02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

http://frwebgate.access.gpo.gov/cgibin/getdoc.cgi?dbname=104_cong_public_laws&docid=f:publ106.104.pdf<br />

Public Law 106-102 – Gramm-Leach-Bliley Act [S. 900] 1999<br />

(aka Financial Services Modernization Act)<br />

Obliges financial institutions to protect <strong>the</strong> privacy <strong>of</strong> customers’ nonpublic personal information<br />

and to implement safeguards; criminalizes fraudulent access to financial information.<br />

http://frwebgate.access.gpo.gov/cgibin/getdoc.cgi?dbname=106_cong_public_laws&docid=f:publ102.106.pdf<br />

15 U.S.C. § 6801-6810 Disclosure <strong>of</strong> Nonpublic Personal Information<br />

15 U.S.C. § 6821-6827 Fraudulent Access to Financial Information<br />

See also http://www.ftc.gov/privacy/glbact/<br />

Public Law 107-296 – Homeland <strong>Security</strong> Act <strong>of</strong> 2002 [H.R. 5005]<br />

Includes FISMA in Title X – Information <strong>Security</strong><br />

(superseded by P.L. 107-347 Title III)<br />

http://frwebgate.access.gpo.gov/cgibin/getdoc.cgi?dbname=107_cong_public_laws&docid=f:publ296.107.pdf<br />

Public Law 107-347 – E-Government Act <strong>of</strong> 2002 [H.R. 2458]<br />

Includes amended version <strong>of</strong> FISMA in Title III – Information <strong>Security</strong><br />

(supersedes Title X in P.L. 107-296)<br />

http://frwebgate.access.gpo.gov/cgibin/getdoc.cgi?dbname=107_cong_public_laws&docid=f:publ347.107.pdf<br />

Federal Information <strong>Security</strong> Management Act <strong>of</strong> 2002<br />

Requires each federal government agency to implement programs and procedures for detecting,<br />

reporting, and responding to security incidents, consistent with published standards<br />

and guidelines<br />

U.S. Department <strong>of</strong> Defense (DoD) Information Technology <strong>Security</strong> Certification and<br />

Accreditation Process (DITSCAP)<br />

http://iase.disa.mil/ditscap/<br />

DoD Instruction 5200.40 – Implements policy, assigns responsibilities, and prescribes procedures<br />

for certification and accreditation <strong>of</strong> information technology (information systems,<br />

networks, and sites) in <strong>the</strong> Department <strong>of</strong> Defense<br />

U.S. Office <strong>of</strong> Management and Budget (OMB) – http://www.whitehouse.gov/omb/<br />

Circular No. A-130 (Revised) – Management <strong>of</strong> Federal Information Resources<br />

http://www.whitehouse.gov/omb/circulars/a130/a130trans4.html<br />

Establishes policy for <strong>the</strong> management <strong>of</strong> Federal information resources<br />

Executive Order 13231 – Critical Infrastructure Protection in <strong>the</strong> Information Age<br />

Authorizes protection program to secure information systems for critical infrastructure<br />

http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=2001_register&docid=fr18oc01-<br />

139.pdf<br />

174 CMU/SEI-2003-TR-001

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!