• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.001 ■ Spring 2024 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack

NIST 800 100 Information Security Handbook Chapter 8

January 24, 2024 by David Lanter 20 Comments

Filed Under: 03 - Planning and Policy Tagged With:

Reader Interactions

Comments

  1. Ooreofeoluwa Koyejo says

    January 27, 2024 at 7:22 pm

    The system security planning process involves inputs from other guidelines as sources for different reasons and purposes to ensure standardization, This includes FIPS 199 for security categorisation and impact analysis, FIPS 200 for minimum security requirements, and NIST 500-32 for security baselines and controls. The objective of system security planning is to document appropriate protection for information systems used by federal agencies and their contractors which forms a part of good security management practices. The plan also gives details to the status of the controls: implemented or planned; the roles and responsibilities are properly defined for accountability in the approval, certification and accreditation processes.

    Log in to Reply
    • Celinemary Turner says

      January 29, 2024 at 9:20 pm

      . By leveraging these established frameworks, organizations can ensure standardization and adherence to best practices in cybersecurity.

      Log in to Reply
  2. Eyup Aslanbay says

    January 28, 2024 at 3:24 pm

    The key point from NIST 800-100 is that the plan for keeping a system safe explains who is responsible and how people should act when they use the system. It also shows how important it is for the team to work together when they are planning. People like program managers, system owners, and security staff need to know how to plan for system security. Users of the system and people who decide what the system needs should also understand this planning. The security plan is a key part of making a system. People who set up and look after information systems have to help decide what security steps to use for their systems.

    Log in to Reply
    • Celinemary Turner says

      January 29, 2024 at 9:28 pm

      By involving relevant stakeholders, clarifying responsibilities, and fostering a shared understanding of the importance of security planning, organizations can effectively mitigate risks and safeguard their systems against potential threats and vulnerabilities.

      Log in to Reply
    • Bo Wang says

      January 30, 2024 at 7:58 pm

      It is very important to have clear responsibilities, which helps to improve work efficiency.

      Log in to Reply
  3. Celinemary Turner says

    January 28, 2024 at 5:58 pm

    One key point from this assigned reading, NIST 800 100 Information Security Handbook Chapter 8, is Security Planning Roles and Responsibilities.
    In security planning, various roles and responsibilities are distributed among different stakeholders. These roles and responsibilities are vital in protecting people, property, and information. Also, It is essential that these roles are clearly defined and that communication and collaboration among team members are maintained to ensure the success of security planning efforts.

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      January 29, 2024 at 10:36 pm

      I understand that the defined roles and responsibilities in the handbook are aimed at ensuring that the execution of the requirements is not ambiguous and can be monitored as part of the process of achieving the security objectives of confidentiality, integrity and availability.

      Log in to Reply
  4. Yannick Rugamba says

    January 28, 2024 at 6:07 pm

    System security plans play a role, in providing a view of the security needs and measures currently in place or intended to fulfill those needs. These plans should incorporate input from individuals for information, system ownership, the Senior Agency Information Security Officer (SAISO). End users. It is essential to update these plans to ensure security practices, such, as risk assessments and certification/accreditation activities.

    Log in to Reply
    • Celinemary Turner says

      January 29, 2024 at 9:37 pm

      Yes. By regularly updating system security plans, organizations can ensure that their security practices remain practical and current. This proactive approach helps organizations avoid emerging threats and vulnerabilities, ensuring their systems remain secure and resilient despite evolving cyber risks.

      Log in to Reply
    • Edge Kroll says

      January 30, 2024 at 6:18 pm

      The collaborative approach you mentioned, incorporating insights from these diverse perspectives ensures that the system security plans are well-rounded and address the real-world needs and challenges. It also fosters a sense of ownership and engagement among end users, making them active participants in the security process rather than just recipients of security measures.

      Log in to Reply
    • Eyup Aslanbay says

      January 30, 2024 at 10:18 pm

      System security plans are vital as they outline current and planned security measures. Including input from system owners, SAISO, and end-users enhances their effectiveness. Regular updates, particularly for risk assessments and certification, are crucial to keep these plans relevant and robust against evolving threats.

      Log in to Reply
  5. Bo Wang says

    January 28, 2024 at 8:40 pm

    The NIXT 800-100 manual defines the responsibilities and benefits of the different roles in the security program. In addition, different roles should fully understand the process of system planning.

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      January 29, 2024 at 10:39 pm

      For the roles and their definitions, the handbook the responsibilities played by each stakeholder to ensure the smooth execution of the security program.

      Log in to Reply
    • Eyup Aslanbay says

      January 30, 2024 at 10:22 pm

      The NIST 800-100 manual does a great job of outlining the responsibilities and benefits of various roles in a security program. It’s crucial that each role fully grasps system planning processes, as this understanding is key to the effectiveness and coherence of the security strategy.

      Log in to Reply
  6. Edge Kroll says

    January 28, 2024 at 10:26 pm

    The reading emphasized the significance of security categorization. A notable insight is that organizations proficient in identifying and categorizing their information systems based on confidentiality and criticality stand to gain resource efficiency advantages as outlined in FIPS 199. By doing so, organizations can strategically allocate efforts toward implementing security controls for high-impact systems rather than expending resources on low-impact systems.

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      January 29, 2024 at 10:43 pm

      I like that there are enough references made available by NIST, FIPS and FedRamp to properly guide the protection of information systems, this begins with the definition of information, information systems, categorization of information systems, selection of controls and continuous review of the security systems.

      Log in to Reply
    • Jon Stillwagon says

      January 30, 2024 at 10:00 pm

      You make a valid point and if they were to reduce resources on low impact systems that would would increase the effectiveness in high impact systems. Organizations can effectively protect peoples personal information. Putting to much resources on lower impact systems wouldn’t be efficient for the organization and wouldn’t be able to make progress.

      Log in to Reply
  7. Jon Stillwagon says

    January 28, 2024 at 10:41 pm

    The security planning in NIST 800-100 security handbook and its security controls will address the management, operational, and technical aspects to protect the C.I.A. objectives. The system security plan should document all the activities that are tailored to what is happening with the security plan. What is important to the planning of the information security plan is the roles and responsibilities Now a lot of companies have various mission and goals to their accomplishments or but one thing is that the roles are filled for a single role or one person with many roles. Once the security certification results come back then it is time to fill the roles and responsibilities so we can determine that once the certification is done an accurate decision can be made on what to do.

    Log in to Reply
    • Yannick Rugamba says

      January 30, 2024 at 12:59 pm

      You make good points about security controls addressing confidentiality, integrity, and availability. It’s also crucial to highlight the significance of managing system interconnections when integrating security planning across systems. As mentioned in section 8.4.3 agencies should be mindful of the risks involved when connecting systems, with security controls and impact levels. Conducting audits and risk assessments, for these interconnections will help ensure that appropriate controls are maintained as systems evolve over time.

      Log in to Reply
  8. Yannick Rugamba says

    January 30, 2024 at 12:24 am

    You make good points about security controls addressing confidentiality, integrity, and availability. It’s also crucial to highlight the significance of managing system interconnections when integrating security planning across systems. As mentioned in section 8.4.3 agencies should be mindful of the risks involved when connecting systems, with security controls and impact levels. Conducting audits and risk assessments, for these interconnections will help ensure that appropriate controls are maintained as systems evolve over time.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (1)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (4)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in