You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -103,7 +112,8 @@ Who is allowed to access what?
103
112
Examples of who:
104
113
- a person
105
114
- a computer
106
-
- an identity delegated to person or computer
115
+
- an identity, role, or group
116
+
- could be delegated to person or computer
107
117
108
118
Access Control patterns
109
119
- Passwords
@@ -129,28 +139,37 @@ Access Control patterns
129
139
130
140
# Risk Management Framework
131
141
132
-
- Every system must be Assessed
133
-
- Every system must be Authorized
134
-
- Authority to Operate
135
-
- System is defined by a boundary and what is in it
136
-
- Information types
137
-
- Who can access
138
-
- What components
139
-
- Connections. In/out, relationships with other systems
140
-
- Sound familiar? This is restatement of the Systems Engineering Strategy: Data, Users, Software, Hardware, Network
141
-
- Controls - The safeguards or countermeasures prescribed for an information system or an organization to protect the confidentiality, integrity, and availability of the system and its information.
142
-
- 20 control families
143
-
- around 1200 unique controls
144
-
- Inheritance makes this manageable
145
-
- Control selection prioritizes which controls to implement
146
-
- Control assessment determines whether a control is implemented
147
-
- Risk Assessment
148
-
- Threat
149
-
- Impact
150
-
- Likelihood
151
-
- STIG = Secure Technical Implementation Guide
152
-
- Standardizes the questions to ask during Assessment
153
-
- Maps directly to the controls
142
+
Every system must be Assessed and Authorized. An Authority to Operate (ATO) specifies the controls that must be implemented.
143
+
144
+
System is defined by a boundary and what is in it.
145
+
146
+
- Information types
147
+
- Who can access
148
+
- What components
149
+
- Connections. In/out, relationships with other systems
150
+
151
+
Sound familiar? This is restatement of the Systems Engineering Strategy: understand Data, Users, Software, Hardware, Network
152
+
153
+
Controls are the safeguards or countermeasures prescribed for an information system or an organization to protect the confidentiality, integrity, and availability of the system and its information.
154
+
155
+
- 20 control families
156
+
- around 1200 unique controls
157
+
- Control selection prioritizes which controls to implement
158
+
- Control assessment determines whether a control is implemented
159
+
- Inheritance makes this manageable
160
+
- Informally, a control, simply asks a question.
161
+
162
+
Risk Assessment
163
+
164
+
- Threat
165
+
- Impact
166
+
- Likelihood
167
+
168
+
STIG
169
+
170
+
- Secure Technical Implementation Guides (STIG)
171
+
- Standardizes the questions to ask during Assessment
0 commit comments