Time
2 hours 22 minutes
Difficulty
Intermediate
CEU/CPE
2

Video Description

This lesson covers monitoring. Upon completion on this chapter, participants will be able to manage, control and document changes to an information system and its environment of operation as well as implementation of the correct forms of patches when the situation requires a patch. In addition, participants will be able to select or support the selection of the appropriate requirements and state the characteristics of good performance measures and choose accordingly. Finally, participants will be able to report of react to the vulnerabilities and mitigations, decommission an information system in the most efficient of the four methods based on the type of information captured, process or stored by the information system. The goal is continuous monitoring.

Video Transcription

00:10
Welcome back to the Dear de Bris management framework. Siri's I'm Mike Redman Walking you through step by step your successful implementation off the D. O D risk management framework. We've made it to the end. Step six.
00:25
The Monitor step The goal of this section is for you to be able to manage control and document changes
00:33
to your information system and its environment. Implement the correct forms and patches when this situation calls for it. Select or support the selection of the appropriate assessment. Rolls state the characteristics of a good performance, measures
00:50
and report or react to the reporting of vulnerabilities and mitigation,
00:55
as well as knowing how and when to decommission an information system.
01:00
For those of you studying for the I. S C squared cap exam review the requirements of the continuous monitoring of system controls. This is a vital step in the risk management framework. So within the monitors step, there are seven core tasks.
01:19
Information system and environment changes,
01:22
ongoing security control assessment, ongoing re mediation actions, key updates, security status reporting ongoing risk of determination and acceptance and information system removal and did commissioning.
01:37
So let's begin by setting some rules for continuous monitoring.
01:42
First Lear, real time risk management. Next ongoing updates to the security plan, this sorrow or security assessment report and the poem
01:53
next reducing the level of effort needed for reauthorization. Remembering the goal is continuous authorization
02:02
and finally scaled with the information systems impact level. First, we'll look at the information system and environment changes. This is where we identify and document and conduct the impact analysis. We identify corrective actions for the information system itself
02:21
and ensure that all appropriate documentation has been revisited. The primary task odor here is the information system owner and the common controls provider.
02:31
So when we began the configuration management process, everyone thinks, of course, of tools of computers of monitoring. And one of the tools available to you is thesis, acuity, content, automation, protocol or scrap. It's a suite of specifications for ongoing and
02:50
expressing security related information in a standardized way.
02:54
You should ensure that all your system administrators and network administrators, I s s O cze, and so forth are familiar with and use the scab viewer that you can download it from I s C doc disa dot mil. So the attempt in the desire is to automate as much as possible
03:12
to do this. We have several
03:15
tools and references to data sources like Scab, which we just talked about. What can be automated Wis Cap and how it is to be implemented is going to differ from organization toe organization. Remember, this capital will only be able to look
03:32
at this system configuration itself.
03:36
It cannot make a determination on the environment that the system lives. Next, you have national vulnerability database data, the N V D plus security configuration checklist. Some people will call this the secure vendor baseline again.
03:53
These are just tools to help automate as much as possible the continuous monitoring step.
03:59
Understand that Scott is there to compliment security assessments, make them faster and more efficient, not replace them. Automated reporting and monitoring is still a requirement, and many organizations are still trying to figure this part out.
04:15
Some use, for instance, e mass for system status
04:20
and then, for instance, a cast and messes for vulnerability. Scanning. Understand? Again, these are just simple tools. They're dumb tools. They don't know where the system is. 70% of continuous monitoring is in fact physical
04:39
vamp princes to the open checklist. Interactive language. It's a partially automated monitoring solution with the express determination of statements in a format compatible with scrap. So when we talk about continuous monitoring, what are we really say?
04:57
We're identifying the organization's overall risk, tolerance or appetite.
05:00
We identified the enterprise architecture itself, the security architecture as well as security configurations, plans for changes to the enterprise, architecture and any available threat information. Remember, it is cyclical. Define, establish, implement,
05:19
analyze and report,
05:21
respond and review and update. So since we're here, we'll talk about the overall role of automation within a continuous monitoring plan. Be sure to give all due consideration to the proper tools, ensuring that they're capable of
05:39
pulling information from a variety of resource is
05:42
toe, identify specific specifications and mechanism thin the information system itself using open specifications. Such a scab is important, especially for interoperability, and ensure that whatever tool you select can support overall compliance with any applicant. Will federal laws, regulations, standards or
06:01
guidelines?
06:02
This is especially important when dealing with, for instance, privacy data and health data. And of course, it should go without saying that any continuous monitoring tool should be able to provide reporting
06:16
with the ability to Taylor that output, and you should consider whether or not the tool is capable off data consolidation inside it they SIM Tool.
06:27
Here's a list of some other sources and technologies that you should be familiar with within continuous monitoring, such as this CW or common weakness and admiration or the CW SS. The common weakness. Scoring a system or the cap. See
06:44
the common attack pattern in new Marais, shin and classifications
06:47
and the male IC. The malware attributes in new Marais shin characterizations these air, some outstanding tools and resource is that provide valuable input to system vulnerabilities.
07:00
Next, we'll deal with ongoing security control assessments again, a core element and ongoing authorization. This simply indicates that each security control should be addressed as a subset to the hole. It should not be done once a year, but on a rotating basis.
07:17
It should also be done or assisted with independent assessors.
07:21
We spoke about howto identify independence with your validators and then always keep a history and reuse prior assessment results. It gives you an indication as to the overall health over the information systems lifetime. Are you getting better or are you getting worse.
07:42
And like with any other criteria, whatever criteria you assess by, it must be performance based measurable. What we look for when we look at performance measures are quantifiable information based on readily attainable data, repeatable information
08:01
useful for tracking the overall performance as well as directing Resource is next. We have our ongoing remediation actions.
08:11
This is your poem. This is maintaining the health status and plan of action in milestones to correct weaknesses as they are identified not only in the risk assessment but through ongoing control assessment as they occur over the course of the information systems life cycle.
08:30
The primary owner of this task again is the information system owner and the common controls provider. Next you have your status reporting. This is the update of the poem. New vulnerabilities are identified all the time. Once they are identified,
08:48
see if they apply to your information system.
08:50
And if they do make an entry in the living poem, it's not a bad thing to have issues that you need to work through a plan of action in milestones. It's only bad when you ignore it
09:03
again. All of this feeds into the utopian goal of ongoing risk, determination and acceptance. The goal of not having to do the 36 month fire drill over and over again. If we do an adequate job of continuous monitoring, looking at security controls
09:20
and a cyclical fashion, we can reach the goal of ongoing authorization. And finally we have information system removal and Decommissioning.
09:31
This is tricky steps sometimes because we really don't like throwing things away. However, reuse is kind of the same as Decommissioning. But remember, everything has a life cycle. Everything should be born and then eventually die,
09:50
making way for newer,
09:52
better technologies, processes and procedures. One of the key aspects when it comes to system Decommissioning is media sanitization. How are you going to do it? Remembering that different media requires different types of attention?
10:09
For instance, some data might be on magnetic media versus optical versus electrical.
10:15
Other media might be on hard copies or Elektronik copies. How are you going to get rid of it? It must be identified, for instance, and the continuous monitoring plan not only how the machine is going to live, but how the data ultimately is going to be disposed off
10:33
when it comes to disposal. There are five key parts of the building and execution of a disposal plan. The information preservation steps, media sanitization hardware and software disposal
10:48
and then system closure. When it comes to sanitization decisions.
10:54
First, you must consider the security. Categorization is some media, and some mediums can be disposed of in some fashions and others, and another then looking at the cost benefit analysis. Do you really need to reuse that hard drive, or
11:11
is it just more cost effective to
11:13
destroy it and buy a new one? Are there any environmental factors that you need to take into account, For instance, the type and size of the media storage itself, Any confidentiality of the data stored entitle, sanitization and external issues that might arise,
11:31
the volume of the media that needs to be accounted for
11:35
and the level of training four sanitization personnel? It is sometimes a very specific skill when it comes to getting rid of data, and then, finally, the potential for reuse or recycling. Like I said, sometimes and most often,
11:52
hard drives don't need to be recycled. Hard drive space is cheap
11:56
is sometimes it's just best to destroy the hard drive and get a new one rather than risk cross contamination, regardless of the sensitivity of the data. Well, there we have it. We've reached the end
12:09
all six steps. I'm sure you were taking notes as you went, and now you're ready to go out and taco the risk management framework. Some final parting thoughts for you.
12:20
The risk management framework itself can look daunting. It can look like a large mountain to climb. However, when you really get into it, it's not that difficult. Sure, there are lots of moving parts, but once we get the entire security community
12:37
wrapped around their processes and their pieces,
12:41
it all actually does move very smoothly. But that requires everyone to do their part. This is no longer just I tease problem. This is the entire organizations issue. I'm sure that you will be successful. However, if you do need help,
13:01
feel free to reach out
13:03
any time.
13:05
Good luck. I'll see you next time

What is the Risk Management Framework?

This course introduces the Department of Defense (DoD) Risk Management Framework (RMF). This course prepares participants to take the CAP Exam which consists of 125 multiple choice questions and covers the following domains:

Instructed By

Instructor Profile Image
Michael Redman
Sr. ISSM at deciBel Research, Inc.
Instructor