新书报道
当前位置: 首页 >> 电类优秀教材 >> 正文
FISMA and the Risk Management Framework : The New Practice of Federal Cyber Security
发布日期:2015-12-31  浏览

FISMA and the Risk Management Framework : The New Practice of Federal Cyber Security

[Book Description]

FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security deals with the Federal Information Security Management Act (FISMA), a law that provides the framework for securing information systems and managing risk associated with information resources in federal government agencies. Comprised of 17 chapters, the book explains the FISMA legislation and its provisions, strengths and limitations, as well as the expectations and obligations of federal agencies subject to FISMA. It also discusses the processes and activities necessary to implement effective information security management following the passage of FISMA, and it describes the National Institute of Standards and Technology's Risk Management Framework. The book looks at how information assurance, risk management, and information systems security is practiced in federal government agencies; the three primary documents that make up the security authorization package: system security plan, security assessment report, and plan of action and milestones; and federal information security-management requirements and initiatives not explicitly covered by FISMA. This book will be helpful to security officers, risk managers, system owners, IT managers, contractors, consultants, service providers, and others involved in securing, managing, or overseeing federal information systems, as well as the mission functions and business processes supported by those systems. * Learn how to build a robust, near real-time risk management system and comply with FISMA* Discover the changes to FISMA compliance and beyond* Gain your systems the authorization they need

[Table of Contents]
Trademarks                                         xvii
Acknowledgements                                   xix
About the Author                                   xxi
    Chapter 1 Introduction                         1   (22)
      Introduction                                 1   (5)
        Purpose and Rationale                      3   (2)
        How to Use This Book                       5   (1)
        Key Audience                               5   (1)
      FISMA Applicability and Implementation       6   (2)
        Implementation Responsibilities            6   (1)
        FISMA Progress to Date                     7   (1)
      FISMA Provisions                             8   (4)
        Standards and Guidelines for Federal       9   (2)
        Information Systems
        System Certification and Accreditation     11  (1)
      Strengths and Shortcomings of FISMA          12  (1)
      Structure and Content                        13  (5)
      Relevant Source Material                     18  (1)
      References                                   19  (4)
    Chapter 2 Federal Information Security         23  (30)
    Fundamentals
      Information Security in the Federal          25  (9)
      Government
        Brief History of Information Security      26  (2)
        Civilian, Defense, and Intelligence        28  (5)
        Sector Practices
        Legislative History of Information         33  (1)
        Security Management
      Certification and Accreditation              34  (9)
        FIPS 102                                   35  (1)
        DITSCAP                                    36  (1)
        NIACAP                                     37  (2)
        NIST Special Publication 800-37            39  (1)
        DIACAP                                     40  (1)
        NIST Risk Management Framework             41  (1)
        Joint Task Force Transformation            42  (1)
        Initiative
      Organizational Responsibilities              43  (4)
        Office of Management and Budget (OMB)      44  (1)
        National Institute of Standards and        44  (1)
        Technology (NIST)
        Department of Defense (DoD)                45  (1)
        Office of the Director of National         45  (1)
        Intelligence (ODNI)
        Department of Homeland Security (DHS)      45  (1)
        National Security Agency (NSA)             46  (1)
        General Services Administration (GSA)      46  (1)
        Government Accountability Office (GAO)     46  (1)
        Congress                                   46  (1)
        Executive Office of the President          47  (1)
      Relevant Source Material                     47  (1)
      References                                   48  (5)
    Chapter 3 Thinking About Risk                  53  (26)
      Understanding Risk                           54  (12)
        Key Concepts                               54  (3)
        Types of Risk                              57  (6)
        Organizational Risk                        63  (3)
      Trust, Assurance, and Security               66  (4)
        Trust and Trustworthiness                  67  (1)
        Assurance and Confidence                   67  (1)
        Security                                   68  (1)
        Trust Models                               68  (2)
      Risk Associated with Information Systems     70  (5)
        Risk Management Framework                  71  (1)
        Risk Management Life Cycle                 72  (1)
        Other Risk Management Frameworks Used      73  (2)
        in Government Organizations
      Relevant Source Material                     75  (1)
      References                                   76  (3)
    Chapter 4 Thinking About Systems               79  (26)
      Defining Systems in Different Contexts       80  (5)
        Information Systems in FISMA and the RMF   81  (1)
        Information System Attributes              82  (3)
      Perspectives on Information Systems          85  (6)
        Information Security Management            85  (1)
        Capital Planning and Investment Control    86  (1)
        Enterprise Architecture                    87  (1)
        System Development Life Cycle              88  (2)
        Information Privacy                        90  (1)
      Establishing Information System Boundaries   91  (6)
        Subsystems                                 92  (3)
        System Interconnections                    95  (2)
      Maintaining System Inventories               97  (1)
      Relevant Source Material                     98  (1)
      References                                   99  (6)
    Chapter 5 Success Factors                      105 (26)
      Prerequisites for Organizational Risk        106 (5)
      Management
        Justifying Information Security            107 (2)
        Key Upper Management Roles                 109 (2)
      Managing the Information Security Program    111 (3)
        Organizational Policies, Procedures,       114 (1)
        Templates, and Guidance
      Compliance and Reporting                     114 (2)
        Agency Reporting Requirements              115 (1)
        Information Security Program Evaluation    115 (1)
      Organizational Success Factors               116 (4)
        Governance                                 116 (1)
        Planning                                   117 (1)
        Budgeting and Resource Allocation          118 (1)
        Communication                              118 (1)
        Standardization, Automation, and Reuse     119 (1)
        Flexibility                                119 (1)
      Measuring Security Effectiveness             120 (6)
        Security Measurement Types                 122 (1)
        Security Measurement Process               123 (3)
      Relevant Source Material                     126 (1)
      References                                   126 (5)
    Chapter 6 Risk Management Framework            131 (22)
    Planning and Initiation
      Planning                                     132 (2)
      Planning the RMF Project                     134 (3)
        Aligning to the SDLC                       135 (1)
        Planning the RMF Timeline                  136 (1)
      Prerequisites for RMF Initiation             137 (6)
        Inputs to Information System               138 (1)
        Categorization
        Inputs to Security Control Selection       139 (1)
        Organizational Policies, Procedures,       140 (2)
        Templates, and Guidance
        Identifying Responsible Personnel          142 (1)
      Establishing a Project Plan                  143 (1)
      Roles and Responsibilities                   144 (1)
      Getting the Project Underway                 145 (3)
      Relevant Source Material                     148 (1)
      References                                   149 (4)
    Chapter 7 Risk Management Framework Steps 1    153 (34)
    & 2
      Purpose and Objectives                       154 (1)
      Standards and Guidance                       154 (3)
      Step 1 Categorize Information System         157 (11)
        Security Categorization                    158 (8)
        Information System Description             166 (1)
        Information System Registration            167 (1)
      Step 2 Select Security Controls              168 (13)
        Common Control Identification              174 (2)
        Security Control Selection                 176 (4)
        Monitoring Strategy                        180 (1)
        Security Plan Approval                     181 (1)
      Relevant Source Material                     181 (1)
      References                                   182 (5)
    Chapter 8 Risk Management Framework Steps 3    187 (32)
    & 4
      Working with Security Control Baselines      188 (6)
        Assurance Requirements                     189 (1)
        Sources of Guidance on Security Controls   190 (4)
      Roles and Responsibilities                   194 (2)
        Management Controls                        194 (1)
        Operational Controls                       195 (1)
        Technical Controls                         195 (1)
        Program Management, Infrastructure, and    196 (1)
        Other Common Controls
      Step 3 Implement Security Controls           196 (6)
        Security Architecture Design               198 (1)
        Security Engineering and Control           198 (3)
        Implementation
        Security Control Documentation             201 (1)
      Step 4 Assess Security Controls              202 (12)
        Security Control Assessment Components     204 (1)
        Assessment Preparation                     205 (6)
        Security Control Assessment                211 (1)
        Security Assessment Report                 212 (1)
        Remediation Actions                        213 (1)
      Relevant Source Material                     214 (1)
      References                                   215 (4)
    Chapter 9 Risk Management Framework Steps 5    219 (26)
    & 6
      Preparing for System Authorization           220 (2)
      Step 5 Authorize Information System          222 (8)
        Plan of Action and Milestones              223 (3)
        Security Authorization Package             226 (2)
        Risk Determination                         228 (1)
        Risk Acceptance                            229 (1)
      Step 6 Monitor Security Controls             230 (9)
        Information System and Environment         233 (1)
        Changes
        Ongoing Security Control Assessments       234 (1)
        Ongoing Remediation Actions                235 (1)
        Key Updates                                236 (1)
        Security Status Reporting                  237 (1)
        Ongoing Risk Determination and             238 (1)
        Acceptance
        Information System Removal and             238 (1)
        Decommissioning
      Relevant Source Material                     239 (1)
      References                                   240 (5)
    Chapter 10 System Security Plan                245 (30)
      Purpose and Role of the System Security      246 (5)
      Plan
        System Security Plan Scope                 246 (1)
        Defining the System Boundary               247 (2)
        Key Roles and Responsibilities             249 (1)
        The Role of the SSP within the RMF         249 (2)
      Structure and Content of the System          251 (15)
      Security Plan
        System Security Plan Format                252 (12)
        SSP Linkage to Other Key Artifacts         264 (2)
      Developing the System Security Plan          266 (2)
        Rules of Behavior                          267 (1)
      Managing System Security Using the SSP       268 (1)
      Relevant Source Material                     269 (1)
      References                                   269 (6)
    Chapter 11 Security Assessment Report          275 (30)
      Security Assessment Fundamentals             276 (17)
        Security Control Assessors and             276 (5)
        Supporting Roles
        Assessment Timing and Frequency            281 (3)
        Scope and Level of Detail                  284 (4)
        Security Assessment Report Structure       288 (2)
        and Contents
        Assessment Methods and Objects             290 (3)
      Performing Security Control Assessments      293 (3)
        Assessment Determinations                  293 (3)
        Producing the Security Assessment Report   296 (1)
      The Security Assessment Report in Context    296 (4)
        The Purpose and Role of the Security       298 (2)
        Assessment Report
        Using the Security Assessment Report       300 (1)
      Relevant Source Material                     300 (1)
      References                                   301 (4)
    Chapter 12 Plan of Action and Milestones       305 (24)
      Regulatory Background                        307 (1)
      Structure and Content of the Plan of         308 (9)
      Action and Milestones
        Agency-Level POA&M                         308 (1)
        System-Level POA&M Information             309 (4)
        Creating POA&M Items                       313 (3)
        Planning for Remediation                   316 (1)
        Oversight of POA&M Creation                317 (1)
      Weaknesses and Deficiencies                  317 (5)
        Risk Assessments                           318 (1)
        Risk Responses                             319 (1)
        Sources of Weaknesses                      320 (2)
      Producing the Plan of Action and             322 (1)
      Milestones
        Timing and Frequency                       322 (1)
      Maintaining and Monitoring the Plan of       323 (1)
      Action and Milestones
        Resolving POA&M Items                      324 (1)
      Relevant Source Material                     324 (2)
      References                                   326 (3)
    Chapter 13 Risk Management                     329 (38)
      Risk Management                              329 (6)
        Key Risk Management Concepts               332 (3)
      Three-Tiered Approach                        335 (9)
        Organizational Perspective                 335 (4)
        Mission and Business Perspective           339 (3)
        Information System Perspective             342 (1)
        Trust and Trustworthiness                  343 (1)
      Components of Risk Management                344 (9)
        Frame                                      344 (3)
        Assess                                     347 (2)
        Respond                                    349 (3)
        Monitor                                    352 (1)
      Information System Risk Assessments          353 (7)
        Risk Models                                355 (1)
        Assessment Methods                         356 (1)
        Analysis Approaches                        357 (1)
