The primary incentive for compliance with the Federal Information Security Management Act (FISMA) is to identify the people, systems, and processes an agency needs to achieve its business objectives, and to protect them appropriately. A secondary incentive is that good FISMA grades bolster an agency's reputation within the House Government Reform Committee and in the eyes of citizens.
This white paper can serve as a reference for IT groups that want to increase information security and ease the path to improving FISMA compliance. It reduces the research that agency IT groups must conduct to achieve FISMA compliance and reduces risk by mapping the control groups defined by the National Institute of Standards and Technology (NIST) to specific security solutions that Cisco® provides in the Cisco® Self-Defending Network portfolio.
Each section of the white paper focuses on one NIST control, describing how that control helps the agency achieve its mission and then listing the Cisco solutions that fulfill that control's requirements. Cisco provides network and security systems that are designed from the outset to operate and be managed as a system. An integrated approach to security helps agencies meet federal government requirements for more effective security, avoids time-consuming and expensive integration work, and reduces management burden. This is a recipe for faster FISMA compliance at lower cost.
FISMA Controls by Types
Table 1 shows FISMA controls by type: technical, management, or operational. This document concerns itself with those controls that appear in boldface type.
Table 1. FISMA Controls by Type
Technical
Management
Operational
AC: Access Control
AU: Audit and Accountability
IA: Identification and Authentication
SC: System and Communications Protection
CA: Certification, Accreditation, and Security Assessments
PL: Planning
SA: System and Services Acquisition
AT: Awareness and Training
CM: Configuration Management
CP: Contingency Planning
IR: Incident Response
MA: Maintenance
MP: Media Protection
PE: Physical and Environmental Protection
PS: Personnel Security
RA: Risk Assessment
SI: System and Information Integrity
Access Control (AC)
Type of control: Technical
FISMA Requirement
Access Control (AC) addresses access policies and procedures, account management and the associated tools and techniques for access enforcement and password control, systems notifications, separation of duties, session lock and termination, marking and labeling, and remote and wireless access.
Mission Impact
The government's mobile workforce is expanding rapidly as agencies realize the value of remote network access and encourage telework to support plans for Continuity of Operations (COOP). As a result, IT organizations are managing many more mobile and remote devices than ever before, including PCs, laptops, servers, smart phones, and personal digital assistants, often with the same resources. To protect confidentiality and prevent network disruption from attack or infection, IT groups need to validate that users are authorized to access systems and that the users' devices are infection-free and compliant with security policy. To accomplish this, agencies need network-based access controls that securely manage who and what can access the network, as well as when, where, and how that access can occur. The goal is to prevent inappropriate and unauthorized use of critical systems.
Cisco Solutions
Table 2. Cisco Products and Services for Access Control
Function Required for FISMA Compliance
Cisco Products and Services
Access control
• Cisco Secure Access Control Server (ACS)
• Network Admission Control
• Cisco Catalyst® routers and Cisco routers using the Cisco IOS® Software
Identity-Based Network Services (IBNS)
Cisco Secure ACS
Security management
• Cisco consulting and integration services
• Services from Cisco security partners
Major Capabilities of Cisco Solutions for Access Control
• Enables granular control of network access by authorizing different types of network services for users or groups
• Provides comprehensive admission control across all access methods to prevent noncompliant and rogue endpoints from affecting network availability
• Enables user accounting and auditing as well as tracking and monitoring of user behavior inside the LAN
• Promotes greater employee mobility and flexibility, which supports COOP initiatives and can increase productivity and the effectiveness of government services
• Enforces a uniform security policy for all users, regardless of how they access the network
• Reduces the administrative and management burden involved in scaling user and network administrator access to the network
• Centralizes the control of all user privileges and distributes them to hundreds or thousands of access points throughout the network
• Provides detailed reporting and monitoring capabilities of network users' behavior and keeps a record of every access connection and device configuration change across the entire network, as required by FISMA and other security regulations
• Supports a broad variety of access connections, including wired and wireless LAN, dialup, broadband, content, storage, voice-over-IP (VoIP), firewalls, and VPNs
Audit and Accountability (AU)
Type of control: Technical
FISMA Requirement
The Audit and Accountability (AU) control enforces appropriate use policy for network and information systems. It also enables agencies to audit usage of information systems and to validate compliance with standards by producing supporting documentation and reports.
Mission Impact
Agencies need to enforce appropriate use of network-based information systems and be able to produce an audit trail of that usage. Requests to view a security policy or compliance reports can come from stakeholders, regulators, or the Inspector General or other auditors. To help ensure effective audits and demonstrate accountability, agencies need to create, protect, and retain information-system audit records. This will enable the monitoring, analysis, investigation, and reporting of unlawful, unauthorized, or inappropriate information system activity. These capabilities give government the ability to trace network activity to individual users so that they can be held accountable.
Cisco Solutions
Cisco solutions for the AU control include tools to generate reports for annual inspector general audits. Cisco Security Manager generates reports on infrastructure configuration, including inventory. Cisco Secure Access Control Server keeps a record of every access connection and device configuration change across the entire network. Cisco Secure Monitoring, Analysis, and Response System (Cisco Secure MARS) correlates network anomalies with security incidents.
Table 3. Cisco Products and Services for Audit and Accountability
Function Required for FISMA Compliance
Cisco Products and Services
Security management
• Cisco Security Manager
• Cisco Secure Access Control Server
• Cisco Secure Monitoring, Analysis, and Response System (Cisco Secure MARS)
• CiscoWorks Network Compliance Manager
• CiscoWorks Security Information Management Solutions (SIMS)
Consulting and integration services
• Cisco Advanced Services
• Services from Cisco Certified Partners in security
Major Capabilities of Cisco Solutions for Audit and Accountability
• Maintains a system log of network events and administrative actions
• Correlates events as they happen at different levels of the network-desktop, server, network-to show the entire security incident
• Automatically diagnoses the root cause of a security breach and suggests possible remedial actions
• Dynamically links to the Cisco Security Manager system, enabling operators to quickly execute remedial action
• Maintains an access control database for audit and for nonrepudiation, which is essential for prosecution
Configuration Management (CM)
Type of control: Operational
FISMA Requirement
The Configuration Management (CM) control addresses policies and procedures, change control, monitoring of configuration changes, configuration settings, and access restrictions for configuration changes.
Mission Impact
Changes to a router or switch configuration, whether intentional or accidental, have the potential to disrupt the agency network. Therefore, agencies need a way to control and track all changes to the information system. This requires a policy that governs configuration changes and provides automated enforcement of the policy by the network. The goals are to protect the network, reduce network outages, verify network resiliency, and demonstrate regulatory and IT compliance. The ability to control and track changes also helps agencies identify security gaps in their current configurations, track and control changes, and pinpoint misconfigurations in their environment. After identifying problems, agencies need a way to resolve them in a timely manner.
Cisco Solutions
Table 4. Cisco Products and Services for Configuration Management
Function Required for FISMA Compliance
Cisco Products and Services
Configuration management
• Cisco Security Manager
• Cisco Configuration Assurance Solution
• CiscoWorks Network Compliance Manager
Consulting and integration services
• Cisco Advanced Services
• Services from Cisco Certified Partners in security
Major Capabilities of Cisco Solutions for Configuration Management
• Lowers cost of ownership by reducing the number of systems to maintain
• Reduces risk by enabling verification and test of configuration changes before they are applied to the production network
• Enforces change-control procedures
• Enables consistent policy enforcement
• Enables rapid, automated deployment of policy updates
• Reduces risk from operator error
System and Information Integrity (SI)
Type of control: Operational
FISMA Requirement
The System and Information Integrity (SI) control addresses policies and procedures, remediation of security flaws, security alerts and advisories, malicious code protection, intrusion detection and prevention tools and techniques, protection against spyware and other malicious code, application and information integrity, and more.
Mission Impact
As part of e-government initiatives, agencies share information with the public and other constituents over networks. This requires two security precautions. The first protects sensitive citizen and government information from disclosure or alteration in transit and in storage. The second prevents disruption from network infection or attack, which requires the ability to identify, report, and remediate system flaws before allowing a connection to the network. The SI control refers to the IT staff's ability to patch systems in a timely manner; protect against worms, viruses, and spyware; and monitor and protect the systems from both external and internal attacks.
