ISC2 CGRC Exam Highlights

NIST RMF (Source: NIST)

With 20 study hours or so, I passed the ISC2 CGRC (formerly known as CAP) exam today (Jan 9, 2024). As a CISSP, I was reluctant to pursue the entry-level exam CC and US government-specific CGRC/CAP because CISSP covers job practices well enough. However, as a CISSP instructor, I must wear the same shoes to prove to my students that CC is a fantastic starter and a significant milestone in the CISSP journey. Moreover, CGRC is a good personal goal for learning and growth in 2024.

Having completed the exam today, I’d like to thank Nancy Allen, also a CGRC holder, who inspired me to push forward to both CGRC and CC. She is quite active in the community and passionate about sharing and helping people. Thank you so much for your contributions and advancing the profession!

I’m thankful for Prabh Nair‘s valuable sharing, How to Prepare for CGRC 2024. He summarized key points for CGRC aspirants and provided effective guidance.

I am grateful to Fadi Sodah (aka Madunix), author of the CISSP Process Guide, for his ongoing quality write-ups. Even though Fadi is undergoing a disease recovery, he keeps writing and helping people. He inspired and motivated me a lot when I was suffering challenges. Thank you, Fadi!

Summary of RMF Tasks

Step 0Prepare – Organization Level
TASK P-1Identify and assign individuals to specific roles associated with security and privacy risk management.
TASK P-2Establish a risk management strategy for the organization that includes a determination of risk tolerance.
TASK P-3Assess organization-wide security and privacy risk and update the risk assessment results on an ongoing basis.
TASK P-4Establish, document, and publish organizationally-tailored control baselines and/or Cybersecurity Framework Profiles.
TASK P-5Identify, document, and publish organization-wide common controls that are available for inheritance by organizational systems.
TASK P-6Prioritize organizational systems with the same impact level.
TASK P-7Develop and implement an organization-wide strategy for continuously monitoring control effectiveness.
Prepare – System Level
TASK P-8Identify the missions, business functions, and mission/business processes that the system is intended to support.
TASK P-9Identify stakeholders who have an interest in the design, development, implementation, assessment, operation, maintenance, or disposal of the system.
TASK P-10Identify assets that require protection.
TASK P-11Determine the authorization boundary of the system.
TASK P-12Identify the types of information to be processed, stored, and transmitted by the system.
TASK P-13Identify and understand all stages of the information life cycle for each information type processed, stored, or transmitted by the system.
TASK P-14Conduct a system-level risk assessment and update the risk assessment results on an ongoing basis.
TASK P-15Define the security and privacy requirements for the system and the environment of operation.
TASK P-16Determine the placement of the system within the enterprise architecture.
TASK P-17Allocate security and privacy requirements to the system and to the environment of operation.
TASK P-18Register the system with organizational program or management offices.
Step 1Categorize System
TASK C-1Document the characteristics of the system.
TASK C-2Categorize the system and document the security categorization results.
TASK C-3Review and approve the security categorization results and decision.
Step 2Select Controls
TASK S-1Select the controls for the system and the environment of operation.
TASK S-2Tailor the controls selected for the system and the environment of operation.
TASK S-3Allocate security and privacy controls to the system and to the environment of operation.
TASK S-4Document the controls for the system and environment of operation in security and privacy plans.
TASK S-5Develop and implement a system-level strategy for monitoring control effectiveness that is consistent with and supplements the organizational continuous monitoring strategy.
TASK S-6Review and approve the security and privacy plans for the system and the environment of operation.
Step 3Implement Controls
TASK I-1Implement the controls in the security and privacy plans.
TASK I-2Document changes to planned control implementations based on the “as-implemented” state of controls.
Step 4Assess Controls
TASK A-1Select the appropriate assessor or assessment team for the type of control assessment to be conducted.
TASK A-2Develop, review, and approve plans to assess implemented controls.
TASK A-3Assess the controls in accordance with the assessment procedures described in assessment plans.
TASK A-4Prepare the assessment reports documenting the findings and recommendations from the control assessments.
TASK A-5Conduct initial remediation actions on the controls and reassess remediated controls.
TASK A-6Prepare the plan of action and milestones based on the findings and recommendations of the assessment reports.
Step 5Authorize System
TASK R-1Assemble the authorization package and submit the package to the authorizing official for an authorization decision.
TASK R-2Analyze and determine the risk from the operation or use of the system or the provision of common controls.
TASK R-3Identify and implement a preferred course of action in response to the risk determined.
TASK R-4Determine if the risk from the operation or use of the information system or the provision or use of common controls is acceptable.
TASK R-5Report the authorization decision and any deficiencies in controls that represent significant security or privacy risk.
Step 6Monitor Controls
TASK M-1Monitor the information system and its environment of operation for changes that impact the security and privacy posture of the system.
TASK M-2Assess the controls implemented within and inherited by the system in accordance with the continuous monitoring strategy.
TASK M-3Respond to risk based on the results of ongoing monitoring activities, risk assessments, and outstanding items in plans of action and milestones.
TASK M-4Update plans, assessment reports, and plans of action and milestones based on the results of the continuous monitoring process.
TASK M-5Report the security and privacy posture of the system to the authorizing official and other organizational officials on an ongoing basis in accordance with the organizational continuous monitoring strategy.
TASK M-6Review the security and privacy posture of the system on an ongoing basis to determine whether the risk remains acceptable.
TASK M-7Implement a system disposal strategy and execute required actions when a system is removed from operation.
Source: NIST SP 800-37 R2

