NIST SP 800-37 Risk Management Framework for Information Systems and Organizations A System Life Cycle Approach for Security and Privacy
NIST SP 800-37
Risk Management Framework for Information Systems and Organizations
A System Life Cycle Approach for Security and Privacy
It structured into 3 level organization view, business mission and information system view.
800-37 is short for NIST SP 800-37, or NIST 800-37. 800-37 can be applied on all industry like military, airflight, etc. For IT industry it is a framework to risk management by invoking multiple NIST standards including: FIPS 199, NIST 800-53B, NIST 800-53A, etc.
ABSTRACT
Risk Management Framework (RMF) is for managing security and privacy risk, to maintain risk at an appropriate level, including:
- information security categorization
- control selection
- implementation
- assessment
- authorization
- monitoring
INTRODUCTION
1.1 BACKGROUND
Risk management by
- promoting security and privacy capabilities throughout SDLC;
- maintaining awareness of security and posture of privacy though continuous monitoring processes;
- senior leaders and executives facilitate decisions on risk;
2.1 ORGANIZATION-WIDE RISK MANAGEMENT
Managing security and privacy risk involves the entire organization.
Level One
Senior leaders’ vision, goal, objectives.
Level Two
Middle level leaders planning, managing projects on developing, implementing, operating, and maintaining to support mission and business process.
Level Three
Information systems apply middle level leader’s project. Addressing risks, executing risk decision.
How to RMF(keywords: preparation)
Identifying business functions, processes of information systems;
Identifying key stakeholders(including external);
Identifying prioritizing assets(including information systems);
Understanding threats to information systems;
Understanding adverse effects on individuals;
Conducting risk assessments;
Identifying and prioritizing security and privacy requirements;
Determining authorization scopes;
Developing security and privacy architecture;
Tracing all risk controls during system software development lifecycle.
2.2 RISK MANAGEMENT FRAMEWORK STEPS AND STRUCTURE
Steps for implementing RMF.
- Categorize the system by impact of loss. To learn more about please read SP 800-30 and FIPS 199.
- Select (tailor) controls(related NIST 800-53B).
- Implement the controls.
- Assess (track) the controls.
- Authorize the system or common(inherited) controls based on determination that risk is acceptable.
- Monitor (track) the system and controls(related NIST 800-53A).
FLEXIBILITY IN RMF IMPLEMENTATION
Organization could do following adjustment: executing tasks in different order, emphasizing specific tasks, combining tasks, including Cyber Security Framework to enhancing RMF asks.
2.3 INFORMATION SECURITY AND PRIVACY IN THE RMF
The RMF require two programs to protect PII:
Security program
protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction to provide confidentiality, integrity, availability.
Privacy program
compliance with privacy requirements to protect individuals.
2.7 SECURITY AND PRIVACY POSTURE
The security and privacy posture represents:
- the status of information systems and information resources (e.g., personnel, equipment, funds, and information technology) based on information assurance resources (e.g., policies, procedures) and
- the capabilities in place to manage the defense; and
- comply with applicable privacy requirements and manage privacy risks; and
- react as the situation changes.
2.8 SUPPLY CHAIN RISK MANAGEMENT
SCRM policy(NIST 180-161) address supply chain risks.
building trust relationships and communicating with both internal and external stakeholders.
3.2 CATEGORIZE
|
Tasks |
Outcomes |
|
TASK C-1 SYSTEM DESCRPTION |
Create an assets list group by system with parameters: system version or release number; manufacturer and supplier information; network topology, etc. |
|
TASK C-2 SECURITY CATEGORIZATION |
Impact level of systems (see FIPS 199) |
|
TASK C-3 APPROVAL |
Approval of TASK C-1 and TASK C-2 by senior management team. |
3.3 SELECT(controls)
|
Tasks |
Outcomes |
|
TASK S-1 to S-4 CONTROL SELECTION AND TAILORING |
Selecting and tailoring controls by NIST SP 800-53B. You may create customized controls on tailoring procedure. |
|
TASK S-5 CONTINOUS MONITORING STRATEGY |
Control assessment by NIST SP 800-53A. You may create customized assessment for tailored controls on TASK S1-S4. |
|
TASK S-6 PLAN REVIEW AND APPROVAL |
Approval by senior management team. |
3.4 IMPLEMENT(controls to plans)
|
Tasks |
Outcomes |
|
TASK I-1, I-2 |
Put controls into SDLC design phase, privacy plan to make sure controls are practicable. Adjusting controls if needs. |
3.5 ASSESS( plans)
The step is optional since 3.3 SELECT, 3.4 IMPLEMENTATION has done most of jobs.
3.6 AUTHORIZATION( plans by senior management officials)
The step is optional since there are approval task in 3.1 CATEGORIZATION and 3.2 SELECT.
3.7 MONITOR
|
Tasks |
Outcomes |
|
TASK M-1 SYSTEM AND ENVIROMENT CHANGES |
Updating security and privacy plan when operational environment changes such as configuration changes. Updating controls may needed. |
|
TASK M-2, M-3, M-4, M-5 |
updated security and privacy assessment reports |
|
TASK M-6 |
Review the security and privacy posture of the system on an ongoing basis to determine whether the risk remains acceptable. |
|
TASK M-7 |
Disposal controls after system removed. |
Tips
Cybersecurity Framework Profiles is another way of implementing preparing TASK P-4 in RMF.
The SDLC process is the best practice for RMF implementation.