Cisco Solutions
Table 5. Cisco Products and Services for System and Information Integrity
Function Required for FISMA Compliance
Cisco Products and Services
Perimeter protection
Cisco ASA 5500 Series Adaptive Security Appliance
Encryption tools for confidentiality and information integrity
• Cisco Secure Monitoring, Analysis, and Response System (Cisco Secure MARS)
• Cisco Secure IntelliShield Alert Manager
• Cisco Incident Control System (ICS), developed jointly with Trend Micro
Consulting and integration services
• Cisco Advanced Services
• Product Security Incident Response Team (PSIRT)
• Services from Cisco Certified Partners in security
Major Capabilities of Cisco Solutions for System and Information Integrity
• Enables comprehensive security management and monitoring
• Automatically identifies, reports, and remediates security flaws in devices attempting to connect to the network
• Manages the flaw remediation process and automatically installs updates without intervention from the agency employee or IT
• Periodically determines the state of information system components, regarding malware remediation
• Provides monitoring and analysis to alert and advise the staff of improper use
• Ensures that desktop and server configurations comply with prevailing policy
• Automatically learns of new threats from trusted resources
• Adapts policy changes without disruption to ongoing live operations
• Provides protection against day-zero threats using signature-based and behavior-based methods
• Prevents unauthorized changes to configuration and addition of nonapproved software
Identification and Authentication (IA)
Type of control: Technical
FISMA Requirement
The Identification and Authentication (IA) control addresses policies and procedures, device and host identification and authentication, authenticator management, feedback, and cryptographic authentication.
Mission Impact
Government agencies need the ability to continuously monitor, audit, and report on every user and device gaining access to the network. The immediate goal is information protection; the larger goal is national security. To fulfill their missions, agencies must limit information system access to authorized users, processes acting on behalf of authorized users, or authorized devices, including other information systems. They must also limit access to the types of transactions and functions for which users are authorized. These measures help ensure that unauthorized users are denied access and that information integrity remains protected.
Table 6. Cisco Products and Services for Identification and Authentication
Function Required for FISMA Compliance
Cisco Products and Services
Authentication and authorization
Cisco Secure Access Control Server (ACS)
Access control
Network Admission Control
Identity management
• Identity-Based Network Services (IBNS)
• Network Access Control (NAC)
• Services from Cisco Advanced Services or Cisco Certified Partners
Major Capabilities of Cisco Solutions for Identification and Authentication
• Provides authentication and validation of devices and software
• Authenticates users for full or limited access
• Automatically detects, isolates, and remediates noncompliant devices
System and Communications Protection (SC)
Type of control: Technical
FISMA Requirement
The System and Communications Protection (SC) control addresses policies and procedures, application partitioning, removal of information remnants, distributed-denial-of-service (DDoS) protection, control plane resource priority, transmission integrity and confidentiality, key management, certificate authorities, and more.
Mission Impact
New communications technologies such as IP telephony and wireless personal digital assistants are blurring the boundaries between traditional networks and communications systems. Therefore, agencies need protections for privacy and integrity not only for government and citizen data but also for video and voice conversations. The SC control protects information confidentiality as well as critical information systems and data. Traditionally, perimeter security solutions such as firewalls and intrusion detection systems have handled these protections. However, those systems alone cannot adequately protect against unknown threats and today's more sophisticated blended threats. Agencies now need multiple layers of defense. As the only IT resource that is pervasive throughout an enterprise or agency, including headquarters and branch offices, the network plays a vital role in protecting systems and communications. Agencies achieve the best protection when every element in the network acts a point of defense, a central tenet of the Cisco Self-Defending Network.
Cisco Solutions
Table 7. Cisco Products and Services for System and Communications Protection
Function Required for FISMA Compliance
Cisco Products and Services
Boundary protection
Network boundaries:
• Cisco ASA 5500 Series Adaptive Security Appliance
• Cisco Intrusion Prevention System/Intrusion Detection System
• Cisco IOS Software
• Cisco integrated services routers
• Cisco Catalyst 6500 Series Switches with security modules (SecureLAN)
Individual hosts:
• Cisco Security Agent
• Network Admission Control
Encryption, confidentiality, and integrity tools
• Cisco IPSec and SSL VPN solutions
• Cisco ASA 5500 Series Adaptive Security Appliance
• Cisco VPN Concentrators
• Cisco firewall solutions
• Cisco integrated services routers
• Cisco Aironet Wireless Access Points and Controllers
• Cisco MDS 9000 Series SAN Switches
Quality of service (QoS)
QoS/Control Plane Policing, a feature of Cisco IOS Software
Intrusion detection and prevention
• Cisco IDS/IPS 4200 Series
