Appendix C Technical Requirements Worksheet

advertisement
Appendix C
Technical Requirements Worksheet (A)
On Appendix C, Technical Requirements Worksheet (A), if your company has
delivered a project that contained any of the described IT Security Service(s) service
items within the past 36 months, record “Yes” in the response column.
If your company has not delivered a project that contained the described IT Security
Service(s) service item within the past 36 months, record “NA” in the response
column. The GTA is expecting to see either a “Yes” or “NA” for Not Applicable
response to each of the 13 IT Security Service(s) service item criteria.
APPENDIX C
TECHNICAL REQUIREMENTS WORKSHEET (A)
CATEGORY I
IT Program Security Services – Provided NIST aligned security program management and planning activities
focused to support organizational mission objectives and enable IT security efforts toward compliance with
federal laws, executive orders, directives, policies, regulations, standards and guidance. These activities should
include development and evaluation of:
SERVICE ITEM(s)
SERVICE ITEM #1:
Information Security Program Planning – Project should have proactively planned for,
implemented and monitored for the appropriate information security management, culture,
processes and security controls that supported the business missions. The efforts should have been
structured to facilitate IT security management functions in a cost-effective manner, while
addressing evolving information security risks. The planning efforts goal should have been to
increase the level of maturity and effectiveness of the information security program.
Service activities should have included:
 Information security strategic planning
 Information security governance structure development/reviews
 Determination of Roles & Responsibilities
 Risk management activities
 Information security policy / standards / guidance development
 Security control reviews
 Personnel security
 Assessment of the security cultural environment
 Program and system documentation development
 Monitoring program overall effectiveness
SERVICE ITEM #2:
Security Awareness Training and Education – Project should have provided the workforce with the
information and tools needed to protect an organization’s vital information resources. The project
should have ensured personnel at all levels of the organization understand their information
security responsibilities, how to properly use and protect the information and resources entrusted
to them.
SERVICE ITEM #3:
Life Cycle Management Support –Project should that were directed to support efforts involving a
planning and governance framework to ensure that all investments in information technology are
evaluated and managed at specific points in their lifecycle to ensure that the investments mee t the
business performance and security needs and expectations of the enterprise. Additionally, the Life
Cycle support services include experience employing an industry accepted System Development
Life Cycle (SDLC), Change Controlled process and Configuration Management methodology.
SERVICE ITEM #4:
Incident and Emergency Response Planning – Project should have involved the planning efforts to
develop an incident response capability necessary for rapidly detecting incidents, minimizing loss
and destruction, mitigating the weaknesses that were exploited, and restoring computing services.
SERVICE ITEM #5:
Contingency and Disaster Response Planning – Project should have provided for the development
of interim measures to recover information system services after a disruption. Interim measures
may include relocation of information systems and operations to an alternate site, recovery of
information system functions using alternate equipment, or performance of information system
functions using manual methods.
Have you
performed?
(“YES” or “NA”)
APPENDIX C
TECHNICAL REQUIREMENTS WORKSHEET (A)
CATEGORY II
IT System Security Services - Pre Operational - Provided FISMA Risk Management Framework aligned technical
security analysis, planning and engineering support up through the “deploy” stage of the “Enterprise Performance
Lifecycle”.
These support areas should have involved:
 Project conceptualization
 Proposal assessment
 System development or acquisition
 Deployment actions
The activities should have been structured to provide an appropriate security solution deliverable that addresses
the individual compliance and business needs of the entity. The activities may include:
SERVICE ITEM(s)
SERVICE ITEM #1:
System Security Planning – Project should have involved the development or revision of the system security
plan(s) that provided an overview of the security requirements of the system(s) and described the controls in
place or planned for meeting those requirements. The system security plan(s) should have also delineated
responsibilities and expected behavior of all individuals who access those system(s). The planning effort
should have required development of other key security-related documents or actions for the information
system such as:
 Risk assessment
 Boundary definitions
 Data categorization
 Security configuration checklists
 System interconnection agreements
The controls should have been consisted mainly of controls described by NIST as part of the FISMA RMF. See
NIST Special Publication 800-18.
