Enterprise Continuous Monitoring Program - PowerPoint PPT Presentation

1 / 32
About This Presentation
Title:

Enterprise Continuous Monitoring Program

Description:

Finally, the DAA is briefed of the results by the system POC and the SPMO ... Brief System DAA. Assist System POC in Briefing DAA (upon request) ... – PowerPoint PPT presentation

Number of Views:112
Avg rating:3.0/5.0
Slides: 33
Provided by: paul47
Category:

less

Transcript and Presenter's Notes

Title: Enterprise Continuous Monitoring Program


1
Enterprise Continuous Monitoring Program
Training Date
2
Contents
  • Continuous Monitoring Refresher
  • Continuous Monitoring Process Approach for FY08
  • Task Overview and Activity Breakout
  • Implementation Process and Next Steps
  • QA

3
Continuous Monitoring Refresher
  • What is Continuous Monitoring (CM)?
  • The Federal Information Security Management Act
    of 2002 (FISMA) requires periodic testing (at
    least annually) of selected security controls for
    all federal certified and accredited (CA)
    systems to evaluate their effectiveness
  • System documentation is updated to reflect
    changes and modifications to the system
  • While general guidance on continuous monitoring
    is provided by National Institute of Standards
    and Technology (NIST) SP 800-37 and SP 800-53A,
    the Agency follows guidance to help create their
    process framework
  • The establishment of a robust Continuous
    Monitoring Framework is an integral piece of the
    information security program
  • A solid continuous monitoring approach will keep
    system stakeholders apprised of their security
    status and help integrate security into everyday
    roles and responsibilities
  • FY08 framework is based on the need for an
    enterprise continuous approach and on guidance
    for the selection of controls and discussion with
    auditors

4
Continuous Monitoring Refresher (continued)
  • Security controls are to be tested on an annual
    basis
  • Continuous Monitoring would occur between
    CA/Security Test Evaluation (STE) cycles for
    systems
  • A minimum number of security controls will be
    tested to monitor the state of security for all
    systems on a yearly basis as well as satisfying
    FISMA requirements
  • Testing throughout the year fosters a more active
    Plans of Action Milestones (POAM) update and
    reconciliation process strengthening the accuracy
    and accountability of each systems POAM and
    high volatility controls
  • Eventually, continuous monitoring will be
    integrated into the quarterly POAM update
    process allowing the system stakeholders to use
    these plans to guide future security
    certification and accreditation activities

5
Continuous Monitoring Approach for FY08
  • Starting the process earlier in FY08
  • May use a three-phrase approach for system
    testing (similar to CAs)
  • Takes lessons learned from both an audit report
    and stakeholders Security controls are to be
    tested on an annual basis
  • Conduct internal meetings, surveys, or
    questionnaires with System Points of Contact
    (POCs) and stakeholders to help identify system
    changes to POCs or security controls (Security
    Control Assessment Guide provides a list of
    questions to assist with determining significant
    changes to the system)
  • Conduct training with all SPMOs on the enterprise
    continuous monitoring approach
  • Provide Security Program Management Office (SPMO)
    with a training deck to assist the System POC and
    testers with security control testing
  • Conduct pre-testing kick-off meeting to outline
    how testing will be conducted
  • Coordinate CA documentation updates with CM
    activities
  • Review each system to determine
    application-specific control set for testing

6
Task 1 Initiation and Planning
7
Task 1 Initiation and Planning Overview
  • The Initiation and Planning task includes
    activities that will assist in the overall
    continuous monitoring process.
  • Systems undergoing CM during the FISMA year are
    identified and scheduled for testing.
  • CA documentation from the previous cycle stored
    in Trusted Agent FISMA (TAF) is downloaded and
    reviewed to ensure that the appropriate controls
    are identified, selected, and fed into Task 2.
  • Distribute Security Control Selection Guide to
    assist business owners in identifying any changes
    necessary to select controls.
  • A preliminary update is made to the System
    Security Plans (SSPs) (via Appendix YY) based on
    the results from the questions answered from the
    Security Control Selection Guide.
  • Testing of controls will not be the
    responsibility of any one individual or
    organization. Depending on the controls
    selected, the test team may involve Information
    Technology Business Unit representatives to
    conduct tests with a technical or operational
    flavor.
  • Stakeholder training will be provided to help set
    expectations and educate the stakeholders on
    roles/responsibilities, tasks, activities and
    schedules

8
Task 1 Initiation and Planning - Activity
Breakout
9
Task 1 Initiation and Planning - Activity
Breakout (continued)
10
Task 2 Control Selection
11
Task 2 Control Selection Overview
  • Test Control Selection is conducted by the
    business owner based on the Assessment Control
    Selection Guide
  • The list of the mandatory and high volatility
    NIST SP 800-53 controls to test for each system
    during the annual cycle is pre-determined and
    should be used as a starting point for control
    selection
  • Other controls to be selected include closed
    POAM controls
  • Collaboration between the stakeholders will help
    determine any additional security controls should
    be tested throughout the year
  • Selected controls should reflect the agencies
    priorities and the importance of the information
    system to the agency. For example, certain
    security controls may be considered more critical
    than other controls because of the potential
    impact on the information system if those
    controls were subverted or found to be
    ineffective.
  • Once selected, a control selection agreement is
    formalized via the Control Selection Memo process

12
Task 2 Control Selection Overview (continued)
  • The Assessment Control Selection Guide was
    created to assist the SPMO/business owner to
    select the security controls to be tested for the
    purpose of performing continuous
    monitoring/annual security control testing.
  • The flow of the guide is as follows
  • The Security Control Selection Guide Overview -
    will provide the documents background and
    purpose
  • The Security Control Selection Process
  • Types of Controls discusses the types of
    controls from which a system owner will select
    the controls to be evaluated during continuous
    monitoring.
  • Types of Security Control Testing covers the
    two types of security control testing based on
    whether a system has performed a Certification
    and Accreditations (CA) in the current FISMA
    cycle.
  • Selection of Additional Volatile Controls
    details three approaches for further selection an
    additional subset of controls
  • A quick reference guide summary

13
Task 2 Control Selection - Activity Breakout
14
Task 3 Pre-Test Preparation
15
Task 3 Pre-Test Preparation Overview
  • Update testing workbooks with selected controls
  • Update any security controls with additional
    technical test cases from previous CA effort
    referring to the STE plan for these test cases
  • Testing workbooks are MS Excel spreadsheets
    containing controls selection matrix, security
    assessment report form and test cases for each
    control
  • A testing schedule is created and finalized
    during the pre-test meeting
  • The pre-test meeting will be held for each
    system
  • Invites will be sent out
  • Outlines specific testing guidelines
  • Answers questions about the evidence required
  • Obtain participation commitments

16
Task 3 Pre-Test Preparation Overview (continued)
  • Workbook Tab Control Selection Matrix

17
Task 3 Pre-Test Preparation Overview (continued)
  • Workbook Tab Control test cases and Sample

18
Task 3 Pre-Test Preparation Overview (continued)
  • Workbook Tab Security Assessment Reporting Form

19
Task 3 Pre-Test Preparation - Activity Breakout
20
Task 4 Perform Test
21
Task 4 Perform Test Overview
  • Controls will be tested using NIST 800-53A test
    procedures and documented in the testing
    workbooks for each system
  • Note how the NIST guidance aligns with our
    process
  • Input Phase 2 (Control Selection)
  • Processing Phase 3 (Pre-Test Prep)
  • Output Phase 4 (Perform Test)

Assessment methods are used to assess objects (in
parentheses) - Examine (documents - to include
gathered evidence as necessary) - Interview
(personnel) - Test (activities or HW/SW)
22
Task 4 Perform Test Overview (continued)
  • CM tests can be conducted via teleconference
  • Invitations should be sent out
  • Documentation will be updated with test results
  • Workbooks/Reports
  • SSPs (via Appendix YY)
  • Appendix YY will be used to document changes from
    the test results
  • Contains control status updates
  • SSP Appendix YY will be validated with the system
    stakeholders and any last documentation updates
    will be made

