HOC Cyber Security Profiles

877 Words2 Pages

HOC Cyber Security Profiles

Introduction

Cyber security profiles (System Security Plans or SSP) are an essential component within an organizational security program. An Organizations Cyber security profile references to information pertinent to the security of a system such as security issues, security controls, security categories to which the system belongs, and concern pertaining to the environment in which the system is installed. Cyber security profiles provides security administrators with essential information necessary to ensure that the proper countermeasures are in place for each system in order to maintain confidentiality, integrity and availability requirements of the organization as well as those that apply specifically to each system. HOC (Housing Opportunities of Montgomery County) maintains a security program designed to protect the highly technical and sensitive cliental information stored within their systems and networks. To ensure that each system within the organizations IT infrastructure is properly, securely configured and protected, Cyber Security Profiles must be implemented for each system in order to concisely document the required secure configuration of both the system and the environment in which the system is installed.
Analysis

1. Management Control
1.1 System and Services Acquisition Controls (SA)
System services and acquisition controls focus on the procurement and life cycle support for items acquired in order to conduct business. For HOC, items such as network devices, computer workstations, and WAN services, established during acquisition are covered by this management control.
1.1.1(SA-5) Information System Documentation
Information system documentation records the det...

... middle of paper ...

...nt. Cyber security profiles help tremendously by organizing security related information in a way that avoids confusion, facilitates coverage and essential understanding. These same profiles are also essential to certification and accreditation efforts as well as routine, periodic audits, as they facilitate communication between the auditors and the organization and ensure that an understanding of the systems, configurations, policies and procedures are in line with best practices and regulatory compliance.

References

NIST, (2006), FIPS Pub 200: Minimum Security Requirements for Federal Information and Information Systems, Retrieved from http://csrc.nist.gov/publications/fips/fips200/FIPS-200-final-march.pdf

NIST, (2013), National Vulnerability Database – Security Controls, Retrieved from http://web.nvd.nist.gov/view/800-53/class?controlClassName=Management

Open Document