NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Organization, Mission, and Information Systems View 2009 Workshop.

Slides:



Advertisements
Similar presentations
NISTs Role in Securing Health Information AMA-IEEE Medical Technology Conference on Individualized Healthcare Kevin Stine, Information Security Specialist.
Advertisements

Defending the United States in the Digital Age Information Security Transformation for the Federal Government OWASP APPSEC DC 2010 November 11, 2010.
BENEFITS OF SUCCESSFUL IT MODERNIZATION
Nick Vennaro, NHIN Team (Contractor), Office of the National Coordinator for Health IT Michael Torppey, CONNECT Health IT Security Specialist (Contractor)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Health IT Standards Committee Meeting Security Risk Management For Health IT Systems and Networks.
Near Real Time Risk Management Transforming the Certification and Accreditation Process ISSA-Baltimore Chapter Meeting May 28, 2008 Dr. Ron Ross.
National Infrastructure Protection Plan
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
National Institute of Standards and Technology 1 NIST Guidance and Standards on System Level Information Security Management Dr. Alicia Clay Deputy Chief.
Security Controls – What Works
Managing Risks from Information Systems Building Effective Information Security Programs Data Management Association-National Capital Region January.
Information Security Policies and Standards
Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Federal Information Security Management Act Applying NIST Information Security Standards and Guidelines Presented to the State of California April.
Stephen S. Yau CSE , Fall Security Strategies.
Risk Management Framework
National Information Assurance Partnership NIAP 2000 Building More Secure Systems for the New Millenium sm.
NIST SP , Revision 1 Applying Risk Management to Information Systems (Transforming the Certification and Accreditation Process) A Tutorial February.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Dr. Ron Ross Computer Security Division
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 FISMA Next Generation Managing Risk in an Environment of Advanced Persistent Cyber Threats NASA IT Summit.
Complying With The Federal Information Security Act (FISMA)
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Systems Under Attack Managing Enterprise Risk in Today's World of Sophisticated Threats and.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Dr. Ron Ross Computer Security Division Information Technology Laboratory Defending the United States.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Panel: Moderator: Michele Iversen Guest Experts: Dr. Ron Ross, Rod Beckstrom, Bob Wandell.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
NHTSA Cyber Security Best Practices Study Tim Weisenberger December 7, 2011.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Dr. Ron Ross Computer Security Division Information Technology Laboratory Evolving Cybersecurity Strategies.
SEC835 Database and Web application security Information Security Architecture.
Building More Secure Information Systems A Strategy for Effectively Applying the Provisions of FISMA Ron Ross Project Manager FISMA Implementation Project.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Security Standards Promoting Trust, Transparency, and Due Diligence E-Gov Washington Workshop.
1 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Federal Government Perspectives on Secure Information Sharing Technology Leadership Series August 14,
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Building More Secure Information Systems A Strategy for Effectively Applying the Provisions of FISMA Presented to the FISSEA Conference March 23, 2005.
TEL2813/IS2820 Security Management
1 Information System Security Assurance Architecture A Proposed IEEE Standard for Managing Enterprise Risk February 7, 2005 Dr. Ron Ross Computer Security.
NIST Special Publication Revision 1
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Protecting Critical Information Assets and Records FIRM Forum.
National Institute of Standards and Technology 1 The Federal Information Security Management Act Reinforcing the Requirements for Security Awareness Training.
VERSION 1.2 National Institute of Standards and Technology 1 Building More Secure Information Systems A Strategy for Effectively Applying the Provisions.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Managing Risk in New Computing Paradigms Applying FISMA Standards and Guidelines to Cloud Computing Workshop.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
CategorizeSelectImplementAssessAuthorizeMonitor.
NIST HIPAA Security Rule Toolkit Kevin Stine Computer Security Division Information Technology Laboratory National Institute of Standards and Technology.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Risk Management Process Frame = context, strategies Assess = determine.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
The NIST Special Publications for Security Management By: Waylon Coulter.
National Institute of Standards and Technology 1 Information Systems Under Attack Managing Enterprise Risk in Today's World of Sophisticated Threats and.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Computer Security Division Information Technology Laboratory
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Introduction to the Federal Defense Acquisition Regulation
Special Publication Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations Dr. Ron Ross Computer Security.
Federal Information Security Management Act Applying NIST Information Security Standards and Guidelines Presented to the State of California April.
An Urgent National Imperative
Cybersecurity ATD technical
Group Meeting Ming Hong Tsai Date :
Presentation transcript:

