The ISSEP Certification is defined by (ISC)2 as the CISSP concentration area that is designed to denote competence and expertise in information security engineering.
To qualify for and obtain the ISSEP certification, the candidate must possess the CISSP credential, sit for and pass the ISSEP examination, and maintain the ISSEP credential in good standing.
The ISSEP examination is similar in format to that of the CISSP examination. The questions are multiple choice, with the examinee being asked to select the best answer of four possible answers. The examination comprises 150 questions, 25 of which are experimental questions that are not counted. The candidate is allotted three hours to complete the examination.
The ISSEP certification and examination cover the following four primary areas:
The key concepts that ISSEP candidates need to understand in the four domains are summarized and reviewed in this appendix.
The Systems Security Engineering domain of the ISSEP concentration is designed to enable the candidate to apply the processes defined in the IATF document, Release 3.1 for the protection of information systems. It also includes the fundamentals of the Systems Engineering and Systems Security Engineering processes.
As stated in the ISSEP Study Guide, the ISSEP candidate is expected to be able to do the following after completing this Appendix:
In addition, the candidate should understand the fundamental concepts of risk assessment and the system life cycle or, as it is sometimes called, the system development life cycle (SDLC). These areas are covered in NIST Special Publication 800-30, “Risk Management Guide for Information Technology Systems”; NIST Special Publication 800-14, “Generally Accepted Principles and Practices for Securing Information Technology Systems”; NIST Special Publication 800-27 Rev A, “Engineering Principles for Information Technology Security (A Baseline for Achieving Security,” and NIST Draft SP 800-26,Rev. 1, “Guide for Information Security Program Assessments and System Reporting Form” with NIST SP 800-53 “References and Associated Security Control Mappings.” NIST SP 800-26 provides an information system security assessment checklist.
The IATF document is a product of the Information Assurance Technical Framework Forum (IATFF). The IATFF, sponsored by the National Security Agency (NSA), encourages and supports technical interchanges on the topic of information assurance among U.S. industry, U.S. academic institutions, and U.S. government agencies. Information on the IATFF can be found at its Web site, www.iatf.net.
The IATF document 3.1 provides a technical process for developing systems with inherent information assurance, emphasizing the criticality of the people involved, the operations required, and the technology needed to meet the organization’s mission. It also defines the information security requirements of the system hardware and software. Applying the process of document 3.1 results in a layered protection scheme known as Defense in Depth for critical information system components.
Principles of Defense in Depth
The strategy of Defense in Depth is aimed at protecting U.S. federal and defense information systems and networks from the various types and classes of attacks. The technology focus areas of the Defense in Depth strategy are:
The second item in this list refers to an enclave. In DoD Directive 8500.1, “Information Assurance (IA),” October 24, 2002, an enclave is defined as a “collection of computing environments connected by one or more internal networks under the control of a single authority and security policy, including personnel and physical security. Enclaves always assume the highest mission assurance category and security classification of the Automated Information System (AIS) applications or outsourced IT-based processes they support, and derive their security needs from those systems. They provide standard IA capabilities such as boundary defense, incident detection and response, and key management, and also deliver common applications such as office automation and electronic mail. Enclaves are analogous to general support systems as defined in OMB A-130. Enclaves may be specific to an organization or a mission, and the computing environments may be organized by physical proximity or by function independent of location. Examples of enclaves include local area networks and the applications they host, backbone networks, and data processing centers.”
The Defense in Depth strategy promotes application of the following information assurance principles:
Types and Classes of Attack
IATF document 3.1 lists the following types of attacks:
These attacks and their characteristics, taken from IATF document 3.1, September 2002, are given in Table D-1.
ATTACK |
DESCRIPTION |
---|---|
Passive |
Passive attacks include traffic analysis, monitoring of unprotected communications, decrypting weakly encrypted traffic, and capture of authentication information (such as passwords). Passive intercept of network operations can give adversaries indications and warnings of impending actions. Passive attacks can result in disclosure of information or data files to an attacker without the consent or knowledge of the user. Examples include the disclosure of personal information such as credit card numbers and medical files. |
Active |
Active attacks include attempts to circumvent or break protection features, introduce malicious code, or steal or modify information. These attacks may be mounted against a network backbone, exploit information in transit, electronically penetrate an enclave, or attack an authorized remote user during an attempt to connect to an enclave. Active attacks can result in the disclosure or dissemination of data files, denial of service, or modification of data. |
Close-In |
Close-in attack consists of individuals attaining close physical proximity to networks, systems, or facilities for the purpose of modifying, gathering, or denying access to information. Close physical proximity is achieved through surreptitious entry, open access, or both. |
Insider |
Insider attacks can be malicious or nonmalicious. Malicious insiders intentionally eavesdrop, steal, or damage information; use information in a fraudulent manner; or deny access to other authorized users. Nonmalicious attacks typically result from carelessness, lack of knowledge, or intentional circumvention of security for such reasons as “getting the job done.” |
Distribution |
Distribution attacks focus on the malicious modification of hardware or software at the factory or during distribution. These attacks can introduce malicious code into a product, such as a back door to gain unauthorized access to information or a system function at a later date. |
The enclaves in the U.S. federal and defense computing environments can be categorized as:
The attacks categorized in Table D-1 are the types that can be perpetrated on the computing environment enclaves. The relationships of the classes of attacks to computing environment enclaves are depicted in Figure D-1.
Figure D-1: Relationships of the classes of attacks to computing environment enclaves (from IATF document, Release 3.1, September 2002).
The Defense in Depth Strategy
The Defense in Depth strategy is built upon three critical elements: people, technology, and operations.
People
To implement effective information assurance in an organization, there must be a high-level commitment from management to the process. This commitment is manifested through the following items and activities:
Technology
An organization has to ensure that the proper technologies are acquired and deployed to implement the required information protection services. These objectives are accomplished through processes and policies for the acquisition of technology. The processes and policies should include the following items:
Operations
Operations emphasize the activities and items that are necessary to maintain an organization’s effective security posture on a day-to-day basis. These activities and items include:
The Defense in Depth approach has become widely accepted and has been incorporated into a number of federal and DoD policies and guidelines. One example is the DoD Global Information Grid (GIG) Information Assurance Policy and Implementation Guidance (www.c3i.osd.mil/org/cio/doc/gigia061600.pdf). Figure D-2 illustrates the embodiment of the Defense in Depth strategy as shown in the GIG Policy and Implementation Guidance.
Figure D-2: Defense in Depth as applied in the GIG Information Assurance Policy and Implementation Guidance (from IATF document, Release 3.1, September 2002).
Sample U.S. Government User Environments
The target systems of a Defense in Depth strategy can be put in perspective by examining two U.S. government computing environments - the Department of Energy (DoE) and Department of Defense information systems.
The DOE interconnects its laboratories and other facilities through wide area networks (WANs), including the Energy Science Network (ESN). ESN supports classified and unclassified DoE networking for research and mission-critical applications. The DoE computing environment is shown in Figure D-3.
Figure D-3: The DoE computing environment (from IATF document, Release 3.1, September 2002).
The DoD Defense Information Infrastructure (DII) provides networking and information services to more than 2 million primary users and 2 million extension users. The DII enclaves typically comprise more than 20,000 local networks and 300,000 secure telephone users. The DII also includes worldwide networks such as the Joint Worldwide Intelligence Communications System (JWICS), the Secret Internet Protocol Router Network (SIPRNet), and the Non-secure Internet Protocol Router Network (NIPRNet). An example DII site is shown in Figure D-4.
Figure D-4: A typical DII site (from IATF document, Release 3.1, September 2002).
Information system security engineering should be conducted in parallel with and according to the proven principles of systems engineering (SE). Even though the terms ISSE and SE are commonly used, it is important to formally define these two concepts so that there is no misunderstanding of their meaning. In Chapter 3 of IATF document 3.1, ISSE is defined as:
The art and science of discovering users’ information protection needs and then designing and making information systems, with economy and elegance, so that they can safely resist the forces to which they may be subjected.
Systems engineering has been defined in numerous ways. Four such definitions are:
The Systems Engineering Process
This definition of the Systems Engineering process is taken from Chapter 3 of the IATF document 3.1. This generic SE process will be used as the basis for integration with the ISSE process and comprises the following components:
An important characteristic of this process is that it emphasizes the application of SE over the entire development life cycle. Figure D-5 illustrates the IATF generic SE process; the arrows show the information flow among activities in the process. The notation of USERS/USERS’ REPRESENTATIVES in the figure is included to emphasize the interaction among the users and the systems engineer throughout the SE process.
Figure D-5: The generic systems engineering process (from IATF document, Release 3.1, September 2002).
A good systems or information systems security engineer will always keep the problem to be solved in perspective. Some rules of thumb to remember are that the purpose of a project is to meet the customer’s needs in his or her environment, the problem and solution spaces should be kept separate, and the solution space must be determined by the problem space. This approach relates to the simple but elegant definitions of verification and validation stated by Barry Boehm. He offered that “verification is doing the job right and validation is doing the right job.”
The Information Systems Security Engineering Process
The ISSE process mirrors the generic SE process of IATF document 3.1. The ISSE process elements and the associated SE process elements, respectively, are:
Each of the six ISSE process activities will be reviewed in the following sections.
Discover Information Protection Needs
The information systems security engineer can obtain a portion of the information required for this activity from the SE process. The objectives of this activity are to understand and document the customer’s needs and to develop solutions that will meet these needs. This approach is illustrated in Figure D-6.
Figure D-6: Discover Information Protection Needs activity (from IATF document, Release 3.1, September 2002).
The information systems security engineer should use any reliable sources of information to learn about the customer’s mission and business operations, including areas such as human resources, finance, command and control, engineering, logistics, and research and development. This knowledge can be used to generate a concept of operations (CONOPS) document or a mission needs statement (MNS). Then, with this information in hand, an information management model (IMM) should be developed that ultimately defines a number of information domains. Information management is defined as:
The principle of least privilege should be used in developing the model by permitting users to access only the information required for them to accomplish their assigned tasks.
The IMM is illustrated in Figure D-7.
Figure D-7: Graphic of the information management model (from IATF document, Release 3.1, Appendix H, September 2002).
In the Discover Information Protection Needs activity of the ISSE process, the information systems security engineer must document all elements of the activity. These elements include:
These items form the basis of an Information Protection Policy (IPP), which in turn becomes a component of the customer’s Information Management Policy (IMP), as shown earlier in Figure D-6.
The information systems security engineer must also support the certification and accreditation (C&A) of the system. For example, the security engineer can identify the Designated Approving Authority (DAA) and the Certification Authority (CA). A detailed discussion of C&A is given in Chapter 11.
Define System Security Requirements
In this ISSE activity, the information systems security engineer identifies one or more solution sets that can satisfy the information protection needs of the IPP. This subprocess is illustrated in Figure D-8.
Figure D-8: Mapping of solution sets to information protection needs.
In selecting a solution set, the information systems security engineer must also consider the needs of external systems such as Public Key Infrastructure (PKI) or other cryptographic-related systems, as shown in Figure D-9.
Figure D-9: Mapping of needs to solution set components.
A solution set consists of a preliminary security CONOPS, the system context, and the system requirements. In close cooperation with the customer and based on the IPP, the information systems security engineer selects the best solution among the solution sets. The information protection functions and the information management functions are delineated in the preliminary security CONOPS, and the dependencies among the organization’s mission and the services provided by other entities are identified. In developing the system context, the information systems security engineer uses systems engineering techniques to identify the boundaries of the system to be protected and allocates security functions to this system as well as to external systems. The information systems security engineer accomplishes this allocation by analyzing the flow of data among the system to be protected and the external systems and by using the information compiled in the IPP and IMM.
The third component of the solution set - the system security requirements - is generated by the information systems security engineer in collaboration with the systems engineers. Requirements should be unambiguous, comprehensive, and concise, and they should be obtained through the process of requirements analysis. The functional requirements and constraints on the design of the information security components include regulations, the operating environment, targeting internal as well as external threats, and customer needs.
At the end of this process, the information systems security engineer reviews the security CONOPS, the security context, and the system security requirements with the customer to ensure that they meet the needs of the customer and are accepted by the customer. As with all activities in the ISSE process, documentation is very important and should be generated in accordance with the C&A requirements.
Design System Security Architecture
The requirements generated in the Define System Security Requirements activity of the ISSE process are necessarily stated in functional terms - indicating what is needed but not how to accomplish what is needed. In Design System Security Architecture, the information systems security engineer performs a functional decomposition of the requirements that can be used to select the components required to implement the designated functions. Some aids that are used to implement the functional decomposition are timeline analyses, flow block diagrams, and a requirements allocation sheet. The result of the functional decomposition is the functional architecture of the information security systems, shown schematically in Figure D-10.
Figure D-10: Design system security architecture.
In the decomposition process, the performance requirements at the higher level are mapped onto the lower-level functions to ensure that the resulting system performs as required. Also as part of this activity, the information systems security engineer determines, at a functional level, the security services that should be assigned to the system to be protected as well as to external systems. Such services include encryption, key management, and digital signatures. Because implementations are not specified in this activity, a complete risk analysis is not possible. General risk analysis, however, can be done by estimating the vulnerabilities in the classes of components that are likely to be used.
As always, documentation in accordance with requirements of the C&A process should be performed.
Develop Detailed Security Design
The information protection design is achieved through continuous assessments of risks and the comparison of these risks with the information system security requirements by the ISSE personnel. The design activity is iterative, and it involves both the SE and ISSE professionals. The design documentation should meet the requirements of the C&A process. It should be noted that this activity specifies the system and components but does not specify products or vendors.
The tasks performed by the information systems security engineer include:
Implement System Security
This activity moves the system from the design phase to the operational phase. The steps in this process are shown in Figure D-11.
Figure D-11: The path from design to operations in the Implement System Security activity.
The Implement System Security activity concludes with a system effectiveness assessment that produces evidence that the system meets the requirements and needs of the mission. Security accreditation usually follows this assessment.
The assessment is accomplished through the following actions of the information systems security engineer:
An important part of the Implement System Security activity is the determination of the specific components of the information system security solution. Some of the factors that have to be considered in selecting the components include:
Assess Information Protection Effectiveness
In order to assess the effectiveness of the information protection mechanisms and services effectively, this activity must be conducted as part of all the activities of the complete ISSE and SE process. Table D-2, with information taken from the IATF document, Release 3.1, September 2002, lists the tasks of the Assess Information Protection activity that correspond to the other activities of the ISSE process.
ISSE ACTIVITYP |
ASSESS INFORMATION ROTECTION EFFECTIVENESS TASKS |
---|---|
Discover Information Protection Needs |
Present the process overview. |
Summarize the information model. |
|
Describe threats to the mission or business through information attacks. |
|
Establish security services to counter those threats and identify their relative importance to the customer. |
|
Obtain customer agreement on the conclusions of this activity as a basis for determining the system security effectiveness. |
|
Define System Security Requirements |
Ensure that the selected solution set meets the mission or business security needs. |
Coordinate the system boundaries. |
|
Present security context, security CONOPS, and system security requirements to the customer and gain customer concurrence. |
|
Ensure that the projected security risks are acceptable to the customer. |
|
Design System Security Architecture |
Begin the formal risk analysis process to ensure that the selected security mechanisms provide the required security services and explain to the customer how the security architecture meets the security requirements. |
Develop Detailed Security Design |
Review how well the selected security services and mechanisms counter the threats by performing an interdependency analysis to compare desired to effective security service strengths. |
Once completed, the risk assessment results, particularly any mitigation needs and residual risk, will be documented and shared with the customer to obtain the customer’s concurrence. |
|
Implement System Security |
The risk analysis will be conducted/updated. |
Strategies will be developed for the mitigation of identified risks. |
|
Identify possible mission impacts and advise the customer and the customer’s Certifiers and Accreditors. |
As discussed in the descriptions of the SE and ISSE processes, there is a one-to-correspondence of activities in the ISSE process to those in the SE process. Table D-3, taken from IATF document, Release 3.1, September 2002, summarizes those activities in the ISSE process that correspond to activities in the SE process.
SE ACTIVITIES |
ISSE ACTIVITIES |
---|---|
Discover Needs |
Discover Information Protection Needs |
The systems engineer helps the customer understand and document the information management needs that support the business or mission. Statements about information needs may be captured in an information management model (IMM). |
The information systems security engineer helps the customer understand the information protection needs that support the mission or business. Statements about information protection needs may be captured in an Information Protection Policy (IPP). |
Define System Requirements |
Define System Security Requirements |
The systems engineer allocates identified needs to systems. A system context is developed to identify the system environment and to show the allocation of system functions to that environment. A preliminary system concept of operations (CONOPS) is written to describe operational aspects of the candidate system (or systems). Baseline requirements are established. |
The information systems security engineer allocates information protection needs to systems. A system security context, a preliminary system security CONOPS, and baseline security requirements are developed. |
Design System Architecture |
Design System Security Architecture |
The systems engineer performs functional analysis and allocation by analyzing candidate architectures, allocating requirements, and selecting mechanisms. The systems engineer identifies components, or elements, allocates functions to those elements, and describes the relationships between the elements. |
The information systems security engineer works with the systems engineer in the areas of functional analysis and allocation by analyzing candidate architectures, allocating security services, and selecting security mechanisms. The information systems security engineer identifies components, or elements, allocates security functions to those elements, and describes the relationships between the elements. |
Develop Detailed Design |
Develop Detailed Security Design |
The systems engineer analyzes design constraints, analyzes trade-offs, does detailed system design, and considers life cycle support. The systems engineer traces all the system requirements to the elements until all are addressed. The final detailed design results in component and interface specifications that provide sufficient information for acquisition when the system is implemented. |
The information systems security engineer analyzes design constraints, analyzes trade-offs, does detailed system and security design, and considers life cycle support. The information systems security engineer traces all the system security requirements to the elements until all are addressed. The final detailed security design results in component and interface specifications that provide sufficient information for acquisition when the system is implemented. |
Implement System |
Implement System Security |
The systems engineer moves the system from specifications to the tangible. The main activities are acquisition, integration, configuration, testing, documentation, and training. Components are tested and evaluated to ensure that they meet the specifications. After successful testing, the individual components - hardware, software, and firmware - are integrated, properly configured, and tested as a system. |
The information systems security engineer participates in a multidisciplinary examination of all system issues and provides inputs to C&A process activities, such as verification that the system as implemented protects against the threats identified in the original threat assessment; tracking of information protection assurance mechanisms related to system implementation and testing practices; and providing inputs to system life cycle support plans, operational procedures, and maintenance training materials. |
Assess Effectiveness |
Assess Information Protection Effectiveness |
The results of each activity are evaluated to ensure that the system will meet the users’ needs by performing the required functions to the required quality standard in the intended environment. The systems engineer examines how well the system meets the needs of the mission. |
The information systems security engineer focuses on the effectiveness of the information protection - whether the system can provide the confidentiality, integrity, availability, authentication, and nonrepudiation for the information it is processing that is required for mission success. |
The ISSE process provides input to the C&A process in the form of evidence and documentation. Thus, the information systems security engineer has to consider the requirements of the accrediting authority. The Certification and Accreditation Process certifies that the information system meets the defined system security requirements and the system assurance requirements. It is not a design process. Details of Certification and Accreditation are presented in Chapter 11 of this text. The SE/ISSE process also benefits by receiving information back from the C&A process that may result in modifications to the SE/ISSE process activities. Figure D-12 illustrates the relationship of the SE/ISSE process to the C&A process.
Figure D-12: Relationship of the SE/ISSE process to the C&A process (from IATF document, Release 3.1, September 2002).
In summary, the outputs of the SE/ISSE process are the implementation of the system and the corresponding system documentation. The outputs of the C&A process are Certification documentation, Certification recommendations, and an Accreditation decision.
Another means of specifying information system assurance requirements are through Common Criteria protection profiles. Protection profiles, which are independent of implementation, comprise:
Many protection profiles are available on the IATF Web site at www.iatf.net/protection_profiles/. Protection profiles that are provided include:
The documents providing the basis for material in this section are NIST SP 800-14, “Generally Accepted Principles and Practices for Securing Information Technology Systems” September 1996; NIST SP 800-27, “Engineering Principles for Information Technology Security (A Baseline for Achieving Security),” June 2001; and NIST SP 800-64, “Security Considerations in the Information System Development Life Cycle,” September-October 2003. In some publications, the System Life Cycle is also referred to as the System Development Life Cycle (SDLC).
The document SP 800-14 defines eight system security principles and 14 practices. SP 800-27 develops another set of 33 engineering principles for information technology security (EP-ITS) that provide a system-level perspective of information system security. These 33 principles incorporate the concepts developed in the eight principles and 14 practices detailed in SP 800-14. With this foundation, the five system life cycle phases are then defined, and each of the 33 EP-ITS principles are mapped onto the life cycle phases as applicable. These principles and practices are also presented in NIST SP 800-14 in a checklist form that can be used by federal agencies for self-evaluation. NIST SP 800-64 details a framework for incorporating information systems security into all the phases of the SDLC activity, using cost-effective control measures.
NIST SP 800-14 defines the system life cycle phases as follows:
The EP-ITS principles can be applied during each phase of the system life cycle. Some principles are critical to certain phases, whereas others can be considered optional or not necessary. SP 800-64 complements SP 800-14 and 800-27 and expands on the SDLC concepts presented in these two publications.
The following list summarizes the information system security steps to be applied to the SDLC as described in SP 800-64.
After discussing these phases and the information security steps in detail, the guide provides specifications, tasks, and clauses that can be used in an RFP to acquire information security features, procedures, and assurances.
The ISSEP candidate should also understand the relationship between the SDLC phases and the acquisition process for the corresponding information system. This relationship is illustrated in Table D-4, also taken from NIST SP 800-64.
ACQUISITION CYCLE PHASES |
||||
---|---|---|---|---|
Mission and Business Planning |
Acquisition Planning |
Acquisition |
Contract Performance |
Disposal and Contract Close- Out |
SDLC PHASES |
||||
Initiation |
Acquisition/ Development |
Implementation |
Operation/ Maintenance |
Disposition |
NIST SP 800-64 also defines the following acquisition-related terms:
An additional, valuable tool in the acquisition process is the spiral model of the acquisition management process. This approach is known as an evolutionary acquisition strategy. This model depicts the acquisition management process as a set of phases and decision points in a circular representation. The model illustrates the concept that a mission need is defined and translated into a solution that undergoes a continuous circle of improvement and evolution until it is no longer required.
NIST SP 800-64 also lists the key personnel associated with system acquisition and development as follows:
The risk management process minimizes the impact of threats realized and provides a foundation for effective management decision making. Thus, it is very important that risk management be a part of the system development life cycle. As defined in NIST SP 800-30, risk management comprises three processes:
These processes should be performed during each of the five phases of the SDLC. Table D-5, taken from NIST SP 800-30, details the risk management activities that should be performed for each SDLC phase.
SDLC |
PHASE |
RISK MANAGEMENT ACTIVITIES |
---|---|---|
Phase 1 - Initiation |
The need for an IT system is expressed and the purpose and scope of the IT system are documented. |
Identified risks are used to support the development of the system requirements, including security requirements, and a security concept of operations (strategy). |
Phase 2 - Development or Acquisition |
The IT system is designed, purchased, programmed, developed, or otherwise constructed. |
The risks identified during this phase can be used to support the security analyses of the IT system, which may lead to architecture and design trade-offs during system development. |
Phase 3 - Implementation |
The system security features should be configured, enabled, tested, and verified. |
The risk management process supports the assessment of the system implementation against its requirements and within its modeled operational environment. Decisions regarding risks identified must be made prior to system operation. |
Phase 4 - Operation or Maintenance |
The system performs its functions. Typically the system is being modified on an ongoing basis through the addition of hardware and software and by changes to organizational processes, policies, and procedures. |
Risk management activities are performed for periodic system reauthorization (or reaccreditation) or whenever major changes are made to an IT system in its operational, production environment (e.g., new system interfaces). |
Phase 5 - Disposal |
This phase may involve the disposition of information, hardware, and software. Activities may include moving, archiving, discarding, or destroying information and sanitizing the hardware and software. |
Risk management activities are performed for system components that will be disposed of or replaced to ensure that the hardware and software are properly disposed of, that residual data is appropriately handled, and that system migration is conducted in a secure and systematic manner. |
To be effective, risk management must be supported by management and information system security practitioners. Some of the key personnel that should actively participate in the risk management activities are:
As defined in NIST SP 800-30, “Risk is a function of the likelihood of a given threat-source’s exercising a particular potential vulnerability, and the resulting impact of that adverse event on the organization.” Risk assessment comprises the following steps:
Each of these steps will be summarized in the following sections.
System Characterization
This step characterizes and defines the scope of the risk assessment process. During this step, information about the system has to be gathered. This information includes:
This information can be gathered using questionnaires, on-site interviews, review of documents, and automated scanning tools. The outputs from this step are:
Threat Identification
This step identifies potential threat-sources and compiles a statement of the threat-sources that relate to the IT system under evaluation. A threat is defined in NIST SP 800-30 as “the potential for a threat-source to exercise (accidentally trigger or intentionally exploit) a specific vulnerability.” A threat-source is defined in the same document as “either (1) intent and method targeted at the intentional exploitation of a vulnerability or (2) a situation and method that may accidentally trigger a vulnerability.” Common threat-sources include natural threats such as storms and floods, human threats such as malicious attacks and unintentional acts, and environmental threats such as power failure and liquid leakage. A vulnerability is defined as “a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach or a violation of the system’s security policy.”
Sources of threat information include the Federal Computer Incident Response Center (FedCIRC), intelligence agencies, mass media, and Web-based resources. The output from this step is a statement that provides a list of threat-sources that could exploit the system’s vulnerabilities.
Vulnerability Identification
This activity results in a list of system vulnerabilities that might be exploited by potential threat-sources. Vulnerabilities can be identified through vulnerability analyses, including information from previous information assessments; audit reports; the NIST vulnerability database (http://icat.nist.gov/icat.cfm); FedCIRC and DOE security bulletins; vendor data; commercial computer incident response teams; and system software security analyses. Testing of the IT system will also yield important results. This testing can be accomplished using penetration testing techniques, automated vulnerability scanning tools, and security test and evaluation (ST&E) procedures.
This phase also involves determining whether the security requirements identified during system characterization are being met. Usually, the security requirements are listed in a table with a corresponding statement about how the requirement is or is not being met. The checklist addresses management, operational, and technical information system security areas. The result of this effort is a security requirements checklist. Some useful references for this activity are the Computer Security Act of 1987, the Privacy Act of 1974, the organization’s security policies, industry best practices, and NIST SP 800-26, “Security Self-Assessment Guide for Information Technology Systems.”
The output from this step is a list of system vulnerabilities/observations that could be exploited by the potential threat-sources.
Control Analysis
The control analysis step analyzes the controls that are in place or in the planning stage to minimize or eliminate the probability that a threat will exploit vulnerability in the system.
Controls can be implemented through technical means such as computer hardware or software, encryption, intrusion detection mechanisms, and identification and authentication subsystems. Other controls such as security policies, administrative actions, physical and environmental mechanisms are considered nontechnical controls. Both technical and nontechnical controls can further be classified as preventive or detective controls. As the names imply, preventive controls attempt to anticipate and stop attacks. Examples of preventive, technical controls are encryption and authentication devices. Detective controls are used to discover attacks or events through such means as audit trails and intrusion detection systems.
Changes in the control mechanisms should be reflected in the security requirement checklist.
The output of this step is a list of current and planned control mechanisms for the IT system to reduce the likelihood that a vulnerability will be exercised and to reduce the impact of an attack or event.
Likelihood Determination
This activity develops a rating that provides an indication of the probability that a potential vulnerability might be exploited based on the defined threat environment. This rating takes into account the type of vulnerability, the capability and motivation of the threat-source, and the existence and effectiveness of information system security controls. The likelihood levels are given as high, medium, and low, as illustrated in Table D-6.
LEVEL OF LIKELIHOOD |
DEFINITION OF LIKELIHOOD |
---|---|
High |
A highly motivated and capable threat source and ineffective controls to prevent exploitation of the associated vulnerability |
Medium |
A highly motivated and capable threat source and controls that might impede exploitation of the associated vulnerability |
Low |
Lack of motivation or capability in the threat source or controls in place to prevent or significantly impede the exploitation of the associated vulnerability |
The output of this step is a likelihood rating of high, medium, or low.
Impact Analysis
If a threat does exploit a vulnerability in an IT system, it is critical to know the negative impact that would result to the system. Three important factors should be considered in calculating the negative impact:
The information necessary to conduct an impact analysis can be obtained from existing organizational documentation, including a business impact analysis (BIA), or mission impact analysis report as it is sometimes called. This document uses either quantitative or qualitative means to determine the impacts caused by compromise or harm to the organization’s information assets. An attack or adverse event can result in compromise or loss of information system confidentiality, integrity, and availability. As with the likelihood determination, the impact on the system can be qualitatively assessed as high, medium, or low, as shown in Table D-7.
IMPACT MAGNITUDE |
DEFINITION OF IMPACT |
---|---|
High |
May cause costly loss of major tangible assets or resources; might cause significant harm or impedance to the mission of an organization; might cause significant harm to an organization’s reputation or interest; might result in human death or injury |
Medium |
May cause costly loss of tangible assets or resources; might cause harm or impedance to the mission of an organization; might cause harm to an organization’s reputation or interest; might result in human injury |
Low |
May cause loss of some tangible assets or resources; might affect noticeably an organization’s mission; might affect noticeably an organization’s reputation or interest |
Qualitative analysis is more easily accomplished and provides identifiable areas for immediate improvement. However, it does not provide specific measures of magnitudes of measures, and thus it makes a cost-benefit analysis difficult. Quantitative analysis does provide magnitudes of measurements but may take more time. It is sometimes very difficult or impossible to place quantitative values on abstract items such as reputation.
Other items that should be included in the impact analysis are the estimated frequency of the threat-source’s exploitation of a vulnerability on annual basis, the approximate cost of each of these occurrences, and a weight factor based on the relative impact of a specific threat exploiting a specific vulnerability.
The output of this step is the magnitude of impact: high, medium, or low.
Risk Determination
This step, the seventh step in the risk assessment process, determines the level of risk to the IT system. The risk is assigned for a threat/vulnerability pair and is a function of the following characteristics:
Mission risk is calculated by multiplying the threat likelihood ratings (the probability that a threat will occur) by the impact of the threat realized. A useful tool for estimating risk in this manner is the risk-level matrix. An example risk-level matrix is shown in Table D-8. In the table, a high likelihood that the threat will occur is given a value of 1.0; a medium likelihood is assigned a value of 0.5; and a low likelihood of occurrence is given a rating of 0.1. Similarly, a high impact level is assigned a value of 100, a medium impact level 50, and a low impact level 10.
LIKELIHOOD OF THREAT |
LOW IMPACT (10) |
MEDIUM IMPACT (50) |
HIGH IMPACT (100) |
---|---|---|---|
High (1.0) |
Low 10 × 1.0 =10 |
Medium 50 × 1.0 = 50 |
High 100 × 1.0 = 100 |
Medium (0.5) |
Low 10 × 0.5 =5 |
Medium 50 × 0.5 = 25 |
High 100 × 0.5 = 50 |
Low (0.1) |
Low 10 × 0.1 =1 |
Medium 50 × 0.1 = 5 |
High 100 × 0.1 = 10 |
Using the risk level as a basis, the next step is to determine the actions that senior management and other responsible individuals must take to mitigate estimated risk. General guidelines for each level of risk are:
The output of the risk determination step is risk level of high, medium, or low.
Control Recommendations
With the risks identified and general guidelines provided for risk mitigation in the previous step, this step specifies the controls to be applied for risk mitigation. In order to specify appropriate controls, issues such as cost/benefit, operational impact, and feasibility have to be considered. In addition, other factors, including applicable legislative regulations, organizational policy, safety, reliability, and the overall effectiveness of the recommended controls should be taken into account.
The output of this step is a recommendation of controls and any alternative solutions to mitigate risk.
Results Documentation
The last step in the risk assessment process is the development of a risk assessment report.
The risk assessment report describes threats and vulnerabilities, risk measurements, and recommendations for implementation of controls. This report is directed at management and should contain information to support appropriate decisions on budget, policies, procedures, management, and operational issues.
Risk mitigation prioritizes, evaluates, and implements the controls that are an output of the risk assessment process. Risk mitigation is the second component of the risk management process.
Because risk can never be completely eliminated and control implementation must make sense under a cost-benefit analysis, a least-cost approach with minimal adverse impact on the IT system is usually taken.
Risk Mitigation Options
Risk mitigation can be classified into the following options:
SP 800-30 emphasizes the following guidance on implementing controls:
Address the greatest risks and strive for sufficient risk mitigation at the lowest cost, with minimal impact on other mission capabilities.
The control implementation approach from the risk mitigation methodology recommended by SP 800-30 is given in Figure D-13.
Figure D-13: A control implementation approach (from NIST SP 800-30).
Categories of Controls
Controls to mitigate risks can be broken into the following categories:
Each of the categories of controls can be further decomposed into additional subcategories. Technical controls can be subdivided into:
Management controls comprise:
Operational security controls are divided into preventive and detection types. Their functions are listed as follows:
Determination of Residual Risk
The risk that remains after the implementation of controls is called the residual risk. All systems will have residual risk, because it is virtually impossible to completely eliminate risk to an IT system. An organization’s senior management or the DAA is responsible for authorizing/accrediting the IT system to begin or continue to operate. The authorization/accreditation must take place every three years in federal agencies or whenever major changes are made to the system. The DAA signs a statement accepting the residual risk when accrediting the IT system for operation. If the DAA determines that the residual risk is at an unacceptable level, the risk management cycle must be redone with the objective of lowering the residual risk to an acceptable level.
Figure D-14 shows the relationship between residual risk and the implementation of controls.
Figure D-14: The relationship between residual risk and implementation of controls (from NIST SP 800-30).
As stated in SP 800-30, “A successful risk management program will rely on (1) senior management’s commitment; (2) the full support and participation of the IT; (3) the competence of the risk assessment team, which must have the expertise to apply the risk assessment methodology to a specific site and system, identify mission risks, and provide cost-effective safeguards that meet the needs of the organization; (4) the awareness and cooperation of members of the user community, who must follow procedures and comply with the implemented controls to safeguard the mission of their organization; and (5) an ongoing evaluation and assessment of the IT-related mission risks.”
To meet the challenges of successful security project management, a combination of technical and management skills are required. Understanding just the technical process is not enough; the proper program management environment must also be created. Many mature methods and tools are used to ensure successful project management, and each should be implemented as early in the SDLC as possible. This chapter will examine the processes and tools the program manager uses, as well as the responsibilities of the program manager to satisfy the needs of the project.
The Software CMM is covered in Chapter 7 of this text, and the System Security Engineering CMM (SSE-CMM) is covered in Chapter 5.
The program manager is the lead for all activities involving cost, schedule, and performance responsibilities. For example, the program manager’s function in the Certification and Accreditation is to ensure that security requirements are integrated into the IT architecture in a way that will result in an acceptable level of risk to the operational infrastructure. The PM works directly with the development integration, maintenance, configuration management, quality assurance, test verification, and validation organizations.
Usually there is one overall planning document for every program or project, which covers all requirements at a high level and leads to a variety of lower-level plans that address specific areas of activity. Although the specific nomenclature may vary from one program to the next, the title Program Management Plan (PMP) is most often selected to represent this high-level plan. Two major components of the PMP are the Systems Engineering Management Plan (SEMP) and the Work Breakdown Structure (WBS).
All of the key participants in the system development process must know not only their own responsibilities but also how to interface with one another. This interaction of responsibilities and authority within the project must be defined and controlled, and it is accomplished through the preparation and dissemination of a System Engineering Management Plan (SEMP). An important function of the SEMP is to ensure that all of the participants know their responsibilities to one another.
The SEMP also serves as a reference for the procedures that are to be followed in carrying out the numerous systems security engineering tasks. Often the contractor is required to prepare a SEMP as part of the concept definition effort. The place of the SEMP in the program management plan is shown in Figure D-15.
Figure D-15: Placement of the SEMP in the program management plan. Source: Systems Engineering: Principles and Practice, A. Kossiakoff and W. N. Sweet (Wiley Publishing, Inc., 2003). Used by permission.
The SEMP is intended to be a dynamic document. It starts as an outline and is updated as the security system development process goes on. The SEMP covers all management functions associated with the performance of security systems engineering activities for a given program. The responsibility for the SEMP must be clearly defined and supported by the program manager.
SEMP Elements
The SEMP contains detailed statements of how the systems security engineering functions are to be carried out during development. Two major elements of the SEMP are:
Development Program Planning and Control
The development program planning and control section describes the tasks that must be implemented to manage the development phase of the security program, including:
Security Systems Engineering Process
The security systems engineering process section describes the security systems engineering process as it applies to the development of the system, including:
Statement of Work (SOW)
The Statement of Work (SOW) is a narrative description of the work required for a given project. It is commonly described in the PMP and should include the following:
After the generation of the SOW and the identification of the organizational structure, one of the initial steps in program planning is the development of the Work Breakdown Structure (WBS). The WBS is a tree that leads to the identification of the activities, functions, tasks, and subtasks that must be completed.
The WSB is an important technique to ensure that all essential tasks are properly defined, assigned, scheduled, and controlled. It contains a hierarchical structure of the tasks to be accomplished during the project. The WBS may be a contractual requirement in competitive bid system developments.
The WSB structure generally includes three levels of activity:
The WBS provides many benefits, such as:
WBS Components
The use of the WBS as a project-organizing framework generally begins in the concept exploration phase. Later, in the concept definition phase, the WBS is defined in detail as the basis for organizing, costing, and scheduling. The WBS format follows a hierarchical structure designed to ensure a slot for every significant task and activity.
In the following example, the entire security system project is at Level 1 in the hierarchy, and the five components represent the Level 2 categories:
Each of the Level 2 categories will have deeper, associated Level 3, Level 4, and possibly Level 5 categories as each component is further broken down. These lower level categories represent the breakdown of each component into definable products of development, the lowest level defining each step of the component’s design, development, and testing. This is vital for establishing cost allocation and controls. The WBS should be structured so that every task is identified at the appropriate place within the WBS hierarchy.
Cost Control and Estimating
Cost control starts with the initial development of cost estimates for the program and continues with the functions of cost monitoring, the collection of cost data, the analysis of the data, and the immediate initiation of corrective action. Cost control requires good overall cost management, including:
The cost control process is typically performed in this order:
CRITICAL PATH METHOD (CPM)
Critical path analysis is an essential project management tool that traces each major element of the system back through the engineering of its constituent parts. Estimates are made up not only of the size, but also of the duration of effort required for each step. The particular path that is estimated to require the longest time to complete is called the critical path. The differences between this time and the times required for other paths are called “slack” for those paths.
The term outsourcing refers to the identification of, selection of, and contracting with one or more outside suppliers for the procurement and acquisition of materials and services for a given system. The term suppliers is defined here as a broad class of external organizations that provide products, components, materials, and/or services to a producer or prime contractor.
The prime activities of the outsourcing process are:
An important step in the security systems development process is the development of a well-designed test plan for determining whether the security system design is stable. A well-planned test program often requires the following five steps:
Test and Evaluation Master Plan (TEMP)
The methods and techniques to be used for measuring and evaluating the system to ensure compliance with security system design requirements must be described early in the SDLC. Individual tests to be performed at each level of the WBS are defined in a series of separate test plans and procedures.
TEST ANALYSIS PLANNING
The planning of how the test results are to be analyzed is just as important as planning how the tests are to be conducted. The following steps should be taken:
An overall description of test objectives and content and a listing of the individual test to be performed should also be set forth in an integrated test planning and management document, the Test and Evaluation Management Plan (TEMP). The TEMP is developed during the later stages of system design. In DoD parlance, this is parallel to the Security Test and Evaluation (ST&E) plan.
Initial test planning is included in the TEMP, which commonly consists of:
Other methods used to determine compliance with the initial specification of security system design requirements may entail using simulations and related analytical methods, using an engineering model for test and evaluation purposes, testing a production model, evaluating an operational configuration in the consumer’s environment, or some combination of these methods.
In the Defense sector, a TEMP is required for most large programs and includes the planning and implementation of procedures for the Development Test and Evaluation (DT&E) and the Operational Test and Evaluation (OT&E). The DT&E basically equates to the Analytical, Type 1, and Type 2 testing (see the next section, “Testing and Evaluation Categories”), and the OT&E is equivalent to Type 3 and Type 4 testing.
Testing and Evaluation Categories
Testing and evaluation processes often involve several stages of testing categories or phases, such as:
Figure D-16 shows a common security system test and evaluation corrective-action loop.
Figure D-16: Security system test and evaluation corrective-action loop. Source: Systems Engineering Management, Third Edition, B. Blanchard (Wiley Publishing, Inc., 2004). Used by permission.
Technical Performance Measurement (TPM)
As the security system development effort progresses, periodic reviews will need to be conducted. Within the systems specification should be the identification and prioritization of Technical Performance Measurements (TPMs). Checklists may be utilized to aid in the evaluation process, identifying those characteristics that have been incorporated into and directly support the TPM objectives. Design parameters and the applicable TPMs will be measured and tracked.
TESTING RESOURCE TRADE-OFFS
Although the ideal testing configuration would be a replica of the entire system and its environment, such a configuration would be too costly in terms of resources. A more practical solution would be to incorporate the elements to be tested into a prototype subsystem, simulating the rest of the system and utilizing the relevant part of the operating environment. The choice of a specific test configuration requires a complex balancing of risks, costs, and contingency plans, requiring a high level of judgment.
Certification and Accreditation is covered in detail in Chapters 11 through 15 of this text, the CAP credential. See the assessment questions at the end of those chapters.
The U.S. Government Information Assurance Regulations domain of the ISSEP concentration is designed to enable the candidate to identify, understand, and apply the practices as defined by the U.S. Government IA regulations and policies.
A large amount of U.S. government assurance terminology has, necessarily, been defined and used in the material preceding this chapter. Therefore, it is not necessary to repeat those definitions in this section. However, the definitions of a number of important terms as they are used in the context of U.S. government information assurance will be presented in this section to ensure that the candidate is familiar with them. Also, National Security Telecommunications and Information Systems Security Instruction (NSTISSI) Publication No. 4009, “National Information Systems Security (INFOSEC) Glossary,” September 2000, Appendix F, provides a comprehensive list of U.S. government IA terms.
The following definitions, taken from NIST Special Publication 800-12, “An Introduction to Computer Security: The NIST Handbook,” October 1995, are fundamental to the understanding of U.S. government IA material.
The additional definitions that follow are selectively taken from the (NSTISSI) Publication No. 4009, Glossary. They are listed to provide the candidate with knowledge of terminology that is used in government IA publications. This list gives the definitions of fundamental concepts that are important to the ISSEP certification:
In the U.S., the Committee on National Security Systems (CNSS) was assigned the responsibility to set national policy for national security systems. CNSS is the result of Executive Order (E.O.) 13231, “Critical Infrastructure Protection in the Information Age,” issued on October 16, 2001. E.O. 13231 renamed the National Security Telecommunications and Information Systems Security Committee (NSTISSC) as CNSS. CNSS is a standing committee of the President’s Critical Infrastructure Board and is chaired by the U.S. DoD.
E.O. 13231directed the following actions:
The E.O. also assigned the following responsibilities to the U.S. Secretary of Defense and the Director of Central Intelligence regarding the security of systems with national security information:
National security systems are categorized as systems with one or more of the following characteristics:
The responsibilities of the CNSS for national security systems outlined in E.O. 13231 include:
An index of CNSS Issuances can be found at www.nstissc.gov/Assets/ pdf/index.pdf
Additional valuable guidance on polices for federal agencies is provided in OMB Circular A-130, “Management of Federal Information Resources, Transmittal 4,” November 30, 2000. This circular addresses information management policy and management of information systems and information technology policy. These policies are summarized in the following two sections.
Information Management Policy
For government agencies, an information management policy should address the following entities:
Management of Information Systems and Information Technology Policy
A policy for the management of information systems should include the following items:
In performing the oversight function, Circular A-130 states:
The Director of OMB will use information technology planning reviews, fiscal budget reviews, information collection budget reviews, management reviews, and such other measures as the Director deems necessary to evaluate the adequacy and efficiency of each agency’s information resources management and compliance with this Circular.
The policies and guidance for information assurance in U.S. defense organizations are given in DoD Directive 8500.1, “Information Assurance (IA),” October 4, 2002. Additional support and implementation guidance is also provided by DoD Directive 8500.2, “Information Assurance (IA) Implementation,” February 6, 2003; DoD 5025.1-M, “DoD Directives System Procedures,” current edition; and DoD Directive 8000.1, “Management of DoD Information Resources and Information Technology,” February 27, 2002. The principal components of U.S. DoD IA policy as embodied in DoD Directive 8500.1 are summarized in the following section.
DoD Directive 8500.1:
Establishes policy and assigns responsibilities to achieve Department of Defense (DoD) information assurance (IA) through a defense-in-depth approach that integrates the capabilities of personnel, operations, and technology, and supports the evolution to network centric warfare.
There are 26 policy items listed in Directive 8500.1. The main elements of these policy statements taken from the Directive are given as follows:
You can find the answers to the following questions in Appendix A.
1. |
Which one of the following is not one of the five system life cycle planning phases as defined in NIST SP 800-14?
|
|
2. |
Which one of the following sets of activities best describes a subset of the Acquisition Cycle phases as given in NIST SP 800-64, “Security Considerations in the Information System Development Life Cycle”?
|
|
3. |
The IATF document 3.1 stresses that information assurance relies on three critical components. Which one of the following answers correctly lists these components?
|
|
4. |
In the 14 Common IT Security Practices listed in NIST SP 800-14, one of the practices addresses having three types of policies in place. Which one of the following items is not one of these types of policies?
|
|
5. |
Risk management, as defined in NIST SP 800-30, comprises which three processes?
|
|
6. |
In the system development life cycle (SDLC), or system life cycle as it is sometimes called, in which one of the of the five phases are the system security features configured, enabled, tested, and verified?
|
|
7. |
Which one of he following activities is performed in the Development/Acquisition phase of the SDLC?
|
|
8. |
In NIST SP 800-30, risk is defined as a function of which set of the following items?
|
|
9. |
The risk assessment methodology described in NIST SP 800-30 comprises nine primary steps. Which one of the following is not one of these steps?
|
|
10. |
The Engineering Principles for Information Technology Security (EPITS), described in NIST SP 800-27, are which one of the following?
|
|
11. |
Which one of the following items is not one of the activities of the generic systems engineering (SE) process?
|
|
12. |
The elements Discover information protection needs, Develop detailed security design, and Assess information protection effectiveness are part of what process?
|
|
13. |
In the ISSE process, information domains are defined under the Discover Information Protection Needs process. Which one of the following tasks is not associated the information domain?
|
|
14. |
In the Discover Information Protection Needs activity of the ISSE process, the information systems security engineer must document the elements of this activity, including roles, responsibilities, threats, strengths, security services, and priorities. These items form the basis of which one of the following?
|
|
15. |
As part of the Define System Security Requirements activity of the ISSE process, the information systems security engineer identifies and selects a solution set that can satisfy the requirements of the IPP. Which one of the following elements is not a component of the solution set?
|
|
16. |
The information systems security engineer’s tasks of cataloging candidate commercial off-the-shelf (COTS) products, government off-the-shelf (GOTS) products, and custom security products are performed in which one of the following ISSE process activities?
|
|
17. |
Which ISSE activity includes conducting unit testing of components, integration testing, and developing installation and operational procedures?
|
|
18. |
Security certification is performed in which phase of the SDLC?
|
|
19. |
The certification and accreditation process receives inputs from the ISSE process. These inputs are which one of the following items?
|
|
20. |
Which one of the following items is not part of an implementation-independent protection profile (PP) of the Common Criteria (CC)?
|
|
21. |
Which one of the following is not one of the technology focus areas of the Defense in Depth strategy?
|
|
22. |
Security categorization is part of which phase of the SDLC?
|
|
23. |
The Defense in Depth strategy identifies five types of attacks on information systems as listed in IATF document 3.1. Which one of the following types of attacks is not one of these five types?
|
|
24. |
Which one of the following items is not an activity under the Acquisition/Development phase of the SDLC?
|
|
25. |
Which one of the following types of enclaves is not one of those categorized in the U.S. federal and defense computing environments?
|
|
26. |
According to NIST SP 800-64, which phase of the SDLC includes the activities of functional statement of need, market research, cost-benefit analysis, and a cost analysis?
|
|
27. |
Which one of the following models is an evolutionary model used to represent the acquisition management process?
|
|
28. |
In NIST SP 800-30, a threat is defined as which one of the following items?
|
|
29. |
Questionnaires, on-site interviews, review of documents, and automated scanning tools are primarily used to gather information for which one of the following steps of the risk assessment process?
|
|
30. |
In performing an impact analysis as part of the risk assessment process, three important factors should be considered in calculating the negative impact. Which one of the following items is not one of these factors?
Technical Management Some material in these questions is also covered in Chapter 5. |
|
31. |
Which statement about the SSE-CMM is incorrect?
|
|
32. |
Which description of the SSE-CMM Level 5 Generic Practice is correct?
|
|
33. |
Which statement about testing and evaluation is not true?
|
|
34. |
Which attribute about the Level 1 SSE-CMM Generic Practice is correct?
|
|
35. |
Which of the following is not a true statement about good cost control?
|
|
36. |
Which statement about the SE-CMM is not correct?
|
|
37. |
Which statement about system security testing and evaluation (ST&E) categories is correct?
|
|
38. |
Which choice is not an activity in the cost control process?
|
|
39. |
Which choice does not describe a common outsourcing activity?
|
|
40. |
Which choice is not an accurate description of an activity level of the WBS?
|
|
41. |
Which of the following is not a phase in the IDEAL model?
|
|
42. |
Which choice best describes systems engineering, as defined in the SSE-CMM?
|
|
43. |
Which of the following choices is not a benefit of the WBS?
|
|
44. |
Which choice is not an element of the Statement of Work (SOW)?
|
|
45. |
Which of the following statements best describes the difference between a Type 1 testing and evaluation category and a Type 2 category?
|
|
46. |
Which choice has the outsourcing activities listed in their proper order?
|
|
47. |
Which answer best describes a Statement of Work (SOW)?
|
|
48. |
Which statement about SSE-CMM Base Practices is correct?
|
|
49. |
As per the SE-CMM, which definition of a system is incorrect?
|
|
50. |
Which of the following choices best describes the purpose of the Learning phase of the IDEAL model?
|
|
51. |
Which statement about the System Engineering Management Plan (SEMP) is not true?
|
|
52. |
Which choice has the correct order of activities in the IDEAL model?
|
|
53. |
Which choice is an incorrect statement regarding the Systems Engineering Management Plan (SEMP)?
|
|
54. |
Which choice best describes an outsourced supplier?
|
|
55. |
Which of the following statements best describes the main premise of process improvement?
|
|
56. |
What is the main purpose of the Work Breakdown Structure (WBS)?
|
|
57. |
Which choice is not an activity in the Development Program Planning and Control element of the SEMP?
|
|
58. |
At what point in the project is the Work Breakdown Structure (WBS) usually created?
|
|
59. |
Which choice accurately lists the five levels of security engineering maturity as defined by the SSE-CMM?
|
|
60. |
Which choice has the correct order of activities in the security system design testing process?
Certification and Accreditation See Chapter 11 Assessment Questions. U.S. Government Information Assurance Regulations Some material in these questions is also covered in Chapter 12. |
|
61. |
Techniques and concerns that are normally addressed by management in the organization’s computer security program are defined in NIST SP 800-12 as:
|
|
62. |
The National Research Council publication Computers at Risk defines an element of computer security as a “requirement intended to assure that systems work properly and service is not denied to authorized users.” Which one of the following elements best fits this definition?
|
|
63. |
NSTISSI Publication No. 4009, “National Information Systems Security (INFOSEC) Glossary,” defines the term assurance as:
|
|
64. |
The “National Information Systems Security (INFOSEC) Glossary” defines an information system security term as a “formal determination by an authorized adjudicative office that an individual is authorized access, on a need to know basis, to a specific level of collateral classified information.” This definition refers to which one of the following terms?
|
|
65. |
In NSTISSI Publication No. 4009, what term is defined as a “document detailing the method, act, process, or effect of using an information system (IS)”?
|
|
66. |
Which one of the following definitions best describes the National Information Assurance Partnership (NIAP) according to NSTISSI Publication No. 4009?
|
|
67. |
TEMPEST refers to which one of the following definitions?
|
|
68. |
Executive Order (E.O.) 13231, issued on October 16, 2001, renamed the National Security Telecommunications and Information Systems Security Committee (NSTISSC) as which one of the following committees?
|
|
69. |
In addressing the security of systems with national security information, E.O. 13231 assigned the responsibilities of developing government-wide policies and overseeing the implementation of governmentwide policies, procedures, standards, and guidelines to the:
|
|
70. |
Which one of the following characteristics is not associated with the definition of a national security system?
|
|
71. |
In 2002, the U.S. Congress enacted the E-Government Act (Public Law 107-347). Title III of the E-Government Act was written to provide for a number of protections of Federal information systems, including to “provide a comprehensive framework for ensuring the effectiveness of information security controls over information resources that support Federal operations and assets.” Title III of the E-Government Act is also known as the:
|
|
72. |
FISMA assigned which one of the following entities the responsibility of overseeing the security policies and practices of U.S. government agencies?
|
|
73. |
Which information system security–related Act requires government agencies to perform periodic assessments of risk, develop policies and procedures that are based on risk assessments, conduct security awareness training, perform periodic testing and evaluation of the effectiveness of information security policies, and implement procedures for detecting, reporting, and responding to security incidents?
|
|
74. |
FISMA charged which one of the following entities to develop information system security standards and guidelines for federal agencies?
|
|
75. |
The general formula for categorization of an information type developed in FIPS Publication 199, “Standards for Security Categorization of Federal Information and Information Systems,” is which one of the following?
|
|
76. |
Circular A-130 directs that an oversight function should be performed consisting of the use of information technology planning reviews, fiscal budget reviews, information collection budget reviews, management reviews, and such other measures as deemed necessary to evaluate the adequacy and efficiency of each agency’s information resources management and compliance with the circular. Which one of the following individuals does the circular designate as being responsible for this oversight function?
|
|
77. |
The National Computer Security Center Publication NCSC-TG-004-88 includes a definition that refers to the characteristic of a system that “performs its intended function in an unimpaired manner, free from deliberate, inadvertent, or unauthorized manipulation of the system.” This characteristic defines which one of the following terms?
|
|
78. |
Which one of the following terms best describes a secure telecommunications or associated cryptographic component that is unclassified but governed by a special set of control requirements, as defined in NSTISSI Publication 4009?
|
|
79. |
What is a definable perimeter encompassing all hardware, firmware, and software components performing critical COMSEC functions, such as key generation and key handling and storage?
|
|
80. |
What process involves the five steps of identification of critical information, analysis of threats, analysis of vulnerabilities, assessment of risks, and application of appropriate countermeasures?
|
|
81. |
Information that has been determined pursuant to Executive Order 12958 or any predecessor order to require protection against unauthorized disclosures is known as:
|
|
82. |
An area that, when staffed, must be occupied by two or more appropriately cleared individuals who remain within sight of each other is referred to as which one of the following terms?
|
|
83. |
According to NSTISSI Publication 4009, the process of identifying and applying countermeasures commensurate with the value of the assets protected based on a risk assessment is called a:
|
|
84. |
In the context of information systems security, the abbreviation ST&E stands for which one of the following terms?
|
|
85. |
Which one of the following designations refers to a product that is a classified or controlled cryptographic item endorsed by the NSA for securing classified and sensitive U.S. government information when appropriately keyed?
|
|
86. |
Which one of the following items is not one of the responsibilities of the Committee on National Security Systems (CNSS) for the security of national security systems?
|
|
87. |
FISMA, Title III of the E-Government Act of 2002, reserves the responsibility for standards associated with the national defense establishment to which of the following entities?
|
|
88. |
FIPS Publication 199, “Standards for Security Characterization of Federal Information and Information Systems, NIST Pre-Publication Final Draft,” December 2003, characterizes three levels of potential impact on organizations or individuals based on the objectives of confidentiality, integrity, and availability. What is the level of impact specified in Publication 199 for the following description of integrity: “The unauthorized modification or destruction of information could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals”?
|
|
89. |
Referring to question 88, the following impact description refers to which one of the three security objectives and which corresponding level of impact: “The disruption of access to or use of information or an information system could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals”?
|
|
90. |
DoD Directive 8500.1, “Information Assurance (IA),” October 4, 2002, specifies a defense-in-depth approach that integrates the capabilities of which set of the following entities?
|
Answers
1. |
Answer: b The requirements phase is not one of the five system life cycle planning phases. The other two phases of the system life cycle are the Development/Acquisition phase and the Operations phase. |
2. |
Answer: a Answers b, c, and d are distracters comprising components of the SDLC and the Acquisition Cycle. |
3. |
Answer: d Answers a, b, and c are distracters. |
4. |
Answer: d A program policy is used to create and define a computer security program, an issue specific policy addresses specific areas and issues, and a system specific policy focuses on decisions made by management. |
5. |
Answer: a Answers b, c, and d are distracters. |
6. |
Answer: c |
7. |
Answer: b Answer a refers to the Initiation phase, answer c refers to the Operation/Maintenance phase, and answer d refers to the Disposal phase. |
8. |
Answer: a Answers b, c, and d are distracters. |
9. |
Answer: d Delineating accreditation boundaries is a subset of system characterization (answer a). |
10. |
Answer: a Answer b describes the principles and practices found in NIST SP 800-14. Answers c and d are distracters. |
11. |
Answer: c Obtaining accreditation is not one of the SE process activities. The other SE process activities are to design system architecture, develop detailed design, and implement system. |
12. |
Answer: b |
13. |
Answer: d This task is performed under the Develop Detailed Security Design activity. |
14. |
Answer: d Answers a through c are distracters. |
15. |
Answer: a Functional decomposition is part of the Design System Security Architecture activity of the ISSE process. |
16. |
Answer: b |
17. |
Answer: c |
18. |
Answer: a Security certification is performed in the Implementation phase. Validation (answer b) is not a phase of the SDLC. Answers c and d are additional phases of the SDLC. This activity has tasks that should be performed throughout the ISSE process. |
19. |
Answer: d Answers A, B, and C are outputs of the Certification and Accreditation process. |
20. |
Answer: d Defense of the enclave boundary is addressed in the Defense-In-Depth strategy. |
21. |
Answer: a |
22. |
Answer: a Security categorization, performed in the Initiation phase, defines low, moderate, or high levels of potential impact on organizations in the event of a security breach. Answers b and c are other phases of the SDLC. Answer d is not a phase of the SDLC. |
23. |
Answer: d Answer d is a distracter. The other two types of attacks, in addition to passive attacks (answer a), active attacks (answer b), and close-in attacks (answer c), are insider and distribution attacks. |
24. |
Answer: a Preliminary risk assessment is performed in the Initiation phase of the SDLC. Additional activities under the Acquisition/Development phase of the SDLC are risk assessment, assurance requirements analysis security, security planning, and security control development. |
25. |
Answer: d |
26. |
Answer: b Additional activities under the Acquisition/Development phase include requirements analysis, alternatives analysis, and a software conversion study. |
27. |
Answer: b The spiral model depicts the acquisition management process as a set of phases and decision points in a circular representation. The other answers are distracters. |
28. |
Answer: c Answer a is a threat source, answer b defines risk, and answer d is the definition of vulnerability. |
29. |
Answer: a |
30. |
Answer: b Technical Management |
31. |
Answer: c The SSE-CMM defines two dimensions that are used to measure the capability of an organization to perform specific activities, the domain dimension and the capability dimension. The domain dimension consists of all the practices that collectively define security engineering. The capability dimension represents practices that indicate process management and institutionalization capability. |
32. |
Answer: b Level 5, “Continuously Improving,” is the highest level. A statement characterizing this level would be: “A culture of continuous improvement requires a foundation of sound management practice, defined processes, and measurable goals.” |
33. |
Answer: c In the Defense sector, a TEMP is required for most large programs and includes the planning and implementation of procedures for the Development Test and Evaluation (DT&E) and Operational Test and Evaluation (OT&E). DT&E basically equates to the Analytical, Type 1, and Type 2 testing, and OT&E is equivalent to Type 3 and Type 4 testing. |
34. |
Answer: a The lowest level, Level 1, “Performed Informally,” focuses on whether an organization or project performs a process that incorporates the BPs. The attribute of this level simply requires that the BPs are performed. |
35. |
Answer: a Cost control starts with the initial development of cost estimates for the program and continues with the functions of cost, monitoring, and the collection of cost data, the analysis of the data, and the immediate initiation of corrective action. Cost control requires good overall cost management, including:
|
36. |
Answer: d The SSE-CMM, not the SE-CMM, goal is to define, improve, and assess security engineering capability. The SE-CMM goal is to improve the system or product engineering process. The SE-CMM describes the essential elements of an organization’s systems engineering process that must exist in order to ensure good systems engineering. It also provides a reference to compare existing systems engineering practices against the essential systems engineering elements described in the model. |
37. |
Answer: d Testing and evaluation processes often involves several stages of testing categories or phases, such as:
|
38. |
Answer: a Answer a is an activity of outsourcing. The cost control process includes:
|
39. |
Answer: b Developing a functional cost reporting capability is a function of Cost Control. The order of activities for the outsourcing process are:
|
40. |
Answer: b The WBS structure generally includes three levels of activity:
|
41. |
Answer: a The five phases of the IDEAL model are:
|
42. |
Answer: b The definition of systems engineering on which the SE-CMM is based is defined as the selective application of scientific and engineering efforts to:
Answer a describes a system, answer c describes the SOW, and answer d describes outsourcing. |
43. |
Answer: d The WBS provides many benefits, such as:
Answer d describes a benefit of systems engineering. |
44. |
Answer: c The Statement of Work (SOW) is a narrative description of the work required for a given project. It includes:
Answer c is an example of a SSE-CMM Best Practice. |
45. |
Answer: a Testing and evaluation processes often involve several stages of testing categories or phases, such as:
|
46. |
Answer: c |
47. |
Answer: a The Statement of Work is a narrative description of the work required for a given project. Answer b describes a “system” as defined by the SECMM, answer c describes outsourcing, and answer d describes a function of Cost Control. |
48. |
Answer: a BPs are mandatory characteristics that must exist within an implemented security engineering process before an organization can claim satisfaction in a given PA. The GPs are ordered in degrees of maturity and are grouped to form and distinguish among five levels of security engineering maturity. The other answers are distracters. |
49. |
Answer: b In the SE-CMM, a system is defined as:
|
50. |
Answer: b The Learning phase is both the final stage of the initial process improvement cycle and the initial phase of the next process improvement effort. Based on the analysis of the improvement effort itself, the lessons learned are translated into recommendations for improving subsequent improvement efforts. Answer a describes the Acting phase, answer c describes the Diagnosing phase, and answer d describes the Establishing phase. |
51. |
Answer: b The SEMP contains detailed statements of how the systems security engineering functions are to be carried out during development. Two elements of the SEMP are:
Answer b describes a goal of process improvement. |
52. |
Answer: d The order of activities in the IDEAL model is Initiating, Diagnosing, Establishing, Acting, and Learning. |
53. |
Answer: d The SEMP is intended to be a dynamic document. It starts as an outline and is updated as the security system development process goes on, and contains detailed statements of how the systems security engineering functions are to be carried out during development. The SEMP covers all management functions associated with the performance of security systems engineering activities for a given program. |
54. |
Answer: a The term suppliers is defined here as a broad class of external organizations that provide products, components, materials, and/or services to a producer or prime contractor. Answers b and c describe a system, and answer d is a distracter. |
55. |
Answer: b The basic premise of process improvement is that the quality of services produced is a direct function of the quality of the associated development and maintenance processes. Answers a and c describe knowledge or assumptions required to implement a successful security engineering process improvement activity, but not the main premise. Answer d is a distracter. |
56. |
Answer: d The Work Breakdown Structure (WBS) is an important technique to ensure that all essential tasks are properly defined, assigned, scheduled, and controlled. It contains a hierarchical structure of the tasks to be accomplished during the project. The WBS may be a contractual requirement in competitive bid system developments. Answers a, c, and d are attributes of the WBS, not its main purpose. |
57. |
Answer: a Development Program Planning and Control describes the security systems security engineering tasks that must be implemented to manage the development phase of the security program, including:
Answer a is an activity of the Security Systems Engineering Process element of the SEMP. |
58. |
Answer: a After the generation of the SOW and the identification of the organizational structure, one of the initial steps in program planning is the development of the Work Breakdown Structure (WBS). The other answers are distracters. |
59. |
Answer: c The five levels are: Level 1, Performed Informally; Level 2, Planned and Tracked; Level 3, Well Defined; Level 4, Quantitatively Controlled; and Level 5, Continuously Improving. |
60. |
Answer: d The correct order of activities in the security system design testing process is Planning, Acquisition, Testing, Analysis, and Correction. Certification and Accreditation See Chapter 11 Assessment Questions. U.S. Government Information Assurance Regulations |
61. |
Answer: b. Answer a is a distracter. Operational controls (answer c) are security controls that are usually implemented by people instead of systems, and technical controls (answer d) are security controls that the computer system executes. |
62. |
Answer: a |
63. |
Answer: c Answer a is a definition of data integrity, answer b defines authentication, and answer d describes confidentiality. |
64. |
Answer: c Answers a and b are distracters. Answer d refers to a “nonhierarchical grouping of sensitive information used to control access to data more finely than with hierarchical security classification alone,” as defined in NSTISSI Publication No. 4009. |
65. |
Answer: b, Concept of Operations Answer a, QUADRANT, refers to technology that provides tamper-proof protection to cryptographic equipment. Answer c defines “a set of assurance requirements that represent a point on the Common Criteria predefined assurance scale,” and answer d is a “framework that assigns and portrays IA roles and behavior among all IT assets, and prescribes rules for interaction and connection.” |
66. |
Answer: c Answer a refers to the National Information Infrastructure (NII), answer b defines the Global Information Infrastructure (GII), and answer d defines a Policy Approving Authority (PAA). |
67. |
Answer: b Answer a refers to the concept of Tranquility, answer c refers to a Special Access Program (SAP), and answer d is distracter. |
68. |
Answer: b The other answers are distracters. |
69. |
Answer: d |
70. |
Answer: b Additional characteristics of a national information system include employing cryptographic activities related to national security, associated with equipment that is an integral part of a weapon or weapons system(s), and critical to the direct fulfillment of military or intelligence missions. |
71. |
Answer: c |
72. |
Answer: c The Director of the Office of Management and Budget (OMB) has the responsibility of overseeing government agency security policies and practices. Standards associated with national defense are still the responsibility of the DoD and NSA. |
73. |
Answer: b |
74. |
Answer: d |
75. |
Answer: b The other answers are distracters. |
76. |
Answer: b |
77. |
Answer: b |
78. |
Answer: c Answer a refers to a device embodying a communications security (COMSEC) design that NSA has approved as a CCI. Answer b is part of a CCI that does not perform the entire COMSEC function but depends upon the host equipment, or assembly, to complete and operate the COMSEC function. Answer d is a device or electronic key used to unlock the secure mode of crypto-equipment. |
79. |
Answer: d Answers a, b, and c are distracters. |
80. |
Answer: a The other answers are distracters. |
81. |
Answer: b Answers a and d are distracters. PII (answer c) is usually associated with privacy. An example of PII is a person’s health care information. |
82. |
Answer: a Answers b, c, and d are distracters. |
83. |
Answer: c |
84. |
Answer: b Answers a, c, and d are distracters. |
85. |
Answer: c Answers a and b are distracters. Answer d, a Type 2 product, defines unclassified cryptographic equipment, assembly, or component endorsed by the NSA for use in national security systems as defined in Title 40 U.S.C. § 1452. |
86. |
Answer: d This responsibility is assigned to the OMB. |
87. |
Answer: a |
88. |
Answer: b |
89. |
Answer: c |
90. |
Answer: a Answers b, c, and d are distracters. |
Part One - Focused Review of the CISSP Ten Domains
Part Two - The Certification and Accreditation Professional (CAP) Credential