Describe the components for creating an audit plan

Assignment Help Management Information Sys
Reference no: EM132046844

Worksheet : Intro to the NIST SP 800-53A

Assessing the Security Controls in Federal Information Systems and Organizations

Course Learning Outcome(s)

• Describe the components and basic requirements for creating an audit plan to support business and system considerations.

• Describe the parameters required to conduct and report on IT infrastructure audit for organizational compliance.

Auditing in IT is the monitoring and validation of safeguards that are put in place to protect information. These safeguards are categorized as controls. Controls are sets or groups of safeguards that relate to different areas within IT systems such as the implementation of security features in hardware and software, administrative processes such as written administrative polices and user agreements.

Controls are categorized into families which define the type of control to be complied to and classes. Classes include management, operational and technical.

ASSESSMENTS WITHIN THE SYSTEM DEVELOPMENT LIFE CYCLE

Security assessments can be effectively carried out at various stages in the system development life cycle to increase the grounds for confidence that the security controls employed within or inherited by an information system are effective in their application. Assessment activities in the initial system development life cycle phases include, for example, design and code reviews, application scanning, and regression testing.

Security weaknesses and deficiencies identified early in the system development life cycle can be resolved more quickly and in a much more cost-effective manner before proceeding to subsequent phases in the life cycle. The objective is to identify the information security architecture and security controls up front and to ensure that the system design and testing validate the implementation of these controls.

The assessment procedures described in Appendix F of the NIST SP 800-53A can support these types of technical assessments carried out during the initial stages of the system development life cycle.

Security assessments are also routinely conducted by information system owners, common control providers, information system security officers, independent assessors, auditors, and Inspectors General during the operations and maintenance phase of the life cycle to ensure that security controls are effective and continue to be effective in the operational environment where the system is deployed.

For example, organizations assess all security controls employed within and inherited by the information system during the initial security authorization. Subsequent to the initial authorization, the organization assesses the security controls (including management, operational, and technical controls) on an ongoing basis.

The frequency of such monitoring is based on the continuous monitoring strategy developed by the information system owner or common control provider and approved by the authorizing official.

As previously stated, organizations develop controls based on laws, regulations, best practices and industry standards. These controls are audited periodically to validate that processes are in place and working. This responsibility is that of the Auditor also referred to as the Security Control Assessor, who will independently validate these controls to ensure compliance and report the findings to higher authority.

The National Institute of Standards and Technology (NIST) has developed a series of specialized publications that layout the framework for the implementation, operation and management of information Technology. Controls can be found within the NIST Special Publication 800-53A which you can find in the Student Center under Additional Resources.

Refer to the Assessment Procedures in NIST Special Publication 800-53A and complete the following;

1. Complete the table below by determining the 18 Families and their corresponding Classes of controls as described in the NIST Special Publication 800-53 A:

Family

Class

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Reference no: EM132046844

Questions Cloud

Discuss about the future development of project management : Discuss about the Future development of project management.
How much is invested in stock x : A portfolio has an expected return of 13.4 percent. This portfolio contains two stocks and one risk-free security. The expected return on Stock X is 12.2.
Which has gotten much attention in the past year is the CFPB : Dodd-Frank is an act which is not, technically, fully written. One portion of this act which has gotten much attention in the past year is the “CFPB”.
Explain the meaning of a residual dividend policy : A position expressed in financial literature is that firms set their dividends as a residual after using income to support new investments.
Describe the components for creating an audit plan : Describe the components and basic requirements for creating an audit plan to support business and system considerations.
What would be the operating profit or loss with production : What would be the operating profit or loss associated with the production and sales of 443 swim trunks? The response must be typed.
What are the portfolio weights for a portfolio : What are the portfolio weights for a portfolio that has 190 shares of Stock A that sell for $95 per share and 165 shares of Stock B that sell for $126 per share
Find the maximum torque in shaft b : The shaft B carries a flywheel of mass 30 kg. If the radius of gyration of the flywheel is 100 mm, find the maximum torque in shaft B
What are the portfolio expected return : A portfolio has two assets; A & B. Asset A has an expected return of 5% and a standard deviation of return of 2%. Asset B, on the other hand.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd