Tag Archives: nist sp 800-53

NIST SP 800-53, Revision 5 Security Controls for Information Systems and Organizations – 1 overview

NIST SP 800-53, Revision 5 Security Controls for Information Systems and Organizations – 1 overview

To download the slide go to:
https://securitycompliance.thinkific.com

NIST Special Publication 800-53, Revision 5
Security and Privacy Controls
Final Public Draft: October 2018
Final Publication: December 2018
Source: https://csrc.nist.gov/projects/risk-m…

NIST Special Publication 800-53A, Revision 5
Assessment Procedures for Security and Privacy Controls
Initial Public Draft: March 2019
Final Public Draft: June 2019
Final Publication: September 2019

There are 6 major objectives for this update—
-Making the security and privacy controls more outcome-based by changing the structure of the controls;

-Fully integrating the privacy controls into the security control catalog creating a consolidated and unified set of controls for information systems and organizations

-Separating the control selection process from the actual controls: systems engineers, software developers, enterprise architects; and mission/business owners

-Promoting integration with different risk management and cybersecurity approaches and lexicons, including the Cybersecurity Framework

-Clarifying the relationship between security and privacy to improve the selection of controls necessary to address the full scope of security and privacy risks

diarmfs cyber security

What is Risk Management Framework NIST 800 37

Risk Management is being aware of and taking actions to prepare for probable unfavorable outcomes.

Risk Management Framework is a process the implement risk management in an organization.

There are (6) steps to the RMF:
1. Categorize
2. Select
3. Implement
4. Assess
5. Authorize
6. Continuous Monitoring

More on the Risk Management Framework Steps here:

risk management framework steps

physical risk

physical risk

physical risk
physical risk – bollards used for physical security

The physical risk to an information system is perhaps the most important to consider.  You MUST limit physical access to a system or any technical or administrative controls you implement are meaningless because they can be bypassed easily.  With direct physical access ANYONE can boot a server into a Kali Linux Live CD/USB or do a Password Recovery on your Cisco Router PWNAGE!!!!  If you can physically touch a system, then you can own it.

Additionally, you should have a contingency plan for the most likely avenue of physical disaster to a system.  This limits the potential of intentional and unintentional harm to the system.

To limit the physical risk to an information system the NIST SP 800-53/DIARMF prescribes “Physical and Environmental Protection” Controls:

  • PE-1 Physical and Environmental Protection Policy and Procedures
  • PE-2 Physical Access Authorizations
  • PE-3 Physical Access Control
  • PE-4 Access Control for Transmission Medium
  • PE-5 Access Control for Output Devices
  • PE-6 Monitoring Physical Access
  • PE-7 Visitor Control
  • PE-8 Access Records
  • PE-9 Power Equipment and Power Cabling
  • PE-10 Emergency Shutoff
  • PE-11 Emergency Power
  • PE-12 Emergency Lighting
  • PE-13 Fire Protection
  • PE-14 Temperature and Humidity Controls
  • PE-15 Water Damage Protection
  • PE-16 Delivery and Removal
  • PE-17 Alternate Work Site
  • PE-18 Location of Information System Components
  • PE-19 Information Leakage