SERVICE ITEM #2:
System Security Plan Implementation – Project should have provided for the implementation of a
system’s security plan or implementation of additional security controls added to a prior version of
the system security plan. These controls should have been implemented as described in the syste m
security plan and in accordance with the FISMA RMF documentation available from NIST. Activities
and artifacts may have included, but not be limited to, system security control implementation,
security control configuration documentation, development of operational guides, project
planning, control gap analysis and tuning, development of Plans of Actions and Milestones, etc.
SERVICE ITEM #3:
SDLC Application Development Reviews – Project should have performed analysis and/or reviews of either
the development process or the final artifact of an SDLC effort to ensure that security design, secure coding
practices and application testing are performed prior to application(s) being placed into a production
environment. Best industry practices and tools should have been utilized to study and evaluate the process
efforts and product artifact so that the review accurately assessed the risks/issues and their potential
effects. Activities and artifacts should have encompassed all SDLC phases such as:
 Initiation
 Development/acquisition
 Implementation/assessment
 Operations/maintenance
 Disposal
 White or black box testing
 Process review
 Development / review of security architecture documentation
Have you
performed?
(“YES” or “NA”)
APPENDIX C
TECHNICAL REQUIREMENTS WORKSHEET (A)
CATEGORY II
IT System Security Services - Pre Operational - Provided FISMA Risk Management Framework aligned technical
security analysis, planning and engineering support up through the “deploy” stage of the “Enterprise Performance
Lifecycle”.
These support areas should have involved:
 Project conceptualization
 Proposal assessment
 System development or acquisition
 Deployment actions
The activities should have been structured to provide an appropriate security solution deliverable that addresses
the individual compliance and business needs of the entity. The activities may include:
SERVICE ITEM(s)
SERVICE ITEM #4:
Pre-Operational Security Assessments – Project should have provided a point in time security
assessment of a systems security posture, from a “pre-production” basis, of the system’s security
controls using appropriate tools and procedures to determine the extent to which the planned
controls were implemented correctly, operated as intended, and produced the desired outcome
with respect to meeting the security requirements for the system.
Activities and artifacts may have included, but not be limited to:
 Data categorization
 Security control selection
 Initial control baseline determination
 Penetration testing
 Control tailoring
 Supplementation
 Assessment reporting
Delivery should have included reporting and recommendation objectives for the target system so as
to improve the organization overall security posture before being placed into the production
environment. The assessment reporting should have been based on FISMA documentation.
Have you
performed?
(“YES” or “NA”)
APPENDIX C
TECHNICAL REQUIREMENTS WORKSHEET (A)
CATEGORY III
IT System Security Services – Operational – Provided FISMA Risk Management Framework aligned technical
security analysis, planning and engineering support within the “operations and disposition” stages of the
“Enterprise Performance Lifecycle”. These support areas should have involved:
 Acquisitions
 Installations
 Upgrades
 Event monitoring/analysis
 Assessments that report about the effectiveness of the deployed security controls in the information system
The activities should have been structured to provide an appropriate security solution deliverable that addresses
the individual compliance and business needs of the entity. The activities should have included:
SERVICE ITEM(s)
SERVICE ITEM #1:
Security Services and Products Acquisition – Project should have provided appropriate business
owners and stakeholders that performed analytics, utilizing best practice methodologies, to
determine the most advantageous solution that addressed the declared business objective(s) and
requirement(s) for a proposed security solution. Actions toward planning, staging, installation
and/or modification should have included advanced technology security products and services
were selected and used appropriately within the organization’s overall security envi ronment.
