Exploring Effective Approaches to the Risk Management Framework (RMF) in the Republic of Korea: A Study
Abstract
:1. Introduction
2. Research on the RMF
2.1. Risk Management Framework
NIST | DoD | NSS |
---|---|---|
NIST SP 800-39 [14] Managing Information Security Risk | DoDI 8500.01 “Cybersecurity” [13] IT Definitions Security Controls Guidance Enterprise Governance | CNSSP 22 [16] IA Risk Management Policy for NSS |
NIST SP 800-37 [15] Risk Management Framework | ||
NIST SP 800-30 [17] Risk Assessment | DoDI 8510.01 “Risk Management Framework for DoD IT” [5] | CNSSI 1253 [23] Categorization Baselines NSS Assignment Values |
NIST SP 800-53 [18] Cybersecurity Controls and Enhancements | ||
NIST SP 800-53A [19] Cybersecurity Control Assessment Procedures | DRAFT CNSSI 1253A [23] Implementation and Assessment Procedures | |
NIST SP 800-137 [20] Continuous Monitoring | ||
NIST SP 800-60 [21] Mapping Types of Information to Security Categories | CNSS 4009 [24] Information Assurance/Cybersecurity Definitions | |
NIST 800-160(DRAFT) [22] Security Engineering Guideline |
- Categorize: The information of the system and the system itself are classified according to the standards of FIPS 199 and the associated NIST SP 800-60. At this stage, the type of system information is identified, and the risk level is determined based on confidentiality, integrity, and availability.
- Select: Security controls proposed in standards like NIST SP 800-53 are selected. This stage involves determining appropriate security controls based on the system’s security requirements and associated risk levels.
- Implement: The selected security controls are applied and implemented in the system. The implementation stage encompasses the design, development, configuration, and installation of the controls.
- Assess: The effectiveness of the implemented security controls is evaluated. This assessment is conducted using security testing and evaluation techniques to accurately understand the system’s security status.
- Authorize: Decisions on system risk acceptance and operation are made. System owners or senior officials can authorize or deny the operation of the system based on the evaluation results and the system’s overall security status.
- Monitor: The security status of the system is continuously monitored, risks are tracked, and security controls are modified or updated as necessary. This stage emphasizes ensuring continuous improvement in security status and the ability to respond to new threats or changes.
2.2. RMF Research by Industry
2.2.1. The Aviation and Defense Industries
2.2.2. The Automotive and Manufacturing Industries
2.2.3. The Environmental and Energy Industries
2.2.4. The Medical and Health Industries
2.2.5. The Internet of Things (IoT) Industry
- The aviation and defense industries: The RMF has been employed to meet information protection requirements in key areas such as the design of cloud-based computing frameworks, the detailing of threat scenarios in simulations, and resolving process issues within cybersecurity groups. This confirms that, in the aviation and defense sector, the RMF plays a vital role in satisfying information security needs in conjunction with technological advancements.
- The automotive and manufacturing industries: The RMF has been utilized in major areas like the automation of car security testing, the enhancement of efficiency and accuracy in threat analysis and risk assessment, and the improvement of the conceptual process model related to drone production. This suggests a need for the integrated approach of the RMF in the automotive and manufacturing sectors.
- The environmental and energy industries: The RMF has been applied to diverse topics such as the risk management of power systems, calculating the loss rates of grid-connected commercial solar power plants, and identifying security vulnerabilities in marine renewable energy systems. This indicates that security concerns and risk management are becoming increasingly significant in the environmental and energy sectors.
- The medical and health industries: The RMF has been employed for improving the HITRUST, cybersecurity in medical device computing, and the security evaluation of cloud-based healthcare applications. This suggests that cybersecurity issues are emerging as significant concerns in the medical sector, necessitating an approach that incorporates the RMF.
- The IoT industry: The RMF has been applied to various topics, including the calculation of the economic impact of IoT cyber risks, the analysis of risks and threats in power IoT, and the analysis of network data in an IoT environment. This underscores the significance of the RMF in ensuring robust security measures in the rapidly evolving IoT sector.
3. RMF Application Method
3.1. Categorize
- 1.
- Step 1. Identify Information Types* Identification of mission-based information types and identification of management and support information and legislative and administrative information obligations.
- 2.
- Step 2. Select Provisional Impact Level* Consideration of security objectives (confidentiality, integrity, and availability) and classification of provisional security impact levels.
- 3.
- Step 3. Review Provisional Impact Levels and Adjust/Final Inf. Ty. Imp. Levels* Review of the appropriateness of provisional impact levels based on organization, environment, mission, use, and data sharing.* Adjustment of target impact levels based on factors determining the security impact for classified information systems.
- 4.
- Step 4. Assign System Security Category* Review of security category classification for information types, identification, and determination of highest scores for each security objective (confidentiality, integrity, and availability).* Highest level adjustment for system security objectives.* Determination of the overall information system impact level based on the highest security impact level.
- 1.
- Step 1. Identify Information Types* Determination of types of information processed, stored, and transmitted by the system, documented, and reflected in the cybersecurity plan.* Classification by referring to the system security classification guide’s mission domain (X type), job function (XX items), and information type (XXX items).* If information types not included in the system security classification guide are identified, the results are reviewed with the control and personnel departments and then reflected.
- 2.
- Step 2. Initial Review Security Impact Levels and Adjustment Factors* Comprehensive assessment and adjustment based on the size of the organization/institution, mission characteristics, system operating environment, etc.* Review and adjustment considering factors such as whether the system processes, stores, or transmits classified or espionage information, whether it can be directly or indirectly accessed by foreigners, and whether it passes through a security domain.
- 3.
- Step 3. By Information Type, Determine the Final Security Impact Level* Creation of a chart of security impact levels by information type, then determination of the final impact level by applying the HWM (High Water Mark) concept.
3.2. Select
- Setting security policies, standards, and detailed specifications (parameters) for security control items defined by each military and agency.
- Clarification of the adjustment process through supplementary explanations.
- Limiting the use of the respective security control items within given basic assumptions.
- Recognizing potential conflicts when using various overlays simultaneously and resolving them through consultation with the security authorizing official.
- 1.
- MBL (Middle Baseline)* The ‘Middle Baseline’ defines the baseline for the security control items of the system.* This baseline is divided into three categories, namely MML, MMM, and MMH, to reflect the various levels and complexities of security requirements.
- 2.
- Modification and application process of security control items* In the center of the table, the modification process of the security control items is sequentially presented. This process is carried out through overlays, tailoring, and various reviews.
- 3.
- Detailed security control items guide* The ‘AM’11’ item, provided as an example, elaborates in detail on account management.* Each item includes the purpose and method of a specific security control task, as well as related parameters or examples, offering guidance on how they should be applied in real-world environments.
- 4.
- Interpretation of symbols and codes* The various symbols and codes included in the table represent the characteristics and requirements of the security control items. These symbols clearly indicate under what conditions each item should be selected or applied.
- 5.
- Related legislation and guidelines* On the right side of the table, legislation, regulations, and guidelines related to each security control item are provided. This enables users to verify the legal requirements that each item must meet.
4. Experiments and Results
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Manulis, M.; Bridges, C.P.; Harrison, R.; Sekar, V.; Davis, A. Cyber security in new space: Analysis of threats, key enabling technologies and challenges. Int. J. Inf. Secur. 2021, 20, 287–311. [Google Scholar]
- Dunn Cavelty, M.; Wenger, A. Cyber security meets security politics: Complex technology, fragmented politics, and networked science. Contemp. Secur. Policy 2020, 41, 5–32. [Google Scholar]
- Li, Y.; Liu, Q. A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Rep. 2021, 7, 8176–8186. [Google Scholar] [CrossRef]
- Force, J.T. Risk management framework for information systems and organizations. NIST Spec. Publ. 2018, 800, 37. [Google Scholar]
- Sherman, J.B. DoD Instruction 8510.01 Risk Management Framework for DoD Systems; Department of Defense: Arlington County, VA, USA, 2022.
- Gorman, C.N. DoD Cybersecurity Weaknesses as Reported in Audit Reports Issued from August 1, 2015 through July 31, 2016 (REDACTED); Department of Defense: Arlington County, VA, USA, 2016.
- Odell, L.A.; DePuy, C.E.; Fauntleroy, J.C.; Rabren, T.C.; Seitz-McLeese, M.G. Recommendations for Improving Agility in Risk Management for Urgent and Emerging Capability Acquisit—Ns—Quick Look Report; JSTOR: Alexandria, VA, USA, 2017. [Google Scholar]
- Commanders, C.; Defense, U.; Defense, A. Subject: DoD Information System Certification and Accreditation Reciprocity; Department of Defense: Washington, DC, USA, 2003.
- Landree, E.; Gonzales, D.; Ohlandt, C.; Wong, C. Implications of Aggregated DoD Information Systems for Information Assurance Certification and Accreditation; RAND: Santa Monica, CA, USA, 2010. [Google Scholar]
- Hutchison, S.J. Cybersecurity: Defending the new battlefield. Def. AT&L 2013, 42, 34–39. [Google Scholar]
- Ross, R. Managing enterprise security risk with NIST standards. Computer 2007, 40, 88–91. [Google Scholar] [CrossRef]
- Combass, T.; Shilling, A. Integrating cybersecurity into NAVAIR OTPS acquisition. In Proceedings of the 2016 IEEE AUTOTESTCON, Anaheim, CA, USA, 12–15 September 2016; pp. 1–5. [Google Scholar]
- Teresa, M.T. DoDI 8500.01 Cybersecurity; Department of Defense: Arlington County, VA, USA, 2014.
- Joint Task Force Transformation Initiative. SP 800-39. Managing Information Security Risk: Organization, Mission, and Information System View; National Institute of Standards & Technology: Gaithersburg, MD, USA, 2011.
- Ross, R. NIST SP 800-37, Revision 1. In Guide for Applying the Risk Management Framework to Federal Information Systems; NIST: Gaithersburg, MD, USA, 2010. [Google Scholar]
- Committee on National Security Systems. IA Risk Management Policy for NSS; Committee on National Security Systems: Fort Meade, MD, USA, 2021.
- Stoneburner, G.; Goguen, A.; Feringa, A. NIST Special Publication 800-30. In Risk Management Guide for Information Technology Systems; NIST: Gaithersburg, MD, USA, 2001. [Google Scholar]
- NIST. NIST SP 800-53. In Recommended Security Controls for Federal Information Systems; NIST: Gaithersburg, MD, USA, 2003; pp. 800–853. [Google Scholar]
- Ross, R.; Johnson, A.; Katzke, S.; Toth, P.; Stoneburner, G.; Rogers, G. Nist Special Publication 800-53a: Guide for Assessing the Security Controls in Federal Information Systems; Tech. Rep.; NIST: National Institute of Standards and Technology, US Department Commerce: Gaithersburg, MD, USA, 2008.
- Dempsey, K.; Chawla, N.S.; Johnson, A.; Johnston, R.; Jones, A.C.; Orebaugh, A.; Scholl, M.; Stine, K. Nist Special Publication 800-137: Information Security Continuous Monitoring (iscm) for Federal Information Systems and Organizations; Tech. Rep.; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2011.
- Stine, K.; Rich, K.; Barker, C.; Fahlsing, J.; Gulick, J. NIST SP. 800-60 Rev 1. In Guide for Mapping Types of Information and Information Systems to Security Categories; NIST: Gaithersburg, MD, USA, 2008. [Google Scholar]
- Ross, R.; McEvilley, M.; Winstead, M. NIST SP 800-160 Volume 1 Revision 1 Engineering Trustworthy Secure Systems Initial Public Draft; NIST: Gaithersburg, MD, USA, 2022.
- Committee on National Security Systems. Categorization Baselines NSS Assignment Values; Committee on National Security Systems: Fort Meade, MD, USA, 2022.
- Committee on National Security Systems. CNSS Instruction 4009; Committee on National Security Systems: Fort Meade, MD, USA, 2010.
- Robertson, J.; Fossaceca, J.M.; Bennett, K.W. A cloud-based computing framework for artificial intelligence innovation in support of multidomain operations. IEEE Trans. Eng. Manag. 2021, 69, 3913–3922. [Google Scholar] [CrossRef]
- Explore Our Products. Available online: https://www.aws.com (accessed on 28 August 2023).
