SlideShare a Scribd company logo
1 of 1
FISMA Requirements
In preparing agencies for FISMA compliance, agency heads, in conjunction with CIOs and CISOs, must develop provisions according to
eight broad categories:

1. Risk Assessments- we can help with a risk assessment of common high risk areas with an ISO Information Risk Pre-
Assessment engagement.

2. Policies and Procedures
3. Security Plans
4. Security Awareness Training
5. Annual Security Testing
6. Remediation Procedures

7. SIEM Alerting: Incident Response Procedures
FISMA requires each agency to develop or acquire sufficient capability to detect and respond to information security incidents within
their agency. This includes the ability to mitigate the risks of attacks in progress. In an effort to foster collaboration and
communication in pursuit of the goal of responding pro-actively to threats, FISMA specifies that agencies report all information security
attacks to a central federal information security incident center, the US-CERT. This means that agencies must perform constant, vigilant
scanning of all systems.

8. SIEM backup and restore: Contingency Plans
FISMA requires every information system on the agency’s inventory to be subject to a documented plan containing procedures to
ensure continuity of system operations in the event of a failure or system corruption. As part of the operational security controls for
the system, such plans must also be tested annually.

Additional Information:
Risk Assessments Engagement
Performing risk assessments is vital (in addition to being required) simply because they allow evaluating parties to determine the
degree to which information security provisions are commensurate with the risk they are designed to mitigate. (FISMA requires that
assessments be performed at least annually; however, the optimal frequency for a positive overall FISMA evaluation will vary from
agency to agency.) Through the course of such assessments, agencies will be called upon to estimate the amount of harm that would
be caused by disruption of its services. These risks are the cornerstone for many of the other required activities.

Policies and Procedures
Agencies will be called upon to formulate information security policies and procedures to cost-effectively mitigate the risk uncovered
through the assessments described above. FISMA specifically calls for agencies to design policies and procedures that ensure that
information security is addressed throughout the lifecycle of an information-technology system, and not simply as a final, quality control
procedure performed prior to deployment.

Security Plans
FISMA requires agencies to draft plans which describe security measures that address specific system requirements and comply with
policies and procedures. Such plans must take into account the guidelines issued by the National Institute of Standards &
Technology (NIST). FISMA specifies that such plans must cover training (of both security professionals and intended users), incident
response capabilities, contingency plans, remediation, and system configuration standards.

Security Awareness Training
Under FISMA, all agencies are required to offer ongoing security awareness training to all personnel, including contractors and all other
users of the agency’s information technology systems. FISMA requires that such training acquaint participants with the
risks associated with handling critical data and the responsibilities involved in providing effective security.

Annual Security Testing
FISMA calls for the evaluation of policies, procedures, and practices through annual testing of every information system on the
agency’s inventory. FISMA requires that these tests be performed as often as necessary, based on the amount of risk such systems
are designed to protect, but at least once a year. FISMA further requires that such testing include not only the technical controls of the
system, but also management and operational controls.

Remediation Procedures
Agencies are required to track all security deficiencies identified through testing and monitoring and to measure remediation progress
and effectiveness for every system regardless of its level of importance.

More Related Content

What's hot

Understanding the Risk Management Framework & (ISC)2 CAP Module 3: Roles
Understanding the Risk Management Framework & (ISC)2 CAP Module 3: RolesUnderstanding the Risk Management Framework & (ISC)2 CAP Module 3: Roles
Understanding the Risk Management Framework & (ISC)2 CAP Module 3: RolesDonald E. Hester
 
Safety management system introduction
Safety management system  introductionSafety management system  introduction
Safety management system introductionS P Singh
 
Information Systems Security Review 2004
Information Systems Security Review 2004Information Systems Security Review 2004
Information Systems Security Review 2004Donald E. Hester
 
The Three Lines of Defense Model & Continuous Controls Monitoring
The Three Lines of Defense Model & Continuous Controls MonitoringThe Three Lines of Defense Model & Continuous Controls Monitoring
The Three Lines of Defense Model & Continuous Controls MonitoringCaseWare IDEA
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringTieu Luu
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: IntroductionUnderstanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: IntroductionDonald E. Hester
 
Sms ii implemention
Sms ii implementionSms ii implemention
Sms ii implementionS P Singh
 
RMF Roles and Responsibilities (Part 1)
RMF Roles and Responsibilities (Part 1) RMF Roles and Responsibilities (Part 1)
RMF Roles and Responsibilities (Part 1) Donald E. Hester
 
Safety Management Systems (SMS) Fundamentals: Safety Assurance
Safety Management Systems (SMS) Fundamentals: Safety AssuranceSafety Management Systems (SMS) Fundamentals: Safety Assurance
Safety Management Systems (SMS) Fundamentals: Safety AssuranceFAA Safety Team Central Florida
 
