NIST SP 800-37 Risk Management Framework for Information Systems and Organizations A System Life Cycle Approach for Security and Privacy
NIST SP 800-37
Risk Management Framework for Information Systems and Organizations
A System Life Cycle Approach for Security and Privacy
It structured into 3 level organization view, business mission and information system view.
800-37 is short for NIST SP 800-37, or NIST 800-37. 800-37 can be applied on all industry like military, airflight, etc. For IT industry it is a framework to risk management by invoking multiple NIST standards including: FIPS 199, NIST 800-53B, NIST 800-53A, etc.
ABSTRACT
Risk Management Framework (RMF) is for managing security and privacy risk, to maintain risk at an appropriate level, including:
- information security categorization
- control selection
- implementation
- assessment
- authorization
- monitoring
INTRODUCTION
1.1 BACKGROUND
Risk management by
- promoting security and privacy capabilities throughout SDLC;
- maintaining awareness of security and posture of privacy though continuous monitoring processes;
- senior leaders and executives facilitate decisions on risk;
2.1 ORGANIZATION-WIDE RISK MANAGEMENT
Managing security and privacy risk involves the entire organization.
Level One
Senior leaders’ vision, goal, objectives.
Level Two
Middle level leaders planning, managing projects on developing, implementing, operating, and maintaining to support mission and business process.
Level Three
Information systems apply middle level leader’s project. Addressing risks, executing risk decision.
How to RMF(keywords: preparation)
Identifying business functions, processes of information systems;
Identifying key stakeholders(including external);
Identifying prioritizing assets(including information systems);
Understanding threats to information systems;
Understanding adverse effects on individuals;
Conducting risk assessments;
Identifying and prioritizing security and privacy requirements;
Determining authorization scopes;
Developing security and privacy architecture;
Tracing all risk controls during system software development lifecycle.
2.2 RISK MANAGEMENT FRAMEWORK STEPS AND STRUCTURE
Steps for implementing RMF.
- Categorize the system by impact of loss. To learn more about please read SP 800-30 and FIPS 199.
- Select (tailor) controls(related NIST 800-53B).
- Implement the controls.
- Assess (track) the controls.
- Authorize the system or common(inherited) controls based on determination that risk is acceptable.
- Monitor (track) the system and controls(related NIST 800-53A).
FLEXIBILITY IN RMF IMPLEMENTATION
Organization could do following adjustment: executing tasks in different order, emphasizing specific tasks, combining tasks, including Cyber Security Framework to enhancing RMF asks.
2.3 INFORMATION SECURITY AND PRIVACY IN THE RMF
The RMF require two programs to protect PII:
Security program
protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction to provide confidentiality, integrity, availability.
Privacy program
compliance with privacy requirements to protect individuals.
2.7 SECURITY AND PRIVACY POSTURE
The security and privacy posture represents:
- the status of information systems and information resources (e.g., personnel, equipment, funds, and information technology) based on information assurance resources (e.g., policies, procedures) and
- the capabilities in place to manage the defense; and
- comply with applicable privacy requirements and manage privacy risks; and
- react as the situation changes.
2.8 SUPPLY CHAIN RISK MANAGEMENT
SCRM policy(NIST 180-161) address supply chain risks.
building trust relationships and communicating with both internal and external stakeholders.
3.2 CATEGORIZE
|
Tasks |
Outcomes |
|
TASK C-1 SYSTEM DESCRPTION |
Create an assets list group by system with parameters: system version or release number; manufacturer and supplier information; network topology, etc. |
|
TASK C-2 SECURITY CATEGORIZATION |
Impact level of systems (see FIPS 199) |
|
TASK C-3 APPROVAL |
Approval of TASK C-1 and TASK C-2 by senior management team. |
3.3 SELECT(controls)
|
Tasks |
Outcomes |
|
TASK S-1 to S-4 CONTROL SELECTION AND TAILORING |
Selecting and tailoring controls by NIST SP 800-53B. You may create customized controls on tailoring procedure. |
|
TASK S-5 CONTINOUS MONITORING STRATEGY |
Control assessment by NIST SP 800-53A. You may create customized assessment for tailored controls on TASK S1-S4. |
|
TASK S-6 PLAN REVIEW AND APPROVAL |
Approval by senior management team. |
3.4 IMPLEMENT(controls to plans)
|
Tasks |
Outcomes |
|
TASK I-1, I-2 |
Put controls into SDLC design phase, privacy plan to make sure controls are practicable. Adjusting controls if needs. |
3.5 ASSESS( plans)
The step is optional since 3.3 SELECT, 3.4 IMPLEMENTATION has done most of jobs.
3.6 AUTHORIZATION( plans by senior management officials)
The step is optional since there are approval task in 3.1 CATEGORIZATION and 3.2 SELECT.
3.7 MONITOR
|
Tasks |
Outcomes |
|
TASK M-1 SYSTEM AND ENVIROMENT CHANGES |
Updating security and privacy plan when operational environment changes such as configuration changes. Updating controls may needed. |
|
TASK M-2, M-3, M-4, M-5 |
updated security and privacy assessment reports |
|
TASK M-6 |
Review the security and privacy posture of the system on an ongoing basis to determine whether the risk remains acceptable. |
|
TASK M-7 |
Disposal controls after system removed. |
Tips
Cybersecurity Framework Profiles is another way of implementing preparing TASK P-4 in RMF.
The SDLC process is the best practice for RMF implementation.
