SlideShare a Scribd company logo
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Categorize
Select
Implement
Assess
Authorize
Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Categorize
Select
Implement
Assess
Authorize
Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
 Management
 Operational
 Technical
 Implemented correctly
 Operating as intended
 Producing the desired outcome
factual basis for an authorizing official to render a
security accreditation decision
An information security assessment is the process of
determining how effectively an entity being assessed
meets specific security objectives.
Three types of assessment methods can be used to
accomplish this—testing, examination, and
interviewing.
Assessment results are used to support the
determination of security control effectiveness over
time.
- NIST SP 800-115
“Independent review and examination
of records and activities to assess the
adequacy of system controls and
ensure compliance with established
policies and operational procedures.”
- CNSS Instruction No. 4009
“Examination and analysis of the safeguards
required to protect an information system,
as they have been applied in an operational
environment, to determine the security
posture of that system.”
- CNSSI No. 4009
Testing is the process of exercising one or more assessment objects under
specified conditions to compare actual and expected behaviors.
Examination is the process of checking, inspecting, reviewing, observing,
studying, or analyzing one or more assessment objects to facilitate
understanding, achieve clarification, or obtain evidence.
Interviewing is the process of conducting discussions with individuals or
groups within an organization to facilitate understanding, achieve
clarification, or identify the location of evidence.
Source NIST SP 800-115
“The security certification and accreditation process is
designed to ensure that an information system will
operate with the appropriate management review, that
there is ongoing monitoring of security controls, and
that reaccreditation occurs periodically.”
NIST SP 800-100
“Security certification is a
comprehensive assessment of the
management, operational, and
technical security controls in an
information system, made in support
of security accreditation, to
determine the extent to which the
controls are implemented correctly,
operating as intended, and producing
the desired outcome with respect to
meeting the security requirements for
the system. The results of a security
certification are used to reassess the
risks and update the system security
plan, thus providing the factual basis
for an authorizing official to render a
security accreditation decision.” NIST
SP 800-100
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
From
OMB M-10-15 - FY 2010
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Categorize
Select
Implement
Assess
Authorize
Monitor
Planning
Information
Gathering
Business Process
Assessment
Technology
Assessment
Risk Analysis &
Reporting
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
use independent assessor
self-assessment
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Plan
Execute
Post
Execution
FISCAM NIST SP 800-115
Plan
PerformReport
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Task 1“Assemble any documentation and supporting materials
necessary for the assessment of the security controls in the
information system; if these documents include previous
assessments of security controls, review the findings, results,
and evidence.”
Task 2 “Select, or develop when needed, appropriate methods
and procedures to assess the management, operational, and
technical security controls in the information system.”
Task 3 “Assess the management, operational, and technical
security controls in the information system using methods and
procedures selected or developed.”
Task 4 “Prepare the final security assessment report.”
NIST SP 800-37
Task 1“Provide the information system owner with the security
assessment report.”
Task 2 “Update the system security plan (and risk assessment)
based on the results of the security assessment and any
modifications to the security controls in the information
system.”
Task 3 “Prepare the plan of action and milestones based on the
results of the security assessment.”
Task 4 “Assemble the final security accreditation package and
submit to authorizing official.”
NIST SP 800-37
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Knowledge
SkillAbility
*GAO recommends 65% of audit staff to be CISA
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
“Risk assessments should be used to guide the
rigor and intensity of all security control
assessment related activities associated with the
information system to enable cost effective, risk-
based implementation of key elements in the
organization’s information security program”
- NIST SP 800-37 rev 1
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Populations over 250
Control Testing Sample Size Table
Significance of Control Inherent Risk Minimum Sample Size1
High High 60
High Low 40
Moderate High 40
Moderate Low 25
Compliance Testing Sample Size Table
Desired Level of
Assurance Minimum Sample Size1
High 60
Moderate 40
Low 25
1: No exceptions expected
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls



Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Governance
RiskCompliance
Dashboards
Metrics
Checklists
Reporting
Trend Analysis
Remediation
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Input
• Data
Entry
Data
Collection
• Database
Storage
Output • Reports
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Where is the best place to scan from?
What strategy would you use to scan
systems?
External scan found 2
critical vulnerabilities
Internal scan found 15
critical vulnerabilities
Authenticated internal
scan found 35 critical
vulnerabilities
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Observers
& Referees
Mimic real-world attacks
Unannounced
Announced
Red Team
“A test methodology in which assessors, typically working under
specific constraints, attempt to circumvent or defeat the security
features of an information system. “
- CNSSI No. 4009
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Authenticated internal
scan found 35 critical
vulnerabilities
Discovery
Gain Access
Escalate
Privilege
System
Browsing
Install Tools
External scan found 2
critical vulnerabilities
Discovery
Gain Access
Escalate
Privilege
System
Browsing
Install Tools
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
*Definition form ISACA
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
DoDI 8510.01, November 28, 2007
DoDI 8510.01, November 28, 2007
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls
implemented correctly,
operating as intended, and producing the desired outcome
Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls

More Related Content

PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 3: Roles
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
PPTX
RMF Roles and Responsibilities (Part 1)
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 3: Roles
Understanding the Risk Management Framework & (ISC)2 CAP Module 2: Introduction
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
RMF Roles and Responsibilities (Part 1)
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...

What's hot (20)

PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
PPTX
Introduction to NIST’s Risk Management Framework (RMF)
PPTX
INFOSECFORCE Risk Management Framework Transition Plan
PDF
Information Security Continuous Monitoring within a Risk Management Framework
PDF
Guide for Applying The Risk Management Framework to Federal Information Systems
PPTX
Developing a Continuous Monitoring Action Plan
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
PPTX
Continuous Monitoring: Getting Past Complexity & Reducing Risk
PPTX
Achieving Continuous Monitoring with Security Automation
PPTX
FISMA NextGen - Continuous Monitoring, Near Real-Time Risk Management
PDF
SuprTEK Continuous Monitoring
PDF
NIST cybersecurity framework
PPTX
"Backoff" Malware: How to Know If You're Infected
PPT
Security audit
PDF
NIST SP 800 30 Flow Chart
PPTX
TalaTek Enterprise Compliance Management Solution
PDF
It Security Audit Process
PPTX
Continual Monitoring
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Introduction to NIST’s Risk Management Framework (RMF)
INFOSECFORCE Risk Management Framework Transition Plan
Information Security Continuous Monitoring within a Risk Management Framework
Guide for Applying The Risk Management Framework to Federal Information Systems
Developing a Continuous Monitoring Action Plan
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Continuous Monitoring: Getting Past Complexity & Reducing Risk
Achieving Continuous Monitoring with Security Automation
FISMA NextGen - Continuous Monitoring, Near Real-Time Risk Management
SuprTEK Continuous Monitoring
NIST cybersecurity framework
"Backoff" Malware: How to Know If You're Infected
Security audit
NIST SP 800 30 Flow Chart
TalaTek Enterprise Compliance Management Solution
It Security Audit Process
Continual Monitoring
Ad

Viewers also liked (20)

PPTX
Payment Card Industry Introduction 2010
PPT
Part 2 Word 2007
PPTX
RMF Roles and Responsibilities (Part 2)
PDF
2016 Maze Live 1 GASB update
PPT
Office 2007 Word
PPT
MS Word Part 1 (2009)
PPTX
Payment Card Industry CMTA NOV 2010
PPT
Office 2007 Word Intro 2009
PPTX
Maze & Associates PCI Compliance Tracker for Local Governments
PPTX
Cyber Security Career Advice
PDF
Rmf step-3-control-selection-nist-sp-800-53r4
PPTX
Payment Card Acceptance PCI Compliance for Local Governments 2012
PPTX
Payment Card Industry Compliance for Local Governments CSMFO 2009
PPTX
Building and Maintaining a Successful RMF Program
PPTX
PCI Compliance for Community Colleges @One CISOA 2011
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 5: Planning
PDF
Annual Maze Live Event 2016 – GASB Updates & Best Practices
PDF
GASB 68 and 71 Planning for the Second Year
PPTX
Cyber Security for Local Gov SAMFOG
PDF
Implementing GASB 72: Fair Value Measurement and Application
Payment Card Industry Introduction 2010
Part 2 Word 2007
RMF Roles and Responsibilities (Part 2)
2016 Maze Live 1 GASB update
Office 2007 Word
MS Word Part 1 (2009)
Payment Card Industry CMTA NOV 2010
Office 2007 Word Intro 2009
Maze & Associates PCI Compliance Tracker for Local Governments
Cyber Security Career Advice
Rmf step-3-control-selection-nist-sp-800-53r4
Payment Card Acceptance PCI Compliance for Local Governments 2012
Payment Card Industry Compliance for Local Governments CSMFO 2009
Building and Maintaining a Successful RMF Program
PCI Compliance for Community Colleges @One CISOA 2011
Understanding the Risk Management Framework & (ISC)2 CAP Module 5: Planning
Annual Maze Live Event 2016 – GASB Updates & Best Practices
GASB 68 and 71 Planning for the Second Year
Cyber Security for Local Gov SAMFOG
Implementing GASB 72: Fair Value Measurement and Application
Ad

Similar to Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls (20)

PPTX
Information Systems Audit & CISA Prep 2010
PPTX
IT Security Bachelor in information technology.pptx
PPTX
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
PPTX
Controls in Audit.pptx
PPTX
Cyber Security Audit and Information Security.pptx
PPT
SLVA - Security monitoring and reporting itweb workshop
PPT
Safety Management Systems (SMS) Fundamentals: Safety Assurance
PPTX
Software engineering
PDF
IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...
PDF
CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...
PPTX
Security auditing architecture
PPTX
Security-Monitoring-and-Improvement.pptx
PPTX
L4 RMF Phase 3 Select.pptx
PPT
Security Manager - Slides - Module 12 Powerpoint Presentation
PPT
Security Manager - Slides - Module 12 Powerpoint Presentation
PPT
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
PPTX
Verifikasi dan Validasi keamanan informasi
PPT
ch14.ppt
PPTX
TOTLEKELIvxcvxdfsdfsdfsdfsdfqqefewrwerwervesfdfsdfefsdsfds
PPT
Information Security Identity and Access Management Administration 07072016
Information Systems Audit & CISA Prep 2010
IT Security Bachelor in information technology.pptx
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
Controls in Audit.pptx
Cyber Security Audit and Information Security.pptx
SLVA - Security monitoring and reporting itweb workshop
Safety Management Systems (SMS) Fundamentals: Safety Assurance
Software engineering
IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...
CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...
Security auditing architecture
Security-Monitoring-and-Improvement.pptx
L4 RMF Phase 3 Select.pptx
Security Manager - Slides - Module 12 Powerpoint Presentation
Security Manager - Slides - Module 12 Powerpoint Presentation
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
Verifikasi dan Validasi keamanan informasi
ch14.ppt
TOTLEKELIvxcvxdfsdfsdfsdfsdfqqefewrwerwervesfdfsdfefsdsfds
Information Security Identity and Access Management Administration 07072016

More from Donald E. Hester (10)

PDF
Cybersecurity for Local Gov for SAMFOG
PDF
2017 IT Control Environment for Local Gov
PPTX
What you Need To Know About Ransomware
PDF
CNT 54 Administering Windows Client
PDF
2016 Maze Live Fraud Environment
PDF
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
PDF
2016 Maze Live Cyber-security for Local Governments
PDF
Payment Card Cashiering for Local Governments 2016
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Cybersecurity for Local Gov for SAMFOG
2017 IT Control Environment for Local Gov
What you Need To Know About Ransomware
CNT 54 Administering Windows Client
2016 Maze Live Fraud Environment
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Cyber-security for Local Governments
Payment Card Cashiering for Local Governments 2016
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...

Recently uploaded (20)

PPTX
PCCR-ROTC-UNIT-ORGANIZATIONAL-STRUCTURE-pptx-Copy (1).pptx
PPTX
Nur Shakila Assesmentlwemkf;m;mwee f.pptx
PDF
Population Estimates 2025 Regional Snapshot 08.11.25
PPTX
Omnibus rules on leave administration.pptx
PDF
Item # 4 -- 328 Albany St. compt. review
PDF
Item # 2 - 934 Patterson Specific Use Permit (SUP)
PDF
Strategic Planning 2025-2026 (Bambang PWD Association, Inc.)
PPTX
GSA Q+A Follow-Up To EO's, Requirements & Timelines
PDF
2025 Shadow report on Ukraine's progression regarding Chapter 29 of the acquis
PDF
It Helpdesk Solutions - ArcLight Group
PDF
Environmental Management Basics 2025 for BDOs WBCS by Samanjit Sen Gupta.pdf
PDF
Courtesy Meeting NIPA and MBS Australia.
PPTX
DFARS Part 249 - Termination Of Contracts
PPTX
怎么办休斯敦大学维多利亚分校毕业证电子版成绩单办理|UHV在读证明信
PPTX
The DFARS - Part 250 - Extraordinary Contractual Actions
PPTX
STG - Sarikei 2025 Coordination Meeting.pptx
PPT
Quality Management Ssystem PPT - Introduction.ppt
PPTX
Weekly Report 17-10-2024_cybersecutity.pptx
PDF
सुशासन सप्ताह भारत रत्न श्री अटल बिहारी बाजपेयी जी जन्मदिवस समारोह 19-24 दिसं...
PPTX
AMO Pune Complete information and work profile
PCCR-ROTC-UNIT-ORGANIZATIONAL-STRUCTURE-pptx-Copy (1).pptx
Nur Shakila Assesmentlwemkf;m;mwee f.pptx
Population Estimates 2025 Regional Snapshot 08.11.25
Omnibus rules on leave administration.pptx
Item # 4 -- 328 Albany St. compt. review
Item # 2 - 934 Patterson Specific Use Permit (SUP)
Strategic Planning 2025-2026 (Bambang PWD Association, Inc.)
GSA Q+A Follow-Up To EO's, Requirements & Timelines
2025 Shadow report on Ukraine's progression regarding Chapter 29 of the acquis
It Helpdesk Solutions - ArcLight Group
Environmental Management Basics 2025 for BDOs WBCS by Samanjit Sen Gupta.pdf
Courtesy Meeting NIPA and MBS Australia.
DFARS Part 249 - Termination Of Contracts
怎么办休斯敦大学维多利亚分校毕业证电子版成绩单办理|UHV在读证明信
The DFARS - Part 250 - Extraordinary Contractual Actions
STG - Sarikei 2025 Coordination Meeting.pptx
Quality Management Ssystem PPT - Introduction.ppt
Weekly Report 17-10-2024_cybersecutity.pptx
सुशासन सप्ताह भारत रत्न श्री अटल बिहारी बाजपेयी जी जन्मदिवस समारोह 19-24 दिसं...
AMO Pune Complete information and work profile

Understanding the Risk Management Framework & (ISC)2 CAP Module 9: Assess Controls

  • 14.  Management  Operational  Technical  Implemented correctly  Operating as intended  Producing the desired outcome factual basis for an authorizing official to render a security accreditation decision
  • 15. An information security assessment is the process of determining how effectively an entity being assessed meets specific security objectives. Three types of assessment methods can be used to accomplish this—testing, examination, and interviewing. Assessment results are used to support the determination of security control effectiveness over time. - NIST SP 800-115
  • 16. “Independent review and examination of records and activities to assess the adequacy of system controls and ensure compliance with established policies and operational procedures.” - CNSS Instruction No. 4009
  • 17. “Examination and analysis of the safeguards required to protect an information system, as they have been applied in an operational environment, to determine the security posture of that system.” - CNSSI No. 4009
  • 18. Testing is the process of exercising one or more assessment objects under specified conditions to compare actual and expected behaviors. Examination is the process of checking, inspecting, reviewing, observing, studying, or analyzing one or more assessment objects to facilitate understanding, achieve clarification, or obtain evidence. Interviewing is the process of conducting discussions with individuals or groups within an organization to facilitate understanding, achieve clarification, or identify the location of evidence. Source NIST SP 800-115
  • 19. “The security certification and accreditation process is designed to ensure that an information system will operate with the appropriate management review, that there is ongoing monitoring of security controls, and that reaccreditation occurs periodically.” NIST SP 800-100
  • 20. “Security certification is a comprehensive assessment of the management, operational, and technical security controls in an information system, made in support of security accreditation, to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system. The results of a security certification are used to reassess the risks and update the system security plan, thus providing the factual basis for an authorizing official to render a security accreditation decision.” NIST SP 800-100
  • 33. Plan Execute Post Execution FISCAM NIST SP 800-115 Plan PerformReport
  • 38. Task 1“Assemble any documentation and supporting materials necessary for the assessment of the security controls in the information system; if these documents include previous assessments of security controls, review the findings, results, and evidence.” Task 2 “Select, or develop when needed, appropriate methods and procedures to assess the management, operational, and technical security controls in the information system.” Task 3 “Assess the management, operational, and technical security controls in the information system using methods and procedures selected or developed.” Task 4 “Prepare the final security assessment report.” NIST SP 800-37
  • 39. Task 1“Provide the information system owner with the security assessment report.” Task 2 “Update the system security plan (and risk assessment) based on the results of the security assessment and any modifications to the security controls in the information system.” Task 3 “Prepare the plan of action and milestones based on the results of the security assessment.” Task 4 “Assemble the final security accreditation package and submit to authorizing official.” NIST SP 800-37
  • 45. *GAO recommends 65% of audit staff to be CISA
  • 52. “Risk assessments should be used to guide the rigor and intensity of all security control assessment related activities associated with the information system to enable cost effective, risk- based implementation of key elements in the organization’s information security program” - NIST SP 800-37 rev 1
  • 55. Populations over 250 Control Testing Sample Size Table Significance of Control Inherent Risk Minimum Sample Size1 High High 60 High Low 40 Moderate High 40 Moderate Low 25 Compliance Testing Sample Size Table Desired Level of Assurance Minimum Sample Size1 High 60 Moderate 40 Low 25 1: No exceptions expected
  • 81. Where is the best place to scan from? What strategy would you use to scan systems? External scan found 2 critical vulnerabilities Internal scan found 15 critical vulnerabilities Authenticated internal scan found 35 critical vulnerabilities
  • 85. Red Team “A test methodology in which assessors, typically working under specific constraints, attempt to circumvent or defeat the security features of an information system. “ - CNSSI No. 4009
  • 88. Authenticated internal scan found 35 critical vulnerabilities Discovery Gain Access Escalate Privilege System Browsing Install Tools External scan found 2 critical vulnerabilities Discovery Gain Access Escalate Privilege System Browsing Install Tools
  • 107. implemented correctly, operating as intended, and producing the desired outcome