Moderator: Steve Warzala swarzala@quanterion.com
eMASS, the True Story
Today’s Presenter: Rebecca Onuskanich, Cybersecurity Consultant June 29, 2017
https://www.csiac.org/
eMASS, the True Story Todays Presenter: Rebecca Onuskanich, - - PowerPoint PPT Presentation
https://www.csiac.org/ eMASS, the True Story Todays Presenter: Rebecca Onuskanich, Cybersecurity Consultant June 29, 2017 Moderator: Steve Warzala swarzala@quanterion.com The Risk Management Framework Process Step 6: Step 1:
Moderator: Steve Warzala swarzala@quanterion.com
Today’s Presenter: Rebecca Onuskanich, Cybersecurity Consultant June 29, 2017
https://www.csiac.org/
Step 1: Categorize Step 2: Select Step 3: Implement Step 4: Assess Step 5: Authorize Step 6: Continuous Monitoring
*Derived from requirements in NIST SP 800-37, Rev. 1 and DoDI 8510.01
Step 1: Categorize Step 2: Select Step 3: Implement Step 4: Assess Step 5: Authorize Step 6: Continuous Monitoring
STEP 1: Categorize System
*Derived from requirements in NIST SP 800-37, Rev. 1 and DoDI 8510.01
Step 1: Categorize Step 2: Select Step 3: Implement Step 4: Assess Step 5: Authorize Step 6: Continuous Monitoring
STEP 1: Categorize System
STEP 2: Select Security Controls
computer!
common and document in Security Plan.
effectiveness and any proposed/actual changes to the information system and environment of operation.
*Derived from requirements in NIST SP 800-37, Rev. 1 and DoDI 8510.01
Step 1: Categorize Step 2: Select Step 3: Implement Step 4: Assess Step 5: Authorize Step 6: Continuous Monitoring
STEP 1: Categorize System
STEP 2: Select Security Controls
computer!
common and document in Security Plan.
effectiveness and any proposed/actual changes to the information system and environment of operation.
STEP 3: Implement Security Controls
become a Configuration Management headache!
accordance with DoD implementation guidance found on the KS.
DoD implementation guidance in the Security Plan
*Derived from requirements in NIST SP 800-37, Rev. 1 and DoDI 8510.01
Step 1: Categorize Step 2: Select Step 3: Implement Step 4: Assess Step 5: Authorize Step 6: Continuous Monitoring
STEP 1: Categorize System
STEP 2: Select Security Controls
computer!
common and document in Security Plan.
effectiveness and any proposed/actual changes to the information system and environment of operation.
STEP 3: Implement Security Controls
become a Configuration Management headache!
accordance with DoD implementation guidance found on the KS.
DoD implementation guidance in the Security Plan
STEP 4: Assess Security Controls
defined in SAP.
Control Assessor (SCA)
*Derived from requirements in NIST SP 800-37, Rev. 1 and DoDI 8510.01
Step 1: Categorize Step 2: Select Step 3: Implement Step 4: Assess Step 5: Authorize Step 6: Continuous Monitoring
STEP 1: Categorize System
STEP 2: Select Security Controls
computer!
common and document in Security Plan.
effectiveness and any proposed/actual changes to the information system and environment of operation.
STEP 3: Implement Security Controls
become a Configuration Management headache!
accordance with DoD implementation guidance found on the KS.
DoD implementation guidance in the Security Plan
STEP 4: Assess Security Controls
defined in SAP.
Control Assessor (SCA)
STEP 5: Authorize System
chain to ensure they are aware of the incoming/pending request.
Authorizing Official (AO)
functions, image, or reputation), organizational assets, individuals, other
*Derived from requirements in NIST SP 800-37, Rev. 1 and DoDI 8510.01
Step 1: Categorize Step 2: Select Step 3: Implement Step 4: Assess Step 5: Authorize Step 6: Continuous Monitoring
STEP 1: Categorize System
STEP 2: Select Security Controls
computer!
common and document in Security Plan.
effectiveness and any proposed/actual changes to the information system and environment of operation.
STEP 3: Implement Security Controls
become a Configuration Management headache!
accordance with DoD implementation guidance found on the KS.
DoD implementation guidance in the Security Plan
STEP 4: Assess Security Controls
defined in SAP.
Control Assessor (SCA)
STEP 5: Authorize System
chain to ensure they are aware of the incoming/pending request.
Authorizing Official (AO)
functions, image, or reputation), organizational assets, individuals, other
STEP 6: Monitor Security Controls
*Derived from requirements in NIST SP 800-37, Rev. 1 and DoDI 8510.01
The Help manual is pretty awesome Repository for artifacts Allows me to have multiple folks working on the A&A
Keeps track of who makes what changes Provides an avenue to ensure systems flow through the
When you migrate a system from DIACAP to RMF, you
Maintains the EITDR number and you can’t update this.
The wizard isn’t a wizard. Not all of the information
NO 1:1 DIACAP-RM control mapping If you don’t transfer all documentation and POA&M
The AF has a policy “system” that you can inherit. If you inherit a control that is defined as Non-Compliant
and your system is compliant, you can’t change this status.
To be fielded systems in development:
Not-applicable, non-compliant or create a manual association.
If a Security Control is set to be removed due to the
A control is deemed “Not Applicable” per an applied
Previously associated vulnerabilities for that control will
be archived.
If a Security Control is set to be removed due to the
A control is deemed “Not Applicable” per an applied
Previously associated vulnerabilities for that control will
be archived.
Uploading STIG CMRS files, Nessus files, ACAS or HBSS scan results does not
tie the vulnerabilities to CCI’s every time.
Extremely manual.
When using the Test Results Import/Export this helps keep things in a slightly
easier format to read.
Once you upload, it will import the information that you completed in the
columns. No ability to tie specific STIG vulnerability to CCI automatically.
Cyber Technology Maturation Framework (CTMF) Program working on
automating this Conflicts – as the A&A SME, if I have defined a CCI as N/A and the DB SME
reviews the STIG and marks the control as NC in STIG viewer a conflict appears in eMass.
Can’t go back and change this annotation in eMass for the STIG. Requires that a new STIG be uploaded and overwrites the previous. Must remember to close out POA&Ms developed.
N/C controls do not automatically drive you to create a
This requires you to continuously to check the status.
Large, complex systems will have possibly hundreds of
Moderate, Low, Low baseline for an “Assess Only” system begins with 6 Security Controls and 58 Security Controls Assessment Procedures before any tailoring as outlined in eMASS and adopted from CNSSI 1253 and NIST SP 800-53R4.
Generate AF Information Technology (IT) Categorization and Selection Checklist Authorizing Official (AO)/ AODR and Program Manager (PM) approval Register AF IT in Enterprise IT Database Repository (EITDR) Air Force and Space AO Assess Only site/URL DoDI 8510.01 AFI 17-101 DoD RMF KS
RMF Assess Only
Enterprise Mission Support service (eMASS) Registration
Assess Only Artifacts
Security Control Assessor (SCA)
Approve Disapprove Returned to RMF team for re-work
Information System Security Manager (ISSM)
POA&M for ISSM Signature Approve Disapprove Returned to The SCA for re-work Signed POA&M and other artifacts certifying process completion uploaded to eMASS RMF Authorization Decision
The Air Force (AF) Assess Only process = 4 STEPS (1) CATEGORIZE, (2) SELECT, (3) IMPLEMENT, and (4) ASSESS