• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2023 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 2a – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2b – Cryptography
      • Unit 3a – Secure Networks
      • Unit 3b – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 4b – Case Study 2 Data Breach at Equifax
      • Unit 5a – Access Control
      • Unit 5b Host Hardening
      • Unit 6a Application Security
      • Unit 6b Data Protection
      • Unit 7a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Team Project Instructions
  • Harvard Coursepack

NIST 800 60 V1R1 Guide for Mapping Types of Information and Information Systems to Security Categories

January 1, 2022 by Jose Gomez 3 Comments

Filed Under: 1b - Planning and Policy Tagged With:

Reader Interactions

Comments

  1. Chenhao Zhang says

    March 1, 2024 at 10:32 am

    It provides a framework to help organizations map their information and information system types to the appropriate security categories. The purpose of this guidance is to simplify and harmonize the process by which federal agencies conduct information security classification.
    Information Type classification: Details the different types of information (such as personal information, sensitive but non-personal private information, public information, etc.) and their potential levels of impact (low, medium, high).
    Classification of information systems: Provides guidance on how to classify information systems based on factors such as system purpose, type of information processed, user groups, etc.
    Mapping process: describes specific steps and methods for mapping information and information system types to security categories. This includes determining the sensitivity of the information, assessing the complexity of the system, and applying the “take high” principle to determine the overall security category.
    Examples and case studies: Practical examples and case studies are provided to help readers understand and apply the mapping process.
    Tools and resources: Provides tools and resources that can be used to assist the mapping process, such as templates, checklists, etc.
    By following the guidance of NIST SP 800-60 Volume 1, Revision 1, organizations can ensure that their information and information systems are properly classified for security, thereby laying the foundation for implementing appropriate security controls. This classification also helps to determine the security requirements of the system in security assessment programs such as FedRAMP.

    Log in to Reply
  2. Yi Liu says

    March 4, 2024 at 11:17 am

    Around the professional development and certification processes within the realm of information security, particularly in the context of federal agencies. The document categorizes knowledge and skill needs into six role-based specialties: Manage, Acquire, Design and Develop, Implement and Operate, and Review and Evaluate​​.
    The need for federal agencies to adopt a set of security controls to protect their information and information systems. The responsibilities and expected behavior of all individuals accessing the system.
    The chapter discusses the importance of understanding the system security planning process by program managers, system owners, security personnel, and users of the information system. It refers to Federal Information Processing Standard (FIPS) 200, which specifies the minimum security requirements for federal information and information systems in seventeen security-related areas.
    Additionally, I know what the roles and responsibilities in security planning are, including those of the Chief Information Officer (CIO), Information System Owner, Information Owner, Senior Agency Information Security Officer (SAISO), and Information System Security Officer (ISSO). The process for system security plan approval, system boundary analysis, and selection of security controls, including compensating controls and common security controls. It emphasizes the need for periodic review, modification, and maintenance of system security plans to ensure they continue to reflect accurate information about the system, which is crucial for system re-certification and reaccreditation.

    Log in to Reply
  3. Yi Liu says

    March 4, 2024 at 11:48 am

    This categorization is based on the levels of security required to protect the information from unauthorized disclosure, modification, or use, considering the potential impact or consequences of such incidents. The aim is to ensure appropriate levels of information security corresponding to various risk levels. NIST SP 800-60 offers a methodology for mapping different types of information and systems to security categories that consider three primary aspects: confidentiality, integrity, and availability. These categories are further divided into impact levels such as low, moderate, and high, providing a structured approach to identify the necessary security measures for different types of information and systems.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (1)
  • 0b – The Threat Environment (5)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 2a – Case Study 1 (4)
  • 2b – Cryptography (4)
  • 3a – Secure Networks (5)
  • 3b – Firewalls and IDS and IPS (3)
  • 4b – Case Study 2 (4)
  • 5a – Access Control (5)
  • 5b – Host Hardening (3)
  • 6a – Application Security (4)
  • 6b – Data Protection (2)
  • 7a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in