SlideShare a Scribd company logo
ESTABLISHING FISMA
PROGRAM
FISMA PROGRAM
• All General Support Systems (GSS) and Major
Applications (MA)
• Required by OMB A-130
• FISMA
• AOs to understand the Risk of the system
• Culture of Organization
RISK MANAGEMENT TIERS
TIER 1 – ORGANIZATIONAL
• Organizational:
• Addresses risk from an organizational perspective by
establishing and implementing governance structures
that are consistent with the strategic goals and
objectives of organizations and the requirements
defined by federal laws, directives, policies, regulations,
standards, and missions/business functions.
• Structure
• The establishment and implementation of a risk executive
(function);
• The establishment of the organization’s risk management
strategy including the determination of risk tolerance; and
• The development and execution of organization-wide
investment strategies for information resources and
information security.
TIER 1 – ORGANIZATIONAL
• Governance
• providing strategic direction;
• Ensuring that organizational mission and business
objectives are achieved;
• Ascertaining that risks are managed appropriately;
and
• Verifying that the organization’s resources are used
responsibly
TIER 1 – ORGANIZATIONAL
• Risk Management Strategy
• Assess
• Respond
• Monitor
• Explicit the specific assumptions, constraints, risk
tolerances, and priorities/trade-offs used within
organizations for making investment and
operational decisions.
TIER 2 – MISSION/BUSINESS PROCESS
VIEW
• Mission/Business Process View
• Addresses risk from a mission/business process perspective
by designing, developing, and implementing
mission/business processes that support the
missions/business functions defined at Tier 1
• Structure
• The types of threat sources and threat events that can
adversely affect the ability of organizations to successfully
execute their missions/business functions);
• The potential adverse impacts/consequences on
organizational operations and assets, individuals, other
organizations, or the Nation if the confidentiality, integrity, or
availability of information or information systems used in a
mission/business process is compromised; and
• The likely resilience to such a compromise that can be
achieved with a given mission/business process definition,
applying realistic expectations for the resilience of information
technology.
TIER 2 – MISSION/BUSINESS PROCESS
VIEW
• Enterprise Architecture
• A management practice employed by organizations to
maximize the effectiveness of mission/business processes
and information resources in helping to achieve
mission/business success.
• Establishes a clear and unambiguous connection from
investments (including information security investments)
to measurable performance improvements whether for an
entire organization or portion of an organization.
• Provides an opportunity to standardize, consolidate, and
optimize information technology assets.
• More transparent and therefore, easier to understand and
protect
• Roadmap for more efficient and cost-effective usage of
information technology
TIER 2 – MISSION/BUSINESS PROCESS
VIEW
• Information Security Architecture
• Developing a segment architecture linked to the strategic goals and
objectives of organizations, defined missions/business functions,
and associated mission/business processes;
• Identifying where effective risk response is a critical element in the
success of organizational missions and business functions;
• Defining the appropriate, architectural-level information security
requirements within organization-defined segments based on the
organization’s risk management strategy;
• Incorporating an information security architecture that implements
architectural-level information security requirements;
• Translating the information security requirements from the
segment architecture into specific security controls for information
systems/environments of operation as part of the solution
architecture;
• Allocating management, operational, and technical security controls
to information systems and environments of operation as defined
by the information security architecture; and
• Documenting risk management decisions at all levels of the
enterprise architecture.
TIER 3 – INFORMATION SYSTEMS
VIEW
• Tier 3 – Information Systems View
• Addressing the organization’s risk management
strategy and any risk related to the cost, schedule,
and performance requirements for individual
information systems supporting the
mission/business functions of organizations.
• Risk management activities take place at every phase
in the system development life cycle with the
outputs at each phase influencing subsequent
phases.
TIER 3 – INFORMATION SYSTEMS
VIEW
• System Development Life Cycle
• The process of developing/building an Information
System
• Requirements definition is a critical part of any system
development process and begins very early in the life
cycle, typically in the initiation phase.
• Threat information may significantly influence
information system requirements and the types of
solutions that are deemed by organizations to be
acceptable
• Early integration of information security requirements
into the system development life cycle is the most
cost-effective method for implementing the
organizational risk management strategy at Tier 3
TRUST AND TRUSTWORTHINESS
• Trust
• A belief that an entity will behave in a predictable
manner in specified circumstances
• Important concept related to risk management
• How organizations approach trust influences their
behaviors and their internal and external trust
relationships
• The importance of organizational governance,
culture, and transparency are also considered with
regard to trust and its affect on risk management
TRUST AND TRUSTWORTHINESS
• Trustworthiness
• An attribute of a person or organization that
provides confidence to others of the qualifications,
capabilities, and reliability of that entity to perform
specific tasks and fulfill assigned responsibilities.
• The determination of trustworthiness plays a key
role in establishing trust relationships among
persons and organizations. The trust relationships
are key factors in risk decisions made by senior
leaders/executives.
TRUST AND TRUSTWORTHINESS
• Trust Relationships
• Among Organizations
• FISMA
• Define the types of services/information to be
provided to organizations or the types of information
to be shared/exchanged in any proposed partnering
arrangements;
• Establish the degree of control or influence
organizations have over the external organizations
participating in such partnering arrangements;
• Describe how the services/information are to be
protected in accordance with the information security
requirements of organizations;
TRUST AND TRUSTWORTHINESS
• Trust Relationships (cont.)
• Obtain the relevant information from external organizations to
determine trustworthiness and to support and maintain trust
(e.g., visibility into business practices and risk/information
security decisions to understand risk tolerance);
• Appropriately balance mission/business-based requirements to
support information sharing while considering the risk of working
with competing or hostile entities and the risk that other
organizations, while neither competing or hostile, may be a path
through which such entities attack;
• Determine if the ongoing risk to organizational operations and
assets, individuals, other organizations, or the Nation resulting
from the continuing use of the services/information or the
participation in the partnership, is at an acceptable level; and
• Recognize that decisions to establish trust relationships are
expressions of acceptable risk.
TRUST AND TRUSTWORTHINESS
• Trustworthiness of Information Systems
• Security functionality (i.e., the security features/functions
employed within the system); and
• NIST SP800-53
• Security assurance (i.e., the grounds for confidence that
the security functionality is effective in its application).
• FISMA (RMF)
• The actions taken by developers and implementers with
regard to the design, development, implementation, and
operation of the security functionality (i.e., security controls);
and
• The actions taken by assessors to determine the extent to
which the functionality is implemented correctly, operating
as intended, and producing the desired outcome with
respect to meeting the security requirements for information
systems and their environments of operation.5
TRUST INFORMATION SYSTEMS
• Organizations are becoming increasingly reliant on
information system services and information provided
by external organizations as well as partnerships to
accomplish missions and business functions.
• EPIC Example
• Trust in IS
• Security Functionality – features/functions
• Common Criteria -
http://www.commoncriteriaportal.org/products/
• FIPS - http://csrc.nist.gov/groups/STM/cmvp/documents/140-
1/140val-all.htm
• Security Assurance – features/functions are effective
ORGANIZATIONAL CULTURE
• Organizational culture
• Refers to the values, beliefs, and norms that influence
the behaviors and actions of the senior
leaders/executives and individual members of
organizations.
• DEA
• TSA
• GMU
• Risk Management Strategy is not consistent with that
organization’s culture, then it is likely that the strategy
will be difficult if not impossible to implement.
ORGANIZATIONAL CULTURE
• Organizational Culture (Cont.)
• Example
• Drones
• Amazon
• ISIS
• Government
• Open Source Software
• Different Organizations
• Internal/External
• More/Less Risk
• Ops/Security
• Troubleshooting
THE RIALS PROCESS
RISK MANAGEMENT PROCESS
• Risk management is a process of developing
an organized, comprehensive, and iterative
approach to:
1. Risk Framing
2. Assessing Risk
3. Responding to Risk
4. Monitoring Risk
RISK FRAMING
• Inputs and Preconditions
• Risk framing is the set of assumptions, constraints,
risk tolerances, and priorities/trade-offs that shape
an organization’s approach for managing risk.
• Trust Relationships
• MOUs/MOAs
• Risk Changing
RISK FRAMING
• Task 1 - Risk Assumptions
• Identify assumptions that affect how risk is
assessed, responded to, and monitored within the
organization.
• Threat Source
• Hostile cyber/physical attacks;
• Human errors of omission or commission; or
• Natural and man-made disasters.
• Tier 2 – Specific Threats
• A particular business or critical infrastructure sector
(e.g., sector ISAC);
• Operating environments specific to the missions or lines
of business (e.g., maritime, airspace); and
• External dependencies (e.g., GPS or satellite
communications)
RISK FRAMING
• Risk (Cont.)
• Vulnerabilities
• The hardware, software, or firmware components that
compose organizational information systems (or the
security controls employed within or inherited by
those systems;
• Mission/business processes and enterprise
architectures (including embedded information
security architectures) implemented by organizations;
or
• Organizational governance structures or processes.
• External Sources (Power Grid)
RISK FRAMING
• Impact
• Tier 1 - How
• HR Example
• Tier 3 – Loss of PII
• Tier 2 – Decision Making
• Likelihood
• Quantitative
• Qualitative
RISK FRAMING
• Risk Constraints
• Identify constraints on the conduct of risk
assessment, risk response, and risk monitoring
activities within the organization.
• The execution of the risk management process can
be constrained in various ways, some of which are
direct and obvious, while others are indirect.
• Financial
• Indirectly
• Positions
• Culture
RISK FRAMING
• Risk Tolerance
• The level of risk that organizations are willing to
accept in pursuit of strategic goals and objectives.
• Priorities and Trade-Offs
• Organizations may be willing to accept short-term
risk of slightly degraded operations to achieve long-
term reduction in information security risk
RISK FRAMING
• Outputs
• Risk Management Strategy
• How organizations intend to assess, respond to, and
monitor risk
ASSESSING RISK
• Risk Assessment
• Identifies, prioritizes, and estimates risk to organizational
operations (i.e., mission, functions, image, and reputation),
organizational assets, individuals, other organizations, and
the Nation, resulting from the operation and use of
information systems.
• The results of threat and vulnerability assessments to
identify and evaluate risk in terms of likelihood of
occurrence and potential adverse impact (i.e., magnitude of
harm) to organizations, assets, and individuals.
RISK ASSESSMENT
• Threat and Vulnerability Identification
• Identify threats to and vulnerabilities in
organizational information systems and the
environments in which the systems operate. (at any
Tier)
• Threat - an examination of all possible resources
