3. Risk Tiers Flashcards

1
Q

Tier 1

A

Organization

Where enterprise institutional risk polices are articulated by the risk executive

Fundamental contexts about governance structures, larger views of risk tolerance, etc.

Defining a risk strategy for the whole organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Tier 2

A

Mission and Business Process

Translates the organizational strategy defined in Tier 1 into processes the organization can use

For example, defining requirements or treating the R&D department as a separate division with its own requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Tier 3

A

Information Systems

Where controls are implemented using Tier 2 (mission / business process) requirements and categorizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

General Support System

Circular A-130 definition

A

Set of IT resources sharing the same management and common functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Major Application
(Circular A-130 definition)
A

Set of IT resources requiring special security attention due to the harm if their CIA were compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Can you create authorization boundaries from general support and major systems by considering commonality of purpose, security perimeter and ownership?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When are information system boundaries established?

A

in coordination with the security categorization process and before developing security plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What happens if IS boundaries are too expansive?

A

The risk management process becomes unwieldy and too complex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What happens if IS boundaries are too narrow?

A

The number of systems that must be separately managed becomes too high, and inflates the organizational costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s the goal of creating system inventories and boundaries?

A

Identify systems requiring protection, planning and management

Aspects are used in RMF Step 1, categorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What defines the boundaries of a system?

A

The set of information resources allocated to an information system

There is a lot of flexibility in determining what an information system is composed of, and its associated boundary

If a set of information resources is identified as an information system, the resources are generally under the same direct management control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What has made boundaries more complex?

A

modern computing changes such as:

service-oriented architecture (SOA), cloud computing, introduced “dynamic subsystems” and “external subsystems)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

3 types of authorization

A

single authorizing official

multiple (joint) authorizing officials

leveraging existing authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Single Authorizing Official

A

Traditional approach

A single official is both responsible and accountable for an information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Joint Authorizing Officials

A

multiple officials from the same or different organizations have a shared interest in authorizing an information system

They are collectively responsible and accountable and jointly accept the risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Leveraged Authorization

A

An agency chooses to accept some or all of the information in an existing authorization package generated by a different agency based on a need to use the same information resources.

Leveraging organization reviews owning organization’s authorization package as the basis for determining risk