Time
2 hours 22 minutes
Difficulty
Intermediate
CEU/CPE
2

Video Description

This lesson discusses cybersecurity policy, regulations and framework. This lesson describes the evolution and interaction of security laws, policy and regulations in information security. Participants also learn about DoD cybersecurity policy drivers, learn how to assess the correct documents for cyber security as well as describe assessment and authorization transformation goals. Cybersecurity is an ever-evolving field which is constantly becoming more complex. Participants learn about the Director of National Intelligence (DNI) Approach to Policy and Standards, the implementation of goals as well as RMF Integration with the SDLC, Federal Guidance and finally, DoD IM/IT Framework.

Video Transcription

00:05
Theo. Welcome back to the D. O D risk management framework. Siri's In this section. We're going to take a look at some of the cyber security policies, regulations and the overall framework itself.
00:21
The goal is to be able to describe the evolution and interaction of security laws, policies and regulations and information security
00:30
list of the D o D cyber security policy drivers access to correct documents for cybersecurity guidance and describe assessment and authorization transformation goals.
00:41
For those of you studying for the S C Square cap exam, this section will identify the relationship between the risk management framework and the system development Lifecycle. However, remember, you need to study the contents of the essential documents listed
00:57
in the tables of this chapter. So every great story has a beginning. How did these policies come to be? Well, they started very independently. The Department of Defense had their set of guidance, and the federal agencies had their sets of guidance
01:15
for the Department of Defense back in the 19 seventies and for
01:19
both the Defense Department and federal agencies. By time the 19 eighties rolled around. It started with the 5200 Siri's, some of you more seasoned veterans will remember the Rainbow Series,
01:33
a series of books, all color coded to tell us exactly how to do specific items
01:40
on the federal side. We dealt with the Ownby circular a 1 30 As time progressed, Video D's cybersecurity initiative became more complex and needed Maur direction approximately this same time. Right there in
01:57
1997 might be six or so.
02:00
We have the introduction of the Clinker Cohen act. Remember, anything that ends with him? Act means that it's a law that means that it came out of Congress. Fast forward to 2002 and Congress introduces Fisma, the Federal Information Security
02:17
Management Act. On the other side, we have the d. O. D. And they finally introduced a standard control set within the accreditation process
02:29
2000. For we see the introduction of the Nest 837 and 5 4006 the 853 and the accompanying Phipps 200 Now on the deal decide we have video D 85 10. This was the original introduction of Di cap
02:50
updated and
02:51
better process than ditz cap, but still not quite perfect. However, looking at the two documents side by side, the 853 Siri's and the 8500 dot to which was the control set document for Did Die Cap. There is striking similarities.
03:10
We'll get into a little more of that later.
03:13
So remember I told you that fisma it's It's a law and all federal systems now, including the Department of Defense, must report back to OA and be at the end of each calendar year no later than December 31st.
03:30
So who is Owen being? What do they do? Well, some of the main functions of on B
03:37
include maintaining the government budget, federal finance management and data collection. Now, when it comes to missed, the computer security division has several documents that you must be familiar with is starting with, of course, the Fisma implementation project.
03:55
Then the standards for categorizing that is
03:59
50 more. 99. The standards for minimum security requirements. Phipps 200. Guidance for selecting security controls, which would be special Publication 53. And guidance for assessing those controls would be 853 a
04:18
assessing
04:19
a kind of tricky right guidance for security authorization. The original 837. And how to set up your continuous monitoring? 800 won 37. So what are the policy drivers that got us to this point?
04:36
Well, one of the most important drivers is the integration with the other federal agencies.
04:43
Networks have grown up and out there no longer self contained little boxes. At some point in time, every system is going to connect to another within the federal government.
04:56
Also, increased network growth and globalisation increased the threat, sophistication and increase speed and connective ity. All of these are ventricle drivers as to why the entire federal system had to get on one standard set of guidance now,
05:14
you'll notice here that I crossed out compliance.
05:16
