Continuous Monitoring Flashcards
National Industrial Security Program (NISP)
NISPOM is the manual that industry must follow
Industry: Implement security requirements
Government: establish requirements, advise and assist, provide oversight
Cleared industry safeguards all classified info
Apply to contractors with access to classified info
Security Policy Guidance
Industry: NISPOM detailed industrial security policy
Federal Government: NIST National Institute of Standards and technology
Military: DoD Policy & Guidance:
RMF
Risk Management Framework
Which of the following are important roles of the NISP in continuous monitoring?
To ensure that cleared industry safeguards classified information and information systems
To protect critical infrastructure
To thwart foreign adversaries and insider threats to information systems
Match
NISPOM: guidance requires that all individuals’ actions on a classified contractor info system be auditable
NIST SP: publications provide detailed guidance on the development and implementation of an ISCM program and security-focused configuration management
DoD Policy and Guidance: policies and guidance establishes the requirement for an integrated continuous capability to monitor and audit for threats and vulnerabilities from internal and external sources.
Risk
possibility that a threat will adversely impact an information system by exploiting a vulnerability
Threat vs. vulnerability
V: weakness or lack of controls that could facilitate, or allow, a compromise
T: a potential for the accidental or deliberate compromise of security
RMF process (Cybersecurity requirements for DoD)
Informs the acquisition process
Implements cybersecurity through use of security controls
Emphasizes continuous monitoring and timely correction of deficiencies
Adopts reciprocity and codifies reciprocity tenets
RMF ensures:
Traceability and transparency of risk-based decisions, organization-wide risk awareness, operational resilience, operation integration, interoperability
3-tiered approach to risk management:
Tier 1 Organization:(Chief Information Officer, Senior Information Security Officer, Risk Executive Function). org as a whole, core missions, business functions. Info necessary to make risk management decisions at this level. Aggregated data to enable organization-wide decision-making.
Tier 2 Mission/Business/Process (Principal Authorizing Officials, DoD Component CIO, DoD Component SISO). Ex: Controls in the PM family
Tier 3 Information Systems (Authorizing Official, Information System Owner, User Rep, Information System Security Officer, Authorizing Official Designated Representative, Program Manager/System Manager, Information System Security Officer). Technical details to support system-level actions
RMF Steps
- Categorize system
- select security controls
- security controls implemented
- Security controls assessed
- authorize the information system
- monitor security controls
Which of the following identify how the RMF supports risk management
RMF process ensures traceability and transparency across all levels of the organization
RMF process emphasizes continuous monitoring and timely correction of deficiencies
Information System Continuous Monitoring
ISCM
ISCM strategy 3 major tasks
Configuration management and security controls monitoring and assessment tasks
security status monitoring tasks
Security Status reporting tasks
ISCM processes
schedule, performance, cost
industrial, information, personnel, physical