+1 (208) 254-6996 [email protected]
  

Risk Management Guide for Information Technology Systems

Recommendations of the National Institute of Standards and Technology

Don't use plagiarized sources. Get Your Custom Essay on
Risk Management Guide for Information Technology Systems
Just from $13/Page
Order Essay

 

Gary Stoneburner, Alice Goguen, and Alexis Feringa

 

Special Publication 800-30

 

 

SP 800-30 Page ii

 

C O M P U T E R S E C U R I T Y

Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 1Booz Allen Hamilton Inc. 3190 Fairview Park Drive Falls Church, VA 22042 July 2002

 

U.S. DEPARTMENT OF COMMERCE Donald L. Evans, Secretary TECHNOLOGY ADMINISTRATION Phillip J. Bond, Under Secretary for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Arden L. Bement, Jr., Director

NIST Special Publication 800-30 Risk Management Guide for Information Technology Systems Recommendations of the National Institute of Standards and Technology Gary Stoneburner, Alice Goguen1, and Alexis Feringa1

 

 

SP 800-30 Page iii

Reports on Computer Systems Technology

The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof-of- concept implementations, and technical analyses to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in federal computer systems. The Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security, and its collaborative activities with industry, government, and academic organizations.

 

National Institute of Standards and Technology Special Publication 800-30 Natl. Inst. Stand. Technol. Spec. Publ. 800-30, 54 pages (July 2002)

CODEN: NSPUE2

 

Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities,

materials, or equipment are necessarily the best available for the purpose.

 

 

 

SP 800-30 Page iv

Acknowledgements The authors, Gary Stoneburner, from NIST and Alice Goguen and Alexis Feringa from Booz Allen Hamilton wish to express their thanks to their colleagues at both organizations who reviewed drafts of this document. In particular, Timothy Grance, Marianne Swanson, and Joan Hash from NIST and Debra L. Banning, Jeffrey Confer, Randall K. Ewell, and Waseem Mamlouk from Booz Allen provided valuable insights that contributed substantially to the technical content of this document. Moreover, we gratefully acknowledge and appreciate the many comments from the public and private sectors whose thoughtful and constructive comments improved the quality and utility of this publication.

 

 

SP 800-30 Page iv

TABLE OF CONTENTS

1. INTRODUCTION…………………………………………………………………………………………………………………………….1 1.1 AUTHORITY ……………………………………………………………………………………………………………………………….1 1.2 PURPOSE……………………………………………………………………………………………………………………………………1 1.3 OBJECTIVE ………………………………………………………………………………………………………………………………..2 1.4 TARGET AUDIENCE …………………………………………………………………………………………………………………….2 1.5 RELATED REFERENCES………………………………………………………………………………………………………………..3 1.6 GUIDE STRUCTURE……………………………………………………………………………………………………………………..3

2. RISK MANAGEMENT OVERVIEW ……………………………………………………………………………………………….4 2.1 IMPORTANCE OF RISK MANAGEMENT ……………………………………………………………………………………………4 2.2 INTEGRATION OF RISK MANAGEMENT INTO SDLC ………………………………………………………………………….4 2.3 KEY ROLES ……………………………………………………………………………………………………………………………….6

3. RISK ASSESSMENT ……………………………………………………………………………………………………………………….8 3.1 STEP 1: SYSTEM CHARACTERIZATION …………………………………………………………………………………………10

3.1.1 System-Related Information………………………………………………………………………………………………….10 3.1.2 Information-Gathering Techniques ………………………………………………………………………………………..11

3.2 STEP 2: THREAT IDENTIFICATION……………………………………………………………………………………………….12 3.2.1 Threat-Source Identification ………………………………………………………………………………………………….12 3.2.2 Motivation and Threat Actions ………………………………………………………………………………………………13

3.3 STEP 3: VULNERABILITY IDENTIFICATION……………………………………………………………………………………15 3.3.1 Vulnerability Sources……………………………………………………………………………………………………………16 3.3.2 System Security Testing ………………………………………………………………………………………………………..17 3.3.3 Development of Security Requirements Checklist……………………………………………………………………..18

3.4 STEP 4: CONTROL ANALYSIS……………………………………………………………………………………………………..19 3.4.1 Control Methods ………………………………………………………………………………………………………………….20 3.4.2 Control Categories …………………………………………………………..

Order your essay today and save 10% with the discount code ESSAYHELP