08.11.2012 Views

Evaluation of Department of State Information Security Program ...

Evaluation of Department of State Information Security Program ...

Evaluation of Department of State Information Security Program ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

UNCLASSIFIED<br />

� Develop operating procedures to ensure the results are included in the Risk<br />

Scoring <strong>Program</strong> dashboard.<br />

� Develop procedures to ensure that System <strong>Security</strong> Owners update the<br />

system security plans to include a continuous monitoring strategy to detail<br />

how system security controls are to be monitored.<br />

Recommendation 12. We recommend that the Chief <strong>Information</strong> Officer, as required<br />

by NIST SP 800-34, Revision 1, Contingency Planning Guide for Federal <strong>Information</strong><br />

Systems, take the following actions:<br />

� Update the Continuity <strong>of</strong> Operations Communication Plan annually or<br />

when changes occur to the organization, network hardware, systems, and<br />

applications and, if necessary, after Continuity Testing.<br />

� Perform an entity-wide Business Impact Analysis and develop a strategy to<br />

prioritize recovery <strong>of</strong> the critical assets within the <strong>Department</strong> <strong>of</strong> <strong>State</strong>.<br />

� Update the section <strong>of</strong> the Foreign Affairs Manual that contains guidance<br />

and direction for development and implementation <strong>of</strong> Continuity <strong>of</strong><br />

Operations Communication Plan.<br />

Recommendation 13. We recommend that the Bureau <strong>of</strong> Administration, Office <strong>of</strong><br />

Emergency Management, in coordination with the Chief <strong>Information</strong> Officer, align the<br />

Business Impact Analysis <strong>of</strong> the Primary Mission Essential Functions with the Bureau<br />

<strong>of</strong> <strong>Information</strong> Resource Management’s Maximum Tolerable Downtime for the<br />

network as required by NIST SP 800-34, Revision 1, Contingency Planning Guide for<br />

Federal <strong>Information</strong> Systems.<br />

Recommendation 14. As required by National Institute <strong>of</strong> Standards and Technology<br />

(NIST) Special Publications (SP) 800-34, Revision 1, Contingency Planning Guide for<br />

Federal <strong>Information</strong> Systems, and SP 800-53, Revision 3, Recommended <strong>Security</strong><br />

Controls for Federal <strong>Information</strong> Systems and Organizations, we recommend that the<br />

Bureau <strong>of</strong> <strong>Information</strong> Resource Management, Office <strong>of</strong> <strong>Information</strong> Assurance, in<br />

coordination with the bureaus and system owners, take the following actions:<br />

� Document and maintain alternate site locations and procedures for<br />

accessing an alternate site.<br />

� Develop and maintain contingency plans for all major applications and<br />

general support systems.<br />

� Maintain and update recovery and restoration procedures for all<br />

applications and general support systems.<br />

Recommendation 15. As required by National Institute <strong>of</strong> Standards and Technology<br />

(NIST) Special Publications (SP) 800-34, Revision 1, Contingency Planning Guide for<br />

38<br />

UNCLASSIFIED

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!