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Organization, Mission, and Information Systems View 2009 Workshop on Cyber Security and Global Affairs Oxford University, United Kingdom August 5, 2009 Dr. Ron Ross Computer Security Division Information Technology Laboratory

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 2 The Threat Situation Continuing serious cyber attacks on federal information systems, large and small; targeting key federal operations and assets…  Attacks are organized, disciplined, aggressive, and well resourced; many are extremely sophisticated.  Adversaries are nation states, terrorist groups, criminals, hackers, and individuals or groups with intentions of compromising federal information systems.  Effective deployment of malicious software causing significant exfiltration of sensitive information (including intellectual property) and potential for disruption of critical information systems/services.

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 3 Unconventional Threats to Security Connectivity Complexity

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 4 Asymmetry of Cyber Warfare The weapons of choice are—  Laptop computers, hand-held devices, cell phones.  Sophisticated attack tools and techniques downloadable from the Internet.  World-wide telecommunication networks including telephone networks, radio, and microwave. Resulting in low-cost, highly destructive attack potential.

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 5 What is at Risk?  Federal information systems supporting Defense, Civil, and Intelligence agencies within the federal government.  Private sector information systems supporting U.S. industry and businesses (intellectual capital).  Information systems supporting critical infrastructures within the United States (public and private sector) including:  Energy (electrical, nuclear, gas and oil, dams)  Transportation (air, road, rail, port, waterways)  Public Health Systems / Emergency Services  Information and Telecommunications  Defense Industry  Banking and Finance  Postal and Shipping  Agriculture / Food / Water / Chemical

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 6 Unconventional Wisdom NEW RULE: Boundary protection is no longer sufficient against high-end threats capable of launching sophisticated cyber attacks...  Complexity of IT products and information systems.  Insufficient penetration resistance (trustworthiness) in commercial IT products.  Insufficient application of information system and security engineering practices.  Undisciplined behavior and use of information technology and systems by individuals.

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 7 The Fundamentals Fighting and winning a 21 st century cyber war requires 21 st century strategies, tactics, training, and technologies…  Integration of information security into enterprise architectures and system life cycle processes.  Common, shared information security standards for unified cyber command.  Enterprise-wide, risk-based protection strategies.  Flexible and agile selection / deployment of safeguards and countermeasures (maximum tactical advantage based on missions / environments of operation).  More resilient, penetration-resistant information systems.  Competent, capable cyber warriors.

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 8 Information Security Transformation  Establishing a common approach to risk management.  Converging parallel efforts across U.S. Intelligence Community, Defense Department, and federal civil agencies.  Leveraging partnerships with NIST and the national security community.  Benefiting the federal government and its partners.  Facilitating information sharing and reciprocity.  Achieving process efficiencies.  Improving communication and increasing decision advantage.  Promoting outreach to state and local governments and private sector (including contracting base).

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 9 Transformation Goals  Establish a common approach to risk management.  Define a common set of trust (impact) levels; adopt and apply those levels across the federal government.  Adopt reciprocity as the norm, enabling organizations to accept the approvals by others without retesting or reviewing.  Define, document, and adopt common security controls.  Adopt a common security lexicon—providing a common language and common understanding.

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 10 Transformation Goals  Institute a senior risk executive function, which bases decisions on an “enterprise” view of risk considering all factors, including mission, IT, budget, and security.  Incorporate information security into Enterprise Architectures and deliver security as common enterprise service across the federal government.  Enable a common process that incorporates information security within the “life cycle” processes and eliminate security-specific processes.

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 11 A Unified Framework For Information Security The Generalized Model Common Information Security Requirements Unique Information Security Requirements The “Delta” Foundational Set of Information Security Standards and Guidance Standardized risk management process Standardized security categorization (criticality/sensitivity) Standardized security controls (safeguards/countermeasures) Standardized security assessment procedures Standardized security authorization process Intelligence Community Department of Defense Federal Civil Agencies National security and non national security information systems

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 12 Compliance vs. Risk-based Protection “We should not be consumed with counting the number of dead bolts on the front door when the back door is wide open...” -- Anonymous

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 13 Risk-Based Protection  Enterprise missions and business processes drive security requirements and associated safeguards and countermeasures for organizational information systems.  Highly flexible implementation; recognizing diversity in missions/business processes and operational environments.  Senior leaders take ownership of their security plans including the safeguards/countermeasures for the information systems.  Senior leaders are both responsible and accountable for their information security decisions; understanding, acknowledging, and explicitly accepting resulting mission/business risk.

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 14 Information Security Programs Adversaries attack the weakest link…where is yours? Risk assessment Security planning, policies, procedures Configuration management and control Contingency planning Incident response planning Security awareness and training Security in acquisitions Physical security Personnel security Security assessments Certification and accreditation Access control mechanisms Identification & authentication mechanisms (Biometrics, tokens, passwords) Audit mechanisms Encryption mechanisms Boundary and network protection devices (Firewalls, guards, routers, gateways) Intrusion protection/detection systems Security configuration settings Anti-viral, anti-spyware, anti-spam software Smart cards Links in the Security Chain: Management, Operational, and Technical Controls

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 15 Strategic Initiatives The Long-term View  Build a unified information security framework for the federal government and support contractors.  Integrate information security and privacy requirements into enterprise architectures.  Employ systems and security engineering techniques to develop more secure (penetration-resistant) information systems.

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 16 Tactical Initiatives The Short-term View  Update security controls catalog and baselines.  Delivery vehicle: NIST Special Publication , Revision 3  Develop enterprise-wide risk management guidance.  Delivery vehicle: NIST Special Publication  Restructure the current certification and accreditation process for information systems.  Delivery vehicle: NIST Special Publication , Revision 1  Provide more targeted guidance on risk assessments.  Delivery vehicle: NIST Special Publication , Revision 1

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 17 Risk Management Hierarchy NIST SP LEVEL 3 Information System LEVEL 2 Mission / Business Process LEVEL 1 Organization  Multi-tiered Risk Management Approach  Implemented by the Risk Executive Function  Enterprise Architecture and SDLC Focus  Flexible and Agile Implementation STRATEGIC RISK FOCUS TACTICAL RISK FOCUS

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 18 Risk Management Hierarchy NIST SP Risk Management Strategy LEVEL 3 Information System LEVEL 2 Mission / Business Process LEVEL 1 Organization  Risk Executive Function (Oversight and Governance)  Risk Assessment Methodologies  Risk Mitigation Approaches  Risk Tolerance  Risk Monitoring Approaches  Linkage to ISO/IEC 27001

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 19 Risk Management Hierarchy NIST SP Risk Management Strategy LEVEL 3 Information System LEVEL 2 Mission / Business Process LEVEL 1 Organization  Mission / Business Processes  Information Flows  Information Categorization  Information Protection Strategy  Information Security Requirements  Linkage to Enterprise Architecture

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 20 Risk Management Hierarchy NIST SP LEVEL 3 Information System LEVEL 2 Mission / Business Process LEVEL 1 Organization  Linkage to SDLC  Information System Categorization  Selection of Security Controls  Security Control Allocation and Implementation  Security Control Assessment  Risk Acceptance  Continuous Monitoring Risk Management Framework

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 21 The Central Question From Two Perspectives  Security Capability Perspective What security capability is needed to defend against a specific class of cyber threat, avoid adverse impacts, and achieve mission success? (REQUIREMENTS DEFINITION)  Threat Capability Perspective Given a certain level of security capability, what class of cyber threat can be addressed and is that capability sufficient to avoid adverse impacts and achieve mission success? (GAP ANALYSIS)

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 22 Risk Management Framework Security Life Cycle SP Determine security control effectiveness (i.e., controls implemented correctly, operating as intended, meeting security requirements for information system). SP A ASSESS Security Controls Define criticality/sensitivity of information system according to potential worst-case, adverse impact to mission/business. FIPS 199 / SP CATEGORIZE Information System Starting Point Continuously track changes to the information system that may affect security controls and reassess control effectiveness. SP / SP A MONITOR Security State SP AUTHORIZE Information System Determine risk to organizational operations and assets, individuals, other organizations, and the Nation; if acceptable, authorize operation. Implement security controls within enterprise architecture using sound systems engineering practices; apply security configuration settings. IMPLEMENT Security Controls SP FIPS 200 / SP SELECT Security Controls Select baseline security controls; apply tailoring guidance and supplement controls as needed based on risk assessment.

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 23 RMF Characteristics  The NIST Risk Management Framework and the associated security standards and guidance documents provide a process that is:  Disciplined  Flexible  Extensible  Repeatable  Organized  Structured “Building information security into the infrastructure of the organization… so that critical enterprise missions and business cases will be protected.”

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 24 Security Control Selection  STEP 1: Select Baseline Security Controls (NECESSARY TO COUNTER THREATS)  STEP 2: Tailor Baseline Security Controls (NECESSARY TO COUNTER THREATS)  STEP 3: Supplement Tailored Baseline (SUFFICIENT TO COUNTER THREATS) CATEGORIZE Information/System ASSESS Security Controls AUTHORIZE Information System IMPLEMENT Security Controls MONITOR Security Controls SELECT Security Controls Risk Management Framework

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 25 Cyber Preparedness THREAT LEVEL 5 CYBER PREP LEVEL 5 THREAT LEVEL 4CYBER PREP LEVEL 4 THREAT LEVEL 3CYBER PREP LEVEL 3 THREAT LEVEL 2 CYBER PREP LEVEL 2 THREAT LEVEL 1 CYBER PREP LEVEL 1 Adversary Capabilities and Intentions Defender Security Capability HIGH LOW HIGH LOW An increasingly sophisticated and motivated threat requires increasing preparedness…

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 26 Dual Protection Strategies  Boundary Protection Primary Consideration: Penetration Resistance Adversary Location: Outside the Defensive Perimeter Objective: Repelling the Attack  Agile Defense Primary Consideration: Information System Resilience Adversary Location: Inside the Defensive Perimeter Objective: Operating while under Attack

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 27 Agile Defense  Boundary protection is a necessary but not sufficient condition for Agile Defense  Examples of Agile Defense measures:  Compartmentalization and segregation of critical assets  Targeted allocation of security controls  Virtualization and obfuscation techniques  Encryption of data at rest  Limiting of privileges  Routine reconstitution to known secure state Bottom Line: Limit damage of hostile attack while operating in a (potentially) degraded mode…

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 28 RISK EXECUTIVE FUNCTION Enterprise-wide Oversight, Monitoring, and Risk Management Strategy INFORMATION SYSTEM INFORMATION SYSTEM Common Controls (Inherited by Information Systems) INFORMATION SYSTEM INFORMATION SYSTEM RMF RISK MANAGEMENT FRAMEWORK POAM SAR SP Authorization Decision POAM SAR SP POAM SAR SP Authorization Decision POAM SAR SP Authorization Decision POAM SAR SP Authorization Decision POAM SAR SP Authorization Decision Architecture Description Architecture Reference Models Segment and Solution Architectures Mission and Business Processes Information System Boundaries Organizational Inputs Laws, Directives, Policy Guidance Strategic Goals and Objectives Priorities and Resource Availability Supply Chain Considerations SP: Security Plan SAR: Security Assessment Report POAM: Plan of Action and Milestones

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 29 Risk Executive Function  Establish organizational information security priorities.  Allocate information security resources across the organization.  Provide oversight of information system security categorizations.  Identify and assign responsibility for common security controls.  Provide guidance on security control selection (tailoring and supplementation).  Define common security control inheritance relationships for information systems.  Establish and apply mandatory security configuration settings.  Identify and correct systemic weaknesses and deficiencies in information systems. Managing Risk at the Organizational Level RISK EXECUTIVE FUNCTION Coordinated policy, risk, and security-related activities Supporting organizational missions and business processes Information system-specific considerations Information System Mission / Business Processes

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 30 Trust and Reciprocity Determining risk to the organization’s operations and assets, individuals, other organizations, and the Nation; and the acceptability of such risk. The objective is to achieve transparency of prospective partner’s information security programs and processes…establishing trust relationships based on common, shared risk management principles. Organization One INFORMATION SYSTEM Plan of Action and Milestones Security Assessment Report Security Plan Mission / Business Information Flow Risk Management Information Plan of Action and Milestones Security Assessment Report Security Plan Organization Two INFORMATION SYSTEM Determining risk to the organization’s operations and assets, individuals, other organizations, and the Nation; and the acceptability of such risk.

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 31 Key Risk Management Publication  NIST Special Publication , Revision 3 Recommended Security Controls for Federal Information Systems and Organizations Published: August 2009  Updating all material from NIST Special Publication , Revision 2  Incorporating security controls from the national security community  Incorporating new security controls for advanced cyber threats  Incorporating information security program-level controls  Incorporating threat appendix for cyber preparedness (Separately vetted and added to SP , Revision 3 when completed) NIST SP

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 32 Key Risk Management Publication  NIST Special Publication , Revision 1 Guide for Applying the Risk Management Framework to Federal Information Systems Projected: October 2009  Incorporating comments from Initial Public Draft  Implementing guideline for Risk Management Framework  Transforming previous certification and accreditation process  Integrating Risk Management Framework into the SDLC  Greater emphasis on ongoing monitoring of information system security  Ongoing security authorizations informed by risk executive function  Greater accountability and assurances for common (inherited) controls  Increased use of automated support tools NIST SP

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 33 Key Risk Management Publication  NIST Special Publication Integrated Enterprise-wide Risk Management Organization, Mission, and Information Systems View Projected: December 2009  Incorporating public comments from NIST Special Publication , Second Public Draft  Incorporating three-tiered risk management approach: organization, mission/business process, and information system views  Incorporating cyber preparedness information  Providing ISO/IEC mapping to risk management publications NIST SP

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 34 Key Risk Management Publication  NIST Special Publication A, Revision 1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations Projected: January 2010  Updating all assessment procedures to ensure consistency with NIST Special Publication , Revision 3  Developing new assessment procedures for information security program management controls  Updating web-based assessment cases for inventory of assessment procedures NIST SP A

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 35 Key Risk Management Publication  NIST Special Publication , Revision 1 (Initial Public Draft) Guide for Conducting Risk Assessments Projected: January 2010  Down scoping current publication from risk management focus to risk assessment focus  Providing guidance for conducting risk assessments at each step in the Risk Management Framework  Incorporating threat information for cyber preparedness NIST SP

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 36 Transformation… Getting There Current State  Lack of reciprocity in authorization and assessment results  Resource intensive  Redundant and duplicative activities  Inconsistent policy and process implementation  Lack of automation (for both workflow and testing tools)  Lack of standardized documentation and artifacts to facilitate informed decisions  Three-year “Paperwork Drill” The Future  Enabled reciprocity and information sharing  Improve security postures (architecture and information)  Streamline processes and improve end-product quality  Uniform set of policies and practices  Consistent implementation and use of automated tools  More effective resource allocation; reduce costs  Continuous monitoring

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 37 Contact Information 100 Bureau Drive Mailstop 8930 Gaithersburg, MD USA Project LeaderAdministrative Support Dr. Ron RossPeggy Himes (301) (301) Senior Information Security Researchers and Technical Support Marianne Swanson Dr. Stu Katzke (301) (301) Pat TothArnold Johnson (301) (301) Matt SchollKelley Dempsey (301) (301) Web: csrc.nist.gov/sec-cert Comments: