Claims
- 1. A computer-implemented method of enabling a user to assess the risk of and/or determine the suitability of a target system to comply with at least one predefined standard, regulation and/or requirement, the target system including hardware and/or software, the method comprising the steps of:
a) electronically scanning, on a predetermined basis, hardware and/or software characteristics of components within a target system to obtain and store target system configuration information; b) receiving and storing target system operational environment information; c) using information collected in said steps a) and b) to select, by the computer, one or more security requirements in accordance with the at least one predefined standard, regulation and/or requirement; d) selecting, by the computer, one or more test procedures used to determine target system compliance with the security requirements; and e) producing a risk assessment of the target system.
- 2. The method according to claim 1, further comprising the steps of:
f) updating at least one test procedure to include testing for at least one of newly discovered and updated target system components; g) updating the risk assessment in said step e) based on updating in said step f).
- 3. The method according to claim 1, wherein said step a) electronically scanning utilizes a secure connection.
- 4. The method according to claim 1, wherein the hardware and software characteristics pertain to at least one of: an internet protocol address, a hostname, a media access control address, an operating system name, and an operating system version.
- 5. The method according to claim 1, wherein an enterprise management system is accessed to facilitate discovery of hardware and software characteristics.
- 6. The method according to claim 5, wherein the hardware and software characteristics pertain to at least one of: an internet protocol address, a hostname, a media access control address, an operating system name, and an operating system version.
- 7. The method according to claim 1, further comprising the step of enabling a user to define one or more process steps to facilitate said producing step.
- 8. The method according to claim 7, further comprising the step of enabling a user to define one or more prerequisite process steps that must be completed before beginning work on one or more process steps.
- 9. The method according to claim 7, further comprising the step of enabling a user to define one or more roles for one or more users performing at least a portion of a process step.
- 10. The method according to claim 9, wherein the roles comprise at least one of certification and accreditation analyst, computer security incident response capabilities representative, privacy advocates office representative, disclosure office representative, vulnerabilities office representative, technical contingency planning document representative, request for information system originator, owner of business system, certification and accreditation request for information system coordinator, critical infrastructure protection representative, system point of contact, principal accrediting authority, certification and accreditation administrator, and certification and accreditation chief.
- 11. The method according to claim 9, further comprising the step of sending an electronic notification to one or more users performing at least a portion of a specified process step upon the occurrence of a predefined event.
- 12. The method according to claim 11, wherein the predefined events comprise at least one of opening a process step, submitting a process step for approval, re-opening a process step, and approving a process step.
- 13. The method according to claim 1, wherein the information collected in said step a) comprises at least one of central processing unit (CPU) manufacturer, CPU clock speed, operating system (OS) manufacturer, OS version, and OS patches.
- 14. The method according to claim 1, further comprising the step of enabling a user to add, edit and/or delete at least one of a security requirement selected in said step c) and at least one test procedure selected in said step d).
- 15. The method according to claim 1, wherein the risk assessment comprises a baseline risk assessment comprising risk levels of high, medium-high, medium, medium-low, low and negligible.
- 16. The method according to claim 15, wherein the baseline risk assessment comprises the steps of:
a) providing one or more test requirements categories; b) associating one or more first data elements with each requirements category, wherein the first data elements represent a potential of threats to exploit a vulnerability; c) associating one or more second data elements with a degree of exposure of the target system to the one or more threats; d) comparing the first data elements to the second data elements to determine, based on predetermined rules, composite data elements for each requirements category; and e) selecting, based upon predetermined rules, a level of risk of the composite data elements as a baseline risk level for each requirements category.
