The presentation defines cyber security, its importance, presents a Framework to address the threats. The framework consists of core, profile and tiers
CISO, or Chief Information Security Officer, is an established top-level executive position in the industry, similar to CEO or CTO. CISO is the highest-level executive in an organization charged with information security. With the increasing awareness of digital information as an asset in the industry at large, the demand for CISOs across organizations is on a rise. The CISOs focus on the core areas pertaining to information security in an enterprise and lead the IS program.
This is about the lessons in Information, Assurance and Security. Complete module 3of lesson 7 are there so you could learn more about it. And may found helpful with your assignments, activities or etc.
Mrs Bianca Pasipanodya, the Group ICT executive for First Mutual Group an esteemed speaker at the ISACA Harare Chapter, gives her remarks about the implementation of an effective Information Security Management System” in Zimbabwe.
Building an effective Information Security RoadmapElliott Franklin
As company information security functions continue to grow each year with increasing attacks and regulations, how are you handling the
pressure? Are you constantly battling to run the business projects and reacting to customer requests? Have you blocked off a few hours each week
on your calendar to close your email, turn off your phone and try to build, assess and maintain an effective vision for your security team? This
presentation will discuss a cascading approach to creating such a roadmap that is easily understood by executives and has helped gain quick buy
in for multiple enterprise wide security projects.
In today’s business environment, organizations have a responsibility to their employees, clients, and customers to ensure the confidentiality, integrity and availability of the critical data that is entrusted to them. Every network is vulnerable to some form of attack. However it is not enough to simply confirm that a technical vulnerability exists and implement countermeasures; it is critical to repeatedly verify that the countermeasures are in place and working properly throughout the secured network. During this webinar, David Hammarberg, Principal, IT Director, and leader of McKonly & Asbury’s Cybersecurity Practice will be joined by Partner, Michael Hoffner and they will lead a discussion on a Cybersecurity Risk Management Program including what it is and how it can prepare your organization for the future.
CHAPTER
5
Security Policies, Standards, Procedures, and
Guidelines
The four components of security documentation are policies, standards,
procedures, and guidelines. Together, these form the complete definition of a
mature security program. The Capability Maturity Model (CMM), which measures
how robust and repeatable a business process is, is often applied to security
programs. The CMM relies heavily on documentation for defining repeatable,
optimized processes. As such, any security program considered mature by CMM
standards needs to have well-defined policies, procedures, standards, and
guidelines.
• Policy is a high-level statement of requirements. A security policy is the primary
way in which management’s expectations for security are provided to the
builders, installers, maintainers, and users of an organization’s information
systems.
• Standards specify how to configure devices, how to install and configure
software, and how to use computer systems and other organizational assets, to be
compliant with the intentions of the policy.
• Procedures specify the step-by-step instructions to perform various tasks in
accordance with policies and standards.
• Guidelines are advice about how to achieve the goals of the security policy, but
they are suggestions, not rules. They are an important communication tool to let
people know how to follow the policy’s guidance. They convey best practices for
using technology systems or behaving according to management’s preferences.
This chapter covers the basics of what you need to know about policies,
standards, procedures, and guidelines, and provides some examples to illustrate
the principles. Of these, security policies are the most important within the
context of a security program, because they form the basis for the decisions that
are made within the security program, and they give the security program its
“teeth.” As such, the majority of this chapter is devoted to security policies. There
are other books that cover policies in as much detail as you like. See the
References section for some recommendations. The end of this chapter provides
you with some guidance and examples for standards, procedures, and guidelines,
so you can see how they are made, and how they relate to policies.
Security Policies
A security policy is the essential foundation for an effective and comprehensive
security program. A good security policy should be a high-level, brief, formalized
statement of the security practices that management expects employees and
other stakeholders to follow. A security policy should be concise and easy to
understand so that everyone can follow the guidance set forth in it.
In its basic form, a security policy is a document that describes an
organization’s security requirements. A security policy specifies what should be
done, not how; nor does it specify technologies or specific solutions. The security
policy defines a specific set of ...
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
Are you effectively securing your organization’s IT systems that store, process, or transmit organizational information?
Is your IT risk management plan tailored to the specific risk profile of your business and being coordinated across all functional and business units?
With the release of IT Governance frameworks, requirements for risk management and new international standards entering the market, the pressure is mounting to ensure that all your IT risks are identified and the necessary action is taken – be this to mitigate them, accept or ignore them. So, how safe is your IT system? What are the risks that your organization is being exposed to?
The solution to this challenge is to establish an effective risk management process that protects the organization, not just its IT assets, and provides it with the ability to perform its mission.
Risk management is the process of identifying and assessing risk and taking preventive measures to reduce it to an acceptable level. It is critical that you develop an effective risk management program that assesses and mitigates risks within your IT systems and better manages these IT-related mission risks.
BENEFITS OF ATTENDING THIS WORKSHOP
Identify common IT project risks
Learn how to assess threats and vulnerabilities to create a risk response strategy
Understand what qualifies as risk with IT projects
Understand the most common IT risk sources
Qualify and quantify IT risks
Learn the difference between negative and positive IT risks
Develop an IT risk management plan
Plan risk response methods for IT risks
Create risk mitigation and contingency plans
Monitor and control project risks
Overcome resistance from stakeholders and team members
WHO SHOULD ATTEND THIS WORKSHOP
IT risk managers
IT security managers
Compliance officers
Program and project managers
IT project managers
IT operation manager
Contact Kris at kris@360bsi.com to register.
The presentation defines cyber security, its importance, presents a Framework to address the threats. The framework consists of core, profile and tiers
CISO, or Chief Information Security Officer, is an established top-level executive position in the industry, similar to CEO or CTO. CISO is the highest-level executive in an organization charged with information security. With the increasing awareness of digital information as an asset in the industry at large, the demand for CISOs across organizations is on a rise. The CISOs focus on the core areas pertaining to information security in an enterprise and lead the IS program.
This is about the lessons in Information, Assurance and Security. Complete module 3of lesson 7 are there so you could learn more about it. And may found helpful with your assignments, activities or etc.
Mrs Bianca Pasipanodya, the Group ICT executive for First Mutual Group an esteemed speaker at the ISACA Harare Chapter, gives her remarks about the implementation of an effective Information Security Management System” in Zimbabwe.
Building an effective Information Security RoadmapElliott Franklin
As company information security functions continue to grow each year with increasing attacks and regulations, how are you handling the
pressure? Are you constantly battling to run the business projects and reacting to customer requests? Have you blocked off a few hours each week
on your calendar to close your email, turn off your phone and try to build, assess and maintain an effective vision for your security team? This
presentation will discuss a cascading approach to creating such a roadmap that is easily understood by executives and has helped gain quick buy
in for multiple enterprise wide security projects.
In today’s business environment, organizations have a responsibility to their employees, clients, and customers to ensure the confidentiality, integrity and availability of the critical data that is entrusted to them. Every network is vulnerable to some form of attack. However it is not enough to simply confirm that a technical vulnerability exists and implement countermeasures; it is critical to repeatedly verify that the countermeasures are in place and working properly throughout the secured network. During this webinar, David Hammarberg, Principal, IT Director, and leader of McKonly & Asbury’s Cybersecurity Practice will be joined by Partner, Michael Hoffner and they will lead a discussion on a Cybersecurity Risk Management Program including what it is and how it can prepare your organization for the future.
CHAPTER
5
Security Policies, Standards, Procedures, and
Guidelines
The four components of security documentation are policies, standards,
procedures, and guidelines. Together, these form the complete definition of a
mature security program. The Capability Maturity Model (CMM), which measures
how robust and repeatable a business process is, is often applied to security
programs. The CMM relies heavily on documentation for defining repeatable,
optimized processes. As such, any security program considered mature by CMM
standards needs to have well-defined policies, procedures, standards, and
guidelines.
• Policy is a high-level statement of requirements. A security policy is the primary
way in which management’s expectations for security are provided to the
builders, installers, maintainers, and users of an organization’s information
systems.
• Standards specify how to configure devices, how to install and configure
software, and how to use computer systems and other organizational assets, to be
compliant with the intentions of the policy.
• Procedures specify the step-by-step instructions to perform various tasks in
accordance with policies and standards.
• Guidelines are advice about how to achieve the goals of the security policy, but
they are suggestions, not rules. They are an important communication tool to let
people know how to follow the policy’s guidance. They convey best practices for
using technology systems or behaving according to management’s preferences.
