SlideShare a Scribd company logo
1 of 36
Final Research Paper
Agency System Security Authorization Program
IA 500 – Seminar on Public Sector Security
Shawn Nicolen
3/17/2015
Agency System Security Authorization Program 2
Contents
Agency Charter...................................................................................................................................6
Overview ...........................................................................................................................................6
Program Objectives ............................................................................................................................7
The Risk Management Framework.......................................................................................................8
Information Categorization .................................................................................................................8
Types of Information Systems..........................................................................................................9
Notable Information Types ........................................................................................................10
Security Controls ..............................................................................................................................15
Access Control (AC).......................................................................................................................16
AC-2 Account Management .......................................................................................................16
AC-18 Wireless Access...............................................................................................................17
Awareness and Training (AT) .........................................................................................................17
AT-2 Security Awareness............................................................................................................17
Audit and Accountability(AU)........................................................................................................18
AU-2 Auditable Events...............................................................................................................18
AU-13 Monitoringfor Information Disclosure .............................................................................18
Certification, Accreditation, and Security Assessments(CA).............................................................19
CA-5 Plan of Action and Milestones............................................................................................19
Configuration Management (CM) ..................................................................................................19
CM-2 Baseline Configuration......................................................................................................19
Agency System Security Authorization Program 3
Contingency Planning(CP).............................................................................................................20
CP-2 Contingency Plan...............................................................................................................20
Identification and Authentication(IA) ............................................................................................20
IA-2 Identification and Authentication (Organizational Users) ......................................................20
Incident Response (IR)...................................................................................................................21
IR-2 Incident Response Training .................................................................................................21
Maintenance (MA)........................................................................................................................22
MA-6 Timely Maintenance.........................................................................................................22
Media Protection (MP)..................................................................................................................22
MP-4 Media Storage..................................................................................................................22
Physical and Environmental Protection (PE)....................................................................................23
PE-11 Emergency Power............................................................................................................23
Planning (PL).................................................................................................................................23
PL-2 System Security Plan ..........................................................................................................23
Personnel Security (PS)..................................................................................................................24
PS-3 Personnel Screening...........................................................................................................24
Risk Assessment (RA) ....................................................................................................................24
RA-2 Security Categorization......................................................................................................24
RA-3 Risk Assessment................................................................................................................25
System and ServicesAcquisition (SA) .............................................................................................25
Agency System Security Authorization Program 4
SA-2 Allocation of Resources......................................................................................................25
System and Communications Protection(SC)..................................................................................26
DC-9 Transmission Confidentiality..............................................................................................26
System and Information Integrity (SI).............................................................................................27
SI-4 Information System Monitoring...........................................................................................27
Risk Assessment...............................................................................................................................27
Threat..........................................................................................................................................28
Vulnerability.................................................................................................................................28
Impact..........................................................................................................................................28
A Note on Measurement...............................................................................................................29
System Security Authorization...........................................................................................................29
Plan of Action and Milestones .......................................................................................................29
Security Authorization Package......................................................................................................30
Risk Determination .......................................................................................................................31
Risk Acceptance............................................................................................................................31
Information System Monitoring.........................................................................................................32
Asset Management.......................................................................................................................32
Configuration Management...........................................................................................................32
Event and Incident Management...................................................................................................32
Information Management.............................................................................................................33
Agency System Security Authorization Program 5
License Management....................................................................................................................33
Malware Detection.......................................................................................................................33
Network Management..................................................................................................................33
Software Assurance ......................................................................................................................33
Vulnerability and Patch Management ............................................................................................34
References.......................................................................................................................................35
Agency System Security Authorization Program 6
Agency Charter
The Office forLunar and Martian Affairs(OLMA) wasfoundedin1964 to addressgrowingconcerns
surroundingcolonial political tensions withinthe UnitedStates Lunarand Martian colonies established
by EdwinHubble andThe ExplorersClubin1932. In additiontoadministratingthe daytoday
operational andmissionbasedobjectivesof these coloniesthe agencywasalsochargedwith the
separate butequallyimportanttaskof keepingknowledge of the coloniesasecretfromthe general
publicof planetEarth,per Executive Order1111A issuedbypresidentKennedyinhisaddresstothe
JointChiefsof Staff onNovember3,1963 (OLMA, STIMU DocumentLibrary).
Overview
Thisdocumentdescribesthe policiesgoverninginformationtechnologyusage andsecurityatOLMA in
compliance withdirectionsestablishedbyfederallaws,policies,andregulations. In1996 the Office of
ManagementandBudget statedthat federal agencies mustprovide,“security commensuratewiththe
riskand magnitude of the harmresultingfromthe loss,misuse,orunauthorizedaccesstoor
modificationof information”(OMBA-130, Page 5). Thiswas furtherenforcedbythe Federal Information
SecurityManagementActof 2002 (FISMA),whichrequiredfederalagenciesto,“provide a
comprehensive frameworkforensuringthe effectivenessof informationsecuritycontrolsover
informationresourcesthatsupportFederal operationsandassets”(FISMA,Section3541).
In compliance withthesedirectives OLMA hasadoptedthe standardsfor informationsecuritydescribed
inthe following:
 Federal InformationProcessingStandards (FIPS) Publication199: StandardsforSecurity
Categorization of FederalInformation and Information Systems andPublication200: Minimum
SecurityRequirementsforFederal Information and Information Systems.
Agency System Security Authorization Program 7
 The National Institute of StandardsandTechnology(NIT) Special Publication800series
pertainingtocomputersecurity, especiallythose on the riskmanagementframework(SP800-
37), informationsystemcategorization(SP800-67), andsecuritycontrols (SP800-53).
It shouldbe notedthatthe policiesandpracticesinthisdocumentdonotapplyto systemsdesignated
as national securitysystemsorinformationdesignatedas classifiedasdescribedinExecutive Order
13526, Classified NationalSecurityInformation anditsamendments.Forguidance inidentifyingthese
national security systemspleaserefertoNISTSP800-59, Guideline forIdentifying an Information System
as a NationalSecurity System.
Program Objectives
The goal of processesoutlined inthisdocumentisto provide governanceineffortstosecure the
informational resourcesof the OLMA inaccordance withfederal directivesandstandards. This
documentderivesitsprocessesfromthose establishedbyNISTinsupportof the Federal Information
SecurityManagementActof 2002 (FISMA).
FISMA chargedNISTwiththe developmentof three keydirectivesinsupportof informationsecurity
whichdefinedthe scope of theirefforts (FIPS199,Page 1):
 The creationof standardsforall federal agenciesforcategorizationof all informationand
informationsystemsusedbythose agencieswiththe goal of providingadequate securitybased
on riskexposure.
 Guidelinesregardingthe typesof informationandinformationsystemsineachof those
categories.
 The minimummanagement, operational, andtechnical control requirementsforsecuring
informationand informationsecuritysystemsineachof those definedcategories.
Agency System Security Authorization Program 8
The RiskManagement Framework
The Office forLunar and Martian Affairsutilizesthe RiskManagementFrameworkdescribedinNISTSP
800-37 Revision1, Guide forApplying theRisk ManagementFrameworkto FederalInformation Systems.
These standards have beencreatedtoensure thatthe managementof riskas itrelatedtoinformation
and informationsystemsisconsistentwiththe missionandfunctionof the agency.
The six stepsof thisprocessare:
1. Categorize the InformationandInformationSystem.
2. Selectaprovisional setof baseline securitycontrolsbasedonthe systemcategorization.
3. Implementthe provisional securitycontrols.
4. Assessthe effectivenessof the provisional securitycontrols.
5. Authorize the informationsystemforuse basedona determinationthe riskpresentonthat
system.
6. Monitorthe informationsystemanditssecuritycontrolscontinuouslytoassesstheir
effectiveness.Changesmade tothe systemare notedandevaluatedforimpactonthe level of
riskpresentonthat system.
InformationCategorization
Securitycategorization isanecessarystep inintegratingagencybusiness andtechnologymanagement
withsecurity,establishingthe pathtothe standardization,measurement,andevaluationof security
efforts(NISTSP800-60, Page 4), and isthe firststepof the risk managementframeworkoutlinedinSP
800-37. FIPS199 providesstandardsforcategorizinginformationandinformationsystemsbasedonthe
impactto the agency of eventsthat jeopardize the accomplishmentof itsmission,assets,legal
responsibilities,daytodayfunctions,andpeople (FIPS199,Page 1). These categoriesare usedin
Agency System Security Authorization Program 9
assessingthe risktoan informationsystemalongside informationaboutrelevantthreatsand
vulnerabilities asa part of a formal,standardized,andmeasurableriskassessmentprocess.
FISMA section3532 describes athree axessystemformeasuringinformationrelevance toan
informationsecurityprogram:
 Confidentiality,ameasure of the desiredlevel of disclosureof information.
 Integrity,ameasure of the intactness,non-repudiation,andauthenticityof information.
 Availability, the timelinessandreliabilityof accesstoinformation.
PerFIPS199, the OLMA usesthese three securityobjectives tomeasure the potential impactthatthe
lossor compromise of informationwouldhave onthe agenciesassets,operations,mission,orpeople. A
lowimpactis attributedtoan eventthatcausesa limitedadverseeffect,amoderate impactisdue toan
eventwithaseriousadverse effect,andahighimpact isdescribedassevere orcatastrophic:preventing
the accomplishmentof the agenciesprimaryfunction.
The securitycategoryof an informationsystemonwhichinformationof variouslevelsof impactresides
isbasedon the highestlevelof impactwithineachof those informationtypes.FIPS199 refersto thisas
the “highwater mark” method(Page 4),beingthe “highestvaluesfromamongthose securitycategories
that have beendeterminedforeachtype of informationresidentonthe informationsystem.” Itisthe
role of the informationsystemowner,withsupportof otherofficialssuchasthe InformationSystem
SecurityOfficer,toprovide thiscategorization.
Types of Information Systems
NISTprovidesguidance inmappingtypesof informationsystemstorecommendedsecuritycategoriesin
SP 800-60: Guide forMapping Typesof Information and Information Systemsto Security Categories,
volumesIandII. Thisdocumentprovidesacatalogof typesof informationsystemswhichcanbe
referredtoinorderto determine aprovisionalrecommendedsecuritycategoryforthose systems.While
these recommendedsecuritycategoriescanbe used initially inthe initialabsence of aformal impact
Agency System Security Authorization Program 10
analysiseveryattemptshouldbe takentodeterminethe actual securitycategoryforeachinformation
systemunderthe responsibilityof the OLMA.
Early coloniststookstepstoensure the secrecyof theireffortsand,forthe mostpart, common
terrestrial technologies werenotinplace toadequatelydetecttheirpresence onthese worldsuntilthe
mid-1950s whensome evidence of theiractivitieswasleakedtothe general publicbut,fortunately,
interpretedasscience fiction. PursuanttoExecutive Order1111A of 1963 one of the OLMA’s missionsis
to conceal the existence of the coloniesfromthe general public until atime whichknowledge of their
existence wouldnolongerpose ariskof disruptiontothe societiesandnationsof Earth.Because of this
some information of anytype maybe classifiedand,therefore,notsubjecttothe policiesandguidance
withinthisdocument.
NotableInformationTypes
While the OLMA’scharter extendstonearlyall aspectsof life onthe Lunarand Martian colonies, some
systemfunctionsandtypesof informationmaybe of notable regard to itsmission of the agencyor have
special considerationstothe unique nature of the OLMA’smission.
Energy Supply InformationType
Thistype of informationisinregardtothe generation,obtaining,use, distribution,andconsumptionof
power.
While the original LunarandMartian colonistsgeneratedandgovernedthe generationof theirown
energysupply,mainly viause of atomicreactors,these operationswere laterfederalizedunderthe
authorityof the OLMA in 1964.
The provisional securitycategoryof systemsinthisfunctionorcontainingthistype of informationis
moderate. The provisional impactforeachaxisis:
 Confidentiality:Low
Agency System Security Authorization Program 11
 Integrity:Moderate
 Availability:Moderate
Note that,due to the factthat the coloniesrely,inpart,onatomicenergy,some informationinthis
categoryis consideredclassifiedandnational securityrelated.Thatinformationisoutside of the scope
of thisdocument.
The above informationregardingthisinformationtype wasdrawnfromNISTSP800-60 Vol 2, section
D.7.1, on page 133. Fore more detailsaboutthistype of information please refertothatdocument.
EnvironmentalMonitoringand ForecastingInformationType
Thistype of informationisinregardtothe observationandpredictionof environmentalconditions,
includingairquality,waterlevelsandquality,emissions,andweather.
ConditionsonLunaand Mars are quite differentfromEarthand as suchsometimesrequire specialized
techniquestomeasure orpredict.Insome casesenvironmental forecastingiscritical tothe continued
existence of the colony,suchasinthe case of solar flares,Martianduststorms,and continuous
monitoringof artificial environments.
The provisional securitycategoryof systemsinthisfunctionorcontainingthistype of informationis
moderate accordingtodefaultNISTguidance.The provisional impactforeachaxisis:
 Confidentiality:Low
 Integrity:Moderate
 Availability:Low (See Note Below)
In the case of informationregarding off world systemsOLMA recommendsthatthe provisionalimpact
alongthe availabilityaxisisraisedtohigh,due tothe extreme nature andsuddenchangesinthe
environments of the off worldcolonies.Insome caseschangesinthe environmentcanhave a
catastrophiceffectresultinginthe lossof humanlife and,therefore,itiscritical thatinformationabout
Agency System Security Authorization Program 12
such potentiallydeadlyenvironmental factorsshouldalwaysbe immediatelyavailable tothe off world
colonists andsupportteamsonEarth.
The above informationregardingthisinformationtype wasdrawnfromNISTSP800-60 Vol 2, section
D.8.1, on page 139. For more detailsaboutthistype of informationpleaserefertothatdocument.
SpaceOperations InformationType
Thistype of informationdescribesandsupportsactivitiesrelatedtomissionsandpeople conducting
aerospace basedmissionsandoperations.
The missionof OLMA isdirectlyrelatedtospace andspace travel toand fromoff worldcoloniesonLuna
and Mars. Since the federalizationof the coloniesOLMA hastakenstepsto bringthe securityof
informationregardingspace operationstothese colonieswithinfederallymandatedguidelines.
The provisional securitycategoryof systemsinthisfunctionorcontainingthistype of informationishigh
accordingto defaultNISTguidance.The provisional impactforeachaxisis:
 Confidentiality:Low(See Note Below)
 Integrity:High
 Availability:High
OLMA recommendsthatthe provisional confidentialityimpactforspace operations information,and
therefore space operationsrelatedinformationsystems,to be moderate.While notall information
regardingthe off worldcoloniesisclassifiedanyinformationregardingspace operations,especially
regardingthe SaganSpace Center(SSC) inAntarctica,isparticularlytellingandcouldleadtofurther
unwantedinquiriesthatmaycompromise the secrecyof the OLMA’smission.
The above informationregardingthisinformationtype wasdrawnfromNISTSP800-60 Vol 2, section
D.11.4, onpage 158. For more detailsaboutthistype of informationplease refertothatdocument.
Agency System Security Authorization Program 13
SpaceExplorationand Innovation InformationType
Informationregardinginnovationanddevelopmentof technologiesandknowledge relatedtospace,
space basedtransportation,andthe explorationof space.
The OLMA isdirectly engagedtosupportoff word Lunar andMartian colonistsintheirpursuittofurther
researchand developmentof technologies inextra-terrestrialenvironments.Whilemostresearchis
conductedwithinplanetaryormoonbasedboundariesitisstill consideredtofall withinthisinformation
type due to the heavylevel of interactionthe off worldcolonistshave withouterspace andregions
where there islittle tonoboundarybetweenthe surface andspace,suchas on the surface of Luna.
The provisional securitycategoryof systemsinthisfunctionorcontainingthistype of informationis
moderate accordingtodefaultNISTguidance.The provisional impactforeachaxisis:
 Confidentiality:Low (See Below)
 Integrity:Moderate
 Availability:Low
OLMA recommendsthatthe provisional confidentialityimpactforspace explorationandinnovation
shouldbe moderate. The technologiesresearchedonthe off worldcoloniesare,insome cases,
extremelydangerousorunacceptablewithinthe currentsocial andcultural climate.Detailedknowledge
of suchresearcheffortscouldhave a seriousadverse effectonthe missionof the OLMA.
The above informationregardingthisinformationtype wasdrawnfromNISTSP800-60 Vol 2, section
D.12.2, onpage 202. For more detailsaboutthistype of informationplease refertothatdocument.
CivilianOperations InformationType
Thisinformationtype describesthe provisioningof non-militaryservice byfederal government
employees.
Agency System Security Authorization Program 14
The personnel conductingeffortsandresearchonthe off worldcoloniesare primarilycivilianwith
guidance,direction,andsupportfromthe OLMA, whichisa militaryagency.Thoughnotalwaysthe case
mostsupportoperationsare conductedperdirectionof the OLMA whichresearchandscientificefforts
are directedbycivilianoperations.
Informationabout CivilianOperations isavehicle bywhichthe federal governmentprovidesservicesto
the citizensof the off worldcolonies underthe care of the OLMA. Thisinformationtype isessentiallya
meansof deliveryforothermission-basedservicesinformationandsubjecttothe provisional security
categoryand impactlevelsdescribedforeachof those servicesasdescribedinNISTSP800-60 Revision
1, Volume 2.
InformationSecurityInformationType
All functionsregardingaddressingthe securityneedsof federalinformationsystemsfallunderthe
informationsecurityinformationtype.Thisincludesbutisnotlimitedtocreationof securitypolicies,
guidelines,procedures,securitycontrolsregardingauthentication,authorization,investigations,non-
repudiation,andriskdetermination.
While notof great concernin the past,the recentactionsof native Martiansregardingcolonial
separationhave spurredthe developmentandenforcementof ITSecuritypoliciesandprocedures
specifictothe off worldcolonies underthe OLMA’sguidance.
The provisional securitycategoryof systemsinthisfunctionorcontainingthistype of informationis
moderate accordingtodefaultNISTguidance.The provisional impactforeachaxisis:
 Confidentiality:Low
 Integrity:Moderate
 Availability:Low
Agency System Security Authorization Program 15
The above informationregardingthisinformationtype wasdrawnfromNISTSP800-60 Vol 2, section
C.3.5.5, on page 96. For more detailsaboutthistype of informationplease refertothatdocument.
Security Controls
FIPSPublication200: MinimumSecurityRequirementsforFederal Information and Information Systems,
establishes the minimumrequirementsforthe securityof federal informationsystems overseventeen
differentareas.The minimumrequirements forthese areas are metby implementingandexercising
securitycontrolsasdescribedinNIST SP800-53 Revision3:Recommended Security ControlsforFederal
Information Systems applicable withineachof those areas.
Control selectionisdone inconsiderationof the securitycategoryof the informationsystemand
determinedlevel of impactof the informationalongthe three axesof confidentiality,integrity,and
availability.Thisisdone bymeansof anestablishedbaselinesetof controls whichrepresentthe
minimumcontrolsrequiredtoadequatelysecure the informationsystem.These controlsmustalso then
be appropriatelytailored,ormodifiedforuse onthe informationsystemaccordingtoitsoperational
scope and functional purpose.
As definedinFIPS200 securitycontrol selectionbasedoninformationsystemimpactisdone inthe
followingmanner:
 Low-impactinformationsystemsmust,atminimum, use securitycontrolsfromthe low baseline
setof controls.
 Medium-impactinformationsystemsmust,atminimum, use securitycontrolsfromthe medium
baseline setof controls.
 High-impactinformationsystemsmust,atminimum, use securitycontrolsfromthe high
baseline setof controls.
For eachof the seventeensecurityareas thatFIPS200 has identifiedNISTSP800-53 lists,amongstother
controlsspecifictoeacharea, governance basedcontrolsthatare bothcommonto all areas and
Agency System Security Authorization Program 16
consistentlywithinthe highestprioritygrouping.Whilenotexplicitlymentionedascontrolsof note
belowthe sectionbelowthese,“policyandprocedure”controlsare exercisesforeachof these security
areas at the OLMA, as governance createsthe foundationand authorityuponwiththe implementation
and exercise of othercontrolsrelies. More informationonpolicyandprocedure controls andtheir
implementation foreachof the seventeensecurityareascanbe foundintheirrespective sectionsof the
Office forLunar andMartian Affairs securitypolicydocuments (OLMA, STIMU DocumentLibrary).
While manydifferentsecuritycontrolsmaybe deployedonthe informationsystemsthe OLMA there are
some of note withineachcategorythat may require special consideration orsupplemental guidance
basedon the missionandoperational requirementsunique tothisagency.
Access Control (AC)
The agency limitsaccesstoinformationsystemssuchthatonlyauthorizedusers,theirprocesses,or
knowndevicescanutilize these appropriate informational resources.
AC-2AccountManagement
Thiscontrol requiresthatthe agencymanage information systemaccountsbyidentifyingaccounttypes,
groupmemberships,accessprivileges,managingaccountlifecycle,reviewingaccounts,andgranting
access basedonvalidauthorization.
Due to the nature of some of the systemsthatthe OLMA manages,including life supportandaccessto
sensitivescientificinformation,itisimperative thataccountsare managed,tracked,andprovisioned
appropriately.Asoff-worldcolonistsrarely,if ever,returntoEarth the terminationof theiraccountsis
generallyonlydone atthe time of theirretirement,death,ortransfertoan unrelatedsystemwiththeir
ownseparate account managementsystem.
Control Reference:NISTAP800-53 Revision3,Page I-5
Agency System Security Authorization Program 17
AC-18WirelessAccess
Wirelessaccesscontrol createsguidance forthe implementationof wirelesscommunicationssystems,
monitorsthose systemsforunauthorizedaccess,authorizesaccess,andenforcesotherrequirements.
While manywirelesscommunicationssystemsare usedbythe OLMA it isimportantto note that the lack
of a magnetosphereonLunaand Mars presentssome technical hurdlesnotfoundintraditional long
range wirelesscommunicationsimplementations,possiblyallowingforthe range of the signalstobe
modifieddependingonthe technologyusedtoeitherfurtherlimitthe use of communicationsorinthe
signalsradiatingbeyondexpectedboundaries.Inthe lattercase thismayleadto a lossof confidentiality
and care shouldbe exercised.
Control Reference:NISTAP800-53 Revision3,Page I-6
Awareness and Training (AT)
The agency ensuresthatpersonnelare made aware of securityrisks,governance requirements,and
applicable procedureswhile alsobeingadequatelytrainedtocarryout theirsecurityrelatedfunctions.
AT-2SecurityAwareness
All newusersare givena basicsecurityawarenesstraining.Existingusersare givensupplemental
trainingperiodicallyorwhenconditionsarise whichwarrantit.Thistrainingincludesinformationabout
the needforsecurityprogramsas well asactionstheycan take themselvesin ordertoensure or
promote a secure environment.Thiscaninclude techniquessuchasuse of posters,communicationsand
newsarticles,remindersoncomputerscreens,andeventsdesignedtopromote securityawarenesssuch
as seminarsorsimulations.
Thiscontrol and agencyspecificreasoningisrelatedtocontrol IR-2IncidentResponse Training.
Agency System Security Authorization Program 18
Control Reference:NISTAP800-53 Revision3,Page F-21
Audit and Accountability (AU)
The agency monitorsandcollectsinformationsystemauditrecordssufficientforpurposesof analysis
and investigationof impactful securityevents.
AU-2AuditableEvents
Informationsystemsmustbe capable of auditingaspecifiedsetof eventsdefinedbythe agency.
The OLMA placesemphasisonauditingeventsassociatedwithenvironmental controlsthathave the
potential toeitherplace apersonintoimmediate danger,suchasan airlockopeningorclosing,and
eventswhichhave the potentialtoplace multiple peopleingreatdangeraftera periodof time,suchas
a leakinan atmosphericseal.The abilitytotrackthese eventsandgatherinformationaboutthemis
paramountto the safetyof the off worldcolonistsunderthe OLMA’sgovernance.
Control Reference:NISTAP800-53 Revision3,Page F-24
AU-13MonitoringforInformationDisclosure
The agency monitorsavailable sourcesof informationforevidence of unauthorizedinformationleakage.
Much of the work happeningatthe off wordcoloniesunderthe OLMA’sguidance isconfidential and
couldpose a dangerto the missionandfunction of the scientificcoloniesonLunaand Mars if exposed.
Because of thisOLMA has dictated,asone of itssecurityfunctions,thatopensourcesof information
such as the internetortelevisionbe monitoredforinformationwhichmayreveal orleadtobe revealed
the importantworkbeingdone inthe off worldcolonies.
Control Reference:NISTAP800-53 Revision3,Page F-31
Agency System Security Authorization Program 19
Certification, Accreditation, and Security Assessments (CA)
The agency periodicallyassesses the effectivenessof securitycontrolson informationsystemsto
determine theirlevel of effectiveness.
CA-5Planof ActionandMilestones
Whennecessarythe agencywill developaPlanof Actionand Milestones (POA&M) documenttotrack
remediationeffortsforweaknessesidentifiedinits informationsystemssuchasvulnerabilitiesor
misconfigurations.
The POA&Mdocumentisan essential partof the systemauthorizationprocessemployedbythe OLMA,
whichisin turnbasedon standardsestablishedby NISTSP800-37 Revision3:Guide forApplying theRisk
ManagementFrameworkto FederalInformation Systems.Seesection3.5,step5.1 of the Risk
ManagementFrameworkformore information.
Control Reference:NISTAP800-53 Revision3,Page F-35
Configuration Management (CM)
The agency establishes andenforcesbaselinescontrolsandconfigurationsforitsinformationsystems
and maintainsandinventoryof those systems.
CM-2BaselineConfiguration
The agency creates,maintains,anddocumentsabaseline configurationforinformationsystems.
Standardizationcreatesabaselineof measurementfromwhichdeviationscanbe detectedand
resolved.Inhostile environmentwhere resources,eventime,are scarce it isimportantto be able to find
Agency System Security Authorization Program 20
and remediate problemsininformationsystemswhichmayresultinacompromise ordelayof the
missionof the OLMA.
Control Reference:NISTAP800-53 Revision3,Page F-38
Contingency Planning (CP)
The agency creates,maintains,andexercisesplansforresponsetoemergencysituations,
implementationof backupoperations,anddisasterrecoveryscenarios.
CP-2ContingencyPlan
Informationsystemsthatprovideessential functionsmusthave contingencyplansthatprovide for
recoveryviarecoverypointobjectives,recoverypriorities,metrics,definedrolesandresponsibilities,
contact information,abilitytomaintainessential functionsdespite disruption,andleadtowardsfull
informationsystemrecovery.
As the OLMA operatedinenvironmentshostiletolife itisof essentialimportance thatthe coloniesare
able to continue inthe eventof anincidentordisaster.The civiliancolonistsrelyonthe OLMA to
provide safetyandsecuritysothattheirfocuscan be onthe continuance of theirimportantwork.
Control Reference:NISTAP800-53 Revision3,Page F-47
Identification and Authentication (IA)
The agency identifiessystemdevices,users,andtheirprocessesandverifiestheiridentitiestogrant
themaccess toagency informationsystems.
IA-2 IdentificationandAuthentication(Organizational Users)
Informationsystemsmusthave the abilitytoidentifyagencypersonnel.
Agency System Security Authorization Program 21
The OLMA representsaunique partnershipbetweenthe civiliancolonistsof Lunaand Mars and the
UnitedStatesfederal government.Whilethe OLMA providesservicestothe coloniststheyare expected
to, inturn,work alongside the agency.Insome casesitisimportantthanan informationsystemmay
needtorespond or grant authorization differentlytoOLMA personnel thanitwouldtoa civiliancolonist
inorder to properly maintainthispartnership.Thiscontrol andreasoningare alsorelateddirectlyto
control IA-8 IdentificationandAuthentication(Non-Organizational Users).
Control Reference:NISTAP800-53 Revision3,Page F-54
Incident Response (IR)
The agency createsa processwhichincludespreparation,detection,analysis,containment,and
recoveryactivitiestorespondtoincidentswhichmayhave anegative impactonthe organization.These
incidentsare monitored,documented,andreportedtothe appropriate agencypersonnel or authorities.
IR-2 IncidentResponseTraining
As the resourcesonthe off worldcoloniesare spreadoverthe vastdistancesof space the OLMA holds
securityawareness andthe abilitytorespondtoanincidentare of high priority;eachpersonmustbe
responsible forthe securityof theirenvironmentandinformationsystemstosome degree asrapid
response maynotbe presentdue to eitherthe distance betweenphysical securityresourcesorthe time
it takesforcommunicationssignalstopassbetweencoloniesondifferentastral bodiesdependingon
theircurrentorbital positions.Forexample,itwill take onaverage between4and5 minutesforsignals
to travel betweenLunaandMars. Because of thisa certaindegree of self-reliance isnecessaryforall of
the OLMA’s personnel.
Thiscontrol and reasoningare relatedtocontrol AT-2: SecurityAwareness.
Control Reference:NISTAP800-53 Revision3,Page F-61
Agency System Security Authorization Program 22
Maintenance (MA)
The agency performsperiodicmaintenance onitsinformationsystems andprovidesoversightonthe
tools,practices,andpeople involvedinthose maintenanceactivities.
MA-6TimelyMaintenance
Thiscontrol ensuresthatsupportor parts are available forinformationsystemswithinagiventime span
of failure.
As the OLMA overseesvariousenvironmental control systemsessential tolife onthe off worldcolonies
it isof highimportance thatmaintenance isperformedonaregularand timelybasis.Ingeneral systems
whichhave a higheravailabilityimpacthave alowerresponse time andfastertime tocompletionfor
maintenance activities.
Control Reference:NISTAP800-53 Revision3,Page F-70
Media Protection (MP)
The agency takesstepstoprotectboth analogand digital informationmedia,limitingaccesstothat
mediatoappropriate personnelanddestroyingthe mediawhere necessary.
MP-4MediaStorage
Thiscontrol dictatesthat storage mediaisto be storedsecurelyandprotectedfromdamage.
As boththe coloniesof Lunaand Mars lacka magnetosphere of Earth theyare subjecttoexposure to
varioussourcesof radiationandenergyfromspace.While mostof the coloniesare underground,
providingshieldingfromthese harmful sourcesof radiation,somepartsof themare exposed.Inall cases
any mediasubjectto damage frominterstellarradiation,suchasmagnetictapes,shouldbe storedin
properlyshieldedcontainers.
Agency System Security Authorization Program 23
Control Reference:NISTAP800-53 Revision3,Page F-72
Physical and Environmental Protection (PE)
The agency limitsphysicalaccesstoits informational resources,protectsphysical informationsystem
componentsandinfrastructure,andprovidesenvironmentalcontrolsforfacilitieswherethose
informationsystemsare located.
PE-11EmergencyPower
Short termpowerisavailable tofacilitatethe propershutdownof aninformationsystem.Insome cases
longtermemergencypowersuppliesmaybe necessary.
Informationsystemsmaintainedbythe OLMA may be performingimportantscientificcalculations,
simulations,orsupportslife sustainingenvironmental function.The higherthe securitycategoryof an
informationsystemthe longeranemergencypowersupply shouldbe able tooperate foruntil normal
operationsare restored.
Control Reference:NISTAP800-53 Revision3,Page F-81
Planning (PL)
The agency develops,revises,andexercisessecurityplansforinformationsystemswhichdescribethe
use of securitycontrolsandbehaviorrequirementsforassignedpersonell.
PL-2 SystemSecurityPlan
The agency createsa securityplanforan informationsystemthatdefinesboundaries,categorization
rationale,requirements,relationshipstoothersystems,anddescribesexistingsecuritycontrolsalready
inplace.
Agency System Security Authorization Program 24
Thisplanis reviewedandapprovedbythe authorizingofficialduringthe systemauthorizationprocess.
Control Reference:NISTAP800-53 Revision3,Page F-85
Personnel Security (PS)
The agency takesstepstoensure the trustworthinessof peopleinpositionsof responsibilityandthe
securityof informationsystemsinuse bythose people.When necessary,formal actionistakenagainst
personnel whohave violatedagencysecuritypolicies.
PS-3Personnel Screening
Thiscontrol dictatesthat potential employeesare screenedpriortogainingauthorizationtoagency
informationsystemsandrescreened whencertainconditionsare met.
The OLMA musttake great care inensuringthatit can trustsits personnel due tothe secretiveand
impactful nature of the workbeingdone underitspurview.Inadditional tobackgroundchecksto
ensure a historyof trustworthinessfurtherbehavioral analysisbasedinterviewtechniquesare used
duringany screeningprocess,bothinitial andsubsequent.
Control Reference:NISTAP800-53 Revision3,Page F-89
Risk Assessment (RA)
The agency periodicallyassessesthe risk toitspeople,assets,andinformationsystems.
RA-2SecurityCategorization
The informationandinformationsystemswithinthe responsibilityof the agencyare categorizedin
accordance withfederal lawsandstandards.
Agency System Security Authorization Program 25
Categorizationisthe firststepof the RiskManagementframeworkdescribedinNISTSP800-37 Revision
3. The OLMA followsthisprocessameanstoproperlydetect,manage,andremediateriskonits
informationsystems.
Control Reference:NISTAP800-53 Revision3,Page F-92
RA-3RiskAssessment
The agency performsaformalizedassessmentof riskpresentonaninformationsystem,reviewsthe
results,andperformsperiodicupdatesof the assessments.
A riskassessmentisauseful tool whendone asapart of the risk managementframeworkandits
associatedprocesses.AccordingtoNISTSP800-37 Revision3,“a risk assessmentguidesthe
prioritizationprocessforitemsincludedinthe planof actionandmilestones.”
Guidance onrisk assessmentscanbe foundinNISTSP800-30 Revision1:Guide forConducting Risk
Assessments.
Control Reference:NISTAP800-53 Revision3,Page F-93
System and Services Acquisition (SA)
The agency allocatessufficientresourcestoprovide adequateprotectiontoitsinformationsystems,
utilizesasystemsdevelopmentlifecycle thataddressessecurityconcerns,andmonitorsthe use of
software.
SA-2AllocationofResources
The agency determinesthe resourcesrequiredtoimplementthe securitycontrolsnecessarytoprovide
an informationsystemwithadequatesecurity.
Agency System Security Authorization Program 26
As resourcesinthe off worldcoloniesare extremelylimiteditisimportanttobe able toknow exactly
howmany will be requiredbythe securitycontrolsassignedforuse onthat system.ColoniesonLuna
may have more immediate accesstoresourcesfromEarth,while resource scarcityonMars isalwaysan
issue.Inmanycasesthe coloniesmustbe self-sufficientwithanyadditional resourcesfromEarthseen
as unnecessarybutnotunwelcome.
Control Reference:NISTAP800-53 Revision3,Page F-96
System and Communications Protection (SC)
The agency monitors,controlsandprotectscommunicationof informationatkeypointsalongsystem
boundaries,bothexternal andinternal,andmakesuse of architectural,softwaredevelopment,and
engineeringtechniquesthat contribute tosecure informationtransmissionpractices.
DC-9TransmissionConfidentiality
Informationwithaconfidentialityrequirementmustbe protectedfromunauthorizeddisclosure while in
transit.
As muchof the OLMA’s workisdone in secretthe classificationof muchof the informationaboutthis
workalongthe confidentialitydimensionishigh.Encryptedcommunicationstunnels,especiallythose
for sharedcommunicationschannelssuchasthe mainbandusedby Mars andLuna to communicate
withSagan StationonEarth, mustbe used.
Thiscontrol and reasonare alsorelateddirectlytocontrol SC-28Protectionof InformationatRest.
Control Reference:NISTAP800-53 Revision3,Page F-112
Agency System Security Authorization Program 27
System and Information Integrity (SI)
The agency locates,reports, andremediatesinformationsystemflawsinatimelymanner,providing
protectionfrommaliciouscode,andmonitoringsecurityalertsandintelligence inordertofacilitate an
appropriate response.
SI-4 InformationSystemMonitoring
The agency tracks eventsoninformationsystemsinaccordance withitsobjectivesandisable todetect
informationsystemsattacks.
Thiscontrol and itsreasoningare directlyrelatedtocontrolsAU-2Auditable Eventsandcontrol AU-13
MonitoringforInformationDisclosure.
Control Reference:NISTAP800-53 Revision3,Page F-126
RiskAssessment
"I often say that when you can measure what you are speaking about, and express it in numbers, you
know something about it; but when you cannot express it in numbers, your knowledge is of a meagre
and unsatisfactory kind;itmay be thebeginning of knowledge, but you have scarcely, in your thoughts,
advanced to the stage of science, whatever the matter may be.” – William Thomson, Lord Kelvin
The OLMA measuresriskaccordingtothe followingconceptual formula:
Risk = Threat x Vulnerability x Impact
There are several variantsof the riskformulainuse throughoutthe securityindustry.Some risk
assessmentmodels,suchasthe NISTmodel,alsoinclude the likelihood of athreateventoccurringas a
componentof risk.Forthe purposesof the OLMA likelihoodisconsideredafactorof threatand will be
includedthereinasmanyof our assessmenttoolsalreadyuse thismethodology.
Agency System Security Authorization Program 28
The resultsof a riskassessment,includingsource documentsforeachcomponentof the riskformula,
are thendocumentedforlaterreference throughoutthe RiskManagementFramework.
The components of thisformulaare definedinNISTSP800-30 Revision1:
Threat
“Any circumstanceor eventwith the potentialto adversely impactorganizationaloperationsand assets,
individuals,otherorganizations…through an information systemvia unauthorized access,destruction,
disclosure,or modification of information,and/ordenialof service.”
Thisvalue istypicallyprovidedforusbyautomatedvulnerabilityscannersandstoredinreports
generatedbythose scanners.Sourcesof threatsmaybe intentional,accidental,orenvironmental.
Vulnerability
“A weaknessin an information system,system,security procedures,internal controls,orimplementation
thatcould be exploited by a threatsource.”
Thisvalue istypicallyprovidedforusbyautomatedvulnerabilityscannersandstoredinreports
generatedbythose scanners.
Impact
“The level of impactfroma threat eventis the magnitudeof harmthatcan be expected to resultfrom
the consequencesof unauthorized disclosureof information,unauthorized modificationof information,
unauthorized destruction of information,orlossof information orinformation systemavailability.”
It shouldbe notedthatimpactis partiallydefinedbythe thingbeingaffectedbythe threatand
vulnerability.Thatis,noexternal source canautomaticallytell uswhatthe impactonour own
environmentwillbe because itisoursandunique to its use andpositionwithinthe OLMA.
Agency System Security Authorization Program 29
The classificationof the informationpresentonorusedby an informationsystemcanbe usedto help
determine thisvalue.Informationof ahighersecuritycategoryshouldbe representedashavinga
greaterlevel of impacton the level of riskdetermined.
A Note on Measurement
Measurementsof componentsof riskforthe OLMA’sinformationsystemsare gatheredaccordingtoa
0.0 to 10.0 scale.If these valuesare goingtobe usedinothercalculationstheyshouldbe keptonthis
scale to preserve likenessandprecision. Resultsof calculations,foruse inreportsor presentations,can
be translatedintootherscalesasneeded,suchasthe 1-5 scale usedby mostcorporate riskassessment
methodologiesorthe 1-3 scale usedbysome federal agenciesorthe CVSS2.0 ratingsystem.
For our purposesvaluesshowninreportswill use the followingscale:
Rating Scale (0-5)
None
Very Low
Low
Medium
High
Critical
System Security Authorization
Step5 of the RiskManagementFramework isthe authorizationof aninformationsystembasedupona
determinationof the riskpresentonthatsystem. Thisisaddressedbyseveral tasks,eachof whichisalso
representedbyacorrespondingsecuritycontrol.
Plan of Action and Milestones
The Planof Actionand Milestones (POA&M) document describesactionsnecessaryto addressand
correct weaknesses inthe securitycontrolsused onaninformation systemorthe vulnerabilities onthe
Agency System Security Authorization Program 30
informationsystem whichthose securitycontrolsdonotadequatelyaddress.The documentthen
describesthe issuesandtaskstoremediate those issues,the resourcesnecessarytodoso,and any
milestones metduringthe course of completionof the plan.
Riskassessmentsare usedtoassignprioritytothese tasksbasedonthe issuestheyaddressandhelpto
guide time requirementsforcompletionof tasks. Control RA-3RiskAssessmentrepresentsthe
correspondingsecuritycontrol forthisstep.
The correspondingsecuritycontrol forthisstepis CA-5Planof Actionand Milestones.The OLMA
specificreasoningandconsiderationscanbe foundinthe correspondingsectionof thisdocument.
Reference:NISTSP800-37 Revision1,Page 34
Security Authorization Package
The POA&M, alongwiththe securityassessmentdocumentandthe securityplancreatedduringearlier
stepsof the Risk ManagementFrameworkprocess,isusedtocomplete the securityauthorization
package.The Authorizingofficial canuse the informationinthispackage to conductfurtheranalysis
basedon the vulnerabilities,threats,andimpactdescribedthereintomake adeterminationof risk.The
authorizingofficial canrequestadditional informationtoaddto the authorizationpackage asnecessary
inorder to make a more accurate determinationof risk.
The securityplanis relatedtocontrol PL-2 SystemSecurityPlan.The security assessmentis relatedto
control CA-2 SecurityAssessments. More informationonsecuritycontrolsnotexplicitlydescribedinthis
documentare describedinNISTSP800-53 Revision3.
Reference:NISTSP800-37 Revision1,Page 34
Agency System Security Authorization Program 31
Risk Determination
The authorizingofficial,workingwiththe seniorinformationsecurityofficer asappropriate,reviewsthe
informationinthe authorizationpackage toexamine security controlscurrentlyinplace on the
informationsystem, determine the current level of riskpresent,andreview the recommendations
providedinthe POA&Mdocument.The currentrisklevel is determinedalongwithriskmitigation
strategies.Remainingriskiscomparedtothe level of acceptablerisktodetermineif furtheractionis
required.
The OLMA has determinedthataverylow level of risk,basedonthe five pointratingscale described
earlierinthisdocument, isacceptable tothe agencydue tothe heavyreliance of the missionand
functionof the agencyon informationtechnology.
Reference:NISTSP800-37 Revision1,Page 35
Risk Acceptance
It isthe authorizingofficial’s role todetermine if the risktothe mission,function,image,reputation,
assets,people,ororganizationsisacceptable withinthe boundssetbythe OLMA’sriskpolicies while
weighingthisrisk againstcontinuedoperationalandmissiondemandsplacedonthe system. This
decisionisdocumentedinthe authorizationdecisiondocument detailingthe final decisionof the
authorizingofficial regardingthe acceptance of riskassociatedwiththisinformationsystemandif that
systemisauthorizedto beginorcontinue operations.Termsandconditionsmayalsobe includedinthis
document,providingforspecial casesforuse ordescribinglimitsonuse of the informationsystem.This
documentalsodescribesthe periodof expirationof thisauthorization,promptinganotherauthorizing
reviewtotake place.Thisinformationisthengiventothe systemownerandsecuritycontrol provideras
well asotherpartiesas necessary.
Agency System Security Authorization Program 32
Reference:Reference:NISTSP800-37 Revision1,Page 35
InformationSystem Monitoring
Because people and resourcesare relativelyscarce onoff worldcoloniesthe OLMA reliesheavilyon
automationandautomatedprocessedtomonitorthe securityof itsinformationsystems. NISTSP800-
137 AppendixDdescribesseveral typesof toolsthat,whendeployedappropriatelyandwithoversight
of humanexpertise,are usefulinsystemmonitoringpractices.
Asset Management
These toolsletsecurityanalysisknowwhatsystemsare presentintheirenvironment.Thisisthe
foundationof anefforttosecure all of the systemsinanorganization,assecuritycontrolscannotbe
deployedtosystemsif youdon’tknowwhatsystemsyouhave inthe firstplace,especiallyif the
environmentissolarge or widespreadthananaccurate and timelymanual inventorywouldbe
impossible.
Configuration Management
Centralizedconfigurationmanagementallowsadministratorstodeployconsistentsettingstomany
categoriesof systemssimultaneously,ensuringcompliance withpre-establishedparametersassecurity
controls.Thistool can alsofind deviationsinsettingsfromthe establishednormal identifyingthese
flawedsecuritycontrol deploymentsinreal time and,inmanycases,correct themautomatically.
Event and Incident Management
These toolsare usedto gatherinformationaboutspecific occurrenceshappeningona givensystem,
such as detectionof attacksbasedonknownsignatures,systembehavioral patterns,orotherlogsof
activity.If there isa commoncause to particularsetsof behaviorthe informationcanbe organizedasan
incidentenablingforcommonreference of relatedevents.
Agency System Security Authorization Program 33
Information Management
The securitycategoryof a systemisdeterminedbythe type of dataon that system.Information
managementtoolsare able totrack thisinformationandhow itmovesoverthe network, possibly
preventinginformationleakage andallowingthe securityteamtoidentifythe sensitivityof agiven
systembasedonthe type of informationpresentonthatsystem.
License Management
License managementcandetectthe numberof installationsof anapplicationinthe environmentand
compare thisagainstthe numberwhichthe organizationisallowedorhaspurchased.Thisallowsfor
avoidance of feesorlegal actionbythe software distributorbydetectingthisdeviationandenablingthe
securityteamto correctit, or by preventingthe installationof the unlicensedsoftware inthe firstplace.
Malware Detection
Symanteccorporationdefines Malware as,“a categoryof maliciouscode thatincludesviruses,worms,
and Trojanhorses.”Thistool is used tofindsuch software and,inmanycases,take a predetermined
actionagainstit, enablingforreal-time protectionof asystemandmitigationof the riskcreatedbythe
malware threat.
Network Management
Networkmanagementtoolsallow fordiscoveryof new hostsonthe networkandmonitoringof traffic.
These toolsallowforreal time discoveryof systemsonthe networkwhichare notinthe inventoryof
allowedsystemsornetworkdevices.
Software Assurance
Thisset of toolsallowsforthe analysisof software behaviorenablinganorganizationtoverifythe
trustworthinessof anapplication.Forsoftware developedinternallythiscanbe utilizedaspartof the
software developmentcycle toimprove onthe securitycompliance of anapplication.
Agency System Security Authorization Program 34
Vulnerability and Patch Management
These toolsscansystemstodetectsoftware flawsordetermine if asoftware update isavailableand
neededtoaddressaknownissue.These toolscanallow forquickdiscoveryof suchissuesthrough
regularlyscheduledscansandremediationviapre-determinedpatchingmechanisms.
Agency System Security Authorization Program 35
References
1. E-GovernmentActof 2002. Pub.L. No. 347.107, Stat. 2899, P.116. RetrievedJanuary2015 from
U.S. GovernmentPrintingOfficeat: http://www.gpo.gov/fdsys/pkg/PLAW-
107publ347/html/PLAW-107publ347.htm
2. Mell,P.,Scarfone,K.,Romanosky S.(2007 January).A Complete Guide tothe Common
VulnerabilityScoringSystemVersion2.0.RetrievedMarch2015 fromFirstat
https://www.first.org/cvss/cvss-guide.pdf
3. National Institute of StandardsandTechnology.(2014 April 1). FISMA – Detailed Overview.
RetrievedJanuary2015 from NISTat: http://csrc.nist.gov/groups/SMA/fisma/overview.html
4. National Institute of Standardsand Technology.(2004 February). FederalInformation Processing
StandardsPublication:StandardsforSecurity Categorization of FederalInformation and
Information Systems.RetrievedFebruary2015 fromNIST at:
http://csrc.nist.gov/publications/fips/fips199/FIPS-PUB-199-final.pdf
5. National Institute of StandardsandTechnology.(2006 March). FederalInformation Processing
StandardsPublication:MinimumSecurity Requirementsfor FederalInformation and Information
Systems.RetrievedMarch2015 fromNIST at:
http://csrc.nist.gov/publications/fips/fips200/FIPS-200-final-march.pdf
6. National Institute of StandardsandTechnology.(2015 January28). NIST ComputerSecurity
Publications - NIST SpecialPublications(SPs).RetrievedMarch2015 from
http://csrc.nist.gov/publications/PubsSPs.html
7. National Institute of StandardsandTechnology.(2010 February). NISTSpecialPublication 800-37
Revision 1: Guide forApplying theRisk ManagementFrameworkto FederalInformation Systems.
RetrievedFebruary2015 fromNISTat: http://csrc.nist.gov/publications/nistpubs/800-37-
rev1/sp800-37-rev1-final.pdf
Agency System Security Authorization Program 36
8. National Institute of StandardsandTechnology.(2013 April). NISTSpecialPublication 800-53
Revision 4: Security and Privacy ControlsforFederalInformation Systemsand Organizations.
RetrievedFebruary2015 fromNISTat:
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf
9. National Institute of StandardsandTechnology.(2003 August). NISTSpecialPublication 800-59:
Guideline for Identifying an Information Systemasa NationalSecurity System.RetrievedMarch
2015 fromNIST at: http://csrc.nist.gov/publications/nistpubs/800-59/SP800-59.pdf
10. National Institute of StandardsandTechnology.(2008 August). NISTSpecialPublication 800-60
Revision 1: Volume1: Guide for Mapping Typesof Informationand Information Systemsto
SecurityCategories.RetrievedFebruary2015 fromNISTat:
http://csrc.nist.gov/publications/nistpubs/800-60-rev1/SP800-60_Vol1-Rev1.pdf
11. National Institute of StandardsandTechnology.(2008 August). NISTSpecialPublication 800-60
Revision 1: Volume2: Appendicesto Guide for Mapping Typesof Informationand Information
Systemsto Security Categories.RetrievedFebruary2015 fromNISTat:
http://csrc.nist.gov/publications/nistpubs/800-60-rev1/SP800-60_Vol2-Rev1.pdf
12. Nicolen,Shawn.(2015March 21). OLMA STIMU:Stuff ThatIMadeUp.Personal Interview,
March 2015.
13. Office andManagementandBudget.(1996 February8). CIRCULARNO.A-130. RetrievedMarch
2015 fromthe OMB at: https://www.whitehouse.gov/omb/circulars_a130
14. Office of the PressSecretary.(2009 December29). Executive Order13526- ClassifiedNational
SecurityInformation.RetrievedMarch2015 from The White House at:
https://www.whitehouse.gov/the-press-office/executive-order-classified-national-security-
information
15. Symantec. Malware- MaliciousVirus CodeDetection - Trojan - Trojan Horse.Retrieved March
2015 fromNortonat: http://us.norton.com/security_response/malware.jsp

