Continuous Monitoring Flashcards

1
Q

National Industrial Security Program (NISP)

A

NISPOM is the manual that industry must follow

Industry: Implement security requirements

Government: establish requirements, advise and assist, provide oversight

Cleared industry safeguards all classified info
Apply to contractors with access to classified info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Policy Guidance

A

Industry: NISPOM detailed industrial security policy

Federal Government: NIST National Institute of Standards and technology

Military: DoD Policy & Guidance:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RMF

A

Risk Management Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following are important roles of the NISP in continuous monitoring?

A

To ensure that cleared industry safeguards classified information and information systems

To protect critical infrastructure

To thwart foreign adversaries and insider threats to information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Match

A

NISPOM: guidance requires that all individuals’ actions on a classified contractor info system be auditable

NIST SP: publications provide detailed guidance on the development and implementation of an ISCM program and security-focused configuration management

DoD Policy and Guidance: policies and guidance establishes the requirement for an integrated continuous capability to monitor and audit for threats and vulnerabilities from internal and external sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risk

A

possibility that a threat will adversely impact an information system by exploiting a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Threat vs. vulnerability

A

V: weakness or lack of controls that could facilitate, or allow, a compromise

T: a potential for the accidental or deliberate compromise of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RMF process (Cybersecurity requirements for DoD)

A

Informs the acquisition process

Implements cybersecurity through use of security controls

Emphasizes continuous monitoring and timely correction of deficiencies

Adopts reciprocity and codifies reciprocity tenets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RMF ensures:

A

Traceability and transparency of risk-based decisions, organization-wide risk awareness, operational resilience, operation integration, interoperability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3-tiered approach to risk management:

A

Tier 1 Organization:(Chief Information Officer, Senior Information Security Officer, Risk Executive Function). org as a whole, core missions, business functions. Info necessary to make risk management decisions at this level. Aggregated data to enable organization-wide decision-making.

Tier 2 Mission/Business/Process (Principal Authorizing Officials, DoD Component CIO, DoD Component SISO). Ex: Controls in the PM family

Tier 3 Information Systems (Authorizing Official, Information System Owner, User Rep, Information System Security Officer, Authorizing Official Designated Representative, Program Manager/System Manager, Information System Security Officer). Technical details to support system-level actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RMF Steps

A
  1. Categorize system
  2. select security controls
  3. security controls implemented
  4. Security controls assessed
  5. authorize the information system
  6. monitor security controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following identify how the RMF supports risk management

A

RMF process ensures traceability and transparency across all levels of the organization

RMF process emphasizes continuous monitoring and timely correction of deficiencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Information System Continuous Monitoring

A

ISCM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ISCM strategy 3 major tasks

A

Configuration management and security controls monitoring and assessment tasks

security status monitoring tasks

Security Status reporting tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ISCM processes

A

schedule, performance, cost

industrial, information, personnel, physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ISCM data fundamental to execution management

A
Risk tolerance
enterprise architecture
security architecture
configuration configurations
configuration changes
threat information
17
Q

Six steps to establish ISCM

A
Define
establish
implement
analyze/report
respond
review/update
18
Q

Which of the following are security-focused configuration management (SecCM) roles in risk management?

A

Ensuring that adjustments to the system configuration do not adversely affect the security of the information system

Establishing configuration baseline and tracking, controlling and managing aspects of business development

Ensuring that adjustments to the system configuration do not adversely affect the organization’s operations

19
Q

Four phases of security management

A

Phase 1 Planning: developing policy and procedure. Baseline approved specifications for ISs or CIs

Phase 2 Identifying and implementing configurations: Most secure state. Develop, approve, implement secure baseline configuration consistent with operational requirements and constraints

Phase 3 Controlling configuration changes: Emphasize management of change to maintain security. Changes implemented as approved. See if any unexpected effects. Employ access restrictions.

Phase 4 Monitoring: Validate that IS adhering to org policies, procedures and approved baseline configuration. Discovers undocumented components, vulnerabilities and unauthorized changes.

20
Q

SSP

A

System Security Plan (Industry): ISSM or ISSO responsible for baseline changes

21
Q

Patches

A

Configuration change control

22
Q

4 audit requirements in NISP

A
  1. Audit Trail
  2. Individual accountability wiht uniqye ID and periodic testing
  3. Adds to 1 and 2 with scheduled audit analysis
  4. Create audit trail capable of recording changes to user access permissions
23
Q

Logs

A

Event logs: event recorded elicits response from program and applications. Should be filtered and can be archived.

Audit logs: