5 Feb 2023

117

FISMA Compliance, NIST and Risk Management Frameworks

Format: APA

Academic level: Master’s

Paper type: Essay (Any Type)

Words: 878

Pages: 3

Downloads: 0

Number of controls 

The brief overview of the compliance process for the federal sector is shown in the visual graphic format shown below: 

The special publication 800-53 gives the guidelines for the selection and specification of the security controls for systems that support the executive agencies of the federal government. The first control required is the SP 800-53-SC requirement honey client which seeks to identify malicious clients and web-based malicious codes (Gikas, 2010). It requires some isolation to ensure that some of the malicious codes that can be discovered in the information system during the search do not affect it. Another control in the compliance requirement is the SP 800-53-IR -4(4) incident handling or the information correlation (Hulitt & Vaughn, 2010). This control can observe the nature of the threat such as hostile attack by bringing together information from different sources. SP 800-IR-5 Incident monitoring is another control required in the compliance. It documents the organization’s information security system by maintaining the report concerning each incident, the status of the incident and other related information (Gikas, 2010). The IR-6 (1) incident reporting control is next control, where it requires the personnel to report suspected security incidents to the organizational incident response capability within the organization-defined time period. The control is used to address both the specific and incident reporting requirements with the organization as well as the formal reporting of incidents for the federal agencies and the subordinate organizations (Hulitt & Vaughn, 2010). The control is viable for reporting security incidences such as receipt of suspicious email communications that contain malicious codes, while it also reflects on the applicable federal laws, executive orders, and other forms of guidance. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Framework to Facilitate Meeting of Compliance Regulations 

The NIST framework is another can be used as a reference in complement to facilitate meeting of compliance regulations (Hulitt & Vaughn, 2010). This voluntary framework consists of the standards, guidelines, and the best practices used in the management of cyber security-related risks. It has a prioritized, flexible, and cost-effective approach that helps in the promotion and the protection of resilience of critical infrastructure and other sectors that may be relevant to the economy and the national security (Gikas, 2010). The framework standards are used by the federal agencies in categorizing information and information systems based in the objectives of provision of appropriate levels of security information according to the levels of risks posed. On the other hand, the guidelines recommend the types of information and information systems that can be included in each of the identified categories. The framework is also comprised of the minimum information security requirements including management, operational, and technical security controls for the information as well as the information systems included in each of the identified categories. The overall framework complements the FISMA framework in managing risks, ensuring confidentiality, availability and integrity of information and information systems. 

Authorization and Accreditation Process of FISMA 

The process of certification and accreditation is the process of implementation of any formal process. This is a systematic procedure of evaluation, description, testing, and authorization systems before and after the system is in operation (Gikas, 2010). The certification and accreditation is a two-step process that aids in the achievement of high levels of security of the information systems (Ross et al., 2005). Certification involves evaluation, testing, and examining of the security controls that would have been pre-determined based on the type of data and the specific type of the information system. The process of certification also involves the identification of the weaknesses and putting in place the mitigation strategies for the identified weaknesses. 

On the other hand, the process of accreditation is carried out by accepting the residual risks associated with the continued operation of a system while granting the approval of operation for a specified period (Gikas, 2010). In IT governance, the process of authorization and accreditation is normally performed on the critical systems to ensure that the process of compliance with security has been technically evaluated. Systems that are accredited are the ones that have their security compliance technically evaluated for optimal performance in a specific environment and configuration. 

Application of Risk Management Framework 

The risk management framework is a viable tool that can help reduce vulnerabilities to the federal information systems through the FISMA process. The framework contains controls for detection and responding to the possible advanced malware. For instance, the FireEye multi-vector virtual execution engine is a mobile solution that detonates suspicious files and web objects within the virtual machines that are built for the purpose of monitoring security at the federal level (Gikas, 2010). The FireEye dectection and response solutions are fully integrated through the underlying technologies. It identifies the possible threats to information while it protects the information system software against sophisticated threats. 

The FISMA controls are also made up of the central management that can provide the users with a single console that is viable in management of configurations, while it helps in correlating activities across the FireEye deployment to lead to the revelation of the multi-stage, multi-vector attack patterns. It also hastens the speed at which the reporting and audit process is carried out. On the other hand, the Incident Response (IR) teams are available on the retainer and have more frontline hours of experience in the detection of threats, while they analyze the threats at high speeds (Gikas, 2010). The teams help in configuring information system components as a proactive way of protecting the federal information systems. FISMA controls also come with the web gateway and data security tools that will essentially ensure that the federal information systems have high levels of detection and reporting or threats to information. 

References 

Gikas, C. (2010). A General Comparison of FISMA, HIPAA, ISO 27000 and PCI-DSS Standards.  Information Security Journal: A Global Perspective 19 (3), 132-141. 

Hulitt, E., & Vaughn, R. B. (2010). Information system security compliance to FISMA standard: a quantitative measure.  Telecommunication Systems 45 (2-3), 139-152. 

Ross, R., Katzke, S., & Toth, P. (2005, October). The new FISMA standards and guidelines changing the dynamic of information security for the federal government. In  Military Communications Conference, 2005. MILCOM 2005. IEEE  (pp. 864-870). IEEE. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). FISMA Compliance, NIST and Risk Management Frameworks.
https://studybounty.com/fisma-compliance-nist-and-risk-management-frameworks-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Evaluation of the Salvation Army’s Budgeting and Cumulative Report

The Salvation Army International is a non-profit organization that conducts charity work in operational countries while preaching the gospel of Jesus Christ. The organization has been existent since the late 19th...

Words: 2195

Pages: 7

Views: 456

How Enterprise Resource Planning Can Help Boost Customer Satisfaction

Enterprise resource planning systems have proven over the years that they have the potential of boosting customer satisfaction. Organizations that have integrated these systems into their daily operations recorded...

Words: 678

Pages: 2

Views: 158

The Challenges Facing Human Resource Management

Human resource management refers to a tactical and comprehensible approach towards the management of a firm's assets and the people who ensure the firm achieves its goals. A meaningful version of HRM incorporates...

Words: 265

Pages: 1

Views: 156

Whistleblower Protection Act

Over the years, whistleblowers have revealed numerous instances of wrongdoing, both on a small scale and a large scale. In spite of the protections set up to protect whistleblowers, there are still significant...

Words: 503

Pages: 2

Views: 151

Social Media and Politics: How They Intersect

Social media usage has gained substantial popularity in political campaigns within the past decade It has influenced the trends of campaign events and ultimate election polls by shaping voters' sentiments....

Words: 635

Pages: 2

Views: 359

Corporate Social Responsibility: What It Is and What It Isn't

The use of Corporate Social Responsibility is a management tool that helps most business companies to integrate their operations by considering the social and environmental demands for the society. It also considers...

Words: 571

Pages: 2

Views: 176

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration