top 10 myths - nist · 8/25/2014  · forum - august 2014 - top ten myths: q&a session...

22
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Federal Computer Security Program Managers’ Forum Top 10 Myths FISMA, RMF, 800-53, Continuous Monitoring, and Life

Upload: others

Post on 22-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Top 10 Myths - NIST · 8/25/2014  · Forum - August 2014 - Top Ten Myths: Q&A Session discussing all of the r ecent updates to the FISMA pubs, Ron Ross Author: NIST Computer Security

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1

Federal Computer Security Program Managers’ Forum

Top 10 Myths FISMA, RMF, 800-53, Continuous Monitoring, and Life

Page 2: Top 10 Myths - NIST · 8/25/2014  · Forum - August 2014 - Top Ten Myths: Q&A Session discussing all of the r ecent updates to the FISMA pubs, Ron Ross Author: NIST Computer Security

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 2

First, a quick refresher course.

Page 3: Top 10 Myths - NIST · 8/25/2014  · Forum - August 2014 - Top Ten Myths: Q&A Session discussing all of the r ecent updates to the FISMA pubs, Ron Ross Author: NIST Computer Security

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 3

Risk management 101.

Page 4: Top 10 Myths - NIST · 8/25/2014  · Forum - August 2014 - Top Ten Myths: Q&A Session discussing all of the r ecent updates to the FISMA pubs, Ron Ross Author: NIST Computer Security

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 4

Risk. Function (threat, vulnerability, impact, likelihood)

Page 5: Top 10 Myths - NIST · 8/25/2014  · Forum - August 2014 - Top Ten Myths: Q&A Session discussing all of the r ecent updates to the FISMA pubs, Ron Ross Author: NIST Computer Security

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 5

The unlikely threat.

Our three-year old adopted pit bull.

Cute. Lovable. Smart.

Hi. I’m Sophie. Welcome to the Forum!

Page 6: Top 10 Myths - NIST · 8/25/2014  · Forum - August 2014 - Top Ten Myths: Q&A Session discussing all of the r ecent updates to the FISMA pubs, Ron Ross Author: NIST Computer Security

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 6

The vulnerability.

Page 7: Top 10 Myths - NIST · 8/25/2014  · Forum - August 2014 - Top Ten Myths: Q&A Session discussing all of the r ecent updates to the FISMA pubs, Ron Ross Author: NIST Computer Security

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 7

The impact.

and the likelihood?.

100%

Page 8: Top 10 Myths - NIST · 8/25/2014  · Forum - August 2014 - Top Ten Myths: Q&A Session discussing all of the r ecent updates to the FISMA pubs, Ron Ross Author: NIST Computer Security

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 8

And a few family photos.

Page 9: Top 10 Myths - NIST · 8/25/2014  · Forum - August 2014 - Top Ten Myths: Q&A Session discussing all of the r ecent updates to the FISMA pubs, Ron Ross Author: NIST Computer Security

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 9

Our newest addition.

7-week old kitten rescued yesterday from a storm drain next to Starbucks...

Named him “Bucks”

Page 10: Top 10 Myths - NIST · 8/25/2014  · Forum - August 2014 - Top Ten Myths: Q&A Session discussing all of the r ecent updates to the FISMA pubs, Ron Ross Author: NIST Computer Security

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 10

Now on to business.

Page 11: Top 10 Myths - NIST · 8/25/2014  · Forum - August 2014 - Top Ten Myths: Q&A Session discussing all of the r ecent updates to the FISMA pubs, Ron Ross Author: NIST Computer Security

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 11

Myth #1 FISMA focuses more on compliance

than effective security. X

Page 12: Top 10 Myths - NIST · 8/25/2014  · Forum - August 2014 - Top Ten Myths: Q&A Session discussing all of the r ecent updates to the FISMA pubs, Ron Ross Author: NIST Computer Security

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 12

Myth #2 Organizations have to implement all security controls in NIST SP 800-53. X

Page 13: Top 10 Myths - NIST · 8/25/2014  · Forum - August 2014 - Top Ten Myths: Q&A Session discussing all of the r ecent updates to the FISMA pubs, Ron Ross Author: NIST Computer Security

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 13

Myth #3 NIST does not prioritize the security

controls in SP 800-53. X

Page 14: Top 10 Myths - NIST · 8/25/2014  · Forum - August 2014 - Top Ten Myths: Q&A Session discussing all of the r ecent updates to the FISMA pubs, Ron Ross Author: NIST Computer Security

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 14

Myth #4 FISMA is just a paperwork exercise. X

Page 15: Top 10 Myths - NIST · 8/25/2014  · Forum - August 2014 - Top Ten Myths: Q&A Session discussing all of the r ecent updates to the FISMA pubs, Ron Ross Author: NIST Computer Security

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 15

Myth #5 The new Cybersecurity Framework is

going to replace the RMF. X

Page 16: Top 10 Myths - NIST · 8/25/2014  · Forum - August 2014 - Top Ten Myths: Q&A Session discussing all of the r ecent updates to the FISMA pubs, Ron Ross Author: NIST Computer Security

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 16

Myth #6 Organizations can obtain FISMA certifications for their products,

systems, and services. X

Page 17: Top 10 Myths - NIST · 8/25/2014  · Forum - August 2014 - Top Ten Myths: Q&A Session discussing all of the r ecent updates to the FISMA pubs, Ron Ross Author: NIST Computer Security

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 17

Myth #7 FISMA requires organizations to assess

every security control annually. X

Page 18: Top 10 Myths - NIST · 8/25/2014  · Forum - August 2014 - Top Ten Myths: Q&A Session discussing all of the r ecent updates to the FISMA pubs, Ron Ross Author: NIST Computer Security

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 18

Myth #8 The DHS Continuous Diagnostics and

Mitigation Program is intended to replace the current CM efforts. X

Page 19: Top 10 Myths - NIST · 8/25/2014  · Forum - August 2014 - Top Ten Myths: Q&A Session discussing all of the r ecent updates to the FISMA pubs, Ron Ross Author: NIST Computer Security

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 19

Myth #9 Hiring more people with hacking

skills is the best way to improve your cybersecurity work force. X

Page 20: Top 10 Myths - NIST · 8/25/2014  · Forum - August 2014 - Top Ten Myths: Q&A Session discussing all of the r ecent updates to the FISMA pubs, Ron Ross Author: NIST Computer Security

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 20

Myth #10 Mitigating vulnerabilities is the best

way to ensure that your critical systems are resilient. X

Page 21: Top 10 Myths - NIST · 8/25/2014  · Forum - August 2014 - Top Ten Myths: Q&A Session discussing all of the r ecent updates to the FISMA pubs, Ron Ross Author: NIST Computer Security

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 21

Page 22: Top 10 Myths - NIST · 8/25/2014  · Forum - August 2014 - Top Ten Myths: Q&A Session discussing all of the r ecent updates to the FISMA pubs, Ron Ross Author: NIST Computer Security

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 22

Contact Information 100 Bureau Drive Mailstop 8930

Gaithersburg, MD USA 20899-8930

Project Leader Administrative Support Dr. Ron Ross Peggy Himes (301) 975-5390 (301) 975-2489

[email protected] [email protected]

LinkedIn http://www.linkedin.com/in/ronrossnist

Senior Information Security Researchers and Technical Support Pat Toth Kelley Dempsey (301) 975-5140 (301) 975-2827 [email protected] [email protected]

Web: csrc.nist.gov Comments: [email protected]