Roles and Responsibilities

1Authorizing Official
2Authorizing Official Designated Representative
3Chief Acquisition Officier
4Chief Information Officier (CIO)
5Common Control Provider
6Control Assessor
7Enterprise Architect
8Head of Agency
9Information Owner or Information Steward
10Mission or Business Owner
11Risk Executive (Function)
12Security Architect or Privacy Architect
13Senior Accountable Official for Risk ManagementThe head of the agency
14Senior Agency Information Security OfficierPrimary Liaison
15Senior Agency Official for Privacy
16System AdministratorOperations and Maintenance
17System Owner (Program Manager or Business/Asset Owner)Security and Privacy Plans
18System Security Officier (Security Manager) or System Privacy OfficierPrincipal advisor on all matters
19System User
20System Security Engineer or System Privacy EngineerDevelopment and Implementation
NIST SP 800-37 R2

Important Concepts

Security Planning Process Inputs/Outputs (NIST SP 800-18 R1)
Security Categorization Process Execution (NIST SP 800-60 V1 R1)
Government Resource Management Functions and Information Types (NIST SP 800-60 V1 R1)
POTENTIAL IMPACT DEFINITIONS FOR SECURITY OBJECTIVES (FIPS 199)
Security Control Class, Family, and Identifier (NIST SP 800-18 R1 from FIPS 200)
ORGANIZATION-WIDE RISK MANAGEMENT APPROACH (NIST SP 800-37 R2)
RISK MANAGEMENT PROCESS APPLIED ACROSS THE TIERS
RELATIONSHIP AMONG RISK FRAMING COMPONENTS (NIST SP 800-30 R1)
RISK ASSESSMENT PROCESS (NIST SP 800-30 R1)
GENERIC RISK MODEL WITH KEY RISK FACTORS (NIST SP 800-30 R1)
CONCEPTUAL VIEW OF THE SYSTEM (NIST SP 800-37 R2)
CONCEPTUAL VIEW OF A COMPLEX SYSTEM (NIST SP 800-37 R2)
TYPES OF AUTHORIZATION DECISIONS (NIST SP 800-37 R2)
DEFINING PROTECTION NEEDS (NIST SP 800-160 V1 R1)
STAKEHOLDER AND SYSTEM REQUIREMENTS (NIST SP 800-160 V1 R1)
REQUIREMENTS ENGINEERING ACROSS KEY LIFE CYCLE PROCESSES (NIST SP 800-160 V1 R1)
FACTORS IN SECURITY REQUIREMENTS ANALYSIS (NIST SP 800-160 V1 R1)
INFORMATION SECURITY REQUIREMENTS INTEGRATION (NIST SP 800-30 R1)
SECURITY AND PRIVACY CONTROL FAMILIES (NIST SP 800-53 R5)
CONTROL STRUCTURE (NIST SP 800-53 R5)
AWARENESS AND TRAINING FAMILY (NIST SP 800-53 R5)
AWARENESS AND TRAINING FAMILY (NIST SP 800-53B)
SECURITY AND PRIVACY ASSESSMENT PROCEDURES (NIST SP 800-53A R5)
ANALYZE ASSESSMENT REPORT RESULTS SUMMARY (NIST SP 800-53A R5)
OVERVIEW OF PROCESS TO CONDUCT EFFECTIVE SECURITY AND PRIVACY CONTROL ASSESSMENTS
SECURITY AND PRIVACY CONTROL ASSESSMENT PROCESS OVERVIEW (NIST SP 800-53A R5)
Summary of NIST SP 800-53 Contingency Planning Controls (NIST SP 800-34 R1)
Type of Plans (NIST SP 800-34 R1)
Contingency Plan Structure (NIST SP 800-34 R1)
ISCM Process (NIST SP 800-137)
Security Automation Domains (NIST SP 800-137)
Sample ISCM Implementation (NIST SP 800-137)
Example of the Relationship between system and its components and CIs (NIST SP 800-128)
Checklist User Process Overview (NIST SP 800-70 R4)
Incident Response Life Cycle (NIST SP 800-61 R2)
Sanitization and Disposition Decision Flow (NIST SP 800-88 R1)
Components of Privacy Engineering (NIST IR 8062)
CSF Profile (Source: NIST CSF)
CSF Functions and Categories (Source: NIST CSF)

