-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
PM-9 #19
Comments
Links
|
Story drafts
Quarterly
|
Compelling evidence
NOTE: For all documents:
Why:Without clear prioritization from executives of the most import digital assets to protect and how much to invest protecting them, cyber security staff will not have enough information to make risk-based decisions. Alternative: Without concise [formal?] executive guidance regarding what risks are tolerable and what risks are not, staff will be unable to prioritize and unable to balance security and innovation. How:
Acceptance Criteria
|
Continuous Monitoring DetailsEnabling continuous monitoring requires:
Data for monitoring
Options
fname="url or path to file"
import os.path
os.path.isfile(fname) or
|
I spent some time examining the Python PEP model then created a "Practices" repository for GovReady PBC inspired by PEP. I discover that PEP model addresses important concerns:
It appears to me a surprisingly robust model that can organizes an extensible repository of official decisions and practices, including meta processes (processes about the process). PEP is not machine readable, but the documents are friendly to web-based management, indexing, and discussion. |
Moving forward with "Practice" document management model based on PEP and RFC model. Current version: https://github.com/GovReady/govready-pbc-practices/blob/master/practices/2-draft-accepted/p-0020.md |
BLUF
Team needs to produce a memo or other document that is the organization's official statement describing how the organization systematically manages cyber risk.
Effort
Initially developing the document is a one time activity performed by executives. The document is disseminated to everyone, especially managers and cyber. The document needs to be updated on defined schedule.
Good
The clearer the prioritization of risk, the easier the rest of org will make good trade-offs and direct resources to priorities.
Bad
A bad document is general and pushes prioritization downstream leading to security viewing all risks as equal.
Story
Story for development team to know location of document and read it
Examples
DoD is compliant because of memo DoDI 8510.01 stating how DoD uses NIST RMF as strategy.
You need a memo declaring what you will use as a strategy.
artifact is the memo.
CDM
Make document public. Separate proprietary info to separate doc and make available enterprise wide.
Roles
Reference
RISK MANAGEMENT STRATEGY
The organization:
a. Develops a comprehensive strategy to manage risk to organizational operations and assets, individuals, other organizations, and the Nation associated with the operation and use of information systems;
b. Implements the risk management strategy consistently across the organization; and
c. Reviews and updates the risk management strategy [Assignment: organization-defined frequency] or as required, to address organizational changes.
The text was updated successfully, but these errors were encountered: