Policy 7230A - Department of Administration

Policy 7230A - Department of Administration Policy 7230A - Department of Administration

10.10.2014 Views

2. Assessment & Security Planning These Assessment and Planning Non-Mandatory Procedures support the Enterprise Security Policy (ITEC 7230 Rev 1). Mandatory Non-Mandatory Procedures Baselines Procedures Baselines 2. Assessment & Security Planning 2.1. Risk and Privacy Assessment 2.1.1. Perform Risk Assessment (7 sets) (3 sets) 2.1.2. Perform Privacy Assessment (7 sets) (3 sets) 2.2. Security Planning 2.2.1. Create a Security Plan (5 sets) (3 sets) 2.3. Maintain Records 2.1. Risk and Privacy Assessment The following are the Non-Mandatory Procedures that support the Risk and Privacy Assessment section of the Default Security Requirements: 2.1.1. Perform Risk Assessment Agencies should determine the amount and nature of risk to which a system is exposed to establish the amount of risk to be mitigated and to better define the appropriate security controls required to mitigate that risk: 2.1.1.1 System Characterization Collect and document the information that defines the system to ensure complete organizational awareness as to which system is the target of the assessment. 2.1.1.2 Threat and Vulnerability Identification Identify and document all potential sources of threat to which the system could be exposed and, for those threats, identify and document all potential vulnerabilities: • Use vulnerability sources such as the National Vulnerability Database. • Use outputs from System Security Tests (see section 6.1 of the Security Requirements Document). • Use deficiencies determined to exist through review of Security Requirements Checklists. 2.1.1.3 Control Analysis Identify and document all implemented controls that are intended to have a mitigating effect on threats and vulnerabilities: • Evaluate both Technical (access control systems, firewalls, etc.) and Non-Technical (policies and procedures) controls. • Evaluate both Detective (those that warn of violations) and Preventative (those that inhibit violations) controls. 2

2.1.1.4 Likelihood Determination Estimate the likelihood that a particular vulnerability will occur in the face of controls that may be in place to mitigate it: • For guidance on classification of likelihood, see section 2.1.1.a of the Non-Mandatory Baselines. 2.1.1.5 Impact Analysis Estimate the impact that a particular vulnerability will have if exercised in the face of controls that may be in place to mitigate it. • For guidance on classification of impact, see section 2.1.1.b of the Non-Mandatory Baselines. 2.1.1.6 Risk Determination Cross reference the determined likelihood with the determined impact to determine the overall risk of each vulnerability. Decide if the risk level is to be accepted and, if not, to what degree it is to be mitigated. • For guidance on classification of risk, see section 2.1.1.c of the Non-Mandatory Baselines. 2.1.1.7 Controls Recommendation Identify and evaluate additional controls that will reduce the identified risk to acceptable levels: • Evaluate both Technical (access control systems, firewalls, etc.) and Non-Technical (policies and procedures) controls. • Evaluate both Detective (those that warn of violations) and Preventative (those that inhibit violations) controls. • Perform a cost-benefit analysis for each control to narrow the selection of controls to those that mitigate risk cost effectively. 2.1.2. Perform Privacy Assessment No applicable Non-Mandatory Procedures. 2.2. Security Planning The following are the Non-Mandatory Procedures that support the Security Planning section of the Default Security Requirements: 2.2.1. Create a Security Plan Agencies should document the requirements and security controls that will be implemented to achieve the determined security stance of the agency as a result of risk and privacy assessment: 3

2.1.1.4 Likelihood Determination<br />

Estimate the likelihood that a particular vulnerability will occur in the<br />

face <strong>of</strong> controls that may be in place to mitigate it:<br />

• For guidance on classification <strong>of</strong> likelihood, see section 2.1.1.a<br />

<strong>of</strong> the Non-Mandatory Baselines.<br />

2.1.1.5 Impact Analysis<br />

Estimate the impact that a particular vulnerability will have if<br />

exercised in the face <strong>of</strong> controls that may be in place to mitigate it.<br />

• For guidance on classification <strong>of</strong> impact, see section 2.1.1.b <strong>of</strong><br />

the Non-Mandatory Baselines.<br />

2.1.1.6 Risk Determination<br />

Cross reference the determined likelihood with the determined<br />

impact to determine the overall risk <strong>of</strong> each vulnerability. Decide if<br />

the risk level is to be accepted and, if not, to what degree it is to be<br />

mitigated.<br />

• For guidance on classification <strong>of</strong> risk, see section 2.1.1.c <strong>of</strong> the<br />

Non-Mandatory Baselines.<br />

2.1.1.7 Controls Recommendation<br />

Identify and evaluate additional controls that will reduce the<br />

identified risk to acceptable levels:<br />

• Evaluate both Technical (access control systems, firewalls,<br />

etc.) and Non-Technical (policies and procedures) controls.<br />

• Evaluate both Detective (those that warn <strong>of</strong> violations) and<br />

Preventative (those that inhibit violations) controls.<br />

• Perform a cost-benefit analysis for each control to narrow the<br />

selection <strong>of</strong> controls to those that mitigate risk cost<br />

effectively.<br />

2.1.2. Perform Privacy Assessment<br />

No applicable Non-Mandatory Procedures.<br />

2.2. Security Planning<br />

The following are the Non-Mandatory Procedures that support the Security Planning<br />

section <strong>of</strong> the Default Security Requirements:<br />

2.2.1. Create a Security Plan<br />

Agencies should document the requirements and security controls that will be<br />

implemented to achieve the determined security stance <strong>of</strong> the agency as a<br />

result <strong>of</strong> risk and privacy assessment:<br />

3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!