Security Convergence - Achieving Integrated Security 2022 Edition - Final
Security Convergence - Achieving Integrated Security 2022 Edition - Final
2022 Edition
This first edition of Security Convergence: Achieving Integrated Security is dedicated to our good friend and
colleague, Dr. William “Will” Morrison, a vital contributor to the Interagency Security Committee (ISC) who
worked tirelessly for the betterment of federal facility security everywhere.
Dr. Morrison served on numerous ISC subcommittees and working groups, including as Chair of the
Convergence Subcommittee since 2011. A Certified Protection Professional, he personified security
convergence, representing the ISC through unwavering collaboration with the government’s Chief
Information Officer community - particularly in the identity, credentialing, and access management
mission space. Dr. Morrison knew the importance of taking a unified approach to operational technology
such as Physical Access Control Systems (PACS), and he readily shared his time and expertise to help
many ISC members with their PACS programs.
Dr. Morrison’s dedication, professionalism, and mentorship are best symbolized in this closing line of an
email last year: “When you have a chance to take a deep breath, let’s talk again and solve the world’s
problems.”
As Chief of the ISC, I am pleased to introduce Security Convergence: Achieving Integrated Security, An
Interagency Security Committee Best Practice, 2022 Edition, which replaces the ISC document titled
Securing Government Assets through Combined Traditional Security and Information Technology: An
Interagency Security Committee White Paper, February 2015. This publication provides best practices,
methodologies, and recommendations to enable federal executive branch departments and agencies to
achieve integrated security through planning, promoting, and implementing unity of effort across
disciplines, including physical security, information security, cybersecurity, and information technology.
Reviewed annually and updated as needed, this best practice represents exemplary leadership from the
Convergence Subcommittee and collaboration across the entire ISC membership.
Daryle J. Hernandez
Chief, Interagency Security Committee
Cybersecurity and Infrastructure Security Agency
Employing operational technology, security professionals rely heavily upon the information technology
(IT) infrastructure to host and interconnect the various
components of VSS, IDS, and ePACS. Utilizing IT In February 2021, attackers used
infrastructure to interconnect Electronic Security System credentials obtained from the dark
(ESS) components across Local Area Networks (LAN), web to gain access to a water plant.
Wide Area Networks (WAN), Metropolitan Area Networks Using the plant’s TeamViewer
(MAN), or the Internet requires convergence between the software, the attackers manipulated
traditional security disciplines and the IT community. the pH in the city’s water to
dangerous levels by increasing the
Webster’s dictionary defines convergence as “the act of sodium hydroxide quantity by 100
converging and especially moving toward union or times. Fortunately, a facility worker
uniformity”, or “the merging of distinct technologies, was able to reverse the change
industries, or devices into a unified whole”. Thus, for before it could take effect.
organizations seeking to achieve integrated security,
security convergence becomes a collaborative effort to integrate physical security, information security,
cybersecurity, information assurance, and information technology to protect assets.
Security Convergence: Achieving Integrated Security, An Interagency Security Committee (ISC) Best Practice,
2022 Edition provides:
• Guidance to assist federal executive branch departments and agencies in achieving integrated
security through best practices and methodologies.
• Recommendations for planning, promoting, and implementing a unified effort between several
related areas, including information security, physical security, cybersecurity, and information
technology.
• A planning model for the merging of parallel risk management processes, the optimization of
organizational alignment, as well as recommended training and performance management.
This document ultimately seeks to create a paradigm shift by promoting the integration of organizational
security disciplines to address the convergence of IT and security functions.
The day after the attack, the president realized federal facilities were vulnerable. There were no minimum-
security standards across the executive branch nor existing federal authority to assess vulnerability,
develop standards, or ensure compliance with security standards. The president directed the Department
of Justice (DOJ) to assess the vulnerability of federal facilities to acts of terrorism and violence and
develop recommendations for minimum standards. A working group was formed to identify possible
threats, vulnerabilities, and consequences to federal facilities. The group issued the “Department of Justice
Vulnerability Assessment of Federal Facilities” report, which recommended the creation of the ISC and
outlined 52 minimum security standards and the method of categorizing buildings by security level.