- 17. The method according to claim 16, wherein the baseline risk level for a requirements category is determined in accordance with at least one of the following steps:
a) for each data element in the requirements category and corresponding target system data elements, determining an overall risk of the composite data elements in accordance with at least one of the following:
1) assigning a risk as negligible if: a) a threat level of the requirements category is negligible and a corresponding project threat level is negligible, low, medium-low, or medium; b) a threat level of the requirements category is low and a corresponding project threat level is negligible; c) a threat level of the requirements category is medium-low and a corresponding project threat level is negligible; or d) a threat level of the requirements category is medium and a corresponding project threat level is negligible; 2) assigning a risk as low if: a) a threat level of the requirements category is negligible and a corresponding project threat level is medium-high or high; b) a threat level of the requirements category is low and a corresponding project threat level is medium-low or low; c) a threat level of the requirements category is medium-low and a corresponding project threat level is low or medium-low; d) a threat level of the requirements category is medium and a corresponding project threat level is low; e) a threat level of the requirements category is medium-high and a corresponding project threat level is negligible; or f) a threat level of the requirements category is high and a corresponding project threat level is negligible; 3) assigning a risk as medium-low if: a) a threat level of the requirements category is low and a corresponding project threat level is medium or medium-high; b) a threat level of the requirements category is medium-low and a corresponding project threat level is medium; c) a threat level of the requirements category is medium and a corresponding project threat level is medium-low; or d) a threat level of the requirements category is medium-high and a corresponding project threat level is low; 4) assigning a risk as medium if: a) a threat level of the requirements category is low and a corresponding project threat level is high; b) a threat level of the requirements category is medium-low and a corresponding project threat level is medium-high; c) a threat level of the requirements category is medium and a corresponding project threat level is medium; d) a threat level of the requirements category is medium-high and a corresponding project threat level is medium-low; or e) a threat level of the requirements category is high and a corresponding project threat level is low or medium-low; 5) assigning a risk as medium-high if: a) a threat level of the requirements category is medium-low and a corresponding project threat level is high; b) a threat level of the requirements category is medium and a corresponding project threat level is medium-high; c) a threat level of the requirements category is medium-high and a corresponding project threat level is medium; or d) a threat level of the requirements category is high and a corresponding project threat level is low or medium; and 6) assigning a risk as high if: a) a threat level of the requirements category is medium and a corresponding project threat level is high; b) a threat level of the requirements category is medium-high and a corresponding project threat level is medium-high or high; or c) a threat level of the requirements category is high and a corresponding project threat level is medium-high or high.
- 18. The method according to claim 17, further comprising the step of determining an adjusted risk level for at least one requirements category.
- 19. The method according to step 18, wherein the adjusted risk levels comprise high, medium-high, medium, medium-low, low, and negligible.
- 20. The method according to claim 19, wherein when a percentage of failed requirements falls within a first range, and the baseline risk level is one of high, medium-high, medium, medium-low and low, the risk level of the requirements category is decreased one level.
- 21. The method according to claim 20, wherein the first range includes zero to twenty percent.
- 22. The method according to claim 19, wherein when a percentage of failed requirements falls within a first range, and the initial risk level is one of high, medium-high, medium, and medium-low, the risk level of the requirements category is decreased two levels.
- 23. The method according to claim 22, wherein the first range includes zero to twenty percent.
- 24. The method according to claim 19, wherein when the percentage of failed requirements falls within a second range, and the initial risk level is one of high, medium-high, medium, medium-low and low, the risk level of the requirements category is decreased one level.
- 25. The method according to claim 24, wherein the first range includes over twenty percent to forty percent.
- 26. The method according to claim 19, wherein when the percentage of failed requirements falls within a third range, and the initial risk level is one of high, medium-high, medium, medium-low, low and negligible, the risk level of the requirements category remains the same.
- 27. The method according to claim 26, wherein the third range includes over forty percent to sixty percent.
- 28. The method according to claim 19, wherein when the percentage of failed requirements falls within a fourth range, and the initial risk level is one of medium-high, medium, medium-low, low and negligible, the risk level of the requirements category is increased one level.
- 29. The method according to claim 28, wherein the first range includes over sixty percent to eighty percent.
- 30. The method according to claim 19, wherein when the percentage of failed requirements falls within a fifth range, and the initial risk level is one of medium, medium-low, low and negligible, the risk level of the requirements category is increased two levels.
- 31. The method according to claim 30, wherein the fifth range includes over eighty percent to one hundred percent.
- 32. The method according to claim 19, wherein:
when a percentage of failed requirements falls within a first range, and the initial risk level is one of high, medium-high, medium, and medium-low, the risk level of the requirements category is decreased two levels; when a percentage of failed requirements falls within a first range, and the initial risk level is one of high, medium-high, medium, and medium-low, and low, the risk level of the requirements category is decreased one level; when a percentage of failed requirements falls within a second range, and the initial risk level is one of high, medium-high, medium, medium-low and low, the risk level of the requirements category is decreased one level; when a percentage of failed requirements falls within a third range, and the initial risk level is one of high, medium-high, medium, medium-low, low and negligible, the risk level of the requirements category remains the same; when a percentage of failed requirements falls within a fourth range, and the initial risk level is one of medium-high, medium, medium-low, low and negligible, the risk level of the requirements category is increased one level; when a percentage of failed requirements falls within a fifth range, and the initial risk level is one of medium-high, medium, medium-low, low and negligible, the risk level of the requirements category is increased one level; and when a percentage of failed requirements falls within a fifth range, and the initial risk level is one of medium, medium-low, low and negligible, the risk level of the requirements category is increased two levels.
- 33. The method according to claim 32, further comprising determining the target system risk as the highest level of risk among any of the requirements categories.
- 34. The method according to claim 1, further comprising printing a documentation package indicative of target system resistance to one or more threats.
- 35. A computing system for enabling a user to assess the risk of and/or determine the suitability of a target system to comply with at least one predefined standard, regulation and/or requirement, the target system including hardware and/or software, the computing system comprising:
a) means for electronically scanning, on a predetermined basis, hardware and/or software characteristics of components within a target system to obtain and store target system configuration information; b) means for receiving and storing target system operational environment information; c) means for using information collected in said steps a) and b) to select, by the computer, one or more security requirements in accordance with the at least one predefined standard, regulation and/or requirement; d) means for selecting, by the computer, one or more test procedures used to determine target system compliance with the security requirements; and e) means for producing a risk assessment of the target system.
- 36. The system according to claim 35, further comprising means for:
f) updating at least one test procedure to include testing for at least one of newly discovered and updated target system components; and g) updating the risk assessment in said step e) based on updating in said step f).
- 37. The system according to claim 35, wherein said means for scanning utilizes a secure connection.
- 38. The system according to claim 37, wherein the hardware and software characteristics pertain to at least one of: an internet protocol address, a hostname, a media access control address, an operating system name, and an operating system version.
- 39. The system according to claim 38, wherein an enterprise management system is accessed to facilitate discovery of hardware and software characteristics.
- 40. The system according to claim 35, further comprising means for enabling a user to define one or more process steps to facilitate said producing step.
- 41. The system according to claim 40, further comprising means for enabling a user to define one or more prerequisite process steps that must be completed before beginning work on one or more process steps.
- 42. The system according to claim 40, further comprising means for enabling a user to define one or more roles for one or more users performing at least a portion of a process step.
- 43. The system according to claim 42, further comprising means for sending an electronic notification to one or more users performing at least a portion of a specified process step upon the occurrence of a predefined event.
- 44. The system according to claim 43, wherein the predefined events comprise at least one of opening a process step, submitting a process step for approval, re-opening a process step, and approving a process step.
- 45. The system according to claim 35, wherein the risk assessment comprises a baseline risk assessment comprising risk levels of high, medium-high, medium, medium-low, low and negligible.
- 46. The system according to claim 45, wherein the baseline risk assessment comprises:
a) providing one or more test requirements categories; b) associating one or more first data elements with each requirements category, wherein the first data elements represent a potential of threats to exploit a vulnerability; c) associating one or more second data elements with a degree of exposure of the target system to the one or more threats; d) comparing the first data elements to the second data elements to determine, based on predetermined rules, composite data elements for each requirements category; and e) selecting, based upon predetermined rules, a level of risk of the composite data elements as a baseline risk level for each requirements category.
- 47. The system according to claim 46, wherein the baseline risk level for a requirements category is determined in accordance with the following steps:
a) for each data element in the requirements category and corresponding target system data elements, determining an overall risk of the composite data elements in accordance with at least one of the following:
1) assigning a risk as negligible if: a) a threat level of the requirements category is negligible and a corresponding project threat level is negligible, low, medium-low, or medium; b) a threat level of the requirements category is low and a corresponding project threat level is negligible; c) a threat level of the requirements category is medium-low and a corresponding project threat level is negligible; or d) a threat level of the requirements category is medium and a corresponding project threat level is negligible; 2) assigning a risk as low if: a) a threat level of the requirements category is negligible and a corresponding project threat level is medium-high or high; b) a threat level of the requirements category is low and a corresponding project threat level is medium-low or low; c) a threat level of the requirements category is medium-low and a corresponding project threat level is low or medium-low; d) a threat level of the requirements category is medium and a corresponding project threat level is low; e) a threat level of the requirements category is medium-high and a corresponding project threat level is negligible; or f) a threat level of the requirements category is high and a corresponding project threat level is negligible; 3) assigning a risk as medium-low if: a) a threat level of the requirements category is low and a corresponding project threat level is medium or medium-high; b) a threat level of the requirements category is medium-low and a corresponding project threat level is medium; c) a threat level of the requirements category is medium and a corresponding project threat level is medium-low; or d) a threat level of the requirements category is medium-high and a corresponding project threat level is low; 4) assigning a risk as medium if: a) a threat level of the requirements category is low and a corresponding project threat level is high; b) a threat level of the requirements category is medium-low and a corresponding project threat level is medium-high; c) a threat level of the requirements category is medium and a corresponding project threat level is medium; d) a threat level of the requirements category is medium-high and a corresponding project threat level is medium-low; or e) a threat level of the requirements category is high and a corresponding project threat level is low or medium-low; 5) assigning a risk as medium-high if: a) a threat level of the requirements category is medium-low and a corresponding project threat level is high; b) a threat level of the requirements category is medium and a corresponding project threat level is medium-high; c) a threat level of the requirements category is medium-high and a corresponding project threat level is medium; or d) a threat level of the requirements category is high and a corresponding project threat level is low or medium; and 6) assigning a risk as high if: a) a threat level of the requirements category is medium and a corresponding project threat level is high; b) a threat level of the requirements category is medium-high and a corresponding project threat level is medium-high or high; or c) a threat level of the requirements category is high and a corresponding project threat level is medium-high or high.
- 48. The system according to claim 47, further comprising means for determining an adjusted risk level for at least one requirements category.
- 49. The system according to claim 48, wherein the adjusted risk is determined in accordance with the following:
when a percentage of failed requirements falls within a first range, and the initial risk level is one of high, medium-high, medium, medium-low and low, the risk level of the requirements category is decreased one level; when a percentage of failed requirements falls within a first range, and the initial risk level is one of high, medium-high, medium, and medium-low, the risk level of the requirements category is decreased two levels; when a percentage of failed requirements falls within a second range, and the initial risk level is one of high, medium-high, medium, medium-low and low, the risk level of the requirements category is decreased one level; when a percentage of failed requirements falls within a third range, and the initial risk level is one of high, medium-high, medium, medium-low, low and negligible, the risk level of the requirements category remains the same; when a percentage of failed requirements falls within a fourth range, and the initial risk level is one of medium-high, medium, medium-low, low and negligible, the risk level of the requirements category is increased one level; when a percentage of failed requirements falls within a fifth range, and the initial risk level is one of medium-high, medium, medium-low, low and negligible, the risk level of the requirements category is increased one level; and when a percentage of failed requirements falls within a fifth range, and the initial risk level is one of medium, medium-low, low and negligible, the risk level of the requirements category is increased two levels.
