ML22080A060
| ML22080A060 | |
| Person / Time | |
|---|---|
| Issue date: | 01/01/2021 |
| From: | NRC/OCIO/GEMSD/CSB |
| To: | |
| Shared Package | |
| ML22077A369 | List: |
| References | |
| EA-PROS-0100 | |
| Download: ML22080A060 (1) | |
Text
Nuclear Regulatory Commission Office of the Chief Information Officer Cybersecurity Oversight and Enterprise Architecture Branch
Office Instruction EA-PROS-0100 Office Instruction Title NRC Systems and Services Inventory Process Version Number 1.3 Effective Date January 1, 2021 Primary Contact Garo Nalabandian Responsible COEAB Organization Description EA-PROS-0100, NRC Systems and Services Inventory Process, details the process for identifying/managing and tracking inventory data for systems and services used by the NRC. This process does not include the individual hardware/software items that support systems and services Office Owner Primary Agency Official COEAB Garo Nalabandian Deputy CISO
EA-PROS -0100
Table of Contents
1 PURPOSE................................................................................................................................. 1
2 GENERAL REQUIREMENTS................................................................................................... 1
3 SPECIFIC REQUIREMENTS.................................................................................................... 2 3.1 System and Service Inventory..................................................................................... 2 3.2 System and Service Inventory Location...................................................................... 4 3.3 Maintaining the Inventory.......................................................................................... 11 3.4 Decommission System/Service and/or Transfer....................................................... 12
EA-PROS -0100
Enterprise Architecture Process EA -PROS -0100
NRC Systems and Services Inventory Process
1 PURPOSE
EA-PROS -0100, NRC Systems and Services Inventory Process, provides the Nuclear Regulatory Commission (NRC)-approved process that must be followed for identifying/managing and tracking the agencys inventory data for NRC systems and services (internal and/or external) that enable the NRC to achieve its mission and to meet various federal reporting/metric requirements. T he Federal Information Security Modernization Act (FISMA) requires federal agencies to report the status of their information security programs to O MB and requires Inspectors General (IG) to conduct annual independent assessments of those programs.O MB and the Department of Homeland Security (DHS) collaborate with interagency partners to develop the Chief lnformation Officer (CIO) FISMA metrics, and with IG partners to develop the IG FISMA metrics to facilitate these processes.All federal agencies submit their metrics into the DHS CyberScope on a quarterly basis.The FISMA metrics leverage the Cybersecurity Framework as a standard for managing and reducing cybersecurity risks, and they are organized around the frameworks five functions: Identify, Protect, Detect, Respond, and Recover. The goal of the Identify metrics section is to assist federal agencies with their inventory of the hardware and software systems and assets that connect to their networks.
Identifying these systems and assets helps agencies facilitate their management of cybersecurity risks to systems, assets, data, and capabilities.
This process applies to unclassified systems and services and Safeguards Information (SGI) systems. The Office of Nuclear Security and Incident Response (NSIR), Division of Security Operations, is responsible for identifying/managing and tracking classified system inventory.
2 GENERAL REQUIREMENTS
The federal requirements that agencies must abide by have evolved over the years. The Clinger-Cohen Act of 1996 introduced the Capital Planning and Investment Control (CPIC) process for managing major information technology (IT) investments. The CPIC process provides the Chief Information Officer (CIO) with the technical and business value analyses necessary for selecting and monitoring the performance of the agency's IT investments.
Title III of the E-Government Act, entitled the Federal Information Security Modernization Act (FISMA) as amended, provides modifications that modernize federal security practices to address evolving security concerns. These changes strengthen the use of continuous monitoring in systems and increase focus on the agencies for compliance and reporting that is more focused on the issues caused by security incidents.
1 l Page
EA-PROS -0100
FISMA, along with the Clinger-Cohen Act, explicitly emphasizes a risk -based policy for cost-effective security. The Office of Management and Budget (OMB) developed Circular A-130, Managing Information as a Strategic Resource to support and reinforce this legislation. OMB Circular A-130 was created in 1985 and revised several times; most recently in 2016 as amended requires federal agencies to establish a comprehensive approach to improving the acquisition and management of information resources and to plan for security. This requires an IT investment management process that links to and supports budget formulation and execution while managing risks and returns.
The NRC's FISMA compliance processes address these federal requirements, which includes accounting, managing, and protecting privacy data.
3 SPECIFIC REQUIREMENTS
The NRC connects planning, budgeting, investment management, and architecture disciplines within an integrated solution to provide visibility and control over the agencys IT system and service inventory.
An information system is the integrated set of components and communication technology owned or operated on behalf of the NRC to support mission/business processes.
An IT service is based on the use of IT and technical expertise to support the agencys business processes.
At the NRC, IT services are divided into three categories:
- External - Systems/services that are operated for or on behalf of the NRC by non-NRC organizations (i.e., Microsoft, Amazon, Office of Personnel Management, Department of Treasury, CGI).
- Internal - Systems/services that support the agency that are fully contained within an NRC facility (on premise).
- Public Facing Web Applications - Services that represent public facing Web applications that are operated for or on behalf of the NRC.
3.1 System and Service Inventory
There are several pathways where an enhancement to an existing system/service or a new system/service is introduced and accounted for in the NRC environment. Ultimately, the system/service is tracked within the system/service inventory. This includes, but is not limited to, the following:
- NRC CPIC Process - The CPIC process assists with managing the overall process to review and approve IT requests initiated by the system/service owners. An NRC user submits a request via service catalog which gets added to the Triage queue in the Remedy tool. Once a week, a technical/cyber review occurs and then goes to appropriate review boards (i.e., architectural and funding) for consideration. Once the request has
2 l Page
EA-PROS -0100
been processed and funding is approved, the Requestor gets notified along with the Enterprise Architecture (EA) Branch via email. The custodian then enters the available data into the NRCs system and service inventory located in SharePoint.
- NRC Configuration Control Board (CCB) Process - The CCB has the authority to approve minor or selected moderate system/service changes on behalf of the authorizing official. Once approved, the Computer Security Organization (CSO) Point of Contact (POC) notifies the EA system and service inventory custodian of the new or enhanced system/service that needs to be added to the inventory via email at CSO_Inventory@nrc.gov
- NRC Authorization Processes - During the authorization process for a new system/service (or significant or selective moderate changes to a system or service), the CSO POC notifies the EA system and service inventory custodian of the new or enhanced system/service that needs to be added to the inventory via email at CSO_Inventory@nrc.gov
- NRC Privacy Program - The NRC OCIO Privacy Team provides guidance and direction to ensure IT systems consider privacy protections and controls when making business decisions involving the collection, use, sharing, retention, disclosure, and destruction of personally identifiable information (PII), whether in paper or electronic form.
- Individual System/Service CCB Processes - For individual system/service CCB approvals, the system Information System Security Officer (ISSO) works with the CSO POC during the effort. The individual system/service CCB has the authority to approve all change s to systems/services that are not third-party offered cloud services or not directly connected to the NRC Production and Operating Environment. In addition, all moderate changes approved by the board must be approved by the Chief Information Security Officer (CISO). The CSO POC notifies the EA system and service inventory custodian of the new or enhanced system/service that needs to be added to the inventory via email at CSO_Inventory@nrc.gov
- NRC CSO POC - The NRC CSOPOC notifies the EA system and service inventory custodian of any other system/service efforts that are not accounted for in the processes listed above via email at CSO_Inventory@nrc.gov
No matter the pathway, the system owner or ISSO must determine the information types processed, stored, or transmitted within the system/service.
The types must be reviewed and approved by the CISO and the NRC Privacy Officer before the system/service can be implemented in the NRC environment.
Once the approval is issued, a unique inventory identification (ID) number must be assigned to the system/service for tracking purposes.The ISSO must email the CSO_Inventory@nrc.gov and request a number. The following information must be completed with the email request.
- Name:
- Short Name (abbreviation, acronym, etc.; ideally unique):
3 l Page
EA-PROS -0100
Description:
- Office (acronym of owning NRC office):
- Inventory Type (System, Subsystem, Service, Public/External facing WEB App, Application, etc.)
- System Boundary (acronym of parent system boundary; can be itself)
- Operated by (Contractor NRC, FedRAMP, other Government)
3.2 System and Service Inventory Location
The NRC System and Service inventory list is located on the NRC SharePoint site at the following link:
https://usnrc.sharepoint.com/teams/test-cso -
memo/lists/system%20inventory/all%20data%20fields.aspx?skipSignal=true
The SharePoint list provides a flexible way to organiz e the inventory data. The information can be filtered and or sorted to support information gathering. System and Service Inventory Layout
The following table describes the data fields in the inventory.
Field Names Existing Values in Inventory Field Descriptions Field Owner (security, privacy, EA, Records)
EA_Data_Class_Type Secret Secret EA SGI SGI SUNSI SUNSI Top Secret Top Secret
EA_Description A description of the Inventory EA item, including the business purpose or the business process(es) it supports EA_FEA_Bus_Function Administrative Management Lines of business or areas of EA Atomic Energy Defense Activities operation described in 800-60.
Central Fiscal Operations It is based on the OMB Federal enterprise Architecture Program
- long list Management consolidated reference model
EA_FEA_Serv_Name Accounting These are subfunctions EA Budget formulation underneath lines of business Budget Execution
EA_Full_Name Prepopulated list The full name of the inventory EA item EA_Inv_State Active The state of the inventory EA Cancelled record such as active, inactive, Development decommissioned, excessed, Excessed pending Inactive N/A Pending
4 l Page
EA-PROS -0100
Field Names Existing Values in Inventory Field Descriptions Field Owner (security, privacy, EA, Records)
Replaced Retired EA_Inv_Type Application Subsystem EA/Security Building System System Facility Public/External facing WEB N/A App Operating Environment Application Placeholder Social Media Prototype On-demand self -service Public/external facing web app Building System Scientific code Facility Security Hardware Operating Environment Service Placeholder Social Media Prototype Subsystem Scientific Code System Security Boundary Technology item Security Hardware Technology Item N/A Privacy Component?
EA_Number Populated list EA Number EA EA_Office Prepopulated list The initials/acronym of the EA name of the office that owns the inventory item or has primary responsibility for it EA_Oper_By NRC Pick List EA/Security Other Govt Contractor Cloud N/A EA_Short_Name Prepopulated Acronyms A short version of the inventory EA items name, in the form of an abbreviation, acronym, or initials PRV_Appr_Date Approved Dates Date of most recent approval. Privacy PRV_DATA_Found No Pick List Privacy Yes PRV_Date Last_Reviewed Date options are provided Date last PIA/PTA was Privacy reviewed PRV_Govt_SORNS PIC List of government wide PIC List of all government wide Privacy SORNS used by NRC. SORNS used by NRC PRV_ML_Num Prepopulated ML #s ML number of the PIA Privacy Prv_NRC_SORNS Prepopulated list of names Drop down listing of all NRC Privacy SORNs PRV_OMB_Clear_Num Clearance not needed OMB clearance numbers Privacy NRC Forms 850A
PRV_PII_Types Fillable Text Types of PII (e.g. SSN, home Privacy address, telephone number)
PRV_Records_Retention Yes Privacy No PRV_Reviewer Fillable Text Name of person who completed Privacy the last PIA/PTA review
5 l Page
EA-PROS -0100
Field Names Existing Values in Inventory Field Descriptions Field Owner (security, privacy, EA, Records)
Prv_SORNS Yes Privacy No Unknown PRV_SSN_Found Yes SSNs Found ? (Yes / No) Privacy No Partial Full PRV_Type PTA Pick List Privacy PIA RM_Activity Multiple lines of text Spells out specific activities Records within each Information Business Function that NRC performs, such as Legal Investigations or Docket Files.
RM_Category Multiple lines of text Represents which of the five Records broad line of business categories at NRC -
Organizational Support, Mission Support, Licensing, Oversight &
Inspections, and Research -
that the records series would fall under. There are interdependencies between the CFAs.
See file categorizations sheet or contact IM Policy Team for assistance. Most CFAs have been approved by offices based on the records schedules in NUREG 0910.
RM_File_Location Multiple lines of text Include if in multiple storage Records locations (physical and/or electronic) and in a system(s).
Provides the location where the information is stored, such as ADAMS, shared drive (G:
drive), a specific system/database (e.g. FAIMIS),
file cabinet, SharePoint, etc.
RM_Function Multiple lines of text Represents which of the sub-Records categories within each line of business that the records series would fall under, such as Nuclear Incident Response or Outreach & Public Relations.
RM_Media Multiple lines of text Include if in multiple formats Records and locations and what format in system(s). Shows what type of media on which the information is stored. Examples of media types include electronic, paper, magnetic tape, system/database, DVD, video, prints & negatives, microfilm, audio cassette, etc.
RM_Permanent_Temporary Multiple lines of text States if the document should Records be transferred to NARA after a certain period of time for permanent holding or if the
6 l Page
EA-PROS -0100
Field Names Existing Values in Inventory Field Descriptions Field Owner (security, privacy, EA, Records) information has a disposition that allows it to be destroyed at some point in the future (Temporary). Note: temporary retention periods could be almost any amount of time, from 1 month to 10,000 years. If (and, only if) a record ends up at NARA according to the disposition instruction - it is permanent. All other records are temporary. Also refer to NUREG 0910 instruction.
RM_Records_Series_Name Multiple lines of text Provides the name of the Records records series, such as Communications - Internal Communications or Time and Attendance Records. These descriptions come directly from the Records Schedules unless records are unscheduled.
RM_Schedule_Number Multiple lines of text Numbers represent: General Records Records Schedule (GRS) -
schedules issued by NARA to provide disposition authorization for records common to several or all agencies of the Federal Government and; NUREG-0910, NRC Comprehensive Records Disposition Schedule -NRC schedules that provide the authorized disposition for all NRC records, after being approved by NARA.
Application of the disposition schedules is mandatory for all scheduled records, and unscheduled records must be held until a disposition authority is obtained.
RM_Series_Description Multiple lines of text These Series Descriptions Records come directly from the Records Schedules unless records are unscheduled. Provides a general description of what type of information and documents would be contained in a series, e.g., for a records series named Records Disposition Files, the series states that it includes descriptive inventories, disposal authorizations, schedules, and reports.
Descriptions also provide additional information for a series that has multiple categories. For example, within
7 l Page
EA-PROS -0100
Field Names Existing Values in Inventory Field Descriptions Field Owner (security, privacy, EA, Records) the General Program Correspondence Files (Subject Files) records series, it contains three sub-series: 1)
Program Correspondence Files at the Office Director Level; 2)
Program Correspondence Files below the Office Director Level; and 3) Routine Program Correspondence Files.
RM_Vital_Business_Info_Locator Multiple lines of text States if a record is considered Records a piece of VBI, which would be required in order to resume business in the event that a disaster occurs, and the agency utilized its Continuity of Operations (COOP) plans. Are these records part of the organizations Vital Business Information (VBI)?
SEC_Alt_ISSO Drop down list with prepopulated The name of the first alternate Security names information system security officer (ISSO)
SEC_Alt_ISSO_Appt_Date Date options are provided Date of appointment Security SEC_Auth_Date Date options are provided The date an inventory record is Security authorized SEC_Auth_Exp_Date Date options are provided The date when the accreditation Security of the system is no longer valid.
SEC_Auth_Type Expired The type of security Security ATT authorization for this inventory Authority to operate item Decommissioned In development Not applicable Ongoing Periodic Short term SEC_Bus_Owner No values Technical POC for TPS Security subsystems SEC_Cloud_Deploy_Model Community Deployment models are defined Security Hybrid according to where the Public infrastructure for the Private environment is located (i.e.,
N/A private, community, public, hybrid and government).