23
Task 4 Perform Test - Activity Breakout
24
Task 5 Analyze Results
25
Task 5 Analyze Results Overview
  • Upon completion of the testing workbooks, the
    System POC delivers the test results to the SPMO
  • SPMO will perform analysis of the documented
    results providing scoring recommendations for the
    evaluated security controls
  • The scoring methodology ensures the test
    procedures are assessed appropriately and the
    required evidence is provided for audit purposes

26
Task 5 Analyze Results Overview (continued)
  • Scoring criteria is based on a Satisfied or an
    Other than satisfied for each determination
    statement under each control test procedure
  • If the results are determined to be sufficient
    and the test procedure is determined to be
    satisfied, the determination statement and
    procedure will be marked as S/Satisfied
  • If the test procedure is not fully addressed or
    the results determine the system does not comply,
    the determination statement and procedure will be
    marked as O/Other than satisfied
  • If the determination statement and procedure is
    not applicable to the information system, the
    determination statement and procedure will be
    marked as N/A.
  • Based on the determination statement results, the
    test teams should mark the control as In Place,
    Partial, Planned, risk based decision, or Not
    Applicable
  • Scoring criteria consistent with NIST guidance
    has been applied to ensure that test procedure is
    assessed to determine if the result sufficiently
    addresses the focus of the test procedure and
    that the required evidence is provided
  • Should all of the determination statements and
    test procedures for a control be marked as
    S/Satisfied, then the control will be scored as
    In Place.
  • Should one or more of the determination
    statements and test procedures for a control be
    marked as O/Other than satisfied, then the
    control will be scored as Partially in Place.
  • Should most or all of the determination
    statements and test procedures for a control be
    marked as O/Other than satisfied or N/A.,
    then the control will be scored as Planned, RBD,
    or N/A.

27
Task 5 Analyze Results - Activity Breakout
28
Task 6 Confirm Results
29
Task 6 Confirm Results Overview
  • Following the completion of results analysis by
    SPMO, SPMO representatives will deliver the CM
    Package to the system POCs
  • The CM package contains the analysis of each
    systems respective test results, including an
    executive-style report describing the scoring
    recommendations and identifying all weaknesses to
    each system
  • CM Package also contains the Signed Control
    Selection Memo
  • The system owner will review and concur with the
    results
  • This will allow the system stakeholders and the
    SPMO the opportunity to discuss scoring
    recommendations made by the SPMO, and give the
    SPMO representatives the opportunity to explain
    scoring rationale and justifications
  • Upon agreement between the system stakeholders
    and SPMO representatives, the confirmed results
    will be used to update each systems respective
    POAM
  • If not in agreement, SPMO representatives will
    work with system stakeholders to ensure results
    are agreed upon before the system POC updates
    their system POAM (if applicable)
  • Finally, the DAA is briefed of the results by the
    system POC and the SPMO uploads the final CM
    Package to TAF

30
Task 6 Confirm Results - Activity Breakout
31
Implementation Process and Next Steps
  • SPMOs Train Test Teams and start control
    selection process Feb 2008
  • Hold Pretest Status Meetings Feb 2008
  • Deliver Control Selection memos and test
    workbooks to begin FY08 testing
  • Objective ensure test teams to prepared to
    start testing
  • Complete Control Selection Matrix
  • Review Control Selection Memo and request DAA
    signature
  • Provide Workbooks with expected test completion
    dates
  • Start testing
  • Provide test support during all test phases Feb
    2008 Apr 2008
  • Hold Close-out Status Meeting May 2008
  • Objective is to close-out previous test phase and
    begin next test phase
  • Close-out to Discuss/resolve issues associated
    with test results, process, etc.
  • Review executive summary and request signature
  • Update SSP (if necessary)
  • Start new cycle with FISMA 09 Status Meeting
    June 2008

32
QA
Write a Comment
User Comments (0)
About PowerShow.com