- 50. The system according to claim 49, further comprising means for determining the target system risk as the highest level of risk among any of the requirements categories.
- 51. A computer program product residing on a computer readable medium for enabling a user to select at least one of a plurality of predefined process steps to create a tailored sequence of process steps that can be used to assess the risk of and/or determine the suitability of a target system to comply with at least one predefined standard, regulation and/or requirement, the target system including hardware and/or software, the computer program product comprising instructions for causing the computer system to interact with a user and enabling at least one of the computing system and the user to perform the steps of:
a) electronically scanning, on a predetermined basis, hardware and/or software characteristics of components within a target system to obtain and store target system configuration information; b) receiving and storing target system operational environment information; c) using information collected in said steps a) and b) to select, by the computer, one or more security requirements in accordance with the at least one predefined standard, regulation and/or requirement; d) selecting, by the computer, one or more test procedures used to determine target system compliance with the security requirements; and e) producing a risk assessment of the target system.
- 52. The computer program product according to claim 51, further comprising instructions for:
f) updating at least one test procedure to include testing for at least one of newly discovered and updated target system components; g) updating the risk assessment in said step e) based on updating in said step f).
- 53. The computer program product according to claim 35, wherein the hardware and software characteristics pertain to at least one of: an internet protocol address, a hostname, a media access control address, an operating system name, and an operating system version.
- 54. The computer program product according to claim 53, wherein an enterprise management system is accessed to facilitate discovery of hardware and software characteristics.
- 55. The computer program product according to claim 51, further comprising instructions for enabling a user to define one or more process steps to facilitate said producing step.
- 56. The computer program product according to claim 55, further comprising instructions that enable a user to define one or more prerequisite process steps that must be completed before beginning work on one or more process steps.
- 57. The computer program product according to claim 55, further comprising instructions that enable a user to define one or more roles for one or more users performing at least a portion of a process step.
- 58. The computer program product according to claim 57, further comprising instructions that enable an electronic notification to be transmitted to one or more users performing at least a portion of a specified process step upon the occurrence of a predefined event.
- 59. The computer program product according to claim 58, wherein the predefined events comprise at least one of opening a process step, submitting a process step for approval, re-opening a process step, and approving a process step.
- 60. The computer program product according to claim 51, wherein the risk assessment comprises a baseline risk assessment comprising risk levels of high, medium-high, medium, medium-low, low and negligible.
- 61. The computer program product according to claim 45, wherein the baseline risk assessment instructions comprise instructions for:
a) providing one or more test requirements categories; b) associating one or more first data elements with each requirements category, wherein the first data elements represent a potential of threats to exploit a vulnerability; c) associating one or more second data elements with a degree of exposure of the target system to the one or more threats; d) comparing the first data elements to the second data elements to determine, based on predetermined rules, composite data elements for each requirements category; and e) selecting, based upon predetermined rules, a level of risk of the composite data elements as a baseline risk level for each requirements category.
- 62. The computer program product according to claim 61, wherein the baseline risk level for a requirements category is determined in accordance with the following:
a) for each data element in the requirements category and corresponding target system data elements, determining an overall risk of the composite data elements in accordance with at least one of the following:
1) assigning a risk as negligible if: a) a threat level of the requirements category is negligible and a corresponding project threat level is negligible, low, medium-low, or medium; b) a threat level of the requirements category is low and a corresponding project threat level is negligible; c) a threat level of the requirements category is medium-low and a corresponding project threat level is negligible; or d) a threat level of the requirements category is medium and a corresponding project threat level is negligible; 2) assigning a risk as low if: a) a threat level of the requirements category is negligible and a corresponding project threat level is medium-high or high; b) a threat level of the requirements category is low and a corresponding project threat level is medium-low or low; c) a threat level of the requirements category is medium-low and a corresponding project threat level is low or medium-low; d) a threat level of the requirements category is medium and a corresponding project threat level is low; e) a threat level of the requirements category is medium-high and a corresponding project threat level is negligible; or f) a threat level of the requirements category is high and a corresponding project threat level is negligible; 3) assigning a risk as medium-low if: a) a threat level of the requirements category is low and a corresponding project threat level is medium or medium-high; b) a threat level of the requirements category is medium-low and a corresponding project threat level is medium; c) a threat level of the requirements category is medium and a corresponding project threat level is medium-low; or d) a threat level of the requirements category is medium-high and a corresponding project threat level is low; 4) assigning a risk as medium if: a) a threat level of the requirements category is low and a corresponding project threat level is high; b) a threat level of the requirements category is medium-low and a corresponding project threat level is medium-high; c) a threat level of the requirements category is medium and a corresponding project threat level is medium; d) a threat level of the requirements category is medium-high and a corresponding project threat level is medium-low; or e) a threat level of the requirements category is high and a corresponding project threat level is low or medium-low; 5) assigning a risk as medium-high if: a) a threat level of the requirements category is medium-low and a corresponding project threat level is high; b) a threat level of the requirements category is medium and a corresponding project threat level is medium-high; c) a threat level of the requirements category is medium-high and a corresponding project threat level is medium; or d) a threat level of the requirements category is high and a corresponding project threat level is low or medium; and 6) assigning a risk as high if: a) a threat level of the requirements category is medium and a corresponding project threat level is high; b) a threat level of the requirements category is medium-high and a corresponding project threat level is medium-high or high; or c) a threat level of the requirements category is high and a corresponding project threat level is medium-high or high.
- 63. The computer program product according to claim 62, further comprising instructions that facilitate determination of an adjusted risk level for at least one requirements category.
- 64. The computer program product according to claim 63, wherein the adjusted risk is determined in accordance with the following:
when a percentage of failed requirements falls within a first range, and the initial risk level is one of high, medium-high, medium, medium-low and low, the risk level of the requirements category is decreased one level; when a percentage of failed requirements falls within a first range, and the initial risk level is one of high, medium-high, medium, and medium-low, the risk level of the requirements category is decreased two levels; when a percentage of failed requirements falls within a second range, and the initial risk level is one of high, medium-high, medium, medium-low and low, the risk level of the requirements category is decreased one level; when a percentage of failed requirements falls within a third range, and the initial risk level is one of high, medium-high, medium, medium-low, low and negligible, the risk level of the requirements category remains the same; when a percentage of failed requirements falls within a fourth range, and the initial risk level is one of medium-high, medium, medium-low, low and negligible, the risk level of the requirements category is increased one level; when a percentage of failed requirements falls within a fifth range, and the initial risk level is one of medium-high, medium, medium-low, low and negligible, the risk level of the requirements category is increased one level; and when a percentage of failed requirements falls within a fifth range, and the initial risk level is one of medium, medium-low, low and negligible, the risk level of the requirements category is increased two levels.
- 65. The computer program product according to claim 64, further comprising instructions for determining the target system risk as the highest level of risk among any of the requirements categories.
RELATED APPLICATIONS
[0001] This application is related to the following applications, all of which are filed on the same date as this application, and all of which are assigned to the assignee of this application:
[0002] Enhanced System, Method And Medium For Certifying And Accrediting Requirements Compliance Utilizing Robust Risk Assessment Model (U.S. application Ser. No. not yet assigned); and
[0003] Enhanced System, Method and Medium for Certifying and Accrediting Requirements Compliance Utilizing Threat Vulnerability Feed (U.S. application Ser. No. not yet assigned).