NIST SP 800-37

Risk Management Framework for Information Systems and Organizations

A System Life Cycle Approach for Security and Privacy

It structured into 3 level organization view, business mission and information system view.

800-37 is short for NIST SP 800-37, or NIST 800-37. 800-37 can be applied on all industry like military, airflight, etc. For IT industry it is a framework to risk management by invoking multiple NIST standards including: FIPS 199, NIST 800-53B, NIST 800-53A, etc.

ABSTRACT

Risk Management Framework (RMF) is for managing security and privacy risk, to maintain risk at an appropriate level, including:

  • information security categorization
  • control selection
  • implementation
  • assessment
  • authorization
  • monitoring

INTRODUCTION

1.1 BACKGROUND

Risk management by

  • promoting security and privacy capabilities throughout SDLC;
  • maintaining awareness of security and posture of privacy though continuous monitoring processes;
  • senior leaders and executives facilitate decisions on risk;

2.1 ORGANIZATION-WIDE RISK MANAGEMENT

Managing security and privacy risk involves the entire organization.

Level One

Senior leaders’ vision, goal, objectives.

Level Two

Middle level leaders planning, managing projects on developing, implementing, operating, and maintaining  to support mission and business process.

Level Three

Information systems apply middle level leader’s project. Addressing risks, executing risk decision.

How to RMF(keywords: preparation)

Identifying business functions, processes of information systems;

Identifying key stakeholders(including external);

Identifying prioritizing assets(including information systems);

Understanding threats to information systems;

Understanding adverse effects on individuals;

Conducting risk assessments;

Identifying and prioritizing security and privacy requirements;

Determining authorization scopes;

Developing security and privacy architecture;

Tracing all risk controls during system software development lifecycle.

2.2 RISK MANAGEMENT FRAMEWORK STEPS AND STRUCTURE

Steps for implementing RMF.

  1. Categorize the system by impact of loss. To learn more about please read SP 800-30 and FIPS 199.
  2. Select (tailor) controls(related NIST 800-53B).
  3. Implement the controls.
  4. Assess (track) the controls.
  5. Authorize the system or common(inherited) controls based on determination that risk is acceptable.
  6. Monitor (track) the system and controls(related NIST 800-53A).

FLEXIBILITY IN RMF IMPLEMENTATION

Organization could do following adjustment: executing tasks in different order, emphasizing specific tasks, combining tasks, including Cyber Security Framework to enhancing RMF asks.

2.3 INFORMATION SECURITY AND PRIVACY IN THE RMF

The RMF require two programs to protect PII:

Security program

protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction to provide confidentiality, integrity, availability.

Privacy program

compliance with privacy requirements to protect individuals.

2.7 SECURITY AND PRIVACY POSTURE

The security and privacy posture represents:

  • the status of information systems and information resources (e.g., personnel, equipment, funds, and information technology) based on information assurance resources (e.g., policies, procedures) and
  • the capabilities in place to manage the defense; and
  • comply with applicable privacy requirements and manage privacy risks; and
  • react as the situation changes.

2.8 SUPPLY CHAIN RISK MANAGEMENT

SCRM policy(NIST 180-161) address supply chain risks.

building trust relationships and communicating with both internal and external stakeholders.

3.2 CATEGORIZE

Tasks

Outcomes

TASK C-1 SYSTEM DESCRPTION

Create an assets list group by system with parameters: system version or release number; manufacturer and supplier information; network topology, etc.

TASK C-2 SECURITY CATEGORIZATION

Impact level of systems (see FIPS 199)

TASK C-3 APPROVAL

Approval of TASK C-1 and TASK C-2 by senior management team.

3.3 SELECT(controls)

Tasks

Outcomes

TASK S-1 to S-4 CONTROL SELECTION AND TAILORING

Selecting and tailoring controls by NIST SP 800-53B. You may create customized controls on tailoring procedure.

TASK S-5 CONTINOUS MONITORING STRATEGY

Control assessment by NIST SP 800-53A. You may create customized assessment for tailored controls on TASK S1-S4.

TASK S-6 PLAN REVIEW AND APPROVAL

Approval by senior management team.

3.4 IMPLEMENT(controls to plans)

Tasks

Outcomes

TASK I-1, I-2

Put controls into SDLC design phase, privacy plan to make sure controls are practicable. Adjusting controls if needs.

3.5 ASSESS( plans)

The step is optional since 3.3 SELECT, 3.4 IMPLEMENTATION has done most of jobs.

3.6 AUTHORIZATION( plans by senior management officials)

The step is optional since there are approval task in 3.1 CATEGORIZATION and 3.2 SELECT.

3.7 MONITOR

Tasks

Outcomes

TASK M-1 SYSTEM AND ENVIROMENT CHANGES

Updating security and privacy plan when operational environment changes such as configuration changes. Updating controls may needed.

TASK M-2, M-3, M-4, M-5

updated security and privacy assessment reports

TASK M-6

Review the security and privacy posture of the system on an ongoing basis to determine whether the risk remains acceptable.

TASK M-7

Disposal controls after system removed.

Tips

Cybersecurity Framework Profiles is another way of implementing preparing TASK P-4 in RMF.

The SDLC process is the best practice for RMF implementation.

Acronyms

SDLC, Software Development Lifecycle

SCRM, Supply Chain Risk Management

Reference

National Institute of Standards and Technology, December 2018, NIST Special Publication 800-37 Revision 2 Risk Management Framework for Information Systems and Organizations A System Life Cycle Approach for Security and Privacy, https://doi.org/10.6028/NIST.SP.800-37r2

PNNL, November 2018, Risk Management Framework Process Map, PNNL-28347.

Veracode, 2008, Understanding NIST 800‐37 FISMA Requirements.

