SlideShare a Scribd company logo
1
Risk Management Framework (RMF)
NIST SP 800 30
Defense Security Service
May 2017
- 2 -
• Review terminology/resources for RMF
• Set expectations for completing documentation
• Provide examples for discussion
• Address Authorization requests via OBMS
• Discuss Security Controls Assessor (SCA) Visit
to the facility
Goals of the Presentation
- 3 -
 What is Risk Management Framework (RMF)?
o A unified information security framework for the entire federal
government that replaces legacy Certification and Accreditation
(C&A) processes applied to information systems (ISs).
o A key component of an organization’s information security program
used in the overall management of organizational risk.
 When will RMF replace C&A (Phased Implementation)?
o RMF has already replaced C&A for Stand-Alone systems as of
October 3, 2016. Multi-User Standalones (MUSA) and Single-User
Standalones (SUSA) were required to execute the RMF process for
any expiring C&A accreditations and new submittals.
o The Transition date for Local Area Networks (LAN) and Wide Area
Networks (WAN) is tentatively set for January 1, 2018.
(You can submit RMF plans prior to the start date)
RMF Basics
- 4 -
Here is the way some people see things
NIST SP-800-53r4
NIST SP-800-30
NIST SP-800-37
CNSSI-1253
Risk Assessment Report (RAR)
System Assessment Report (SAR)
SCAP Compliance Checker
DISA STIGs
DAAPM
Terminology/Resources
CDSE Training on RMF
DOD 5220.22-M (NISPOM)
SSP
SSP Appendices
ISSM Certification Statement
DSS In Transition
NIST SP 800-61 www.dss.mil/rmf
Continuous Monitoring
NIST SP 800-60
NIST SP 800-53A
NIST SP-800-137
- 5 -
Local Area Network, Wide Area Network or Interconnected System between August 1, 2016 – 28 February 2017
RMF Policy References
- 6 -
Planning Guidance/Resources
NIST SP-800-53 (rev 4)- Security and Privacy Controls for Federal Information Systems
and Organizations, Dated April 2013 (with Jan 2015 updates)
NIST SP-800-30 (rev 1)- Guide for Conducting Risk Assessments, dated September 2012
NIST SP-800-37 (rev 1) - Guide for Applying the Risk Management Framework to
Federal Information Systems, dated February 2010 (with June 2014 updates)
CNSSI-1253 Security Categorization and Control Selection for National Security Systems,
Dated March 27, 2014
DAAPM- DSS Assessment and Authorization Process Manual, Dated August 24, 2016
Basic guidance for requesting the authorization of an information system
for classified Government work.
CDSE RMF Training- There are 7 courses that ISSMs are required to complete to get an
Overall understanding of RMF (see “ISSM Required Online Training” in the DAAPM).
NISPOM- DOD 5220.22-M, Dated February 2006 (with change 2 dated May 18, 2016)
Basic starting point for cleared contractors to implement RMF (NISPOM 8-100.d)
NIST SP 800-61 (rev 2)- Computer Security Incident Handling Guide, Dated August 2012
www.dss.mil/rmf- One stop website for many tools and templates needed for RMF
NIST SP 800-60 (vol 1-2)- Guide for mapping information to categories, Dated August 2008
- 7 -
Security Controls and Continuous Monitoring
The RMF process will manage risk more effectively through the introduction of security controls and continuous
monitoring of those controls.
Resources to assist in the
RMF Process
Many additional resources
can be found on the NIST
website (www.nist.gov)
National Industrial Security Program Operating Manual (NISPOM)
NIST SP 800-37: Guide for Applying the Risk Management Framework to Federal
Information Systems
NIST SP 800-137: Information Security Continuous Monitoring (ISCM) for
Federal Information Systems and Organizations
NIST SP 800-53: Security and Privacy Controls for Federal Information Systems
and Organizations
NIST SP 800-53A: Assessing Security and Privacy Controls in Federal Information
Systems and Organizations: Building Effective Assessment Plans
Committee on National Security Systems Instruction (CNSSI) 1253: Security
Categorization and Control Selection for National Security Systems
Purpose of Security Controls and Continuous Monitoring Benefits of Security Controls and Continuous Monitoring
Assess security control effectiveness for an IS
Document changes to the IS or its environment of operation
Conduct security impact analyses of associated changes
Report the security status of an IS
Facilitate more efficient enterprise management of
cybersecurity
Increase security in the system development and acquisition
processes
Ensure compliance with national standards and reporting
requirements
- 8 -
RMF Process Stakeholders – New Terminology
Old Term in the C&A Process New Term in the RMF Process
Designated Approving Authority (DAA) Authorizing Official (AO)
Regional Designated Approving Authority (RDAA) Regional Authorizing Official (RAO)
Office of the Designated Approving Authority (ODAA) NISP Authorization Office (NAO)
Information Systems Security Professional (ISSP) ISSP/Security Control Assessor (SCA)
Customer, Government Contracting Activity (GCA) Information Owner (IO)
Contractor Information System Owner (ISO)
*Information Systems Security Manager (ISSM) ISSM
*Information Systems Security Officer (ISSO) ISSO
Many RMF stakeholder titles have been revised in the transition from C&A. The following table
outlines former terms in the C&A process as well as the corresponding new terms in the RMF
process. Both sets of terms will continue to be used during the transition to RMF.
*Titles will remain the same in RMF.
- 9 -
Connecting the Dots –
What is Changing? What is staying the same?
Process C&A RMF
ODAA Business Management System (OBMS) Same Same
System Security Plan (SSP) Template C&A Template RMF Template
Categorization Basic, Med,
High
PLs
Low, Mod, High
Accessibility
Certification Statement Same Same
Risk Acknowledgement/Tailoring-out Risk
Acknowledged
Tailored-Out/Risk
Acknowledgement
MOU MOU MOU/ISA
Standing-Up Like System Self-
Certification
Type
Authorization
Controls NISPOM Refs NIST Controls
Approval to Process Accreditation Authorization
- 10 -
Connecting the Dots –
What is Changing? What is staying the same?
Process C&A RMF OBMS File
Designation
Submit Artifacts within OBMS  SSP
 Certification
Statement
 Profile
 SSP
 Certification
Statement
 Risk
Assessment
Report
 POA&M
 SSP Supporting
Artifacts
(appendices)
SSP
Security Package
Submission and
Certification Statement
IS Profile
Other
Other
Issues Related to Authorization Comments Form
Accreditation
Letter
Comments form used to
concur with
categorization/controls
Terms & Conditions in
Authorization Letter
- 11 -
RMF Process Walk Through: Introduction
NISPAssessment
& Authorization
Life Cycle
ISSM conducts self-assessment and updates
the SSP to reflect the actual state of the IS.
ISSP reviews submitted SSP and assesses
the IS.
4. ASSESS
Security Controls
ISSM conducts risk assessment to
determine system categorization
(confidentiality, integrity, and
availability).
1. CATEGORIZE
Information System
Starting Point
ISSM continuously tracks and reports IS
changes to the ISSP IAW the
Continuous Monitoring Plan/Strategy.
6. MONITOR
Security Controls
5. AUTHORIZE
Information System
AO determines risk.
If acceptable, AO formally authorizes
system to operate.
ISSM implements security controls
selected for the IS.
3. IMPLEMENT
Security Controls
2. SELECT
Security Controls
ISSM selects security controls and
applies tailoring and supplemental
controls as needed based on risk
assessment. ISSP reviews SSP and
provides concurrence.
- 12 -
 RMF Courses
Introduction to RMF (CS124.16)
Continuous Monitoring (CS200.16)
Categorization of the System (CS102.16)
Selecting Security Controls (CS103.16)
Implementing Security Controls (CS104.16)
Assessing Security Controls (CS105.16)
Authorizing Systems (CS106.16)
Monitoring Security Controls (CS107.16)
CDSE Training Courses
- 13 -
RMF Process Walk Through -
STEP 1: Categorize the IS
ISSM Actions:
 Categorize the Information System (IS) based on the impact due to a loss of Confidentiality,
Integrity, and Availability of the information that will be processed.
(Note: The DSS SSP template is based on a Moderate Confidentiality, Low Integrity, and Low
Availability Impact. Make sure you haven’t been contractually required to address different
Impact Levels)
 Perform a Risk/Threat Assessment and ensure a Risk Assessment Report (RAR) is completed.
(Note: Seek information from all available sources (e.g., Government Customer/Information
Owner, Program Managers, Local service risk/threat developed documents)
 Document the system description, including the system/authorization boundary, in the System
Security Plan.
 Assign qualified personnel to RMF roles and document team member assignments in the SSP.
Output(s): Risk Assessment Report, Initial System Security Plan
Reference(s): NIST SP 800-30 rev 1, NIST SP 800-60, CNSSI 1253, DAAPM
- 14 -
 What guide is used when conducting a Risk Assessment?
o NIST 800-30 Rev 1, Guide for Conducting Risk Assessments
 What is the purpose of the RAR?
o Inform decision makers and support risk responses by identifying:
 Relevant threats
 Vulnerabilities both internal and external to the organization
 Impact to the organization that may occur given the potential for
threats exploiting vulnerabilities
 Likelihood that harm will occur
o The end result is a determination of risk.
o The RAR will be used to “fine tune” security controls for the life of
the system
RMF Step 1 – Risk Assessment Report (RAR)
- 15 -
RMF Step 1 – Risk Assessment Report (RAR)
- 16 -
RMF Process Walk Through –
Step 2-1 through 2-3: Selecting Security Controls
ISSM Actions:
 Select the security controls applicable to the IS. The selection is based upon the results of the
categorization (which is impacted by the RAR).
(Controls for Moderate/Low/Low impact are included in the DSS SSP Template)
 Tailor the controls as needed by supplementing, modifying, or tailoring out controls to effectively
manage risk for any unique system conditions.
 Develop a strategy for continuous monitoring of security control effectiveness.
 Document the security controls selection results in the SSP.
Output(s): Initial System Security Plan
Reference(s): NIST SP 800-53 rev 4, CNSSI 1253, DAAPM (appendix A, D)
- 17 -
Security Controls Summary- NIST
112
10
58
82
50
34
48
56
26
22
22
116
86
13
15
10
50
16
826 Individual Controls from 18 “families” according to NIST SP-800-53r4
- 18 -
Security Controls Summary- DSS Appendix D
57
7
30
31
25
24
7
28
11
17
11
51
22
9
12
8
21
15
386 Individual Controls from 18 “families” according to DAAPM- App-D
- 19 -
Security Controls – Overlays (DAAPM, App D.)
- 20 -
Control Selection Using Excel
A Spreadsheet is available at www.dss.mil/rmf . This would need converted to a PDF for input into OBMS
- 21 -
Now you are done selecting controls, but
remember…
- 22 -
RMF Process Walk Through –
Step 2-4: Submit Security Controls/ Categorization
NISPAssessment
& Authorization
Life Cycle
ISSM conducts self-assessment and updates
the SSP to reflect the actual state of the IS.
ISSP reviews submitted SSP and assesses
the IS.
4. ASSESS
Security Controls
ISSM conducts risk assessment to
determine system categorization
(confidentiality, integrity, and
availability).
1. CATEGORIZE
Information System
Starting Point
ISSM continuously tracks and reports IS
changes to the ISSP IAW the
Continuous Monitoring Plan/Strategy.
6. MONITOR
Security Controls
5. AUTHORIZE
Information System
AO determines risk.
If acceptable, AO formally authorizes
system to operate.
ISSM implements security controls
selected for the IS.
3. IMPLEMENT
Security Controls
2. SELECT
Security Controls
ISSM selects security controls and
applies tailoring and supplemental
controls as needed based on risk
assessment.
ISSP reviews SSP and provides
concurrence.
Risk Assessment Report (RAR) is complete
Categorization is complete
Control Selection is complete
Now at this point….
- 23 -
• Use OBMS to submit initial documents.
• Submit the SSP in OBMS as the “SSP”
• Submit the Risk Assessment Report (RAR) as the “IS Profile”
• Submit a “blank” Certification Statement as the “Security Package
Submission and Certification Statement”
• Submit other necessary artifacts as “other”
(Note: There is a “SSP appendices” document that can be used for
things like the POA&M, DD-254, etc.)
• Remember that all documents in OBMS must be .pdf
RMF Process Walk Through –
Step 2-4: ISSM Submits Step “2” work via OBMS
- 24 -
RMF Process Walk Through –
Step 2-4: DSS Response to Controls/Categorization
ISSP/SCAActions:
 Review the initial SSP and RAR to ensure it meets the necessary security requirements and
effectively identifies potential risks to the IS. The ISSP/SCA also reviews the ISSM-recommended
deltas from the standard baseline.
 Documents concurrence or non-concurrence in the Categorization & Implementation Concurrence
Form.
 Categorization & Implementation Concurrence Form is returned to ISSM via OBMS.
(Note: This is done with a new form, but the “comments” drop down is used in OBMS.)
Output: DSS Categorization & Implementation Concurrence Form
• The ISSP/SCA is focusing their review on the Categorization of the IS and the Selection of
controls and will only comment on detailed supporting information if time permits.
- 25 -
RMF Process Walk Through –
Step 2-4: ISSM Response to DSS “step 2” review
ISSM Actions:
 If concurrence for both categorization and selection of initial baseline controls is issued, proceed
to RMF Step 3.
 If non-concurrence is issued, address outstanding issues documented in Categorization &
Implementation Concurrence Form. Once issues are addressed, resubmit the RAR and initial SSP
via OBMS.
Output(s): Initial SSP with identified controls, Continuous Monitoring Strategy, RAR, and
Categorization & Implementation Concurrence Form
- 26 -
RMF Process Walk Through –
Step 3: Implement Security Controls
ISSM Actions:
 Implement security controls as determined/documented in RMF Step 2.
 Revise the SSP in order to document the security control implementation.
 Start a Plan of Action and Milestones (as applicable).
 Conduct an initial assessment to facilitate early identification of weaknesses and deficiencies.
 Document (or update as necessary) the security control implementation in the SSP.
Output: Updated SSP with a complete functional description of security control implementation.
Reference(s): CNSSI 1253, NIST SP 800-53, and DAAPM (Appendix A & D)
- 27 -
RMF Process Walk Through –
Step 4: Assess Security Controls
ISSM Actions:
 Conduct an initial assessment of the effectiveness of the security controls in accordance with the
security procedures defined in the SSP.
 Utilize the Defense Information System Agency (DISA) vulnerability scanning tools (SCAP
Compliance Checker and DISA STIG Viewer) and the DSS Technical Assessment Job Aids to
support the initial assessment. If the IS cannot be assessed utilizing the specified scanning tools,
please document the justification in the SSP.
 Finalize the SSP to reflect the actual state of the security controls, as required, based on the
vulnerabilities of the security control assessment, reassessment, and completion of any
remediation actions taken.
 Submit the final SSP, signed Certification Statement, RAR, POA&M, and supporting artifacts via
OBMS.
Artifact(s): Final SSP, singed Certification Statement, RAR, POA&M, and SSP Supporting Artifacts
Reference(s): NIST SP 800-53A, DAAPM, www.dss.mil/rmf
- 28 -
The following tools are helpful :
 SCAP Content Checker (SCC)- This tool (developed for SPAWAR) allows you to compare your
system configuration to a “defined” standard (typically called a “benchmark”).
 DISA STIG Viewer- This is a DISA application used to view various “Security Technical
Implementation Guide (STIG) content
 DISA STIG Content
• Complete Comprehensive STIG
• Benchmarks
• IAVMs- Information Assurance Vulnerability Management….i.e., Patching
• STIG Checklists
Output: Confirmation that controls have been properly implemented, Checklists, etc..
Reference(s): http://iase.disa.mil/stigs/Pages/index.aspx#
NOTE: Some DISA Content is PKI encrypted which can present some difficulty for Contractors.
RMF Process Walk Through –
Step 4: Assess Security Controls- Assessment Tools
- 29 -
The STIG Viewer is used to create a checklist of 300
Overall STIG Items
RMF Process Walk Through –
Step 4: Assessment Tools-Windows 7 Example
The SCC can analyze 254
Windows 7 automated
computer settings based on a
Windows 7 STIG
Benchmark (V1R31)
Remaining 46 Items
need to be manually
assessed
An IAVM STIG checklist can be generated to view 493
Vulnerabilities (as of 12-23-2016) to confirm Patch implementation
XCCDF results file
is created and
imported into the
overall checklist.
Technical & Manual Checks
- 30 -
RMF Process Walk Through –
Step 4: Assessment Tools- STIG Viewer
Sign up to get notified about STIG updates…
A guide for the STIG viewer (Now at version 2.5.1) is located at….http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx
- 31 -
RMF Process Walk Through –
Step 4: Assessment Tools- SCC Tool
- 32 -
RMF Process Walk Through –
Step 4: Assessment Tools- STIG Checklist
- 33 -
RMF Process Walk Through –
Step 2-4: Submit Security Controls/ Categorization
NISPAssessment
& Authorization
Life Cycle
ISSM conducts self-assessment and updates
the SSP to reflect the actual state of the IS.
ISSP reviews submitted SSP and assesses
the IS.
4. ASSESS
Security Controls
ISSM conducts risk assessment to
determine system categorization
(confidentiality, integrity, and
availability).
1. CATEGORIZE
Information System
Starting Point
ISSM continuously tracks and reports IS
changes to the ISSP IAW the
Continuous Monitoring Plan/Strategy.
6. MONITOR
Security Controls
5. AUTHORIZE
Information System
AO determines risk.
If acceptable, AO formally authorizes
system to operate.
ISSM implements security controls
selected for the IS.
3. IMPLEMENT
Security Controls
2. SELECT
Security Controls
ISSM selects security controls and
applies tailoring and supplemental
controls as needed based on risk
assessment.
ISSP reviews SSP and provides
concurrence.
Certification is ready for signature
Final POA&M is complete
Final SSP is complete
Now at this point….
- 34 -
RMF Process Walk Through –
Step 4: Assess Security Controls
ISSP/SCAActions:
 Receives/Reviews the final SSP, Certification Statement, RAR, POA&M, and SSP Supporting
Artifacts via OBMS.
 If the SSP is acceptable and the documentation fully addresses all system security controls and
security configurations, an on-site validation will be scheduled.
Artifact(s): Final SSP, POA&M
Reference(s): DAAPM, NIST SP 800-53A
- 35 -
RMF Process Walk Through –
Step 5: Authorize the IS
ISSP/SCAActions:
 Perform an on-site validation:
 Assess the technical security controls and system configuration utilizing the DISA
vulnerability scanning tools (SCAP Compliance Checker/DISA STIG Viewer).
 Document any weaknesses and deficiencies within the Security Assessment Report.
 Identify necessary remediation actions in the POA&M.
 Prepares the System Assessment Report (SAR).
 Completes Security Authorization Package which included a risk based recommendation
 Submits Security Authorization Package to AO.
AO Actions:
 Assess the Security Authorization Package and issue an authorization decision. The authorization
decision will be an Interim Authorization to Operate (IATO), Authorization to Operate (ATO), or
Denial of Authorization to Operate (DATO). The authorization decision will include any terms
and conditions of operation as well as the authorization termination date (ATD).
 The Authorization Letter will be provided to the ISSM via OBMS.
Artifact(s): System Assessment Report (SAR), Authorization Letter
Reference(s): DAAPM
- 36 -
RMF Process Walk Through –
Step 6: Monitor the IS
ISSM Actions:
 Determine the security impact of proposed or actual changes to the IS and its operating
environment and inform the ISSP/SCA as necessary.
 Assess a selected subset of the security controls, based on the approved continuous monitoring
strategy, and inform the ISSP/SCA of the results.
 Update SSP documentation and work to satisfy POA&M requirements. Provide regular status
reports to the ISSP/SCA per the continuous monitoring strategy.
 Conduct any necessary remediation actions based on findings discovered during continuous
monitoring.
 Ensure IS security documentation is updated and maintained. Review the reported security status
of the IS.
 As necessary, develop and implement an IS decommissioning strategy.
Artifact(s): Updated POA&M, Updated SSP, Status Reports, Decommissioning Strategy (as
necessary), and Continuous Monitoring Strategy.
Reference(s): DAAPM, NIST SP 800-137
- 37 -
 RMF is a new process for both ISSPs and ISSMs. Success can only be
achieved by becoming familiar with the DAAPM and utilizing all available
resources. The DAAPM is the ultimate authority.
 As with any new process, the first SSP submission will be the most
challenging. After the first SSP submission is completed, the process will
become more routine.
 The DSS Risk Management Framework Information and Resources Web Page
provides links to Policy/Guidance, Resources, Training, and Toolkits.
 Helpful information can also be accessed at the RMF Knowledge Service
Webpage (https://rmfks.osd.mil/login.htm).
RMF Helpful Hints
- 38 -
DSS RMF Information and Resources Web Page
www.dss.mil/rmf
- 39 -
Questions?
Contact your local ISSP or visit http://www.dss.mil/rmf/.

More Related Content

What's hot

Information Serurity Risk Assessment Basics
Information Serurity Risk Assessment BasicsInformation Serurity Risk Assessment Basics
Information Serurity Risk Assessment Basics
Vidyalankar Institute of Technology
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?
PECB
 
Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)
MetroStar
 
Iso 27001 Checklist
Iso 27001 ChecklistIso 27001 Checklist
Iso 27001 Checklist
Craig Willetts ISO Expert
 
NIST - Cybersecurity Framework mindmap
NIST - Cybersecurity Framework mindmapNIST - Cybersecurity Framework mindmap
NIST - Cybersecurity Framework mindmap
WAJAHAT IQBAL
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
PECB
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
Midhun Nirmal
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
Ãsħâr Ãâlâm
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
Tanmay Shinde
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleWalk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
EnterpriseGRC Solutions, Inc.
 
ISMS Part I
ISMS Part IISMS Part I
ISMS Part I
khushboo
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overview
Naresh Rao
 
RMF Roles and Responsibilities (Part 1)
RMF Roles and Responsibilities (Part 1) RMF Roles and Responsibilities (Part 1)
RMF Roles and Responsibilities (Part 1)
Donald E. Hester
 
SOC 2 Type 2 Checklist - Part 1 - V2_final.pdf
SOC 2 Type 2 Checklist - Part 1 - V2_final.pdfSOC 2 Type 2 Checklist - Part 1 - V2_final.pdf
SOC 2 Type 2 Checklist - Part 1 - V2_final.pdf
infosecTrain
 
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
Denise Tawwab
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overview
Julia Urbina-Pineda
 
Top management role to implement ISO 27001
Top management role to implement ISO 27001Top management role to implement ISO 27001
Top management role to implement ISO 27001
PECB
 
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?
PECB
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
Erick Kish, U.S. Commercial Service
 
Control Standards for Information Security
Control Standards for Information SecurityControl Standards for Information Security
Control Standards for Information Security
JohnHPazEMCPMPITIL5G
 

What's hot (20)

Information Serurity Risk Assessment Basics
Information Serurity Risk Assessment BasicsInformation Serurity Risk Assessment Basics
Information Serurity Risk Assessment Basics
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?
 
Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)
 
Iso 27001 Checklist
Iso 27001 ChecklistIso 27001 Checklist
Iso 27001 Checklist
 
NIST - Cybersecurity Framework mindmap
NIST - Cybersecurity Framework mindmapNIST - Cybersecurity Framework mindmap
NIST - Cybersecurity Framework mindmap
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleWalk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
 
ISMS Part I
ISMS Part IISMS Part I
ISMS Part I
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overview
 
RMF Roles and Responsibilities (Part 1)
RMF Roles and Responsibilities (Part 1) RMF Roles and Responsibilities (Part 1)
RMF Roles and Responsibilities (Part 1)
 
SOC 2 Type 2 Checklist - Part 1 - V2_final.pdf
SOC 2 Type 2 Checklist - Part 1 - V2_final.pdfSOC 2 Type 2 Checklist - Part 1 - V2_final.pdf
SOC 2 Type 2 Checklist - Part 1 - V2_final.pdf
 
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overview
 
Top management role to implement ISO 27001
Top management role to implement ISO 27001Top management role to implement ISO 27001
Top management role to implement ISO 27001
 
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
Control Standards for Information Security
Control Standards for Information SecurityControl Standards for Information Security
Control Standards for Information Security
 

Similar to DSS RMF Training.pptx

NIST Framework for Information System
NIST Framework for Information SystemNIST Framework for Information System
NIST Framework for Information System
newbie2019
 
NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)
James W. De Rienzo
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
akquinet enterprise solutions GmbH
 
Part 1 Major Events DocumentationScenario You visit a retail.docx
Part 1 Major Events DocumentationScenario You visit a retail.docxPart 1 Major Events DocumentationScenario You visit a retail.docx
Part 1 Major Events DocumentationScenario You visit a retail.docx
alisondakintxt
 
RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™
CPaschal
 
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NetLockSmith
 
INFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition PlanINFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition Plan
Bill Ross
 
Sap Security Assessment V3 English
Sap Security Assessment V3 EnglishSap Security Assessment V3 English
Sap Security Assessment V3 English
guest5bd7a1
 
Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.
Ignyte Assurance Platform
 
NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417
James W. De Rienzo
 
TEBO NDAGHA cyber resume
TEBO NDAGHA cyber resumeTEBO NDAGHA cyber resume
TEBO NDAGHA cyber resume
FRANKLINE TEBO
 
Continuous Monitoring: Monitoring Strategy – Part 2 of 3
Continuous Monitoring: Monitoring Strategy – Part 2 of 3Continuous Monitoring: Monitoring Strategy – Part 2 of 3
Continuous Monitoring: Monitoring Strategy – Part 2 of 3
EMC
 
RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™
CPaschal
 
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopCybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy Workshop
Life Cycle Engineering
 
Resume_Santoro_Aug_2016
Resume_Santoro_Aug_2016Resume_Santoro_Aug_2016
Resume_Santoro_Aug_2016
David A. Santoro
 
5757912.ppt
5757912.ppt5757912.ppt
5757912.ppt
Muhammad Mazhar
 
A Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT BudgetA Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT Budget
Rochester Security Summit
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life CycleUnderstanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Donald E. Hester
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4
CrispnCrunch
 
Corporate Cyber Program
Corporate Cyber ProgramCorporate Cyber Program
Corporate Cyber Program
Ignyte Assurance Platform
 

Similar to DSS RMF Training.pptx (20)

NIST Framework for Information System
NIST Framework for Information SystemNIST Framework for Information System
NIST Framework for Information System
 
NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
 
Part 1 Major Events DocumentationScenario You visit a retail.docx
Part 1 Major Events DocumentationScenario You visit a retail.docxPart 1 Major Events DocumentationScenario You visit a retail.docx
Part 1 Major Events DocumentationScenario You visit a retail.docx
 
RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™
 
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
 
INFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition PlanINFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition Plan
 
Sap Security Assessment V3 English
Sap Security Assessment V3 EnglishSap Security Assessment V3 English
Sap Security Assessment V3 English
 
Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.
 
NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417
 
TEBO NDAGHA cyber resume
TEBO NDAGHA cyber resumeTEBO NDAGHA cyber resume
TEBO NDAGHA cyber resume
 
Continuous Monitoring: Monitoring Strategy – Part 2 of 3
Continuous Monitoring: Monitoring Strategy – Part 2 of 3Continuous Monitoring: Monitoring Strategy – Part 2 of 3
Continuous Monitoring: Monitoring Strategy – Part 2 of 3
 
RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™
 
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopCybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy Workshop
 
Resume_Santoro_Aug_2016
Resume_Santoro_Aug_2016Resume_Santoro_Aug_2016
Resume_Santoro_Aug_2016
 
5757912.ppt
5757912.ppt5757912.ppt
5757912.ppt
 
A Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT BudgetA Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT Budget
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life CycleUnderstanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4
 
Corporate Cyber Program
Corporate Cyber ProgramCorporate Cyber Program
Corporate Cyber Program
 

More from Muhammad Mazhar

Compliance & Auditing (UBL).pptx
Compliance & Auditing (UBL).pptxCompliance & Auditing (UBL).pptx
Compliance & Auditing (UBL).pptx
Muhammad Mazhar
 
Reference_Template.pptx
Reference_Template.pptxReference_Template.pptx
Reference_Template.pptx
Muhammad Mazhar
 
NISTSP80037rev2.pptx
NISTSP80037rev2.pptxNISTSP80037rev2.pptx
NISTSP80037rev2.pptx
Muhammad Mazhar
 
Central Depository Committee of Pakistan.pptx
Central Depository Committee of Pakistan.pptxCentral Depository Committee of Pakistan.pptx
Central Depository Committee of Pakistan.pptx
Muhammad Mazhar
 
NISTSP80037rev2-by Beruos.pptx
NISTSP80037rev2-by Beruos.pptxNISTSP80037rev2-by Beruos.pptx
NISTSP80037rev2-by Beruos.pptx
Muhammad Mazhar
 
CDC (1).pptx
CDC (1).pptxCDC (1).pptx
CDC (1).pptx
Muhammad Mazhar
 

More from Muhammad Mazhar (6)

Compliance & Auditing (UBL).pptx
Compliance & Auditing (UBL).pptxCompliance & Auditing (UBL).pptx
Compliance & Auditing (UBL).pptx
 
Reference_Template.pptx
Reference_Template.pptxReference_Template.pptx
Reference_Template.pptx
 
NISTSP80037rev2.pptx
NISTSP80037rev2.pptxNISTSP80037rev2.pptx
NISTSP80037rev2.pptx
 
Central Depository Committee of Pakistan.pptx
Central Depository Committee of Pakistan.pptxCentral Depository Committee of Pakistan.pptx
Central Depository Committee of Pakistan.pptx
 
NISTSP80037rev2-by Beruos.pptx
NISTSP80037rev2-by Beruos.pptxNISTSP80037rev2-by Beruos.pptx
NISTSP80037rev2-by Beruos.pptx
 
CDC (1).pptx
CDC (1).pptxCDC (1).pptx
CDC (1).pptx
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 

DSS RMF Training.pptx

  • 1. 1 Risk Management Framework (RMF) NIST SP 800 30 Defense Security Service May 2017
  • 2. - 2 - • Review terminology/resources for RMF • Set expectations for completing documentation • Provide examples for discussion • Address Authorization requests via OBMS • Discuss Security Controls Assessor (SCA) Visit to the facility Goals of the Presentation
  • 3. - 3 -  What is Risk Management Framework (RMF)? o A unified information security framework for the entire federal government that replaces legacy Certification and Accreditation (C&A) processes applied to information systems (ISs). o A key component of an organization’s information security program used in the overall management of organizational risk.  When will RMF replace C&A (Phased Implementation)? o RMF has already replaced C&A for Stand-Alone systems as of October 3, 2016. Multi-User Standalones (MUSA) and Single-User Standalones (SUSA) were required to execute the RMF process for any expiring C&A accreditations and new submittals. o The Transition date for Local Area Networks (LAN) and Wide Area Networks (WAN) is tentatively set for January 1, 2018. (You can submit RMF plans prior to the start date) RMF Basics
  • 4. - 4 - Here is the way some people see things NIST SP-800-53r4 NIST SP-800-30 NIST SP-800-37 CNSSI-1253 Risk Assessment Report (RAR) System Assessment Report (SAR) SCAP Compliance Checker DISA STIGs DAAPM Terminology/Resources CDSE Training on RMF DOD 5220.22-M (NISPOM) SSP SSP Appendices ISSM Certification Statement DSS In Transition NIST SP 800-61 www.dss.mil/rmf Continuous Monitoring NIST SP 800-60 NIST SP 800-53A NIST SP-800-137
  • 5. - 5 - Local Area Network, Wide Area Network or Interconnected System between August 1, 2016 – 28 February 2017 RMF Policy References
  • 6. - 6 - Planning Guidance/Resources NIST SP-800-53 (rev 4)- Security and Privacy Controls for Federal Information Systems and Organizations, Dated April 2013 (with Jan 2015 updates) NIST SP-800-30 (rev 1)- Guide for Conducting Risk Assessments, dated September 2012 NIST SP-800-37 (rev 1) - Guide for Applying the Risk Management Framework to Federal Information Systems, dated February 2010 (with June 2014 updates) CNSSI-1253 Security Categorization and Control Selection for National Security Systems, Dated March 27, 2014 DAAPM- DSS Assessment and Authorization Process Manual, Dated August 24, 2016 Basic guidance for requesting the authorization of an information system for classified Government work. CDSE RMF Training- There are 7 courses that ISSMs are required to complete to get an Overall understanding of RMF (see “ISSM Required Online Training” in the DAAPM). NISPOM- DOD 5220.22-M, Dated February 2006 (with change 2 dated May 18, 2016) Basic starting point for cleared contractors to implement RMF (NISPOM 8-100.d) NIST SP 800-61 (rev 2)- Computer Security Incident Handling Guide, Dated August 2012 www.dss.mil/rmf- One stop website for many tools and templates needed for RMF NIST SP 800-60 (vol 1-2)- Guide for mapping information to categories, Dated August 2008
  • 7. - 7 - Security Controls and Continuous Monitoring The RMF process will manage risk more effectively through the introduction of security controls and continuous monitoring of those controls. Resources to assist in the RMF Process Many additional resources can be found on the NIST website (www.nist.gov) National Industrial Security Program Operating Manual (NISPOM) NIST SP 800-37: Guide for Applying the Risk Management Framework to Federal Information Systems NIST SP 800-137: Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations NIST SP 800-53: Security and Privacy Controls for Federal Information Systems and Organizations NIST SP 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans Committee on National Security Systems Instruction (CNSSI) 1253: Security Categorization and Control Selection for National Security Systems Purpose of Security Controls and Continuous Monitoring Benefits of Security Controls and Continuous Monitoring Assess security control effectiveness for an IS Document changes to the IS or its environment of operation Conduct security impact analyses of associated changes Report the security status of an IS Facilitate more efficient enterprise management of cybersecurity Increase security in the system development and acquisition processes Ensure compliance with national standards and reporting requirements
  • 8. - 8 - RMF Process Stakeholders – New Terminology Old Term in the C&A Process New Term in the RMF Process Designated Approving Authority (DAA) Authorizing Official (AO) Regional Designated Approving Authority (RDAA) Regional Authorizing Official (RAO) Office of the Designated Approving Authority (ODAA) NISP Authorization Office (NAO) Information Systems Security Professional (ISSP) ISSP/Security Control Assessor (SCA) Customer, Government Contracting Activity (GCA) Information Owner (IO) Contractor Information System Owner (ISO) *Information Systems Security Manager (ISSM) ISSM *Information Systems Security Officer (ISSO) ISSO Many RMF stakeholder titles have been revised in the transition from C&A. The following table outlines former terms in the C&A process as well as the corresponding new terms in the RMF process. Both sets of terms will continue to be used during the transition to RMF. *Titles will remain the same in RMF.
  • 9. - 9 - Connecting the Dots – What is Changing? What is staying the same? Process C&A RMF ODAA Business Management System (OBMS) Same Same System Security Plan (SSP) Template C&A Template RMF Template Categorization Basic, Med, High PLs Low, Mod, High Accessibility Certification Statement Same Same Risk Acknowledgement/Tailoring-out Risk Acknowledged Tailored-Out/Risk Acknowledgement MOU MOU MOU/ISA Standing-Up Like System Self- Certification Type Authorization Controls NISPOM Refs NIST Controls Approval to Process Accreditation Authorization
  • 10. - 10 - Connecting the Dots – What is Changing? What is staying the same? Process C&A RMF OBMS File Designation Submit Artifacts within OBMS  SSP  Certification Statement  Profile  SSP  Certification Statement  Risk Assessment Report  POA&M  SSP Supporting Artifacts (appendices) SSP Security Package Submission and Certification Statement IS Profile Other Other Issues Related to Authorization Comments Form Accreditation Letter Comments form used to concur with categorization/controls Terms & Conditions in Authorization Letter
  • 11. - 11 - RMF Process Walk Through: Introduction NISPAssessment & Authorization Life Cycle ISSM conducts self-assessment and updates the SSP to reflect the actual state of the IS. ISSP reviews submitted SSP and assesses the IS. 4. ASSESS Security Controls ISSM conducts risk assessment to determine system categorization (confidentiality, integrity, and availability). 1. CATEGORIZE Information System Starting Point ISSM continuously tracks and reports IS changes to the ISSP IAW the Continuous Monitoring Plan/Strategy. 6. MONITOR Security Controls 5. AUTHORIZE Information System AO determines risk. If acceptable, AO formally authorizes system to operate. ISSM implements security controls selected for the IS. 3. IMPLEMENT Security Controls 2. SELECT Security Controls ISSM selects security controls and applies tailoring and supplemental controls as needed based on risk assessment. ISSP reviews SSP and provides concurrence.
  • 12. - 12 -  RMF Courses Introduction to RMF (CS124.16) Continuous Monitoring (CS200.16) Categorization of the System (CS102.16) Selecting Security Controls (CS103.16) Implementing Security Controls (CS104.16) Assessing Security Controls (CS105.16) Authorizing Systems (CS106.16) Monitoring Security Controls (CS107.16) CDSE Training Courses
  • 13. - 13 - RMF Process Walk Through - STEP 1: Categorize the IS ISSM Actions:  Categorize the Information System (IS) based on the impact due to a loss of Confidentiality, Integrity, and Availability of the information that will be processed. (Note: The DSS SSP template is based on a Moderate Confidentiality, Low Integrity, and Low Availability Impact. Make sure you haven’t been contractually required to address different Impact Levels)  Perform a Risk/Threat Assessment and ensure a Risk Assessment Report (RAR) is completed. (Note: Seek information from all available sources (e.g., Government Customer/Information Owner, Program Managers, Local service risk/threat developed documents)  Document the system description, including the system/authorization boundary, in the System Security Plan.  Assign qualified personnel to RMF roles and document team member assignments in the SSP. Output(s): Risk Assessment Report, Initial System Security Plan Reference(s): NIST SP 800-30 rev 1, NIST SP 800-60, CNSSI 1253, DAAPM
  • 14. - 14 -  What guide is used when conducting a Risk Assessment? o NIST 800-30 Rev 1, Guide for Conducting Risk Assessments  What is the purpose of the RAR? o Inform decision makers and support risk responses by identifying:  Relevant threats  Vulnerabilities both internal and external to the organization  Impact to the organization that may occur given the potential for threats exploiting vulnerabilities  Likelihood that harm will occur o The end result is a determination of risk. o The RAR will be used to “fine tune” security controls for the life of the system RMF Step 1 – Risk Assessment Report (RAR)
  • 15. - 15 - RMF Step 1 – Risk Assessment Report (RAR)
  • 16. - 16 - RMF Process Walk Through – Step 2-1 through 2-3: Selecting Security Controls ISSM Actions:  Select the security controls applicable to the IS. The selection is based upon the results of the categorization (which is impacted by the RAR). (Controls for Moderate/Low/Low impact are included in the DSS SSP Template)  Tailor the controls as needed by supplementing, modifying, or tailoring out controls to effectively manage risk for any unique system conditions.  Develop a strategy for continuous monitoring of security control effectiveness.  Document the security controls selection results in the SSP. Output(s): Initial System Security Plan Reference(s): NIST SP 800-53 rev 4, CNSSI 1253, DAAPM (appendix A, D)
  • 17. - 17 - Security Controls Summary- NIST 112 10 58 82 50 34 48 56 26 22 22 116 86 13 15 10 50 16 826 Individual Controls from 18 “families” according to NIST SP-800-53r4
  • 18. - 18 - Security Controls Summary- DSS Appendix D 57 7 30 31 25 24 7 28 11 17 11 51 22 9 12 8 21 15 386 Individual Controls from 18 “families” according to DAAPM- App-D
  • 19. - 19 - Security Controls – Overlays (DAAPM, App D.)
  • 20. - 20 - Control Selection Using Excel A Spreadsheet is available at www.dss.mil/rmf . This would need converted to a PDF for input into OBMS
  • 21. - 21 - Now you are done selecting controls, but remember…
  • 22. - 22 - RMF Process Walk Through – Step 2-4: Submit Security Controls/ Categorization NISPAssessment & Authorization Life Cycle ISSM conducts self-assessment and updates the SSP to reflect the actual state of the IS. ISSP reviews submitted SSP and assesses the IS. 4. ASSESS Security Controls ISSM conducts risk assessment to determine system categorization (confidentiality, integrity, and availability). 1. CATEGORIZE Information System Starting Point ISSM continuously tracks and reports IS changes to the ISSP IAW the Continuous Monitoring Plan/Strategy. 6. MONITOR Security Controls 5. AUTHORIZE Information System AO determines risk. If acceptable, AO formally authorizes system to operate. ISSM implements security controls selected for the IS. 3. IMPLEMENT Security Controls 2. SELECT Security Controls ISSM selects security controls and applies tailoring and supplemental controls as needed based on risk assessment. ISSP reviews SSP and provides concurrence. Risk Assessment Report (RAR) is complete Categorization is complete Control Selection is complete Now at this point….
  • 23. - 23 - • Use OBMS to submit initial documents. • Submit the SSP in OBMS as the “SSP” • Submit the Risk Assessment Report (RAR) as the “IS Profile” • Submit a “blank” Certification Statement as the “Security Package Submission and Certification Statement” • Submit other necessary artifacts as “other” (Note: There is a “SSP appendices” document that can be used for things like the POA&M, DD-254, etc.) • Remember that all documents in OBMS must be .pdf RMF Process Walk Through – Step 2-4: ISSM Submits Step “2” work via OBMS
  • 24. - 24 - RMF Process Walk Through – Step 2-4: DSS Response to Controls/Categorization ISSP/SCAActions:  Review the initial SSP and RAR to ensure it meets the necessary security requirements and effectively identifies potential risks to the IS. The ISSP/SCA also reviews the ISSM-recommended deltas from the standard baseline.  Documents concurrence or non-concurrence in the Categorization & Implementation Concurrence Form.  Categorization & Implementation Concurrence Form is returned to ISSM via OBMS. (Note: This is done with a new form, but the “comments” drop down is used in OBMS.) Output: DSS Categorization & Implementation Concurrence Form • The ISSP/SCA is focusing their review on the Categorization of the IS and the Selection of controls and will only comment on detailed supporting information if time permits.
  • 25. - 25 - RMF Process Walk Through – Step 2-4: ISSM Response to DSS “step 2” review ISSM Actions:  If concurrence for both categorization and selection of initial baseline controls is issued, proceed to RMF Step 3.  If non-concurrence is issued, address outstanding issues documented in Categorization & Implementation Concurrence Form. Once issues are addressed, resubmit the RAR and initial SSP via OBMS. Output(s): Initial SSP with identified controls, Continuous Monitoring Strategy, RAR, and Categorization & Implementation Concurrence Form
  • 26. - 26 - RMF Process Walk Through – Step 3: Implement Security Controls ISSM Actions:  Implement security controls as determined/documented in RMF Step 2.  Revise the SSP in order to document the security control implementation.  Start a Plan of Action and Milestones (as applicable).  Conduct an initial assessment to facilitate early identification of weaknesses and deficiencies.  Document (or update as necessary) the security control implementation in the SSP. Output: Updated SSP with a complete functional description of security control implementation. Reference(s): CNSSI 1253, NIST SP 800-53, and DAAPM (Appendix A & D)
  • 27. - 27 - RMF Process Walk Through – Step 4: Assess Security Controls ISSM Actions:  Conduct an initial assessment of the effectiveness of the security controls in accordance with the security procedures defined in the SSP.  Utilize the Defense Information System Agency (DISA) vulnerability scanning tools (SCAP Compliance Checker and DISA STIG Viewer) and the DSS Technical Assessment Job Aids to support the initial assessment. If the IS cannot be assessed utilizing the specified scanning tools, please document the justification in the SSP.  Finalize the SSP to reflect the actual state of the security controls, as required, based on the vulnerabilities of the security control assessment, reassessment, and completion of any remediation actions taken.  Submit the final SSP, signed Certification Statement, RAR, POA&M, and supporting artifacts via OBMS. Artifact(s): Final SSP, singed Certification Statement, RAR, POA&M, and SSP Supporting Artifacts Reference(s): NIST SP 800-53A, DAAPM, www.dss.mil/rmf
  • 28. - 28 - The following tools are helpful :  SCAP Content Checker (SCC)- This tool (developed for SPAWAR) allows you to compare your system configuration to a “defined” standard (typically called a “benchmark”).  DISA STIG Viewer- This is a DISA application used to view various “Security Technical Implementation Guide (STIG) content  DISA STIG Content • Complete Comprehensive STIG • Benchmarks • IAVMs- Information Assurance Vulnerability Management….i.e., Patching • STIG Checklists Output: Confirmation that controls have been properly implemented, Checklists, etc.. Reference(s): http://iase.disa.mil/stigs/Pages/index.aspx# NOTE: Some DISA Content is PKI encrypted which can present some difficulty for Contractors. RMF Process Walk Through – Step 4: Assess Security Controls- Assessment Tools
  • 29. - 29 - The STIG Viewer is used to create a checklist of 300 Overall STIG Items RMF Process Walk Through – Step 4: Assessment Tools-Windows 7 Example The SCC can analyze 254 Windows 7 automated computer settings based on a Windows 7 STIG Benchmark (V1R31) Remaining 46 Items need to be manually assessed An IAVM STIG checklist can be generated to view 493 Vulnerabilities (as of 12-23-2016) to confirm Patch implementation XCCDF results file is created and imported into the overall checklist. Technical & Manual Checks
  • 30. - 30 - RMF Process Walk Through – Step 4: Assessment Tools- STIG Viewer Sign up to get notified about STIG updates… A guide for the STIG viewer (Now at version 2.5.1) is located at….http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx
  • 31. - 31 - RMF Process Walk Through – Step 4: Assessment Tools- SCC Tool
  • 32. - 32 - RMF Process Walk Through – Step 4: Assessment Tools- STIG Checklist
  • 33. - 33 - RMF Process Walk Through – Step 2-4: Submit Security Controls/ Categorization NISPAssessment & Authorization Life Cycle ISSM conducts self-assessment and updates the SSP to reflect the actual state of the IS. ISSP reviews submitted SSP and assesses the IS. 4. ASSESS Security Controls ISSM conducts risk assessment to determine system categorization (confidentiality, integrity, and availability). 1. CATEGORIZE Information System Starting Point ISSM continuously tracks and reports IS changes to the ISSP IAW the Continuous Monitoring Plan/Strategy. 6. MONITOR Security Controls 5. AUTHORIZE Information System AO determines risk. If acceptable, AO formally authorizes system to operate. ISSM implements security controls selected for the IS. 3. IMPLEMENT Security Controls 2. SELECT Security Controls ISSM selects security controls and applies tailoring and supplemental controls as needed based on risk assessment. ISSP reviews SSP and provides concurrence. Certification is ready for signature Final POA&M is complete Final SSP is complete Now at this point….
  • 34. - 34 - RMF Process Walk Through – Step 4: Assess Security Controls ISSP/SCAActions:  Receives/Reviews the final SSP, Certification Statement, RAR, POA&M, and SSP Supporting Artifacts via OBMS.  If the SSP is acceptable and the documentation fully addresses all system security controls and security configurations, an on-site validation will be scheduled. Artifact(s): Final SSP, POA&M Reference(s): DAAPM, NIST SP 800-53A
  • 35. - 35 - RMF Process Walk Through – Step 5: Authorize the IS ISSP/SCAActions:  Perform an on-site validation:  Assess the technical security controls and system configuration utilizing the DISA vulnerability scanning tools (SCAP Compliance Checker/DISA STIG Viewer).  Document any weaknesses and deficiencies within the Security Assessment Report.  Identify necessary remediation actions in the POA&M.  Prepares the System Assessment Report (SAR).  Completes Security Authorization Package which included a risk based recommendation  Submits Security Authorization Package to AO. AO Actions:  Assess the Security Authorization Package and issue an authorization decision. The authorization decision will be an Interim Authorization to Operate (IATO), Authorization to Operate (ATO), or Denial of Authorization to Operate (DATO). The authorization decision will include any terms and conditions of operation as well as the authorization termination date (ATD).  The Authorization Letter will be provided to the ISSM via OBMS. Artifact(s): System Assessment Report (SAR), Authorization Letter Reference(s): DAAPM
  • 36. - 36 - RMF Process Walk Through – Step 6: Monitor the IS ISSM Actions:  Determine the security impact of proposed or actual changes to the IS and its operating environment and inform the ISSP/SCA as necessary.  Assess a selected subset of the security controls, based on the approved continuous monitoring strategy, and inform the ISSP/SCA of the results.  Update SSP documentation and work to satisfy POA&M requirements. Provide regular status reports to the ISSP/SCA per the continuous monitoring strategy.  Conduct any necessary remediation actions based on findings discovered during continuous monitoring.  Ensure IS security documentation is updated and maintained. Review the reported security status of the IS.  As necessary, develop and implement an IS decommissioning strategy. Artifact(s): Updated POA&M, Updated SSP, Status Reports, Decommissioning Strategy (as necessary), and Continuous Monitoring Strategy. Reference(s): DAAPM, NIST SP 800-137
  • 37. - 37 -  RMF is a new process for both ISSPs and ISSMs. Success can only be achieved by becoming familiar with the DAAPM and utilizing all available resources. The DAAPM is the ultimate authority.  As with any new process, the first SSP submission will be the most challenging. After the first SSP submission is completed, the process will become more routine.  The DSS Risk Management Framework Information and Resources Web Page provides links to Policy/Guidance, Resources, Training, and Toolkits.  Helpful information can also be accessed at the RMF Knowledge Service Webpage (https://rmfks.osd.mil/login.htm). RMF Helpful Hints
  • 38. - 38 - DSS RMF Information and Resources Web Page www.dss.mil/rmf
  • 39. - 39 - Questions? Contact your local ISSP or visit http://www.dss.mil/rmf/.