• Vulnerability – issue within Hardware, Software,
Process and Procedures
RISK ASSESSMENT
• Risk Determination
• Determine the risk to organizational operations and
assets, individuals, other organizations, and the
Nation if identified threats exploit identified
vulnerabilities
• Likelihood
• Impact
RISK ASSESSMENT
• Risk Determination (Cont.)
• Qualitative
• The process of assessing the probability and consequences
of identified risk root causes, and prioritizing them
according to their potential effect on achieving program
objectives.
• Usually involves the use of a risk matrix or table to assign
risk ratings based on the combination of probability and
consequence.
QUALITATIVE
QUALITATIVE RISK ANALYSIS-MATRIX
QUALITATIVE
QUANTITATIVE RISK ANALYSIS
• The process of numerically analyzing the
probability and impact of identified risk root
causes
• Uses techniques such as:
• Decision analysis: evaluating complex alternatives in
terms of values and uncertainty
• Sensitivity analysis: varying model input parameters
over a reasonable range and observing the relative
change in model response
• Produces more objective prioritization of risks
RISK ASSESSMENT PROCESS
A determination of risk to organizational operations (i.e.,
mission, functions, image, and reputation), organizational
assets, individuals, other organizations, and the Nation
RISK RESPONSE
• Risk Response
• Identifies, evaluates, decides on, and implements appropriate
courses of action to accept, avoid, mitigate, share, or transfer
risk to organizational operations and assets, individuals, other
organizations, and the Nation, resulting from the operation and
use of information systems.
RISK RESPONSE IDENTIFICATION
• Risk Acceptance: the appropriate risk response when the
identified risk is within the organizational risk tolerance.
• Datacenters in the Northeast
• Earthquakes
• Risk Avoidance: the appropriate risk response when the
identified risk exceeds the organizational risk tolerance.
• Connecting Domains
• Air Gap
RISK RESPONSE
• Risk Mitigation (Risk Reduction): the appropriate
risk response for that portion of risk that cannot
be accepted, avoided, shared, or transferred.
• Mobile Devices – Foreign Travel
• Risk Sharing (Risk Transfer): the appropriate risk
response when organizations desire and have the
means to shift risk liability and responsibility to
other organizations. Risk transfer shifts the entire
risk responsibility or liability from one
organization to another organization
• Insurance
RISK RESPONSE PLAN
• Execute the planned mitigation efforts
• Determine what planning, budget, requirements, and
contract changes may be needed
RISK RESPONSE
• Evaluation of Alternatives
• Evaluate alternative courses of action for responding
to risk
• Laptops
• Providing users traveling to high-risk areas with clean
laptops;
• Removing hard drives from laptops and operate from
CDs or DVDs; or
• Having laptops go through a detailed assessment before
being allowed to connect to organizational networks.
RISK RESPONSE
• Risk Response Decision
• Decide on the appropriate course of action for
responding to risk.
• Prioritization of Risks
RISK RESPONSE
• Risk Response Implementation
• Implement the selected course of action
• Risk Response Output
• The implementation of the selected courses of
action
MONITORING RISK
• Monitoring Risk
• Verify compliance;
• Determine the ongoing effectiveness of risk
response measures; and
• Identify risk-impacting changes to organizational
information systems and environments of operation
MONITORING RISK
• Risk Monitoring Strategy
• Develop a risk monitoring strategy for the
organization that includes the purpose, type, and
frequency of monitoring activities.
• Verify Risk Response
• Effectiveness
• Change Control
MONITORING RISK
• Risk Monitoring
• Monitor organizational information systems and
environments of operation on an ongoing basis to
verify compliance, determine effectiveness of risk
response measures, and identify changes.
• Monitoring Risk Outputs
• Verification
• Effectiveness
• Change Control
SYSTEM DEVELOPMENT LIFE CYCLE
• SDLC Process
• Initiation
• Development and Acquisitions
• Implementation/Assessment
• Operation and Maintenance
• Disposal
• SP 800-64
SDLC
• Initiation
• Planned and Developed
• Financial Plan
• Security Requirements – CIA
• Information Types
• PIA
• Management Approval
• Analyze and arrange organization’s information needs, identify and
describe potential project, determine system scope, and provide a
business case for continuing with the project
• Feasibility Analysis: determine economic and organizational
impact of the system
SDLC
• Development/Acquisition
• Evaluate Requirements
• Develop/Purchase System
• Architectural Design
• Document Security Controls
• Deliverables
• Draft SSP
• Architecture Design
• Draft Risk Assessment
• Thorough study of
organization’s current system
and processes, determination
of system requirements,
structuring requirements,
generate alternative design
strategies.
• Use of UML for system
modeling
• Goal: describe what needs to
be done
SDLC
• Development
• Translating alternative solution generated by analysis phase
into detailed logical and physical system specifications.
• Logical design: not tied to any hardware or software platform
• Physical design: specific programming languages, databases,
architectures
• Goal: identify how the task will be accomplished
SDLC
• Implementation/Assessment
• Assess the System
• Security Assessment Report
• Plan of Actions and Milestones
• Information system is coded, tested, and installed, and
undergoes periodic corrections and enhancements
• Implement the Design
• Goal: provide a fully operational system
SDLC
• Operations and Maintenance
• No “real” Information
• Longest Phase
• Configuration Control Board
• Patching/Updates/EOL
• Updated SSP
• POAM
SDLC
• Disposal
• Securing/Managing the data
• Transition Plan
• SDLC
Page
56
SECURITY CONTROL PROCESS
• Step 1: Categorize
• Step 2: Select
• Step 3: Implement
• Step 4: Assess
• Step 5: Authorize
• Step 6: Monitor
FISMA PROGRAM
• Standardize Security Assessment Process
• Templates
• Software
• AO
• DCIO
• Improve the Program
FISMA PROGRAM
• Issues with not having one
• Missing Information
• Organizational challenges
• Inconsistent assessments
• Unknown security configurations
• Unknown Risks

More Related Content

Similar to L13 SDLC and Risk Management.pptx

Security Architecture
Security ArchitectureSecurity Architecture
Security ArchitecturePriyank Hada
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
Dam Frank
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
harsh arora
 
Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Fameworklneut03
 
Chapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdfChapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdf
kimangeloullero
 
CCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdfCCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdf
priyanshamadhwal2
 
Module 3_Lesson 7.pptx
Module 3_Lesson 7.pptxModule 3_Lesson 7.pptx
Module 3_Lesson 7.pptx
cejobelle
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by
FirstMutualHoldings
 
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a ProgramCNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
Sam Bowne
 
insider threat research
insider threat researchinsider threat research
insider threat research
Asma Al-maskaria
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
Elliott Franklin
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
McKonly & Asbury, LLP
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptx
HardikKundra
 
Ch2-CIISA_IT Governance.pdf
Ch2-CIISA_IT Governance.pdfCh2-CIISA_IT Governance.pdf
Ch2-CIISA_IT Governance.pdf
DanteHayashi
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
Divya Tiwari
 
CHAPTER 5 Security Policies, Standards, Procedures, a
CHAPTER  5 Security Policies, Standards, Procedures, aCHAPTER  5 Security Policies, Standards, Procedures, a
CHAPTER 5 Security Policies, Standards, Procedures, a
MaximaSheffield592
 
CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016
Hafiz Sheikh Adnan Ahmed
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
360 BSI
 

Similar to L13 SDLC and Risk Management.pptx (20)

Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Famework
 
Chapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdfChapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdf
 
CCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdfCCISO_Certification_Training_Course-Outline.pdf
CCISO_Certification_Training_Course-Outline.pdf
 
Module 3_Lesson 7.pptx
Module 3_Lesson 7.pptxModule 3_Lesson 7.pptx
Module 3_Lesson 7.pptx
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by
 
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a ProgramCNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
 
Mandelaris_SecureWorld_2016_FINAL
Mandelaris_SecureWorld_2016_FINALMandelaris_SecureWorld_2016_FINAL
Mandelaris_SecureWorld_2016_FINAL
 
insider threat research
insider threat researchinsider threat research
insider threat research
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Gtag 1 information risk and control
Gtag 1 information risk and controlGtag 1 information risk and control
Gtag 1 information risk and control
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptx
 
Ch2-CIISA_IT Governance.pdf
Ch2-CIISA_IT Governance.pdfCh2-CIISA_IT Governance.pdf
Ch2-CIISA_IT Governance.pdf
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
CHAPTER 5 Security Policies, Standards, Procedures, a
CHAPTER  5 Security Policies, Standards, Procedures, aCHAPTER  5 Security Policies, Standards, Procedures, a
CHAPTER 5 Security Policies, Standards, Procedures, a
 
CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 

More from StevenTharp2

L11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxL11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptx
StevenTharp2
 
L5 RMF Phase 4 Implement.pptx
L5 RMF Phase 4 Implement.pptxL5 RMF Phase 4 Implement.pptx
L5 RMF Phase 4 Implement.pptx
StevenTharp2
 
L6 RMF Phase 5 Assess.pptx
L6 RMF Phase 5 Assess.pptxL6 RMF Phase 5 Assess.pptx
L6 RMF Phase 5 Assess.pptx
StevenTharp2
 
L3 RMF Phase 2 Categorize.pptx
L3 RMF Phase 2 Categorize.pptxL3 RMF Phase 2 Categorize.pptx
L3 RMF Phase 2 Categorize.pptx
StevenTharp2
 
