The identify function of the FCS is visually represented as such:
Function | Category | Subcategory |
Identify (ID) | Asset Management (AM) | ID.AM-1: Inventory Agency physical devices and systems |
ID.AM-2: Inventory Agency software platforms and applications | ||
ID.AM-3: Map Agency communication and data flows | ||
ID.AM-4: Catalog interdependent external information systems | ||
ID.AM-5: Prioritize IT Resources based on classification, criticality, and business value | ||
ID.AM-6: Establish cybersecurity roles and responsibilities for the entire Workforce and third-party Stakeholders | ||
Business Environment (BE) | ID.BE-1: Identify and communicate the Agency's role in the business mission/processes | |
ID.BE-2: Identify and communicate the Agency's place in Critical Infrastructure and its Industry Sector to Workers | ||
ID.BE-3: Establish and communicate priorities for Agency mission, objectives, and activities | ||
ID.BE-4: Identify dependencies and critical functions for delivery of critical services | ||
ID.BE-5: Implement resiliency requirements to support the delivery of critical services for all operating states (e.g., normal operations, under duress, during recovery) | ||
Governance (GV) | ID.GV-1: Establish and communicate an organizational cyber security policy | |
ID.GV-2: Coordinate and align cybersecurity roles and responsibilities with internal roles and External Partners | ||
ID.GV-3: Understand and manage legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties obligations | ||
ID.GV-4: Ensure that governance and risk management processes address cybersecurity risks | ||
Risk Assessment (RA) | ID.RA-1: Identify and document asset vulnerabilities | |
ID.RA-2: Receive cyber Threat intelligence from information sharing forums and sources | ||
ID.RA-3: Identify and document Threats, both internal and external | ||
ID.RA-4: Identify potential business impacts and likelihoods | ||
ID.RA-5: Use Threats, vulnerabilities, likelihoods, and impacts to determine risk | ||
ID.RA-6: Identify and prioritize risk responses | ||
Risk Management Strategy (RM) | ID.RM-1: Establish, manage, and ensure organizational Stakeholders understand the approach to be employed via the risk management processes | |
ID.RM-2: Determine and clearly express organizational risk tolerance | ||
ID.RM-3: Ensure that the organization's determination of risk tolerance is informed by its role in Critical Infrastructure and sector specific risk analysis | ||
Supply Chain Risk Management (SC) | ID.SC-1: Establish management processes to identify, establish, assess, and manage cyber supply chain risk which are agreed to by organizational Stakeholders | |
ID.SC-2: Identify, prioritize, and assess Suppliers and third-party providers of information systems, components, and services using a cyber supply chain risk assessment process | ||
ID.SC-3: Require Suppliers and third-party providers (by contractual requirement when necessary) to implement appropriate measures designed to meet the objectives of the organization's information security program or cyber supply chain risk management plan | ||
ID.SC-4: Routinely assess Suppliers and third-party providers to confirm that they are meeting their contractual obligations by conducting reviews of audits, summaries of test results, or other equivalent evaluations of Suppliers/providers | ||
ID.SC-5: Conduct response and recovery planning and testing with Suppliers and third-party providers |
Each Agency shall establish appointment selection disqualifying criteria for individuals hired as IT Workers that will have access to information processing facilities, or who have system, database, developer, network, or other administrative capabilities for systems, applications, or servers with risk categorization of moderate-impact or higher.
Risk Assessments | |
Categorize: | Categorize information systems and the information processed, stored, and transmitted by that system based on a security impact analysis. |
Select: | Select baseline security for information systems based on the security categorization; tailoring and supplementing the security baseline as needed based on organization assessment of risk and local conditions. |
Implement: | Implement the selected baseline security and document how the controls are deployed within information systems and environment of operation. |
Assess: | Assess the baseline security using appropriate procedures to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for systems. |
Authorize: | Authorize information system operation based upon a determination of the risk to organizational operations and assets, individuals, other organizations and the state resulting from the operation of the information system and the decision that this risk is acceptable. |
Monitor: | Monitor and assess selected baseline security in information systems on an ongoing basis including assessing control effectiveness, documenting changes to the system or environment of operation, conducting security impact analyses of the associated changes, and reporting the security state of systems to appropriate Agency officials. |
Agencies are required to consider the following security objectives when assessing risk and determining what kind of assessment is required and when or how often an assessment is to occur: confidentiality, integrity, and availability. When determining the potential impact to these security objectives Agencies will use the following table.
POTENTIAL IMPACT | |||
Security Objectives: | LOW | MODERATE | HIGH |
Confidentiality Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. | The unauthorized disclosure of information could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. | The unauthorized disclosure of information could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. | The unauthorized disclosure of information could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. |
Integrity Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity. | The unauthorized modification or destruction of information could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. | The unauthorized modification or destruction of information could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. | The unauthorized modification or destruction of information could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. |
Availability Ensuring timely and reliable access to and use of information. | The disruption of access to or use of information or an information system could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. | The disruption of access to or use of information or an information system could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. | The disruption of access to or use of information or an information system could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. |
In accordance with section 282.318(4)(d), F.S., each Agency shall complete and submit to FL[DS] no later than July 31, 2017, and every three years thereafter, a comprehensive Risk Assessment. In completing the Risk Assessment, Agencies shall follow the six-step process ("Conducting the Risk Assessment") outlined in Section 3.2 of NIST Special Publication 800-30, utilizing the exemplary tables provided therein as applicable to address that particular Agency's Threat situation. NIST Special Publication 800-30, Guide for Conducting Risk Assessments, Revision 1 (September 2012) is hereby incorporated by reference and may be found at: http://www.flrules.org/Gateway/reference.asp?No=Ref-06499. When establishing risk management processes, it may be helpful for Agencies to review NIST Risk Management Framework Special Publications - they can be downloaded from the following website: http://csrc.nist.gov/publications/PubsSPs.html. When assessing risk, Agencies shall estimate the magnitude of harm resulting from unauthorized access, unauthorized modification or destruction, or loss of availability of a resource. Estimates shall be documented as low-impact, moderate-impact, or high-impact relative to the security objectives of confidentiality, integrity, and availability.
Fla. Admin. Code Ann. R. 60GG-2.002
Rulemaking Authority 282.318(11) FS. Law Implemented 282.318(3) FS.
New 3-16-16, Amended 2-5-19, Formerly 74-2.002, Amended 9-18-22.