Why Risk management framework is not about compliance. It's not a series of checklists. It's It's designed to be what is best for the system. It's not like Die Cap. We're gonna get into this in a little more detail, but
05:33
you'll notice that I will keep crossing out the word compliance and
05:38
just in your mind, insert the word security posture.
05:42
Understand? What we're looking for is efficiency for riel security enforcement, not just a documentation drill. So what is the individual benefit to the individual stakeholders. Well, the C I O, for instance, standardizes the eye language across the entire federal government. Finally,
06:01
we're all talking the same language.
06:03
Where is the war fighters? They can get more rapid development of solutions that they need to go fight the fight for business system owners. You find more consistent and assured protection of individual privacy and data supporting the D o D business systems themselves
06:24
and four system developers, and increased coordination and integration off security
06:29
into the systems development and acquisition process. At the end of the day, it's all about efficiency. Everything you see here is efficiency driven. Now I know it.
06:43
It does take a long time, and we're gonna walk through the timeline on how to start with our meth package from start to finish.
06:49
But you only have to do it once. Once that system has been properly categorized. Once the controls air selected, the overlays air worked, you're done. All you have to do at that point is maintained.
07:02
So some of our transformation goals as we move into the framework or to define a common set of trust levels and to adopt and apply them using the C. N. S s I 12 53 across all intelligence community's duties and other federal agencies
07:23
to adopt
07:24
reciprocity. No need to continuously reauthorize systems just because they're moving from the Air Force to the Marine Corps to the Army and maybe to the Department of Energy. Next is to define document and adapt
07:43
common security controls.
07:45
This is done using beaten this Special Publications 853 as the baseline adopt a common lexicon. Get us all talking the same language so we can approach the mountain of cybersecurity issues. All speaking the same language. Do
08:03
institute a senior risk executive function.
08:07
Now it's important to understand that this is a function. It takes the whole family. It takes intelligence. It takes your classic six element. Whether it's G six or insects or Essex, it's going to take the two and the three and the four and the eight.
08:24
The whole family. Everyone that has a security function
08:30
must be an integral steak order. End the risk management framework and next to Abel, a common process consistency. The easiest, strongest systems are ones that are predictable with the predictable baseline.
08:48
You have a predictable outcome.
08:50
Being able to manage the system throughout its entire life cycle is paramount. So the director of national intelligence approach to Policy and standards was to establish the icy D 503
09:05
and they will continue to develop the intelligence community standards as appropriate for those required systems. However, they will be leveraging the existing this special publications
09:18
bring the intelligence community Maurin line with fisma, and it assigns the inspector general audits, which are based on the list standards, consistency and align with the rest of the federal government to support overall reciprocity.
09:37
Remember, the optimum goal here is to ensure that all key policies for the intelligence community are either in an official C. M. S s publication or in a mist special publication.
09:48
So as we continue to move and now talk about the implementation goals, here is the desired outcome. First, moving away from what we called Max or mission assurance category levels.
10:03
We don't address the systems. Is Mac one or Mac to or Mac free anymore? We also will not be referring to them
10:11
with classifications. Levels like classified, it's sensitive or public way move to addressing them with impact levels such as low, moderate and high and security objectives to meet the confidentiality, integrity and availability.
10:31
This ensures the D. O. D is synchronized with the rest of the federal systems using neatness standards.
10:39
Next, reciprocity inside the d. O d I 85 10 01 Next, the deal the will use the list 853 Security Control catalogue with beauty, specific assignment, values, implementation, guidance and valuation process is
10:58
Remember, the goal here is to ensure that the deer, the security catalog, categorization
11:03
and control processes are in sync with fitness standards.
11:09
Next, continue to incorporate new structure and other new risk management framework terms into the CNS i 4009 and continue its juices. The official glossary of terms throughout the 8500 Siri's
11:24
Next on the list is to continue the duty enterprise governance structure and strengthen the interfaces to the intelligence community Enterprise Governance. This is implemented through the d. O. D. I. 8500.1 and 85 10.1