L2 RMF Phase 1 Prepare.pptx
L2 RMF Phase 1 Prepare.pptxL2 RMF Phase 1 Prepare.pptx
L2 RMF Phase 1 Prepare.pptx
StevenTharp2
 
L4 RMF Phase 3 Select.pptx
L4 RMF Phase 3 Select.pptxL4 RMF Phase 3 Select.pptx
L4 RMF Phase 3 Select.pptx
StevenTharp2
 
L8 RMF Phase 7 Monitor.pptx
L8 RMF Phase 7 Monitor.pptxL8 RMF Phase 7 Monitor.pptx
L8 RMF Phase 7 Monitor.pptx
StevenTharp2
 
L7 RMF Phase 6 Authorize.pptx
L7 RMF Phase 6 Authorize.pptxL7 RMF Phase 6 Authorize.pptx
L7 RMF Phase 6 Authorize.pptx
StevenTharp2
 
L12 CP CMP PIA BIA.pptx
L12 CP CMP PIA BIA.pptxL12 CP CMP PIA BIA.pptx
L12 CP CMP PIA BIA.pptx
StevenTharp2
 

More from StevenTharp2 (9)

L11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxL11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptx
 
L5 RMF Phase 4 Implement.pptx
L5 RMF Phase 4 Implement.pptxL5 RMF Phase 4 Implement.pptx
L5 RMF Phase 4 Implement.pptx
 
L6 RMF Phase 5 Assess.pptx
L6 RMF Phase 5 Assess.pptxL6 RMF Phase 5 Assess.pptx
L6 RMF Phase 5 Assess.pptx
 
L3 RMF Phase 2 Categorize.pptx
L3 RMF Phase 2 Categorize.pptxL3 RMF Phase 2 Categorize.pptx
L3 RMF Phase 2 Categorize.pptx
 
L2 RMF Phase 1 Prepare.pptx
L2 RMF Phase 1 Prepare.pptxL2 RMF Phase 1 Prepare.pptx
L2 RMF Phase 1 Prepare.pptx
 
L4 RMF Phase 3 Select.pptx
L4 RMF Phase 3 Select.pptxL4 RMF Phase 3 Select.pptx
L4 RMF Phase 3 Select.pptx
 
L8 RMF Phase 7 Monitor.pptx
L8 RMF Phase 7 Monitor.pptxL8 RMF Phase 7 Monitor.pptx
L8 RMF Phase 7 Monitor.pptx
 
L7 RMF Phase 6 Authorize.pptx
L7 RMF Phase 6 Authorize.pptxL7 RMF Phase 6 Authorize.pptx
L7 RMF Phase 6 Authorize.pptx
 
L12 CP CMP PIA BIA.pptx
L12 CP CMP PIA BIA.pptxL12 CP CMP PIA BIA.pptx
L12 CP CMP PIA BIA.pptx
 

Recently uploaded

Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
Antti Rautiainen
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
Saeed Al Dhaheri
 
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) AmendmentPPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
ahcitycouncil
 
PPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933FPPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933F
ahcitycouncil
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
Get Government Grants
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
850fcj96
 
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
ehbuaw
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
evkovas
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
ClaudioTebaldi2
 
PACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdfPACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdf
Mohammed325561
 
Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023
ARCResearch
 
The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
oklahomajudicialproc1
 
What is the point of small housing associations.pptx
What is the point of small housing associations.pptxWhat is the point of small housing associations.pptx
What is the point of small housing associations.pptx
Paul Smith
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
SERUDS INDIA
 
PPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way StopPPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way Stop
ahcitycouncil
 
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptxMHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
ILC- UK
 
2024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 362024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 36
JSchaus & Associates
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
ahcitycouncil
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
AjayVejendla3
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Congressional Budget Office
 

Recently uploaded (20)

Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
 
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) AmendmentPPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
PPT Item # 9 - 2024 Street Maintenance Program(SMP) Amendment
 
PPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933FPPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933F
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
 
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
 
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
一比一原版(WSU毕业证)西悉尼大学毕业证成绩单
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
 
PACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdfPACT launching workshop presentation-Final.pdf
PACT launching workshop presentation-Final.pdf
 
Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023
 
The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
 
What is the point of small housing associations.pptx
What is the point of small housing associations.pptxWhat is the point of small housing associations.pptx
What is the point of small housing associations.pptx
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
 
PPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way StopPPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way Stop
 
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptxMHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
 
2024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 362024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 36
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
 

L13 SDLC and Risk Management.pptx

  • 2. FISMA PROGRAM • All General Support Systems (GSS) and Major Applications (MA) • Required by OMB A-130 • FISMA • AOs to understand the Risk of the system • Culture of Organization
  • 4. TIER 1 – ORGANIZATIONAL • Organizational: • Addresses risk from an organizational perspective by establishing and implementing governance structures that are consistent with the strategic goals and objectives of organizations and the requirements defined by federal laws, directives, policies, regulations, standards, and missions/business functions. • Structure • The establishment and implementation of a risk executive (function); • The establishment of the organization’s risk management strategy including the determination of risk tolerance; and • The development and execution of organization-wide investment strategies for information resources and information security.
  • 5. TIER 1 – ORGANIZATIONAL • Governance • providing strategic direction; • Ensuring that organizational mission and business objectives are achieved; • Ascertaining that risks are managed appropriately; and • Verifying that the organization’s resources are used responsibly
  • 6. TIER 1 – ORGANIZATIONAL • Risk Management Strategy • Assess • Respond • Monitor • Explicit the specific assumptions, constraints, risk tolerances, and priorities/trade-offs used within organizations for making investment and operational decisions.
  • 7. TIER 2 – MISSION/BUSINESS PROCESS VIEW • Mission/Business Process View • Addresses risk from a mission/business process perspective by designing, developing, and implementing mission/business processes that support the missions/business functions defined at Tier 1 • Structure • The types of threat sources and threat events that can adversely affect the ability of organizations to successfully execute their missions/business functions); • The potential adverse impacts/consequences on organizational operations and assets, individuals, other organizations, or the Nation if the confidentiality, integrity, or availability of information or information systems used in a mission/business process is compromised; and • The likely resilience to such a compromise that can be achieved with a given mission/business process definition, applying realistic expectations for the resilience of information technology.
  • 8. TIER 2 – MISSION/BUSINESS PROCESS VIEW • Enterprise Architecture • A management practice employed by organizations to maximize the effectiveness of mission/business processes and information resources in helping to achieve mission/business success. • Establishes a clear and unambiguous connection from investments (including information security investments) to measurable performance improvements whether for an entire organization or portion of an organization. • Provides an opportunity to standardize, consolidate, and optimize information technology assets. • More transparent and therefore, easier to understand and protect • Roadmap for more efficient and cost-effective usage of information technology
  • 9. TIER 2 – MISSION/BUSINESS PROCESS VIEW • Information Security Architecture • Developing a segment architecture linked to the strategic goals and objectives of organizations, defined missions/business functions, and associated mission/business processes; • Identifying where effective risk response is a critical element in the success of organizational missions and business functions; • Defining the appropriate, architectural-level information security requirements within organization-defined segments based on the organization’s risk management strategy; • Incorporating an information security architecture that implements architectural-level information security requirements; • Translating the information security requirements from the segment architecture into specific security controls for information systems/environments of operation as part of the solution architecture; • Allocating management, operational, and technical security controls to information systems and environments of operation as defined by the information security architecture; and • Documenting risk management decisions at all levels of the enterprise architecture.
  • 10.
  • 11. TIER 3 – INFORMATION SYSTEMS VIEW • Tier 3 – Information Systems View • Addressing the organization’s risk management strategy and any risk related to the cost, schedule, and performance requirements for individual information systems supporting the mission/business functions of organizations. • Risk management activities take place at every phase in the system development life cycle with the outputs at each phase influencing subsequent phases.
  • 12. TIER 3 – INFORMATION SYSTEMS VIEW • System Development Life Cycle • The process of developing/building an Information System • Requirements definition is a critical part of any system development process and begins very early in the life cycle, typically in the initiation phase. • Threat information may significantly influence information system requirements and the types of solutions that are deemed by organizations to be acceptable • Early integration of information security requirements into the system development life cycle is the most cost-effective method for implementing the organizational risk management strategy at Tier 3
  • 13. TRUST AND TRUSTWORTHINESS • Trust • A belief that an entity will behave in a predictable manner in specified circumstances • Important concept related to risk management • How organizations approach trust influences their behaviors and their internal and external trust relationships • The importance of organizational governance, culture, and transparency are also considered with regard to trust and its affect on risk management
  • 14. TRUST AND TRUSTWORTHINESS • Trustworthiness • An attribute of a person or organization that provides confidence to others of the qualifications, capabilities, and reliability of that entity to perform specific tasks and fulfill assigned responsibilities. • The determination of trustworthiness plays a key role in establishing trust relationships among persons and organizations. The trust relationships are key factors in risk decisions made by senior leaders/executives.
