Misc. Flashcards
Assessment Object
AIMS
- Activity
- Individual
- Mechanism
- Specification
Assessment Objective Methods
TIE
- Test
- Interview
- Examine
Assessment Objective Security Control Classes
MOT
- Management
- Operations
- Technical
An Information System containing what cannot have an confidentiality impact level below moderate?
- Privacy Information
- Trade Secrets
6 Steps of the Tailoring Guidance
- Identifying and Designating Common Controls
- Applying Scoping Considerations
- Selecting Compensating Controls
- Assigning Security Control Parameter Values
- Supplementing Baseline Security Controls
- Providing Additional Specification Information for Implementation
Tiered Roles
Tier 1:
- Organization (Governance)
- Head/CEO, CIO, SISO, RE
Tier 1/2:
- CCP, ISO, SCA
Tier 2:
- Mission/Business Process (Information Flow)
- AO, AODR
Tier 3:
- Information System (Environment of Operations)
- ISO, IO, ISSO, ISSE
Organizational Risk Frame
determines Risk Assessment Model
- Risk Assumptions
- Risk Constraints
- Priorities and Tradeoffs
- Risk Tolerance
- Uncertainty
NIST 800-60 Process
- Step 1: Identify Information Type
- Step 2: Select Provisional Impact Level
- Step 3: Review Provisional Impact Level and Adjust/Finalize Provisional Impact Level
- Step 4: Assign System Security Category
- Leads to Security Categorization and Security Control Selection
Low = Minor/Limited Moderate = Serious High = Severe/Catastrophic
Risk Assessment Methodology
determined by Organizational Risk Frame
- Risk Assessment Process
- Risk Model
- Assessment Approach
- Analysis Approach
Risk Management Process; what is it, where is it from?
- NIST SP 800-39
- Frame
- Assess
- Respond
- Monitor
Risk Assessment Process; what is it, where is it from?
- NIST SP 800-39
- Prepare
- Conduct
- Communicating
- Maintaining
What are the criteria for a National Security System? Where is it from?
- NIST SP 800-59
- Intelligence Activities
- Cryptographic Information
- Command and Control of Military Forces
- Weapon/ Weapon System
- Military or Intelligence Missions
- Processes Classified Information
What is the standard wording for an effective control?
Implemented correctly, operating as intended and producing the desired outcome
Risk = ?
Likelihood x Impact
Threat and Vulnerability feed into Likelihood and Impact
Threat Source - initiates - Threat Event - exploits - Vulnerability - causing - Adverse Impact - producing - Organizational Risk
Enterprise Architechture
People
Process
Technology
Architecture Description Inputs
- Architecture Reference Models
- Segment and Solution Architectures
- Mission and Business Processes
- Information System Boundaries
Organization Inputs
- Laws, Directives, Policy Guidance
- Strategic Goals and Objectives
- Priorities and Resource Availability
- Supply Chain Considerations
CIO
- Will use words like “ensure a program does…”
- Primarily administrative
- Makes sure the ISCM program exists
- Ensures resources are available to support
- High level
- Inherently government function
SCA
- Will use words like “assessment” a lot
- Updates the SSP and SAR
- Submits the SAP for approval
- Has to be an engineer (technically competent)
SISO
- Responsible for developing and implementing the ISCM program
- Looks at initial monitoring strategy put together by the ISO and CCP
- Tracks and analyzes POAMs
CCP
- Only really involved a lot if some common controls need updating/remediation
RE
- Oversees strategy and program
- Matrix position
- Collaborates and shares news with everyone
- Uses words like: Shared, Communicated, Collaborated
- Inherently government position
AO
- Ensures security posture of the program is acceptable
- Makes authorization decisions
ISO
- Does the grunt work
- Ensures operational impacts are being done
- Conducts assessments
- Reports back to AO/SCA
- Updates documentation
- Only one who registers anything
ISSO
- Assists the ISO
Safeguards v Countermeasures
Safeguards are designed into a system to prevent risk
Countermeasures are reactive and added after the risk assessment
RTO
Recovery Time Objective
Amount of time a system is allowable to be down; no impacts
MTD
Maximum Tolerable Downtime
Maximum amount of time a system can be down
RPO
Recovery Point Objective
Point to which you want to be able to restore to
Boxes and Knowledge
- Basic (Black Box) - Zero Knowledge
- Focused (Grey Box) - Partial Knowledge
- Comprehensive (White Box) - Full Knowledge, Explicit and substantial