Risk Management Framework

WHITE PAPER Making the Most of the Risk Management Framework NIST’s six-step process is now the risk management standard across the federal governme...
Author: Shon Conley
7 downloads 1 Views 213KB Size
WHITE PAPER

Making the Most of the

Risk Management Framework NIST’s six-step process is now the risk management standard across the federal government. Here’s why agencies that want to safeguard their IT infrastructure and enhance their mission need to bring their cybersecurity workforce fully up to speed on this highly customizable, effective framework.

Introduction As information systems have increased in complexity and capacity and the number and type of threats have grown over the last decade, very few of the earliest frontline information security tools and methodologies have maintained their initial significance or applicability—much less become even more relevant.

Information Assurance Certification and Accreditation Process (DIACAP) in favor of the RMF, and a growing number of private sector organizations, including financial institutions and health care organizations, are now relying on the RMF on a voluntary basis. “The beauty of the RMF is that it’s a process that can be applied in many different ways based on the specific organization’s mission, the environments in which they operate and the technologies that they use,” says Dr. Ron Ross, a Fellow with NIST who is also the principal architect of the RMF. “I think it has stood the test of time and will continue to serve the organizations that rely on it because it doesn’t force you into a particular box. It allows you to drive the security solutions that are most appropriate for your organization, and that’s a very powerful characteristic of any framework.”

One high-profile exception to that reality, however, is the Risk Management Framework (RMF), a disciplined and structured six-step process that was first developed nearly 10 years ago by the National Institute of Standards and Technology (NIST) to help federal agencies better protect their information technology systems. Initially, the RMF was used to certify and accredit (C&A) the systems of federal civilian agencies as a mandated part of their compliance with the Federal Information Systems Management Act (FISMA). For the first several years, the use of RMF as part of this C&A effort was fairly static, with assessment and authorization taking place every three years or whenever there was a change to the system.

Step By Step The RMF, which is fully delineated in NIST Special Publication 800-37, is a holistic risk management process that involves six basic steps at the system level that are further broken down into specific tasks. These steps, according to

However, the RMF was also designed from the start to be flexible. As a result, organizations are now able to leverage the RMF to take a much more dynamic approach to identifying and mitigating vulnerabilities and threats and can achieve their mission objectives by continuously monitoring any security measures chosen and implemented to avoid, counteract or minimize those risks.

NIST, are shown in Figure 1 on Page 3.

New and Different

With the RMF, there’s no one-size-fits-all approach. Each individual system can be triaged according to its value to the enterprise, and security controls can be specifically selected and then monitored year by year, month by month, day by day or even hour by hour, depending on the criticality of a specific system, the organization’s risk tolerance and the threats posed.

The DoD’s decision to adopt the RMF and mandate its exclusive use in conducting security authorization activities means that, for the first time, all defense, intelligence and federal civilian agencies will be working from the same risk management framework. And that will have a farranging impact. Not only will DoD information security personnel have to learn and adapt to the RMF, but civilian agencies can now count on “reciprocity” between all federal systems, as can government contractors and anyone else who does business with the public sector.

This flexibility is the reason that more and more organizations are adopting the RMF over other risk management frameworks. The Department of Defense announced in March 2014 that it would abandon its long-used and specialized Defense

2

NIST’s Risk Management Framework Figure 1.

PROCESS OVERVIEW

Architecture Description

Starting Point

Architecture Reference Models Segment and Solution Architectures Mission and Business Processes Information System Boundaries

Organizational Inputs Laws, Directives, Policy Guidance, Strategic Goals and Objectives, Priorities and Resource Availability, Supply Chain Considerations

STEP 1

CATEGORIZE

Repeat as necessary

Information System STEP 2

STEP 6

SELECT

MONITOR

Security Controls

Security Controls

NIST’s RISK MANAGEMENT FRAMEWORK STEP 5

STEP 3

AUTHORIZE

IMPLEMENT

Information System

Security Controls STEP 4

ASSESS

Security Controls

3

be able to come to the decisions that you come to about whether the security program is adequate and whether the system is ready to operate,” Kelsall says. “So we’re looking at that across the board.”

“Everybody is going to be speaking the same language, so that when someone at the State Department says, ‘Here’s my risk level on this system and here are the security controls that I’m using to measure and mitigate that risk,’ it can be equated to connected systems on the DoD side or within the intelligence community or at the White House,” says Dan Waddell, CISSP, CAP, Director of U.S. Government Affairs at (ISC)2.



Other key differences between DIACAP and RMF lie in the way the security and privacy controls in NIST’s 800-53 catalog are organized and described, along with the role descriptions and responsibilities. “Our primary effort will be to ensure that we transition successfully and smoothly from the Information Assurance Manager (IAM) outlined in the DoD 8570.01M, and its associated qualification requirements, to the Information System Security Manager (ISSM) roles and responsibilities required by the RMF,” says Kelsall. “We will have to look closely at the qualification requirements for the ISSM based on responsibilities and determine how to structure a program that includes all the elements required and the best means of delivering training.”

Everybody is going to be speaking the same language,...



In addition, universal use of the RMF provides information security professionals with a simpler, more business-friendly language needed to effectively explain their efforts to senior executives, budgetary decision-makers, acquisition personnel, enterprise architects and other stakeholders so that security can be fully incorporated from the top down, rather than from the bottom up.



...don’t turn it into a compliance exercise but rather allow the flexibility that’s inherent in the framework to drive the solutions that you come up with.

“Security in many people’s view is a cost to the organization, a drag, an impediment,” says Ross. “When you go at it from the top-down, with the stakeholders sitting there talking about the mission they have to accomplish and what is fundamentally required to protect themselves and to make the mission successful, then security is viewed from a very different perspective: it’s viewed as a mission enabler, an investment in our mission success.”



Civilian agencies that have been using the RMF to comply with FISMA will find value in renewing and continuing their training efforts on the RMF process. The process has been revised to adapt to a new focus on continuous monitoring and ongoing authorization, as well as new threats and vulnerabilities. NIST’s security and privacy control catalog, for example, added another 200-plus security measures when it was revised in 2013.

For DoD personnel, the effort to move to the RMF is made easier by the fact that the RMF is more similar than different from DIACAP, though the DIACAP was encapsulated in five phases versus the RMF’s six steps. The biggest difference is the process and the role nomenclature, says Chris Kelsall, DON CIO Cyberspace Workforce Branch Head. “Our biggest concern is that although the same concepts in RMF were in DIACAP, there’s a whole new process for evaluation and a new way of going through the steps to

What’s more, even though RMF takes a step-by-step approach to risk management, information security professionals need

4

framework but also for those who have used it in the past in a more static fashion.

to guard against utilizing it in a checklist fashion, as is the cultural tendency, says Ross. “It’s important to let the RMF be the RMF,” Ross says. “In other words, don’t turn it into a compliance exercise but rather allow the flexibility that’s inherent in the framework to drive the solutions that you come up with.”

There are many training outlets on risk assessment and management, but the only one that is mapped specifically to the RMF steps and the NIST guidance outlined in Special Publications 800-37, 800-39 and 800-53 is (ISC)2’s Certified Authorization Professional (CAP®) credential and its Common Body of Knowledge (CBK®). CAP is ANSI accredited, and so DoD personnel who earn the CAP credential will also satisfy DoD 8570 compliance for IAM Levels I and II.

A broader context is required, Ross says, and civilian agencies need to rethink the RMF by making sure they are assessing their systems, choosing and implementing security controls and monitoring systems even as they assess and adapt to other factors, including the threat space, mission changes and technology evolutions.

The CAP CBK Training Seminar covers seven domains over a five-day period. The first domain provides a history and overview of the RMF and then delves deeply into the tasks and specifics of each of the six steps of the RMF process, including how to effectively select the right security controls and how to prepare a required document known as the continuous monitoring strategy that must be approved by the authorizing official.



