NIST revises security guidelines to address cloud, mobile and APTs

Better known to the federal computer security and contractor community as "SP (Special Publication) 800-53," this fourth revision is the most comprehensive update to the security controls catalog since the document's inception in 2005.

"This update was motivated by the expanding threats we all face," explained project leader and NIST fellow Ron Ross, in a statement. "These include the increasing sophistication of cyber attacks and the fact that we are being challenged more frequently and more persistently."

“State-of-the-practice” security controls and control enhancements have been integrated into the new revision to address the evolving technology and threat space, NIST said. Examples include issues particular to mobile and cloud computing; insider threats; application security; supply chain risks; advanced persistent threats; and trustworthiness, assurance and resilience of information systems. The revision also features eight new families of privacy controls that are based on the internationally accepted Fair Information Practice Principles.

SP 800-53, Revision 4 also takes a more holistic approach to information security and risk management than the guidelines offered before. The publication calls for maintaining "cybersecurity hygiene" – the routine best practices that help reduce information security risks – but also appeals for hardening those systems by applying state-of-the-practice architecture and engineering principles to minimize the impacts of cyber attacks and other threats.

"This 'Build It Right' strategy, coupled with security controls for continuous monitoring, provide organizations with near real-time information that leaders can use to make ongoing risk-based decisions to protect their critical missions and business functions," said Ross.

To provide organizations with greater flexibility and agility in building information security programs, the baseline set of security controls can be tailored for specific needs according to the organization's missions, environments of operation, and technologies used. Specific lists of controls and implementation guidance, or overlays, focus on a variety of missions, including space operations, military tactical operations and health care applications. Overlays also support specific technologies such as cloud computing and mobile devices.

"This specialization approach to security control selection is important as the number of threat-driven controls and control enhancements increases and organizations develop specific risk management strategies," Ross said.

What’s hot on Infosecurity Magazine?