risk management framework - nist

37
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Dr. Ron Ross Computer Security Division Information Technology Laboratory RMF RISK MANAGEMENT FRAMEWORK SIMPLIFY. INNOVATE. AUTOMATE. 2.0

Upload: others

Post on 12-Jan-2022

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY

Dr. Ron RossComputer Security DivisionInformation Technology Laboratory

RMFRISK MANAGEMENT FRAMEWORKSIMPLIFY. INNOVATE. AUTOMATE.

2.0

Page 2: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 2

The Current Landscape.It’s a dangerous world in cyberspace…

Page 3: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 3

Risk.Function (threat, vulnerability, impact, likelihood)

Defense

Energy

Transportation

Manufacturing

Page 4: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 4

Resilient Military Systems and the Advanced Cyber Threat

Cyber Supply Chain

Cyber Deterrence

Defense Science Board Reports

Page 5: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 5

Complexity.

Page 6: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 6

Our appetite for advanced technology is rapidly exceeding our ability to protect it.

Page 7: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 7

Data. Data. Everywhere.

Page 8: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 8

Protecting critical systems and assets—The highest priority for the national and economic security interests of the United States.

Page 9: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 9

Defending cyberspace in 2018 and beyond.

Page 10: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 10

Identify and develop federal shared services.

Move to FedRAMP-approved cloud services.

Isolate and strengthen protection for high value assets.

Reduce and manage the complexity of systems and networks…Engineering more trustworthy, secure, and resilient solutions.

Federal Government’s Modernization Strategy

Page 11: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 11

Simplify. Innovate. Automate.

Page 12: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 12

NIST SP 800-37, Revision 2Risk Management Framework for Information Systems and OrganizationsA System Life Cycle Approach for Security and Privacy

Page 13: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 13

Risk Management Framework (RMF) 2.0

CATEGORIZE

ASSESS

AUTHORIZE

MONITOR

PREPARE

IMPLEMENT

SELECT

Page 14: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY

To provide closer linkage and communication between the risk management processes and activities at the C-suite or governance level of the organization and the individuals, processes, and activities at the system and operational level of the organization.

OBJECTIVE 1

RMFRISK MANAGEMENT FRAMEWORKSIMPLIFY. INNOVATE. AUTOMATE.

Page 15: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY

To institutionalize critical enterprise-wide risk management preparatory activities to facilitate a more effective, efficient, and cost-effective execution of the RMF.

OBJECTIVE 2

RMFRISK MANAGEMENT FRAMEWORKSIMPLIFY. INNOVATE. AUTOMATE.

Page 16: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY

To demonstrate how the Cybersecurity Framework can be aligned with the RMF and implemented using established NIST risk management processes.

OBJECTIVE 3

RMFRISK MANAGEMENT FRAMEWORKSIMPLIFY. INNOVATE. AUTOMATE.

Page 17: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY

To integrate privacy risk management concepts and principles into the RMF and support the use of the consolidated security and privacy control catalog in NIST Special Publication 800-53, Revision 5.

OBJECTIVE 4

RMFRISK MANAGEMENT FRAMEWORKSIMPLIFY. INNOVATE. AUTOMATE.

Page 18: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY

To promote the development of trustworthy secure software and systems by aligning life cycle-based systems engineering processes in NIST Special Publication 800-160 with the steps in the RMF.

OBJECTIVE 5

RMFRISK MANAGEMENT FRAMEWORKSIMPLIFY. INNOVATE. AUTOMATE.

Page 19: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY

To integrate supply chain risk management (SCRM) concepts into the RMF to protect against untrustworthy suppliers, insertion of counterfeits, tampering, unauthorized production, theft, insertion of malicious code, and poor manufacturing and development practices throughout the SDLC.

OBJECTIVE 6

RMFRISK MANAGEMENT FRAMEWORKSIMPLIFY. INNOVATE. AUTOMATE.

Page 20: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY

To provide an alternative organization-generated control selection approach to complement the baseline control selection approach.

OBJECTIVE 7

RMFRISK MANAGEMENT FRAMEWORKSIMPLIFY. INNOVATE. AUTOMATE.

Page 21: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 21

Security and Privacy.

Authorized PII Processing

Unauthorized System Activity

or Behavior Impacting PII

YES NO YES YES YES YES YES

* Except for system description, categorization tasks are not conducted to manage the risks arising from the authorized processing of PII.

YES YES YES YES YES YES YES

RMF STEPS

PREP

ARE

CAT

EGO

RIZ

E*

SELE

CT

IMPL

EMEN

T

ASSE

SS

AUTH

OR

IZE

MO

NIT

OR

PRIV

ACY

RISK

S

Page 22: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY

RMF2.0

Security Risk Management

Privacy Risk Management

Supply Chain Risk Management

A unified framework for managing security, privacy, and supply chain risks.

Communication between C-Suite and Implementers and Operators

Alignment with NIST Cybersecurity Framework

Alignment with Security Engineering Processes

Page 23: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 23

Everything (good or bad) that happens with the RMF starts at the

top of the organization.

Page 24: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 24

Preparing organizations to execute the RMF from the enterprise perspective…

Prepare StepOrganization Level

Outcomes Individuals are identified and assigned key roles

for executing the RMF.[Cybersecurity Framework: ID.AM-6; ID.GV-2]

A risk management strategy for the organization that includes a determination and expression of organizational risk tolerance is established.[Cybersecurity Framework: ID.RM]

An organization-wide risk assessment is completed or an existing risk assessment is updated.[Cybersecurity Framework: ID.RA]

Tailored control baselines for enterprise-wide use are established and made available.[Cybersecurity Framework: Profile]

Page 25: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 25

Outcomes Common controls that are available for

inheritance by organizational systems are identified, documented, and published.[Cybersecurity Framework: No mapping]

A prioritization of organizational systems with the same impact level is conducted.[Cybersecurity Framework: ID.AM-5]

An organization-wide strategy for monitoring control effectiveness is developed and implemented.[Cybersecurity Framework: DE.CM]

Preparing organizations to execute the RMF from the enterprise perspective…

Prepare StepOrganization Level

Page 26: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 26

Outcomes Missions, business functions, and processes the

system is intended to support are identified.[Cybersecurity Framework: Profile; Implementation Tiers; ID.BE]

The stakeholders having an interest in the system are identified.[Cybersecurity Framework: ID.AM; ID.BE]

Stakeholder assets are identified and prioritized.[Cybersecurity Framework: ID.AM]

The authorization boundary (system-of-interest) is determined.[Cybersecurity Framework: No mapping]

The types of information processed, stored, and transmitted by the system are identified.[Cybersecurity Framework: ID.AM-5]

Preparing organizations to execute the RMF from the system perspective…

Prepare StepSystem Level

Page 27: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 27

Outcomes For systems that process PII, the information life

cycle is identified.[Cybersecurity Framework: No mapping]

A system-level risk assessment is completed or an existing risk assessment is updated.[Cybersecurity Framework: ID.RA]

Protection needs and security and privacy requirements are defined and prioritized.[Cybersecurity Framework: ID.GV; PR.IP]

The placement of the system within the enterprise architecture is determined.[Cybersecurity Framework: No mapping]

The system is registered for management, accountability, coordination, and oversight.[Cybersecurity Framework: ID.GV]

Preparing organizations to execute the RMF from the system perspective…

Prepare StepSystem Level

Page 28: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 28

Business or mission analysis Stakeholder needs and requirements definition System requirements definition Architecture definition Design definition System analysis Implementation Integration

Verification Transition

Validation Operation

Maintenance Disposal

ISO/IEC/IEEE 15288:2015Systems and software engineering — System life cycle processes

Build It In…

Life Cycle Security and Privacy

Page 29: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 29

Transparency.

Trust.Traceability.

Page 30: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 30

On the Horizon…

NIST Special Publication 800-37, Revision 2Risk Management Framework for Information Systems and OrganizationsFinal Publication: October 2018

NIST Special Publication 800-53, Revision 5Security and Privacy Controls for Information Systems and OrganizationsFinal Publication: December 2018

NIST Special Publication 800-53A, Revision 5Assessing Security and Privacy Controls in Information Systems and OrganizationsFinal Publication: September 2019

Page 31: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 31

Some final thoughts.

Page 32: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY

Work smarter, not harder.

Page 33: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY

Institutionalize.

The ultimate objective for security.

Operationalize.

Page 34: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY

Page 35: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 35

Security is a team sport.

Industry

Government Academia

Page 36: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 36

Security. Privacy. Freedom.

Page 37: RISK MANAGEMENT FRAMEWORK - NIST

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 37

100 Bureau Drive Mailstop 8930Gaithersburg, MD USA 20899-8930

Email [email protected] 301.651.5083

LinkedIn Twitterwww.linkedin.com/in/ronross-cybersecurity @ronrossecure

Web Commentscsrc.nist.gov [email protected]

RMFRISK MANAGEMENT FRAMEWORKSIMPLIFY. INNOVATE. AUTOMATE.