ais finals lesson 2 Flashcards
responsible for ensuring that the IAP is developed and
implemented in accordance with regulatory and business requirements
Chief executive officer(CEO)
plays a crucial role in allocating resources and fostering commitment
to the IAP
Chief executive officer(CEO)
what does IAP stands for?
information assurance program
AO stands for?
authorizing official
ISO stands for?
Information system owner
is responsible for the execution of overall IT program and
delegate authority to the CISO for the management of the IAP.
Chief information officer (CIO)
is the
focal point for IT management and governance of IT portfolios
CIO
carries out the CIO’s security and privacy responsibilities
under FISMA and is responsible for managing the IAP
Chief information security officer
FISMA stands for?
Federal Information Security Management Act
responsible for:
* Ensuring information security management processes are integrated with
strategic and operational planning processes.
* Ensuring trained personnel sufficient to assist in complying with the
information assurance requirements in related legislation, policies, directives,
instructions, standards, and guidelines.
* Coordinating with senior management to report annually to the head of the
federal agency on the overall effectiveness of IAP, including progress of
remedial actions
CIO
is responsible for:
* Developing an organization-wide IAP that provides adequate security for
all information and information systems.
* Centralized reporting of information security-related activities.
* Developing and maintaining information security and privacy policies.
* Defining specific security requirements, tools, templates, and checklists to
support the IAP.
* Ensuring that personnel with significant system security responsibilities
are adequately trained.
CISO
s appointed by the CEO and is granted the authority to formally
assume responsibility for operating an information system at an acceptable level
of risk.
Authorizing official
has budgetary oversight for an information system and is
responsible for the mission/business operations supported by the system.
Authorizing official
approve systems security plans (SSPs), memorandums of agreement or
understanding (MOA/MOU), and plans of action and milestones (POA&Ms
Authorizing official
approve systems security plans (SSPs), memorandums of agreement or
understanding (MOA/MOU), and plans of action and milestones (POA&Ms
Authorizing official
is responsible for:
* Ensuring the security posture of the Agency’s information systems is
maintained.
* Reviewing security status reports and security documents and determining if
the risk to the Agency of operating the system remains acceptable.
* Reauthorizing information systems when required.
* Assisting in response to security incidents and privacy breaches.
* Appointing, when required, a designated representative to coordinate and
carry out system security responsibilities
Authorizing official
is appointed by the CEO and serves as the focal point for the information
system and is the central point of contact during the security authorization process.
Information system owner (ISO)
is responsible for:
* Coordinating data protection requirements with Information Owners (IOs) that have
information stored and processed in the system.
* Deciding, in coordination with the IO and Information System Security Officer
(ISSO), who has access to the system. Determining access privileges and rights to
the system.
* Ensuring that system users and support personnel receive the required security
training
(e.g., instruction in the Rules of Behavior).
* Ensuring that the system is compliant with the required security controls.
* Appointing an ISSO for the information system to carry out the day-to-day
security responsibilities.
* Reviewing system security documents (e.g., SSP, POA&M, etc.).
* Ensuring that system-specific security training is provided to the users and
administrators of the systems.
* Ensuring that remediation activities for the system are performed as
needed to maintain the authorization status.
* Appointing an Information System Security Manager (ISSM) to coordinate
system security task and provide oversight responsibilities to ensure security
activities are performed.
ISO
is an official with regulatory, management, or operational authority
for specified information and is responsible for establishing the policies and
procedures governing its generation, collection, processing, dissemination,
and disposal.
Information owner (IO)
responsible for:
* Providing input to ISOs regarding the security requirements and controls for
the systems where the information is processed, stored, or transmitted.
* Retaining information in accordance with the National Archives and
Records Administration (NARA) record schedule.
* Categorizing the sensitivity level5 of the information stored and
processed in the system.
* Establishing rules for appropriate use and protection of the information.
* Coordinating with the ISO when security requirements change.
* Assisting in the response to security incidents.
* Ensuring that the PII inventory is updated
IO
is appointed by the ISO and works closely with the ISO or ISSM to
ensure that the appropriate security posture is maintained for the information
system.
information system security officer(ISSO)
serves as a principal advisor on all the security related issues
of an information system.
ISSO
must have the detailed knowledge and
expertise required to manage the security aspects of an information system and
is responsible for the day-to-day security operations of a system
ISSO
responsible for:
* Ensuring system compliance with security policies and procedures.
* Managing and controlling changes to the system.
* Assessing the security impact of any changes.
* Monitoring the system and its environment.
* Developing and updating the SSP.
* Coordinating with and supporting the ISO with security responsibilities.
* Preparing or overseeing the preparation of system security documents7 and
security activities.
* Developing security policies and procedures that are consistent with IA policies.
* Performing or overseeing remediation activities to maintain the authorization status.
* Assisting the ISO assemble the security authorization package for submission to
the AO.
* Assisting in the investigation of security incidents.
ISSO
responsible for:
* Monitoring compliance with Federal requirement and IA policies.
* Providing guidance on the implementation of IA policies.
* Providing security and privacy training.
* Investigating system security and privacy incidents.
* Providing support for audits and reviews.
* Managing the vulnerability management program.
IAM
serves as the primary liaison for the CISO to individuals with
security and privacy responsibilities and supports activities at the IAP level.
Information assurance manager(IAM)
coordinates system security task and provide
oversight responsibilities to ensure security activities are performed and serves
as the liaison between the Information System Security Officer (ISSO) and the
Information System Owner (ISO)
information system security manager (ISSM)
responsible for:
* Providing oversight of system security activities performed by the ISSO.
* Acting as the liaison between the IAM and the ISSO.
* Monitoring system compliance with Information Assurance policies and federal
guidance
ISSM