Continual Monitoring
Continual MonitoringContinual Monitoring
Continual MonitoringTripwire
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber securityWGroup
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Donald E. Hester
 
Symantec Managed AV Service - KAZ
Symantec Managed AV Service - KAZSymantec Managed AV Service - KAZ
Symantec Managed AV Service - KAZGrant Chapman
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...Donald E. Hester
 
Magic quadrant for operational risk management solutions
Magic quadrant for operational risk management solutions Magic quadrant for operational risk management solutions
Magic quadrant for operational risk management solutions Deepak Kamboj
 
Risk management ii
Risk management iiRisk management ii
Risk management iiDhani Ahmad
 
How Do You Define Continuous Monitoring?
How Do You Define Continuous Monitoring?How Do You Define Continuous Monitoring?
How Do You Define Continuous Monitoring?Tieu Luu
 

What's hot (20)

Understanding the Risk Management Framework & (ISC)2 CAP Module 3: Roles
Understanding the Risk Management Framework & (ISC)2 CAP Module 3: RolesUnderstanding the Risk Management Framework & (ISC)2 CAP Module 3: Roles
Understanding the Risk Management Framework & (ISC)2 CAP Module 3: Roles
 
Safety management system introduction
Safety management system  introductionSafety management system  introduction
Safety management system introduction
 
Information Systems Security Review 2004
Information Systems Security Review 2004Information Systems Security Review 2004
Information Systems Security Review 2004
 
The Three Lines of Defense Model & Continuous Controls Monitoring
The Three Lines of Defense Model & Continuous Controls MonitoringThe Three Lines of Defense Model & Continuous Controls Monitoring
The Three Lines of Defense Model & Continuous Controls Monitoring
 
Safety Management Systems (SMS) Fundamentals: Promotion
Safety Management Systems (SMS) Fundamentals: PromotionSafety Management Systems (SMS) Fundamentals: Promotion
Safety Management Systems (SMS) Fundamentals: Promotion
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous Monitoring
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: IntroductionUnderstanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
 
Sms ii implemention
Sms ii implementionSms ii implemention
Sms ii implemention
 
RMF Roles and Responsibilities (Part 1)
RMF Roles and Responsibilities (Part 1) RMF Roles and Responsibilities (Part 1)
RMF Roles and Responsibilities (Part 1)
 
Safety Management Systems (SMS) Fundamentals: Safety Assurance
Safety Management Systems (SMS) Fundamentals: Safety AssuranceSafety Management Systems (SMS) Fundamentals: Safety Assurance
Safety Management Systems (SMS) Fundamentals: Safety Assurance
 
Continual Monitoring
Continual MonitoringContinual Monitoring
Continual Monitoring
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber security
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
 
Symantec Managed AV Service - KAZ
Symantec Managed AV Service - KAZSymantec Managed AV Service - KAZ
Symantec Managed AV Service - KAZ
 
Security policy
Security policySecurity policy
Security policy
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
 
Magic quadrant for operational risk management solutions
Magic quadrant for operational risk management solutions Magic quadrant for operational risk management solutions
Magic quadrant for operational risk management solutions
 
Safety management systems
Safety management systemsSafety management systems
Safety management systems
 
Risk management ii
Risk management iiRisk management ii
Risk management ii
 
How Do You Define Continuous Monitoring?
How Do You Define Continuous Monitoring?How Do You Define Continuous Monitoring?
How Do You Define Continuous Monitoring?
 

Similar to Example of fisma compliance analysis.1

Information Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkInformation Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkWilliam McBorrough
 
E’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docxE’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docxmydrynan
 
DEPARTMENT CYBERSECURITY What’s Your IT Risk Approa
DEPARTMENT CYBERSECURITY What’s Your IT Risk ApproaDEPARTMENT CYBERSECURITY What’s Your IT Risk Approa
DEPARTMENT CYBERSECURITY What’s Your IT Risk ApproaLinaCovington707
 
Information Security Identity and Access Management Administration 07072016
Information Security   Identity and Access Management Administration 07072016Information Security   Identity and Access Management Administration 07072016
Information Security Identity and Access Management Administration 07072016Leon Blum
 
Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)MetroStar
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practicesphanleson
 
Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Fameworklneut03
 
Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.Ignyte Assurance Platform
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdfsdfghj21
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji JacobBeji Jacob
 
Physical security information management market
Physical security information management marketPhysical security information management market
Physical security information management marketRishabhJain1113
 
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...Editor IJCATR
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...abhichowdary16
 
SMS For Aviation Organizations
SMS For Aviation OrganizationsSMS For Aviation Organizations
SMS For Aviation OrganizationsCarlos Pera
 
10 steps to cyber security
10 steps to cyber security10 steps to cyber security
10 steps to cyber securityTevfik Üret
 

