- Standards used by ALL federal agencies to categorize all information and information systems based on risk levels.
- Guidelines recommending the types of information and information systems to be included in each category.
- Minimum information security requirements (management, operational, and technical controls).
- Defines three objectives: Confidentiality, Integrity, Availability.
NIST Publications:
-
- FISMA made FIPS mandatory for federal organizations
-
FIPS 199: Standards for Security Categorization. Defines three levels of impact if there should be a breach.
- Potential impact is LOW if - The loss of CIA could be expected to have a LIMITED adverse effect on operations, assets, or individuals.
- A system is LOW IMPACT if all three legs of the CIA triad are low.
- Potential impact is MODERATE if - the loss of CIA could be expected to have a SERIOUS adverse effect on operations, assets, or individuals.
- A system is MODERATE IMPACT if at least one leg of the CIA triad is moderate, and no leg is greater than moderate.
- Potential impact is HIGH if - The loss of CIA could be expected to have a SEVERE OR CATASTROPHIC adverse effect on operations, assets, or individuals.
- A system is HIGH IMPACT if at least one of the legs of the CIA triad are high.
-
- High Watermark: The highest degree of impact is the degree of which that system is categorized. - Defines 17 security-related areas (families) that: Represent a broad-based, balanced security program. These map to the areas that the RMF lists.
- Includes Management, Operational, and Technical controls.
-
Special Publications: Provides guidance to federal organizations, and are not mandatory but may be mandated
-
SP 800-30 Rev 1: Guide for conducting risk assessments
- Three Step Process for Risk Assessment:
- Step 1: Prepare for the assessment
- Step 2: Conduct the assessment
- Step 3: Maintain the assessment
- In the context of four risk factors:
- Threats
- Vulnerabilities
- Likelihoods
- Impacts
- Threats X Vulnerabilities = Risk
- Types of Assessments:
- Qualitative Assessments:
- Set of methods, principles, or rules for assessing risk based on non-numerical categories or levels.
- Low, Moderate, High, Very High
- Quantitative Assessments:
- Assessing risk based on numbers. Where the meanings and proportionality of values are maintained inside and outside the context of the assessment.
- Semi-Quantitative Assessments:
- Set of methods, principles, or rules for assessing risk using bins (i.e. 0-15, 16-35, 35-70), using scales (i.e. 1-10) or representative numbers whose values and meanings are not maintained in other contexts.
-
- Specifies a three-tiered approach of security risk:
- Organization
- Mission
- Information System
- Establish a relationship between aggregated risk from information systems and mission/business success.
- Encourage senior leaders to recognize the importance of managing information security risk within the organization.
- Help those with system level security responsibilities understand how system-level issues affect the organization/mission as a whole.
-
SP 800-53 Rev 4: Security controls catalog/assessment procedures
- Multitiered Risk Management
- Tier 1: Defining the mission/business processes needed to support the organizational missions/business functions. (Org as a whole).
- Tier 2: Determining the security categories of the information systems needed to execute the mission/business processes. (Individual processes).
- Tier 3: Incorporating information security requirements into the mission/business processes. (Systems).
- Security Controls Structure
- Controls are organized into 18 families (including the 17 families from FIPS 200), adding PM-Program Management.
- Security Control Baselines
- Minimum accepted security configuration based upon the security category and associated with the impact level of information systems determined in accordance with FIPS 199 and FIPS 200.
- Security Control Designations
- Three types of controls:
- Common Controls:
- Controls that may be inherited by one or more information systems. i.e an environmental control in a data center. The control isn’t implemented explicitly on the system, but applies to the system.
- System-Specific Controls:
- Applied to a system.
- Hybrid Controls:
- When one part is common and another part is system-specific.
- External Service Providers
- External service providers that have any interaction with federal systems must meet the same standards as the agencies.
-
- Describe how to establish a system security categorization based on the system’s use, connectivity, and aggregate information content.
- Suggest provisional security impact levels for common information types.
- Discuss information attributes that may result in variances from the provisional impact level assignment.
Tags:
Blue Team, Compliance