This chapter covers the basics of what you need to know about policies,
standards, procedures, and guidelines, and provides some examples to illustrate
the principles. Of these, security policies are the most important within the
context of a security program, because they form the basis for the decisions that
are made within the security program, and they give the security program its
“teeth.” As such, the majority of this chapter is devoted to security policies. There
are other books that cover policies in as much detail as you like. See the
References section for some recommendations. The end of this chapter provides
you with some guidance and examples for standards, procedures, and guidelines,
so you can see how they are made, and how they relate to policies.
Security Policies
A security policy is the essential foundation for an effective and comprehensive
security program. A good security policy should be a high-level, brief, formalized
statement of the security practices that management expects employees and
other stakeholders to follow. A security policy should be concise and easy to
understand so that everyone can follow the guidance set forth in it.
In its basic form, a security policy is a document that describes an
organization’s security requirements. A security policy specifies what should be
done, not how; nor does it specify technologies or specific solutions. The security
policy defines a specific set of ...
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
Are you effectively securing your organization’s IT systems that store, process, or transmit organizational information?
Is your IT risk management plan tailored to the specific risk profile of your business and being coordinated across all functional and business units?
With the release of IT Governance frameworks, requirements for risk management and new international standards entering the market, the pressure is mounting to ensure that all your IT risks are identified and the necessary action is taken – be this to mitigate them, accept or ignore them. So, how safe is your IT system? What are the risks that your organization is being exposed to?
The solution to this challenge is to establish an effective risk management process that protects the organization, not just its IT assets, and provides it with the ability to perform its mission.
Risk management is the process of identifying and assessing risk and taking preventive measures to reduce it to an acceptable level. It is critical that you develop an effective risk management program that assesses and mitigates risks within your IT systems and better manages these IT-related mission risks.
BENEFITS OF ATTENDING THIS WORKSHOP
Identify common IT project risks
Learn how to assess threats and vulnerabilities to create a risk response strategy
Understand what qualifies as risk with IT projects
Understand the most common IT risk sources
Qualify and quantify IT risks
Learn the difference between negative and positive IT risks
Develop an IT risk management plan
Plan risk response methods for IT risks
Create risk mitigation and contingency plans
Monitor and control project risks
Overcome resistance from stakeholders and team members
WHO SHOULD ATTEND THIS WORKSHOP
IT risk managers
IT security managers
Compliance officers
Program and project managers
IT project managers
IT operation manager
Contact Kris at kris@360bsi.com to register.
Russian anarchist and anti-war movement in the third year of full-scale warAntti Rautiainen
Anarchist group ANA Regensburg hosted my online-presentation on 16th of May 2024, in which I discussed tactics of anti-war activism in Russia, and reasons why the anti-war movement has not been able to make an impact to change the course of events yet. Cases of anarchists repressed for anti-war activities are presented, as well as strategies of support for political prisoners, and modest successes in supporting their struggles.
Thumbnail picture is by MediaZona, you may read their report on anti-war arson attacks in Russia here: https://en.zona.media/article/2022/10/13/burn-map
Links:
Autonomous Action
http://Avtonom.org
Anarchist Black Cross Moscow
http://Avtonom.org/abc
Solidarity Zone
https://t.me/solidarity_zone
Memorial
https://memopzk.org/, https://t.me/pzk_memorial
OVD-Info
https://en.ovdinfo.org/antiwar-ovd-info-guide
RosUznik
https://rosuznik.org/
Uznik Online
http://uznikonline.tilda.ws/
Russian Reader
https://therussianreader.com/
ABC Irkutsk
https://abc38.noblogs.org/
Send mail to prisoners from abroad:
http://Prisonmail.online
YouTube: https://youtu.be/c5nSOdU48O8
Spotify: https://podcasters.spotify.com/pod/show/libertarianlifecoach/episodes/Russian-anarchist-and-anti-war-movement-in-the-third-year-of-full-scale-war-e2k8ai4
ZGB - The Role of Generative AI in Government transformation.pdfSaeed Al Dhaheri
This keynote was presented during the the 7th edition of the UAE Hackathon 2024. It highlights the role of AI and Generative AI in addressing government transformation to achieve zero government bureaucracy
A process server is a authorized person for delivering legal documents, such as summons, complaints, subpoenas, and other court papers, to peoples involved in legal proceedings.
What is the point of small housing associations.pptxPaul Smith
Given the small scale of housing associations and their relative high cost per home what is the point of them and how do we justify their continued existance
Understanding the Challenges of Street ChildrenSERUDS INDIA
By raising awareness, providing support, advocating for change, and offering assistance to children in need, individuals can play a crucial role in improving the lives of street children and helping them realize their full potential
Donate Us
https://serudsindia.org/how-individuals-can-support-street-children-in-india/
#donatefororphan, #donateforhomelesschildren, #childeducation, #ngochildeducation, #donateforeducation, #donationforchildeducation, #sponsorforpoorchild, #sponsororphanage #sponsororphanchild, #donation, #education, #charity, #educationforchild, #seruds, #kurnool, #joyhome
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
Presentation by Jared Jageler, David Adler, Noelia Duchovny, and Evan Herrnstadt, analysts in CBO’s Microeconomic Studies and Health Analysis Divisions, at the Association of Environmental and Resource Economists Summer Conference.
2. FISMA PROGRAM
• All General Support Systems (GSS) and Major
Applications (MA)
• Required by OMB A-130
• FISMA
• AOs to understand the Risk of the system
• Culture of Organization
4. TIER 1 – ORGANIZATIONAL
• Organizational:
• Addresses risk from an organizational perspective by
establishing and implementing governance structures
that are consistent with the strategic goals and
objectives of organizations and the requirements
defined by federal laws, directives, policies, regulations,
standards, and missions/business functions.
• Structure
• The establishment and implementation of a risk executive
(function);
• The establishment of the organization’s risk management
strategy including the determination of risk tolerance; and
• The development and execution of organization-wide
investment strategies for information resources and
information security.
5. TIER 1 – ORGANIZATIONAL
• Governance
• providing strategic direction;
• Ensuring that organizational mission and business
objectives are achieved;
• Ascertaining that risks are managed appropriately;
and
• Verifying that the organization’s resources are used
responsibly
6. TIER 1 – ORGANIZATIONAL
• Risk Management Strategy
• Assess
• Respond
• Monitor
• Explicit the specific assumptions, constraints, risk
tolerances, and priorities/trade-offs used within
organizations for making investment and
operational decisions.
7. TIER 2 – MISSION/BUSINESS PROCESS
VIEW
• Mission/Business Process View
• Addresses risk from a mission/business process perspective
by designing, developing, and implementing
mission/business processes that support the
missions/business functions defined at Tier 1
• Structure
• The types of threat sources and threat events that can
adversely affect the ability of organizations to successfully
execute their missions/business functions);
• The potential adverse impacts/consequences on
organizational operations and assets, individuals, other
organizations, or the Nation if the confidentiality, integrity, or
availability of information or information systems used in a
mission/business process is compromised; and
• The likely resilience to such a compromise that can be
achieved with a given mission/business process definition,
applying realistic expectations for the resilience of information
technology.
8. TIER 2 – MISSION/BUSINESS PROCESS
VIEW
• Enterprise Architecture
• A management practice employed by organizations to
maximize the effectiveness of mission/business processes
and information resources in helping to achieve
mission/business success.
• Establishes a clear and unambiguous connection from
investments (including information security investments)
to measurable performance improvements whether for an
entire organization or portion of an organization.
• Provides an opportunity to standardize, consolidate, and
optimize information technology assets.
• More transparent and therefore, easier to understand and
protect
• Roadmap for more efficient and cost-effective usage of
information technology
9. TIER 2 – MISSION/BUSINESS PROCESS
VIEW
• Information Security Architecture
• Developing a segment architecture linked to the strategic goals and
objectives of organizations, defined missions/business functions,
and associated mission/business processes;
• Identifying where effective risk response is a critical element in the
success of organizational missions and business functions;
• Defining the appropriate, architectural-level information security
requirements within organization-defined segments based on the
organization’s risk management strategy;
• Incorporating an information security architecture that implements
architectural-level information security requirements;
• Translating the information security requirements from the
segment architecture into specific security controls for information
systems/environments of operation as part of the solution
architecture;
• Allocating management, operational, and technical security controls
to information systems and environments of operation as defined
by the information security architecture; and
• Documenting risk management decisions at all levels of the
enterprise architecture.
10.
11. TIER 3 – INFORMATION SYSTEMS
VIEW
• Tier 3 – Information Systems View
• Addressing the organization’s risk management
strategy and any risk related to the cost, schedule,
and performance requirements for individual
information systems supporting the
mission/business functions of organizations.
