ais finals lesson 2 Flashcards
(75 cards)
responsible for ensuring that the IAP is developed and
implemented in accordance with regulatory and business requirements
Chief executive officer(CEO)
plays a crucial role in allocating resources and fostering commitment
to the IAP
Chief executive officer(CEO)
what does IAP stands for?
information assurance program
AO stands for?
authorizing official
ISO stands for?
Information system owner
is responsible for the execution of overall IT program and
delegate authority to the CISO for the management of the IAP.
Chief information officer (CIO)
is the
focal point for IT management and governance of IT portfolios
CIO
carries out the CIO’s security and privacy responsibilities
under FISMA and is responsible for managing the IAP
Chief information security officer
FISMA stands for?
Federal Information Security Management Act
responsible for:
* Ensuring information security management processes are integrated with
strategic and operational planning processes.
* Ensuring trained personnel sufficient to assist in complying with the
information assurance requirements in related legislation, policies, directives,
instructions, standards, and guidelines.
* Coordinating with senior management to report annually to the head of the
federal agency on the overall effectiveness of IAP, including progress of
remedial actions
CIO
is responsible for:
* Developing an organization-wide IAP that provides adequate security for
all information and information systems.
* Centralized reporting of information security-related activities.
* Developing and maintaining information security and privacy policies.
* Defining specific security requirements, tools, templates, and checklists to
support the IAP.
* Ensuring that personnel with significant system security responsibilities
are adequately trained.
CISO
s appointed by the CEO and is granted the authority to formally
assume responsibility for operating an information system at an acceptable level
of risk.
Authorizing official
has budgetary oversight for an information system and is
responsible for the mission/business operations supported by the system.
Authorizing official
approve systems security plans (SSPs), memorandums of agreement or
understanding (MOA/MOU), and plans of action and milestones (POA&Ms
Authorizing official
approve systems security plans (SSPs), memorandums of agreement or
understanding (MOA/MOU), and plans of action and milestones (POA&Ms
Authorizing official
is responsible for:
* Ensuring the security posture of the Agency’s information systems is
maintained.
* Reviewing security status reports and security documents and determining if
the risk to the Agency of operating the system remains acceptable.
* Reauthorizing information systems when required.
* Assisting in response to security incidents and privacy breaches.
* Appointing, when required, a designated representative to coordinate and
carry out system security responsibilities
Authorizing official
is appointed by the CEO and serves as the focal point for the information
system and is the central point of contact during the security authorization process.
Information system owner (ISO)
is responsible for:
* Coordinating data protection requirements with Information Owners (IOs) that have
information stored and processed in the system.
* Deciding, in coordination with the IO and Information System Security Officer
(ISSO), who has access to the system. Determining access privileges and rights to
the system.
* Ensuring that system users and support personnel receive the required security
training
(e.g., instruction in the Rules of Behavior).
* Ensuring that the system is compliant with the required security controls.
* Appointing an ISSO for the information system to carry out the day-to-day
security responsibilities.
* Reviewing system security documents (e.g., SSP, POA&M, etc.).
* Ensuring that system-specific security training is provided to the users and
administrators of the systems.
* Ensuring that remediation activities for the system are performed as
needed to maintain the authorization status.
* Appointing an Information System Security Manager (ISSM) to coordinate
system security task and provide oversight responsibilities to ensure security
activities are performed.
ISO
is an official with regulatory, management, or operational authority
for specified information and is responsible for establishing the policies and
procedures governing its generation, collection, processing, dissemination,
and disposal.
Information owner (IO)
responsible for:
* Providing input to ISOs regarding the security requirements and controls for
the systems where the information is processed, stored, or transmitted.
* Retaining information in accordance with the National Archives and
Records Administration (NARA) record schedule.
* Categorizing the sensitivity level5 of the information stored and
processed in the system.
* Establishing rules for appropriate use and protection of the information.
* Coordinating with the ISO when security requirements change.
* Assisting in the response to security incidents.
* Ensuring that the PII inventory is updated
IO
is appointed by the ISO and works closely with the ISO or ISSM to
ensure that the appropriate security posture is maintained for the information
system.
information system security officer(ISSO)
serves as a principal advisor on all the security related issues
of an information system.
ISSO