Documents Flashcards

1
Q

CNSSI 1253

A

Details what to do if you’re a National Security System (compared to FIPS 199); Gets rid of High-Water Mark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

E- Government Act of 2002

A

Improves the management and promotion of electronic government services and processes by establishing a Federal Chief Information Officer within OMB and by establishing a framework of measures for internet-based information technology

Established the requirement for a Privacy Impact Assessment (PIA) which is an analysis of how information is handled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Executive Order 13526

A

Relates to National Security information (along with EO 12958 and the Atomic Energy Act of 1954); Says you have to have a process for classified (though doesn’t spell out a process); how classified should be handled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

FISMA 2002

A

Spells out Information Systems: What is it? What is the framework? Definitions for Integrity, Confidentiality, Availability…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FISMA 2014

A

Took FISMA 2002 and outlined who is responsible for what

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ICD 503

A

Intelligence Community’s way of doing things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NIST FIPS 140-2

A

USG computer security standard used to approve cryptographic modules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NIST FIPS 199

A

Details what to do if you’re NOT a National Security System (compared to CNSSI 1253); Confidentiality, Integrity, Availability (L, M, H)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NIST FIPS 200

A

Addresses the specification of minimum security requirements for federal information and information systems.

Security Controls selection (along with NIST SP 800-53); Identifies 17 families of controls; Introduces the concept of the High-Water Mark and minimum-security requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NIST FIPS 201-2

A

Specifies Personal Identity Verification (PIV) requirements for federal employees and contractors (i.e.: CAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NIST SP 800-18

A

Old document; ignore outdated Roles and Responsibilities; Details making a system boundary and the approvals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NIST SP 800-30

A

Provide guidance on conducting risk assessments of federal information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NIST SP 800-34

A

General concepts of Business Continuity Management (BCM) and Disaster Recovery Planning (DRP) and integration with Incident Response Plans (IRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NIST SP 800-37

A

Best info on the contents of the SP, SAR, POAM, etc…; Details the SAR and how to do it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NIST SP 800-39

A

Looks at the whole process; Risk Management process: FARM (Frame, Assess, Respond, Monitor); Risk Assessment process: Prepare, Conduct, Communicating, Maintaining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NIST SP 800-41

A

Overview of types of firewall technologies and recommendations on establishing policies for selecting, configuring, testing deploying and managing firewall solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

NIST SP 800-47

A

Important to know the level of the systems connecting (L, M, H) including any dynamic systems

18
Q

NIST SP 800-50

A

Building an Information Technology Security Awareness and Training Program

Awareness: What is it and how do you recognize it; Training is specific to what you need; Education is more in-depth

19
Q

NIST SP 800-53

A

Security Controls selection (along with FIPS 200); 17 Families of controls + PM Controls + 7 Privacy Controls; Only NIST document that is mandatory

20
Q

NIST SP 800-53A

A

Parallel to NIST SP 800-53, but for each control in 53, 53A lays out how to assess it

21
Q

NIST SP 800-55

A

Guidance on using metrics to ID the adequacy of in-place security controls, policies and procedures. Provide an approach to help management decide where to invest additional security protection resources and to ID and evaluate nonproductive controls.

22
Q

NIST SP 800-59

A

Defines the criteria for a National Security System; 6 criteria: intelligence activities, crypto, command and control of military forces, weapon/weapon system, military or intelligence missions, process classified?

23
Q

NIST SP 800-60

A

Information on properly assessing impact levels (L, M, H); Identify info type, Select provisional impact level, Review provisional impact level, Adjust provisional impact level, Assign system security category

Data Criticality and Data Sensitivity are ways to evaluate the security impact of an IS and are indicators of how impact level will be impacted.

24
Q

NIST SP 800-61

A

Guidelines on establishing an effective incident-response program; Preparation, Detection and Analysis, Containment Eradication & Recovery, Post-Incident Activity

25
Q

NIST SP 800-83

A

Talks about malware

26
Q

NIST SP 800-88

A

Media sanitation guide (clearing, purging, destruction, disposal)

27
Q

NIST SP 800-92

A

Practical guidance on developing, implementing and maintaining effective computer security log management practices throughout an enterprise

28
Q

NIST SP 800-115

A

Guidance and philosophy on assessment/testing; Guidelines on how to set up a test program (is it repeatable and can you test it)

Technical Guide to Information Security Testing and Assessment

29
Q

NIST SP 800-122

A

Talks about PII, what is it and what to do with it

30
Q

NIST SP 800-124

A

Talks about mobile devices, what is a mobile device and how do you protect it

31
Q

NIST SP 800-128

A

Relates to Configuration Management

Guide for Security Focused Configuration Management of Information Systems

32
Q

NIST SP 800-160

A

Engineering-driven perspective and actions necessary to develop more defensible and survivable systems, inclusive of the machine, physical and human components that compose a system

33
Q

NIST SP 800-161

A

Guidance to federal agencies on identifying, assessing and mitigation supply chain risks at all levels of their organizations

34
Q

OMB Circular A-11

A

How to prepare a budget; Who, how, steps, assumptions, etc…

35
Q

OMB Circular A-108

A

Privacy Act; Keeping records; Agency responsibilities for implementing the review, reporting and publication requirements of the Privacy Act of 1974

36
Q

OMB Circular A-123

A

Be smart in how you spend money on controls; don’t spend more money on controls than the system is worth (with exceptions)

37
Q

OMB Circular A-130

A

Instructs to use security (Appendix I) and privacy (Appendix II) controls and how to verify; Mandates the need for Security and Privacy Controls Officers; Accounts for PII; Greater transparency and sharing; Continuous Monitoring Strategies for security and privacy controls

38
Q

Privacy Act 1974

A

Establishes a Code of Fair Information Practice that governs the collection, maintenance, use and dissemination of PII that is maintained in a system of records by federal agencies

39
Q

M-02-01

A

Memo relating to creating POAMs

40
Q

NIST SP 800-137

A

Continuous Monitoring for Federal Systems

Assist in the development of a continuous monitoring strategy, provide visibility into threats and vulnerabilities and visibility into the effectiveness of the security controls. Provides assurance that the security controls are in alignment with organizational risk tolerance.