81
Gap Analysis FITSP-A Module 4

Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Embed Size (px)

Citation preview

Page 1: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Gap Analysis

FITSP-AModule 4

Page 2: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Leadership

“…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated in order to identify important trends and decide where effort should be applied to eliminate or reduce threat capabilities; eliminate or reduce vulnerabilities; and assess, coordinate, and deconflict all cyberspace operations…”

The National Strategy for Cyberspace OperationsOffice of the Chairman, Joint Chiefs Of Staff, U.S. Department Of Defense

Page 3: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

FITSP-A Exam Objectives

Data Security– Review controls that facilitate the necessary levels of confidentiality of

information found within the organization’s information system– Evaluate safeguards in the system that facilitate the necessary levels of

integrity of information found within information systems– Audit controls that facilitate the necessary levels of availability of

information and information systems

[Security Control] Planning– Audit security plans for organizational information systems that describe

the security controls in place or planned for the information systems and the rules of behavior for individuals accessing the information systems

– Assess processes to handle the implementation of security plans for organizational information systems that describe the security controls in place or planned for the information systems and the rules of behavior for individuals accessing the information systems

Page 4: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Gap Analysis Module Overview

Section A: Security Categorization – FIPS 199: Security Categorization Standards– SP 800-60: Mapping Types to Categories– Subsection A.1: Special Types of Information

• SP 800-59 National Security• SP 800-66 Health Information• SP 800-122 Personally Identifiable Information

Section B: Documentation – System Security Plan Section C: Security Control Baseline

– Subsection C1 – FIPS 200: Minimum Security Requirements– Subsection C2 – SP 800-53: The Fundamentals– Subsection C3 – Selecting Controls from 800-53– Subsection C4 – Implementing Controls

Page 5: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

SECURITY CATEGORIZATIONSection A

Page 6: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

RMF Step 1Categorize Information System

Security Categorization Information System Description Information System Registration

Page 7: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

FIPS 199 – Feb. 2004

First step in Security Authorization Process Security Standards for Categorization of Federal

Information & Systems Requires Solid Inventory of All Systems on Your

Networks Mandated by FISMA Security Categories Based on Potential Impact

Federal Information Processing Standards

Page 8: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Security Objectives under FISMA

Page 9: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Loss of life, mission capability

Levels of Potential Impact

Low - Limited adverse effect

Moderate - Serious adverse effect

High - Severe or catastrophic adverse effect

Impact on organizations, operations, assets, or individualsImpact on organizations, operations, assets, or individuals

Financial lossHarm to individuals

Effectiveness reducedMinor damage/loss/harm

Page 10: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Assignment of Impact Levels and Security Categorization

Page 11: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Knowledge Check

Name the 3 tasks of the RMF Categorization step. Security categories are to be used in conjunction with

what other information in assessing the risk to an organization?

What is the first step to assigning impact levels for security categorization?

What are the key words associated with the following impact levels:

Impact Key Word(s)

Low

Moderate

High

Page 12: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

1 - Identifying Information Types

OMB’s Business Reference Model– Basis for Identifying Information types– Four Business Areas/ 39 Lines of Business

Mission Based Information Types– Service for Citizens (Purpose of Gov’t)– Mode of Delivery (to Achieve Purpose)

Management & Support Information Types– Support Delivery of Services (Necessary Operational Support)– Management of Government Resources (Resource

Management Functions)

Page 13: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated
Page 14: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated
Page 15: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

day-to-day activities necessary to provide the critical policy, programmatic, and managerial foundation that support Federal government operations

Page 16: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

back office support activities enabling the Federal government to operate effectively

Page 17: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

2 - Select Provisional Impact Level

Page 18: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Information Types & ImpactManagement & Support

Page 19: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Information Types & ImpactMission Specific

Page 20: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

3 - Review Provisional Impact, Adjust/Finalize Impact Levels

Review Adjust

(based on special guidance from 800-60)

Page 21: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Guidelines for Adjusting System Categorization

Aggregation Critical System Functionality Extenuating Circumstances Public Information Integrity Catastrophic Loss of System Availability Large Supporting and Interconnecting Systems Critical Infrastructures and Key Resources Trade Secrets Overall Information System Impact Privacy Information

Page 22: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

4 - Assign System Security Category

Review for Aggregate Information Types Identifying High Water Mark Based on Aggregate Adjust High Water, as Necessary Assign Overall Information System Impact Level

Document All Security Categorization Determinations and Decisions

Page 23: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

SPECIAL TYPES OF INFORMATION

Subsection A.1

Page 24: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Special Types of information

