Module 7: Step 5 - Authorizing Information Systems

advertisement
FITSP-A
Module 6
Authorizing Information
Systems
Leadership
It is imperative that leaders and managers at all levels understand
their responsibilities and are held accountable for managing
information security risk.
SP 800-39 Managing Information Security Risk
(March 2011)
FITSP-A Exam Module Objectives
 Security Assessments and Authorization
– Assess and implement plans of action designed to correct
deficiencies and reduce or eliminate vulnerabilities in
organizational information systems
– Inspect mechanisms that authorize the operation of
organizational information systems and any associated
information system connections
Assessment and Authorization Overview
 Section A: Assessment and Authorization Tasks
–
–
–
–
Assess Security Controls
Authorization Package
Authorization Decisions
Authorization Decision Document
 Section B: Authorization Elements
– Ongoing Authorization
– Type Authorization
– Authorization Approaches
Section A
ASSESSMENT AND
AUTHORIZATION TASKS
RMF Step 4 – Assess Security
Controls




Assessment Preparation
Security Control Assessment
Security Assessment Report
Remediation Actions
RMF Step 5 – Authorize
Information System




Plan of Action and Milestones
Security Authorization Package
Risk Determination
Risk Acceptance
Authorization Package
Authorization Decisions
 Authorization to Operate
 Denial Of Authorization to Operate
 Interim Authorization to Test
 Interim Authorization to Operate
Authorization Decision Document




Authorization decision
Terms and conditions for the authorization
Authorization termination date
Risk executive (function) input (if provided)
Knowledge Check
 What is the first step in the Authorization RMF step?
 What documents the results of the security control
assessment and provides the authorizing official with
essential information needed to make a risk-based
decision on whether to authorize operation of an
information system or a designated set of common
controls?
 What are the contents of the Authorization Package,
from System Owner to Authorizing Official?
 The authorization decision document contains what
information?
Section B
AUTHORIZATION ELEMENTS
Ongoing Authorization




Maintains Knowledge of Current Security State
Re-execute RMF Step(s)
Maximize Use of Status Reports
Reauthorization
– Time-driven
– Event-driven
Type Authorization
 Definition of Type Authorization
– Official authorization decision to employ identical copies of an
information system or subsystem (including hardware, software,
firmware, and/or applications) in specified environments of
operation.
Authorization Approaches
 Single Authorizing Official
 Multiple Authorizing Officials
 Leveraging an Existing Authorization
Key Concepts & Vocabulary










Authorization Decisions
Authorization Decision Document
Authorization Package
Authorizing Official
IATO
IATT
POAM
SAR
SSP
Type Authorization
Questions?
Next Module: Continuous Monitoring
Download