SEC_Cloud_Service_Model IaaS The type of model (IaaS, PaaS, Security PaaS SaaS) used by NRC SaaS N/A SEC_Comments Various status notes-wide EA ranging comments SEC_CSO_POC Alan Sage Pick list Security Bill Bauer Bill Dabbs Nicole Crouch Mike Mangefrida SEC_Ext_Service_Type Other Govt A view for external IT services Security Cloud/FedRAMP would filter on this field and
8 l Page
EA-PROS -0100
Field Names Existing Values in Inventory Field Descriptions Field Owner (security, privacy, EA, Records)
Contractor include everything but the NRC.
Hybrid NRC A view for internal services would filter on NRC only or hybrid.
SEC_Ext_Srv_Provider Fill in Name of the Agency or Name Security of the contractor. Cloud Provider utilizes its own dedicated field.
SEC_FedRAMP_ATO_Letter Yes / No If the inventory record has an Security ATO letter on file at FedRAMP PMO SEC_FedRAMP_Auth_Type Agency Authorized FedRAMP Cloud Security Jab service. If it is not authorized leave blank.
SEC_FedRAMP_Srv_Offer Fillable fields such as; Name of the offering used by Security NRC Azure Commercial Cloud Such as:
Office 365 Multi -tenant Azure Commercial Cloud AWS US E/W Office 365 Multi -tenant AWS Gov Cloud AWS US E/W AWS Gov Cloud SEC_FedRAMP_Srv_Provider Fillable Field such as: Fillable Text Security
Amazon MicroPact Microsoft Oracle Amazon University Central Florida SEC_FIPS_199_A Low The FIPS 199 categorization of Security Moderate the potential impact due to loss High of availability (A)
SEC_FIPS_199_C Low The FIPS 199 categorization of Security Moderate the potential impact due to loss High of confidentiality © SEC_FIPS_199_I Low The FIPS 199 categorization of Security Moderate the potential impact due to loss High of integrity (I)
SEC_FIPS_199_O Low The overall FIPS 199 Security Moderate categorization, which is the High highest impact value among FIPS 199 A, FIPS 199 C, and FIPS 199 I.
SEC_HVA_Alt_Pros_Site N/A Pic List of alternate processing Security R4 site locations used at the NRC.
Ashburn SEC_HVA_Connect_Ext_Entity Yes Is the HVA connected to an Security No external entity SEC_HVA_Connect_Int_Entity ITI What HVA interconnects to Security BASS internally ACCESS OCIMS ADAMS SEC_HVA_Fail_Time_Impact <1 Hour Pick List Security
<1 Week
9 l Page
EA-PROS -0100
Field Names Existing Values in Inventory Field Descriptions Field Owner (security, privacy, EA, Records)
<1 Month
>1 Month SEC_HVA_How_Many_PMEF Number Fillable Text. Security
Primary Mission Essential Functions (PMEFs) are those functions that need to be continuous or resumed within 12 hours1.388889e-4 days <br />0.00333 hours <br />1.984127e-5 weeks <br />4.566e-6 months <br /> after an event and maintained for up to 30 days or until normal operations can be resumed. PMEFs are validated by the Federal Emergency Management Agency (FEMA)
National Community Coordinator.
SEC_HVA_MEF MEFs HVA supports Fillable Text. Security
Agency level government functions that must be resumed rapidly after, a disruption of normal operations. MEFs are functions that cannot be deferred during an emergency or disaster.
SEC_HVA_PMEF PMEFS HVA supports Fillable Text. Security SEC_HVA_Tier N/A Is the system categorized as an Security Tier 1 HVA Yes or No Tier 2 SEC_Prim_ISSO Prepopulated list The name of the appointed Security Primary Information System Security Officer SEC_Prim_ISSO_Appt_Date Prepopulated dates The date that the Information Security System Security Officer was appointed.
