<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Dan+Philpott</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Dan+Philpott"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Dan_Philpott"/>
		<updated>2026-05-02T23:11:07Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Using_freed_memory&amp;diff=87457</id>
		<title>Using freed memory</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Using_freed_memory&amp;diff=87457"/>
				<updated>2010-08-09T18:56:11Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: Added some links to referenced conditions, no content changes.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Vulnerability}}&lt;br /&gt;
{{Template:SecureSoftware}}&lt;br /&gt;
{{Template:Fortify}}&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
[[ASDR_TOC_Vulnerabilities|Vulnerabilities Table of Contents]]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Referencing memory after it has been freed can cause a program to crash.&lt;br /&gt;
&lt;br /&gt;
The use of heap allocated memory after it has been freed or deleted leads to undefined system behavior and, in many cases, to a [[Write-what-where_condition|write-what-where condition]].&lt;br /&gt;
&lt;br /&gt;
Use after free errors occur when a program continues to use a pointer after it has been freed. Like [[Doubly_freeing_memory|double free error]]s and [[memory leak]]s, use after free errors have two common and sometimes overlapping causes:&lt;br /&gt;
&lt;br /&gt;
* Error conditions and other exceptional circumstances &lt;br /&gt;
* Confusion over which part of the program is responsible for freeing the memory &lt;br /&gt;
&lt;br /&gt;
Use after free errors sometimes have no effect and other times cause a program to crash. While it is technically feasible for the freed memory to be re-allocated and for an attacker to use this reallocation to launch a buffer overflow attack, we are unaware of any exploits based on this type of attack.&lt;br /&gt;
&lt;br /&gt;
'''Consequences'''&lt;br /&gt;
&lt;br /&gt;
* Integrity: The use of previously freed memory may corrupt valid data, if the memory area in question has been allocated and used properly elsewhere.&lt;br /&gt;
* Availability: If chunk consolidation occurs after the use of previously freed data, the process may crash when invalid data is used as chunk information.&lt;br /&gt;
* Access Control (instruction processing): If malicious data is entered before chunk consolidation can take place, it may be possible to take advantage of a write-what-where primitive to execute arbitrary code.&lt;br /&gt;
&lt;br /&gt;
'''Exposure period'''&lt;br /&gt;
&lt;br /&gt;
* Implementation: Use of previously freed memory errors occur largely at implementation time.&lt;br /&gt;
&lt;br /&gt;
'''Platform'''&lt;br /&gt;
&lt;br /&gt;
* Languages: C, C++, Assembly &lt;br /&gt;
* Operating Platforms: All&lt;br /&gt;
&lt;br /&gt;
'''Required resources'''&lt;br /&gt;
&lt;br /&gt;
Any&lt;br /&gt;
&lt;br /&gt;
'''Severity'''&lt;br /&gt;
&lt;br /&gt;
Very High&lt;br /&gt;
&lt;br /&gt;
'''Likelihood of exploit'''&lt;br /&gt;
&lt;br /&gt;
High&lt;br /&gt;
&lt;br /&gt;
The use of previously freed memory can have any number of adverse consequences - ranging from the corruption of valid data to the execution of arbitrary code, depending on the instantiation and timing of the flaw.&lt;br /&gt;
&lt;br /&gt;
The simplest way data corruption may occur involves the system's reuse of the freed memory. In this scenario, the memory in question is allocated to another pointer validly at some point after it has been freed. The original pointer to the freed memory is used again and points to somewhere within the new allocation. As the data is changed, it corrupts the validly used memory; this induces undefined behavior in the process.&lt;br /&gt;
&lt;br /&gt;
If the newly allocated data chances to hold a class, in C++ for example, various function pointers may be scattered within the heap data. If one of these function pointers is overwritten with an address to valid shellcode, execution of arbitrary code can be achieved.&lt;br /&gt;
&lt;br /&gt;
==Risk Factors==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
===Example1===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#include &amp;lt;stdio.h&amp;gt;&lt;br /&gt;
#include &amp;lt;unistd.h&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#define BUFSIZER1   512&lt;br /&gt;
#define BUFSIZER2   ((BUFSIZER1/2) - 8)&lt;br /&gt;
&lt;br /&gt;
int main(int argc, char **argv) {   &lt;br /&gt;
    char *buf1R1;&lt;br /&gt;
    char *buf2R1;&lt;br /&gt;
    char *buf2R2;&lt;br /&gt;
    char *buf3R2;&lt;br /&gt;
&lt;br /&gt;
    buf1R1 = (char *) malloc(BUFSIZER1);&lt;br /&gt;
    buf2R1 = (char *) malloc(BUFSIZER1);&lt;br /&gt;
&lt;br /&gt;
    free(buf2R1);&lt;br /&gt;
&lt;br /&gt;
    buf2R2 = (char *) malloc(BUFSIZER2);&lt;br /&gt;
    buf3R2 = (char *) malloc(BUFSIZER2);&lt;br /&gt;
&lt;br /&gt;
    strncpy(buf2R1, argv[1], BUFSIZER1-1);&lt;br /&gt;
    free(buf1R1);&lt;br /&gt;
    free(buf2R2);&lt;br /&gt;
    free(buf3R2);&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Example2===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
	char* ptr = (char*)malloc (SIZE);&lt;br /&gt;
	...&lt;br /&gt;
	if (err) {&lt;br /&gt;
		abrt = 1;&lt;br /&gt;
		free(ptr);&lt;br /&gt;
	}&lt;br /&gt;
	...&lt;br /&gt;
	if (abrt) {&lt;br /&gt;
		logError(&amp;quot;operation aborted before commit&amp;quot;, ptr);&lt;br /&gt;
	}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
&lt;br /&gt;
* [[Attack 1]]&lt;br /&gt;
* [[Attack 2]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
&lt;br /&gt;
* [[Buffer Overflow]] (in particular, heap overflows): The method of exploitation is often the same, as both constitute the unauthorized writing to heap memory.&lt;br /&gt;
* [[Write-what-where condition]]: The use of previously freed memory can result in a write-what-where in several ways.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
&lt;br /&gt;
* Implementation: Ensuring that all pointers are set to NULL once the memory they point to has been freed can be effective strategy. The utilization of multiple or complex data structures may lower the usefulness of this strategy.&lt;br /&gt;
&lt;br /&gt;
==Related [[Technical Impacts]]==&lt;br /&gt;
&lt;br /&gt;
* [[Technical Impact 1]]&lt;br /&gt;
* [[Technical Impact 2]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
[[Category:FIXME|add links&lt;br /&gt;
&lt;br /&gt;
In addition, one should classify vulnerability based on the following subcategories: Ex:&amp;lt;nowiki&amp;gt;[[Category:Error Handling Vulnerability]]&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Availability Vulnerability&lt;br /&gt;
&lt;br /&gt;
Authorization Vulnerability&lt;br /&gt;
&lt;br /&gt;
Authentication Vulnerability&lt;br /&gt;
&lt;br /&gt;
Concurrency Vulnerability&lt;br /&gt;
&lt;br /&gt;
Configuration Vulnerability&lt;br /&gt;
&lt;br /&gt;
Cryptographic Vulnerability&lt;br /&gt;
&lt;br /&gt;
Encoding Vulnerability&lt;br /&gt;
&lt;br /&gt;
Error Handling Vulnerability&lt;br /&gt;
&lt;br /&gt;
Input Validation Vulnerability&lt;br /&gt;
&lt;br /&gt;
Logging and Auditing Vulnerability&lt;br /&gt;
&lt;br /&gt;
Session Management Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ASDR Project]]&lt;br /&gt;
[[Category:Vulnerability]]&lt;br /&gt;
[[Category:Range and Type Error Vulnerability]]&lt;br /&gt;
[[Category:OWASP_CLASP_Project]]&lt;br /&gt;
[[Category:Code Quality Vulnerability]]&lt;br /&gt;
[[Category:Implementation]]&lt;br /&gt;
[[Category:Code Snippet]]&lt;br /&gt;
[[Category:C]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=75669</id>
		<title>Global Industry Committee</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=75669"/>
				<updated>2010-01-04T15:25:53Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: /* Work in Progress */ Removing NIST SP 800-37r1 FPD from work in progress list&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''The Global Industry Committee was created during the OWASP EU Summit in Portugal. The primary purpose of the Global Industry Committee is to work with industry executives to gather requirements from industry, work with Membership, Projects and others.'''&lt;br /&gt;
&lt;br /&gt;
==Mission Statement==&lt;br /&gt;
&lt;br /&gt;
''To expand awareness of and promote the inclusion of software security best practices in Industry, Government, Academia and regulatory agencies and be a voice for industry. We will accomplish this through outreach; including presentations, development of position papers and collaborative efforts with other entities.''  [https://www.owasp.org/index.php/Global_Industry_Committee#General_Presentations_and_Reports Powerpoint of Accomplishments]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Committee Plan==&lt;br /&gt;
&lt;br /&gt;
Step 1:&lt;br /&gt;
[[Industry:Organizations_for_Outreach|Identify specific organizations]] worth working with to spread the OWASP gospel&lt;br /&gt;
&lt;br /&gt;
Step 2:&lt;br /&gt;
Prioritize the proposed liasons based on potential impact, and also realistic likelihood of the organization actively working with us&lt;br /&gt;
&lt;br /&gt;
Step 3:&lt;br /&gt;
Execute, leveraging global OWASP resources as much as possible to maximize impact&lt;br /&gt;
&lt;br /&gt;
Step 4:&lt;br /&gt;
Evaluate progress &amp;amp; repeat Step 1-3&lt;br /&gt;
&lt;br /&gt;
==Committee Members==&lt;br /&gt;
&lt;br /&gt;
Board Member Rep: [mailto:tomb@owasp.org Tom Brennan]&lt;br /&gt;
&lt;br /&gt;
Committee Members:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
! Name&lt;br /&gt;
! Email&lt;br /&gt;
! Location&lt;br /&gt;
|-&lt;br /&gt;
| Joe Bernik&lt;br /&gt;
| &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Rex Booth&lt;br /&gt;
| rex.booth 'at' gt dot com&lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| David Campbell&lt;br /&gt;
| dcampbell 'at' owasp dot org&lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Alexander Fry&lt;br /&gt;
| alexander.fry 'at' owasp dot org&lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Georg Hess&lt;br /&gt;
| georg.hess 'at' artofdefence dot com&lt;br /&gt;
| Germany&lt;br /&gt;
|-&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| eoin.keary 'at' owasp dot org&lt;br /&gt;
| Ireland&lt;br /&gt;
|-&lt;br /&gt;
| Yiannis Pavlosoglou&lt;br /&gt;
| yiannis 'at' owasp dot org&lt;br /&gt;
| UK&lt;br /&gt;
|-&lt;br /&gt;
| Colin Watson&lt;br /&gt;
| colin.watson 'at' owasp dot org&lt;br /&gt;
| UK&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
OWASP Employees:&lt;br /&gt;
* Alison&lt;br /&gt;
* Kate Hartman&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
=== Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/global_industry_committee Join our mailing list]&lt;br /&gt;
&lt;br /&gt;
=== Meetings ===&lt;br /&gt;
&lt;br /&gt;
The next Global Industry Committee meeting will be:&lt;br /&gt;
&lt;br /&gt;
* TBC (Conference Bridge: 1-866-534-4754)&lt;br /&gt;
&lt;br /&gt;
Host Code: check calendar invite&lt;br /&gt;
&lt;br /&gt;
Guest Code:  192341&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Previous meeting minutes are:&lt;br /&gt;
&lt;br /&gt;
* [[Industry:Minutes 2009-01-23|23 Jan 2009]]&lt;br /&gt;
&lt;br /&gt;
=== Membership ===&lt;br /&gt;
&lt;br /&gt;
[[Membership]] explains how to become an OWASP organization supporter or individual member. &lt;br /&gt;
&lt;br /&gt;
You don't have to be an OWASP Member or Committee Member to contribute - the current committee members joined for a 12 month term - see [[How to Join a Committee]] and [[Global Committee Pages]].&lt;br /&gt;
&lt;br /&gt;
=== Other ongoing initiatives ===&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Global_Industry_Committee-SIG Special Interest Groups] - Outreach to sector-specific critical infrastructures worldwide.&lt;br /&gt;
* [http://www.owasp.org/index.php/Category:India OWASP India Advisory Board] - Regional panel contributing to the software outsourcing industry.&lt;br /&gt;
* [http://www.owasp.org/index.php/Industry:Citations OWASP Citations] - References to OWASP in official, or otherwise important, documents.&lt;br /&gt;
&lt;br /&gt;
==Current Activity==&lt;br /&gt;
&lt;br /&gt;
=== Work in Progress ===&lt;br /&gt;
&lt;br /&gt;
The current activities being undertaken:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
! Task&lt;br /&gt;
! Deadline&lt;br /&gt;
! Type&lt;br /&gt;
! Status&lt;br /&gt;
! Description&lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.enisa.europa.eu/ ENISA] Cloud Computing Common Assurance Metrics&lt;br /&gt;
| 2010&lt;br /&gt;
| Standards&lt;br /&gt;
| New&lt;br /&gt;
| Work with [[:Category:OWASP Cloud ‐ 10 Project]] to contribute to the development of Common Assurance Metrics for ENISA's [http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-information-assurance-framework?searchterm=cloud Cloud Computing Information Assurance Framework]. See also the [http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment Cloud Computing Risk Assessment] report.&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Personal Information Online Code of Practice|Personal Information Online COP]]&lt;br /&gt;
| 5 Mar 2010&lt;br /&gt;
| Legislation&lt;br /&gt;
| In Progress&lt;br /&gt;
| Provide response to UK Information Commissioner's Office draft &amp;quot;Personal Information Online Code of Practice&amp;quot;&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.spva.org Secure POS Vendor Alliance (SPVA)]&lt;br /&gt;
| -&lt;br /&gt;
| Outreach&lt;br /&gt;
| In Progress&lt;br /&gt;
| Begin dialogue about possibility of working together &lt;br /&gt;
| DC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Completed Items ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
! Task&lt;br /&gt;
! Completed&lt;br /&gt;
! Type&lt;br /&gt;
! Status&lt;br /&gt;
! Description&lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| [[:Industry:Draft_NIST_SP_800-37_Revision_1|NIST SP 800-37 Revision 1 FPD]] Review Project&lt;br /&gt;
| 30 Dec 2009&lt;br /&gt;
| Standards&lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;NIST SP 800-37 Revision 1 Final Public Draft, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach&amp;quot;&lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.crest-approved.org/ CREST] CRESTCon&lt;br /&gt;
| 15 Dec 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed &lt;br /&gt;
| Already an oversubscribed event, YP &amp;amp; CW have been placed on the reserve list. Update: Positions secured for the 15th.&lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://msdn.microsoft.com/en-us/security/cc448177.aspx SDL Pro Network]&lt;br /&gt;
| 30 Nov 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Contact SDL Pro Network to discuss if there are opportunities for OWASP to become involved or connected in some way&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST IR 7628|Draft NIST IR 7628]]&lt;br /&gt;
| 25 Nov 2009&lt;br /&gt;
| Standards&lt;br /&gt;
| Closed&lt;br /&gt;
| Provide response to &amp;quot;NIST IR 7628 Draft Smart Grid Cyber Security Strategy and Requirements&amp;quot;&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_DC_2009 Appsec DC 2009]&lt;br /&gt;
| 10-13 Nov 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Conference organisation - special effort to engage with US Federal sector&lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.justice.gov.uk/ UK Ministry of Justice]&lt;br /&gt;
| -&lt;br /&gt;
| Legislation&lt;br /&gt;
| Closed&lt;br /&gt;
| Ask to be added to official consultation list&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.it-sa.de/ IT-SA]&lt;br /&gt;
| 13-15 Oct 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| OWASP booth at trade show&lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_Germany_2009_Conference OWASP AppSec Germany 2009]&lt;br /&gt;
| 13 Oct 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Conference organisation&lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress]&lt;br /&gt;
| 28 Sep 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Presentation about OWASP&lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_Ireland_AppSec_2009_Conference OWASP Ireland AppSec 2009]&lt;br /&gt;
| 10 Sep 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Conference organisation&lt;br /&gt;
| EK&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Citations&lt;br /&gt;
| 7 Sep 2009&lt;br /&gt;
| Other&lt;br /&gt;
| Closed&lt;br /&gt;
| Identify and record the most important references to OWASP in official, or otherwise important, documents. Page created at: [[Industry:Citations]]&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress]&lt;br /&gt;
| 26 Aug 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Presentation about OWASP&lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| OWASP webcast at Brighttalk [http://www.brighttalk.com/summit/dataprivacy2 Data and Privacy in Web 2.0 Summit]&lt;br /&gt;
| 13 Aug 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Deliver [http://www.brighttalk.com/webcasts/4767/attend OWASP presentation on XSS, client side exploitation, and countermeasures].&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:SAFECode Secure Development Practices (update to Oct 2008 version)|SAFECode Secure Development Practices (update to Oct 2008 version)]]&lt;br /&gt;
| 31 Jul 2009&lt;br /&gt;
| Standards&lt;br /&gt;
| Closed&lt;br /&gt;
| Response to [http://www.safecode.org/ SAFECode] &amp;quot;Fundamental Practices for Secure Software Development: A Guide to the Most Effective Secure Development Practices in Use Today.&amp;quot;&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_CSA_Project OWASP CSA Project]&lt;br /&gt;
| 8 Jul 2009&lt;br /&gt;
| Standards&lt;br /&gt;
| Closed&lt;br /&gt;
| Response to RFC [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Cloud Security Alliance Guidance v1.0]&lt;br /&gt;
| TB&lt;br /&gt;
|-&lt;br /&gt;
| [[Scotland]]&lt;br /&gt;
| 25 Jun 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-scotland-industry-committee-june-2009.ppt]] and written notes [[Image:Owasp-scotland-industry-committee-june-2009-notes.pdf]])&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Presentation at [http://cfp2009.org/ CFP Con 2009]&lt;br /&gt;
| 1 Jun 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Deliver presentation on web threats and countermeasures.  See [http://www.cfp2009.org/wiki/index.php/Tutorials/Workshops CFP tutorial page] grep OWASP for more info.&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| ENISA [http://www.enisa.europa.eu/pages/02_03_news_2009_02_19_who_is_who.html Who-Is-Who Directory]&lt;br /&gt;
| -&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Contact ENISA regarding OWASP inclusion in directory (in progress). Encourage European chapter leaders to contact their ENISA liaison officers (completed). Contact UK liaison officer on behalf of London, Leeds and Scotland chapters.&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| IIL [http://www.iilondon.co.uk/ Insurance Institute of London]&lt;br /&gt;
| 2 Jun 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Contact IIL regarding future input to their publication [http://www.iilondon.co.uk/XtraCart/store/comersus_viewItem.asp?idProduct=187 Insurance Aspects of E-Commerce]&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-118|Draft NIST SP 800-118]]&lt;br /&gt;
| 29 May 2009&lt;br /&gt;
| Standards&lt;br /&gt;
| Closed&lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-118 Guide to Enterprise Password Management&amp;quot;&lt;br /&gt;
| CW/EK/RB/DC&lt;br /&gt;
|-&lt;br /&gt;
| German IT Industry Association&lt;br /&gt;
| 15 May 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Presentation on OWASP&lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://docs.google.com/Present?docid=ddkr62qv_171cd7gh5fb&amp;amp;skipauth=true Outreach Presentation to Frontier Airlines]&lt;br /&gt;
| 7 May 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Provide outreach presentation covering fundamentals of AppSec and Intro to OWASP&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 10012|DPC BS 10012]]&lt;br /&gt;
| 31 Mar 2009&lt;br /&gt;
| Standards&lt;br /&gt;
| Closed&lt;br /&gt;
| Provide response to &amp;quot;BS 10012 Specification for the management of personal information in compliance with the Data Protection Act 1998&amp;quot; Draft for Public Comment (DPC)&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-53 Revision 3|Draft NIST SP 800-53 Revision 3]]&lt;br /&gt;
| 27 Mar 2009&lt;br /&gt;
| Standards&lt;br /&gt;
| Closed&lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-53 (Revision 3) Recommended Security Controls for Federal Information Systems and Organizations&amp;quot;&lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-122|Draft NIST SP 800-122]]&lt;br /&gt;
| 13 Mar 2009&lt;br /&gt;
| Standards&lt;br /&gt;
| Closed&lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)&amp;quot;&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[London]]&lt;br /&gt;
| 12 Mar 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-london-industry-committee-march-2009.ppt]] and written notes [[Image:Owasp-london-industry-committee-march-2009-notes.pdf]])&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Digital Britain Interim Report|Digital Britain Interim Report]]&lt;br /&gt;
| 11 Mar 2009&lt;br /&gt;
| Legislation&lt;br /&gt;
| Closed&lt;br /&gt;
| Provide response to UK Government's &amp;quot;Digital Britain Interim Report Jan 2009&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Front Range]&lt;br /&gt;
| 5 Mar 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Conference organisation&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.commerce.gov/ Department of Commerce]&lt;br /&gt;
| 25 Feb 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Presentation about OWASP to Economic Security Working Group&lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 8878:2009|DPC BS 8878:2009]]&lt;br /&gt;
| 31 Jan 2009&lt;br /&gt;
| Standards&lt;br /&gt;
| Closed&lt;br /&gt;
| Provide response to &amp;quot;BS 8878:2009 Web accessibility. Building accessible experiences for disabled people&amp;quot; Draft for Public Comment (DPC)&lt;br /&gt;
| Puneet/CW&lt;br /&gt;
|-&lt;br /&gt;
| AppSec Presentation Delivered to Infragard, Dec 2008 &lt;br /&gt;
| Dec 2008&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| [http://www.infragard.net/ Infragard] is a collaboration between the US FBI and maintainers of critical infrastructure.  [http://docs.google.com/Present?docid=ddkr62qv_0cn7km4c3&amp;amp;skipauth=true Presentation here].  Email DC for full PPT with speaker notes&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| The Register [http://www.theregister.co.uk/2008/11/22/google_analytics_as_security_risk/ Google Analytics — Yes, it is a security risk]&lt;br /&gt;
| Nov 2008&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Co-ordination of response and provision of comments from OWASP leaders about risk of JavaScript on Barack Obama's website&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== General Presentations and Reports ===&lt;br /&gt;
&lt;br /&gt;
[[Summit_2009]]&lt;br /&gt;
* Global Industry Committee Presentation [[Image:Owasp-summit2009-industry-committee.ppt]]&lt;br /&gt;
&lt;br /&gt;
Summaries (for inclusion into other full OWASP presentations):&lt;br /&gt;
* Sep 2009 [[Image:Owasp-industry-committee-summary-september-2009.ppt]]&lt;br /&gt;
* Jul 2009 [[Image:Owasp-industry-committee-summary-july-2009.ppt]]&lt;br /&gt;
* May 2009 [[Image:Owasp-industry-committee-summary-may-2009.ppt]]&lt;br /&gt;
* Apr 2009 [[Image:Owasp-industry-committee-summary-april-2009.ppt]]&lt;br /&gt;
* Mar 2009 [[Image:Owasp-industry-committee-summary-march-2009.ppt]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Other [http://www.owasp.org/index.php/Global_Committee_Pages Global Committees]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=75668</id>
		<title>Global Industry Committee</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=75668"/>
				<updated>2010-01-04T15:25:08Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: /* Completed Items */ Adding NIST SP 800-37r1 FPD Review Project to completed projects list.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''The Global Industry Committee was created during the OWASP EU Summit in Portugal. The primary purpose of the Global Industry Committee is to work with industry executives to gather requirements from industry, work with Membership, Projects and others.'''&lt;br /&gt;
&lt;br /&gt;
==Mission Statement==&lt;br /&gt;
&lt;br /&gt;
''To expand awareness of and promote the inclusion of software security best practices in Industry, Government, Academia and regulatory agencies and be a voice for industry. We will accomplish this through outreach; including presentations, development of position papers and collaborative efforts with other entities.''  [https://www.owasp.org/index.php/Global_Industry_Committee#General_Presentations_and_Reports Powerpoint of Accomplishments]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Committee Plan==&lt;br /&gt;
&lt;br /&gt;
Step 1:&lt;br /&gt;
[[Industry:Organizations_for_Outreach|Identify specific organizations]] worth working with to spread the OWASP gospel&lt;br /&gt;
&lt;br /&gt;
Step 2:&lt;br /&gt;
Prioritize the proposed liasons based on potential impact, and also realistic likelihood of the organization actively working with us&lt;br /&gt;
&lt;br /&gt;
Step 3:&lt;br /&gt;
Execute, leveraging global OWASP resources as much as possible to maximize impact&lt;br /&gt;
&lt;br /&gt;
Step 4:&lt;br /&gt;
Evaluate progress &amp;amp; repeat Step 1-3&lt;br /&gt;
&lt;br /&gt;
==Committee Members==&lt;br /&gt;
&lt;br /&gt;
Board Member Rep: [mailto:tomb@owasp.org Tom Brennan]&lt;br /&gt;
&lt;br /&gt;
Committee Members:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
! Name&lt;br /&gt;
! Email&lt;br /&gt;
! Location&lt;br /&gt;
|-&lt;br /&gt;
| Joe Bernik&lt;br /&gt;
| &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Rex Booth&lt;br /&gt;
| rex.booth 'at' gt dot com&lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| David Campbell&lt;br /&gt;
| dcampbell 'at' owasp dot org&lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Alexander Fry&lt;br /&gt;
| alexander.fry 'at' owasp dot org&lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Georg Hess&lt;br /&gt;
| georg.hess 'at' artofdefence dot com&lt;br /&gt;
| Germany&lt;br /&gt;
|-&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| eoin.keary 'at' owasp dot org&lt;br /&gt;
| Ireland&lt;br /&gt;
|-&lt;br /&gt;
| Yiannis Pavlosoglou&lt;br /&gt;
| yiannis 'at' owasp dot org&lt;br /&gt;
| UK&lt;br /&gt;
|-&lt;br /&gt;
| Colin Watson&lt;br /&gt;
| colin.watson 'at' owasp dot org&lt;br /&gt;
| UK&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
OWASP Employees:&lt;br /&gt;
* Alison&lt;br /&gt;
* Kate Hartman&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
=== Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/global_industry_committee Join our mailing list]&lt;br /&gt;
&lt;br /&gt;
=== Meetings ===&lt;br /&gt;
&lt;br /&gt;
The next Global Industry Committee meeting will be:&lt;br /&gt;
&lt;br /&gt;
* TBC (Conference Bridge: 1-866-534-4754)&lt;br /&gt;
&lt;br /&gt;
Host Code: check calendar invite&lt;br /&gt;
&lt;br /&gt;
Guest Code:  192341&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Previous meeting minutes are:&lt;br /&gt;
&lt;br /&gt;
* [[Industry:Minutes 2009-01-23|23 Jan 2009]]&lt;br /&gt;
&lt;br /&gt;
=== Membership ===&lt;br /&gt;
&lt;br /&gt;
[[Membership]] explains how to become an OWASP organization supporter or individual member. &lt;br /&gt;
&lt;br /&gt;
You don't have to be an OWASP Member or Committee Member to contribute - the current committee members joined for a 12 month term - see [[How to Join a Committee]] and [[Global Committee Pages]].&lt;br /&gt;
&lt;br /&gt;
=== Other ongoing initiatives ===&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Global_Industry_Committee-SIG Special Interest Groups] - Outreach to sector-specific critical infrastructures worldwide.&lt;br /&gt;
* [http://www.owasp.org/index.php/Category:India OWASP India Advisory Board] - Regional panel contributing to the software outsourcing industry.&lt;br /&gt;
* [http://www.owasp.org/index.php/Industry:Citations OWASP Citations] - References to OWASP in official, or otherwise important, documents.&lt;br /&gt;
&lt;br /&gt;
==Current Activity==&lt;br /&gt;
&lt;br /&gt;
=== Work in Progress ===&lt;br /&gt;
&lt;br /&gt;
The current activities being undertaken:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
! Task&lt;br /&gt;
! Deadline&lt;br /&gt;
! Type&lt;br /&gt;
! Status&lt;br /&gt;
! Description&lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.enisa.europa.eu/ ENISA] Cloud Computing Common Assurance Metrics&lt;br /&gt;
| 2010&lt;br /&gt;
| Standards&lt;br /&gt;
| New&lt;br /&gt;
| Work with [[:Category:OWASP Cloud ‐ 10 Project]] to contribute to the development of Common Assurance Metrics for ENISA's [http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-information-assurance-framework?searchterm=cloud Cloud Computing Information Assurance Framework]. See also the [http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment Cloud Computing Risk Assessment] report.&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Personal Information Online Code of Practice|Personal Information Online COP]]&lt;br /&gt;
| 5 Mar 2010&lt;br /&gt;
| Legislation&lt;br /&gt;
| In Progress&lt;br /&gt;
| Provide response to UK Information Commissioner's Office draft &amp;quot;Personal Information Online Code of Practice&amp;quot;&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[:Industry:Draft_NIST_SP_800-37_Revision_1|NIST SP 800-37 Revision 1 FPD]]&lt;br /&gt;
| 31 Dec 2009&lt;br /&gt;
| Standards&lt;br /&gt;
| In Progress&lt;br /&gt;
| Provide response to &amp;quot;NIST SP 800-37 Revision 1 Final Public Draft: Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach&amp;quot;&lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.spva.org Secure POS Vendor Alliance (SPVA)]&lt;br /&gt;
| -&lt;br /&gt;
| Outreach&lt;br /&gt;
| In Progress&lt;br /&gt;
| Begin dialogue about possibility of working together &lt;br /&gt;
| DC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Completed Items ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
! Task&lt;br /&gt;
! Completed&lt;br /&gt;
! Type&lt;br /&gt;
! Status&lt;br /&gt;
! Description&lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| [[:Industry:Draft_NIST_SP_800-37_Revision_1|NIST SP 800-37 Revision 1 FPD]] Review Project&lt;br /&gt;
| 30 Dec 2009&lt;br /&gt;
| Standards&lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;NIST SP 800-37 Revision 1 Final Public Draft, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach&amp;quot;&lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.crest-approved.org/ CREST] CRESTCon&lt;br /&gt;
| 15 Dec 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed &lt;br /&gt;
| Already an oversubscribed event, YP &amp;amp; CW have been placed on the reserve list. Update: Positions secured for the 15th.&lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://msdn.microsoft.com/en-us/security/cc448177.aspx SDL Pro Network]&lt;br /&gt;
| 30 Nov 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Contact SDL Pro Network to discuss if there are opportunities for OWASP to become involved or connected in some way&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST IR 7628|Draft NIST IR 7628]]&lt;br /&gt;
| 25 Nov 2009&lt;br /&gt;
| Standards&lt;br /&gt;
| Closed&lt;br /&gt;
| Provide response to &amp;quot;NIST IR 7628 Draft Smart Grid Cyber Security Strategy and Requirements&amp;quot;&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_DC_2009 Appsec DC 2009]&lt;br /&gt;
| 10-13 Nov 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Conference organisation - special effort to engage with US Federal sector&lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.justice.gov.uk/ UK Ministry of Justice]&lt;br /&gt;
| -&lt;br /&gt;
| Legislation&lt;br /&gt;
| Closed&lt;br /&gt;
| Ask to be added to official consultation list&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.it-sa.de/ IT-SA]&lt;br /&gt;
| 13-15 Oct 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| OWASP booth at trade show&lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_Germany_2009_Conference OWASP AppSec Germany 2009]&lt;br /&gt;
| 13 Oct 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Conference organisation&lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress]&lt;br /&gt;
| 28 Sep 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Presentation about OWASP&lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_Ireland_AppSec_2009_Conference OWASP Ireland AppSec 2009]&lt;br /&gt;
| 10 Sep 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Conference organisation&lt;br /&gt;
| EK&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Citations&lt;br /&gt;
| 7 Sep 2009&lt;br /&gt;
| Other&lt;br /&gt;
| Closed&lt;br /&gt;
| Identify and record the most important references to OWASP in official, or otherwise important, documents. Page created at: [[Industry:Citations]]&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress]&lt;br /&gt;
| 26 Aug 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Presentation about OWASP&lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| OWASP webcast at Brighttalk [http://www.brighttalk.com/summit/dataprivacy2 Data and Privacy in Web 2.0 Summit]&lt;br /&gt;
| 13 Aug 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Deliver [http://www.brighttalk.com/webcasts/4767/attend OWASP presentation on XSS, client side exploitation, and countermeasures].&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:SAFECode Secure Development Practices (update to Oct 2008 version)|SAFECode Secure Development Practices (update to Oct 2008 version)]]&lt;br /&gt;
| 31 Jul 2009&lt;br /&gt;
| Standards&lt;br /&gt;
| Closed&lt;br /&gt;
| Response to [http://www.safecode.org/ SAFECode] &amp;quot;Fundamental Practices for Secure Software Development: A Guide to the Most Effective Secure Development Practices in Use Today.&amp;quot;&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_CSA_Project OWASP CSA Project]&lt;br /&gt;
| 8 Jul 2009&lt;br /&gt;
| Standards&lt;br /&gt;
| Closed&lt;br /&gt;
| Response to RFC [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Cloud Security Alliance Guidance v1.0]&lt;br /&gt;
| TB&lt;br /&gt;
|-&lt;br /&gt;
| [[Scotland]]&lt;br /&gt;
| 25 Jun 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-scotland-industry-committee-june-2009.ppt]] and written notes [[Image:Owasp-scotland-industry-committee-june-2009-notes.pdf]])&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Presentation at [http://cfp2009.org/ CFP Con 2009]&lt;br /&gt;
| 1 Jun 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Deliver presentation on web threats and countermeasures.  See [http://www.cfp2009.org/wiki/index.php/Tutorials/Workshops CFP tutorial page] grep OWASP for more info.&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| ENISA [http://www.enisa.europa.eu/pages/02_03_news_2009_02_19_who_is_who.html Who-Is-Who Directory]&lt;br /&gt;
| -&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Contact ENISA regarding OWASP inclusion in directory (in progress). Encourage European chapter leaders to contact their ENISA liaison officers (completed). Contact UK liaison officer on behalf of London, Leeds and Scotland chapters.&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| IIL [http://www.iilondon.co.uk/ Insurance Institute of London]&lt;br /&gt;
| 2 Jun 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Contact IIL regarding future input to their publication [http://www.iilondon.co.uk/XtraCart/store/comersus_viewItem.asp?idProduct=187 Insurance Aspects of E-Commerce]&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-118|Draft NIST SP 800-118]]&lt;br /&gt;
| 29 May 2009&lt;br /&gt;
| Standards&lt;br /&gt;
| Closed&lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-118 Guide to Enterprise Password Management&amp;quot;&lt;br /&gt;
| CW/EK/RB/DC&lt;br /&gt;
|-&lt;br /&gt;
| German IT Industry Association&lt;br /&gt;
| 15 May 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Presentation on OWASP&lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://docs.google.com/Present?docid=ddkr62qv_171cd7gh5fb&amp;amp;skipauth=true Outreach Presentation to Frontier Airlines]&lt;br /&gt;
| 7 May 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Provide outreach presentation covering fundamentals of AppSec and Intro to OWASP&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 10012|DPC BS 10012]]&lt;br /&gt;
| 31 Mar 2009&lt;br /&gt;
| Standards&lt;br /&gt;
| Closed&lt;br /&gt;
| Provide response to &amp;quot;BS 10012 Specification for the management of personal information in compliance with the Data Protection Act 1998&amp;quot; Draft for Public Comment (DPC)&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-53 Revision 3|Draft NIST SP 800-53 Revision 3]]&lt;br /&gt;
| 27 Mar 2009&lt;br /&gt;
| Standards&lt;br /&gt;
| Closed&lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-53 (Revision 3) Recommended Security Controls for Federal Information Systems and Organizations&amp;quot;&lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-122|Draft NIST SP 800-122]]&lt;br /&gt;
| 13 Mar 2009&lt;br /&gt;
| Standards&lt;br /&gt;
| Closed&lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)&amp;quot;&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[London]]&lt;br /&gt;
| 12 Mar 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-london-industry-committee-march-2009.ppt]] and written notes [[Image:Owasp-london-industry-committee-march-2009-notes.pdf]])&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Digital Britain Interim Report|Digital Britain Interim Report]]&lt;br /&gt;
| 11 Mar 2009&lt;br /&gt;
| Legislation&lt;br /&gt;
| Closed&lt;br /&gt;
| Provide response to UK Government's &amp;quot;Digital Britain Interim Report Jan 2009&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Front Range]&lt;br /&gt;
| 5 Mar 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Conference organisation&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.commerce.gov/ Department of Commerce]&lt;br /&gt;
| 25 Feb 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Presentation about OWASP to Economic Security Working Group&lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 8878:2009|DPC BS 8878:2009]]&lt;br /&gt;
| 31 Jan 2009&lt;br /&gt;
| Standards&lt;br /&gt;
| Closed&lt;br /&gt;
| Provide response to &amp;quot;BS 8878:2009 Web accessibility. Building accessible experiences for disabled people&amp;quot; Draft for Public Comment (DPC)&lt;br /&gt;
| Puneet/CW&lt;br /&gt;
|-&lt;br /&gt;
| AppSec Presentation Delivered to Infragard, Dec 2008 &lt;br /&gt;
| Dec 2008&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| [http://www.infragard.net/ Infragard] is a collaboration between the US FBI and maintainers of critical infrastructure.  [http://docs.google.com/Present?docid=ddkr62qv_0cn7km4c3&amp;amp;skipauth=true Presentation here].  Email DC for full PPT with speaker notes&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| The Register [http://www.theregister.co.uk/2008/11/22/google_analytics_as_security_risk/ Google Analytics — Yes, it is a security risk]&lt;br /&gt;
| Nov 2008&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Co-ordination of response and provision of comments from OWASP leaders about risk of JavaScript on Barack Obama's website&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== General Presentations and Reports ===&lt;br /&gt;
&lt;br /&gt;
[[Summit_2009]]&lt;br /&gt;
* Global Industry Committee Presentation [[Image:Owasp-summit2009-industry-committee.ppt]]&lt;br /&gt;
&lt;br /&gt;
Summaries (for inclusion into other full OWASP presentations):&lt;br /&gt;
* Sep 2009 [[Image:Owasp-industry-committee-summary-september-2009.ppt]]&lt;br /&gt;
* Jul 2009 [[Image:Owasp-industry-committee-summary-july-2009.ppt]]&lt;br /&gt;
* May 2009 [[Image:Owasp-industry-committee-summary-may-2009.ppt]]&lt;br /&gt;
* Apr 2009 [[Image:Owasp-industry-committee-summary-april-2009.ppt]]&lt;br /&gt;
* Mar 2009 [[Image:Owasp-industry-committee-summary-march-2009.ppt]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Other [http://www.owasp.org/index.php/Global_Committee_Pages Global Committees]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_I&amp;diff=75498</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Appendix I</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_I&amp;diff=75498"/>
				<updated>2009-12-24T21:39:23Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
PARTNERSHIPS, OUTSOURCING ARRANGEMENTS, SUPPLY CHAIN EXCHANGES&lt;br /&gt;
&lt;br /&gt;
For Appendix I, my major comment is that it did not seem to have covered issues with outsourced application development, which happens a lot. In this scenario, you could provide the service provider with your security requirements and standards. But you may have to rely on the service provider to choose and implement the security controls. It is probably necessary to conduct a review of the chosen security controls before they are implemented. And eventually, the steps of &amp;quot;assess security controls&amp;quot; and &amp;quot;authorize information systems&amp;quot; would need to be conducted by internal people. Furthermore, security code review need to be conducted if the service provider has development software code that is deemed critical from a security perspective. -William Zhang&lt;br /&gt;
&lt;br /&gt;
== APPENDIX I SECURITY CONTROLS IN EXTERNAL ENVIRONMENTS  ==&lt;br /&gt;
&lt;br /&gt;
[https://buildsecurityin.us-cert.gov/swa/downloads/ContractLanguage_ID_DH_090806.pdf Software Assurance in Acquisition and Contract Language] Version 1.1 July 31, 2009. &lt;br /&gt;
Integrating software security in the acquisition life cycle promotes the acquisition of secure software. This version includes sample SwA Request for Proposal (RFP)/ Contract language. Buyers and evaluators of software and suppliers can gain security risk-based insight. They can put suppliers on notice that consumers are concerned about software security and the risks to their organizations that are attributable to exploitable software. &lt;br /&gt;
&lt;br /&gt;
[https://buildsecurityin.us-cert.gov/swa/downloads/DueDiligenceMWV12_01AM090909.pdf Software Supply Chain Risk Management and Due Diligence] Version 1.2 June 16, 2009. &lt;br /&gt;
Software security enhanced due-diligence is a critical element of software supply chain risk management. Buyers and evaluators of software and services can gain security risk-based insight. They can put suppliers on notice that consumers are concerned about software security and the risks to their organizations that are attributable to exploitable software.&lt;br /&gt;
&lt;br /&gt;
[https://buildsecurityin.us-cert.gov/swa/downloads/SwA_in_Acquisition_102208.pdf Software Assurance in Acquisition: Mitigating Risks to the Enterprise] &amp;quot;... provides information on how to incorporate SwA considerations in key decisions and how to exercise due diligence throughout the acquisition process relative to potential risk exposures that could be introduced by the supply chain.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[http://www.sans.org/appseccontract/ Application Security Procurement Language]. These guidelines incorporate substantial language from the [https://www.owasp.org/index.php/OWASP_Secure_Software_Contract_Annex OWASP Secure Software Contract Annex]. These ... enable buyers of custom software to more explicitly focus on the responsibilities of code writers for checking the code and for fixing security flaws before software is delivered. The sample procurement language ... addresses: &lt;br /&gt;
&lt;br /&gt;
*Personnel, Security Training, Background Checks of Developers, Vulnerabilities, Risks and Threats, and Application Development. &lt;br /&gt;
*Development environment: Secure Coding, Configuration Management, Distribution, Disclosure, and Evaluation. &lt;br /&gt;
*Testing: test planning, source code reviews, as well as vulnerability and penetration tests. &lt;br /&gt;
*Patches and Updates, along with notification and testing of those modifications to the software. &lt;br /&gt;
*Tracking Security Issues. - vendor ... “certification package” that establishes the security requirements, design, implementation, and test results were properly completed and all security issues were resolved appropriately. Its provisions include specifying that the developer is to warrant that the software shall not contain any code that does not support a software requirement and weakens the security of the application, including computer viruses, worms, time bombs, back doors, Trojan horses, Easter eggs, and all other forms of malicious code. It offers procurement language for how security issues will be investigated.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
See Software Assurance [https://buildsecurityin.us-cert.gov/swa/acqwg.html Acquisition and Outsourcing Working Group].  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;--[[User:Walter Houser|Walter Houser]] 23:22, 19 December 2009 (UTC) &lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_F&amp;diff=75497</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Appendix F</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_F&amp;diff=75497"/>
				<updated>2009-12-24T20:55:02Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: /* F.1  AUTHORIZATION PACKAGE */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;APPENDIX F&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''SECURITY AUTHORIZATION'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AUTHORIZATION DECISIONS AND SUPPORTING EVIDENCE&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== F.1  AUTHORIZATION PACKAGE ==&lt;br /&gt;
&amp;quot;a risk assessment, privacy impact assessment, system interconnection agreements, contingency plan, security configurations, configuration management plan, incident response plan, and continuous monitoring strategy&amp;quot;&lt;br /&gt;
:None of the links seem to provide a clear definition and requirements for each of these items. Does it exist? If not, I would think it would make for much more streamlined and complete security package submissions -Wade Woolwine&lt;br /&gt;
&lt;br /&gt;
&amp;quot;(i) a vulnerability scan of the information system or vulnerability assessment of the environment of operation; (ii) new threat information; (iii) weaknesses or deficiencies discovered in currently deployed security controls after an information system breach; (iv) a redefinition of mission priorities or business objectives invalidating the results of the previous security categorization process; and (v) a change in the information system (e.g., adding new hardware, software, or firmware; establishing new connections) or its environment of operation (e.g., moving to a new facility).&amp;quot;&lt;br /&gt;
:Should this specifically call out new code drops for custom applications? Software is listed as part of (v) but doesn't do much to call it out specifically. -Wade Woolwine&lt;br /&gt;
&lt;br /&gt;
== F.2  AUTHORIZATION DECISIONS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Authorization to Operate ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Denial of Authorization to Operate ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== F.3  AUTHORIZATION DECISION DOCUMENT ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== F.4  ONGOING AUTHORIZATION ==&lt;br /&gt;
&lt;br /&gt;
In the second paragraph of page F-7 a definition is offered for significant change, the text reads &amp;quot;A significant change is defined as a change that has the potential to affect the security state of an information system.&amp;quot;  This definition is overbroad and includes almost any activity on a computer as all activity has the potential to affect the security state of the system.  The threshold should be raised to either &amp;quot;a change that is likely to affect&amp;quot; or &amp;quot;a change that has the potential to significantly affect&amp;quot;. [[User:Dan Philpott|Dan Philpott]] 04:36, 9 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
The risk with providing this definition and its illustrative examples can be to disincentivize improvements in security or functionality. NIST has previously not defined &amp;quot;significant change,&amp;quot; leaving the decision to reauthorize after such a change entirely to the agencies' discretion.  This has led many to consider that no change needs to rise to significance, largely to avoid reauthorization. Or agencies may delay valuable upgrades to avoid triggering the reauthorization process.  Reauthorization should only be triggered in the event of a fundamental transfomation of the system's architecture, mission, or technology. The events cited in the draft appear routine and can be reasonably documented in the SSP and tested as part of the continuous monitoring process. [[User:Walter Houser|Walter Houser]] 19:33, 19 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
Text of the examples in the event-driven reauthorizations paragraph (page F-7) should reflect that the examples are only significant when they meet the threshold established in the definition of significant change.  Otherwise misreading of the lines is likely to occur with the affect of causing unnecessary effort without worthwhile security gains. [[User:Dan Philpott|Dan Philpott]] 04:36, 9 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
Footnote 63 should add the word can between &amp;quot;action include&amp;quot; unless the requirement is to always have both the Risk Executive (Function) and SISO/CISO provide input whenever the decision to initiate a formal reauthorization is made.  This could cause unnecessary effort for an AO who is making the decision to initiate reauthorization for a system and reduce the likelihood it will occur. [[User:Dan Philpott|Dan Philpott]] 04:36, 9 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75496</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Chapter 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75496"/>
				<updated>2009-12-24T20:39:29Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: /* Supplemental Guidance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;CHAPTER THREE&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''THE PROCESS'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
EXECUTING THE RISK MANAGEMENT FRAMEWORK TASKS&lt;br /&gt;
