SlideShare a Scribd company logo
NIST Special Publication 800-12
Revision 1
An Introduction to Information Security
Michael Nieles
Kelley Dempsey
Victoria Yan Pillitteri
This publication is available free of charge from:
https://doi.org/10.6028/NIST.SP.800-12r1
C O M P U T E R S E C U R I T Y
NIST Special Publication 800-12
Revision 1
An Introduction to Information Security
Michael Nieles
Kelley Dempsey
Victoria Yan Pillitteri
Computer Security Division
Information Technology Laboratory
This publication is available free of charge from:
https://doi.org/10.6028/NIST.SP.800-12r1
June 2017
U.S. Department of Commerce
Wilbur L. Ross, Jr., Secretary
National Institute of Standards and Technology
Kent Rochford, Acting NIST Director and Under Secretary of
Commerce for Standards and Technology
Authority
This publication has been developed by NIST in accordance
with its statutory responsibilities under the
Federal Information Security Modernization Act (FISMA) of
2014, 44 U.S.C. § 3551 et seq., Public Law
(P.L.) 113-283. NIST is responsible for developing information
security standards and guidelines, including
minimum requirements for federal systems, but such standards
and guidelines shall not apply to national
security systems without the express approval of appropriate
federal officials exercising policy authority
over such systems. This guideline is consistent with the
requirements of the Office of Management and
Budget (OMB) Circular A-130.
Nothing in this publication should be taken to contradict the
standards and guidelines made mandatory and
binding on federal agencies by the Secretary of Commerce
under statutory authority. Nor should these
guidelines be interpreted as altering or superseding the existing
authorities of the Secretary of Commerce,
Director of the OMB, or any other federal official. This
publication may be used by nongovernmental
organizations on a voluntary basis and is not subject to
copyright in the United States. Attribution would,
however, be appreciated by NIST.
National Institute of Standards and Technology Special
Publication 800-12 Revision 1
Natl. Inst. Stand. Technol. Spec. Publ. 800-12 Rev. 1, 101 pages
(June 2017)
CODEN: NSPUE2
This publication is available free of charge from:
https://doi.org/10.6028/NIST.SP.800-12r1
Certain commercial entities, equipment, or materials may be
identified in this document in order to describe an
experimental procedure or concept adequately. Such
identification is not intended to imply recommendation or
endorsement by NIST, nor is it intended to imply that the
entities, materials, or equipment are necessarily the best
available for the purpose.
There may be references in this publication to other
publications currently under development by NIST in
accordance
with its assigned statutory responsibilities. The information in
this publication, including concepts and methodologies,
may be used by federal agencies even before the completion of
such companion publications. Thus, until each
publication is completed, current requirements, guidelines, and
procedures, where they exist, remain operative. For
planning and transition purposes, federal agencies may wish to
closely follow the development of these new
publications by NIST.
Organizations are encouraged to review all draft publications
during public comment periods and provide feedback to
NIST. Many NIST cybersecurity publications, other than the
ones noted above, are available at
http://csrc.nist.gov/publications.
Comments on this publication may be submitted to:
National Institute of Standards and Technology
Attn: Computer Security Division, Information Technology
Laboratory
100 Bureau Drive (Mail Stop 8930) Gaithersburg, MD 20899-
8930
Email: [email protected]
All comments are subject to release under the Freedom of
Information Act (FOIA).
http://csrc.nist.gov/publications
mailto:[email protected]
NIST SP 800-12 REV. 1 AN INTRODUCTION TO
INFORMATION SECURITY
ii
T
his publication is available free of charge from
: https://doi.org/10.6028/N
IS
T
.S
P
.800-12r1
Reports on Computer Systems Technology
The Information Technology Laboratory (ITL) at the National
Institute of Standards and
Technology (NIST) promotes the U.S. economy and public
welfare by providing technical
leadership for the Nation’s measurement and standards
infrastructure. ITL develops tests, test
methods, reference data, proof of concept implementations, and
technical analyses to advance the
development and productive use of information technology.
ITL’s responsibilities include the
development of management, administrative, technical, and
physical standards and guidelines for
the cost-effective security and privacy of other than national
security-related information in federal
systems. The Special Publication 800-series reports on ITL’s
research, guidelines, and outreach
efforts in systems security as well as its collaborative activities
with industry, government, and
academic organizations.
Abstract
Organizations rely heavily on the use of information technology
(IT) products and services to run
their day-to-day activities. Ensuring the security of these
products and services is of the utmost
importance for the success of the organization. This publication
introduces the information
security principles that organizations may leverage to
understand the information security needs
of their respective systems.
Keywords
assurance; computer security; information security;
introduction; risk management; security
controls; security requirements
NIST SP 800-12 REV. 1 AN INTRODUCTION TO
INFORMATION SECURITY
iii
T
his publication is available free of charge from
: https://doi.org/10.6028/N
IS
T
.S
P
.800-12r1
Acknowledgements
The authors would like to thank everyone who took the time to
review and make comments on
the draft of this publication, specifically Celia Paulsen, Ned
Goren, Isabel Van Wyk, and Rathini
Vijayaverl of the National Institute of Standards and
Technology (NIST). The authors would also
like to acknowledge the original authors, Barbara Guttman and
Edward A. Roback, as well as all
those individuals who contributed to the original version of this
publication.
NIST SP 800-12 REV. 1 AN INTRODUCTION TO
INFORMATION SECURITY
iv
T
his publication is available free of charge from
: https://doi.org/10.6028/N
IS
T
.S
P
.800-12r1
Table of Contents
1 Introduction
...............................................................................................
............. 1
1.1 Purpose
...............................................................................................
.............. 1
1.2 Intended Audience
............................................................................................ 1
1.3 Organization
...............................................................................................
....... 1
1.4 Important Terminology
...................................................................................... 2
1.5 Legal Foundation for Federal Information Security Programs
........................... 3
1.6 Related NIST Publications
................................................................................ 4
2 Elements of Information Security
......................................................................... 7
2.1 Information security supports the mission of the
organization ........................... 7
2.2 Information security is an integral element of sound
management ................... 8
2.3 Information security protections are implemented so as to be
commensurate
with risk
...............................................................................................
.................... 8
2.4 Information security roles and responsibilities are made
explicit ....................... 9
2.5 Information security responsibilities for system owners go
beyond their own
organization
...............................................................................................
............. 9
2.6 Information security requires a comprehensive and
integrated approach ......... 9
2.6.1 Interdependencies of security controls
............................................... 10
2.6.2 Other interdependencies
.................................................................... 10
2.7 Information security is assessed and monitored regularly
............................... 10
2.8 Information security is constrained by societal and cultural
factors ................. 11
3 Roles and
Responsibilities.......................................................................
........... 13
3.1 Risk Executive Function (Senior Management)
.............................................. 13
3.2 Chief Executive Officer (CEO)
......................................................................... 13
3.3 Chief Information Officer (CIO)
........................................................................ 14
3.4 Information Owner/Steward
............................................................................ 14
3.5 Senior Agency Information Security Officer (SAISO)
...................................... 14
3.6 Authorizing Official (AO)
.................................................................................. 15
3.7 Authorizing Official Designated Representative
.............................................. 15
3.8 Senior Agency Official for Privacy (SAOP)
...................................................... 15
3.9 Common Control Provider
............................................................................... 15
3.10 System Owner
...............................................................................................
16
3.11 System Security Officer (SSO)
...................................................................... 16
NIST SP 800-12 REV. 1 AN INTRODUCTION TO
INFORMATION SECURITY
v
T
his publication is available free of charge from
: https://doi.org/10.6028/N
IS
T
.S
P
.800-12r1
3.12 Information Security Architect
....................................................................... 16
3.13 System Security Engineer (SSE)
.................................................................. 17
3.14 Security Control Assessor
............................................................................. 17
3.15 System Administrator
.................................................................................... 17
3.16 User
...............................................................................................
............... 17
3.17 Supporting Roles
...........................................................................................
18
4 Threats and Vulnerabilities: A Brief Overview
................................................... 20
4.1 Examples of Adversarial Threat Sources and Events
..................................... 20
4.1.1 Fraud and Theft
.................................................................................. 21
4.1.2 Insider Threat
..................................................................................... 22
4.1.3 Malicious Hacker
................................................................................ 22
4.1.4 Malicious Code
................................................................................... 23
4.2 Examples of Non-Adversarial Threat Sources and Events
............................. 24
4.2.1 Errors and Omissions
......................................................................... 24
4.2.2 Loss of Physical and Infrastructure Support
....................................... 24
4.2.3 Impacts to Personal Privacy of Information Sharing
........................... 25
5 Information Security Policy
................................................................................. 26
5.1 Standards, Guidelines, and Procedures
.......................................................... 26
5.2 Program Policy
............................................................................................ ...
. 27
5.2.1 Basic Components of Program Policy
................................................ 27
5.3 Issue-Specific Policy
....................................................................................... 28
5.3.1 Example Topics for Issue-Specific Policy
........................................... 28
5.3.2 Basic Components of Issue-Specific Policy
........................................ 29
5.4 System-Specific Policy
.................................................................................... 30
5.4.1 Security Objectives
............................................................................. 31
5.4.2 Operational Security Rules
................................................................. 31
5.4.3 System-Specific Policy Implementation
.............................................. 32
5.5 Interdependencies
...........................................................................................
32
5.6 Cost Considerations
........................................................................................ 33
6 Information Security Risk Management
............................................................. 34
6.1 Categorize
......................................................................................... ......
........ 36
6.2 Select
...............................................................................................
............... 36
NIST SP 800-12 REV. 1 AN INTRODUCTION TO
INFORMATION SECURITY
vi
T
his publication is available free of charge from
: https://doi.org/10.6028/N
IS
T
.S
P
.800-12r1
6.3 Implement
...............................................................................................
........ 37
6.4 Assess
...............................................................................................
............. 37
6.5 Authorize
...............................................................................................
.......... 37
6.6 Monitor
...............................................................................................
............. 37
7 Assurance
...............................................................................................
.............. 38
7.1 Authorization
...............................................................................................
.... 38
7.1.1 Authorization and Assurance
.............................................................. 39
7.1.2 Authorization of Products to Operate in Similar Situation
................... 39
7.2 Security Engineering
....................................................................................... 39
7.2.1 Planning and Assurance
..................................................................... 39
7.2.2 Design and Implementation Assurance
.............................................. 39
7.3 Operational Assurance
.................................................................................... 41
7.3.1 Security and Privacy Control Assessments
........................................ 42
7.3.2 Audit Methods and Tools
.................................................................... 42
7.3.3 Monitoring Methods and Tools
........................................................... 44
7.4 Interdependencies
...........................................................................................
46
7.5 Cost Considerations
........................................................................................ 46
8 Security Considerations in System Support and Operations
.......................... 47
8.1 User Support
...............................................................................................
.... 47
8.2 Software Support
............................................................................................
48
8.3 Configuration Management
............................................................................. 48
8.4 Backups
...............................................................................................
........... 49
8.5 Media Controls
...............................................................................................
. 49
8.6 Documentation
...............................................................................................
. 49
8.7 Maintenance
...............................................................................................
..... 50
8.8 Interdependencies
...........................................................................................
50
8.9 Cost Considerations
........................................................................................ 51
9
Cryptography..........................................................................
.............................. 52
9.1 Uses of Cryptography
..................................................................................... 52
9.1.1 Data Encryption
.................................................................................. 52
9.1.2 Integrity
....................................................................................... ........
53
9.1.3 Electronic Signatures
.......................................................................... 53
NIST SP 800-12 REV. 1 AN INTRODUCTION TO
INFORMATION SECURITY
vii
T
his publication is available free of charge from
: https://doi.org/10.6028/N
IS
T
.S
P
.800-12r1
9.1.4 User Authentication
............................................................................ 54
9.2 Implementation Issues
.................................................................................... 54
9.2.1 Selecting Design and Implementation Standards
............................... 55
9.2.2 Deciding between Software, Hardware, or Firmware
Implementations ..
...............................................................................................
............ 55
9.2.3 Managing Keys
................................................................................... 55
9.2.4 Security of Cryptographic Modules
..................................................... 56
9.2.5 Applying Cryptography to Networks
................................................... 56
9.2.6 Complying with Export Rules
.............................................................. 57
9.3 Interdependencies
...........................................................................................
57
9.4 Cost Considerations
........................................................................................ 58
9.4.1 Direct Costs
........................................................................................ 58
9.4.2 Indirect Costs
..................................................................................... 58
10 Control Families
...............................................................................................
.... 59
10.1 Access Control (AC)
...................................................................................... 59
10.2 Awareness and Training (AT)
........................................................................ 59
10.3 Audit and Accountability (AU)
........................................................................ 60
10.4 Assessment, Authorization, and Monitoring (CA)
.......................................... 60
10.5 Configuration Management (CM)
.................................................................. 61
10.6 Contingency Planning (CP)
........................................................................... 61
10.7 Identification and Authentication (IA)
............................................................. 62
10.8 Individual Participation (IP)
............................................................................ 63
10.9 Incident Response (IR)
................................................................................. 64
10.10 Maintenance (MA)
....................................................................................... 64
10.11 Media Protection (MP)
................................................................................ 65
10.12 Privacy Authorization (PA)
.......................................................................... 65
10.13 Physical and Environmental Protection (PE)
............................................... 66
10.14 Planning (PL)
..............................................................................................
67
10.15 Program Management (PM)
........................................................................ 67
10.16 Personnel Security (PS)
.............................................................................. 68
10.17 Risk Assessment (RA)
................................................................................ 68
10.18 System and Services Acquisition (SA)
........................................................ 69
10.19 System and Communications Protection (SC)
............................................ 69
NIST SP 800-12 REV. 1 AN INTRODUCTION TO
INFORMATION SECURITY
viii
T
his publication is available free of charge from
: https://doi.org/10.6028/N
IS
T
.S
P
.800-12r1
10.20 System and Information Integrity (SI)
.......................................................... 70
List of Appendices
References
.......................................................................................... 71
Glossary
..............................................................................................
76
Acronyms and Abbreviations
............................................................ 88
List of Figures
Figure 1 - Risk Management Framework (RMF) Overview
........................................... 36
NIST SP 800-12 REV. 1 AN INTRODUCTION TO
INFORMATION SECURITY
1
T
his publication is available free of charge from
: https://doi.org/10.6028/N
IS
T
.S
P
.800-12r1
1 Introduction
1.1 Purpose
This publication serves as a starting-point for those new to
information security as well as those
unfamiliar with NIST information security publications and
guidelines. The intent of this special
publication is to provide a high-level overview of information
security principles by introducing
related concepts and the security control families (as defined in
NIST SP 800-53, Security and
Privacy Controls for Federal Information Systems and
Organizations) that organizations can
leverage to effectively secure their systems1 and information.
To better understand the meaning
and intent of the security control families described later, this
publication begins by familiarizing
the reader with various information security principles.
After the introduction of these security principles, the
publication provides detailed descriptions
of multiple security control families as well as the benefits of
each control family. The point is
not to impose requirements on organizations, but to explore
available techniques for applying a
specific control family to an organization’s system and to
explain the benefit(s) of employing the
selected controls.
Since this publication provides an introduction to information
security, detailed steps as to how
security controls are implemented or how to check for security
control effectiveness are not
included. Rather, separate publications that may provide more
detailed information about a
specific topic will be noted as a reference.
1.2 Intended Audience
The target audience for this publication are those new to the
information security principles and
tenets needed to protect information and systems in a way that
is commensurate with risk. This
publication provides a basic foundation of concepts and ideas to
any person tasked with or
interested in understanding how to secure systems.
For that reason, this publication is a good resource for anyone
seeking a better understanding of
information security basics or a high-level view on the topic.
The tips and techniques described
in this publication may be applied to any type of information or
system in any type of
organization. While there may be differences in the way federal
organizations, academia, and the
private sector process, store, and disseminate information
within their respective systems, the
basic principles of information security are applicable to all.
1.3 Organization
This publication is organized as follows:
• Chapter 1 describes the purpose, target audience, important
terms, the legal foundation
for information security, and a list of NIST publications related
to information security
and information risk management.
1 System is defined in SP 800-53 as any organized assembly of
resources and procedures united and regulated by interaction or
interdependence to accomplish a set of specific functions.
NIST SP 800-12 REV. 1 AN INTRODUCTION TO
INFORMATION SECURITY
2
T
his publication is available free of charge from
: https://doi.org/10.6028/N
IS
T
.S
P
.800-12r1
• Chapter 2 lists eight major elements regarding information
security.
• Chapter 3 outlines several roles, supporting roles, and the
respective responsibilities
attributed to those roles on providing information security to
the organization.
• Chapter 4 introduces threats and vulnerabilities, distinguishes
the difference between the
two, and provides examples of different threat sources and
events.
• Chapter 5 discusses information security policy and the
differences between Program
Policy, Issue-Specific Policy, and System-Specific Policy.
• Chapter 6 considers how to manage risk and briefly describes
the six steps of the NIST
Risk Management Framework (RMF).
• Chapter 7 focuses on information assurance and what
measures can be taken to protect
information and systems.
• Chapter 8 introduces system support and operations, which
collectively function to run a
system.
• Chapter 9 provides a brief overview of cryptography as well as
several NIST 800-series
Publications that contain additional, more detailed information
on specific cryptographic
technologies.
• Chapter 10 introduces the 20 information security and privacy
control families.
• Appendix A provides a list of References.
• Appendix B provides a Glossary of terms used throughout the
document.
• Appendix C provides a list of Acronyms and Abbreviations
used throughout the
document.
1.4 Important Terminology
The term Information System is defined by 44 U.S.C., Sec. 3502
as “a discrete set of information
resources organized for the collection, processing, maintenance,
use, sharing, dissemination, or
disposition of information.”
For this publication, the term system is used in lieu of the term
information system to reflect the
broader applicability of information resources of any size or
complexity, organized expressly for
the collection, processing, use, sharing, dissemination,
maintenance, or disposition of data or
