Cyber Policy

NIST's latest cyber guidelines stress resiliency, privacy controls

concept cybersecurity art

Officials from the National Institute of Standards and Technology are calling the latest update to its security controls catalog the most comprehensive since the guideline was first conceived in 2005.

The guideline, designed for federal agencies but commonly adopted elsewhere in the IT community, is Special Publication 800-53, Revision 4: Security and Privacy Controls for Federal Information Systems and Organizations.

Its latest revisions were published April 29 and were led by NIST with assistance from the Department of Defense, the intelligence community and the Committee on National Security Systems as part of the Joint Task Force, an interagency group created in 2009. The revisions came in response to more advanced, frequent and sophisticated cyber-attacks that put federal agencies squarely in the crosshairs of would-be attackers.

Resource

Read the report

"This historic update to NIST Special Publication 800-53 moves beyond good cyber security hygiene and continuous monitoring into the space of system resiliency and strengthening the IT infrastructure to achieve that resiliency," said Ron Ross, Federal Information Security Management Act Implementation Project Leader, in a statement.

"In the modern world of complex systems and total dependence on IT, cyber security hygiene alone cannot stop cyber-attacks. Good architecture and engineering can," Ross said. "You can't control the threat, but you can control how you defend your information systems and networks using best practices in architecture and engineering."

What's new

Overlays are introduced in this revision. According to the document, overlays provide a "structured approach to help organizations tailor security control baselines and develop specialized security plans that can be applied to specific" missions, environments or technologies. Overlays allow organizations to take advantage of expanded security and privacy controls.

The document provides a holistic approach to information security and risk management through a "Built it Right" strategy coupled with a wide range of security controls for continuous monitoring. A system adhering these guidelines receives information in near real-time. It also includes eight new families of privacy controls, including controls that address areas like mobile and cloud computing, applications, trustworthiness, assurance, resiliency of information systems and advanced persistent threat.

"Continuing to be in a reactive mode regarding cyber-attacks will never prove successful," Ross said. "Organizations need to be more proactive in how their information systems and networks are designed and developed from an architecture and engineering perspective."

In addition, Special Publication 800-53's update includes several new features. They include:

• Assumptions relating to security-control baseline development;

• The ability to tailor the controls to align with the enterprise's mission;

• Additional assignment and selection statement options for security and privacy controls;

• Descriptive names for security and privacy control enhancements;

• Consolidated tables for security controls and control enhancements by family with baseline allocations;

• Tables for security controls that support development, evaluation and operational assurance; and

• Mapping tables for international security standard ISO/IEC 15408, which are known as the Common Criteria.

About the Author

Frank Konkel is a former staff writer for FCW.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • computer network

    How Einstein changes the way government does business

    The Department of Commerce is revising its confidentiality agreement for statistical data survey respondents to reflect the fact that the Department of Homeland Security could see some of that data if it is captured by the Einstein system.

  • Defense Secretary Jim Mattis. Army photo by Monica King. Jan. 26, 2017.

    Mattis mulls consolidation in IT, cyber

    In a Feb. 17 memo, Defense Secretary Jim Mattis told senior leadership to establish teams to look for duplication across the armed services in business operations, including in IT and cybersecurity.

  • Image from Shutterstock.com

    DHS vague on rules for election aid, say states

    State election officials had more questions than answers after a Department of Homeland Security presentation on the designation of election systems as critical U.S. infrastructure.

  • Org Chart Stock Art - Shutterstock

    How the hiring freeze targets millennials

    The government desperately needs younger talent to replace an aging workforce, and experts say that a freeze on hiring doesn't help.

  • Shutterstock image: healthcare digital interface.

    VA moves ahead with homegrown scheduling IT

    The Department of Veterans Affairs will test an internally developed scheduling module at primary care sites nationwide to see if it's ready to service the entire agency.

  • Shutterstock images (honglouwawa & 0beron): Bitcoin image overlay replaced with a dollar sign on a hardware circuit.

    MGT Act poised for a comeback

    After missing in the last Congress, drafters of a bill to encourage cloud adoption are looking for a new plan.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group