Information Security Governance Papers

Paper Title Evaluation and Assessment
The Abstract of The Paper The third and final phase in the risk management process is evaluation and assessment. The art of risk management in today’s dynamic and constantly changing information technology (IT) environments must be ongoing and continuously evolving. Systems are upgraded and expanded, components are improved, and architectures are constantly evolving.
The security control evaluation and assessment, which is conducted during the Security Certification Phase of a system’s security certification and accreditation, provides input needed to finalize the risk assessment.68 The results are used to provide the Authorizing Official with the essential information needed to make a credible, risk-based decision on whether to authorize the operation of the information system. Ideally, the risk assessment activities would be conducted at the same time the system is being certified and accredited. The reuse of assessment data will not only save valuable resources, but also provide the most up-to-date risk information for the authorizing official.
Many of the risk management activities are conducted during a snapshot in time—a static representation of a dynamic environment. All the changes that occur to systems during normal, daily operations have the potential to adversely affect the security of the system in some fashion, and it is the goal of the risk management evaluation and assessment process to ensure that the system continues to operate in a safe and secure manner. This goal can be partially reached by implementing a strong configuration management program.69 In addition, to monitoring the security of an information system on a continuous basis, agencies must track findings from the security control assessment to ensure they are addressed appropriately and do not continue to pose or introduce new risks to the system.
The process of managing risk permeates the Systems Development Life Cycle (SDLC), beginning with the early stages of project inception through the retirement of the system and its data. From inception forward, agencies should consider the possible threats, vulnerabilities, and risks to the system so that they can better prepare it to operate in its intended environment, securely and effectively, and within a select risk threshold, as deemed acceptable by an agency senior official during the security certification and accreditation process.
Web Link http://csrc.nist.gov/publications/nistpubs/800-100/SP800-100-Mar07-2007.pdf

Back To Information Security Governance Papers List

Database Sections