information. Some other key terms to be familiar with are:2
• Information – (1) Facts or ideas, which can be represented
(encoded) as various forms of
data; (2) Knowledge (e.g., data, instructions) in any medium or
form that can be
communicated between system entities.
• Information Security – The protection of information and
information systems from
unauthorized access, use, disclosure, disruption, modification,
or destruction in order to
ensure confidentiality, integrity, and availability.
• Confidentiality – Preserving authorized restrictions on
information access and disclosure,
2 These terms and definitions were retrieved from CNSSI 4009,
Committee on National Security Systems (CNSS) Glossary,
dated
April 6, 2015.
NIST SP 800-12 REV. 1 AN INTRODUCTION TO
INFORMATION SECURITY
3
T
his publication is available free of charge from
: https://doi.org/10.6028/N
IS
T
.S
P
.800-12r1
including means for protecting personal privacy and proprietary
information.
• Integrity – Guarding against improper information
modification or destruction and
ensuring information non-repudiation and authenticity.
o Data Integrity – The property that data has not been altered in
an unauthorized
manner. Data integrity covers data in storage, during
processing, and while in
transit.
o System Integrity – The quality that a system has when it
performs its intended
function in an unimpaired manner, free from unauthorized
manipulation of the
system, whether intentional or accidental.
• Availability – Ensuring timely and reliable access to and use
of information.
• Security Controls3 – The management, operational, and
technical controls (i.e.,
safeguards or countermeasures) prescribed for a system to
protect the confidentiality,
availability, and integrity of the system and its information.
1.5 Legal Foundation for Federal Information Security Programs
Within the Federal Government, many laws and regulations
mandate that federal organizations
protect their systems, the information processed, stored, or
transmitted by systems, and related
technology resources (e.g., telecommunications). A sampling of
these laws and regulations is …
Managing and Using Information Systems:
A Strategic Approach – Seventh Edition
Keri Pearlson, Carol Saunders,
and Dennis Galletta
© Copyright 2016
John Wiley & Sons, Inc.
Chapter 9
Governance of the Information Systems Organization
2
Learning Objectives
Understand how governance structures define how decisions are
made
Describe governance based on organization structure, decision
rights, and control
Discuss examples and strategies for implementation.
© 2016 John Wiley & Sons, Inc.
3
Intel’s Transformation
Huge performance improvements between 2013 and 2014
Was it due to a spending increase?
Intel’s evolution
1992: Centralized IT
2003: Protect Era – lockdown (SOX & virus)
2009: Protect to Enable Era (BYOD pressure)
© 2016 John Wiley & Sons, Inc.
4
No, it was due to a spending decrease, not an increase.
They focused on protecting to enable, not just locking down
4
Intel Reached Level 3:
Developing programs and delivering services
Contributing business value
Transforming the firm
Previously: categorized problems as “business” or “IT”
Now: Integrated solutions are the only way
© 2016 John Wiley & Sons, Inc.
5
IT Governance
Governance (in business) is all about making decisions that
Define expectations,
Grant authority, or
Ensure performance.
Empowerment and monitoring will help align behavior with
business goals.
Empowerment: granting the right to make decisions.
Monitoring: evaluating performance.
© 2016 John Wiley & Sons, Inc.
6
A decision right is an important organizational design variable
since it indicates who in the organization has the responsibility
to initiate, supply
information for, approve, implement, and control various types
of decisions.
6
IT Governance
IT governance focuses on how decision rights can be distributed
differently to facilitate three possible modes of decision
making:
centralized,
decentralized, or
hybrid
Organizational structure plays a major role.
© 2016 John Wiley & Sons, Inc.
7
Four Perspectives
Traditional – Centralized vs decentralized
Accountability and allocation of decision rights
Ecosystem
Control structures from legislation
© 2016 John Wiley & Sons, Inc.
8
Centralized vs. Decentralized Organizational Structures
Centralized – bring together all staff, hardware, software, data,
and processing into a single location.
Decentralized – the components in the centralized structure are
scattered in different locations to address local business needs.
Federalism – a hybrid of centralized and decentralized
structures.
© 2016 John Wiley & Sons, Inc.
9
9
Organizational continuum
10
Federalism
Most companies would like to achieve the advantages of both
centralization and decentralization.
Leads to federalism
Distributes, power, hardware, software, data and personnel
Between a central IS group and IS in business units
A hybrid approach
Some decisions centralized; some decentralized
© 2016 John Wiley & Sons, Inc.
11
11
Federal IT
© 2016 John Wiley & Sons, Inc.
12
12
Recent Global Survey
Percent of firms reporting that they are:
Centralized: 70.6%
Decentralized: 13.5%
Federated: 12.7%
© 2016 John Wiley & Sons, Inc.
13
Figure 9.4 IT Accountability and Decision Rights
MismatchesAccountabilityLowHighDecision
RightsHighTechnocentric Gap
Danger of overspending on IT creating an oversupply
IT assets may not be utilized to meet business demand
Business group frustration with IT group Strategic Norm (Level
3 balance)
IT is viewed as competent
IT is viewed as strategic to businessLowSupport Norm (Level 1
balance)
Works for organizations where IT is viewed as a support
function
Focus is on business efficiencyBusiness Gap
Cost considerations dominate IT decision
IT assets may not utilize internal competencies to meet business
demand
IT group frustration with business group
© 2016 John Wiley & Sons, Inc.
14
Figure 9.5 Five major categories of IT
decisions.CategoryDescriptionExamples of Affected IS
ActivitiesIT PrinciplesHow to determine IT assets that are
neededParticipating in setting strategic directionIT
ArchitectureHow to structure IT assetsEstablishing architecture
and standardsIT Infrastructure StrategiesHow to build IT
assetsManaging Internet and network services; data; human
resources; mobile computingBusiness Application NeedsHow to
acquire, implement and maintain IT (insource or
outsource)Developing and maintaining information systemsIT
Investment and PrioritizationHow much to invest and where to
invest in IT assetsAnticipating new technologies
© 2016 John Wiley & Sons, Inc.
15
Political Archetypes (Weill & Ross)
Archetypes label the combinations of people who either provide
information or have key IT decision rights
Business monarchy, IT monarchy, feudal, federal, IT duopoly,
and anarchy.
Decisions can be made at several levels in the organization
(Figure 9.6).
Enterprise-wide, business unit, and region/group within a
business unit.
© 2016 John Wiley & Sons, Inc.
16
For each decision category, the organization adopts an
archetype as the means to obtain inputs for decisions and to
assign responsibility for them.
16
Political Archetypes
Organizations vary widely in their archetypes selected
The duopoly is used by the largest portion (36%) of
organizations for IT principles decisions.
IT monarchy is the most popular for IT architecture (73%) and
infrastructure decisions (59%).
© 2016 John Wiley & Sons, Inc.
17
Figure 9.6 IT governance archetypes
© 2016 John Wiley & Sons, Inc.
18
There is no best arrangement for the allocation of decision
rights.
The most appropriate arrangement depends on a number of
factors, including the type of performance indicator.
18
Emergent Governance:
Digital Ecosystems
Challenge a “top down” approach
Self-interested, self-organizing, autonomous sets of
technologies from different sources
Firms find opportunities to exploit new technologies that were
not anticipated
Good examples:
Google Maps
YouTube
© 2016 John Wiley & Sons, Inc.
19
Another Interesting Example
Electronic Health Record
Can connect to perhaps planned sources:
Pharmacy
Lab
Insurance Company
And can connect to unplanned sources:
Banks – for payment
Tax authority – for matching deductions
Smartphone apps – for many purposes
© 2016 John Wiley & Sons, Inc.
20
How to Govern in this case?
Might be difficult to impossible!
The systems might simply emerge and evolve over time
No one entity can plan these systems in their entirety
© 2016 John Wiley & Sons, Inc.
21
Mechanisms for Making Decisions
Policies and Standards (60% of firms)
Review board or committee
Steering committee (or governance council)
Key stakeholders
Can be at different levels:
Higher level (focus on CIO effectiveness)
Lower level (focus on details of various projects)
© 2016 John Wiley & Sons, Inc.
22
Summary of Three Governance FrameworksGovernance
FrameworkMain ConceptPossible Best PracticeCentralization-
DecentralizationDecisions can be made by a central authority or
by autonomous individuals or groups in an organization.A
hybrid, Federal approachDecision ArchetypesSpecifying
patterns based upon allocating decision rights and
accountability. Tailor the archetype to the situationDigital
EcosystemsMembers of the ecosystem contribute their
strengths, giving the whole ecosystem a complete set of
capabilities.Build flexibility and adaptability into governance.
© 2016 John Wiley & Sons, Inc.
23
A Fourth – Out of a Firm’s Control:
Legislation
24
© 2016 John Wiley & Sons, Inc.
Sarbanes-Oxley Act (SoX) (2002)
To increase regulatory visibility and accountability of public
companies and their financial health
All companies subject to the SEC are subject to SoX.
CEOs and CFOs must personally certify and be accountable for
their firm’s financial records and accounting.
Firms must provide real-time disclosures of any events that may
affect a firm’s stock price or financial performance.
20 year jail term is the alternative.
IT departments play a major role in ensuring the accuracy of
financial data.
© 2016 John Wiley & Sons, Inc.
25
25
IT Control and Sarbanes-Oxley
In 2004 and 2005, IT departments began to
Identify controls,
Determine design effectiveness, and
Test to validate operation of controls
© 2016 John Wiley & Sons, Inc.
26
26
IT Control and Sarbanes-Oxley
Five IT control weaknesses are repeatedly uncovered by
auditors:
Failure to segregate duties within applications, and failure to set
up new accounts and terminate old ones in a timely manner
Lack of proper oversight for making application changes,
including appointing a person to make a change and another to
perform quality assurance on it
Inadequate review of audit logs to not only ensure that systems
were running smoothly but that there also was an audit log of
the audit log
Failure to identify abnormal transactions in a timely manner
Lack of understanding of key system configurations
© 2016 John Wiley & Sons, Inc.
27
Frameworks for Implementing SoX
COSO - Committee of Sponsoring Organzations of the
Treadway Commission.
Created three control objectives for management and auditors
that focused on dealing with risks to internal control
Operations –maintain and improve operating effectiveness;
protect the firm’s assets
Compliance –with relevant laws and regulations.
Financial reporting –in accordance with GAAP
© 2016 John Wiley & Sons, Inc.
28
28
Control Components
Five essential control components were created to make sure a
company is meeting its objectives:
Control environment (culture of the firm)
Assessment of most critical risks to internal controls
Control processes that outline important processes and
guidelines
Communication of those procedures
Monitoring of internal controls by management
© 2016 John Wiley & Sons, Inc.
29
Frameworks (continued)
COBIT (Control Objectives for Information and Related
Technology)
IT governance framework that is consistent with COSO
controls.
Issued in 1996 by Information Systems Audit & Control
Association (ISACA)
A company must
Determine the processes/risks to be managed.
Set up control objectives and KPIs (key performance indicators)
Develop activities to reach the KPIs
Advantages - well-suited to organizations focused on risk
management and mitigation, and very detailed.
Disadvantages – costly and time consuming
© 2016 John Wiley & Sons, Inc.
30
30
IS and the Implementation of SoX Compliance
The IS department and CIO are involved with the
implementation of SoX.
Section 404 deals with management’s assessment of internal
controls.
Six tactics that CIOs can use in working with auditors, CFOs,
and CEOs (Fig. 9.9):
Knowledge building (Build a knowledge base)
Knowledge deployment (Disseminate knowledge to
management.)
Innovation directive (Organize for implementing SoX)
Mobilization (Persuade players and subsidiaries to cooperate)
Standardization (Negotiate agreements, build rules)
Subsidy (Fund the costs)
A CIO’s ability to employ these various tactics depends upon
his/her power (relating to the SoX implementation).
© 2016 John Wiley & Sons, Inc.
31
The CIO needs to acquire and manage the considerable IT
resources to make SoX compliance a reality.
31
Managing and Using Information Systems:
A Strategic Approach – Sixth Edition
Keri Pearlson, Carol Saunders,
and Dennis Galletta
© Copyright 2016
John Wiley & Sons, Inc.

