SlideShare a Scribd company logo
Working for Uncle Sam
FIPS/FISMA 101
Kenneth Silsbee
Principal Consultant, Yeoman Security Consulting
ksilsbee@yeomansecurity.com
Who Am I?
Kenneth Silsbee
In IT for over 20 years.
In Information Security over 10 years.
Over 10 years teaching business management and security.
6 years consulting, Built 2 software security programs from
scratch.
Worked in numerous Fortune 500 companies and 2 startups.
I’ve seen telecommunications, aerospace, manufacturing,
insurance, and commercial software.
Recent efforts in HIPAA, FISMA, and PCI compliance.
Security IT leadership & Program Management,
specializing in software and data protection.
FISMA-FIPS, FIPS-FISMA. . .
I’m Sooo Confused!!
E-Government Act of 2002
 Recognized importance of information security to the US
 Every federal agency and contractor needs a security program
 FISMA part of the act.
FISMA (Federal Information Security Management Act)
 Sets the requirements for an overall risk-based program to
manage information security
 Specifies the framework of policies and procedures to address
security risks
FIPS (Federal Information Processing Standards)
 Government standards for computer systems used by
non-military government agencies and contractors
 FIPS 100 document series are required standards
And Then There is NIST
National Institute of Standards and Testing
 Computer Security Division
 Develops standards and guidelines for Federal
computer systems
 Creates FIPS where no acceptable industry standards
or solutions exist
 Using voluntary industry standards (eg ANSI) encouraged
Key NIST Publication Types
 FIPS 100 Series Publications on
mandatory security standards
 ITL (Information Technology Laboratory) Security Bulletin
– special topics
 800 Series Special Publications on security
The Link Between FISMA,
FIPS, and NIST
FISMA
Relies on NIST Special Publications for How to Execute a
Security Program
Relies on FIPS Publications for Specific Security Standards
NIST
Also Provides Supplemental Security Guidance
and Guidelines not identified by FISMA or FIPS
Compliant vs Certified
FIPS
“FIPS compliant” if using the methods and technologies specified
by the FIPS 100 document series
 Usually references cryptography (FIPS 140 compliant)
“FIPS Certified” applies to custom cryptography tested by
third-party laboratories
 Part of the Cryptographic Module Validation Program (CMVP)
 NIST FIPS 140-2 for details
FISMA
Certification and accreditation program
First, system controls are certified to function appropriately
Next, the information system’s security accredited by
review and government authorization
NIST SP 800-37 for details
FISMA Compliance
Framework PI
1. Create an Information Systems Inventory
 “The elements used for a common purpose”
(NIST SP 800-18)
1. Categorize Information and Information
Systems by Risk Level
 Maps to impact level & response
(NIST SP 800-18)
1. Select Minimum Security Controls
 Flexible match of security controls to need
(NIST SP 800-53)
FISMA Compliance
Framework PII
4. Assess the Effectiveness of the System
 Risk assessment adjusts security needs
(NIST SP 800-30)
5. Maintain a System Security Plan
 Defines a repeatable evaluation process
(NIST SP 800-18)
6. Perform Continuous Monitoring
 Part of the Risk Management Framework (RMF)
(NIST SP 800-137 ,
NIST FAQ Continuous Monitoring)
What do I do to
Work for Uncle Sam?
 Any device with software (eg defibrillator) or a
software application at a minimum must:
 Be categorized by risk level (FIPS 199)
 Meet minimum security requirements
(FIPS 200 & NIST SP 800-53)
 An Information System (integrated components for
collecting, storing and processing data or delivering
information or knowledge) must:
 Become FISMA compliant (includes FIPS)
 Although mandated, only 7 of 14
government agencies FISMA compliant
Best Practices
 Appoint somebody to own data security
 Ultimate oversight (doesn’t need to be CIO)
 Meet FIPS first (FISMA next – If needed)
 Expend resources based on risk – Some risk is OK. ID
most crucial security controls
 Monitor where it counts – vulnerability scanners, etc.
 Use Integrity testing tools to ID system
changes & potential compromises
For More Information
FISMA Resourced
http://csrc.nist.gov/groups/SMA/fisma/
FIPS and NIST Documents
http://csrc.nist.gov/publications/
FISMA Advice
http://www.cliftonlarsonallen.com/Federal-Government/CMS-
Security-Guidelines-Contractors-FISMA-Compliance.aspx
Meeting FISMA Effectively
http://www.informationweek.com/whitepaper/government/security
/six-critical-elements-to-achieving-economies-in-f-
wp1278458862136
QUESTIONS?
Kenneth Silsbee
Principal Consultant, Yeoman Security Consutling
ksilsbee@yeomansecurity.com
425-413-3979

More Related Content

What's hot

5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
MEN Mikro Elektronik GmbH
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
Zefren Edior
 
Structure of iso 27001
Structure of iso 27001Structure of iso 27001
Structure of iso 27001
CUNIX INDIA
 
Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.
Computer engineering company
 
Information Assurance And Security - Chapter 1 - Lesson 3
Information Assurance And Security - Chapter 1 - Lesson 3Information Assurance And Security - Chapter 1 - Lesson 3
Information Assurance And Security - Chapter 1 - Lesson 3
MLG College of Learning, Inc
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data Breach
Anchises Moraes
 
How I Woke Up from the CMMC Compliance Nightmare
How I Woke Up from the CMMC Compliance NightmareHow I Woke Up from the CMMC Compliance Nightmare
How I Woke Up from the CMMC Compliance Nightmare
Ignyte Assurance Platform
 
Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4
MLG College of Learning, Inc
 
Lesson 2
Lesson 2Lesson 2
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_bangloreIPPAI
 
S nandakumar
S nandakumarS nandakumar
S nandakumarIPPAI
 
Infosec Workshop - PacINET 2007
Infosec Workshop - PacINET 2007Infosec Workshop - PacINET 2007
Infosec Workshop - PacINET 2007
Chris Hammond-Thrasher
 
Top 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure InfrastructureTop 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure Infrastructure
Infosec
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Ignyte Assurance Platform
 
How to Comply with NIST 800-171
How to Comply with NIST 800-171How to Comply with NIST 800-171
How to Comply with NIST 800-171
Corserva
 
Khas bank isms 3 s
Khas bank isms 3 sKhas bank isms 3 s
Khas bank isms 3 s
Khaltar Togtuun
 
A framework for an organization to use in determining if it needs a ciso
A framework for an organization to use in determining if it needs a cisoA framework for an organization to use in determining if it needs a ciso
A framework for an organization to use in determining if it needs a ciso
Max Justice
 
Security Information and Event Management
Security Information and Event ManagementSecurity Information and Event Management
Security Information and Event Management
UTD Computer Security Group
 
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...
Dubai Cyber Security   02   Ics Scada Cyber Security Standards, Solution Tips...Dubai Cyber Security   02   Ics Scada Cyber Security Standards, Solution Tips...
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...
Ahmed Al Enizi
 
Physical Security Information Management Solution for the Enterprise
Physical Security Information Management Solution for the EnterprisePhysical Security Information Management Solution for the Enterprise
Physical Security Information Management Solution for the Enterprise
VidSys, Inc.
 

What's hot (20)

5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
 
Structure of iso 27001
Structure of iso 27001Structure of iso 27001
Structure of iso 27001
 
Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.
 
Information Assurance And Security - Chapter 1 - Lesson 3
Information Assurance And Security - Chapter 1 - Lesson 3Information Assurance And Security - Chapter 1 - Lesson 3
Information Assurance And Security - Chapter 1 - Lesson 3
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data Breach
 
How I Woke Up from the CMMC Compliance Nightmare
How I Woke Up from the CMMC Compliance NightmareHow I Woke Up from the CMMC Compliance Nightmare
How I Woke Up from the CMMC Compliance Nightmare
 
Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_banglore
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
Infosec Workshop - PacINET 2007
Infosec Workshop - PacINET 2007Infosec Workshop - PacINET 2007
Infosec Workshop - PacINET 2007
 
Top 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure InfrastructureTop 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure Infrastructure
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
 
How to Comply with NIST 800-171
How to Comply with NIST 800-171How to Comply with NIST 800-171
How to Comply with NIST 800-171
 
Khas bank isms 3 s
Khas bank isms 3 sKhas bank isms 3 s
Khas bank isms 3 s
 
A framework for an organization to use in determining if it needs a ciso
A framework for an organization to use in determining if it needs a cisoA framework for an organization to use in determining if it needs a ciso
A framework for an organization to use in determining if it needs a ciso
 
Security Information and Event Management
Security Information and Event ManagementSecurity Information and Event Management
Security Information and Event Management
 
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...
Dubai Cyber Security   02   Ics Scada Cyber Security Standards, Solution Tips...Dubai Cyber Security   02   Ics Scada Cyber Security Standards, Solution Tips...
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...
 
Physical Security Information Management Solution for the Enterprise
Physical Security Information Management Solution for the EnterprisePhysical Security Information Management Solution for the Enterprise
Physical Security Information Management Solution for the Enterprise
 

Similar to KSC_FIPS_FISMA101

Rapid7 FISMA Compliance Guide
Rapid7 FISMA Compliance GuideRapid7 FISMA Compliance Guide
Rapid7 FISMA Compliance Guide
Rapid7
 
Demystifying the Cyber NISTs
Demystifying the Cyber NISTsDemystifying the Cyber NISTs
Demystifying the Cyber NISTs
Schellman & Company
 
Contractor Responsibilities under the Federal Information Security Management...
Contractor Responsibilities under the Federal Information Security Management...Contractor Responsibilities under the Federal Information Security Management...
Contractor Responsibilities under the Federal Information Security Management...padler01
 
A Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT BudgetA Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT Budget
Rochester Security Summit
 
NIST-Cloud-Presentation-Industry-Day-Release.pptx
NIST-Cloud-Presentation-Industry-Day-Release.pptxNIST-Cloud-Presentation-Industry-Day-Release.pptx
NIST-Cloud-Presentation-Industry-Day-Release.pptx
KellyMcBrair
 
Federal Cybersecurity: The latest challenges, initiatives and best practices
Federal Cybersecurity: The latest challenges, initiatives and best practicesFederal Cybersecurity: The latest challenges, initiatives and best practices
Federal Cybersecurity: The latest challenges, initiatives and best practices
John Gilligan
 
DojoSec FISMA Presentation
DojoSec FISMA PresentationDojoSec FISMA Presentation
DojoSec FISMA Presentation
danphilpott
 
Security Information Event Management - nullhyd
Security Information Event Management - nullhydSecurity Information Event Management - nullhyd
Security Information Event Management - nullhyd
n|u - The Open Security Community
 
Security Standards Please respond to the following A number of .pdf
Security Standards Please respond to the following A number of .pdfSecurity Standards Please respond to the following A number of .pdf
Security Standards Please respond to the following A number of .pdf
fsenterprises
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
mccormicknadine86
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
sleeperharwell
 
RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™
CPaschal
 
L11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxL11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptx
StevenTharp2
 
CRS Company Overview -Feb 6 2017
CRS Company Overview -Feb 6 2017CRS Company Overview -Feb 6 2017
CRS Company Overview -Feb 6 2017Joseph John
 
Standards & Framework.pdf
Standards & Framework.pdfStandards & Framework.pdf
Standards & Framework.pdf
karthikvcyber
 
Information Security Identity and Access Management Administration 07072016
Information Security   Identity and Access Management Administration 07072016Information Security   Identity and Access Management Administration 07072016
Information Security Identity and Access Management Administration 07072016Leon Blum
 
Standards & Framework.ppt
Standards & Framework.pptStandards & Framework.ppt
Standards & Framework.ppt
karthikvcyber
 
2010 Secure World Boston Nist
2010 Secure World Boston Nist2010 Secure World Boston Nist
2010 Secure World Boston Nist
candy_alexander
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summary
SensePost
 
Cyber Families - Incident Response.pptx
Cyber Families - Incident Response.pptxCyber Families - Incident Response.pptx
Cyber Families - Incident Response.pptx
Kinetic Potential
 

Similar to KSC_FIPS_FISMA101 (20)

Rapid7 FISMA Compliance Guide
Rapid7 FISMA Compliance GuideRapid7 FISMA Compliance Guide
Rapid7 FISMA Compliance Guide
 
Demystifying the Cyber NISTs
Demystifying the Cyber NISTsDemystifying the Cyber NISTs
Demystifying the Cyber NISTs
 
Contractor Responsibilities under the Federal Information Security Management...
Contractor Responsibilities under the Federal Information Security Management...Contractor Responsibilities under the Federal Information Security Management...
Contractor Responsibilities under the Federal Information Security Management...
 
A Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT BudgetA Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT Budget
 
NIST-Cloud-Presentation-Industry-Day-Release.pptx
NIST-Cloud-Presentation-Industry-Day-Release.pptxNIST-Cloud-Presentation-Industry-Day-Release.pptx
NIST-Cloud-Presentation-Industry-Day-Release.pptx
 
Federal Cybersecurity: The latest challenges, initiatives and best practices
Federal Cybersecurity: The latest challenges, initiatives and best practicesFederal Cybersecurity: The latest challenges, initiatives and best practices
Federal Cybersecurity: The latest challenges, initiatives and best practices
 
DojoSec FISMA Presentation
DojoSec FISMA PresentationDojoSec FISMA Presentation
DojoSec FISMA Presentation
 
Security Information Event Management - nullhyd
Security Information Event Management - nullhydSecurity Information Event Management - nullhyd
Security Information Event Management - nullhyd
 
Security Standards Please respond to the following A number of .pdf
Security Standards Please respond to the following A number of .pdfSecurity Standards Please respond to the following A number of .pdf
Security Standards Please respond to the following A number of .pdf
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™
 
L11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxL11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptx
 
CRS Company Overview -Feb 6 2017
CRS Company Overview -Feb 6 2017CRS Company Overview -Feb 6 2017
CRS Company Overview -Feb 6 2017
 
Standards & Framework.pdf
Standards & Framework.pdfStandards & Framework.pdf
Standards & Framework.pdf
 
Information Security Identity and Access Management Administration 07072016
Information Security   Identity and Access Management Administration 07072016Information Security   Identity and Access Management Administration 07072016
Information Security Identity and Access Management Administration 07072016
 
Standards & Framework.ppt
Standards & Framework.pptStandards & Framework.ppt
Standards & Framework.ppt
 
2010 Secure World Boston Nist
2010 Secure World Boston Nist2010 Secure World Boston Nist
2010 Secure World Boston Nist
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summary
 
Cyber Families - Incident Response.pptx
Cyber Families - Incident Response.pptxCyber Families - Incident Response.pptx
Cyber Families - Incident Response.pptx
 

KSC_FIPS_FISMA101

  • 1. Working for Uncle Sam FIPS/FISMA 101 Kenneth Silsbee Principal Consultant, Yeoman Security Consulting ksilsbee@yeomansecurity.com
  • 2. Who Am I? Kenneth Silsbee In IT for over 20 years. In Information Security over 10 years. Over 10 years teaching business management and security. 6 years consulting, Built 2 software security programs from scratch. Worked in numerous Fortune 500 companies and 2 startups. I’ve seen telecommunications, aerospace, manufacturing, insurance, and commercial software. Recent efforts in HIPAA, FISMA, and PCI compliance. Security IT leadership & Program Management, specializing in software and data protection.
  • 3. FISMA-FIPS, FIPS-FISMA. . . I’m Sooo Confused!! E-Government Act of 2002  Recognized importance of information security to the US  Every federal agency and contractor needs a security program  FISMA part of the act. FISMA (Federal Information Security Management Act)  Sets the requirements for an overall risk-based program to manage information security  Specifies the framework of policies and procedures to address security risks FIPS (Federal Information Processing Standards)  Government standards for computer systems used by non-military government agencies and contractors  FIPS 100 document series are required standards
  • 4. And Then There is NIST National Institute of Standards and Testing  Computer Security Division  Develops standards and guidelines for Federal computer systems  Creates FIPS where no acceptable industry standards or solutions exist  Using voluntary industry standards (eg ANSI) encouraged Key NIST Publication Types  FIPS 100 Series Publications on mandatory security standards  ITL (Information Technology Laboratory) Security Bulletin – special topics  800 Series Special Publications on security
  • 5. The Link Between FISMA, FIPS, and NIST FISMA Relies on NIST Special Publications for How to Execute a Security Program Relies on FIPS Publications for Specific Security Standards NIST Also Provides Supplemental Security Guidance and Guidelines not identified by FISMA or FIPS
  • 6. Compliant vs Certified FIPS “FIPS compliant” if using the methods and technologies specified by the FIPS 100 document series  Usually references cryptography (FIPS 140 compliant) “FIPS Certified” applies to custom cryptography tested by third-party laboratories  Part of the Cryptographic Module Validation Program (CMVP)  NIST FIPS 140-2 for details FISMA Certification and accreditation program First, system controls are certified to function appropriately Next, the information system’s security accredited by review and government authorization NIST SP 800-37 for details
  • 7. FISMA Compliance Framework PI 1. Create an Information Systems Inventory  “The elements used for a common purpose” (NIST SP 800-18) 1. Categorize Information and Information Systems by Risk Level  Maps to impact level & response (NIST SP 800-18) 1. Select Minimum Security Controls  Flexible match of security controls to need (NIST SP 800-53)
  • 8. FISMA Compliance Framework PII 4. Assess the Effectiveness of the System  Risk assessment adjusts security needs (NIST SP 800-30) 5. Maintain a System Security Plan  Defines a repeatable evaluation process (NIST SP 800-18) 6. Perform Continuous Monitoring  Part of the Risk Management Framework (RMF) (NIST SP 800-137 , NIST FAQ Continuous Monitoring)
  • 9. What do I do to Work for Uncle Sam?  Any device with software (eg defibrillator) or a software application at a minimum must:  Be categorized by risk level (FIPS 199)  Meet minimum security requirements (FIPS 200 & NIST SP 800-53)  An Information System (integrated components for collecting, storing and processing data or delivering information or knowledge) must:  Become FISMA compliant (includes FIPS)  Although mandated, only 7 of 14 government agencies FISMA compliant
  • 10. Best Practices  Appoint somebody to own data security  Ultimate oversight (doesn’t need to be CIO)  Meet FIPS first (FISMA next – If needed)  Expend resources based on risk – Some risk is OK. ID most crucial security controls  Monitor where it counts – vulnerability scanners, etc.  Use Integrity testing tools to ID system changes & potential compromises
  • 11. For More Information FISMA Resourced http://csrc.nist.gov/groups/SMA/fisma/ FIPS and NIST Documents http://csrc.nist.gov/publications/ FISMA Advice http://www.cliftonlarsonallen.com/Federal-Government/CMS- Security-Guidelines-Contractors-FISMA-Compliance.aspx Meeting FISMA Effectively http://www.informationweek.com/whitepaper/government/security /six-critical-elements-to-achieving-economies-in-f- wp1278458862136
  • 12. QUESTIONS? Kenneth Silsbee Principal Consultant, Yeoman Security Consutling ksilsbee@yeomansecurity.com 425-413-3979