Finals 2 Flashcards
This is responsible for ensuring that the IAP is developed and implemented in accordance with regulatory and business requirements; allocates resources and foster commitment to the IAP
Chief Executive Officer (CEO)
This is responsible for the execution of overall IT program and delegate authority to the CISO for the management of the IAP
Chief Information Officer (CIO)
This is the focal point for IT management and governance of IT portfolios
Chief Information Officer (CIO)
Responsibilities of a Chief Information Officer (CIO)
- It’s responsible for: Ensuring information security management processes are integrated with
strategic and operational planning processes. - This is responsible for ensuring trained personnel is sufficient to assist in complying with the information assurance requirements in related legislation, policies, directives, instructions, standards, and guidelines
- This is responsible for coordinating with senior management to report annually to the head of the federal agency on the overall effectiveness of IAP, including progress of remedial actions
This carries out the CIO’s security and privacy responsibilities under FISMA and is responsible for managing the IAP
Chief Information Security Officer (CISO)
Characteristics of a Chief Information Security Officer (CISO)
- This possess professional qualifications, including training and experience, required to administer the IAP functions
- This maintain information assurance duties as a primary responsibility
- This heads an office with the mission and resources to assist the organization in achieving more secure information and information systems in accordance with FISMA and Privacy Act requirements
What does FISMA mean
Federal Information Security Management Act
Responsibilities of CISO
- Develop an organization-wide IAP that provides adequate security for all information systems
- Centralized reporting of information security-related activities
- Develop and maintain information security and privacy policies
- Define specific security requirements, tools, templates, and checklists to support the IAP
- Ensure that personnel with significant system security responsibilities are trained
- Assist senior management concerning security responsibilities
- Ensure implementation of information privacy and security protections as required by the Privacy Act, FISMA, and memoranda
- Monitor security incidents and provide assistance when required
- Manage the Office of Information Technology (OIT) audits and program reviews; support Office of the Inspector General (OIG) investigations
- Report to the CIO and other senior management on the effectiveness of IAP and developing and submitting the annual FISMA report
This is appointed by the CEO and is granted the authority to formally assume responsibility for operating an information system at an acceptable level of risk
Authorizing Official
True or false: The AO has budgetary oversight for an information system and is responsible for the mission/business operations supported by the system
True
They approve systems security plans (SSPs), memorandums of agreement or understanding (MOA/MOU), and plans of action and milestones (POA & Ms).
Authorizing Official
True or false: AOs can deny authorization to operate an information system if unacceptable risks exist
True
True or False: It is possible that a particular information system may involve multiple AOs
True
Responsibilities of the AO
- Ensure the security posture of the Agency’s information systems is maintained
- Reviewing security status reports and security documents and determining if the risk to the Agency of operating the system remains acceptable
- Reauthorizing information systems when required
- Assisting in response to security incidents and privacy breaches
- Appointing, when required, a designated representative to coordinate and carry out system security responsibilities
Appointed by the CEO and serves as the focal point for the information system and is the central point of contact during the security authorization process
Information System Owner (ISO)
Responsibilities of the ISO
- Coordinating data protection requirements with Information Owners (IOs) that have information stored and processed in the system
- Deciding, in coordination with the IO and Information System Security Officer (ISSO), who has access to the system. Determining access privileges and rights to the system
- Ensuring that system users and support personnel receive the required security training
- Ensuring that the system is compliant with the required security controls
- Appointing an ISSO for the information system to carry out the day-to-day security responsibilities
- Reviewing system security documents
- Ensuring that system-specific security training is provided to the users and administrators of the systems
- Ensuring that remediation activities for the system are performed as needed to maintain the authorization status
- Appointing an Information System Security Manager (ISSM) to coordinate system security task and provide oversight responsibilities to ensure security activities are performed
This is an official with regulatory, management, or operational authority for specified information and is responsible for establishing the policies and procedures governing its generation, collection, processing, dissemination, and disposal.
Information Owner
Responsibilities of Information Owner (IO)
- Providing input to ISOs regarding the security requirements and controls for
the systems where the information is processed, stored, or transmitted. - Retaining information in accordance with the National Archives and
Records Administration (NARA) record schedule. - Categorizing the sensitivity level5 of the information stored and
processed in the system. - Establishing rules for appropriate use and protection of the information.
- Coordinating with the ISO when security requirements change.
- Assisting in the response to security incidents.
- Ensuring that the PII inventory is updated.
Appointed by the ISO and works closely with the ISO or ISSM to ensure that the appropriate security posture is maintained for the information system
Information System Security Officer
True or False: The Information System Security Officer (ISSO) serves as a principal advisor on all the security related issues of an information system
True
This supports activities at the system level and includes physical and environmental protection, personnel security, incident handling, and security training and awareness
Information System Security Officer (ISSO)
Responsibilities of the Information System Security Officer (ISSO)
- Ensuring system compliance with security policies and procedures.
- Managing and controlling changes to the system.
- Assessing the security impact of any changes.
- Monitoring the system and its environment.
- Developing and updating the SSP.
- Coordinating with and supporting the ISO with security responsibilities.
- Preparing or overseeing the preparation of system security documents7 and
security activities. - Developing security policies and procedures that are consistent with IA policies.
- Performing or overseeing remediation activities to maintain the authorization status.
- Assisting the ISO assemble the security authorization package for submission to
the AO. - Assisting in the investigation of security incidents.
This serves as the primary liaison for the CISO to individuals with security and privacy responsibilities and supports activities at the IAP level
Information Assurance Manager (IAM)
Responsibilities of the Information Assurance Manager (IAM)
- Monitoring compliance with Federal requirement and IA policies.
- Providing guidance on the implementation of IA policies.
- Providing security and privacy training.
- Investigating system security and privacy incidents.
- Providing support for audits and reviews.
- Managing the vulnerability management program.
This coordinates system security task and provide oversight responsibilities to ensure security activities are performed and serves as the liaison between the Information System Security Officer (ISSO) and the Information System Owner (ISO)
The ISSO (contractor) coordinates directly with the ____ for all system security related issues
Information System Security Manager (ISSM)
Responsibilities of the Information System Security Manager (ISSM)
Providing oversight of system security activities performed by the ISSO.
* Acting as the liaison between the IAM and the ISSO.
* Monitoring system compliance with Information Assurance policies and federal
guidance.
This is nominated by the Agency and assists the Contracting Officer (CO) by
Acting as a technical liaison between the CO and the contractor.
* Providing technical assistance.
* Performing onboarding and off boarding activities for the contractors assigned to the
contract.
* Ensuring that contractors have the proper background investigations before
accessing information or systems.
* Ensuring that contractors properly maintain information and information systems in
accordance with the IAP.
Contracting Officer’s Representative (COR)
This conducts assessments of the security controls employed within or inherited by an information system to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented
correctly, operating as intended, and producing the desired outcome with
respect to meeting the security requirements for the system).
Security Assessment Team