Acronyms
SDLC, Software Development Lifecycle
SCRM, Supply Chain Risk Management
Reference
National Institute of Standards and Technology, December 2018, NIST Special Publication 800-37 Revision 2 Risk Management Framework for Information Systems and Organizations A System Life Cycle Approach for Security and Privacy, https://doi.org/10.6028/NIST.SP.800-37r2
PNNL, November 2018, Risk Management Framework Process Map, PNNL-28347.
Veracode, 2008, Understanding NIST 800‐37 FISMA Requirements.
NIST SP 800-37 Risk Management Framework for Information Systems and Organizations A System Life Cycle Approach for Security and Privacy的更多相关文章
- Stakeholder Risk Management
In this article we'll address the people swirling around your project: stakeholders. You'll find som ...
- 10 Golden Rules of Project Risk Management
The benefits of risk management in projects are huge. You can gain a lot of money if you deal with u ...
- 【EMV L2】终端风险管理(Terminal Risk Management)
终端风险管理使大额交易联机授权,并确保芯片交易能够周期性地进行联机以防止在脱机环境中也许无法察觉的风险. 虽然发卡行被强制要求在应用交互特征(AIP)中将终端风险管理位设置成1以触发终端风险管理,但终 ...
- Security and Risk Management(5)
Ethics: ISC Code of Ethics You agree to this before the exam, and the code of ethics is very testabl ...
- SQL Server get SP parameters and get output fields type information
Summary 本文主要介绍一下,SQL里面的两个很实用的两个操作: 获取存储过程的参数信息 SELECT * FROM INFORMATION_SCHEMA.PARAMETERS WHERE SPE ...
- 论文阅读 Prefetch-aware fingerprint cache management for data deduplication systems
论文链接 https://link.springer.com/article/10.1007/s11704-017-7119-0 这篇论文试图解决的问题是在cache 环节之前,prefetch-ca ...
- Disruptor 详解
想了解一个项目,最好的办法就是,把它的源码搞到本地自己捣鼓. 在网上看了 N 多人对 Disruptor 速度的吹捧,M 多人对它的机制分析,就连 Disruptor 官方文档中,也 NB 哄哄自诩: ...
- CWE 4.3:强化你的数据自我保护能力
摘要:如何通过软件自动的检查法规中涉及的数据保护, 新版的CWE 4.3 给出了一个解决途径. 1. 按照惯例,先说故事 用12月初在深圳参加的"全球C++及系统软件技术大会"里C ...
- [Z] 计算机类会议期刊根据引用数排名
一位cornell的教授做的计算机类期刊会议依据Microsoft Research引用数的排名 link:http://www.cs.cornell.edu/andru/csconf.html Th ...
- 《Network Security A Decision and Game Theoretic Approach》阅读笔记
网络安全问题的背景 网络安全研究的内容包括很多方面,作者形象比喻为盲人摸象,不同领域的网络安全专家对网络安全的认识是不同的. For researchers in the field of crypt ...
随机推荐
- 【NLP 系列】Bert 词向量的空间分布
作者:京东零售 彭馨 1. 背景 我们知道Bert 预训练模型针对分词.ner.文本分类等下游任务取得了很好的效果,但在语义相似度任务上,表现相较于 Word2Vec.Glove 等并没有明显的提升. ...
- 翟佳:StreamNative 组织构建之路丨声网开发者创业讲堂 • 第 5 期
前言 翟佳,StreamNative 联合创始⼈,Apache Pulsar PMC 成员与 Committer.之前任职于 EMC,担任统⼀存储部⻔技术负责⼈. 在声网开发者创业讲堂 • 第 5 期 ...
- java网络编程--3 TCP
java网络编程--3 TCP 1.6.TCP 客户端 连接服务器 Socket 发送消息 package com.ssl.lesson02; import java.io.IOException; ...
- 递推求解DAG最长路径长度及最长路径条数
说明 在一般图中,求解最长路或最短路只能通过最短路算法解决 但是在DAG中,由于不存在环,因此可以通过递推,以线性复杂度计算处最长路或最短路.当然需要首先对有向图进行Tarjan缩点转化为DAG 例题 ...
- Java中使用List的add方法后元素相同问题
在写JavaWeb时,我在后端通过JDBC读取了数据后逐个使用List.add()方法添加元素并通过request方法传给jsp页面解析,但是添加以后出现了在列表里有n个(假设添加了n个元素)最后一个 ...
- 驱动开发:探索DRIVER_OBJECT驱动对象
本章将探索驱动程序开发的基础部分,了解驱动对象DRIVER_OBJECT结构体的定义,一般来说驱动程序DriverEntry入口处都会存在这样一个驱动对象,该对象内所包含的就是当前所加载驱动自身的一些 ...
- 每日复习关于static 饿汉式 懒汉式,单例设计模式
1.1.static 的使用 当我们编写一个类时,其实就是在描述其对象的属性和行为,而并没有产生实质上的对象,只有通过 new 关键字才会产生出对象,这时系统才会分配内存空间给对象,其方法才可以供外部 ...
- python入门教程之十二Open及file操作
读和写文件 open() 将会返回一个 file 对象,基本语法格式如下: open(filename, mode) filename:包含了你要访问的文件名称的字符串值. mode:决定了打开文件的 ...
- matplotlab可视化学习
1 使用pip安装 使用 Python 包管理器 pip 来安装 Matplotlib 是一种最轻量级的方式.打开 CMD 命令提示符窗口,并输入以下命令: pip install matplotli ...
- [GIT]辨析/区别: git reset HEAD 与 git reset --hard HEAD | 版本回撤
1 场景1: 撤销到远程仓库或本地仓库的最新最近一次的正式版本 1.1 文由 时常有这样一种场景,不小心改动了部分文件,或修改了部分文件却发现无用,此时可能还没有git push,也可能push了:又 ...