        Prepare                                    357 (2)
        Conduct                                    359 (1)
        Maintain                                   359 (1)
      Relevant Source Material                     360 (1)
      References                                   361 (6)
    Chapter 14 Continuous Monitoring               367 (36)
      The Role of Continuous Monitoring in the     369 (8)
      Risk Management Framework
        Monitoring Strategy                        373 (1)
        Selecting Security Controls for            374 (1)
        Continuous Monitoring
        Integrating Continuous Monitoring with     375 (1)
        Security Management
        Roles and Responsibilities                 375 (2)
      Continuous Monitoring Process                377 (11)
        Define ISCM Strategy                       380 (1)
        Establish ISCM Program                     381 (4)
        Implement ISCM Program                     385 (1)
        Analyze Data and Report Findings           385 (1)
        Respond to Findings                        386 (1)
        Review and Update ISCM Program and         387 (1)
        Strategy
      Technical Solutions for Continuous           388 (7)
      Monitoring
        Manual vs. Automated Monitoring            388 (1)
        Data Gathering                             389 (5)
        Aggregation and Analysis                   394 (1)
        Automation and Reference Data Sources      395 (1)
      Relevant Source Material                     395 (1)
      References                                   396 (7)
    Chapter 15 Contingency Planning                403 (42)
      Introduction to Contingency Planning         403 (8)
        Contingency Planning Drivers               404 (2)
        Contingency Planning Controls              406 (5)
      Contingency Planning and Continuity of       411 (6)
      Operations
        Federal Requirements for Continuity of     412 (1)
        Operations Planning
        Distinguishing Contingency Planning        413 (1)
        from Continuity of Operations Planning
        Contingency Planning Components and        414 (3)
        Processes
      Information System Contingency Planning      417 (7)
        Develop Contingency Planning Policy        417 (1)
        Conduct Business Impact Analysis           418 (1)
        Identify Preventive Controls               419 (1)
        Create Contingency Strategies              420 (2)
        Develop Contingency Plan                   422 (1)
        Conduct Plan Testing, Training, and        422 (2)
        Exercises
        Maintain Plan                              424 (1)
      Developing the Information System            424 (8)
      Contingency Plan
        ISCP Introduction and Supporting           425 (1)
        Information
        Concept of Operations                      426 (1)
        Activation and Notification                427 (1)
        Recovery                                   428 (2)
        Reconstitution                             430 (1)
        Appendices and Supplemental Information    431 (1)
      Operational Requirements for Contingency     432 (5)
      Planning
        System Development and Engineering         432 (1)
        System Interconnections                    433 (1)
        Technical Contingency Planning             433 (4)
        Considerations
      Relevant Source Material                     437 (1)
      References                                   438 (7)
    Chapter 16 Privacy                             445 (36)
      Privacy Requirements for Federal Agencies    446 (9)
      Under FISMA and the E-Government Act
        Privacy Provisions in the E-Government     447 (4)
        Act of 2002
        Privacy and Minimum Security Controls      451 (1)
        Privacy in FISMA Reporting                 452 (3)
        FISMA Incident Reporting and Handling      455 (1)
      Federal Agency Requirements Under the        455 (6)
      Privacy Act
        Fair Information Practices                 456 (5)
      Privacy Impact Assessments                   461 (5)
        Applicability of Privacy Impact            462 (1)
        Assessments
        Conducting Privacy Impact Assessments      463 (1)
        Documenting and Publishing PIA Results     464 (1)
        System of Records Notices                  465 (1)
        Updates to Privacy Impact Assessments      465 (1)
        for Third-Party Sources
        Privacy Impact Assessments within the      466 (1)
        Risk Management Framework
      Protecting Personally Identifiable           466 (4)
      Information (PII)
        Notification Requirements for Breaches     468 (2)
        of Personally Identifiable Information
      Other Legal and Regulatory Sources of        470 (5)
      Privacy Requirements
        Privacy Requirements Potentially           470 (5)
        Applicable to Agencies
      Relevant Source Material                     475 (1)
      References                                   476 (5)
    Chapter 17 Federal Initiatives                 481 (26)
      Network Security                             481 (4)
        US-CERT                                    482 (1)
        Comprehensive National Cybersecurity       483 (1)
        Initiative
        Trusted Internet Connections               484 (1)
        EINSTEIN                                   484 (1)
      Cloud Computing                              485 (2)
        FedRAMP                                    486 (1)
      Application Security                         487 (3)
        Tested Security Technologies               488 (1)
        Federal Information Processing Standards   488 (1)
        Common Criteria                            489 (1)
        Secure Configuration Checklists            489 (1)
      Identity and Access Management               490 (7)
        Identity, Credential, and Access           491 (1)
        Management (ICAM)
        Personal Identity Verification             491 (2)
        Electronic Authentication                  493 (3)
        Federal PKI                                496 (1)
      Other Federal Security Management            497 (4)
      Requirements
        Personally Identifiable Information        498 (1)
        Protection
        OMB Memoranda                              498 (1)
        Information Resources Management           499 (1)
        Federal Enterprise Architecture            499 (2)
        Open Government                            501 (1)
      Relevant Source Material                     501 (1)
      References                                   502 (5)
Appendix A References                              507 (14)
Appendix B Acronyms                                521 (6)
Appendix C Glossary                                527 (20)
Index                                              547
 

关闭


版权所有:西安交通大学图书馆      设计与制作:西安交通大学数据与信息中心  
地址:陕西省西安市碑林区咸宁西路28号     邮编710049

推荐使用IE9以上浏览器、谷歌、搜狗、360浏览器;推荐分辨率1360*768以上