More Related Content

What's hot

Critical Success Factors in Implementation of ERP Systems
Critical Success Factors in Implementation of ERP SystemsCritical Success Factors in Implementation of ERP Systems
Critical Success Factors in Implementation of ERP SystemsStephen Coady
 
A practical guide for health researchers
A practical guide  for health researchersA practical guide  for health researchers
A practical guide for health researchersAbdulwahab Elroubat
 
A review of emerging technologies for food refrigeration applications
A review of emerging technologies for food refrigeration applicationsA review of emerging technologies for food refrigeration applications
A review of emerging technologies for food refrigeration applicationsYaniraCParedes
 
White Paper Oracle Subledger Accounting
White Paper Oracle Subledger AccountingWhite Paper Oracle Subledger Accounting
White Paper Oracle Subledger AccountingSandeep Vantmuriswami
 
Wessex AHSN Business Plan 2021-22
Wessex AHSN Business Plan 2021-22Wessex AHSN Business Plan 2021-22
Wessex AHSN Business Plan 2021-22Wessex AHSN
 
Trimble total station help
Trimble total station helpTrimble total station help
Trimble total station helpGonçalo Beja
 
Wireless Geolocation
Wireless GeolocationWireless Geolocation
Wireless GeolocationFatema Zohora
 
FasterCures-GivingSmarter-Alzheimers-April2015
FasterCures-GivingSmarter-Alzheimers-April2015FasterCures-GivingSmarter-Alzheimers-April2015
FasterCures-GivingSmarter-Alzheimers-April2015LaTese Briggs, Ph.D.
 
Alecinflorida
AlecinfloridaAlecinflorida
AlecinfloridaDeepDude
 
District Profile of Pakistan
District Profile of PakistanDistrict Profile of Pakistan
District Profile of Pakistanasifjaved04
 
Standards, Legal and Privacy aspects for IoT
Standards, Legal and Privacy aspects for IoTStandards, Legal and Privacy aspects for IoT
Standards, Legal and Privacy aspects for IoTIET India
 
WebIT2 Consultants Proposal
WebIT2 Consultants ProposalWebIT2 Consultants Proposal
WebIT2 Consultants ProposalSarah Killey
 

What's hot (18)

Critical Success Factors in Implementation of ERP Systems
Critical Success Factors in Implementation of ERP SystemsCritical Success Factors in Implementation of ERP Systems
Critical Success Factors in Implementation of ERP Systems
 
A practical guide for health researchers
A practical guide  for health researchersA practical guide  for health researchers
A practical guide for health researchers
 
A review of emerging technologies for food refrigeration applications
A review of emerging technologies for food refrigeration applicationsA review of emerging technologies for food refrigeration applications
A review of emerging technologies for food refrigeration applications
 
White Paper Oracle Subledger Accounting
White Paper Oracle Subledger AccountingWhite Paper Oracle Subledger Accounting
White Paper Oracle Subledger Accounting
 
Wessex AHSN Business Plan 2021-22
Wessex AHSN Business Plan 2021-22Wessex AHSN Business Plan 2021-22
Wessex AHSN Business Plan 2021-22
 
Trimble total station help
Trimble total station helpTrimble total station help
Trimble total station help
 
Wireless Geolocation
Wireless GeolocationWireless Geolocation
Wireless Geolocation
 
Enrollment Management Plan
Enrollment Management PlanEnrollment Management Plan
Enrollment Management Plan
 
FasterCures-GivingSmarter-Alzheimers-April2015
FasterCures-GivingSmarter-Alzheimers-April2015FasterCures-GivingSmarter-Alzheimers-April2015
FasterCures-GivingSmarter-Alzheimers-April2015
 
Alecinflorida
AlecinfloridaAlecinflorida
Alecinflorida
 
District Profile of Pakistan
District Profile of PakistanDistrict Profile of Pakistan
District Profile of Pakistan
 
Binder1.compressed
Binder1.compressedBinder1.compressed
Binder1.compressed
 
Binder2
Binder2Binder2
Binder2
 
Car hacking
Car hackingCar hacking
Car hacking
 
Standards, Legal and Privacy aspects for IoT
Standards, Legal and Privacy aspects for IoTStandards, Legal and Privacy aspects for IoT
Standards, Legal and Privacy aspects for IoT
 
1236
12361236
1236
 
SEO Strategic Plan
SEO Strategic PlanSEO Strategic Plan
SEO Strategic Plan
 
WebIT2 Consultants Proposal
WebIT2 Consultants ProposalWebIT2 Consultants Proposal
WebIT2 Consultants Proposal
 

Viewers also liked

ΑΡΓΥΡΟΠΕΛΕΚΑΝΟΣ ΣΤ'1
ΑΡΓΥΡΟΠΕΛΕΚΑΝΟΣ ΣΤ'1ΑΡΓΥΡΟΠΕΛΕΚΑΝΟΣ ΣΤ'1
ΑΡΓΥΡΟΠΕΛΕΚΑΝΟΣ ΣΤ'113ouser9
 
Case study on the great escape
Case study on the great escapeCase study on the great escape
Case study on the great escapeDhanalaxmi Bhat
 
The woman in black
The woman in blackThe woman in black
The woman in blacktomclark94
 
OLD SHORT- Yleo everyday oils class powerpoint
OLD SHORT- Yleo everyday oils class powerpointOLD SHORT- Yleo everyday oils class powerpoint
OLD SHORT- Yleo everyday oils class powerpointKayla Lain
 
Cook_Presentation
Cook_PresentationCook_Presentation
Cook_Presentationcookmat7
 
Keolis Group At A Glance
Keolis Group At A GlanceKeolis Group At A Glance
Keolis Group At A GlanceKeolis
 
Журнал дело №7 за август 2014 О перспективах развития самары
Журнал дело №7 за август 2014 О перспективах развития самарыЖурнал дело №7 за август 2014 О перспективах развития самары
Журнал дело №7 за август 2014 О перспективах развития самарыSamara Strategia
 

Viewers also liked (20)

ΑΡΓΥΡΟΠΕΛΕΚΑΝΟΣ ΣΤ'1
ΑΡΓΥΡΟΠΕΛΕΚΑΝΟΣ ΣΤ'1ΑΡΓΥΡΟΠΕΛΕΚΑΝΟΣ ΣΤ'1
ΑΡΓΥΡΟΠΕΛΕΚΑΝΟΣ ΣΤ'1
 
Diapositivas aida sarahi
Diapositivas aida sarahiDiapositivas aida sarahi
Diapositivas aida sarahi
 
Case study on the great escape
Case study on the great escapeCase study on the great escape
Case study on the great escape
 
The woman in black
The woman in blackThe woman in black
The woman in black
 
испарение
испарениеиспарение
испарение
 
испарение
испарениеиспарение
испарение
 
portfoliostudia
portfoliostudiaportfoliostudia
portfoliostudia
 
OLD SHORT- Yleo everyday oils class powerpoint
OLD SHORT- Yleo everyday oils class powerpointOLD SHORT- Yleo everyday oils class powerpoint
OLD SHORT- Yleo everyday oils class powerpoint
 
Costumes & Props
Costumes & PropsCostumes & Props
Costumes & Props
 
Dirty dog 1r a
Dirty dog 1r aDirty dog 1r a
Dirty dog 1r a
 
SafePRO
SafePROSafePRO
SafePRO
 
26112014
2611201426112014
26112014
 
Lucy
LucyLucy
Lucy
 
Dirty dog 1r a
Dirty dog 1r aDirty dog 1r a
Dirty dog 1r a
 
programgurt
programgurtprogramgurt
programgurt
 
Cook_Presentation
Cook_PresentationCook_Presentation
Cook_Presentation
 
Investigacion 3
Investigacion 3Investigacion 3
Investigacion 3
 
Keolis Group At A Glance
Keolis Group At A GlanceKeolis Group At A Glance
Keolis Group At A Glance
 
Журнал дело №7 за август 2014 О перспективах развития самары
Журнал дело №7 за август 2014 О перспективах развития самарыЖурнал дело №7 за август 2014 О перспективах развития самары
Журнал дело №7 за август 2014 О перспективах развития самары
 
15122014
1512201415122014
15122014
 

Similar to Agency System Security Authorization Program Overview

Falcon Capital Partners - Physician RCM Industry Report
Falcon Capital Partners - Physician RCM Industry ReportFalcon Capital Partners - Physician RCM Industry Report
Falcon Capital Partners - Physician RCM Industry ReportJonathan Brallier
 
Transforming Healthcare with mHealth Solutions August 2011
Transforming Healthcare with mHealth Solutions August 2011Transforming Healthcare with mHealth Solutions August 2011
Transforming Healthcare with mHealth Solutions August 2011Carolyn Galvin
 
TDD EGH Item and Inventory Conversion-Sample
TDD EGH Item and Inventory Conversion-SampleTDD EGH Item and Inventory Conversion-Sample
TDD EGH Item and Inventory Conversion-SampleRyan Liebert
 
How To View Current Execution Policy PowerShell
How To View Current Execution Policy PowerShellHow To View Current Execution Policy PowerShell
How To View Current Execution Policy PowerShellVCP Muthukrishna
 
2020 ccaf-3rd-global-cryptoasset-benchmarking-study
2020 ccaf-3rd-global-cryptoasset-benchmarking-study2020 ccaf-3rd-global-cryptoasset-benchmarking-study
2020 ccaf-3rd-global-cryptoasset-benchmarking-studyLoeb Smith Attorneys
 
Informatica installation guide
Informatica installation guideInformatica installation guide
Informatica installation guidecbosepandian
 
Instructor utilities guide
Instructor utilities guideInstructor utilities guide
Instructor utilities guideapaezgonzal
 
1ux2y54tcwomq2gtx7pd
1ux2y54tcwomq2gtx7pd1ux2y54tcwomq2gtx7pd
1ux2y54tcwomq2gtx7pdJuanfe1978
 
Putting Together the Pieces - The S&OP Technology Landscape - 20 AUG 2015
Putting Together the Pieces - The S&OP Technology Landscape - 20 AUG 2015Putting Together the Pieces - The S&OP Technology Landscape - 20 AUG 2015
Putting Together the Pieces - The S&OP Technology Landscape - 20 AUG 2015Lora Cecere
 
Eta nonfab-deploy-guide-2019oct
Eta nonfab-deploy-guide-2019octEta nonfab-deploy-guide-2019oct
Eta nonfab-deploy-guide-2019octssuserae99fb
 
Creating A Business Advantage With Offshore Resources
Creating A Business Advantage With Offshore ResourcesCreating A Business Advantage With Offshore Resources
Creating A Business Advantage With Offshore ResourcesKPI Partners
 
SOA A View from the Trenches
SOA A View from the TrenchesSOA A View from the Trenches
SOA A View from the TrenchesTim Vibbert
 
Oracle performance tuning
Oracle performance tuningOracle performance tuning
Oracle performance tuningvksgarg
 
Network and Communications Management
Network and Communications ManagementNetwork and Communications Management
Network and Communications ManagementLee Trieu
 
Network and Communications Management
Network and Communications ManagementNetwork and Communications Management
Network and Communications ManagementMarek Kotlinski
 
Google decode q3 2015 toc
Google decode q3 2015 tocGoogle decode q3 2015 toc
Google decode q3 2015 tocJoe Buzzanga
 

Similar to Agency System Security Authorization Program Overview (20)

Falcon Capital Partners - Physician RCM Industry Report
Falcon Capital Partners - Physician RCM Industry ReportFalcon Capital Partners - Physician RCM Industry Report
Falcon Capital Partners - Physician RCM Industry Report
 
Transforming Healthcare with mHealth Solutions August 2011
Transforming Healthcare with mHealth Solutions August 2011Transforming Healthcare with mHealth Solutions August 2011
Transforming Healthcare with mHealth Solutions August 2011
 
SystemProposal
SystemProposalSystemProposal
SystemProposal
 
TDD EGH Item and Inventory Conversion-Sample
TDD EGH Item and Inventory Conversion-SampleTDD EGH Item and Inventory Conversion-Sample
TDD EGH Item and Inventory Conversion-Sample
 
actix lte
actix lteactix lte
actix lte
 
How To View Current Execution Policy PowerShell
How To View Current Execution Policy PowerShellHow To View Current Execution Policy PowerShell
How To View Current Execution Policy PowerShell
 
Evaluating Your Program
Evaluating Your ProgramEvaluating Your Program
Evaluating Your Program
 
2020 ccaf-3rd-global-cryptoasset-benchmarking-study
2020 ccaf-3rd-global-cryptoasset-benchmarking-study2020 ccaf-3rd-global-cryptoasset-benchmarking-study
2020 ccaf-3rd-global-cryptoasset-benchmarking-study
 
Informatica installation guide
Informatica installation guideInformatica installation guide
Informatica installation guide
 
Instructor utilities guide
Instructor utilities guideInstructor utilities guide
Instructor utilities guide
 
1ux2y54tcwomq2gtx7pd
1ux2y54tcwomq2gtx7pd1ux2y54tcwomq2gtx7pd
1ux2y54tcwomq2gtx7pd
 
Putting Together the Pieces - The S&OP Technology Landscape - 20 AUG 2015
Putting Together the Pieces - The S&OP Technology Landscape - 20 AUG 2015Putting Together the Pieces - The S&OP Technology Landscape - 20 AUG 2015
Putting Together the Pieces - The S&OP Technology Landscape - 20 AUG 2015
 
Eta nonfab-deploy-guide-2019oct
Eta nonfab-deploy-guide-2019octEta nonfab-deploy-guide-2019oct
Eta nonfab-deploy-guide-2019oct
 
Creating A Business Advantage With Offshore Resources
Creating A Business Advantage With Offshore ResourcesCreating A Business Advantage With Offshore Resources
Creating A Business Advantage With Offshore Resources
 
SOA A View from the Trenches
SOA A View from the TrenchesSOA A View from the Trenches
SOA A View from the Trenches
 
Oracle performance tuning
Oracle performance tuningOracle performance tuning
Oracle performance tuning
 
Network and Communications Management
Network and Communications ManagementNetwork and Communications Management
Network and Communications Management
 
Network and Communications Management
Network and Communications ManagementNetwork and Communications Management
Network and Communications Management
 
Google decode q3 2015 toc
Google decode q3 2015 tocGoogle decode q3 2015 toc
Google decode q3 2015 toc
 
Privacy and Security Guide
Privacy and Security GuidePrivacy and Security Guide
Privacy and Security Guide
 

Recently uploaded

Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls ServiceCall Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Servicenarwatsonia7
 
WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.Christina Parmionova
 
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...saminamagar
 
Disciplines-and-Ideas-in-the-Applied-Social-Sciences-DLP-.pdf
Disciplines-and-Ideas-in-the-Applied-Social-Sciences-DLP-.pdfDisciplines-and-Ideas-in-the-Applied-Social-Sciences-DLP-.pdf
Disciplines-and-Ideas-in-the-Applied-Social-Sciences-DLP-.pdfDeLeon9
 
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...narwatsonia7
 
Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...yalehistoricalreview
 
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...saminamagar
 
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...ResolutionFoundation
 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26JSchaus & Associates
 
Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...Christina Parmionova
 
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...narwatsonia7
 
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
productionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptxproductionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptxHenryBriggs2
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...narwatsonia7
 
2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdfilocosnortegovph
 

Recently uploaded (20)

Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls ServiceCall Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
Call Girls Service AECS Layout Just Call 7001305949 Enjoy College Girls Service
 
WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.WORLD CREATIVITY AND INNOVATION DAY 2024.
WORLD CREATIVITY AND INNOVATION DAY 2024.
 
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
 
Disciplines-and-Ideas-in-the-Applied-Social-Sciences-DLP-.pdf
Disciplines-and-Ideas-in-the-Applied-Social-Sciences-DLP-.pdfDisciplines-and-Ideas-in-the-Applied-Social-Sciences-DLP-.pdf
Disciplines-and-Ideas-in-the-Applied-Social-Sciences-DLP-.pdf
 
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
 
Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...Jewish Efforts to Influence American Immigration Policy in the Years Before t...
Jewish Efforts to Influence American Immigration Policy in the Years Before t...
 
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in West Patel Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
 
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
 
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26
 
Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...
 
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
 
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Tilak Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
productionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptxproductionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptx
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
 
2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf
 

Agency System Security Authorization Program Overview

  • 1. Final Research Paper Agency System Security Authorization Program IA 500 – Seminar on Public Sector Security Shawn Nicolen 3/17/2015
  • 2. Agency System Security Authorization Program 2 Contents Agency Charter...................................................................................................................................6 Overview ...........................................................................................................................................6 Program Objectives ............................................................................................................................7 The Risk Management Framework.......................................................................................................8 Information Categorization .................................................................................................................8 Types of Information Systems..........................................................................................................9 Notable Information Types ........................................................................................................10 Security Controls ..............................................................................................................................15 Access Control (AC).......................................................................................................................16 AC-2 Account Management .......................................................................................................16 AC-18 Wireless Access...............................................................................................................17 Awareness and Training (AT) .........................................................................................................17 AT-2 Security Awareness............................................................................................................17 Audit and Accountability(AU)........................................................................................................18 AU-2 Auditable Events...............................................................................................................18 AU-13 Monitoringfor Information Disclosure .............................................................................18 Certification, Accreditation, and Security Assessments(CA).............................................................19 CA-5 Plan of Action and Milestones............................................................................................19 Configuration Management (CM) ..................................................................................................19 CM-2 Baseline Configuration......................................................................................................19
  • 3. Agency System Security Authorization Program 3 Contingency Planning(CP).............................................................................................................20 CP-2 Contingency Plan...............................................................................................................20 Identification and Authentication(IA) ............................................................................................20 IA-2 Identification and Authentication (Organizational Users) ......................................................20 Incident Response (IR)...................................................................................................................21 IR-2 Incident Response Training .................................................................................................21 Maintenance (MA)........................................................................................................................22 MA-6 Timely Maintenance.........................................................................................................22 Media Protection (MP)..................................................................................................................22 MP-4 Media Storage..................................................................................................................22 Physical and Environmental Protection (PE)....................................................................................23 PE-11 Emergency Power............................................................................................................23 Planning (PL).................................................................................................................................23 PL-2 System Security Plan ..........................................................................................................23 Personnel Security (PS)..................................................................................................................24 PS-3 Personnel Screening...........................................................................................................24 Risk Assessment (RA) ....................................................................................................................24 RA-2 Security Categorization......................................................................................................24 RA-3 Risk Assessment................................................................................................................25 System and ServicesAcquisition (SA) .............................................................................................25
  • 4. Agency System Security Authorization Program 4 SA-2 Allocation of Resources......................................................................................................25 System and Communications Protection(SC)..................................................................................26 DC-9 Transmission Confidentiality..............................................................................................26 System and Information Integrity (SI).............................................................................................27 SI-4 Information System Monitoring...........................................................................................27 Risk Assessment...............................................................................................................................27 Threat..........................................................................................................................................28 Vulnerability.................................................................................................................................28 Impact..........................................................................................................................................28 A Note on Measurement...............................................................................................................29 System Security Authorization...........................................................................................................29 Plan of Action and Milestones .......................................................................................................29 Security Authorization Package......................................................................................................30 Risk Determination .......................................................................................................................31 Risk Acceptance............................................................................................................................31 Information System Monitoring.........................................................................................................32 Asset Management.......................................................................................................................32 Configuration Management...........................................................................................................32 Event and Incident Management...................................................................................................32 Information Management.............................................................................................................33
  • 5. Agency System Security Authorization Program 5 License Management....................................................................................................................33 Malware Detection.......................................................................................................................33 Network Management..................................................................................................................33 Software Assurance ......................................................................................................................33 Vulnerability and Patch Management ............................................................................................34 References.......................................................................................................................................35
  • 6. Agency System Security Authorization Program 6 Agency Charter The Office forLunar and Martian Affairs(OLMA) wasfoundedin1964 to addressgrowingconcerns surroundingcolonial political tensions withinthe UnitedStates Lunarand Martian colonies established by EdwinHubble andThe ExplorersClubin1932. In additiontoadministratingthe daytoday operational andmissionbasedobjectivesof these coloniesthe agencywasalsochargedwith the separate butequallyimportanttaskof keepingknowledge of the coloniesasecretfromthe general publicof planetEarth,per Executive Order1111A issuedbypresidentKennedyinhisaddresstothe JointChiefsof Staff onNovember3,1963 (OLMA, STIMU DocumentLibrary). Overview Thisdocumentdescribesthe policiesgoverninginformationtechnologyusage andsecurityatOLMA in compliance withdirectionsestablishedbyfederallaws,policies,andregulations. In1996 the Office of ManagementandBudget statedthat federal agencies mustprovide,“security commensuratewiththe riskand magnitude of the harmresultingfromthe loss,misuse,orunauthorizedaccesstoor modificationof information”(OMBA-130, Page 5). Thiswas furtherenforcedbythe Federal Information SecurityManagementActof 2002 (FISMA),whichrequiredfederalagenciesto,“provide a comprehensive frameworkforensuringthe effectivenessof informationsecuritycontrolsover informationresourcesthatsupportFederal operationsandassets”(FISMA,Section3541). In compliance withthesedirectives OLMA hasadoptedthe standardsfor informationsecuritydescribed inthe following:  Federal InformationProcessingStandards (FIPS) Publication199: StandardsforSecurity Categorization of FederalInformation and Information Systems andPublication200: Minimum SecurityRequirementsforFederal Information and Information Systems.
  • 7. Agency System Security Authorization Program 7  The National Institute of StandardsandTechnology(NIT) Special Publication800series pertainingtocomputersecurity, especiallythose on the riskmanagementframework(SP800- 37), informationsystemcategorization(SP800-67), andsecuritycontrols (SP800-53). It shouldbe notedthatthe policiesandpracticesinthisdocumentdonotapplyto systemsdesignated as national securitysystemsorinformationdesignatedas classifiedasdescribedinExecutive Order 13526, Classified NationalSecurityInformation anditsamendments.Forguidance inidentifyingthese national security systemspleaserefertoNISTSP800-59, Guideline forIdentifying an Information System as a NationalSecurity System. Program Objectives The goal of processesoutlined inthisdocumentisto provide governanceineffortstosecure the informational resourcesof the OLMA inaccordance withfederal directivesandstandards. This documentderivesitsprocessesfromthose establishedbyNISTinsupportof the Federal Information SecurityManagementActof 2002 (FISMA). FISMA chargedNISTwiththe developmentof three keydirectivesinsupportof informationsecurity whichdefinedthe scope of theirefforts (FIPS199,Page 1):  The creationof standardsforall federal agenciesforcategorizationof all informationand informationsystemsusedbythose agencieswiththe goal of providingadequate securitybased on riskexposure.  Guidelinesregardingthe typesof informationandinformationsystemsineachof those categories.  The minimummanagement, operational, andtechnical control requirementsforsecuring informationand informationsecuritysystemsineachof those definedcategories.
  • 8. Agency System Security Authorization Program 8 The RiskManagement Framework The Office forLunar and Martian Affairsutilizesthe RiskManagementFrameworkdescribedinNISTSP 800-37 Revision1, Guide forApplying theRisk ManagementFrameworkto FederalInformation Systems. These standards have beencreatedtoensure thatthe managementof riskas itrelatedtoinformation and informationsystemsisconsistentwiththe missionandfunctionof the agency. The six stepsof thisprocessare: 1. Categorize the InformationandInformationSystem. 2. Selectaprovisional setof baseline securitycontrolsbasedonthe systemcategorization. 3. Implementthe provisional securitycontrols. 4. Assessthe effectivenessof the provisional securitycontrols. 5. Authorize the informationsystemforuse basedona determinationthe riskpresentonthat system. 6. Monitorthe informationsystemanditssecuritycontrolscontinuouslytoassesstheir effectiveness.Changesmade tothe systemare notedandevaluatedforimpactonthe level of riskpresentonthat system. InformationCategorization Securitycategorization isanecessarystep inintegratingagencybusiness andtechnologymanagement withsecurity,establishingthe pathtothe standardization,measurement,andevaluationof security efforts(NISTSP800-60, Page 4), and isthe firststepof the risk managementframeworkoutlinedinSP 800-37. FIPS199 providesstandardsforcategorizinginformationandinformationsystemsbasedonthe impactto the agency of eventsthat jeopardize the accomplishmentof itsmission,assets,legal responsibilities,daytodayfunctions,andpeople (FIPS199,Page 1). These categoriesare usedin
  • 9. Agency System Security Authorization Program 9 assessingthe risktoan informationsystemalongside informationaboutrelevantthreatsand vulnerabilities asa part of a formal,standardized,andmeasurableriskassessmentprocess. FISMA section3532 describes athree axessystemformeasuringinformationrelevance toan informationsecurityprogram:  Confidentiality,ameasure of the desiredlevel of disclosureof information.  Integrity,ameasure of the intactness,non-repudiation,andauthenticityof information.  Availability, the timelinessandreliabilityof accesstoinformation. PerFIPS199, the OLMA usesthese three securityobjectives tomeasure the potential impactthatthe lossor compromise of informationwouldhave onthe agenciesassets,operations,mission,orpeople. A lowimpactis attributedtoan eventthatcausesa limitedadverseeffect,amoderate impactisdue toan eventwithaseriousadverse effect,andahighimpact isdescribedassevere orcatastrophic:preventing the accomplishmentof the agenciesprimaryfunction. The securitycategoryof an informationsystemonwhichinformationof variouslevelsof impactresides isbasedon the highestlevelof impactwithineachof those informationtypes.FIPS199 refersto thisas the “highwater mark” method(Page 4),beingthe “highestvaluesfromamongthose securitycategories that have beendeterminedforeachtype of informationresidentonthe informationsystem.” Itisthe role of the informationsystemowner,withsupportof otherofficialssuchasthe InformationSystem SecurityOfficer,toprovide thiscategorization. Types of Information Systems NISTprovidesguidance inmappingtypesof informationsystemstorecommendedsecuritycategoriesin SP 800-60: Guide forMapping Typesof Information and Information Systemsto Security Categories, volumesIandII. Thisdocumentprovidesacatalogof typesof informationsystemswhichcanbe referredtoinorderto determine aprovisionalrecommendedsecuritycategoryforthose systems.While these recommendedsecuritycategoriescanbe used initially inthe initialabsence of aformal impact
  • 10. Agency System Security Authorization Program 10 analysiseveryattemptshouldbe takentodeterminethe actual securitycategoryforeachinformation systemunderthe responsibilityof the OLMA. Early coloniststookstepstoensure the secrecyof theireffortsand,forthe mostpart, common terrestrial technologies werenotinplace toadequatelydetecttheirpresence onthese worldsuntilthe mid-1950s whensome evidence of theiractivitieswasleakedtothe general publicbut,fortunately, interpretedasscience fiction. PursuanttoExecutive Order1111A of 1963 one of the OLMA’s missionsis to conceal the existence of the coloniesfromthe general public until atime whichknowledge of their existence wouldnolongerpose ariskof disruptiontothe societiesandnationsof Earth.Because of this some information of anytype maybe classifiedand,therefore,notsubjecttothe policiesandguidance withinthisdocument. NotableInformationTypes While the OLMA’scharter extendstonearlyall aspectsof life onthe Lunarand Martian colonies, some systemfunctionsandtypesof informationmaybe of notable regard to itsmission of the agencyor have special considerationstothe unique nature of the OLMA’smission. Energy Supply InformationType Thistype of informationisinregardtothe generation,obtaining,use, distribution,andconsumptionof power. While the original LunarandMartian colonistsgeneratedandgovernedthe generationof theirown energysupply,mainly viause of atomicreactors,these operationswere laterfederalizedunderthe authorityof the OLMA in 1964. The provisional securitycategoryof systemsinthisfunctionorcontainingthistype of informationis moderate. The provisional impactforeachaxisis:  Confidentiality:Low
  • 11. Agency System Security Authorization Program 11  Integrity:Moderate  Availability:Moderate Note that,due to the factthat the coloniesrely,inpart,onatomicenergy,some informationinthis categoryis consideredclassifiedandnational securityrelated.Thatinformationisoutside of the scope of thisdocument. The above informationregardingthisinformationtype wasdrawnfromNISTSP800-60 Vol 2, section D.7.1, on page 133. Fore more detailsaboutthistype of information please refertothatdocument. EnvironmentalMonitoringand ForecastingInformationType Thistype of informationisinregardtothe observationandpredictionof environmentalconditions, includingairquality,waterlevelsandquality,emissions,andweather. ConditionsonLunaand Mars are quite differentfromEarthand as suchsometimesrequire specialized techniquestomeasure orpredict.Insome casesenvironmental forecastingiscritical tothe continued existence of the colony,suchasinthe case of solar flares,Martianduststorms,and continuous monitoringof artificial environments. The provisional securitycategoryof systemsinthisfunctionorcontainingthistype of informationis moderate accordingtodefaultNISTguidance.The provisional impactforeachaxisis:  Confidentiality:Low  Integrity:Moderate  Availability:Low (See Note Below) In the case of informationregarding off world systemsOLMA recommendsthatthe provisionalimpact alongthe availabilityaxisisraisedtohigh,due tothe extreme nature andsuddenchangesinthe environments of the off worldcolonies.Insome caseschangesinthe environmentcanhave a catastrophiceffectresultinginthe lossof humanlife and,therefore,itiscritical thatinformationabout
