Newsletters
Customer Relationship Management News NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home CRM Systems Customer Service Contact Centers Business Intelligence More Topics...
APC Free White Paper
Optimize your network investment &
Enter to win a Samsung Galaxy Note

www.apc.com
Druva Resource Center
24/7/365 Network Uptime!
Average Rating:
Rate this article:  
NIST Issues Draft Guide for IT System Security
NIST Issues Draft Guide for IT System Security

By Barry Levine
May 14, 2014 2:45PM

Bookmark and Share
"The ultimate objective," the NIST draft systems security report said, "is to address security issues from a stakeholder requirements and protection needs perspective and to use established organizational processes to ensure that such requirements and needs are addressed early in and throughout the life cycle of the system."
 



An initial public draft for IT systems' security guidelines was offered this week by the U.S. National Institute of Standards and Technology (NIST). The publication proposes guidelines that are implemented at every level of IT systems.

The document, "Systems Security Engineering: An Integrated Approach to Building Trustworthy Resilient Systems," said that it is addressing the engineering actions needed "for developing a more defensible and survivable information technology structure."

"We need to have the same confidence in the trustworthiness of our IT products and systems that we have in the bridges we drive across or the airplanes we fly in," said NIST fellow Ron Ross in a statement. He added that civil engineers employ principles of physics and engineering when they build, say, bridges, and, similarly, systems security engineering processes can be employed to produce trustworthy IT components and systems, using scientific and engineering principles.

International Standards

The report is available at http://1.usa.gov/1qDPGNY.

It utilizes international standards for systems and software engineering from the International Organization for Standardization, the International Electrotechnical Commission, and the Institute of Electrical and Electronic Engineers.

Eleven core systems processes for developing IT systems/software are addressed, with security recommendations for each process.

"The ultimate objective," the report said, "is to address security issues from a stakeholder requirements and protection needs perspective and to use established organizational processes to ensure that such requirements and needs are addressed early in and throughout the life cycle of the system."

The processes in the report cover stakeholder requirements definition process, requirements analysis, architectural design, implementation, integration, verification, transition, validation, operation, maintenance and disposal. Appendices include ones on information security risk management, use case scenarios, roles and responsibilities, security and trustworthiness, system resiliency, the Department of Defense engineering process, and acquisition considerations.

Final by December

While voluntary, governmental agencies and private companies that utilize these guidelines will be able to tout their compliance with NIST-recommended standards. NIST said that these guidelines, as best practices, could be applied to a wide range of systems, both small and large, general purpose and specialized, financial, defense and industrial control.

A final draft of the publication is targeted for December of this year. Revised drafts are expected to include use cases, risk management, and system resilience. The agency is seeking comments until July 11, which should be sent to sec-cert@nist.gov.

In February, NIST also released its "Framework for Improving Critical Infrastructure Cybersecurity," a separate voluntary standards effort for industry that had been ordered last year by a presidential directive.

The newest publication, first unveiled Tuesday at the University of Minnesota Technological Leadership Institute, is primarily targeted at the public sector, and resumes an effort begun two years ago under Vivek Kundra, who had been the first U.S. chief information officer.

In 2009, a task force between NIST and the intelligence agencies worked to standardize federal approaches to information security, and this report includes some of those results.
 

Tell Us What You Think
Comment:

Name:



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Druva Resource Center
1.   NIST Issues Draft Guide for IT Security
2.   Druva Debuts eDiscovery Solution
3.   Are Your Enterprise Assets at Risk?
4.   Human Element Overlooked in Security
5.   Druva inSync Earns Highest Marks


advertisement


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Tor Internet Privacy Service Warns Users It Was Breached
You may never have heard of the Tor Project, but the Internet privacy service is making headlines. Tor’s devs say users might be victims of an attack launched against the project earlier this year.
 
Canadian Government Charges China With Cyberattack
The government of Canada is not happy with China. Canadian officials have accused "a highly sophisticated Chinese state-sponsored actor" of launching a cyberattack on its National Research Council.
 
Researchers Working To Fix Tor Security Exploit
Developers for the Tor privacy browser are scrambling to fix a bug revealed Monday that researchers say could allow hackers, or government surveillance agencies, to track users online.
 

Enterprise Hardware Spotlight
AMD's ARM-Based Opteron Out in $3K Dev Kit
It's dubbed "Seattle" and it's AMD's first 64-bit ARM-based Opteron processor. The low-power chip is being released as part of AMD’s Opteron A1100-series developer kit, and aimed at high-end data center needs.
 
Apple Updates MacBook Pros, Cuts Prices Up to $100
The popular MacBook Pro laptop line just got an update and a price cut of as much as $100. The MacBook Pro with Retina display now includes faster processors and double the memory.
 
Dell, BlackBerry Not Sweating Apple-IBM Alliance
IBM's recent move to partner with Apple to sell iPhones and iPads loaded with corporate applications has excited investors in both companies, but two rivals say they are unperturbed for now.
 

Mobile Technology Spotlight
Virgin Mobile Offers Custom Smartphone Plans
As the wireless carrier wars continue heating up, Virgin Mobile just threw the customization coal onto the fire. The firm has debuted a no-annual-contract plan with rates based on individual use.
 
Collaboration Provider Asana Revamps Mobile App
Asana, a collaboration software provider started by a Facebook founder, is now out with a rebuilt native iOS mobile app. It replaces one that even the company admits was not up to par.
 
Facebook: You Will Use Messenger, and You Will Like It
Starting this week, Facebook users with Android and iOS phones will be forced to use the separate Messenger app to send Facebook messages. Pending messages will still be visible in the main app.
 

Navigation
CRM Daily
Home/Top News | CRM Systems | Customer Service | Contact Centers | Business Intelligence | Sales & Marketing | Customer Data | CRM Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.