Roles and Responsibilities in Cybersecurity Team

Download Presenatation
ovl ecosystem roles and responsibilities n.w
1 / 5
Embed
Share

Explore the hierarchical roles and responsibilities within a cybersecurity team, including the Authorizing Official (AO), Cyber Risk Assessors (CRA), Information System Owners (ISO), and more. Learn how each role contributes to maintaining the security posture of information systems and ensuring compliance with cybersecurity policies and standards.

  • Cybersecurity
  • Roles
  • Responsibilities
  • Team
  • Information Systems

Uploaded on | 1 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. OVL Ecosystem Roles and Responsibilities February 2024 Daniel C. Holtzman Authorizing Official (AO) DOD Chief Digital & Artificial Office (CDAO) Authorizing Official for: DOD CDAO; JSF F-35 ALIS DISTRIBUTION STATEMENT A: Distribution approved for public release on 09 May 2025; distribution is unlimited. Case Number: 25-T-2015

  2. OVL Cyber Team Roles and Responsibilities FUNCTION TITLE ROLE RESPONSIBILITIES (AO-DEFINED) Senior Acquisition Executive (SAE) Responsible for the procurement, development, integration, modification, operation, maintenance, and disposal of a capability. Senior Acquisition Official System Owners Primarily responsible for managing system development, operations, and maintenance at the capability level. As part of these responsibilities, ISO must work with AOs, ISSMs, ISSEs, and PMs to ensure compliance for the systems which they own. Information System Owner (ISO) System Operational Owner Provides a determination of RISK for a capability. Responsible for assessing and determining the Risk of Use for the system or capability and informing the stakeholders. The AO is responsible for authorizing or denying the operation (or the testing) of the information system by issuing an authorizing determination. The AO reviews the security authorization package, including supporting evidence and the recommendation of the CRA as a basis for determining risk. Authorizing Official (AO) Authorizing Official Assess and Authorize Authorizing Official Designated Representative (AODR) AO Designated Representative As defined by the AO, acts on behalf of the authorizing official to coordinate and conduct the required day-to-day activities associated with the security authorization process. Provides the AO, an independent (of the capability) risk assessment of assigned systems, and an authorization recommendation to the AO. Cyber Risk Assessors (CRA) Independent Risk Assessor Primarily responsible for maintaining the overall security posture of the systems within their organization and are accountable for the implementation. The organization s Cybersecurity Capability is developed by ISSMs that includes Cybersecurity architecture, requirements, objectives and policies, Cybersecurity personnel, and Cybersecurity processes and procedures. ISSMs are also in charge of the continuous monitoring of systems within their purview to ensure compliance with Cybersecurity policies. Information System Security Manager (ISSM) Capability/ Cyber Lead Acquisition Program The official responsible for and authority to accomplish program or system objectives for development, production and sustainment to meet the user s operational needs. Additionally, the PM serves as the focal point for the integration of cybersecurity into and throughout the system life cycle of an assigned IS and PIT system. Program Manager (PM) Program Manager 2 2

  3. OVL Cyber Team Taskings ROLE TASK Provides Assessment criteria input and reviews the plan to assess the security requirements. Final authorization determination Review the reported security status of the IS (including the effectiveness of security requirements employed within and inherited by the IS) on an ongoing basis and in accordance with the continuous monitoring strategy to determine whether the risk to organizational operations, organizational assets, individuals, other organizations, or the Nation remains acceptable. Authorizing Official Duties as assigned. AODR Categorize the information system and document the results in the AO Determination Brief. Describe the information system (including system boundary) and document the description in the AO Determination Brief. Register the IS with the appropriate organizational program management offices. Assign qualified personnel to the OVL roles Identify the security requirements provided by the organization as common requirements for organizational IS and document the requirements in the AO Determination Brief. Select the security requirements for the IS (i.e., baseline, overlays, tailoring) and document the requirements in the AO Determination Brief. Develop a system-level continuous monitoring strategy Apply Overlays and tailor Implement the security requirements specified in the AO Determination Brief. Document the implementation as appropriate in the AO Determination Brief, providing a functional description of the implementation. Conduct initial remedial actions based on findings and reassess remediated risk(s) as appropriate. Prepare the Plan of Action and Milestones (POA&M) based on the findings and recommendations from the SAR, include any remediation actions taken. Assemble and submit the Security Authorization Package (SAP) to the CRA. References are not part of the Security Authorization Package but must documented and made available. Determine the security impact of proposed or actual changes to the IS and its environment of operation. Conduct remediation actions based on the results of ongoing monitoring activities, assessment or risk, and outstanding items in the POA&M. Update AO Determination Brief, SAR, and POA&M based on the results of the continuous monitoring process. Report the security status of the IS (including the effectiveness of security requirements employed within and inherited by the IS) to the AO and other appropriate organizational officials on an ongoing basis and in accordance with the continuous monitoring strategy. Implement an IS Decommissioning Strategy when needed which executes required actions when a system is removed from service. Information System Owner 3 3

  4. OVL Cyber Team Taskings ROLE TASK Register the IS with the appropriate organizational program management offices. Assign qualified personnel to the OVL roles Select the security requirements for the IS (i.e., baseline, overlays, tailoring) and document the requirements in the AO Determination Brief. Develop a system-level continuous monitoring strategy Apply Overlays and tailor Implement the security requirements specified in the AO Determination Brief. Document the implementation as appropriate in the AO Determination Brief, providing a functional description of the implementation. Prepare the Plan of Action and Milestones (POA&M) based on the findings and recommendations from the SAR, include any remediation actions taken. Update AO Determination Brief, SAR, and POA&M based on the results of the continuous monitoring process. Implement an IS Decommissioning Strategy when needed which executes required actions when a system is removed from service. PM/SM Identify the security requirements provided by the organization as common requirements for organizational IS and document the requirements in the AO Determination Brief. Develop a system-level continuous monitoring strategy Review the AO Determination Brief and Continuous Monitoring Strategy. Determine Assessment Criteria, develop, review, and create a plan to assess the security requirements. Assess the security requirements in accordance with the assessment procedures defined in the Security Assessment Plan. Prepare the Security Assessment Report (SAR) Conduct initial remedial actions based on findings and reassess remediated risk(s) as appropriate. Assemble and submit the Security Authorization Package (SAP) to the AO. References are not part of the Security Authorization Package but must documented and made available. Assess a selected subset of security requirements employed within and inherited by the IS in accordance with the organization-defined monitoring strategy. Cyber Risk Assessor 4 4

  5. OVL Cyber Team Taskings ROLE TASK Identify the security requirements provided by the organization as common requirements for organizational IS and document the requirements in the AO Determination Brief. Document the AO Determination Brief and Continuous Monitoring Strategy. Document the implementation as appropriate in the AO Determination Brief, providing a functional description of the implementation. Conduct initial remedial actions based on findings and reassess remediated risk(s) as appropriate. Prepare the Plan of Action and Milestones (POA&M) based on the findings and recommendations from the SAR, include any remediation actions taken. Assemble and submit the Security Authorization Package (SAP) to the CRA. References are not part of the Security Authorization Package but must documented and made available. Assess a selected subset of security requirements employed within and inherited by the IS in accordance with the organization-defined monitoring strategy. Conduct remediation actions based on the results of ongoing monitoring activities, assessment or risk, and outstanding items in the POA&M. Update AO Determination Brief, SAR, and POA&M based on the results of the continuous monitoring process. Report the security status of the IS (including the effectiveness of security requirements employed within and inherited by the IS) to the AO and other appropriate organizational officials on an ongoing basis and in accordance with the continuous monitoring strategy. Information System Security Manager Identify the security requirements provided by the organization as common requirements for organizational IS and document the requirements in the AO Determination Brief. Select the security requirements for the IS (i.e., baseline, overlays, tailoring) and document the requirements in the SSP. Develop a system-level continuous monitoring strategy Apply Overlays and tailor Implement the security requirements specified in the AO Determination Brief. Document the implementation as appropriate in the AO Determination Brief, providing a functional description of the implementation. Determine the security impact of proposed or actual changes to the IS and its environment of operation. Information Systems Security Engineer 5 5

Related


More Related Content