Table of Contents
- 1 Introduction
- 1.1 Purpose
- 1.2 Intended Audience
- 1.3 Organization
- 1.4 Important Terminology
- 1.5 Legal Foundation for Federal Information Security Programs
- 1.6 Related NIST Publications
- 2 Elements of Information Security
- 2.1 Information security supports the mission of the organization
- 2.2 Information security is an integral element of sound management
- 2.3 Information security protections are implemented so as to be commensurate with risk
- 2.4 Information security roles and responsibilities are made explicit
- 2.5 Information security responsibilities for system owners go beyond their own organization
- 2.6 Information security requires a comprehensive and integrated approach
- 2.6.1 Interdependencies of security controls
- 2.6.2 Other interdependencies
- 2.7 Information security is assessed and monitored regularly
- 2.8 Information security is constrained by societal and cultural factors
- 3 Roles and Responsibilities
- 3.1 Risk Executive Function (Senior Management)
- 3.2 Chief Executive Officer (CEO)
- 3.3 Chief Information Officer (CIO)
- 3.4 Information Owner/Steward
- 3.5 Senior Agency Information Security Officer (SAISO)
- 3.6 Authorizing Official (AO)
- 3.7 Authorizing Official Designated Representative
- 3.8 Senior Agency Official for Privacy (SAOP)
- 3.9 Common Control Provider
- 3.10 System Owner
- 3.11 System Security Officer (SSO)
- 3.12 Information Security Architect
- 3.13 System Security Engineer (SSE)
- 3.14 Security Control Assessor
- 3.15 System Administrator
- 3.16 User
- 3.17 Supporting Roles
- 4 Threats and Vulnerabilities: A Brief Overview
- 4.1 Examples of Adversarial Threat Sources and Events
- 4.1.1 Fraud and Theft
- 4.1.2 Insider Threat
- 4.1.3 Malicious Hacker
- 4.1.4 Malicious Code
- 4.2 Examples of Non-Adversarial Threat Sources and Events
- 4.2.1 Errors and Omissions
- 4.2.2 Loss of Physical and Infrastructure Support
- 4.2.3 Impacts to Personal Privacy of Information Sharing
- 4.1 Examples of Adversarial Threat Sources and Events
- 5 Information Security Policy
- 5.1 Standards, Guidelines, and Procedures
- 5.2 Program Policy
- 5.2.1 Basic Components of Program Policy
- 5.3 Issue-Specific Policy
- 5.3.1 Example Topics for Issue-Specific Policy
- 5.3.2 Basic Components of Issue-Specific Policy
- 5.4 System-Specific Policy
- 5.4.1 Security Objectives
- 5.4.2 Operational Security Rules
- 5.4.3 System-Specific Policy Implementation
- 5.5 Interdependencies
- 5.6 Cost Considerations
- 6 Information Security Risk Management
- 6.1 Categorize
- 6.2 Select
- 6.3 Implement
- 6.4 Assess
- 6.5 Authorize
- 6.6 Monitor
- 7 Assurance
- 7.1 Authorization
- 7.1.1 Authorization and Assurance
- 7.1.2 Authorization of Products to Operate in Similar Situation
- 7.2 Security Engineering
- 7.2.1 Planning and Assurance
- 7.2.2 Design and Implementation Assurance
- 7.3 Operational Assurance
- 7.3.1 Security and Privacy Control Assessments
- 7.3.2 Audit Methods and Tools
- 7.3.3 Monitoring Methods and Tools
- 7.4 Interdependencies
- 7.5 Cost Considerations
- 7.1 Authorization
- 8 Security Considerations in System Support and Operations
- 8.1 User Support
- 8.2 Software Support
- 8.3 Configuration Management
- 8.4 Backups
- 8.5 Media Controls
- 8.6 Documentation
- 8.7 Maintenance
- 8.8 Interdependencies
- 8.9 Cost Considerations
- 9 Cryptography
- 9.1 Uses of Cryptography
- 9.1.1 Data Encryption
- 9.1.2 Integrity
- 9.1.3 Electronic Signatures
- 9.1.4 User Authentication
- 9.2 Implementation Issues
- 9.2.1 Selecting Design and Implementation Standards
- 9.2.2 Deciding between Software, Hardware, or Firmware Implementations
- 9.2.3 Managing Keys
- 9.2.4 Security of Cryptographic Modules
- 9.2.5 Applying Cryptography to Networks
- 9.2.6 Complying with Export Rules
- 9.3 Interdependencies
- 9.4 Cost Considerations
- 9.4.1 Direct Costs
- 9.4.2 Indirect Costs
- 9.1 Uses of Cryptography
- 10 Control Families
- 10.1 Access Control (AC)
- 10.2 Awareness and Training (AT)
- 10.3 Audit and Accountability (AU)
- 10.4 Assessment, Authorization, and Monitoring (CA)
- 10.5 Configuration Management (CM)
- 10.6 Contingency Planning (CP)
- 10.7 Identification and Authentication (IA)
- 10.8 Individual Participation (IP)
- 10.9 Incident Response (IR)
- 10.10 Maintenance (MA)
- 10.11 Media Protection (MP)
- 10.12 Privacy Authorization (PA)
- 10.13 Physical and Environmental Protection (PE)
- 10.14 Planning (PL)
- 10.15 Program Management (PM)
- 10.16 Personnel Security (PS)
- 10.17 Risk Assessment (RA)
- 10.18 System and Services Acquisition (SA)
- 10.19 System and Communications Protection (SC)
- 10.20 System and Information Integrity (SI)
List of Appendices
- Appendix A – References
- Appendix B – Glossary
- Appendix C – Acronyms and Abbreviations
List of Figures
Figure 1 - Risk Management Framework (RMF) Overview