Editor's Notes

  1. The amount of terminology and available reference material can sometimes feel overwhelming. This presentation will attempt to help put things in perspective.
  2. Remember that all files loaded into OBMS must be pdf files. Items in “red” are required by OBMS or the submitter will get an error
  3. The highlighted steps is where the most DSS involvement will be.
  4. You may be asked to coordinate a RAL with the Information Owner if items tailored out are not already included in the RAR.
  5. We are still in Step 2 of the RMF process and the ISSM has just completed the RAR, The system categorization, and the selection of controls (identified by the boxed area. The question is now how do you get that to DSS?
  6. ISSM are encouraged to use available tools to aid with their assessment of the implemented controls. These tools are not mandatory, but they will be used by the SCA during the onsite review.
  7. Here is an overall diagram related to the possible review of a Windows 7 computer. You can review the 278 technical settings either manually or in an automated fashion with the SCC and then evaluate the other items manually
  8. This STIG viewer can be used to view STIG content from many different areas. You can view Benchmarks, IAVMs, or overall STIG content.
  9. Here is an example of what the SCAP Compliance Checker (SCC) looks like. The tool can be used in conjunction with many different benchmarks. This can include benchmarks that relate to the Operating System software and various Application software.
  10. This is what a typical STIG checklist will look like and as you fill it out the chart in the upper left and the colors for completed items will help identify which items remain open.
  11. We are still in Step 2 of the RMF process and the ISSM has just completed the RAR, The system categorization, and the selection of controls (identified by the boxed area. The question is now how do you get that to DSS?