Key Elements for Assessment Reporting

  • System name
  • Security categorization
  • Site(s) assessed and assessment date(s)
  • Assessor’s name/identification
  • Previous assessment results (if reused)
  • Security/privacy control or control enhancement designator
  • Selected assessment methods and objects
  • Depth and coverage attributes values
  • Assessment finding summary (indicating “satisfied” or “other than satisfied”)
  • Assessor comments (weaknesses or deficiencies noted)
  • Assessor recommendations (priorities, remediation, corrective actions, or improvements)

CBK Suggested References

  1. Information Security Risk Management for ISO 27001/ISO 27002, 3rd Edition by Alan Calder, Steve Watkings. Publisher: IT Governance Publishing. (Aug, 2019).
  2. ISO 27001/ISO 27002 A Pocket Guide, 2nd Edition by Chris Davis, Mike Kegerreis, Mike Schille. Publisher: McGraw-Hill. (Oct, 2013).
  3. IT Auditing Using Controls to Protect Information Assets, 3rd Edition by Mike Kegerreis, Mike Schiller, Chris Davis. Publisher: McGraw-Hill Education. (Oct, 2019).
  4. NIST FIPS-199, Standards for Security Categorization of Federal Information and Information Systems by U.S. Dept. of Commerce. (Feb, 2004).
  5. NIST SP 800-115, Technical Guide to Information Security Testing and Assessment by Karen Scarfone, Murugiah Souppaya, Amanda Cody, Angela Orebaugh. (Sep, 2008).
  6. NIST SP 800-137, Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations by Kelley Dempsey, Nirali Shah Chawla, Arnold Johnson, Ronald Johnston, Alicia Clay Jones, Angela Orebaugh, Matthew Scholl, Kevin Stine. (Sep, 2011).
  7. NIST SP 800-160, Vol. 1, Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems by Ron Ross, Michael McEvilley, Janet Carrier Oren. (Mar, 2018).
  8. NIST SP 800-30, Rev. 1, Guide for Conducting Risk Assessments by Joint Task Force Transformation Initiative. (Sep, 2012).
  9. NIST SP 800-37, Rev. 2, Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy by Joint Task Force Transformation Initiative. (Dec, 2018).
  10. NIST SP 800-39, Managing Information Security Risk: Organization, Mission, and Information System View by Joint Task Force Transformation Initiative. (Mar, 2011).
  11. NIST SP 800-53, Rev. 5, Security and Privacy Controls for Information Systems and Organizations by Joint Task Force Transformation Initiative. (Sep, 2020).
  12. NIST SP 800-53B, Control Baselines for Information Systems and Organizations by Joint Task Force Transformation Initiative. (Oct, 2020).
  13. NIST SP 800-60, Vol. 1, Rev. 1, Guide for Mapping Types of Information and Information Systems to Security Categories by Kevin Stine, Rich Kissel, William C. Barker, Jim Fahlsing, Jessica Gulick. (Aug, 2008).
  14. NIST SP 800-70, Rev. 4, National Checklist Program for IT Products: Guidelines for Checklist Users and Developers by Stephen D. Quinn, Murugiah Souppaya, Melanie Cook, Karen Scarfone. (Sep, 2020).
  15. NIST SP 800-88, Guidelines for Media Sanitization by Richard Kissel, Andrew Regenscheid, Matthew Scholl, Kevin Stine. (Dec, 2014).

CGRC Examination Weights

Leave a Reply