SlideShare a Scribd company logo
RISK MANAGEMENT
STRATEGY
RMF v2 Organizational Preparation Step (“Step Zero”) Task 2
WHAT ARE RMF AND CSF?
• Risk Management Framework (RMF) and Cybersecurity Framework (CSF) are two
different sets of guidelines created by NIST for managing information security risk in
an agency or enterprise
• RMF is an answer to the Federal Information Security Management Act (FISMA) of
2002 requirements, and is required for all federal agencies
• CSF came out of Obama’s Executive Order 13636 of February 2013, and is voluntary
for Critical Infrastructure businesses (and also used by other private sector
companies)
WHAT HAPPENED TO CAUSE NIST TO
CREATE A NEW VERSION OF RMF?
• In May, 2017 Executive Order 13800 was signed
• EO 13800 requires:
• that agency heads manage risk at the agency level and across the
Executive Branch
• the use of the CSF by agency heads
• Increased emphasis on privacy
• The current version of RMF does not fully address these concerns
WHAT NEEDS TO CHANGE IN RMF?
• As a result of the analysis of RMF v1 and the EO, these are the
primary issues with the current version of RMF:
• Doesn’t specify how agency heads should be involved in the process from
the beginning
• There is no risk management preparation guidance
• It doesn’t completely mesh with the CSF
• There are no privacy considerations included in it
HOW EXACTLY IS RMF CHANGING IN V2?
• Primarily the addition of a new step (“Step Zero”): Organizational Preparation
(13 tasks)
• There are also a few more additional tasks added to the other steps
• Privacy concerns are addressed in addition to “security” concerns
WHAT IS ORGANIZATIONAL
PREPARATION “STEP ZERO” TASK 2?
• Title: Risk Management Strategy
• Definition: Establish a risk management strategy for the
organization that includes a determination of risk tolerance
WHO IS RESPONSIBLE FOR DOING
TASK 2?
Head of Agency or Chief Executive Officer:
• Definition: Senior official within an organization with the responsibility to provide
security protections commensurate with the risk and magnitude of harm to
organizational operations and assets, individuals, other organizations, and the
Nation…
WHAT ARE THE INPUTS AND
OUTPUTS?
• Potential inputs:
• Organizational mission statement
• Organizational policies
• Organizational risk assumptions, constraints, priorities, and trade-offs
• Potential outputs:
• Organizational risk management strategy
• Statement of risk tolerance
WHERE DOES THIS TASK FALL IN THE
SDLC?
• For new systems, during the Initiation phase
(concept/requirements definition)
• For existing systems, during the Operations/Maintenance
phase
WHERE DO I GO TO FIND MORE
DETAILS?
• NIST SP 800-30
• NIST SP 800-39 (Organization Level)
• NIST SP 800-160 (Risk Management, Quality Assurance, Quality Management,
Decision Management, Project Assessment and Control Processes)
• NIST SP 800-161
• NIST Interagency Report 8062
• Cybersecurity Framework (Core [Identify Function])
RISK MANAGEMENT PROCESS
• The four components of the Risk Management Process are:
• Framing,
• Assessment,
• Response, and
• Monitoring
NIST SP 800-30: GUIDE FOR
CONDUCTING RISK ASSESSMENTS
• Defines Risk Management Strategy as one of the outputs
from the Risk Management Process Framing component,
which becomes an input to the Risk Management Process
Assessment component
NIST SP 800-39: MANAGING
INFORMATION SECURITY RISK
• Risk Management Strategy is affected by three concepts:
• Risk Tolerance
• Trust
• Organizational Culture
NIST SP 800-39 (RISK TOLERANCE)
• Definition: “Level of risk or degree of uncertainty that is acceptable to organizations”
• The degree of risk tolerance is
• Indicative of organizational culture
• Different for different types of losses
• Influenced by the individual risk tolerance of senior leaders
• Defines ramifications of risk tolerance decisions
• Gives examples of how level of risk tolerance may affect risk assessments and risk
responses
NIST SP 800-39 (TRUST)
• Definition: A belief that an entity will behave in a predictable manner in specified
circumstances
• Entity may be a person, process, object, or combination of those (e.g., hardware
component, software module, piece of equipment, site, organization, nation-state)
• Based on objective evidence (e.g., testing) or subjective elements (e.g., level of
comfort)
• Trust between organizations informs risk management strategy
NIST SP 800-39 (ORGANIZATIONAL
CULTURE)
• Definition: values, beliefs, and norms that influence the behaviors and actions of
members of organizations
• Culture is largely affected by senior leaders
• Different cultures can exist within an organization and between organizations that
work together; this can result in different risk tolerance levels
• Direct relationship between culture and how organizations respond to uncertainties
• If a risk management strategy is not consistent with culture, it will be difficult to
implement
NIST SP 800-160: SYSTEMS SECURITY
ENGINEERING
• Systems engineering provides the basic foundation for a disciplined approach to
engineering trustworthy secure systems
• Five processes inform Risk Management Strategy:
• Risk Management Process
• Quality Management Process
• Quality Assurance Process
• Decision Management Process
• Project Assessment and Control Process
NIST SP 800-161: SUPPLY CHAIN RISK
MANAGEMENT PRACTICES FOR FEDERAL
INFORMATION SYSTEMS AND
ORGANIZATIONS
• Remember Target?
• Risk Management Strategy must incorporate Supply Chain
• Outputs from the organization’s risk management process serve
as inputs to this process
NIST INTERAGENCY REPORT 8062:
AN INTRODUCTION TO PRIVACY
ENGINEERING AND RISK MANAGEMENT
IN FEDERAL SYSTEMS
• Published in January 2017
• Incorporates privacy into the risk management process (e.g., PII,
PHI, etc.)
• Privacy needs to be considered in Risk Management Strategy
CSF: FRAMEWORK FOR IMPROVING
CRITICAL INFRASTRUCTURE
CYBERSECURITY
• Framework Core definition:
• a set of activities to achieve specific cybersecurity outcomes
• Core comprises four elements:
• Functions
• Categories
• Subcategories
• Informative References
• Functions include:
• Identify
• Protect
• Detect
• Respond
• Recover
• Task 2 of RMFv2 references the Identify function
CSF IDENTIFY FUNCTION
• Purpose: To develop the organizational understanding to manage
cybersecurity risk to systems, assets, data, and capabilities
• One outcome is a Risk Management Strategy (ID.RM)
SUMMARIZATION
• Task 2 is part of the Organizational Preparation step (“Step Zero”), which is entirely
new to the publication (SP 800-37)
• Task 2 covers Risk Management Strategy as a preparatory step to overall risk
management
• The purpose of including Task 2 in RMFv2 is to ensure that senior leaders are
involved in the risk management process from the very beginning, and determine
the risk tolerance of the organization
REFERENCES
• Draft NIST SP 800-37, Revision 2, September 2017
• NIST SP 800-30, Revision 1, September 2012
• NIST SP 800-39, March 2011
• NIST SP 800-160, November 2016
• NIST SP 800-161, April 2015
• NIST IR 8062, January 2017
• Framework for Improving Critical Infrastructure Cybersecurity, v1.0, February 2014
QUESTIONS?
AMY NICEWICK, CISSP
SalusSec, LLC
www.salussec.com

More Related Content

PPTX
Cloud application security (CCSP Domain 4)
PPTX
NIST CSF Overview
PPTX
Cybersecurity framework v1-1_presentation
PDF
Software Development Life Cycle – Managing Risk and Measuring Security
PDF
NISTs Cybersecurity Framework -- Comparison with Best Practice
PDF
Building a Product Security Practice in a DevOps World
PDF
Common Criteria and a Mutually-Recognized International Cryptographic Standard
PDF
NIST cybersecurity framework
Cloud application security (CCSP Domain 4)
NIST CSF Overview
Cybersecurity framework v1-1_presentation
Software Development Life Cycle – Managing Risk and Measuring Security
NISTs Cybersecurity Framework -- Comparison with Best Practice
Building a Product Security Practice in a DevOps World
Common Criteria and a Mutually-Recognized International Cryptographic Standard
NIST cybersecurity framework

What's hot (20)

PPTX
Key metrics and process in cyber security case scenario
PPTX
CISO Platform Security Maturity Model
PPTX
How to Solve Your Top IT Security Reporting Challenges with AlienVault
PDF
The What, Why, and How of DevSecOps
PPT
Secure by design and secure software development
PPTX
Security assessment with a hint of CISSP Prep
PPTX
Enterprise Security Architecture Design
PDF
Assessing Risk: Developing a Client/Server Security Architecture,
PPT
OWASP - Building Secure Web Applications
PPTX
Improve Threat Detection with OSSEC and AlienVault USM
PPTX
Chapter 1 Security Framework
PDF
Open Source IDS Tools: A Beginner's Guide
PPTX
Owasp Proactive Controls for Web developer
PPTX
Beginner's Guide to SIEM
PPTX
Simplify PCI DSS Compliance with AlienVault USM
PPTX
How to Simplify Audit Compliance with Unified Security Management
PPT
Software Security Frameworks
PDF
NIST CSD Cybersecurity Publications 20160417
PPTX
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
PPTX
IDS for Security Analysts: How to Get Actionable Insights from your IDS
Key metrics and process in cyber security case scenario
CISO Platform Security Maturity Model
How to Solve Your Top IT Security Reporting Challenges with AlienVault
The What, Why, and How of DevSecOps
Secure by design and secure software development
Security assessment with a hint of CISSP Prep
Enterprise Security Architecture Design
Assessing Risk: Developing a Client/Server Security Architecture,
OWASP - Building Secure Web Applications
Improve Threat Detection with OSSEC and AlienVault USM
Chapter 1 Security Framework
Open Source IDS Tools: A Beginner's Guide
Owasp Proactive Controls for Web developer
Beginner's Guide to SIEM
Simplify PCI DSS Compliance with AlienVault USM
How to Simplify Audit Compliance with Unified Security Management
Software Security Frameworks
NIST CSD Cybersecurity Publications 20160417
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
IDS for Security Analysts: How to Get Actionable Insights from your IDS
Ad

Similar to Risk Management Strategy (RMF v2) (20)

PPT
5757912.ppt
PPTX
800-37.pptx
PDF
CNIT 160: Ch 3b: The Risk Management Life Cycle
PDF
NIST Framework for Information System
PDF
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
PDF
Guide to Risk Management Framework (RMF)
PPSX
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
DOCX
CHAPTER 5Risk Response and MitigationIn this chapter, you will
DOCX
CHAPTER 5Risk Response and MitigationIn this chapter, you will.docx
PPTX
L1_Introduction.pptx
PPT
Risk Based Security and Self Protection Powerpoint
DOCX
DEPARTMENT CYBERSECURITY What’s Your IT Risk Approa
PDF
Guide for Applying The Risk Management Framework to Federal Information Systems
DOCX
Project 7 - Organization Security PlanChoose an organization fro.docx
PDF
Bluedog White Paper - overview of RMF implementation.pdf
PDF
practical-approach-to-strategic-risk-management-220318051837.pdf
PPT
practical-approach-to-strategic-risk-management.ppt
PPT
practical-approach-to-strategic-risk-management.ppt
PPT
practical-approach-to-strategic-risk-management.ppt
PPT
strategic-risk-management
5757912.ppt
800-37.pptx
CNIT 160: Ch 3b: The Risk Management Life Cycle
NIST Framework for Information System
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Guide to Risk Management Framework (RMF)
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
CHAPTER 5Risk Response and MitigationIn this chapter, you will
CHAPTER 5Risk Response and MitigationIn this chapter, you will.docx
L1_Introduction.pptx
Risk Based Security and Self Protection Powerpoint
DEPARTMENT CYBERSECURITY What’s Your IT Risk Approa
Guide for Applying The Risk Management Framework to Federal Information Systems
Project 7 - Organization Security PlanChoose an organization fro.docx
Bluedog White Paper - overview of RMF implementation.pdf
practical-approach-to-strategic-risk-management-220318051837.pdf
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.ppt
practical-approach-to-strategic-risk-management.ppt
strategic-risk-management
Ad