• Cisco ASA 5500 Series Adaptive Security Appliance
• Cisco integrated services routers
Anti-X
• Cisco Security Agent
• Cisco ASA 5500 Series Adaptive Security Appliance
• Cisco integrated services routers
Security management
• Cisco Security Manager
• Cisco Secure MARS
Consulting and integration services
• Cisco Advanced Services
• Services from Cisco Certified Partners in security
Policy enforcement
• Cisco Security Manager
• Network Admission Control
• CiscoWorks Network Compliance Manager
DDoS protection
• Cisco Guard DDoS Mitigation Appliances
• Cisco Traffic Anomaly Detectors
• QoS, a feature of Cisco IOS Software
• Cisco Intrusion Prevention System
As features of Cisco integrated service routers and Cisco ASA 5500 Series Adaptive Security Appliances:
• Adaptive Security Algorithms
• Control Plane Policing
• Access Control Lists
• SYN flood protection
• Unicast Reverse Path Forwarding
• RFC 2827 filtering
Public access protection
Application inspection capabilities of:
• Cisco 5500 Series Adaptive Security Appliances
• Cisco integrated services routers
• Cisco Intrusion Prevention System
• Cisco Security Agent, for host-based protection
Major Capabilities of Cisco System and Communications Protection Solutions
• Enables IT staff to control, deploy, and enforce policies according to the current business requirements
• Supports federal COOP and telework initiatives
• Protects network from DoS and DDoS attacks
• Protects privacy by encrypting communications
• Prevents infection from worms and viruses and helps mitigate network attacks
• Enables real-time monitoring of security events
• Provides real-time, continuous auditing
• Accelerates incident response by enabling proactive rather than reactive response
• Simplifies management
• Enables adaptation to constantly changing security threats
Incident Response (IR)
Type of control: Operational
FISMA Requirement
The Incident Response (IR) control addresses policies and procedures, incident handling, incident reporting, and incident response assistance, including forensic services and automated tools where applicable.
Mission Impact
Worms or virus outbreaks can spread globally in just minutes. Therefore, early detection and proactive response have become crucial for protecting agency data, assets, and information systems; and for ensuring confidentiality of data and communications. Agencies need to respond within minutes of the outbreak to help ensure that government services remain available and to decrease the costs associated with damage remediation.
Cisco Solutions
The Cisco Incident Control System (ICS) solution defends the global network within minutes of an outbreak anywhere in the world. Using up-to-the-moment threat intelligence from Trend Micro, an industry-leading expert in antivirus and worm mitigation, Cisco ICS collaborates with the agency's Cisco network and security devices to rapidly distribute worm and virus immunization capabilities throughout the network. A faster, proactive response prevents worms and viruses from becoming entrenched, thus helping ensure network availability and decreasing the costs associated with damage cleanup.
Table 8. Cisco Products and Services for Incident Response
Function Required for FISMA Compliance
Cisco Products and Services
Perimeter security protection
• Cisco Guard DDoS Mitigation Appliances
• Cisco integrated services routers
• Cisco ASA 5500 Series Adaptive Security Appliance
• Network Admission Control, for quarantine and remediation
Security management
• Cisco Security Manager
• Cisco Secure Monitoring, Analysis, and Response System (Cisco Secure MARS)
• CiscoWorks Network Compliance Manager
Consulting and integration services
• Cisco Advanced Services
• Services from Cisco Certified Partners in security
• Product Security Incident Response Team (PSIRT)
Major Capabilities of Cisco Incident Response Solutions
• Proactively prevents infection from worms and viruses
• Harnesses existing Cisco network and security devices to adapt in real time for a coordinated networkwide response
• Gives agency IT groups granular control of how Cisco ICS mitigation policies are deployed in the network
• Provides timely, accurate, continuously updated, targeted alerts of major threats and vulnerabilities to Cisco and third-party software and hardware products, with links to remediation solutions
• Facilitates real-time incident response by automatically correlating raw log reports to events, and events to incidents
• Reduces the complexity of security threat management
• Automatically learns new threats and adapts dynamically
• Reduces the need for incident response by preventing threats before they occur
Good agency governance depends on the effective management of internal controls and on the availability, confidentiality, and integrity of information within the organization. An agency's reputation, ability to serve the public, and productivity all depend on the defense of business processes and on the compliance with a growing array of legislation and regulation, including FISMA.
The network plays a major role in FISMA compliance because it touches every aspect of the extended organization and its business processes. The Cisco Self-Defending Network aligns with the controls recommended by FISMA and NIST 800-53, as described in this white paper. Agencies can minimize the research required for FISMA compliance-and avoid the risks of trial and error-by adopting an integrated approach to security to develop a Self-Defending Network. Agency IT groups do not need to implement all NIST controls at once; rather, they may implement them incrementally according to their importance to the agency mission.