28

Introduction to NIST’s Risk Management Framework (RMF)

Embed Size (px)

Citation preview

Page 1: Introduction to NIST’s Risk Management Framework (RMF)
Page 2: Introduction to NIST’s Risk Management Framework (RMF)
Page 3: Introduction to NIST’s Risk Management Framework (RMF)
Page 4: Introduction to NIST’s Risk Management Framework (RMF)
Page 5: Introduction to NIST’s Risk Management Framework (RMF)
Page 6: Introduction to NIST’s Risk Management Framework (RMF)
Page 7: Introduction to NIST’s Risk Management Framework (RMF)
Page 8: Introduction to NIST’s Risk Management Framework (RMF)
Page 9: Introduction to NIST’s Risk Management Framework (RMF)
Page 10: Introduction to NIST’s Risk Management Framework (RMF)
Page 11: Introduction to NIST’s Risk Management Framework (RMF)

Categorize

Select

Implement

Assess

Authorize

Monitor

Page 12: Introduction to NIST’s Risk Management Framework (RMF)

“Certification and accreditation is the methodology

used to ensure that security controls are established for

an information system, that these controls are

functioning appropriately, and that management has

authorized the operation of the system in is current

security posture.”

- Official (ISC)2 Guide to the CAP CBK (1st ed.)

Page 13: Introduction to NIST’s Risk Management Framework (RMF)

Measures that protect and defend information and

information systems by ensuring their availability,

integrity, authentication, confidentiality, and non

repudiation. These measures include providing for

restoration of information systems by incorporating

protection, detection, and reaction capabilities.

- CNSS Instruction No. 4009

Page 14: Introduction to NIST’s Risk Management Framework (RMF)
Page 15: Introduction to NIST’s Risk Management Framework (RMF)
Page 16: Introduction to NIST’s Risk Management Framework (RMF)
Page 17: Introduction to NIST’s Risk Management Framework (RMF)
Page 18: Introduction to NIST’s Risk Management Framework (RMF)

“The official management decision given by a senior

organizational official to authorize operation of an

information system and to explicitly accept the risk to

organizational operations (including mission, functions,

image, or reputation), organizational assets, individuals,

other organizations, and the Nation based on the

implementation of an agreed-upon set of security

controls.”- NIST SP 800-37 rev 1

Page 19: Introduction to NIST’s Risk Management Framework (RMF)
Page 20: Introduction to NIST’s Risk Management Framework (RMF)
Page 21: Introduction to NIST’s Risk Management Framework (RMF)
Page 22: Introduction to NIST’s Risk Management Framework (RMF)

Why are Agencies riddled with security holes?

Page 23: Introduction to NIST’s Risk Management Framework (RMF)
Page 24: Introduction to NIST’s Risk Management Framework (RMF)

http://gcn.com/articles/2011/07/06/cyber-attacks-take-2-energy-labs-offline.aspx

Page 25: Introduction to NIST’s Risk Management Framework (RMF)
Page 26: Introduction to NIST’s Risk Management Framework (RMF)
Page 27: Introduction to NIST’s Risk Management Framework (RMF)
Page 28: Introduction to NIST’s Risk Management Framework (RMF)

//// Trainers Underground ////

The session will begin shortly.

Open/close Chat

Mute / unmute

Share Video

See attendees

Share/view

presentation

You may need an microphone plugged in

to join the Lync call