Actions should have included providing analysis to identify potential or existing assets as well as
the risks to those assets, to estimate the likelihood of security failures, and to identify and
recommend appropriate controls for protecting those assets and resources based on the entity
business objectives and security plan(s). Activities and artifacts may have included, but not be
limited to:
 Performing asset inventories
 Identification of critical security services/functions gaps
 Risk analysis
 Development and articulation of rational justifications for security project approval
 Development of service level arrangements
 Project planning for integration or transition efforts for the desired future security
implementation
 Security control identification
 Product or service acquisitions
 Installations or upgrades
SERVICE ITEM #2:
Operational Security Assessments – Project should have provided a point in time assessment, from
an “operational” environment basis, of a system’s security controls using appropriate tools and
procedures to determine the extent to which the client’s current controls are implemented
correctly, operating as intended, and producing the desired outcome with respect to meeting the
security requirements for the system. The assessment process should have included documenting
any changes to the system or environment since implementation, conduct security impact analyses
and determine if control modifications are necessary due to changes of data categorization or
governing control requirements and document/report on the results as to security appropriate
officials. Additionally the service should have included the development of recommendations to
guide management with risk based prioritized remedial actions to address the gaps identified in the
security environment. The assessment reporting should have utilized reporting template forms
based on FISMA documentation.
Have you
performed?
(“YES” or “NA”)
APPENDIX C
TECHNICAL REQUIREMENTS WORKSHEET (A)
CATEGORY III
IT System Security Services – Operational – Provided FISMA Risk Management Framework aligned technical
security analysis, planning and engineering support within the “operations and disposition” stages of the
“Enterprise Performance Lifecycle”. These support areas should have involved:
 Acquisitions
 Installations
 Upgrades
 Event monitoring/analysis
 Assessments that report about the effectiveness of the deployed security controls in the information system
The activities should have been structured to provide an appropriate security solution deliverable that addresses
the individual compliance and business needs of the entity. The activities should have included:
SERVICE ITEM(s)
SERVICE ITEM #3:
Security Incident and Event Monitoring – Project should have provided services directed toward
establishment, review and recommendations of mechanisms and processes that were structured to
automatically collect, aggregate, correlate and filter security event information from key points
across the network and thus assist in providing for both automated and human analysis
functionality concerning anomalous or potentially damaging security events. These actions should
have been leveraged to provide better response and reporting capabilities and thus assist with
compliance to regulatory requirements. Activities and artifacts may have included, but not be
limited to:
 Implementation or review of the entity monitoring program
 Historical event data collection
 Log management reviews
 Trend analysis
 Establishment of measurements and metrics
 Acquisition/implementation of security appliances
 Periodic reporting
SERVICE ITEM #4:
Security Operations Management Reviews – Project should have provided evaluation of
organizational operational procedures and resource efforts impacting the enterprise security
posture, applied and functioning appropriately to achieve organizational and compliance
objectives. These actions should have been leveraged to provide better management, response and
reporting capabilities and thus assist with compliance to regulatory requirements. Activities and
artifacts in this area may have included, but not be limited to:
 Reviews and recommendations concerning: patch management
 System backup/recovery
 Identity provisioning
 Access control
 System monitoring
 Logging
Have you
performed?
(“YES” or “NA”)
APPENDIX C
TECHNICAL REQUIREMENTS
WORKSHEET (B)
INSTRUCTIONS: Record requested information about each company that received a “Yes” in Appendix C, Technical
Requirements Worksheet (A).
Category
CATEGORY
I
IT Program
Security
Services
CATEGORY
II
IT System
Security
Services –
Pre
Operational
CATEGORY
III
IT System
Security
Services Operational
Service Item
Information Security
Program Planning
Security Awareness
Training and Education
Life Cycle Management
Support
Incident and Emergency
Response Planning
Contingency and Disaster
Response Planning
System Security Planning
System Security Plan
Implementation
SDLC Application
Development Reviews
Pre-Operational Security
Assessments
Security Services and
Products Acquisition
Operational Security
Assessments
Security Incident & Event
Monitoring
Security Operations
Management Reviews
Company Name
Project Name
Company Address
Point of Contact
(Name/Email)
Download