Cybersecurity Framework Implementation
Cybersecurity Framework Implementation
13
35
36
37
38 U.S. Department of Commerce
39 Wilbur L. Ross, Jr., Secretary
40
41 National Institute of Standards and Technology
42 Kent Rochford, Acting NIST Director and Under Secretary of Commerce for Standards and Technology
43 National Institute of Standards and Technology Interagency Report 8170
44 41 pages (May 2017)
45
46
47 Certain commercial entities, equipment, or materials may be identified in this document in order to describe an
48 experimental procedure or concept adequately. Such identification is not intended to imply recommendation or
49 endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best
50 available for the purpose.
51 There may be references in this publication to other publications currently under development by NIST in
52 accordance with its assigned statutory responsibilities. The information in this publication, including concepts and
53 methodologies, may be used by federal agencies even before the completion of such companion publications. Thus,
54 until each publication is completed, current requirements, guidelines, and procedures, where they exist, remain
55 operative. For planning and transition purposes, federal agencies may wish to closely follow the development of
56 these new publications by NIST.
57 Organizations are encouraged to review all draft publications during public comment periods and provide feedback
58 to NIST. Many NIST cybersecurity publications, other than the ones noted above, are available at
59 http://csrc.nist.gov/publications.
60
61 Public comment period: May 12, 2017 through June 30, 2017
62 National Institute of Standards and Technology
63 Attn: Applied Cybersecurity Division, Information Technology Laboratory
64 100 Bureau Drive (Mail Stop 2000) Gaithersburg, MD 20899-2000
65 Email: [email protected]
66
67 All comments are subject to release under the Freedom of Information Act (FOIA).
68
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
78 Acknowledgments
79 The authors would like to thank our advisors and reviewers including Donna Dodson, Adam
80 Sedgewick, Matt Scholl, Kevin Stine, Kelley Dempsey, Ron Ross, Steve Quinn, Jim Foti, Mat
81 Heyman, and Matt Smith.
82 Abstract
83 This publication assists federal agencies in strengthening their cybersecurity risk management by
84 helping them to determine an appropriate implementation of the Framework for Improving
85 Critical Infrastructure Cybersecurity (known as the Cybersecurity Framework). Federal agencies
86 can use the Cybersecurity Framework to complement the existing suite of NIST security and
87 privacy risk management standards, guidelines, and practices developed in response to the
88 Federal Information Security Management Act, as amended (FISMA). The relationship between
89 the Cybersecurity Framework and the National Institute of Standards and Technology (NIST)
90 Risk Management Framework are discussed in eight use cases.
91 Keywords
92 Cybersecurity Framework; Federal Information Security Management Act (FISMA); Risk
93 Management Framework (RMF); security and privacy controls
94 Supplemental Content
95 For additional information on NISTs cybersecurity programs, projects and publications, visit the
96 Computer Security Resource Center, csrc.nist.gov. Information on other efforts at NIST and in
97 the Information Technology Laboratory (ITL) is available at www.nist.gov and www.nist.gov/itl.
98
99
ii
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
1 Such as use of the Industry Resources located at the Cybersecurity Framework Web site:
https://www.nist.gov/cyberframework/industry-resources
2 The suite of NIST security and privacy risk management publications include: Federal Information Processing Standards (FIPS)
Publication 199, FIPS Publication 200, Special Publication (SP) 800-53, SP 800-37, SP 800-137, SP 800-39, and SP 800-30.
3 The Federal Information Security Management Act of 2002 was updated through the Federal Information Security
Modernization Act of 2014.
4 The Framework for Improving Critical Infrastructure Cybersecurity is found at: https://www.nist.gov/cyberframework
iii
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
132 The term Tiers cited in NIST Special Publication 800-39, Managing Information Security
133 Risk: Organization, Mission, and Information System View, will be referred to as Levels in this
134 report to avoid confusion with Cybersecurity Framework Implementation Tiers.
135 The six steps of the Risk Management Framework described in NIST Special Publication 800-
136 37, Guide for Applying the Risk Management Framework to Federal Information Systems: A
137 Security Life Cycle Approach Categorize, Select, Implement, Assess, Authorize, and Monitor
138 are indicated using capital letters. This includes all conjugations (e.g., Authorize, Authorizing,
139 and Authorized all refer to step five of the RMF).
140 The five Functions of the Cybersecurity Framework Identify, Protect, Detect, Respond, and
141 Recover are indicated using capital letters. This includes all conjugations (e.g., Detect,
142 Detected, and Detecting all refer to the Detect Function of Cybersecurity Framework).
143 The terms enterprise risk management and organization-wide risk management are used
144 interchangeably.
145
iv
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
v
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
189 cybersecurity-related responsibilities, NIST will use federal agency feedback to inform and
190 prioritize accelerated updates of those documents.
vi
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
vii
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
221 1 Introduction
222 As part of its statutory responsibilities under the Federal Information Security Management Act
223 as amended (FISMA), NIST develops standards and guidelines including minimum
224 requirements to provide adequate information security for all agency operations and assets.
225 Fulfilling the requirements of FISMA and OMB Circular A-130 5, these documents include
226 Federal Information Processing Standards (FIPS), Special Publications (SPs), and NIST
227 Interagency Reports (NISTIRs), which are used by agencies to develop, implement, and maintain
228 cybersecurity and privacy programs
229 The Cybersecurity Enhancement Act of 2014 formally updated NISTs role to include
230 identifying and developing cybersecurity risk frameworks for voluntary use by critical
231 infrastructure (CI) owners and operators. That statutes assignments included work NIST had
232 begun in February 2013 as a result of Executive Order (EO) 13636, Improving Critical
233 Infrastructure Cybersecurity. 6 The EO tasked the Department of Commerce to lead the
234 development of a framework to reduce CI cybersecurity risks. NIST convened industry,
235 academia, and government to develop a voluntary Framework for Improving Critical
236 Infrastructure Cybersecurity (known as the Cybersecurity Framework) that consists of standards,
237 methodologies, procedures, and processes that align policy, business, and technological
238 approaches to address cybersecurity risks. It offers a high-level vocabulary for cybersecurity risk
239 management, a taxonomy of cybersecurity outcomes, and a methodology to assess and manage
240 those outcomes.
241 The increasing frequency, creativity, and variety of cyber attacks means that a greater emphasis
242 must be placed by all organizations on managing cybersecurity risk as a part of their enterprise
243 risk management programs to fulfill their mission and business objectives. By seamlessly
244 integrating the Cybersecurity Framework and key NIST cybersecurity risk management
245 standards and guidelines already in wide use at various organizational levels, agencies can
246 develop, implement, and continuously improve agency-wide cybersecurity risk management
247 processes that inform strategic, operational, and other enterprise risk decisions. 7
249 This document is intended for those who are responsible for overseeing, leading, and managing
250 information systems within their agencies. That includes senior executives and line managers
251 and staff and every level in between. It is especially relevant for personnel who develop,
5 https://www.federalregister.gov/documents/2016/07/28/2016-17872/revision-of-omb-circular-no-a-130-managing-information-
as-a-strategic-resource
6 https://www.federalregister.gov/documents/2013/02/19/2013-03915/improving-critical-infrastructure-cybersecurity
7
While this report is intended to help federal agencies to incorporate key Cybersecurity Framework elements into their
programs, publication of this document will not affect the Cybersecurity Frameworks primary focus on private sector critical
infrastructure owners and operators.
8
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
252 implement, report, and improve enterprise and cybersecurity risk management processes within
253 their organizations. While the focus is on federal users, NIST expects that many public and
254 private sector organizations that choose to use the NIST cybersecurity risk management suite of
255 standards and guidelines will benefit from this document, including the use cases that are
256 presented.
9
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
269 2 Guidance
270 Using eight common government cybersecurity needs, this section provides guidance that can
271 assist federal agencies as they develop, implement, and continuously improve their cybersecurity
272 risk management programs. It is consistent with OMBs policy guidance to federal agencies
273 contained in OMB Circular A-130, Managing Information as a Strategic Resource. That circular
274 provides guidance regarding the Risk Management Framework (described in NIST SP 800-37),
275 associated documents, and the Cybersecurity Framework.
284 NIST will work with federal agencies to assess the relative value of these eight proposed uses,
285 identify additional uses, and understand how to better illustrate applications of the Cybersecurity
286 Framework. The feedback received will guide and inform NIST as it incorporates Cybersecurity
287 Framework concepts into its various cybersecurity risk management publications. These uses
288 illustrate how agencies can leverage both the Cybersecurity Framework and the NIST Risk
289 Management Framework to:
290 Measure and improve cybersecurity performance at various organizational levels;
291 Organize communication about cybersecurity risk, activities, and results across the
292 organization-wide risk management program; and
293 Align and prioritize cybersecurity requirements for use in the acquisition process and to
294 inform the tailoring of controls.
295 Figure 1 depicts federal cybersecurity risk management needs (middle column) superimposed on
296 the three-level pyramid found in one of the primary NIST cybersecurity documents used by
297 federal agencies Managing Information Security Risk: Organization, Mission, and Information
298 System View (SP 800-39). Most of the uses addressed in this publication fit in the
299 Mission/Business Processes (Level 2). One use is offered that illustrates the Organization
300 function (Level 1) and another addresses the System (Level 3). In the right column, Figure 1
301 also depicts the most applicable Cybersecurity Framework component Core, Profile(s), or
302 Implementation Tiers for a given federal use.
10
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
303
304 Figure 1: Federal Cybersecurity Uses
305 Federal agencies may determine additional ways the integrated federal approach can or should
306 enhance their cybersecurity risk management programs. NIST intends to develop additional
307 examples of uses based in part on feedback from federal agencies.
11
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
324 finance and physical security may choose to integrate their unique processes and terminologies
325 into the Frameworks Functions to facilitate communication.
326 For example, CISOs and other cybersecurity professionals in federal agencies can use these five
327 Functions as a way to engage, organize and explain their cybersecurity approaches to agency
328 external stakeholders, executive leadership, and employees and to integrate cybersecurity
329 concepts into other organizational areas. The Functions provide an understandable and intuitive
330 language for CISOs to gather risk tolerance perspectives from their peers and leadership team.
331 The Functions are also a simple way to organize and express a risk strategy to address those risk
332 tolerances. This helps CISOs to collaborate with stakeholders from various parts of the
333 organization (e.g. human resources, finance, legal, acquisition) in identifying common priorities
334 and assets and the risk-based strategies to address those common priorities. When representatives
335 across an organization are engaged and instrumental in identifying and prioritizing
336 organizational assets and determining risk management strategies, the results are more likely to
337 achieve the desired outcomes.
8
Source: OMB A-130
12
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
345 Agencies can integrate requirements by aligning and de-conflicting using the structure of the
346 Core. For instance, a federal agency may need to abide by FISMA, the Health Insurance
347 Portability and Accountability Act (HIPAA) Security Rule, the Payment Card Industry Data
348 Security Standard, as well as their own cybersecurity policy, all while accomplishing a mission
349 objective. Applicable excerpts of these laws, guidelines, policy, and objectives can be aligned
350 with the various Functions, Categories, and Subcategores of the Core. By reconciling
351 cybersecurity requirements in this manner, a federal agency can determine where requirements
352 overlap and/or conflict, and consider alternative approaches, perhaps including modification of
353 cybersecurity requirements in that agencys control, to address those requirements. In turn, this
354 offers the agency the opportunity to improve its efficiency as well as its effectiveness.
355 By integrating requirements into the Core, agencies stage efficient prioritization. For instance, it
356 may be apparent that certain Subcategory outcomes are meaningful for multiple requirements. It
357 may also be clear that a short list of Subcategories are essential for successful achievement of
358 mission objectives. Priorities can be captured in the structure of the Core and used as inputs to
359 drive cybersecurity investments, effort, and focus.
360 The work product of cybersecurity requirements management using Cybersecurity Framework is
361 referred to as a Profile. See Appendix A for additional description and uses of Cybersecurity
362 Framework Profiles.
13
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
365 Federal agencies and contractors must adhere to both common and unique cybersecurity and
366 acquisition requirements 9. In the acquisition process, this often causes a misunderstanding of
367 expectations between federal agencies and offerors and may limit government access to the best
368 products and services, while increasing costs to offerors, agencies, and taxpayers.
369 The Cybersecurity Framework can be used to translate among a variety of risk management
370 practices and support federal agencies as they interact with a wide variety of suppliers. These
371 include service providers, product vendors, systems integrators, organizations within a regulated
372 sector, and other private sector partners.
373 For example, an agency could use the Cybersecurity Framework during market research by
374 asking respondents to a Request For Information or Sources Sought Notice to include their
375 Cybersecurity Framework Profile or to express the cybersecurity capabilities of their product in
376 responses. This information would help the agency to better compare and contrast the
377 cybersecurity capabilities of organizations, products and services of respondents.
378 By using Profiles, the Cybersecurity Framework can be incorporated into the acquisition process
379 as the underpinning of: evaluation criteria (agency), solicitation response (supplier),
380 proposal/quote review (agency), minimum contract requirements (agency), contract compliance
381 evidence (supplier), and contract compliance verification (agency). The use of Profiles allows
382 suppliers the flexibility to select from among various standards and practices to meet federal
383 agency specific requirements, while communicating their cybersecurity posture in a consistent
384 way. It also provides agencies a means to consistently and objectively assess the cybersecurity
385 posture of potential partners.
9 Compare, e.g., FAR 52.204-21, Basic Safeguarding of Covered Contractor Information Systems (common), with DFARS
252.204-7012 Safeguarding Covered Defense Information and Cyber Incident Reporting (unique), and OMB Circular No.
A-130, Managing Information as a Strategic Resource (common), with DoD Instruction 8500.01, Cybersecurity (unique).
14
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
10 High Value Asset as first referenced in OMB Memorandum M-16-04 and defined in M-17-09
15
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
Typical Participants: Head of Agency (Chief Executive Officer), Agency Deputy (Chief Operating
Officer) Risk Executive, Chief Information Officer, Senior Information Security Officer/Chief
Information Security Officer (CISO), stakeholders representing other risk management disciplines
(e.g., Finance, Human Resources, Acquisition)
Primary NIST Documents: NIST Special Publication 800-39, Cybersecurity Framework
16
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
448 the identification of common controls to secure assets and business processes across business
449 units. It also can yield significant cost savings.
17
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
470 weaknesses or deficiencies across the enterprise can provide a comprehensive understanding of
471 vulnerabilities and planned mitigations. This information can be viewed at the Subcategory,
472 Category, or Function level to provide agencies additional context before making risk decisions
473 and associated resource investments.
474 Further, aggregating essential information from SARs, POA&Ms, and SSPs enables security
475 Authorization decisions through continuous monitoring. Security control assessments,
476 remediation actions, and key updates to the SARs, POA&Ms and SSPs for the system-at-hand
477 can be considered in the context of the organizations aggregate risk. The risk register is also
478 curated using the on-going risk changes tracked through Risk Management Framework (RMF)
479 Monitor activities. The risk register is a tool that helps the AO understand if accepting the system
480 risk will drive overall risk beyond organizational tolerance. Organizing the risk register
481 according to the language of the Core also enables a larger group of people to participate in and
482 inform the Authorization decision. In particular, the understandable language of Functions and
483 Categories of the Core enables non-cybersecurity experts to participate.
18
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
494 Additionally, the timeliness of reports is critical for two reasons. First, reporting needs to match
495 the timeline expectations of the receiving parties. Second, reports often need to represent current
496 state, so the time between risk measurement and report delivery needs to be minimized.
497 Today, risk reporting within federal organizations is performed using a variety of technologies
498 and reporting formats due to different sources requesting information for different purposes and
499 with a high degree of variability in reporting timelines. In recent years, the Office of
500 Management and Budget has requested annual FISMA metrics organized using the structure of
501 the Cybersecurity Frameworks Core. With an increasing number of federal organizations,
502 partners, and suppliers using the Cybersecurity Framework, it is more efficient to use the
503 Frameworks approach to meet these multiple reporting needs.
504 Structuring a risk register according to the hierarchy of cybersecurity outcomes in the Core
505 allows organizations to generate reports at varying levels of detail. Specifically, relating the
506 hierarchy of five Functions, Categories, and Subcategories to SP 800-53 controls allows
507 maximum flexibility in the level of detail of a given report, and can make those reports more
508 useful to varied audiences. That level of detail can be achieved quickly using the Core,
509 minimizing time and resources invested in generating the report.
19
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
518 other organizational considerations. This process is used to customize the controls baseline for
519 each system.
520 The Cybersecurity Framework offers a mechanism for reconciling mission objectives and
521 cybersecurity requirements into Profiles, making them an important work product using a top-
522 down approach to inform the tailoring. In developing a Profile, organizations can align and de-
523 conflict all mission objectives and cybersecurity requirements into a singular structure according
524 to the taxonomy of the Core. That allows organizations to easily prioritize the cybersecurity
525 outcomes of the Subcategories. Since Profiles can be a reconciliation of cybersecurity
526 requirements and associated priorities from many sources, Profiles can be used as a concise and
527 important artifact for consideration when tailoring SP 800-53 initial control baselines to final
528 control baselines. Specifically, considering organizational Subcategory priorities and knowing
529 the associated SP 800-53 controls may lead to precise adjustments to the initial controls baseline
530 in ways that best support the organizational mission.
20
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
12 https://www.gpo.gov/fdsys/pkg/PLAW-107publ347/pdf/PLAW-107publ347.pdf.
21
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
22
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
595 RMF utilizes the SP 800-39 roles to coordinate multiple Levels of personnel to provision secure
596 systems.
597 Preliminary Guidance Analysis
598 As displayed in Figure 1, the requirements reconciliation process is critical for managing
599 cybersecurity risk. Many cybersecurity requirements originate from mission objectives, laws,
600 regulation, and policy. These must be aligned and deconflicted so that organizational
601 cybersecurity dependencies become apparent. The requirements are then integrated into
602 organizational cybersecurity risk management strategy and supportive activities. Those same
603 requirements inform decision making about provisioning secure systems. Finally, provisioning
604 secure systems is a foundational component to managing cybersecurity risk.
605
606 Figure 1: Relationships of Key NIST Risk Management Guidance
607
608 Basis for Document Alignment
609 The complex relationships among organizational missions, mission/business processes, and the
610 systems supporting those missions/processes require an integrated view for managing risk. NIST
611 SP 800-39 provides guidance for an integrated, organization-wide program for managing
612 information security risk. To integrate the risk management process throughout the organization,
23
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
613 three levels of risk management are defined: (i) organization; (ii) mission/business processes;
614 and (iii) system. Figure 2 illustrates the organization-wide multi-level risk management
615 structure.
616
617 Figure 2: Special Publication 800-39 Multi-Level Risk Management
618 The three respective levels of cybersecurity risk management described in the Cybersecurity
619 Framework and SP 800-39 are equivalent. The SP 800-39 Levels and roles are referenced
620 throughout the SP 800-37. The equivalence of the Cybersecurity Framework and SP 800-39
621 organizational levels, and the current alignment of SP 800-37 with the SP 800-39 Levels, help to
622 illustrate the alignment of organizational levels across all three RM publications.
623 Additionally, the SP 800-39 provides process and roles for cybersecurity risk management. The
624 Cybersecurity Framework provides a structure for organizing cybersecurity risk management
625 through activities like reconciling cybersecurity requirements.
626 NIST Risk Management Framework
627 The organization-wide risk management process of SP 800-39 is central to administering the
628 RMFs six-step process in alignment with business/mission objectives and architectural
629 considerations, as shown in Figure 3.
24
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
630
631 Figure 3: Cybersecurity Risk Management Framework described in NIST SP 800-37
632 The RMF provides a method of coordinating the inter-related risk management standards and
633 guidelines described below:
634 Federal Information Processing Standards (FIPS) Publication 199, Standards for
635 Security Categorization of Federal Information and Information Systems, is a standard
636 for categorizing information and systems based on the potential impact to an
637 organization and its ability to accomplish its mission, protect assets, fulfill its legal
638 responsibilities, and maintain day-to-day functions. FIPS Publication 199 requires
639 federal agencies to categorize their systems as low-impact, moderate-impact, or high-
640 impact for the security objectives of confidentiality, integrity, and availability. Federal
641 agencies use Special Publication 800-60, Guide for Mapping Types of Information
642 and Information Systems to Security Categories, to identify all information types
643 processed, stored, or transmitted by these systems. Each identified information type has
644 an impact value (low, moderate, or high) assigned for each of the security objectives of
645 confidentiality, integrity, and availability.
646 FIPS Publication 200, Minimum Security Requirements for Federal Information and
647 Information Systems, specifies (i) minimum security requirements for information and
648 systems supporting executive agencies of the federal government and (ii) a risk-based
649 process for selecting the security controls necessary to satisfy the minimum security
25
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
650 requirements. This standard promotes the development, implementation, and operation
651 of more secure systems within the federal government by establishing minimal levels of
652 due diligence and facilitates a more consistent, comparable, and repeatable approach for
653 selecting and specifying security controls for systems.
654 SP 800-53, Security and Privacy Controls for Federal Information Systems and
655 Organizations, provides a comprehensive catalog of security and privacy controls and a
656 process for selecting controls to protect organizational operations, assets, individuals,
657 and other organizations from a diverse set of threats. The controls are customizable and
658 implemented as part of an organization-wide process to manage information security and
659 privacy risk. SP 800-53 also provides a methodology to develop specialized sets of
660 controls, or overlays, tailored for specific types of mission/business functions,
661 technologies, or environments of operation. SP 800-53A, Guide for Assessing the
662 Security Controls in Federal Information Systems and Organizations, provides a set of
663 procedures for conducting assessments of the information security and privacy controls
664 in SP 800-53.
665 SP 800-37, Guide for Applying the Risk Management Framework to Federal
666 Information Systems, provides guidelines for applying the Risk Management
667 Framework (RMF) to federal systems. The RMF promotes the concept of near real-time
668 risk management and ongoing system authorization through the implementation of
669 robust continuous monitoring processes. It provides senior leaders the information to
670 make risk-based decisions for their systems, integrating information security into
671 enterprise architecture and the system development lifecycle. The document describes
672 how to apply the RMF to systems through a six-step process, including:
673 (i) the categorization of information and systems;
674 (ii) the selection of controls;
675 (iii) the implementation of controls;
676 (iv) the assessment of control effectiveness;
677 (v) the authorization of the system; and
678 (vi) ongoing monitoring of controls and the security state of the system.
679 SP 800-137, Information Security Continuous Monitoring for Federal Information
680 Systems and Organizations, supports the ongoing monitoring of security controls and
681 the security state of systems. 800-137 provides guidance on developing an agency-wide
682 information security continuous monitoring (ISCM) strategy and implementing an ISCM
683 program. An ISCM program assists federal agencies in making informed risk
684 management decisions by providing ongoing awareness of threats, vulnerabilities, and
685 security control effectiveness.
686
26
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
687 SP 800-39, Managing Information Security Risk, provides guidance for an integrated,
688 organization-wide program for managing information security risk resulting from the
689 operation and use of federal systems. The publication describes a multi-level approach to
690 risk management and applying risk management concepts across an organization. The
691 approach includes three distinct organizational levels 13: the organization level; the
692 mission/business process level; and the system level. The application of risk
693 management processes among these levels is described in four key steps: Framing
694 Risk, Assessing Risk, Responding to Risk, and Monitoring Risk. The risk
695 management process is carried out seamlessly across the three levels, with the overall
696 objective of continuous improvement in the organizations risk-related activities and
697 effective communication within and across the three levels.
698 SP 800-30, Guide for Conducting Risk Assessments, provides guidance for conducting
699 risk assessments of federal systems and organizations. This document provides guidance
700 for carrying out each of the steps in the risk assessment process and how risk
701 assessments and other organizational risk management processes complement and
702 inform each other. SP 800-30 also provides guidance to organizations on identifying
703 specific risk factors to monitor on an ongoing basis. These monitoring activities enable
704 organizations to determine whether risks have increased to unacceptable levels and to
705 implement appropriate risk responses.
706 Federal agencies use the RMF to develop, document, and implement an agency-wide program
707 to improve the security of its information and systems that support the operations and assets of
708 the agency.[15]
709 The Cybersecurity Framework
710 The three primary components of the Cybersecurity Framework are the Core, Implementation
711 Tiers, and Profiles.
712 One of the central features of the Cybersecurity Framework is its ability to translate highly
713 technical and specialized cybersecurity language to a standardized language that experts outside
714 of cybersecurity can understand. This allows a larger team of experts to participate in
715 cybersecurity risk management dialogs and to incorporate considerations of cybersecurity more
716 broadly as part of how an organization manages its risks . The Cybersecurity Framework Core
717 is the structure that enables that translation. Specifically, it provides a set of specific
718 cybersecurity outcomes and reference examples of guidance to achieve those outcomes. The
719 Core is not a checklist of actions to perform; rather, it presents key cybersecurity outcomes
720 identified by industry as helpful in managing cybersecurity risk. The Core itself is composed of
721 four elements: Functions, Categories, Subcategories, and Informative References.
13 SP 800-39 uses the term Tier. To avoid confusion between the Cybersecurity Framework Implementation Tiers and the SP
800-39 organizational Tiers are referred to as Levels in this document.