Similar to Example of fisma compliance analysis.1 (20)

Information Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkInformation Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management Framework
 
5757912.ppt
5757912.ppt5757912.ppt
5757912.ppt
 
E’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docxE’s Data Security Company Strategic Security Plan – 2015.docx
E’s Data Security Company Strategic Security Plan – 2015.docx
 
Chapter003
Chapter003Chapter003
Chapter003
 
DEPARTMENT CYBERSECURITY What’s Your IT Risk Approa
DEPARTMENT CYBERSECURITY What’s Your IT Risk ApproaDEPARTMENT CYBERSECURITY What’s Your IT Risk Approa
DEPARTMENT CYBERSECURITY What’s Your IT Risk Approa
 
Information Security Identity and Access Management Administration 07072016
Information Security   Identity and Access Management Administration 07072016Information Security   Identity and Access Management Administration 07072016
Information Security Identity and Access Management Administration 07072016
 
Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practices
 
Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Famework
 
Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.Ignyte assurance platform NIST RMF datasheet.
Ignyte assurance platform NIST RMF datasheet.
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
 
Physical security information management market
Physical security information management marketPhysical security information management market
Physical security information management market
 
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
SMS For Aviation Organizations
SMS For Aviation OrganizationsSMS For Aviation Organizations
SMS For Aviation Organizations
 
Ffiec cat may_2017
Ffiec cat may_2017Ffiec cat may_2017
Ffiec cat may_2017
 
SDET UNIT 5.pptx
SDET UNIT 5.pptxSDET UNIT 5.pptx
SDET UNIT 5.pptx
 
Cyber scuriry19
Cyber scuriry19Cyber scuriry19
Cyber scuriry19
 
10 steps to cyber security
10 steps to cyber security10 steps to cyber security
10 steps to cyber security
 

Example of fisma compliance analysis.1

  • 1. FISMA Requirements In preparing agencies for FISMA compliance, agency heads, in conjunction with CIOs and CISOs, must develop provisions according to eight broad categories: 1. Risk Assessments- we can help with a risk assessment of common high risk areas with an ISO Information Risk Pre- Assessment engagement. 2. Policies and Procedures 3. Security Plans 4. Security Awareness Training 5. Annual Security Testing 6. Remediation Procedures 7. SIEM Alerting: Incident Response Procedures FISMA requires each agency to develop or acquire sufficient capability to detect and respond to information security incidents within their agency. This includes the ability to mitigate the risks of attacks in progress. In an effort to foster collaboration and communication in pursuit of the goal of responding pro-actively to threats, FISMA specifies that agencies report all information security attacks to a central federal information security incident center, the US-CERT. This means that agencies must perform constant, vigilant scanning of all systems. 8. SIEM backup and restore: Contingency Plans FISMA requires every information system on the agency’s inventory to be subject to a documented plan containing procedures to ensure continuity of system operations in the event of a failure or system corruption. As part of the operational security controls for the system, such plans must also be tested annually. Additional Information: Risk Assessments Engagement Performing risk assessments is vital (in addition to being required) simply because they allow evaluating parties to determine the degree to which information security provisions are commensurate with the risk they are designed to mitigate. (FISMA requires that assessments be performed at least annually; however, the optimal frequency for a positive overall FISMA evaluation will vary from agency to agency.) Through the course of such assessments, agencies will be called upon to estimate the amount of harm that would be caused by disruption of its services. These risks are the cornerstone for many of the other required activities. Policies and Procedures Agencies will be called upon to formulate information security policies and procedures to cost-effectively mitigate the risk uncovered through the assessments described above. FISMA specifically calls for agencies to design policies and procedures that ensure that information security is addressed throughout the lifecycle of an information-technology system, and not simply as a final, quality control procedure performed prior to deployment. Security Plans FISMA requires agencies to draft plans which describe security measures that address specific system requirements and comply with policies and procedures. Such plans must take into account the guidelines issued by the National Institute of Standards & Technology (NIST). FISMA specifies that such plans must cover training (of both security professionals and intended users), incident response capabilities, contingency plans, remediation, and system configuration standards. Security Awareness Training Under FISMA, all agencies are required to offer ongoing security awareness training to all personnel, including contractors and all other users of the agency’s information technology systems. FISMA requires that such training acquaint participants with the risks associated with handling critical data and the responsibilities involved in providing effective security. Annual Security Testing FISMA calls for the evaluation of policies, procedures, and practices through annual testing of every information system on the agency’s inventory. FISMA requires that these tests be performed as often as necessary, based on the amount of risk such systems are designed to protect, but at least once a year. FISMA further requires that such testing include not only the technical controls of the system, but also management and operational controls. Remediation Procedures Agencies are required to track all security deficiencies identified through testing and monitoring and to measure remediation progress and effectiveness for every system regardless of its level of importance.