Time
2 hours 22 minutes
Difficulty
Intermediate
CEU/CPE
2

Video Description

This lesson introduces methods of security control assessments and explains in detail the tasks associated with assessing the security controls in an information system. Upon completion of this unit, participants will be able to use one or more of the three methods of assessment to assess an information system's security controls. In addition, participants will be able to prepare or support the preparation of the security assessment report documenting the issues, findings and recommendations from the security control assessment. A security assessment plan consists of 6 steps:

  1. Develop Security assessment policy
  2. Prioritize and schedule assessment
  3. Select and customize testing techniques
  4. Determine logistics of assessment
  5. Develop the assessment plan
  6. Address legal considerations

Participants also learn about technical assessment tools and methods: 1. Log reviews

  1. File Integrity checkers
  2. Penetration Testing
  3. Vulnerability scanning
  4. Social Engineering
  5. Wireless scanning
  6. Network scanning and discovery
  7. Prior Assessment reports

Video Transcription

00:09
Welcome back to the D. O D risk management framework. Siris on Mike Redman here, guiding you through ensuring you have the information that you need to successfully implement the deer de risk management framework. We've made a two step number four assess
00:27
In this section. We will ensure that you know how to use one or more of the three methods of assessment
00:34
to assess your information system. How to prepare or support the preparation off the security assessment documentation and the issues or findings and recommendations that may come out of the assessment activity. If you're studying for the I S C squared cap examination,
00:49
this is where you would need to understand the control, assessment and monitoring faces
00:55
and the triggers in the new cap process. Within the assess step Step four. We have four based task assessment preparation, security control assessment itself, the security assessment report and any remedial actions.
01:14
So this is another core difference between Die Cap and Orin F.
01:18
There's an extra step here in the assessment of the security controls you are required to test, examine and interview. This is an expansion on the di cat methodology where there was only examine an interview.
01:36
So why go through this process? It's all about finding the gap by doing the three step process test interview examined. The hope is to find the gap. Where should it be? Where do you think it is? And where is it
01:53
when constructing their security assessment plant itself,
01:57
there are six base operations. One developed the security assessment policy to prioritize and scheduled the assessment. Three select and customized testing techniques of four determined logistics and assessment, and five developed the assessment plan
02:15
and six address. Indeed, legal considerations. You confined AIM or expansive explanation. Indeed, this Special publication 801 15.
02:24
So the guide for assessors that would be wth e 853 a A. For assessment. It gives control assessors specific guidance on how to perform each risk assessment. The assessment itself must be
02:40
consistent, incomparable, repeatable and cost effective. To better understand the full risk to the information system, the hope is by making it, for instance,
02:52
comparable and repeatable that aim or complete more reliable and trustworthy outcome or risk assessment is being performed. Walking through base assessment preparation. This is a task owned by the security controls assessor themselves
03:08
So what makes a security control assessor
03:12
first? What you're looking for is experience. Does Theis Assessor have the required skills and technical expertise for that particular information system and a wealth of the knowledge that is required to be able to assess the particular hardware software
03:28
firmware that the information system contains? You want to find independence,
03:34
no vested outcome and the success or failure of anyone assessment. Now the assessor can be an individual, or most often it's going to be a group of individuals. They are free from perceived or actual conflicts of interest. They should not be directly involved in any aspect
03:53
of that information system.
03:55
Assessing the security controls themselves again is a task owned by the Security Control Assessor or the Scott. Each assessment has clear objectives.
04:05
For instance, the security control assessment objective should be where the controls implemented, correctly identifying that each control is operating as intended.
04:16
And are they producing the desired result with reference to this security objective itself Again, this is where tailoring can be of utmost importance. Yes, you have the right to control in place, but do you have the proper control in place?
04:35
Did you put a door in place to separate security zones.
04:40