Acronyms
SDLC, Software Development Lifecycle
SCRM, Supply Chain Risk Management
Reference
National Institute of Standards and Technology, December 2018, NIST Special Publication 800-37 Revision 2 Risk Management Framework for Information Systems and Organizations A System Life Cycle Approach for Security and Privacy, https://doi.org/10.6028/NIST.SP.800-37r2
PNNL, November 2018, Risk Management Framework Process Map, PNNL-28347.
Veracode, 2008, Understanding NIST 800‐37 FISMA Requirements.
NIST SP 800-37 Risk Management Framework for Information Systems and Organizations A System Life Cycle Approach for Security and Privacy的更多相关文章
- Stakeholder Risk Management
In this article we'll address the people swirling around your project: stakeholders. You'll find som ...
- 10 Golden Rules of Project Risk Management
The benefits of risk management in projects are huge. You can gain a lot of money if you deal with u ...
- 【EMV L2】终端风险管理(Terminal Risk Management)
终端风险管理使大额交易联机授权,并确保芯片交易能够周期性地进行联机以防止在脱机环境中也许无法察觉的风险. 虽然发卡行被强制要求在应用交互特征(AIP)中将终端风险管理位设置成1以触发终端风险管理,但终 ...
- Security and Risk Management(5)
Ethics: ISC Code of Ethics You agree to this before the exam, and the code of ethics is very testabl ...
- SQL Server get SP parameters and get output fields type information
Summary 本文主要介绍一下,SQL里面的两个很实用的两个操作: 获取存储过程的参数信息 SELECT * FROM INFORMATION_SCHEMA.PARAMETERS WHERE SPE ...
- 论文阅读 Prefetch-aware fingerprint cache management for data deduplication systems
论文链接 https://link.springer.com/article/10.1007/s11704-017-7119-0 这篇论文试图解决的问题是在cache 环节之前,prefetch-ca ...
- Disruptor 详解
想了解一个项目,最好的办法就是,把它的源码搞到本地自己捣鼓. 在网上看了 N 多人对 Disruptor 速度的吹捧,M 多人对它的机制分析,就连 Disruptor 官方文档中,也 NB 哄哄自诩: ...
- CWE 4.3:强化你的数据自我保护能力
摘要:如何通过软件自动的检查法规中涉及的数据保护, 新版的CWE 4.3 给出了一个解决途径. 1. 按照惯例,先说故事 用12月初在深圳参加的"全球C++及系统软件技术大会"里C ...
- [Z] 计算机类会议期刊根据引用数排名
一位cornell的教授做的计算机类期刊会议依据Microsoft Research引用数的排名 link:http://www.cs.cornell.edu/andru/csconf.html Th ...
- 《Network Security A Decision and Game Theoretic Approach》阅读笔记
网络安全问题的背景 网络安全研究的内容包括很多方面,作者形象比喻为盲人摸象,不同领域的网络安全专家对网络安全的认识是不同的. For researchers in the field of crypt ...
随机推荐
- 项目构建node-sass源码报错 SyntaxError:Unexpectedtoken"?"
背景 vue2项目,之前一直构建正常.今天改了代码,构建时报错,报错原因显示编译node-sass源码时出错. 报错信息: Modulebuild failed:/node_modules/node- ...
- 一次.net code中的placeholder导致的高cpu诊断
背景 最近一位朋友找到我,让我帮看他们的一个aspnet core service无端cpu高的问题.从描述上看,这个service之前没有出现过cpu高的情况,最近也没有改过实际的什么code.很奇 ...
- 用Java代码验证三门问题
三门问题(Monty Hall problem)亦称为蒙提霍尔问题,出自美国的电视游戏节目Let's Make a Deal. 问题名字来自该节目的主持人蒙提·霍尔(Monty Hall).参赛者会看 ...
- K8S安全学习
k8s安全学习 一.云 云的定义看似模糊,但本质上,它是一个用于描述全球服务器网络的术语,每个服务器都有一个独特的功能.云不是一个物理实体,而是一个庞大的全球远程服务器网络,它们连接在一起,旨在作为单 ...
- Spark Catalyst 查询优化器原理
这里我们讲解一下SparkSQL的优化器系统Catalyst,Catalyst本质就是一个SQL查询的优化器,而且和 大多数当前的大数据SQL处理引擎设计基本相同(Impala.Presto.Hive ...
- vue项目如何解决跨域问题
跨域是什么 跨域本质是浏览器基于同源策略的一种安全手段 同源策略(Sameoriginpolicy),是一种约定,它是浏览器最核心也最基本的安全功能 所谓同源(即指在同一个域)具有以下三个相同点 ...
- Kafka 物理存储机制
一个商业化消息队列的性能好坏,其文件存储机制设计是衡量一个消息队列服务技术水平和最关键指标之一.下面将从 Kafka文件存储机制和物理结构角度,分析 Kafka是如何实现高效文件存储,及实际应用效果. ...
- js循环中reduce的用法简单介绍
reduce() 方法接收一个函数作为累加器,reduce 为数组中的每一个元素依次执行回调函数,不包括数组中被删除或从未被赋值的元素,接受四个参数:初始值(上一次回调的返回值),当前元素值,当前索引 ...
- ACM-NEFUOJ-汉诺塔问题
P200汉诺塔 #include<bits/stdc++.h> using namespace std; int main() { int n,i; long long s[40]; s[ ...
- 电商AARRR模型分析(一)——R语言
在2010年,互联网创业者增长黑客之父肖恩·埃利斯(Sean Ellis)就创造了增长黑客(Growth hacker)这样一个概念.2015年,范冰撰写的一本新书<增长黑客>确立了Gro ...