Question

In: Computer Science

Accreditation is the evaluation of the security controls of an IT system to establish the extent...

Accreditation is the evaluation of the security controls of an IT system to establish the extent to which a particular design and implementation meets a set of specified security requirements. The risk management strategy used for A&A is depicted in the document, Risk Management Framework. Select Three of the six steps of the framework illustrated in the Risk Management Framework below:

STEPS: 1: Categorize Information System 2: Implement Security Controls 3: Assess Security Controls 4: Select Security Controls 5: Authorize Information System 6: Monitor Security Control

  1. Identify the step and associated government document.
  2. Discuss the importance of the step in the overall framework.
  3. What are the consequences if the step is not included in the risk management life-cycle.

Solutions

Expert Solution

Categorize Information System:
This is the first step of Risk Management Framework. This step determines the main importance of the information and on based of this informationit will conclude the following.
a.) worst case scenario
b.) antagonistic effect to the organization
c.) the vision and mission of the organization
According to Federal Information Processing Standard(FIPS)199, the following are the standards for Security Categorization of FIPS.
1.Confidentiality
2.Integrity
3.Availability
We should take care of how these 3 objectives effects the information. If the impact level is low, the loss has limited effect. If the impact level is moderate, the loss has serious effect which we should bother about. If the impact level is high, the loss has a very high effect which should be taken into account on an important note.
If this step is not included, then we will not be sure about which kind of information we have and how to go through about it. Further steps will be easy if we categorize the information.

Select Security Controls:
This is the second step of Risk Management Framework. This step selects its own security controls by starting with the most appropriate base using the output from Categorize Information System(Step 1). If needed, we have to use tailoring guidance according to the risk management.
Minimalistic Security Requirements for FIPS defines 17 security based families which includes broad based and balanced security system, in depth of operational, management and technical security controls(needed for the defense).The minimum baseline of the security controls will be implemented. We should take care that these baselines should be correctly tailored.
These privacy and Security measures are mainly not focused on any particular technology.
For example, Cloud based technology, mobile systems and their applications.
A very important point that is to be noted is that the Baselines should be tailored only based on the type of risk, to properly fit the mission and
vision of the system environment.
If this step is not included, we might lose the data or it might get hacked by others. So we need to protect our information. Confidentiality is very important.

Implement Security Controls:
We have to implement security controls which falls under the organizational architecture. We should use the appropriate security engineering methods to implement. SP 800-160 can be referred in this case. We should apply the configuration settings of the security properly.
We should plan the implementation in the development phase of SDLC. There are many publications that are available which helps us for proper implementation on a vast area of controls and its types.
The implementation might include the following.
i.) Taking a note of the policies and following the plans and the operational procedures.
ii.) Configuring the settings appropriately in the applications
iii.) Automating the implementation.
If this step is not included, then the information may get leaked and the actual purpose may be deviated.


Related Solutions

Accreditation is the evaluation of the security controls of an IT system to establish the extent...
Accreditation is the evaluation of the security controls of an IT system to establish the extent to which a particular design and implementation meets a set of specified security requirements. The risk management strategy used for A&A is depicted in the document, Risk Management Framework. Select ONE of the six steps of the framework illustrated in the Risk Management Framework. In at least 250 words, discuss the following: Identify the step and associated government document. Discuss the importance of the...
3. Are the types of system controls that may be implemented effective at maintaining system security?...
3. Are the types of system controls that may be implemented effective at maintaining system security? Justify your answer. Answer that question in at least 300 words.
I am creating a system for a security design and need to choose controls for network...
I am creating a system for a security design and need to choose controls for network security and those with access controls as well. I need to decide what major network security controls I would need to recommend. Which ones are good examples and why? Within that, I need to describe three access control techs. and their essentials for util. apps. Are there a few cases to assist in demonstrating those access control techs.
the concepts of nature, timing, and extent as they relate to controls testing
Discuss the concepts of nature, timing, and extent as they relate to controls testing.
Evaluation and testing of controls at Hales Ltd Tyrone has provided a narrative of controls over...
Evaluation and testing of controls at Hales Ltd Tyrone has provided a narrative of controls over inventory at Hales Ltd and would like you to provide some advice on making the preliminary control risk assessment. Hales is a distributor of haircare products, including shampoos, conditioners and styling products throughout Australia. Hales uses an on-line ordering system. Hales does not manufacture any goods in house, instead, an inventory of raw materials is kept, with manufacturing being outsourced to other companies. Hales...
- List some of Windows Server threats and the security controls?
- List some of Windows Server threats and the security controls?
Analyze and draw conclusions about the nature and extent of tests of controls: For each assertion...
Analyze and draw conclusions about the nature and extent of tests of controls: For each assertion that you identify as high or maximum inherent risk, identify an internal control, or a combination of internal controls, that would control that risk. Explain the nature and extent of tests of controls you would need to perform to assess control risk as low, for the controls you identified in (c)1 above. Analyze and draw conclusions about the nature, timing, and extent of substantive...
Research and include the following: Security Risk Mitigation Plan: Select and document security policies and controls.
Security Mitigation Plan discuss the following Research and include the following: Security Risk Mitigation Plan: Select and document security policies and controls. Create password policies. Document administrator roles and responsibilities. Document user roles and responsibilities. Determine authentication strategy. Determine intrusion detection and monitoring strategy. Determine virus detection strategies and protection. Create auditing policies and procedures. Develop education plan for employees on security protocols and appropriate use. Provide risk response. Avoidance Transference Mitigation Acceptance Address change Management/Version Control. Outline acceptable use of organizational assets and data. Present employee policies (separation of duties/training). Explain incident response. Incident types/category definitions Roles and responsibilities Reporting requirements/escalation Cyber-incident response...
For Aira, discuss what the appropriate security and controls should be for the device
For Aira, discuss what the appropriate security and controls should be for the device, for a smart phone app that reads the device, and for a web site where device readings can be stored and shared with medical personal. Note: Your device may not currently support all three of these options. If not, assume that such enhancements have been made for the device/system.
Adoption of the Critical Security Controls is a hot topic in today’s organizations.
Adoption of the Critical Security Controls is a hot topic in today’s organizations. Review the CSC survey document and provide at least one suggestion on three different controls for an organization to move from awareness of the CSC’s to implementation. Please feel free to make assumptions as needed for you to develop recommendations for a fictional company. The document is attached. https://www.sans.org/reading-room/whitepapers/analyst/2013-critical-security-controls-survey-moving-awareness-action-35065
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT