NIST Frameworks and SPs Overview

When I was first getting oriented and searching the internet for help, I found a common theme that was interesting; technical people tended to over emphasize the importance of the 800-53 and undersell the importance of the CSF and RMF. One could argue this is because the CSF and RMF are significantly smaller documents and go into less detail, but I think it comes down to who we are as technicians. We get absorbed in the how, and ignore or forget about the why.

I can't help but feel like NIST also found this, and is why they made the "Govern" function central to all other funcitons.

I hope this helps fellow technical people to see the forest through the trees.

Based on my research and understanding, here's my understanding on how the NIST CSF, RMF, and 800-53R5 fit together.

Each of these documents (in particular the RMF and 800-53) are supported by Special Publications (SPs) that delve[1] into more specific topics and provide additional examples, context, and guidance to help you secure your organization.

I've created a flow-chart to better illustrate this and identify how some of the SPs are used.

NIST Frameworks and SPs Overview-1.png

NIST also has their own chart (below), which reflects the circular nature of a strong security posture and the broad relevance of some Special Publications.
NIST-RMF.png
[2]

Additional Resources

Below are other sources I've used to orient myself to the NIST ecosystem of publications, with some notes on use and usefulness.

NIST Courses

NIST has a series of free online courses to introduce anyone to the RMF (800-37), 800-53, the 800-53A, and 800-53B, accessible here: NIST RMF Online Introductory Courses | CSRC

The complete courses are 6 hours in length (3 for the RMF and 3 total for the 800-53, 53A, and 53B). The courses use cookies to track progress through the slides. You're not allowed to skip forward and can't adjust the speed, which is not ideal,[3] but I guess it's better than creating an account.[4]

RiskOptics

This guide (Complete Guide to the NIST Cybersecurity Framework — RiskOptics) provides a thorough introduction to the NIST Cybersecurity Framework and how it interrelates.

Gerald Auger Definitive Guide to RMF (2021)

Definitive Guide to RMF (Actionable plan for FISMA Compliance) - YouTube

  1. Video Overview
    1. Duration - 15:40
      1. First two minutes are purely introduction - skip to 2:39
    2. Focus is on NIST SP 800-37
  2. The RMF is a 6-step 7-step continuous cycle to understand and provide a uniform approach to securing information systems
    1. These are the steps:
      1. Prepare (not discussed in Gerald's video)
      2. Categorize
      3. Select
      4. Implement
      5. Assess (Audit)
      6. Authorize
      7. Monitor
  3. RMF Step Guide
    1. Prepare:[5] Setup the organization for success
      1. Identify systems and stakeholders in the business and assign role for executing the RMF
      2. Conduct risk assessments and get a baseline of current risk and security practices
      3. Max note: Without any practical experience myself, I feel like Gerald combined the Prepare and Categorize tasks, and I think that omission would likely make subsequent steps more difficult.
    2. Categorize: Identifying potential impact
      1. FIPS 199 and FIPS 200 are used to identify potential impact of a system
        1. Describes the importance of a system and steps required to secure it
      2. Impact ratings are chosen between High, Moderate, and Low
        1. 80-90% of systems are Moderate impact systems
        2. High ratings are reserved for national security or classified systems
        3. Low ratings are also rare, non-business critical
      3. NIST SP 800-60 provides guidelines on the impact you should assign to certain systems
        1. More on this here: NIST RMF System Categorization Step Hands On (Using SP 800-60 Vol II) - YouTube
    3. Select: Select controls to implement from 800-53R5
      1. Basically a big dictionary with hundreds of controls
      2. We're just baselining, so able to pick and choose as needed
    4. Implement: Implement the controls, the lions-share of the work
      1. Make a "System Security Plan"
        1. This is the book/plan for the documentation of your system
          1. Network diagram, who owns the system, what kind of data is stored, etc.
          2. All the controls to secure the systems and how they are implemented
            1. May be more or less complicated, depending on the size of the organization
        2. Gerald specifically mentions the NIST SP 800-15, but it was withdrawn in September of the year he published his video
      2. If you have any challenges implementing controls, NIST has implementation guides for most systems
        1. Offer tons of instructions and things you can do
    5. Assess: Bring in an independent auditor to inspect your controls
      1. For FISMA or anything else, you will need an external auditor
        1. If this is purely internal, can do it yourself, but it's better to have someone else verify
    6. Authorize: Authorize the system
      1. Basically just a memo from the person responsible authorizing the system to operate
        1. Usually just a page or so with their signature
      2. What's missing in this (as of 2021) is a risk assessment
        1. Use NIST 800-30 to asses risk
          1. Residual risk for controls not implemented, etc.
      3. This grants an Authorization to Operate for 1-3 years, depending on the requirements
    7. Monitor: Monitor the controls
      1. Systems are monitored and brought re-audited at regular intervals
      2. Often the audits are often scheduled to be tested in a kind of sequence to prevent infrequent massive effort
ChatGPT

The list below was generated by ChatGPT, and it feels like it front loads a lot, according to the Gerald Auger video.

  1. NIST CSF
    1. Purpose: The CSF provides a high-level overview of cybersecurity concepts and outlines six core functions: Govern, Identify, Protect, Detect, Respond, and Recover. Understanding the CSF helps grasp the broader objectives of cybersecurity practices that SP 800-53 aims to support with specific controls.
    2. Relevance: It sets the stage for understanding the risk-based approach to selecting and implementing the appropriate controls detailed in SP 800-53.
  2. NIST SP 800-37 - RMF
    1. Purpose: SP 800-37 guides the implementation of the RMF and explains how to integrate security and risk management activities into the system development life cycle.
    2. Relevance: SP 800-53 is used within the RMF as the catalog of controls for organizations to implement based on their specific risk assessments. Understanding the RMF is crucial for knowing how and why specific controls from SP 800-53 are selected.
  3. NIST SP 800-39 - Managing Information Security Risk
    4. Purpose: This document provides a structured approach to managing risk at the organizational, mission/business process, and information system levels.
    5. Relevance: It helps understand the broader context of organizational risk management, within which SP 800-53 controls are applied.
  4. NIST 800-30 - Guide for Conducting Risk Assessments
    1. Purpose: SP 800-30 provides detailed instructions on conducting risk assessments, which are crucial for identifying threats, vulnerabilities, and impacts.
    2. Relevance: Knowing how to assess risk is essential for appropriately applying and tailoring the controls in SP 800-53 to an organization’s specific needs.
  5. NIST 800-53A - Assessing Security and Privacy Controls
    1. Purpose: This publication serves as a companion document to SP 800-53, focusing on assessing the effectiveness of the implemented controls.
    2. Relevance: Understanding the assessment process helps ensure that the controls detailed in SP 800-53 are not only implemented but are also effective and functioning as intended.
  6. NIST SP 800-53

  1. Or "dive" if "delve" is too arcane a word for you. ↩︎

  2. Risk Management Framework (RMF) Overview - FISMA Implementation Project | CSRC ↩︎

  3. It actually kind of sucks, because it means you can't continue progress easily on another device. ↩︎

  4. One COULD theoretically use tools like Move Mouse and Greenshot (which gives precise mouse coordinates) to automate mouse movements and clicks to skip to the last two seconds of the video progress bar and then click "Next" to progress the slides, running it while taking a break, and then coming back later to peruse the slides and lectures at your leisure.[4] ↩︎

  5. Not discussed in Gerald's video, but detailed here for reference ↩︎