- Kim, I.; Kim, S.; Kim, H.; Shin, D. Mission-Based Cybersecurity Test and Evaluation of Weapon Systems in Association with Risk Management Framework. Symmetry 2022, 14, 2361. [Google Scholar] [CrossRef]
- Pearson, J.; Oni, O. Addressing cybersecurity and safety disconnects in United States army aviation: An exploratory qualitative case study. Secur. J. 2023, 1–17. [Google Scholar] [CrossRef]
- Zhang, H.; Luo , L.; Li, R.; Yi, J.; Li, Y.; Chen, L. Research and application of intelligent vehicle cybersecurity threat model. In Proceedings of the 2022 7th IEEE International Conference on Data Science in Cyberspace (DSC), Guilin, China, 11–13 July 2022; pp. 102–109. [Google Scholar] [CrossRef]
- Wynn, J.; Whitmore, J.; Upton, G.; Spriggs, L.; McKinnon, D.; McInnes, R.; Clausen, L. Threat Assessment & Remediation Analysis (TARA) (No. MTR110176); MITRE: Bedford, MA, USA, 2011. [Google Scholar]
- Qi, Y.; Yang, G.; Liu, L.; Fan, J.; Orlandi, A.; Kong, H.; Yu, W.; Yang, Z. 5G over-the-air measurement challenges: Overview. IEEE Trans. Electromagn. Compat. 2017, 59, 1661–1670. [Google Scholar] [CrossRef]
- Chhawri, S.; Tarnutzer, S.; Tasky, T.; Lane, G.R. Smart Vehicles, Automotive Cyber Security & Software Safety Applied to Leader-Follower (LF) and Autonomous Convoy Operations. In Proceedings of the Ground Vehicle Systems Engineering and Technology Symposium (GVSETS), Novi, MI, USA, 8–10 August 2017. [Google Scholar]
- Thangavelu, S.; Janczewski, L.; Peko, G.; Sundaram, D. A Dynamic Security-dedicated Approach to Commercial Drone Vulnerabilities, Threat Vectors and Their Mitigation. In Proceedings of the 2020 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 16–18 December 2020; pp. 1054–1059. [Google Scholar]
- Jiang, L.; Shao, L.; Qiu, Y.; Zhou, L. A Risk Management Model for Power Industry based on Impact Analysis. In Proceedings of the 2021 2nd International Conference on Big Data Economy and Information Management (BDEIM), Sanya, China, 3–5 December 2021; pp. 159–163. [Google Scholar]
- Miranda, A.W.; Goldsmith, S. Cyber-physical risk management for PV photovoltaic plants. In Proceedings of the 2017 International Carnahan Conference on Security Technology (ICCST), Madrid, Spain, 23–26 October 2017; pp. 1–8. [Google Scholar]
- de Peralta, F.; Gorton, A.; Watson, M.; Bays, R.; Boles, J.; Castleberry, J.; Gorton, B.; Powers, F. Framework for Identifying Cybersecurity Vulnerability and Determining Risk for Marine Renewable Energy Systems; National Technical Information Service: Alexandria, VA, USA, 2020.