National Security (NS) Health Information (e-PHI)

(Electronic Protected Health Information) Personally Identifiable Information (PII)

Page 25: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

National Security Systems

SP 800-59 Guideline for Identifying an Information System as a National Security System– Involves Intelligence Activities– Involves Cryptologic Activities Related to National Security– Involves Command and Control of Military Forces– Involves Equipment That is Part of a Weapon System– Is Critical to Military or Intelligence Missions

CNSS1253 Security Categorization and Control Selection for National Security Systems– Derives Authority from National Security Directive 42 , and– CNSS Policy No. 22 (IARMP)– Companion Document to NIST SP 800-53

Page 26: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Distinctions of CNSS 1253

High Water Mark Not Used Categorizations Tailored Through Risk-based Adjustment Supplements Use of Impact-level Determinations with

Control Profiles Member Organizations Practice Reciprocity with Respect

to System Certification

Page 27: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Retention of CIA Impact

Page 28: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

NSS Organization-defined Parameters Supporting Reciprocity

Page 29: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

SP 800-66r1 Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule

Applicable to Covered Entities– Covered Healthcare Providers– Health Plans– Healthcare Clearinghouses– Medicare Prescription Drug Card Sponsors

Six Sections of the HIPAA Security Rule– Security standards– Administrative Safeguards – Physical Safeguards– Technical Safeguards– Organizational Requirements – Policies and Procedures and Documentation Requirements

Page 30: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Security Rule Standards and Implementation Specifications

HIPAA Security Rule

HIPAA Security Rule Standard Implementation Specification 800-53r3 Control

Publication Crosswalk

164.310(d)(2)(iii)   Accountability (A): Maintain a record of the movements of hardware and electronic media and any person responsible therefore

CM-8, MP-5, PS-6

 

164.310(d)(2)(iv)   Data Backup and Storage (A): Create a retrievable exact copy of electronic protected health information, when needed, before movement of equipment.

CP-9, MP-4  

164.312(a)(1) Access Control: Implement technical policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to those persons or software programs that have been granted access rights as specified in § 164.308(a)(4).

  AC-1, AC-3, AC-5, AC-6

NIST SP 800-12 NIST SP 800-14 NIST SP 800-21 NIST SP 800-34 NIST SP 800-53 NIST SP 800-63 FIPS 140-2 

164.312(a)(2)(i)   Unique User Identification (R): Assign a unique name and/or number for identifying and tracking user identity.

AC-2, AC-3, IA-2, IA-3,  IA-4

164.312(a)(2)(ii)   Emergency Access Procedure (R): Establish (and implement as needed) procedures for obtaining necessary electronic protected health information during an emergency.

AC-2, AC-3, CP-2

Required

Addressable

Page 31: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Security Rules that Do Not Map to NIST Security Controls

HIPAA Security Rule

HIPAA Security Rule Standard Implementation Specification 800-53r3 Control

Publication Crosswalk

164.314(b)(1) Requirements for Group Health Plans: Except when the only electronic protected health information disclosed to a plan sponsor is disclosed pursuant to § 164.504(f)(1)(ii) or (iii), or as authorized under § 164.508.

  Does not map

 

164.314(b)(2)(i)   Group Heath Plan Implementation Specification (R): The plan documents of the group health plan must be amended to incorporate provisions to require the plan sponsor to-- (i) Implement safeguards that reasonably protect the electronic protected health information that it creates, receives, maintains, or transmits on behalf of the group health plan.

Does not map

NIST SP 800-35 NIST SP 800-39 NIST SP 800-47 NIST SP 800-61 NIST SP 800-64 NIST SP 800-100

164.314(b)(2)(ii)   Group Heath Plan Implementation Specification (R): The plan documents of the group health plan must be amended to incorporate provisions to require the plan sponsor to-- (ii) Ensure that the adequate separation required by § 164.504(f)(2)(iii) is supported by reasonable and appropriate security measures

Does not map

Page 32: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Categorizing Privacy Information

New Guidance – SP800-122– Organizations should identify all PII residing in their environment– Organizations should minimize the use, collection, and retention

of PII to what is strictly necessary to accomplish their business purpose and mission

– Organizations should categorize their PII by the PII confidentiality impact level

Each organization should decide which factors it will use for determining impact levels and then create and implement the appropriate policy, procedures, and controls.