27
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
722 The Cybersecurity Framework Functions Identify, Protect, Detect, Respond, and Recover
723 provide a high level risk management vocabulary that is meaningful to cybersecurity experts and
724 accessible to non-cybersecurity experts. For this reason, the Functions are applicable to both
725 cybersecurity risk management and enterprise risk management, where cybersecurity is
726 considered along with other organizational concerns. As illustrated in the Figure 4, the bow tie
727 risk diagram, 14 the five Functions also balance prevention and reaction, including preparatory
728 activities to enable the best possible outcome from that reaction. This balance allows Functions
729 to act as a high level expression of risk management strategy and structure for risk assessment.
730
731 Figure 4: Balancing Organizational Focus with Cybersecurity Framework Functions
732 While Functions are often depicted linearly, the outcomes and dependencies associated with each
733 Function can be iterative and often non-sequential. For example, continuous process
734 improvements and lessons learned from the Respond and Recover Functions can inform the
735 Protect Function. These data may be coupled with new best practices and information sharing
736 from other organizations that also inform federal agency considerations for continuous process
737 improvement in the Prevent Function.
738 The rest of the Cybersecurity Framework Core is subordinate to the Functions, and is composed
739 of Categories, Subcategories, and Informative References. The Core hierarchy depicted in Figure
740 5 ensures a frame of reference. This greatly enriches the context of cybersecurity conversations
741 or documents.
14 Bow tie diagrams are commonly used to represent all hazards, and proactive and reactive measures to address those hazards.
This type of visualization may be helpful when considering cybersecurity along side of other enterprise concerns.
28
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
742
743 Figure 5: The Cybersecurity Framework Core
744 Categories are the subdivisions of a Function into groups of cybersecurity outcomes closely tied
745 to programmatic needs and particular activities. Examples of Categories include Asset
746 Management, Access Control, and Detection Processes. Subcategories further divide a
747 Category into specific outcomes of technical and/or management activities. Each subcategory is
748 supported by one or more Informative References, which are specific sections of standards,
749 guidelines, and practices that illustrate a method to achieve the outcomes described.
750 Using the Core taxonomy of Functions, Categories, and Subcategories, the Cybersecurity
751 Framework fosters communication within and among the levels of an organization. The
752 Cybersecurity Framework provides a common language among the representatives of various
753 units of an organization and between organizations, including partners and suppliers. This helps
754 to align a shared vision of security outcomes.
755 Another key feature of the Cybersecurity Framework is the qualitative measurement of
756 organizational risk practices or behaviors. This allows organizations to identify their desirable
757 behaviors, measure current behaviors, determine gaps, and work to improve.
758 The Cybersecurity Framework Implementation Tiers provide a method for organizations to
759 view cybersecurity risk behaviors and the processes for managing risk. The Implementation
760 Tiers range from Partial (Tier 1) to Adaptive (Tier 4) and describe an increasing degree of rigor
761 and sophistication in cybersecurity risk management practices. They also describe the extent to
762 which cybersecurity risk management is informed by business needs and is integrated into an
763 organizations overall risk management practices. The Cybersecurity Framework characterizes
764 three distinct cybersecurity risk management practices:
29
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
30
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
794
795 Figure 6: Notional Information and Decision Flows within an Organization
31
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
797 Selected acronyms and abbreviations used in this paper are defined below.
798
AO Authorizing Official
CI Critical Infrastructure
CISO Chief Information Security Officer
EO Executive Order
FIPS Federal Information Processing Standards
FISMA Federal Information Security Management Act of 2002, as amended
HIPAA Health Insurance Portability and Accountability Act
HVA High Value Asset
ISCM Information Security Continuous Monitoring
ISO International Organization for Standardization
ITL Information Technology Laboratory
NIST National Institute of Standards and Technology
OMB Office of Management and Budget
POA&M Plan of Action and Milestones
RFC Request for Comment
RFI Request for Information
RMF Risk Management Framework
SAR Security Assessment Report
SP Special Publication
SSP System Security Plan
799
32
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
33
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
34
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
35
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
36
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
37
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
38
DRAFT NISTIR 8170 CYBERSECURITY FRAMEWORK
IMPLEMENTATION GUIDANCE FOR FEDERAL AGENCIES
39