• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2023 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 2a – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2b – Cryptography
      • Unit 3a – Secure Networks
      • Unit 3b – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 4b – Case Study 2 Data Breach at Equifax
      • Unit 5a – Access Control
      • Unit 5b Host Hardening
      • Unit 6a Application Security
      • Unit 6b Data Protection
      • Unit 7a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Team Project Instructions
  • Harvard Coursepack

NIST SP 800-18r1 “Guide for Developing Security Plans for Federal Information Systems”

January 1, 2022 by Jose Gomez 2 Comments

Filed Under: 1a - System Security Plan Tagged With:

Reader Interactions

Comments

  1. Chenhao Zhang says

    March 1, 2024 at 10:18 am

    The NIST SP 800-18r1 Guide to the Development of a Federal Information Systems Security Plan is a detailed document designed to provide guidance to federal agencies in developing and implementing an information systems security plan. The guidance Outlines the safety requirements of the system and details the controls that should be implemented or planned to be implemented to meet these requirements.
    Specifically, the guidance may address the following areas:
    Security Policy and Management: Guide organizations on how to develop and implement security policies, ensure that these policies are aligned with the organization’s overall business objectives, and clarify security responsibilities at various levels and roles.
    Risk assessment and Management: Provides risk assessment methodologies and tools to help organizations identify, assess, and mitigate potential security risks. In addition, it also covers how to develop risk acceptance guidelines and monitor changes in risk.
    Physical and environmental security: Focus on the security requirements of the physical environment where the information system resides, including data centers, device storage, and disaster recovery facilities.
    Network and communication security: involves the design of network architecture, boundary security, encryption technology, access control and the security of communication protocols.
    System and application security: Provides guidance on how to ensure the security of the operating system, database, middleware, and application software, including patch management, configuration management, and malware protection.
    Access control and Identity management: Emphasizes the importance of user access control and identity management, including authentication, authorization, account management, and access auditing.
    Audit and Monitoring: Provides guidance on how to conduct security audits and monitoring to detect and respond to security incidents in a timely manner.
    Training and awareness raising: emphasizing the importance of security training and awareness raising in information system security, including the formulation of training plans, the selection of training content and the evaluation of training effects.
    Supply Chain Security: Focuses on security risks in the information systems supply chain, including security review of software and hardware components, supplier security management, etc.
    NIST SP 800-18r1 is a comprehensive guide designed to help federal agencies build and maintain a secure, reliable, and efficient information system to protect their information assets from threats such as unauthorized access, use, disclosure, destruction, modification, or destruction.

    Log in to Reply
  2. Yi Liu says

    March 4, 2024 at 12:24 pm

    The document is a guide for developing security plans for federal information systems, outlining the process of enhancing information system security, detailing responsibilities of various roles such as Chief Information Officer and Information System Owner, and explaining how to categorize systems and select security controls. It emphasizes the importance of a structured planning process, documentation, and periodic review to protect sensitive information within federal systems, in accordance with federal standards and guidelines.
    The management pf information owners, the system owner, and the senior agency information security officer (SAISO) acts as a quality control measure and signifies the acceptance of associated risks. This authorization is based on an assessment of management, operational, and technical controls and must be reviewed and possibly re-authorized at least every three years or upon significant changes to the system​​.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (1)
  • 0b – The Threat Environment (5)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 2a – Case Study 1 (4)
  • 2b – Cryptography (4)
  • 3a – Secure Networks (5)
  • 3b – Firewalls and IDS and IPS (3)
  • 4b – Case Study 2 (4)
  • 5a – Access Control (5)
  • 5b – Host Hardening (3)
  • 6a – Application Security (4)
  • 6b – Data Protection (2)
  • 7a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in