RMF Step 1: Categorize
In the step
What does DoD IT entail?
All DoD-owned IT or DoD-controlled IT that receives; processes; stores; displays; or transmits DoD information
What IT regs for SAP?
JSIG
What is Reciprocity?
What groups does DoD use to categorize IT?
Information Systems
Platform IT
IT products
IT services
RMF Step 2: Select Security Controls
In this step
What are common controls?
Controls inherited from the hosting environment (physical, personnel) that are typically controlled by personnel outside of the cyber team. Example: Ensuring the facility the network is housed in has emergency lighting and exits.
RMF Step 3: Implement Controls
In this step
RMF Step 4: Assess Controls
In this step
RMF Step 5: Authorize System
In this step
Security Assessment Report (SAR)
Provides authorizing officials with the information needed for understanding the current security state of the organization’s information systems and supporting infrastructure and the current risk posture of the system and therefor the organization
RMF Step 6: Monitor Controls
In this step
What is the objective of Continuous Monitoring?
To determine if the security controls in the information system continue to be effective over time in light of the inevitable changes to hardware, software and firmware that occur in the system, as well as changes in the environment in which the system operates
Email Phishing Indicators Indicators
Examples of types of information adversaries target
Targeted Technology and Information Threats
Insiders Hackers Cyber Criminals Terrorists Organized Crime Foreign Intelligence Entities
Most Targeted Technologies
What is malicious code?
Software that does damage and/or creates unwanted behaviors
Examples of malicious code
Viruses Trojan horses Worms Keyloggers Spyware Rootkits Backdoors
Examples of vessels of malicious code
E-mail attachments
Removable media
Downloaded files
Infected websites
Counters against malicious code in emails
Counters against malicious code in websites
Best philosophy for creating passwords?
- Combination of numbers, letters and special characters
Indicators of weak passwords