a Rules
of
Engagement (ROE) in place with DHS consistent with OMB M-16-03.
11
In
addition, all Federal Executive Branch agencies are encouraged to follow these procedures.
All agencies are responsible for the ongoing assessment and authorization
of
their systems to
ensure accuracy
of
information pertaining to the security posture
of
their
HV
As. Agencies
should leverage the results
of
security audits and voluntary third party assessments to ensure that
HV As are assessed on a regular basis. Following the assessments, DHS or, alternatively, an
independent third party assessment organization will provide specific findings and
recommendations and will work with agencies to develop a remediation plan to address findings
discovered during the assessment. Agencies must ensure that the independent third party
assessment findings and recommendations are provided to
DHS
in
a timely manner. In addition
to including appropriate confidentiality and data handling requirements in any agreements with
independent third party assessors, agencies must ensure that relevant agreements with
independent third party assessors specify that the agency is the sole owner
of
all agency
information collected by the third party and such information and any derivative work, including
notes and working documents, must be returned to the agency.
Assessment Process
HV A assessments will focus
on
the agency's assets, systems, information, data, and datasets as
prioritized by the agency and will be reviewed by DHS in coordination with OMB. These
assessments will not replace existing cybersecurity assessment programs for the agency.
Agencies may work with DHS to receive comprehensive assessment services or may, and are
encouraged to, procure similar
HV
A risk management services from commercial providers, so
long as such services meet the DBS-established baseline requirements
of
the newly developed
Highly Adaptive Cybersecurity Services (HACS) Special Item Numbers (SINs) on GSA's IT
Schedule 70.
12
HV
A assessment activities include:
11
OMB M-16-03 directed agencies (not only CFO Act agencies), consistent with applicable law, to provide a signed
FNA to DHS by November 13, 2015, to ensure DHS, typically through US-CERT, can rapidly deploy on-site
resources to conduct incident response activities, as necessary.
12
The HACS SINS are comprised
of
the following cybersecurity services:
l 32-45A: Penetration Testing - Security testing in which assessors mimic real-world attacks to identify methods for
circumventing the security features
of
an application, system, or network.
132-45B: Incident Response Services
-These
services help organizations impacted by a cybersecurity compromise
determine the extent
of
the incident, remove the adversary from their systems, and restore their networks to a more
secure state.
132-45C: Cyber Hunt Services
-These
activities are undertaken in response to crises or urgent situations within the
pertinent domain to mitigate immediate and potential threats. Cyber hunt activities start with the premise that threat
actors that are known to target some organizations in a specific industry, or organizations using specific systems, are
likely to also target other organizations in the same industry or with the same systems. The processes use
information and threat intelligence specifically focused on the proximate incident to identify undiscovered attacks.
Cyber hunt activities also include the investigation and analysis
of
all relevant response activities.
132-45D: Risk and Vulnerability
Assessment-
These activities include assessments
of
threats and vulnerabilities,
deviations from acceptable configurations, and enterprise or local policy to assesses the current level
of
risk. The
assessor then develops and/or recommends appropriate mitigation countermeasures in operational and non-
operational situations.
Page
10of16