SECURITY CONTROL SELECTION PHASE 2

  • C&A analyst selects Recommended controls from NIST SP 800-53 base on the system categorization-Low, Moderate or High to develop the Security Control Baseline draft
  • C&A Analyst provides Draft of the Security Control Baseline to the information System Security Officer (ISSO) and the System Owner for review
  • ISSO and System Owner identify common controlHybrid controlsystem specific control and control Not applicable
  • The above process is called Tailoring of Security control baseline
  • Final Security Control Baseline is created after system owner and ISSO review and tailor the security control baseline
SECURITY CONTROL SELECTION PHASE 2 – SmartThink LLC

SECURITY CONTROL SELECTION PHASE 2

  • C&A analyst selects Recommended controls from NIST SP 800-53 base on the system categorization-Low, Moderate or High to develop the Security Control Baseline draft
  • C&A Analyst provides Draft of the Security Control Baseline to the information System Security Officer (ISSO) and the System Owner for review
  • ISSO and System Owner identify common controlHybrid controlsystem specific control and control Not applicable
  • The above process is called Tailoring of Security control baseline
  • Final Security Control Baseline is created after system owner and ISSO review and tailor the security control baseline
SECURITY CONTROL SELECTION PHASE 2 – SmartThink LLC

Security Control Selection Phase 2

  • Now that we have finished classifying the system, the next step is to selected NIST recommended security controls that apply to the system’s classification (HighModerate or Low).
  • NIST Publication
  • SANS Top20 critical Security Control-SANS controls are mapped to NIST controls http://www.sans.org/criticalsecuritycontrols
  • The security controls selected is termed System Security Control Baseline. This is usual in a form of a spread sheet.
  • The security controls (e.g., AC-2) prescribe specific security-related activities or actions to be carried out by organizations or by information systems.
  • The security control enhancements (e.g., AC-2 (7)) provides statements of security capability to: (i) add functionality/specificity to a control; and/or (ii) increase the strength of a control.