Cover image for Building and implementing a security certification and accreditation program : official (ISC) guide to the CAP CBK
Title:
Building and implementing a security certification and accreditation program : official (ISC) guide to the CAP CBK
Personal Author:
Publication Information:
Boca Raton, FL : Auerbach Publications, 2006
ISBN:
9780849320620

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010132711 QA76.3 H68 2006 Open Access Book Book
Searching...

On Order

Summary

Summary

Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2Guide to the CAP CBK demonstrates the practicality and effectiveness of certification and accreditation (C&A) as a risk management methodology for IT systems in both public and private organizations. It provides security professionals with an overview of C&A components, enabling them to document the status of the security controls of their IT systems, and learn how to secure systems via standard, repeatable processes.

This book consists of four main sections. It begins with a description of what it takes to build a certification and accreditation program at the organization level, followed by an analysis of various C&A processes and how they interrelate. The text then provides a case study of the successful implementation of certification and accreditation in a major U.S. government department. It concludes by offering a collection of helpful samples in the appendices.


Table of Contents

Forewordp. xv
Prefacep. xvii
Acknowledgmentsp. xix
Introductionp. xxi
The Authorp. xxix
Section I Building a Successful Enterprise Certification and Accreditation Program
1 Key Elements of an Enterprise Certification and Accreditation Programp. 3
The Certification and Accreditation Business Casep. 3
Certification and Accreditation Goal Settingp. 4
Establishing Program Tasks and Milestonesp. 6
Overseeing Program Executionp. 6
Maintaining Program Visibilityp. 7
Resourcesp. 9
Developing Guidancep. 9
Program Integrationp. 12
Establishing Certification and Accreditation Points of Contactp. 14
Measuring Progressp. 14
Tracking Program Activitiesp. 16
Tracking Compliancep. 17
Providing Advice and Assistancep. 18
Responding to Changesp. 20
Program Awareness, Training, and Educationp. 21
Use of Expert Systemsp. 21
Waivers and Exceptions to Policyp. 23
Summaryp. 24
2 Certification and Accreditation Roles and Responsibilitiesp. 25
Primary Roles and Responsibilitiesp. 25
Other Roles and Responsibilitiesp. 27
Documenting Roles and Responsibilitiesp. 29
Job Descriptionsp. 30
Position Sensitivity Designationsp. 30
Personnel Transitionp. 30
Time Requirementsp. 33
Expertise Requiredp. 33
Using Contractorsp. 34
Routine Dutiesp. 35
Organizational Skillsp. 36
Organizational Placement of the Certification and Accreditation Functionp. 37
Summaryp. 37
3 The Certification and Accreditation Life Cyclep. 41
Initiation Phasep. 44
Acquisition/Development Phasep. 44
Implementation Phasep. 45
Operations/Maintenance Phasep. 45
Disposition Phasep. 46
Challenges to Implementationp. 48
Summaryp. 50
4 Why Certification and Accreditation Programs Failp. 51
Problems in Program Scopep. 51
Assessment Focusp. 52
Short-Term Thinkingp. 52
Long-Term Thinkingp. 52
Poor Planningp. 53
Lack of Responsibilityp. 54
Too Much Paperworkp. 54
Lack of Enforcementp. 54
Lack of Foresightp. 55
Poor Timingp. 55
Lack of Supportp. 56
Summaryp. 56
Section II Certification and Accreditation Processes
5 Certification and Accreditation Project Planningp. 61
Planning Factorsp. 61
Dealing with Peoplep. 62
Team Member Selectionp. 63
Scope Definitionp. 64
Assumptionsp. 65
Risksp. 65
Project Agreementsp. 66
Project Team Guidelinesp. 66
Administrative Requirementsp. 67
Reportingp. 68
Other Tasksp. 71
Project Kickoffp. 72
Wrap-Upp. 72
Summaryp. 73
6 System Inventory Processp. 75
Responsibilityp. 77
System Identificationp. 78
Small Systemsp. 79
Large Systemsp. 79
Combining Systemsp. 80
Accreditation Boundariesp. 80
The Processp. 82
Validationp. 82
Inventory Informationp. 83
Inventory Toolsp. 83
Using the Inventoryp. 84
Maintenancep. 86
Summaryp. 88
7 Assessing Data Sensitivity and Criticalityp. 91
Defining Sensitivityp. 91
Data Sensitivity and System Sensitivityp. 93
Sensitivity Assessment Processp. 93
Data Classification Approachesp. 95
Responsibility for Data Sensitivity Assessmentp. 96
