Guide to NIST Security Documents Legal Requirements

From FISMApedia
Jump to: navigation, search

Legal Requirements

There are certain legal requirements regarding IT security to which Federal agencies must adhere. Many come from legislation, while others come from Presidential Directives or the Office of Budget and Management (OMB) Circulars. Here is a list of the major sources of these requirements with supporting documents from NIST. Some of the documents are a direct result of mandates given to NIST. Others are documents developed in order to give guidance to Federal agencies in how to carry out legal requirements.

Title III of the E-Gov Act of 2002 (Public Law 107-347)


FEDERAL INFORMATION SECURITY MANAGEMENT ACT OF 2002 (FISMA)

Categorization of all information and information systems and minimum information security requirements for each category

FIPS 200 Security Controls for Federal Information Systems
FIPS 199 Standards for Security Categorization of Federal Information and Information Systems
SP 800-70 Security Configuration Checklists Program for IT Products
SP 800-60 Guide for Mapping Types of Information and Information Systems to Security Categories
SP 800-53 Recommended Security Controls for Federal Information Systems
SP 800-53A Guide for Assessing the Security Controls in Federal Information Systems
SP 800-37 Guide for the Security Certification and Accreditation of Federal Information Systems
SP 800-34 Contingency Planning Guide for Information Technology Systems
SP 800-30 Risk management Guide for Information Technology Systems
SP 800-26 Rev 1 Guide for Information Security Program Assessments and System Reporting Form
SP 800-18 Rev 1 Guide for Developing Security Plans for Information Systems


Identification of an information system as a national security system

SP 800-59 Guide for Identifying an Information System as a National Security System


Detection and handling of information security incidents

SP 800-84 Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities
SP 800-61 Computer Security Incident Handling Guide
SP 800-83 Guide to Malware Incident Prevention and Handling
SP 800-86 Guide to Integrating Forensic Techniques into Incident Response
SP 800-51 Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme
December 2005 Preventing And Handling Malware Incidents: How To Protect Information Technology Systems From Malicious Code And Software


Manage security incidents

SP 800-61 Computer Security Incident Handling Guide
SP 800-83 Guide to Malware Incident Prevention and Handling
SP 800-86 Guide to Integrating Forensic Techniques into Incident Response
SP 800-51 Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme


Annual public report on activities undertaken in the previous year

NISTIR 7285 Computer Security Division 2005 Annual Report
NISTIR 7219 Computer Security Division 2004 Annual Report
NISTIR 7111 Computer Security Division 2003 Annual Report


OMB CIRCULAR A-130: MANAGEMENT OF FEDERAL INFORMATION RESOURCES, APPENDIX III: SECURITY OF FEDERAL AUTOMATED INFORMATION RESOURCES

Assess risks

FIPS 199 Standards for Security Categorization of Federal Information and Information Systems


Certify and accredit systems

FIPS 200 Security Controls for Federal Information Systems
SP 800-37 Guide for the Security Certification and Accreditation of Federal Information Systems


Develop contingency plans and procedures

SP 800-34 Contingency Planning Guide for Information Technology Systems
SP 800-46 Security for Telecommuting and Broadband Communications


Manage system configurations and security throughout the system development life cycle

SP 800-64 Rev 1 Security Considerations in the Information System Development Life Cycle
SP 800-70 Security Configuration Checklists Program for IT Products
SP 800-34 Contingency Planning Guide for Information Technology Systems
NISTIR 7316 Assessment of Access Control Systems


Mandates agency-wide information security program development and implementation

SP 800-18, Rev 1 Guide for Developing Security Plans for Information Systems
SP 800-100 Information Security Handbook: A Guide for Managers
SP 800-12 An Introduction to Computer Security: The NIST Handbook


Conduct security awareness training

SP 800-50 Building an Information Technology Security Awareness and Training Program
SP 800-16 Information Technology Security Training Requirements: A Role- and Performance-Based Model
SP 800-46 Security for Telecommuting and Broadband Communications


E-GOVERNMENT ACT OF 2002

(Public Law 107-347)


Mandates NIST development of security standards

FIPS 199 Standards for Security Categorization of Federal Information and Information Systems
FIPS 200 Security Controls for Federal Information Systems


HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-12 (HSPD-12), COMMON IDENTIFICATION STANDARD FOR FEDERAL EMPLOYEES AND CONTRACTORS

Establishes a mandatory, Government-wide standard for secure and reliable forms of identification issued by the Federal Government to its employees and contractors

FIPS 201-1 Personal Identity Verification for Federal Employees and Contractors
SP 800-85B PIV Data Model Test Guidelines
SP 800-85A PIV Card Application and Middleware Interface Test Guidelines (SP800-73 compliance)
SP 800-79 Guidelines for the Certification and Accreditation of PIV Card Issuing Organizations
SP 800-78 Cryptographic Algorithms and Key Sizes for Personal Identity Verification
SP 800-76 Biometric Data Specification for Personal Identity Verification
SP 800-73 Rev 1 Integrated Circuit Card for Personal Identification Verification
NISTIR 7337 Personal Identity Verification Demonstration Summary
NISTIR 7284 Personal Identity Verification Card Management Report
January 2006 Testing And Validation Of Personal Identity Verification (PIV) Components And Subsystems For Conformance To Federal Information Processing Standard 201
August 2005 Implementation Of FIPS 201, Personal Identity Verification (PIV) Of Federal Employees And Contractors
March 2005 Personal Identity Verification (PIV) Of Federal Employees And Contractors: Federal Information Processing Standard (FIPS) 201


OMB CIRCULAR A-11: PREPARATION, SUBMISSION, AND EXECUTION OF THE BUDGET

Capital Planning

SP 800-65 Integrating IT Security into the Capital Planning and Investment Control Process


OTHER REQUIREMENTS WITH SUPPORTING DOCUMENTS

Health Insurance Portability and Accountability Act (HIPAA)

For more information about HIPAA requirements, please visit www.cms.hhs.gov

Assure health information privacy and security

Standardize electronic data interchange in health care transactions

SP 800-66 An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act Security Rule


Homeland Security Presidential Directive-7 (HSPD-7), Critical Infrastructure Identification, Prioritization, and Protection

For more information about HSPD-7, please visit www.dhs.gov

Protect critical infrastructure

FIPS 199 Standards for Security Categorization of Federal Information and Information Systems
FIPS 200 Security Controls for Federal Information Systems
SP 800-18 Guide for Developing Security Plans for Information Technology Systems
SP 800-30 Risk Management Guide for Information Technology Systems
SP 800-37 Guide for Security Certification and Accreditation of Federal Information Systems
SP 800-53 Recommended Security Controls for Federal Information Systems
SP 800-60 Guide for Mapping Types of Information and Information Systems to Security Categories
SP 800-59 Guideline for Identifying an Information System as a National Security System
SP 800-82 Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control System Security



Tanya Brewer, Editor
Matthew Scholl, Editor


NIST
National Institute of Standards and Technology
Technology Administration, U.S. Department of Commerce


February 2007
Disclaimer: Any mention of commercial products is for information only; it does not imply NIST recommendation or endorsement, nor does it imply that the products mentioned are necessarily the best available for the purpose.


Michael James, Design/Production
The DesignPond