Customer Relationship Management News NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home CRM Systems Customer Service Contact Centers Business Intelligence More Topics...
You are here: Home / Computing / NIST Issues Draft Guide for IT Security
DDoS Protection Powered By Verisign
NIST Issues Draft Guide for IT System Security
NIST Issues Draft Guide for IT System Security
By Barry Levine / CRM Daily Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
MAY
14
2014

An initial public draft for IT systems' security guidelines was offered this week by the U.S. National Institute of Standards and Technology (NIST). The publication proposes guidelines that are implemented at every level of IT systems.

The document, "Systems Security Engineering: An Integrated Approach to Building Trustworthy Resilient Systems," said that it is addressing the engineering actions needed "for developing a more defensible and survivable information technology structure."

"We need to have the same confidence in the trustworthiness of our IT products and systems that we have in the bridges we drive across or the airplanes we fly in," said NIST fellow Ron Ross in a statement. He added that civil engineers employ principles of physics and engineering when they build, say, bridges, and, similarly, systems security engineering processes can be employed to produce trustworthy IT components and systems, using scientific and engineering principles.

International Standards

The report is available at http://1.usa.gov/1qDPGNY.

It utilizes international standards for systems and software engineering from the International Organization for Standardization, the International Electrotechnical Commission, and the Institute of Electrical and Electronic Engineers.

Eleven core systems processes for developing IT systems/software are addressed, with security recommendations for each process.

"The ultimate objective," the report said, "is to address security issues from a stakeholder requirements and protection needs perspective and to use established organizational processes to ensure that such requirements and needs are addressed early in and throughout the life cycle of the system."

The processes in the report cover stakeholder requirements definition process, requirements analysis, architectural design, implementation, integration, verification, transition, validation, operation, maintenance and disposal. Appendices include ones on information security risk management, use case scenarios, roles and responsibilities, security and trustworthiness, system resiliency, the Department of Defense engineering process, and acquisition considerations.

Final by December

While voluntary, governmental agencies and private companies that utilize these guidelines will be able to tout their compliance with NIST-recommended standards. NIST said that these guidelines, as best practices, could be applied to a wide range of systems, both small and large, general purpose and specialized, financial, defense and industrial control.

A final draft of the publication is targeted for December of this year. Revised drafts are expected to include use cases, risk management, and system resilience. The agency is seeking comments until July 11, which should be sent to sec-cert@nist.gov.

In February, NIST also released its "Framework for Improving Critical Infrastructure Cybersecurity," a separate voluntary standards effort for industry that had been ordered last year by a presidential directive.

The newest publication, first unveiled Tuesday at the University of Minnesota Technological Leadership Institute, is primarily targeted at the public sector, and resumes an effort begun two years ago under Vivek Kundra, who had been the first U.S. chief information officer.

In 2009, a task force between NIST and the intelligence agencies worked to standardize federal approaches to information security, and this report includes some of those results.

Tell Us What You Think
Comment:

Name:

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY BE OF INTEREST
Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.
MORE IN COMPUTING
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Are Government Spies Tipping Off Tor?
Less than a month ago, tech news headlines heralded a Tor Project breach. Now, some are saying that government spies are sharing information with Tor to help it prevent future breaches.
 
Backoff Malware Hits 1,000+ Businesses, Likely More
More than 1,000 businesses across the U.S. might have been affected by Backoff, a new kind of point-of-sale (PoS) malware, according to the Department of Homeland Security.
 
PlayStation Network Back Online After Attack
Sony’s PlayStation and Entertainment Network are back online after a distributed denial of service (DDoS) attack crashed the systems on Sunday. But Sony says no personal info was accessed.
 

Enterprise Hardware Spotlight
Alert: HP Recalls 5 Million Notebook AC Power Cords
HP is recalling about 5.6 million notebook computer AC power cords in the U.S. and another 446,700 in Canada because of possible overheating, which can pose a fire and burn hazard.
 
Acer's New Desktop Box Rides the Chrome OS Wave
Filling out its Chrome OS line, Acer is following the introduction of a larger Chromebook line earlier this month with a new tiny $180 desktop Chromebox and also a smaller Chromebook.
 
Feds OK $2.3 Billion IBM-Lenovo x86 Server Deal
IBM and Lenovo are celebrating U.S. approval of their x86-based server deal, having cleared some major security hurdles. The deal makes Lenovo a major player for enterprise data centers.
 

Mobile Technology Spotlight
Verizon Hops on the Voice-Over-LTE Bandwagon
Wireless provider Verizon is gearing up for a nationwide launch of its Voice-over-LTE service over the next several weeks, promising clearer and crisper phone calls and a Skype-like video service.
 
Smartphone 'Kill Switch' Law in California; Will Other States Follow?
California’s new law -- signed by Gov. Jerry Brown on Monday -- aimed at deterring cellphone theft could mean most mobile phones sold in the U.S. will soon include similar “kill-switch” tech.
 
Apple To Replace 'Small Percentage' of iPhone 5 Batteries
If you've noticed your iPhone 5 isn't acting right, it might be because of a bad battery -- and you might be eligible for a replacement. Apple is offering new batteries, though only for a small percentage of users.
 

Navigation
CRM Daily
Home/Top News | CRM Systems | Customer Service | Contact Centers | Business Intelligence | Sales & Marketing | Customer Data | CRM Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.