SEC_PUB_Facing Yes Pick List Security No NA SEC_Sub_Sys Prepopulated Acronyms Name of the subsystem Security SEC_System_Boundary Prepopulated with FISMA FISMA system boundary of the Security System Names inventory item SEC_System_Owner Office Director Name of the individual Security OCIO Division Director responsible for the overall Regional Administrators procurement, development, integration, security, operation, e.g. OCHCO, OCIO/SDOD, maintenance, and retirement of Region III an information system.
Currently, there are 4 field owner roles:
- Enterprise Architecture (EA)
- Security
- Privacy
- Records
The field owner has sole authority to change the field name, description, or value.
10 l Page
EA-PROS -0100
The following views have been created for efficiency and to meet the various reporting requirements for which the NRC is responsible. These views limit the fields that appear to support the specified information need.
- FISMA Systems
- FISMA Subsystems
- Public Facing Web Apps
- External IT Services
- Expired Authorizations
- High Valued Asset (HVA)
- Privacy
- Records
- CyberScope
3.3 Maintaining the Inventory
The NRC Risk and Continuous Authorization Tracking System (RCATS) interfaces with the SharePoint Inventory List to update the following fields on a nightly basis:
- SEC_Auth_Date
- SEC_Auth_Exp_Date
- SEC_Auth_Type
- SEC_FIPS_199_C
- SEC_FIPS_199_I
- SEC_FIPS_199_A
- SEC_FIPS_199_O
- EA_Number
- EA_Office
- PRV_Type
- PRV_PII_Types
- SEC_Prim_ISSO
- EA_Short_Name
- SEC_Sub_Sys
- SEC_System_Names
- SEC_System_Owner
On a bi-monthly basis, security and privacy field owners meet to discuss any updates that need to be made to the inventory based on changes that have occurred. Adhoc/structural updates to the inventory must be coordinated by email to CSO_Inventory@nrc.gov.
Annually, the system and service inventory is independently verified by an enterprise assessor. A high-level test plan is developed prior to the assessment that describes the testing approach and scope. A test report is created by the enterprise assessor that documents the discrepancies and weaknesses discovered during the assessment. Corrective actions are taken to correct any discrepancies.
11 l Page
EA-PROS -0100
3.4 Decommission System/Service and/or Transfer
When a system/service is transferred to another system becomes obsolete, or is no longer usable, proper decommissioning must be followed for proper inventory accountability. Once approval for the decommissioning and/or transfer of the system/service has been obtained, the ISSO must email CSO_Inventory@nrc.gov so the inventory can be updated to reflect the status.
Refer to CSO-PROS -2101, NRC IT System/Subsystem/Service Decommissioning and/or Transfer Process, for more information on this process.
12 l Page
EA-PROS -0100
APPENDIX A. REFERENCES
System documentation repositories, policies, and processes related to FISMA activities are provided in the CSO FISMA Repository at:
https://usnrc.sharepoint.com/teams/OCIO-CSO/SitePages/Home.aspx
- CSO-PROS-1323, Information Security Continuous Monitoring Process,
- CSO-PROS-1341, Short-Term Change Authorization Process,
- CSO-PROS-2001, System Security Categorization Process,
- CSO-PROS-2101, NRC IT System/Subsystem/Service Decommissioning and/or Transfer Process,
- CSO-PROS-2102, System Cybersecurity Assessment Process,
13 l Page
EA-PROS -0100
EA-PROS-0100 Change History Date Version Description Method used to Training of Changes Announce &
Distribute 12/18/2019 1.0 Initial OCIO/CSO As release website Needed 12/11/2020 1.1 Phase 2 OCIO/CSO As Updates website Needed 4/14/2021 1.2 Minor edits OCIO/CSO As made to website Needed inventory fields table 5/5/2021 1.3 Added OCIO/CSO As language in website Needed Section 3 to clarify definitions of an external, internal and public facing web application
14 l Page