A risk management reading list
This text is intended to be a caption for the above image.
The Federal Information Security Management Act of 2002 and the newer Federal Risk and Authorization Management Program provide detailed requirements regarding what agencies need to consider when assessing and managing security risks. The National Institute of Standards and Technology takes those requirements into account in developing its guidelines for agencies.
Main story: Cyber insecurity: Managing against the risks
FISMA sets various standards and guidance for agencies to use when assessing risks and establishing security controls, and agencies must comply with them annually. However, the law does not yet tell agencies that they must improve security, only that they must show that they have a process in place that will enable them to do so.
However, FISMA is credited with providing a good foundation for risk management in the federal government. Its requirement for continuous monitoring of security risks and controls is considered a fundamental shift in risk management because it moves reporting from periodic snapshots to a real-time process. NIST has a portfolio of documents that provide detailed guidance on risk management, including:
- SP 800-30 — Risk Management Guide for IT Systems
- SP 800-37 — Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach
- SP 800-39 — Managing Information Security Risk: Organization, Mission and Information System View
- SP 800-53 — Recommended Security Controls for Federal Information Systems and Organizations
- SP 800-53A — Guide for Assessing the Security Controls in Federal Information Systems and Organizations: Building Effective Security Assessment Plans
The big new idea in the latest set of documents is that agencies should look at risk management as an enterprisewide process and not something to be performed at the system level, said Ron Ross, a NIST fellow and leader of the agency’s FISMA Implementation Project.
“It applies to all three tiers in an organization — from where the assessment is done at the highest level, where the risk management strategy is produced [and] is pushed down through Tier 2, where assessments have an impact on mission and business operations, to the system security design at Tier 3,” he said.
NEXT STORY: DOD's Wennergren named 'chief change maker'