Documents Flashcards
(40 cards)
CNSSI 1253
Details what to do if you’re a National Security System (compared to FIPS 199); Gets rid of High-Water Mark
E- Government Act of 2002
Improves the management and promotion of electronic government services and processes by establishing a Federal Chief Information Officer within OMB and by establishing a framework of measures for internet-based information technology
Established the requirement for a Privacy Impact Assessment (PIA) which is an analysis of how information is handled.
Executive Order 13526
Relates to National Security information (along with EO 12958 and the Atomic Energy Act of 1954); Says you have to have a process for classified (though doesn’t spell out a process); how classified should be handled
FISMA 2002
Spells out Information Systems: What is it? What is the framework? Definitions for Integrity, Confidentiality, Availability…
FISMA 2014
Took FISMA 2002 and outlined who is responsible for what
ICD 503
Intelligence Community’s way of doing things
NIST FIPS 140-2
USG computer security standard used to approve cryptographic modules
NIST FIPS 199
Details what to do if you’re NOT a National Security System (compared to CNSSI 1253); Confidentiality, Integrity, Availability (L, M, H)
NIST FIPS 200
Addresses the specification of minimum security requirements for federal information and information systems.
Security Controls selection (along with NIST SP 800-53); Identifies 17 families of controls; Introduces the concept of the High-Water Mark and minimum-security requirements
NIST FIPS 201-2
Specifies Personal Identity Verification (PIV) requirements for federal employees and contractors (i.e.: CAC)
NIST SP 800-18
Old document; ignore outdated Roles and Responsibilities; Details making a system boundary and the approvals
NIST SP 800-30
Provide guidance on conducting risk assessments of federal information systems
NIST SP 800-34
General concepts of Business Continuity Management (BCM) and Disaster Recovery Planning (DRP) and integration with Incident Response Plans (IRP)
NIST SP 800-37
Best info on the contents of the SP, SAR, POAM, etc…; Details the SAR and how to do it
NIST SP 800-39
Looks at the whole process; Risk Management process: FARM (Frame, Assess, Respond, Monitor); Risk Assessment process: Prepare, Conduct, Communicating, Maintaining
NIST SP 800-41
Overview of types of firewall technologies and recommendations on establishing policies for selecting, configuring, testing deploying and managing firewall solutions
NIST SP 800-47
Important to know the level of the systems connecting (L, M, H) including any dynamic systems
NIST SP 800-50
Building an Information Technology Security Awareness and Training Program
Awareness: What is it and how do you recognize it; Training is specific to what you need; Education is more in-depth
NIST SP 800-53
Security Controls selection (along with FIPS 200); 17 Families of controls + PM Controls + 7 Privacy Controls; Only NIST document that is mandatory
NIST SP 800-53A
Parallel to NIST SP 800-53, but for each control in 53, 53A lays out how to assess it
NIST SP 800-55
Guidance on using metrics to ID the adequacy of in-place security controls, policies and procedures. Provide an approach to help management decide where to invest additional security protection resources and to ID and evaluate nonproductive controls.
NIST SP 800-59
Defines the criteria for a National Security System; 6 criteria: intelligence activities, crypto, command and control of military forces, weapon/weapon system, military or intelligence missions, process classified?
NIST SP 800-60
Information on properly assessing impact levels (L, M, H); Identify info type, Select provisional impact level, Review provisional impact level, Adjust provisional impact level, Assign system security category
Data Criticality and Data Sensitivity are ways to evaluate the security impact of an IS and are indicators of how impact level will be impacted.
NIST SP 800-61
Guidelines on establishing an effective incident-response program; Preparation, Detection and Analysis, Containment Eradication & Recovery, Post-Incident Activity