Operational Class Security Control Families ID CA PL PM RA SA AT CM CP IR MA MP PE PS SI AC AU IA SC Class Management Management Management Management Management Operational Operational Operational Operational Operational Operational Operational Operational Operational Technical Technical Technical Technical Family Security Assessment and Authorization Planning Program Management Risk Assessment System and Services Acquisition Awareness and Training Configuration Management Contingency Planning Incident Response Maintenance Media Protection Physical and Environmental Protection Personnel Security System and Information Integrity Access Control Audit and Accountability Identification and Authentication System and Communications Protection # of 6 5 11 4 14/40 5 9 10 8 6 6 19 8 13/84 19 14 8 34/75 Awareness & Training AT-2 Security Awareness AT-3 Security Training AT-4 Security Training Records CP-3 IR-2 CP-4 IR-3 Contingency Training Incident Response Training Contingency Plan Testing and Exercises Incident Response Testing and Exercises 800-16 800-50 800-84 – Plan Testing, Training and Exercise TT&E Test Training Exercises – Tabletop – Functional CP-3 Contingency Training IR-2 Incident Response Training CP-4 Contingency Plan Testing and Exercises IR-3 Incident Response Testing and Exercises CP TT&E CP TT&E Configuration Management CM-2 CM-3 CM-4 CM-5 CM-6 CM-7 Baseline Configuration Configuration Change Control Security Impact Analysis Access Restrictions for Change Configuration Settings Least Functionality Information System Component CM-8 Inventory CM-9 Configuration Management Plan 800-70 800-128 CM OMB 07-11 OMB 07-18 OMB 08-22 SCAP/NVD FDCC The Phases of Security-focused Configuration Management SCAP v1.2 Components Additional SCAP Terminology Knowledge Check Which SCAP specifications provide a standard naming convention for operating systems, hardware, and applications for the purpose of providing consistent, easily parsed names? What is defined as an identifiable part of a system (e.g., hardware, software, firmware, documentation, or a combination thereof) that is a discrete target of configuration control processes? Which special pub provides guidelines on designing, developing, conducting, and evaluating test, training, and exercise (TT&E) events? Contingency Planning CP-6 CP-7 CP-8 CP-9 CP10 Alternate Storage Site Alternate Processing Site Telecommunications Services Information System Backup Information System Recovery and Reconstitution 800-34 FCD 1 Type of Plans Contingency Planning Process Business Impact Analysis System/Process Downtime Maximum Tolerable Downtime (MTD) Recovery Time Objective (RTO) Recovery Point Objective (RPO) Recovery Strategies Incident Response IR-4 IR-5 IR-6 IR-7 IR-8 Incident Handling Incident Monitoring Incident Reporting Incident Response Assistance Incident Response Plan 800-61 Incident Response 800-83 (SI) Malware Handling an Incident Preparation Detection and Analysis Containment, Eradication, and Recovery Post-Incident Activity Incident Reporting Organizations US-CERT [IR 6,7] Each agency must designate a primary and secondary POC with US-CERT, report all incidents, and internally document corrective actions and their impact. [IR-7] Information Analysis Infrastructure Protection (IAIP) CERT® Coordination Center (CERT®/CC) Information Sharing and Analysis Centers (ISAC) Federal Agency Incident Reporting Categories CAT 0 - Exercise/Network Defense Testing CAT 1 - *Unauthorized Access CAT 2 - *Denial of Service (DoS) CAT 3 - *Malicious Code CAT 4 - *Inappropriate Usage CAT 5 - Scans/Probes/ Attempted Access CAT 6 - Investigation * Any incident that involves compromised PII must be reported to US-CERT within 1 hour of detection regardless of the incident category reporting timeframe. Knowledge Check Name the contingency planning variable that defines the maximum amount of time that a system resource can remain unavailable before there is an unacceptable impact on other system resources, supported mission/business functions, and the MTD? What is created to correlate the information system with critical mission/business processes, which is further used to characterize the consequences of a disruption? Which Federal mandate requires agencies to report incidents to US-CERT? What is the US-CERT incident category name and reporting timeframe for a CAT-2 incident? System Maintenance MA-2 MA-3 MA-4 MA-5 MA-6 Controlled Maintenance Maintenance Tools Non-Local Maintenance Maintenance Personnel Timely Maintenance 800-63 - E-Auth (IA) 800-88 – Sanitization (MP) FIPS 140-2 - Crypto FIPS 197 - AES FIPS 201 – PIV (IA) Encryption Standards FIPS 140-2 – Level 1 – Basic (at least one Approved algorithm or Approved security function shall be used) – Level (EAL) 2 - Tamper-evidence, requires role-based authentication – Level (EAL) 3 – Intrusion detection and prevention, requires identity-based authentication mechanisms – Level (EAL) 4 – Zeroization, environmental protection Advanced Encryption Standard (FIPS 197) 27 Media Protection MP-2 MP-3 MP-4 MP-5 MP-6 Media Access Media Marking Media Storage Media Transport Media Sanitization 800-56 Key Management 800-57 800-60 800-88 - Sanitization 800-111 – Storage Encryption Storage Encryption Technologies Media Sanitization Disposal - discarding media with no other sanitization considerations Cleaning - must not allow information to be retrieved by data, disk, or file recovery utilities. Purging - protects the confidentiality of information against a laboratory attack. Destroying - ultimate form of sanitization: disintegration, incineration, pulverizing, shredding, and melting. 30 Sanitization and Disposition Decision Flow PE-2 PE-3 PE-4 PE-5 PE-6 PE-7 PE-8 PE-9 PE-10 PE-11 PE-12 PE-13 PE-14 PE-15 PE-16 PE-17 PE-18 Physical & Environmental Emergency Shutoff Protection Emergency Power Emergency Lighting Fire Protection Temperature and Humidity Controls Water Damage Protection Delivery and Removal Alternate Work Site Location of Information System Components Physical Access Authorizations Physical Access Control Access Control for Transmission Medium Access Control for Output Devices Monitoring Physical Access Visitor Control Access Records Power Equipment and Power Cabling 800-46 – Telework/ Remote Access 800-73 800-76 800-78 FIPS 201 PIV (IA) Physical Access Controls Badges Memory Cards Guards Keys True-floor-to-true-ceiling Wall Construction Fences Locks Fire Safety Ignition Sources Fuel Sources Building Operation Building Occupancy Fire Detection Fire Extinguishment Supporting Utilities Air-conditioning System Electric Power Distribution Heating Plants Water Sewage Planning for Failure – Mean-Time-Between-Failures (MTBF) – Mean-Time-To-Repair (MTTR) Personnel Security PS-2 PS-3 PS-4 PS-5 PS-6 PS-7 PS-8 Position Categorization Personnel Screening Personnel Termination Personnel Transfer Access Agreements Third-Party Personnel Security Personnel Sanctions 800-73 800-76 800-78 PIV (IA) 5 CFR 731.106 Designation of public trust positions and investigative requirements. ICD 704 Personnel Security Standards (SCI) Staffing User Administration User Account Management Audit and Management Reviews Detecting Unauthorized/Illegal Activities Temporary Assignments and In-house Transfers Termination Termination Friendly Termination Unfriendly Termination Knowledge Check Which FIPS 140-2 encryption level requires identity based authentication? What is the FIPS publication specifies the Rijndael algorithm, a symmetric block cipher that can process data blocks of 128 bits, using cipher keys with lengths of 128, 192, and 256 bits? What is the recommended disposal method, from the sanitization guidelines of NIST SPO 800-88, for paperbased medical records containing sensitive PII? What is the supporting guideline for PS-9 Alternate Work Site? Systems Integrity SI-2 Flaw Remediation SI-3 Malicious Code Protection SI-4 Information System Monitoring Security Alerts, Advisories, and SI-5 Directives SI-6 Security Functionality Verification Software and Information SI-7 Integrity SI-8 Spam Protection SI-9 Information Input Restrictions SI-10 Information Input Validation SI-11 Error Handling Information Output Handling and SI-12 Retention 800-40 – Patching (RA) 800-45 - Email 800-61 – Incidents (IR) 800-83 - Malware 800-92 – Logs (AU) 800-94 - IDPS NVD/CWE Malware Incident Prevention & Handling Malware Categories Malware Incident Prevention – – – – Policy Awareness Vulnerability Mitigation Threat Mitigation Malware Incident Response – – – – – – Preparation Detection Containment Eradication Recovery Lessons Learned Malware Categories Viruses – – – Worms Trojan Horses Malicious Mobile Code Blended Attacks Tracking Cookies Attacker Tools – – – – – – Compiled Viruses Interpreted Viruses Virus Obfuscation Techniques Backdoors Keystroke Loggers Rootkits Web Browser Plug-Ins E-Mail Generators Attacker Toolkits Non-Malware Threats – – Phishing Virus Hoaxes Uses of IDPS Technologies Identifying Possible Incidents Identify Reconnaissance Activity Identifying Security Policy Problems Documenting Existing Threat to an Organization Deterring Individuals from Violating Security Policies Key Functions of IDPS Technologies Recording information related to observed events Notifying security administrators of important observed events Producing reports Response Techniques – Stops Attack – Changes Security Environment – Changes Attack’s Content False Positive False Negative Tuning Evasion Common Detection Methodologies Signature-Based Detection Anomaly-Based Detection Stateful Protocol Analysis Types of IDPS Technologies Network-Based Wireless Network Behavior Analysis Host Based Email Security - Spam Ensure that spam cannot be sent from the mail servers they control Implement spam filtering for inbound messages Block messages from known spam-sending servers Operational Security Controls Key Concepts & Vocabulary Awareness and Training Configuration Management Contingency Planning Incident Response Maintenance Media Protection Physical and Environmental Protection Personnel Security System and Information Integrity