• Risk management activities take place at every phase
in the system development life cycle with the
outputs at each phase influencing subsequent
phases.
12. TIER 3 – INFORMATION SYSTEMS
VIEW
• System Development Life Cycle
• The process of developing/building an Information
System
• Requirements definition is a critical part of any system
development process and begins very early in the life
cycle, typically in the initiation phase.
• Threat information may significantly influence
information system requirements and the types of
solutions that are deemed by organizations to be
acceptable
• Early integration of information security requirements
into the system development life cycle is the most
cost-effective method for implementing the
organizational risk management strategy at Tier 3
13. TRUST AND TRUSTWORTHINESS
• Trust
• A belief that an entity will behave in a predictable
manner in specified circumstances
• Important concept related to risk management
• How organizations approach trust influences their
behaviors and their internal and external trust
relationships
• The importance of organizational governance,
culture, and transparency are also considered with
regard to trust and its affect on risk management
14. TRUST AND TRUSTWORTHINESS
• Trustworthiness
• An attribute of a person or organization that
provides confidence to others of the qualifications,
capabilities, and reliability of that entity to perform
specific tasks and fulfill assigned responsibilities.
• The determination of trustworthiness plays a key
role in establishing trust relationships among
persons and organizations. The trust relationships
are key factors in risk decisions made by senior
leaders/executives.
15. TRUST AND TRUSTWORTHINESS
• Trust Relationships
• Among Organizations
• FISMA
• Define the types of services/information to be
provided to organizations or the types of information
to be shared/exchanged in any proposed partnering
arrangements;
• Establish the degree of control or influence
organizations have over the external organizations
participating in such partnering arrangements;
• Describe how the services/information are to be
protected in accordance with the information security
requirements of organizations;
16. TRUST AND TRUSTWORTHINESS
• Trust Relationships (cont.)
• Obtain the relevant information from external organizations to
determine trustworthiness and to support and maintain trust
(e.g., visibility into business practices and risk/information
security decisions to understand risk tolerance);
• Appropriately balance mission/business-based requirements to
support information sharing while considering the risk of working
with competing or hostile entities and the risk that other
organizations, while neither competing or hostile, may be a path
through which such entities attack;
• Determine if the ongoing risk to organizational operations and
assets, individuals, other organizations, or the Nation resulting
from the continuing use of the services/information or the
participation in the partnership, is at an acceptable level; and
• Recognize that decisions to establish trust relationships are
expressions of acceptable risk.
17. TRUST AND TRUSTWORTHINESS
• Trustworthiness of Information Systems
• Security functionality (i.e., the security features/functions
employed within the system); and
• NIST SP800-53
• Security assurance (i.e., the grounds for confidence that
the security functionality is effective in its application).
• FISMA (RMF)
• The actions taken by developers and implementers with
regard to the design, development, implementation, and
operation of the security functionality (i.e., security controls);
and
• The actions taken by assessors to determine the extent to
which the functionality is implemented correctly, operating
as intended, and producing the desired outcome with
respect to meeting the security requirements for information
systems and their environments of operation.5
18. TRUST INFORMATION SYSTEMS
• Organizations are becoming increasingly reliant on
information system services and information provided
by external organizations as well as partnerships to
accomplish missions and business functions.
• EPIC Example
• Trust in IS
• Security Functionality – features/functions
• Common Criteria -
http://www.commoncriteriaportal.org/products/
• FIPS - http://csrc.nist.gov/groups/STM/cmvp/documents/140-
1/140val-all.htm
• Security Assurance – features/functions are effective
19. ORGANIZATIONAL CULTURE
• Organizational culture
• Refers to the values, beliefs, and norms that influence
the behaviors and actions of the senior
leaders/executives and individual members of
organizations.
• DEA
• TSA
• GMU
• Risk Management Strategy is not consistent with that
organization’s culture, then it is likely that the strategy
will be difficult if not impossible to implement.
20. ORGANIZATIONAL CULTURE
• Organizational Culture (Cont.)