In October 1995, the president signed Executive Order (EO) 12977 establishing the ISC, which has
developed and published over 20 policies, standards, and recommendations to identify, assess, and
prioritize risks at federal facilities.
By EO 13286, the Department of Homeland Security (DHS) has been the home of the ISC since its transfer
from the General Services Administration (GSA) in March 2003.
The convergence of cyber across all security functions has been a focus area for ISC members since the
2015 publication of Securing Government Assets Through Combined Traditional Security and Information
Technology White Paper. The ISC recognized the necessity for additional guidance and reengaged its
Convergence Subcommittee to develop this guidance. Given the ISC’s diverse membership, the
Subcommittee was able to draw upon a variety of subject matter experts to consolidate security
convergence information into a single best practices document.
ANNOTATED SOURCES:
TERM DEFINITION
Cybersecurity1 The ability to protect or defend the use of cyberspace from cyber-attacks.
The explicit or implicit decision to not take an action that would affect all or
Risk Acceptance2
part of a particular risk.
As required by FISMA, the National Institute for Standards and Technology (NIST) provides technical
standards and guidance to executive departments and agencies on IT security. Federal departments and
agencies must meet the minimum-security requirements using the security controls in NIST Special
Publication (SP) 800-53 Rev. 5, Security and Privacy Controls for Federal Information Systems (2020).
Security controls are the safeguards or countermeasures within a system or organization that protect the
confidentiality, integrity, and availability of the system and its information and that manage information
security risk. The controls selected or planned must be documented in a System Security Plan (SSP) in
accordance with NIST SP 800-18 Rev. 1, Guide for Developing Security Plans for Federal Information
Systems (2006).
The composite of federal standards and controls documents represented in NIST SP 800-37 Rev 2, Risk
Management Framework (RMF) for Information Systems and Organizations (2018), provides guidelines for
managing information security and privacy risk, as applicable to systems and organizations. The
guidelines clarify the security and privacy risks inherent when operating a system and managing risk at an
acceptable level based on countermeasures, and mandate senior official authorization when bringing a
system into operation. Applying the NIST RMF and granting and maintaining an Authority to Operate
(ATO) is akin to granting a clearance or certifying a facility for certain activities.
Security professionals use The Risk Management Process for Federal Facilities (RMP): An ISC Standard to
develop recommended physical security countermeasures for a
In August 2020, a group of facility. Recent revisions have included the identification and
hackers breached security camera implementation of security countermeasures for Building Access
data from a Silicon Valley security and Control Systems (BACS)1. Additionally, the ISC Design-Basis
provider. The breach allowed the Threat (DBT) Report provides an estimate of the threat federal
hackers access to live feeds from facilities face across a range of undesirable events. The DBT details
over 150,000 surveillance cameras the threat of cyber-attacks to include unauthorized access,
installed in hospitals, police interruption of services, and modification of services to federal
departments, prisons, and facility Information and Communication Technology (ICT).
manufacturing plants.
Organizations should first identify the level of risk associated with
individual positions and then determine what level of security is required before assigning a designation.
Position designation is achieved by assessing the duties and responsibilities of the position to determine
the risk level, (i.e., the degree of potential damage to the efficiency or integrity of the service from
potential misconduct of an incumbent) and sensitivity level, (i.e., the potential for the incumbent to bring
a material adverse effect on the national security and the degree of that potential effect).
1
More information on countermeasures and BACS can be found in The Risk Management Process for
Federal Facilities: An Interagency Security Committee Standard Appendix A and B.
• Defense-in-Depth
• Risk Management
• Organizational Alignment
• Cultural Adaptation
• Performance Management
• Supply Chain Risk Management
2
NIST SP 800-53 Rev. 5, Security and Privacy Controls for Information Systems and Organizations (2020)
Security controls: Security controls include safeguards or countermeasures prescribed for an information
system or an organization to protect the confidentiality, integrity, and availability of the system and its
information2. Security controls can include administrative, technical, and physical aspects. Organizations
meet this requirement through the application of the NIST Risk Management Framework. Organizational
training should include recognizing and reporting potential indicators of insider threat along with
cybersecurity awareness and reporting. The FISMA3 requires agency information security programs to
include security awareness training on information security risks associated when complying with agency
policies and procedures intended to reduce risk. In addition, FISMA requires agencies to provide role-
based training to personnel with significant responsibilities for information security.4
Personnel Vetting: Through proper vetting, agencies assess potential risks presented by personnel.
Depending on the position type, position risk, and sensitivity level, the agency will determine the
individual's suitability or fitness to work for or on behalf of the government, eligibility to hold a sensitive
position, have access to classified information, and hold a personal identity verification credential.
Specifically, this relates directly to Federal Identity, Credential, and Access Management (FICAM) and
Homeland Security Presidential Directive 12 (HSPD-12), which provide a common, standardized identity
credential allowing secure, interoperable physical and logical access.
One way to accomplish authentication is to acquire a Physical Access Control System (PACS) solution from
one of the approved solutions on the GSA FIPS 201 Approved Products List (APL). Departments or
agencies can then customize a methodology (Table 1), where the security practitioner can use the FSL
designation to support the necessary Levels of Assurance (LOA) for defined logical or physical functional
3
https://www.cisa.gov/federal-information-security-modernization-act
4
https://www.gao.gov/products/gao-21-288
5
NIST SP 800-37 Rev 2, Risk Management Framework for Information Systems and Organizations (2018).
• Managing risk by installing security and privacy capabilities into IT systems through the
application of security and privacy controls.
• Maintaining awareness of the security and privacy state of systems on an ongoing basis through
enhanced monitoring processes.
The RMF also provides essential information to senior leaders and executives to facilitate decision-making
regarding the acceptance of risk to organizational operations, organizational assets, individuals, other
organizations, and the nation arising from the operation and use of systems. The RMF links to a suite of
NIST standards and guidelines to support the implementation of risk management programs to meet the
requirements of FISMA (Figure 5).
Many variables exist that may influence organizational alignment including size, mission, culture, and
budget. The Office of Management and Budget (OMB) Memorandum M-19-17, Enabling Mission Delivery
through Improved Identity, Credential, and Access Management (ICAM), provides a benchmark on how an
organization can “harmonize its enterprise-wide approach to governance, architecture, and acquisition.”6
6
“Enabling Mission Delivery through Improved Identity, Credential, and Access Management” (OMB M-
19-17, 2019).
In 2008, the NASA Assistant Administrator for Office of Protective Services created the position of an
Integrated Security Strategy Program Manager to establish and utilize an integrated security
strategy approach for all protective services operations. This strategy encompasses all security
disciplines across the agency, mission directorates, centers, and projects/programs. The strategy
increased efficiencies through a more integrated approach to governing and managing the agency’s
security.
As an example, NASA Center Protective Services Offices conducts the FSL determination with support
from the CIO, Center Facilities Office, and designated representatives of the assessed facility to ensure
operational technology, CIO designated High Value Assets (HVA), and critical interdependencies for
FSL III and FSL IV designated facilities are identified and afforded the same LOP as the asset/mission
or facility.
• An MOA/ISA establishes the formal relationships and processes and defines the cooperative work
efforts and responsibilities of the Office of the Chief Security Officer (OCSO) and the Office of the
Chief Information Officer (OCIO).
o The MOA/ISA should define the cooperative work efforts between physical security, IT
personnel, the system owner, (e.g., CSO), and the service provider, (e.g., CIO), and include
configuration management, an APL, the SSP, and operating procedures.
• Under a procedural approach, physical security and cybersecurity are fully incorporated into all
aspects of the organization’s work to help drive decision-making and risk mitigation as
demonstrated by the USCIS procedural approach.
Best Practice: USCIS Procedural Approach
In 2020, The United States Citizen and Immigration Services (USCIS) used the “procedural approach”
to create a cross-functional team to provide a collaborative effort between the USCIS Office of
Information Technology (OIT) and the Office of Security and Integrity (OSI). The collaboration
operates under a single charter to plan, develop, prioritize, and deploy ePACS across all facilities
within USCIS. This collaboration included the modernization of the Physical Access Control System
(PACS) to meet the Federal Identity, Credentials, and Access Management (FICAM) and HSPD-12
criteria and then integration of PACS on the USCIS network. Leveraging a single application
programming interface for managing the systems now allows OIT the ability to manage PACS
hardware, software, and firmware, ensuring the systems operate at peak performance. It also provides
OIT the ability to manage access to systems software and hardware via networking protocols to
protect information systems from cyber security threats. Finally, this concept provides the OSI team
the ability to track, audit, and ensure only authorized personnel have access to the facilities and assets
they are responsible for protecting.
6.4.1 Training
Focused training is an important vehicle for developing a capable workforce, expanding vocabularies, and
bridging differences between various professional disciplines. Departments or agencies may consider
developing internal training to support integrated security initiatives. The following recommended topics
provide examples of what to include in organizational training modules.
Description: The course will help the end-user/stakeholder identify basic security system terminology.
Learning Objectives: Upon successful completion of this course, the end-user/stakeholder should be
able to:
1. Identify basic physical security terminology.
2. Define basic electronic security terminology (to assist with understanding related components
of Electronic Security Systems such as basic parts of Access Control Systems or Video
Surveillance Systems).
3. Identify basic cybersecurity terminology.
4. Explain how the combination of physical security and cyber security is a step towards
integrated security.
5. Communicate across the security enterprise with appropriate standards/approvals in place.
Description: The course will help the end-user/stakeholder describe the relationship and
interdependencies between physical security and cybersecurity elements.
Learning Objectives: Upon successful completion of this course, the student should be able to:
1. Identify cyber-physical systems.
2. Describe the interdependencies between the physical security and cybersecurity elements.
3. Summarize concepts and components that bridge cyberspace with physical space.
4. Apply/establish a framework aligning physical security and cybersecurity.
Description: The course provides the stakeholder with the tactics, techniques, and procedures to
develop a planning model or structure to align physical security and cybersecurity goals while
delivering best practices and lessons learned.
Learning Objectives: Upon successful completion of this course, the student should be able to:
1. Analyze and employ integrated security solutions.
2. Align physical security and cybersecurity policies and goals.
3. Develop integrated security best practices.
7
The Risk Management Process for Federal Facilities: An Interagency Security Committee Standard,
Appendix E: Use of Physical Security Performance Measures, (ISC, 2021)
• Surveillance systems
• Safety management systems
• Lighting control systems
• ePACS
• Vertical transportation systems
• Routine business and emergency communications systems
• IDS
• Building automation system management dashboard and supervisory console
• Heating, ventilation, and air conditioning control systems
• Power and energy management systems
To optimize resources, organizations should collaborate on implementation between the OTA and annual
FISMA reviews to ensure implementation of effective security controls in conjunction with the OTA.
CISA’s 2021 publication, Defending Against Software Supply Chain Attacks, a collaborative effort between
CISA and NIST, provides an overview of software supply chain risks and recommendations for software
customers and vendors when using the NIST Cyber Supply Chain Risk Management (C-SCRM) framework
and the Secure Software Development Framework to identify, assess, and mitigate risks.
6.6.3 Mitigating ICT Supply Chain Risks with Qualified Bidder and
Manufacturer Lists
Establishing and utilizing vetted, qualified sources of supplies can limit an organization’s exposure to risk.
Incorporating C-SCRM focused qualification criteria into existing or new qualification list processes can
provide a targeted and effective means of ensuring that an ICT supplier or product is sufficiently
trustworthy.9 The FIPS 201 Evaluation Program and APL provide a great example of a qualified list.
In June 2006, the OMB issued Memorandum M-06-18 that requires federal agencies to procure only
qualified products and services listed on the GSA APL when implementing HSPD-12 into their
environment. Procurement of approved products and services facilitates the government-wide
objective of a federated and interoperable FICAM segment architecture, and ensures compliance,
consistency, and alignment of commercially available products and services with the requirements and
functional needs of FICAM implementer. The APL provides federal agencies with products and services
that have been approved for FICAM implementation based on rigorous security vulnerability and
interoperability testing performed by the FIPS 201 Evaluation Program (ID Management, 2019). Product
testing evaluates and certifies services and commercial products used in credentialing systems, physical
access control systems, and public key infrastructures.
