• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2023 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 2a – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2b – Cryptography
      • Unit 3a – Secure Networks
      • Unit 3b – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 4b – Case Study 2 Data Breach at Equifax
      • Unit 5a – Access Control
      • Unit 5b Host Hardening
      • Unit 6a Application Security
      • Unit 6b Data Protection
      • Unit 7a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Team Project Instructions
  • Harvard Coursepack

NIST 800 53Ar4 Assessing Security and Privacy Controls for Federal Info and Info Sys

January 1, 2024 by Jose Gomez 2 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 2b - Cryptography Tagged With:

Reader Interactions

Comments

  1. Chenhao Zhang says

    March 1, 2024 at 10:57 am

    Here are some of the key components of the SP 800-53r4:
    Security and privacy controls :SP 800-53r4 defines a set of security and privacy controls that are grouped into families based on their functionality. These controls cover areas such as access control, audit and liability, awareness and training, configuration management, emergency planning, identification and certification, incident response, information protection, maintenance, media protection, personnel security, physical and environmental security, planning, project management, risk assessment, security assessment and authorization, system and service acquisition, system and communications protection, and system development.
    Control baselines: The SP 800-53r4 provides multiple control baselines that organizations can use as a starting point for security and privacy needs. These baselines include low, medium, high, and enhanced baselines that represent different levels of security and privacy rigor depending on the sensitivity and importance of the information being processed, stored, or transmitted by the system.
    Evaluation Procedures: For each control, SP 800-53r4 provides evaluation procedures that agencies can use to determine if the control is being implemented correctly and effectively. These procedures include questions, guidance, and reference materials to help the institution conduct a thorough assessment.
    Security Authorization Process :SP 800-53r4 Outlines the security authorization process, which is used to document and approve the security and privacy controls implemented in federal information systems. This process ensures that the system is authorized to operate based on compliance with applicable control baselines and other policy requirements.
    Privacy Impact Assessments (PIAs): SP 800-53r4 also includes guidance for conducting Privacy impact Assessments (PIAs) to identify and assess privacy risks associated with the collection, use, retention, sharing, and disposal of personally identifiable information (PII) by federal agencies.
    NIST SP 800-53r4 is a comprehensive framework for assessing, implementing, and monitoring security and privacy controls for federal information systems. It provides agencies with a set of controls, baselines, assessment procedures and guidance to help them ensure the protection of their information assets.

    Log in to Reply
  2. Yi Liu says

    March 3, 2024 at 12:35 pm

    Information security program Management controls (PM controls) refer to those that are typically implemented at the organizational level and are not specific to individual organizational information systems. These controls are designed to help organizations comply with applicable federal laws, executive orders, directives, policies, regulations, and standards. The individual or individuals designated by the organization to be responsible for the development, implementation, evaluation, authorization and monitoring of program management controls. Program management controls are documented in the information security plan. An organization-wide information security plan complements the individual security plans developed for each organization’s information system. The security plan for individual information systems and the information security plan together cover the totality of all security controls adopted by the organization.
    In addition, the security plan provides a central repository where the organization can document all the security controls in Appendix F that have been designated as common controls (that is, security controls that can be inherited by the organization’s information system).

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (1)
  • 0b – The Threat Environment (5)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 2a – Case Study 1 (4)
  • 2b – Cryptography (4)
  • 3a – Secure Networks (5)
  • 3b – Firewalls and IDS and IPS (3)
  • 4b – Case Study 2 (4)
  • 5a – Access Control (5)
  • 5b – Host Hardening (3)
  • 6a – Application Security (4)
  • 6b – Data Protection (2)
  • 7a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in