Table of Contents

Cover

Title page

Copyright

Dedication

Introduction

Section I

Chapter 1: Introduction to Assessments

Abstract

Chapter 2: Risk, Security, and Assurance

Abstract

Risk management

Risk assessments

Security controls

Chapter 3: Statutory and Regulatory GRC

Abstract

Statutory requirements

Executive Orders/Presidential Directives

Federal processing standards

Regulatory requirements

OMB requirements for each agency

Chapter 4: Federal RMF Requirements

Abstract

Federal civilian agencies

DOD – DIACAP – RMF for DOD IT

IC – ICD 503

FedRAMP

NIST Cybersecurity Framework

Chapter 5: Risk Management Framework

Abstract

Step 1 – categorization

Step 2 – selection

Step 3 – implementation

Step 4 – assessment

Step 5 – authorization

Step 6 – monitoring

Chapter 6: Roles and Responsibilities

Abstract

Organizational roles

Individual roles

DOD roles

Section II

Introduction

What is an assessment?

Experiences and the process

Chapter 7: Assessment Process

Abstract

Focus

Guidance

Chapter 8: Assessment Methods

Abstract

Evaluation methods and their attributes

Processes

Chapter 9: Assessment Techniques for Each Kind of Control

Abstract

Security assessment plan developmental process

Security assessment actions

Security controls by family

Chapter 10: System and Network Assessments

Abstract

800-115 introduction

Assessment techniques

Network testing purpose and scope

Testing roles and responsibilities

Security testing techniques

Four phases of penetration testing

Post-test actions to be taken

General schedule for testing categories

Chapter 11: Security Component Fundamentals for Assessment

Abstract

Management areas of consideration

Management controls

Information security resources

Measures of performance (SP 800-55)

Measures of performance

Federal enterprise architecture

System and services acquisition (SA)

Security services life cycle

Information security and external parties

CA – security assessment and authorization

PL – planning family and family plans

RA – risk assessment family

Critical success factors to information security management

Operational areas of consideration

Operational security controls key concepts

Physical security

Personnel security

System integrity

Technical areas of consideration

Access control

Identification and authentication

Log-on IDs and passwords

Systems and communications protection

Wireless networking

Firewalls

Audit and accounting

Chapter 12: Evidence of Assessment

Abstract

Types of evidence

Documentation requirements

Chapter 13: Reporting

Abstract

Key elements for assessment reporting

The assessment findings

Security Assessment Report

Executive summary

Risk Assessment Report

Artifacts as reports

Privacy impact assessment report

Remediation efforts during and subsequent to assessment

POAMs

Chapter 14: Conclusion

Abstract

Appendix A: Acronym List

Appendix B: FedRAMP Assessment Process and Templates

Appendix C: Templates for Testing and Evaluation Reports

Subject Index