Scottish Pride Scottish Pride Licensing System Risk Assessment Summary Report Version 1.00 February 17, 2015 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report DOCUMENT CONTROL Change Record Date Author Version Change Reference Quality Review History Date Reviewer Comments Approval Sign-off Name Role Page 2 of 57 Signature Date Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report Table of Contents 1 EXECUTIVE SUMMARY ................................................................................................................................5 1.1 1.1.1 1.1.2 1.1.3 1.2 1.3 2 INTRODUCTION ............................................................................................................................................ 13 2.1 2.2 3 SYSTEM DESCRIPTION................................................................................................................................. 20 SYSTEM ENVIRONMENT .............................................................................................................................. 23 INFORMATION SENSITIVITY ........................................................................................................................ 25 CONTROL ANALYSIS ................................................................................................................................... 26 5.1 6 RISK ASSESSMENT OBJECTIVE .................................................................................................................... 14 GOAL .......................................................................................................................................................... 15 RISK ASSESSMENT PROCESS ....................................................................................................................... 16 PHASE I ....................................................................................................................................................... 17 PHASE II...................................................................................................................................................... 18 PHASE III .................................................................................................................................................... 19 SYSTEM IDENTIFICATION ......................................................................................................................... 20 4.1 4.2 4.3 5 PURPOSE ..................................................................................................................................................... 13 SCOPE ......................................................................................................................................................... 14 RISK ASSESSMENT APPROACH ................................................................................................................ 14 3.1 3.2 3.3 3.4 3.5 3.6 4 TOP VULNERABILITY LIST ............................................................................................................................7 DISASTER AND CONTINGENCY PLANNING ....................................................................................................7 INCIDENT RESPONSE TRAINING AND TESTING ..............................................................................................8 VULNERABILITY SCANNING ..........................................................................................................................9 ORGANIZATION COMPLIANCE ..................................................................................................................... 10 NON-COMPLIANCE REPORT ........................................................................................................................ 10 BASELINE SECURITY CONTROL GAP SUMMARY ......................................................................................... 28 RISK CALCULATION .................................................................................................................................... 32 6.1 6.2 6.3 6.4 6.5 6.6 6.7 6.8 6.9 IDENTIFICATION OF VULNERABILITIES........................................................................................................ 32 IDENTIFICATION OF THREATS ..................................................................................................................... 32 IDENTIFICATION OF RISKS ........................................................................................................................... 32 CORRELATION OF RELEVANT CONTROLS.................................................................................................... 32 RISK LIKELIHOOD DETERMINATION ........................................................................................................... 33 IMPACT ANALYSIS ...................................................................................................................................... 33 RISK DETERMINATION ................................................................................................................................ 34 RECOMMENDATIONS ................................................................................................................................... 34 SPLA RISK MATRIX ................................................................................................................................... 34 APPENDIX A – CONTROL CATEGORY DESCRIPTION ................................................................................ 51 APPENDIX B – GLOSSARY ................................................................................................................................... 52 APPENDIX H – LAWS, REGULATIONS, AND GUIDANCE ............................................................................ 54 APPENDIX I – RISK BASED DECISION DOCUMENTS................................................................................... 57 Page 3 of 57 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report LIST OF TABLES Table 1: IT System Inventory and Definition Document .................................................................................... 23 Table 2: Scottish Pride Licensing Application System Specifics........................................................................ 24 Table 3: Server Categorization ............................................................................................................................... 25 Table 4: Scottish Pride Licensing Application Information Sensitivity ............................................................ 25 Table 5: High-level Security Controls Status Summary ..................................................................................... 27 Table 6: Baseline Security Controls Gap Summary ............................................................................................. 28 Table 7: Threats Identified in IT ............................................................................................................................. 32 Table 8: Risk Likelihood Definitions ..................................................................................................................... 33 Table 9: Risk Impact Rating Definitions ............................................................................................................... 33 Table 10: Overall Risk Rating Matrix .................................................................................................................... 34 LIST OF FIGURES Figure 1: Figure 2: Figure 3: Figure 4: Figure 5: Figure 6: Figure 7: NIST-SP800-53 Non-Compliance .......................................................................................................... 11 NIST-SP800-53 Non-Compliance By Control Family ......................................................................... 12 NIST-SP800-53 Compliance by Control Family .................................................................................. 12 Step 4 of the Risk Management Framework is In-Scope for this Project ......................................... 15 North Highland Phase Approach ......................................................................................................... 17 Scottish Pride Licensing Application Server Configuration .............................................................. 23 Scottish Pride Licensing Application Basic Network Diagram ........................................................ 23 Page 4 of 57 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report 1 EXECUTIVE SUMMARY This report documents results of the risk assessment of the Scottish Pride Licensing Application (SPLA) for Scottish Pride Information Services (IT). The risk assessment was conducted by the Information Technology (IT) Department to satisfy the best practice recommendations of the Agency for State Technology (AST). Specifically, AST recommends agencies perform and document such an assessment on sensitive IT systems annually, or whenever a significant change is made to a sensitive system. This risk assessment describes vulnerabilities, threats, and risks to which SPLA is exposed, derived from the Information Technology (IT) Department’s observations, interviews, and documentation reviews regarding SPLA. The report also assigns a likelihood, impact, and overall rating to each risk, based on the methodology described within the report, and makes recommendations for mitigation of each risk, based on Information Technology (IT) Department’s independent analysis. This report documents the risks that pertain to SPLA at the time the assessment was conducted, and, as such constitutes a snapshot in time of SPLA. It is intended to be used, along with the SPLA Plan of Action and Milestone (POA&M) and Continuous Monitoring Plan risk to develop enterprise-wide plans for the further mitigation of risks to SPLA. The plan should be commensurate to the sensitivity of the data, and the extent of the risks. It does not constitute, nor does it seek to constitute, an overall assessment of the functionality of SPLA, nor of the knowledge, skills, and abilities, or professionalism of the staff charged with its development, maintenance, and operation. The risk assessment was performed in accordance with the methodology described in NIST SP 800-53 Revision 3 Recommended Security Controls for Federal Information Systems and NIST SP 800-30 and Risk Management Guide for Information Technology Systems. Also, Information Technology (IT) Department conducted interviews with IT and Scottish Solutions staff to identify components and functions of SPLA. This methodology is detailed further in the NIST Risk Management Framework. By following the NIST SP-800-53 method, IT has already made information-protection improvements based on risks to the confidentiality, integrity, and availability of critical information technology assets. The Information Technology (IT) Department’s analysis team conducted a knowledge base questionnaire with staff, providing information on controls, control objectives for federal/government standards and regulations. The questionnaires were mapped to the 11 fundamental elements of Information Security, to controls within Information Security requirements identified in NIST SP 800-53, NIST SP 800-122, HIPAA, GLBA, Sarbanes-Oxley Act, California SB-1386 and USA Patriot Act, thereby acting as an interface between these myriad of information security requirements. The results Page 5 of 57 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report indicated that the agency’s SPLA system overall is 93% compliant in meeting NIST Standard 800-53 Revision 3 Recommended Security Controls for Federal Information Systems. Overview of Risk Assessment Results Overall, the agency is managing risks that affect SPLA system in an appropriate manner. The risk assessment found no evidence of compromise of the confidentiality, integrity, or availability of SPLA and the sensitive data in handles. In addition, the staff including both employees and Scottish Solutions contractors is exceptionally dedicated and able. Appropriate management of risks to the confidentiality, integrity, and availability of sensitive data is a primary consideration in the development, maintenance, and operation of SPLA. The risk assessment documented by this report, however, did identify nine (9) risks associated with SPLA, associated primarily with a single type of control weakness. An industry-standard methodology for categorizing controls to mitigate risks describes these controls as being of one of three types: 1. Management controls, which are policies adopted by the senior management to describe actions and behaviors required to achieve the desired reduction in risk; 2. Operational controls, which are processes and procedures implemented to put policies described by management controls into practice; and 3. Technical controls, which are executed by computer system to enforce management and operational controls, and provide automated protection from unauthorized access or misuse, facilitate detection of security violations, and support security requirements for applications and data. The risk assessment of SPLA found management and technical controls applied to SPLA are for, all in all, adequate. The majority of risks identified in the body of this report are associated with weaknesses in operational controls. These may controls that are informal and are not fully documented. This association of the majority of SPLA risks with operational control weaknesses is especially important in light of the relatively small size and high utilization of the staff and Scottish Solutions contractors. In this environment, the likelihood of overlooking an informal or undocumented process or procedure under customer, service-level, or deadline pressures is high, and can inadvertently expose sensitive data to risk of compromise. As part of its enterprise risk mitigation strategy, a relatively modest investment in formalizing and documenting operational would yield value for IT in more comprehensive risk mitigation far beyond its cost. Page 6 of 57 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report For the staff, implementation of AST best practices identified in 71A-1, F.A.C, “Florida Information Resource Security Policies and Standards.” http://Rule 71A-1, F.A.C., Florida Information Technology Resource Security Policies and Standards.pdf is recommended to assure effective use and compliance. The results of this Risk Assessment indicate that IT must place the highest priority on the recommendations, remediation requirements outlined in the Plan of Action & Milestones (POA&M) and implement new controls that would enable IT to monitor compliance to their security and privacy objectives. 1.1 Top Vulnerability List The list below contains the “Top Vulnerabilities” findings, weaknesses, or vulnerabilities discovered during the site security assessment. 1.1.1 Disaster and Contingency Planning Observation: IT will benefit from developing a Disaster Contingency Plan. The plan should detail procedures to provide an effective response to disruptions and natural disasters by explicitly indicating the intended disruption/disaster coverage. IT should include a management structure for business continuity training and testing within the agency as defined in CP-3 Contingency Training and CP-4 Contingency Plan Testing and Exercises. There are no provisions identified in the Southwood Shared Resource Center (SSRC) Service Level Agreement (SLA) pertaining to SPLA operations and recovery. Best Practices: Whether SPLA processes or stores sensitive date, the requirement for a disaster and contingency plan impacts the availability of the system. In the case of SPLA externally facing the public, the public will demand that it be available 7 by 24. Internally, availability will impact on IT capability to carry out its mission. In both cases a disaster and contingency plan are a necessity to the image of IT in maintaining public trust Risk: If a disaster and contingency plan are not in place, tested, and staff trained, then public and employee trust could be lost resulting in embarrassing media attention and state government officials. IT may not be able to sustain or resume communications and IT functions that support critical business operations and essential constituent services within a specified period of time. Recommendation: IT should implement and support an appropriate information technology business continuity program to ensure the timely delivery of critical automated business services to the State’s citizens. IT has primary leadership responsibility to identify information technology risks and to determine what Page 7 of 57 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report impact these risks have on SPLA business operations. IT should also plan for business continuity, including disaster recovery, based on these risks and document continuity and recovery strategies and procedures in a defined business continuity plan that is reviewed, approved, tested and updated on an annual basis. IT management and information custodians must ensure that business continuity and disaster recovery plans are developed, maintained, tested on a prescribed basis and subjected to a continual update and improvement process. Train, Test and/or exercise the contingency plan for SPLA at least annually using defined training awareness and tests and/or exercises to determine the plan's effectiveness and the agency's readiness to execute the plan. Once per quarter, a testing team should evaluate a random sample of system backups by attempting to restore them on a test bed environment. The restored systems should be verified to ensure that the operating system, application, and data from the backup are all intact and functional. 1.1.2 Incident Response Training and Testing Observation: The agency does not implement incident response training as defined in IR-2 Incident Response Training. Best Practices: IT has a program in place that allows for reporting security incidents. However, not providing formal training and testing may lead to internal and external breaches occurring as a result of unauthorized people being granted improper access or intrusions being made to both the software and equipment. AST best practices require that an Agency Form Security Incident Report, be completed. These security incidents then must be tracked and corrective action taken. Risk: Failure to provide formal training and testing to document, assess, and take corrective action on security incidents that arise may cause serious security exposures. Included in these are (1) potential damage to the system or information contained within it; and (2) violation of privacy rights. These type of incidents need to be evaluated for the possible loss of confidentiality, loss of data integrity, denial of service, and the risk they present to the agency in terms of public and employee trust. Recommendation: After defining detailed incident response procedures, the incident response team should develop and engage in periodic scenario based training and testing, working through a series of attack scenarios fine tuned to the threats and vulnerabilities the agency faces. These scenarios help ensure that team members Page 8 of 57 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report understand their role on the incident response team and also help prepare them to handle incidents. 1.1.3 Vulnerability Scanning Observation: The agency has not implemented vulnerability scanning and penetration testing as defined in RA-5 Vulnerability Scanning. Best Practices: IT should conduct vulnerability scans to ascertain vulnerabilities inside the network perimeter demilitarized zone (DMZ). The overall objective is to identify potential vulnerabilities within the internal network and weaknesses in controls in place to prevent and/or detect their exploitation by a hacker/malicious employee/contractor who may obtain unauthorized access to information resources or cause system disruption or a system outage. Risk: Failure to conduct formal vulnerability scanning and penetration testing does not allow the agency to identify potential vulnerabilities within the internal network and weaknesses in controls in place to prevent and detect their exploitation by a hacker/malicious employee/contractor who may obtain unauthorized access to information resources or cause system disruption or a system outage. Recommendation: Penetration tests and vulnerability assessments should be performed annually or immediately after system upgrades to verify that unauthorized connections and systems changes have not been made. Regular penetration tests identify vulnerabilities and attack vectors that can be used to exploit enterprise systems successfully. Penetration testing should occur from outside the network perimeter as well from within its boundaries to simulate both outsider and insider attacks. Page 9 of 57 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report 1.2 Organization Compliance By integrating all the various requirements into a compliance matrix, the IT analysis team was able to determine the extent of non-compliance and make appropriate recommendations. The IT analysis team used an integrated compliance health check solution tool for the myriad of information security requirements in the IT. The IT analysis team used a unique way to process all information security requirements for risk assessment and present the results as a comprehensive report of areas in which the IT may have failed regulatory compliance. The Compliantz tool the IT analysis team used consists of a knowledge base, providing information on controls, control objectives for federal/government standards and regulations. The IT analysis team then mapped the 11 fundamental elements of Information Security, to controls within Information Security requirements, such as ITO 27002 / ITO 27001, NIST SP 800-53, NIST SP 800-122, HIPAA, GLBA, Sarbanes-Oxley Act, California SB-1386 and USA Patriot Act, thereby acting as an interface between these myriad of information security requirements. Compliantz is predicated on the Plan-Do-Check-Act methodology (established over 50 years ago in Japan). 1. Plan: Gap analysis and mapping tool for highlighting areas of security exposure and evaluating IT’s state of readiness for compliance or certification. 2. Do: Rate IT’s state of readiness. This rating is presented in actual percentage terms. 3. Check: Perform benchmarking, also known as a verification audit or gap analysis which entails a process of comparing IT’s current information security management system, if any, to ITO 27002 / ITO 27001, NIST SP 800-53, NIST SP 800-122, HIPAA, GLBA, Sarbanes-Oxley Act, California SB-1386 and USA Patriot Act, elements, identifying any non conformities in SPLA and recommending how to bring them into conformance with these elements. 4. Act: Based on answers received from questions, Compliantz determines if IT is required to comply with these standards and where they may be deficient. 1.3 Non-Compliance Report Standard: National Institute of Standards and Technology (NIST) Page 10 of 57 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report Owner: U.S Department of Commerce Type: Regulatory Effective date: October 2010 Industry: Federal Penalties: Litigation Penalty Types: Federal The Information Technology Laboratory (ITIL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analyses to advance the development and productive use of information technology. ITL’s responsibilities include the development of management, administrative, technical, and physical standards and guidelines for the cost-effective security and privacy of non-national security-related information in Federal information systems. NIST-SP800-53: Revision 3 Non-Compliance Report for SPLA Overall Rating: 7% Figure 1: NIST-SP800-53 Non-Compliance Page 11 of 57 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report Figure 2: NIST-SP800-53 Non-Compliance By Control Family Figure 3: NIST-SP800-53 Compliance by Control Family Page 12 of 57 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report 2 INTRODUCTION A Risk Assessment is an important tool for Information Technology (IT) managers to use in evaluating the security of the IT systems that they manage, and in determining the potential for loss or harm to organizational operations, mission, and stakeholders. The risk assessment provides management with the capability to: Provide an adequate level of security protection for IT applications and systems Meet Federal, State, and SPLA requirements for information and system security Satisfy oversight organizations Establish an acceptable level of risk Risk can never be totally eliminated, but can be minimized by the application of IT security controls. The decision as to what level risk will be accepted will be based on management review of the identified IT security controls needed to mitigate risk versus the potential impact of implementing those controls on available resources and system operations. The Risk Assessment identifies the current level of risk for the SPLA application and provides risk mitigation recommendations for management review. The Risk Assessment serves as the primary access control function for numerous critical applications and the loss of system availability and/or integrity that could have a debilitating impact on the agency’s mission. The sensitivity level of the system and of the information stored within, processed by, or transmitted by the SPLA system reflects the value of the system to the agency. The sensitivity level has been used as the basis for implementing the necessary IT security controls for SPLA. This risk assessment describes SPLA vulnerabilities and associated threats based on executive, legislative, departmental, and technical guidelines. The Scottish Pride Security Program, establishes the policy, as well as organizational and management responsibility to implement the necessary controls. The security risk assessment methodology is adapted from National Institute of Standards and Technology (NIST) Risk Management Guide for Information Technology Systems, Special Publication 800-30. 2.1 Purpose The purpose of this report is to provide the CIO with an assessment of the adequacy of the management, operational and technical security controls that are currently in place to secure SPLA. This risk assessment report identifies threats and vulnerabilities applicable to SPLA. It also evaluates the likelihood that vulnerability can be exploited, assesses the impact associated with these threats and vulnerabilities, and identifies the overall risk level. This report documents risk assessment activities conducted by IT Page 13 of 57 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report personnel from 1-14-2015 to 1-30-2015, and will help the CIO understand risks to SPLA resources. 2.2 Scope The scope of this risk assessment assessed SPLA’s use of resources and controls (implemented or planned) to eliminate and/or manage vulnerabilities exploitable by threats internal and external to IT. If exploited, these vulnerabilities could result in: Unauthorized disclosure of data Unauthorized modification to the system, its data, or both Denial of service, access to data, or both to authorized users This Risk Assessment Report evaluates the confidentiality (protection from unauthorized disclosure of system and data information), integrity (protection from improper modification of information), and availability (loss of system access) of SPLA. Recommended security safeguards will allow management to make decisions about security-related initiatives. 3 RISK ASSESSMENT APPROACH 3.1 Risk Assessment Objective The objective of the project is to assess the security controls using appropriate methods and procedures to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the SPLA system. IT has completed Steps 1, 2, and 3 of the 6-step Risk Management Framework. This project will continue the agency path towards implementing steps 1 through 6 enabling them to become compliant with AST’s best practices. Step 4 is in scope for this project. IT shall review results of Step 4 of the Risk Management Framework and implement appropriate security controls that are cost effective in the reduction or elimination of identified risks to SPLA. NIST SP 800-30 Risk Management Guide for Information Technology Systems sp800-30.pdf and NIST SP 800-53 Revision 3 Recommended Security Controls for Federal Information Systems sp800-53-rev3-final.pdf are hereby incorporated by reference. Page 14 of 57 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report STEP 1 STEP 2 STEP 3 CATEGORIZE Information Systems SELECT Security Controls IMPLEMENT Security Controls FIPS 199/SP 800-60 FIPS 200/SP 800 -53 SP 800 Series Define category of information system according to potential impact of loss Select minimum security controls (i.e., safeguards and countermeasures) planned or in place to protect the information system Implement security controls in new or legacy information systems; implement security configuration checklists STEP 6 STEP 5 STEP 4 MONITOR Security Controls AUTHORIZE Information Systems ASSESS Security Controls SP 800 -53A SP 800-37 Continuously track changes to the information system that may affect security controls and assesses control effectiveness Determine risk to operations , assets , or individuals and, if acceptable, authorizes information system processing SP 800-53A Determine extent to which the security controls are implemented correctly, operating as intended, and producing desired outcome with respect to meeting security requirements Figure 4: Step 4 of the Risk Management Framework is In-Scope for this Project 3.2 Goal The fundamental goal of this engagement is to: 1. Assess the current Scottish Pride Licensing Application (SPLA) to identify the information security risks. 2. Educate the CIO about the gaps identified and what is a requirement using National Institute Standards and Technology (NIST) standards to secure those gaps. 3. Provide documentation outlining the current security posture, the gaps that exist in the current security posture and why it is so important to improve the current posture where required. 4. Plan for improvement by developing a Plan of Action and Milestones (POA&M) for agency improvement and risk mitigation to reduce the risk. 5. Provide necessary baseline security information for use with future evaluations on an annual basis at a minimum or when major events dictate another complete evaluation. 6. Update the SPLA System Security Plans (SSP) with the Risk Assessment and Privacy Impact Assessment (PIA) results. Page 15 of 57 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report 3.3 Risk Assessment Process This risk assessment methodology and approach was conducted using the guidelines in NIST SP 800-53 Revision. 3 Recommended Security Controls for Federal Information Systems and Organizations http://csrc.nist.gov/publications/nistpubs/800-53-Rev3/sp800-53-rev3-final-errata.pdf The assessment is broad in scope and evaluates security vulnerabilities affecting confidentiality, integrity, and availability. The assessment recommends appropriate security safeguards, permitting management to make knowledge-based decisions about security-related initiatives. The methodology addresses the following types of controls: Management Controls: Management of the information technology (IT) security system and the management and acceptance of risk Operational Controls: Security methods focusing on mechanisms implemented and executed primarily by people (as opposed to systems), including all aspects of physical security, media safeguards, and inventory controls Technical Controls: Hardware and software controls providing automated protection to the system or applications (Technical controls operate within the technical system and applications.) North Highland’s approach to the Risk Assessment is divided into three phases. Phases were be defined as Identification and Analysis, Plan of Action & Milestones, and Update System Security Plan and were be performed as outlined in NIST SP 800-30 Risk Management Guide for Information Technology Systems sp800-30.pdf. . Page 16 of 57 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report PHASE I - Identification and Analysis •Data Collection •Document Review •Threat Identification •Vulnerability Identification •Risk Determination •Risk Mitigation Recommendations PHASE II - Plan of Action and Milestones •Identify IT Security Weakness •Analyze Weakness Risk Level •Document Weakness Risk Acceptance and Decision •Identify Corrective Action Options and Funding Required •Determine Funding Availability and Weakness Prioritization •Estimate Completion Date •Document Weakness and Corrective Action Plan PHASE III - Update System Security Plan •Document Privacy Impact Analysis •Document Risk Assessment Results •Validate System Categorizations •Update FIPS-199 (if Necessary) •Develop new SSP (if Necessary) Figure 5: North Highland Phase Approach 3.4 Phase I The overall objective of Phase I was to gather information regarding SPLA. North Highland analyzed all system information and documented the results in the Plan of Action & Milestones, System Security Plan, and this Risk Summary Report prioritizing recommended solutions. North Highland evaluated the existing security policies to compare them to the policies outlined in NIST standards. This involved determining whether a policy exists or another policy within the Agency covers the areas outlined in the NIST standards. It also involves structuring both the set of security policies, as well as the content contained within the documents themselves. The IT analysis team used an integrated compliance health check solution tool from eFortresses Inc. for the myriad of information security requirements in SPLA. The analysis team used this tool to conduct a knowledge base questionnaire with staff, providing information on controls, control objectives for federal/government standards and regulations. Phase I was divided into pre-assessment and assessment steps. Page 17 of 57 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report Step 1: Data Collection The data collection phase included identifying and interviewing key personnel within the agency with a compliance health check questionnaire and conducting document reviews. Interviews focused on the SPLA operating environment. Documented reviews provided the risk assessment team with the basis on which to evaluate compliance with policy and procedure. Step 2: Document Review The assessment phase began with the review of documents provided by the members of the SPLA system team. Detailed interviews with members of the SPLA system team allowed completion of the system questionnaire and identification of specific threats. Step 3: Threat Identification The IT analysis team used NIST SP 800-30 as a basis for threat identification. Through the interview process, the team also identified “most likely” system and locationspecific threats. Step 4: Vulnerability Identification The IT analysis team developed a list of system vulnerabilities (flaws or weaknesses) that could be exploited by the potential threat vectors. The IT analysis team used NIST SP 800-53; Revision 3 to document vulnerabilities extracted from interviews and documents, and listed them by category. Step 5: Risk Determination The IT analysis team determined the degree of priority risk to SPLA. The IT team identified any residual risk and documented them in the SSP. Step 6: Risk Mitigation Recommendations During this step of the process, controls that could mitigate or eliminate the identified risks, as appropriate to IT’s operations, were provided. The goal of the recommended controls is to reduce the level of risk to the SPLA and its data to an acceptable level. 3.5 Phase II The overall objective in Phase II was to create a separate Plan of Action & Milestones (POA&M) for the SPLA. A POA&M is a tool that identifies tasks that need to be accomplished to meet best practices in the draft Florida Information Technology Resource Security Policies and Standards identified in 71A-1.001, F.A.C. It details resources required to accomplish the elements of the plan, any milestones in meeting the task, and scheduled completion dates for the milestones. Page 18 of 57 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report 3.6 Phase III The overall objective in Phase III was to update the SPLA System Security Plan. The Privacy Impact Assessment identified in Appendix D was updated with risk assessment analysis results and the results of the Risk Assessment are documented in the System Security Plan in section 2.7 depicting priority risks to SPLA in the areas of Management, Operational, and Technical. The SPLA FIPS-199 System Categorization document was updated accordingly. Page 19 of 57 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report 4 SYSTEM IDENTIFICATION 4.1 System Description IT System ID Owned By System Responsibility Physical Location Major Business Function IT System Inventory and Definition Document I. IT System Identification and Ownership IT System None Scottish Pride Licensing Application (SPLA) Common Name Department of Children and Families Information Services (IT) Scottish Pride is the responsible agency and owns the system, the data it contains, and controls the use of the data. Scottish Solutions is under contract to develop and provide maintenance to the system and support Continuity of Operations Planning. Scottish Pride, Inc. 1317 Pinewood Blvd. Bldg 6 Tallahassee, Florida 32399 Southwood Shared Resource Center (SSRC) Scottish Solutions 1650 Highland Glen Drive, Suite 101 Tallahassee, Florida 32317 SPLA is used to maintain child care licensing data for the Scottish Pride. The information system includes 12 modules for maintaining child care provider, personnel and inspection data. In addition to Scottish Pride, several other departments or agencies use SPLA as a primary repository for their child care related data. System Owner Scottish Pride CIO System Scottish Pride Program Project Phone Number Deborah McLeod Administrator(s Manager ) 1317 Pinewood Blvd. Bldg 6 Robert Berrie Phone Number 897 East Venice Ave Tallahassee, Florida 32399 Main : 850.588.4900 Venice, Florida 34285 Fax : 850.588.9584 Direct : 941.586.2575 Email: Fax : 941.586.2505 [email protected] Email: [email protected] Internet : www.spla.com Data Owner(s) Scottish Pride CIO Data Program Business Analyst Phone Custodian(s) Deborah McLeod Kim McDonald Number(s) Phone 1317 Pinewood Blvd. Bldg 6 1317 Pinewood Blvd. Bldg 6 Number(s) Tallahassee, Florida 32399 Tallahassee, Florida 32399 Main : 850.588.4900 Main : 850.588.1315 Fax : 850.588.9584 Fax : 850.588.9584 Email: Email: [email protected] [email protected] Page 20 of 57 Scottish Pride, Inc. Information Services Security Contact(s) Phone Number(s) Information Security Manager Other Relevant Information IT System Description and Components Scottish Pride Licensing Application Risk Summary Report IT System Inventory and Definition Document Security Scottish Pride CIO Scottish Solutions Security Contact(s) Deborah McLeod Manager Phone 1317 Pinewood Blvd. Bldg 6 Doug McCoy Number(s) Tallahassee, Florida 32399 1317 Pinewood Blvd. Bldg 6 Main : 850.588.4900 Tallahassee, Florida 32399 Fax : 850.588.9584 Main : 850.588.9534 Email: Email: [email protected] [email protected] Scottish Pride Information Security Manager Fred Mclean Scottish Pride, Inc. 1940 Argyll Street Tallahassee, FL 32399-1027 Main : 850.587.8161 Email: [email protected] None II. IT System Boundary and Components SansWrite Client software is used on portable computers to collect inspection results while at licensed child care facilities and family day care homes The SansWrite Middleware enables licensing staff to submit completed inspection to a centralized database and receive updates to provider and personnel data The SansWrite Web Portal allows public and private access to provider, demographic and inspection data via PDF files and statistical reports Administrative staff can add and/or update licensed or registered providers using a secure web application The public can access provider information and inspection reports using a variety of different search criteria The public can access maps that show where a provider is located and identifies other providers in the same vicinity Child Care Licensing Supervisors can access a variety of different management and staff performance reports IT can access statistical, performance and trend reports to help determine or access the quality of child care throughout the State of Florida IT uses a specialized private web portal for tracking Gold Seal Providers In addition to Scottish Pride, Brevard County, Broward County, Hillsborough County, Pinellas County, Palm Beach County, Sarasota County, Resource and Referral organization use SPLA as their primary data repository and/or access child care related data Six counties use SPLA as an extension of their local information systems. Data from the local information systems is synchronized with Scottish Pride on a nightly basis Page 21 of 57 Scottish Pride, Inc. Information Services IT System Interfaces IT System Boundary System Environment Agency or Organization Scottish Pride Licensing Application Risk Summary Report IT System Inventory and Definition Document Resource and Referral organization access SPLA to retrieve data on licensed child care facilities, licensed family day care homes and registered family day care homes Scottish Pride uses SPLA to record and track information for Voluntary Prekindergarten (VPK) providers SPLA does not interface with any other systems. The boundaries of the system are the Dell PowerEdge 2800, 2900, 2950, Hyper-V Host Server, and SansWrite Database servers and the Oracle applications on the client desktops. System URL: https://Scottish Pridesanswrite.state.fl.us/SPLA/Administration Licensing URL: https://Scottish Pridesanswrite.state.fl.us/SPLA/Provider Gold Seal URL: https://Scottish Pridesanswrite.state.fl.us/GoldSeal VPK URL: https://Scottish Pridesanswrite.state.fl.us/VPK/Administration III. IT System Interconnections (add additional lines, as needed) IT System Name IT IT System Interconnection Security System Owner Agreement Status ID None IV. IT System and Data Sensitivity (add additional lines, as needed) Type of Data Sensitivity Ratings Include Rationale for each Rating Confidentiality Integrity Availability Name Moderate Moderate Moderate Address Moderate Moderate Moderate Phone Moderate Moderate Moderate Date of Birth Moderate Moderate Moderate Email address Moderate Moderate Moderate SSN (encrypted) Moderate Moderate Moderate As required by the AEIT best practices), IT will conduct a self-assessment of this IT system annually and conduct another full Risk Assessment no later than three years from the date of this report, or sooner if required by significant changes to this IT system and/or its operating environment. These Sensitivity Ratings will be re-evaluated as part of each self-assessment and Risk Assessment, and this table will be updated as required. Overall IT System Sensitivity Rating for the Scottish Pride Licensing Application Must be “high” if sensitivity of any data type is rated “high” on any criterion Overall IT System HIGH MODERATE LOW Sensitivity Rating SPLA System Classification and Classification Must be “Sensitive” if overall sensitivity is “high”; consider as “Sensitive” if overall for SPLA sensitivity is “moderate” SENSITIVE NON-SENSITIVE Page 22 of 57 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report Table 1: IT System Inventory and Definition Document 4.2 System Environment System - SPLA Type - DELL PowerEdge 2950 (17.5" W x 3.5" H ) Server Name Property Tag # - 30311115 IP address(es) – 402.90.30.215, 402.90.30.216 & 402.90.30.217 Serial # TTT945K1 State Tag # 33250311216 Type - Web Portal & Middleware Other info – Runs VMware Location – CS14502 System - SPLA Type - DELL PowerEdge 2900 ( 9 " W x 18.75" H ) Server Name Property Tag # IP address(es) – 199.240.36.128 Back up – 192.163.90.122 Type - Database Serial # JG18543FD1 State Tag # 2034510374 Location – CS13309 System - SPLA Type - DELL PowerEdge 2800 ( 9.1 " W x 17.6 " H ) Server Name Property Tag # IP address(es) – 204.90.20.58 Back up - 192.161.70.66 Serial # 4K1442391 State Tag # 2034409277 Type - Web Portal & Middleware Other Info – 32 bit, very old and will be replaced and used as back up. Location – CS17702 Will be pulled from the Data center Figure 6: Scottish Pride Licensing Application Server Configuration <INSERT SPLA NETWORK DIAGRAM> Figure 7: Scottish Pride Licensing Application Basic Network Diagram Page 23 of 57 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report Scottish Pride Licensing Application Specifics System Environment System URL: Licensing URL: https://Scottish Pridesanswrite.state.fl.us/SPLA/Administration https://Scottish Pridesanswrite.state.fl.us/SPLA/Provider Gold Seal URL: https://Scottish Pridesanswrite.state.fl.us/GoldSeal VPK URL: Technology https://Scottish Pridesanswrite.state.fl.us/VPK/Administration Standards Used xhtml (eXtended Hyper Text Markup Language) www.w2.org/RR/xhtml1/ All web pages are xhtml compliant. This standard uses the markup of HTML pages while enforcing the standards of XML documents xml (eXtensable Markup Language) www.w3.org/XML/ Industry Standard for transmitting data PDF (Portable Document Format) www.adobe.com Used throughout the system to give the users and administrators forms in a printable, non-editable, industry standard format SQL (Structured Query Language) www.iso.com (documentation of standard is not free, must be purchased) Used to interface with the database JavaScript (Scripting language based on Livescript) www.ecmainternational. org/publications/ Ecma262.htm Used on web pages for value checking and visual manipulation Web Services Used to exchange data between systems. ASP.NET (Active Server Pages) www.microsoft.com Used to provide data entry functionality via the Web Portal Implementation Standards IIT (Internet Information Server 6.0) www.microsoft.com Used to host the SPLA Web Portal. Serves up static web pages and redirects interactive pages to the application server .Net 1.1, 2.0 www.microsoft .com provides the application framework Oracle Database 10 g www.oracle.com, Scottish Pride choice for the SPLA data repository Windows Server 2003 Standard Edition Table 2: Scottish Pride Licensing Application System Specifics Page 24 of 57 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report 4.3 Information Sensitivity Table 3 below describes the categorization for each SPLA server located in the Southwood Shared Resource Center (SSRC). Table 4 describes the information system categorization for SPLA and will be inserted into the System Security Plan. For SPLA, the potential impact values assigned to the respective security objectives (confidentiality, integrity, availability) are the highest values (i.e., high water mark) from among those security categories that have been determined for each type of information that resides on SPLA. The System Owner and Scottish Solutions project manager have identified this system as Moderate from Table 4 below risk in accordance with FIPS-199. The system has been deemed critical and directly impacts the agency’s major mission. SECURITY OBJECTIVE (RANKING – LOW, MODERATE, HIGH) Server Dell PowerEdge 2900 Dell PowerEdge 2950 Confidentiality Integrity Availability Moderate Moderate Moderate Moderate Low Low Security Category (sc) Moderate Moderate Table 3: Server Categorization Ranking (Low, Moderate, High) Security Objective Confidentiality Moderate Integrity Moderate Availability Security Category (SC) = Low Moderate Table 4: Scottish Pride Licensing Application Information Sensitivity Page 25 of 57 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report 5 CONTROL ANALYSIS Table 5 provides a high-level summary by control category of how SPLA complies with the security controls articulated in NIST SP 800-53 Rev. 3 Recommended Security Controls for Federal Information Systems. Legend: In Place – the control is fully applied and the control requirements have been fully met. Partially In Place – The control has been partially applied and some aspects of the control requirements have not been met. Planned – The control is not in place and there is a planned activity to implement the control. Not Applicable – The control does not directly apply to the information system. The system either does not perform the functions described by the control, or does not possess the technology for which the control is required. Risk Based Decision – The control is not in place and there has been a decision reached not to put the control in place based on risk factors. [ ] – Indicates the number of controls that are in place, partially in place, planned, not applicable to the control family, and risk based decisions identified. Page 26 of 57 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report Table 5: High-level Security Controls Status Summary Control Category In Place Partially In Place Planned Not Applicable Management Controls 1 Risk Assessment [3] 2 Planning [5] 3 System and Services Acquisition [9] 4 Security Assessment and Authorization [6] 5 Program Management [9] [1] [2] [2] Operational Controls 6 Personnel Security [4] [4] 7 Physical and Environmental Protection [ 18 ] 8 Contingency Planning [3] 9 Configuration Management [8] [1] 10 Maintenance [5] [1] 11 System and Information Integrity [ 10 ] 12 Media Protection [6] 13 Incident Response [5] 14 Awareness and Training [4] [6] [1] [1] [2] Technical Controls 15 Identification and Authentication [7] [1] 16 Access Controls [ 14 ] [1] 17 Audit and Accountability [ 10 ] [1] 18 System and Communications Protection [ 16 ] Totals 142 [4] 12 Page 27 of 58 9 7 Risk Based Decision Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report 5.1 Baseline Security Control Gap Summary Table 6 provides a baseline security control gap summary by control category of how Scottish Pride Licensing Application complies with the security controls articulated in NIST SP 800-53 Revision 3 Recommended Security Controls for Federal Information Systems. Table 6: Baseline Security Controls Gap Summary Security Control RA-5 Risk Assessment (RA) Vulnerability Scanning (P1) The agency: Scans for vulnerabilities in the information system and hosted applications [Assignment: agency-defined frequency and/or randomly in accordance with agency-defined process] and when new vulnerabilities potentially affecting the system/applications are identified and reported Employs vulnerability scanning tools and techniques that promote interoperability among tools and automate parts of the vulnerability management process by using standards for: o Enumerating platforms, software flaws, and improper configurations o Formatting and making transparent, checklists and test procedures o Measuring vulnerability impact Analyzes vulnerability scan reports and results from security control assessments Remediates legitimate vulnerabilities [Assignment: agencydefined response time] in accordance with an organizational assessment of risk Shares information obtained from the vulnerability scanning process and security control assessments with designated personnel throughout the agency to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies) Page 28 of 58 Control Status Gap Scottish Pride, Inc. Information Services CP-2 Contingency Planning (CP) Contingency Plan (P1) The agency: Develops a contingency plan for the information system that: o Identifies essential missions and business functions and associated contingency requirements o Provides recovery objectives, restoration priorities, and metrics o Addresses contingency roles, responsibilities, assigned individuals with contact information o Addresses maintaining essential missions and business functions despite an information system disruption, compromise, or failure o Addresses eventual, full information system restoration without deterioration of the security measures originally planned and implemented o Is reviewed and approved by designated officials within the agency Distributes copies of the contingency plan to [Assignment: agency-defined list of key contingency personnel (identified by name and/or by role and organizational element] Coordinates contingency planning activities with incident handling activities Reviews the contingency plan for the information system [Assignment: agency-defined frequency] Designated officials within the agency review and approve the contingency plan and distribute copies of the plan to key contingency personnel Revises the contingency plan to address changes to the agency, information system, or environment of operation and problems encountered during contingency plan implementation, execution, or testing CP-3 Scottish Pride Licensing Application Risk Summary Report Gap Communicates contingency plan changes to [Assignment: agency-defined list of key contingency personnel (identified by name and/or by role and organizational element] Contingency Training (P2) Gap The agency trains personnel in their contingency roles and responsibilities with respect to the information system and provides refresher training [Assignment: agency-defined frequency]. Page 29 of 58 Scottish Pride, Inc. Information Services CP-4 Contingency Planning (CP) Contingency Plan Testing and Exercises (P2) The agency: CP-7 Scottish Pride Licensing Application Risk Summary Report Tests and/or exercises the contingency plan for the information system [Assignment: agency-defined frequency] using [Assignment: agency-defined tests and/or exercises] to determine the plan’s effectiveness and the agency’s readiness to execute the plan Reviews the contingency plan test/exercise results and initiates corrective actions Alternate Processing Site (P1) The agency: Gap Gap Establishes an alternate processing site including necessary agreements to permit the resumption of information system operations for essential missions and business functions within [Assignment: agency-defined time period consistent with recovery time objectives] when the primary processing capabilities are unavailable Ensures that equipment and supplies required to resume operations are available at the alternate site or contracts are in place to support delivery to the site in time to support the agency-defined time period for resumption CP-8 Telecommunications Services (P1) The agency establishes alternate telecommunications services including necessary agreements to permit the resumption of information system operations for essential missions and business functions within [Assignment: agency-defined time period] hours when the primary telecommunications capabilities are unavailable. Gap CP-10 Information System Recovery and Reconstitution (P1) The agency provides for the recovery and reconstitution of the information system to a known state after a disruption, compromise, or failure. Gap Page 30 of 58 Scottish Pride, Inc. Information Services IR-2 (PII) IR-3 (PII) Scottish Pride Licensing Application Risk Summary Report Incident Response Incident Response Training (P2) The agency: Trains personnel in their incident response roles and responsibilities with respect to the information system Provides refresher training [Assignment: agency-defined frequency] Incident Response Testing and Exercises (P2) The agency tests and/or exercises the incident response capability for the information system [Assignment: agency-defined frequency] using [Assignment: agency-defined tests and/or exercises] to determine the incident response effectiveness and documents the results. Page 31 of 58 Gap Gap Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report 6 RISK CALCULATION 6.1 Identification of Vulnerabilities The identification of vulnerabilities for SPLA included interviews with the IT and Scottish Solutions staff, and the judgment and experience of the North Highland risk assessment team. 6.2 Identification of Threats The North Highland risk assessment team developed a standard list of threats in Table 7 below to consider in assessing risk to SPLA. This list is based on the judgment and experience of the North Highland risk assessment team, and its evaluation of the IT environment. Threats Pandemic Power Outage Embezzlement Fire (Major or Minor) Sabotage/Vandalism Software Failure Terrorism Tornados, Hurricanes, Blizzards Unauthorized Access or Use Air Conditioning Failure Bomb Threats Communication Failure Computer Crime Fire (Major or Minor) Flooding/Water Damage Hardware Failure Human Error Loss of Key Personnel Table 7: Threats Identified in IT 6.3 Identification of Risks Risks were identified for SPLA by matching identified vulnerabilities with credible threats that might exploit them. This pairing of vulnerabilities with credible threats is documented in the Risk Matrix table (see Section 6.9 Risk Matrix) columns labeled Vulnerability and Threat. All identified risks have been included. 6.4 Correlation of Relevant Controls Correlation of the threats identified above with the relevant IT security controls documented in Table 5: High-level Security Controls Status Summary (see page 28) and with other mitigating or exacerbating factors is documented in the Risk Matrix Table column labeled Analysis of Relevant Controls and Other Factors. Page 32 of 58 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report 6.5 Risk Likelihood Determination Table 8 below defines the risk likelihood matrix and definitions. Effectiveness of Controls Probability of Threat Occurrence (Natural Or Environmental Threats) or Threat Motivation and Capability (Human Threats) Low Moderate High High Low Low Low Moderate Low Moderate High Low Low High High Table 8: Risk Likelihood Definitions The columns labeled Risk Likelihood Evaluation and Risk Impact of the Risk Matrix Table (see Section 6.9 Risk Matrix) document evaluation of the effectiveness of controls, evaluation of the probability of threat occurrence, and evaluation of the threat motivation/capability of each threat to SPLA, along with its associated likelihood, as defined in Table 8 above. 6.6 Impact Analysis Table 9 documents the ratings used to evaluate the impact of risks. Magnitude of Impact High Moderate Low Impact Definition Occurrence of the risk: (1) may result in human death or serious injury; (2) may result in the loss of major IT tangible assets, resources or sensitive data; or (3) may significantly harm or impede the IT’s mission, reputation or interest. Occurrence of the risk: (1) may result in human injury; (2) may result in the costly loss of IT tangible assets or resources; or (3) may violate, harm or impede the IT’s mission, reputation or interest. Occurrence of the risk: (1) may result in the loss of some tangible IT assets or resources or; (2) may noticeably affect the IT’s mission, reputation or interest. Table 9: Risk Impact Rating Definitions Page 33 of 58 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report The columns labeled Risk Impact and Risk Impact Rating in the Risk Matrix Table (see Section 6.9 Risk Matrix) document the results of the impact analysis, including the estimated impact for each risk identified and the impact rating assigned to the risk. 6.7 Risk Determination Table 10 documents the criteria used in determining the overall ratings for risks to IT. This table is based both on the Overall Risk Rating Matrix on the Risk Level Matrix in the Risk Management Guide for Information Technology Systems, published by the National Institute of Standards and Technology (NIST) as NIST Special Publication (SP) 800-30. North Highland has augmented these matrices by defining a “moderate-high” overall risk rating to describe the intersection of moderate likelihood with high impact and of high likelihood with moderate impact. This augmentation is designed to assist IT in prioritizing its risk mitigation activities. Risk Impact Risk Likelihood Low Moderate High (10) (50) (100) High Low Moderate-High High (1.0) 10 x 1.0 = 10 50 x 1.0 = 50 100 x 1.0 = 100 Moderate Low Moderate Moderate-High (0.5) 10 x 0.5 = 5 50 x 0.5 = 25` 100 x 0.5 = 50 Low Low Low Low (0.1) 10 x 0.1 = 1 50 x 0.1 = 5 100 x 0.1 = 10 Risk Scale: Low (1 to 10); Moderate ( >10 to 50); High ( >50 to 100) Table 10: Overall Risk Rating Matrix The column labeled Overall Risk Rating in the Risk Matrix Table (see Section 6.9 Risk Matrix) identifies the overall risk rating for each of the risks to IT, as defined in Table 10 above. 