Recently uploaded (20)

PDF
Encapsulation theory and applications.pdf
PPT
Teaching material agriculture food technology
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Empathic Computing: Creating Shared Understanding
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
A Presentation on Artificial Intelligence
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Modernizing your data center with Dell and AMD
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation theory and applications.pdf
Teaching material agriculture food technology
NewMind AI Weekly Chronicles - August'25 Week I
Advanced methodologies resolving dimensionality complications for autism neur...
Understanding_Digital_Forensics_Presentation.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
The Rise and Fall of 3GPP – Time for a Sabbatical?
Chapter 3 Spatial Domain Image Processing.pdf
Machine learning based COVID-19 study performance prediction
Empathic Computing: Creating Shared Understanding
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
“AI and Expert System Decision Support & Business Intelligence Systems”
A Presentation on Artificial Intelligence
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Modernizing your data center with Dell and AMD
Network Security Unit 5.pdf for BCA BBA.
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

Risk Management Strategy (RMF v2)

  • 1. RISK MANAGEMENT STRATEGY RMF v2 Organizational Preparation Step (“Step Zero”) Task 2
  • 2. WHAT ARE RMF AND CSF? • Risk Management Framework (RMF) and Cybersecurity Framework (CSF) are two different sets of guidelines created by NIST for managing information security risk in an agency or enterprise • RMF is an answer to the Federal Information Security Management Act (FISMA) of 2002 requirements, and is required for all federal agencies • CSF came out of Obama’s Executive Order 13636 of February 2013, and is voluntary for Critical Infrastructure businesses (and also used by other private sector companies)
  • 3. WHAT HAPPENED TO CAUSE NIST TO CREATE A NEW VERSION OF RMF? • In May, 2017 Executive Order 13800 was signed • EO 13800 requires: • that agency heads manage risk at the agency level and across the Executive Branch • the use of the CSF by agency heads • Increased emphasis on privacy • The current version of RMF does not fully address these concerns
  • 4. WHAT NEEDS TO CHANGE IN RMF? • As a result of the analysis of RMF v1 and the EO, these are the primary issues with the current version of RMF: • Doesn’t specify how agency heads should be involved in the process from the beginning • There is no risk management preparation guidance • It doesn’t completely mesh with the CSF • There are no privacy considerations included in it
  • 5. HOW EXACTLY IS RMF CHANGING IN V2? • Primarily the addition of a new step (“Step Zero”): Organizational Preparation (13 tasks) • There are also a few more additional tasks added to the other steps • Privacy concerns are addressed in addition to “security” concerns
  • 6. WHAT IS ORGANIZATIONAL PREPARATION “STEP ZERO” TASK 2? • Title: Risk Management Strategy • Definition: Establish a risk management strategy for the organization that includes a determination of risk tolerance
  • 7. WHO IS RESPONSIBLE FOR DOING TASK 2? Head of Agency or Chief Executive Officer: • Definition: Senior official within an organization with the responsibility to provide security protections commensurate with the risk and magnitude of harm to organizational operations and assets, individuals, other organizations, and the Nation…
  • 8. WHAT ARE THE INPUTS AND OUTPUTS? • Potential inputs: • Organizational mission statement • Organizational policies • Organizational risk assumptions, constraints, priorities, and trade-offs • Potential outputs: • Organizational risk management strategy • Statement of risk tolerance
  • 9. WHERE DOES THIS TASK FALL IN THE SDLC? • For new systems, during the Initiation phase (concept/requirements definition) • For existing systems, during the Operations/Maintenance phase
  • 10. WHERE DO I GO TO FIND MORE DETAILS? • NIST SP 800-30 • NIST SP 800-39 (Organization Level) • NIST SP 800-160 (Risk Management, Quality Assurance, Quality Management, Decision Management, Project Assessment and Control Processes) • NIST SP 800-161 • NIST Interagency Report 8062 • Cybersecurity Framework (Core [Identify Function])
  • 11. RISK MANAGEMENT PROCESS • The four components of the Risk Management Process are: • Framing, • Assessment, • Response, and • Monitoring
  • 12. NIST SP 800-30: GUIDE FOR CONDUCTING RISK ASSESSMENTS • Defines Risk Management Strategy as one of the outputs from the Risk Management Process Framing component, which becomes an input to the Risk Management Process Assessment component
  • 13. NIST SP 800-39: MANAGING INFORMATION SECURITY RISK • Risk Management Strategy is affected by three concepts: • Risk Tolerance • Trust • Organizational Culture
  • 14. NIST SP 800-39 (RISK TOLERANCE) • Definition: “Level of risk or degree of uncertainty that is acceptable to organizations” • The degree of risk tolerance is • Indicative of organizational culture • Different for different types of losses • Influenced by the individual risk tolerance of senior leaders • Defines ramifications of risk tolerance decisions • Gives examples of how level of risk tolerance may affect risk assessments and risk responses
  • 15. NIST SP 800-39 (TRUST) • Definition: A belief that an entity will behave in a predictable manner in specified circumstances • Entity may be a person, process, object, or combination of those (e.g., hardware component, software module, piece of equipment, site, organization, nation-state) • Based on objective evidence (e.g., testing) or subjective elements (e.g., level of comfort) • Trust between organizations informs risk management strategy
  • 16. NIST SP 800-39 (ORGANIZATIONAL CULTURE) • Definition: values, beliefs, and norms that influence the behaviors and actions of members of organizations • Culture is largely affected by senior leaders • Different cultures can exist within an organization and between organizations that work together; this can result in different risk tolerance levels • Direct relationship between culture and how organizations respond to uncertainties • If a risk management strategy is not consistent with culture, it will be difficult to implement
  • 17. NIST SP 800-160: SYSTEMS SECURITY ENGINEERING • Systems engineering provides the basic foundation for a disciplined approach to engineering trustworthy secure systems • Five processes inform Risk Management Strategy: • Risk Management Process • Quality Management Process • Quality Assurance Process • Decision Management Process • Project Assessment and Control Process
  • 18. NIST SP 800-161: SUPPLY CHAIN RISK MANAGEMENT PRACTICES FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS • Remember Target? • Risk Management Strategy must incorporate Supply Chain • Outputs from the organization’s risk management process serve as inputs to this process
  • 19. NIST INTERAGENCY REPORT 8062: AN INTRODUCTION TO PRIVACY ENGINEERING AND RISK MANAGEMENT IN FEDERAL SYSTEMS • Published in January 2017 • Incorporates privacy into the risk management process (e.g., PII, PHI, etc.) • Privacy needs to be considered in Risk Management Strategy
  • 20. CSF: FRAMEWORK FOR IMPROVING CRITICAL INFRASTRUCTURE CYBERSECURITY • Framework Core definition: • a set of activities to achieve specific cybersecurity outcomes • Core comprises four elements: • Functions • Categories • Subcategories • Informative References • Functions include: • Identify • Protect • Detect • Respond • Recover • Task 2 of RMFv2 references the Identify function
  • 21. CSF IDENTIFY FUNCTION • Purpose: To develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities • One outcome is a Risk Management Strategy (ID.RM)
  • 22. SUMMARIZATION • Task 2 is part of the Organizational Preparation step (“Step Zero”), which is entirely new to the publication (SP 800-37) • Task 2 covers Risk Management Strategy as a preparatory step to overall risk management • The purpose of including Task 2 in RMFv2 is to ensure that senior leaders are involved in the risk management process from the very beginning, and determine the risk tolerance of the organization
  • 23. REFERENCES • Draft NIST SP 800-37, Revision 2, September 2017 • NIST SP 800-30, Revision 1, September 2012 • NIST SP 800-39, March 2011 • NIST SP 800-160, November 2016 • NIST SP 800-161, April 2015 • NIST IR 8062, January 2017 • Framework for Improving Critical Infrastructure Cybersecurity, v1.0, February 2014
  • 25. AMY NICEWICK, CISSP SalusSec, LLC www.salussec.com