But did you select the correct door for the separation of those owns? So the assessment methodology will include the appropriate evaluation methods from this list document. Review the interview observation and test for it to be a valid assessment.
04:59
These are the required components
05:00
for that assessment. Again. Document interview,
05:06
observe and test Mist lays out these steps in court. Functionality. Examine is the observation and review portion the interview? Well, it's somewhat self explains where I think the test. Observe the process owner performed the specific control
05:26
and make sure that you were getting
05:28
the desired or expected outcome the attributes that you could be looking for. It can range in depth from a basic assessment all the way to a full and comprehensive assessment coverage, a basic assessment or a comprehensive coverage,
05:46
determining by assurance requirements or segmenting if you will defined by the organization.
05:54
For instance, not all controls are gonna be applicable to every organization in every situation.
06:00
The assessor is working through some very specific tasks to ensure that the proper policies Aaron Place ensure that all previous arm if steps were completed and completed correctly to insure that all common controls are in place and implemented to collect and evaluate system artifacts.
06:19
The assessment testing itself can include, for instance, vulnerability scanning or log review. Physical or logical penetration testing
06:29
configuration review checklists. It's really up to the assessor what they deem necessary, based on conversation with system owner to properly assess that information system in a given environment or against specific requirements.
06:46
That brings us to a section that is wholly unique to the Department of Defense.
06:50
The C C I's CC eyes are control correlation identify where they are singular, actionable statements pulled out of the dis a Stig's the C C. I is designed to bridge the gap between the high level policy and the low level implementation.
07:09
All CC eyes are to be developed to provide traceability.
07:14
It allows organizations too readily demonstrate compliance with multiple information assurance compliance frameworks. So the first criteria is that a C C. I must be discreet. It must represent a single requirement.
07:30
For example, if the Stig control indicates the password policy
07:34
has to include multiple requirements addressing password minimum and maximum and reuse in lifetime. There should be or will be five individual cc eyes that originate from that single control one C C I for the minimum password length
07:53
one C C I for the maximum password length.
07:56
One for password reuse, one for password minimum lifetime and one to establish the administrative procedure for lost or compromised passwords. The next criteria is that each cc I must be actionable and measurable.
08:13
The C C I. Is there to represent an action that can be taken on the system or against the information
08:20
that can be acquired by reviewing or testing or querying the organizational policy. Also, it's there to describe what must be able to be determined by a measurable event, for instance, using the same example with the password.
08:37
The minimum password length can be a value that can be measured against the organizational policy or thes system configuration itself.
08:46
Here is an overall mapping of how the Stig's overlay and correlate with the 853 bass controls you see that you have the C. C. I sitting right in between so you have the high level 853
09:03
the mid level where all your policies and standards in the C. N S s 12 53
09:09
and then the control identify IRS themselves correlating to an individual system or technology stick. Some of the tools and methods available to assessors again. Our law reviews and file integrity. Checkers penetration testing both logical and physical.
09:28
Overall vulnerability. Scanning,
09:31
perhaps social engineering or wireless scanning, as well as network scanning and discovery and prior assessment reports. It is, however, important to note here that we want each assessment to be independent. That also means independent of bias.
09:48
Eso access to prior assessment reports
09:52
should really be an assessors last option when all others have failed to validate a specific control. Finally, we get to this security assessment report. This is where the issues and findings or documented and recommendations for correcting weaknesses and any inefficiencies found.
10:11
This is also where we identify any remedial actions.
10:15
Such is to review in the prioritization of findings themselves, the remedial actions, reassessment of risk and so forth. Throughout these steps, you will have the system owner, the common control provider and the assessor themselves. In our next section, we will tackle Step five
10:35
the authorization

Up Next

What is the Risk Management Framework?

This course introduces the Department of Defense (DoD) Risk Management Framework (RMF). This course prepares participants to take the CAP Exam which consists of 125 multiple choice questions and covers the following domains:

Instructed By

Instructor Profile Image
Michael Redman
Sr. ISSM at deciBel Research, Inc.
Instructor