy on Information Assurance Risk Management for National Security Systems

New Developments in Data Sharing, Remote Access, Secure Data, and Documentation at the Cornell Institute for Social and Economic Research (CISER)

IG ISCM MATURITY MODEL FOR FY 2015 FISMA FOR OFFICIAL USE ONLY

FREQUENTLY ASKED QUESTIONS

Security Control Standard

Information Security for Managers

2014 Audit of the Board s Information Security Program

Supply Chain Risk Management Practices for Federal Information Systems and Organizations

Compliance Risk Management IT Governance Assurance

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014

Managing Security Risk In a World of Complex Systems and IT Infrastructures

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

RMF. Cybersecurity and the Risk Management. Framework UNCLASSIFIED

Security Control Standard

2012 FISMA Executive Summary Report

MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY

Get Confidence in Mission Security with IV&V Information Assurance

Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations

IBM Internet Security Systems October FISMA Compliance A Holistic Approach to FISMA and Information Security

NIST National Institute of Standards and Technology

Security Risk Management For Health IT Systems and Networks

Office of Inspector General Corporation for National and Community Service

FSIS DIRECTIVE

Minimum Security Requirements for Federal Information and Information Systems

Securing the Cloud Infrastructure

Department of Veterans Affairs VA Directive 6004 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS

Cybersecurity Risk Management Activities Instructions Fiscal Year 2015

NIST Special Publication (SP) , Revision 2, Security Considerations in the System Development Life Cycle

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule

Dr. Ron Ross National Institute of Standards and Technology

Cloud Computing Technologies Achieving Greater Trustworthiness and Resilience

FY 2016 Inspector General Federal Information Security Modernization Act of 2014 Reporting Metrics V1.0

The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013.

Help for the Developers of Control System Cyber Security Standards

FISMA Cloud GovDataHosting Service Portfolio

What The OMB Cybersecurity Proposal Does And Doesn't Do

Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014

Security Authorization Process Guide

Federal Trade Commission Privacy Impact Assessment. Conference Room Scheduling PIA

Security Controls Assessment for Federal Information Systems

Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program

MD 12.5 NRC CYBER SECURITY PROGRAM DT-13-15

Section 37.1 Purpose Section 37.2 Background Section 37.3 Scope and Applicability Section 37.4 Policy... 5

The Intersection of Internal Controls and Cyber Security

Securing the Microsoft Cloud

Continuous Monitoring in a Risk Management Framework. US Census Bureau Oct 2012

Cyber Security Controls Assessment : A Critical Discipline of Systems Engineering

Building Security In:

GAO. IT SUPPLY CHAIN Additional Efforts Needed by National Security- Related Agencies to Address Risks

Overview. FedRAMP CONOPS

How To Write A Cybersecurity Framework

Security Testing. Claire L. Lohr, CSQE, CSDP, CTAL F. Scot Anderson, CISSP April 7, 2009 V 1.

FISMA Implementation Project

April 28, Ms. Hada Flowers Regulatory Secretariat Division General Services Administration 1800 F Street, NW, 2 nd Floor Washington, DC

Guide for Security-Focused Configuration Management of Information Systems

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

UNITED STATES PATENT AND TRADEMARK OFFICE. AGENCY ADMINISTRATIVE ORDER Agency Administrative Order Series. Secure Baseline Attachment

NIST Cybersecurity Initiatives. ARC World Industry Forum 2014

PROTIVITI FLASH REPORT

Information Security Program Management Standard

HHS Information System Security Controls Catalog V 1.0

Automate Risk Management Framework

Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

SECURITY CONTROLS AND RISK MANAGEMENT FRAMEWORK

Information Security and Privacy Policy Handbook

NARA s Information Security Program. OIG Audit Report No October 27, 2014

Framework for Improving Critical Infrastructure Cybersecurity

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1

Guide for Applying the Risk Management Framework to Federal Information Systems

Department of Veterans Affairs VA Handbook Information Security Program

In Brief. Smithsonian Institution Office of the Inspector General

Information Security Guide For Government Executives. Pauline Bowen Elizabeth Chew Joan Hash

DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE

NIST Cybersecurity Framework & A Tale of Two Criticalities

CMS POLICY FOR THE INFORMATION SECURITY PROGRAM

NIST Cyber Security Activities

Guide for the Security Certification and Accreditation of Federal Information Systems

PUTTING NIST GUIDELINES FOR INFORMATION SECURITY CONTINUOUS MONITORING INTO PRACTICE

Guide for the Role and Responsibilities of an Information Security Officer Within State Government

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12

How to Use the Federal Risk and Authorization Management Program (FedRAMP) for Cloud Computing

Transcription:

Advancing Access to Restricted Data: Regulations, Compliance, Continuous Monitoring. OH MY!!! Cornell Institute for Social and Economic Research and Cornell Restricted Access Data Center

CISER s Mission:.anticipate and support the evolving computational and data needs of Cornell social scientists and economists throughout the entire research process and data life cycle. 2

CISER s Suite of Services: Hardware High-performance Windows computing environment Software Complete range of software applications Data Extensive archive; supplemented by ICPSR and ROPER memberships Data Use Support Training, consultations, research support, data programming services Secure Data Services Tiered secure environments, including administrative support 3

CRADC Cornell Restricted Access Data Center Established in 1999 as a pilot project Sponsored by National Science Foundation Secure computing environment with remote access 4

CRADC exists to: Deliver a high level of customized support House and protect restricted research data Help PIs comply with requirements of data distributors Provide a computing platform as flexible as data use agreements permit 5

Multiple Modes of Secure Access Secure Rooms/Dedicated Stand-alone computers Secure Rooms/Thin-client access to remote-servers Cornell Census Research Data Center (RDC) Institut für Arbeitsmarkt- und Berufsforschung (IAB) Secure Remote Access 6

Declining use of Public Data in Research http://obs.rc.fas.harvard.edu/chetty/admin_data_trends.pdf 7

Increasing use of Restricted Data in Research http://obs.rc.fas.harvard.edu/chetty/admin_data_trends.pdf 8

9

Secure research project stages: Proposal development Security Plan, data agreement process Project setup Data procurement, account creation Ongoing project support Continuous monitoring, audit support Project closeout processing De-provisioning, disposal of data 10

11

FIPS 199 SP 800-137 FIPS 200 SP 800-53 SP 800-37 SP 800-160 SP 800-53A 12

13

NIST SP 800-18 Guide for Developing Security Plans for Federal Information Systems The purpose of the system security plan is to provide an overview of the security requirements of the system and describe the controls in place or planned for meeting those requirements. The system security plan also delineates responsibilities and expected behavior of all individuals who access the system. The system security plan should be viewed as documentation of the structured process of planning adequate, cost-effective security protection for a system. 14

FIPS 199 Standards for Security Categorization of Federal Information and Information Systems 15

NIST SP 800-160 16

FIPS 200 Minimum Security Requirements for Federal Information and Information Systems 17

NIST SP 800-53 Rev 4 Security and Privacy Controls for Federal Information Systems and Organizations The security controls in NIST Special Publication 800-53 are designed to facilitate compliance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. Compliance is not about adhering to static checklists or generating unnecessary FISMA reporting paperwork. Rather, compliance necessitates organizations executing due diligence with regard to information security and risk management. Information security due diligence includes using all appropriate information as part of an organization-wide risk management program to effectively use the tailoring guidance and inherent flexibility in NIST publications so that the selected security controls documented in organization security plans meet the mission and the business requirements of organizations. Using the risk management tools and techniques that are available to organizations is essential in developing, implementing, and maintaining the safeguards and countermeasures with the necessary and sufficient strength of mechanism to address the current threats to organizational operations and assets, individuals, other organizations, and the Nation. Employing effective risk-based processes, procedures, and technologies will help ensure that all federal information systems and organizations have the necessary resilience to support ongoing federal responsibilities, critical infrastructure applications, and continuity of government. 18

19

20

NIST SP 800-160 (Draft) Systems Security Engineering: An Integrated Approach to Building Trustworthy Resilient Systems This publication addresses the engineering-driven actions necessary for developing a more defensible and survivable information technology (IT) infrastructure including the component products, systems, and services that compose the infrastructure. It starts with and builds upon a set of well-established International Standards for systems and software engineering published by the International Organization for Standardization (ISO), the International Electrotechnical Commission (IEC), and the Institute of Electrical and Electronic Engineers (IEEE) and infuses systems security engineering techniques, methods, and practices into those systems and software engineering processes. The ultimate objective is to address security issues from a stakeholder requirements and protection needs perspective and to use established organizational processes to ensure that such requirements and needs are addressed early in and throughout the life cycle of the system. 21

22

NIST SP 800-37 Guide for Applying the Risk Management Framework to Federal Information Systems The purpose of this publication is to provide guidelines for applying the Risk Management Framework to federal information systems to include conducting the activities of security categorization, security control selection and implementation, security control assessment, information system authorization, and security control monitoring. The guidelines have been developed: To ensure that managing information system-related security risks is consistent with the organization s mission/business objectives and overall risk strategy established by the senior leadership through the risk executive (function); To ensure that information security requirements, including necessary security controls, are integrated into the organization s enterprise architecture and system development life cycle processes; To support consistent, well-informed, and ongoing security authorization decisions (through continuous monitoring), transparency of security and risk managementrelated information, and reciprocity; and To achieve more secure information and information systems within the federal government through the implementation of appropriate risk mitigation strategies. 23

24

NIST SP 800-137 Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations Information security continuous monitoring (ISCM) is defined as maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions. This publication specifically addresses assessment and analysis of security control effectiveness and of organizational security status in accordance with organizational risk tolerance. Security control effectiveness is measured by correctness of implementation and by how adequately the implemented controls meet organizational needs in accordance with current risk tolerance (i.e., is the control implemented in accordance with the security plan to address threats and is the security plan adequate). 25

CRADC gateway to restricted access data at Cornell University. 26

Questions? ciser@cornell.edu cradc@cornell.edu ciser.cornell.edu 27