More Related Content

Similar to NIST Special Publication 800-12 Revision 1 An Introduc.docx

NIST Special Publication 800-52 Revision 2 Guidelines .docx
NIST Special Publication 800-52 Revision 2 Guidelines .docxNIST Special Publication 800-52 Revision 2 Guidelines .docx
NIST Special Publication 800-52 Revision 2 Guidelines .docx
vannagoforth
 
Nist.sp.800 124r1
Nist.sp.800 124r1Nist.sp.800 124r1
Nist.sp.800 124r1
Global Business Professor
 
Sp800 30-rev1-ipd
Sp800 30-rev1-ipdSp800 30-rev1-ipd
Sp800 30-rev1-ipd
FISMA-COMPARED
 
NIST Special Publication 800-34 Rev. 1 Contingency.docx
NIST Special Publication 800-34 Rev. 1   Contingency.docxNIST Special Publication 800-34 Rev. 1   Contingency.docx
NIST Special Publication 800-34 Rev. 1 Contingency.docx
picklesvalery
 
SP 800-150, the Guide to Cyber Threat Information Sharing
SP 800-150, the Guide to Cyber Threat Information SharingSP 800-150, the Guide to Cyber Threat Information Sharing
SP 800-150, the Guide to Cyber Threat Information Sharing
David Sweigert
 
Contingency Planning Guide for Federal Information Systems Maria.docx
Contingency Planning Guide for Federal Information Systems Maria.docxContingency Planning Guide for Federal Information Systems Maria.docx
Contingency Planning Guide for Federal Information Systems Maria.docx
maxinesmith73660
 
NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3
David Sweigert
 
NIST 800-125 a DRAFT (HyperVisor Security)
NIST 800-125 a DRAFT   (HyperVisor Security)NIST 800-125 a DRAFT   (HyperVisor Security)
NIST 800-125 a DRAFT (HyperVisor Security)
David Sweigert
 
Nist.sp.800 82r2
Nist.sp.800 82r2Nist.sp.800 82r2
Nist.sp.800 82r2
vimal Kumar Gupta
 
I N F O R M A T I O N S E C U R I T Y Computer S
I N F O R M A T I O N     S E C U R I T Y   Computer SI N F O R M A T I O N     S E C U R I T Y   Computer S
I N F O R M A T I O N S E C U R I T Y Computer S
NarcisaBrandenburg70
 
NIST SP 800-137 Information security continuous monitoring (ISCM)
NIST SP 800-137 Information security continuous monitoring (ISCM)NIST SP 800-137 Information security continuous monitoring (ISCM)
NIST SP 800-137 Information security continuous monitoring (ISCM)
David Sweigert
 
3 - Firewall Guidlines.pdf
3 - Firewall Guidlines.pdf3 - Firewall Guidlines.pdf
3 - Firewall Guidlines.pdf
Admin621695
 
Endpoint Protection Platform Invent Youself/tutorialoutletdotcom
Endpoint Protection Platform Invent Youself/tutorialoutletdotcomEndpoint Protection Platform Invent Youself/tutorialoutletdotcom
Endpoint Protection Platform Invent Youself/tutorialoutletdotcom
apjk220
 
NIST SP 800-171 - Protecting Controlled Unclassified Information
NIST SP 800-171  - Protecting Controlled Unclassified Information  NIST SP 800-171  - Protecting Controlled Unclassified Information
NIST SP 800-171 - Protecting Controlled Unclassified Information
David Sweigert
 
Glossary - Standard Security Terms - NIST Vocabulary
Glossary - Standard Security Terms - NIST VocabularyGlossary - Standard Security Terms - NIST Vocabulary
Glossary - Standard Security Terms - NIST Vocabulary
David Sweigert
 
NIST releases SP 800-160 Multi-discplinary approach to cybersecurity
NIST releases SP 800-160  Multi-discplinary approach to cybersecurityNIST releases SP 800-160  Multi-discplinary approach to cybersecurity
NIST releases SP 800-160 Multi-discplinary approach to cybersecurity
David Sweigert
 
oow
oowoow
NIST Risk management Framework NIST 800-30, rev. 1
NIST Risk management Framework NIST 800-30, rev. 1NIST Risk management Framework NIST 800-30, rev. 1
NIST Risk management Framework NIST 800-30, rev. 1
David Sweigert
 
Sp800 55 Rev1 Performance Measurement Guide For Information Security
Sp800 55 Rev1   Performance Measurement Guide For Information SecuritySp800 55 Rev1   Performance Measurement Guide For Information Security
Sp800 55 Rev1 Performance Measurement Guide For Information Security
Joao Couto
 
httpsclass.waldenu.eduwebappsassessmenttakelaunchAssess
httpsclass.waldenu.eduwebappsassessmenttakelaunchAssesshttpsclass.waldenu.eduwebappsassessmenttakelaunchAssess
httpsclass.waldenu.eduwebappsassessmenttakelaunchAssess
LizbethQuinonez813
 

Similar to NIST Special Publication 800-12 Revision 1 An Introduc.docx (20)

NIST Special Publication 800-52 Revision 2 Guidelines .docx
NIST Special Publication 800-52 Revision 2 Guidelines .docxNIST Special Publication 800-52 Revision 2 Guidelines .docx
NIST Special Publication 800-52 Revision 2 Guidelines .docx
 
Nist.sp.800 124r1
Nist.sp.800 124r1Nist.sp.800 124r1
Nist.sp.800 124r1
 
Sp800 30-rev1-ipd
Sp800 30-rev1-ipdSp800 30-rev1-ipd
Sp800 30-rev1-ipd
 
NIST Special Publication 800-34 Rev. 1 Contingency.docx
NIST Special Publication 800-34 Rev. 1   Contingency.docxNIST Special Publication 800-34 Rev. 1   Contingency.docx
NIST Special Publication 800-34 Rev. 1 Contingency.docx
 
SP 800-150, the Guide to Cyber Threat Information Sharing
SP 800-150, the Guide to Cyber Threat Information SharingSP 800-150, the Guide to Cyber Threat Information Sharing
SP 800-150, the Guide to Cyber Threat Information Sharing
 
Contingency Planning Guide for Federal Information Systems Maria.docx
Contingency Planning Guide for Federal Information Systems Maria.docxContingency Planning Guide for Federal Information Systems Maria.docx
Contingency Planning Guide for Federal Information Systems Maria.docx
 
NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3
 
NIST 800-125 a DRAFT (HyperVisor Security)
NIST 800-125 a DRAFT   (HyperVisor Security)NIST 800-125 a DRAFT   (HyperVisor Security)
NIST 800-125 a DRAFT (HyperVisor Security)
 
Nist.sp.800 82r2
Nist.sp.800 82r2Nist.sp.800 82r2
Nist.sp.800 82r2
 
I N F O R M A T I O N S E C U R I T Y Computer S
I N F O R M A T I O N     S E C U R I T Y   Computer SI N F O R M A T I O N     S E C U R I T Y   Computer S
I N F O R M A T I O N S E C U R I T Y Computer S
 
NIST SP 800-137 Information security continuous monitoring (ISCM)
NIST SP 800-137 Information security continuous monitoring (ISCM)NIST SP 800-137 Information security continuous monitoring (ISCM)
NIST SP 800-137 Information security continuous monitoring (ISCM)
 
3 - Firewall Guidlines.pdf
3 - Firewall Guidlines.pdf3 - Firewall Guidlines.pdf
3 - Firewall Guidlines.pdf
 
Endpoint Protection Platform Invent Youself/tutorialoutletdotcom
Endpoint Protection Platform Invent Youself/tutorialoutletdotcomEndpoint Protection Platform Invent Youself/tutorialoutletdotcom
Endpoint Protection Platform Invent Youself/tutorialoutletdotcom
 
NIST SP 800-171 - Protecting Controlled Unclassified Information
NIST SP 800-171  - Protecting Controlled Unclassified Information  NIST SP 800-171  - Protecting Controlled Unclassified Information
NIST SP 800-171 - Protecting Controlled Unclassified Information
 
Glossary - Standard Security Terms - NIST Vocabulary
Glossary - Standard Security Terms - NIST VocabularyGlossary - Standard Security Terms - NIST Vocabulary
Glossary - Standard Security Terms - NIST Vocabulary
 
NIST releases SP 800-160 Multi-discplinary approach to cybersecurity
NIST releases SP 800-160  Multi-discplinary approach to cybersecurityNIST releases SP 800-160  Multi-discplinary approach to cybersecurity
NIST releases SP 800-160 Multi-discplinary approach to cybersecurity
 
oow
oowoow
oow
 
NIST Risk management Framework NIST 800-30, rev. 1
NIST Risk management Framework NIST 800-30, rev. 1NIST Risk management Framework NIST 800-30, rev. 1
NIST Risk management Framework NIST 800-30, rev. 1
 
Sp800 55 Rev1 Performance Measurement Guide For Information Security
Sp800 55 Rev1   Performance Measurement Guide For Information SecuritySp800 55 Rev1   Performance Measurement Guide For Information Security
Sp800 55 Rev1 Performance Measurement Guide For Information Security
 
httpsclass.waldenu.eduwebappsassessmenttakelaunchAssess
httpsclass.waldenu.eduwebappsassessmenttakelaunchAssesshttpsclass.waldenu.eduwebappsassessmenttakelaunchAssess
httpsclass.waldenu.eduwebappsassessmenttakelaunchAssess
 

More from picklesvalery

NPV, IRR, Payback period,— PA1Correlates with CLA2 (NPV portion.docx
NPV, IRR, Payback period,— PA1Correlates with CLA2 (NPV portion.docxNPV, IRR, Payback period,— PA1Correlates with CLA2 (NPV portion.docx
NPV, IRR, Payback period,— PA1Correlates with CLA2 (NPV portion.docx
picklesvalery
 
Now that you have had the opportunity to review various Cyber At.docx
Now that you have had the opportunity to review various Cyber At.docxNow that you have had the opportunity to review various Cyber At.docx
Now that you have had the opportunity to review various Cyber At.docx
picklesvalery
 
Now that you have completed a series of assignments that have led yo.docx
Now that you have completed a series of assignments that have led yo.docxNow that you have completed a series of assignments that have led yo.docx
Now that you have completed a series of assignments that have led yo.docx
picklesvalery
 
Now that you have completed your paper (ATTACHED), build and deliver.docx
Now that you have completed your paper (ATTACHED), build and deliver.docxNow that you have completed your paper (ATTACHED), build and deliver.docx
Now that you have completed your paper (ATTACHED), build and deliver.docx
picklesvalery
 
Now that you have identified the revenue-related internal contro.docx
Now that you have identified the revenue-related internal contro.docxNow that you have identified the revenue-related internal contro.docx
Now that you have identified the revenue-related internal contro.docx
picklesvalery
 
Now that you have read about Neandertals and modern Homo sapiens.docx
Now that you have read about Neandertals and modern Homo sapiens.docxNow that you have read about Neandertals and modern Homo sapiens.docx
Now that you have read about Neandertals and modern Homo sapiens.docx
picklesvalery
 
Now that you have had an opportunity to explore ethics formally, cre.docx
Now that you have had an opportunity to explore ethics formally, cre.docxNow that you have had an opportunity to explore ethics formally, cre.docx
Now that you have had an opportunity to explore ethics formally, cre.docx
picklesvalery
 
Novel Literary Exploration EssayWrite a Literary Exploration Ess.docx
Novel Literary Exploration EssayWrite a Literary Exploration Ess.docxNovel Literary Exploration EssayWrite a Literary Exploration Ess.docx
Novel Literary Exploration EssayWrite a Literary Exploration Ess.docx
picklesvalery
 
Notifications My CommunityHomeBBA 3551-16P-5A19-S3, Inform.docx
Notifications My CommunityHomeBBA 3551-16P-5A19-S3, Inform.docxNotifications My CommunityHomeBBA 3551-16P-5A19-S3, Inform.docx
Notifications My CommunityHomeBBA 3551-16P-5A19-S3, Inform.docx
picklesvalery
 
November-December 2013 • Vol. 22No. 6 359Beverly Waller D.docx
November-December 2013 • Vol. 22No. 6 359Beverly Waller D.docxNovember-December 2013 • Vol. 22No. 6 359Beverly Waller D.docx
November-December 2013 • Vol. 22No. 6 359Beverly Waller D.docx
picklesvalery
 
NOTEPlease pay attention to the assignment instructionsZero.docx
NOTEPlease pay attention to the assignment instructionsZero.docxNOTEPlease pay attention to the assignment instructionsZero.docx
NOTEPlease pay attention to the assignment instructionsZero.docx
picklesvalery
 
NOTE Use below Textbooks only. 400 WordsTopic Which doctrine.docx
NOTE Use below Textbooks only. 400 WordsTopic Which doctrine.docxNOTE Use below Textbooks only. 400 WordsTopic Which doctrine.docx
NOTE Use below Textbooks only. 400 WordsTopic Which doctrine.docx
picklesvalery
 
NOTE Everything in BOLD are things that I need to turn in for m.docx
NOTE Everything in BOLD are things that I need to turn in for m.docxNOTE Everything in BOLD are things that I need to turn in for m.docx
NOTE Everything in BOLD are things that I need to turn in for m.docx
picklesvalery
 
Note Be sure to focus only on the causes of the problem in this.docx
Note Be sure to focus only on the causes of the problem in this.docxNote Be sure to focus only on the causes of the problem in this.docx
Note Be sure to focus only on the causes of the problem in this.docx
picklesvalery
 
Note I’ll provide my sources in the morning, and lmk if you hav.docx
Note I’ll provide my sources in the morning, and lmk if you hav.docxNote I’ll provide my sources in the morning, and lmk if you hav.docx
Note I’ll provide my sources in the morning, and lmk if you hav.docx
picklesvalery
 
Note Here, the company I mentioned was Qualcomm 1. Email is the.docx
Note Here, the company I mentioned was Qualcomm 1. Email is the.docxNote Here, the company I mentioned was Qualcomm 1. Email is the.docx
Note Here, the company I mentioned was Qualcomm 1. Email is the.docx
picklesvalery
 
Note Please follow instructions to the T.Topic of 3 page pape.docx
Note Please follow instructions to the T.Topic of 3 page pape.docxNote Please follow instructions to the T.Topic of 3 page pape.docx
Note Please follow instructions to the T.Topic of 3 page pape.docx
picklesvalery
 
Note A full-sentence outline differs from bullet points because e.docx
Note A full-sentence outline differs from bullet points because e.docxNote A full-sentence outline differs from bullet points because e.docx
Note A full-sentence outline differs from bullet points because e.docx
picklesvalery
 
Notable photographers 1980 to presentAlmas, ErikAraki, No.docx
Notable photographers 1980 to presentAlmas, ErikAraki, No.docxNotable photographers 1980 to presentAlmas, ErikAraki, No.docx
Notable photographers 1980 to presentAlmas, ErikAraki, No.docx
picklesvalery
 
Note 2 political actions that are in line with Socialism and explain.docx
Note 2 political actions that are in line with Socialism and explain.docxNote 2 political actions that are in line with Socialism and explain.docx
Note 2 political actions that are in line with Socialism and explain.docx
picklesvalery
 

More from picklesvalery (20)

NPV, IRR, Payback period,— PA1Correlates with CLA2 (NPV portion.docx
NPV, IRR, Payback period,— PA1Correlates with CLA2 (NPV portion.docxNPV, IRR, Payback period,— PA1Correlates with CLA2 (NPV portion.docx
NPV, IRR, Payback period,— PA1Correlates with CLA2 (NPV portion.docx
 
Now that you have had the opportunity to review various Cyber At.docx
Now that you have had the opportunity to review various Cyber At.docxNow that you have had the opportunity to review various Cyber At.docx
Now that you have had the opportunity to review various Cyber At.docx
 
Now that you have completed a series of assignments that have led yo.docx
Now that you have completed a series of assignments that have led yo.docxNow that you have completed a series of assignments that have led yo.docx
Now that you have completed a series of assignments that have led yo.docx
 
Now that you have completed your paper (ATTACHED), build and deliver.docx
Now that you have completed your paper (ATTACHED), build and deliver.docxNow that you have completed your paper (ATTACHED), build and deliver.docx
Now that you have completed your paper (ATTACHED), build and deliver.docx
 
Now that you have identified the revenue-related internal contro.docx
Now that you have identified the revenue-related internal contro.docxNow that you have identified the revenue-related internal contro.docx
Now that you have identified the revenue-related internal contro.docx
 
Now that you have read about Neandertals and modern Homo sapiens.docx
Now that you have read about Neandertals and modern Homo sapiens.docxNow that you have read about Neandertals and modern Homo sapiens.docx
Now that you have read about Neandertals and modern Homo sapiens.docx
 
Now that you have had an opportunity to explore ethics formally, cre.docx
Now that you have had an opportunity to explore ethics formally, cre.docxNow that you have had an opportunity to explore ethics formally, cre.docx
Now that you have had an opportunity to explore ethics formally, cre.docx
 
Novel Literary Exploration EssayWrite a Literary Exploration Ess.docx
Novel Literary Exploration EssayWrite a Literary Exploration Ess.docxNovel Literary Exploration EssayWrite a Literary Exploration Ess.docx
Novel Literary Exploration EssayWrite a Literary Exploration Ess.docx
 
Notifications My CommunityHomeBBA 3551-16P-5A19-S3, Inform.docx
Notifications My CommunityHomeBBA 3551-16P-5A19-S3, Inform.docxNotifications My CommunityHomeBBA 3551-16P-5A19-S3, Inform.docx
Notifications My CommunityHomeBBA 3551-16P-5A19-S3, Inform.docx
 
November-December 2013 • Vol. 22No. 6 359Beverly Waller D.docx
November-December 2013 • Vol. 22No. 6 359Beverly Waller D.docxNovember-December 2013 • Vol. 22No. 6 359Beverly Waller D.docx
November-December 2013 • Vol. 22No. 6 359Beverly Waller D.docx
 
NOTEPlease pay attention to the assignment instructionsZero.docx
NOTEPlease pay attention to the assignment instructionsZero.docxNOTEPlease pay attention to the assignment instructionsZero.docx
NOTEPlease pay attention to the assignment instructionsZero.docx
 
NOTE Use below Textbooks only. 400 WordsTopic Which doctrine.docx
NOTE Use below Textbooks only. 400 WordsTopic Which doctrine.docxNOTE Use below Textbooks only. 400 WordsTopic Which doctrine.docx
NOTE Use below Textbooks only. 400 WordsTopic Which doctrine.docx
 
NOTE Everything in BOLD are things that I need to turn in for m.docx
NOTE Everything in BOLD are things that I need to turn in for m.docxNOTE Everything in BOLD are things that I need to turn in for m.docx
NOTE Everything in BOLD are things that I need to turn in for m.docx
 
Note Be sure to focus only on the causes of the problem in this.docx
Note Be sure to focus only on the causes of the problem in this.docxNote Be sure to focus only on the causes of the problem in this.docx
Note Be sure to focus only on the causes of the problem in this.docx
 
Note I’ll provide my sources in the morning, and lmk if you hav.docx
Note I’ll provide my sources in the morning, and lmk if you hav.docxNote I’ll provide my sources in the morning, and lmk if you hav.docx
Note I’ll provide my sources in the morning, and lmk if you hav.docx
 
Note Here, the company I mentioned was Qualcomm 1. Email is the.docx
Note Here, the company I mentioned was Qualcomm 1. Email is the.docxNote Here, the company I mentioned was Qualcomm 1. Email is the.docx
Note Here, the company I mentioned was Qualcomm 1. Email is the.docx
 
Note Please follow instructions to the T.Topic of 3 page pape.docx
Note Please follow instructions to the T.Topic of 3 page pape.docxNote Please follow instructions to the T.Topic of 3 page pape.docx
Note Please follow instructions to the T.Topic of 3 page pape.docx
 
Note A full-sentence outline differs from bullet points because e.docx
Note A full-sentence outline differs from bullet points because e.docxNote A full-sentence outline differs from bullet points because e.docx
Note A full-sentence outline differs from bullet points because e.docx
 
Notable photographers 1980 to presentAlmas, ErikAraki, No.docx
Notable photographers 1980 to presentAlmas, ErikAraki, No.docxNotable photographers 1980 to presentAlmas, ErikAraki, No.docx
Notable photographers 1980 to presentAlmas, ErikAraki, No.docx
 
Note 2 political actions that are in line with Socialism and explain.docx
Note 2 political actions that are in line with Socialism and explain.docxNote 2 political actions that are in line with Socialism and explain.docx
Note 2 political actions that are in line with Socialism and explain.docx
 

Recently uploaded

FinalSD_MathematicsGrade7_Session2_Unida.pptx
FinalSD_MathematicsGrade7_Session2_Unida.pptxFinalSD_MathematicsGrade7_Session2_Unida.pptx
FinalSD_MathematicsGrade7_Session2_Unida.pptx
JennySularte1
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
Kalna College
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
 
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Quiz Club IIT Kanpur
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
shreyassri1208
 
Ch-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdfCh-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdf
lakshayrojroj
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
 
Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024
khabri85
 
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
andagarcia212
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
sanamushtaq922
 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
Kalna College
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
Nguyen Thanh Tu Collection
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
nitinpv4ai
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
MJDuyan
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
ShwetaGawande8
 

Recently uploaded (20)

FinalSD_MathematicsGrade7_Session2_Unida.pptx
FinalSD_MathematicsGrade7_Session2_Unida.pptxFinalSD_MathematicsGrade7_Session2_Unida.pptx
FinalSD_MathematicsGrade7_Session2_Unida.pptx
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
 
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
 
Ch-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdfCh-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdf
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
 
Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024
 
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
 

NIST Special Publication 800-12 Revision 1 An Introduc.docx

  • 1. NIST Special Publication 800-12 Revision 1 An Introduction to Information Security Michael Nieles Kelley Dempsey Victoria Yan Pillitteri This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-12r1 C O M P U T E R S E C U R I T Y
  • 2. NIST Special Publication 800-12 Revision 1 An Introduction to Information Security Michael Nieles Kelley Dempsey Victoria Yan Pillitteri Computer Security Division Information Technology Laboratory This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-12r1 June 2017 U.S. Department of Commerce Wilbur L. Ross, Jr., Secretary National Institute of Standards and Technology
  • 3. Kent Rochford, Acting NIST Director and Under Secretary of Commerce for Standards and Technology Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et seq., Public Law (P.L.) 113-283. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on federal agencies by the Secretary of Commerce under statutory authority. Nor should these guidelines be interpreted as altering or superseding the existing authorities of the Secretary of Commerce, Director of the OMB, or any other federal official. This publication may be used by nongovernmental organizations on a voluntary basis and is not subject to copyright in the United States. Attribution would, however, be appreciated by NIST. National Institute of Standards and Technology Special Publication 800-12 Revision 1
  • 4. Natl. Inst. Stand. Technol. Spec. Publ. 800-12 Rev. 1, 101 pages (June 2017) CODEN: NSPUE2 This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-12r1 Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, may be used by federal agencies even before the completion of such companion publications. Thus, until each publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For planning and transition purposes, federal agencies may wish to closely follow the development of these new publications by NIST. Organizations are encouraged to review all draft publications during public comment periods and provide feedback to NIST. Many NIST cybersecurity publications, other than the ones noted above, are available at http://csrc.nist.gov/publications.
  • 5. Comments on this publication may be submitted to: National Institute of Standards and Technology Attn: Computer Security Division, Information Technology Laboratory 100 Bureau Drive (Mail Stop 8930) Gaithersburg, MD 20899- 8930 Email: [email protected] All comments are subject to release under the Freedom of Information Act (FOIA). http://csrc.nist.gov/publications mailto:[email protected] NIST SP 800-12 REV. 1 AN INTRODUCTION TO INFORMATION SECURITY ii T his publication is available free of charge from : https://doi.org/10.6028/N IS T .S
  • 6. P .800-12r1 Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analyses to advance the development and productive use of information technology. ITL’s responsibilities include the development of management, administrative, technical, and physical standards and guidelines for the cost-effective security and privacy of other than national security-related information in federal systems. The Special Publication 800-series reports on ITL’s research, guidelines, and outreach efforts in systems security as well as its collaborative activities with industry, government, and academic organizations. Abstract Organizations rely heavily on the use of information technology (IT) products and services to run their day-to-day activities. Ensuring the security of these products and services is of the utmost importance for the success of the organization. This publication introduces the information security principles that organizations may leverage to
  • 7. understand the information security needs of their respective systems. Keywords assurance; computer security; information security; introduction; risk management; security controls; security requirements NIST SP 800-12 REV. 1 AN INTRODUCTION TO INFORMATION SECURITY iii T his publication is available free of charge from : https://doi.org/10.6028/N IS T .S P .800-12r1
  • 8. Acknowledgements The authors would like to thank everyone who took the time to review and make comments on the draft of this publication, specifically Celia Paulsen, Ned Goren, Isabel Van Wyk, and Rathini Vijayaverl of the National Institute of Standards and Technology (NIST). The authors would also like to acknowledge the original authors, Barbara Guttman and Edward A. Roback, as well as all those individuals who contributed to the original version of this publication. NIST SP 800-12 REV. 1 AN INTRODUCTION TO INFORMATION SECURITY iv T his publication is available free of charge from : https://doi.org/10.6028/N IS T
  • 9. .S P .800-12r1 Table of Contents 1 Introduction ............................................................................................... ............. 1 1.1 Purpose ............................................................................................... .............. 1 1.2 Intended Audience ............................................................................................ 1 1.3 Organization ............................................................................................... ....... 1 1.4 Important Terminology ...................................................................................... 2 1.5 Legal Foundation for Federal Information Security Programs ........................... 3 1.6 Related NIST Publications ................................................................................ 4 2 Elements of Information Security ......................................................................... 7 2.1 Information security supports the mission of the organization ........................... 7 2.2 Information security is an integral element of sound management ................... 8 2.3 Information security protections are implemented so as to be commensurate with risk ...............................................................................................
  • 10. .................... 8 2.4 Information security roles and responsibilities are made explicit ....................... 9 2.5 Information security responsibilities for system owners go beyond their own organization ............................................................................................... ............. 9 2.6 Information security requires a comprehensive and integrated approach ......... 9 2.6.1 Interdependencies of security controls ............................................... 10 2.6.2 Other interdependencies .................................................................... 10 2.7 Information security is assessed and monitored regularly ............................... 10 2.8 Information security is constrained by societal and cultural factors ................. 11 3 Roles and Responsibilities....................................................................... ........... 13 3.1 Risk Executive Function (Senior Management) .............................................. 13 3.2 Chief Executive Officer (CEO) ......................................................................... 13 3.3 Chief Information Officer (CIO) ........................................................................ 14 3.4 Information Owner/Steward ............................................................................ 14 3.5 Senior Agency Information Security Officer (SAISO) ...................................... 14 3.6 Authorizing Official (AO) .................................................................................. 15
  • 11. 3.7 Authorizing Official Designated Representative .............................................. 15 3.8 Senior Agency Official for Privacy (SAOP) ...................................................... 15 3.9 Common Control Provider ............................................................................... 15 3.10 System Owner ............................................................................................... 16 3.11 System Security Officer (SSO) ...................................................................... 16 NIST SP 800-12 REV. 1 AN INTRODUCTION TO INFORMATION SECURITY v T his publication is available free of charge from : https://doi.org/10.6028/N IS T .S P
  • 12. .800-12r1 3.12 Information Security Architect ....................................................................... 16 3.13 System Security Engineer (SSE) .................................................................. 17 3.14 Security Control Assessor ............................................................................. 17 3.15 System Administrator .................................................................................... 17 3.16 User ............................................................................................... ............... 17 3.17 Supporting Roles ........................................................................................... 18 4 Threats and Vulnerabilities: A Brief Overview ................................................... 20 4.1 Examples of Adversarial Threat Sources and Events ..................................... 20 4.1.1 Fraud and Theft .................................................................................. 21 4.1.2 Insider Threat ..................................................................................... 22 4.1.3 Malicious Hacker ................................................................................ 22 4.1.4 Malicious Code ................................................................................... 23 4.2 Examples of Non-Adversarial Threat Sources and Events ............................. 24 4.2.1 Errors and Omissions ......................................................................... 24
  • 13. 4.2.2 Loss of Physical and Infrastructure Support ....................................... 24 4.2.3 Impacts to Personal Privacy of Information Sharing ........................... 25 5 Information Security Policy ................................................................................. 26 5.1 Standards, Guidelines, and Procedures .......................................................... 26 5.2 Program Policy ............................................................................................ ... . 27 5.2.1 Basic Components of Program Policy ................................................ 27 5.3 Issue-Specific Policy ....................................................................................... 28 5.3.1 Example Topics for Issue-Specific Policy ........................................... 28 5.3.2 Basic Components of Issue-Specific Policy ........................................ 29 5.4 System-Specific Policy .................................................................................... 30 5.4.1 Security Objectives ............................................................................. 31 5.4.2 Operational Security Rules ................................................................. 31 5.4.3 System-Specific Policy Implementation .............................................. 32 5.5 Interdependencies ........................................................................................... 32 5.6 Cost Considerations
  • 14. ........................................................................................ 33 6 Information Security Risk Management ............................................................. 34 6.1 Categorize ......................................................................................... ...... ........ 36 6.2 Select ............................................................................................... ............... 36 NIST SP 800-12 REV. 1 AN INTRODUCTION TO INFORMATION SECURITY vi T his publication is available free of charge from : https://doi.org/10.6028/N IS T .S P .800-12r1
  • 15. 6.3 Implement ............................................................................................... ........ 37 6.4 Assess ............................................................................................... ............. 37 6.5 Authorize ............................................................................................... .......... 37 6.6 Monitor ............................................................................................... ............. 37 7 Assurance ............................................................................................... .............. 38 7.1 Authorization ............................................................................................... .... 38 7.1.1 Authorization and Assurance .............................................................. 39 7.1.2 Authorization of Products to Operate in Similar Situation ................... 39 7.2 Security Engineering ....................................................................................... 39 7.2.1 Planning and Assurance ..................................................................... 39 7.2.2 Design and Implementation Assurance .............................................. 39 7.3 Operational Assurance .................................................................................... 41
  • 16. 7.3.1 Security and Privacy Control Assessments ........................................ 42 7.3.2 Audit Methods and Tools .................................................................... 42 7.3.3 Monitoring Methods and Tools ........................................................... 44 7.4 Interdependencies ........................................................................................... 46 7.5 Cost Considerations ........................................................................................ 46 8 Security Considerations in System Support and Operations .......................... 47 8.1 User Support ............................................................................................... .... 47 8.2 Software Support ............................................................................................ 48 8.3 Configuration Management ............................................................................. 48 8.4 Backups ............................................................................................... ........... 49 8.5 Media Controls ............................................................................................... . 49 8.6 Documentation ............................................................................................... . 49 8.7 Maintenance ............................................................................................... ..... 50 8.8 Interdependencies
  • 17. ........................................................................................... 50 8.9 Cost Considerations ........................................................................................ 51 9 Cryptography.......................................................................... .............................. 52 9.1 Uses of Cryptography ..................................................................................... 52 9.1.1 Data Encryption .................................................................................. 52 9.1.2 Integrity ....................................................................................... ........ 53 9.1.3 Electronic Signatures .......................................................................... 53 NIST SP 800-12 REV. 1 AN INTRODUCTION TO INFORMATION SECURITY vii T his publication is available free of charge from
  • 18. : https://doi.org/10.6028/N IS T .S P .800-12r1 9.1.4 User Authentication ............................................................................ 54 9.2 Implementation Issues .................................................................................... 54 9.2.1 Selecting Design and Implementation Standards ............................... 55 9.2.2 Deciding between Software, Hardware, or Firmware Implementations .. ............................................................................................... ............ 55 9.2.3 Managing Keys ................................................................................... 55 9.2.4 Security of Cryptographic Modules ..................................................... 56 9.2.5 Applying Cryptography to Networks ................................................... 56 9.2.6 Complying with Export Rules .............................................................. 57 9.3 Interdependencies ........................................................................................... 57 9.4 Cost Considerations ........................................................................................ 58
  • 19. 9.4.1 Direct Costs ........................................................................................ 58 9.4.2 Indirect Costs ..................................................................................... 58 10 Control Families ............................................................................................... .... 59 10.1 Access Control (AC) ...................................................................................... 59 10.2 Awareness and Training (AT) ........................................................................ 59 10.3 Audit and Accountability (AU) ........................................................................ 60 10.4 Assessment, Authorization, and Monitoring (CA) .......................................... 60 10.5 Configuration Management (CM) .................................................................. 61 10.6 Contingency Planning (CP) ........................................................................... 61 10.7 Identification and Authentication (IA) ............................................................. 62 10.8 Individual Participation (IP) ............................................................................ 63 10.9 Incident Response (IR) ................................................................................. 64 10.10 Maintenance (MA) ....................................................................................... 64 10.11 Media Protection (MP) ................................................................................ 65 10.12 Privacy Authorization (PA) .......................................................................... 65 10.13 Physical and Environmental Protection (PE) ............................................... 66 10.14 Planning (PL)
  • 20. .............................................................................................. 67 10.15 Program Management (PM) ........................................................................ 67 10.16 Personnel Security (PS) .............................................................................. 68 10.17 Risk Assessment (RA) ................................................................................ 68 10.18 System and Services Acquisition (SA) ........................................................ 69 10.19 System and Communications Protection (SC) ............................................ 69 NIST SP 800-12 REV. 1 AN INTRODUCTION TO INFORMATION SECURITY viii T his publication is available free of charge from : https://doi.org/10.6028/N IS T .S
  • 21. P .800-12r1 10.20 System and Information Integrity (SI) .......................................................... 70 List of Appendices References .......................................................................................... 71 Glossary .............................................................................................. 76 Acronyms and Abbreviations ............................................................ 88 List of Figures Figure 1 - Risk Management Framework (RMF) Overview ........................................... 36 NIST SP 800-12 REV. 1 AN INTRODUCTION TO INFORMATION SECURITY 1 T his publication is available free of charge from : https://doi.org/10.6028/N IS
  • 22. T .S P .800-12r1 1 Introduction 1.1 Purpose This publication serves as a starting-point for those new to information security as well as those unfamiliar with NIST information security publications and guidelines. The intent of this special publication is to provide a high-level overview of information security principles by introducing related concepts and the security control families (as defined in NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations) that organizations can leverage to effectively secure their systems1 and information. To better understand the meaning and intent of the security control families described later, this publication begins by familiarizing the reader with various information security principles. After the introduction of these security principles, the publication provides detailed descriptions of multiple security control families as well as the benefits of each control family. The point is not to impose requirements on organizations, but to explore available techniques for applying a specific control family to an organization’s system and to explain the benefit(s) of employing the
  • 23. selected controls. Since this publication provides an introduction to information security, detailed steps as to how security controls are implemented or how to check for security control effectiveness are not included. Rather, separate publications that may provide more detailed information about a specific topic will be noted as a reference. 1.2 Intended Audience The target audience for this publication are those new to the information security principles and tenets needed to protect information and systems in a way that is commensurate with risk. This publication provides a basic foundation of concepts and ideas to any person tasked with or interested in understanding how to secure systems. For that reason, this publication is a good resource for anyone seeking a better understanding of information security basics or a high-level view on the topic. The tips and techniques described in this publication may be applied to any type of information or system in any type of organization. While there may be differences in the way federal organizations, academia, and the private sector process, store, and disseminate information within their respective systems, the basic principles of information security are applicable to all. 1.3 Organization This publication is organized as follows:
  • 24. • Chapter 1 describes the purpose, target audience, important terms, the legal foundation for information security, and a list of NIST publications related to information security and information risk management. 1 System is defined in SP 800-53 as any organized assembly of resources and procedures united and regulated by interaction or interdependence to accomplish a set of specific functions. NIST SP 800-12 REV. 1 AN INTRODUCTION TO INFORMATION SECURITY 2 T his publication is available free of charge from : https://doi.org/10.6028/N IS T .S P .800-12r1 • Chapter 2 lists eight major elements regarding information security.
  • 25. • Chapter 3 outlines several roles, supporting roles, and the respective responsibilities attributed to those roles on providing information security to the organization. • Chapter 4 introduces threats and vulnerabilities, distinguishes the difference between the two, and provides examples of different threat sources and events. • Chapter 5 discusses information security policy and the differences between Program Policy, Issue-Specific Policy, and System-Specific Policy. • Chapter 6 considers how to manage risk and briefly describes the six steps of the NIST Risk Management Framework (RMF). • Chapter 7 focuses on information assurance and what measures can be taken to protect information and systems. • Chapter 8 introduces system support and operations, which collectively function to run a system. • Chapter 9 provides a brief overview of cryptography as well as several NIST 800-series Publications that contain additional, more detailed information on specific cryptographic technologies. • Chapter 10 introduces the 20 information security and privacy control families. • Appendix A provides a list of References.
  • 26. • Appendix B provides a Glossary of terms used throughout the document. • Appendix C provides a list of Acronyms and Abbreviations used throughout the document. 1.4 Important Terminology The term Information System is defined by 44 U.S.C., Sec. 3502 as “a discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information.” For this publication, the term system is used in lieu of the term information system to reflect the broader applicability of information resources of any size or complexity, organized expressly for the collection, processing, use, sharing, dissemination, maintenance, or disposition of data or information. Some other key terms to be familiar with are:2 • Information – (1) Facts or ideas, which can be represented (encoded) as various forms of data; (2) Knowledge (e.g., data, instructions) in any medium or form that can be communicated between system entities. • Information Security – The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to ensure confidentiality, integrity, and availability. • Confidentiality – Preserving authorized restrictions on
  • 27. information access and disclosure, 2 These terms and definitions were retrieved from CNSSI 4009, Committee on National Security Systems (CNSS) Glossary, dated April 6, 2015. NIST SP 800-12 REV. 1 AN INTRODUCTION TO INFORMATION SECURITY 3 T his publication is available free of charge from : https://doi.org/10.6028/N IS T .S P .800-12r1 including means for protecting personal privacy and proprietary information. • Integrity – Guarding against improper information modification or destruction and
  • 28. ensuring information non-repudiation and authenticity. o Data Integrity – The property that data has not been altered in an unauthorized manner. Data integrity covers data in storage, during processing, and while in transit. o System Integrity – The quality that a system has when it performs its intended function in an unimpaired manner, free from unauthorized manipulation of the system, whether intentional or accidental. • Availability – Ensuring timely and reliable access to and use of information. • Security Controls3 – The management, operational, and technical controls (i.e., safeguards or countermeasures) prescribed for a system to protect the confidentiality, availability, and integrity of the system and its information. 1.5 Legal Foundation for Federal Information Security Programs Within the Federal Government, many laws and regulations mandate that federal organizations protect their systems, the information processed, stored, or transmitted by systems, and related technology resources (e.g., telecommunications). A sampling of these laws and regulations is … Managing and Using Information Systems: A Strategic Approach – Seventh Edition Keri Pearlson, Carol Saunders,
  • 29. and Dennis Galletta © Copyright 2016 John Wiley & Sons, Inc. Chapter 9 Governance of the Information Systems Organization 2 Learning Objectives Understand how governance structures define how decisions are made Describe governance based on organization structure, decision rights, and control Discuss examples and strategies for implementation. © 2016 John Wiley & Sons, Inc. 3
  • 30. Intel’s Transformation Huge performance improvements between 2013 and 2014 Was it due to a spending increase? Intel’s evolution 1992: Centralized IT 2003: Protect Era – lockdown (SOX & virus) 2009: Protect to Enable Era (BYOD pressure) © 2016 John Wiley & Sons, Inc. 4 No, it was due to a spending decrease, not an increase. They focused on protecting to enable, not just locking down 4 Intel Reached Level 3: Developing programs and delivering services Contributing business value Transforming the firm Previously: categorized problems as “business” or “IT” Now: Integrated solutions are the only way © 2016 John Wiley & Sons, Inc. 5 IT Governance
  • 31. Governance (in business) is all about making decisions that Define expectations, Grant authority, or Ensure performance. Empowerment and monitoring will help align behavior with business goals. Empowerment: granting the right to make decisions. Monitoring: evaluating performance. © 2016 John Wiley & Sons, Inc. 6 A decision right is an important organizational design variable since it indicates who in the organization has the responsibility to initiate, supply information for, approve, implement, and control various types of decisions. 6 IT Governance IT governance focuses on how decision rights can be distributed differently to facilitate three possible modes of decision making: centralized, decentralized, or hybrid Organizational structure plays a major role. © 2016 John Wiley & Sons, Inc. 7
  • 32. Four Perspectives Traditional – Centralized vs decentralized Accountability and allocation of decision rights Ecosystem Control structures from legislation © 2016 John Wiley & Sons, Inc. 8 Centralized vs. Decentralized Organizational Structures Centralized – bring together all staff, hardware, software, data, and processing into a single location. Decentralized – the components in the centralized structure are scattered in different locations to address local business needs. Federalism – a hybrid of centralized and decentralized structures. © 2016 John Wiley & Sons, Inc. 9 9
  • 33. Organizational continuum 10 Federalism Most companies would like to achieve the advantages of both centralization and decentralization. Leads to federalism Distributes, power, hardware, software, data and personnel Between a central IS group and IS in business units A hybrid approach Some decisions centralized; some decentralized © 2016 John Wiley & Sons, Inc. 11 11 Federal IT © 2016 John Wiley & Sons, Inc. 12
  • 34. 12 Recent Global Survey Percent of firms reporting that they are: Centralized: 70.6% Decentralized: 13.5% Federated: 12.7% © 2016 John Wiley & Sons, Inc. 13 Figure 9.4 IT Accountability and Decision Rights MismatchesAccountabilityLowHighDecision RightsHighTechnocentric Gap Danger of overspending on IT creating an oversupply IT assets may not be utilized to meet business demand Business group frustration with IT group Strategic Norm (Level 3 balance) IT is viewed as competent IT is viewed as strategic to businessLowSupport Norm (Level 1 balance) Works for organizations where IT is viewed as a support function Focus is on business efficiencyBusiness Gap Cost considerations dominate IT decision IT assets may not utilize internal competencies to meet business demand IT group frustration with business group
  • 35. © 2016 John Wiley & Sons, Inc. 14 Figure 9.5 Five major categories of IT decisions.CategoryDescriptionExamples of Affected IS ActivitiesIT PrinciplesHow to determine IT assets that are neededParticipating in setting strategic directionIT ArchitectureHow to structure IT assetsEstablishing architecture and standardsIT Infrastructure StrategiesHow to build IT assetsManaging Internet and network services; data; human resources; mobile computingBusiness Application NeedsHow to acquire, implement and maintain IT (insource or outsource)Developing and maintaining information systemsIT Investment and PrioritizationHow much to invest and where to invest in IT assetsAnticipating new technologies © 2016 John Wiley & Sons, Inc. 15 Political Archetypes (Weill & Ross) Archetypes label the combinations of people who either provide information or have key IT decision rights Business monarchy, IT monarchy, feudal, federal, IT duopoly, and anarchy. Decisions can be made at several levels in the organization (Figure 9.6). Enterprise-wide, business unit, and region/group within a
  • 36. business unit. © 2016 John Wiley & Sons, Inc. 16 For each decision category, the organization adopts an archetype as the means to obtain inputs for decisions and to assign responsibility for them. 16 Political Archetypes Organizations vary widely in their archetypes selected The duopoly is used by the largest portion (36%) of organizations for IT principles decisions. IT monarchy is the most popular for IT architecture (73%) and infrastructure decisions (59%). © 2016 John Wiley & Sons, Inc. 17 Figure 9.6 IT governance archetypes © 2016 John Wiley & Sons, Inc. 18
  • 37. There is no best arrangement for the allocation of decision rights. The most appropriate arrangement depends on a number of factors, including the type of performance indicator. 18 Emergent Governance: Digital Ecosystems Challenge a “top down” approach Self-interested, self-organizing, autonomous sets of technologies from different sources Firms find opportunities to exploit new technologies that were not anticipated Good examples: Google Maps YouTube © 2016 John Wiley & Sons, Inc. 19 Another Interesting Example Electronic Health Record Can connect to perhaps planned sources: Pharmacy Lab Insurance Company
  • 38. And can connect to unplanned sources: Banks – for payment Tax authority – for matching deductions Smartphone apps – for many purposes © 2016 John Wiley & Sons, Inc. 20 How to Govern in this case? Might be difficult to impossible! The systems might simply emerge and evolve over time No one entity can plan these systems in their entirety © 2016 John Wiley & Sons, Inc. 21 Mechanisms for Making Decisions Policies and Standards (60% of firms) Review board or committee Steering committee (or governance council) Key stakeholders Can be at different levels: Higher level (focus on CIO effectiveness) Lower level (focus on details of various projects) © 2016 John Wiley & Sons, Inc. 22
  • 39. Summary of Three Governance FrameworksGovernance FrameworkMain ConceptPossible Best PracticeCentralization- DecentralizationDecisions can be made by a central authority or by autonomous individuals or groups in an organization.A hybrid, Federal approachDecision ArchetypesSpecifying patterns based upon allocating decision rights and accountability. Tailor the archetype to the situationDigital EcosystemsMembers of the ecosystem contribute their strengths, giving the whole ecosystem a complete set of capabilities.Build flexibility and adaptability into governance. © 2016 John Wiley & Sons, Inc. 23 A Fourth – Out of a Firm’s Control: Legislation 24 © 2016 John Wiley & Sons, Inc. Sarbanes-Oxley Act (SoX) (2002) To increase regulatory visibility and accountability of public companies and their financial health All companies subject to the SEC are subject to SoX.
  • 40. CEOs and CFOs must personally certify and be accountable for their firm’s financial records and accounting. Firms must provide real-time disclosures of any events that may affect a firm’s stock price or financial performance. 20 year jail term is the alternative. IT departments play a major role in ensuring the accuracy of financial data. © 2016 John Wiley & Sons, Inc. 25 25 IT Control and Sarbanes-Oxley In 2004 and 2005, IT departments began to Identify controls, Determine design effectiveness, and Test to validate operation of controls © 2016 John Wiley & Sons, Inc. 26 26 IT Control and Sarbanes-Oxley Five IT control weaknesses are repeatedly uncovered by
  • 41. auditors: Failure to segregate duties within applications, and failure to set up new accounts and terminate old ones in a timely manner Lack of proper oversight for making application changes, including appointing a person to make a change and another to perform quality assurance on it Inadequate review of audit logs to not only ensure that systems were running smoothly but that there also was an audit log of the audit log Failure to identify abnormal transactions in a timely manner Lack of understanding of key system configurations © 2016 John Wiley & Sons, Inc. 27 Frameworks for Implementing SoX COSO - Committee of Sponsoring Organzations of the Treadway Commission. Created three control objectives for management and auditors that focused on dealing with risks to internal control Operations –maintain and improve operating effectiveness; protect the firm’s assets Compliance –with relevant laws and regulations. Financial reporting –in accordance with GAAP © 2016 John Wiley & Sons, Inc. 28
  • 42. 28 Control Components Five essential control components were created to make sure a company is meeting its objectives: Control environment (culture of the firm) Assessment of most critical risks to internal controls Control processes that outline important processes and guidelines Communication of those procedures Monitoring of internal controls by management © 2016 John Wiley & Sons, Inc. 29 Frameworks (continued) COBIT (Control Objectives for Information and Related Technology) IT governance framework that is consistent with COSO controls. Issued in 1996 by Information Systems Audit & Control Association (ISACA) A company must Determine the processes/risks to be managed. Set up control objectives and KPIs (key performance indicators) Develop activities to reach the KPIs Advantages - well-suited to organizations focused on risk management and mitigation, and very detailed. Disadvantages – costly and time consuming © 2016 John Wiley & Sons, Inc.
  • 43. 30 30 IS and the Implementation of SoX Compliance The IS department and CIO are involved with the implementation of SoX. Section 404 deals with management’s assessment of internal controls. Six tactics that CIOs can use in working with auditors, CFOs, and CEOs (Fig. 9.9): Knowledge building (Build a knowledge base) Knowledge deployment (Disseminate knowledge to management.) Innovation directive (Organize for implementing SoX) Mobilization (Persuade players and subsidiaries to cooperate) Standardization (Negotiate agreements, build rules) Subsidy (Fund the costs) A CIO’s ability to employ these various tactics depends upon his/her power (relating to the SoX implementation). © 2016 John Wiley & Sons, Inc. 31 The CIO needs to acquire and manage the considerable IT
  • 44. resources to make SoX compliance a reality. 31 Managing and Using Information Systems: A Strategic Approach – Sixth Edition Keri Pearlson, Carol Saunders, and Dennis Galletta © Copyright 2016 John Wiley & Sons, Inc.