• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.001 ■ Spring 2024 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack

NIST SP 800-18r1 “Guide for Developing Security Plans for Federal Information Systems”

January 17, 2024 by David Lanter 18 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 02 - System Security Plan Tagged With:

Reader Interactions

Comments

  1. Eyup Aslanbay says

    January 20, 2024 at 8:51 pm

    One key point from the “Guide for Developing Security Plans for Federal Information Systems” that stands out is the emphasis on the assignment of a unique identifier to each system. This practice ensures effective traceability and accountability, aids in the collection of specific security metrics, and supports the entire system lifecycle management.

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      January 21, 2024 at 1:35 am

      This unique identifier in the security categorization phase of risk assessment is important to ensure the accuracy of the developed security plan which prevents incorrect or inapplicable controls to information systems thereby, defeating the purpose of protecting the assets.

      Log in to Reply
  2. Ooreofeoluwa Koyejo says

    January 21, 2024 at 12:33 am

    Information systems require a minimum level of security controls implemented to ensure their protection and assurance of confidentiality, integrity and availability. These controls (management, technical or operational) must be documented and authorized by a senior officer as part of quality control. A security plan as a document for information systems must be maintained for accuracy, accountability, relevance and adequacy at all times, a review is typically at least once in 3 years which is needed in the security certification and accreditation process for the system.

    Log in to Reply
    • Celinemary Turner says

      January 23, 2024 at 10:13 am

      The connection between the security plan and the security certification and accreditation process is noteworthy. This process is vital for assessing and affirming the effectiveness of security controls. It aligns with regulatory and compliance requirements, ensuring that information systems meet established security standards.

      Log in to Reply
    • Eyup Aslanbay says

      January 23, 2024 at 9:43 pm

      Your explanation about keeping information systems safe is really on point. It’s important to have the right security rules (like management, technical, or operational) and to make sure someone in charge checks and agrees with them. Keeping the security plan updated and checking it every three years makes sure it’s still good and does its job well.

      Log in to Reply
  3. Yannick Rugamba says

    January 21, 2024 at 5:52 pm

    My takeaway The NIST Special Publication 800 18 Revision 1 emphasizes the significance of having a security plan, for every system. it involves comprehending the characteristics and vulnerabilities of each system and devising a security approach that caters, to these particular requirements It’s comparable to having a defined roadmap that outlines everything from the personnel, to the measures taken in order to safeguard the system.

    Log in to Reply
    • Celinemary Turner says

      January 23, 2024 at 10:08 am

      Understanding the characteristics and vulnerabilities of each system is a foundational step in devising an effective security plan. This tailored approach acknowledges the uniqueness of each system’s requirements, ensuring that security measures are specifically aligned with the system’s architecture and potential vulnerabilities.

      Log in to Reply
    • Jon Stillwagon says

      January 23, 2024 at 9:04 pm

      You make a better point than what I had originally thought. what I took from it was just a simple plan that needed to be picked up or accepted by some higher ups for it to be put into place. Like what you said makes sense about the measures being taken in order to safeguard the system.

      Log in to Reply
  4. Celinemary Turner says

    January 21, 2024 at 6:28 pm

    One key point from reading. NIST SP 800-100 emphasizes the iterative nature of risk management, stressing the importance of continuous assessment and adaptation to evolving threats and vulnerabilities.
    The National Institute of Standards and Technology (NIST) Special Publication 800-100 highlights the dynamic nature of risk management. It underscores the need for an ongoing, iterative process that regularly assesses risks, identifies vulnerabilities, and adapts security measures to address emerging threats. This iterative approach ensures that risk management remains effective despite evolving cybersecurity landscapes and organizational changes.

    Log in to Reply
    • Bo Wang says

      January 23, 2024 at 6:09 pm

      I agree with you because the current network environment is changing rapidly, and companies need to constantly adapt to this environment.

      Log in to Reply
  5. Celinemary Turner says

    January 21, 2024 at 6:42 pm

    One key point that resonated deeply to me from NIST SP 800-18r1 is the interdependence of controls in securing federal information systems. The document emphasizes that achieving robust security requires a layered approach, where different types of controls work together in a collaborative manner. This concept resonated with me because it breaks down the false of focusing solely on technical controls versus management or operational controls. The emphasis on interdependence in NIST SP 800-18r1 is a valuable reminder for anyone involved in information security. It highlights the need for a holistic approach that recognizes the interconnectedness of different controls and promotes collaboration between various stakeholders. By recognizing this interdependence, we can build a more robust and adaptable security posture for our information system.

    Log in to Reply
    • Yannick Rugamba says

      January 23, 2024 at 12:06 am

      Good point about the significance of incorporating forms of controls mentioned in NIST SP 800 18r1. In my opinion integrating components, like user training and incident response would greatly strengthen our security strategies. By providing training we can minimize the risks associated with errors, which complements our technical controls. Additionally having a defined incident response plan ensures that we are adequately prepared for any breaches thereby enhancing the resilience of our system. Ultimately it’s, about creating a security framework.

      Log in to Reply
    • Edge Kroll says

      January 23, 2024 at 10:27 pm

      A layered cybersecurity approach is crucial for defense. Redundancy minimizes the impact of breaches, and comprehensive coverage ensures protection across various fronts. This approach aids regulatory compliance and proves cost-effective in safeguarding against cyber threats.

      Log in to Reply
  6. Edge Kroll says

    January 21, 2024 at 7:47 pm

    One key point that I took from this reading was the emphasis on input from various sources on the system security plan. When developing a security plan it must be comprehensive, this means gathering information from system owners, information owners, and information security officers. Doing so allows those developing the system security plan to ensure that all possible points of view are accounted for when creating the basic plan and structure of the security plan.

    Log in to Reply
    • Celinemary Turner says

      January 23, 2024 at 10:22 am

      your observation reinforces the idea that a comprehensive and effective security plan is a collective effort that benefits from input from multiple stakeholders. It aligns with best practices in information security, where a collaborative and inclusive approach is essential for developing robust security measures. Well-articulated!

      Log in to Reply
  7. Jon Stillwagon says

    January 21, 2024 at 7:48 pm

    For the NIST SP800 18 R1 I found interesting or key point that I took away from this reading is that a company would first have to create a system security plan then wait for that security plan to be accepted. If the security plan wasn’t accepted it would mean that it wasn’t protecting the items that the company needed, or it could be many things. Once It is accepted that system will have its own responsibilities to uphold while the security system is up and running.

    Log in to Reply
    • Bo Wang says

      January 23, 2024 at 6:15 pm

      I think of it more as a kind of planning automation, where once a plan is implemented, it keeps running as required.

      Log in to Reply
  8. Bo Wang says

    January 21, 2024 at 10:01 pm

    The key point I’ve found is this: all federal applications have merit and require some level of protection. Because some applications have features that are important to the organization, you need to specify the relevant security protection plan and provide a copy of the protection plan.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (1)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (4)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in