Page 33: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Factors for Categorizing PII

Ability to Identify Quantity of PII Data Field Sensitivity Context of Use Obligations to Protect Confidentiality Access to and Location of PII

Page 34: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Security Controls for PII

Creating Policies and Procedures Conducting Training De-Identifying PII Using Access Enforcement Implementing Access Control for Mobile Devices Providing Transmission Confidentiality Auditing Events

Page 35: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated
Page 36: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Windows Server 2008 R2

Page 37: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Knowledge Check

What is the basis for defining information types? The BRM describes [how many] business areas

containing [how many] FEA lines of business. Which NIST document lists information types, and their

associated provisional impact level? List reasons for adjusting a system’s provisional impact

level. Which NIST Special Publication provides guidance for

protecting PII?

Page 38: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Lab Activity 2 – Categorizing Information Systems

Step 1 – Categorize

Information System

Step 6 – Monitor Controls

Step 5 - Authorize

Information System

Step 4 – Assess Controls

Step 3 – Implement

Controls

Step 2 – Select Controls

Page 39: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

HGA’s Local Area Network – Washington, DC

Terremark Data Center – Culpeper, VA

Fraud, Waste & Abuse Reporting

DatabaseEmployee

Payroll Database

Financial Distribution Service Provider –

Kansas City

Financial Distribution Application

Logical ConnectionExternal Network

Externally Owned System BoundariesHGA System Boundaries

IRS Tax Payments

Various Banking Institutions for Employee Direct Deposits

Time & Attendance Input Workstation

FW&A Web PortalPayroll Application

Page 40: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

DOCUMENTATIONSection B

Page 41: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Documenting the Security Categorization Process

Categorization Determination Research Key Decisions Approvals Supporting Rationale

Page 42: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated
Page 43: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

System Security Plan

System Name and Identifier System Categorization Rules of Behavior System Boundary Security Control Selection

Page 44: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

SSP Reference Enhancements

Business Area Legislative Mandates Time-critical Information Provisional Impact Review Information Type Aggregate Special Factors & Circumstances Justification for Elevated Impact

Page 45: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Reuse of Categorization Information

Business Impact Analysis Capital Planning and Investment Control

& Enterprise Architecture System Design Contingency and Disaster Recovery Planning Information Sharing and System Interconnection

Agreements

Page 46: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

SECURITY CONTROL BASELINE

Section C

Page 47: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Role in the RMF Process

Page 48: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

RMF STEP 2 & 3: Select & Implement Security Controls

RMF Step 2 – Select Controls– Common Control Identification– Security Control Selection– Monitoring Strategy– Security Plan Approval

RMF Step 3 – Implement Controls– Security Control Implementation– Security Control Documentation

Page 49: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated
Page 50: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated
Page 51: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Security Controls Standards and Guidelines

FIPS 200– Purpose– Information System Impact Levels– Minimum Security Requirements– Security Control Selection

SP 800-53r3– Security Control Organization and Structure– Security Control Baselines– Common Controls– Security Controls In External Environments– Security Control Assurance– Revisions And Extensions– Selecting Security Controls

Page 52: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

FIPS 200Subsection C.1

Page 53: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

FIPS 200 – Minimum Security Requirements

Purpose Information System Impact Levels Minimum Security Requirements Security Control Selection

Page 54: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Specifications for Minimum Security Requirements

Page 55: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

FIPS 200: Selecting Security Controls

Using SP 800-53 Achieve Adequate Security Control Selection Based on FIP 199 Impact Level

– For low-impact information systems, organizations must employ appropriate controls from the low baseline of controls defined in NIST Special Publication 800-53.

– For moderate-impact information systems, …moderate baseline– For high-impact information systems,

…high baseline

Page 56: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Knowledge Check

What is the most significant change, regarding security control selection, in the revision of the SP 800-37?

What are the factors that drive the level of effort for the selection and implementation of security controls?

Security controls are organized by _________ and ___________.

Identify the class for the following security controls:

Control Class

Access Control

Personnel Security

Planning

Page 57: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

SP 800-53 FUNDAMENTALSSubsection C.2

Page 58: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

SP 800-53r3 Control Catalog

The Fundamentals– Security Control Organization and Structure– Security Control Baselines– Common Controls– Security Controls In External Environments– Security Control Assurance– Revisions And Extensions

Selecting Security Controls– Selecting– Tailoring– Supplementing

Page 59: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Security Control Organization and Structure

Page 60: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated
Page 61: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Security Control Baselines

Starting Point for the Security Control Selection Process Three Sets of Baseline Controls Based on Information

Impact– Low– Moderate– High

Supplements to the Tailored Baseline will Likely be Necessary

Page 62: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Common Controls

Inheritable Organization-wide Exercise Common Control Candidates

– Contingency Planning – Incident Response – Security Training And Awareness – Personnel Security – Physical And Environmental Protection – Intrusion Detection

System-specific Controls Hybrid Controls

Page 63: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Security Controls In External Environments

Used by, but Not Part of, Organizational Information Systems

May Completely Replace Functionality of Internal Information Systems

Information System Security Challenges– Defining Services– Securing Services– Obtaining Assurances of Acceptable Risk

Trust Relationships & Chain of Trust Applying Gap Analyses to External

Service Providers

Page 64: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Security Control Assurance

Page 65: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated
Page 66: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Revisions And Extensions of the Control Catalog

Experience Gained from Using Controls Changing Security Requirements Emerging Threats, Vulnerabilities, and Attack Methods Availability of New Technologies

Page 67: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

SP 800-53 SELECTING SECURITY CONTROLS

Subsection C.3

Page 68: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Selecting Security Controls

Selecting the Initial Set Of Baseline Security Controls Tailoring the Baseline Security Controls Supplementing the Tailored Baseline

Page 69: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated
Page 70: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated
Page 71: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Tailoring Security Controls

Scoping Guidance Compensating Security Controls Organization-defined Parameters

Page 72: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Scoping Guidance Considerations

Common Control-related Security Objective-related Technology-related Physical Infrastructure-related Policy/Regulatory-related Operational/Environmental-related Scalability-related Public Access-related

Implementing only those controls that are essential to providing the appropriate level of protection.

Page 73: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Compensating Security Controls

Used in Lieu of Recommended Control Control Not Available Provides Supporting Rationale Risk Accepted with Compensating Control

Page 74: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated
Page 75: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Supplementing Security Controls

Advanced Persistent Threat Cross-domain Services Mobility Highly Sensitive Information and Information Sharing Application-layer Security

Page 76: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Knowledge Check

There are three levels of baseline controls that are defined by the _____________ of the information system.

What are security controls that are inheritable by one or more organizational information systems?

What are the Two key components of information security affecting the trustworthiness of information systems ?

What kind of security control is a management, operational, or technical control is employed by an organization in lieu of a recommended security control.?

Page 77: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

IMPLEMENTING CONTROLSSubsection C.4

Page 78: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Implementing ControlsNO

CNTL NAME

CC Provider CNTL_Implementation Platforms Monitoring Strategy

SI-3 Malicious Code Protection

Systems Integrity Division

Symnantec Endpoint Protection v.11 - The  AntiVirus Program provides anti-virus software support to Domestic Bureaus, Consular and Executive Offices, IRM Systems Managers, Overseas Posts and Tenant Organizations Department-wide.

The contract with the Symantec Corporation for Symantec Endpoint Protection (SEP) supports the following operating system platforms: Windows File and Exchange Servers, and client workstations, Current Operating Systems (Windows NT, 2000, XP, 2003, Vista)

Anti-Virus signature file age detection is provided by SMS.The date on the signature file is compared to the current date.

 There is no score until a grace period of 6 days has elapsed. 

Beginning on day 7, a score of 6.0 is assigned for each day since the last update of the signature file. In particular, on day 7 the score is 42.0.  

 

SI-3 Malicious Code Protection

Systems Integrity Division

Fortinet FortiMail, FortiGate, Micro ScanMail.  To protect the network backbone infrastructure, i.e., e-mail gateways and Windows Exchange Servers from penetration by hostile hacker software tools, the Department implemented network "on the fly" anti-virus software support.

Implemented network anti-virus software support using: Fortinet FortiMail - SMTP, Spam, Phishing,Fortinet FortiGate - SMTP, FTP and HTTP Scanning, Trend Micro ScanMail for Microsoft Exchange Servers - SMTP, Spam, Content Filtering.

Page 79: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Gap AnalysisKey Concepts & Vocabulary

Security Categorization – FIPS 199: Security Categorization Standards– SP 800-60: Mapping Types to Categories– Categorizing Privacy Information– SP 800-122 Protecting PII

Documentation – System Security Plan Security Control Baseline

– FIPS 200: Minimum Security Requirements– SP 800-53: The Fundamentals– Selecting Controls from 800-53– Implementing Controls

Page 80: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Lab Activity 3 – Selecting and Implementing Baseline Controls

Step 1 – Categorize

Information System

Step 6 – Monitor Controls

Step 5 - Authorize

Information System

Step 4 – Assess Controls

Step 3 – Implement

Controls

Step 2 – Select Controls

Page 81: Gap Analysis FITSP-A Module 4. Leadership “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated

Questions?

Next Module: Control Assessment