RMF Step 2: Select Flashcards
RMF Task 2-1
Identify security controls that are common controls
RMF Task 2-2
Select the security controls for the information system
RMF Task 2-3
Develop a strategy for continuous monitoring of controls
Security Controls
Management, Operational, and Technical controls designated to information system to protect CIA. Made up of safeguards and countermeasures
Safeguards
Protective measures prescribed to meet the security requirements
Countermeasures
Actions that reduce the vulnerability of a system
Minimum Security Baseline
set of standards that applied enterprise wide to ensure consistent level of compliance
Two documents that govern Step 2 selection of security controls are
FIPs 200 and NIST 800-53 (Security and Privacy Controls for information systems)
How many control families are there?
17, with one additional family control (PM controls, program mgmt)
and privacy controls
but makes a total of 18
High water mark
used to identify the system category and baseline security controls to implement
NIST 800-53 no longer divides families into what?
Mgmt, operational, technical controls
What are the 18 control families
AC AT AU CA CM CP IA IR MA MP PE PL PS RA SA SC SI PM
AC AT AU - audit and accountability CA - Security Assessment and Authorization CM CP IA - identification and authentication IR MA MP PE - physical and environment protection PL PS RA SA - System and Services Acquisition SC - System and Communications Protection SI - System and Information Integrity PM - Program mgmt
Information Security Programs - PM Controls
- Organization wide information security program management controls
- Not associated with security control baselines
- Independent of any system impact level, no control enhancements
Privacy Controls - Define and how many control families
- Safeguards employed to protect and ensure proper handling of PII
- Split into 8 families
Privacy Controls
AP AR DI DM IP SE TR UL
AP - Authority and purpose AR - Accountability, Audit, and Risk Mgmt DI - Data Quality and Integrity DM - Data Minimization and Retention IP - Individual Participation and Redress SE - Security TR - Transparency UL - Use Limitation