• Skip to main content
  • Skip to primary sidebar

ConvoCourses

Cyber Security Compliance and IT Jobs

  • Cyber Security Training
  • about me.
  • Information Assurance Jobs

DIARMF Documentation & Implementation

DISA Draft Voice Video Session Management

August 11, 2015 by Bruce Brown Leave a Comment

Defense Information System Agency has developed the Draft for Voice Video Session Management Security Requirement Guidance Version 1.

 

The Draft SRG is available at
http://iase.disa.mil/stigs/net_perimeter/telecommunications/Pages/voip.aspx
for review and comment. Please provide comments, recommended changes, and/or
additions to the draft SRG by 12 August 2015 on the Comment Matrix
spreadsheet located at
http://iase.disa.mil/stigs/net_perimeter/telecommunications/Pages/voip.aspx.
Comments should be sent via NIPRNet email to:  disa.stig_spt@mail.mil.
Include the title and version of the SRG in the subject line of your email.

Filed Under: STIGS Tagged With: DIARMF Documentation & Implementation, implementation, STIG

DIARMF Implement

January 16, 2014 by Bruce Brown 2 Comments

DIARMF Implement

What you will learn:

  • Overview of Step 3, Implementation
  • Where to go for technical help on implementation

In Step 3 of the DIARMF, the organization implements the security controls specified in the security plan.  Implementation relies heavily on the Security Plan documented Step 2, Selecting the security controls.  

Who Does the DIARMF Implementation?

 

Although the primary responsibility of implementation is in the hands of the Information System Owner or Common Control Provider it is delegated to a system administrator, information system security officer and/or system engineer.

Whatever their title, the most important thing is that they know HOW to do it and perhaps have experience doing it.  The organization usually is bound by regulations to only select qualified technicians to do the work.  US Department of Defense (DoD) Directive 8570.1-M, Information Assurance Training, Certification, and Workforce Management, is the policy that the DoD uses to determine what is “qualified”.  This policy identifies specific certification & training that IT professionals need to be considered to do certain work.  

Realistically, a certification is a poor substitute for real world experience, but most seasoned employers that know about their companies needs recognize this.  

DIARMF-Implement1

How is DIARMF Implementation done and When?

The Managers (information assurance managers, systems/program managers) are the key to getting things done.  And for managers, the most important parts of implementation are planning and resources.  An organization needs these managed well to be successful.

Resources:  resources are qualified personal to do the work, funding to keep the work going, material/software/hardware to get the job done.  These resources need to be managed appropriately.  One of the hardest parts of a managers job is making sure there are enough resources to get the work done.  

Timeframe & Planning:  planning and planning of limited resources is a must!  Assuming there is a requirement for the work to be done, not much can be done efficiently without a plan.  Managers (information assurance managers, systems/program managers) main job is to get the most effective use out of resources provided.

Managers are the center piece to getting the job done.  Without good management, its very hard for the system administrators, information system security officers, technicians and engineers to do their jobs.  Because they must either take the time to manage themselves which takes away from doing the work by attending back to back meetings with higher ups, completed documentation that has nothing to do with the project and make critical decisions that are outside the scope of their job.  All of this puts them and the project itself at risk.

A good manager runs interference for his team, provides the team with all the tools they need to be successful and make realistic milestones that are tracked diligently from start to finish of the project.

A bad manager is self-serving, lazy and goes out of their way to sabotage the project by being an asshole.  They so mistrust by absorbing all the credit for good work and deflect all the blame for bad work.  They are mostly ignorant of what is going on.  They make everyones life harder by breathing.

DIARMF Documentation & Implementation

Its important to document what security controls are implemented.  This helps continuity especially since some security controls break functionality but also it helps with DIARMF Assessment since part of DIARMF Assessment.

DOD Resources for DIARMF Implementation

Where you will have to go for guidance on certain technical security controls are actual vendor documentation, online knowledge databases, technical manuals, and even actual support technicians on specific products if necessary.  Other places that are helpful are:

  • NSA.gov/ia
  • iase.disa.gov

Filed Under: diarmf - implement Tagged With: DIARMF, diarmf - implement, DIARMF Documentation & Implementation, diarmf implentation, implement, rmf

Primary Sidebar

search


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This book is an overview of how the NIST SP 800-37 risk management framework works from the perspective of an information system security officer (ISSO).

also available on Amazon!

View Book

NIST RMF 800-37 templates
Free 800-37 templates

The NIST 800 Template download contains a .doc file template and xls templates for POAMs, Federal, State, cloud based and a legacy template as well as resources where you can find more on NIST 800-37 documents for your use.

View Book

Learn to Make 6 Figures in CyberSecurity

RMF ISSO Foundations Training
RMF ISSO Foundations Training

RMF ISSO Foundations

I was an Information System Security Officer (ISSO) doing Risk Management Framework (NIST SP 800-37) for over a decade. I am a Cybersecurity veteran and I can explain (in plain English) what you DO in the Risk Management Framework process as an ISSO.

View Course

NIST SP 800-37 Presentation
NIST SP 800-37 Presentation

View Course

login

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Posts

  • Cybersecurity Jobs Resume Marketing: Book 1 Find Cybersecurity jobs
  • Security Control Assessor (SCA) Methods table top exercise
  • Cybersecurity Pro opinion about Tiktok
  • Las Vegas teleworking
  • STIGS in the RMF Process

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • http://Www.Finance.Ipt.Pw/ on SRG/STIG Applicability Guide and Collection Tool Update
  • Elsa7 on ConvoCourses podcast: Cyber Security day to day activity
  • Tony on STIG Update – DISA has released the Microsoft SQL Server 2016 STIG Version 1
  • horloge on SCAP Compliance Checker SCC)
  • 218 Information assurance Success Criteria – ITSECURITYSURVIVAL.COM on Information Assurance Vulnerability Alert

Tags

8140 8570 ArcSight c&a CISSP convocourses cyber cybersecurity cyber security DIACAP DIARMF diarmf - implement disa DISA STIG dodd 8140 dodd 8140 cyberspace workforce HBSS IA implement implementation info assurance information assurance information security ISSO it jobs it jobs in usa job jobs Linux mcafee network nist nist risk management framework nist risk management framework 800-37 podcast risk risk assessment risk management risk management framework rmf security STIG stigs unix windows


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book

Copyright © 2023 · Author Pro on Genesis Framework · WordPress · Log in