About the Author |
|
xiii | |
About the Technical Editor |
|
xv | |
Foreword |
|
xvii | |
|
Foreword |
|
xix | |
|
|
Chapter 1 Introduction to the federal cloud computing strategy |
|
|
1 | (34) |
|
|
1 | (5) |
|
A Historical View of Federal IT |
|
|
6 | (17) |
|
The Early Years and the Mainframe Era |
|
|
7 | (2) |
|
|
9 | (1) |
|
Decentralization: The Microcomputer ("Personal Computer") |
|
|
10 | (1) |
|
Transitioning to Mobility |
|
|
11 | (2) |
|
Evolution of Federal IT Policy |
|
|
13 | (10) |
|
Cloud Computing: Drivers in Federal IT Transformation |
|
|
23 | (7) |
|
|
25 | (3) |
|
|
28 | (2) |
|
Decision Framework for Cloud Migration |
|
|
30 | (3) |
|
Selecting Services to Move to the Cloud |
|
|
31 | (1) |
|
Provisioning Cloud Services Effectively |
|
|
32 | (1) |
|
Managing Services Rather Than Assets |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
33 | (2) |
|
Chapter 2 Cloud computing standards |
|
|
35 | (24) |
|
|
35 | (4) |
|
Standards Development Primer |
|
|
39 | (3) |
|
Cloud Computing Standardization Drivers |
|
|
42 | (3) |
|
|
43 | (1) |
|
|
44 | (1) |
|
Identifying Standards for Federal Cloud Computing Adoption |
|
|
45 | (12) |
|
Standards Development Organizations (SDOs) and Other Community-Driven Organizations |
|
|
48 | (1) |
|
|
48 | (9) |
|
|
57 | (1) |
|
|
57 | (2) |
|
Chapter 3 A Case for Open Source |
|
|
59 | (20) |
|
|
59 | (4) |
|
Open Source Software and the Federal Government |
|
|
63 | (5) |
|
Open Source Software Adoption Challenges: Acquisition and Security |
|
|
68 | (4) |
|
|
68 | (3) |
|
|
71 | (1) |
|
Open Source Software and Federal Cloud Computing |
|
|
72 | (3) |
|
|
75 | (1) |
|
|
76 | (3) |
|
Chapter 4 Security and privacy in public cloud computing |
|
|
79 | (38) |
|
|
79 | (2) |
|
Security and Privacy in the Context of the Public Cloud |
|
|
81 | (7) |
|
Federal Privacy Laws and Policies |
|
|
83 | (3) |
|
|
86 | (2) |
|
Federal Information Security Modernization Act (FISMA) |
|
|
88 | (1) |
|
|
89 | (1) |
|
Safeguarding Privacy Information |
|
|
90 | (22) |
|
|
94 | (15) |
|
Data Breaches, Impacts, and Consequences |
|
|
109 | (3) |
|
Security and Privacy Issues |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
113 | (4) |
|
Chapter 5 Applying the NIST risk management framework |
|
|
117 | (68) |
|
|
117 | (8) |
|
|
117 | (2) |
|
Roles and Responsibilities |
|
|
119 | (6) |
|
Risk Management Framework Overview |
|
|
125 | (3) |
|
The Role of Risk Management |
|
|
126 | (2) |
|
The NIST RMF and the System Development Life Cycle |
|
|
128 | (1) |
|
|
128 | (54) |
|
Information System Categorization |
|
|
131 | (15) |
|
Security Controls Selection |
|
|
146 | (13) |
|
Security Controls Implementation |
|
|
159 | (2) |
|
Security Controls Assessment |
|
|
161 | (5) |
|
Information System Authorization |
|
|
166 | (9) |
|
Security Controls Monitoring |
|
|
175 | (7) |
|
|
182 | (1) |
|
|
182 | (3) |
|
Chapter 6 Risk management |
|
|
185 | (26) |
|
Introduction to Risk Management |
|
|
185 | (3) |
|
Federal Information Security Risk Management Practices |
|
|
188 | (3) |
|
Overview of Enterprise-Wide Risk Management |
|
|
191 | (7) |
|
Components of the NIST Risk Management Process |
|
|
191 | (4) |
|
Multitiered Risk Management |
|
|
195 | (3) |
|
NIST Risk Management Process |
|
|
198 | (6) |
|
|
199 | (1) |
|
|
200 | (2) |
|
|
202 | (1) |
|
|
203 | (1) |
|
Comparing the NIST and ISO/IEC Risk Management Processes |
|
|
204 | (5) |
|
|
209 | (1) |
|
|
209 | (2) |
|
Chapter 7 Comparison of federal and international security certification standards |
|
|
211 | (28) |
|
|
211 | (1) |
|
Overview of Certification and Accreditation |
|
|
212 | (10) |
|
Evolution of the Federal C&A Processes |
|
|
214 | (6) |
|
Towards a Unified Approach to C&A |
|
|
220 | (2) |
|
NIST and ISO/IEC Information Security Standards |
|
|
222 | (14) |
|
Boundary and Scope Definition |
|
|
225 | (1) |
|
|
226 | (1) |
|
Risk Management Strategy (Context) |
|
|
227 | (1) |
|
|
227 | (1) |
|
Security Objectives and Controls |
|
|
228 | (8) |
|
|
236 | (1) |
|
|
236 | (3) |
|
|
239 | (30) |
|
|
239 | (2) |
|
|
241 | (1) |
|
|
242 | (2) |
|
FedRAMP Governance and Stakeholders |
|
|
244 | (5) |
|
|
245 | (4) |
|
FedRAMP Accelerated Process |
|
|
249 | (4) |
|
FedRAMP Security Assessment Framework |
|
|
253 | (12) |
|
FedRAMP Security Assessment Framework Phases |
|
|
256 | (9) |
|
Third Party Assessment Organization Program |
|
|
265 | (2) |
|
|
267 | (1) |
|
|
267 | (2) |
|
Chapter 9 The FedRAMP cloud computing security requirements |
|
|
269 | (110) |
|
Security Control Selection Process |
|
|
269 | (3) |
|
Selecting the Security Control Baseline |
|
|
270 | (1) |
|
Tailoring and Supplementing Security Control Baseline |
|
|
270 | (1) |
|
FedRAMP Cloud Computing Overlay |
|
|
271 | (1) |
|
FedRAMP Cloud Computing Security Requirements |
|
|
272 | (90) |
|
|
273 | (3) |
|
Harmonizing FedRAMP Requirements |
|
|
276 | (1) |
|
Assurance of External Service Providers Compliance |
|
|
277 | (2) |
|
Approaches to Implementing FedRAMP Security Controls |
|
|
279 | (2) |
|
FedRAMP Security Control Requirements |
|
|
281 | (81) |
|
Federal Laws, Executive Orders, Policies, Directives, Regulations, Standards and Guidelines |
|
|
362 | (14) |
|
Federal Laws and Executive Orders |
|
|
363 | (1) |
|
Federal Policies, Directives, and Regulations |
|
|
363 | (3) |
|
|
366 | (1) |
|
Federal Guidelines and Interagency Reports |
|
|
367 | (9) |
|
|
376 | (1) |
|
|
376 | (3) |
|
Chapter 10 Security testing: vulnerability assessments and penetration testing |
|
|
379 | (22) |
|
Introduction to Security Testing |
|
|
379 | (2) |
|
|
381 | (6) |
|
|
387 | (5) |
|
FedRAMP Vulnerability Scan and Penetration Testing Requirements |
|
|
392 | (8) |
|
|
397 | (1) |
|
|
397 | (1) |
|
|
397 | (3) |
|
|
400 | (1) |
|
|
400 | (1) |
|
Chapter 11 Security assessment and authorization: Governance, preparation, and execution |
|
|
401 | (24) |
|
Introduction to the Security Assessment Process |
|
|
401 | (3) |
|
Governance in the Security Assessment |
|
|
404 | (3) |
|
Preparing for the Security Assessment |
|
|
407 | (14) |
|
Security Assessment Customer Responsibilities |
|
|
409 | (1) |
|
Selecting a Security Assessment Provider |
|
|
410 | (4) |
|
Security Assessment Provider Responsibilities |
|
|
414 | (7) |
|
Executing the Security Assessment Plan |
|
|
421 | (2) |
|
|
423 | (1) |
|
|
424 | (1) |
|
Chapter 12 Strategies for continuous monitoring |
|
|
425 | (28) |
|
Introduction to Continuous Monitoring |
|
|
425 | (10) |
|
Organizational Governance |
|
|
427 | (4) |
|
|
431 | (3) |
|
|
434 | (1) |
|
The Continuous Monitoring Process |
|
|
435 | (8) |
|
|
435 | (2) |
|
Implementing a CM Program |
|
|
437 | (6) |
|
Review and Update CM Strategy and Program |
|
|
443 | (1) |
|
Continuous Monitoring within FedRAMP |
|
|
443 | (8) |
|
|
451 | (1) |
|
|
452 | (1) |
|
Chapter 13 Continuous monitoring through security automation |
|
|
453 | (20) |
|
|
453 | (3) |
|
CM Reference Architectures |
|
|
456 | (10) |
|
Continuous Asset Evaluation, Situational Awareness, and Risk Scoring Reference Architecture |
|
|
456 | (1) |
|
CAESARS Framework Extension Reference Architecture |
|
|
456 | (10) |
|
Security Automation Standards and Specifications |
|
|
466 | (2) |
|
Security Content Automation Protocol |
|
|
467 | (1) |
|
Cybersecurity Information Exchange Framework |
|
|
468 | (1) |
|
Operational Visibility and Continuous Monitoring |
|
|
468 | (3) |
|
|
471 | (1) |
|
|
471 | (2) |
|
Chapter 14 A Case Study for Cloud Service Providers |
|
|
473 | (26) |
|
Case Study Scenario: "Healthcare Exchange" |
|
|
473 | (1) |
|
Applying the Risk Management Framework within FedRAMP |
|
|
474 | (23) |
|
Categorize Information System |
|
|
475 | (13) |
|
|
488 | (5) |
|
Implement and Document Security Controls |
|
|
493 | (4) |
|
Assessing Security Controls |
|
|
497 | (1) |
|
|
497 | (1) |
|
|
498 | (1) |
Index |
|
499 | |