6.8 Recommendations The final column labeled Recommendations in the Risk Matrix table (see Section 6.9 Risk Matrix) documents the mitigation strategy necessary to minimize the stated risk. 6.9 SPLA Risk Matrix Vulnerabilities, threats, and risks to SPLA are outlined on the following pages in the Risk Matrix table. Page 34 of 58 Scottish Pride, Inc. Information Services 1 Vulnerability Threat The agency has not implemented a SPLA Contingency Plan as defined in CP-2 Contingency Plan. Malicious Use, Human Error, Hardware Failure Scottish Pride Licensing Application Risk Summary Report Risk Of Compromise Risk Summary Availability of SPLA data Lack of documented processes could cause errors, facilitate unauthorized access, or inhibit recovery. Analysis Of Relevant Controls and Other Factors Undocumented, informal training procedures appear to be in place. The agency is not compliant with AEIT best practices. Risk Likelihood Evaluation Risk Likelihood Rating Limited documentation of contingency procedures make this risk likely to materialize. Moderate Risk Impact Because documentation of a contingency plan is ad hoc the impact of this risk is moderate. Risk Impact Rating Overall Risk Rating Moderate Moderate Recommendations Develop a contingency plan for SPLA that: A Contingency Plan for SPLA shall be consistent with NIST SP 800-34 Contingency Planning Guide for Federal Information Systems sp800-34-rev1.pdf Identifies essential mission and business functions and associated contingency; requirements. Addresses contingency roles, responsibilities, assigned individuals with contact information, and activities associated with restoring the system after a disruption, compromise. Is reviewed and approved by designated officials within the agency. Distribute copies of the contingency plan to a defined list of IT and Scottish Solutions key contingency personnel. Review the contingency plan at a minimum annually. Revise the contingency plan to address system/organizational changes or problems encountered during contingency plan implementation, execution, or testing. Communicate contingency plan changes to a defined list of IT and Scottish Solutions key contingency personnel. Page 35 of 58 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report Conduct capacity planning so that necessary capacity for information processing, telecommunications, and environmental support exists during crisis situations. Identify circumstances that can inhibit recovery and reconstitution of SPLA to a known, secure state and provide compensating controls to mitigate risk. Page 36 of 58 Scottish Pride, Inc. Information Services 2 Vulnerability Threat The agency does not implement SPLA contingency training as defined in CP-3 Contingency Training. Malicious Use, Human Error, Hardware Failure Scottish Pride Licensing Application Risk Summary Report Risk Of Compromise Risk Summary Availability of SPLA data Lack of a documented contingency plan, training, and formal testing could inhibit recovery. Analysis Of Relevant Controls and Other Factors Undocumented, informal training procedures appear to be in place. The agency is not compliant with AEIT best practices. Risk Likelihood Evaluation Risk Likelihood Rating Limited documentation of contingency training procedures make this risk likely to materialize. Low Risk Impact Because contingency plan training material is ad hoc the impact of this risk is low. Risk Impact Rating Overall Risk Rating Low Low Recommendations: Define in the System Security Plan, explicitly or by reference, the frequency of refresher contingency training and the frequency is at least annually Each review session should be documented and confirmed that appropriate training has been completed. All staff should be trained in the business recovery process. This is particularly important when the procedures are significantly different from those pertaining to normal operations. This training may be integrated with the training phase or handled separately. The training should be carefully planned and delivered on a structured basis. The training should be assessed to verify that it has achieved its objectives and is relevant for the procedures involved. Training may be delivered either using in-house resources or external resources depending upon available skills and related costs. The objectives and scope of the training activities should be clearly stated within the plan. The COOP and IT/DRP should contain a description of the objectives and scope of the training phase. This will enable the training to be consistent and organized in a manner where the results can be measured, and the training fine tuned, as appropriate. The plan should specify which person or group of persons requires which type of training. It is necessary for all new or revised processes to be explained carefully to the staff. Page 37 of 58 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report Once the training needs have been identified it is necessary to specify and develop suitable training materials. This can be a time consuming task and unless priorities are given to critical training programs, it could delay the agency in reaching an adequate level of preparedness. Once it has been agreed who requires training and the training materials have been prepared a detailed training schedule should be drawn up. Once the training is arranged to be delivered to the employees, it is necessary to advise them about the training programs they are scheduled to attend. The individual COOP IT/DRP training programs and the overall COOP IT/DRP training process should be assessed to ensure its effectiveness and applicability. This information should be gathered from the trainers and also the trainees through the completion of feedback questionnaires. It is vital to receive feedback from the persons managing and participating in each of the training programs. This feedback will enable weaknesses within the Business Recovery Process, or the training, to be identified and eliminated. Completion of feedback forms should be mandatory for all persons participating in the training process. The forms should be completed either during the training (to record a specific issue) or as soon after finishing as practical. This will enable observations and comments to be recorded whilst the event is still fresh in the persons mind. The completed questionnaires from the trainees plus the feedback from the trainers should be assessed. Identified weaknesses should be notified to the COOP IT/DRP Team Leader and the process strengthened accordingly. The key issues raised by the trainees should be noted and consideration given to whether the findings are critical to the process or not. If there are a significant number of negative issues raised then consideration should be given to possible re-training once the training materials, or the process, have been improved. Page 38 of 58 Scottish Pride, Inc. Information Services 3 Vulnerability Threat The agency does not implement SPLA contingency plan testing and exercises as defined in CP-4 Contingency Plan Testing and Exercises. Malicious Use, Human Error, Hardware Failure Scottish Pride Licensing Application Risk Summary Report Risk Of Compromise Availability of SPLA data. Risk Summary Lack of a documented contingency plan, training, and formal testing could inhibit recovery. Analysis Of Relevant Controls and Other Factors Undocumented formal testing procedures appear to be in place. The agency is not compliant with AEIT best practices. Risk Likelihood Evaluation Risk Likelihood Rating Failure to formally test the contingency plan against best practice threat scenarios make this risk likely to materialize. Moderate Risk Impact Because contingency plan testing scenarios are not developed and tested the impact of this risk is moderate. Risk Impact Rating Overall Risk Rating Moderate Moderate Recommendations: Define in the System Security Plan, explicitly or by reference, the frequency of contingency plan tests and/or exercises and the frequency are at least annually. Test and/or exercise the contingency plan for SPLA at least annually using defined tests and/or exercises to determine the plan's effectiveness and the agency's readiness to execute the plan. Review the contingency plan test/exercise results and initiates corrective actions. Use NIST SP 800-84 Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities SP800-84.pdf as guidance on test, training, and exercise programs for information technology plans and capabilities. The COOP should contain a description of the objectives and scope of the testing phase. This will enable the tests to be structured and organized in a manner where the results can be measured, and the plan fine tuned, as appropriate. As with all testing, the use of live data within the testing environment should be prohibited by the IT. Test data should however, be prepared which is representative of normal business transactions. Actual names or contact details should also not be used for such tests. It is recommended that a full test environment be set up for use in the applicable Page 39 of 58 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report circumstances. Each separate test should be given a unique reference number which will identify the Business Process being recorded, the simulated conditions used, the persons involved in the testing process and the date the test was carried out. This will enable the monitoring and testing reports to be co-coordinated with any feedback received. In order to ensure consistency of the testing process throughout the agency, one or more members of the COOP Team should be nominated to coordinate the testing process within each business unit, a nominated testing and across the agency. Each business process should be thoroughly tested and the coordinator should ensure that each business unit observes the necessary rules associated with ensuring that the testing process is carried out within a realistic environment. In order to ensure consistency when measuring the results, the tests should be independently monitored. This task would normally be carried out by a nominated member of the COOP Recovery Team. It is vital to receive feedback from the persons managing and participating in each of the tests. This feedback will hopefully enable weaknesses within the COOP Recovery Process to be identified and eliminated. Completion of feedback forms should be mandatory for all persons participating in the testing process. The forms should be completed either during the tests (to record a specific issue) or as soon after finishing as practical. This will enable observations and comments to be recorded whilst the event is still fresh in the persons mind. In order for the testing process to proceed smoothly, it is necessary for the core testing team to be trained in the emergency procedures. The tests must be carried out under authentic conditions and all participants must take the process seriously. It is important that all persons who are likely to be involved with recovering a particular business process in the event of an emergency should participate in the testing process. It should be mandatory for the management of a business unit to be present when that unit is involved with conducting the tests. In so far as it is practical, each critical part of the business recovery process should be fully tested. Every part of the procedures included as part of the recovery process is to be tested to ensure validity and relevance. During the testing process the accuracy of employee and vendor emergency contact information should be reconfirmed. All contact numbers should be validated for all involved employees. This is particularly important for management and key employees who are critical to the success of the recovery process. Page 40 of 58 Scottish Pride, Inc. Information Services 4 Vulnerability Threat The agency does not implement system recovery and reconstitution as defined in CP-10 Information System Recovery and Reconstitution. Malicious Use, Human Error, Hardware Failure Scottish Pride Licensing Application Risk Summary Report Risk Of Compromise Availability of SPLA data. Risk Summary Lack of documented system recovery and reconstition procedures will inhibit the agency to sustain or resume communciations and IT function that support critical business operations and essential constituent services within a specified period of time. Analysis Of Relevant Controls and Other Factors Undocumented formal system recovery and reconstition procedures appear to be in place. The agency is not compliant with AEIT best practices. Risk Likelihood Evaluation Risk Likelihood Rating Failure to document formal system recovery and reconstition procedures make this risk likely to materialize. Moderate Risk Impact Because contingency plan system recovery and reconstition procedures are not developed, trainined, and tested the impact of this risk is moderate. Risk Impact Rating Overall Risk Rating Moderate Moderate Recommendations: Provide the capability to recover and reconstitute SPLA to a known secure state after a disruption, compromise, or failure. o Information system recovery and reconstitution to a known secure state means that all system parameters (either default or organization-established) are set to secure values, security-critical patches are reinstalled, security-related configuration settings are reestablished, system documentation and operating procedures are available, application and system software is reinstalled and configured with secure settings, information from the most recent, known secure backups is loaded, and the system is fully tested. Recovery of SPLA after a failure or other contingency shall be done in a trusted, secure, and verifiable manner. Page 41 of 58 Scottish Pride, Inc. Information Services 5 Vulnerability Threat The agency does not implement vulnerability scanning as defined in RA-5 Vulnerability Scanning Malicious Use, Human Error, Hardw Computer Crime, are and Software Failure Scottish Pride Licensing Application Risk Summary Report Risk Of Compromise Availability of SPLA data. Risk Summary Failure to conduct formal vulnerability scanning and penetration testing will not allow the agency to identify potential vulnerabilities within the internal network and weaknesses in controls in place to prevent and/or detect their exploitation by a hacker/malicious employee/contractor who may obtain unauthorized access to information resources or cause system disruption or a system outage. Analysis Of Relevant Controls and Other Factors Without formal Vulnerability Scanning and Penetration Testing the agency will be able to measure security control effectiveness. A computer criminal could exploit Patched vulnerability and compromise SPLA data. The agency is not compliant with AEIT best practices. Risk Likelihood Evaluation Risk Likelihood Rating Failure to formally conduct vulnerability scanning and penetration testing make this risk likely to materialize. Moderate Risk Impact Because vulnerability scanning and penetration testing are not being performed at a minimum annually the impact of this risk is moderate. Risk Impact Rating Overall Risk Rating Moderate Moderate Recommendations: Define in the System Security Plan, explicitly or by reference, the frequency of vulnerability scans within SPLA. Train selected personnel in the use and maintenance of vulnerability scanning tools and techniques. Utilize appropriate vulnerability scanning tools and techniques to scan for vulnerabilities in SPLA every 90 days or when significant new vulnerabilities are identified and reported. Page 42 of 58 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report Perform external network penetration testing and conduct enterprise security posture review as needed but no less than once every 365 days, in accordance with industry best practices. Document findings and assessment results and correlate vulnerabilities to Common Vulnerabilities and Exposures (CVE) naming convention. The information obtained from the vulnerability scanning process shall be shared with appropriate personnel throughout the agency on a "need to know" basis to help eliminate similar vulnerabilities in other information systems. The activities of employees using agency Internet and email resources shall be subject to monitoring by system or security personnel without notice. Use NIST SP 800-40 Creating a Patch and Vulnerability Management Program SP800-40v2.pdf for guidance on patch and vulnerability management. Page 43 of 58 Scottish Pride, Inc. Information Services 6 Vulnerability Threat The agency does not implement alternate processing capabilities as defined in CP-7 Alternate Processing Site. Human Error, Hardware Failure Scottish Pride Licensing Application Risk Summary Report Risk Of Compromise Availability of SPLA data. Risk Summary Failure to identify and alternate processing site will inhibit the agency to sustain or resume communciations and IT function that support critical business operations and essential constituent services if a complete power outage ocurred in the local area. Analysis Of Relevant Controls and Other Factors No alternate processing site has been determined and no contingency is covered in the SSRC Service Level Agreement. The agency is not compliant with AEIT best practices. Risk Likelihood Evaluation Risk Likelihood Rating Failure to identify a nm alternate processing site make this risk likely to materialize. Low Risk Impact Because an alternate site has not been identified and the agency relies on Outlier Technology to help in its recovery oeprations the impact of this risk is low. Risk Impact Rating Overall Risk Rating Low Low Recommendations: Identify an alternate processing site that is geographically separated from the primary processing site so as not to be susceptible to the same hazards. Agreements with an alternate processing site shall be established and implemented to permit the resumption of SPLA operations for mission critical business functions when the primary processing capabilities are unavailable, and the Contingency Plan calls for application recovery in place of other accepted processes. Identify potential accessibility problems to the alternate processing site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions. Page 44 of 58 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report Develop alternate processing site agreements that contain priority-of-service provisions in accordance with the agency's availability requirements. Ensure that the alternate processing site provides information security measures equivalent to that of the primary site. Ensure all equipment and supplies required for resuming SPLA operations for critical functions are available within one week at the alternate processing site, or contracts are in place to support delivery to the site. Define in the System Security Plan, explicitly or by reference, the time period within which processing must be resumed at the alternate processing site. Procedures shall be developed, documented, and implemented effectively to establish contingency activities and responsibilities. Page 45 of 58 Scottish Pride, Inc. Information Services 7 Scottish Pride Licensing Application Risk Summary Report Vulnerability Threat The agency does not implement primary and alternate telecommunications services as defined in CP-8 Telecommunications Services. Hardware Failure Risk Of Compromise Availability of SPLA data. Risk Summary Lack of documented processes could cause inhibit recovery. Analysis Of Relevant Controls and Other Factors There is no formal documented procedures that address the compelte failure of telecommunciations and its recovery with the local carrier or an alternative carrier. The agency is not compliant with AEIT best practices. Risk Likelihood Evaluation Limited documentation of recovery procedures combined with no formal contingency plan make this risk likely to materialize. Risk Likelihood Rating Low Risk Impact Because no formal contingency plan has been developed the impact of this risk is moderate. Risk Impact Rating Moderate Recommendations: Obtain alternate telecommunications services with consideration for reducing the likelihood of sharing a single point of failure with primary telecommunications services. Necessary agreements should be established and implemented for alternate communications services capable of restoring adequate communications to accomplish mission critical functions when the primary operations and communications capabilities are unavailable. Resume system operations for critical functions within one week when the primary telecommunications capabilities are unavailable. In the event that the primary and/or alternate telecommunications services are provided by a common carrier, the agency should request Telecommunications Service Priority (TSP) for all telecommunications services used for national security emergency preparedness. Page 46 of 58 Overall Risk Rating Moderate Scottish Pride, Inc. Information Services 8 Vulnerability Threat The agency does not implement incident response training as defined in IR2 Incident Reponse Training. Malicious Use, Human Error, Computer Crime. Hardware and Sofwtare Failure Scottish Pride Licensing Application Risk Summary Report Risk Of Compromise Availability of SPLA data. Risk Summary Failure to train personnel in incident management reponse and threats may lead to a compormise of the confidentiality, integrity of the system, and posibly lead to a Denial of Service attack affecting the systems availability. Analysis Of Relevant Controls and Other Factors No formal incident response training appears to be in place. The agency is not compliant with AEIT best practices. Risk Likelihood Evaluation Risk Likelihood Rating Failure to have staff recognize threats and how to response to threats make this risk likely to materialize. Low Risk Impact Because there is no formal incident response training being performed at a minimum annually the impact of this risk is moderate. Risk Impact Rating Overall Risk Rating Moderate Moderate Recommendations: Procedures and incident response training implementation should: Train personnel in their incident response roles and responsibilities with respect to SPLA. All users of SPLA must be exposed to security awareness materials at least annually. o Users of SPLA include employees, contractors, students, guest, visitors, and others who may need access to. Page 47 of 58 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report o Executives should receive training in information security basics and policy level training in security planning and management. o Program and functional managers should receive training in information security basics; management and implementation level training in security planning and system/application security management; and management and implementation level training in system/ application life cycle management, risk management, and contingency planning. o CIOs, Chief Information Officers (CIOs), IT security program managers, auditors, and other security-oriented personnel (e.g., system and network administrators, and system/application security officers) should receive training in information security basics and broad training in security planning, system and application security management, system/application life cycle management, risk management, and contingency planning. o IT function management and operations personnel should receive training in information security basics; management and implementation level training in security planning and system/application security management; and management and implementation level training in system/ application life cycle management, risk management, and contingency planning. Define in the System Security Plan, explicitly or by reference, the frequency of refresher incident response training is at least annually. Provide the SPLA security awareness material/exposure outlined in NIST SP800-50 Building an Information Technology Security Awareness and Training Program NIST-SP800-50.pdf to all new employees before allowing them access to the systems. Provide SPLA security refresher training for employees as frequently as determined necessary, based on the sensitivity of the information that the employees use or process and whenever there is a significant change in the information system environment or procedures or when an employee enters a new position that requires additional role-specific training. Page 48 of 58 Scottish Pride, Inc. Information Services 9 Vulnerability Threat The agency does not test and/or exercise incident response as defined in IR3 Incident Response Testing and Exercises. Malicious Use, Human Error, Hardware Failure Scottish Pride Licensing Application Risk Summary Report Risk Of Compromise Risk Summary Availability of SPLA data Failure to formally test incident management reponse towards formal threat scenarios may lead to a compormise of the confidentiality, integrity of the system, and posibly lead to a Denial of Service attack affecting the systems availability. Analysis Of Relevant Controls and Other Factors No formal incident response ttest scenarios have been develoepd. The agency is not compliant with AEIT best practices. Risk Likelihood Evaluation Risk Likelihood Rating Failure to conduct formal simulated tests against predefined threat scenarios and observe staff response make this risk likely to materialize. Moderate Risk Impact Because there is no formal incident response testing being performed at a minimum annually the impact of this risk is moderate. Risk Impact Rating Overall Risk Rating Moderate Moderate Recommendations The Incident response capability for SPLA should be tested periodically using appropriate tests, procedures, automated mechanisms, and exercises to determine the plan's effectiveness. Test and/or exercise and document the incident response capability every 365 days, using reviews, analyses, and simulations. Use NIST SP 800-84 Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities SP800-84.pdf for information technology plans and capabilities. Page 49 of 58 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report Define in the System Security Plan, explicitly or by reference, the frequency of incident response tests/exercises is at least annually; The test results, procedures, and exercises employed to conduct the test shall be documented. Page 50 of 58 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report APPENDIX A – CONTROL CATEGORY DESCRIPTION The following acronyms are used throughout the Federal Information Processing Standard 199 (FIPS-199) system categorization and System Security Plan (SSP) process. Acronym Meaning SPLA Scottish Pride Licensing Application CP Contingency Planning DR Disaster Recovery FIPS Federal Information Processing Standards FIPS PUB Federal Information Processing Standard Publications FIPS -199 Federal Information Processing Standard System Categorization IR Incident Response ITM Information Security Manager IT Information Technology NIST National Institute of Standards and Technology OMB Office of Management and Budget PIA Privacy Impact Assessment PII Personal Identifiable Information POA&M Plan of Action and Milestones POC Point of Contact RA Risk Assessment SSP System Security Plan Page 51 of 57 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report APPENDIX B – GLOSSARY This glossary contains terms and associated definitions that are used throughout the Federal Information Processing Standard 199 (FIPS-199) system categorization and System Security Plan (SSP) process. Term Availability Confidentiality Florida Information Technology Resource Security Policies and Standards identified in 71A1.001-.010, F.A.C. Definition The consequences of loss or disruption of access to system resources or to data or information in the system are generally acceptable. The loss of availability could be expected to affect IT level interests and have some negative impact on mission accomplishment. The consequences of unauthorized disclosure or compromise of data or information in the system are generally acceptable. The loss of confidentiality could be expected to affect IT level interests and have some negative impact on mission accomplishment. The purpose of the Florida Information Resource Security Policies and Standards is to: Promulgate state policies regarding the security of data and information technology resources. Policies are broad principles underlying the state’s Information resource security program. Define minimum-security standards for the protection of state information resources. Standards are required administrative procedures or management controls, utilizing current, open, non-proprietary or non-vendor specific technologies. Integrity Low Low-level System Management Controls Moderate The consequences of corruption or unauthorized modification of data or information in the system are only marginally acceptable. Loss of integrity could be expected to affect IT level interests and have some negative impact on mission accomplishment. Data stored, processed, or transported by computer or telecommunications resources, the inaccuracy, alteration, disclosure, or unavailability of which: (1) would have a minimal impact on major application or minor application missions, functions, image, or reputation, such that the impact would result in the least possible significant unfavorable condition with a negative outcome, or (2) could result in loss of some tangible assets or resources. An information system in which all three security objectives (i.e., confidentiality, integrity, and availability) are assigned a FIPS 199 potential impact value of low. Describes the management control measures intended to meet the systems security requirements. Management controls focus on the management of risk in operating the system. This includes risk assessment processes, risk reviews, and the behavioral expectations of all individuals who work within the system. Data stored, processed, or transported by computer or telecommunications resources, the inaccuracy, alteration, disclosure, or unavailability of which: (1) would have an adverse impact on moderate application or minor application missions, functions, image, or reputation, such that the impact would place the Page 52 of 57 Scottish Pride, Inc. Information Services Term Operational Controls Risk assessment Security category Security controls System Owner System Security Plan Technical Controls Vulnerability Scottish Pride Licensing Application Risk Summary Report Definition moderate application at a significant disadvantage, or (2) could result in loss of significant tangible assets or resources. Address operational controls, focusing on mechanisms that are primarily implemented and executed by the systems management, administration, and technical support personnel. These security controls were put in place to improve the overall security of the system environment. This includes personnel controls, physical and environmental protections, and other operational security processes. The process of identifying risks to agency operations (including mission, functions, image, or reputation), agency assets, or individuals by determining the probability of occurrence, the resulting impact, and additional security controls that would mitigate this impact. A risk assessment is part of risk management, synonymous with risk analysis, and incorporates threat and vulnerability analyses. The characterization of information or an information system based on an assessment of the potential impact that a loss of confidentiality, integrity, or availability of such information or information system would have on organizational operations, organizational assets, or individuals. The management, operational, and technical controls (i.e., safeguards or countermeasures) prescribed for an information system to protect the confidentiality, integrity, and availability of the system and its information. Official responsible for the overall procurement, development, integration, modification, operation, and maintenance of an information system. Formal document that provides an overview of the security requirements for the information system and describes the security controls in place or planned for meeting those requirements. Describe the technical security mechanisms and controls that are used to minimize or prevent unauthorized users from accessing the system and to ensure its integrity, confidentiality, and availability. These controls describe the system's user authentication control mechanisms, such as password, token, and biometrics. They also indicate the frequency of password changes, describe how changes are enforced, and identify who changes the passwords (user, system administrator, or system). Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source. Page 53 of 57 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report APPENDIX H – LAWS, REGULATIONS, AND GUIDANCE Appendix H shows the Federal laws, regulatory guidance, and directives that drive Agency for Innovation Workforce’s IT security program. This appendix also lists Office of Management and Budget (OMB) and National Institute of Standards and Technology (NIST) guidance. Laws and Regulations: Federal Information Security Management Act of 2002, Title III – Information Security, P.L. 107-347. http://csrc.nist.gov/groups/SMA/fisma/index.html USA PATRIOT Act (P.L. 107-56), October 2001. http://www.usdoj.gov/oig/special/s0708/final.pdf Computer Fraud and Abuse Act of 1986, as amended. http://www.usdoj.gov/criminal/cybercrime/ccmanual/01ccma.html Privacy Act of 1987 http://csrc.nist.gov/groups/SMA/ispab/documents/csa_87.txt OMB Circulars: OMB Circular A-130, Management of Federal Information Resources, November 2000. http://www.ogc.doc.gov/ogc/contracts/cld/ecomm/65fr77677.html OMB Memorandum M-05-24, Implementation of Homeland Security Presidential Directive (HSPD) 12—Policy for a Common Identification Standard for Federal Employees and Contractors, August 2005. http://www.whitehouse.gov/omb/memoranda/fy2005/m05-24.pdf OMB Memorandum M-06-16, Protection of Sensitive Agency Information, June 2006. http://www.whitehouse.gov/omb/memoranda/fy2006/m06-16.pdf OMB Memorandum, M-06-19, Reporting Incidents Involving Personally Identifiable Information and Incorporating the Cost for Security in Agency Information Technology Investments, July 2006. http://www.whitehouse.gov/omb/memoranda/fy2006/m06-19.pdf Page 54 of 57 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report FIPS Publications: FIPS PUB 199, Standards for Security Categorization of Federal Information and Information Systems. http://csrc.nist.gov/publications/fips/fips199/FIPS-PUB199-final.pdf NIST Publications: NIST SP 800-18 Rev.1 Guide for Developing Security Plans for Federal Information Systems sp800-18-Rev1-final.pdf NIST SP 800-30 Risk Management Guide for Information Technology Systems sp800-30.pdf NIST SP 800-34 Contingency Planning Guide for Federal Information Systems sp800-34-rev1.pdf NIST SP 800-37 Guide for Applying the Risk Management Framework to Federal Information Systems Rev. 1 http://csrc.nist.gov/publications/nistpubs/800-37-rev1/sp800-37-rev1-final.pdf NIST SP 800-40 Creating a Patch and Vulnerability Management Program SP800-40v2.pdf NIST SP800-50 Building an Information Technology Security Awareness and Training Program NIST-SP800-50.pdf NIST SP 800-53 Rev. 3 Recommended Security Controls for Federal Information Systems and Organizations http://csrc.nist.gov/publications/nistpubs/800-53-Rev3/sp800-53-rev3-finalerrata.pdf NIST SP 800-61 Rev. 1 Computer Security Incident Handling Guide SP800-61rev1.pdf NIST SP 800-64 Rev. 2 Security Considerations in the System Development Life Cycle SP800-64-Revision2.pdf NIST SP 800-84 Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities SP800-84.pdf Page 55 of 57 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report NIST SP 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) http://csrc.nist.gov/publications/nistpubs/800-122/sp800-122.pdf Organization Policy and Guidance Documents: Section 282.318, Florida Statutes – “Security of Data and Information Technology Resources”. http://flsenate.gov/Statutes/index.cfm?App_mode=Display_Statute&Search_St ring=&URL=Ch0282/SEC318.HTM&Title=-%3E2008-%3ECh0282%3ESection+318 Chapter 815, Florida Statutes, “Computer-Related Crimes”. http://www.leg.state.fl.us/statutes/index.cfm?App_mode=Display_Statute&U RL=Ch0815/titl0815.htm&StatuteYear=2000&Title=-%3E2000-%3EChapter+815 Florida Administrative Code 60DD-2, “Florida Information Resource Security Policies and Standards”. https://www.flrules.org/gateway/ruleNo.asp?id=60DD-2.006 Proposed Rule 71A-1, F.A.C , “Florida Information Resource Security Policies and Standards”. http://Proposed Rule 71A-1.pdf Policies and Procedures of the Scottish Pride, Inc. http://www.Scottish Pride.state.fl.us/publications/policies.shtml http://www.Scottish Pride.state.fl.us/publications/policies/050-2.pdf Page 56 of 57 Scottish Pride, Inc. Information Services Scottish Pride Licensing Application Risk Summary Report APPENDIX I – RISK BASED DECISION DOCUMENTS There were no risk-based decisions documented during this risk assessment on SPLA. Page 57 of 57
© Copyright 2026 Paperzz