SlideShare a Scribd company logo
1 of 53
Download to read offline
Guide for Applying The
Risk Management
Framework to Federal
Information Systems
A Security Life Cycle Approach
Abdulmajeed, Joanna, Xiaoqian, Guillermo, Julio
INTRODUCTION
-Organizations depend on information technology and the information systems that are developed from that
technology to successfully carry out their missions and business functions.
-Threats to information and information systems include environmental disruptions, human or machine errors, and
purposeful attacks.
- Successful attacks on public and private sector information systems can result in serious or grave damage to the
national and economic security interests of the United States.
-Given the significant and growing danger of these threats, it is imperative that leaders at all levels of an organization
understand their responsibilities for achieving adequate information security and for managing information system-
related security risks.
BACKGROUND
A publication, developed by the Joint Task Force Transformation Initiative Working Group, transforms the traditional
Certification and Accreditation (C&A) process into the six-step Risk Management Framework (RMF).
- building information security capabilities into federal information systems through the application of state-of-the-
practice management, operational, and technical security controls;
- maintaining awareness of the security state of information systems on an ongoing basis through enhanced
monitoring processes;
-providing essential information to senior leaders to facilitate decisions regarding the acceptance of risk to
organizational operations and assets, individuals, other organizations, and the Nation arising from the operation and
use of information systems.
PURPOSE AND APPLICABILITY
-The purpose of this publication is to provide guidelines for applying the Risk Management Framework to federal
information systems to include conducting the activities of security categorization, security control selection and
implementation, security control assessment, information system authorization, and security control monitoring.
-The guidelines have been broadly developed from a technical perspective to complement similar guidelines for
national security systems and may be used for such systems with the approval of appropriate federal officials
exercising policy authority over such systems. State, local, and tribal governments, as well as private sector
organizations are encouraged to consider using these guidelines, as appropriate.
TARGET AUDIENCE
This publication serves individuals associated with the design, development, implementation, operation, maintenance,
and disposition of federal information systems including:
-Individuals with mission/business ownership responsibilities or fiduciary responsibilities;
-Individuals with information system development and integration responsibilities;
-Individuals with information system and/or security management/oversight responsibilities;
-Individuals with information system and security control assessment and monitoring responsibilities;
-Individuals with information security implementation and operational responsibilities
ORGANIZATION OF THIS SPECIAL PUBLICATION
-CHAPTER TWO describes the fundamental concepts associated with managing information system-related security
risks.
-CHAPTER THREE describes the tasks required to apply the Risk Management Framework to information systems.
-SUPPORTING APPENDICES s provide additional information regarding the application of the Risk Management
Framework to information systems
MANAGING INFORMATION SYSTEM-RELATED SECURITY RISKS:
- This describes the basic concepts associated with managing information system-related
security risks. These concepts include: incorporating risk management principles and best
practices into organization-wide strategic planning considerations, core missions and
business processes, and supporting organizational information systems.
The Fundamentals
Cont…,
- The Risk Management Framework (RMF): provides a disciplined and structured process that integrates information security and risk management activities into the
system development life cycle.The RMF steps include: -> • Categorize. • Select. • Implement. • Assess. • Authorize. • Monitor.
Cont…,
SYSTEM DEVELOPMENT LIFE CYCLE:
Is the most cost-effective and efficient method for an organization to ensure that its protection strategy is implemented.
- INFORMATION SYSTEM BOUNDARIES: Information System Boundaries are established in coordination with the security categorization process
and before the development of security plans.
- These sections provide general guidelines to assist organizations in establishing appropriate system boundaries to achieve cost-effective
solutions for managing information security-related risks from the operation and use of information systems:
- Establishing Information System Boundaries.
- Boundaries for Complex Information Systems.
- Changing Technologies and the Effect on Information System Boundaries.
There are three types of security controls for information systems that can be employed by an organization: (i) system-specific controls (ii) common
controls (iii) hybrid controls. THIS graph illustrates security control allocation within an organization and using the RMF:
SECURITY CONTROL ALLOCATION
The Process
Executing The Risk Management Framework Tasks
- The process of applying Risk Management Framework to Federal Information Systems
- RMF tasks are executed concurrently with or as part of system development life cycle processes,
taking into account appropriate dependencies, to ensure the effective integration of management
information systems-related security risks with system development life cycle processes.
- To achieve this, RMF steps and associated task can be applied to both new and development and
legacy information systems.
- Legacy Systems - Steps 1 - 3.
- If weaknesses/deficiencies are discovered steps 3 - 6
- Else Move to Last Step (Monitoring)
The Process
RMF Tasks:
- RMF tasks support the selection, development, implementation, assessment, authorization, and
ongoing monitoring of common controls inherited by organizational information systems.
1. RMF STEP 1 – CATEGORIZE INFORMATION SYSTEM
2. RMF STEP 2 – SELECT SECURITY CONTROLS
3. RMF STEP 3 – IMPLEMENT SECURITY CONTROLS
4. RMF STEP 4 – ASSESS SECURITY CONTROLS
5. RMF STEP 5 – AUTHORIZE INFORMATION SYSTEM
6. RMF STEP 6 – MONITOR SECURITY CONTROLS
RMF STEP 1 – CATEGORIZE INFORMATION SYSTEM
- TASK1-1: Categorize the information system and document the results of the security categorization in the
security plan.
- TASK1-2: Describe the information system (including system boundary) and document the description in the
security plan.
- TASK1-3: Register the information system with appropriate organizational program/management offices.
Milestone Checkpoint # 1
- Has the organization completed a security categorization of the information system (informed by the initial risk assessment) including the
information to be processed, stored, and transmitted by the system?
- Are the results of the security categorization process for the information system consistent with the organization’s enterprise architecture and
commitment to protecting organizational mission/business processes?
- Do the results of the security categorization process reflect the organization’s risk management strategy?
- Has the organization adequately described the characteristics of the information system?
- Has the organization registered the information system for purposes of management, accountability, coordination, and oversight?
RMF STEP 2 – SELECT SECURITY CONTROLS
- Task 2-1: Identify the security controls that are provided by the organization as common controls for
organizational information
- Task 2-2: Select the security controls for the information system and document the controls in the security plan
- Task 2-3: Develop a strategy for the continuous monitoring of security control effectiveness and any proposed or
actual changes to the information system and its environment of operation
- Review and approve the security plan
-
Milestone Checkpoint # 2
- Has the organization allocated all security controls to the information system as system-specific, hybrid, or common controls?
- Has the organization used its risk assessment (either formal or informal) to inform and guide the security control selection
process?
- Has the organization identified authorizing officials for the information system and all common controls inherited by the
system?
- Has the organization tailored the baseline security controls to ensure that the controls, if implemented, adequately mitigate
risks to organizational operations and assets, individuals, other organizations, and the Nation?
- Has the organization addressed minimum assurance requirements for the security controls employed within and inherited by
the information system?
Milestone Checkpoint # 2
- Has the organization consulted information system owners when identifying common controls to ensure that the security
capability provided by the inherited controls is sufficient to deliver adequate protection?
- Has the organization supplemented the common controls with system-specific or hybrid controls when the security control
baselines of the common controls are less than those of the information system inheriting the controls?
- Has the organization documented the common controls inherited from external providers?
- Has the organization developed a continuous monitoring strategy for the information system (including monitoring of security
control effectiveness for system-specific, hybrid, and common controls) that reflects the organizational risk management
strategy and organizational commitment to protecting critical missions and business functions?
- Have appropriate organizational officials approved security plans containing system-specific, hybrid, and common controls?
RMF STEP 3 – IMPLEMENT SECURITY CONTROLS
- TASK 3-1: Implement the security controls specified in the security plan.
- TASK 3-2: Document the secuirty control implementation, as appropiate, in the security plan, providing a
functional description of the control implementation (including planned input, expected behaviou, and expected
outputs).
Milestone Checkpoint # 3
- Has the organization allocated security controls as system-specific, hybrid, or common controls consistent with the enterprise
architecture and information security architecture?
- Has the organization demonstrated the use of sound information system and security engineering methodologies in
integrating information technology products into the information system and in implementing the security controls contained
in the security plan?
- Has the organization documented how common controls inherited by organizational information systems have been
implemented?
- Has the organization documented how system-specific and hybrid security controls have been implemented within the
information system taking into account specific technologies and platform dependencies?
- Has the organization taken into account the minimum assurance requirements when implementing security controls?
RMF STEP 4 – ASSESS SECURITY CONTROLS
- TASK 4-1: Develop ,review, and approve a plan to assess the security controls.
- TASK 4-2: Assess the security controls in according with the assessment procedures defined in the security assessment plan
- TASK 4-3: Prepare the security assessment report documenting the issues, findings, and recommendations from the security
control assessment.
- TASK 4-4: Conduct initial remediation actions on security controls based on the findings and recommendations of the security
assessment report and reassess remediated control(s) as appropriate.
-
Milestone Checkpoint # 4
- Has the organization developed a comprehensive plan to assess the security controls employed within or inherited by the
information system?
- Was the assessment plan reviewed and approved by appropriate organizational officials?
- Has the organization considered the appropriate level of assessor independence for the security control assessment?
- Has the organization provided all of the essential supporting assessment-related materials needed by the assessor(s) to
conduct an effective security control assessment?
- Has the organization examined opportunities for reusing assessment results from previous assessments or from other
sources?
- Did the assessor(s) complete the security control assessment in accordance with the stated assessment plan?
Milestone Checkpoint # 4
- Did the organization receive the completed security assessment report with appropriate findings and recommendations
from the assessor(s)?
- Did the organization take the necessary remediation actions to address the most important weaknesses and deficiencies in the
information system and its environment of operation based on the findings and recommendations in the security assessment
report?
- Did the assessor reassess the remediated controls for effectiveness to provide the authorization official with an unbiased,
factual security assessment report on the weaknesses or deficiencies in the system?
- Did the organization update appropriate security plans based on the findings and recommendations in the security assessment
report and any subsequent changes to the information system and its environment of operation?
RMF STEP 5 – ASSESS SECURITY CONTROLS
- TASK 5-1: Prepare the plan of action and milestone based on the findings and recommendations of the security assessment
report including any remediations actions taken
- TASK 5-2: Assemble the security authorization package and submit the package to the authorizing official for adjudication
- TASK 5-3: Determine the risk to organizational operations (including mission, functions, image, or reputation), organizations,
or the nation
- TASK 5-4: Determine if the risk to organizational operations, organizational assets, individuals, other organizations, or the
Nations is acceptable
-
Milestone Checkpoint # 5
- Did the organization develop a plan of action and milestones reflecting organizational priorities for addressing the remaining
weaknesses and deficiencies in the information system and its environment of operation?
- Did the organization develop an appropriate authorization package with all key documents including the security plan, security
assessment report, and plan of action and milestones (if applicable)?
- Did the final risk determination and risk acceptance by the authorizing official reflect the risk management strategy developed
by the organization and conveyed by the risk executive (function)?
- Was the authorization decision conveyed to appropriate organizational personnel including information system owners and
common control providers?
RMF STEP 6 – MONITOR SECURITY CONTROLS
- TASK 6-1: Determine the security impact of proposed or actual changes to the information system and its
environment of operation
- TASK 6-2: ASsess the technical, management, and operational security controls employed within and inherited
by the information system in accordance with the organization-defined monitoring strategy.
- TASK 6-3: Conduct remediation actions based on the results of ongoing monitoring activities, assessment of
risk, and outstanding items in the plan of action and milestone.
- TASK 6-4: Update the security plan, security assessment report, and plan of action and milestone based on the
result of the continuous monitoring process.
RMF STEP 6 – MONITOR SECURITY CONTROLS
- TASK 6-5: Report the security status of the information system (including the effectiveness of security controls
employed within and inherited by the system) to the authorizing official and other appropriate organizational
officials on an ongoing basis in accordance with the monitoring strategy.
- TASK 6-6: Review the reported security status of the information system (including the effectiveness of security
controls employed within and inherited by the system) on an ongoing basis in accordance with the monitoring
strategy to determine whether the risk to organizational operations, organizational assets, individuals, other
organizations, or the nation remains acceptable.
- TASK 6-7: Implement an information system disposal strategy, when needed, which executes required actions
when a system is removed from servoce
Milestone Checkpoint # 6
- Is the organization effectively monitoring changes to the information system and its environment of operation
including the effectiveness of deployed security controls in accordance with the continuous monitoring strategy?
- Is the organization effectively analyzing the security impacts of identified changes to the information system and
its environment of operation?
- Is the organization conducting ongoing assessments of security controls in accordance with the monitoring
strategy?
- Is the organization taking the necessary remediation actions on an ongoing basis to address identified
weaknesses and
deficiencies in the information system and its environment of operation?
Milestone Checkpoint # 6
- Does the organization have an effective process in place to report the security status of the information system
and its environment of operation to the authorizing officials and other designated senior leaders within the
organization on an ongoing basis?
- Is the organization updating critical risk management documents based on ongoing monitoring activities?
- Are authorizing officials conducting ongoing security authorizations by employing effective continuous
monitoring activities and communicating updated risk determination and acceptance decisions to information
system owners and common control providers?
Security Authorization
AUTHORIZATION PACKAGE:
The security authorization package documents the results of the security control assessment and provides the authorizing official with essential
information needed to make a risk-based decision on whether to authorize operation of an information system or a designated set of common
controls. The authorization package contains the following documents:
1. Security plan
2. Security assessment report
3. Plan of action and milestones
Organizations may choose to develop an executive summary from the detailed findings that are generated during a security control
assessment. An executive summary provides an authorizing official with an abbreviated version of the security assessment report
focusing on the highlights of the assessment, synopsis of key findings, and recommendations for addressing weaknesses and
deficiencies in the security controls.
Authorization Decisions AUTHORIZATION DECISION DOCUMENT
The authorization decision document transmits the final
security authorization decision from the authorizing official
to the information system owner or common control
provider and other key organizational officials, as
appropriate. The authorization decision document contains
the following information:
● Authorization decision.
● Terms and conditions for the authorization.
● Authorization termination date.
● Risk executive (function) input (if provided).
Authorization decisions are based on the content
of the authorization package including inputs from
the organization’s risk executive (function) and
any additional supporting documentation required
by the authorizing official. The security
authorization package provides comprehensive
information on the security state of the
information system.
When monitoring is conducted in accordance with the needs of the authorizing official,
that monitoring results in the production of key information needed to determine:
● (i) the current security state of the information system (including the effectiveness of
the security controls employed within and inherited by the system).
● (ii) the resulting risks to organizational operations, organizational assets, individuals,
other organizations, and the Nation.
● (iii) whether to authorize continued operation of the system or continued use of
common controls inherited by organizational information systems.
ONGOING AUTHORIZATION
Reauthorization
● Formal reauthorization actions occur at the discretion of the authorizing official in
accordance with federal or organizational policy.
● If a formal reauthorization action is required, organizations maximize the use of
security and risk-related information produced as part of the continuous monitoring
processes currently in effect.
● Formal reauthorization actions, if initiated, can be either time-driven or event-
driven.
● Time-driven reauthorizations occur when the authorization termination date is
reached (if one is specified).
● If the information system is under ongoing authorization (i.e., a continuous
monitoring program is in place that monitors all implemented common, hybrid, and
system-specific controls with the frequency specified in the continuous monitoring
strategy), time-driven reauthorizations may not be necessary.
EVENT-DRIVEN TRIGGERS:
Organizations may define event-driven triggers (i.e., indicators and/or prompts that
cause a pre- defined organizational reaction) for both ongoing authorization and
reauthorization. Event-driven triggers include, but are not limited to:
1. (i) new threat/vulnerability/impact information;
2. (ii) an increased number of findings, weaknesses, and/or deficiencies from
the continuous monitoring program;
3. (iii) new missions/business requirements;
4. (iv) a change in the Authorizing Official;
5. (v) a significant change in risk assessment findings;
6. (vi) significant changes to the information system, common controls, or the
environment of operation; or
7. (vii) organizational thresholds being exceeded.
AUTHORIZATION
APPROACHES
Organizations can choose from three different approaches when
planning for and conducting security authorizations to include:
1. (i) an authorization with a single authorizing official.
2. (ii) an authorization with multiple authorizing officials.
3. (iii) leveraging an existing authorization.
The sharing of the authorization package (including the
security plan, security assessment report, plan of action and
milestones, and authorization decision document) is
accomplished under terms and conditions agreed upon by all
parties (i.e., the owning organization and the leveraging
organization).
TYPE
AUTHORIZATION
A type authorization is an official authorization decision to
employ identical copies of an information system or
subsystem (including hardware, software, firmware, and/or
applications)
Examples of type authorizations include:
1. (i) an authorization of the hardware and software
applications for a standard financial system deployed
in several locations around the world; or
2. (ii) an authorization of a common workstation or
operating environment (i.e., hardware, operating
system, middleware, and applications) deployed to all
operating units within an organization.
Roles and Responsibilities
- Head of Agency (CEO) - The head of agency is the highest-level senior official or executive within an
organization with overall responsibility to provide protection from high risk threats. The head is responsible for
assuring that;
- Information security management processes are integrated with strategic & operational planning
processes
- Provide information that support the operations and assets under their control
- Ensure the organization has trained personnel sufficient to assist in complying with policies, standards
and guidelines
- Establish a level of due diligence within an organization that promotes a climate for mission and business
success
(Cont.)
- Risk Executive (function) - Helps ensure the overall strategic goals and objectives in carrying out core
missions and functions. The executive coordinates with senior leadership to:
- Provides a greater understanding of the integrated operations of an organization
- Develop risk management strategies
- Assist the sharing of risk related information within the organization
- Help ensure effective risk acceptance decisions
- Identify organization risk from the operation and use of information systems
- Ensure that authorization decisions consider all factors necessary for mission and business success
(Cont..)
- Chief Information Officer - Responsible for designating a senior information security officer and developing
and maintaining information security policies, procedures, and control techniques to address all applicable
requirements;
- Ensure that personnel are adequately trained
- Report overall effectiveness to the head of the federal agency as well as the organization’s information
security program, including progress of remedial actions
- Ensure that information security program is effectively implemented
- Information systems are covered by approved security plans and are authorized to operate
(Cont..)
- Ensure that personnel are adequately trained
- Report overall effectiveness to the head of the federal agency as well as the organization’s information
security program, including progress of remedial actions
- Ensure that information security program is effectively implemented
- Information systems are covered by approved security plans and are authorized to operate
- The role of chief information officer has inherent U.S. Government authority and is assigned to government
personnel only.
(Cont..)
- Information Owner/Steward - An organizational official with statutory,
management, is responsible for establishing the rules for appropriate
use and protection of the subject information (e.g., rules of behavior) and
retains that responsibility even when the information is shared with or
provided to other organizations.
- provide input to information system owners regarding the security requirements and
security controls for the systems where the information is processed, stored, or
transmitted.
(Cont..)
- Senior Information Security Officer - Carries out the chief information officer
security responsibilities under FISMA
‑ Serves as the primary liaison for the chief information officer to the organization’s authorizing
officials, information system owners, common control providers, and information system
security officers.
‑ Possesses professional qualifications, including training and experience, required to
administer the information security program functions
‑ Achieves more secure information and information systems in accordance with the
requirements in FISMA.
‑ The role of senior information security officer has inherent U.S. Government authority and is
assigned to government personnel only.
(Cont..)
- Authorizing Official - Authorizing officials typically have budgetary
oversight for an information system or are responsible for the mission
and/or business operations supported by the system
- Officials are accountable for the security risks associated with information system
operations.
- coordinate their activities with the risk executive (function), chief information officer,
senior information security officer, common control providers, information system
owners, information system security officers, security control assessors, and other
interested parties during the security authorization process.
- ensuring that all activities and functions associated with security authorization that are
delegated to authorizing official designated representatives are carried out.
(Cont..)
- Authorizing Official - Authorizing officials typically have budgetary
oversight for an information system or are responsible for the mission
and/or business operations supported by the system
- Officials are accountable for the security risks associated with information system
operations.
- coordinate their activities with the risk executive (function), chief information officer,
senior information security officer, common control providers, information system
owners, information system security officers, security control assessors, and other
interested parties during the security authorization process.
- ensuring that all activities and functions associated with security authorization that are
delegated to authorizing official designated representatives are carried out.
(Cont..)
- Authorizing Official Designated Representative- Acts on behalf of an
authorizing official to coordinate and conduct the required day-to-day
activities associated with the security authorization process. supported by
the system
- May prepare the final authorization package, obtain the authorizing official’s signature on
the authorization decision document, and transmit the authorization package to
appropriate organizational officials
OPERATIONAL SCENARIOS
-SCENARIO 1: For an information system that is used or operated by a federal agency, the system boundary is defined
by the agency. The agency conducts all RMF tasks to include information system authorization. The agency maintains
control over the security controls employed within and inherited by the information system.
-SCENARIO 2: For an information system that is used or operated by another organization on behalf of a federal
agency, the system boundary is defined by the agency in collaboration with the other organization
SECURITY CONTROLS IN EXTERNAL ENVIRONMENTS
Organizations are becoming increasingly reliant on information system services provided by external providers to
carry out important missions and business functions. External information system services are services implemented
outside of the authorization boundaries established by the organization for its information systems.
Organizations are responsible and accountable for the risk incurred by use of services provided by external
providers and address this risk by implementing compensating controls when the risk is greater than the authorizing
official or the organization is willing to accept.
FISMA and OMB policy require external providers handling federal information or operating information systems on
behalf of the federal government to meet the same security requirements as federal agencies.
SECURITY CONTROLS IN EXTERNAL ENVIRONMENTS
The assurance or confidence that the risk from using external services is at an acceptable level depends on the trust
that the organization places in the external service provider.
The provision of services by external providers may result in some services without explicit agreements between the
organization and the external entities responsible for the services.
The responsibility for adequately mitigating unacceptable risks arising from the use of external information system
services remains with the authorizing official.
Q&A
References

More Related Content

What's hot

Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: CategorizeUnderstanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: CategorizeDonald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...Donald E. Hester
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringTieu Luu
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...Donald E. Hester
 
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Understanding the NIST Risk Management Framework: 800-37 Rev. 2Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Understanding the NIST Risk Management Framework: 800-37 Rev. 2Denise Tawwab
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: MonitorUnderstanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: MonitorDonald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam Donald E. Hester
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and proceduresCAS
 
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NetLockSmith
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2newbie2019
 
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKSRISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKSChristina33713
 
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Tripwire
 
It Audit Expectations High Detail
It Audit Expectations   High DetailIt Audit Expectations   High Detail
It Audit Expectations High Detailecarrow
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Donald E. Hester
 
Information Security
Information SecurityInformation Security
Information Securitychenpingling
 
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwdJob aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwdJames W. De Rienzo
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramSasha Nunke
 
Designing NextGen Threat Identification Solutions
Designing NextGen Threat Identification SolutionsDesigning NextGen Threat Identification Solutions
Designing NextGen Threat Identification SolutionsArun Prabhakar
 

What's hot (20)

Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: CategorizeUnderstanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous Monitoring
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Con...
 
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Understanding the NIST Risk Management Framework: 800-37 Rev. 2Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: MonitorUnderstanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
 
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKSRISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
 
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99 Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
 
It Audit Expectations High Detail
It Audit Expectations   High DetailIt Audit Expectations   High Detail
It Audit Expectations High Detail
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
 
Information Security
Information SecurityInformation Security
Information Security
 
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwdJob aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
Designing NextGen Threat Identification Solutions
Designing NextGen Threat Identification SolutionsDesigning NextGen Threat Identification Solutions
Designing NextGen Threat Identification Solutions
 

Viewers also liked

NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)James W. De Rienzo
 
(4) NIST SP 800-53 Revision 4 (security control enhancements omitted) 20140804
(4) NIST SP 800-53 Revision 4 (security control enhancements omitted) 20140804(4) NIST SP 800-53 Revision 4 (security control enhancements omitted) 20140804
(4) NIST SP 800-53 Revision 4 (security control enhancements omitted) 20140804James W. De Rienzo
 
Nist 800 60 data types catgorization tables
Nist 800 60 data types catgorization  tablesNist 800 60 data types catgorization  tables
Nist 800 60 data types catgorization tablesDaniel Kerberos
 
RMF STEP 2: SELECT (NIST 800-53 Rev. 3 Controls, Enhancements and Supplementa...
RMF STEP 2: SELECT (NIST 800-53 Rev. 3 Controls, Enhancements and Supplementa...RMF STEP 2: SELECT (NIST 800-53 Rev. 3 Controls, Enhancements and Supplementa...
RMF STEP 2: SELECT (NIST 800-53 Rev. 3 Controls, Enhancements and Supplementa...James W. De Rienzo
 
Risk Management Framework (RMF) STEP 4- Access Security Controls - NIST SP 80...
Risk Management Framework (RMF) STEP 4- Access Security Controls - NIST SP 80...Risk Management Framework (RMF) STEP 4- Access Security Controls - NIST SP 80...
Risk Management Framework (RMF) STEP 4- Access Security Controls - NIST SP 80...James W. De Rienzo
 
"Accelerating Talent and Startups in South-Eastern Europe", Speech at Stanfor...
"Accelerating Talent and Startups in South-Eastern Europe", Speech at Stanfor..."Accelerating Talent and Startups in South-Eastern Europe", Speech at Stanfor...
"Accelerating Talent and Startups in South-Eastern Europe", Speech at Stanfor...Irena N. Chaushevska M.A.
 
risk-reduction-physical-activity-web-algorithm
risk-reduction-physical-activity-web-algorithmrisk-reduction-physical-activity-web-algorithm
risk-reduction-physical-activity-web-algorithmAllica Austin
 
RMF Roles and Responsibilities (Part 2)
RMF Roles and Responsibilities (Part 2) RMF Roles and Responsibilities (Part 2)
RMF Roles and Responsibilities (Part 2) Donald E. Hester
 
Adjevtive phrase
Adjevtive phraseAdjevtive phrase
Adjevtive phrasemeesh19q
 
Master Thesis_Executive Summary
Master Thesis_Executive SummaryMaster Thesis_Executive Summary
Master Thesis_Executive SummaryMarina Kahle
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 
Critical Security Controls v4 1 Mapped to NIST SP 800-53 Rev.4-final r6a
Critical Security Controls v4 1 Mapped to NIST SP 800-53 Rev.4-final r6aCritical Security Controls v4 1 Mapped to NIST SP 800-53 Rev.4-final r6a
Critical Security Controls v4 1 Mapped to NIST SP 800-53 Rev.4-final r6aJames W. De Rienzo
 
Information System Sensitivity Level Impact Assessment (NIST SP 800-60v2r1)
Information System Sensitivity Level Impact Assessment (NIST SP 800-60v2r1)Information System Sensitivity Level Impact Assessment (NIST SP 800-60v2r1)
Information System Sensitivity Level Impact Assessment (NIST SP 800-60v2r1)James W. De Rienzo
 
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...Tripwire
 
Vulnerability Assesment
Vulnerability AssesmentVulnerability Assesment
Vulnerability AssesmentDedi Dwianto
 

Viewers also liked (20)

NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)
 
(4) NIST SP 800-53 Revision 4 (security control enhancements omitted) 20140804
(4) NIST SP 800-53 Revision 4 (security control enhancements omitted) 20140804(4) NIST SP 800-53 Revision 4 (security control enhancements omitted) 20140804
(4) NIST SP 800-53 Revision 4 (security control enhancements omitted) 20140804
 
eMASS Training 2016
eMASS Training 2016eMASS Training 2016
eMASS Training 2016
 
Nist 800 60 data types catgorization tables
Nist 800 60 data types catgorization  tablesNist 800 60 data types catgorization  tables
Nist 800 60 data types catgorization tables
 
RMF STEP 2: SELECT (NIST 800-53 Rev. 3 Controls, Enhancements and Supplementa...
RMF STEP 2: SELECT (NIST 800-53 Rev. 3 Controls, Enhancements and Supplementa...RMF STEP 2: SELECT (NIST 800-53 Rev. 3 Controls, Enhancements and Supplementa...
RMF STEP 2: SELECT (NIST 800-53 Rev. 3 Controls, Enhancements and Supplementa...
 
Risk Management Framework (RMF) STEP 4- Access Security Controls - NIST SP 80...
Risk Management Framework (RMF) STEP 4- Access Security Controls - NIST SP 80...Risk Management Framework (RMF) STEP 4- Access Security Controls - NIST SP 80...
Risk Management Framework (RMF) STEP 4- Access Security Controls - NIST SP 80...
 
KompletnaIntervju
KompletnaIntervjuKompletnaIntervju
KompletnaIntervju
 
"Accelerating Talent and Startups in South-Eastern Europe", Speech at Stanfor...
"Accelerating Talent and Startups in South-Eastern Europe", Speech at Stanfor..."Accelerating Talent and Startups in South-Eastern Europe", Speech at Stanfor...
"Accelerating Talent and Startups in South-Eastern Europe", Speech at Stanfor...
 
risk-reduction-physical-activity-web-algorithm
risk-reduction-physical-activity-web-algorithmrisk-reduction-physical-activity-web-algorithm
risk-reduction-physical-activity-web-algorithm
 
Joy of Unix
Joy of UnixJoy of Unix
Joy of Unix
 
RMF Roles and Responsibilities (Part 2)
RMF Roles and Responsibilities (Part 2) RMF Roles and Responsibilities (Part 2)
RMF Roles and Responsibilities (Part 2)
 
Adjevtive phrase
Adjevtive phraseAdjevtive phrase
Adjevtive phrase
 
Master Thesis_Executive Summary
Master Thesis_Executive SummaryMaster Thesis_Executive Summary
Master Thesis_Executive Summary
 
ANALGESICS
ANALGESICSANALGESICS
ANALGESICS
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Critical Security Controls v4 1 Mapped to NIST SP 800-53 Rev.4-final r6a
Critical Security Controls v4 1 Mapped to NIST SP 800-53 Rev.4-final r6aCritical Security Controls v4 1 Mapped to NIST SP 800-53 Rev.4-final r6a
Critical Security Controls v4 1 Mapped to NIST SP 800-53 Rev.4-final r6a
 
Information System Sensitivity Level Impact Assessment (NIST SP 800-60v2r1)
Information System Sensitivity Level Impact Assessment (NIST SP 800-60v2r1)Information System Sensitivity Level Impact Assessment (NIST SP 800-60v2r1)
Information System Sensitivity Level Impact Assessment (NIST SP 800-60v2r1)
 
NIST SP 800 30 Flow Chart
NIST SP 800 30 Flow ChartNIST SP 800 30 Flow Chart
NIST SP 800 30 Flow Chart
 
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
The RMF: New Emphasis on the Risk Management Framework for Government Organiz...
 
Vulnerability Assesment
Vulnerability AssesmentVulnerability Assesment
Vulnerability Assesment
 

Similar to Guide for Applying The Risk Management Framework to Federal Information Systems

Ise viii-information and network security [10 is835]-solution
Ise viii-information and network  security [10 is835]-solutionIse viii-information and network  security [10 is835]-solution
Ise viii-information and network security [10 is835]-solutionVivek Maurya
 
E’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docxE’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docxmydrynan
 
L1_Introduction.pptx
L1_Introduction.pptxL1_Introduction.pptx
L1_Introduction.pptxStevenTharp2
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdfsdfghj21
 
Information Security Identity and Access Management Administration 07072016
Information Security   Identity and Access Management Administration 07072016Information Security   Identity and Access Management Administration 07072016
Information Security Identity and Access Management Administration 07072016Leon Blum
 
Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Fameworklneut03
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practicesphanleson
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptxHardikKundra
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...abhichowdary16
 
Example of fisma compliance analysis.1
Example of fisma compliance analysis.1Example of fisma compliance analysis.1
Example of fisma compliance analysis.1Sal Velasco
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docxLynellBull52
 
L4 RMF Phase 3 Select.pptx
L4 RMF Phase 3 Select.pptxL4 RMF Phase 3 Select.pptx
L4 RMF Phase 3 Select.pptxStevenTharp2
 
DEPARTMENT CYBERSECURITY What’s Your IT Risk Approa
DEPARTMENT CYBERSECURITY What’s Your IT Risk ApproaDEPARTMENT CYBERSECURITY What’s Your IT Risk Approa
DEPARTMENT CYBERSECURITY What’s Your IT Risk ApproaLinaCovington707
 
Cyber Families - Incident Response.pptx
Cyber Families - Incident Response.pptxCyber Families - Incident Response.pptx
Cyber Families - Incident Response.pptxKinetic Potential
 
Bluedog White Paper - overview of RMF implementation.pdf
Bluedog White Paper - overview of RMF implementation.pdfBluedog White Paper - overview of RMF implementation.pdf
Bluedog White Paper - overview of RMF implementation.pdftom termini
 
NIST Special Publication 800-37 Revision 2 Ris.docx
 NIST Special Publication 800-37 Revision 2  Ris.docx NIST Special Publication 800-37 Revision 2  Ris.docx
NIST Special Publication 800-37 Revision 2 Ris.docxrobert345678
 

Similar to Guide for Applying The Risk Management Framework to Federal Information Systems (20)

5757912.ppt
5757912.ppt5757912.ppt
5757912.ppt
 
Ise viii-information and network security [10 is835]-solution
Ise viii-information and network  security [10 is835]-solutionIse viii-information and network  security [10 is835]-solution
Ise viii-information and network security [10 is835]-solution
 
E’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docxE’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docx
 
L1_Introduction.pptx
L1_Introduction.pptxL1_Introduction.pptx
L1_Introduction.pptx
 
800-37.pptx
800-37.pptx800-37.pptx
800-37.pptx
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
Information Security Identity and Access Management Administration 07072016
Information Security   Identity and Access Management Administration 07072016Information Security   Identity and Access Management Administration 07072016
Information Security Identity and Access Management Administration 07072016
 
Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Famework
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practices
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptx
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
Example of fisma compliance analysis.1
Example of fisma compliance analysis.1Example of fisma compliance analysis.1
Example of fisma compliance analysis.1
 
27001.pptx
27001.pptx27001.pptx
27001.pptx
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
Chapter003
Chapter003Chapter003
Chapter003
 
L4 RMF Phase 3 Select.pptx
L4 RMF Phase 3 Select.pptxL4 RMF Phase 3 Select.pptx
L4 RMF Phase 3 Select.pptx
 
DEPARTMENT CYBERSECURITY What’s Your IT Risk Approa
DEPARTMENT CYBERSECURITY What’s Your IT Risk ApproaDEPARTMENT CYBERSECURITY What’s Your IT Risk Approa
DEPARTMENT CYBERSECURITY What’s Your IT Risk Approa
 
Cyber Families - Incident Response.pptx
Cyber Families - Incident Response.pptxCyber Families - Incident Response.pptx
Cyber Families - Incident Response.pptx
 
Bluedog White Paper - overview of RMF implementation.pdf
Bluedog White Paper - overview of RMF implementation.pdfBluedog White Paper - overview of RMF implementation.pdf
Bluedog White Paper - overview of RMF implementation.pdf
 
NIST Special Publication 800-37 Revision 2 Ris.docx
 NIST Special Publication 800-37 Revision 2  Ris.docx NIST Special Publication 800-37 Revision 2  Ris.docx
NIST Special Publication 800-37 Revision 2 Ris.docx
 

Guide for Applying The Risk Management Framework to Federal Information Systems

  • 1. Guide for Applying The Risk Management Framework to Federal Information Systems A Security Life Cycle Approach Abdulmajeed, Joanna, Xiaoqian, Guillermo, Julio
  • 2. INTRODUCTION -Organizations depend on information technology and the information systems that are developed from that technology to successfully carry out their missions and business functions. -Threats to information and information systems include environmental disruptions, human or machine errors, and purposeful attacks. - Successful attacks on public and private sector information systems can result in serious or grave damage to the national and economic security interests of the United States. -Given the significant and growing danger of these threats, it is imperative that leaders at all levels of an organization understand their responsibilities for achieving adequate information security and for managing information system- related security risks.
  • 3. BACKGROUND A publication, developed by the Joint Task Force Transformation Initiative Working Group, transforms the traditional Certification and Accreditation (C&A) process into the six-step Risk Management Framework (RMF). - building information security capabilities into federal information systems through the application of state-of-the- practice management, operational, and technical security controls; - maintaining awareness of the security state of information systems on an ongoing basis through enhanced monitoring processes; -providing essential information to senior leaders to facilitate decisions regarding the acceptance of risk to organizational operations and assets, individuals, other organizations, and the Nation arising from the operation and use of information systems.
  • 4. PURPOSE AND APPLICABILITY -The purpose of this publication is to provide guidelines for applying the Risk Management Framework to federal information systems to include conducting the activities of security categorization, security control selection and implementation, security control assessment, information system authorization, and security control monitoring. -The guidelines have been broadly developed from a technical perspective to complement similar guidelines for national security systems and may be used for such systems with the approval of appropriate federal officials exercising policy authority over such systems. State, local, and tribal governments, as well as private sector organizations are encouraged to consider using these guidelines, as appropriate.
  • 5. TARGET AUDIENCE This publication serves individuals associated with the design, development, implementation, operation, maintenance, and disposition of federal information systems including: -Individuals with mission/business ownership responsibilities or fiduciary responsibilities; -Individuals with information system development and integration responsibilities; -Individuals with information system and/or security management/oversight responsibilities; -Individuals with information system and security control assessment and monitoring responsibilities; -Individuals with information security implementation and operational responsibilities
  • 6. ORGANIZATION OF THIS SPECIAL PUBLICATION -CHAPTER TWO describes the fundamental concepts associated with managing information system-related security risks. -CHAPTER THREE describes the tasks required to apply the Risk Management Framework to information systems. -SUPPORTING APPENDICES s provide additional information regarding the application of the Risk Management Framework to information systems
  • 7. MANAGING INFORMATION SYSTEM-RELATED SECURITY RISKS: - This describes the basic concepts associated with managing information system-related security risks. These concepts include: incorporating risk management principles and best practices into organization-wide strategic planning considerations, core missions and business processes, and supporting organizational information systems. The Fundamentals
  • 8. Cont…, - The Risk Management Framework (RMF): provides a disciplined and structured process that integrates information security and risk management activities into the system development life cycle.The RMF steps include: -> • Categorize. • Select. • Implement. • Assess. • Authorize. • Monitor.
  • 9. Cont…, SYSTEM DEVELOPMENT LIFE CYCLE: Is the most cost-effective and efficient method for an organization to ensure that its protection strategy is implemented. - INFORMATION SYSTEM BOUNDARIES: Information System Boundaries are established in coordination with the security categorization process and before the development of security plans. - These sections provide general guidelines to assist organizations in establishing appropriate system boundaries to achieve cost-effective solutions for managing information security-related risks from the operation and use of information systems: - Establishing Information System Boundaries. - Boundaries for Complex Information Systems. - Changing Technologies and the Effect on Information System Boundaries.
  • 10. There are three types of security controls for information systems that can be employed by an organization: (i) system-specific controls (ii) common controls (iii) hybrid controls. THIS graph illustrates security control allocation within an organization and using the RMF: SECURITY CONTROL ALLOCATION
  • 11. The Process Executing The Risk Management Framework Tasks - The process of applying Risk Management Framework to Federal Information Systems - RMF tasks are executed concurrently with or as part of system development life cycle processes, taking into account appropriate dependencies, to ensure the effective integration of management information systems-related security risks with system development life cycle processes. - To achieve this, RMF steps and associated task can be applied to both new and development and legacy information systems. - Legacy Systems - Steps 1 - 3. - If weaknesses/deficiencies are discovered steps 3 - 6 - Else Move to Last Step (Monitoring)
  • 12. The Process RMF Tasks: - RMF tasks support the selection, development, implementation, assessment, authorization, and ongoing monitoring of common controls inherited by organizational information systems. 1. RMF STEP 1 – CATEGORIZE INFORMATION SYSTEM 2. RMF STEP 2 – SELECT SECURITY CONTROLS 3. RMF STEP 3 – IMPLEMENT SECURITY CONTROLS 4. RMF STEP 4 – ASSESS SECURITY CONTROLS 5. RMF STEP 5 – AUTHORIZE INFORMATION SYSTEM 6. RMF STEP 6 – MONITOR SECURITY CONTROLS
  • 13. RMF STEP 1 – CATEGORIZE INFORMATION SYSTEM - TASK1-1: Categorize the information system and document the results of the security categorization in the security plan. - TASK1-2: Describe the information system (including system boundary) and document the description in the security plan. - TASK1-3: Register the information system with appropriate organizational program/management offices.
  • 14. Milestone Checkpoint # 1 - Has the organization completed a security categorization of the information system (informed by the initial risk assessment) including the information to be processed, stored, and transmitted by the system? - Are the results of the security categorization process for the information system consistent with the organization’s enterprise architecture and commitment to protecting organizational mission/business processes? - Do the results of the security categorization process reflect the organization’s risk management strategy? - Has the organization adequately described the characteristics of the information system? - Has the organization registered the information system for purposes of management, accountability, coordination, and oversight?
  • 15. RMF STEP 2 – SELECT SECURITY CONTROLS - Task 2-1: Identify the security controls that are provided by the organization as common controls for organizational information - Task 2-2: Select the security controls for the information system and document the controls in the security plan - Task 2-3: Develop a strategy for the continuous monitoring of security control effectiveness and any proposed or actual changes to the information system and its environment of operation - Review and approve the security plan -
  • 16. Milestone Checkpoint # 2 - Has the organization allocated all security controls to the information system as system-specific, hybrid, or common controls? - Has the organization used its risk assessment (either formal or informal) to inform and guide the security control selection process? - Has the organization identified authorizing officials for the information system and all common controls inherited by the system? - Has the organization tailored the baseline security controls to ensure that the controls, if implemented, adequately mitigate risks to organizational operations and assets, individuals, other organizations, and the Nation? - Has the organization addressed minimum assurance requirements for the security controls employed within and inherited by the information system?
  • 17. Milestone Checkpoint # 2 - Has the organization consulted information system owners when identifying common controls to ensure that the security capability provided by the inherited controls is sufficient to deliver adequate protection? - Has the organization supplemented the common controls with system-specific or hybrid controls when the security control baselines of the common controls are less than those of the information system inheriting the controls? - Has the organization documented the common controls inherited from external providers? - Has the organization developed a continuous monitoring strategy for the information system (including monitoring of security control effectiveness for system-specific, hybrid, and common controls) that reflects the organizational risk management strategy and organizational commitment to protecting critical missions and business functions? - Have appropriate organizational officials approved security plans containing system-specific, hybrid, and common controls?
  • 18. RMF STEP 3 – IMPLEMENT SECURITY CONTROLS - TASK 3-1: Implement the security controls specified in the security plan. - TASK 3-2: Document the secuirty control implementation, as appropiate, in the security plan, providing a functional description of the control implementation (including planned input, expected behaviou, and expected outputs).
  • 19. Milestone Checkpoint # 3 - Has the organization allocated security controls as system-specific, hybrid, or common controls consistent with the enterprise architecture and information security architecture? - Has the organization demonstrated the use of sound information system and security engineering methodologies in integrating information technology products into the information system and in implementing the security controls contained in the security plan? - Has the organization documented how common controls inherited by organizational information systems have been implemented? - Has the organization documented how system-specific and hybrid security controls have been implemented within the information system taking into account specific technologies and platform dependencies? - Has the organization taken into account the minimum assurance requirements when implementing security controls?
  • 20. RMF STEP 4 – ASSESS SECURITY CONTROLS - TASK 4-1: Develop ,review, and approve a plan to assess the security controls. - TASK 4-2: Assess the security controls in according with the assessment procedures defined in the security assessment plan - TASK 4-3: Prepare the security assessment report documenting the issues, findings, and recommendations from the security control assessment. - TASK 4-4: Conduct initial remediation actions on security controls based on the findings and recommendations of the security assessment report and reassess remediated control(s) as appropriate. -
  • 21. Milestone Checkpoint # 4 - Has the organization developed a comprehensive plan to assess the security controls employed within or inherited by the information system? - Was the assessment plan reviewed and approved by appropriate organizational officials? - Has the organization considered the appropriate level of assessor independence for the security control assessment? - Has the organization provided all of the essential supporting assessment-related materials needed by the assessor(s) to conduct an effective security control assessment? - Has the organization examined opportunities for reusing assessment results from previous assessments or from other sources? - Did the assessor(s) complete the security control assessment in accordance with the stated assessment plan?
  • 22. Milestone Checkpoint # 4 - Did the organization receive the completed security assessment report with appropriate findings and recommendations from the assessor(s)? - Did the organization take the necessary remediation actions to address the most important weaknesses and deficiencies in the information system and its environment of operation based on the findings and recommendations in the security assessment report? - Did the assessor reassess the remediated controls for effectiveness to provide the authorization official with an unbiased, factual security assessment report on the weaknesses or deficiencies in the system? - Did the organization update appropriate security plans based on the findings and recommendations in the security assessment report and any subsequent changes to the information system and its environment of operation?
  • 23. RMF STEP 5 – ASSESS SECURITY CONTROLS - TASK 5-1: Prepare the plan of action and milestone based on the findings and recommendations of the security assessment report including any remediations actions taken - TASK 5-2: Assemble the security authorization package and submit the package to the authorizing official for adjudication - TASK 5-3: Determine the risk to organizational operations (including mission, functions, image, or reputation), organizations, or the nation - TASK 5-4: Determine if the risk to organizational operations, organizational assets, individuals, other organizations, or the Nations is acceptable -
  • 24. Milestone Checkpoint # 5 - Did the organization develop a plan of action and milestones reflecting organizational priorities for addressing the remaining weaknesses and deficiencies in the information system and its environment of operation? - Did the organization develop an appropriate authorization package with all key documents including the security plan, security assessment report, and plan of action and milestones (if applicable)? - Did the final risk determination and risk acceptance by the authorizing official reflect the risk management strategy developed by the organization and conveyed by the risk executive (function)? - Was the authorization decision conveyed to appropriate organizational personnel including information system owners and common control providers?
  • 25. RMF STEP 6 – MONITOR SECURITY CONTROLS - TASK 6-1: Determine the security impact of proposed or actual changes to the information system and its environment of operation - TASK 6-2: ASsess the technical, management, and operational security controls employed within and inherited by the information system in accordance with the organization-defined monitoring strategy. - TASK 6-3: Conduct remediation actions based on the results of ongoing monitoring activities, assessment of risk, and outstanding items in the plan of action and milestone. - TASK 6-4: Update the security plan, security assessment report, and plan of action and milestone based on the result of the continuous monitoring process.
  • 26. RMF STEP 6 – MONITOR SECURITY CONTROLS - TASK 6-5: Report the security status of the information system (including the effectiveness of security controls employed within and inherited by the system) to the authorizing official and other appropriate organizational officials on an ongoing basis in accordance with the monitoring strategy. - TASK 6-6: Review the reported security status of the information system (including the effectiveness of security controls employed within and inherited by the system) on an ongoing basis in accordance with the monitoring strategy to determine whether the risk to organizational operations, organizational assets, individuals, other organizations, or the nation remains acceptable. - TASK 6-7: Implement an information system disposal strategy, when needed, which executes required actions when a system is removed from servoce
  • 27. Milestone Checkpoint # 6 - Is the organization effectively monitoring changes to the information system and its environment of operation including the effectiveness of deployed security controls in accordance with the continuous monitoring strategy? - Is the organization effectively analyzing the security impacts of identified changes to the information system and its environment of operation? - Is the organization conducting ongoing assessments of security controls in accordance with the monitoring strategy? - Is the organization taking the necessary remediation actions on an ongoing basis to address identified weaknesses and deficiencies in the information system and its environment of operation?
  • 28. Milestone Checkpoint # 6 - Does the organization have an effective process in place to report the security status of the information system and its environment of operation to the authorizing officials and other designated senior leaders within the organization on an ongoing basis? - Is the organization updating critical risk management documents based on ongoing monitoring activities? - Are authorizing officials conducting ongoing security authorizations by employing effective continuous monitoring activities and communicating updated risk determination and acceptance decisions to information system owners and common control providers?
  • 29. Security Authorization AUTHORIZATION PACKAGE: The security authorization package documents the results of the security control assessment and provides the authorizing official with essential information needed to make a risk-based decision on whether to authorize operation of an information system or a designated set of common controls. The authorization package contains the following documents: 1. Security plan 2. Security assessment report 3. Plan of action and milestones Organizations may choose to develop an executive summary from the detailed findings that are generated during a security control assessment. An executive summary provides an authorizing official with an abbreviated version of the security assessment report focusing on the highlights of the assessment, synopsis of key findings, and recommendations for addressing weaknesses and deficiencies in the security controls.
  • 30. Authorization Decisions AUTHORIZATION DECISION DOCUMENT The authorization decision document transmits the final security authorization decision from the authorizing official to the information system owner or common control provider and other key organizational officials, as appropriate. The authorization decision document contains the following information: ● Authorization decision. ● Terms and conditions for the authorization. ● Authorization termination date. ● Risk executive (function) input (if provided). Authorization decisions are based on the content of the authorization package including inputs from the organization’s risk executive (function) and any additional supporting documentation required by the authorizing official. The security authorization package provides comprehensive information on the security state of the information system.
  • 31. When monitoring is conducted in accordance with the needs of the authorizing official, that monitoring results in the production of key information needed to determine: ● (i) the current security state of the information system (including the effectiveness of the security controls employed within and inherited by the system). ● (ii) the resulting risks to organizational operations, organizational assets, individuals, other organizations, and the Nation. ● (iii) whether to authorize continued operation of the system or continued use of common controls inherited by organizational information systems. ONGOING AUTHORIZATION
  • 32. Reauthorization ● Formal reauthorization actions occur at the discretion of the authorizing official in accordance with federal or organizational policy. ● If a formal reauthorization action is required, organizations maximize the use of security and risk-related information produced as part of the continuous monitoring processes currently in effect. ● Formal reauthorization actions, if initiated, can be either time-driven or event- driven. ● Time-driven reauthorizations occur when the authorization termination date is reached (if one is specified). ● If the information system is under ongoing authorization (i.e., a continuous monitoring program is in place that monitors all implemented common, hybrid, and system-specific controls with the frequency specified in the continuous monitoring strategy), time-driven reauthorizations may not be necessary.
  • 33. EVENT-DRIVEN TRIGGERS: Organizations may define event-driven triggers (i.e., indicators and/or prompts that cause a pre- defined organizational reaction) for both ongoing authorization and reauthorization. Event-driven triggers include, but are not limited to: 1. (i) new threat/vulnerability/impact information; 2. (ii) an increased number of findings, weaknesses, and/or deficiencies from the continuous monitoring program; 3. (iii) new missions/business requirements; 4. (iv) a change in the Authorizing Official; 5. (v) a significant change in risk assessment findings; 6. (vi) significant changes to the information system, common controls, or the environment of operation; or 7. (vii) organizational thresholds being exceeded.
  • 34. AUTHORIZATION APPROACHES Organizations can choose from three different approaches when planning for and conducting security authorizations to include: 1. (i) an authorization with a single authorizing official. 2. (ii) an authorization with multiple authorizing officials. 3. (iii) leveraging an existing authorization. The sharing of the authorization package (including the security plan, security assessment report, plan of action and milestones, and authorization decision document) is accomplished under terms and conditions agreed upon by all parties (i.e., the owning organization and the leveraging organization). TYPE AUTHORIZATION A type authorization is an official authorization decision to employ identical copies of an information system or subsystem (including hardware, software, firmware, and/or applications) Examples of type authorizations include: 1. (i) an authorization of the hardware and software applications for a standard financial system deployed in several locations around the world; or 2. (ii) an authorization of a common workstation or operating environment (i.e., hardware, operating system, middleware, and applications) deployed to all operating units within an organization.
  • 35. Roles and Responsibilities - Head of Agency (CEO) - The head of agency is the highest-level senior official or executive within an organization with overall responsibility to provide protection from high risk threats. The head is responsible for assuring that; - Information security management processes are integrated with strategic & operational planning processes - Provide information that support the operations and assets under their control - Ensure the organization has trained personnel sufficient to assist in complying with policies, standards and guidelines - Establish a level of due diligence within an organization that promotes a climate for mission and business success
  • 36. (Cont.) - Risk Executive (function) - Helps ensure the overall strategic goals and objectives in carrying out core missions and functions. The executive coordinates with senior leadership to: - Provides a greater understanding of the integrated operations of an organization - Develop risk management strategies - Assist the sharing of risk related information within the organization - Help ensure effective risk acceptance decisions - Identify organization risk from the operation and use of information systems - Ensure that authorization decisions consider all factors necessary for mission and business success
  • 37. (Cont..) - Chief Information Officer - Responsible for designating a senior information security officer and developing and maintaining information security policies, procedures, and control techniques to address all applicable requirements; - Ensure that personnel are adequately trained - Report overall effectiveness to the head of the federal agency as well as the organization’s information security program, including progress of remedial actions - Ensure that information security program is effectively implemented - Information systems are covered by approved security plans and are authorized to operate
  • 38. (Cont..) - Ensure that personnel are adequately trained - Report overall effectiveness to the head of the federal agency as well as the organization’s information security program, including progress of remedial actions - Ensure that information security program is effectively implemented - Information systems are covered by approved security plans and are authorized to operate - The role of chief information officer has inherent U.S. Government authority and is assigned to government personnel only.
  • 39. (Cont..) - Information Owner/Steward - An organizational official with statutory, management, is responsible for establishing the rules for appropriate use and protection of the subject information (e.g., rules of behavior) and retains that responsibility even when the information is shared with or provided to other organizations. - provide input to information system owners regarding the security requirements and security controls for the systems where the information is processed, stored, or transmitted.
  • 40. (Cont..) - Senior Information Security Officer - Carries out the chief information officer security responsibilities under FISMA ‑ Serves as the primary liaison for the chief information officer to the organization’s authorizing officials, information system owners, common control providers, and information system security officers. ‑ Possesses professional qualifications, including training and experience, required to administer the information security program functions ‑ Achieves more secure information and information systems in accordance with the requirements in FISMA. ‑ The role of senior information security officer has inherent U.S. Government authority and is assigned to government personnel only.
  • 41. (Cont..) - Authorizing Official - Authorizing officials typically have budgetary oversight for an information system or are responsible for the mission and/or business operations supported by the system - Officials are accountable for the security risks associated with information system operations. - coordinate their activities with the risk executive (function), chief information officer, senior information security officer, common control providers, information system owners, information system security officers, security control assessors, and other interested parties during the security authorization process. - ensuring that all activities and functions associated with security authorization that are delegated to authorizing official designated representatives are carried out.
  • 42. (Cont..) - Authorizing Official - Authorizing officials typically have budgetary oversight for an information system or are responsible for the mission and/or business operations supported by the system - Officials are accountable for the security risks associated with information system operations. - coordinate their activities with the risk executive (function), chief information officer, senior information security officer, common control providers, information system owners, information system security officers, security control assessors, and other interested parties during the security authorization process. - ensuring that all activities and functions associated with security authorization that are delegated to authorizing official designated representatives are carried out.
  • 43. (Cont..) - Authorizing Official Designated Representative- Acts on behalf of an authorizing official to coordinate and conduct the required day-to-day activities associated with the security authorization process. supported by the system - May prepare the final authorization package, obtain the authorizing official’s signature on the authorization decision document, and transmit the authorization package to appropriate organizational officials
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49. OPERATIONAL SCENARIOS -SCENARIO 1: For an information system that is used or operated by a federal agency, the system boundary is defined by the agency. The agency conducts all RMF tasks to include information system authorization. The agency maintains control over the security controls employed within and inherited by the information system. -SCENARIO 2: For an information system that is used or operated by another organization on behalf of a federal agency, the system boundary is defined by the agency in collaboration with the other organization
  • 50. SECURITY CONTROLS IN EXTERNAL ENVIRONMENTS Organizations are becoming increasingly reliant on information system services provided by external providers to carry out important missions and business functions. External information system services are services implemented outside of the authorization boundaries established by the organization for its information systems. Organizations are responsible and accountable for the risk incurred by use of services provided by external providers and address this risk by implementing compensating controls when the risk is greater than the authorizing official or the organization is willing to accept. FISMA and OMB policy require external providers handling federal information or operating information systems on behalf of the federal government to meet the same security requirements as federal agencies.
  • 51. SECURITY CONTROLS IN EXTERNAL ENVIRONMENTS The assurance or confidence that the risk from using external services is at an acceptable level depends on the trust that the organization places in the external service provider. The provision of services by external providers may result in some services without explicit agreements between the organization and the external entities responsible for the services. The responsibility for adequately mitigating unacceptable risks arising from the use of external information system services remains with the authorizing official.
  • 52. Q&A