GovReady / security-stories-nist800-53

A collection of security related user stories compatible with NIST Special Publication 800-53
GNU General Public License v2.0
34 stars 15 forks source link

PM-9 #19

Open gregelin opened 7 years ago

gregelin commented 7 years ago

BLUF

Team needs to produce a memo or other document that is the organization's official statement describing how the organization systematically manages cyber risk.

Effort

Initially developing the document is a one time activity performed by executives. The document is disseminated to everyone, especially managers and cyber. The document needs to be updated on defined schedule.

Good

The clearer the prioritization of risk, the easier the rest of org will make good trade-offs and direct resources to priorities.

Bad

A bad document is general and pushes prioritization downstream leading to security viewing all risks as equal.

Story

Story for development team to know location of document and read it

Examples

DoD is compliant because of memo DoDI 8510.01 stating how DoD uses NIST RMF as strategy. You need a memo declaring what you will use as a strategy. artifact is the memo.

CDM

Make document public. Separate proprietary info to separate doc and make available enterprise wide.

Roles

Reference

RISK MANAGEMENT STRATEGY

The organization: a. Develops a comprehensive strategy to manage risk to organizational operations and assets, individuals, other organizations, and the Nation associated with the operation and use of information systems; b. Implements the risk management strategy consistently across the organization; and c. Reviews and updates the risk management strategy [Assignment: organization-defined frequency] or as required, to address organizational changes.

gregelin commented 7 years ago

Links

gregelin commented 7 years ago

Story drafts

Quarterly

gregelin commented 7 years ago

Compelling evidence

NOTE: For all documents:

Why:

Without clear prioritization from executives of the most import digital assets to protect and how much to invest protecting them, cyber security staff will not have enough information to make risk-based decisions.

Alternative: Without concise [formal?] executive guidance regarding what risks are tolerable and what risks are not, staff will be unable to prioritize and unable to balance security and innovation.

How:

Acceptance Criteria

gregelin commented 7 years ago

Continuous Monitoring Details

Enabling continuous monitoring requires:

Data for monitoring

Options

gregelin commented 7 years ago

I spent some time examining the Python PEP model then created a "Practices" repository for GovReady PBC inspired by PEP.

I discover that PEP model addresses important concerns:

It appears to me a surprisingly robust model that can organizes an extensible repository of official decisions and practices, including meta processes (processes about the process). PEP is not machine readable, but the documents are friendly to web-based management, indexing, and discussion.

gregelin commented 7 years ago

Moving forward with "Practice" document management model based on PEP and RFC model.

Current version: https://github.com/GovReady/govready-pbc-practices/blob/master/practices/2-draft-accepted/p-0020.md