11:43
Next to continue Vico evolution of security control, categorization
11:48
and selection. The risk management framework, a component of the gig integration, architecture alignment framework for gig I A and other supporting elements off the gig, Technical Framework and Gig I A portfolio.
12:05
And lastly, to incorporate transformation concepts into duty policies that adopt new concepts being enterprise, governance and propagate via knowledge service as well. Let's continue to influence the Gig I, A portfolio
12:20
for configuration management, automated monitoring and other enablers.
12:26
Next, let's take a look at how the risk management framework integrates with the system development life cycle. You'll see that there is a specific step to do at every piece of the classic system development life cycle. So let's walk through the steps one by one.
12:45
First
12:46
initiation.
12:48
Next development and acquisitions.
12:52
Third implementation
12:56
fourth Operation Maintenance and fifth Disposal.
13:03
Now let's take a look at which step of the risk management framework fits with which step of this system. Development lifecycle initiation, Step one. Development and acquisitions
13:18
Step one. Step two. Step three. Step four and Step six. Implementation
13:28
Step three,
13:30
four and five.
13:33
Operation and maintenance, Step six and disposal
13:41
Step six.
13:43
There is an action for security to take in every step of the system development Lifecycle. This is where we get the bumper sticker baked in, not bolted on so How has the process changed? Well, let's take a look.
14:01
So from die Kathy old 85 10
14:03
to risk management framework, the new 85 10 Really, that's just a change in language. There's Ah lot of similarity here. Way used to address systems as Mac and confidentiality level and now simply impact level and sensitivity objectives. Way
14:24
used to have some rigid information system definitions.
14:28
Those definitions have been expanded to a line better with the CNS I 4000 mine,
14:35
the D. O. D. Had their own defined set of security controls. Now we have a universal set of security controls across all federal systems.
14:46
We used to have the c n A process or certification and accreditation. Now we have the process assess and authorized so paying close attention to the proper guidance documents where we had the 85 10 01
15:03
$8500.01 and two,
15:07
The nightcap instruction. The CNS I 12 53 has been condensed to the 85 10 itself, which point you to the 853 Siri's and the CIA NSS 12 53.
15:24
For the intelligence community we used principally in the D C i. D 53
15:28
as well as the deal. The instruction 8500 02 for the controls the protection levels implemented within the CNS s 12. 53 documents that has now been condensed to the I C D 503 and the revised CNS s 12. 53
15:46
for all other government agencies where we were using the common controls the I S O standards, the Mist 837 the CNS s 12 53 wth e Mitzi and the NY app has been greatly reduced has been greatly reduced to simply
16:06
the list of special publication
16:07
837 30 39 53 53 A and 1 37
16:18
Here's a complete list of what would be considered critical guidance. You have the Phipps, Siri's 1 99 and fits 200 thes special publication. Siri's, the CNS s and the Owen be circular. Now, the only thing really to watch out for
16:34
is for Deal D systems. Instead of using defects 200. We simply used the C n s s swell 53
16:44
for the baseline controls.
16:45
All other federal systems will continue to use the Phipps 1 99 and fits 200. As part of this transition, the Doody has taken the opportunity to continue to align it's information management and I T policies,
17:02
including a cyber security policies, into the 8000 Siri's under the sole responsibility of the duty chief information officer.
17:11
Here you see the base 8000 Capstone, the 8100 where you will find the new anyone 40 that replaced the 85 70
17:21
the 8200 for Mission Elin functional processes wth E 8300 for information infrastructure design wth E 8400 for information technology
17:33
and the 8500 for cyber Security. Now the only really tricky one is that the D. O. D. Has published under the 8100 Siri's, the Cyber Security Policy as part of the 8500 Siri's. When I went and took a look at, why would they do that? Well,
17:52
8100 is
17:52
more general. It applies to everyone, whereas Theeighty 500 Siri's was very specific to I A or cyber security people. This will help better align for proper education, training and awareness across the environments.
18:10
In our next chapter, we're going to take a look at some of the arm F roles and responsibilities

Up Next

What is the Risk Management Framework?

This course introduces the Department of Defense (DoD) Risk Management Framework (RMF). This course prepares participants to take the CAP Exam which consists of 125 multiple choice questions and covers the following domains:

Instructed By

Instructor Profile Image
Michael Redman
Sr. ISSM at deciBel Research, Inc.
Instructor