here

advertisement
System Security Categorization Review
(NOTE: See Excel Spreadsheets for GSS & MA Systems Categorization)
System Security Categorization Review for the
[SystemName (Acronym) and System Version Number]
Date Month, Year
1
System Security Categorization Review
Overview
XYZ COMPANY conducted a System Security Categorization assessment of the [SystemName]
(SystemAcronym). The purpose of this assessment is to identify and document the system’s security
categorization per the National Institute of Standards and Technology (NIST) Special Publication (SP)
800-60, Guide for Mapping Types of Information and Information Systems to Security Categories, and the
Federal Information Processing Standard (FIPS) 199, Standards for Security Categorization of Federal
Information and Information Systems.
This document provides the security categorization for the (SystemAcronym).
System Security Categorization Process
Background. The System Security Categorization is an invaluable asset in the Certification and
Accreditation (C&A) process and FIPS 199 requires it. The System Security Categorization
determination and document process follows NIST SP 800-60, Guide for Mapping Types of Information
and Information Systems to Security Categories, which implements FIPS 199. The basis for the
categorization is the identification of the types of information stored or created within the system, and
determining the expected impact to the SSA or the entity from a loss in Confidentiality, Integrity, and
Availability to the system or data.
Impact Levels. Descriptions of the security impact levels are below.
Security Impact Levels
Security Attribute
CONFIDENTIALITY
INTEGRITY
AVAILABILITY
Low
The unauthorized disclosure
of information could be
expected to have a limited
adverse effect on
organizational operations,
organizational assets, or
individuals.
Security Impact Level
Moderate
The unauthorized disclosure
of information could be
expected to have a serious
adverse effect on
organizational operations,
organizational assets, or
individuals.
The unauthorized
modification or destruction
of information could be
expected to have a limited
adverse effect on
organizational operations,
organizational assets, or
individuals.
The unauthorized
modification or destruction
of information could be
expected to have a serious
adverse effect on
organizational operations,
organizational assets, or
individuals.
The disruption of access to
or use of information or an
information system could
be expected to have a
limited adverse effect on
organizational operations,
organizational assets, or
individuals.
The disruption of access to
or use of information or an
information system could be
expected to have a serious
adverse effect on
organizational operations,
organizational assets, or
individuals.
2
High
The unauthorized
disclosure of information
could be expected to have
a severe, catastrophic
adverse effect on
organizational operations,
organizational assets, or
individuals.
The unauthorized
modification or
destruction of information
could be expected to have
a severe, catastrophic
adverse effect on
organizational operations,
organizational assets, or
individuals.
The disruption of access to
or use of information or an
information system could
be expected to have a
severe, catastrophic
adverse effect on
organizational operations,
organizational assets, or
individuals.
System Security Categorization Review
Process Steps.
The steps to determine the System Security Categorization are as follows:
 Obtain review and analyze existing documentation and interview system personnel to characterize the
system and identify the data elements and information contained within the system.
 Use NIST SP 800-60, to conduct an analysis to map each of the data elements to an applicable
Information Type.
 Determine and document the provisional impact levels, High, Medium, or Low, for Confidentiality,
Integrity, and Availability for each of the Information Types.
 The highest impact level for Confidentiality, Integrity, and Availability is the overall impact level for
the System Security Categorization impact level.
See Appendix A for the characterization of the system and the data types selected.
For further information, refer to NIST SP 800-60 and FIPS 199.
 NIST 800-60 Volume I, the overview of Security Categorization, is at
http://csrc.nist.gov/publications/nistpubs/800-60-rev1/SP800-60_Vol1-Rev1.pdf
 NIST 800-60 Volume II contains the details of the individual information types is at
http://csrc.nist.gov/publications/nistpubs/800-60-rev1/SP800-60_Vol2-Rev1.pdf.
 FIPS 199 is at http://csrc.nist.gov/publications/fips/fips199/FIPS-PUB-199-final.pdf.
3
System Security Categorization Review
Recommended Security Categorization for (SystemName) (System Acronym)
System Name:
System Acronym:
GSS/MA:
Description of System:
4
System Security Categorization Review
The following information types have been derived utilizing NIST SP 800-60.
Information Type
Impact Level
for
Confidentiality
Impact
Level for
Integrity
Impact Level
for
Availability
Given the information types and impact levels, the following are the system’s impact levels:
Final Impact Level
for Confidentiality
Final Impact Level
for Integrity
Final Impact Level
for Availability
The System Security Categorization recommendation:
LOW
MODERATE
HIGH
5
Overall Impact
Level
System Security Categorization Review
Appendix A: NIST 800-60 Security Categorization Worksheet
(Place copy of Security Categorization Worksheet here)
System Information:
MA Identifier:
MA Name:
MA Acronym:
System
Information:
MA Identifier:
Description:
MA Name:
MA Acronym:
MA Description:
Resident GSS Infrastructures:
FISMA ID
Owner
Sharing Partner
Resident GSS Infrastructures:
FISMA ID
Owner
Sharing Partner
800-60 Provisional Impact Levels
Δ
Applicable NIST 800-60 MA Information Type
Legend:
Confidentiality
Integrity
Availability
800-60
Provisional
C
I Impact LevelsA
Applicable NIST 800-60 MA Information Type
C
Δ
Δ
Legend:
Confidentiality
C
Integrity
I
Availability
A
C
Δ
Adjusted Impact Levels
= Deviation HWM = High Water-Mark
= No Change
= Reduce
= Increase
Adjusted Impact Levels
I
Δ
A
Δ
HWM
= Deviation HWM = High Water-Mark
= No Change
= Reduce
= Increase
I
Overall Security Category
Overall
Security
Applicable
NIST Category
800-60 MA Information Type
Information Type Association Rationale
Impact Level Adjustment Factors
Applicable NIST 800-60 MA Information Type
Information Type Association Rationale
Impact Level Adjustment Factors
6
Δ
A
Δ
HWM
Download