NIST SP 800-37 Risk Management Framework for Information Systems and Organizations A System Life Cycle Approach for Security and Privacy的更多相关文章

  1. Stakeholder Risk Management

    In this article we'll address the people swirling around your project: stakeholders. You'll find som ...

  2. 10 Golden Rules of Project Risk Management

    The benefits of risk management in projects are huge. You can gain a lot of money if you deal with u ...

  3. 【EMV L2】终端风险管理(Terminal Risk Management)

    终端风险管理使大额交易联机授权,并确保芯片交易能够周期性地进行联机以防止在脱机环境中也许无法察觉的风险. 虽然发卡行被强制要求在应用交互特征(AIP)中将终端风险管理位设置成1以触发终端风险管理,但终 ...

  4. Security and Risk Management(5)

    Ethics: ISC Code of Ethics You agree to this before the exam, and the code of ethics is very testabl ...

  5. SQL Server get SP parameters and get output fields type information

    Summary 本文主要介绍一下,SQL里面的两个很实用的两个操作: 获取存储过程的参数信息 SELECT * FROM INFORMATION_SCHEMA.PARAMETERS WHERE SPE ...

  6. 论文阅读 Prefetch-aware fingerprint cache management for data deduplication systems

    论文链接 https://link.springer.com/article/10.1007/s11704-017-7119-0 这篇论文试图解决的问题是在cache 环节之前,prefetch-ca ...

  7. Disruptor 详解

    想了解一个项目,最好的办法就是,把它的源码搞到本地自己捣鼓. 在网上看了 N 多人对 Disruptor 速度的吹捧,M 多人对它的机制分析,就连 Disruptor 官方文档中,也 NB 哄哄自诩: ...

  8. CWE 4.3:强化你的数据自我保护能力

    摘要:如何通过软件自动的检查法规中涉及的数据保护, 新版的CWE 4.3 给出了一个解决途径. 1. 按照惯例,先说故事 用12月初在深圳参加的"全球C++及系统软件技术大会"里C ...

  9. [Z] 计算机类会议期刊根据引用数排名

    一位cornell的教授做的计算机类期刊会议依据Microsoft Research引用数的排名 link:http://www.cs.cornell.edu/andru/csconf.html Th ...

  10. 《Network Security A Decision and Game Theoretic Approach》阅读笔记

    网络安全问题的背景 网络安全研究的内容包括很多方面,作者形象比喻为盲人摸象,不同领域的网络安全专家对网络安全的认识是不同的. For researchers in the field of crypt ...

随机推荐

  1. 自己动手从零写桌面操作系统GrapeOS系列教程——13.向MBR中写入程序

    学习操作系统原理最好的方法是自己写一个简单的操作系统. 前面铺垫了这么久,今天终于开始写程序了.本讲将介绍3个逐步深入但非常简单的程序,一方面是让大家熟悉开发流程,另一方面是顺便解决前面遇到的CPU占 ...

  2. P8112 符文破译

    题目描述 将字符串 \(T\) 拆成若干个子串,使这些子串为字符串 \(S\) 的前缀,要求拆分形成的子串数最小. 思路整理 实际上并不需要倒着枚举,也不需要线段树,更不需要 Z 函数. 如果你做过 ...

  3. ExcelDataReader插件的使用

    NPOI插件的弊端 刚来公司的时候公司软件导入导出操作都使用微软的office组件来实现,大家应该都知道这个组件有很大的弊端,就是运行主机上面必须安装office组件才可进行使用,不然无法进行导入导出 ...

  4. 安全测试之探索 windows 游戏扫雷

    作者:京东工业 宛煜昕 扫雷游戏相信很多人都从小玩过,在那个电脑游戏并不多的时代,扫雷成为玩的热度蛮高的一款游戏之一,然而就在有一次,接触到了一次不寻常的扫雷过程,使得后来我也有了这个冲动,也来做一次 ...

  5. 一遍博客带你上手Servlet

    概念 Servlet其实就是Java提供的一门动态web资源开发技术.本质就是一个接口. 快速入门 创建web项目,导入servlet依赖坐标(注意依赖范围scope,是provided,只在编译和测 ...

  6. 官方文档 | 【JVM调优体系】「GC底层调优实战」XPocket为终结性能问题而生—开发指南

    XPocket 用户文档 XPocket 是PerfMa为终结性能问题而生的开源的插件容器,它是性能领域的乐高,将定位或者解决各种性能问题的常见的Linux命令,JDK工具,知名性能工具等适配成各种X ...

  7. Django笔记十三之select_for_update等选择和更新等相关操作

    本篇笔记将介绍 update 和 create 的一些其他用法,目录如下: get_or_create update_or_create select_for_update bulk_create b ...

  8. Azure Terraform(十三)提升 Azure Web App Plan 的性能

    一,引言 一,引言 我们是否正在为部署在云主机上的应用程序性能缓慢和停机问题而苦恼?我们是否正在因为云主机上仅仅部署了应用程序,在流量平缓的时候而浪费大量的计算资源而心疼荷包.那么让我们来一起看看 A ...

  9. vmware中安装windows11系统

    1.官网下载windwos11镜像(点击跳转下载) 2.打开vmware,创建新的虚拟机 3.选择典型方便快捷 4.选择安装程序光盘文件,点击浏览选择刚刚下载好的iso镜像 5.选择windows版本 ...

  10. ChatGPT 和 Midjourney 初体验

    ChatGPT 和 Midjourney 这两个系统这些天红的发紫,自己也尝试着注册和使用了一下. 一.ChatGPT 我在上周才刚刚注册 OpenAI,注册过程也比较麻烦. 国内的 IP 是无法访问 ...