- Radoglou-Grammatikis, P.; Liatifis, A.; Dalamagkas, C.; Lekidis, A.; Voulgaridis, K.; Lagkas, T.; Fotos, N.; Menesidou, S.-A.; Krousarlis, T.; Alcazar, P.R. ELECTRON: An Architectural Framework for Securing the Smart Electrical Grid with Federated Detection, Dynamic Risk Assessment and Self-Healing. In Proceedings of the 18th International Conference on Availability, Reliability and Security, Benevento, Italy, 29 August–1 September 2023; pp. 1–8. [Google Scholar]
- Liatifis, A.; Alcazar, P.R.; Grammatikis, P.R.; Papamartzivanos, D.; Menesidou, S.; Krousarlis, T.; Alberto, M.M.; Angulo, I.; Sarigiannidis, A.; Lagkas, T.; et al. Dynamic Risk Assessment and Certification in the Power Grid: A Collaborative Approach. In Proceedings of the 2022 IEEE 8th International Conference on Network Softwarization (NetSoft), Milan, Italy, 27 June–1 July 2022; pp. 462–467. [Google Scholar]
- Udroiu, A.-M.; Dumitrache, M.; Sandu, I. Improving the cybersecurity of medical systems by applying the NIST framework. In Proceedings of the 2022 14th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Ploiesti, Romania, 30 June–1 July 2022; pp. 1–7. [Google Scholar]
- Alliance, H. HITRUST CSF; HITRUST: Frisco, TX, USA, 2019. [Google Scholar]
- Reddy, G.N.; Reddy, G. A study of cyber security challenges and its emerging trends on latest technologies. arXiv 2014, arXiv:1402.1842. [Google Scholar]
- Ursillo, S.; Arnold, C. Cybersecurity Is Critical for All Organizations–Large and Small; International Federation of Accountants: New York, NY, USA, 2019. [Google Scholar]
- Ani, U.P.D.; He, H.; Tiwari, A. Review of cybersecurity issues in industrial critical infrastructure: Manufacturing in perspective. J. Cyber Secur. Technol. 2017, 1, 32–74. [Google Scholar] [CrossRef]
- Van Devender, M.S. Risk Assessment Framework for Evaluation of Cybersecurity Threats and Vulnerabilities in Medical Devices. Ph.D. Thesis, University of South Alabama, Mobile, AL, USA, 2023. [Google Scholar]
- Miller, J.C. Security Assessment of Cloud-Based Healthcare Applications. Master’s Thesis, Milligan University, Johnson City, TN, USA, 2019. [Google Scholar]
- Bodie, M.T. HIPPA; Cardozo L. Rev. De-Novo; Saint Louis University School of Law, Saint Louis University: St. Louis, MO, USA, 2022; p. 118. [Google Scholar]
- Radanliev, P. Future developments in cyber risk assessment for the internet of things. Comput. Ind. 2018, 102, 14–22. [Google Scholar] [CrossRef]
- Li, K.; Shi, R.; Yan, J.; Cai, C.; Sun, M.; Li, J. A RMF and AHP-Based Approach to Risk Assessment of Power Internet of Things. In Proceedings of the 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Calgary, AB, Canada, 17–22 August 2020; pp. 684–689. [Google Scholar]
- Brandon, A.; Seekins, M.; Joshua, B.V.; Samuel, C.; Haller, J. Network data analysis to support risk management in an IoT environment. In Proceedings of the 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 10–12 October 2019; pp. 0063–0068. [Google Scholar]
- Warren, K.; Sabetto, R. FedRAMP: A Practical Approach; MITRE Corporation: McLean, VA, USA, 2018. [Google Scholar]
- McLaughlin, M. Reforming FedRAMP: A Guide to Improving the Federal Procurement and Risk Management of Cloud Services; Information Technology and Innovation Foundation: Washington, DC, USA, 2020. [Google Scholar]
- McGillivray, K. Government Cloud Procurement; Cambridge University Press: Cambridge, UK, 2021. [Google Scholar]
- United States Government Accountability Office; Wilshusen, G.C. Cloud Computing Security: Agencies Increased Their Use of the Federal Authorization Program, but Improved Oversight and Implementation Are Needed: Report to Congressional Requesters; United States Government Accountability Office: Washington, DC, USA, 2019.
- Green, S. An Evaluation of Two Host-Based Vulnerability Scanning Tools. Ph.D. Thesis, Utica College, Utica, NY, USA, 2020. [Google Scholar]
- Kinsella, D. Building an EERM Toolkit. Risk Manag. 2019, 66, 20–21. [Google Scholar]
- Koo, J.; Kim, Y.-G.; Lee, S.-H. Security requirements for cloud-based C4I security architecture. In Proceedings of the 2019 International Conference on Platform Technology and Service (PlatCon), Jeju, Republic of Korea, 28–30 January 2019; pp. 1–4. [Google Scholar]
- Kent, S. Federal Cloud Computing Strategy; Executive Office of the President of the United States: Washington, DC, USA, 2019.
- Mughal, A.A. Cybersecurity Architecture for the Cloud: Protecting Network in a Virtual Environment. Int. J. Intell. Autom. Comput. 2021, 4, 35–48. [Google Scholar]
Industry | Research (Year) | Methods |
---|---|---|
Aviation and Defense | Robertson, J. et al. [25] (2021) | The RMF was used to meet information security requirements when designing a cloud-based computing framework. |
Kim, I. et al. [27] (2022) | Threat scenarios were concretized in simulation phase 1 linked with the RMF. | |
Pearson, J. et al. [28] (2023) | The RMF was applied to resolve process disconnection issues within the cyber security group. | |
Automotive and Manufacturing | Haitao, Z. et al. [29] (2022) | TARA was improved based on the RMF to enhance efficiency and accuracy in automotive threat analysis and risk assessment. |
Chhawri, S. et al. [32] (2017) | The NIST RMF was applied to automotive use cases and used to automate automotive security tests. | |
Thangavelu, S. et al. [33] (2020) | The conceptual process model needed for drone production was improved by referencing the conventional system threat approach and the RMF. | |
Environmental and Energy | Jiang, L. et al. [34] (2021) | The RMF was applied to the risk management of power systems, allowing for the measurement of security loss rates across various metrics. |
Miranda, A. W. et al. [35] (2017) | Loss rates for grid-connected commercial solar plants were calculated based on RMF control items. | |
de Peralta, F. et al. [36] (2020) | A framework was proposed to identify security vulnerabilities in marine renewable energy systems and determine risks based on the RMF. | |
Radoglou-Grammatikis, P. et al. [37] (2023) | The collAborative Risk assessMent sYstem (ARMY) was incorporated as a primary component for collaborative risk assessment, and risk evaluations were conducted using quantification techniques at various levels. | |
Liatifis, A. et al. [38] (2023) | The system was modeled using attack–defense trees (ADT), and risk assessment, sensitivity analysis, optimization, and continuous monitoring and adjustment were conducted. | |
Medical and Health | Udroiu, A.M. et al. [39] (2022) | A methodology was presented that improves HITRUST based on the RMF to evaluate and enhance cyber security. |
Van Devender, M. S. et al. [44] (2023) | An RMF-based framework was introduced for threat and vulnerability assessments in the computing cybersecurity field of medical devices. | |
Miller, J. C. [45] (2019) | A methodology was presented that uses the RMF for the security evaluation of cloud-based healthcare applications. | |
IoT | Radanliev, P. [47] (2018) | A new model for calculating the economic impact of IoT cyber risks was developed by applying established models such as Cyber Value at Risk and MicroMort to predict IoT risks. |
Li, K. et al. [48] (2020) | The RMF was used to collect and input information from each link of the power IoT system, initializing the process and evaluating risks at both organizational and system levels. | |
Brandon, A. et al. [49] (2019) | The method of analyzing and managing the security of the IoT network using the RMF is explored, with a particular focus on the ‘monitor’ aspect. |
Behavior | Duty Function | Information Type | Initial Security Impact | ||
---|---|---|---|---|---|
C | I | A | |||
Defense policy and planning | Defense policy | National security | H | H | H |
International policy | M | M | M | ||
… | … | … | … | … | |
… | … | … | … | … | … |
Class | Criteria |
---|---|
First Class |
|
Second Class |
|
Third Class |
|
Information Type | Initial Security Impact Level | Reasons for Choosing an Information Type | ||||
---|---|---|---|---|---|---|
First Class | Second Class | Third Class | C | I | A | |
Defensive support | Command communications | Defense networks | H | H | H | An exchange of information with various systems is required. |
… | … | … | … | … | ||
… | … | … | … | … | … | … |
Information Type | Initial Security Impact Level | Security Impact Level Adjustment Factor | References | ||
---|---|---|---|---|---|
Third Class | C | I | A | ||
Defense networks | M | M | H |
| XX guide p. 27 |
… | … | … | … | … | … |
Item | Detail |
---|---|
General description | A standard data transmission communication system used to share tactical data (defense secret information, Class II) between reconnaissance assets, command and control, and defense systems and to conduct defensive operations. |
Interlocking form | Integrates with vehicle defense systems and Vehicle C4I (command, control, communications, computers, and intelligence) platforms. |
… | … |
Main Keyword | Detailed Keyword |
---|---|
Secret | For security control items required by systems involving password creation and authentication, handling classified information and materials, maintaining and repairing classified systems, and authorization, search the keyword ⇒ Secret. |
Interlocking | For security control items required by systems that operate or feature domain interconnection approvals and restrictions, interconnection agreements, and interconnection security control equipment, search the keywords ⇒ Interconnection, Interface, Network, and NAC. |
… | … |
Keyword | Document/ Security Control | Detail | DoD RMF |
---|---|---|---|
Secret | Secret Guide/SP-3-35 (continuation of essential functions) | Essential functions must be maintained until the site is fully restored. | CP-2(5) |
… | … | … | |
… | … | … | … |
Information Type | Initial Security Impact Level | Reasons for Choosing an Information Type | ||||
---|---|---|---|---|---|---|
First Class | Second Class | Third Class | C | I | A | |
Defensive support | Command communications | Defense networks | H | H | H | An exchange of information with various systems is required. |
Defense system integration | H | H | H | Sharing of the situation in the defense area is needed. | ||
Sharing information | Data exchange | L | L | L | A function to share information about the defense area with defenders is necessary. | |
… | … | … | … | … | … | … |
Initial System Security Classification | H | H | H | Apply the HWM |
Information Type | Initial Security Impact Level | Security Impact Level Adjustment Factor | References | ||
---|---|---|---|---|---|
Third Class | C | I | A | ||
Defense networks | M | M | H |
| XX guide p. 27 |
Defense System Integration | M | M | H |
| Defense guide p. 66 |
Data Exchange | L | L | L |
| Exchange guide p. 59 |
… | … | … | … | … | … |
Adjusted System Security Classification | M | M | H | Apply the HWM | Security Guide p. 83 |
Item | Detail |
---|---|
General description | A standard data transmission communication system used to share tactical data (defense secret information, Class II) between reconnaissance assets, command and control, and defense systems and to conduct defensive operations. => Security |
Transmission method | Time division multiple access (TDMA) |
Maximum number of subscribers | Supports simultaneous subscription across X networks and can handle up to XXX subscribers. |
Radio distance | 20,000 km |
Message format | Supports Y and Z message formats. |
Interlocking structure | Components include a data link processor, encryption equipment, data link, terminal device, communication gear, storage devices, antennas, and more. => Encryption, Storage |
Interlocking form | Integrates with vehicle defense systems and Vehicle C4I (command, control, communications, computers, and intelligence) platforms. => Interlocking |
… | … |
Repetition Number | Security Control Code | Number of Security Control Items Retrieved |
---|---|---|
1 | AC | 21 |
SC | 17 | |
… | … | |
Total | 79 | |
2 | AC | 13 |
SC | 7 | |
… | … | |
Total | 38 | |
3 | AC | 13 |
SC | 5 | |
… | … | |
Total | 35 | |
4 | AC | 14 |
SC | 6 | |
… | … | |
Total | 33 | |
5 | AC | 14 |
SC | 6 | |
… | … | |
Total | 33 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Jeong, G.; Kim, K.; Yoon, S.; Shin, D.; Kang, J. Exploring Effective Approaches to the Risk Management Framework (RMF) in the Republic of Korea: A Study. Information 2023, 14, 561. https://doi.org/10.3390/info14100561
Jeong G, Kim K, Yoon S, Shin D, Kang J. Exploring Effective Approaches to the Risk Management Framework (RMF) in the Republic of Korea: A Study. Information. 2023; 14(10):561. https://doi.org/10.3390/info14100561
Chicago/Turabian StyleJeong, Giseok, Kookjin Kim, Sukjoon Yoon, Dongkyoo Shin, and Jiwon Kang. 2023. "Exploring Effective Approaches to the Risk Management Framework (RMF) in the Republic of Korea: A Study" Information 14, no. 10: 561. https://doi.org/10.3390/info14100561
APA StyleJeong, G., Kim, K., Yoon, S., Shin, D., & Kang, J. (2023). Exploring Effective Approaches to the Risk Management Framework (RMF) in the Republic of Korea: A Study. Information, 14(10), 561. https://doi.org/10.3390/info14100561