You can’t base today’s tactics on yesterday’s battle plan because the conditions won’t remain the same.



In addition, the CAP coursework provides a deep understanding of the roles involved in the RMF process. Rae Hayward, (ISC)2’s Director of Education and Training, says that this is the topic that the DoD is most anxious to learn about “since at the different stages, accurate determination of who meets the requirements for each role will also identify who will be responsible for categorizing the systems and selecting the controls and then—once you get down to operating and monitoring the system—who will be responsible for taking action and signing off on that.”

“The RMF was really patterned after the way military commanders assess and adapt to changing circumstances on the battlefield: You can’t base today’s tactics on yesterday’s battle plan because the conditions won’t remain the same,” says Ross. “So you can no longer design a system security plan and expect it to survive for three years or even for three months. It’s going to have to be modified on an ongoing basis depending on what you’re experiencing or anticipating right now.”

To ensure that its role identification definitions are always

Mapping Knowledge to Value

up to date, (ISC)2 performs a job task analysis frequently, and it is currently in the process of cross-mapping the roles

The RMF’s new status as the risk management standard within the DoD and across the federal government notwithstanding, learning to apply the RMF can seem overwhelming. That’s why investing in training cybersecurity professionals on the specifics of the RMF process—rather than general principles of risk management—is critical, not just for those new to the

that existed within DIACAP to the roles as delineated within RMF in order to help DoD personnel more easily make the transition to RMF. Kelsall notes that there is value to any opportunity that can help train military personnel on the RMF process, including

5

internal training programs and CAP training. “If it makes more sense for me to go get something that I can use that’s already built and proven rather than trying to build something myself, then we’ll go that way, and that will probably be the better option for someone who’s worked as a Designated Approval Authority under DIACAP and just needs to get the RMF specifics,” he says.



If it makes more sense for me to go get something that I can use that’s already built and proven rather than trying to build something myself, then we’ll go that way,...



Personnel that complete CAP training can also go on to take the exam and earn the CAP credential. By taking this extra step, information security professionals not only validate their RMF knowledge and skills but they are also required to meet continuing education requirements, which provides their organization with ongoing access to the most up-to-date information on relevant risk assessment and management practices.

Ross notes that the RMF’s flexibility is enabling it to continue to evolve and grow in its relevancy and effectiveness at helping organizations protect systems throughout the information lifecycle. For example, NIST is currently drafting Special Publication 800-160, which will extend the RMF process and new security controls to the systems engineering and software development processes. With the adoption of RMF, the federal government is able to unify on a standard process and set of security controls while, at the same time, maintain unique and customized security strategies for different environments, Ross says. As information security professionals get up to speed on how to effectively leverage the dynamic nature of the RMF, it will result in the government’s overall ability to more effectively manage risk and protect the nation’s infrastructure. For more information on (ISC)2’s CAP Training, visit www.isc2.org/cap-training.

About (ISC)2® Formed in 1989, (ISC)2 is the largest not-for-profit membership body of certified information and software security professionals worldwide, with over 100,000 members in more than 160 countries. Globally recognized as the Gold Standard, (ISC)2 issues the Certified Information Systems Security Professional (CISSP®) and related concentrations, as well as the Certified Secure Software Lifecycle Professional (CSSLP®), the Certified Cyber Forensics Professional (CCFPSM), Certified Authorization Professional (CAP®), HealthCare Information Security and Privacy Practitioner (HCISPPSM) and Systems Security Certified Practitioner (SSCP®) credentials to qualifying candidates. (ISC)²’s certifications are among the first information technology credentials to meet the stringent requirements of ISO/IEC Standard 17024, a global benchmark for assessing and certifying personnel. (ISC)2 also offers education programs and services based on its CBK®, a compendium of information and software security topics. More information is available at www.isc2.org. © 2014, (ISC)2 Inc., (ISC)², CISSP, ISSAP, ISSMP, ISSEP, CSSLP, CAP, SSCP and CBK are registered marks, and CCFP and HCISPP are service marks of (ISC)2, Inc.

Suggest Documents