SlideShare a Scribd company logo
FISMA Requirements
In preparing agencies for FISMA compliance, agency heads, in conjunction with CIOs and CISOs, must develop provisions according to
eight broad categories:

1. Risk Assessments- we can help with a risk assessment of common high risk areas with an ISO Information Risk Pre-
Assessment engagement.

2. Policies and Procedures
3. Security Plans
4. Security Awareness Training
5. Annual Security Testing
6. Remediation Procedures

7. SIEM Alerting: Incident Response Procedures
FISMA requires each agency to develop or acquire sufficient capability to detect and respond to information security incidents within
their agency. This includes the ability to mitigate the risks of attacks in progress. In an effort to foster collaboration and
communication in pursuit of the goal of responding pro-actively to threats, FISMA specifies that agencies report all information security
attacks to a central federal information security incident center, the US-CERT. This means that agencies must perform constant, vigilant
scanning of all systems.

8. SIEM backup and restore: Contingency Plans
FISMA requires every information system on the agency’s inventory to be subject to a documented plan containing procedures to
ensure continuity of system operations in the event of a failure or system corruption. As part of the operational security controls for
the system, such plans must also be tested annually.

Additional Information:
Risk Assessments Engagement
Performing risk assessments is vital (in addition to being required) simply because they allow evaluating parties to determine the
degree to which information security provisions are commensurate with the risk they are designed to mitigate. (FISMA requires that
assessments be performed at least annually; however, the optimal frequency for a positive overall FISMA evaluation will vary from
agency to agency.) Through the course of such assessments, agencies will be called upon to estimate the amount of harm that would
be caused by disruption of its services. These risks are the cornerstone for many of the other required activities.

Policies and Procedures
Agencies will be called upon to formulate information security policies and procedures to cost-effectively mitigate the risk uncovered
through the assessments described above. FISMA specifically calls for agencies to design policies and procedures that ensure that
information security is addressed throughout the lifecycle of an information-technology system, and not simply as a final, quality control
procedure performed prior to deployment.

Security Plans
FISMA requires agencies to draft plans which describe security measures that address specific system requirements and comply with
policies and procedures. Such plans must take into account the guidelines issued by the National Institute of Standards &
Technology (NIST). FISMA specifies that such plans must cover training (of both security professionals and intended users), incident
response capabilities, contingency plans, remediation, and system configuration standards.

Security Awareness Training
Under FISMA, all agencies are required to offer ongoing security awareness training to all personnel, including contractors and all other
users of the agency’s information technology systems. FISMA requires that such training acquaint participants with the
risks associated with handling critical data and the responsibilities involved in providing effective security.

Annual Security Testing
FISMA calls for the evaluation of policies, procedures, and practices through annual testing of every information system on the
agency’s inventory. FISMA requires that these tests be performed as often as necessary, based on the amount of risk such systems
are designed to protect, but at least once a year. FISMA further requires that such testing include not only the technical controls of the
system, but also management and operational controls.

Remediation Procedures
Agencies are required to track all security deficiencies identified through testing and monitoring and to measure remediation progress
and effectiveness for every system regardless of its level of importance.

More Related Content

PPTX
Safety management system phase ii
PDF
ISACA Indonesia Special Technical Session feat Erik Guldentops Panelist Widha...
PPTX
INFOSECFORCE Risk Management Framework Transition Plan
PPTX
Developing a Continuous Monitoring Action Plan
PDF
Safety Management System
PDF
Guide for Applying The Risk Management Framework to Federal Information Systems
PPTX
Safety Management System framework
PPT
2. Improving an Existing Sec Sys
Safety management system phase ii
ISACA Indonesia Special Technical Session feat Erik Guldentops Panelist Widha...
INFOSECFORCE Risk Management Framework Transition Plan
Developing a Continuous Monitoring Action Plan
Safety Management System
Guide for Applying The Risk Management Framework to Federal Information Systems
Safety Management System framework
2. Improving an Existing Sec Sys

What's hot (20)

PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 3: Roles
PPTX
Safety management system introduction
PPT
Information Systems Security Review 2004
PPTX
The Three Lines of Defense Model & Continuous Controls Monitoring
PPT
Safety Management Systems (SMS) Fundamentals: Promotion
PDF
SuprTEK Continuous Monitoring
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
PDF
Sms ii implemention
PPTX
RMF Roles and Responsibilities (Part 1)
PPT
Safety Management Systems (SMS) Fundamentals: Safety Assurance
PPTX
Continual Monitoring
PDF
Five principles for improving your cyber security
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
PDF
Symantec Managed AV Service - KAZ
PPT
Security policy
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
PDF
Magic quadrant for operational risk management solutions
PDF
Safety management systems
PPT
Risk management ii
PDF
How Do You Define Continuous Monitoring?
Understanding the Risk Management Framework & (ISC)2 CAP Module 3: Roles
Safety management system introduction
Information Systems Security Review 2004
The Three Lines of Defense Model & Continuous Controls Monitoring
Safety Management Systems (SMS) Fundamentals: Promotion
SuprTEK Continuous Monitoring
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Sms ii implemention
RMF Roles and Responsibilities (Part 1)
Safety Management Systems (SMS) Fundamentals: Safety Assurance
Continual Monitoring
Five principles for improving your cyber security
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Symantec Managed AV Service - KAZ
Security policy
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Magic quadrant for operational risk management solutions
Safety management systems
Risk management ii
How Do You Define Continuous Monitoring?
Ad

Similar to Example of fisma compliance analysis.1 (20)

PDF
Information Security Continuous Monitoring within a Risk Management Framework
PDF
Threat and Vulnerability Management https://www.omexsecurity.com/
PPT
5757912.ppt
PDF
Cyber Security Risk Mitigation Checklist
PPTX
MIS, or Management Information System, is a structured framework that uses te...
DOCX
E’s Data Security Company Strategic Security Plan – 2015.docx
PPT
Chapter003
PDF
IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...
PDF
CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...
DOCX
DEPARTMENT CYBERSECURITY What’s Your IT Risk Approa
PPT
Information Security Identity and Access Management Administration 07072016
PDF
Guide to Risk Management Framework (RMF)
PDF
Ch09 Information Security Best Practices
DOCX
Risk Assessment Famework
PPTX
Security Plans & Policies in Cybersecurity.pptx
PDF
Ignyte assurance platform NIST RMF datasheet.
PDF
Solve the exercise in security management.pdf
PDF
u10a1-Risk Assessment Report-Beji Jacob
PPTX
Physical security information management market
PDF
The Role of Penetration Testing in Strengthening Organizational Cyber securit...
Information Security Continuous Monitoring within a Risk Management Framework
Threat and Vulnerability Management https://www.omexsecurity.com/
5757912.ppt
Cyber Security Risk Mitigation Checklist
MIS, or Management Information System, is a structured framework that uses te...
E’s Data Security Company Strategic Security Plan – 2015.docx
Chapter003
IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...
CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...
DEPARTMENT CYBERSECURITY What’s Your IT Risk Approa
Information Security Identity and Access Management Administration 07072016
Guide to Risk Management Framework (RMF)
Ch09 Information Security Best Practices
Risk Assessment Famework
Security Plans & Policies in Cybersecurity.pptx
Ignyte assurance platform NIST RMF datasheet.
Solve the exercise in security management.pdf
u10a1-Risk Assessment Report-Beji Jacob
Physical security information management market
The Role of Penetration Testing in Strengthening Organizational Cyber securit...
Ad

Example of fisma compliance analysis.1

  • 1. FISMA Requirements In preparing agencies for FISMA compliance, agency heads, in conjunction with CIOs and CISOs, must develop provisions according to eight broad categories: 1. Risk Assessments- we can help with a risk assessment of common high risk areas with an ISO Information Risk Pre- Assessment engagement. 2. Policies and Procedures 3. Security Plans 4. Security Awareness Training 5. Annual Security Testing 6. Remediation Procedures 7. SIEM Alerting: Incident Response Procedures FISMA requires each agency to develop or acquire sufficient capability to detect and respond to information security incidents within their agency. This includes the ability to mitigate the risks of attacks in progress. In an effort to foster collaboration and communication in pursuit of the goal of responding pro-actively to threats, FISMA specifies that agencies report all information security attacks to a central federal information security incident center, the US-CERT. This means that agencies must perform constant, vigilant scanning of all systems. 8. SIEM backup and restore: Contingency Plans FISMA requires every information system on the agency’s inventory to be subject to a documented plan containing procedures to ensure continuity of system operations in the event of a failure or system corruption. As part of the operational security controls for the system, such plans must also be tested annually. Additional Information: Risk Assessments Engagement Performing risk assessments is vital (in addition to being required) simply because they allow evaluating parties to determine the degree to which information security provisions are commensurate with the risk they are designed to mitigate. (FISMA requires that assessments be performed at least annually; however, the optimal frequency for a positive overall FISMA evaluation will vary from agency to agency.) Through the course of such assessments, agencies will be called upon to estimate the amount of harm that would be caused by disruption of its services. These risks are the cornerstone for many of the other required activities. Policies and Procedures Agencies will be called upon to formulate information security policies and procedures to cost-effectively mitigate the risk uncovered through the assessments described above. FISMA specifically calls for agencies to design policies and procedures that ensure that information security is addressed throughout the lifecycle of an information-technology system, and not simply as a final, quality control procedure performed prior to deployment. Security Plans FISMA requires agencies to draft plans which describe security measures that address specific system requirements and comply with policies and procedures. Such plans must take into account the guidelines issued by the National Institute of Standards & Technology (NIST). FISMA specifies that such plans must cover training (of both security professionals and intended users), incident response capabilities, contingency plans, remediation, and system configuration standards. Security Awareness Training Under FISMA, all agencies are required to offer ongoing security awareness training to all personnel, including contractors and all other users of the agency’s information technology systems. FISMA requires that such training acquaint participants with the risks associated with handling critical data and the responsibilities involved in providing effective security. Annual Security Testing FISMA calls for the evaluation of policies, procedures, and practices through annual testing of every information system on the agency’s inventory. FISMA requires that these tests be performed as often as necessary, based on the amount of risk such systems are designed to protect, but at least once a year. FISMA further requires that such testing include not only the technical controls of the system, but also management and operational controls. Remediation Procedures Agencies are required to track all security deficiencies identified through testing and monitoring and to measure remediation progress and effectiveness for every system regardless of its level of importance.