Risk Management Framework

Improved Essays
NIST Special Publication 800-37 Revision 1

Guide for Applying the Risk Management Framework to Federal Information Systems
A Security Life Cycle Approach

JOINT TASK FORCE TRANSFORMATION INITIATIVE

INFORMATION

SECURITY

Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930

February 2010

U.S. Department of Commerce
Gary Locke, Secretary

National Institute of Standards and Technology
Patrick D. Gallagher, Director

Special Publication 800-37

Guide for Applying the Risk Management Framework to Federal Information Systems A Security Life Cycle Approach

________________________________________________________________________________________________
…show more content…
interests from adversaries using cyberspace to their advantage and from our own efforts to employ the global nature of cyberspace to achieve objectives in military, intelligence, and business operations… “ “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated in order to identify important trends and decide where effort should be applied to eliminate or reduce threat capabilities; eliminate or reduce vulnerabilities; and assess, coordinate, and deconflict all cyberspace operations…” “…Leaders at all levels are accountable for ensuring readiness and security to the same degree as in any other …show more content…
As part of the overall governance structure established by the organization, the risk management strategy is propagated to organizational officials and contractors with programmatic, planning, developmental, acquisition, operational, and oversight responsibilities, including for example: (i) authorizing officials; (ii) chief information officers; (iii) senior information security officers; (iv) enterprise/information security architects; (v) information system owners/program managers; (vi) information owners/stewards; (vii) information system security officers; (viii)

Related Documents

  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Joint Force 2020

    • 1383 Words
    • 6 Pages

    Issues that pose risk to missions are: “providing sufficient enabling capabilities, building partnership capacity, and securing DoD systems in cyberspace.” In example, an ally or partner’s lack of ability or willingness to support common goals may present an operational risk. When it comes to cyberspace, a failure to secure systems would pose a major risk to operations, personnel, and mission accomplishment. In such cases operational risk may be mitigated through the development of bilateral and multilateral capacity to improve interoperability to protect common interests through security cooperation, agreements, and…

    • 1383 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    The Federal Information Security Management (FISMA) was set up by the United States government for cyber security purposes such as to increase the level of security of software applications, systems and databases. As stated by (Kim, n.d.), “When FISMA was enacted, its purpose was to ensure that federal agencies secure the information contained in the non-defense information systems of the Unites States government”. To protect the systems and data it is important to have a security plan developed for not just federal agencies but also for the government contractors and organizations affiliated with the information. According to (Kim, n.d.), “These grades have trended slightly upward in recent years, with the grades from 2005 through 2007 being…

    • 166 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Evaluate the risk and create policies and procedures to negate or reduce them. Educate and communicate with management and staff about risk factors. Rank risks according to likelihood of occurrences for each dept. Periodically review and update risks, and risks management programs. (Rubbens, 2007)…

    • 819 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Joint Force Case Study

    • 1637 Words
    • 7 Pages

    The key general capabilities necessary to rebalance the Joint Force 2025 given the current strategic direction and global security environment to ensure Freedom of Maneuver (FOM) in the global commons and dominance within the cyber and space domains. Enhanced capabilities to protect cyber and space domains and synchronized partnered alliances are required to counter threats to these domains. This rebalancing is warranted to maintain a level of readiness that meets the needs of the National Security Strategy (NSS). By addressing key capabilities in each branch of service and the general capabilities needed for cyber and space succinctly maps the path ahead for the Joint Force 2025. Three publications are tantamount in directing the Joint Force…

    • 1637 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    The Federal Information Security Management Act also known as FISMA is United States federal law enactment established to ensure government data, operations and resources against regular or man-made dangers are protected. FISMA was created in 2002 Electronic Government Act of 2002 before cybersecurity became such a vast problem. Modifications were made to FISMA law and renamed Federal Information Security Modernization Act of 2014. The cybersecurity market is continuously expanding as the society rely upon the development and utilization of information technology systems. Within recent years, there has been an increase in the number security risks and data breaches.…

    • 240 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    As CCI note 13/3 mentions, my primary reason for choosing rolled storage for the scarf is that it is a space saver. Since folding the object is not recommended (Nielson 213), it would be difficult to find a storage space for the scarf that would be able to accommodate the length of the scarf without wasting storage space. Additionally, keeping the scarf rolled makes it much easier to move than if it was stored lying flat. The one pitfall to rolled storage is that in order to view the textile, a fair amount of handling has to ensue. However, attaching a tag with detailed information and a colour photo of the scarf, as detailed by CCI note 13/3, helps to reduce the amount of handling that could occur by allowing staff to see what it is without…

    • 677 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    A Risk Assessment Plan plays a big role in any company, whether it is big or small company. The risk assessment will help identify the vulnerabilities and threats to the Wells Fargo IT resources. Which will help determine the impact of those vulnerabilities, threats, and unauthorized access. Having some knowledge of what type of risks expect will help mitigate them faster. There are a several steps needed for a good risk assessment plan, which will essentially help the company be in compliance with FISMA and other federal laws.…

    • 720 Words
    • 3 Pages
    Decent Essays
  • Superior Essays

    Back in 2008 when President Obama was elected as president, he made it a priority to bring awareness cyber security being one the nation’s most important challenges. Even though he signed the Cybersecurity Act of 2015, he still believes that there is a lot more than needs to be done to secure our nation and the American people. Today, the President is directing his Administration to implement “a Cybersecurity National Action Plan (CNAP) that takes near-term actions and puts in place a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, maintain public safety as well as economic and national security, and empower Americans to take better control of their digital security” (The White House, 2016). The Cybersecurity National Action Plan will also cover several other laws and regulations to help private industries fight off cyber-attacks with the help from the…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    Identifying and managing risks is a critical responsibility of project managers. Risk is defined as the probability of a specified threat and the subsequent impact that the event produces (Vaidyanathan, 2013). Risks can also bring about either positive or negative outcomes for a project or organization. A project manager must identify potential risks and evaluate each one to determine the severity and likelihood of each event. Only by completing the risk management process, a project manager can determine what approach would work best to avoid, mitigate, and/or transfer the risk.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Since September 11th, there has been great implementation of systems to support the homeland security efforts. These systems include fusion centers and the Interagency Threat Assessment and Coordination Group (ITACG). The purpose of these systems was to ensure intelligence was being shared. This became a stark change from the past where invisible barriers prevented the collective effort of agencies, not only at the state level, but at the federal level, working towards the same objective. Sometimes this same objective included chasing after the same suspect at the local or federal level.…

    • 864 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Third element is Risk Organization and Governance. This element covers how an organization structures its risk along with allocating final responsibility among certain positions in the organization in order to empower the employees with the proper understanding and significance to the risks certain departments in the organization are exposed to. Certain key employees with authority take these elements of risk management into account in order to retain, avoid or transfer possible risks. Having a whole organization follow a risk management mindset is crucial, both horizontally and vertically in an organization.…

    • 700 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Next the paper will examine whether the national organizational structure tasked with cyber operations needs to be reorganized and subsequently require a change to the United States Code (USC). Finally, the paper will discuss that if a reorganization is required, which agency should be in charge of cyber security for the United States. Cyber Geography The emergence of the cyber domain has been uniquely different than the traditional domains of air, land, and maritime. Theories about both the cyber and space domains have at times been very similar, treating the domains and purely functional rather than having a physical geography.…

    • 1692 Words
    • 7 Pages
    Great Essays