8
Defending Against Software Supply Chain Attacks (CISA, 2021)
9
Mitigating ICT Supply Chain Risks with Qualified Bidder and Manufacturer Lists (CISA, 2021).
The ICT SCRM Task Force, established by CISA in December 2018, produced two publicly available
documents (below) to help assess an ICT vendor’s trustworthiness, as well as a report that evaluates ICT
supply chain threats.
1. Mitigating ICT Supply Chain Risks with Qualified Bidder and Manufacturer Lists (CISA, 2021): This
document provides a list of criteria and factors that can be used to inform an organization's
decision to build or rely on a qualified list for the acquisition of ICT products and services.
2. Vendor SCRM Template (CISA, 2021): This document provides a set of questions regarding an ICT
supplier/provider’s implementation and application of industry standards and best practices that
can help guide supply chain risk planning in a standardized way. The template provides clarity to
organizations on reporting and vetting processes when purchasing ICT hardware, software, and
services.
EO Executive Order
IA Information Assurance
IT Information Technology
SP Special Publications
• IS-1170 Introduction to the Interagency Security Committee and Risk Management Process
• IS-1171 Introduction to Interagency Security Committee Documents
• IS-1172 Interagency Security Committee Risk Management Process: Facility Security Level
Determination
• IS-1173 Interagency Security Committee Risk Management Process: Levels of Protection and
Application of the Design Basis Threat Report (FOUO). Note: A Homeland Security Information
System (HSIN) account is required to access this course.
• IS-1174 Interagency Security Committee Risk Management Process: Facility Security Committees
Risk Management Framework for Systems and Organizations Introductory Course is offered by the NIST
Computer Security Resource Center.
• Cybersecurity
• Critical Infrastructure Training
• Insider Threat Training and Awareness
• Federal Virtual Training Environment
• PCII Authorized User Training
• Security and Awareness Training
• Risk-Based Performance Standard Training
• Mitigating ICT Supply Chain Risks with Qualified Bidder and Manufacturer Lists
ISC
• “Securing Government Assets Through Combined Traditional Security and Information
Technology White Paper”
NIST
• FIPS 199, Standards for Security Categorization of Federal Information and Information Systems
• FIPS 200, Minimum Security Requirements for Federal Information and Information Systems
• FIPS 201-2, Personal Identity Verification (PIV) of Federal Employees and Contractors
• NISTIR 8011 Vol. 4, Automation Support for Security Control Assessments: Software Vulnerability
Management
• NISTIR 8062, An Introduction to Privacy Engineering and Risk Management in Federal Systems
• SP 800-18 Rev. 1, Guide for Developing Security Plans for Federal Information Systems
• SP 800-37 Rev. 2, Risk Management Framework for Information Systems and Organizations: A
System Life Cycle Approach for Security and Privacy
• SP 800-39, Managing Information Security Risk: Organization, Mission, and Information System
View
10
See Organization pages for most current versions of documents.
• SP 800-53A Rev 4, Assessing Security Controls in Federal Information Systems and Organizations
• SP 800-60 Vol 1 Rev. 1, Guide for Mapping Types of Information and Information Systems to
Security Categories
• SP 800-116 Rev.1, Guidelines for the Use of PIV Credentials in Facility Access
• SP 800-137, Information Security Continuous Monitoring (ISCM) for Federal Information Systems
and Organizations
• SP 800-161, Supply Chain Risk Management Practices for Federal Information Systems and
Organizations
Other
• Federal Information Security Management Act (FISMA) of 2002 and 2014
• Office of Management and Budget Memorandum M-19-17, Enabling Mission Delivery through
Improved Identity, Credential, and Access Management
Convergence Subcommittee
Contributing Authors
Subcommittee Members
Antonio Gallegos
Cybersecurity and Infrastructure Security Agency
Tom Seaman
Program Analyst