• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.005 ■ Spring 2021 ■ Wade Mackey
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit 01 – Threat Environment
      • Unit 02 – System Security Plan
      • Unit 03 – Planning and Policy
      • Unit 04 – Cryptography
      • Unit 05 – Secure Networks
      • Unit 06 – Firewalls
      • Unit 07 – Mid-Term Exam
    • Second Half of the Semester
      • Unit 08 – Access Control
      • Unit 9 Host Hardening
      • Unit 10 Application Security
      • Unit 11 Data Protection
      • Unit 12 – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Participation
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Cyberattack: The Maersk Global Supply-Chain Meltdown
    • Team Project – Updated 3/31/2020
  • Harvard Coursepack
  • Gradebook

FIPS 200 Minimum Security Requirements for Federal Information and Information Systems

January 23, 2020 by Wade Mackey 19 Comments

Filed Under: 03 - Planning and Policy Tagged With:

Reader Interactions

Comments

  1. Akshay Shendarkar says

    January 24, 2020 at 3:20 pm

    The FIPS 200 document gives a brief description of the minimum-security requirements, which are divided in to 17 categories for protecting the information and information assets of the federal agencies.
    The seventeen areas address the management, operational, and technical aspects of protecting federal information systems. The selection of controls is done from the NIST 800-3 SP after conducting a risk analysis involving the management and technical authorities of the organization. The initial step is to categorize the information assets as per FIPS 199 standard and subsequently appropriate controls are to be implemented as per the categorization of the information assets, that satisfy the minimum-security requirements of this standard. This document also emphasizes on the cost-effective risk-based approach for achieving the security across the organization by encouraging co-ordination of appropriate authorities in the organization to come up with security control baseline activities.

    Log in to Reply
    • Imran Jordan Kharabsheh says

      January 28, 2020 at 3:58 am

      Hello,
      As I was reading through your post on what you took away from reading through the FIPS 200 publication, I began to note how I had not attempted to see if I could simplify the purpose of the document yet. The reason I find what you’ve written about to be quite interesting is because it shows that you have a true understanding of what you’ve read, and shows that even in simpler terms the key principals and purpose of the document can be conveyed.

      Log in to Reply
  2. Numneung Koedkietpong says

    January 24, 2020 at 8:18 pm

    The FIPS 200 gives the details of seventeen security requirements for information and information systems such as access control (AC), Awareness and training (AT), and Physical and Environmental Protection (PE). One key that I took from this standard is that it is important to have these security requirements covered in policies and procedures because these documents are the high level that govern and manage IT high level controls in every organization.

    Log in to Reply
    • Innocent says

      March 2, 2020 at 12:27 pm

      Hi Num, Yes, the seventeen areas represent a broad-based, balanced information security program and addresses the management, operational and technical aspects of protecting federal information and information systems. So, policies and procedures are necessary for effective implementation of enterprise-wide information security programs within the federal government, and firms must develop and document policies and procedure governing the minimum security requirements set forth in this standard and should ensure their effective

      Log in to Reply
  3. Zeynep Sahin says

    January 24, 2020 at 10:58 pm

    One of the key points that I took from this document is that this is one of two mandatory security standards required by FISMA legislation. The other mandatory document is FIPS Publication 199, Standards for Security Categorization of Federal Information and Information Systems. FIPS Publication 200, points out risk-based process for selecting the security controls to meet the minimum-security requirements. FIPS 200 defines 17 security areas covered under confidentiality, integrity, and availability of federal information systems and the information processed, stored, and transmitted by those systems.

    Log in to Reply
    • Numneung Koedkietpong says

      January 27, 2020 at 12:57 pm

      Hi Zeynep, I like the key point that you summarized in the concise way. Organizations should understand and in-place controls in FIP 200 which are categorized to 17 areas. It can increase cyber attack resilience among CIA (confidentiality, integrity, and availability)

      Log in to Reply
  4. Percy Jacob Rwandarugali says

    January 26, 2020 at 2:00 pm

    FIPS 200 provides minimum security requirements which cover seventeen security-related areas about protecting the confidentiality, integrity, and availability of data. For example, access control, maintenance, media protection to mention but a few. As stated in the document, the seventeen areas represent a broad-based, balanced information security program that addresses the management, operational, and technical aspects of protecting federal information and information systems.

    Log in to Reply
  5. Christopher James Lukens says

    January 26, 2020 at 2:08 pm

    Fips 200 lays out the 17 security related areas in terms of protecting confidentiality integrity and availability. It also stresses the importance of policies to cover all 17 security areas laid out. To figure out which controls to use it then teaches how to go to NIST 800-53 and select controls based upon impact ratings of FIPS 199. It also explains the approval processes so the right controls are selected for the rights areas and impacts.

    Log in to Reply
    • Natalie Dorely says

      January 26, 2020 at 9:56 pm

      Hi Chris!

      I think it’s interesting how much it stresses the importance to go over all of these policies as it is important to have these minimum security controls in place.

      Best,
      Natalie Dorely

      Log in to Reply
  6. Imran Jordan Kharabsheh says

    January 26, 2020 at 7:49 pm

    Reading through the FIPS 200 Publication titled Minimum Security Requirements for Federal Information and Information Systems, I enjoyed revisiting some of the concepts and topics that were discussed or covered in previous courses in the ITACS program . Among the most important ones is the Minimum Security Requirements section and the seventeen security-related areas that help determine appropriate control requirements for federal information systems and the information stored within them. The publication also makes note of how significant documented policies and procedures that meet the standard specifications for minimum security requirements are to the effective implementation and success of “enterprise-wide information security programs” and the associated information systems controls.

    Log in to Reply
    • Akshay Shendarkar says

      January 28, 2020 at 2:23 pm

      Hello Jordan,

      You have rightly mentioned the importance of documented policies and procedures and ensuring they meet the minimum security criteria. Security policies are the starting point of any effective security program and it is necessary to ensure that they are well updated as per the current security regulations and threat scenario.

      Log in to Reply
  7. Sarah Puffen says

    January 26, 2020 at 9:23 pm

    FIPS 200 specifies the minimum security requirements for federal information systems in order to protect the confidentiality, integrity, and availability of these systems and the information that is handled within them. The 17 areas relate to the managerial, operational, and technical components of protecting information and information systems. What is most important for these requirements to be effective is the necessity of having proper policies and procedures in place to ensure proper implementation.

    Log in to Reply
  8. Natalie Dorely says

    January 26, 2020 at 9:34 pm

    One key takeaway I received through reading this is that the main 17 security-related areas covering the security objectives. For example, one security-related area is awareness and training. This is one of my favorite topics personally because I find it interesting how the lack of security awareness and training can be the main proponent in a data breach occurring in a company. This is why it’s good that all companies take the time to create security training for all of their employees, not just tailored to their IS department.

    Log in to Reply
    • Peiran Liu says

      April 1, 2020 at 7:23 pm

      Hi Natalie,

      Lacking security awareness and training is one of the biggest problem now. Like the case we learned from last semester about Target. The main reason of the attack is one of the staff open a mail with virus, which infect everything in the network.

      Log in to Reply
  9. Junjie Han says

    January 26, 2020 at 11:00 pm

    FIPS 200 federal minimum Security requirements of information and information system according to the management of information Security features, and illustrates some specified minimum Security requirements, for example, the Access Control (AC), Audit and Accountability (AU), Certification and Accreditation, and Security Assessments (CA), Contingency Planning (CP) and so on.The e-government Act of 2002 recognizes the importance of information security and provides guidelines.Information classification, guidelines for information systems and minimum security requirements for information systems in each region.

    Log in to Reply
  10. Alexander Reichart-Anderson says

    January 26, 2020 at 11:58 pm

    FIPS 200 seems like itself could be a course in our program. The always present CIA triad of confidentiality, integrity, and availability once more makes and appearance. In addition to the triad, the concept of controls was also brought up again. Controls are a very critical and — I feel — underrated part of the information security process in todays IS environment. Many controls are either nonexistent or hardly enforced. 200, places an emphasis, or at the leasts reiterates the importance of creating and following controls in any tech atmosphere — especially the federal government. That is why FIPS 200 is focused on “Minimum Security Requirements”.

    Log in to Reply
  11. Joseph Nguyen says

    January 27, 2020 at 1:26 am

    FIPS 200 has 17 Specifications for Minimum Security Requirements. These requirements are classified into 3 categories (Management, Administrative, and Technical). These specifications can then be used to effectively implement/ develop formal policies, procedures, and guidelines.

    Log in to Reply
  12. Innocent says

    March 2, 2020 at 12:20 pm

    One key point to remember from this FIPS publication is that organizations must meet the minimum-security requirements by selecting the appropriate security controls and assurance requirements as described by NIST special publication 800-53 : Recommended Security Controls of Federal Information Systems. Thus, this process of selecting the right security controls is multifaceted, risk-based activity involving management and operational personnel within the organization; and the first step in the risk management process is following the guidelines in the FIPS publication 199 – security categorization of Federal Information and Information systems. The next step is to select the security controls in NIST SP 800-53 which are associated with the designated impact levels ( Low- impact, Moderate impact and High impact).

    Log in to Reply
  13. Peiran Liu says

    April 1, 2020 at 7:20 pm

    The key takeaway from FIPS 200 is that how barebone the document is, as it is the minimum security requirement for Federal Information and Information Systems. Also in the document, they shows each area and abbreviation so that people that are not familiar with IT audit stuff can easily find out what they are writing about. They also include the definition for all kinds of nouns for non IT audit professionals.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (2)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (6)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (6)
  • 13 – Review (1)
  • 13 – Team Project Presentations and Review for Final (1)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in