Running Head: Implementing Risk Management Framework 1
Running Head: Implementing Risk Management Framework 1
Raul Mendoza
CSOL-530
assess and understand what risk exists and how best to reduce our risk. As a risk-based approach
we integrate security early and determine how best to implement applicable laws, policies,
RMF is best explained in detail through NIST Special Publications. These publications
explain Security and Privacy Controls for Federal Information Systems and Organizations. RMF
is a six-step process we used to assess our payroll system and apply the necessary security
controls to protect employees and the operations and assets of the company.
Step 1: Categorization
IMPLEMENTING RISK MANAGEMENT FRAMEWORK 3
requirements. Because our payroll system handles personal and sensitive data, we must apply the
appropriate security and privacy controls to protect it. Ultimately our goal is to implement
security and privacy controls in a manner that safeguards the Confidentiality, Integrity, and
Availability of our payroll data. There are three defined security objectives for information and
information systems. Within each we are able to determine whether the impact to each is Low,
Moderate, or High.
o Same as above
o Same as above
Because payroll is such an integral part of our company, we must understand for each
security objective what the impact levels should be. Payroll has the responsibility of, not only
employee compensation and salary, but contributes to our company’s reputation. When
considering the importance of the payroll system we must ensure that the information is only
accessible to authorized employees, the information is accurate and reliable, and is available with
the least amount of down time. The following categorization was recommended and approved by
leadership.
Confidentiality – High
IMPLEMENTING RISK MANAGEMENT FRAMEWORK 4
o Loss of trust
people
Integrity – High
Availability – High
Step 2: Select
Within our payroll system we have identified specific controls that must be implemented
to meet the Confidentiality, Integrity, and Availability (CIA) categorization. The sensitivity of
payroll data demands that we apply the highest level of security and privacy controls available.
Effective use of these controls helps us protect the payroll system and information against
advanced persistent threats. Because the controls are designed to address our companies protect
needs, I am confident we have applied them in a manner complementary to the business and our
employees. The following controls have been selected to meet our needs:
Step 3: Implement
surface of our payroll system. Since we have categorized our system as High – Confidentiality,
High – Integrity, and High – Availability, we must implement the associated controls within each
control family that are marked as high. I have identified the following control families and a few
controls within each that address the CIA areas we should focus our efforts; AC –
specific controls that must be implemented to ensure we meet the recommended baseline
Access Control: (National Institute of Standards and Technology [NIST], 2017, table E-1)
AC-1: Access control Policy and Procedures – In order to ensure the appropriate
controls are understood and implemented appropriately, we must develop an access control
policy to ensure employees understand who is authorized to access the payroll system. In
addition, we must also develop procedures that outline how best to allow the employees access.
control whom has access and the level of access based on permissions granted. In addition, it
control mechanisms to constrain what actions a person can take despite having access to the
information.
sensitive, we must ensure that no one person can perform all functions within it. Separation of
duties allows us to ensure employees cannot abuse their privileges and reduces the risk of
collusion.
AU-1: Audit and Accountability Policy and Procedures – Defines the role and
responsibilities of all individuals responsible for enforcing and monitoring user activity within
the payroll system. Procedures must also be defined to ensure the appropriate steps are taken
AU-2: Audit Events – By implementing the audit events control we are able to define
which types of events we are monitoring. Some events must be monitored based on laws and
AU-6: Audit Review, Analysis, and Reporting – Regular review, analysis, and
occurring within the payroll system. If suspicious activity occurs, we must understand and
MA-1: System Maintenance Policy and Procedures – Defines the roles and
responsibilities of all individuals responsible for maintenance of the payroll system. Procedures
must also be defined to ensure the appropriate maintenance steps are taken to ensure the
provides us the ability to document, approve, and verify that the appropriate controls are still
implemented.
MA-6 Timely Maintenance – Affords the company the ability to ensure that
adequate supply can all impact the availability of the payroll system, but by addressing and
SI-1: System and Information Integrity Policy and Procedures – Defines the roles
and responsibilities of all individuals responsible for enforcing and monitoring the integrity of
IMPLEMENTING RISK MANAGEMENT FRAMEWORK 8
the information contained within the payroll system. Procedures must also be defined to ensure
the appropriate remediation steps are taken when determining that the integrity of the
remote connections have been made. Monitoring these areas will provide us the ability to
verification tools provides us the ability to ensure unauthorized changes to software, hardware,
and information cannot occur. If manipulation of each occurs, the verification tools provide
Step 4: Assess
To better understand which controls have been applied and which have not, we must
assess the system to ensure traceability of the assessment results can be linked to the specific
control baselines. Without properly assessing our implementation of the selected controls, we
increase our risk by not understanding if we implemented them correctly. Since we have
categorized and implemented security baseline controls to meet High, High, High across the CIA
Overall Assessment
Maintenance Compliant
Step 5: Authorize
Prior to receiving an Authorization to Operate (ATO), there are a number of artifacts that
must be completed. An authorization package must be provided to the authorizing official for
Once we have provided the necessary package, the AO will review and determine
whether or not our current plan and risk mitigation is acceptable. Within the POA&M we
outlined specific actions that will be performed and the timeline in which they will be completed.
Because we understand the risk and have established specific tasks to reduce the risk, it is
expected that the AO will approve and grant us an ATO based on our input.
Step 6: Monitor
professionals and executive leadership visibility across our system on a consistent basis.
security, threats, and vulnerabilities despite our dynamic operational environment. Our plan will
enhance our ability to measure actionable and relevant issues as they arise. By applying specific
controls, we are able to define our plan and ensure our payroll system is effectively monitored. In
Throughout the entire process we have identified the security levels needed to ensure our
information meets the protection levels associated to the appropriate categorization. In doing so,
we are able to ensure the system remains secure despite employee rotation, changes to
provides us the ability to identify additional risks and reduce those risks by implementing
References
NIST. (2017). Plan of Action and Milestones. In In Security and Privacy Controls for
https://ole.sandiego.edu/bbcswebdav/pid-1096872-dt-content-rid-
4627450_1/courses/CSOL-530-MASTER/M3/sp800-53r5-draft.pdf
https://csrc.nist.gov/projects/risk-management/risk-management-framework-(RMF)-
Overview
National Institute of Standards and Technology. (2017). Security and Privacy Controls for
https://ole.sandiego.edu/bbcswebdav/pid-1096883-dt-content-rid-
4627450_1/courses/CSOL-530-MASTER/M3/sp800-53r5-draft.pdf