• Example
• Drones
• Amazon
• ISIS
• Government
• Open Source Software
• Different Organizations
• Internal/External
• More/Less Risk
• Ops/Security
• Troubleshooting
22. RISK MANAGEMENT PROCESS
• Risk management is a process of developing
an organized, comprehensive, and iterative
approach to:
1. Risk Framing
2. Assessing Risk
3. Responding to Risk
4. Monitoring Risk
23. RISK FRAMING
• Inputs and Preconditions
• Risk framing is the set of assumptions, constraints,
risk tolerances, and priorities/trade-offs that shape
an organization’s approach for managing risk.
• Trust Relationships
• MOUs/MOAs
• Risk Changing
24. RISK FRAMING
• Task 1 - Risk Assumptions
• Identify assumptions that affect how risk is
assessed, responded to, and monitored within the
organization.
• Threat Source
• Hostile cyber/physical attacks;
• Human errors of omission or commission; or
• Natural and man-made disasters.
• Tier 2 – Specific Threats
• A particular business or critical infrastructure sector
(e.g., sector ISAC);
• Operating environments specific to the missions or lines
of business (e.g., maritime, airspace); and
• External dependencies (e.g., GPS or satellite
communications)
25. RISK FRAMING
• Risk (Cont.)
• Vulnerabilities
• The hardware, software, or firmware components that
compose organizational information systems (or the
security controls employed within or inherited by
those systems;
• Mission/business processes and enterprise
architectures (including embedded information
security architectures) implemented by organizations;
or
• Organizational governance structures or processes.
• External Sources (Power Grid)
26. RISK FRAMING
• Impact
• Tier 1 - How
• HR Example
• Tier 3 – Loss of PII
• Tier 2 – Decision Making
• Likelihood
• Quantitative
• Qualitative
27. RISK FRAMING
• Risk Constraints
• Identify constraints on the conduct of risk
assessment, risk response, and risk monitoring
activities within the organization.
• The execution of the risk management process can
be constrained in various ways, some of which are
direct and obvious, while others are indirect.
• Financial
• Indirectly
• Positions
• Culture
28. RISK FRAMING
• Risk Tolerance
• The level of risk that organizations are willing to
accept in pursuit of strategic goals and objectives.
• Priorities and Trade-Offs
• Organizations may be willing to accept short-term
risk of slightly degraded operations to achieve long-
term reduction in information security risk
29. RISK FRAMING
• Outputs
• Risk Management Strategy
• How organizations intend to assess, respond to, and
monitor risk
30. ASSESSING RISK
• Risk Assessment
• Identifies, prioritizes, and estimates risk to organizational
operations (i.e., mission, functions, image, and reputation),
organizational assets, individuals, other organizations, and
the Nation, resulting from the operation and use of
information systems.
• The results of threat and vulnerability assessments to
identify and evaluate risk in terms of likelihood of
occurrence and potential adverse impact (i.e., magnitude of
harm) to organizations, assets, and individuals.
31. RISK ASSESSMENT
• Threat and Vulnerability Identification
• Identify threats to and vulnerabilities in
organizational information systems and the
environments in which the systems operate. (at any
Tier)
• Threat - an examination of all possible resources
• Vulnerability – issue within Hardware, Software,
Process and Procedures
32. RISK ASSESSMENT
• Risk Determination
• Determine the risk to organizational operations and
assets, individuals, other organizations, and the
Nation if identified threats exploit identified
vulnerabilities
• Likelihood
• Impact
33. RISK ASSESSMENT
• Risk Determination (Cont.)
• Qualitative
• The process of assessing the probability and consequences
of identified risk root causes, and prioritizing them
according to their potential effect on achieving program
objectives.
• Usually involves the use of a risk matrix or table to assign
risk ratings based on the combination of probability and
consequence.
37. QUANTITATIVE RISK ANALYSIS
• The process of numerically analyzing the
probability and impact of identified risk root
causes
• Uses techniques such as:
• Decision analysis: evaluating complex alternatives in
terms of values and uncertainty
• Sensitivity analysis: varying model input parameters
over a reasonable range and observing the relative
change in model response
• Produces more objective prioritization of risks
38. RISK ASSESSMENT PROCESS
A determination of risk to organizational operations (i.e.,
mission, functions, image, and reputation), organizational
assets, individuals, other organizations, and the Nation
39. RISK RESPONSE
• Risk Response
• Identifies, evaluates, decides on, and implements appropriate
courses of action to accept, avoid, mitigate, share, or transfer
risk to organizational operations and assets, individuals, other
organizations, and the Nation, resulting from the operation and
use of information systems.
40. RISK RESPONSE IDENTIFICATION
• Risk Acceptance: the appropriate risk response when the
identified risk is within the organizational risk tolerance.
• Datacenters in the Northeast
• Earthquakes
• Risk Avoidance: the appropriate risk response when the
identified risk exceeds the organizational risk tolerance.
• Connecting Domains
• Air Gap
41. RISK RESPONSE
• Risk Mitigation (Risk Reduction): the appropriate
risk response for that portion of risk that cannot
be accepted, avoided, shared, or transferred.
• Mobile Devices – Foreign Travel
• Risk Sharing (Risk Transfer): the appropriate risk
response when organizations desire and have the
means to shift risk liability and responsibility to
other organizations. Risk transfer shifts the entire
risk responsibility or liability from one
organization to another organization
• Insurance
42. RISK RESPONSE PLAN
• Execute the planned mitigation efforts
• Determine what planning, budget, requirements, and
contract changes may be needed
43. RISK RESPONSE
• Evaluation of Alternatives
• Evaluate alternative courses of action for responding
to risk
• Laptops
• Providing users traveling to high-risk areas with clean
laptops;
• Removing hard drives from laptops and operate from
CDs or DVDs; or
• Having laptops go through a detailed assessment before
being allowed to connect to organizational networks.
44. RISK RESPONSE
• Risk Response Decision
• Decide on the appropriate course of action for
responding to risk.
• Prioritization of Risks
45. RISK RESPONSE
• Risk Response Implementation
• Implement the selected course of action
• Risk Response Output
• The implementation of the selected courses of
action
46. MONITORING RISK
• Monitoring Risk
• Verify compliance;
• Determine the ongoing effectiveness of risk
response measures; and
• Identify risk-impacting changes to organizational
information systems and environments of operation
47. MONITORING RISK
• Risk Monitoring Strategy
• Develop a risk monitoring strategy for the
organization that includes the purpose, type, and
frequency of monitoring activities.
• Verify Risk Response
• Effectiveness
• Change Control
48. MONITORING RISK
• Risk Monitoring
• Monitor organizational information systems and
environments of operation on an ongoing basis to
verify compliance, determine effectiveness of risk
response measures, and identify changes.
• Monitoring Risk Outputs
• Verification
• Effectiveness
• Change Control
49. SYSTEM DEVELOPMENT LIFE CYCLE
• SDLC Process
• Initiation
• Development and Acquisitions
• Implementation/Assessment
• Operation and Maintenance
• Disposal
• SP 800-64
50. SDLC
• Initiation
• Planned and Developed
• Financial Plan
• Security Requirements – CIA
• Information Types
• PIA
• Management Approval
• Analyze and arrange organization’s information needs, identify and
describe potential project, determine system scope, and provide a
business case for continuing with the project
• Feasibility Analysis: determine economic and organizational
impact of the system
51. SDLC
• Development/Acquisition
• Evaluate Requirements
• Develop/Purchase System
• Architectural Design
• Document Security Controls
• Deliverables
• Draft SSP
• Architecture Design
• Draft Risk Assessment
• Thorough study of
organization’s current system
and processes, determination
of system requirements,
structuring requirements,
generate alternative design
strategies.
• Use of UML for system
modeling
• Goal: describe what needs to
be done
52. SDLC
• Development
• Translating alternative solution generated by analysis phase
into detailed logical and physical system specifications.
• Logical design: not tied to any hardware or software platform
• Physical design: specific programming languages, databases,
architectures
• Goal: identify how the task will be accomplished
53. SDLC
• Implementation/Assessment
• Assess the System
• Security Assessment Report
• Plan of Actions and Milestones
• Information system is coded, tested, and installed, and
undergoes periodic corrections and enhancements
• Implement the Design
• Goal: provide a fully operational system
54. SDLC
• Operations and Maintenance
• No “real” Information
• Longest Phase
• Configuration Control Board
• Patching/Updates/EOL
• Updated SSP
• POAM
58. FISMA PROGRAM
• Standardize Security Assessment Process
• Templates
• Software
• AO
• DCIO
• Improve the Program
59. FISMA PROGRAM
• Issues with not having one
• Missing Information
• Organizational challenges
• Inconsistent assessments
• Unknown security configurations
• Unknown Risks