&lt;br /&gt;
As an overall comment I find that the blocks of text making up these tasks are too dense and need to be broken up into shorter, more targetted segments.  NIST SP 800-53r3 made excellent use of exploding out lists which had previously been embedded in paragraphs (e.g., (i) ..., (ii) ..., etc.).  Reading security documents is often difficult for people who feel overwhelmed trying to link the different data elements into a comprehensive picture. Good writing practice and formatting can make reading dense guidance wording easier, much as good writing and formatting can make reading source code easier.  [[User:Dan Philpott|Dan Philpott]] 04:10, 8 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== APPLICATION OF THE RISK MANAGEMENT FRAMEWORK ===&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;Execution of the RMF tasks by common control providers, both internal and external to the organization, helps to ensure that the security capabilities provided by the common controls can be inherited by information system owners with a known degree of assurance.&amp;quot;  The issue here is the reference to a known degree of assurance.  How is the degree of assurance known?  Often organizations have no insight into the security operations of a common control provider or information system from which controls are inherited.  To state that the degree of assurance is known may not be accurate.  At best the degree of assurance can be estimated based on the level of trust one has in the controls provider, but trust is an inherently unmeasurable quality.  Recommend restating &amp;quot;common controls can be inherited by information system owners with an appropriate level of trust.&amp;quot; [[User:Dan Philpott|Dan Philpott]] 03:28, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
:Playing Devil's Advocate here, how can an &amp;quot;appropriate level of trust&amp;quot; be considered to be more of a &amp;quot;known&amp;quot; factor than knowing your degree of assurance?  Either measure requires trusting the entity providing the &amp;quot;assurance&amp;quot; to have done their due diligence and thoroughly, at that. Taking this into consideration, the solution doesn't really change anything. - Jack Mannino&lt;br /&gt;
&lt;br /&gt;
::You're right of course, neither is anything like an objective measure.  The only difference is that level of trust is a concept woven into FISMA guidance and has guidance available for establishing a subjective 'level of trust' or 'chain of trust'.  NIST SP 800-53r3 even includes a control called Trustworthiness (SA-13). I'm not a fan of either of these subjective measures but at least with the level of trust there is some guidance to work with. [[User:Dan Philpott|Dan Philpott]] 20:35, 24 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
== 3.1 RMF STEP 1 - CATEGORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-1 SECURITY CATEGORIZATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
The task &amp;quot;Categorize the information system and document the results of the security categorization in the security plan.&amp;quot; varies the order of activities slightly from the NIST SP 800-18r1 description of the process, &amp;quot;Before the system security plan can be developed, the information system and the information resident within that system must be categorized based on a FIPS 199 impact analysis. Then a determination can be made as to which systems in the inventory can be logically grouped into major applications or general support systems.&amp;quot;  In general the security categorization is separately documented and then eventually recorded in the security plan.  Recommend including in the Supplemental Guidance that recording the categorization does not have to initially be done in the security plan but it should be included in the security plan eventually.  [[User:Dan Philpott|Dan Philpott]] 03:42, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;The security categorization process is conducted as an organization-wide activity taking into consideration the enterprise architecture and the information security architecture.&amp;quot;  The wording of this line may cause confusion and impose an unnecessary burden on those with primary responsibility for conducting security categorization.  The categorization process has organization-wide influences and impacts but for systems is conducted primarily at the system level. It may later be reviewed and adjusted by others but the activity of the categorization is local.  By stating it is an organization-wide activity the burden is then to have all those listed with primary responsibility and supporting roles involved in all levels of the activity.  Recommend the sentence be changed to &amp;quot;The security categorization process takes potential adverse impacts to organizational operations, organizational assets, individuals, other organizations, and the Nation as well as organization-wide guidance into consideration including the enterprise architecture and the information security architecture.&amp;quot;  This would also obviate the need for the final sentence of this Supplemental Guidance. [[User:Dan Philpott|Dan Philpott]] 04:03, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-2 INFORMATION SYSTEM DESCRIPTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
Inclusion of the Risk Executive (Function) may be indicated.  As grouping of systems in the organizational inventory into an information system is often a function of determining which have related risks the organizational function which coordinates the holistic assessment of risk may play a role.  Recommend considering whether the Risk Executive (Function) should be included in the Supporting Roles for Task 1-2. [[User:Dan Philpott|Dan Philpott]] 04:11, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;A typical system description may include, for example:&amp;quot;.  Use of the word typical in this instance implies that all of the below should be included to be 'typical'.  The later modifiers, 'may include' and 'for example' indicate this is not the case.  Recommend rephrasing the line to &amp;quot;A system description may include, for example:&amp;quot;. [[User:Dan Philpott|Dan Philpott]] 04:27, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
In the bullet point, &amp;quot;- Cross domain devices/requirements; &amp;quot; The term 'cross domain' is a term that may not be familiar to many FISMA practitioners and may be a reference to multi-level security.  Recommend including an entry for 'Cross Domain' in the glossary. [[User:Dan Philpott|Dan Philpott]] 04:27, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
As organizations implement dynamic subsystems it will be more important to include a reference to the data resource that contains all of the system's inventory of subsystems instead of trying to include that highly dynamic data in the information system description itself.  Recommend including a bullet point indicating a reference to a real-time inventory of subsystems resource be included in the system description where appropriate.  [[User:Dan Philpott|Dan Philpott]] 04:27, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-3 INFORMATION SYSTEM REGISTRATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the lines &amp;quot;Those subsystems that are more dynamic in nature (e.g., subsystems in net-centric architectures) may not be present throughout all phases of the system development life cycle. For such subsystems, it may not be possible to complete all registration information. Some information about dynamic subsystems is known prior to the subsystem manifesting itself in the information system (e.g., assumptions and constraints specified in the security plan). However, more detailed information may not be known until the subsystem manifests itself. &amp;quot;  This is confused and adds little of value beyond the statement that some dynamic subsystems may not be able to complete all registration information. As most dynamic subsystems are likely to be part of better defined systems the inclusion of a description of the issue may not be useful to include here. Recommend providing guidance to organizations that says dynamic subsystems should be registered either as a subset of a better defined complex system or that a method of dynamic registration for dynamic subsystems be implemented which includes as much information as feasible. [[User:Dan Philpott|Dan Philpott]] 04:46, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
A reference to NIST SP 800-53 Revision 3 may be worth including here.  This task appears related to the Program Management family's PM-5 control (Information System Inventory) in Appendix G. Also, OMB's yearly guidance on FISMA reporting requires an inventory of systems and this is a task directly related to the creation of an inventory of systems. Recommend considering inclusion of these documents as references. [[User:Dan Philpott|Dan Philpott]] 04:35, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.2 RMF STEP 2 - SELECT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-1 SECURITY CONTROL SELECTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-2 COMMON CONTROL IDENTIFICATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Organizations may choose to defer common control identification and security control selection until later in the system development life cycle.&amp;quot;&lt;br /&gt;
While it is stated that organizations can defer identification of common controls and security controls until later in the development life cycle, the guidance does not state whether finite points in the development life cycle exist as to when this activity can be deferred.  Recommend consideration of the ramifications of this language, with the inclusion of language mandating when this activity must be performed (example- prior to implementation in a production environment). -Jack Mannino&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-3 MONITORING STRATEGY ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
Within this section, there is a great deal of language highlighting the reliance (or over-reliance) on the use of automation to monitor security controls implementation.  While automation does indeed permit the average organization to increase the frequency and efficiency of monitoring, automation cannot be fully trusted as a foolproof measure to identifying security deficiencies or non-compliance in any way, shape, or form.  Recommend the inclusion of a requirement to identify target areas that cannot be fully automated, and to develop manual processes and the frequencies in which they will be performed, within levels of effort proportionate to an organization's alloted resources.  Also recommend that a reference be made to performing gap-analysis to identify areas relevant to an organization that cannot be adequately addressed via automated means, which has the potential to lead to a greater level of accountability as well as more a more holistic overall approach to security. -Jack Mannino&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-4 SECURITY PLAN APPROVAL ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #2 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.3 RMF STEP 3 - IMPLEMENT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-1 SECURITY CONTROL IMPLEMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-2 SECURITY CONTROL DOCUMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #3 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.4 RMF STEP 4 - ASSESS SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-1 ASSESSMENT PREPARATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-2 SECURITY CONTROL ASSESSMENT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-3 SECURITY ASSESSMENT REPORT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #4 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.5 RMF STEP 5 - AUTHORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-1 REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-2 PLAN OF ACTION AND MILESTONES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-3 SECURITY AUTHORIZATION PACKAGE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-4 RISK DETERMINATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-5 RISK ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the line: &amp;quot;Security authorization decisions are based on the content of the security authorization package and, where appropriate, any inputs received from key organizational officials, including the risk executive (function).&amp;quot; The word 'key' implies that the list of organizational officials the authorizing official can receive input from are limited to those defined in Appendix D/listed as primary or supporting roles.  This unnecessarily limits the resources authorizing officials can draw upon to inform their decision.  An example of where this would be a problem would be if an authorizing official did not sufficiently understand a technology or policy issue and consulted with anyone outside of the defined list of roles for background information.  Limiting this kind of interaction would lower the quality of authorization decisions with a likely outcome of poorer security being implemented.  Recommend removal of the word 'key' from the sentence. [[User:Dan Philpott|Dan Philpott]] 04:09, 23 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #5 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.6 RMF STEP 6 - MONITOR SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-1 INFORMATION SYSTEM AND ENVIRONMENT CHANGES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-2 ONGOING SECURITY CONTROL ASSESSMENTS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-3 ONGOING REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-4 CRITICAL UPDATES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-5 SECURITY STATUS REPORTING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-6 ONGOING RISK DETERMINATION AND ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-7 INFORMATION SYSTEM REMOVAL AND DECOMMISSIONING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #6 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75495</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Chapter 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75495"/>
				<updated>2009-12-24T20:39:01Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: /* Supplemental Guidance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;CHAPTER THREE&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''THE PROCESS'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
EXECUTING THE RISK MANAGEMENT FRAMEWORK TASKS&lt;br /&gt;
&lt;br /&gt;
As an overall comment I find that the blocks of text making up these tasks are too dense and need to be broken up into shorter, more targetted segments.  NIST SP 800-53r3 made excellent use of exploding out lists which had previously been embedded in paragraphs (e.g., (i) ..., (ii) ..., etc.).  Reading security documents is often difficult for people who feel overwhelmed trying to link the different data elements into a comprehensive picture. Good writing practice and formatting can make reading dense guidance wording easier, much as good writing and formatting can make reading source code easier.  [[User:Dan Philpott|Dan Philpott]] 04:10, 8 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== APPLICATION OF THE RISK MANAGEMENT FRAMEWORK ===&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;Execution of the RMF tasks by common control providers, both internal and external to the organization, helps to ensure that the security capabilities provided by the common controls can be inherited by information system owners with a known degree of assurance.&amp;quot;  The issue here is the reference to a known degree of assurance.  How is the degree of assurance known?  Often organizations have no insight into the security operations of a common control provider or information system from which controls are inherited.  To state that the degree of assurance is known may not be accurate.  At best the degree of assurance can be estimated based on the level of trust one has in the controls provider, but trust is an inherently unmeasurable quality.  Recommend restating &amp;quot;common controls can be inherited by information system owners with an appropriate level of trust.&amp;quot; [[User:Dan Philpott|Dan Philpott]] 03:28, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
:Playing Devil's Advocate here, how can an &amp;quot;appropriate level of trust&amp;quot; be considered to be more of a &amp;quot;known&amp;quot; factor than knowing your degree of assurance?  Either measure requires trusting the entity providing the &amp;quot;assurance&amp;quot; to have done their due diligence and thoroughly, at that. Taking this into consideration, the solution doesn't really change anything. - Jack Mannino&lt;br /&gt;
&lt;br /&gt;
::You're right of course, neither is anything like an objective measure.  The only difference is that level of trust is a concept woven into FISMA guidance and has guidance available for establishing a subjective 'level of trust' or 'chain of trust'.  NIST SP 800-53r3 even includes a control called Trustworthiness (SA-13). I'm not a fan of either of these subjective measures but at least with the level of trust there is some guidance to work with. [[User:Dan Philpott|Dan Philpott]] 20:35, 24 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
== 3.1 RMF STEP 1 - CATEGORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-1 SECURITY CATEGORIZATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
The task &amp;quot;Categorize the information system and document the results of the security categorization in the security plan.&amp;quot; varies the order of activities slightly from the NIST SP 800-18r1 description of the process, &amp;quot;Before the system security plan can be developed, the information system and the information resident within that system must be categorized based on a FIPS 199 impact analysis. Then a determination can be made as to which systems in the inventory can be logically grouped into major applications or general support systems.&amp;quot;  In general the security categorization is separately documented and then eventually recorded in the security plan.  Recommend including in the Supplemental Guidance that recording the categorization does not have to initially be done in the security plan but it should be included in the security plan eventually.  [[User:Dan Philpott|Dan Philpott]] 03:42, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;The security categorization process is conducted as an organization-wide activity taking into consideration the enterprise architecture and the information security architecture.&amp;quot;  The wording of this line may cause confusion and impose an unnecessary burden on those with primary responsibility for conducting security categorization.  The categorization process has organization-wide influences and impacts but for systems is conducted primarily at the system level. It may later be reviewed and adjusted by others but the activity of the categorization is local.  By stating it is an organization-wide activity the burden is then to have all those listed with primary responsibility and supporting roles involved in all levels of the activity.  Recommend the sentence be changed to &amp;quot;The security categorization process takes potential adverse impacts to organizational operations, organizational assets, individuals, other organizations, and the Nation as well as organization-wide guidance into consideration including the enterprise architecture and the information security architecture.&amp;quot;  This would also obviate the need for the final sentence of this Supplemental Guidance. [[User:Dan Philpott|Dan Philpott]] 04:03, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-2 INFORMATION SYSTEM DESCRIPTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
Inclusion of the Risk Executive (Function) may be indicated.  As grouping of systems in the organizational inventory into an information system is often a function of determining which have related risks the organizational function which coordinates the holistic assessment of risk may play a role.  Recommend considering whether the Risk Executive (Function) should be included in the Supporting Roles for Task 1-2. [[User:Dan Philpott|Dan Philpott]] 04:11, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;A typical system description may include, for example:&amp;quot;.  Use of the word typical in this instance implies that all of the below should be included to be 'typical'.  The later modifiers, 'may include' and 'for example' indicate this is not the case.  Recommend rephrasing the line to &amp;quot;A system description may include, for example:&amp;quot;. [[User:Dan Philpott|Dan Philpott]] 04:27, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
In the bullet point, &amp;quot;- Cross domain devices/requirements; &amp;quot; The term 'cross domain' is a term that may not be familiar to many FISMA practitioners and may be a reference to multi-level security.  Recommend including an entry for 'Cross Domain' in the glossary. [[User:Dan Philpott|Dan Philpott]] 04:27, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
As organizations implement dynamic subsystems it will be more important to include a reference to the data resource that contains all of the system's inventory of subsystems instead of trying to include that highly dynamic data in the information system description itself.  Recommend including a bullet point indicating a reference to a real-time inventory of subsystems resource be included in the system description where appropriate.  [[User:Dan Philpott|Dan Philpott]] 04:27, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-3 INFORMATION SYSTEM REGISTRATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the lines &amp;quot;Those subsystems that are more dynamic in nature (e.g., subsystems in net-centric architectures) may not be present throughout all phases of the system development life cycle. For such subsystems, it may not be possible to complete all registration information. Some information about dynamic subsystems is known prior to the subsystem manifesting itself in the information system (e.g., assumptions and constraints specified in the security plan). However, more detailed information may not be known until the subsystem manifests itself. &amp;quot;  This is confused and adds little of value beyond the statement that some dynamic subsystems may not be able to complete all registration information. As most dynamic subsystems are likely to be part of better defined systems the inclusion of a description of the issue may not be useful to include here. Recommend providing guidance to organizations that says dynamic subsystems should be registered either as a subset of a better defined complex system or that a method of dynamic registration for dynamic subsystems be implemented which includes as much information as feasible. [[User:Dan Philpott|Dan Philpott]] 04:46, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
A reference to NIST SP 800-53 Revision 3 may be worth including here.  This task appears related to the Program Management family's PM-5 control (Information System Inventory) in Appendix G. Also, OMB's yearly guidance on FISMA reporting requires an inventory of systems and this is a task directly related to the creation of an inventory of systems. Recommend considering inclusion of these documents as references. [[User:Dan Philpott|Dan Philpott]] 04:35, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.2 RMF STEP 2 - SELECT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-1 SECURITY CONTROL SELECTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-2 COMMON CONTROL IDENTIFICATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Organizations may choose to defer common control identification and security control selection until later in the system development life cycle.&amp;quot;&lt;br /&gt;
While it is stated that organizations can defer identification of common controls and security controls until later in the development life cycle, the guidance does not state whether finite points in the development life cycle exist as to when this activity can be deferred.  Recommend consideration of the ramifications of this language, with the inclusion of language mandating when this activity must be performed (example- prior to implementation in a production environment). -Jack Mannino&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-3 MONITORING STRATEGY ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-4 SECURITY PLAN APPROVAL ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #2 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.3 RMF STEP 3 - IMPLEMENT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-1 SECURITY CONTROL IMPLEMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-2 SECURITY CONTROL DOCUMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #3 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.4 RMF STEP 4 - ASSESS SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-1 ASSESSMENT PREPARATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-2 SECURITY CONTROL ASSESSMENT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-3 SECURITY ASSESSMENT REPORT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #4 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.5 RMF STEP 5 - AUTHORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-1 REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-2 PLAN OF ACTION AND MILESTONES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-3 SECURITY AUTHORIZATION PACKAGE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-4 RISK DETERMINATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-5 RISK ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the line: &amp;quot;Security authorization decisions are based on the content of the security authorization package and, where appropriate, any inputs received from key organizational officials, including the risk executive (function).&amp;quot; The word 'key' implies that the list of organizational officials the authorizing official can receive input from are limited to those defined in Appendix D/listed as primary or supporting roles.  This unnecessarily limits the resources authorizing officials can draw upon to inform their decision.  An example of where this would be a problem would be if an authorizing official did not sufficiently understand a technology or policy issue and consulted with anyone outside of the defined list of roles for background information.  Limiting this kind of interaction would lower the quality of authorization decisions with a likely outcome of poorer security being implemented.  Recommend removal of the word 'key' from the sentence. [[User:Dan Philpott|Dan Philpott]] 04:09, 23 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #5 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.6 RMF STEP 6 - MONITOR SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-1 INFORMATION SYSTEM AND ENVIRONMENT CHANGES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-2 ONGOING SECURITY CONTROL ASSESSMENTS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-3 ONGOING REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-4 CRITICAL UPDATES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-5 SECURITY STATUS REPORTING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-6 ONGOING RISK DETERMINATION AND ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-7 INFORMATION SYSTEM REMOVAL AND DECOMMISSIONING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #6 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75494</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Chapter 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75494"/>
				<updated>2009-12-24T20:36:16Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: /* APPLICATION OF THE RISK MANAGEMENT FRAMEWORK */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;CHAPTER THREE&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''THE PROCESS'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
EXECUTING THE RISK MANAGEMENT FRAMEWORK TASKS&lt;br /&gt;
&lt;br /&gt;
As an overall comment I find that the blocks of text making up these tasks are too dense and need to be broken up into shorter, more targetted segments.  NIST SP 800-53r3 made excellent use of exploding out lists which had previously been embedded in paragraphs (e.g., (i) ..., (ii) ..., etc.).  Reading security documents is often difficult for people who feel overwhelmed trying to link the different data elements into a comprehensive picture. Good writing practice and formatting can make reading dense guidance wording easier, much as good writing and formatting can make reading source code easier.  [[User:Dan Philpott|Dan Philpott]] 04:10, 8 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== APPLICATION OF THE RISK MANAGEMENT FRAMEWORK ===&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;Execution of the RMF tasks by common control providers, both internal and external to the organization, helps to ensure that the security capabilities provided by the common controls can be inherited by information system owners with a known degree of assurance.&amp;quot;  The issue here is the reference to a known degree of assurance.  How is the degree of assurance known?  Often organizations have no insight into the security operations of a common control provider or information system from which controls are inherited.  To state that the degree of assurance is known may not be accurate.  At best the degree of assurance can be estimated based on the level of trust one has in the controls provider, but trust is an inherently unmeasurable quality.  Recommend restating &amp;quot;common controls can be inherited by information system owners with an appropriate level of trust.&amp;quot; [[User:Dan Philpott|Dan Philpott]] 03:28, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
:Playing Devil's Advocate here, how can an &amp;quot;appropriate level of trust&amp;quot; be considered to be more of a &amp;quot;known&amp;quot; factor than knowing your degree of assurance?  Either measure requires trusting the entity providing the &amp;quot;assurance&amp;quot; to have done their due diligence and thoroughly, at that. Taking this into consideration, the solution doesn't really change anything. - Jack Mannino&lt;br /&gt;
&lt;br /&gt;
::You're right of course, neither is anything like an objective measure.  The only difference is that level of trust is a concept woven into FISMA guidance and has guidance available for establishing a subjective 'level of trust' or 'chain of trust'.  NIST SP 800-53r3 even includes a control called Trustworthiness (SA-13). I'm not a fan of either of these subjective measures but at least with the level of trust there is some guidance to work with. [[User:Dan Philpott|Dan Philpott]] 20:35, 24 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
== 3.1 RMF STEP 1 - CATEGORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-1 SECURITY CATEGORIZATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
The task &amp;quot;Categorize the information system and document the results of the security categorization in the security plan.&amp;quot; varies the order of activities slightly from the NIST SP 800-18r1 description of the process, &amp;quot;Before the system security plan can be developed, the information system and the information resident within that system must be categorized based on a FIPS 199 impact analysis. Then a determination can be made as to which systems in the inventory can be logically grouped into major applications or general support systems.&amp;quot;  In general the security categorization is separately documented and then eventually recorded in the security plan.  Recommend including in the Supplemental Guidance that recording the categorization does not have to initially be done in the security plan but it should be included in the security plan eventually.  [[User:Dan Philpott|Dan Philpott]] 03:42, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;The security categorization process is conducted as an organization-wide activity taking into consideration the enterprise architecture and the information security architecture.&amp;quot;  The wording of this line may cause confusion and impose an unnecessary burden on those with primary responsibility for conducting security categorization.  The categorization process has organization-wide influences and impacts but for systems is conducted primarily at the system level. It may later be reviewed and adjusted by others but the activity of the categorization is local.  By stating it is an organization-wide activity the burden is then to have all those listed with primary responsibility and supporting roles involved in all levels of the activity.  Recommend the sentence be changed to &amp;quot;The security categorization process takes potential adverse impacts to organizational operations, organizational assets, individuals, other organizations, and the Nation as well as organization-wide guidance into consideration including the enterprise architecture and the information security architecture.&amp;quot;  This would also obviate the need for the final sentence of this Supplemental Guidance. [[User:Dan Philpott|Dan Philpott]] 04:03, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-2 INFORMATION SYSTEM DESCRIPTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
Inclusion of the Risk Executive (Function) may be indicated.  As grouping of systems in the organizational inventory into an information system is often a function of determining which have related risks the organizational function which coordinates the holistic assessment of risk may play a role.  Recommend considering whether the Risk Executive (Function) should be included in the Supporting Roles for Task 1-2. [[User:Dan Philpott|Dan Philpott]] 04:11, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;A typical system description may include, for example:&amp;quot;.  Use of the word typical in this instance implies that all of the below should be included to be 'typical'.  The later modifiers, 'may include' and 'for example' indicate this is not the case.  Recommend rephrasing the line to &amp;quot;A system description may include, for example:&amp;quot;. [[User:Dan Philpott|Dan Philpott]] 04:27, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
In the bullet point, &amp;quot;- Cross domain devices/requirements; &amp;quot; The term 'cross domain' is a term that may not be familiar to many FISMA practitioners and may be a reference to multi-level security.  Recommend including an entry for 'Cross Domain' in the glossary. [[User:Dan Philpott|Dan Philpott]] 04:27, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
As organizations implement dynamic subsystems it will be more important to include a reference to the data resource that contains all of the system's inventory of subsystems instead of trying to include that highly dynamic data in the information system description itself.  Recommend including a bullet point indicating a reference to a real-time inventory of subsystems resource be included in the system description where appropriate.  [[User:Dan Philpott|Dan Philpott]] 04:27, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-3 INFORMATION SYSTEM REGISTRATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the lines &amp;quot;Those subsystems that are more dynamic in nature (e.g., subsystems in net-centric architectures) may not be present throughout all phases of the system development life cycle. For such subsystems, it may not be possible to complete all registration information. Some information about dynamic subsystems is known prior to the subsystem manifesting itself in the information system (e.g., assumptions and constraints specified in the security plan). However, more detailed information may not be known until the subsystem manifests itself. &amp;quot;  This is confused and adds little of value beyond the statement that some dynamic subsystems may not be able to complete all registration information. As most dynamic subsystems are likely to be part of better defined systems the inclusion of a description of the issue may not be useful to include here. Recommend providing guidance to organizations that says dynamic subsystems should be registered either as a subset of a better defined complex system or that a method of dynamic registration for dynamic subsystems be implemented which includes as much information as feasible. [[User:Dan Philpott|Dan Philpott]] 04:46, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
A reference to NIST SP 800-53 Revision 3 may be worth including here.  This task appears related to the Program Management family's PM-5 control (Information System Inventory) in Appendix G. Also, OMB's yearly guidance on FISMA reporting requires an inventory of systems and this is a task directly related to the creation of an inventory of systems. Recommend considering inclusion of these documents as references. [[User:Dan Philpott|Dan Philpott]] 04:35, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.2 RMF STEP 2 - SELECT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-1 SECURITY CONTROL SELECTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-2 COMMON CONTROL IDENTIFICATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-3 MONITORING STRATEGY ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-4 SECURITY PLAN APPROVAL ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #2 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.3 RMF STEP 3 - IMPLEMENT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-1 SECURITY CONTROL IMPLEMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-2 SECURITY CONTROL DOCUMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #3 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.4 RMF STEP 4 - ASSESS SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-1 ASSESSMENT PREPARATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-2 SECURITY CONTROL ASSESSMENT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-3 SECURITY ASSESSMENT REPORT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #4 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.5 RMF STEP 5 - AUTHORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-1 REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-2 PLAN OF ACTION AND MILESTONES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-3 SECURITY AUTHORIZATION PACKAGE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-4 RISK DETERMINATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-5 RISK ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the line: &amp;quot;Security authorization decisions are based on the content of the security authorization package and, where appropriate, any inputs received from key organizational officials, including the risk executive (function).&amp;quot; The word 'key' implies that the list of organizational officials the authorizing official can receive input from are limited to those defined in Appendix D/listed as primary or supporting roles.  This unnecessarily limits the resources authorizing officials can draw upon to inform their decision.  An example of where this would be a problem would be if an authorizing official did not sufficiently understand a technology or policy issue and consulted with anyone outside of the defined list of roles for background information.  Limiting this kind of interaction would lower the quality of authorization decisions with a likely outcome of poorer security being implemented.  Recommend removal of the word 'key' from the sentence. [[User:Dan Philpott|Dan Philpott]] 04:09, 23 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #5 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.6 RMF STEP 6 - MONITOR SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-1 INFORMATION SYSTEM AND ENVIRONMENT CHANGES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-2 ONGOING SECURITY CONTROL ASSESSMENTS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-3 ONGOING REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-4 CRITICAL UPDATES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-5 SECURITY STATUS REPORTING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-6 ONGOING RISK DETERMINATION AND ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-7 INFORMATION SYSTEM REMOVAL AND DECOMMISSIONING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #6 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75493</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Chapter 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75493"/>
				<updated>2009-12-24T20:35:50Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: /* APPLICATION OF THE RISK MANAGEMENT FRAMEWORK */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;CHAPTER THREE&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''THE PROCESS'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
EXECUTING THE RISK MANAGEMENT FRAMEWORK TASKS&lt;br /&gt;
&lt;br /&gt;
As an overall comment I find that the blocks of text making up these tasks are too dense and need to be broken up into shorter, more targetted segments.  NIST SP 800-53r3 made excellent use of exploding out lists which had previously been embedded in paragraphs (e.g., (i) ..., (ii) ..., etc.).  Reading security documents is often difficult for people who feel overwhelmed trying to link the different data elements into a comprehensive picture. Good writing practice and formatting can make reading dense guidance wording easier, much as good writing and formatting can make reading source code easier.  [[User:Dan Philpott|Dan Philpott]] 04:10, 8 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== APPLICATION OF THE RISK MANAGEMENT FRAMEWORK ===&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;Execution of the RMF tasks by common control providers, both internal and external to the organization, helps to ensure that the security capabilities provided by the common controls can be inherited by information system owners with a known degree of assurance.&amp;quot;  The issue here is the reference to a known degree of assurance.  How is the degree of assurance known?  Often organizations have no insight into the security operations of a common control provider or information system from which controls are inherited.  To state that the degree of assurance is known may not be accurate.  At best the degree of assurance can be estimated based on the level of trust one has in the controls provider, but trust is an inherently unmeasurable quality.  Recommend restating &amp;quot;common controls can be inherited by information system owners with an appropriate level of trust.&amp;quot; [[User:Dan Philpott|Dan Philpott]] 03:28, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
:Playing Devil's Advocate here, how can an &amp;quot;appropriate level of trust&amp;quot; be considered to be more of a &amp;quot;known&amp;quot; factor than knowing your degree of assurance?  Either measure requires trusting the entity providing the &amp;quot;assurance&amp;quot; to have done their due diligence and thoroughly, at that. Taking this into consideration, the solution doesn't really change anything.&lt;br /&gt;
 - Jack Mannino&lt;br /&gt;
&lt;br /&gt;
::You're right of course, neither is anything like an objective measure.  The only difference is that level of trust is a concept woven into FISMA guidance and has guidance available for establishing a subjective 'level of trust' or 'chain of trust'.  NIST SP 800-53r3 even includes a control called Trustworthiness (SA-13). I'm not a fan of either of these subjective measures but at least with the level of trust there is some guidance to work with. [[User:Dan Philpott|Dan Philpott]] 20:35, 24 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
== 3.1 RMF STEP 1 - CATEGORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-1 SECURITY CATEGORIZATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
The task &amp;quot;Categorize the information system and document the results of the security categorization in the security plan.&amp;quot; varies the order of activities slightly from the NIST SP 800-18r1 description of the process, &amp;quot;Before the system security plan can be developed, the information system and the information resident within that system must be categorized based on a FIPS 199 impact analysis. Then a determination can be made as to which systems in the inventory can be logically grouped into major applications or general support systems.&amp;quot;  In general the security categorization is separately documented and then eventually recorded in the security plan.  Recommend including in the Supplemental Guidance that recording the categorization does not have to initially be done in the security plan but it should be included in the security plan eventually.  [[User:Dan Philpott|Dan Philpott]] 03:42, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;The security categorization process is conducted as an organization-wide activity taking into consideration the enterprise architecture and the information security architecture.&amp;quot;  The wording of this line may cause confusion and impose an unnecessary burden on those with primary responsibility for conducting security categorization.  The categorization process has organization-wide influences and impacts but for systems is conducted primarily at the system level. It may later be reviewed and adjusted by others but the activity of the categorization is local.  By stating it is an organization-wide activity the burden is then to have all those listed with primary responsibility and supporting roles involved in all levels of the activity.  Recommend the sentence be changed to &amp;quot;The security categorization process takes potential adverse impacts to organizational operations, organizational assets, individuals, other organizations, and the Nation as well as organization-wide guidance into consideration including the enterprise architecture and the information security architecture.&amp;quot;  This would also obviate the need for the final sentence of this Supplemental Guidance. [[User:Dan Philpott|Dan Philpott]] 04:03, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-2 INFORMATION SYSTEM DESCRIPTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
Inclusion of the Risk Executive (Function) may be indicated.  As grouping of systems in the organizational inventory into an information system is often a function of determining which have related risks the organizational function which coordinates the holistic assessment of risk may play a role.  Recommend considering whether the Risk Executive (Function) should be included in the Supporting Roles for Task 1-2. [[User:Dan Philpott|Dan Philpott]] 04:11, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;A typical system description may include, for example:&amp;quot;.  Use of the word typical in this instance implies that all of the below should be included to be 'typical'.  The later modifiers, 'may include' and 'for example' indicate this is not the case.  Recommend rephrasing the line to &amp;quot;A system description may include, for example:&amp;quot;. [[User:Dan Philpott|Dan Philpott]] 04:27, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
In the bullet point, &amp;quot;- Cross domain devices/requirements; &amp;quot; The term 'cross domain' is a term that may not be familiar to many FISMA practitioners and may be a reference to multi-level security.  Recommend including an entry for 'Cross Domain' in the glossary. [[User:Dan Philpott|Dan Philpott]] 04:27, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
As organizations implement dynamic subsystems it will be more important to include a reference to the data resource that contains all of the system's inventory of subsystems instead of trying to include that highly dynamic data in the information system description itself.  Recommend including a bullet point indicating a reference to a real-time inventory of subsystems resource be included in the system description where appropriate.  [[User:Dan Philpott|Dan Philpott]] 04:27, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-3 INFORMATION SYSTEM REGISTRATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the lines &amp;quot;Those subsystems that are more dynamic in nature (e.g., subsystems in net-centric architectures) may not be present throughout all phases of the system development life cycle. For such subsystems, it may not be possible to complete all registration information. Some information about dynamic subsystems is known prior to the subsystem manifesting itself in the information system (e.g., assumptions and constraints specified in the security plan). However, more detailed information may not be known until the subsystem manifests itself. &amp;quot;  This is confused and adds little of value beyond the statement that some dynamic subsystems may not be able to complete all registration information. As most dynamic subsystems are likely to be part of better defined systems the inclusion of a description of the issue may not be useful to include here. Recommend providing guidance to organizations that says dynamic subsystems should be registered either as a subset of a better defined complex system or that a method of dynamic registration for dynamic subsystems be implemented which includes as much information as feasible. [[User:Dan Philpott|Dan Philpott]] 04:46, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
A reference to NIST SP 800-53 Revision 3 may be worth including here.  This task appears related to the Program Management family's PM-5 control (Information System Inventory) in Appendix G. Also, OMB's yearly guidance on FISMA reporting requires an inventory of systems and this is a task directly related to the creation of an inventory of systems. Recommend considering inclusion of these documents as references. [[User:Dan Philpott|Dan Philpott]] 04:35, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.2 RMF STEP 2 - SELECT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-1 SECURITY CONTROL SELECTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-2 COMMON CONTROL IDENTIFICATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-3 MONITORING STRATEGY ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-4 SECURITY PLAN APPROVAL ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #2 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.3 RMF STEP 3 - IMPLEMENT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-1 SECURITY CONTROL IMPLEMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-2 SECURITY CONTROL DOCUMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #3 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.4 RMF STEP 4 - ASSESS SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-1 ASSESSMENT PREPARATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-2 SECURITY CONTROL ASSESSMENT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-3 SECURITY ASSESSMENT REPORT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #4 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.5 RMF STEP 5 - AUTHORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-1 REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-2 PLAN OF ACTION AND MILESTONES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-3 SECURITY AUTHORIZATION PACKAGE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-4 RISK DETERMINATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-5 RISK ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the line: &amp;quot;Security authorization decisions are based on the content of the security authorization package and, where appropriate, any inputs received from key organizational officials, including the risk executive (function).&amp;quot; The word 'key' implies that the list of organizational officials the authorizing official can receive input from are limited to those defined in Appendix D/listed as primary or supporting roles.  This unnecessarily limits the resources authorizing officials can draw upon to inform their decision.  An example of where this would be a problem would be if an authorizing official did not sufficiently understand a technology or policy issue and consulted with anyone outside of the defined list of roles for background information.  Limiting this kind of interaction would lower the quality of authorization decisions with a likely outcome of poorer security being implemented.  Recommend removal of the word 'key' from the sentence. [[User:Dan Philpott|Dan Philpott]] 04:09, 23 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #5 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.6 RMF STEP 6 - MONITOR SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-1 INFORMATION SYSTEM AND ENVIRONMENT CHANGES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-2 ONGOING SECURITY CONTROL ASSESSMENTS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-3 ONGOING REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-4 CRITICAL UPDATES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-5 SECURITY STATUS REPORTING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-6 ONGOING RISK DETERMINATION AND ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-7 INFORMATION SYSTEM REMOVAL AND DECOMMISSIONING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #6 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75416</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Chapter 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75416"/>
				<updated>2009-12-23T04:09:08Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: /* Supplemental Guidance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;CHAPTER THREE&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''THE PROCESS'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
EXECUTING THE RISK MANAGEMENT FRAMEWORK TASKS&lt;br /&gt;
&lt;br /&gt;
As an overall comment I find that the blocks of text making up these tasks are too dense and need to be broken up into shorter, more targetted segments.  NIST SP 800-53r3 made excellent use of exploding out lists which had previously been embedded in paragraphs (e.g., (i) ..., (ii) ..., etc.).  Reading security documents is often difficult for people who feel overwhelmed trying to link the different data elements into a comprehensive picture. Good writing practice and formatting can make reading dense guidance wording easier, much as good writing and formatting can make reading source code easier.  [[User:Dan Philpott|Dan Philpott]] 04:10, 8 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== APPLICATION OF THE RISK MANAGEMENT FRAMEWORK ===&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;Execution of the RMF tasks by common control providers, both internal and external to the organization, helps to ensure that the security capabilities provided by the common controls can be inherited by information system owners with a known degree of assurance.&amp;quot;  The issue here is the reference to a known degree of assurance.  How is the degree of assurance known?  Often organizations have no insight into the security operations of a common control provider or information system from which controls are inherited.  To state that the degree of assurance is known may not be accurate.  At best the degree of assurance can be estimated based on the level of trust one has in the controls provider, but trust is an inherently unmeasurable quality.  Recommend restating &amp;quot;common controls can be inherited by information system owners with an appropriate level of trust.&amp;quot; [[User:Dan Philpott|Dan Philpott]] 03:28, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
== 3.1 RMF STEP 1 - CATEGORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-1 SECURITY CATEGORIZATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
The task &amp;quot;Categorize the information system and document the results of the security categorization in the security plan.&amp;quot; varies the order of activities slightly from the NIST SP 800-18r1 description of the process, &amp;quot;Before the system security plan can be developed, the information system and the information resident within that system must be categorized based on a FIPS 199 impact analysis. Then a determination can be made as to which systems in the inventory can be logically grouped into major applications or general support systems.&amp;quot;  In general the security categorization is separately documented and then eventually recorded in the security plan.  Recommend including in the Supplemental Guidance that recording the categorization does not have to initially be done in the security plan but it should be included in the security plan eventually.  [[User:Dan Philpott|Dan Philpott]] 03:42, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;The security categorization process is conducted as an organization-wide activity taking into consideration the enterprise architecture and the information security architecture.&amp;quot;  The wording of this line may cause confusion and impose an unnecessary burden on those with primary responsibility for conducting security categorization.  The categorization process has organization-wide influences and impacts but for systems is conducted primarily at the system level. It may later be reviewed and adjusted by others but the activity of the categorization is local.  By stating it is an organization-wide activity the burden is then to have all those listed with primary responsibility and supporting roles involved in all levels of the activity.  Recommend the sentence be changed to &amp;quot;The security categorization process takes potential adverse impacts to organizational operations, organizational assets, individuals, other organizations, and the Nation as well as organization-wide guidance into consideration including the enterprise architecture and the information security architecture.&amp;quot;  This would also obviate the need for the final sentence of this Supplemental Guidance. [[User:Dan Philpott|Dan Philpott]] 04:03, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-2 INFORMATION SYSTEM DESCRIPTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
Inclusion of the Risk Executive (Function) may be indicated.  As grouping of systems in the organizational inventory into an information system is often a function of determining which have related risks the organizational function which coordinates the holistic assessment of risk may play a role.  Recommend considering whether the Risk Executive (Function) should be included in the Supporting Roles for Task 1-2. [[User:Dan Philpott|Dan Philpott]] 04:11, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;A typical system description may include, for example:&amp;quot;.  Use of the word typical in this instance implies that all of the below should be included to be 'typical'.  The later modifiers, 'may include' and 'for example' indicate this is not the case.  Recommend rephrasing the line to &amp;quot;A system description may include, for example:&amp;quot;. [[User:Dan Philpott|Dan Philpott]] 04:27, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
In the bullet point, &amp;quot;- Cross domain devices/requirements; &amp;quot; The term 'cross domain' is a term that may not be familiar to many FISMA practitioners and may be a reference to multi-level security.  Recommend including an entry for 'Cross Domain' in the glossary. [[User:Dan Philpott|Dan Philpott]] 04:27, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
As organizations implement dynamic subsystems it will be more important to include a reference to the data resource that contains all of the system's inventory of subsystems instead of trying to include that highly dynamic data in the information system description itself.  Recommend including a bullet point indicating a reference to a real-time inventory of subsystems resource be included in the system description where appropriate.  [[User:Dan Philpott|Dan Philpott]] 04:27, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-3 INFORMATION SYSTEM REGISTRATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the lines &amp;quot;Those subsystems that are more dynamic in nature (e.g., subsystems in net-centric architectures) may not be present throughout all phases of the system development life cycle. For such subsystems, it may not be possible to complete all registration information. Some information about dynamic subsystems is known prior to the subsystem manifesting itself in the information system (e.g., assumptions and constraints specified in the security plan). However, more detailed information may not be known until the subsystem manifests itself. &amp;quot;  This is confused and adds little of value beyond the statement that some dynamic subsystems may not be able to complete all registration information. As most dynamic subsystems are likely to be part of better defined systems the inclusion of a description of the issue may not be useful to include here. Recommend providing guidance to organizations that says dynamic subsystems should be registered either as a subset of a better defined complex system or that a method of dynamic registration for dynamic subsystems be implemented which includes as much information as feasible. [[User:Dan Philpott|Dan Philpott]] 04:46, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
A reference to NIST SP 800-53 Revision 3 may be worth including here.  This task appears related to the Program Management family's PM-5 control (Information System Inventory) in Appendix G. Also, OMB's yearly guidance on FISMA reporting requires an inventory of systems and this is a task directly related to the creation of an inventory of systems. Recommend considering inclusion of these documents as references. [[User:Dan Philpott|Dan Philpott]] 04:35, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.2 RMF STEP 2 - SELECT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-1 SECURITY CONTROL SELECTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-2 COMMON CONTROL IDENTIFICATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-3 MONITORING STRATEGY ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-4 SECURITY PLAN APPROVAL ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #2 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.3 RMF STEP 3 - IMPLEMENT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-1 SECURITY CONTROL IMPLEMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-2 SECURITY CONTROL DOCUMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #3 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.4 RMF STEP 4 - ASSESS SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-1 ASSESSMENT PREPARATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-2 SECURITY CONTROL ASSESSMENT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-3 SECURITY ASSESSMENT REPORT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #4 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.5 RMF STEP 5 - AUTHORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-1 REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-2 PLAN OF ACTION AND MILESTONES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-3 SECURITY AUTHORIZATION PACKAGE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-4 RISK DETERMINATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-5 RISK ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the line: &amp;quot;Security authorization decisions are based on the content of the security authorization package and, where appropriate, any inputs received from key organizational officials, including the risk executive (function).&amp;quot; The word 'key' implies that the list of organizational officials the authorizing official can receive input from are limited to those defined in Appendix D/listed as primary or supporting roles.  This unnecessarily limits the resources authorizing officials can draw upon to inform their decision.  An example of where this would be a problem would be if an authorizing official did not sufficiently understand a technology or policy issue and consulted with anyone outside of the defined list of roles for background information.  Limiting this kind of interaction would lower the quality of authorization decisions with a likely outcome of poorer security being implemented.  Recommend removal of the word 'key' from the sentence. [[User:Dan Philpott|Dan Philpott]] 04:09, 23 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #5 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.6 RMF STEP 6 - MONITOR SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-1 INFORMATION SYSTEM AND ENVIRONMENT CHANGES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-2 ONGOING SECURITY CONTROL ASSESSMENTS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-3 ONGOING REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-4 CRITICAL UPDATES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-5 SECURITY STATUS REPORTING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-6 ONGOING RISK DETERMINATION AND ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-7 INFORMATION SYSTEM REMOVAL AND DECOMMISSIONING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #6 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75379</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Chapter 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75379"/>
				<updated>2009-12-22T04:46:08Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: /* Supplemental Guidance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;CHAPTER THREE&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''THE PROCESS'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
EXECUTING THE RISK MANAGEMENT FRAMEWORK TASKS&lt;br /&gt;
&lt;br /&gt;
As an overall comment I find that the blocks of text making up these tasks are too dense and need to be broken up into shorter, more targetted segments.  NIST SP 800-53r3 made excellent use of exploding out lists which had previously been embedded in paragraphs (e.g., (i) ..., (ii) ..., etc.).  Reading security documents is often difficult for people who feel overwhelmed trying to link the different data elements into a comprehensive picture. Good writing practice and formatting can make reading dense guidance wording easier, much as good writing and formatting can make reading source code easier.  [[User:Dan Philpott|Dan Philpott]] 04:10, 8 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== APPLICATION OF THE RISK MANAGEMENT FRAMEWORK ===&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;Execution of the RMF tasks by common control providers, both internal and external to the organization, helps to ensure that the security capabilities provided by the common controls can be inherited by information system owners with a known degree of assurance.&amp;quot;  The issue here is the reference to a known degree of assurance.  How is the degree of assurance known?  Often organizations have no insight into the security operations of a common control provider or information system from which controls are inherited.  To state that the degree of assurance is known may not be accurate.  At best the degree of assurance can be estimated based on the level of trust one has in the controls provider, but trust is an inherently unmeasurable quality.  Recommend restating &amp;quot;common controls can be inherited by information system owners with an appropriate level of trust.&amp;quot; [[User:Dan Philpott|Dan Philpott]] 03:28, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
== 3.1 RMF STEP 1 - CATEGORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-1 SECURITY CATEGORIZATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
The task &amp;quot;Categorize the information system and document the results of the security categorization in the security plan.&amp;quot; varies the order of activities slightly from the NIST SP 800-18r1 description of the process, &amp;quot;Before the system security plan can be developed, the information system and the information resident within that system must be categorized based on a FIPS 199 impact analysis. Then a determination can be made as to which systems in the inventory can be logically grouped into major applications or general support systems.&amp;quot;  In general the security categorization is separately documented and then eventually recorded in the security plan.  Recommend including in the Supplemental Guidance that recording the categorization does not have to initially be done in the security plan but it should be included in the security plan eventually.  [[User:Dan Philpott|Dan Philpott]] 03:42, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;The security categorization process is conducted as an organization-wide activity taking into consideration the enterprise architecture and the information security architecture.&amp;quot;  The wording of this line may cause confusion and impose an unnecessary burden on those with primary responsibility for conducting security categorization.  The categorization process has organization-wide influences and impacts but for systems is conducted primarily at the system level. It may later be reviewed and adjusted by others but the activity of the categorization is local.  By stating it is an organization-wide activity the burden is then to have all those listed with primary responsibility and supporting roles involved in all levels of the activity.  Recommend the sentence be changed to &amp;quot;The security categorization process takes potential adverse impacts to organizational operations, organizational assets, individuals, other organizations, and the Nation as well as organization-wide guidance into consideration including the enterprise architecture and the information security architecture.&amp;quot;  This would also obviate the need for the final sentence of this Supplemental Guidance. [[User:Dan Philpott|Dan Philpott]] 04:03, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-2 INFORMATION SYSTEM DESCRIPTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
Inclusion of the Risk Executive (Function) may be indicated.  As grouping of systems in the organizational inventory into an information system is often a function of determining which have related risks the organizational function which coordinates the holistic assessment of risk may play a role.  Recommend considering whether the Risk Executive (Function) should be included in the Supporting Roles for Task 1-2. [[User:Dan Philpott|Dan Philpott]] 04:11, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;A typical system description may include, for example:&amp;quot;.  Use of the word typical in this instance implies that all of the below should be included to be 'typical'.  The later modifiers, 'may include' and 'for example' indicate this is not the case.  Recommend rephrasing the line to &amp;quot;A system description may include, for example:&amp;quot;. [[User:Dan Philpott|Dan Philpott]] 04:27, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
In the bullet point, &amp;quot;- Cross domain devices/requirements; &amp;quot; The term 'cross domain' is a term that may not be familiar to many FISMA practitioners and may be a reference to multi-level security.  Recommend including an entry for 'Cross Domain' in the glossary. [[User:Dan Philpott|Dan Philpott]] 04:27, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
As organizations implement dynamic subsystems it will be more important to include a reference to the data resource that contains all of the system's inventory of subsystems instead of trying to include that highly dynamic data in the information system description itself.  Recommend including a bullet point indicating a reference to a real-time inventory of subsystems resource be included in the system description where appropriate.  [[User:Dan Philpott|Dan Philpott]] 04:27, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-3 INFORMATION SYSTEM REGISTRATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the lines &amp;quot;Those subsystems that are more dynamic in nature (e.g., subsystems in net-centric architectures) may not be present throughout all phases of the system development life cycle. For such subsystems, it may not be possible to complete all registration information. Some information about dynamic subsystems is known prior to the subsystem manifesting itself in the information system (e.g., assumptions and constraints specified in the security plan). However, more detailed information may not be known until the subsystem manifests itself. &amp;quot;  This is confused and adds little of value beyond the statement that some dynamic subsystems may not be able to complete all registration information. As most dynamic subsystems are likely to be part of better defined systems the inclusion of a description of the issue may not be useful to include here. Recommend providing guidance to organizations that says dynamic subsystems should be registered either as a subset of a better defined complex system or that a method of dynamic registration for dynamic subsystems be implemented which includes as much information as feasible. [[User:Dan Philpott|Dan Philpott]] 04:46, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
A reference to NIST SP 800-53 Revision 3 may be worth including here.  This task appears related to the Program Management family's PM-5 control (Information System Inventory) in Appendix G. Also, OMB's yearly guidance on FISMA reporting requires an inventory of systems and this is a task directly related to the creation of an inventory of systems. Recommend considering inclusion of these documents as references. [[User:Dan Philpott|Dan Philpott]] 04:35, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.2 RMF STEP 2 - SELECT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-1 SECURITY CONTROL SELECTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-2 COMMON CONTROL IDENTIFICATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-3 MONITORING STRATEGY ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-4 SECURITY PLAN APPROVAL ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #2 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.3 RMF STEP 3 - IMPLEMENT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-1 SECURITY CONTROL IMPLEMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-2 SECURITY CONTROL DOCUMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #3 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.4 RMF STEP 4 - ASSESS SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-1 ASSESSMENT PREPARATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-2 SECURITY CONTROL ASSESSMENT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-3 SECURITY ASSESSMENT REPORT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #4 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.5 RMF STEP 5 - AUTHORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-1 REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-2 PLAN OF ACTION AND MILESTONES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-3 SECURITY AUTHORIZATION PACKAGE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-4 RISK DETERMINATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-5 RISK ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #5 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.6 RMF STEP 6 - MONITOR SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-1 INFORMATION SYSTEM AND ENVIRONMENT CHANGES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-2 ONGOING SECURITY CONTROL ASSESSMENTS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-3 ONGOING REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-4 CRITICAL UPDATES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-5 SECURITY STATUS REPORTING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-6 ONGOING RISK DETERMINATION AND ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-7 INFORMATION SYSTEM REMOVAL AND DECOMMISSIONING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #6 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75378</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Chapter 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75378"/>
				<updated>2009-12-22T04:35:57Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;CHAPTER THREE&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''THE PROCESS'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
EXECUTING THE RISK MANAGEMENT FRAMEWORK TASKS&lt;br /&gt;
&lt;br /&gt;
As an overall comment I find that the blocks of text making up these tasks are too dense and need to be broken up into shorter, more targetted segments.  NIST SP 800-53r3 made excellent use of exploding out lists which had previously been embedded in paragraphs (e.g., (i) ..., (ii) ..., etc.).  Reading security documents is often difficult for people who feel overwhelmed trying to link the different data elements into a comprehensive picture. Good writing practice and formatting can make reading dense guidance wording easier, much as good writing and formatting can make reading source code easier.  [[User:Dan Philpott|Dan Philpott]] 04:10, 8 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== APPLICATION OF THE RISK MANAGEMENT FRAMEWORK ===&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;Execution of the RMF tasks by common control providers, both internal and external to the organization, helps to ensure that the security capabilities provided by the common controls can be inherited by information system owners with a known degree of assurance.&amp;quot;  The issue here is the reference to a known degree of assurance.  How is the degree of assurance known?  Often organizations have no insight into the security operations of a common control provider or information system from which controls are inherited.  To state that the degree of assurance is known may not be accurate.  At best the degree of assurance can be estimated based on the level of trust one has in the controls provider, but trust is an inherently unmeasurable quality.  Recommend restating &amp;quot;common controls can be inherited by information system owners with an appropriate level of trust.&amp;quot; [[User:Dan Philpott|Dan Philpott]] 03:28, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
== 3.1 RMF STEP 1 - CATEGORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-1 SECURITY CATEGORIZATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
The task &amp;quot;Categorize the information system and document the results of the security categorization in the security plan.&amp;quot; varies the order of activities slightly from the NIST SP 800-18r1 description of the process, &amp;quot;Before the system security plan can be developed, the information system and the information resident within that system must be categorized based on a FIPS 199 impact analysis. Then a determination can be made as to which systems in the inventory can be logically grouped into major applications or general support systems.&amp;quot;  In general the security categorization is separately documented and then eventually recorded in the security plan.  Recommend including in the Supplemental Guidance that recording the categorization does not have to initially be done in the security plan but it should be included in the security plan eventually.  [[User:Dan Philpott|Dan Philpott]] 03:42, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;The security categorization process is conducted as an organization-wide activity taking into consideration the enterprise architecture and the information security architecture.&amp;quot;  The wording of this line may cause confusion and impose an unnecessary burden on those with primary responsibility for conducting security categorization.  The categorization process has organization-wide influences and impacts but for systems is conducted primarily at the system level. It may later be reviewed and adjusted by others but the activity of the categorization is local.  By stating it is an organization-wide activity the burden is then to have all those listed with primary responsibility and supporting roles involved in all levels of the activity.  Recommend the sentence be changed to &amp;quot;The security categorization process takes potential adverse impacts to organizational operations, organizational assets, individuals, other organizations, and the Nation as well as organization-wide guidance into consideration including the enterprise architecture and the information security architecture.&amp;quot;  This would also obviate the need for the final sentence of this Supplemental Guidance. [[User:Dan Philpott|Dan Philpott]] 04:03, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-2 INFORMATION SYSTEM DESCRIPTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
Inclusion of the Risk Executive (Function) may be indicated.  As grouping of systems in the organizational inventory into an information system is often a function of determining which have related risks the organizational function which coordinates the holistic assessment of risk may play a role.  Recommend considering whether the Risk Executive (Function) should be included in the Supporting Roles for Task 1-2. [[User:Dan Philpott|Dan Philpott]] 04:11, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;A typical system description may include, for example:&amp;quot;.  Use of the word typical in this instance implies that all of the below should be included to be 'typical'.  The later modifiers, 'may include' and 'for example' indicate this is not the case.  Recommend rephrasing the line to &amp;quot;A system description may include, for example:&amp;quot;. [[User:Dan Philpott|Dan Philpott]] 04:27, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
In the bullet point, &amp;quot;- Cross domain devices/requirements; &amp;quot; The term 'cross domain' is a term that may not be familiar to many FISMA practitioners and may be a reference to multi-level security.  Recommend including an entry for 'Cross Domain' in the glossary. [[User:Dan Philpott|Dan Philpott]] 04:27, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
As organizations implement dynamic subsystems it will be more important to include a reference to the data resource that contains all of the system's inventory of subsystems instead of trying to include that highly dynamic data in the information system description itself.  Recommend including a bullet point indicating a reference to a real-time inventory of subsystems resource be included in the system description where appropriate.  [[User:Dan Philpott|Dan Philpott]] 04:27, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-3 INFORMATION SYSTEM REGISTRATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
A reference to NIST SP 800-53 Revision 3 may be worth including here.  This task appears related to the Program Management family's PM-5 control (Information System Inventory) in Appendix G. Also, OMB's yearly guidance on FISMA reporting requires an inventory of systems and this is a task directly related to the creation of an inventory of systems. Recommend considering inclusion of these documents as references. [[User:Dan Philpott|Dan Philpott]] 04:35, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.2 RMF STEP 2 - SELECT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-1 SECURITY CONTROL SELECTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-2 COMMON CONTROL IDENTIFICATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-3 MONITORING STRATEGY ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-4 SECURITY PLAN APPROVAL ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #2 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.3 RMF STEP 3 - IMPLEMENT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-1 SECURITY CONTROL IMPLEMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-2 SECURITY CONTROL DOCUMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #3 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.4 RMF STEP 4 - ASSESS SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-1 ASSESSMENT PREPARATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-2 SECURITY CONTROL ASSESSMENT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-3 SECURITY ASSESSMENT REPORT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #4 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.5 RMF STEP 5 - AUTHORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-1 REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-2 PLAN OF ACTION AND MILESTONES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-3 SECURITY AUTHORIZATION PACKAGE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-4 RISK DETERMINATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-5 RISK ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #5 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.6 RMF STEP 6 - MONITOR SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-1 INFORMATION SYSTEM AND ENVIRONMENT CHANGES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-2 ONGOING SECURITY CONTROL ASSESSMENTS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-3 ONGOING REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-4 CRITICAL UPDATES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-5 SECURITY STATUS REPORTING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-6 ONGOING RISK DETERMINATION AND ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-7 INFORMATION SYSTEM REMOVAL AND DECOMMISSIONING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #6 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75377</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Chapter 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75377"/>
				<updated>2009-12-22T04:27:58Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: /* Supplemental Guidance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;CHAPTER THREE&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''THE PROCESS'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
EXECUTING THE RISK MANAGEMENT FRAMEWORK TASKS&lt;br /&gt;
&lt;br /&gt;
As an overall comment I find that the blocks of text making up these tasks are too dense and need to be broken up into shorter, more targetted segments.  NIST SP 800-53r3 made excellent use of exploding out lists which had previously been embedded in paragraphs (e.g., (i) ..., (ii) ..., etc.).  Reading security documents is often difficult for people who feel overwhelmed trying to link the different data elements into a comprehensive picture. Good writing practice and formatting can make reading dense guidance wording easier, much as good writing and formatting can make reading source code easier.  [[User:Dan Philpott|Dan Philpott]] 04:10, 8 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== APPLICATION OF THE RISK MANAGEMENT FRAMEWORK ===&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;Execution of the RMF tasks by common control providers, both internal and external to the organization, helps to ensure that the security capabilities provided by the common controls can be inherited by information system owners with a known degree of assurance.&amp;quot;  The issue here is the reference to a known degree of assurance.  How is the degree of assurance known?  Often organizations have no insight into the security operations of a common control provider or information system from which controls are inherited.  To state that the degree of assurance is known may not be accurate.  At best the degree of assurance can be estimated based on the level of trust one has in the controls provider, but trust is an inherently unmeasurable quality.  Recommend restating &amp;quot;common controls can be inherited by information system owners with an appropriate level of trust.&amp;quot; [[User:Dan Philpott|Dan Philpott]] 03:28, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
== 3.1 RMF STEP 1 - CATEGORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-1 SECURITY CATEGORIZATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
The task &amp;quot;Categorize the information system and document the results of the security categorization in the security plan.&amp;quot; varies the order of activities slightly from the NIST SP 800-18r1 description of the process, &amp;quot;Before the system security plan can be developed, the information system and the information resident within that system must be categorized based on a FIPS 199 impact analysis. Then a determination can be made as to which systems in the inventory can be logically grouped into major applications or general support systems.&amp;quot;  In general the security categorization is separately documented and then eventually recorded in the security plan.  Recommend including in the Supplemental Guidance that recording the categorization does not have to initially be done in the security plan but it should be included in the security plan eventually.  [[User:Dan Philpott|Dan Philpott]] 03:42, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;The security categorization process is conducted as an organization-wide activity taking into consideration the enterprise architecture and the information security architecture.&amp;quot;  The wording of this line may cause confusion and impose an unnecessary burden on those with primary responsibility for conducting security categorization.  The categorization process has organization-wide influences and impacts but for systems is conducted primarily at the system level. It may later be reviewed and adjusted by others but the activity of the categorization is local.  By stating it is an organization-wide activity the burden is then to have all those listed with primary responsibility and supporting roles involved in all levels of the activity.  Recommend the sentence be changed to &amp;quot;The security categorization process takes potential adverse impacts to organizational operations, organizational assets, individuals, other organizations, and the Nation as well as organization-wide guidance into consideration including the enterprise architecture and the information security architecture.&amp;quot;  This would also obviate the need for the final sentence of this Supplemental Guidance. [[User:Dan Philpott|Dan Philpott]] 04:03, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-2 INFORMATION SYSTEM DESCRIPTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
Inclusion of the Risk Executive (Function) may be indicated.  As grouping of systems in the organizational inventory into an information system is often a function of determining which have related risks the organizational function which coordinates the holistic assessment of risk may play a role.  Recommend considering whether the Risk Executive (Function) should be included in the Supporting Roles for Task 1-2. [[User:Dan Philpott|Dan Philpott]] 04:11, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;A typical system description may include, for example:&amp;quot;.  Use of the word typical in this instance implies that all of the below should be included to be 'typical'.  The later modifiers, 'may include' and 'for example' indicate this is not the case.  Recommend rephrasing the line to &amp;quot;A system description may include, for example:&amp;quot;. [[User:Dan Philpott|Dan Philpott]] 04:27, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
In the bullet point, &amp;quot;- Cross domain devices/requirements; &amp;quot; The term 'cross domain' is a term that may not be familiar to many FISMA practitioners and may be a reference to multi-level security.  Recommend including an entry for 'Cross Domain' in the glossary. [[User:Dan Philpott|Dan Philpott]] 04:27, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
As organizations implement dynamic subsystems it will be more important to include a reference to the data resource that contains all of the system's inventory of subsystems instead of trying to include that highly dynamic data in the information system description itself.  Recommend including a bullet point indicating a reference to a real-time inventory of subsystems resource be included in the system description where appropriate.  [[User:Dan Philpott|Dan Philpott]] 04:27, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-3 INFORMATION SYSTEM REGISTRATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.2 RMF STEP 2 - SELECT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-1 SECURITY CONTROL SELECTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-2 COMMON CONTROL IDENTIFICATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-3 MONITORING STRATEGY ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-4 SECURITY PLAN APPROVAL ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #2 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.3 RMF STEP 3 - IMPLEMENT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-1 SECURITY CONTROL IMPLEMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-2 SECURITY CONTROL DOCUMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #3 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.4 RMF STEP 4 - ASSESS SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-1 ASSESSMENT PREPARATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-2 SECURITY CONTROL ASSESSMENT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-3 SECURITY ASSESSMENT REPORT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #4 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.5 RMF STEP 5 - AUTHORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-1 REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-2 PLAN OF ACTION AND MILESTONES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-3 SECURITY AUTHORIZATION PACKAGE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-4 RISK DETERMINATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-5 RISK ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #5 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.6 RMF STEP 6 - MONITOR SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-1 INFORMATION SYSTEM AND ENVIRONMENT CHANGES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-2 ONGOING SECURITY CONTROL ASSESSMENTS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-3 ONGOING REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-4 CRITICAL UPDATES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-5 SECURITY STATUS REPORTING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-6 ONGOING RISK DETERMINATION AND ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-7 INFORMATION SYSTEM REMOVAL AND DECOMMISSIONING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #6 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75376</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Chapter 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75376"/>
				<updated>2009-12-22T04:11:01Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: /* Supporting Roles */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;CHAPTER THREE&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''THE PROCESS'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
EXECUTING THE RISK MANAGEMENT FRAMEWORK TASKS&lt;br /&gt;
&lt;br /&gt;
As an overall comment I find that the blocks of text making up these tasks are too dense and need to be broken up into shorter, more targetted segments.  NIST SP 800-53r3 made excellent use of exploding out lists which had previously been embedded in paragraphs (e.g., (i) ..., (ii) ..., etc.).  Reading security documents is often difficult for people who feel overwhelmed trying to link the different data elements into a comprehensive picture. Good writing practice and formatting can make reading dense guidance wording easier, much as good writing and formatting can make reading source code easier.  [[User:Dan Philpott|Dan Philpott]] 04:10, 8 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== APPLICATION OF THE RISK MANAGEMENT FRAMEWORK ===&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;Execution of the RMF tasks by common control providers, both internal and external to the organization, helps to ensure that the security capabilities provided by the common controls can be inherited by information system owners with a known degree of assurance.&amp;quot;  The issue here is the reference to a known degree of assurance.  How is the degree of assurance known?  Often organizations have no insight into the security operations of a common control provider or information system from which controls are inherited.  To state that the degree of assurance is known may not be accurate.  At best the degree of assurance can be estimated based on the level of trust one has in the controls provider, but trust is an inherently unmeasurable quality.  Recommend restating &amp;quot;common controls can be inherited by information system owners with an appropriate level of trust.&amp;quot; [[User:Dan Philpott|Dan Philpott]] 03:28, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
== 3.1 RMF STEP 1 - CATEGORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-1 SECURITY CATEGORIZATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
The task &amp;quot;Categorize the information system and document the results of the security categorization in the security plan.&amp;quot; varies the order of activities slightly from the NIST SP 800-18r1 description of the process, &amp;quot;Before the system security plan can be developed, the information system and the information resident within that system must be categorized based on a FIPS 199 impact analysis. Then a determination can be made as to which systems in the inventory can be logically grouped into major applications or general support systems.&amp;quot;  In general the security categorization is separately documented and then eventually recorded in the security plan.  Recommend including in the Supplemental Guidance that recording the categorization does not have to initially be done in the security plan but it should be included in the security plan eventually.  [[User:Dan Philpott|Dan Philpott]] 03:42, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;The security categorization process is conducted as an organization-wide activity taking into consideration the enterprise architecture and the information security architecture.&amp;quot;  The wording of this line may cause confusion and impose an unnecessary burden on those with primary responsibility for conducting security categorization.  The categorization process has organization-wide influences and impacts but for systems is conducted primarily at the system level. It may later be reviewed and adjusted by others but the activity of the categorization is local.  By stating it is an organization-wide activity the burden is then to have all those listed with primary responsibility and supporting roles involved in all levels of the activity.  Recommend the sentence be changed to &amp;quot;The security categorization process takes potential adverse impacts to organizational operations, organizational assets, individuals, other organizations, and the Nation as well as organization-wide guidance into consideration including the enterprise architecture and the information security architecture.&amp;quot;  This would also obviate the need for the final sentence of this Supplemental Guidance. [[User:Dan Philpott|Dan Philpott]] 04:03, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-2 INFORMATION SYSTEM DESCRIPTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
Inclusion of the Risk Executive (Function) may be indicated.  As grouping of systems in the organizational inventory into an information system is often a function of determining which have related risks the organizational function which coordinates the holistic assessment of risk may play a role.  Recommend considering whether the Risk Executive (Function) should be included in the Supporting Roles for Task 1-2. [[User:Dan Philpott|Dan Philpott]] 04:11, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-3 INFORMATION SYSTEM REGISTRATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.2 RMF STEP 2 - SELECT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-1 SECURITY CONTROL SELECTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-2 COMMON CONTROL IDENTIFICATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-3 MONITORING STRATEGY ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-4 SECURITY PLAN APPROVAL ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #2 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.3 RMF STEP 3 - IMPLEMENT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-1 SECURITY CONTROL IMPLEMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-2 SECURITY CONTROL DOCUMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #3 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.4 RMF STEP 4 - ASSESS SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-1 ASSESSMENT PREPARATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-2 SECURITY CONTROL ASSESSMENT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-3 SECURITY ASSESSMENT REPORT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #4 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.5 RMF STEP 5 - AUTHORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-1 REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-2 PLAN OF ACTION AND MILESTONES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-3 SECURITY AUTHORIZATION PACKAGE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-4 RISK DETERMINATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-5 RISK ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #5 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.6 RMF STEP 6 - MONITOR SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-1 INFORMATION SYSTEM AND ENVIRONMENT CHANGES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-2 ONGOING SECURITY CONTROL ASSESSMENTS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-3 ONGOING REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-4 CRITICAL UPDATES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-5 SECURITY STATUS REPORTING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-6 ONGOING RISK DETERMINATION AND ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-7 INFORMATION SYSTEM REMOVAL AND DECOMMISSIONING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #6 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75375</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Chapter 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75375"/>
				<updated>2009-12-22T04:03:08Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: /* Supplemental Guidance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;CHAPTER THREE&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''THE PROCESS'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
EXECUTING THE RISK MANAGEMENT FRAMEWORK TASKS&lt;br /&gt;
&lt;br /&gt;
As an overall comment I find that the blocks of text making up these tasks are too dense and need to be broken up into shorter, more targetted segments.  NIST SP 800-53r3 made excellent use of exploding out lists which had previously been embedded in paragraphs (e.g., (i) ..., (ii) ..., etc.).  Reading security documents is often difficult for people who feel overwhelmed trying to link the different data elements into a comprehensive picture. Good writing practice and formatting can make reading dense guidance wording easier, much as good writing and formatting can make reading source code easier.  [[User:Dan Philpott|Dan Philpott]] 04:10, 8 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== APPLICATION OF THE RISK MANAGEMENT FRAMEWORK ===&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;Execution of the RMF tasks by common control providers, both internal and external to the organization, helps to ensure that the security capabilities provided by the common controls can be inherited by information system owners with a known degree of assurance.&amp;quot;  The issue here is the reference to a known degree of assurance.  How is the degree of assurance known?  Often organizations have no insight into the security operations of a common control provider or information system from which controls are inherited.  To state that the degree of assurance is known may not be accurate.  At best the degree of assurance can be estimated based on the level of trust one has in the controls provider, but trust is an inherently unmeasurable quality.  Recommend restating &amp;quot;common controls can be inherited by information system owners with an appropriate level of trust.&amp;quot; [[User:Dan Philpott|Dan Philpott]] 03:28, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
== 3.1 RMF STEP 1 - CATEGORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-1 SECURITY CATEGORIZATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
The task &amp;quot;Categorize the information system and document the results of the security categorization in the security plan.&amp;quot; varies the order of activities slightly from the NIST SP 800-18r1 description of the process, &amp;quot;Before the system security plan can be developed, the information system and the information resident within that system must be categorized based on a FIPS 199 impact analysis. Then a determination can be made as to which systems in the inventory can be logically grouped into major applications or general support systems.&amp;quot;  In general the security categorization is separately documented and then eventually recorded in the security plan.  Recommend including in the Supplemental Guidance that recording the categorization does not have to initially be done in the security plan but it should be included in the security plan eventually.  [[User:Dan Philpott|Dan Philpott]] 03:42, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;The security categorization process is conducted as an organization-wide activity taking into consideration the enterprise architecture and the information security architecture.&amp;quot;  The wording of this line may cause confusion and impose an unnecessary burden on those with primary responsibility for conducting security categorization.  The categorization process has organization-wide influences and impacts but for systems is conducted primarily at the system level. It may later be reviewed and adjusted by others but the activity of the categorization is local.  By stating it is an organization-wide activity the burden is then to have all those listed with primary responsibility and supporting roles involved in all levels of the activity.  Recommend the sentence be changed to &amp;quot;The security categorization process takes potential adverse impacts to organizational operations, organizational assets, individuals, other organizations, and the Nation as well as organization-wide guidance into consideration including the enterprise architecture and the information security architecture.&amp;quot;  This would also obviate the need for the final sentence of this Supplemental Guidance. [[User:Dan Philpott|Dan Philpott]] 04:03, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-2 INFORMATION SYSTEM DESCRIPTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-3 INFORMATION SYSTEM REGISTRATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.2 RMF STEP 2 - SELECT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-1 SECURITY CONTROL SELECTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-2 COMMON CONTROL IDENTIFICATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-3 MONITORING STRATEGY ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-4 SECURITY PLAN APPROVAL ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #2 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.3 RMF STEP 3 - IMPLEMENT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-1 SECURITY CONTROL IMPLEMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-2 SECURITY CONTROL DOCUMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #3 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.4 RMF STEP 4 - ASSESS SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-1 ASSESSMENT PREPARATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-2 SECURITY CONTROL ASSESSMENT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-3 SECURITY ASSESSMENT REPORT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #4 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.5 RMF STEP 5 - AUTHORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-1 REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-2 PLAN OF ACTION AND MILESTONES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-3 SECURITY AUTHORIZATION PACKAGE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-4 RISK DETERMINATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-5 RISK ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #5 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.6 RMF STEP 6 - MONITOR SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-1 INFORMATION SYSTEM AND ENVIRONMENT CHANGES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-2 ONGOING SECURITY CONTROL ASSESSMENTS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-3 ONGOING REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-4 CRITICAL UPDATES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-5 SECURITY STATUS REPORTING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-6 ONGOING RISK DETERMINATION AND ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-7 INFORMATION SYSTEM REMOVAL AND DECOMMISSIONING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #6 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75374</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Chapter 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75374"/>
				<updated>2009-12-22T03:42:22Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: /* TASK */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;CHAPTER THREE&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''THE PROCESS'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
EXECUTING THE RISK MANAGEMENT FRAMEWORK TASKS&lt;br /&gt;
&lt;br /&gt;
As an overall comment I find that the blocks of text making up these tasks are too dense and need to be broken up into shorter, more targetted segments.  NIST SP 800-53r3 made excellent use of exploding out lists which had previously been embedded in paragraphs (e.g., (i) ..., (ii) ..., etc.).  Reading security documents is often difficult for people who feel overwhelmed trying to link the different data elements into a comprehensive picture. Good writing practice and formatting can make reading dense guidance wording easier, much as good writing and formatting can make reading source code easier.  [[User:Dan Philpott|Dan Philpott]] 04:10, 8 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== APPLICATION OF THE RISK MANAGEMENT FRAMEWORK ===&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;Execution of the RMF tasks by common control providers, both internal and external to the organization, helps to ensure that the security capabilities provided by the common controls can be inherited by information system owners with a known degree of assurance.&amp;quot;  The issue here is the reference to a known degree of assurance.  How is the degree of assurance known?  Often organizations have no insight into the security operations of a common control provider or information system from which controls are inherited.  To state that the degree of assurance is known may not be accurate.  At best the degree of assurance can be estimated based on the level of trust one has in the controls provider, but trust is an inherently unmeasurable quality.  Recommend restating &amp;quot;common controls can be inherited by information system owners with an appropriate level of trust.&amp;quot; [[User:Dan Philpott|Dan Philpott]] 03:28, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
== 3.1 RMF STEP 1 - CATEGORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-1 SECURITY CATEGORIZATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
The task &amp;quot;Categorize the information system and document the results of the security categorization in the security plan.&amp;quot; varies the order of activities slightly from the NIST SP 800-18r1 description of the process, &amp;quot;Before the system security plan can be developed, the information system and the information resident within that system must be categorized based on a FIPS 199 impact analysis. Then a determination can be made as to which systems in the inventory can be logically grouped into major applications or general support systems.&amp;quot;  In general the security categorization is separately documented and then eventually recorded in the security plan.  Recommend including in the Supplemental Guidance that recording the categorization does not have to initially be done in the security plan but it should be included in the security plan eventually.  [[User:Dan Philpott|Dan Philpott]] 03:42, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-2 INFORMATION SYSTEM DESCRIPTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-3 INFORMATION SYSTEM REGISTRATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.2 RMF STEP 2 - SELECT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-1 SECURITY CONTROL SELECTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-2 COMMON CONTROL IDENTIFICATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-3 MONITORING STRATEGY ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-4 SECURITY PLAN APPROVAL ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #2 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.3 RMF STEP 3 - IMPLEMENT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-1 SECURITY CONTROL IMPLEMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-2 SECURITY CONTROL DOCUMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #3 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.4 RMF STEP 4 - ASSESS SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-1 ASSESSMENT PREPARATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-2 SECURITY CONTROL ASSESSMENT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-3 SECURITY ASSESSMENT REPORT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #4 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.5 RMF STEP 5 - AUTHORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-1 REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-2 PLAN OF ACTION AND MILESTONES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-3 SECURITY AUTHORIZATION PACKAGE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-4 RISK DETERMINATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-5 RISK ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #5 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.6 RMF STEP 6 - MONITOR SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-1 INFORMATION SYSTEM AND ENVIRONMENT CHANGES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-2 ONGOING SECURITY CONTROL ASSESSMENTS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-3 ONGOING REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-4 CRITICAL UPDATES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-5 SECURITY STATUS REPORTING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-6 ONGOING RISK DETERMINATION AND ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-7 INFORMATION SYSTEM REMOVAL AND DECOMMISSIONING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #6 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75373</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Chapter 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75373"/>
				<updated>2009-12-22T03:42:00Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: /* TASK */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;CHAPTER THREE&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''THE PROCESS'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
EXECUTING THE RISK MANAGEMENT FRAMEWORK TASKS&lt;br /&gt;
&lt;br /&gt;
As an overall comment I find that the blocks of text making up these tasks are too dense and need to be broken up into shorter, more targetted segments.  NIST SP 800-53r3 made excellent use of exploding out lists which had previously been embedded in paragraphs (e.g., (i) ..., (ii) ..., etc.).  Reading security documents is often difficult for people who feel overwhelmed trying to link the different data elements into a comprehensive picture. Good writing practice and formatting can make reading dense guidance wording easier, much as good writing and formatting can make reading source code easier.  [[User:Dan Philpott|Dan Philpott]] 04:10, 8 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== APPLICATION OF THE RISK MANAGEMENT FRAMEWORK ===&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;Execution of the RMF tasks by common control providers, both internal and external to the organization, helps to ensure that the security capabilities provided by the common controls can be inherited by information system owners with a known degree of assurance.&amp;quot;  The issue here is the reference to a known degree of assurance.  How is the degree of assurance known?  Often organizations have no insight into the security operations of a common control provider or information system from which controls are inherited.  To state that the degree of assurance is known may not be accurate.  At best the degree of assurance can be estimated based on the level of trust one has in the controls provider, but trust is an inherently unmeasurable quality.  Recommend restating &amp;quot;common controls can be inherited by information system owners with an appropriate level of trust.&amp;quot; [[User:Dan Philpott|Dan Philpott]] 03:28, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
== 3.1 RMF STEP 1 - CATEGORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-1 SECURITY CATEGORIZATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
The task &amp;quot;Categorize the information system and document the results of the security categorization in the security plan.&amp;quot; varies the order of activities slightly from the NIST SP 800-18r1 description of the process, &amp;quot;Before the system security plan can be developed, the information system and the information resident within that system must be categorized based on a FIPS 199 impact analysis. Then a determination can be made as to which systems in the inventory can be logically grouped into major applications or general support systems.&amp;quot;  In general the security categorization is seperately documented and then eventually recorded in the security plan.  Recommend including in the Supplemental Guidance that recording the categorization does not have to initially be done in the security plan but it should be included in the security plan eventually.&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-2 INFORMATION SYSTEM DESCRIPTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-3 INFORMATION SYSTEM REGISTRATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.2 RMF STEP 2 - SELECT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-1 SECURITY CONTROL SELECTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-2 COMMON CONTROL IDENTIFICATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-3 MONITORING STRATEGY ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-4 SECURITY PLAN APPROVAL ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #2 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.3 RMF STEP 3 - IMPLEMENT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-1 SECURITY CONTROL IMPLEMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-2 SECURITY CONTROL DOCUMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #3 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.4 RMF STEP 4 - ASSESS SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-1 ASSESSMENT PREPARATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-2 SECURITY CONTROL ASSESSMENT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-3 SECURITY ASSESSMENT REPORT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #4 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.5 RMF STEP 5 - AUTHORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-1 REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-2 PLAN OF ACTION AND MILESTONES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-3 SECURITY AUTHORIZATION PACKAGE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-4 RISK DETERMINATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-5 RISK ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #5 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.6 RMF STEP 6 - MONITOR SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-1 INFORMATION SYSTEM AND ENVIRONMENT CHANGES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-2 ONGOING SECURITY CONTROL ASSESSMENTS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-3 ONGOING REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-4 CRITICAL UPDATES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-5 SECURITY STATUS REPORTING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-6 ONGOING RISK DETERMINATION AND ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-7 INFORMATION SYSTEM REMOVAL AND DECOMMISSIONING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #6 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75372</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Chapter 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75372"/>
				<updated>2009-12-22T03:28:20Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: /* APPLICATION OF THE RISK MANAGEMENT FRAMEWORK */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;CHAPTER THREE&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''THE PROCESS'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
EXECUTING THE RISK MANAGEMENT FRAMEWORK TASKS&lt;br /&gt;
&lt;br /&gt;
As an overall comment I find that the blocks of text making up these tasks are too dense and need to be broken up into shorter, more targetted segments.  NIST SP 800-53r3 made excellent use of exploding out lists which had previously been embedded in paragraphs (e.g., (i) ..., (ii) ..., etc.).  Reading security documents is often difficult for people who feel overwhelmed trying to link the different data elements into a comprehensive picture. Good writing practice and formatting can make reading dense guidance wording easier, much as good writing and formatting can make reading source code easier.  [[User:Dan Philpott|Dan Philpott]] 04:10, 8 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== APPLICATION OF THE RISK MANAGEMENT FRAMEWORK ===&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;Execution of the RMF tasks by common control providers, both internal and external to the organization, helps to ensure that the security capabilities provided by the common controls can be inherited by information system owners with a known degree of assurance.&amp;quot;  The issue here is the reference to a known degree of assurance.  How is the degree of assurance known?  Often organizations have no insight into the security operations of a common control provider or information system from which controls are inherited.  To state that the degree of assurance is known may not be accurate.  At best the degree of assurance can be estimated based on the level of trust one has in the controls provider, but trust is an inherently unmeasurable quality.  Recommend restating &amp;quot;common controls can be inherited by information system owners with an appropriate level of trust.&amp;quot; [[User:Dan Philpott|Dan Philpott]] 03:28, 22 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
== 3.1 RMF STEP 1 - CATEGORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-1 SECURITY CATEGORIZATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-2 INFORMATION SYSTEM DESCRIPTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-3 INFORMATION SYSTEM REGISTRATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.2 RMF STEP 2 - SELECT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-1 SECURITY CONTROL SELECTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-2 COMMON CONTROL IDENTIFICATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-3 MONITORING STRATEGY ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-4 SECURITY PLAN APPROVAL ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #2 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.3 RMF STEP 3 - IMPLEMENT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-1 SECURITY CONTROL IMPLEMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-2 SECURITY CONTROL DOCUMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #3 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.4 RMF STEP 4 - ASSESS SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-1 ASSESSMENT PREPARATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-2 SECURITY CONTROL ASSESSMENT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-3 SECURITY ASSESSMENT REPORT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #4 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.5 RMF STEP 5 - AUTHORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-1 REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-2 PLAN OF ACTION AND MILESTONES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-3 SECURITY AUTHORIZATION PACKAGE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-4 RISK DETERMINATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-5 RISK ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #5 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.6 RMF STEP 6 - MONITOR SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-1 INFORMATION SYSTEM AND ENVIRONMENT CHANGES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-2 ONGOING SECURITY CONTROL ASSESSMENTS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-3 ONGOING REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-4 CRITICAL UPDATES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-5 SECURITY STATUS REPORTING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-6 ONGOING RISK DETERMINATION AND ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-7 INFORMATION SYSTEM REMOVAL AND DECOMMISSIONING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #6 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75371</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Chapter 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75371"/>
				<updated>2009-12-22T03:28:01Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: /* APPLICATION OF THE RISK MANAGEMENT FRAMEWORK */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;CHAPTER THREE&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''THE PROCESS'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
EXECUTING THE RISK MANAGEMENT FRAMEWORK TASKS&lt;br /&gt;
&lt;br /&gt;
As an overall comment I find that the blocks of text making up these tasks are too dense and need to be broken up into shorter, more targetted segments.  NIST SP 800-53r3 made excellent use of exploding out lists which had previously been embedded in paragraphs (e.g., (i) ..., (ii) ..., etc.).  Reading security documents is often difficult for people who feel overwhelmed trying to link the different data elements into a comprehensive picture. Good writing practice and formatting can make reading dense guidance wording easier, much as good writing and formatting can make reading source code easier.  [[User:Dan Philpott|Dan Philpott]] 04:10, 8 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== APPLICATION OF THE RISK MANAGEMENT FRAMEWORK ===&lt;br /&gt;
&lt;br /&gt;
In the line &amp;quot;Execution of the RMF tasks by common control providers, both internal and external to the organization, helps to ensure that the security capabilities provided by the common controls can be inherited by information system owners with a known degree of assurance.&amp;quot;  The issue here is the reference to a known degree of assurance.  How is the degree of assurance known?  Often organizations have no insight into the security operations of a common control provider or information system from which controls are inherited.  To state that the degree of assurance is known may not be accurate.  At best the degree of assurance can be estimated based on the level of trust one has in the controls provider, but trust is an inherently unmeasurable quality.  Recommend restating &amp;quot;common controls can be inherited by information system owners with an appropriate level of trust.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== 3.1 RMF STEP 1 - CATEGORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-1 SECURITY CATEGORIZATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-2 INFORMATION SYSTEM DESCRIPTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-3 INFORMATION SYSTEM REGISTRATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.2 RMF STEP 2 - SELECT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-1 SECURITY CONTROL SELECTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-2 COMMON CONTROL IDENTIFICATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-3 MONITORING STRATEGY ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-4 SECURITY PLAN APPROVAL ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #2 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.3 RMF STEP 3 - IMPLEMENT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-1 SECURITY CONTROL IMPLEMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-2 SECURITY CONTROL DOCUMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #3 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.4 RMF STEP 4 - ASSESS SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-1 ASSESSMENT PREPARATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-2 SECURITY CONTROL ASSESSMENT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-3 SECURITY ASSESSMENT REPORT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #4 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.5 RMF STEP 5 - AUTHORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-1 REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-2 PLAN OF ACTION AND MILESTONES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-3 SECURITY AUTHORIZATION PACKAGE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-4 RISK DETERMINATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-5 RISK ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #5 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.6 RMF STEP 6 - MONITOR SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-1 INFORMATION SYSTEM AND ENVIRONMENT CHANGES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-2 ONGOING SECURITY CONTROL ASSESSMENTS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-3 ONGOING REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-4 CRITICAL UPDATES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-5 SECURITY STATUS REPORTING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-6 ONGOING RISK DETERMINATION AND ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-7 INFORMATION SYSTEM REMOVAL AND DECOMMISSIONING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #6 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_1&amp;diff=75182</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Chapter 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_1&amp;diff=75182"/>
				<updated>2009-12-16T04:26:33Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: /* 1.2 PURPOSE AND APPLICABILITY */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;CHAPTER ONE&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''INTRODUCTION'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Lines which reads: &amp;quot;Information systems can include a range of diverse computing platforms from high-end supercomputers to personal digital assistants and cellular telephones. Information systems can also include very specialized systems and devices (e.g., telecommunications systems, industrial/process control systems, testing and calibration devices, weapons systems, command and control systems, and environmental control systems).&amp;quot;  The phrasing here doesn't clearly indicate that these are not systems in and of themselves. Given widespread confusion regarding how to determine boundaries every effort should be made to prevent any confusion on this matter.  Recommend sentences begin with a phrase like, &amp;quot;Information systems can include as constituent elements ...&amp;quot;  [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
: Is it really necessary to spell this out for readers of the document?  Shouldn't we expect them to be able to ascertain what we meant from what we said? [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
:: No, assuming that a reader starting at the beginning isn't going to have their understandings colored by a misinterpretation here depends on an expectation that is unlikely to be met. [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
== 1.1 BACKGROUND ==&lt;br /&gt;
&lt;br /&gt;
Bullet point which reads: &amp;quot;Promotes the concept of near real-time risk management and ongoing information system authorization through the implementation of robust continuous monitoring processes;&amp;quot;. The continuous monitoring described later in this document does not rise to the level of a robust continuous monitoring process which can support real-time risk management.  Additional technical detail in support of continuous monitoring for real-time risk management needs to be included to support this concept later in this document.  [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
Line which reads: &amp;quot;... changes the traditional focus from the stove-pipe, organization-centric, static-based approaches to C&amp;amp;A ...&amp;quot; C&amp;amp;A was previously very system-centric and lacked the organization-centric functions of the new Risk Management Hierarchy.  The adjective fest here seems a little out of place.  It might be more accurate to describe C&amp;amp;A as a static, procedural activity which provided inadequate guidance to support ongoing risk based decisions.  Recommend dropping dramatic flourishes and have a simple statement that RMF moves the process of FISMA compliance away from a procedural, documentation of C&amp;amp;A focus to a process focused on risk management that leads to FISMA compliance. [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 1.2 PURPOSE AND APPLICABILITY ==&lt;br /&gt;
&lt;br /&gt;
Bullet point which reads: &amp;quot;To ensure that managing risk from the operation and use of federal information systems is consistent with the organization's mission/business objectives and overall risk strategy established by the senior leadership through the risk executive (function);&amp;quot; The concept of mission/business objectives is not well defined in the RMF or SP's 800-30, 800-37 or 800-39.  Recommend that as this mission/business objective concept is central to understanding the risk posed from a failure in the security objectives for a system a clear process for establishing the mission/business objectives for an organization in the context of information systems security should be described as part of the risk strategy established by senior leadership. [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
Bullet point which reads: &amp;quot;To support consistent, well-informed, and ongoing security authorization decisions (through continuous monitoring), transparency of security and risk-related information, and reciprocity of authorization results; and&amp;quot;. The focus on security authorization decision deemphasizes awareness of and acceptance of risk.  Speaking to the authorization decision emphasizes the process. Speaking to awareness of and acceptance of risk in consideration of whether to grant a security authorization emphasizes the management of risk.  Recommend that as RMF is trying to place the emphasis on risk management and away from the empty process of making a decision this should be reworded to emphasize awareness of and acceptance of risk and relate the authorization decision only as a consequent of this awareness and acceptance. [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
== 1.3 TARGET AUDIENCE ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 1.4 ORGANIZATION OF THIS SPECIAL PUBLICATION ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
A recurring problem with footnotes is that the definitions used here do not match the definitions provided by the glossary.  Variation in definitions leads to confusion and the possibility of misinterpretation.  The use of a single definition should be standard practice. [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Footnote 5: An information system is a discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information.&amp;quot; Recommend either referring readers to glossary for full definition or using full definition here &amp;quot;Information System [44 U.S.C., Sec. 3502] A discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information. [Note: Information systems also include specialized systems such as industrial/process controls systems, telephone switching and private branch exchange (PBX) systems, and environmental control systems.]&amp;quot; [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Footnote 6: A federal information system is defined as an information system used or operated by a federal agency, or by a contractor of a federal agency or by another organization on behalf of a federal agency.&amp;quot; This definition varies a great deal from the definition in the glossary.  Also, as no other footnoted definition uses 'is defined as' it is not recommended for use here.  Recommendation: use definition from glossary as it uses the correct reference to executive agency and is a legal definition: &amp;quot;Federal Information System [40 U.S.C., Sec. 11331] An information system used or operated by an executive agency, by a contractor of an executive agency, or by another organization on behalf of an executive agency.&amp;quot; [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Footnote 7: Adverse impacts to the Nation include, for example, compromises to information systems that support critical infrastructure applications or are paramount to government continuity of operations as defined by the Department of Homeland Security.&amp;quot; This phrase should be included in the glossary. [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Footnote 8: OMB Circular A-130, Appendix III, describes adequate security as security commensurate with risk. This risk includes both the likelihood and magnitude of harm resulting from the loss, misuse, or unauthorized access to or modification of information.&amp;quot; The definition should be the same as the A-130 definition as the implication by reference is that this is the A-130 definition.  &lt;br /&gt;
&lt;br /&gt;
The glossary definition: &amp;quot;Adequate Security [OMB Circular A-130, Appendix III] Security commensurate with the risk and the magnitude of harm resulting from the loss, misuse, or unauthorized access to or modification of information.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The A-130 definition: &amp;quot;adequate security&amp;quot; means security commensurate with the risk and magnitude of the harm resulting from the loss, misuse, or unauthorized access to or modification of information. This includes assuring that systems and applications used by the agency operate effectively and provide appropriate confidentiality, integrity, and availability, through the use of cost-effective management, personnel, operational, and technical controls. [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Footnote 9: Risk is a measure of the extent to which an entity is threatened by a potential circumstance or event, and is typically a function of the likelihood of the circumstance or event occurring and of the resulting adverse impacts.&amp;quot;  Again the definition varies slightly from the definition in the glossary. This disparity can cause confusion and misinterpretation.  The glossary definition also includes a modifying footnote detailing information system-related security risks which is what is intended to be discussed in this footnote.  Recommendation is to stick with the glossary definition or come up with a hybrid definition including all the elements described and used both here and in the glossary.  [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Footnote 10: Security categorization methodologies are described in CNSS Instruction 1253 for national security systems and in FIPS 199 for other than national security systems.&amp;quot; Recommend rewording this for clarity, &amp;quot;Security categorization methodologies for national security systems are described in CNSS Instruction 1253. Security categorization methodologies for non-national security systems are described in FIPS 199. [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Footnote 12: Reciprocity of security authorization results is the mutual agreement among participating organizations to accept each other's security assessments in order to reuse information system resources and/or to accept each other's assessed security posture in order to share information. Reciprocity is best achieved by promoting the concept of transparency (i.e., making sufficient evidence regarding the security state of an information system available, so that an authorizing official from another organization can use that evidence to make credible, risk-based decisions regarding the operation and use of that system or the information it processes, stores, or transmits).&amp;quot;  Different term is used in glossary and in this footnote, enterprise and organization respectively.  Organization is more accurate but reciprocity is defined in NIST SP 800-53r3 with the enterprise term.  Recommend changing the glossary definition to use organization.&lt;br /&gt;
&lt;br /&gt;
Also, the parts of the Defense Security Service Glossary definition for reciprocity might be worth including in the definition as the term will be used in IC.  &amp;quot;Recognition and  acceptance, without further  processing of: (1) security background investigations and  clearance  eligibility determinations. (2) accreditations of  information systems; and (3)  facility accreditations.  Reciprocity is obligatory in the  Intelligence Community when there are no waivers, conditions, or deviations to the Director of  National Intelligence.&amp;quot; [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Footnote 14: A federal information system is an information system used or operated by an executive agency, by a contractor of an executive agency, or by another organization on behalf of an executive agency.&amp;quot; Recommend 'federal information system' should be italicized as it is a defined term. [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Footnote 16: At the agency level, this position is known as the Senior Agency Information Security Officer. Organizations may also refer to this position as the Chief Information Security Officer.&amp;quot; Recommendation: Drop the word &amp;quot;may&amp;quot; from second sentence as it implies NIST is allowing organizations to this. &amp;quot;Organizations also refer&amp;quot; works.  [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_1&amp;diff=75181</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Chapter 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_1&amp;diff=75181"/>
				<updated>2009-12-16T04:26:08Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: Added first run of detailed comments for chapter.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;CHAPTER ONE&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''INTRODUCTION'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Lines which reads: &amp;quot;Information systems can include a range of diverse computing platforms from high-end supercomputers to personal digital assistants and cellular telephones. Information systems can also include very specialized systems and devices (e.g., telecommunications systems, industrial/process control systems, testing and calibration devices, weapons systems, command and control systems, and environmental control systems).&amp;quot;  The phrasing here doesn't clearly indicate that these are not systems in and of themselves. Given widespread confusion regarding how to determine boundaries every effort should be made to prevent any confusion on this matter.  Recommend sentences begin with a phrase like, &amp;quot;Information systems can include as constituent elements ...&amp;quot;  [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
: Is it really necessary to spell this out for readers of the document?  Shouldn't we expect them to be able to ascertain what we meant from what we said? [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
:: No, assuming that a reader starting at the beginning isn't going to have their understandings colored by a misinterpretation here depends on an expectation that is unlikely to be met. [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
== 1.1 BACKGROUND ==&lt;br /&gt;
&lt;br /&gt;
Bullet point which reads: &amp;quot;Promotes the concept of near real-time risk management and ongoing information system authorization through the implementation of robust continuous monitoring processes;&amp;quot;. The continuous monitoring described later in this document does not rise to the level of a robust continuous monitoring process which can support real-time risk management.  Additional technical detail in support of continuous monitoring for real-time risk management needs to be included to support this concept later in this document.  [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
Line which reads: &amp;quot;... changes the traditional focus from the stove-pipe, organization-centric, static-based approaches to C&amp;amp;A ...&amp;quot; C&amp;amp;A was previously very system-centric and lacked the organization-centric functions of the new Risk Management Hierarchy.  The adjective fest here seems a little out of place.  It might be more accurate to describe C&amp;amp;A as a static, procedural activity which provided inadequate guidance to support ongoing risk based decisions.  Recommend dropping dramatic flourishes and have a simple statement that RMF moves the process of FISMA compliance away from a procedural, documentation of C&amp;amp;A focus to a process focused on risk management that leads to FISMA compliance. [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 1.2 PURPOSE AND APPLICABILITY ==&lt;br /&gt;
&lt;br /&gt;
Bullet point which reads: &amp;quot;To ensure that managing risk from the operation and use of federal information systems is consistent with the organization's mission/business objectives and overall risk strategy established by the senior leadership through the risk executive (function);&amp;quot; The concept of mission/business objectives is not well defined in the RMF or SP's 800-30, 800-37 or 800-39.  Recommend that as this mission/business objective concept is central to understanding the risk posed from a failure in the security objectives for a system a clear process for establishing the mission/business objectives for an organization in the context of information systems security should be described as part of the risk strategy established by senior leadership. [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
Bullet point which reads: &amp;quot;To support consistent, well-informed, and ongoing security authorization decisions (through continuous monitoring), transparency of security and risk-related information, and reciprocity of authorization results; and&amp;quot;. The focus on security authorization decision deemphasizes awareness of and acceptance of risk.  Speaking to the authorization decision emphasizes the process. Speaking to awareness of and acceptance of risk in consideration of whether to grant a security authorization emphasizes the management of risk.  Recommend that as RMF is trying to place the emphasis on risk management and away from the empty process of making a decision this should be reworded to emphasize awareness of and acceptance of risk and relate the authorization decision only as a consequent of this awareness and acceptance.&lt;br /&gt;
&lt;br /&gt;
== 1.3 TARGET AUDIENCE ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 1.4 ORGANIZATION OF THIS SPECIAL PUBLICATION ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
A recurring problem with footnotes is that the definitions used here do not match the definitions provided by the glossary.  Variation in definitions leads to confusion and the possibility of misinterpretation.  The use of a single definition should be standard practice. [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Footnote 5: An information system is a discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information.&amp;quot; Recommend either referring readers to glossary for full definition or using full definition here &amp;quot;Information System [44 U.S.C., Sec. 3502] A discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information. [Note: Information systems also include specialized systems such as industrial/process controls systems, telephone switching and private branch exchange (PBX) systems, and environmental control systems.]&amp;quot; [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Footnote 6: A federal information system is defined as an information system used or operated by a federal agency, or by a contractor of a federal agency or by another organization on behalf of a federal agency.&amp;quot; This definition varies a great deal from the definition in the glossary.  Also, as no other footnoted definition uses 'is defined as' it is not recommended for use here.  Recommendation: use definition from glossary as it uses the correct reference to executive agency and is a legal definition: &amp;quot;Federal Information System [40 U.S.C., Sec. 11331] An information system used or operated by an executive agency, by a contractor of an executive agency, or by another organization on behalf of an executive agency.&amp;quot; [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Footnote 7: Adverse impacts to the Nation include, for example, compromises to information systems that support critical infrastructure applications or are paramount to government continuity of operations as defined by the Department of Homeland Security.&amp;quot; This phrase should be included in the glossary. [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Footnote 8: OMB Circular A-130, Appendix III, describes adequate security as security commensurate with risk. This risk includes both the likelihood and magnitude of harm resulting from the loss, misuse, or unauthorized access to or modification of information.&amp;quot; The definition should be the same as the A-130 definition as the implication by reference is that this is the A-130 definition.  &lt;br /&gt;
&lt;br /&gt;
The glossary definition: &amp;quot;Adequate Security [OMB Circular A-130, Appendix III] Security commensurate with the risk and the magnitude of harm resulting from the loss, misuse, or unauthorized access to or modification of information.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The A-130 definition: &amp;quot;adequate security&amp;quot; means security commensurate with the risk and magnitude of the harm resulting from the loss, misuse, or unauthorized access to or modification of information. This includes assuring that systems and applications used by the agency operate effectively and provide appropriate confidentiality, integrity, and availability, through the use of cost-effective management, personnel, operational, and technical controls. [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Footnote 9: Risk is a measure of the extent to which an entity is threatened by a potential circumstance or event, and is typically a function of the likelihood of the circumstance or event occurring and of the resulting adverse impacts.&amp;quot;  Again the definition varies slightly from the definition in the glossary. This disparity can cause confusion and misinterpretation.  The glossary definition also includes a modifying footnote detailing information system-related security risks which is what is intended to be discussed in this footnote.  Recommendation is to stick with the glossary definition or come up with a hybrid definition including all the elements described and used both here and in the glossary.  [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Footnote 10: Security categorization methodologies are described in CNSS Instruction 1253 for national security systems and in FIPS 199 for other than national security systems.&amp;quot; Recommend rewording this for clarity, &amp;quot;Security categorization methodologies for national security systems are described in CNSS Instruction 1253. Security categorization methodologies for non-national security systems are described in FIPS 199. [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Footnote 12: Reciprocity of security authorization results is the mutual agreement among participating organizations to accept each other's security assessments in order to reuse information system resources and/or to accept each other's assessed security posture in order to share information. Reciprocity is best achieved by promoting the concept of transparency (i.e., making sufficient evidence regarding the security state of an information system available, so that an authorizing official from another organization can use that evidence to make credible, risk-based decisions regarding the operation and use of that system or the information it processes, stores, or transmits).&amp;quot;  Different term is used in glossary and in this footnote, enterprise and organization respectively.  Organization is more accurate but reciprocity is defined in NIST SP 800-53r3 with the enterprise term.  Recommend changing the glossary definition to use organization.&lt;br /&gt;
&lt;br /&gt;
Also, the parts of the Defense Security Service Glossary definition for reciprocity might be worth including in the definition as the term will be used in IC.  &amp;quot;Recognition and  acceptance, without further  processing of: (1) security background investigations and  clearance  eligibility determinations. (2) accreditations of  information systems; and (3)  facility accreditations.  Reciprocity is obligatory in the  Intelligence Community when there are no waivers, conditions, or deviations to the Director of  National Intelligence.&amp;quot; [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Footnote 14: A federal information system is an information system used or operated by an executive agency, by a contractor of an executive agency, or by another organization on behalf of an executive agency.&amp;quot; Recommend 'federal information system' should be italicized as it is a defined term. [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Footnote 16: At the agency level, this position is known as the Senior Agency Information Security Officer. Organizations may also refer to this position as the Chief Information Security Officer.&amp;quot; Recommendation: Drop the word &amp;quot;may&amp;quot; from second sentence as it implies NIST is allowing organizations to this. &amp;quot;Organizations also refer&amp;quot; works.  [[User:Dan Philpott|Dan Philpott]] 04:26, 16 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_I&amp;diff=75180</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Appendix I</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_I&amp;diff=75180"/>
				<updated>2009-12-16T03:29:48Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;APPENDIX I&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''SECURITY CONTROLS IN EXTERNAL ENVIRONMENTS'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
PARTNERSHIPS, OUTSOURCING ARRANGEMENTS, SUPPLY CHAIN EXCHANGES&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:GIC-NISTSP80037r1FPD&amp;diff=75179</id>
		<title>Category:GIC-NISTSP80037r1FPD</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:GIC-NISTSP80037r1FPD&amp;diff=75179"/>
				<updated>2009-12-16T03:28:31Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
== Table of Contents ==&lt;br /&gt;
&lt;br /&gt;
*[[Industry:Project_Review/NIST_SP_800-37r1_FPD_Front_Matter|FRONT MATTER]] ([[Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Front_Matter|Discussion]])&lt;br /&gt;
*[[Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_1|CHAPTER ONE INTRODUCTION]] ([[Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_1|Discussion]])&lt;br /&gt;
**1.1 BACKGROUND&lt;br /&gt;
**1.2 PURPOSE AND APPLICABILITY&lt;br /&gt;
**1.3 TARGET AUDIENCE&lt;br /&gt;
**1.4 ORGANIZATION OF THIS SPECIAL PUBLICATION&lt;br /&gt;
*[[Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_2|CHAPTER TWO THE FUNDAMENTALS]] ([[Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_2|Discussion]])&lt;br /&gt;
**2.1 INTEGRATED ENTERPRISE-WIDE RISK MANAGEMENT&lt;br /&gt;
**2.2 SYSTEM DEVELOPMENT LIFE CYCLE&lt;br /&gt;
**2.3 INFORMATION SYSTEM BOUNDARIES&lt;br /&gt;
**2.4 SECURITY CONTROL ALLOCATION&lt;br /&gt;
*[[Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3|CHAPTER THREE THE PROCESS]] ([[Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3|Discussion]])&lt;br /&gt;
**3.1 RMF STEP 1 – CATEGORIZE INFORMATION SYSTEM&lt;br /&gt;
**3.2 RMF STEP 2 – SELECT SECURITY CONTROLS&lt;br /&gt;
**3.3 RMF STEP 3 – IMPLEMENT SECURITY CONTROLS&lt;br /&gt;
**3.4 RMF STEP 4 – ASSESS SECURITY CONTROLS&lt;br /&gt;
**3.5 RMF STEP 5 – AUTHORIZE INFORMATION SYSTEM&lt;br /&gt;
**3.6 RMF STEP 6 – MONITOR SECURITY CONTROLS&lt;br /&gt;
*[[Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_A|APPENDIX A REFERENCES]] ([[Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_A|Discussion]])&lt;br /&gt;
*[[Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_B|APPENDIX B GLOSSARY]] ([[Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_B|Discussion]])&lt;br /&gt;
*[[Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_C|APPENDIX C ACRONYMS]] ([[Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_C|Discussion]])&lt;br /&gt;
*[[Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_D|APPENDIX D ROLES AND RESPONSIBILITIES]] ([[Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_D|Discussion]])&lt;br /&gt;
*[[Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_E|APPENDIX E SUMMARY OF RMF TASKS]] ([[Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_E|Discussion]])&lt;br /&gt;
*[[Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_F|APPENDIX F SECURITY AUTHORIZATION]] ([[Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_F|Discussion]])&lt;br /&gt;
*[[Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_G|APPENDIX G CONTINUOUS MONITORING]] ([[Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_G|Discussion]])&lt;br /&gt;
*[[Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_H|APPENDIX H OPERATIONAL SCENARIOS]] ([[Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_H|Discussion]])&lt;br /&gt;
*[[Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_I|APPENDIX I SECURITY CONTROLS IN EXTERNAL ENVIRONMENTS]] ([[Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_I|Discussion]])&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== Prologue ==&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;quot;...''Through the process of risk management, leaders must consider risk to U.S. interests from adversaries using cyberspace to their advantage and from our own efforts to employ the global nature of cyberspace to achieve objectives in military, intelligence, and business operations''...&amp;quot;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;quot;...''For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated in order to identify important trends and decide where effort should be applied to eliminate or reduce threat capabilities; eliminate or reduce vulnerabilities; and assess, coordinate, and deconflict all cyberspace operations''...&amp;quot;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;quot;...''Leaders at all levels are accountable for ensuring readiness and security to the same degree as in any other domain''...&amp;quot;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
-- THE NATIONAL STRATEGY FOR CYBERSPACE OPERATIONS&lt;br /&gt;
:OFFICE OF THE CHAIRMAN, JOINT CHIEFS OF STAFF, U.S. DEPARTMENT OF DEFENSE&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sources ==&lt;br /&gt;
&lt;br /&gt;
* [http://csrc.nist.gov/publications/drafts/800-37-Rev1/SP800-37-rev1-FPD.pdf NIST SP 800-37 Rev. 1 DRAFT Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach]&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_H&amp;diff=75178</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Appendix H</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_H&amp;diff=75178"/>
				<updated>2009-12-16T02:35:47Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: Added footnotes section.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;APPENDIX H&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''OPERATIONAL SCENARIOS'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
APPLYING THE RISK MANAGEMENT FRAMEWORK IN DIFFERENT ENVIRONMENTS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_G&amp;diff=75177</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Appendix G</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_G&amp;diff=75177"/>
				<updated>2009-12-16T02:35:42Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: Added footnotes section.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;APPENDIX G&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''CONTINUOUS MONITORING'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
MANAGING AND TRACKING THE SECURITY STATE OF INFORMATION SYSTEMS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== G.1  MONITORING STRATEGY ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== G.2  SELECTION OF SECURITY CONTROLS FOR MONITORING ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== G.3  CRITICAL DOCUMENT UPDATES AND STATUS REPORTING ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_F&amp;diff=75176</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Appendix F</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_F&amp;diff=75176"/>
				<updated>2009-12-16T02:35:39Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: Added footnotes section.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;APPENDIX F&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''SECURITY AUTHORIZATION'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AUTHORIZATION DECISIONS AND SUPPORTING EVIDENCE&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== F.1  AUTHORIZATION PACKAGE ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== F.2  AUTHORIZATION DECISIONS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Authorization to Operate ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Denial of Authorization to Operate ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== F.3  AUTHORIZATION DECISION DOCUMENT ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== F.4  ONGOING AUTHORIZATION ==&lt;br /&gt;
&lt;br /&gt;
In the second paragraph of page F-7 a definition is offered for significant change, the text reads &amp;quot;A significant change is defined as a change that has the potential to&lt;br /&gt;
affect the security state of an information system.&amp;quot;  This definition is overbroad and includes almost any activity on a computer as all activity has the potential to affect the security state of the system.  The threshold should be raised to either &amp;quot;a change that is likely to affect&amp;quot; or &amp;quot;a change that has the potential to significantly affect&amp;quot;. [[User:Dan Philpott|Dan Philpott]] 04:36, 9 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
Text of the examples in the event-driven reauthorizations paragraph (page F-7) should reflect that the examples are only significant when they meet the threshold established in the definition of significant change.  Otherwise misreading of the lines is likely to occur with the affect of causing unnecessary effort without worthwhile security gains. [[User:Dan Philpott|Dan Philpott]] 04:36, 9 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
Footnote 63 should add the word can between &amp;quot;action include&amp;quot; unless the requirement is to always have both the Risk Executive (Function) and SISO/CISO provide input whenever the decision to initiate a formal reauthorization is made.  This could cause unnecessary effort for an AO who is making the decision to initiate reauthorization for a system and reduce the likelihood it will occur. [[User:Dan Philpott|Dan Philpott]] 04:36, 9 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_E&amp;diff=75175</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Appendix E</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_E&amp;diff=75175"/>
				<updated>2009-12-16T02:35:35Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: Added footnotes section.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;APPENDIX E&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''SUMMARY OF RMF TASKS'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
LISTING OF PRIMARY RESPONSIBILITIES AND SUPPORTING ROLES&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== RMF Step 1: Categorize Information System ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-2 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-3 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== RMF Step 2: Select Security Controls ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-2 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-3 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-4 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== RMF Step 3: Implement Security Controls ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-2 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== RMF Step 4: Assess Security Controls ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-2 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-3 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== RMF Step 5: Authorize Information System ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-2 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-3 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-4 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-5 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== RMF Step 6: Monitor Security Controls ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-2 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-3 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-4 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-5 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-6 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-7 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_D&amp;diff=75174</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Appendix D</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_D&amp;diff=75174"/>
				<updated>2009-12-16T02:35:31Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: Added footnotes section.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;APPENDIX D&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''ROLES AND RESPONSIBILITIES'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
KEY PARTICIPANTS IN THE RISK MANAGEMENT PROCESS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== D.1  HEAD OF AGENCY (CHIEF EXECUTIVE OFFICER) ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== D.2  RISK EXECUTIVE (FUNCTION) ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== D.3  CHIEF INFORMATION OFFICER ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== D.4  INFORMATION OWNER/STEWARD ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== D.5  SENIOR INFORMATION SECURITY OFFICER ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== D.6  AUTHORIZING OFFICIAL ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== D.7  AUTHORIZING OFFICIAL DESIGNATED REPRESENTATIVE ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== D.8  COMMON CONTROL PROVIDER ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== D.9  INFORMATION SYSTEM OWNER ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== D.10  INFORMATION SYSTEM SECURITY MANAGER/OFFICER ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== D.11  INFORMATION SECURITY ARCHITECT ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== D.12  INFORMATION SYSTEM SECURITY ENGINEER ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== D.13  SECURITY CONTROL ASSESSOR ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_C&amp;diff=75173</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Appendix C</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_C&amp;diff=75173"/>
				<updated>2009-12-16T02:35:28Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: Added footnotes section.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;APPENDIX C&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''ACRONYMS'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
COMMON ABBREVIATIONS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_B&amp;diff=75172</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Appendix B</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_B&amp;diff=75172"/>
				<updated>2009-12-16T02:35:24Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: Added footnotes section.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;APPENDIX B&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''GLOSSARY'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
COMMON TERMS AND DEFINITIONS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPDFPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_A&amp;diff=75171</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Appendix A</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_A&amp;diff=75171"/>
				<updated>2009-12-16T02:35:21Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: Added footnotes section.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;APPENDIX A&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''REFERENCES'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
LAWS, POLICIES, DIRECTIVES, INSTRUCTIONS, STANDARDS, AND GUIDELINES&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{GIC-NISTSP80037r1FPDReferenceHeaders&lt;br /&gt;
| Text=LEGISLATION&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{GIC-NISTSP80037r1FPDReferenceHeaders&lt;br /&gt;
| Text=POLICIES, DIRECTIVES, INSTRUCTIONS&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{GIC-NISTSP80037r1FPDReferenceHeaders&lt;br /&gt;
| Text=STANDARDS&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{GIC-NISTSP80037r1FPDReferenceHeaders&lt;br /&gt;
| Text=GUIDELINES&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPDFPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75170</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Chapter 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=75170"/>
				<updated>2009-12-16T02:35:18Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: Added footnotes section.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;CHAPTER THREE&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''THE PROCESS'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
EXECUTING THE RISK MANAGEMENT FRAMEWORK TASKS&lt;br /&gt;
&lt;br /&gt;
As an overall comment I find that the blocks of text making up these tasks are too dense and need to be broken up into shorter, more targetted segments.  NIST SP 800-53r3 made excellent use of exploding out lists which had previously been embedded in paragraphs (e.g., (i) ..., (ii) ..., etc.).  Reading security documents is often difficult for people who feel overwhelmed trying to link the different data elements into a comprehensive picture. Good writing practice and formatting can make reading dense guidance wording easier, much as good writing and formatting can make reading source code easier.  [[User:Dan Philpott|Dan Philpott]] 04:10, 8 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== APPLICATION OF THE RISK MANAGEMENT FRAMEWORK ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.1 RMF STEP 1 - CATEGORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-1 SECURITY CATEGORIZATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-2 INFORMATION SYSTEM DESCRIPTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-3 INFORMATION SYSTEM REGISTRATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.2 RMF STEP 2 - SELECT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-1 SECURITY CONTROL SELECTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-2 COMMON CONTROL IDENTIFICATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-3 MONITORING STRATEGY ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-4 SECURITY PLAN APPROVAL ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #2 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.3 RMF STEP 3 - IMPLEMENT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-1 SECURITY CONTROL IMPLEMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-2 SECURITY CONTROL DOCUMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #3 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.4 RMF STEP 4 - ASSESS SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-1 ASSESSMENT PREPARATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-2 SECURITY CONTROL ASSESSMENT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-3 SECURITY ASSESSMENT REPORT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #4 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.5 RMF STEP 5 - AUTHORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-1 REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-2 PLAN OF ACTION AND MILESTONES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-3 SECURITY AUTHORIZATION PACKAGE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-4 RISK DETERMINATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-5 RISK ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #5 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.6 RMF STEP 6 - MONITOR SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-1 INFORMATION SYSTEM AND ENVIRONMENT CHANGES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-2 ONGOING SECURITY CONTROL ASSESSMENTS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-3 ONGOING REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-4 CRITICAL UPDATES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-5 SECURITY STATUS REPORTING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-6 ONGOING RISK DETERMINATION AND ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-7 INFORMATION SYSTEM REMOVAL AND DECOMMISSIONING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #6 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_2&amp;diff=75169</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Chapter 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_2&amp;diff=75169"/>
				<updated>2009-12-16T02:35:14Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: Added footnotes section.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;CHAPTER TWO&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''THE FUNDAMENTALS'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
BASIC CONCEPTS ASSOCIATED WITH MANAGING RISK FROM INFORMATION SYSTEMS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2.1 INTEGRATED ENTERPRISE-WIDE RISK MANAGEMENT ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2.2 SYSTEM DEVELOPMENT LIFE CYCLE ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2.3 INFORMATION SYSTEM BOUNDARIES ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2.3.1  Establishing Information System Boundaries ===&lt;br /&gt;
&lt;br /&gt;
Final chapter of this section is very concerning to me. Seems to imply that security of the Operating System is the paramount concern without regard to the fact that applications are where the majority of government data is held. [[User:Dan Philpott|Dan Philpott]] 03:26, 8 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== 2.3.2  Boundaries for Complex Information Systems (System of Systems) ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2.3.3 Dynamic Subsystems ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2.4 SECURITY CONTROL ALLOCATION ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Front_Matter&amp;diff=75168</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Front Matter</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Front_Matter&amp;diff=75168"/>
				<updated>2009-12-16T02:35:11Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: Added footnotes section.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;color:black;background:white;width:100%&amp;quot; align=&amp;quot;left&amp;quot; border=&amp;quot;0&amp;quot;&lt;br /&gt;
| align=&amp;quot;left&amp;quot; |&lt;br /&gt;
{| style=&amp;quot;color:black;background:white;&amp;quot; align=&amp;quot;left&amp;quot; border=&amp;quot;0&amp;quot;&lt;br /&gt;
| NIST Special Publication 800-37&lt;br /&gt;
| &amp;lt;font size=&amp;quot;+2&amp;quot;&amp;gt;'''Guide for Applying the Risk'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Revision 1&lt;br /&gt;
| &amp;lt;font size=&amp;quot;+2&amp;quot;&amp;gt;'''Management Framework to'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &amp;lt;font size=&amp;quot;+2&amp;quot;&amp;gt;'''Federal Information Systems'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| &amp;lt;font size=&amp;quot;+1&amp;quot;&amp;gt;'''''A Security [http://fismapedia.org/index.php?title=Term:Life_Cycle Life Cycle] Approach'''''&amp;lt;/font&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; align=&amp;quot;right&amp;quot; |&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Reports on Computer Systems Technology ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Authority==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Compliance with NIST Standards and Guidelines ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Notes to Reviewers ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_1&amp;diff=75167</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Chapter 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_1&amp;diff=75167"/>
				<updated>2009-12-16T02:35:07Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: Added footnotes section.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;CHAPTER ONE&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''INTRODUCTION'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 1.1 BACKGROUND ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 1.2 PURPOSE AND APPLICABILITY ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 1.3 TARGET AUDIENCE ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 1.4 ORGANIZATION OF THIS SPECIAL PUBLICATION ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_F&amp;diff=74988</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Appendix F</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_F&amp;diff=74988"/>
				<updated>2009-12-09T04:42:35Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: /* F.4  ONGOING AUTHORIZATION */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;APPENDIX F&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''SECURITY AUTHORIZATION'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AUTHORIZATION DECISIONS AND SUPPORTING EVIDENCE&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== F.1  AUTHORIZATION PACKAGE ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== F.2  AUTHORIZATION DECISIONS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Authorization to Operate ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Denial of Authorization to Operate ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== F.3  AUTHORIZATION DECISION DOCUMENT ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== F.4  ONGOING AUTHORIZATION ==&lt;br /&gt;
&lt;br /&gt;
In the second paragraph of page F-7 a definition is offered for significant change, the text reads &amp;quot;A significant change is defined as a change that has the potential to&lt;br /&gt;
affect the security state of an information system.&amp;quot;  This definition is overbroad and includes almost any activity on a computer as all activity has the potential to affect the security state of the system.  The threshold should be raised to either &amp;quot;a change that is likely to affect&amp;quot; or &amp;quot;a change that has the potential to significantly affect&amp;quot;. [[User:Dan Philpott|Dan Philpott]] 04:36, 9 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
Text of the examples in the event-driven reauthorizations paragraph (page F-7) should reflect that the examples are only significant when they meet the threshold established in the definition of significant change.  Otherwise misreading of the lines is likely to occur with the affect of causing unnecessary effort without worthwhile security gains. [[User:Dan Philpott|Dan Philpott]] 04:36, 9 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
Footnote 63 should add the word can between &amp;quot;action include&amp;quot; unless the requirement is to always have both the Risk Executive (Function) and SISO/CISO provide input whenever the decision to initiate a formal reauthorization is made.  This could cause unnecessary effort for an AO who is making the decision to initiate reauthorization for a system and reduce the likelihood it will occur. [[User:Dan Philpott|Dan Philpott]] 04:36, 9 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_F&amp;diff=74987</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Appendix F</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_F&amp;diff=74987"/>
				<updated>2009-12-09T04:36:17Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: /* F.4  ONGOING AUTHORIZATION */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;APPENDIX F&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''SECURITY AUTHORIZATION'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AUTHORIZATION DECISIONS AND SUPPORTING EVIDENCE&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== F.1  AUTHORIZATION PACKAGE ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== F.2  AUTHORIZATION DECISIONS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Authorization to Operate ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Denial of Authorization to Operate ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== F.3  AUTHORIZATION DECISION DOCUMENT ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== F.4  ONGOING AUTHORIZATION ==&lt;br /&gt;
&lt;br /&gt;
In the second paragraph of page F-7 a definition is offered for significant change, the text reads &amp;quot;A significant change is defined as a change that has the potential to&lt;br /&gt;
affect the security state of an information system.&amp;quot;  This definition is overbroad and includes almost any activity on a computer as all activity has the potential to affect the security state of the system.  The threshold should be raised to either &amp;quot;a change that is likely to affect&amp;quot; or &amp;quot;a change that has the potential to significantly affect&amp;quot;. [[User:Dan Philpott|Dan Philpott]] 04:36, 9 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
Text of the examples in the event-driven reauthorizations paragraph (Page F-7) should reflect that the examples are only significant when they meet the threshold established in the definition of significant change.  Otherwise misreading of the lines is likely to occur with the affect of causing unnecessary effort without worthwhile security gains. [[User:Dan Philpott|Dan Philpott]] 04:36, 9 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
Footnote 63 should add the word can between &amp;quot;action include&amp;quot; unless the requirement is to always have both the Risk Executive (Function) and SISO/CISO provide input whenever a formal reauthorization decision is made.  This could cause unnecessary effort for an AO who is making the decision to initiate reauthorization for a system and reduce the likelihood it will occur. [[User:Dan Philpott|Dan Philpott]] 04:36, 9 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=74931</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Chapter 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=74931"/>
				<updated>2009-12-08T04:25:52Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;CHAPTER THREE&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''THE PROCESS'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
EXECUTING THE RISK MANAGEMENT FRAMEWORK TASKS&lt;br /&gt;
&lt;br /&gt;
As an overall comment I find that the blocks of text making up these tasks are too dense and need to be broken up into shorter, more targetted segments.  NIST SP 800-53r3 made excellent use of exploding out lists which had previously been embedded in paragraphs (e.g., (i) ..., (ii) ..., etc.).  Reading security documents is often difficult for people who feel overwhelmed trying to link the different data elements into a comprehensive picture. Good writing practice and formatting can make reading dense guidance wording easier, much as good writing and formatting can make reading source code easier.  [[User:Dan Philpott|Dan Philpott]] 04:10, 8 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== APPLICATION OF THE RISK MANAGEMENT FRAMEWORK ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.1 RMF STEP 1 - CATEGORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-1 SECURITY CATEGORIZATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-2 INFORMATION SYSTEM DESCRIPTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-3 INFORMATION SYSTEM REGISTRATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.2 RMF STEP 2 - SELECT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-1 SECURITY CONTROL SELECTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-2 COMMON CONTROL IDENTIFICATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-3 MONITORING STRATEGY ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-4 SECURITY PLAN APPROVAL ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #2 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.3 RMF STEP 3 - IMPLEMENT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-1 SECURITY CONTROL IMPLEMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-2 SECURITY CONTROL DOCUMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #3 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.4 RMF STEP 4 - ASSESS SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-1 ASSESSMENT PREPARATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-2 SECURITY CONTROL ASSESSMENT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-3 SECURITY ASSESSMENT REPORT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #4 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.5 RMF STEP 5 - AUTHORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-1 REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-2 PLAN OF ACTION AND MILESTONES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-3 SECURITY AUTHORIZATION PACKAGE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-4 RISK DETERMINATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-5 RISK ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #5 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.6 RMF STEP 6 - MONITOR SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-1 INFORMATION SYSTEM AND ENVIRONMENT CHANGES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-2 ONGOING SECURITY CONTROL ASSESSMENTS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-3 ONGOING REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-4 CRITICAL UPDATES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-5 SECURITY STATUS REPORTING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-6 ONGOING RISK DETERMINATION AND ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-7 INFORMATION SYSTEM REMOVAL AND DECOMMISSIONING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #6 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=74930</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Chapter 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3&amp;diff=74930"/>
				<updated>2009-12-08T04:10:31Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;CHAPTER THREE&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''THE PROCESS'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
EXECUTING THE RISK MANAGEMENT FRAMEWORK TASKS&lt;br /&gt;
&lt;br /&gt;
As an overall comment I find that the blocks of text making up these tasks are too dense and need to be broken up into shorter, more targetted segments.  NIST SP 800-53r3 made excellent use of exploding out lists which had previously been embedded in paragraphs (e.g., (i) ..., (ii) ..., etc.).  Reading security documents is often difficult for people who feel overwhelmed trying to the different data elements to each other. Good writing practice and formatting can make reading dense guidance wording easier, much as good writing and formatting can make reading source code easier.  [[User:Dan Philpott|Dan Philpott]] 04:10, 8 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== APPLICATION OF THE RISK MANAGEMENT FRAMEWORK ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.1 RMF STEP 1 - CATEGORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-1 SECURITY CATEGORIZATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-2 INFORMATION SYSTEM DESCRIPTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 1-3 INFORMATION SYSTEM REGISTRATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.2 RMF STEP 2 - SELECT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-1 SECURITY CONTROL SELECTION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-2 COMMON CONTROL IDENTIFICATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-3 MONITORING STRATEGY ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 2-4 SECURITY PLAN APPROVAL ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #2 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.3 RMF STEP 3 - IMPLEMENT SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-1 SECURITY CONTROL IMPLEMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 3-2 SECURITY CONTROL DOCUMENTATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #3 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.4 RMF STEP 4 - ASSESS SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-1 ASSESSMENT PREPARATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-2 SECURITY CONTROL ASSESSMENT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 4-3 SECURITY ASSESSMENT REPORT ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #4 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.5 RMF STEP 5 - AUTHORIZE INFORMATION SYSTEM ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-1 REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-2 PLAN OF ACTION AND MILESTONES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-3 SECURITY AUTHORIZATION PACKAGE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-4 RISK DETERMINATION ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 5-5 RISK ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #5 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 3.6 RMF STEP 6 - MONITOR SECURITY CONTROLS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-1 INFORMATION SYSTEM AND ENVIRONMENT CHANGES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-2 ONGOING SECURITY CONTROL ASSESSMENTS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-3 ONGOING REMEDIATION ACTIONS ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-4 CRITICAL UPDATES ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-5 SECURITY STATUS REPORTING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-6 ONGOING RISK DETERMINATION AND ACCEPTANCE ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TASK 6-7 INFORMATION SYSTEM REMOVAL AND DECOMMISSIONING ===&lt;br /&gt;
&lt;br /&gt;
==== TASK ====&lt;br /&gt;
&lt;br /&gt;
==== Primary Responsibility ====&lt;br /&gt;
&lt;br /&gt;
==== Supporting Roles ====&lt;br /&gt;
&lt;br /&gt;
==== System Development Life Cycle Phase ====&lt;br /&gt;
&lt;br /&gt;
==== Supplemental Guidance ====&lt;br /&gt;
&lt;br /&gt;
==== References  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Milestone Checkpoint #6 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_2&amp;diff=74929</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Chapter 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_2&amp;diff=74929"/>
				<updated>2009-12-08T03:40:55Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;CHAPTER TWO&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''THE FUNDAMENTALS'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
BASIC CONCEPTS ASSOCIATED WITH MANAGING RISK FROM INFORMATION SYSTEMS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2.1 INTEGRATED ENTERPRISE-WIDE RISK MANAGEMENT ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2.2 SYSTEM DEVELOPMENT LIFE CYCLE ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2.3 INFORMATION SYSTEM BOUNDARIES ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2.3.1  Establishing Information System Boundaries ===&lt;br /&gt;
&lt;br /&gt;
Final chapter of this section is very concerning to me. Seems to imply that security of the Operating System is the paramount concern without regard to the fact that applications are where the majority of government data is held. [[User:Dan Philpott|Dan Philpott]] 03:26, 8 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== 2.3.2  Boundaries for Complex Information Systems (System of Systems) ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2.3.3 Dynamic Subsystems ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2.4 SECURITY CONTROL ALLOCATION ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_2&amp;diff=74928</id>
		<title>Industry:Project Review/NIST SP 800-37r1 FPD Chapter 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_2&amp;diff=74928"/>
				<updated>2009-12-08T03:40:24Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: /* 2.3.2  Boundaries for Complex Information Systems (System of Systems) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;CHAPTER TWO&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''THE FUNDAMENTALS'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
BASIC CONCEPTS ASSOCIATED WITH MANAGING RISK FROM INFORMATION SYSTEMS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This chapter describes the basic concepts associated with managing information security-related risks from information systems. These concepts include: (i) incorporating [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] principles and best practices into organization-wide strategic planning considerations, core missions and business processes, and supporting organizational information systems; (ii) integrating information [http://fismapedia.org/index.php?title=Term:Security_Requirements security requirements] into [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle] processes; (iii) establishing practical and meaningful boundaries for organizational information systems; and ([http://fismapedia.org/index.php?title=AnA:IV iv]) allocating [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] to organizational information systems as system-specific, hybrid, or common controls.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2.1 INTEGRATED ENTERPRISE-WIDE RISK MANAGEMENT ==&lt;br /&gt;
&lt;br /&gt;
Managing risks from information systems is a complex, multifaceted undertaking that requires the involvement of the entire organization—from the senior leaders providing the strategic vision and top-level goals and objectives for the organization, to the mid-level leaders managing projects and implementing systems, to the individuals on the front lines developing, implementing, and operating the systems supporting the organization's core missions and business processes. [http://fismapedia.org/index.php?title=Term:Risk_Management Risk management] can be viewed as a holistic [http://fismapedia.org/index.php?title=Term:Activity activity] that is fully integrated into every aspect of the organization. Figure 2-1 illustrates a hierarchical, three-tiered approach to [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] that addresses risk-related concerns at: (i) the ''organization'' level; (ii) the ''mission and business process'' level; and (iii) the ''information system'' level.&amp;lt;ref&amp;gt;NIST [http://fismapedia.org/index.php?title=Doc:Special_Publication_800-39 Special Publication 800-39], ''Integrated Enterprise-Wide Risk Management: Organization, Mission, and Information System View'' (projected for publication in 2010), will provide guidance on the holistic approach to [http://fismapedia.org/index.php?title=Term:Risk_Management risk management].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:80037r1FPD_Figure2-1.png|500px|thumb|center|FIGURE 2-1: HIERARCHICAL RISK MANAGEMENT APPROACH]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Risk management at Tier 1 addresses risk from the organizational perspective with the development of a comprehensive governance structure and enterprise-wide [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] strategy that includes: (i) the techniques and methodologies the organization plans to employ to assess risk from information systems and other types of risk of concern to the organization;&amp;lt;ref&amp;gt;Other types of risk include, for example: (i) acquisition risk (cost, schedule, performance); (ii) compliance and regulatory risk; (iii) financial risk; ([http://fismapedia.org/index.php?title=AnA:IV iv]) legal risk; (v) operational (mission/business) risk; (vi) political risk; (vii) program/project risk; (viii) reputational risk; (ix) safety risk; (x) strategic planning risk; and (xi) [http://fismapedia.org/index.php?title=Term:Supply_Chain supply chain] risk.&amp;lt;/ref&amp;gt; (ii) the methods and procedures the organization plans to use to evaluate the significance of the risks identified during the [http://fismapedia.org/index.php?title=Term:Risk_Assessment risk assessment]; (iii) the types and extent of [http://fismapedia.org/index.php?title=Term:Risk_Mitigation risk mitigation] [http://fismapedia.org/index.php?title=Term:Measures measures] the organization plans to employ to address identified risks; ([http://fismapedia.org/index.php?title=AnA:IV iv]) the level of risk the organization plans to accept (i.e., [http://fismapedia.org/index.php?title=Term:Risk_Tolerance risk tolerance]); (v) how the organization plans to monitor risk on an ongoing basis given the inevitable changes to organizational information systems and their environments of operation; and (vi) the degree and type of oversight the organization plans to use to ensure that the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] strategy is being effectively carried out. As part of the overall governance structure established by the organization, the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] strategy is propagated to organizational officials and support contractors with developmental, operational, and oversight responsibilities, including for example: (i) authorizing officials (including mission and business owners); (ii) chief information officers; (iii) senior information security officers; ([http://fismapedia.org/index.php?title=AnA:IV iv]) enterprise/information security architects; (v) information system owners/program managers; (vi) information owners/stewards; (vii) information system security officers; (viii) information system security engineers; (ix) information system developers and integrators; (x) system administrators; and (xi) users.&lt;br /&gt;
&lt;br /&gt;
Managing risk at Tier 2 addresses risk from a ''mission'' and ''business process'' perspective and is guided by the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management]-related decisions taken at Tier 1. Tier 2 activities are integral to enterprise architecture&amp;lt;ref&amp;gt;Federal [http://fismapedia.org/index.php?title=Term:Enterprise_Architecture Enterprise Architecture] [http://fismapedia.org/index.php?title=Term:Reference Reference] Models and Segment and Solution [http://fismapedia.org/index.php?title=Term:Architectures Architectures] are defined in the OMB [http://fismapedia.org/index.php?title=Term:Federal_Enterprise_Architecture Federal Enterprise Architecture] ([http://fismapedia.org/index.php?title=AnA:FEA FEA]) Program, [http://fismapedia.org/index.php?title=AnA:FEA FEA] Consolidated [http://fismapedia.org/index.php?title=Term:Reference Reference] Model Document, Version 2.3, October 2003 and OMB Federal [http://fismapedia.org/index.php?title=Term:Segment_Architecture Segment Architecture] Methodology (FSAM), January 2009, respectively.&amp;lt;/ref&amp;gt; and organizational assessments of risk and include: (i) defining the core missions and business processes for the organization (including any derivative or related missions and business processes carried out by subordinate organizations); (ii) prioritizing missions and business processes with respect to the goals and objectives of the organization; (iii) defining the types of information that the organization needs to successfully execute the stated missions and business processes and the information flows both internal and external to the organization; and ([http://fismapedia.org/index.php?title=AnA:IV iv]) developing an organization-wide information protection strategy and incorporating high-level information [http://fismapedia.org/index.php?title=Term:Security_Requirements security requirements] into the core missions and business processes; (v) specifying the degree of autonomy for subordinate organizations (i.e., organizations within the [http://fismapedia.org/index.php?title=Term:Parent_Organization parent organization]) that the [http://fismapedia.org/index.php?title=Term:Parent_Organization parent organization] permits for assessing, evaluating, mitigating, accepting, and monitoring risk.&lt;br /&gt;
&lt;br /&gt;
The [http://fismapedia.org/index.php?title=AnA:FIRST first] two activities are necessary because there may be different priorities associated with organizational missions and business processes (including derivative or related missions and business processes) that need to be factored into the weighting of risk calculations—both within specific elements of the organization as well as for the overall [http://fismapedia.org/index.php?title=Term:Risk_Tolerance risk tolerance] of the organization. The early incorporation of information [http://fismapedia.org/index.php?title=Term:Security_Requirements security requirements] into the organization's missions and business processes helps to ensure that risk-related considerations are effectively integrated into the organization's [http://fismapedia.org/index.php?title=Term:Enterprise_Architecture enterprise architecture] and [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle] processes. The last [http://fismapedia.org/index.php?title=Term:Activity activity] reflects the diversity of mission/business needs and the availability of resources across the organization. Because subordinate organizations responsible for carrying out derivative or related missions and business processes may have already invested in their own methods of assessing, evaluating, mitigating, accepting and monitoring risk, parent organizations may allow a greater degree of autonomy within parts of the organization or across the entire organization in order to minimize costs. When a diversity of [http://fismapedia.org/index.php?title=Term:Risk_Assessment risk assessment] methods is allowed, organizations employ some means of translation and/or synthesis of the risk-related information to ensure that the output of the different [http://fismapedia.org/index.php?title=Term:Risk_Assessment risk assessment] activities can be correlated in a meaningful manner.&lt;br /&gt;
&lt;br /&gt;
Risk management at Tier 3 addresses risk from an ''information system'' perspective and is guided by the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] decisions taken at Tier 2. [http://fismapedia.org/index.php?title=Term:Risk_Management Risk management] decisions taken at Tier 2 impact the ultimate selection and deployment of needed safeguards and countermeasures (i.e., [http://fismapedia.org/index.php?title=Term:Security_Controls security controls]) at the information [http://fismapedia.org/index.php?title=Term:System_Level system level]. Information [http://fismapedia.org/index.php?title=Term:Security_Requirements security requirements] are satisfied by the selection of appropriate management, operational, and [http://fismapedia.org/index.php?title=Term:Technical_Security technical security] controls from [http://fismapedia.org/index.php?title=Doc:NIST_Special_Publication_800-53 NIST Special Publication 800-53]. The [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] are subsequently allocated to the various components of the information system as system-specific, hybrid, or common controls.&amp;lt;ref&amp;gt;The allocation of [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] can take place at all three tiers in the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] hierarchy. For example, [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] that are identified as common controls may be allocated at the organization, mission/business process, or information [http://fismapedia.org/index.php?title=Term:System_Level system level]. See Section 2.4 for additional information on security control allocation.&amp;lt;/ref&amp;gt; [http://fismapedia.org/index.php?title=Term:Security_Controls Security controls] can be provided by the organization or by an external provider. Relationships with external providers are established in a variety of ways, for example, through joint ventures, business partnerships, outsourcing arrangements (i.e., through contracts, interagency agreements, [http://fismapedia.org/index.php?title=Term:Lines_of_Business lines of business] arrangements), licensing agreements, and/or [http://fismapedia.org/index.php?title=Term:Supply_Chain supply chain] exchanges.&amp;lt;ref&amp;gt;Appendix I provides additional guidance regarding external service providers and the provision of [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] in external environments.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Risk management tasks begin early in the [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle] and are important in shaping the security capabilities of the information system. If these tasks are not adequately performed during the initiation, development, and acquisition phases of the [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle], the tasks will, by necessity, be undertaken later in the [http://fismapedia.org/index.php?title=Term:Life_Cycle life cycle] and be more costly to implement. In either situation, all tasks are completed prior to placing the information system into operation or continuing its operation to ensure that: (i) [http://fismapedia.org/index.php?title=Term:Information_System-related_Security_Risks information system-related security risks] are being adequately addressed on an ongoing basis; and (ii) the [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official] explicitly understands and accepts the risk to organizational operations and assets, individuals, other organizations, and the Nation based on the implementation of a defined set of [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] and the current security state of the information system.&lt;br /&gt;
&lt;br /&gt;
Tier 3 [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] assumes the integration and tight coupling of the six-step [http://fismapedia.org/index.php?title=Term:Risk_Management Risk Management] Framework ([http://fismapedia.org/index.php?title=AnA:RMF RMF]) into the [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle]. The framework, illustrated in Figure 2-2, provides a disciplined and structured process that operates within the [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle] to effectively manage [http://fismapedia.org/index.php?title=Term:Information_System-related_Security_Risks information system-related security risks]. The [http://fismapedia.org/index.php?title=AnA:RMF RMF] steps include:&lt;br /&gt;
&lt;br /&gt;
*   '''''Categorizing''''' the information system and the information processed, stored, and transmitted by that system based on a worst-case impact analysis.&amp;lt;ref&amp;gt;FIPS 199 provides [http://fismapedia.org/index.php?title=Term:Security_Categorization security categorization] guidance for nonnational security systems. [http://fismapedia.org/index.php?title=Doc:CNSS_Instruction_1253 CNSS Instruction 1253] provides similar guidance for [http://fismapedia.org/index.php?title=Term:National_Security_Systems national security systems].&amp;lt;/ref&amp;gt;&lt;br /&gt;
*   '''''Selecting''''' an initial set of [http://fismapedia.org/index.php?title=Term:Baseline_Security baseline security] controls for the information system based on the [http://fismapedia.org/index.php?title=Term:Security_Categorization security categorization]; [http://fismapedia.org/index.php?title=Term:Tailoring tailoring] and supplementing the [http://fismapedia.org/index.php?title=Term:Security_Control_Baseline security control baseline] as needed based on an organizational [http://fismapedia.org/index.php?title=Term:Assessment assessment] of risk and local conditions.&amp;lt;ref&amp;gt;NIST [http://fismapedia.org/index.php?title=Doc:Special_Publication_800-53 Special Publication 800-53] provides security control selection guidance for nonnational security systems. [http://fismapedia.org/index.php?title=Doc:CNSS_Instruction_1253 CNSS Instruction 1253] provides similar guidance for [http://fismapedia.org/index.php?title=Term:National_Security_Systems national security systems].&amp;lt;/ref&amp;gt;&lt;br /&gt;
*   ''Implementing'' the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] and describing how the controls are employed within the information system and its environment of operation.&lt;br /&gt;
*   ''Assessing'' the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] using appropriate [http://fismapedia.org/index.php?title=Term:Assessment assessment] procedures to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the [http://fismapedia.org/index.php?title=Term:Security_Requirements security requirements] for the system.&lt;br /&gt;
*   ''Authorizing'' information system operation based on a determination of the risk to organizational operations and assets, individuals, other organizations, and the Nation resulting from the operation of the information system and the decision that this risk is acceptable.&lt;br /&gt;
*   ''Monitoring'' the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] in the information system on an ongoing basis including assessing control effectiveness, documenting changes to the system or its environment of operation, conducting security impact analyses of the associated changes, nvironment of operation, conducting security impact analyses of the associated changes, and [http://fismapedia.org/index.php?title=Term:Reporting reporting] the security state of the system to designated organizational officials.&lt;br /&gt;
&lt;br /&gt;
Chapter Three provides a detailed description of each of the specific tasks necessary to carry out the six steps in the [http://fismapedia.org/index.php?title=AnA:RMF RMF].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:80037r1FPD_Figure2-2.png|500px|thumb|center|FIGURE 2-2: RISK MANAGEMENT FRAMEWORK]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In summary, there is a significant degree of flexibility in how organizations employ the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] processes described above. While it is convenient to portray the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] approach in Figure 2-1 as hierarchical, the reality of project and organization dynamics can be much more complex. The organizational management style may be at one or more points on the continuum from top-down command to consensus among peers. For [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] to succeed at all levels of the organization, the organization must have a consistent and effective approach to [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] that is applied to all [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] processes and procedures.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2.2 SYSTEM DEVELOPMENT LIFE CYCLE ==&lt;br /&gt;
&lt;br /&gt;
All federal information systems, including operational systems, systems under development, and systems undergoing modification or upgrade, are in some phase of the [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle].&amp;lt;ref&amp;gt;There are typically five phases in a generic [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle] including: (i) system initiation; (ii) system development/acquisition; (iii) system implementation; ([http://fismapedia.org/index.php?title=AnA:IV iv]) system operations/maintenance; and (v) system [http://fismapedia.org/index.php?title=Term:Disposition disposition].&amp;lt;/ref&amp;gt; Requirements definition is a critical part of the system development process and begins very early in the [http://fismapedia.org/index.php?title=Term:Life_Cycle life cycle], typically in the ''system initiation'' phase.&amp;lt;ref&amp;gt;Organizations may employ a variety of [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle] processes including, for example, waterfall, spiral, or agile development.&amp;lt;/ref&amp;gt; [http://fismapedia.org/index.php?title=Term:Security_Requirements Security requirements] are a subset of the overall functional requirements levied on an information system and therefore, whenever possible, are incorporated into the [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle] at the earliest opportunity. Without the early infusion of [http://fismapedia.org/index.php?title=Term:Security_Requirements security requirements], significant expense may be incurred by the organization later in the [http://fismapedia.org/index.php?title=Term:Life_Cycle life cycle] to address security considerations that could have been included in the initial design. This may also result in less than effective information security solutions. Organizations prioritize information system requirements, both functional and security-related, in accordance with the strategic objectives of the organization, its core missions and business processes, and operational considerations.&lt;br /&gt;
&lt;br /&gt;
Integrating information [http://fismapedia.org/index.php?title=Term:Security_Requirements security requirements] into the [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle] is the most cost-effective and efficient method for an organization to ensure that its protection strategy is implemented. It also ensures that information security processes are not isolated from the other routine management processes employed by the organization to develop, implement, operate, and maintain information systems supporting ongoing missions and business functions. In addition to incorporating information [http://fismapedia.org/index.php?title=Term:Security_Requirements security requirements] into the [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle], [http://fismapedia.org/index.php?title=Term:Security_Requirements security requirements] are also integrated into the program, planning, and budgeting activities within the organization to ensure that the resources are available when needed. The [http://fismapedia.org/index.php?title=Term:Enterprise_Architecture enterprise architecture] provides a central record of this integration within an organization. As part of their ongoing management and oversight responsibilities, organizational officials ensure that adequate resources are allocated to information security. Organizational officials identify the resources necessary to complete the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] tasks described in this publication and ensure that those resources are made available to appropriate personnel. [http://fismapedia.org/index.php?title=Term:Resource Resource] allocation includes both funding to carry out the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] tasks and assigning the personnel needed to accomplish the tasks.&amp;lt;ref&amp;gt;Resource requirements include funding for training organizational personnel to ensure that they can effectively carry out their assigned responsibilities.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Using the well-established concept of ''integrated project teams'',&amp;lt;ref&amp;gt;Integrated project teams are multidisciplinary entities consisting of individuals with appropriate skills and expertise to help facilitate the development of information systems that meet the requirements of the organization.&amp;lt;/ref&amp;gt; security professionals are an integral part of any information system-related development activities. Making information [http://fismapedia.org/index.php?title=Term:Security_Requirements security requirements] an integral part of all types of [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle] processes (e.g., waterfall, spiral, agile development) helps to ensure that senior leaders consider information security risks to organizational operations and assets, individuals, other organizations, and the Nation and take appropriate actions to mitigate these risks. Such consideration is used to foster close cooperation among personnel responsible for the design, development, implementation, operation, [http://fismapedia.org/index.php?title=Term:Maintenance maintenance], and [http://fismapedia.org/index.php?title=Term:Disposition disposition] of information systems and the information security professionals advising the senior leadership on appropriate [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] needed to adequately mitigate risk and protect critical missions and business functions.&lt;br /&gt;
&lt;br /&gt;
Finally, organizations maximize the use of [http://fismapedia.org/index.php?title=Term:Security-Relevant_Information security-relevant information] (e.g., [http://fismapedia.org/index.php?title=Term:Assessment assessment] results, information system documentation, and other [http://fismapedia.org/index.php?title=Term:Artifacts artifacts]) generated during the [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle] to satisfy requirements for similar information needed for information security-related purposes. Similar [http://fismapedia.org/index.php?title=Term:Security-Relevant_Information security-relevant information] concerning common controls, including controls provided by external providers, is factored into the organization's [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] process. Reuse of information is an effective method to help eliminate duplication of effort, reduce documentation, and avoid unnecessary costs that may result when security activities are conducted independently of [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle] processes. In addition, reuse promotes greater consistency of information used in the design, development, implementation, operation, [http://fismapedia.org/index.php?title=Term:Maintenance maintenance], and [http://fismapedia.org/index.php?title=Term:Disposition disposition] of an information system including security-related considerations.&lt;br /&gt;
&lt;br /&gt;
==2.3 INFORMATION SYSTEM BOUNDARIES ==&lt;br /&gt;
&lt;br /&gt;
One of the most challenging problems for information system owners, authorizing officials, chief information officers, senior information security officers, and information security architects is identifying appropriate boundaries for organizational information systems. Well-defined boundaries establish the scope of protection for organizational information systems (i.e., what the organization agrees to protect under its direct [http://fismapedia.org/index.php?title=Term:Management_Control management control] or within the scope of its responsibilities) and include the people, processes, and information technologies that are part of the systems supporting the organization's missions and business processes. [http://fismapedia.org/index.php?title=Term:Information_System_Boundaries Information system boundaries] need to be established in [http://fismapedia.org/index.php?title=Term:Coordination coordination] with the [http://fismapedia.org/index.php?title=Term:Security_Categorization security categorization] process and before the development of security plans. [http://fismapedia.org/index.php?title=Term:Information_System_Boundaries Information system boundaries] that are too expansive (i.e., too many system components and/or unnecessary architectural complexity) make the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] process extremely unwieldy and complex. Boundaries that are too limited increase the number of information systems that must be separately managed and as a consequence, unnecessarily inflate the total information security costs for the organization. The following sections provide general guidelines to assist organizations in establishing appropriate system boundaries to achieve cost-effective solutions for managing information security-related risks from the operation and use of information systems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2.3.1  Establishing [http://fismapedia.org/index.php?title=Term:Information_System_Boundaries Information System Boundaries] ===&lt;br /&gt;
&lt;br /&gt;
The allocation of information resources&amp;lt;ref&amp;gt;Information resources consist of information and related resources including personnel, equipment, funds, and information technology.&amp;lt;/ref&amp;gt; to an information system defines the [http://fismapedia.org/index.php?title=Term:Boundary boundary] for that system. Organizations have significant flexibility in determining what constitutes an information system. If a set of [http://fismapedia.org/index.php?title=Term:Information_Resources information resources] is identified as an information system, the resources are generally under the same direct [http://fismapedia.org/index.php?title=Term:Management_Control management control].&amp;lt;ref&amp;gt;For information systems, direct [http://fismapedia.org/index.php?title=Term:Management_Control management control] involves budgetary, programmatic, or operational authority and associated ''responsibility'' and ''accountability''.&amp;lt;/ref&amp;gt; Direct [http://fismapedia.org/index.php?title=Term:Management_Control management control] does not necessarily imply that there is no intervening management. It is possible for multiple information systems to be validly considered as independent ''subsystems''&amp;lt;ref&amp;gt;A [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] is a major subdivision or component of an information system consisting of information, information technology, and personnel that perform one or more specific functions.&amp;lt;/ref&amp;gt; of a larger and more complex system provided all of the subsystems fall under the same management authority. This situation may arise in many organizations when smaller information systems are coalesced for purposes of [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] into a larger, more comprehensive system. In addition to consideration of direct [http://fismapedia.org/index.php?title=Term:Management_Control management control], it may also be helpful for organizations to consider if the [http://fismapedia.org/index.php?title=Term:Information_Resources information resources] being identified as an information system:&lt;br /&gt;
&lt;br /&gt;
*   Support the same mission/business objectives or functions and essentially the same operating characteristics and information [http://fismapedia.org/index.php?title=Term:Security_Requirements security requirements]; and&lt;br /&gt;
*   Reside in the same general operating environment (or in the case of a distributed information system, reside in various locations with similar operating environments).&amp;lt;ref&amp;gt;Similarity of operating environments includes, for example, consideration of threat, policy, and management.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
While the above considerations may be useful to organizations in determining [http://fismapedia.org/index.php?title=Term:Information_System_Boundaries information system boundaries] for purposes of [http://fismapedia.org/index.php?title=Term:Risk_Management risk management], they are not viewed as limiting the organization's flexibility in establishing commonsense boundaries that promote effective information security within the available resources of the organization. Information system owners consult with authorizing officials, chief information officers, senior information security officers, the [http://fismapedia.org/index.php?title=Term:Risk_Executive_(Function) risk executive (function)],&amp;lt;ref&amp;gt;The [http://fismapedia.org/index.php?title=Term:Roles_and_Responsibilities roles and responsibilities] of the [http://fismapedia.org/index.php?title=Term:Risk_Executive_(Function) Risk Executive (Function)] are described in Appendix D.&amp;lt;/ref&amp;gt; and information security architects when establishing or changing system boundaries. The process of establishing boundaries for information systems and the associated [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] implications is an organization-level [http://fismapedia.org/index.php?title=Term:Activity activity] that includes careful negotiation among all key participants—taking into account mission and business requirements, technical considerations with respect to information security, and programmatic costs to the organization.&lt;br /&gt;
&lt;br /&gt;
Software ''applications'' are included in the [http://fismapedia.org/index.php?title=Term:Boundary boundary] of an information system hosting the applications and do not require a separate [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] process (including a separate [http://fismapedia.org/index.php?title=Term:Security_Authorization security authorization]). Rather, software applications take advantage of the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] provided by the hosting information system to help provide a foundational [http://fismapedia.org/index.php?title=Term:Level_of_Protection level of protection] for the hosted applications. Additional application-level [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] are provided by the respective software applications, as needed. Employing strong [http://fismapedia.org/index.php?title=Term:Configuration_Management configuration management] and control processes within the hosting information system and reusing [http://fismapedia.org/index.php?title=Term:Assessment assessment] evidence of security control effectiveness helps to provide the necessary protection for applications. [http://fismapedia.org/index.php?title=Term:Security_Controls Security controls] provided by the hosted software application are documented in the [http://fismapedia.org/index.php?title=Term:Security_Plan security plan] for the hosting information system and assessed for effectiveness during the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] process (including during the initial authorization or subsequent to the initial authorization if the applications are added after the system is authorized to operate). Organizations ensure that all [http://fismapedia.org/index.php?title=Term:Security_Controls security controls], including application-level controls employed in separate software applications, are managed and tracked on an ongoing basis. Information system owners ensure that hosted applications do not affect the security state of the hosting system. Information system owners obtain the necessary information from hosted applications to conduct security impact analyses, when needed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2.3.2  Boundaries for Complex Information Systems (System of Systems) ===&lt;br /&gt;
&lt;br /&gt;
The application of [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] within a large and complex information system (or system of systems) can present significant challenges to an organization. From a centralized development, implementation, and operations perspective, the [http://fismapedia.org/index.php?title=Term:Information_System_Owner information system owner], in collaboration with the [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official], [http://fismapedia.org/index.php?title=Term:Senior_Information_Security_Officer senior information security officer], information security architect, and [http://fismapedia.org/index.php?title=Term:Information_System_Security_Engineer information system security engineer], examines the purpose of the information system and considers the feasibility of decomposing the complex system into more manageable components, or ''subsystems''. From a distributed development, implementation, and operations perspective the organization recognizes that multiple entities, possibly operating under different policies, may be contributing to the development, implementation, and/or operations of the subsystems that comprise the overall information system. In such a scenario, the organization is responsible for ensuring that these separate subsystems can work together in both a secure and functional manner. Treating an information system as multiple subsystems, each with its own [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] [http://fismapedia.org/index.php?title=Term:Boundary boundary], facilitates a more targeted application of [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] to achieve [http://fismapedia.org/index.php?title=Term:Adequate_Security adequate security] and a more cost-effective [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] process. The decomposition into [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] components is reflected in the [http://fismapedia.org/index.php?title=Term:Security_Plan security plan] for that complex system (or system of systems).&lt;br /&gt;
&lt;br /&gt;
Information security [http://fismapedia.org/index.php?title=Term:Architecture architecture] plays a key part in the security control selection and allocation process for a large and complex information system (or system of systems). This includes monitoring and controlling communications at key internal boundaries and providing system-wide ''common controls'' (see Section 2.4) that meet or exceed the requirements of the constituent subsystems inheriting those system-wide common controls. One approach to control selection and allocation is to categorize each identified [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] (including dynamic subsystems as described in Section 2.3.3). Separately categorizing each [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] does not change the overall categorization of the information system. Rather, it allows the constituent subsystems to receive a separate allocation of [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] from [http://fismapedia.org/index.php?title=Doc:NIST_Special_Publication_800-53 NIST Special Publication 800-53] instead of deploying higher impact controls across every [http://fismapedia.org/index.php?title=Term:Subsystem subsystem]. Another approach is to bundle smaller subsystems into larger subsystems within the overall complex information system, categorize each of the aggregated subsystems, and allocate [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] to the subsystems, as appropriate. While subsystems of complex information systems may sometimes exist as full systems, for complex systems, these portions of the system are not treated as independent entities because the subsystems are typically interdependent and interconnected.&lt;br /&gt;
&lt;br /&gt;
In addition to protecting the external [http://fismapedia.org/index.php?title=Term:Boundary boundary] of a large and complex information system (or system of systems), the organization may, as part of the information security [http://fismapedia.org/index.php?title=Term:Architecture architecture], implement [http://fismapedia.org/index.php?title=Term:Boundary_Protection boundary protection] between subsystems (possibly represented by different security domains). Such internal [http://fismapedia.org/index.php?title=Term:Boundary_Protection boundary protection] is part of an overall [http://fismapedia.org/index.php?title=Term:Defense-In-Depth defense-in-depth] [http://fismapedia.org/index.php?title=Term:Architecture architecture] implemented by the organization. The policy implemented in each [http://fismapedia.org/index.php?title=Term:Boundary_Protection_Device boundary protection device] may be specific to the permitted information flows through that [http://fismapedia.org/index.php?title=Term:Boundary boundary], but is also consistent with the information security [http://fismapedia.org/index.php?title=Term:Architecture architecture] for the organization as a whole.&lt;br /&gt;
&lt;br /&gt;
When the results of security categorizations for the identified subsystems are different, the organization carefully examines the interfaces among subsystems and selects [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] for interconnection of the subsystems to eliminate or reduce potential vulnerabilities in this area. This helps to ensure that the information system (at large) is adequately [http://fismapedia.org/index.php?title=Term:Protected protected].&amp;lt;ref&amp;gt;Tightly coupled [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] components may introduce inadvertent weak links in a complex information system (system of systems). For example, if a large organizational [http://fismapedia.org/index.php?title=Term:Intranet intranet] is decomposed by [http://fismapedia.org/index.php?title=Term:Enterprise_Services enterprise services] into smaller subsystems (e.g., severable components such as [http://fismapedia.org/index.php?title=Term:Local_Area_Network local area network] segments) and subsequently categorized individually, the specific protections at the [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] level may allow a vector of attack against the [http://fismapedia.org/index.php?title=Term:Intranet intranet] by requiring [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] commensurate with a lower impact level, than the rest of the system. To avoid this situation, organizations are encouraged to carefully examine the interfaces among [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] components and to take appropriate actions to eliminate potential vulnerabilities in this area, thus helping to ensure that the information system is adequately [http://fismapedia.org/index.php?title=Term:Protected protected].&amp;lt;/ref&amp;gt; [http://fismapedia.org/index.php?title=Term:Security_Controls Security controls] for interconnection of subsystems are also employed when the subsystems implement different security policies or are administered by different authorities (i.e., the subsystems belong to different security domains). Common controls provided by different organization often require such [http://fismapedia.org/index.php?title=Term:Boundary_Protection boundary protection] [http://fismapedia.org/index.php?title=Term:Interface_Controls interface controls]. The extent to which the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the [http://fismapedia.org/index.php?title=Term:Security_Requirements security requirements] for the complex system, can be determined by combining security control assessments at the [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] level and adding system-level considerations addressing interface issues among subsystems. This approach facilitates a more targeted and cost-effective [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] process by scaling the level of effort in accordance with that subsystem's [http://fismapedia.org/index.php?title=Term:Security_Categorization security categorization] and allowing for reuse of [http://fismapedia.org/index.php?title=Term:Assessment assessment] results at the [http://fismapedia.org/index.php?title=Term:System_Level system level]. Figure 2-3 illustrates the concept of decomposition for a complex information system.&lt;br /&gt;
&lt;br /&gt;
*    [http://fismapedia.org/index.php?title=Term:Security_Plan Security plan] reflects information system decomposition with [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] assigned to each [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] component.&lt;br /&gt;
*    [http://fismapedia.org/index.php?title=Term:Security_Assessment Security assessment] procedures tailored for the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] in each [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] component and for the combined [http://fismapedia.org/index.php?title=Term:System_Level system level].&lt;br /&gt;
*    [http://fismapedia.org/index.php?title=Term:Security_Control_Assessment Security control assessment] performed on each [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] component and on system-level controls not covered by [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] security control assessments.&lt;br /&gt;
*    [http://fismapedia.org/index.php?title=Term:Security_Authorization Security authorization] conducted on the information system as a whole.&lt;br /&gt;
&lt;br /&gt;
[[Image:80037r1FPD_Figure2-3.png|500px|thumb|center|FIGURE 2-3: DECOMPOSITION OF COMPLEX SYSTEMS]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the above example, an information system contains a system guard that monitors the flow of information between two local area networks. The information system, in this case, can be partitioned into multiple [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] components: (i) [http://fismapedia.org/index.php?title=Term:Local_Area_Network local area network] one; (ii) [http://fismapedia.org/index.php?title=Term:Local_Area_Network local area network] two; (iii) the system guard separating the two networks; and ([http://fismapedia.org/index.php?title=AnA:IV iv]) several dynamic subsystems that become part of the system at various points in time (see Section 2.3.3). Each [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] component within the information system may be categorized individually. The [http://fismapedia.org/index.php?title=Term:Security_Categorization security categorization] of the information system is determined by taking into consideration all of the individual [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] categorizations. When all subsystems within the information system have completed the [http://fismapedia.org/index.php?title=Term:Security_Control_Assessment security control assessment], an additional [http://fismapedia.org/index.php?title=Term:Assessment assessment] is performed on the system-level [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] not covered by the individual [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] assessments, and the results are bundled together into the authorization package and presented as evidence to the authorizing official.&lt;br /&gt;
&lt;br /&gt;
=== 2.3.3 Dynamic Subsystems ===&lt;br /&gt;
&lt;br /&gt;
For many information systems,, the determination of subsystems is established at system initiation and maintained throughout the [http://fismapedia.org/index.php?title=Term:Life_Cycle life cycle] of the system. However, there are some instances, most notably in [http://fismapedia.org/index.php?title=Term:Net-Centric net-centric] [http://fismapedia.org/index.php?title=Term:Architectures architectures] (e.g., cloud computing, service-oriented [http://fismapedia.org/index.php?title=Term:Architectures architectures]),&amp;lt;ref&amp;gt;A [http://fismapedia.org/index.php?title=Term:Net-Centric net-centric] [http://fismapedia.org/index.php?title=Term:Architecture architecture] is a complex system of systems comprised of subsystems and services that are part of a continuously-evolving, complex community of people, devices, information and services interconnected by a network that enhances [http://fismapedia.org/index.php?title=Term:Information_Sharing information sharing] and collaboration.&amp;lt;/ref&amp;gt; where the subsystems that compose the system may not be present at all stages of the [http://fismapedia.org/index.php?title=Term:Life_Cycle life cycle]. Some subsystems may not become part of an information system until sometime after system initiation, while other subsystems may leave the system sometime prior to system [http://fismapedia.org/index.php?title=Term:Termination termination]. Generally, this will not impact the external [http://fismapedia.org/index.php?title=Term:Boundary boundary] of the information system if the dynamic subsystems are in the system design and the appropriate [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] are reflected in the [http://fismapedia.org/index.php?title=Term:Security_Plan security plan]. But it does impact the subsystems that exist within the [http://fismapedia.org/index.php?title=Term:Boundary boundary] at any given point in time.&lt;br /&gt;
&lt;br /&gt;
Dynamic subsystems that become part of an organizational information system at various points in time may or may not be under the direct control of the organization. These subsystems may be provided by external providers (e.g., through contracts, interagency agreements, [http://fismapedia.org/index.php?title=Term:Lines_of_Business lines of business] arrangements, licensing agreements, and/or [http://fismapedia.org/index.php?title=Term:Supply_Chain supply chain] exchanges). Regardless of whether the [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] is or is not controlled by the organization, the expectations of its capabilities have to be considered. The dynamic inclusion or exclusion of the subsystems may or may not require reassessment of the information system as a whole. This is determined based on constraints and assumptions (e.g., functions the subsystems perform, connections to other subsystems and other information systems) imposed upon the subsystems at system design and incorporated in the [http://fismapedia.org/index.php?title=Term:Security_Plan security plan]. So long as the subsystems conform to the identified constraints and assumptions, they can be dynamically added or removed from the information system without requiring reassessments of the system.&lt;br /&gt;
&lt;br /&gt;
As noted above, the assumptions and constraints on the dynamic subsystems are reflected in the information system design and the [http://fismapedia.org/index.php?title=Term:Security_Plan security plan]. The determination as to whether the subsystems conform to the assumptions and constraints is addressed during the continuous monitoring phase of the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] process. Depending upon the nature of the subsystems (including the functions, connections, and relative trust relationships established with the [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] providers), the determination of conformance may be performed in a manual or automated manner, and may occur prior to, or during the [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] connecting/disconnecting to the information system.&lt;br /&gt;
&lt;br /&gt;
== 2.4 SECURITY CONTROL ALLOCATION ==&lt;br /&gt;
&lt;br /&gt;
There are three types of [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] for information systems that can be employed by an organization: (i) ''system-specific controls'' (i.e., controls that provide a security capability for a particular information system only); (ii) ''common controls'' (i.e., controls that provide a security capability for multiple information systems); or (iii) ''hybrid controls'' (i.e., controls that have both system-specific and common characteristics).&amp;lt;ref&amp;gt;NIST [http://fismapedia.org/index.php?title=Doc:Special_Publication_800-53 Special Publication 800-53] provides additional guidance on [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] for organizational information systems.&amp;lt;/ref&amp;gt; As illustrated in Figure 2-4, [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] are allocated to organizational information systems as system-specific, hybrid, or common controls. The allocation of [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] is consistent with the organization's [http://fismapedia.org/index.php?title=Term:Enterprise_Architecture enterprise architecture] and information security [http://fismapedia.org/index.php?title=Term:Architecture architecture]. As part of the information security [http://fismapedia.org/index.php?title=Term:Architecture architecture], organizations are encouraged to identify and implement [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] that can support multiple information systems efficiently and effectively as a common capability (i.e., common controls). When these controls are used to support a specific information system, they are referenced by that specific system as ''inherited controls''. Common controls promote more cost-effective and consistent information security across the organization and can also simplify [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] activities. By allocating [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] to an information system as system-specific controls (e.g., [http://fismapedia.org/index.php?title=Term:Access_Controls access controls], [http://fismapedia.org/index.php?title=Term:Identification_and_Authentication identification and authentication] controls, system communications and protection controls, audit controls), as hybrid controls (e.g., [http://fismapedia.org/index.php?title=Term:Contingency_Planning contingency planning] controls), or as common controls that are inherited (e.g., physical and environmental protection controls, awareness and training controls, [http://fismapedia.org/index.php?title=Term:Personnel_Security personnel security] controls), the organization assigns responsibility to specific organizational entities for the development, implementation, [http://fismapedia.org/index.php?title=Term:Assessment assessment], authorization, and monitoring of those controls.&lt;br /&gt;
&lt;br /&gt;
[[Image:80037r1FPD_Figure2-4.png|500px|thumb|center|FIGURE 2-4: SECURITY CONTROL ALLOCATION&amp;lt;ref&amp;gt;Security plans, security assessment reports, and plans of action and milestones are critical outputs from the RMF used to manage risk associated with the operation of information systems. See Appendix F for additional information.&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sources ==&lt;br /&gt;
&lt;br /&gt;
* [http://csrc.nist.gov/publications/drafts/800-37-Rev1/SP800-37-rev1-FPD.pdf NIST SP 800-37 Rev. 1 DRAFT Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach]&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_2&amp;diff=74927</id>
		<title>Talk:Industry:Project Review/NIST SP 800-37r1 FPD Chapter 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_2&amp;diff=74927"/>
				<updated>2009-12-08T03:26:31Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: /* 2.3.1  Establishing Information System Boundaries */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;CHAPTER TWO&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''THE FUNDAMENTALS'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
BASIC CONCEPTS ASSOCIATED WITH MANAGING RISK FROM INFORMATION SYSTEMS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2.1 INTEGRATED ENTERPRISE-WIDE RISK MANAGEMENT ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2.2 SYSTEM DEVELOPMENT LIFE CYCLE ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2.3 INFORMATION SYSTEM BOUNDARIES ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2.3.1  Establishing Information System Boundaries ===&lt;br /&gt;
&lt;br /&gt;
Final chapter of this section is very concerning to me. Seems to imply that security of the Operating System is the paramount concern without regard to the fact that applications are where the majority of government data is held. [[User:Dan Philpott|Dan Philpott]] 03:26, 8 December 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
=== 2.3.2  Boundaries for Complex Information Systems (System of Systems) ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2.4 SECURITY CONTROL ALLOCATION ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_F&amp;diff=74926</id>
		<title>Industry:Project Review/NIST SP 800-37r1 FPD Appendix F</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_F&amp;diff=74926"/>
				<updated>2009-12-08T03:15:31Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: Uploaded images and edited links to make them work properly&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;APPENDIX F&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''SECURITY AUTHORIZATION'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AUTHORIZATION DECISIONS AND SUPPORTING EVIDENCE&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This appendix provides information on the [http://fismapedia.org/index.php?title=Term:Security_Authorization security authorization] process to include: (i) the content of the authorization package; (ii) types of authorization decisions; (iii) the content of the authorization decision document; and ([http://fismapedia.org/index.php?title=AnA:IV iv]) [http://fismapedia.org/index.php?title=Term:Maintenance maintenance] of authorizations through continuous monitoring processes and conditions for reauthorization.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== F.1  AUTHORIZATION PACKAGE ==&lt;br /&gt;
&lt;br /&gt;
The [http://fismapedia.org/index.php?title=Term:Security_Authorization security authorization] package documents the results of the [http://fismapedia.org/index.php?title=Term:Security_Control_Assessment security control assessment] and provides the [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official] with essential information needed to make a credible, risk-based decision on whether to authorize operation of an information system or a designated set of common controls. Unless specifically designated otherwise by the [http://fismapedia.org/index.php?title=Term:Chief_Information_Officer chief information officer] or [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official], the [http://fismapedia.org/index.php?title=Term:Information_System_Owner information system owner] or [http://fismapedia.org/index.php?title=Term:Common_Control_Provider common control provider] is responsible for the assembly, compilation, and submission of the authorization package. The [http://fismapedia.org/index.php?title=Term:Information_System_Owner information system owner] or [http://fismapedia.org/index.php?title=Term:Common_Control_Provider common control provider] receives inputs from the [http://fismapedia.org/index.php?title=Term:Information_System_Security_Officer information system security officer], [http://fismapedia.org/index.php?title=Term:Security_Control_Assessor security control assessor], [http://fismapedia.org/index.php?title=Term:Senior_Information_Security_Officer senior information security officer], and [http://fismapedia.org/index.php?title=Term:Risk_Executive_(Function) risk executive (function)] during the preparation of the authorization package. The authorization package&amp;lt;ref&amp;gt;The [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official] determines what additional supporting documentation or [http://fismapedia.org/index.php?title=Term:References references] may be required to be included in the [http://fismapedia.org/index.php?title=Term:Security_Authorization security authorization] package. Appropriate [http://fismapedia.org/index.php?title=Term:Measures measures] are employed to protect information contained in [http://fismapedia.org/index.php?title=Term:Security_Authorization security authorization] packages in accordance with federal and organizational policy.&amp;lt;/ref&amp;gt; contains the following documents:&lt;br /&gt;
&lt;br /&gt;
*   [http://fismapedia.org/index.php?title=Term:Security_Plan Security plan];&lt;br /&gt;
*   [http://fismapedia.org/index.php?title=Term:Security_assessment_report Security assessment report]; and&lt;br /&gt;
*   [http://fismapedia.org/index.php?title=Term:Plan_of_Action_and_Milestones Plan of action and milestones].&lt;br /&gt;
&lt;br /&gt;
