understanding the risk management framework & (isc)2 cap module 4: life cycle

48

Upload: donald-e-hester

Post on 09-Feb-2017

144 views

Category:

Government & Nonprofit


4 download

TRANSCRIPT

Page 1: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Presenter
Presentation Notes
© 2016 Maze & Associates Revision 10 (April 2016) Images from Microsoft Clipart unless otherwise noted, Other Sources: NIST and Donald E. Hester Picture: Muir Beach, North of San Francisco, CA, Photo by Donald E. Hester all rights reserved
Page 2: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Presenter
Presentation Notes
Picture: Alcatraz Island, CA; Photo by Donald E. Hester all rights reserved NIST SP 800-37 Rev 1, § 2.2
Page 3: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle

Conduct Minimum Security Baseline Assessment

•Minimum Security Baseline Report

Assess Risks

•Risk Assessment Report

Perform Vulnerability Scanning

•Vulnerability Scan Results

Develop Security Plan

•Draft System Security Plan

Perform Certification Testing

•Certification Test Plan

Prepare Certification Package

•Certification Test Results

•Updated System Security Plan

•Certification Statement

Submit Certification Package

•Transmittal

Accredit System

•Accreditation Statement

Presenter
Presentation Notes
C & A Process Flow (800-37) Old Process Flow
Page 4: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle

System Owner

Authorizing OfficialCertification Agent

Prepare Documentation

Initiation Phase 1

1. Describe the System2. Categorize its C.I.A.3. Identify Threats to it4. Identify its Vulnerabilities5. Identify In-Place and

Planned Security Controls6. Determine its Initial Risks

InitiationNotify Officials & IdentifyResourcesPlanning Phase 3

1. Notify Program Officials2. Identify Resources Needed

and Plan execution of Activities

Initiation

Report & DocumentStatus

O&M Phase 9

1. Update Security Plan2. Update Plan of Action

& Milestones3. Report Status

Monitoring

Monitor SecurityControls

O&M Phase 9

1. Select In-Place Security Controls

2. Assess Selected Security Controls

Monitoring

Manage & ControlConfiguration

O&M Phase 9

1. Document System Changes

2. Analyze Security Impacts

Monitoring

Analyze, Update& Accept System Security PlanMultiple Phases 4-6

1. Review Security C.I.A.Categorizations

2. Analyze Security Plan 3. Update Security Plan 4. Obtain Authorizing

Official Acceptance ofSecurity Plan

Initiation

Assess & EvaluateSecurity ControlsIntegration & TestPhase 7

1. Prepare Documentation &Supporting Materials

2. Review Methods and Test Procedures

3. Assess & Evaluate In-Place Security Controls

4. Report SecurityAssessment Results

Certification

Document SecurityAccreditationIntegration & TestPhase 7

1. Transmit Security Accreditation Package

2. Update Security Plan

Accreditation

Document SecurityCertificationIntegration & TestPhase 7

1. Provide Findings and Recommendations

2. Update Security Plan3. Prepare Plan of Action &

Milestones4. Assemble Accreditation

Package

Certification

Make Security AccreditationDecisionIntegration & TestPhase 7

1. Determine Final Risk Levels

2. Accept Residual Risk

Accreditation

System Owner

Phase 1 – Task 1

Phase 3 – Task 6

Phase 1 – Task 2 Phase 1 – Task 3 Phase 2 – Task 4 Phase 2 – Task 5

Phase 3 – Task 7 Phase 4 – Task 8 Phase 4 – Task 9 Phase 4 – Task 10

Primary Responsibility

SDLC

NIST 800-37

Presenter
Presentation Notes
NIST 800-37 Risk Management & Certification and Accreditation Tasks Old Process Flow
Page 5: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Presenter
Presentation Notes
RMF Process, 3 Phases, 6 Steps NIST SP 800-37 Rev 1 Draft NIST SP 800-37 Rev 1 Draft 3 Phases were in the draft of NIST SP 800-37 rev1 but taken out of the final document
Page 6: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Presenter
Presentation Notes
RMF Process Flow (800-37 rev 1) NIST SP 800-37 Rev 1, § 2.1
Page 7: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle

Categorize

Select

Implement

Assess

Authorize

Monitor

Presenter
Presentation Notes
Risk Management Framework (RMF) NIST SP 800-37 Rev 1, § 2.1
Page 8: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle

Categorize

Select

Implement

Assess

Authorize

Monitor

Presenter
Presentation Notes
Categorize Categorize the information system and the information processed, stored, and transmitted by that system based on an impact analysis. FIPS 199 NIST SP 800-60 NIST SP 800-37 Rev 1, § 2.1
Page 9: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle

Categorize

Select

Implement

Assess

Authorize

Monitor

Presenter
Presentation Notes
Select Select an initial set of baseline security controls for the information system based on the security categorization; tailoring and supplementing the security control baseline as needed based on an organizational assessment of risk and local conditions. FIPS 200 NIST SP 800-53 NIST SP 800-37 Rev 1, § 2.1
Page 10: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle

Categorize

Select

Implement

Assess

Authorize

Monitor

Presenter
Presentation Notes
Implement Implement the security controls and describe how the controls are employed within the information system and its environment of operation. Various NIST SP and IR OMB Memorandum NIST SP 800-37 Rev 1, § 2.1
Page 11: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle

the controls are implemented correctly, operating as intended, and producing the desired outcome

Categorize

Select

Implement

Assess

Authorize

Monitor

Presenter
Presentation Notes
Assess Assess the security controls using appropriate assessment procedures to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system. NIST SP 800-53A NIST SP 800-115 NIST SP 800-37 Rev 1, § 2.1
Page 12: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle

Categorize

Select

Implement

Assess

Authorize

Monitor

Presenter
Presentation Notes
Authorize Authorize information system operation based on a determination of the risk to organizational operations and assets, individuals, other organizations, and the Nation resulting from the operation of the information system and the decision that this risk is acceptable. NIST SP 800-37 Rev 1 NIST SP 800-37 Rev 1, § 2.1
Page 13: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle

Categorize

Select

Implement

Assess

Authorize

Monitor

Presenter
Presentation Notes
Monitor Monitor the security controls in the information system on an ongoing basis including assessing control effectiveness, documenting changes to the system or its environment of operation, conducting security impact analyses of the associated changes, and reporting the security state of the system to designated organizational officials. NIST SP 800-37 Rev 1, § 2.1
Page 14: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Presenter
Presentation Notes
Each part of the process has a NIST Document NIST SP 800-100 Chapter 10
Page 15: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle

Document RememberNIST SP 800-37 C & A program, overall process, guidelinesFIPS 199 Standard to define criticality / sensitivityNIST SP 800-60 Guideline to define criticality / sensitivityFIPS 200 Standard to select controlsNIST SP 800-53 Guidelines to selecting controls, control catalog NIST SP 800-53A Guidelines for assessing controls, auditNIST SP 800-30 Risk Assessment guidelinesNIST SP 800-18 Guidelines for System Security PlansNIST SP 800-64 Guidelines for Security and SDLCNIST SP 800-70 Security Configuration Checklist ProgramNIST SP 800-47 Guideline for System Interconnections (MOU/MOA)NIST SP 800-34 Contingency Planning GuideNIST SP 800-61 Computer Security Incident Handling Guide

Presenter
Presentation Notes
Key NIST Documents
Page 16: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Presenter
Presentation Notes
C & A / RMF There are multiple frameworks used for FISMA Compliance DoD uses DITSCAP, DIACAP, moving toward DIARMF NSA and intelligence agencies use NIACAP Public Agencies use NIST’s C&A and moving to the new RMF There is movement ahead to come up with one framework NIST SP 800-53 rev 3 is the first move in that direction adding DoD controls to the NIST control catalog Lots of challenges ahead DoD and NSA have staff who do what NIST does, they will not want to give that up NIST has the mandate from congress and will eventually have the framework used by the entire federal government (input from all agencies of course) Joint Task Force Transformation Initiative Interagency Working Group NIACAP: National Information Assurance Certification and Accreditation Process (NSTISSI No. 1000) DITSCAP: DoD Information Technology Security Certification and Accreditation Process (DoD Instruction 5200.40) DIACAP: DoD Information Assurance Certification and Accreditation Process (DoD Directive 8510.01) C&A: Certification and Accreditation (NIST SP 800-37) RMF: Risk Management Framework (NIST SP 800-37 Rev 1) Must the Department of Defense and the Director of National Intelligence (DNI) follow OMB policy and NIST guidance? Provided that DOD and DNI internal security standards and policies are as stringent as OMB’s policies and NIST’s standards, they must only follow OMB’s reporting policies. However, please note that NIST publication SP-800-53 Revision 3 (issued in August 2009) was developed jointly by NIST, the Department of Defense (DOD) and the intelligence community through the Joint Task Force Transformation Initiative Interagency Working Group. Therefore, DOD and the intelligence community must follow this publication. - OMB M-10-15 - FY 2010 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management “With the rewrite of NIST 800-37, the new document represents a convergence of information security standards, guidelines and best standards across agencies. As a result, the DoD and the Intelligence community will begin to transition away from DIACAP toward NIST over time.” https://www.isc2.org/cap-change-faqs.aspx
Page 17: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle

Methodology Phase 1 Phase 2 Phase 3 Phase 4NIST SP 800-37

Initiation Security Certification

Security Accreditation

Continuous Monitoring

NIACAP Definition Verification Validation PostaccreditationDITSCAP Definition Verification Validation PostaccreditationDIACAP Definition Verification Validation Postaccreditation(ISC)2 CAP Preparation Execution Maintenance

Preparation Execution MaintenanceRMF Step

1RMF Step

2RMF Step

3RMF Step

4RMF Step 5 RMF Step 6

Categorize Select Implement Assess Authorize Monitor

Presenter
Presentation Notes
Comparison C & A and RMF Methodology Risk Management Framework (RMF) NIST SP 800-37 Rev 1 DIACAP includes a 5th phase “Decommission”
Page 18: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Presenter
Presentation Notes
NIST C & A Phases (NIST SP 800-37) NIST SP 800-100 This is the old NIST 4 phase approach as documented in NIST SP 800-37. They have since moved to a 6 step process with NIST SP 800-37 Rev 1.
Page 19: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Presenter
Presentation Notes
NIACAP C & A Phases NSTISSI 1000
Page 20: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Presenter
Presentation Notes
NIACAP Phase 1 NSTISSI 1000
Page 21: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Presenter
Presentation Notes
NIACAP Phase 2 NSTISSI 1000
Page 22: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Presenter
Presentation Notes
NIACAP Phase 3 NSTISSI 1000
Page 23: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Presenter
Presentation Notes
NIACAP Phase 4 NSTISSI 1000
Page 24: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Presenter
Presentation Notes
DIACAP Source: DoDI 8510.01 28-NOV-2007
Page 25: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle

This instruction applies to: (2) All DoD IT that receive, process, store, display, or transmit DoD information. These technologies are broadly grouped as DoD IS, platform IT (PIT), IT services, and IT products. This includes IT supporting research, development, test and evaluation (T&E), and DoD-controlled IT operated by a contractor or other entity on behalf of the DoD. - DoDI 8510.01, para 2a

Page 26: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle

Initiate and Plan

Implement and Validate

Decision to Authorize

Maintain Authorization Decommission

Categorize Select Implement Assess Authorize Monitor

Presenter
Presentation Notes
DIACAP ~ “DIARMF”
Page 27: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Page 28: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Presenter
Presentation Notes
Photo by Donald E. Hester all rights reserved NIST SP 800-37 Rev 1, § 2.2
Page 29: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle

Security is most useful and cost-effective when such integration begins with a system development or integration project initiation, and is continued throughout the SDLC through system disposal. A number of federal laws and directives require integrating security into the SDLC, including the Federal Information Security Management Act (FISMA) and Office of Management and Budget (OMB) Circular A-130, Appendix III.

National Institute of Standards and Technology (NIST) Special Publication (SP) 800-64 Rev. 1, Security Considerations in the Information System Development Life Cycle, presents a framework for incorporating security into all phases of the SDLC,

Presenter
Presentation Notes
RMF and C&A work with the SDLC Security is most useful and cost-effective when such integration begins with a system development or integration project initiation, and is continued throughout the SDLC through system disposal. A number of federal laws and directives require integrating security into the SDLC, including the Federal Information Security Management Act (FISMA) and Office of Management and Budget (OMB) Circular A-130, Appendix III National Institute of Standards and Technology (NIST) Special Publication (SP) 800-64 Rev. 1, Security Considerations in the Information System Development Life Cycle, presents a framework for incorporating security into all phases of the SDLC, Reference: NIST SP 800-100, Information Security Handbook: A Guide for Managers Read: Official (ISC)2 Guide to CAP CBK Second Edition Chapter 1 Table 1.8 Information Technology Security Activities in the SDLC
Page 30: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Presenter
Presentation Notes
Risk Management Framework in the SDLC Reference: NIST SP 800-100, Information Security Handbook: A Guide for Managers
Page 31: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle

All information technology (IT) projects have a starting point, what is commonly referred to as the initiation phase. During the initiation phase, the organization establishes the need for a particular system and documents its purpose. The information to be processed, transmitted, or stored is typically evaluated, as well as who is required access to such information and how (in high-level terms). In addition, it is often determined whether the project will be an independent information system or a component of an already-defined system. A preliminary risk assessment is typically conducted in this phase, and security planning documents are initiated (system security plan). NIST SP 800-100

Presenter
Presentation Notes
Initiation Phase Document the sensitivity of the system with the risk assessment Identify threats and vulnerabilities Control selection With limited resources you will have to prioritize All information technology (IT) projects have a starting point, what is commonly referred to as the initiation phase. During the initiation phase, the organization establishes the need for a particular system and documents its purpose. The information to be processed, transmitted, or stored is typically evaluated, as well as who is required access to such information and how (in high-level terms). In addition, it is often determined whether the project will be an independent information system or a component of an already-defined system. A preliminary risk assessment is typically conducted in this phase, and security planning documents are initiated (system security plan). NIST SP 800-100
Page 32: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Presenter
Presentation Notes
Risk Management Framework in the SDLC Reference: NIST SP 800-100, Information Security Handbook: A Guide for Managers
Page 33: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle

During this phase, the system is designed, purchased, programmed, developed, or otherwise constructed. This phase often consists of other defined cycles, such as the system development cycle or the acquisition cycle.

During the first part of the development/acquisition phase, the organization should simultaneously define the system’s security and functional requirements. These requirements can be expressed as technical features (e.g., access control), assurances (e.g., background checks for system developers), or operational practices (e.g., awareness and training). During the last part of this phase, the organization should perform developmental testing of the technical and security features/functions to ensure that they perform as intended prior to launching the implementation and integration phase. NIST SP 800-100

Presenter
Presentation Notes
Acquisition / Development Phase Cost-benefit analysis Control selection Develop SSP During this phase, the system is designed, purchased, programmed, developed, or otherwise constructed. This phase often consists of other defined cycles, such as the system development cycle or the acquisition cycle. During the first part of the development/acquisition phase, the organization should simultaneously define the system’s security and functional requirements. These requirements can be expressed as technical features (e.g., access control), assurances (e.g., background checks for system developers), or operational practices (e.g., awareness and training). During the last part of this phase, the organization should perform developmental testing of the technical and security features/functions to ensure that they perform as intended prior to launching the implementation and integration phase. NIST SP 800-100
Page 34: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Presenter
Presentation Notes
Risk Management Framework in the SDLC Reference: NIST SP 800-100, Information Security Handbook: A Guide for Managers
Page 35: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle

In the implementation phase, the organization configures and enables system security features, tests the functionality of these features, installs or implements the system, and finally, obtains a formal authorization to operate the system. Design reviews and system tests should be performed before placing the system into operation to ensure that it meets all required security specifications. NIST SP 800-100

Presenter
Presentation Notes
Implementation Phase Ensure controls are in place and functioning correctly SSP updated as needed Certification test Certification test results reporting Authorization to operate (go live) In the implementation phase, the organization configures and enables system security features, tests the functionality of these features, installs or implements the system, and finally, obtains a formal authorization to operate the system. Design reviews and system tests should be performed before placing the system into operation to ensure that it meets all required security specifications. NIST SP 800-100
Page 36: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Presenter
Presentation Notes
Risk Management Framework in the SDLC Reference: NIST SP 800-100, Information Security Handbook: A Guide for Managers
Page 37: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle

An effective security program demands comprehensive and continuous understanding of program and system weaknesses. In the operation and maintenance phase, systems and products are in place and operating, enhancements and/or modifications to the system are developed and tested, and hardware and/or software is added or replaced. During this phase, the organization should continuously monitor performance of the system to ensure that it is consistent with preestablished user and security requirements, and needed system modifications are incorporated. NIST SP 800-100

Presenter
Presentation Notes
Operations/Maintenance Phase An effective security program demands comprehensive and continuous understanding of program and system weaknesses. In the operation and maintenance phase, systems and products are in place and operating, enhancements and/or modifications to the system are developed and tested, and hardware and/or software is added or replaced. During this phase, the organization should continuously monitor performance of the system to ensure that it is consistent with preestablished user and security requirements, and needed system modifications are incorporated. NIST SP 800-100
Page 38: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Presenter
Presentation Notes
Risk Management Framework in the SDLC Reference: NIST SP 800-100, Information Security Handbook: A Guide for Managers
Page 39: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle

The disposal phase of the system life cycle refers to the process of preserving (if applicable) and discarding system information, hardware, and software. This step is extremely important because during this phase, information, hardware, and software are moved to another system, archived, discarded, or destroyed. If performed improperly, the disposal phase can result in the unauthorized disclosure of sensitive data. NIST SP 800-100

Presenter
Presentation Notes
Disposition Phase Disposal of the system System replacement and/or upgrade Secure disposal Archive data Data migration
Page 40: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Presenter
Presentation Notes
Additional Study Resource Check out Section 3.6 Security Activities within the SDLC, NIST SP 800-100, Information Security Handbook: A Guide for Managers (March 2007)
Page 41: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle

should be risk-based

Presenter
Presentation Notes
Challenges to Implementation Failing to follow the System Development Life Cycle (SDLC) Rapid deployment Alternative is to have multiple tracks Normal full C & A track Fast track for interim authorization to operate, followed by full C & A Flexibility, should be risk-based
Page 42: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle

Methodology Phase 1 Phase 2 Phase 3 Phase 4NIST SP 800-37

Initiation Security Certification

Security Accreditation

Continuous Monitoring

NIACAP Definition Verification Validation PostaccreditationDITSCAP Definition Verification Validation PostaccreditationDIACAP Definition Verification Validation Postaccreditation(ISC)2 CAP* Preparation Execution Maintenance

Preparation Execution MaintenanceRMF Step

1RMF Step

2RMF Step

3RMF Step

4RMF Step 5 RMF Step 6

Categorize Select Implement Assess Authorize Monitor

Risk Management Framework (RMF) NIST SP 800-37 Rev 1

Presenter
Presentation Notes
Comparison C & A and RMF Methodology *(ISC)2 Domains from March 2010 to November 2010 and NIST SP 800-37 Rev 1 Draft NIACAP: National Information Assurance Certification and Accreditation Process (NSTISSI No. 1000) DITSCAP: DoD Information Technology Security Certification and Accreditation Process (DoD Instruction 5200.40) DIACAP: DoD Information Assurance Certification and Accreditation Process (DoD Directive 8510.01) C&A: Certification and Accreditation (NIST SP 800-37) RMF: Risk Management Framework (NIST SP 800-37 Rev 1)
Page 43: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle

Initiation (Definition)

Certification(Verification)

Accreditation(Validation)

Continuous Monitoring(Postaccreditation)

Presenter
Presentation Notes
SDLC and C & A Overlay Reference: NIST SP 800-100, Information Security Handbook: A Guide for Managers
Page 44: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle

Categorize

SelectImplement

Assess

Authorize

Monitor

Presenter
Presentation Notes
SDLC and RMF Overlay Reference: NIST SP 800-100, Information Security Handbook: A Guide for Managers Using the 6 steps of the RMF as it was documented in NIST SP 80-37 Rev 1
Page 45: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Presenter
Presentation Notes
NIST SP 800-39 Draft This graph was removed from the Final Public Draft of NIST SP 800-39 released Dec 2010
Page 46: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Page 47: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Presenter
Presentation Notes
Summary
Page 48: Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Presenter
Presentation Notes
Class Discussion: Life Cycle You are an auditor assessing a system for the certification phase. You notice the last time the system security plan and risk assessment were modified was prior to the last accreditation/authorization. What would this indicate to you as an auditor? What is the benefit of using a cycle to describe the process of authorization? What is the best time to start the RMF process when developing or purchasing a new system? What happens in reality?