Enterprise-Wide Risk Management Organization, Mission, and Information Systems View SC World Congress Data Security Conference November 10, 2010. Dr. Ron Ross Computer Security Division Information Technology Laboratory.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Enterprise-Wide Risk ManagementOrganization, Mission, and Information Systems ViewSC World Congress Data Security ConferenceNovember 10, 2010
Dr. Ron Ross
Computer Security Division
Information Technology Laboratory
Explosive growth and aggressive use of information technology.
Proliferation of information systems and networks with virtually unlimited connectivity.
Increasing sophistication of threat including exponential growth rate in malware (malicious code).
Resulting in an increasing number of penetrations of information systems in the public and private sectors…
Continuing serious cyber attacks on public and private
sector information systems targeting key operations,
assets, and individuals…
Attacks are organized, disciplined, aggressive, and well resourced; many are extremely sophisticated.
Adversaries are nation states, terrorist groups, criminals, hackers, and individuals or groups with hostile intentions.
Effective deployment of malware causing significant exfiltration of sensitive information (e.g., intellectual property).
Potential for disruption of critical systems and services.
Over 90% of critical infrastructure
systems/applications owned and
operated by non federal entities.
Energy (electrical, nuclear, gas and oil, dams)
Transportation (air, road, rail, port, waterways)
Public Health Systems / Emergency Services
Information and Telecommunications
Banking and Finance
Postal and Shipping
Agriculture / Food / Water / Chemical
A Broad-Based Partnership —
The Generalized Model
Unique Information Security Requirements
Department of Defense
Federal Civil Agencies
Common Information Security Requirements
National security and non national security information systems
STRATEGIC RISK FOCUS
TACTICAL RISK FOCUS
Mission / Business Process
(Information and Information Flows)
(Environment of Operation)
Integrates information security more closely into the enterprise architecture and system life cycle.
Promotes near real-time risk management and ongoing system authorization through the implementation of robust continuous monitoring processes.
Provides senior leaders with necessary information to make risk-based decisions regarding information systems supporting their core missions and business functions.
Links risk management activitiesat the organization, mission, and information system levels through a risk executive (function).
Establishes responsibility and accountability for security controls deployed within information systems.
Encourages the use of automation to increase consistency, effectiveness, and timeliness of security control implementation.
CATEGORIZE Information System
Define criticality/sensitivity of information system according to potential worst-case, adverse impact to mission/business.
SELECT Security Controls
Continuously track changes to the information system that may affect security controls and reassess control effectiveness.
Select baseline security controls; apply tailoring guidance and supplement controls as needed based on risk assessment.
Security Life Cycle
AUTHORIZE Information System
IMPLEMENT Security Controls
Determine risk to organizational operations and assets, individuals, other organizations, and the Nation;
if acceptable, authorize operation.
Implement security controls within enterprise architecture using sound systems engineering practices; apply security configuration settings.
Determine security control effectiveness
(i.e., controls implemented correctly, operating as intended, meeting security requirements for information system).
Links in the Security Chain: Management, Operational, and Technical Controls
(Biometrics, tokens, passwords)
(Firewalls, guards, routers, gateways)
Adversaries attack the weakest link…where is yours?
Recommended Security Controls for Federal Information
Systems and Organizations
Applying the Risk Management Framework to Federal
Information Systems: A Security Lifecycle Approach
Guide for Assessing the Security Controls in Federal
Information Systems and Organizations: Building Effective Assessment Plans
Enterprise-Wide Risk Management: Organization, Mission, and Information Systems View
Projected November 2010 (Public Draft)
Guide for Conducting Risk Assessments
Projected January 2011 (Public Draft)
100 Bureau Drive Mailstop 8930
Gaithersburg, MD USA 20899-8930
Project LeaderAdministrative Support
Dr. Ron RossPeggy Himes
(301) 975-5390(301) firstname.lastname@example.org email@example.com
Senior Information Security Researchers and Technical Support
Marianne Swanson Kelley Dempsey
(301) 975-3293 (301) 975-2827
Pat TothArnold Johnson
(301) 975-5140(301) 975-3247 firstname.lastname@example.org@nist.gov