27.01.2014 Views

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GUIDELINES ON SECURING PUBLIC WEB SERVERS<br />

practices. Training also supports individual accountability, which is an important method for<br />

improving informati<strong>on</strong> system security. If the user community includes members of the general<br />

public, providing security awareness specifically targeting them might also be appropriate.<br />

C<strong>on</strong>tingency, C<strong>on</strong>tinuity of Operati<strong>on</strong>s, and Disaster Recovery Planning—C<strong>on</strong>tingency plans,<br />

c<strong>on</strong>tinuity of operati<strong>on</strong>s plans, and disaster recovery plans are established in advance to allow an<br />

organizati<strong>on</strong> or facility to maintain operati<strong>on</strong>s in the event of a disrupti<strong>on</strong>. 10<br />

Certificati<strong>on</strong> and Accreditati<strong>on</strong>—Certificati<strong>on</strong> in the c<strong>on</strong>text of informati<strong>on</strong> systems security means<br />

that a system has been analyzed to determine how well it meets all of the security requirements of the<br />

organizati<strong>on</strong>. Accreditati<strong>on</strong> occurs when the organizati<strong>on</strong>’s management accepts that the system<br />

meets the organizati<strong>on</strong>’s security requirements. 11<br />

3.4 System Security Plan<br />

The objective of system security planning is to improve protecti<strong>on</strong> of informati<strong>on</strong> system resources. 12<br />

Plans that adequately protect informati<strong>on</strong> assets require managers and informati<strong>on</strong> owners—directly<br />

affected by and interested in the informati<strong>on</strong> and/or processing capabilities—to be c<strong>on</strong>vinced that their<br />

informati<strong>on</strong> assets are adequately protected from loss, misuse, unauthorized access or modificati<strong>on</strong>,<br />

unavailability, and undetected activities.<br />

The purpose of the system security plan is to provide an overview of the security and privacy<br />

requirements of the system and describe the c<strong>on</strong>trols in place or planned for meeting those requirements.<br />

The system security plan also delineates resp<strong>on</strong>sibilities and expected behavior of all individuals who<br />

access the system. The system security plan should be viewed as documentati<strong>on</strong> of the structured process<br />

of planning adequate, cost-effective security protecti<strong>on</strong> for a system. It should reflect input from various<br />

managers with resp<strong>on</strong>sibilities c<strong>on</strong>cerning the system, including informati<strong>on</strong> owners, the system owner,<br />

and the ISSPM.<br />

For Federal agencies, all informati<strong>on</strong> systems must be covered by a system security plan. Other<br />

organizati<strong>on</strong>s should str<strong>on</strong>gly c<strong>on</strong>sider the completi<strong>on</strong> of a system security plan for each of their systems<br />

as well. The informati<strong>on</strong> system owner 13 is generally the party resp<strong>on</strong>sible for ensuring that the security<br />

plan is developed and maintained and that the system is deployed and operated according to the agreedup<strong>on</strong><br />

security requirements.<br />

In general, an effective system security plan should include the following:<br />

System Identificati<strong>on</strong>—The first secti<strong>on</strong>s of the system security plan provide basic identifying<br />

informati<strong>on</strong> about the system. They c<strong>on</strong>tain general informati<strong>on</strong> such as the key points of c<strong>on</strong>tact for<br />

the system, the purpose of the system, the sensitivity level of the system, and the envir<strong>on</strong>ment in<br />

which the system is deployed.<br />

10<br />

11<br />

12<br />

13<br />

For more informati<strong>on</strong>, see <str<strong>on</strong>g>NIST</str<strong>on</strong>g> SP <str<strong>on</strong>g>800</str<strong>on</strong>g>-34, C<strong>on</strong>tingency Planning Guide for Informati<strong>on</strong> Technology Systems<br />

(http://csrc.nist.gov/publicati<strong>on</strong>s/nistpubs/).<br />

For more informati<strong>on</strong> <strong>on</strong> certificati<strong>on</strong> and accreditati<strong>on</strong>, see <str<strong>on</strong>g>NIST</str<strong>on</strong>g> SP <str<strong>on</strong>g>800</str<strong>on</strong>g>-37, Federal <str<strong>on</strong>g>Guidelines</str<strong>on</strong>g> for the Security<br />

Certificati<strong>on</strong> and Accreditati<strong>on</strong> of Informati<strong>on</strong> Technology Systems (http://csrc.nist.gov/publicati<strong>on</strong>s/nistpubs/).<br />

For more informati<strong>on</strong> <strong>on</strong> system security plans, see <str<strong>on</strong>g>NIST</str<strong>on</strong>g> SP <str<strong>on</strong>g>800</str<strong>on</strong>g>-18 Revisi<strong>on</strong> 1, Guide for Developing Security Plans for<br />

Federal Informati<strong>on</strong> Systems (http://csrc.nist.gov/publicati<strong>on</strong>s/nistpubs/).<br />

The informati<strong>on</strong> system owner is resp<strong>on</strong>sible for defining the system’s operating parameters, authorized functi<strong>on</strong>s, and<br />

security requirements. The informati<strong>on</strong> owner for informati<strong>on</strong> stored within, processed by, or transmitted by a system may<br />

or may not be the same as the informati<strong>on</strong> system owner. In additi<strong>on</strong>, a single system may use informati<strong>on</strong> from multiple<br />

informati<strong>on</strong> owners.<br />

3-7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!