The [http://fismapedia.org/index.php?title=Term:Security_Plan security plan], prepared by the [http://fismapedia.org/index.php?title=Term:Information_System_Owner information system owner] or [http://fismapedia.org/index.php?title=Term:Common_Control_Provider common control provider], provides an overview of the [http://fismapedia.org/index.php?title=Term:Security_Requirements security requirements] and describes the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] in place or planned for meeting those requirements. The plan provides sufficient information to understand the intended implementation of each security control employed within or inherited by the information system.&amp;lt;ref&amp;gt;The [http://fismapedia.org/index.php?title=Term:Security_Plan security plan] is a conceptual body of information which may be accounted for within one or more repositories and include documents (electronic or hard copy) that come from a variety of sources produced throughout the [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle]. For example, information system owners inheriting common controls can either list the controls in their respective security plans or [http://fismapedia.org/index.php?title=Term:Reference reference] the controls contained in the security plans of [http://fismapedia.org/index.php?title=Term:Common_Control common control] providers.&amp;lt;/ref&amp;gt; The [http://fismapedia.org/index.php?title=Term:Security_Plan security plan] also contains as supporting appendices or as [http://fismapedia.org/index.php?title=Term:References references] to appropriate sources, other risk and security-related documents such as a [http://fismapedia.org/index.php?title=Term:Risk_Assessment risk assessment], [http://fismapedia.org/index.php?title=Term:Privacy_Impact_Assessment privacy impact assessment], [http://fismapedia.org/index.php?title=Term:System_Interconnection system interconnection] agreements, [http://fismapedia.org/index.php?title=Term:Contingency_Plan contingency plan], security configurations, [http://fismapedia.org/index.php?title=Term:Configuration_Management configuration management] plan, [http://fismapedia.org/index.php?title=Term:Incident_Response_Plan incident response plan], and continuous monitoring strategy. In accordance with the near [http://fismapedia.org/index.php?title=Term:Real-Time real-time] [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] objectives of the [http://fismapedia.org/index.php?title=Term:Security_Authorization security authorization] process, the [http://fismapedia.org/index.php?title=Term:Security_Plan security plan] is updated whenever events dictate changes to the agreed-upon [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] employed within or inherited by the information system. Updates to the [http://fismapedia.org/index.php?title=Term:Security_Plan security plan] may be triggered by a variety of events, for example: (i) a vulnerability scan of the information system or [http://fismapedia.org/index.php?title=Term:Vulnerability_Assessment vulnerability assessment] of the environment of operation; (ii) new threat information; (iii) weaknesses or deficiencies discovered in currently deployed [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] after an information system breach; ([http://fismapedia.org/index.php?title=AnA:IV iv]) a redefinition of mission priorities or business objectives invalidating the results of the previous [http://fismapedia.org/index.php?title=Term:Security_Categorization security categorization] process; and (v) a change in the information system (e.g., adding new hardware, software, or [http://fismapedia.org/index.php?title=Term:Firmware firmware]; establishing new connections) or its environment of operation (e.g., moving to a new [http://fismapedia.org/index.php?title=Term:Facility facility]).&lt;br /&gt;
&lt;br /&gt;
The [http://fismapedia.org/index.php?title=Term:security_assessment_report security assessment report], prepared by the [http://fismapedia.org/index.php?title=Term:Security_Control_Assessor security control assessor], provides the results of assessing the implementation of the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] identified in the [http://fismapedia.org/index.php?title=Term:Security_Plan security plan] to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the specified [http://fismapedia.org/index.php?title=Term:Security_Requirements security requirements]. The [http://fismapedia.org/index.php?title=Term:security_assessment_report security assessment report] also contains a list of recommended corrective actions for any weaknesses or deficiencies identified in the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls].&amp;lt;ref&amp;gt;Organizations may choose to develop an executive summary from the detailed findings that are generated during a [http://fismapedia.org/index.php?title=Term:Security_Control_Assessment security control assessment]. An executive summary provides an [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official] with an abbreviated version of the [http://fismapedia.org/index.php?title=Term:security_assessment_report security assessment report] focusing on the highlights of the [http://fismapedia.org/index.php?title=Term:Assessment assessment], synopsis of key findings, and recommendations for addressing weaknesses and deficiencies in the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls].&amp;lt;/ref&amp;gt; Supporting the near [http://fismapedia.org/index.php?title=Term:Real-Time real-time] [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] objectives of the [http://fismapedia.org/index.php?title=Term:Security_Authorization security authorization] process, the [http://fismapedia.org/index.php?title=Term:security_assessment_report security assessment report] is updated on an ongoing basis whenever changes are made to the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] employed within or inherited by the information system. Updates to the [http://fismapedia.org/index.php?title=Term:security_assessment_report security assessment report] help to ensure that the [http://fismapedia.org/index.php?title=Term:Information_System_Owner information system owner], [http://fismapedia.org/index.php?title=Term:Common_Control_Provider common control provider], and authorizing officials maintain the appropriate awareness with regard to security control effectiveness. The overall effectiveness of the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] directly affects the ultimate security state of the information system and decisions regarding explicit [http://fismapedia.org/index.php?title=Term:Acceptance acceptance] of risk.&lt;br /&gt;
&lt;br /&gt;
The [http://fismapedia.org/index.php?title=Term:Plan_of_Action_and_Milestones plan of action and milestones], prepared by the [http://fismapedia.org/index.php?title=Term:Information_System_Owner information system owner] or [http://fismapedia.org/index.php?title=Term:Common_Control_Provider common control provider], describes the specific [http://fismapedia.org/index.php?title=Term:Measures measures] planned: (i) to correct weaknesses or deficiencies noted in the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] during the [http://fismapedia.org/index.php?title=Term:Assessment assessment]; and (ii) to address known vulnerabilities in the information system.&amp;lt;ref&amp;gt;Organizations may choose to document the specific [http://fismapedia.org/index.php?title=Term:Measures measures] implemented to correct weaknesses or deficiencies in [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] in the [http://fismapedia.org/index.php?title=Term:Plan_of_Action_and_Milestones plan of action and milestones], thereby providing an historical record of actions completed.&amp;lt;/ref&amp;gt; The content and structure of [http://fismapedia.org/index.php?title=Term:Plans_of_Action_and_Milestones plans of action and milestones] are informed by the organizational [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] strategy developed as part of the [http://fismapedia.org/index.php?title=Term:Risk_Executive_(Function) risk executive (function)] and is consistent with the [http://fismapedia.org/index.php?title=Term:Plans_of_Action_and_Milestones plans of action and milestones] process established by the organization and any specific requirements defined in federal policies, directives, memoranda, or regulations. The most effective [http://fismapedia.org/index.php?title=Term:Plans_of_Action_and_Milestones plans of action and milestones] contain a robust set of actual weaknesses or deficiencies identified in the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] employed within or inherited by the information system. Assuming that most information systems and the environments in which those systems are deployed, have more vulnerabilities than available resources can realistically address, organizations define a strategy for developing and implementing [http://fismapedia.org/index.php?title=Term:Plans_of_Action_and_Milestones plans of action and milestones] that facilitates a prioritized approach to [http://fismapedia.org/index.php?title=Term:Risk_Mitigation risk mitigation] and that is consistent across the organization. This strategy helps to ensure that [http://fismapedia.org/index.php?title=Term:Plans_of_Action_and_Milestones plans of action and milestones] are based on:&lt;br /&gt;
&lt;br /&gt;
*   The [http://fismapedia.org/index.php?title=Term:Security_Categorization security categorization] of the information system;&lt;br /&gt;
*   The specific weaknesses or deficiencies in the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls];&lt;br /&gt;
*   The importance of the identified security control weaknesses or deficiencies (i.e., the direct or indirect effect the weaknesses or deficiencies may have on the overall security state of the information system and hence on the risk exposure&amp;lt;ref&amp;gt;In general, risk exposure is the degree to which an organization is threatened by the potential adverse effects on organizational operations and assets, individuals, other organizations, or the Nation.&amp;lt;/ref&amp;gt; of the organization);&lt;br /&gt;
*   The organization's proposed [http://fismapedia.org/index.php?title=Term:Risk_Mitigation risk mitigation] approach to address the identified weaknesses or deficiencies in the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] (e.g., prioritization of [http://fismapedia.org/index.php?title=Term:Risk_Mitigation risk mitigation] actions, allocation of [http://fismapedia.org/index.php?title=Term:Risk_Mitigation risk mitigation] resources); and&lt;br /&gt;
*   The organization's rationale for accepting certain weaknesses or deficiencies in the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls].&amp;lt;ref&amp;gt;Organizations document their rationale for accepting security control weakness or deficiencies.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Organizational strategies for [http://fismapedia.org/index.php?title=Term:Plans_of_Action_and_Milestones plans of action and milestones] are guided by the security categories of the respective information systems affected by the [http://fismapedia.org/index.php?title=Term:Risk_Mitigation risk mitigation] activities. Organizations may decide, for example, to allocate the vast majority of [http://fismapedia.org/index.php?title=Term:Risk_Mitigation risk mitigation] resources initially to the highest-impact information systems because a failure to correct the weaknesses or deficiencies in those systems could potentially have the most significant adverse effects on the organization's missions or business operations. Organizations also prioritize weaknesses or deficiencies using information from organizational assessments of risk and the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] strategy developed as part of the [http://fismapedia.org/index.php?title=Term:Risk_Executive_(Function) risk executive (function)]. Therefore, a [http://fismapedia.org/index.php?title=Term:High-Impact_System high-impact system] would have a prioritized list of weaknesses or deficiencies for that system, as would moderate-impact and low-impact systems. In general, the [http://fismapedia.org/index.php?title=Term:Plan_of_Action_and_Milestones plan of action and milestones] strategy always addresses the highest-priority weaknesses or deficiencies within those prioritized systems.&lt;br /&gt;
&lt;br /&gt;
After completion of the [http://fismapedia.org/index.php?title=Term:Security_Plan security plan], [http://fismapedia.org/index.php?title=Term:security_assessment_report security assessment report], and [http://fismapedia.org/index.php?title=Term:Plan_of_Action_and_Milestones plan of action and milestones], the [http://fismapedia.org/index.php?title=Term:Information_System_Owner information system owner] or [http://fismapedia.org/index.php?title=Term:Common_Control_Provider common control provider] submits the final [http://fismapedia.org/index.php?title=Term:Security_Authorization security authorization] package to the [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official] or designated representative. Figure F-1 illustrates the key sections of the authorization package.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:80037r1FPD_FigureF-1.png‎|500px|thumb|center|FIGURE F-1: SECURITY AUTHORIZATION PACKAGE]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== F.2  AUTHORIZATION DECISIONS ==&lt;br /&gt;
&lt;br /&gt;
Authorization decisions are based on the content of the authorization package including inputs from the organization's [http://fismapedia.org/index.php?title=Term:Risk_Executive_(Function) risk executive (function)] and any additional supporting documentation required by the [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official]. The [http://fismapedia.org/index.php?title=Term:Security_Authorization security authorization] package provides comprehensive information on the security state of the information system. [http://fismapedia.org/index.php?title=Term:Risk_Executive_(Function) Risk executive (function)] inputs, including the previously established overarching risk guidance derived from the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] strategy, provide additional information to the [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official] that may be relevant and affect the final authorization decision (e.g., organizational [http://fismapedia.org/index.php?title=Term:Risk_Tolerance risk tolerance], organization's overall [http://fismapedia.org/index.php?title=Term:Risk_Mitigation risk mitigation] strategy, core mission and business requirements, dependencies among information systems, ongoing risk monitoring requirements, and other types of risks not directly associated with the information system or its environment of operation). [http://fismapedia.org/index.php?title=Term:Risk_Executive_(Function) Risk executive (function)] inputs are documented and become part of the authorization decision. Organizations determine how the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] strategy and risk-related guidance from the [http://fismapedia.org/index.php?title=Term:Risk_Executive_(Function) risk executive (function)] influences/impacts the authorization decisions of authorizing officials. [http://fismapedia.org/index.php?title=Term:Security_Authorization Security authorization] decisions are conveyed to information system owners and [http://fismapedia.org/index.php?title=Term:Common_Control common control] providers and are made available to selected officials within the organization (e.g., information system owners inheriting common controls, authorizing officials for interconnected systems, chief information officers, senior information security officers, information owners/stewards). There are two types of authorization decisions that can be rendered by authorizing officials:&lt;br /&gt;
&lt;br /&gt;
*   [http://fismapedia.org/index.php?title=Term:Authorization_to_Operate Authorization to operate];&amp;lt;ref&amp;gt;An [http://fismapedia.org/index.php?title=Term:Interim_Authorization_to_Test interim authorization to test] is a special type of authorization decision allowing an information system to operate in an [http://fismapedia.org/index.php?title=Term:Operational_Environment operational environment] for the express purpose of testing the system with actual operational (i.e., live) data for a specified time period. An [http://fismapedia.org/index.php?title=Term:Interim_Authorization_to_Test interim authorization to test] is granted by an [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official] only when the [http://fismapedia.org/index.php?title=Term:Operational_Environment operational environment] or live data is required to complete specific test objectives.&amp;lt;/ref&amp;gt; and&lt;br /&gt;
*   [http://fismapedia.org/index.php?title=Term:Denial_of_Authorization_to_Operate Denial of authorization to operate].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [http://fismapedia.org/index.php?title=Term:Authorization_to_Operate Authorization to Operate] ===&lt;br /&gt;
&lt;br /&gt;
If the [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official], after reviewing the authorization package and any additional inputs provided by the [http://fismapedia.org/index.php?title=Term:Risk_Executive_(Function) risk executive (function)], deems that the risk to organizational operations and assets, individuals, other organizations, and the Nation is acceptable, an [http://fismapedia.org/index.php?title=Term:Authorization_to_Operate authorization to operate] is issued for the information system or for the common controls inherited by organizational information systems. The information system is authorized to operate for a specified time period in accordance with the terms and conditions established by the [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official].&amp;lt;ref&amp;gt;Some organizations may choose to use the term [http://fismapedia.org/index.php?title=Term:Interim_Authorization_to_Operate interim authorization to operate] to focus attention on the increased risk being accepted by the [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official] in situations where there are significant weaknesses or deficiencies in the information system, but an overarching mission necessity requires placing the system into operation or continuing its operation.&amp;lt;/ref&amp;gt;  For [http://fismapedia.org/index.php?title=Term:Common_Control common control] providers external to an information system, the authorization decision means that the common controls under their control are approved for [http://fismapedia.org/index.php?title=Term:Inheritance inheritance] by organizational information systems. An [http://fismapedia.org/index.php?title=Term:authorization_termination_date authorization termination date] is also established by the [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official] as a [http://fismapedia.org/index.php?title=Term:Condition condition] of authorization. The [http://fismapedia.org/index.php?title=Term:authorization_termination_date authorization termination date] can be adjusted by the [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official] to reflect an increased [http://fismapedia.org/index.php?title=Term:Level_of_Concern level of concern] regarding the security state of the information system including the security control employed within or inherited by the system. Authorization [http://fismapedia.org/index.php?title=Term:Termination termination] dates do not exceed the maximum allowable time periods for authorization established by federal or organizational policy.&lt;br /&gt;
&lt;br /&gt;
The [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official] takes specific actions to reduce or eliminate vulnerabilities identified during the execution of the [http://fismapedia.org/index.php?title=Term:Risk_Management Risk Management] Framework unless the vulnerabilities have been explicitly accepted as part of the authorization decision. In addition, the [http://fismapedia.org/index.php?title=Term:Information_System_Owner information system owner] or [http://fismapedia.org/index.php?title=Term:Common_Control_Provider common control provider] establishes a disciplined, structured, and repeatable process to monitor the ongoing effectiveness of the deployed [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] and the progress of any actions taken to correct or eliminate weaknesses or deficiencies. The [http://fismapedia.org/index.php?title=Term:Plan_of_Action_and_Milestones plan of action and milestones] submitted by the [http://fismapedia.org/index.php?title=Term:Information_System_Owner information system owner] is used by the [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official] to monitor the progress in correcting deficiencies and weaknesses noted during the [http://fismapedia.org/index.php?title=Term:Security_Control_Assessment security control assessment].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== [http://fismapedia.org/index.php?title=Term:Denial_of_Authorization_to_Operate Denial of Authorization to Operate] ===&lt;br /&gt;
&lt;br /&gt;
If the [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official], after reviewing the authorization package and any additional inputs provided by the [http://fismapedia.org/index.php?title=Term:Risk_Executive_(Function) risk executive (function)], deems that the risk to organizational operations and assets, individuals, other organizations, and the Nation is unacceptable and [http://fismapedia.org/index.php?title=Term:Immediate immediate] steps cannot be taken to reduce the risk to an acceptable level, a [http://fismapedia.org/index.php?title=Term:Denial_of_Authorization_to_Operate denial of authorization to operate] is issued for the information system or for the common controls inherited by organizational information systems. The information system is not authorized to operate and is not placed into operation. If the system is currently in operation, all [http://fismapedia.org/index.php?title=Term:Activity activity] is halted. For [http://fismapedia.org/index.php?title=Term:Common_Control common control] providers external to an information system, the authorization decision means that the common controls under their control are not approved for [http://fismapedia.org/index.php?title=Term:Inheritance inheritance] by organizational information systems. Failure to receive an [http://fismapedia.org/index.php?title=Term:Authorization_to_Operate authorization to operate] indicates that there are major weaknesses or deficiencies in the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] employed within or inherited by the information system. The [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official] or designated representative works with the [http://fismapedia.org/index.php?title=Term:Information_System_Owner information system owner] or [http://fismapedia.org/index.php?title=Term:Common_Control_Provider common control provider] to revise the [http://fismapedia.org/index.php?title=Term:Plan_of_Action_and_Milestones plan of action and milestones] to ensure that appropriate [http://fismapedia.org/index.php?title=Term:Measures measures] are taken to correct the identified weaknesses or deficiencies.&lt;br /&gt;
&lt;br /&gt;
A special case of a [http://fismapedia.org/index.php?title=Term:Denial_of_Authorization_to_Operate denial of authorization to operate] is an authorization rescission. Authorizing officials can rescind a previous authorization decision at any time in situations where there is a specific [http://fismapedia.org/index.php?title=Term:Violation violation] of: (i) federal/organizational security policies, directives, regulations, standards, guidance, or practices; or (ii) the terms and conditions of the original authorization. For example, failure to maintain an effective continuous monitoring program may be grounds for rescinding an authorization decision. Authorizing officials consult with the [http://fismapedia.org/index.php?title=Term:Risk_Executive_(Function) risk executive (function)] and the [http://fismapedia.org/index.php?title=Term:Senior_Information_Security_Officer senior information security officer] before rescinding security authorizations.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== F.3  AUTHORIZATION DECISION DOCUMENT ==&lt;br /&gt;
&lt;br /&gt;
The authorization decision document transmits the final [http://fismapedia.org/index.php?title=Term:Security_Authorization security authorization] decision from the [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official] to the [http://fismapedia.org/index.php?title=Term:Information_System_Owner information system owner] or [http://fismapedia.org/index.php?title=Term:Common_Control_Provider common control provider] and other key organizational officials, as appropriate. The authorization decision document contains the following information:&lt;br /&gt;
&lt;br /&gt;
*   Authorization decision;&lt;br /&gt;
*   Terms and conditions for the authorization;&lt;br /&gt;
*   [http://fismapedia.org/index.php?title=Term:Authorization_termination_date Authorization termination date] (if applicable); and&lt;br /&gt;
*   [http://fismapedia.org/index.php?title=Term:Risk_Executive_(Function) Risk executive (function)] input (if provided).&lt;br /&gt;
&lt;br /&gt;
The [http://fismapedia.org/index.php?title=Term:Security_Authorization security authorization] decision indicates whether the information system is: (i) authorized to operate; or (ii) not authorized to operate. For common controls, the authorization decision means that the controls are approved for [http://fismapedia.org/index.php?title=Term:Inheritance inheritance] by organizational information systems. The terms and conditions for the authorization provide a description of any limitations or restrictions placed on the operation of the information system or the implementation of common controls that must be followed by the system owner or [http://fismapedia.org/index.php?title=Term:Common_Control_Provider common control provider]. The [http://fismapedia.org/index.php?title=Term:authorization_termination_date authorization termination date], established by the [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official], indicates when the [http://fismapedia.org/index.php?title=Term:Security_Authorization security authorization] expires and reauthorization is required. An [http://fismapedia.org/index.php?title=Term:Authorizing_Official_Designated_Representative authorizing official designated representative] prepares the authorization decision document for the [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official] with authorization recommendations, as appropriate. The authorization decision document is attached to the original authorization package and transmitted to the [http://fismapedia.org/index.php?title=Term:Information_System_Owner information system owner] or [http://fismapedia.org/index.php?title=Term:Common_Control_Provider common control provider].&amp;lt;ref&amp;gt;Authorization decision documents may be digitally signed to ensure [http://fismapedia.org/index.php?title=Term:Authenticity authenticity].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Upon receipt of the authorization decision document and authorization package, the [http://fismapedia.org/index.php?title=Term:Information_System_Owner information system owner] or [http://fismapedia.org/index.php?title=Term:Common_Control_Provider common control provider] accepts the terms and conditions of the authorization. The [http://fismapedia.org/index.php?title=Term:Information_System_Owner information system owner] or [http://fismapedia.org/index.php?title=Term:Common_Control_Provider common control provider] retains the original authorization decision document and authorization package.&amp;lt;ref&amp;gt;Organizations may choose to employ automated tools to support the development, distribution, and archiving of [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] documentation to include [http://fismapedia.org/index.php?title=Term:Artifacts artifacts] associated with the [http://fismapedia.org/index.php?title=Term:Security_Authorization security authorization] process.&amp;lt;/ref&amp;gt; The organization ensures that authorization documents for information systems and for common controls are available to appropriate organizational officials (e.g., information system owners inheriting common controls, the risk executive [function], chief information officers, senior information security officers, information system security officers). The [http://fismapedia.org/index.php?title=Term:Contents contents] of the [http://fismapedia.org/index.php?title=Term:Security_Authorization security authorization] documentation, especially information regarding information system vulnerabilities, are: (i) marked and appropriately [http://fismapedia.org/index.php?title=Term:Protected protected] in accordance with federal/organizational policy; and (ii) retained in accordance with the organization's record retention policy. The [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official] verifies on an ongoing basis, that the terms and conditions established as part of the authorization are being followed by the [http://fismapedia.org/index.php?title=Term:Information_System_Owner information system owner] or [http://fismapedia.org/index.php?title=Term:Common_Control_Provider common control provider].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== F.4  ONGOING AUTHORIZATION ==&lt;br /&gt;
&lt;br /&gt;
A robust and comprehensive continuous monitoring&amp;lt;ref&amp;gt;Continuous monitoring is described in Appendix G.&amp;lt;/ref&amp;gt; strategy integrated into the organization's [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle] process, promotes [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] on an ongoing basis and can significantly reduce the resources required for reauthorization, if required. Using automation and state-of-the-practice tools, techniques, and procedures, [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] can become near [http://fismapedia.org/index.php?title=Term:Real-Time real-time] with ongoing monitoring of [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] and changes to the information system and its environment of operation. When monitoring is conducted in accordance with the needs of the [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official], that monitoring results in the production of [http://fismapedia.org/index.php?title=Term:Critical_Information critical information] needed to determine: (i) the current security state of the information system (including the effectiveness of the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] employed within and inherited by the system) (ii) the resulting risks to organizational operations, organizational assets, individuals, other organizations, and the Nation; and (iii) whether to authorize continued operation of the system or continued use of common controls inherited by organizational information systems.&lt;br /&gt;
&lt;br /&gt;
Continuous monitoring also helps to amortize the [http://fismapedia.org/index.php?title=Term:Resource resource] expenditures for reauthorization activities over the authorization period. The ultimate objective is to achieve a state of ongoing authorization where the [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official] maintains sufficient knowledge of the current security state of the information system (including the effectiveness of the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] employed within and inherited by the system) to determine whether continued operation is acceptable based on ongoing risk determinations, and if not, which step or steps in the [http://fismapedia.org/index.php?title=Term:Risk_Management Risk Management] Framework needs to be re-executed in order to adequately mitigate the additional risk. Formal reauthorization actions are avoided in situations where the continuous monitoring process provides authorizing officials the necessary information to manage the potential risk arising from changes to the information system or its environment of operation. Organizations maximize the use of status reports and critical security state information produced during the continuous monitoring process to minimize the level of effort required if a formal reauthorization action is required. Formal reauthorization actions occur at the discretion of the [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official] in accordance with federal or organizational policy. If a formal reauthorization action is required, organizations maximize the use of security and risk-related information produced during the continuous monitoring and ongoing authorization processes currently in effect.&lt;br /&gt;
&lt;br /&gt;
Reauthorization actions, if initiated, can be either time-driven or event-driven. Time-driven reauthorizations occur when the [http://fismapedia.org/index.php?title=Term:authorization_termination_date authorization termination date] is reached. Authorization [http://fismapedia.org/index.php?title=Term:Termination termination] dates are influenced by federal and/or organizational policies and by the requirements of authorizing officials which may establish maximum authorization periods. For example, if the maximum authorization period for an information system is three years, then an organization establishes a continuous monitoring strategy for assessing a subset of the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] employed within and inherited by the system during the authorization period. This strategy allows all [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] designated in the respective security plans to be assessed at least one time by the end of the three-year period. This also includes any common controls deployed external to organizational information systems. If the security control assessments are conducted by qualified assessors with the required degree of independence based on federal/organizational policies, appropriate security standards and guidelines, and the needs of the [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official], the [http://fismapedia.org/index.php?title=Term:Assessment assessment] results can be cumulatively applied to the reauthorization, thus supporting the concept of ongoing authorization.&amp;lt;ref&amp;gt;The specific conditions under which security-related information can be effectively reused in [http://fismapedia.org/index.php?title=Term:Security_Authorization security authorization], ongoing authorization, and reauthorization is described in [http://fismapedia.org/index.php?title=Doc:NIST_Special_Publication_800-53A NIST Special Publication 800-53A].&amp;lt;/ref&amp;gt; The reauthorization action can be as simple as updating critical security [http://fismapedia.org/index.php?title=Term:Status_Information status information] in the authorization package (i.e., the [http://fismapedia.org/index.php?title=Term:Security_Plan security plan], [http://fismapedia.org/index.php?title=Term:security_assessment_report security assessment report], and [http://fismapedia.org/index.php?title=Term:Plan_of_Action_and_Milestones plan of action and milestones]). The [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official] subsequently signs an updated authorization decision document based on the current determination and [http://fismapedia.org/index.php?title=Term:Acceptance acceptance] of risk to organizational operations and assets, individuals, other organizations, and the Nation.&amp;lt;ref&amp;gt;Decisions to initiate a formal reauthorization action include inputs from the [http://fismapedia.org/index.php?title=Term:Risk_Executive_(Function) risk executive (function)] and the [http://fismapedia.org/index.php?title=Term:Senior_Information_Security_Officer senior information security officer].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Unless otherwise handled by continuous monitoring and ongoing authorization, event-driven reauthorizations can occur when there is a significant change to an information system or its environment of operation. A significant change is defined as a change that has the potential to affect the security state of an information system. Significant changes to an information system may include for example: (i) installation of a new or upgraded operating system, [http://fismapedia.org/index.php?title=Term:Middleware middleware] component, or application; (ii) modifications to system ports, protocols, or services; (iii) installation of a new or upgraded hardware platform; ([http://fismapedia.org/index.php?title=AnA:IV iv]) modifications to cryptographic modules or services; or (v) modifications to [http://fismapedia.org/index.php?title=Term:Security_Controls security controls]. Examples of significant changes to the environment of operation may include for example: (i) moving to a new [http://fismapedia.org/index.php?title=Term:Facility facility]; (ii) adding new core missions or business functions; (iii) acquiring specific and credible threat information that the organization is being targeted by a [http://fismapedia.org/index.php?title=Term:Threat_Source threat source]; or ([http://fismapedia.org/index.php?title=AnA:IV iv]) establishing new/modified laws, directives, policies, or regulations. If a formal reauthorization action is initiated, the organization targets only the specific [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] affected by the changes and reuses previous [http://fismapedia.org/index.php?title=Term:Assessment assessment] results wherever possible. Most [http://fismapedia.org/index.php?title=Term:Routine_Changes routine changes] to an information system or its environment of operation can be handled by the organization's continuous monitoring program, thus supporting the concept of ongoing authorization. An effective monitoring program can significantly reduce the overall cost and level of effort of reauthorization actions.&lt;br /&gt;
&lt;br /&gt;
In the event that there is a change in authorizing officials, the new [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official] reviews the current authorization decision document, authorization package, and any updated documents created as a result of the ongoing monitoring activities. If the new [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official] is willing to accept the currently documented risk, then the official signs a new authorization decision document, thus formally transferring responsibility and [http://fismapedia.org/index.php?title=Term:Accountability accountability] for the information system or the common controls inherited by organizational information systems and explicitly accepting the risk to organizational operations and assets, individuals, other organizations, and the Nation.&lt;br /&gt;
&lt;br /&gt;
If the new [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official] is not willing to accept the previous authorization results (including identified level of risk), a reauthorization action may need to be initiated or the new [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official] may instead establish new terms and conditions for continuing the original authorization, but not extend the original [http://fismapedia.org/index.php?title=Term:authorization_termination_date authorization termination date]. In all situations where there is a decision to reauthorize an information system or the common controls inherited by organizational information systems, the maximum reuse of authorization information is strongly encouraged to minimize the time and expense associated with the reauthorization effort.&amp;lt;ref&amp;gt;The decision to initiate a formal reauthorization action can be based on a variety of factors, including for example, the acceptability of the previous authorization information provided in the authorization package, the length of time since the previous authorization decision, the [http://fismapedia.org/index.php?title=Term:Risk_Tolerance risk tolerance] of the new [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official], and current organizational requirements and/or priorities.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sources ==&lt;br /&gt;
&lt;br /&gt;
* [http://csrc.nist.gov/publications/drafts/800-37-Rev1/SP800-37-rev1-FPD.pdf NIST SP 800-37 Rev. 1 DRAFT Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach]&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_2&amp;diff=74925</id>
		<title>Industry:Project Review/NIST SP 800-37r1 FPD Chapter 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_2&amp;diff=74925"/>
				<updated>2009-12-08T03:13:37Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: Uploaded images and edited links to make them work properly&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;CHAPTER TWO&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''THE FUNDAMENTALS'''&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
BASIC CONCEPTS ASSOCIATED WITH MANAGING RISK FROM INFORMATION SYSTEMS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This chapter describes the basic concepts associated with managing information security-related risks from information systems. These concepts include: (i) incorporating [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] principles and best practices into organization-wide strategic planning considerations, core missions and business processes, and supporting organizational information systems; (ii) integrating information [http://fismapedia.org/index.php?title=Term:Security_Requirements security requirements] into [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle] processes; (iii) establishing practical and meaningful boundaries for organizational information systems; and ([http://fismapedia.org/index.php?title=AnA:IV iv]) allocating [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] to organizational information systems as system-specific, hybrid, or common controls.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2.1 INTEGRATED ENTERPRISE-WIDE RISK MANAGEMENT ==&lt;br /&gt;
&lt;br /&gt;
Managing risks from information systems is a complex, multifaceted undertaking that requires the involvement of the entire organization—from the senior leaders providing the strategic vision and top-level goals and objectives for the organization, to the mid-level leaders managing projects and implementing systems, to the individuals on the front lines developing, implementing, and operating the systems supporting the organization's core missions and business processes. [http://fismapedia.org/index.php?title=Term:Risk_Management Risk management] can be viewed as a holistic [http://fismapedia.org/index.php?title=Term:Activity activity] that is fully integrated into every aspect of the organization. Figure 2-1 illustrates a hierarchical, three-tiered approach to [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] that addresses risk-related concerns at: (i) the ''organization'' level; (ii) the ''mission and business process'' level; and (iii) the ''information system'' level.&amp;lt;ref&amp;gt;NIST [http://fismapedia.org/index.php?title=Doc:Special_Publication_800-39 Special Publication 800-39], ''Integrated Enterprise-Wide Risk Management: Organization, Mission, and Information System View'' (projected for publication in 2010), will provide guidance on the holistic approach to [http://fismapedia.org/index.php?title=Term:Risk_Management risk management].&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:80037r1FPD_Figure2-1.png|500px|thumb|center|FIGURE 2-1: HIERARCHICAL RISK MANAGEMENT APPROACH]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Risk management at Tier 1 addresses risk from the organizational perspective with the development of a comprehensive governance structure and enterprise-wide [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] strategy that includes: (i) the techniques and methodologies the organization plans to employ to assess risk from information systems and other types of risk of concern to the organization;&amp;lt;ref&amp;gt;Other types of risk include, for example: (i) acquisition risk (cost, schedule, performance); (ii) compliance and regulatory risk; (iii) financial risk; ([http://fismapedia.org/index.php?title=AnA:IV iv]) legal risk; (v) operational (mission/business) risk; (vi) political risk; (vii) program/project risk; (viii) reputational risk; (ix) safety risk; (x) strategic planning risk; and (xi) [http://fismapedia.org/index.php?title=Term:Supply_Chain supply chain] risk.&amp;lt;/ref&amp;gt; (ii) the methods and procedures the organization plans to use to evaluate the significance of the risks identified during the [http://fismapedia.org/index.php?title=Term:Risk_Assessment risk assessment]; (iii) the types and extent of [http://fismapedia.org/index.php?title=Term:Risk_Mitigation risk mitigation] [http://fismapedia.org/index.php?title=Term:Measures measures] the organization plans to employ to address identified risks; ([http://fismapedia.org/index.php?title=AnA:IV iv]) the level of risk the organization plans to accept (i.e., [http://fismapedia.org/index.php?title=Term:Risk_Tolerance risk tolerance]); (v) how the organization plans to monitor risk on an ongoing basis given the inevitable changes to organizational information systems and their environments of operation; and (vi) the degree and type of oversight the organization plans to use to ensure that the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] strategy is being effectively carried out. As part of the overall governance structure established by the organization, the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] strategy is propagated to organizational officials and support contractors with developmental, operational, and oversight responsibilities, including for example: (i) authorizing officials (including mission and business owners); (ii) chief information officers; (iii) senior information security officers; ([http://fismapedia.org/index.php?title=AnA:IV iv]) enterprise/information security architects; (v) information system owners/program managers; (vi) information owners/stewards; (vii) information system security officers; (viii) information system security engineers; (ix) information system developers and integrators; (x) system administrators; and (xi) users.&lt;br /&gt;
&lt;br /&gt;
Managing risk at Tier 2 addresses risk from a ''mission'' and ''business process'' perspective and is guided by the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management]-related decisions taken at Tier 1. Tier 2 activities are integral to enterprise architecture&amp;lt;ref&amp;gt;Federal [http://fismapedia.org/index.php?title=Term:Enterprise_Architecture Enterprise Architecture] [http://fismapedia.org/index.php?title=Term:Reference Reference] Models and Segment and Solution [http://fismapedia.org/index.php?title=Term:Architectures Architectures] are defined in the OMB [http://fismapedia.org/index.php?title=Term:Federal_Enterprise_Architecture Federal Enterprise Architecture] ([http://fismapedia.org/index.php?title=AnA:FEA FEA]) Program, [http://fismapedia.org/index.php?title=AnA:FEA FEA] Consolidated [http://fismapedia.org/index.php?title=Term:Reference Reference] Model Document, Version 2.3, October 2003 and OMB Federal [http://fismapedia.org/index.php?title=Term:Segment_Architecture Segment Architecture] Methodology (FSAM), January 2009, respectively.&amp;lt;/ref&amp;gt; and organizational assessments of risk and include: (i) defining the core missions and business processes for the organization (including any derivative or related missions and business processes carried out by subordinate organizations); (ii) prioritizing missions and business processes with respect to the goals and objectives of the organization; (iii) defining the types of information that the organization needs to successfully execute the stated missions and business processes and the information flows both internal and external to the organization; and ([http://fismapedia.org/index.php?title=AnA:IV iv]) developing an organization-wide information protection strategy and incorporating high-level information [http://fismapedia.org/index.php?title=Term:Security_Requirements security requirements] into the core missions and business processes; (v) specifying the degree of autonomy for subordinate organizations (i.e., organizations within the [http://fismapedia.org/index.php?title=Term:Parent_Organization parent organization]) that the [http://fismapedia.org/index.php?title=Term:Parent_Organization parent organization] permits for assessing, evaluating, mitigating, accepting, and monitoring risk.&lt;br /&gt;
&lt;br /&gt;
The [http://fismapedia.org/index.php?title=AnA:FIRST first] two activities are necessary because there may be different priorities associated with organizational missions and business processes (including derivative or related missions and business processes) that need to be factored into the weighting of risk calculations—both within specific elements of the organization as well as for the overall [http://fismapedia.org/index.php?title=Term:Risk_Tolerance risk tolerance] of the organization. The early incorporation of information [http://fismapedia.org/index.php?title=Term:Security_Requirements security requirements] into the organization's missions and business processes helps to ensure that risk-related considerations are effectively integrated into the organization's [http://fismapedia.org/index.php?title=Term:Enterprise_Architecture enterprise architecture] and [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle] processes. The last [http://fismapedia.org/index.php?title=Term:Activity activity] reflects the diversity of mission/business needs and the availability of resources across the organization. Because subordinate organizations responsible for carrying out derivative or related missions and business processes may have already invested in their own methods of assessing, evaluating, mitigating, accepting and monitoring risk, parent organizations may allow a greater degree of autonomy within parts of the organization or across the entire organization in order to minimize costs. When a diversity of [http://fismapedia.org/index.php?title=Term:Risk_Assessment risk assessment] methods is allowed, organizations employ some means of translation and/or synthesis of the risk-related information to ensure that the output of the different [http://fismapedia.org/index.php?title=Term:Risk_Assessment risk assessment] activities can be correlated in a meaningful manner.&lt;br /&gt;
&lt;br /&gt;
Risk management at Tier 3 addresses risk from an ''information system'' perspective and is guided by the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] decisions taken at Tier 2. [http://fismapedia.org/index.php?title=Term:Risk_Management Risk management] decisions taken at Tier 2 impact the ultimate selection and deployment of needed safeguards and countermeasures (i.e., [http://fismapedia.org/index.php?title=Term:Security_Controls security controls]) at the information [http://fismapedia.org/index.php?title=Term:System_Level system level]. Information [http://fismapedia.org/index.php?title=Term:Security_Requirements security requirements] are satisfied by the selection of appropriate management, operational, and [http://fismapedia.org/index.php?title=Term:Technical_Security technical security] controls from [http://fismapedia.org/index.php?title=Doc:NIST_Special_Publication_800-53 NIST Special Publication 800-53]. The [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] are subsequently allocated to the various components of the information system as system-specific, hybrid, or common controls.&amp;lt;ref&amp;gt;The allocation of [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] can take place at all three tiers in the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] hierarchy. For example, [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] that are identified as common controls may be allocated at the organization, mission/business process, or information [http://fismapedia.org/index.php?title=Term:System_Level system level]. See Section 2.4 for additional information on security control allocation.&amp;lt;/ref&amp;gt; [http://fismapedia.org/index.php?title=Term:Security_Controls Security controls] can be provided by the organization or by an external provider. Relationships with external providers are established in a variety of ways, for example, through joint ventures, business partnerships, outsourcing arrangements (i.e., through contracts, interagency agreements, [http://fismapedia.org/index.php?title=Term:Lines_of_Business lines of business] arrangements), licensing agreements, and/or [http://fismapedia.org/index.php?title=Term:Supply_Chain supply chain] exchanges.&amp;lt;ref&amp;gt;Appendix I provides additional guidance regarding external service providers and the provision of [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] in external environments.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Risk management tasks begin early in the [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle] and are important in shaping the security capabilities of the information system. If these tasks are not adequately performed during the initiation, development, and acquisition phases of the [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle], the tasks will, by necessity, be undertaken later in the [http://fismapedia.org/index.php?title=Term:Life_Cycle life cycle] and be more costly to implement. In either situation, all tasks are completed prior to placing the information system into operation or continuing its operation to ensure that: (i) [http://fismapedia.org/index.php?title=Term:Information_System-related_Security_Risks information system-related security risks] are being adequately addressed on an ongoing basis; and (ii) the [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official] explicitly understands and accepts the risk to organizational operations and assets, individuals, other organizations, and the Nation based on the implementation of a defined set of [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] and the current security state of the information system.&lt;br /&gt;
&lt;br /&gt;
Tier 3 [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] assumes the integration and tight coupling of the six-step [http://fismapedia.org/index.php?title=Term:Risk_Management Risk Management] Framework ([http://fismapedia.org/index.php?title=AnA:RMF RMF]) into the [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle]. The framework, illustrated in Figure 2-2, provides a disciplined and structured process that operates within the [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle] to effectively manage [http://fismapedia.org/index.php?title=Term:Information_System-related_Security_Risks information system-related security risks]. The [http://fismapedia.org/index.php?title=AnA:RMF RMF] steps include:&lt;br /&gt;
&lt;br /&gt;
*   '''''Categorizing''''' the information system and the information processed, stored, and transmitted by that system based on a worst-case impact analysis.&amp;lt;ref&amp;gt;FIPS 199 provides [http://fismapedia.org/index.php?title=Term:Security_Categorization security categorization] guidance for nonnational security systems. [http://fismapedia.org/index.php?title=Doc:CNSS_Instruction_1253 CNSS Instruction 1253] provides similar guidance for [http://fismapedia.org/index.php?title=Term:National_Security_Systems national security systems].&amp;lt;/ref&amp;gt;&lt;br /&gt;
*   '''''Selecting''''' an initial set of [http://fismapedia.org/index.php?title=Term:Baseline_Security baseline security] controls for the information system based on the [http://fismapedia.org/index.php?title=Term:Security_Categorization security categorization]; [http://fismapedia.org/index.php?title=Term:Tailoring tailoring] and supplementing the [http://fismapedia.org/index.php?title=Term:Security_Control_Baseline security control baseline] as needed based on an organizational [http://fismapedia.org/index.php?title=Term:Assessment assessment] of risk and local conditions.&amp;lt;ref&amp;gt;NIST [http://fismapedia.org/index.php?title=Doc:Special_Publication_800-53 Special Publication 800-53] provides security control selection guidance for nonnational security systems. [http://fismapedia.org/index.php?title=Doc:CNSS_Instruction_1253 CNSS Instruction 1253] provides similar guidance for [http://fismapedia.org/index.php?title=Term:National_Security_Systems national security systems].&amp;lt;/ref&amp;gt;&lt;br /&gt;
*   ''Implementing'' the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] and describing how the controls are employed within the information system and its environment of operation.&lt;br /&gt;
*   ''Assessing'' the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] using appropriate [http://fismapedia.org/index.php?title=Term:Assessment assessment] procedures to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the [http://fismapedia.org/index.php?title=Term:Security_Requirements security requirements] for the system.&lt;br /&gt;
*   ''Authorizing'' information system operation based on a determination of the risk to organizational operations and assets, individuals, other organizations, and the Nation resulting from the operation of the information system and the decision that this risk is acceptable.&lt;br /&gt;
*   ''Monitoring'' the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] in the information system on an ongoing basis including assessing control effectiveness, documenting changes to the system or its environment of operation, conducting security impact analyses of the associated changes, nvironment of operation, conducting security impact analyses of the associated changes, and [http://fismapedia.org/index.php?title=Term:Reporting reporting] the security state of the system to designated organizational officials.&lt;br /&gt;
&lt;br /&gt;
Chapter Three provides a detailed description of each of the specific tasks necessary to carry out the six steps in the [http://fismapedia.org/index.php?title=AnA:RMF RMF].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:80037r1FPD_Figure2-2.png|500px|thumb|center|FIGURE 2-2: RISK MANAGEMENT FRAMEWORK]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In summary, there is a significant degree of flexibility in how organizations employ the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] processes described above. While it is convenient to portray the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] approach in Figure 2-1 as hierarchical, the reality of project and organization dynamics can be much more complex. The organizational management style may be at one or more points on the continuum from top-down command to consensus among peers. For [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] to succeed at all levels of the organization, the organization must have a consistent and effective approach to [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] that is applied to all [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] processes and procedures.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2.2 SYSTEM DEVELOPMENT LIFE CYCLE ==&lt;br /&gt;
&lt;br /&gt;
All federal information systems, including operational systems, systems under development, and systems undergoing modification or upgrade, are in some phase of the [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle].&amp;lt;ref&amp;gt;There are typically five phases in a generic [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle] including: (i) system initiation; (ii) system development/acquisition; (iii) system implementation; ([http://fismapedia.org/index.php?title=AnA:IV iv]) system operations/maintenance; and (v) system [http://fismapedia.org/index.php?title=Term:Disposition disposition].&amp;lt;/ref&amp;gt; Requirements definition is a critical part of the system development process and begins very early in the [http://fismapedia.org/index.php?title=Term:Life_Cycle life cycle], typically in the ''system initiation'' phase.&amp;lt;ref&amp;gt;Organizations may employ a variety of [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle] processes including, for example, waterfall, spiral, or agile development.&amp;lt;/ref&amp;gt; [http://fismapedia.org/index.php?title=Term:Security_Requirements Security requirements] are a subset of the overall functional requirements levied on an information system and therefore, whenever possible, are incorporated into the [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle] at the earliest opportunity. Without the early infusion of [http://fismapedia.org/index.php?title=Term:Security_Requirements security requirements], significant expense may be incurred by the organization later in the [http://fismapedia.org/index.php?title=Term:Life_Cycle life cycle] to address security considerations that could have been included in the initial design. This may also result in less than effective information security solutions. Organizations prioritize information system requirements, both functional and security-related, in accordance with the strategic objectives of the organization, its core missions and business processes, and operational considerations.&lt;br /&gt;
&lt;br /&gt;
Integrating information [http://fismapedia.org/index.php?title=Term:Security_Requirements security requirements] into the [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle] is the most cost-effective and efficient method for an organization to ensure that its protection strategy is implemented. It also ensures that information security processes are not isolated from the other routine management processes employed by the organization to develop, implement, operate, and maintain information systems supporting ongoing missions and business functions. In addition to incorporating information [http://fismapedia.org/index.php?title=Term:Security_Requirements security requirements] into the [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle], [http://fismapedia.org/index.php?title=Term:Security_Requirements security requirements] are also integrated into the program, planning, and budgeting activities within the organization to ensure that the resources are available when needed. The [http://fismapedia.org/index.php?title=Term:Enterprise_Architecture enterprise architecture] provides a central record of this integration within an organization. As part of their ongoing management and oversight responsibilities, organizational officials ensure that adequate resources are allocated to information security. Organizational officials identify the resources necessary to complete the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] tasks described in this publication and ensure that those resources are made available to appropriate personnel. [http://fismapedia.org/index.php?title=Term:Resource Resource] allocation includes both funding to carry out the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] tasks and assigning the personnel needed to accomplish the tasks.&amp;lt;ref&amp;gt;Resource requirements include funding for training organizational personnel to ensure that they can effectively carry out their assigned responsibilities.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Using the well-established concept of ''integrated project teams'',&amp;lt;ref&amp;gt;Integrated project teams are multidisciplinary entities consisting of individuals with appropriate skills and expertise to help facilitate the development of information systems that meet the requirements of the organization.&amp;lt;/ref&amp;gt; security professionals are an integral part of any information system-related development activities. Making information [http://fismapedia.org/index.php?title=Term:Security_Requirements security requirements] an integral part of all types of [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle] processes (e.g., waterfall, spiral, agile development) helps to ensure that senior leaders consider information security risks to organizational operations and assets, individuals, other organizations, and the Nation and take appropriate actions to mitigate these risks. Such consideration is used to foster close cooperation among personnel responsible for the design, development, implementation, operation, [http://fismapedia.org/index.php?title=Term:Maintenance maintenance], and [http://fismapedia.org/index.php?title=Term:Disposition disposition] of information systems and the information security professionals advising the senior leadership on appropriate [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] needed to adequately mitigate risk and protect critical missions and business functions.&lt;br /&gt;
&lt;br /&gt;
Finally, organizations maximize the use of [http://fismapedia.org/index.php?title=Term:Security-Relevant_Information security-relevant information] (e.g., [http://fismapedia.org/index.php?title=Term:Assessment assessment] results, information system documentation, and other [http://fismapedia.org/index.php?title=Term:Artifacts artifacts]) generated during the [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle] to satisfy requirements for similar information needed for information security-related purposes. Similar [http://fismapedia.org/index.php?title=Term:Security-Relevant_Information security-relevant information] concerning common controls, including controls provided by external providers, is factored into the organization's [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] process. Reuse of information is an effective method to help eliminate duplication of effort, reduce documentation, and avoid unnecessary costs that may result when security activities are conducted independently of [http://fismapedia.org/index.php?title=Term:System_Development_Life_Cycle system development life cycle] processes. In addition, reuse promotes greater consistency of information used in the design, development, implementation, operation, [http://fismapedia.org/index.php?title=Term:Maintenance maintenance], and [http://fismapedia.org/index.php?title=Term:Disposition disposition] of an information system including security-related considerations.&lt;br /&gt;
&lt;br /&gt;
==2.3 INFORMATION SYSTEM BOUNDARIES ==&lt;br /&gt;
&lt;br /&gt;
One of the most challenging problems for information system owners, authorizing officials, chief information officers, senior information security officers, and information security architects is identifying appropriate boundaries for organizational information systems. Well-defined boundaries establish the scope of protection for organizational information systems (i.e., what the organization agrees to protect under its direct [http://fismapedia.org/index.php?title=Term:Management_Control management control] or within the scope of its responsibilities) and include the people, processes, and information technologies that are part of the systems supporting the organization's missions and business processes. [http://fismapedia.org/index.php?title=Term:Information_System_Boundaries Information system boundaries] need to be established in [http://fismapedia.org/index.php?title=Term:Coordination coordination] with the [http://fismapedia.org/index.php?title=Term:Security_Categorization security categorization] process and before the development of security plans. [http://fismapedia.org/index.php?title=Term:Information_System_Boundaries Information system boundaries] that are too expansive (i.e., too many system components and/or unnecessary architectural complexity) make the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] process extremely unwieldy and complex. Boundaries that are too limited increase the number of information systems that must be separately managed and as a consequence, unnecessarily inflate the total information security costs for the organization. The following sections provide general guidelines to assist organizations in establishing appropriate system boundaries to achieve cost-effective solutions for managing information security-related risks from the operation and use of information systems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2.3.1  Establishing [http://fismapedia.org/index.php?title=Term:Information_System_Boundaries Information System Boundaries] ===&lt;br /&gt;
&lt;br /&gt;
The allocation of information resources&amp;lt;ref&amp;gt;Information resources consist of information and related resources including personnel, equipment, funds, and information technology.&amp;lt;/ref&amp;gt; to an information system defines the [http://fismapedia.org/index.php?title=Term:Boundary boundary] for that system. Organizations have significant flexibility in determining what constitutes an information system. If a set of [http://fismapedia.org/index.php?title=Term:Information_Resources information resources] is identified as an information system, the resources are generally under the same direct [http://fismapedia.org/index.php?title=Term:Management_Control management control].&amp;lt;ref&amp;gt;For information systems, direct [http://fismapedia.org/index.php?title=Term:Management_Control management control] involves budgetary, programmatic, or operational authority and associated ''responsibility'' and ''accountability''.&amp;lt;/ref&amp;gt; Direct [http://fismapedia.org/index.php?title=Term:Management_Control management control] does not necessarily imply that there is no intervening management. It is possible for multiple information systems to be validly considered as independent ''subsystems''&amp;lt;ref&amp;gt;A [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] is a major subdivision or component of an information system consisting of information, information technology, and personnel that perform one or more specific functions.&amp;lt;/ref&amp;gt; of a larger and more complex system provided all of the subsystems fall under the same management authority. This situation may arise in many organizations when smaller information systems are coalesced for purposes of [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] into a larger, more comprehensive system. In addition to consideration of direct [http://fismapedia.org/index.php?title=Term:Management_Control management control], it may also be helpful for organizations to consider if the [http://fismapedia.org/index.php?title=Term:Information_Resources information resources] being identified as an information system:&lt;br /&gt;
&lt;br /&gt;
*   Support the same mission/business objectives or functions and essentially the same operating characteristics and information [http://fismapedia.org/index.php?title=Term:Security_Requirements security requirements]; and&lt;br /&gt;
*   Reside in the same general operating environment (or in the case of a distributed information system, reside in various locations with similar operating environments).&amp;lt;ref&amp;gt;Similarity of operating environments includes, for example, consideration of threat, policy, and management.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
While the above considerations may be useful to organizations in determining [http://fismapedia.org/index.php?title=Term:Information_System_Boundaries information system boundaries] for purposes of [http://fismapedia.org/index.php?title=Term:Risk_Management risk management], they are not viewed as limiting the organization's flexibility in establishing commonsense boundaries that promote effective information security within the available resources of the organization. Information system owners consult with authorizing officials, chief information officers, senior information security officers, the [http://fismapedia.org/index.php?title=Term:Risk_Executive_(Function) risk executive (function)],&amp;lt;ref&amp;gt;The [http://fismapedia.org/index.php?title=Term:Roles_and_Responsibilities roles and responsibilities] of the [http://fismapedia.org/index.php?title=Term:Risk_Executive_(Function) Risk Executive (Function)] are described in Appendix D.&amp;lt;/ref&amp;gt; and information security architects when establishing or changing system boundaries. The process of establishing boundaries for information systems and the associated [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] implications is an organization-level [http://fismapedia.org/index.php?title=Term:Activity activity] that includes careful negotiation among all key participants—taking into account mission and business requirements, technical considerations with respect to information security, and programmatic costs to the organization.&lt;br /&gt;
&lt;br /&gt;
Software ''applications'' are included in the [http://fismapedia.org/index.php?title=Term:Boundary boundary] of an information system hosting the applications and do not require a separate [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] process (including a separate [http://fismapedia.org/index.php?title=Term:Security_Authorization security authorization]). Rather, software applications take advantage of the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] provided by the hosting information system to help provide a foundational [http://fismapedia.org/index.php?title=Term:Level_of_Protection level of protection] for the hosted applications. Additional application-level [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] are provided by the respective software applications, as needed. Employing strong [http://fismapedia.org/index.php?title=Term:Configuration_Management configuration management] and control processes within the hosting information system and reusing [http://fismapedia.org/index.php?title=Term:Assessment assessment] evidence of security control effectiveness helps to provide the necessary protection for applications. [http://fismapedia.org/index.php?title=Term:Security_Controls Security controls] provided by the hosted software application are documented in the [http://fismapedia.org/index.php?title=Term:Security_Plan security plan] for the hosting information system and assessed for effectiveness during the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] process (including during the initial authorization or subsequent to the initial authorization if the applications are added after the system is authorized to operate). Organizations ensure that all [http://fismapedia.org/index.php?title=Term:Security_Controls security controls], including application-level controls employed in separate software applications, are managed and tracked on an ongoing basis. Information system owners ensure that hosted applications do not affect the security state of the hosting system. Information system owners obtain the necessary information from hosted applications to conduct security impact analyses, when needed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2.3.2  Boundaries for Complex Information Systems (System of Systems) ===&lt;br /&gt;
&lt;br /&gt;
The application of [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] within a large and complex information system (or system of systems) can present significant challenges to an organization. From a centralized development, implementation, and operations perspective, the [http://fismapedia.org/index.php?title=Term:Information_System_Owner information system owner], in collaboration with the [http://fismapedia.org/index.php?title=Term:Authorizing_Official authorizing official], [http://fismapedia.org/index.php?title=Term:Senior_Information_Security_Officer senior information security officer], information security architect, and [http://fismapedia.org/index.php?title=Term:Information_System_Security_Engineer information system security engineer], examines the purpose of the information system and considers the feasibility of decomposing the complex system into more manageable components, or ''subsystems''. From a distributed development, implementation, and operations perspective the organization recognizes that multiple entities, possibly operating under different policies, may be contributing to the development, implementation, and/or operations of the subsystems that comprise the overall information system. In such a scenario, the organization is responsible for ensuring that these separate subsystems can work together in both a secure and functional manner. Treating an information system as multiple subsystems, each with its own [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] [http://fismapedia.org/index.php?title=Term:Boundary boundary], facilitates a more targeted application of [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] to achieve [http://fismapedia.org/index.php?title=Term:Adequate_Security adequate security] and a more cost-effective [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] process. The decomposition into [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] components is reflected in the [http://fismapedia.org/index.php?title=Term:Security_Plan security plan] for that complex system (or system of systems).&lt;br /&gt;
&lt;br /&gt;
Information security [http://fismapedia.org/index.php?title=Term:Architecture architecture] plays a key part in the security control selection and allocation process for a large and complex information system (or system of systems). This includes monitoring and controlling communications at key internal boundaries and providing system-wide ''common controls'' (see Section 2.4) that meet or exceed the requirements of the constituent subsystems inheriting those system-wide common controls. One approach to control selection and allocation is to categorize each identified [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] (including dynamic subsystems as described in Section 2.3.3). Separately categorizing each [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] does not change the overall categorization of the information system. Rather, it allows the constituent subsystems to receive a separate allocation of [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] from [http://fismapedia.org/index.php?title=Doc:NIST_Special_Publication_800-53 NIST Special Publication 800-53] instead of deploying higher impact controls across every [http://fismapedia.org/index.php?title=Term:Subsystem subsystem]. Another approach is to bundle smaller subsystems into larger subsystems within the overall complex information system, categorize each of the aggregated subsystems, and allocate [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] to the subsystems, as appropriate. While subsystems of complex information systems may sometimes exist as full systems, for complex systems, these portions of the system are not treated as independent entities because the subsystems are typically interdependent and interconnected.&lt;br /&gt;
&lt;br /&gt;
In addition to protecting the external [http://fismapedia.org/index.php?title=Term:Boundary boundary] of a large and complex information system (or system of systems), the organization may, as part of the information security [http://fismapedia.org/index.php?title=Term:Architecture architecture], implement [http://fismapedia.org/index.php?title=Term:Boundary_Protection boundary protection] between subsystems (possibly represented by different security domains). Such internal [http://fismapedia.org/index.php?title=Term:Boundary_Protection boundary protection] is part of an overall [http://fismapedia.org/index.php?title=Term:Defense-In-Depth defense-in-depth] [http://fismapedia.org/index.php?title=Term:Architecture architecture] implemented by the organization. The policy implemented in each [http://fismapedia.org/index.php?title=Term:Boundary_Protection_Device boundary protection device] may be specific to the permitted information flows through that [http://fismapedia.org/index.php?title=Term:Boundary boundary], but is also consistent with the information security [http://fismapedia.org/index.php?title=Term:Architecture architecture] for the organization as a whole.&lt;br /&gt;
&lt;br /&gt;
When the results of security categorizations for the identified subsystems are different, the organization carefully examines the interfaces among subsystems and selects [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] for interconnection of the subsystems to eliminate or reduce potential vulnerabilities in this area. This helps to ensure that the information system (at large) is adequately [http://fismapedia.org/index.php?title=Term:Protected protected].&amp;lt;ref&amp;gt;Tightly coupled [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] components may introduce inadvertent weak links in a complex information system (system of systems). For example, if a large organizational [http://fismapedia.org/index.php?title=Term:Intranet intranet] is decomposed by [http://fismapedia.org/index.php?title=Term:Enterprise_Services enterprise services] into smaller subsystems (e.g., severable components such as [http://fismapedia.org/index.php?title=Term:Local_Area_Network local area network] segments) and subsequently categorized individually, the specific protections at the [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] level may allow a vector of attack against the [http://fismapedia.org/index.php?title=Term:Intranet intranet] by requiring [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] commensurate with a lower impact level, than the rest of the system. To avoid this situation, organizations are encouraged to carefully examine the interfaces among [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] components and to take appropriate actions to eliminate potential vulnerabilities in this area, thus helping to ensure that the information system is adequately [http://fismapedia.org/index.php?title=Term:Protected protected].&amp;lt;/ref&amp;gt; [http://fismapedia.org/index.php?title=Term:Security_Controls Security controls] for interconnection of subsystems are also employed when the subsystems implement different security policies or are administered by different authorities (i.e., the subsystems belong to different security domains). Common controls provided by different organization often require such [http://fismapedia.org/index.php?title=Term:Boundary_Protection boundary protection] [http://fismapedia.org/index.php?title=Term:Interface_Controls interface controls]. The extent to which the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the [http://fismapedia.org/index.php?title=Term:Security_Requirements security requirements] for the complex system, can be determined by combining security control assessments at the [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] level and adding system-level considerations addressing interface issues among subsystems. This approach facilitates a more targeted and cost-effective [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] process by scaling the level of effort in accordance with that subsystem's [http://fismapedia.org/index.php?title=Term:Security_Categorization security categorization] and allowing for reuse of [http://fismapedia.org/index.php?title=Term:Assessment assessment] results at the [http://fismapedia.org/index.php?title=Term:System_Level system level]. Figure 2-3 illustrates the concept of decomposition for a complex information system.&lt;br /&gt;
&lt;br /&gt;
*    [http://fismapedia.org/index.php?title=Term:Security_Plan Security plan] reflects information system decomposition with [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] assigned to each [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] component.&lt;br /&gt;
*    [http://fismapedia.org/index.php?title=Term:Security_Assessment Security assessment] procedures tailored for the [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] in each [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] component and for the combined [http://fismapedia.org/index.php?title=Term:System_Level system level].&lt;br /&gt;
*    [http://fismapedia.org/index.php?title=Term:Security_Control_Assessment Security control assessment] performed on each [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] component and on system-level controls not covered by [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] security control assessments.&lt;br /&gt;
*    [http://fismapedia.org/index.php?title=Term:Security_Authorization Security authorization] conducted on the information system as a whole.&lt;br /&gt;
&lt;br /&gt;
[[Image:80037r1FPD_Figure2-3.png|500px|thumb|center|FIGURE 2-3: DECOMPOSITION OF COMPLEX SYSTEMS]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the above example, an information system contains a system guard that monitors the flow of information between two local area networks. The information system, in this case, can be partitioned into multiple [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] components: (i) [http://fismapedia.org/index.php?title=Term:Local_Area_Network local area network] one; (ii) [http://fismapedia.org/index.php?title=Term:Local_Area_Network local area network] two; (iii) the system guard separating the two networks; and ([http://fismapedia.org/index.php?title=AnA:IV iv]) several dynamic subsystems that become part of the system at various points in time (see Section 2.3.3). Each [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] component within the information system may be categorized individually. The [http://fismapedia.org/index.php?title=Term:Security_Categorization security categorization] of the information system is determined by taking into consideration all of the individual [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] categorizations. When all subsystems within the information system have completed the [http://fismapedia.org/index.php?title=Term:Security_Control_Assessment security control assessment], an additional [http://fismapedia.org/index.php?title=Term:Assessment assessment] is performed on the system-level [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] not covered by the individual [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] assessments, and the results are bu, the determination of subsystems is established at system initiation and maintained throughout the [http://fismapedia.org/index.php?title=Term:Life_Cycle life cycle] of the system. However, there are some instances, most notably in [http://fismapedia.org/index.php?title=Term:Net-Centric net-centric] [http://fismapedia.org/index.php?title=Term:Architectures architectures] (e.g., cloud computing, service-oriented [http://fismapedia.org/index.php?title=Term:Architectures architectures]),&amp;lt;ref&amp;gt;A [http://fismapedia.org/index.php?title=Term:Net-Centric net-centric] [http://fismapedia.org/index.php?title=Term:Architecture architecture] is a complex system of systems comprised of subsystems and services that are part of a continuously-evolving, complex community of people, devices, information and services interconnected by a network that enhances [http://fismapedia.org/index.php?title=Term:Information_Sharing information sharing] and collaboration.&amp;lt;/ref&amp;gt; where the subsystems that compose the system may not be present at all stages of the [http://fismapedia.org/index.php?title=Term:Life_Cycle life cycle]. Some subsystems may not become part of an information system until sometime after system initiation, while other subsystems may leave the system sometime prior to system [http://fismapedia.org/index.php?title=Term:Termination termination]. Generally, this will not impact the external [http://fismapedia.org/index.php?title=Term:Boundary boundary] of the information system if the dynamic subsystems are in the system design and the appropriate [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] are reflected in the [http://fismapedia.org/index.php?title=Term:Security_Plan security plan]. But it does impact the subsystems that exist within the [http://fismapedia.org/index.php?title=Term:Boundary boundary] at any given point in time.&lt;br /&gt;
&lt;br /&gt;
Dynamic subsystems that become part of an organizational information system at various points in time may or may not be under the direct control of the organization. These subsystems may be provided by external providers (e.g., through contracts, interagency agreements, [http://fismapedia.org/index.php?title=Term:Lines_of_Business lines of business] arrangements, licensing agreements, and/or [http://fismapedia.org/index.php?title=Term:Supply_Chain supply chain] exchanges). Regardless of whether the [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] is or is not controlled by the organization, the expectations of its capabilities have to be considered. The dynamic inclusion or exclusion of the subsystems may or may not require reassessment of the information system as a whole. This is determined based on constraints and assumptions (e.g., functions the subsystems perform, connections to other subsystems and other information systems) imposed upon the subsystems at system design and incorporated in the [http://fismapedia.org/index.php?title=Term:Security_Plan security plan]. So long as the subsystems conform to the identified constraints and assumptions, they can be dynamically added or removed from the information system without requiring reassessments of the system.&lt;br /&gt;
&lt;br /&gt;
As noted above, the assumptions and constraints on the dynamic subsystems are reflected in the information system design and the [http://fismapedia.org/index.php?title=Term:Security_Plan security plan]. The determination as to whether the subsystems conform to the assumptions and constraints is addressed during the continuous monitoring phase of the [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] process. Depending upon the nature of the subsystems (including the functions, connections, and relative trust relationships established with the [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] providers), the determination of conformance may be performed in a manual or automated manner, and may occur prior to, or during the [http://fismapedia.org/index.php?title=Term:Subsystem subsystem] connecting/disconnecting to the information system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2.4 SECURITY CONTROL ALLOCATION ==&lt;br /&gt;
&lt;br /&gt;
There are three types of [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] for information systems that can be employed by an organization: (i) ''system-specific controls'' (i.e., controls that provide a security capability for a particular information system only); (ii) ''common controls'' (i.e., controls that provide a security capability for multiple information systems); or (iii) ''hybrid controls'' (i.e., controls that have both system-specific and common characteristics).&amp;lt;ref&amp;gt;NIST [http://fismapedia.org/index.php?title=Doc:Special_Publication_800-53 Special Publication 800-53] provides additional guidance on [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] for organizational information systems.&amp;lt;/ref&amp;gt; As illustrated in Figure 2-4, [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] are allocated to organizational information systems as system-specific, hybrid, or common controls. The allocation of [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] is consistent with the organization's [http://fismapedia.org/index.php?title=Term:Enterprise_Architecture enterprise architecture] and information security [http://fismapedia.org/index.php?title=Term:Architecture architecture]. As part of the information security [http://fismapedia.org/index.php?title=Term:Architecture architecture], organizations are encouraged to identify and implement [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] that can support multiple information systems efficiently and effectively as a common capability (i.e., common controls). When these controls are used to support a specific information system, they are referenced by that specific system as ''inherited controls''. Common controls promote more cost-effective and consistent information security across the organization and can also simplify [http://fismapedia.org/index.php?title=Term:Risk_Management risk management] activities. By allocating [http://fismapedia.org/index.php?title=Term:Security_Controls security controls] to an information system as system-specific controls (e.g., [http://fismapedia.org/index.php?title=Term:Access_Controls access controls], [http://fismapedia.org/index.php?title=Term:Identification_and_Authentication identification and authentication] controls, system communications and protection controls, audit controls), as hybrid controls (e.g., [http://fismapedia.org/index.php?title=Term:Contingency_Planning contingency planning] controls), or as common controls that are inherited (e.g., physical and environmental protection controls, awareness and training controls, [http://fismapedia.org/index.php?title=Term:Personnel_Security personnel security] controls), the organization assigns responsibility to specific organizational entities for the development, implementation, [http://fismapedia.org/index.php?title=Term:Assessment assessment], authorization, and monitoring of those controls.&lt;br /&gt;
&lt;br /&gt;
[[Image:80037r1FPD_Figure2-4.png|500px|thumb|center|FIGURE 2-4: SECURITY CONTROL ALLOCATION&amp;lt;ref&amp;gt;Security plans, security assessment reports, and plans of action and milestones are critical outputs from the RMF used to manage risk associated with the operation of information systems. See Appendix F for additional information.&amp;lt;/ref&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sources ==&lt;br /&gt;
&lt;br /&gt;
* [http://csrc.nist.gov/publications/drafts/800-37-Rev1/SP800-37-rev1-FPD.pdf NIST SP 800-37 Rev. 1 DRAFT Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach]&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:80037r1FPD_FigureF-1.png&amp;diff=74924</id>
		<title>File:80037r1FPD FigureF-1.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:80037r1FPD_FigureF-1.png&amp;diff=74924"/>
				<updated>2009-12-08T03:08:09Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: NIST SP 800-37r1 FPD - Figure F-1: Security Authorization Package&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;NIST SP 800-37r1 FPD - Figure F-1: Security Authorization Package&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:80037r1FPD_Figure2-4.png&amp;diff=74923</id>
		<title>File:80037r1FPD Figure2-4.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:80037r1FPD_Figure2-4.png&amp;diff=74923"/>
				<updated>2009-12-08T03:07:25Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: NIST SP 800-37r1 FPD - Figure 2-4: Security Control Allocation&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;NIST SP 800-37r1 FPD - Figure 2-4: Security Control Allocation&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:80037r1FPD_Figure2-3.png&amp;diff=74922</id>
		<title>File:80037r1FPD Figure2-3.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:80037r1FPD_Figure2-3.png&amp;diff=74922"/>
				<updated>2009-12-08T03:06:54Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: NIST SP 800-37r1 FPD - Figure 2-3: Decomposition Of Complex Systems&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;NIST SP 800-37r1 FPD - Figure 2-3: Decomposition Of Complex Systems&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:80037r1FPD_Figure2-2.png&amp;diff=74921</id>
		<title>File:80037r1FPD Figure2-2.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:80037r1FPD_Figure2-2.png&amp;diff=74921"/>
				<updated>2009-12-08T03:06:30Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: NIST SP 800-37r1 FPD - Figure 2-2: Risk Management Framework&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;NIST SP 800-37r1 FPD - Figure 2-2: Risk Management Framework&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:80037r1FPD_Figure2-1.png&amp;diff=74920</id>
		<title>File:80037r1FPD Figure2-1.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:80037r1FPD_Figure2-1.png&amp;diff=74920"/>
				<updated>2009-12-08T03:05:48Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: NIST SP 800-37r1 FPD - Figure 2-1: Hierarchical Risk Management Approach&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;NIST SP 800-37r1 FPD - Figure 2-1: Hierarchical Risk Management Approach&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:GIC-NISTSP80037r1FPD&amp;diff=74730</id>
		<title>Category:GIC-NISTSP80037r1FPD</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:GIC-NISTSP80037r1FPD&amp;diff=74730"/>
				<updated>2009-12-04T15:43:02Z</updated>
		
		<summary type="html">&lt;p&gt;Dan Philpott: Modified to add links to discussion pages&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| align=&amp;quot;right&amp;quot;&lt;br /&gt;
| __TOC__&lt;br /&gt;
|}&lt;br /&gt;
== Table of Contents ==&lt;br /&gt;
&lt;br /&gt;
*[[Industry:Project_Review/NIST_SP_800-37r1_FPD_Front_Matter|FRONT MATTER]] ([[Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Front_Matter|Discussion]])&lt;br /&gt;
*[[Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_1|CHAPTER ONE INTRODUCTION]] ([[Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_1|Discussion]])&lt;br /&gt;
**1.1 BACKGROUND&lt;br /&gt;
**1.2 PURPOSE AND APPLICABILITY&lt;br /&gt;
**1.3 TARGET AUDIENCE&lt;br /&gt;
**1.4 ORGANIZATION OF THIS SPECIAL PUBLICATION&lt;br /&gt;
*[[Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_2|CHAPTER TWO THE FUNDAMENTALS]] ([[Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_2|Discussion]])&lt;br /&gt;
**2.1 INTEGRATED ENTERPRISE-WIDE RISK MANAGEMENT&lt;br /&gt;
**2.2 SYSTEM DEVELOPMENT LIFE CYCLE&lt;br /&gt;
**2.3 INFORMATION SYSTEM BOUNDARIES&lt;br /&gt;
**2.4 SECURITY CONTROL ALLOCATION&lt;br /&gt;
*[[Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3|CHAPTER THREE THE PROCESS]] ([[Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Chapter_3|Discussion]])&lt;br /&gt;
**3.1 RMF STEP 1 – CATEGORIZE INFORMATION SYSTEM&lt;br /&gt;
**3.2 RMF STEP 2 – SELECT SECURITY CONTROLS&lt;br /&gt;
**3.3 RMF STEP 3 – IMPLEMENT SECURITY CONTROLS&lt;br /&gt;
**3.4 RMF STEP 4 – ASSESS SECURITY CONTROLS&lt;br /&gt;
**3.5 RMF STEP 5 – AUTHORIZE INFORMATION SYSTEM&lt;br /&gt;
**3.6 RMF STEP 6 – MONITOR SECURITY CONTROLS&lt;br /&gt;
*[[Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_A|APPENDIX A REFERENCES]] ([[Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_A|Discussion]])&lt;br /&gt;
*[[Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_B|APPENDIX B GLOSSARY]] ([[Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_B|Discussion]])&lt;br /&gt;
*[[Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_C|APPENDIX C ACRONYMS]] ([[Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_C|Discussion]])&lt;br /&gt;
*[[Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_D|APPENDIX D ROLES AND RESPONSIBILITIES]] ([[Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_D|Discussion]])&lt;br /&gt;
*[[Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_E|APPENDIX E SUMMARY OF RMF TASKS]] ([[Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_E|Discussion]])&lt;br /&gt;
*[[Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_F|APPENDIX F SECURITY AUTHORIZATION]] ([[Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_F|Discussion]])&lt;br /&gt;
*[[Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_G|APPENDIX G CONTINUOUS MONITORING]] ([[Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_G|Discussion]])&lt;br /&gt;
*[[Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_H|APPENDIX H OPERATIONAL SCENARIOS]] ([[Talk:Industry:Project_Review/NIST_SP_800-37r1_FPD_Appendix_H|Discussion]])&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
== Prologue ==&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;quot;...''Through the process of risk management, leaders must consider risk to U.S. interests from adversaries using cyberspace to their advantage and from our own efforts to employ the global nature of cyberspace to achieve objectives in military, intelligence, and business operations''...&amp;quot;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;quot;...''For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated in order to identify important trends and decide where effort should be applied to eliminate or reduce threat capabilities; eliminate or reduce vulnerabilities; and assess, coordinate, and deconflict all cyberspace operations''...&amp;quot;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;quot;...''Leaders at all levels are accountable for ensuring readiness and security to the same degree as in any other domain''...&amp;quot;&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
-- THE NATIONAL STRATEGY FOR CYBERSPACE OPERATIONS&lt;br /&gt;
:OFFICE OF THE CHAIRMAN, JOINT CHIEFS OF STAFF, U.S. DEPARTMENT OF DEFENSE&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Footnotes==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sources ==&lt;br /&gt;
&lt;br /&gt;
* [http://csrc.nist.gov/publications/drafts/800-37-Rev1/SP800-37-rev1-FPD.pdf NIST SP 800-37 Rev. 1 DRAFT Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach]&lt;br /&gt;
&lt;br /&gt;
[[Category:GIC-NISTSP80037r1FPD]]&lt;/div&gt;</summary>
		<author><name>Dan Philpott</name></author>	</entry>

	</feed>