Ranking Data Sensitivityp. 96
Criticalityp. 97
Criticality Assessmentp. 99
Criticality in the View of the System Ownerp. 102
Ranking Criticalityp. 102
Changes in Criticality and Sensitivityp. 103
Summaryp. 104
8 System Security Plansp. 105
Applicabilityp. 105
Responsibilityp. 106
Plan Contentsp. 106
What a Security Plan Is Notp. 110
Plan Initiationp. 111
Information Sourcesp. 112
Security Plan Development Toolsp. 112
Plan Formatp. 114
Plan Approvalp. 114
Plan Maintenancep. 114
Plan Securityp. 116
Plan Metricsp. 117
Resistance to Security Plansp. 117
Summaryp. 118
9 Coordinating Security for Interconnected Systemsp. 119
The Solutionp. 119
Agreements in the Certification and Accreditation Processp. 120
Trust Relationshipsp. 121
Initiationp. 121
Time Issuesp. 122
Exceptionsp. 124
Maintaining Agreementsp. 124
Summaryp. 125
10 Minimum Security Baselines and Best Practicesp. 127
Levels of Controlsp. 128
Selecting Baseline Controlsp. 128
Use of the Minimum Security Baseline Setp. 132
Summaryp. 133
11 Assessing Riskp. 135
Backgroundp. 135
Risk Assessment in Certification and Accreditationp. 137
Risk Assessment Processp. 138
Asset Identificationp. 138
Threat Identificationp. 138
Vulnerability Assessmentp. 139
Risk Calculationp. 142
Safeguard Identificationp. 144
Risk Assessment Executionp. 144
Risk Categorizationp. 147
Documenting Risk Assessment Resultsp. 147
Summaryp. 148
12 Security Proceduresp. 149
Purposep. 149
The Problem with Proceduresp. 150
Responsibilityp. 150
Procedure Templatesp. 151
The Procedure Development Processp. 151
Stylep. 151
Formattingp. 154
Accessp. 155
Maintenancep. 155
Common Proceduresp. 155
Procedures in the Certification and Accreditation Processp. 156
Summaryp. 156
13 Certification Testingp. 159
Scopep. 159
Level of Effortp. 160
Independencep. 160
Developing the Test Planp. 163
The Role of the Hostp. 170
Test Executionp. 171
Documenting Test Resultsp. 173
Summaryp. 174
14 Remediation Planningp. 175
Applicability of the Remediation Planp. 176
Responsibility for the Planp. 176
Risk Remediation Plan Scopep. 177
Plan Formatp. 177
Using the Planp. 182
When to Create the Planp. 183
Risk Mitigation Meetingsp. 185
Summaryp. 186
15 Essential Certification and Accreditation Documentationp. 187
Authorityp. 190
Certification Package Contentsp. 190
Excluded Documentationp. 191
The Certification Statementp. 192
Transmittal Letterp. 192
Administrationp. 193
Summaryp. 193
16 Documenting the Accreditation Decisionp. 195
The Accrediting Authorityp. 196
Timingp. 196
The Accreditation Letterp. 196
Conditional and Interim Accreditationp. 198
Designation of Approving Authoritiesp. 198
Approving Authority Qualificationsp. 200
Accreditation Decision Processp. 200
Actions Following Accreditationp. 202
Summaryp. 203
Section III Certification and Accreditation Case Study
Situationp. 205
Action Planp. 206
Lessons Learnedp. 207
Toolsp. 211
Document Templatesp. 213
Coordinationp. 215
Role of the Inspector Generalp. 215
Compliance Monitoringp. 216
Measuring Successp. 216
Project Milestonesp. 217
Interim Accreditationp. 217
Management Support and Focusp. 218
Results and Future Challengesp. 218
Summaryp. 219
Section IV The Future of Certification and Accreditation
Section V Appendices
Appendix A Certification and Accreditation Referencesp. 227
Appendix B Glossaryp. 229
Appendix C Sample Statement of Workp. 239
Appendix D Sample Project Work Planp. 247
Appendix E Sample Project Kickoff Presentation Outlinep. 249
Appendix F Sample Project Wrap-Up Presentation Outlinep. 255
Appendix G Sample System Inventory Policyp. 259
Appendix H Sample Business Impact Assessmentp. 261
Appendix I Sample Rules of Behavior (General Support System)p. 265
Appendix J Sample Rules of Behavior (Major Application)p. 267
Appendix K Sample System Security Plan Outlinep. 269
Appendix L Sample Memorandum of Understandingp. 271
Appendix M Sample Interconnection Security Agreementp. 275
Appendix N Sample Risk Assessment Outlinep. 279
Appendix O Sample Security Procedurep. 281
Appendix P Sample Certification Test Results Matrixp. 285
Appendix Q Sample Risk Remediation Planp. 289
Appendix R Sample Certification Statementp. 293
Appendix S Sample Accreditation Letterp. 297
Appendix T Sample Interim Accreditation Letterp. 299
Section VI Index
Indexp. 303