• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.001 ■ Spring 2024 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack

NIST 800 60 V1R1 Guide for Mapping Types of Information and Information Systems to Security Categories

January 24, 2024 by David Lanter 14 Comments

Filed Under: 03 - Planning and Policy Tagged With:

Reader Interactions

Comments

  1. Ooreofeoluwa Koyejo says

    January 27, 2024 at 9:20 pm

    As a part of the need to standardize the system security plan process, the need to properly define information and information systems which is the starting point for the security categorization, impact analysis, and baseline control selection processes hence, the development of an information taxonomy/creation of a catalogue of information types defined in the guide as these four business areas separating government operations into high-level categories: 1) the purpose of government (services for citizens); 2) the mechanisms the government uses to achieve its purpose (mode of delivery); 3) the support functions necessary to conduct government operations (support delivery of services); and 4) the resource management functions that support all areas of the government’s business (management of government resources).

    Log in to Reply
    • Edge Kroll says

      January 30, 2024 at 6:19 pm

      By defining these categories, you are creating a roadmap for securing information and information systems across different facets of government operations. This structured approach not only enhances the efficiency of security processes but also ensures a more targeted and tailored security strategy for each category.

      Log in to Reply
  2. Eyup Aslanbay says

    January 28, 2024 at 5:37 pm

    A key thing to learn from NIST 800-60 V1R1 is how it explains the importance of keeping information confidentiality, integrity, and availability. It also gives advice on how staff in agencies should think about different factors when they’re putting together information types for a system. Sometimes unexpected issues can affect one of the security goals. These issues can include how data is put together, what the system does, and special situations.

    Log in to Reply
    • Yannick Rugamba says

      January 30, 2024 at 12:36 am

      You’ve brought up a point regarding the need to consider factors, like data aggregation and critical functionality when categorizing system information taking into account their impact on confidentiality, integrity and availability. It’s also crucial to emphasize the importance of revisiting these categorizations as mentioned in Section 4.3. This allows for adjustments based on any changes, in the system, data usage, environment or mission that may affect security risks. Through monitoring we can ensure that impact levels and controls are consistently aligned with evolving risks.

      Log in to Reply
  3. Celinemary Turner says

    January 28, 2024 at 6:00 pm

    . One key point is the Importance of Context in Information Security Categorization. The NIST 800-60 V1R1 Guide reading emphasizes contextual understanding in mapping information and information systems to security categories. The Guide goes beyond simply classifying data based on its inherent sensitivity and instead encourages considering the broader context in which the information resides and operates. This contextual approach is crucial for several reasons:
    The NIST 800-60 V1R1 Guide promotes a more holistic and risk-based approach to information security. This approach moves beyond checkbox compliance and encourages organizations to critically evaluate the specific threats, Strong matches, and potential consequences associated with their information assets.

    Log in to Reply
    • Eyup Aslanbay says

      January 30, 2024 at 10:16 pm

      Your point on context in information security, as highlighted in the NIST 800-60 V1R1 Guide, is crucial. It’s important to look beyond just data sensitivity and consider the overall environment in which the data is used. This holistic, risk-based approach promoted by the guide moves past simple compliance and pushes organizations to think about the unique threats and potential impacts specific to their situation. This perspective is essential for truly effective information security.

      Log in to Reply
  4. Yannick Rugamba says

    January 28, 2024 at 6:09 pm

    what is took from this reading is the initial step, in risk management involves classifying information systems according to the impact levels of confidentiality, integrity and availability associated with the information they handle. This practice ensures that security measures are in alignment, with the level of risk and helps determine where investments should be directed for security.

    Log in to Reply
    • Celinemary Turner says

      January 29, 2024 at 10:04 pm

      You highlight the importance of classifying information systems based on risk profiles to inform strategic decision-making in risk management. By aligning security measures with the level of risk and directing investments towards high-priority areas, organizations can enhance their ability to protect sensitive information and maintain the integrity and availability of their systems effectively.

      Log in to Reply
  5. Bo Wang says

    January 28, 2024 at 8:48 pm

    NIXT 800-60 is designed to assist federal government agencies in classifying information and information systems. It helps agencies continuously map the types of security impact levels: information and information systems

    Log in to Reply
  6. Edge Kroll says

    January 28, 2024 at 10:30 pm

    The main takeaway I got from this reading was a more accurate idea of how data classifications are used. It is very easy to think of many of the different types of information an organization may be storing, but to have it laid out in an official government document takes out a lot of the guesswork and allows me to get a more accurate idea of what to look out for when classifying data.

    Log in to Reply
    • Celinemary Turner says

      January 29, 2024 at 10:27 pm

      I agree with you .Having official guidance from a government document like NIST SP800-60 V1R1 reduces the guesswork involved in data classification. Instead of relying on subjective interpretations or assumptions, individuals and organizations can refer to the document for a standardized approach to classifying data based on its sensitivity and importance.

      Log in to Reply
    • Bo Wang says

      January 30, 2024 at 8:01 pm

      I agree with the official assurances you mentioned about the reliability of the documents. This will save a lot of unnecessary trouble.

      Log in to Reply
  7. Jon Stillwagon says

    January 28, 2024 at 11:10 pm

    The NIST SP800 – 60VR1 describes that companies with the security categorization process and security impact levels for common information types. This document helps describes the things that need to be done in for network security like documenting the security categorization process which supports the life cycle and has to be included in the systems security plan. Everything is there to develop the system security plan to be put into place so an organization can implement their security architecture in their network.

    Log in to Reply
    • Celinemary Turner says

      January 29, 2024 at 10:06 pm

      By categorizing information types and determining their security impact levels, organizations can better understand the risks associated with their data and tailor their security measures accordingly.

      Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (1)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (4)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in