• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
NIST Risk Management Framework (RMF)
 

NIST Risk Management Framework (RMF)

on

  • 1,191 views

Overview of the NIST Risk Management Framework (RMF)

Overview of the NIST Risk Management Framework (RMF)

Statistics

Views

Total Views
1,191
Views on SlideShare
1,191
Embed Views
0

Actions

Likes
0
Downloads
23
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

CC Attribution-ShareAlike LicenseCC Attribution-ShareAlike License

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    NIST Risk Management Framework (RMF) NIST Risk Management Framework (RMF) Document Transcript

    • RISK Management Framework Risk Management Framework Description Phase 1: Certification Step 1: Categorize Information System Categorize Information System Categorize the impact rating of the information system using FIPS 199. Determine the high water mark impact rating for information types processed by the information system as specified in NIST SP 800-60 Rev. 1. Initial Risk Determination Determine whether selected security controls reduce risk to an acceptable level based on known vulnerabilities and potential threats. Review SSP Security Categorization Conduct an independent review of the SSP security categorization. Confirm that a contingency plan exists or is in the process of being created. System Security Plan (SSP) Update Update the SSP with any findings from independent reviews. Threat Identification Confirm that the Threat Statement identifies potential threats for the system boundary and also accounts for interconnections between other systems. Risk Assessment (RA) Confirm that the Risk Assessment (RA) identifies risks to the information system. Privacy Impact Assessment (PIA) Confirm that the Privacy Impact Assessment (PIA) identifies risks to the information system. Step 2: Select Security Controls Risk Approval Letter Verify the existence of a Risk Approval Letter. SSP Analysis Perform an SSP Analysis to determine the effectiveness of implemented or planned security controls in reducing risk to an acceptable level. System Security Plan Develop the SSP in accordance with NIST Guidance, OMB Memoranda and Circulars, FISMA Law, and Presidential Directives and Executive Orders. Ensure that the SSP adheres to Agency policies, the PCSP and the Program Security Plan if applicable. Step 3: Implement Security Controls Security Control Implementation Status Report Generate a Security Control Implementation Status Report to analyze security control effectiveness. SSP Document Maintenance Ensure that the SSP reflects information system changes. Step 4: Assess Security Controls Deviation Risk Assessment Report Issue a Deviation Risk Assessment Report that lists ST&E security control failures such as poorly implemented security controls or omissions. Findings & Recommendations Recommend corrective actions to reduce or eliminate vulnerabilities mentioned in the SAR. Identify Deviations in an Updated Risk Assessment Update the Risk Assessment to include any proposed or approved deviations. Deviations include waivers, exceptions and variances. The deviation process is typically described in the PCSP. Prepared by Jim W. DeRienzo Cloudburst Security, LLC
    • RISK Management Framework Risk Management Framework Plan of Actions and Milestones (POA&M) Description Update the POA&M Report to reflect progress in applying countermeasures that address weaknesses mentioned in the SAR. Project Plan Define the level of effort and resource requirements for conducting the ST&E: 1)Identify scope of effort (e.g., # of physical and virtual servers; Operating systems involved; # of applications; Geographic location of IT assets; Geographic location of security control staff). 2) Schedule demands (e.g., Reauthorization deadlines; POA&M deadlines). 3)Personnel/skills availability (e.g., Who is the Security Authorization Agent? Is an independent testing team available?). 4)Security Control Assessment (e.g., Evaluate security controls to verify that the controls are implemented correctly, operating as intended, and meeting the requirements of the SSP). Rules of Engagement Remain independent of system development and operations teams, as well as those responsible for correcting security deficiencies. Security Assessment Plan Conduct a comprehensive assessment of the management, operational and technical security controls for each General Support System (GSS) and Major Application (MA). Conduct technical assessments using a combination of automated tools and manual checks (e.g. vulnerability scans, packet analysis, pen tests and social engineering). Security Assessment Report (SAR) Using the approved ST&E test case procedures, assess each control and prepare the Security Assessment Report (SAR). A SAR is less than 10 pages and shows residual risk such as major issues or red flags to the system owner (i.e., % of management, operational and technical controls passed) ST&E Procedures Select or develop ST&E test cases to perform an assessment of each security control. Ensure that the DAA approves all selected ST&E test case procedures. ST&E Report Using the approved ST&E test case procedures, assess each control and prepare the ST&E Report. An ST&E Report is hundreds of pages based on individual test cases and artifacts (i.e., Contingency Plan). Prepared by Jim W. DeRienzo Cloudburst Security, LLC
    • RISK Management Framework Risk Management Framework Submit Security Authorization (SA) Package to DAA Description Assemble the final SA Package and submit to the DAA. The SA Package contains: Security Risk Assessment (RA) Approves System Security Plan (SSP) Completed Privacy Impact Assessments (PIA) Configuration Management Plan (CMP) Contingency Plan (CP) Security Test & Evaluation Report (ST&E Rpt.) Plan of Action and Milestones (POA&M) Security Assessment Report (SAR) Accreditation Decision letter (ATO) Interconnection Security Agreement (ISA) Memorandum of Understanding (MOU) / Memorandum of Agreement (MOA) Update Security Authorization Package Determine that the DAA has authorized any deviation from the baseline image prior to forwarding the Security Authorization Package to the DAA. Update the SSP and Risk Assessment based on the SAR. Vulnerability Assessment Provide an Executive Summary Report and a Technical Summary Report that shows vulnerabilities by IP Address, Open TCP/UDP Port and Common Vulnerability Enumeration (CVE). Include network devices, hosting providers, ISA partners, and local host checks for systems, applications and database servers. Local host checks must include credentialed scan results. Provide a Compliance Failure Report for USGCB, CIS, STIG, CAG 4.0, OWASP Top 10 or PII. Software code reviews are available upon request. Phase 2: Accreditation Step 5: Authorize Information System Accreditation Decision Letter Verify that the DAA has issued an Approval to Operate (ATO) based on the residual risks identified in the RA, and that the ATO includes any special conditions that apply. Accreditation Documentation Authority to Operate (ATO) - The system is authorized to operate under conditions outlined in the ATO letter. Interim Authority to Operate (IATO) - The system may operate, but has deficiencies that must be corrected within a specified time period. Denial/Revocation - The DAA denies or removes authorization to operate. Briefing materials Provide briefing materials to justify the risk decision. Recommendation Report Provide recommendations to correct, eliminate or reduce any deficiencies or vulnerabilities specified in the SAR. Prepared by Jim W. DeRienzo Cloudburst Security, LLC
    • RISK Management Framework Phase 3: Continuous Monitoring Step 6: Monitor Security Controls Configuration Management and Control Document Information System Changes - Determine that information system changes are documented. Security Impact Analysis - Analyze the security impact of proposed and actual system changes. Security Control Monitoring Security Control Selection - Selects controls for continuous monitoring assessment. Example: MA-4 (Remote Maintenance), SC-7 (Boundary Protection), SI-3 (Malicious Code Protection) Selected Security Control Assessment - Assess controls designated for continuous monitoring. Example: check VPN/remote access logs daily; check firewall rule set daily; update A/V daily. Status Report and Documentation Update System Security Plan - Periodically review and update the SSP Update POA&Ms - Review and update the POA&Ms Report Security Status to DAA - Report the security status of the information system to the System Owner, who in turn reports to the DAA. Prepared by Jim W. DeRienzo Cloudburst Security, LLC