  • 12. Agency System Security Authorization Program 12 such potentiallydeadlyenvironmental factorsshouldalwaysbe immediatelyavailable tothe off world colonists andsupportteamsonEarth. The above informationregardingthisinformationtype wasdrawnfromNISTSP800-60 Vol 2, section D.8.1, on page 139. For more detailsaboutthistype of informationpleaserefertothatdocument. SpaceOperations InformationType Thistype of informationdescribesandsupportsactivitiesrelatedtomissionsandpeople conducting aerospace basedmissionsandoperations. The missionof OLMA isdirectlyrelatedtospace andspace travel toand fromoff worldcoloniesonLuna and Mars. Since the federalizationof the coloniesOLMA hastakenstepsto bringthe securityof informationregardingspace operationstothese colonieswithinfederallymandatedguidelines. The provisional securitycategoryof systemsinthisfunctionorcontainingthistype of informationishigh accordingto defaultNISTguidance.The provisional impactforeachaxisis:  Confidentiality:Low(See Note Below)  Integrity:High  Availability:High OLMA recommendsthatthe provisional confidentialityimpactforspace operations information,and therefore space operationsrelatedinformationsystems,to be moderate.While notall information regardingthe off worldcoloniesisclassifiedanyinformationregardingspace operations,especially regardingthe SaganSpace Center(SSC) inAntarctica,isparticularlytellingandcouldleadtofurther unwantedinquiriesthatmaycompromise the secrecyof the OLMA’smission. The above informationregardingthisinformationtype wasdrawnfromNISTSP800-60 Vol 2, section D.11.4, onpage 158. For more detailsaboutthistype of informationplease refertothatdocument.
  • 13. Agency System Security Authorization Program 13 SpaceExplorationand Innovation InformationType Informationregardinginnovationanddevelopmentof technologiesandknowledge relatedtospace, space basedtransportation,andthe explorationof space. The OLMA isdirectly engagedtosupportoff word Lunar andMartian colonistsintheirpursuittofurther researchand developmentof technologies inextra-terrestrialenvironments.Whilemostresearchis conductedwithinplanetaryormoonbasedboundariesitisstill consideredtofall withinthisinformation type due to the heavylevel of interactionthe off worldcolonistshave withouterspace andregions where there islittle tonoboundarybetweenthe surface andspace,suchas on the surface of Luna. The provisional securitycategoryof systemsinthisfunctionorcontainingthistype of informationis moderate accordingtodefaultNISTguidance.The provisional impactforeachaxisis:  Confidentiality:Low (See Below)  Integrity:Moderate  Availability:Low OLMA recommendsthatthe provisional confidentialityimpactforspace explorationandinnovation shouldbe moderate. The technologiesresearchedonthe off worldcoloniesare,insome cases, extremelydangerousorunacceptablewithinthe currentsocial andcultural climate.Detailedknowledge of suchresearcheffortscouldhave a seriousadverse effectonthe missionof the OLMA. The above informationregardingthisinformationtype wasdrawnfromNISTSP800-60 Vol 2, section D.12.2, onpage 202. For more detailsaboutthistype of informationplease refertothatdocument. CivilianOperations InformationType Thisinformationtype describesthe provisioningof non-militaryservice byfederal government employees.
  • 14. Agency System Security Authorization Program 14 The personnel conductingeffortsandresearchonthe off worldcoloniesare primarilycivilianwith guidance,direction,andsupportfromthe OLMA, whichisa militaryagency.Thoughnotalwaysthe case mostsupportoperationsare conductedperdirectionof the OLMA whichresearchandscientificefforts are directedbycivilianoperations. Informationabout CivilianOperations isavehicle bywhichthe federal governmentprovidesservicesto the citizensof the off worldcolonies underthe care of the OLMA. Thisinformationtype isessentiallya meansof deliveryforothermission-basedservicesinformationandsubjecttothe provisional security categoryand impactlevelsdescribedforeachof those servicesasdescribedinNISTSP800-60 Revision 1, Volume 2. InformationSecurityInformationType All functionsregardingaddressingthe securityneedsof federalinformationsystemsfallunderthe informationsecurityinformationtype.Thisincludesbutisnotlimitedtocreationof securitypolicies, guidelines,procedures,securitycontrolsregardingauthentication,authorization,investigations,non- repudiation,andriskdetermination. While notof great concernin the past,the recentactionsof native Martiansregardingcolonial separationhave spurredthe developmentandenforcementof ITSecuritypoliciesandprocedures specifictothe off worldcolonies underthe OLMA’sguidance. The provisional securitycategoryof systemsinthisfunctionorcontainingthistype of informationis moderate accordingtodefaultNISTguidance.The provisional impactforeachaxisis:  Confidentiality:Low  Integrity:Moderate  Availability:Low
  • 15. Agency System Security Authorization Program 15 The above informationregardingthisinformationtype wasdrawnfromNISTSP800-60 Vol 2, section C.3.5.5, on page 96. For more detailsaboutthistype of informationplease refertothatdocument. Security Controls FIPSPublication200: MinimumSecurityRequirementsforFederal Information and Information Systems, establishes the minimumrequirementsforthe securityof federal informationsystems overseventeen differentareas.The minimumrequirements forthese areas are metby implementingandexercising securitycontrolsasdescribedinNIST SP800-53 Revision3:Recommended Security ControlsforFederal Information Systems applicable withineachof those areas. Control selectionisdone inconsiderationof the securitycategoryof the informationsystemand determinedlevel of impactof the informationalongthe three axesof confidentiality,integrity,and availability.Thisisdone bymeansof anestablishedbaselinesetof controls whichrepresentthe minimumcontrolsrequiredtoadequatelysecure the informationsystem.These controlsmustalso then be appropriatelytailored,ormodifiedforuse onthe informationsystemaccordingtoitsoperational scope and functional purpose. As definedinFIPS200 securitycontrol selectionbasedoninformationsystemimpactisdone inthe followingmanner:  Low-impactinformationsystemsmust,atminimum, use securitycontrolsfromthe low baseline setof controls.  Medium-impactinformationsystemsmust,atminimum, use securitycontrolsfromthe medium baseline setof controls.  High-impactinformationsystemsmust,atminimum, use securitycontrolsfromthe high baseline setof controls. For eachof the seventeensecurityareas thatFIPS200 has identifiedNISTSP800-53 lists,amongstother controlsspecifictoeacharea, governance basedcontrolsthatare bothcommonto all areas and
  • 16. Agency System Security Authorization Program 16 consistentlywithinthe highestprioritygrouping.Whilenotexplicitlymentionedascontrolsof note belowthe sectionbelowthese,“policyandprocedure”controlsare exercisesforeachof these security areas at the OLMA, as governance createsthe foundationand authorityuponwiththe implementation and exercise of othercontrolsrelies. More informationonpolicyandprocedure controls andtheir implementation foreachof the seventeensecurityareascanbe foundintheirrespective sectionsof the Office forLunar andMartian Affairs securitypolicydocuments (OLMA, STIMU DocumentLibrary). While manydifferentsecuritycontrolsmaybe deployedonthe informationsystemsthe OLMA there are some of note withineachcategorythat may require special consideration orsupplemental guidance basedon the missionandoperational requirementsunique tothisagency. Access Control (AC) The agency limitsaccesstoinformationsystemssuchthatonlyauthorizedusers,theirprocesses,or knowndevicescanutilize these appropriate informational resources. AC-2AccountManagement Thiscontrol requiresthatthe agencymanage information systemaccountsbyidentifyingaccounttypes, groupmemberships,accessprivileges,managingaccountlifecycle,reviewingaccounts,andgranting access basedonvalidauthorization. Due to the nature of some of the systemsthatthe OLMA manages,including life supportandaccessto sensitivescientificinformation,itisimperative thataccountsare managed,tracked,andprovisioned appropriately.Asoff-worldcolonistsrarely,if ever,returntoEarth the terminationof theiraccountsis generallyonlydone atthe time of theirretirement,death,ortransfertoan unrelatedsystemwiththeir ownseparate account managementsystem. Control Reference:NISTAP800-53 Revision3,Page I-5
  • 17. Agency System Security Authorization Program 17 AC-18WirelessAccess Wirelessaccesscontrol createsguidance forthe implementationof wirelesscommunicationssystems, monitorsthose systemsforunauthorizedaccess,authorizesaccess,andenforcesotherrequirements. While manywirelesscommunicationssystemsare usedbythe OLMA it isimportantto note that the lack of a magnetosphereonLunaand Mars presentssome technical hurdlesnotfoundintraditional long range wirelesscommunicationsimplementations,possiblyallowingforthe range of the signalstobe modifieddependingonthe technologyusedtoeitherfurtherlimitthe use of communicationsorinthe signalsradiatingbeyondexpectedboundaries.Inthe lattercase thismayleadto a lossof confidentiality and care shouldbe exercised. Control Reference:NISTAP800-53 Revision3,Page I-6 Awareness and Training (AT) The agency ensuresthatpersonnelare made aware of securityrisks,governance requirements,and applicable procedureswhile alsobeingadequatelytrainedtocarryout theirsecurityrelatedfunctions. AT-2SecurityAwareness All newusersare givena basicsecurityawarenesstraining.Existingusersare givensupplemental trainingperiodicallyorwhenconditionsarise whichwarrantit.Thistrainingincludesinformationabout the needforsecurityprogramsas well asactionstheycan take themselvesin ordertoensure or promote a secure environment.Thiscaninclude techniquessuchasuse of posters,communicationsand newsarticles,remindersoncomputerscreens,andeventsdesignedtopromote securityawarenesssuch as seminarsorsimulations. Thiscontrol and agencyspecificreasoningisrelatedtocontrol IR-2IncidentResponse Training.
  • 18. Agency System Security Authorization Program 18 Control Reference:NISTAP800-53 Revision3,Page F-21 Audit and Accountability (AU) The agency monitorsandcollectsinformationsystemauditrecordssufficientforpurposesof analysis and investigationof impactful securityevents. AU-2AuditableEvents Informationsystemsmustbe capable of auditingaspecifiedsetof eventsdefinedbythe agency. The OLMA placesemphasisonauditingeventsassociatedwithenvironmental controlsthathave the potential toeitherplace apersonintoimmediate danger,suchasan airlockopeningorclosing,and eventswhichhave the potentialtoplace multiple peopleingreatdangeraftera periodof time,suchas a leakinan atmosphericseal.The abilitytotrackthese eventsandgatherinformationaboutthemis paramountto the safetyof the off worldcolonistsunderthe OLMA’sgovernance. Control Reference:NISTAP800-53 Revision3,Page F-24 AU-13MonitoringforInformationDisclosure The agency monitorsavailable sourcesof informationforevidence of unauthorizedinformationleakage. Much of the work happeningatthe off wordcoloniesunderthe OLMA’sguidance isconfidential and couldpose a dangerto the missionandfunction of the scientificcoloniesonLunaand Mars if exposed. Because of thisOLMA has dictated,asone of itssecurityfunctions,thatopensourcesof information such as the internetortelevisionbe monitoredforinformationwhichmayreveal orleadtobe revealed the importantworkbeingdone inthe off worldcolonies. Control Reference:NISTAP800-53 Revision3,Page F-31
  • 19. Agency System Security Authorization Program 19 Certification, Accreditation, and Security Assessments (CA) The agency periodicallyassesses the effectivenessof securitycontrolson informationsystemsto determine theirlevel of effectiveness. CA-5Planof ActionandMilestones Whennecessarythe agencywill developaPlanof Actionand Milestones (POA&M) documenttotrack remediationeffortsforweaknessesidentifiedinits informationsystemssuchasvulnerabilitiesor misconfigurations. The POA&Mdocumentisan essential partof the systemauthorizationprocessemployedbythe OLMA, whichisin turnbasedon standardsestablishedby NISTSP800-37 Revision3:Guide forApplying theRisk ManagementFrameworkto FederalInformation Systems.Seesection3.5,step5.1 of the Risk ManagementFrameworkformore information. Control Reference:NISTAP800-53 Revision3,Page F-35 Configuration Management (CM) The agency establishes andenforcesbaselinescontrolsandconfigurationsforitsinformationsystems and maintainsandinventoryof those systems. CM-2BaselineConfiguration The agency creates,maintains,anddocumentsabaseline configurationforinformationsystems. Standardizationcreatesabaselineof measurementfromwhichdeviationscanbe detectedand resolved.Inhostile environmentwhere resources,eventime,are scarce it isimportantto be able to find
  • 20. Agency System Security Authorization Program 20 and remediate problemsininformationsystemswhichmayresultinacompromise ordelayof the missionof the OLMA. Control Reference:NISTAP800-53 Revision3,Page F-38 Contingency Planning (CP) The agency creates,maintains,andexercisesplansforresponsetoemergencysituations, implementationof backupoperations,anddisasterrecoveryscenarios. CP-2ContingencyPlan Informationsystemsthatprovideessential functionsmusthave contingencyplansthatprovide for recoveryviarecoverypointobjectives,recoverypriorities,metrics,definedrolesandresponsibilities, contact information,abilitytomaintainessential functionsdespite disruption,andleadtowardsfull informationsystemrecovery. As the OLMA operatedinenvironmentshostiletolife itisof essentialimportance thatthe coloniesare able to continue inthe eventof anincidentordisaster.The civiliancolonistsrelyonthe OLMA to provide safetyandsecuritysothattheirfocuscan be onthe continuance of theirimportantwork. Control Reference:NISTAP800-53 Revision3,Page F-47 Identification and Authentication (IA) The agency identifiessystemdevices,users,andtheirprocessesandverifiestheiridentitiestogrant themaccess toagency informationsystems. IA-2 IdentificationandAuthentication(Organizational Users) Informationsystemsmusthave the abilitytoidentifyagencypersonnel.
  • 21. Agency System Security Authorization Program 21 The OLMA representsaunique partnershipbetweenthe civiliancolonistsof Lunaand Mars and the UnitedStatesfederal government.Whilethe OLMA providesservicestothe coloniststheyare expected to, inturn,work alongside the agency.Insome casesitisimportantthanan informationsystemmay needtorespond or grant authorization differentlytoOLMA personnel thanitwouldtoa civiliancolonist inorder to properly maintainthispartnership.Thiscontrol andreasoningare alsorelateddirectlyto control IA-8 IdentificationandAuthentication(Non-Organizational Users). Control Reference:NISTAP800-53 Revision3,Page F-54 Incident Response (IR) The agency createsa processwhichincludespreparation,detection,analysis,containment,and recoveryactivitiestorespondtoincidentswhichmayhave anegative impactonthe organization.These incidentsare monitored,documented,andreportedtothe appropriate agencypersonnel or authorities. IR-2 IncidentResponseTraining As the resourcesonthe off worldcoloniesare spreadoverthe vastdistancesof space the OLMA holds securityawareness andthe abilitytorespondtoanincidentare of high priority;eachpersonmustbe responsible forthe securityof theirenvironmentandinformationsystemstosome degree asrapid response maynotbe presentdue to eitherthe distance betweenphysical securityresourcesorthe time it takesforcommunicationssignalstopassbetweencoloniesondifferentastral bodiesdependingon theircurrentorbital positions.Forexample,itwill take onaverage between4and5 minutesforsignals to travel betweenLunaandMars. Because of thisa certaindegree of self-reliance isnecessaryforall of the OLMA’s personnel. Thiscontrol and reasoningare relatedtocontrol AT-2: SecurityAwareness. Control Reference:NISTAP800-53 Revision3,Page F-61
  • 22. Agency System Security Authorization Program 22 Maintenance (MA) The agency performsperiodicmaintenance onitsinformationsystems andprovidesoversightonthe tools,practices,andpeople involvedinthose maintenanceactivities. MA-6TimelyMaintenance Thiscontrol ensuresthatsupportor parts are available forinformationsystemswithinagiventime span of failure. As the OLMA overseesvariousenvironmental control systemsessential tolife onthe off worldcolonies it isof highimportance thatmaintenance isperformedonaregularand timelybasis.Ingeneral systems whichhave a higheravailabilityimpacthave alowerresponse time andfastertime tocompletionfor maintenance activities. Control Reference:NISTAP800-53 Revision3,Page F-70 Media Protection (MP) The agency takesstepstoprotectboth analogand digital informationmedia,limitingaccesstothat mediatoappropriate personnelanddestroyingthe mediawhere necessary. MP-4MediaStorage Thiscontrol dictatesthat storage mediaisto be storedsecurelyandprotectedfromdamage. As boththe coloniesof Lunaand Mars lacka magnetosphere of Earth theyare subjecttoexposure to varioussourcesof radiationandenergyfromspace.While mostof the coloniesare underground, providingshieldingfromthese harmful sourcesof radiation,somepartsof themare exposed.Inall cases any mediasubjectto damage frominterstellarradiation,suchasmagnetictapes,shouldbe storedin properlyshieldedcontainers.
  • 23. Agency System Security Authorization Program 23 Control Reference:NISTAP800-53 Revision3,Page F-72 Physical and Environmental Protection (PE) The agency limitsphysicalaccesstoits informational resources,protectsphysical informationsystem componentsandinfrastructure,andprovidesenvironmentalcontrolsforfacilitieswherethose informationsystemsare located. PE-11EmergencyPower Short termpowerisavailable tofacilitatethe propershutdownof aninformationsystem.Insome cases longtermemergencypowersuppliesmaybe necessary. Informationsystemsmaintainedbythe OLMA may be performingimportantscientificcalculations, simulations,orsupportslife sustainingenvironmental function.The higherthe securitycategoryof an informationsystemthe longeranemergencypowersupply shouldbe able tooperate foruntil normal operationsare restored. Control Reference:NISTAP800-53 Revision3,Page F-81 Planning (PL) The agency develops,revises,andexercisessecurityplansforinformationsystemswhichdescribethe use of securitycontrolsandbehaviorrequirementsforassignedpersonell. PL-2 SystemSecurityPlan The agency createsa securityplanforan informationsystemthatdefinesboundaries,categorization rationale,requirements,relationshipstoothersystems,anddescribesexistingsecuritycontrolsalready inplace.
  • 24. Agency System Security Authorization Program 24 Thisplanis reviewedandapprovedbythe authorizingofficialduringthe systemauthorizationprocess. Control Reference:NISTAP800-53 Revision3,Page F-85 Personnel Security (PS) The agency takesstepstoensure the trustworthinessof peopleinpositionsof responsibilityandthe securityof informationsystemsinuse bythose people.When necessary,formal actionistakenagainst personnel whohave violatedagencysecuritypolicies. PS-3Personnel Screening Thiscontrol dictatesthat potential employeesare screenedpriortogainingauthorizationtoagency informationsystemsandrescreened whencertainconditionsare met. The OLMA musttake great care inensuringthatit can trustsits personnel due tothe secretiveand impactful nature of the workbeingdone underitspurview.Inadditional tobackgroundchecksto ensure a historyof trustworthinessfurtherbehavioral analysisbasedinterviewtechniquesare used duringany screeningprocess,bothinitial andsubsequent. Control Reference:NISTAP800-53 Revision3,Page F-89 Risk Assessment (RA) The agency periodicallyassessesthe risk toitspeople,assets,andinformationsystems. RA-2SecurityCategorization The informationandinformationsystemswithinthe responsibilityof the agencyare categorizedin accordance withfederal lawsandstandards.
  • 25. Agency System Security Authorization Program 25 Categorizationisthe firststepof the RiskManagementframeworkdescribedinNISTSP800-37 Revision 3. The OLMA followsthisprocessameanstoproperlydetect,manage,andremediateriskonits informationsystems. Control Reference:NISTAP800-53 Revision3,Page F-92 RA-3RiskAssessment The agency performsaformalizedassessmentof riskpresentonaninformationsystem,reviewsthe results,andperformsperiodicupdatesof the assessments. A riskassessmentisauseful tool whendone asapart of the risk managementframeworkandits associatedprocesses.AccordingtoNISTSP800-37 Revision3,“a risk assessmentguidesthe prioritizationprocessforitemsincludedinthe planof actionandmilestones.” Guidance onrisk assessmentscanbe foundinNISTSP800-30 Revision1:Guide forConducting Risk Assessments. Control Reference:NISTAP800-53 Revision3,Page F-93 System and Services Acquisition (SA) The agency allocatessufficientresourcestoprovide adequateprotectiontoitsinformationsystems, utilizesasystemsdevelopmentlifecycle thataddressessecurityconcerns,andmonitorsthe use of software. SA-2AllocationofResources The agency determinesthe resourcesrequiredtoimplementthe securitycontrolsnecessarytoprovide an informationsystemwithadequatesecurity.
  • 26. Agency System Security Authorization Program 26 As resourcesinthe off worldcoloniesare extremelylimiteditisimportanttobe able toknow exactly howmany will be requiredbythe securitycontrolsassignedforuse onthat system.ColoniesonLuna may have more immediate accesstoresourcesfromEarth,while resource scarcityonMars isalwaysan issue.Inmanycasesthe coloniesmustbe self-sufficientwithanyadditional resourcesfromEarthseen as unnecessarybutnotunwelcome. Control Reference:NISTAP800-53 Revision3,Page F-96 System and Communications Protection (SC) The agency monitors,controlsandprotectscommunicationof informationatkeypointsalongsystem boundaries,bothexternal andinternal,andmakesuse of architectural,softwaredevelopment,and engineeringtechniquesthat contribute tosecure informationtransmissionpractices. DC-9TransmissionConfidentiality Informationwithaconfidentialityrequirementmustbe protectedfromunauthorizeddisclosure while in transit. As muchof the OLMA’s workisdone in secretthe classificationof muchof the informationaboutthis workalongthe confidentialitydimensionishigh.Encryptedcommunicationstunnels,especiallythose for sharedcommunicationschannelssuchasthe mainbandusedby Mars andLuna to communicate withSagan StationonEarth, mustbe used. Thiscontrol and reasonare alsorelateddirectlytocontrol SC-28Protectionof InformationatRest. Control Reference:NISTAP800-53 Revision3,Page F-112
  • 27. Agency System Security Authorization Program 27 System and Information Integrity (SI) The agency locates,reports, andremediatesinformationsystemflawsinatimelymanner,providing protectionfrommaliciouscode,andmonitoringsecurityalertsandintelligence inordertofacilitate an appropriate response. SI-4 InformationSystemMonitoring The agency tracks eventsoninformationsystemsinaccordance withitsobjectivesandisable todetect informationsystemsattacks. Thiscontrol and itsreasoningare directlyrelatedtocontrolsAU-2Auditable Eventsandcontrol AU-13 MonitoringforInformationDisclosure. Control Reference:NISTAP800-53 Revision3,Page F-126 RiskAssessment "I often say that when you can measure what you are speaking about, and express it in numbers, you know something about it; but when you cannot express it in numbers, your knowledge is of a meagre and unsatisfactory kind;itmay be thebeginning of knowledge, but you have scarcely, in your thoughts, advanced to the stage of science, whatever the matter may be.” – William Thomson, Lord Kelvin The OLMA measuresriskaccordingtothe followingconceptual formula: Risk = Threat x Vulnerability x Impact There are several variantsof the riskformulainuse throughoutthe securityindustry.Some risk assessmentmodels,suchasthe NISTmodel,alsoinclude the likelihood of athreateventoccurringas a componentof risk.Forthe purposesof the OLMA likelihoodisconsideredafactorof threatand will be includedthereinasmanyof our assessmenttoolsalreadyuse thismethodology.
  • 28. Agency System Security Authorization Program 28 The resultsof a riskassessment,includingsource documentsforeachcomponentof the riskformula, are thendocumentedforlaterreference throughoutthe RiskManagementFramework. The components of thisformulaare definedinNISTSP800-30 Revision1: Threat “Any circumstanceor eventwith the potentialto adversely impactorganizationaloperationsand assets, individuals,otherorganizations…through an information systemvia unauthorized access,destruction, disclosure,or modification of information,and/ordenialof service.” Thisvalue istypicallyprovidedforusbyautomatedvulnerabilityscannersandstoredinreports generatedbythose scanners.Sourcesof threatsmaybe intentional,accidental,orenvironmental. Vulnerability “A weaknessin an information system,system,security procedures,internal controls,orimplementation thatcould be exploited by a threatsource.” Thisvalue istypicallyprovidedforusbyautomatedvulnerabilityscannersandstoredinreports generatedbythose scanners. Impact “The level of impactfroma threat eventis the magnitudeof harmthatcan be expected to resultfrom the consequencesof unauthorized disclosureof information,unauthorized modificationof information, unauthorized destruction of information,orlossof information orinformation systemavailability.” It shouldbe notedthatimpactis partiallydefinedbythe thingbeingaffectedbythe threatand vulnerability.Thatis,noexternal source canautomaticallytell uswhatthe impactonour own environmentwillbe because itisoursandunique to its use andpositionwithinthe OLMA.
  • 29. Agency System Security Authorization Program 29 The classificationof the informationpresentonorusedby an informationsystemcanbe usedto help determine thisvalue.Informationof ahighersecuritycategoryshouldbe representedashavinga greaterlevel of impacton the level of riskdetermined. A Note on Measurement Measurementsof componentsof riskforthe OLMA’sinformationsystemsare gatheredaccordingtoa 0.0 to 10.0 scale.If these valuesare goingtobe usedinothercalculationstheyshouldbe keptonthis scale to preserve likenessandprecision. Resultsof calculations,foruse inreportsor presentations,can be translatedintootherscalesasneeded,suchasthe 1-5 scale usedby mostcorporate riskassessment methodologiesorthe 1-3 scale usedbysome federal agenciesorthe CVSS2.0 ratingsystem. For our purposesvaluesshowninreportswill use the followingscale: Rating Scale (0-5) None Very Low Low Medium High Critical System Security Authorization Step5 of the RiskManagementFramework isthe authorizationof aninformationsystembasedupona determinationof the riskpresentonthatsystem. Thisisaddressedbyseveral tasks,eachof whichisalso representedbyacorrespondingsecuritycontrol. Plan of Action and Milestones The Planof Actionand Milestones (POA&M) document describesactionsnecessaryto addressand correct weaknesses inthe securitycontrolsused onaninformation systemorthe vulnerabilities onthe
  • 30. Agency System Security Authorization Program 30 informationsystem whichthose securitycontrolsdonotadequatelyaddress.The documentthen describesthe issuesandtaskstoremediate those issues,the resourcesnecessarytodoso,and any milestones metduringthe course of completionof the plan. Riskassessmentsare usedtoassignprioritytothese tasksbasedonthe issuestheyaddressandhelpto guide time requirementsforcompletionof tasks. Control RA-3RiskAssessmentrepresentsthe correspondingsecuritycontrol forthisstep. The correspondingsecuritycontrol forthisstepis CA-5Planof Actionand Milestones.The OLMA specificreasoningandconsiderationscanbe foundinthe correspondingsectionof thisdocument. Reference:NISTSP800-37 Revision1,Page 34 Security Authorization Package The POA&M, alongwiththe securityassessmentdocumentandthe securityplancreatedduringearlier stepsof the Risk ManagementFrameworkprocess,isusedtocomplete the securityauthorization package.The Authorizingofficial canuse the informationinthispackage to conductfurtheranalysis basedon the vulnerabilities,threats,andimpactdescribedthereintomake adeterminationof risk.The authorizingofficial canrequestadditional informationtoaddto the authorizationpackage asnecessary inorder to make a more accurate determinationof risk. The securityplanis relatedtocontrol PL-2 SystemSecurityPlan.The security assessmentis relatedto control CA-2 SecurityAssessments. More informationonsecuritycontrolsnotexplicitlydescribedinthis documentare describedinNISTSP800-53 Revision3. Reference:NISTSP800-37 Revision1,Page 34
  • 31. Agency System Security Authorization Program 31 Risk Determination The authorizingofficial,workingwiththe seniorinformationsecurityofficer asappropriate,reviewsthe informationinthe authorizationpackage toexamine security controlscurrentlyinplace on the informationsystem, determine the current level of riskpresent,andreview the recommendations providedinthe POA&Mdocument.The currentrisklevel is determinedalongwithriskmitigation strategies.Remainingriskiscomparedtothe level of acceptablerisktodetermineif furtheractionis required. The OLMA has determinedthataverylow level of risk,basedonthe five pointratingscale described earlierinthisdocument, isacceptable tothe agencydue tothe heavyreliance of the missionand functionof the agencyon informationtechnology. Reference:NISTSP800-37 Revision1,Page 35 Risk Acceptance It isthe authorizingofficial’s role todetermine if the risktothe mission,function,image,reputation, assets,people,ororganizationsisacceptable withinthe boundssetbythe OLMA’sriskpolicies while weighingthisrisk againstcontinuedoperationalandmissiondemandsplacedonthe system. This decisionisdocumentedinthe authorizationdecisiondocument detailingthe final decisionof the authorizingofficial regardingthe acceptance of riskassociatedwiththisinformationsystemandif that systemisauthorizedto beginorcontinue operations.Termsandconditionsmayalsobe includedinthis document,providingforspecial casesforuse ordescribinglimitsonuse of the informationsystem.This documentalsodescribesthe periodof expirationof thisauthorization,promptinganotherauthorizing reviewtotake place.Thisinformationisthengiventothe systemownerandsecuritycontrol provideras well asotherpartiesas necessary.
  • 32. Agency System Security Authorization Program 32 Reference:Reference:NISTSP800-37 Revision1,Page 35 InformationSystem Monitoring Because people and resourcesare relativelyscarce onoff worldcoloniesthe OLMA reliesheavilyon automationandautomatedprocessedtomonitorthe securityof itsinformationsystems. NISTSP800- 137 AppendixDdescribesseveral typesof toolsthat,whendeployedappropriatelyandwithoversight of humanexpertise,are usefulinsystemmonitoringpractices. Asset Management These toolsletsecurityanalysisknowwhatsystemsare presentintheirenvironment.Thisisthe foundationof anefforttosecure all of the systemsinanorganization,assecuritycontrolscannotbe deployedtosystemsif youdon’tknowwhatsystemsyouhave inthe firstplace,especiallyif the environmentissolarge or widespreadthananaccurate and timelymanual inventorywouldbe impossible. Configuration Management Centralizedconfigurationmanagementallowsadministratorstodeployconsistentsettingstomany categoriesof systemssimultaneously,ensuringcompliance withpre-establishedparametersassecurity controls.Thistool can alsofind deviationsinsettingsfromthe establishednormal identifyingthese flawedsecuritycontrol deploymentsinreal time and,inmanycases,correct themautomatically. Event and Incident Management These toolsare usedto gatherinformationaboutspecific occurrenceshappeningona givensystem, such as detectionof attacksbasedonknownsignatures,systembehavioral patterns,orotherlogsof activity.If there isa commoncause to particularsetsof behaviorthe informationcanbe organizedasan incidentenablingforcommonreference of relatedevents.
  • 33. Agency System Security Authorization Program 33 Information Management The securitycategoryof a systemisdeterminedbythe type of dataon that system.Information managementtoolsare able totrack thisinformationandhow itmovesoverthe network, possibly preventinginformationleakage andallowingthe securityteamtoidentifythe sensitivityof agiven systembasedonthe type of informationpresentonthatsystem. License Management License managementcandetectthe numberof installationsof anapplicationinthe environmentand compare thisagainstthe numberwhichthe organizationisallowedorhaspurchased.Thisallowsfor avoidance of feesorlegal actionbythe software distributorbydetectingthisdeviationandenablingthe securityteamto correctit, or by preventingthe installationof the unlicensedsoftware inthe firstplace. Malware Detection Symanteccorporationdefines Malware as,“a categoryof maliciouscode thatincludesviruses,worms, and Trojanhorses.”Thistool is used tofindsuch software and,inmanycases,take a predetermined actionagainstit, enablingforreal-time protectionof asystemandmitigationof the riskcreatedbythe malware threat. Network Management Networkmanagementtoolsallow fordiscoveryof new hostsonthe networkandmonitoringof traffic. These toolsallowforreal time discoveryof systemsonthe networkwhichare notinthe inventoryof allowedsystemsornetworkdevices. Software Assurance Thisset of toolsallowsforthe analysisof software behaviorenablinganorganizationtoverifythe trustworthinessof anapplication.Forsoftware developedinternallythiscanbe utilizedaspartof the software developmentcycle toimprove onthe securitycompliance of anapplication.
  • 34. Agency System Security Authorization Program 34 Vulnerability and Patch Management These toolsscansystemstodetectsoftware flawsordetermine if asoftware update isavailableand neededtoaddressaknownissue.These toolscanallow forquickdiscoveryof suchissuesthrough regularlyscheduledscansandremediationviapre-determinedpatchingmechanisms.
  • 35. Agency System Security Authorization Program 35 References 1. E-GovernmentActof 2002. Pub.L. No. 347.107, Stat. 2899, P.116. RetrievedJanuary2015 from U.S. GovernmentPrintingOfficeat: http://www.gpo.gov/fdsys/pkg/PLAW- 107publ347/html/PLAW-107publ347.htm 2. Mell,P.,Scarfone,K.,Romanosky S.(2007 January).A Complete Guide tothe Common VulnerabilityScoringSystemVersion2.0.RetrievedMarch2015 fromFirstat https://www.first.org/cvss/cvss-guide.pdf 3. National Institute of StandardsandTechnology.(2014 April 1). FISMA – Detailed Overview. RetrievedJanuary2015 from NISTat: http://csrc.nist.gov/groups/SMA/fisma/overview.html 4. National Institute of Standardsand Technology.(2004 February). FederalInformation Processing StandardsPublication:StandardsforSecurity Categorization of FederalInformation and Information Systems.RetrievedFebruary2015 fromNIST at: http://csrc.nist.gov/publications/fips/fips199/FIPS-PUB-199-final.pdf 5. National Institute of StandardsandTechnology.(2006 March). FederalInformation Processing StandardsPublication:MinimumSecurity Requirementsfor FederalInformation and Information Systems.RetrievedMarch2015 fromNIST at: http://csrc.nist.gov/publications/fips/fips200/FIPS-200-final-march.pdf 6. National Institute of StandardsandTechnology.(2015 January28). NIST ComputerSecurity Publications - NIST SpecialPublications(SPs).RetrievedMarch2015 from http://csrc.nist.gov/publications/PubsSPs.html 7. National Institute of StandardsandTechnology.(2010 February). NISTSpecialPublication 800-37 Revision 1: Guide forApplying theRisk ManagementFrameworkto FederalInformation Systems. RetrievedFebruary2015 fromNISTat: http://csrc.nist.gov/publications/nistpubs/800-37- rev1/sp800-37-rev1-final.pdf
  • 36. Agency System Security Authorization Program 36 8. National Institute of StandardsandTechnology.(2013 April). NISTSpecialPublication 800-53 Revision 4: Security and Privacy ControlsforFederalInformation Systemsand Organizations. RetrievedFebruary2015 fromNISTat: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf 9. National Institute of StandardsandTechnology.(2003 August). NISTSpecialPublication 800-59: Guideline for Identifying an Information Systemasa NationalSecurity System.RetrievedMarch 2015 fromNIST at: http://csrc.nist.gov/publications/nistpubs/800-59/SP800-59.pdf 10. National Institute of StandardsandTechnology.(2008 August). NISTSpecialPublication 800-60 Revision 1: Volume1: Guide for Mapping Typesof Informationand Information Systemsto SecurityCategories.RetrievedFebruary2015 fromNISTat: http://csrc.nist.gov/publications/nistpubs/800-60-rev1/SP800-60_Vol1-Rev1.pdf 11. National Institute of StandardsandTechnology.(2008 August). NISTSpecialPublication 800-60 Revision 1: Volume2: Appendicesto Guide for Mapping Typesof Informationand Information Systemsto Security Categories.RetrievedFebruary2015 fromNISTat: http://csrc.nist.gov/publications/nistpubs/800-60-rev1/SP800-60_Vol2-Rev1.pdf 12. Nicolen,Shawn.(2015March 21). OLMA STIMU:Stuff ThatIMadeUp.Personal Interview, March 2015. 13. Office andManagementandBudget.(1996 February8). CIRCULARNO.A-130. RetrievedMarch 2015 fromthe OMB at: https://www.whitehouse.gov/omb/circulars_a130 14. Office of the PressSecretary.(2009 December29). Executive Order13526- ClassifiedNational SecurityInformation.RetrievedMarch2015 from The White House at: https://www.whitehouse.gov/the-press-office/executive-order-classified-national-security- information 15. Symantec. Malware- MaliciousVirus CodeDetection - Trojan - Trojan Horse.Retrieved March 2015 fromNortonat: http://us.norton.com/security_response/malware.jsp