  • 15. TRUST AND TRUSTWORTHINESS • Trust Relationships • Among Organizations • FISMA • Define the types of services/information to be provided to organizations or the types of information to be shared/exchanged in any proposed partnering arrangements; • Establish the degree of control or influence organizations have over the external organizations participating in such partnering arrangements; • Describe how the services/information are to be protected in accordance with the information security requirements of organizations;
  • 16. TRUST AND TRUSTWORTHINESS • Trust Relationships (cont.) • Obtain the relevant information from external organizations to determine trustworthiness and to support and maintain trust (e.g., visibility into business practices and risk/information security decisions to understand risk tolerance); • Appropriately balance mission/business-based requirements to support information sharing while considering the risk of working with competing or hostile entities and the risk that other organizations, while neither competing or hostile, may be a path through which such entities attack; • Determine if the ongoing risk to organizational operations and assets, individuals, other organizations, or the Nation resulting from the continuing use of the services/information or the participation in the partnership, is at an acceptable level; and • Recognize that decisions to establish trust relationships are expressions of acceptable risk.
  • 17. TRUST AND TRUSTWORTHINESS • Trustworthiness of Information Systems • Security functionality (i.e., the security features/functions employed within the system); and • NIST SP800-53 • Security assurance (i.e., the grounds for confidence that the security functionality is effective in its application). • FISMA (RMF) • The actions taken by developers and implementers with regard to the design, development, implementation, and operation of the security functionality (i.e., security controls); and • The actions taken by assessors to determine the extent to which the functionality is implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for information systems and their environments of operation.5
  • 18. TRUST INFORMATION SYSTEMS • Organizations are becoming increasingly reliant on information system services and information provided by external organizations as well as partnerships to accomplish missions and business functions. • EPIC Example • Trust in IS • Security Functionality – features/functions • Common Criteria - http://www.commoncriteriaportal.org/products/ • FIPS - http://csrc.nist.gov/groups/STM/cmvp/documents/140- 1/140val-all.htm • Security Assurance – features/functions are effective
  • 19. ORGANIZATIONAL CULTURE • Organizational culture • Refers to the values, beliefs, and norms that influence the behaviors and actions of the senior leaders/executives and individual members of organizations. • DEA • TSA • GMU • Risk Management Strategy is not consistent with that organization’s culture, then it is likely that the strategy will be difficult if not impossible to implement.
  • 20. ORGANIZATIONAL CULTURE • Organizational Culture (Cont.) • Example • Drones • Amazon • ISIS • Government • Open Source Software • Different Organizations • Internal/External • More/Less Risk • Ops/Security • Troubleshooting
  • 22. RISK MANAGEMENT PROCESS • Risk management is a process of developing an organized, comprehensive, and iterative approach to: 1. Risk Framing 2. Assessing Risk 3. Responding to Risk 4. Monitoring Risk
  • 23. RISK FRAMING • Inputs and Preconditions • Risk framing is the set of assumptions, constraints, risk tolerances, and priorities/trade-offs that shape an organization’s approach for managing risk. • Trust Relationships • MOUs/MOAs • Risk Changing
  • 24. RISK FRAMING • Task 1 - Risk Assumptions • Identify assumptions that affect how risk is assessed, responded to, and monitored within the organization. • Threat Source • Hostile cyber/physical attacks; • Human errors of omission or commission; or • Natural and man-made disasters. • Tier 2 – Specific Threats • A particular business or critical infrastructure sector (e.g., sector ISAC); • Operating environments specific to the missions or lines of business (e.g., maritime, airspace); and • External dependencies (e.g., GPS or satellite communications)
  • 25. RISK FRAMING • Risk (Cont.) • Vulnerabilities • The hardware, software, or firmware components that compose organizational information systems (or the security controls employed within or inherited by those systems; • Mission/business processes and enterprise architectures (including embedded information security architectures) implemented by organizations; or • Organizational governance structures or processes. • External Sources (Power Grid)
  • 26. RISK FRAMING • Impact • Tier 1 - How • HR Example • Tier 3 – Loss of PII • Tier 2 – Decision Making • Likelihood • Quantitative • Qualitative
  • 27. RISK FRAMING • Risk Constraints • Identify constraints on the conduct of risk assessment, risk response, and risk monitoring activities within the organization. • The execution of the risk management process can be constrained in various ways, some of which are direct and obvious, while others are indirect. • Financial • Indirectly • Positions • Culture
  • 28. RISK FRAMING • Risk Tolerance • The level of risk that organizations are willing to accept in pursuit of strategic goals and objectives. • Priorities and Trade-Offs • Organizations may be willing to accept short-term risk of slightly degraded operations to achieve long- term reduction in information security risk
  • 29. RISK FRAMING • Outputs • Risk Management Strategy • How organizations intend to assess, respond to, and monitor risk
  • 30. ASSESSING RISK • Risk Assessment • Identifies, prioritizes, and estimates risk to organizational operations (i.e., mission, functions, image, and reputation), organizational assets, individuals, other organizations, and the Nation, resulting from the operation and use of information systems. • The results of threat and vulnerability assessments to identify and evaluate risk in terms of likelihood of occurrence and potential adverse impact (i.e., magnitude of harm) to organizations, assets, and individuals.
  • 31. RISK ASSESSMENT • Threat and Vulnerability Identification • Identify threats to and vulnerabilities in organizational information systems and the environments in which the systems operate. (at any Tier) • Threat - an examination of all possible resources • Vulnerability – issue within Hardware, Software, Process and Procedures
  • 32. RISK ASSESSMENT • Risk Determination • Determine the risk to organizational operations and assets, individuals, other organizations, and the Nation if identified threats exploit identified vulnerabilities • Likelihood • Impact
  • 33. RISK ASSESSMENT • Risk Determination (Cont.) • Qualitative • The process of assessing the probability and consequences of identified risk root causes, and prioritizing them according to their potential effect on achieving program objectives. • Usually involves the use of a risk matrix or table to assign risk ratings based on the combination of probability and consequence.
  • 37. QUANTITATIVE RISK ANALYSIS • The process of numerically analyzing the probability and impact of identified risk root causes • Uses techniques such as: • Decision analysis: evaluating complex alternatives in terms of values and uncertainty • Sensitivity analysis: varying model input parameters over a reasonable range and observing the relative change in model response • Produces more objective prioritization of risks
  • 38. RISK ASSESSMENT PROCESS A determination of risk to organizational operations (i.e., mission, functions, image, and reputation), organizational assets, individuals, other organizations, and the Nation
  • 39. RISK RESPONSE • Risk Response • Identifies, evaluates, decides on, and implements appropriate courses of action to accept, avoid, mitigate, share, or transfer risk to organizational operations and assets, individuals, other organizations, and the Nation, resulting from the operation and use of information systems.
  • 40. RISK RESPONSE IDENTIFICATION • Risk Acceptance: the appropriate risk response when the identified risk is within the organizational risk tolerance. • Datacenters in the Northeast • Earthquakes • Risk Avoidance: the appropriate risk response when the identified risk exceeds the organizational risk tolerance. • Connecting Domains • Air Gap
  • 41. RISK RESPONSE • Risk Mitigation (Risk Reduction): the appropriate risk response for that portion of risk that cannot be accepted, avoided, shared, or transferred. • Mobile Devices – Foreign Travel • Risk Sharing (Risk Transfer): the appropriate risk response when organizations desire and have the means to shift risk liability and responsibility to other organizations. Risk transfer shifts the entire risk responsibility or liability from one organization to another organization • Insurance
  • 42. RISK RESPONSE PLAN • Execute the planned mitigation efforts • Determine what planning, budget, requirements, and contract changes may be needed
  • 43. RISK RESPONSE • Evaluation of Alternatives • Evaluate alternative courses of action for responding to risk • Laptops • Providing users traveling to high-risk areas with clean laptops; • Removing hard drives from laptops and operate from CDs or DVDs; or • Having laptops go through a detailed assessment before being allowed to connect to organizational networks.
  • 44. RISK RESPONSE • Risk Response Decision • Decide on the appropriate course of action for responding to risk. • Prioritization of Risks
  • 45. RISK RESPONSE • Risk Response Implementation • Implement the selected course of action • Risk Response Output • The implementation of the selected courses of action
  • 46. MONITORING RISK • Monitoring Risk • Verify compliance; • Determine the ongoing effectiveness of risk response measures; and • Identify risk-impacting changes to organizational information systems and environments of operation
  • 47. MONITORING RISK • Risk Monitoring Strategy • Develop a risk monitoring strategy for the organization that includes the purpose, type, and frequency of monitoring activities. • Verify Risk Response • Effectiveness • Change Control
  • 48. MONITORING RISK • Risk Monitoring • Monitor organizational information systems and environments of operation on an ongoing basis to verify compliance, determine effectiveness of risk response measures, and identify changes. • Monitoring Risk Outputs • Verification • Effectiveness • Change Control
  • 49. SYSTEM DEVELOPMENT LIFE CYCLE • SDLC Process • Initiation • Development and Acquisitions • Implementation/Assessment • Operation and Maintenance • Disposal • SP 800-64
  • 50. SDLC • Initiation • Planned and Developed • Financial Plan • Security Requirements – CIA • Information Types • PIA • Management Approval • Analyze and arrange organization’s information needs, identify and describe potential project, determine system scope, and provide a business case for continuing with the project • Feasibility Analysis: determine economic and organizational impact of the system
  • 51. SDLC • Development/Acquisition • Evaluate Requirements • Develop/Purchase System • Architectural Design • Document Security Controls • Deliverables • Draft SSP • Architecture Design • Draft Risk Assessment • Thorough study of organization’s current system and processes, determination of system requirements, structuring requirements, generate alternative design strategies. • Use of UML for system modeling • Goal: describe what needs to be done
  • 52. SDLC • Development • Translating alternative solution generated by analysis phase into detailed logical and physical system specifications. • Logical design: not tied to any hardware or software platform • Physical design: specific programming languages, databases, architectures • Goal: identify how the task will be accomplished
  • 53. SDLC • Implementation/Assessment • Assess the System • Security Assessment Report • Plan of Actions and Milestones • Information system is coded, tested, and installed, and undergoes periodic corrections and enhancements • Implement the Design • Goal: provide a fully operational system
  • 54. SDLC • Operations and Maintenance • No “real” Information • Longest Phase • Configuration Control Board • Patching/Updates/EOL • Updated SSP • POAM
  • 55. SDLC • Disposal • Securing/Managing the data • Transition Plan
  • 57. SECURITY CONTROL PROCESS • Step 1: Categorize • Step 2: Select • Step 3: Implement • Step 4: Assess • Step 5: Authorize • Step 6: Monitor
  • 58. FISMA PROGRAM • Standardize Security Assessment Process • Templates • Software • AO • DCIO • Improve the Program
  • 59. FISMA PROGRAM • Issues with not having one • Missing Information • Organizational challenges • Inconsistent assessments • Unknown security configurations • Unknown Risks