AMS Information Systems & Security Checklist
Note:
- This is the complete checklist throughout your ISS Engineering activities during the AMS Lifecycle phases.
- The symbol "*" indicates that the FAA firewall access is required to view this link.
Initiate
FAA Information Systems Security (ISS) Activities Process:
- If any questions, please contact 9-ATOP-HQ-ISSE-Info@faa.gov, ATO-P Information Systems Security Chief Scientist Engineer.
- Go to the last page of this checklist to review:
- Appendix 1: "AMS Logo Map - FAA Lifecycle Management Process".
- Use the map to follow the numbered AMS decision points in the process with this checklist.
- Appendix 2: "Security Activities during AMS Phases"
- It is a quick overview of deliverable security related products for each AMS Phases.
- Appendix 1: "AMS Logo Map - FAA Lifecycle Management Process".
- Use this checklist to map the security activities along with your appendix 1 & 2.
- Review the lettered content of the "FAA Information Systems Security (ISS) Engineering Process".
Resources
- The ATOISS related websites:
- FAAFASTAMS - Security Section
- FAANAS Enterprise Architecture (NASEA) - Security View (TBA - Still in the maturation process.)
- FAA Systems Engineering Manual (SEM)
- ATOISS Program Library website
- ISS related policies*
- SCAP Templates and FAQs
Quick Links
- Service Analysis (SA)
- Concept & Requirement Definition (CRD)
- Investment Analysis (IA)
- Final Investment Analysis (FIA)
- Solution Implementation (SI)
- In-Service Management (ISM)
Begin Service Analysis (SA) - AMS decision point: #1
(Start: Service Analysis activities for the Mission Needs Decision (MND))
Note: The symbol "*" indicates that the FAA firewall access is required to view this link.
Review
- FAAFASTAMS Lifecycle Phases and Decisions guidance website:
- Service Analysis (SA)
- Mission Need Decision (MND)
- ISS policy guidance listed in the ATOISS Program Library website.
- ISS Engineering
Initiate
- Service Level Mission Need (SLMN) Threat Stipulation and basic security policy.
Deliverable(s)
- Statement of security policy and threat environment stipulation incorporated into the SLMN.
End SA for AMS decision point: #1
Begin Concept and Requirement Definition (CRD) - AMS decision point: #2
(Start:OMB Exhibit 300 Attachment 1 for the Investment Analysis Readiness Decision (IARD))
Review
- The CONOPs of the system.
- FAAFASTAMS Lifecycle Phases and Decisions guidance website:
- FAAFASTISS Flow Chart of the CRD section
- Security engineering activities.
- The NAS-SR1000 security requirements section.
- To obtain the document please contact Linda Suppan (Acting Manager).
Coordinate
- Service Unit/Service Area Certification Team Lead to determine plans and strategy for SCAP activities including determining the level of effort and security activities.
- ATO Information System Security Manager (ISSM)
- ATO Designated Approving Authority (DAA), Information System Security Certifier (ISSC), and Information System Security Manager (ISSM)
- ATO Service Unit/Service Area Certification Team Lead
- ATO Service Unit/Service Area ISSO.
- The individual is responsible for all the security functions for the program and is designated by the Program Manager.
Generate
- “Developing CONOPS and Preliminary Security Requirements (b)”
- CONOPS of system.
- ISS section of the Preliminary Requirements. (pPR document).
- For assistance in developing security requirements contact Kenneth Kepchar, ATO-PISS Chief Scientist System Engineer.
- The 800-53 controls.
Deliverable(s)
- OMB Exhibit 300, Attachment 1: Preliminary Program Requirements (pPR)
- ISS Section of the Preliminary requirements. (pPR)
End CRD for AMS decision point: #2 & AMS Phase Mission Analysis (MA)
Begin Initial Investment Analysis (IIA) - AMS decision point: #3
(Start:OMB Exhibit 300 Attachment 2 for the Initial Investment Decision (IID))
Review
- FAAFASTAMS Lifecycle Phases and Decisions guidance website
- FAAFASTISS Flow Chart of the IIA section
- Security engineering activities
Update
- CONOPS of system.
- ISS section of the Preliminary Requirements. (pPR document).
- Apply 800-53.
- Tailor 800-53 security requirements to your acquisitions.
- Apply 800-53.
Generate
- Basis of Estimates (BOE) on security cost estimates for alternatives.
- SCAP with your Service Unit/Service Area Certification Team Lead.
- The preliminary Information System Security Plan, (ISSP).
- Preliminary System Characterization/Categorization.
- Preliminary vulnerability and risk assessment.
Deliverable(s)
- BOE on security cost estimates for alternatives.
- OMB Exhibit 300, Attachment 2: Business Case Analysis Report (BCAR)
- Updated OMB Exhibit 300, Attachment 1: (pPR)
- Requirements for the ISS section of the (pPR) to include the 800-53 controls.
- Preliminary vulnerability and risk assessment.
- Preliminary SCAPs document
- Preliminary ISSP with security policy statement.
- Preliminary System Characterization/Categorization.
End IIA for AMS decision point: #3
BEGIN Final Investment Analysis (FIA) - AMS decision point: #4
(Start:OMB Exhibit 300 Attachment 3 for the Final Investment Decision (FID))
Review
- FAAFASTAMS Lifecycle Phases and Decisions guidance website:
- FAAFASTISS Flow Chart of the FIA section.
Update
- SCAP with your Service Unit/Service Area Certification Team Lead.
- CONOPS of system.
- ISS section of the Preliminary Requirements for the Final Requirement Document (fPR).
- Security Interfaces document for inclusion in Interface Requirement Document (IRD).
- The ISSP.
- System characterization/categorization.(FIPS-199)
- Vulnerability and risk assessment.
Generate
- Initial Security Test Plan & Report.
- Documentation should be produced only if test documents are being developed early based on approved system prototype, prior to Solution Implementation phase.
- Support for system addition to the ATO Five Year SCAP Plan with your Service Unit/Service Area Certification Team Lead and ISSO.
- Proposed schedule, security characterization/categorization (FIPS-199) and planned sites where a system would be fielded to the ISSM
- Security Information for Solicitation Information Request (SIR), Contract Statement of Work (SOW) and Contract Data Requirement List (CDRL).
Obtain
- Stakeholders’ buy-ins and signing of the final security documents.
Deliverable(s)
- Updated OMB Exhibit 300, Attachment 1:
- (pPR) transformed into Final Requirement Document (fPR).
- OMB Exhibit 300, Attachment 2:Business Case Analysis Report (BCAR)
- OMB Exhibit 300, Attachment 3:Implementation Strategy/Planning (ISP)
- Final security vulnerability and risk assessment.
- SCAP documents
- ISSP with security policy statement.
- System characterization/categorization.
- Security Test Plan & Report (See note above.)
- Proposal of schedule, FIPS-199, and plan toward ATO Five Year SCAP Plan for your added system.
- The security information for SIR, SOW & CDRL.
- Stakeholders’ signatures on all finalized security documents
End FIA for AMS decision point: #4 & Phase: IA
BEGIN Solution Implementation (SI) - AMS decision point: #5
(Re-baseline:OMB Exhibit 300, Attachment 1, 2 & 3 for the In-Service Decision (ISD))
Note: The symbol "*" indicates that the FAA firewall access is required to view this link.
Review
- FAAFASTAMS Lifecycle Phases and Decisions guidance website:
- FAAFASTISS Flow Chart of the SI section
- OMB Exhibit 300, Attachment 1, 2, & 3.
Update
- Security information for Solicitation Information Request (SIR), Contract Statement of Work (SOW) and Contract Data Requirement List (CDRL).
- Vulnerability and risk assessment for the Security Risk Assessment (SRA).
- This is to be performed independent of the Integrated Product Team (IPT).
- “Update Vulnerability and Risk Assessment” (f)
- CONOPS of system.
- “Update the CONOPS and Security Requirements” (g)
- To include ISS section to the CONOPS depending on level of impact of the NAS system.
- ISS section for the Final Requirement Document (fPR).
- Security Interfaces document for inclusion in Interface Requirement Document (IRD).
- “Integrate Security Requirements with System Requirements” (h)
- “Integrate Security Architecture and Design” (i)
- The ISSP.
- “Update the ISSP” (j)
- SCAP to reflect actual fielded systems with your Service Unit/Service Area Certification Team Lead and ISSO. Must complete the SCAP documents before operating the system.
- Locate the “ATOISS Implementation Guide * ” and follow the link “SCAP” for the SCAP guidance document.
- “Create Final Security C&A Documents” (n)
Generate
- Security testing on system baseline and refine solution as needed for ISD/commissioning.
- This is to be performed independent of the IPT.
- “Develop Security Test Plans and Procedures” (k)
- Users guide, training plans, and contingency/disaster recovery plans.
Obtain
- DAA signature(s) of Certification and Authorization to connect and operate system in the NAS.
- “Obtain Security Authorization and Accreditation” (o)
- ATO Designated Approving Authority (DAA), Information System Security Certifier (ISSC), and Information System Security Manager (ISSM).
- “Obtain Security Authorization and Accreditation” (o)
Deliverables
- SCAP Implementation Guide(Reference: SCAP implementation guide - Section 4.1.1 *)
- Baselined OMB Exhibit 300, Attachment 1:
- ISS section of the Final Requirement Document(fPR).
- Security Interfaces in the IRD.
- ISS section of the Final Requirement Document(fPR).
- Baselined OMB Exhibit 300, Attachment 2, & 3
- The security information for SIR, SOW & CDRL.
- DAA signature(s) of Certification and Authorization to connect and operate the system in the NAS.
End SI for AMS decision point: #5 & AMS Phase: SI
BEGIN In-Service Management (ISM) – Systems Engineering Milestones: Technology Refresh Assessment (TRA)
(Determine: To continue, update (Tech refresh, P3I) or end the Systems Development Lifecycle needs for the (ISM))
Review
- FAAFASTAMS Lifecycle Phases and Decisions guidance website:
- FAAFASTISS Flow Chart of the ISM section.
- The ISSP for the system assessed.
- OMB Exhibit 300, Attachment 1, 2, & 3.
Update
- ISS section of the Final Requirement Document (fPR).
- Vulnerability and risk assessment for the Security Risk Assessment (SRA).
- SCAP with your Service Unit/Service Area Certification Team Lead.
- Verify if recertification is required.
Generate
- Technology refresh and/or upgrade of the system assessed.
- For disposal of the system.
- Follow ISSP
- Archive information
- Sanitize media
- Dispose of hardware and software.
Obtain
- DAA signature(s) of Certification and Authorization package (SCAP).
- Service Unit/Service Area Certification Team Lead and ISSO.
- ATO Designated Approving Authority (DAA), Information System Security Certifier (ISSC), and Information System Security Manager (ISSM).
Deliverables
- Updated OMB Exhibit 300, Attachment 1, 2, & 3
- ISS section of the Final Requirement Document (fPR).
- Updated Security vulnerability and threat assessment for the SRA.
- Updated SCAP documents.
- DAA signature(s) of the SCAP documents.
End ISM for Systems Engineering Milestones: TRA & AMS Phase: ISM
The Information Systems Security (ISS) engineering process starts in the Corporate Mission Analysis. In this phase, the ISSE process focuses on:
The Information Systems Security (ISS) engineering activities during the earlier phases provide the basis for the updating, monitoring, and controlling system security risks and the respective mitigation measures or controls that are implemented during this phase of the system development. A summary of ISS engineering activities for this phase includes the following:
Integrating the Information Systems Security (ISS) engineering process with the SE elements is essential. During the Initial Investment Analysis (IIA), ISSE develops and documents the need for security in the CONOPS and the initial security requirements for the Preliminary Requirements document (pPR). The Investment Analysis (IA) team uses the system program CONOPS and the security requirements to evaluate the system alternatives. The security engineers in the product team conduct a preliminary vulnerability and security risk assessment using updated threat and vulnerability data to determine the specific risks that must be controlled or mitigated. The security trade studies are performed to evaluate the system alternatives and to assess the security risk controls/mitigation measures related to the system alternatives. Also, the security trade studies identify the native, existing system, and/or network features that reduces the likelihood of the system threats successfully exploiting a vulnerability. These trade studies compare the costs and benefits of the system features/security controls in terms of risk reduction. Trade studies may evaluate the cost-effectiveness of different controls for a given risk or set of risks. Also, system alternatives may require different types of controls to balance the system performance and security requirements against the security risks/costs of the different alternatives. The different system alternatives may have significantly different physical and/or system architectures that would require different security controls that may lead to different security costs and effectiveness.
Activities during this phase include the following: