Plan of Action and Milestones (Poa&M)

Plan of Action and Milestones (Poa&M)

SCGD004AF IS Security POA&M Guidebook16 March2017

INFORMATION SYSTEM SECURITY

PLAN OF ACTION AND MILESTONES (POA&M)

GUIDEBOOK

Prepared By: SAF/A6CS

Date: 31Jan 2016

BES Update: 17 Nov 2016

REFERENCES

1. DoDI 8510.01, March 12, 2014 Risk Management Framework (RMF) for DoD Information Technology (IT)

2. AFI 17-101, 30 November 2016, Risk Management Framework (RMF) for Air Force Information Technology (IT)

3. AFI 17-130, 31 August 2015, Cybersecurity Program Management

4. P.L. 107-347, 17 December 2002, Electronic Government Act 2002, Title III - Federal Information Security Management Act (FISMA)

5. NIST SP 800-30 Rev. 1, September 2012, Guide for Conducting Risk Assessments

BACKGROUND

In accordance with Public Law 107-347 Federal agencies are required to report significant security deficiencies in information security practices and planned remedial action to address such deficiencies. Department of Defense (DoD) policy requires systems without an Authorization to Operate (ATO), authorized with conditions (ATO with Conditions), and systems with expired and/or incomplete authorizationsto document a plan of action and milestones (POA&M).

1. What is a POA&M? The POA&M is a tool identifying tasks that need to be accomplished to remediate any identified vulnerabilities in a program or system. It specifies resources required to accomplish the elements of the plan, any milestones in meeting the task, and scheduled completion dates for the milestones.

2. What is the purpose of a POA&M? The purpose of a POA&M is to assist agencies in identifying, assessing, prioritizing, and monitoring security deficiencies found in programs and systems, and to document progress in correcting those deficiencies. The Office of Management and Budget (OMB) requires agencies to prepare POAMs for all programs and systems where security deficiencies have been found. The POA&M is designed to be a management tool to assist agencies in closing their security performance gaps, assistinspectors general (IGs) in their evaluation work of agency security performance, and assist OMB with oversight responsibilities.

POA&Ms are permanent records. Once posted, entries are updated, but not removed even after correction or mitigation actions are completed. Inherited deficiencies are also reflected on the POA&Ms. DoD is responsible for maintaining the confidentiality of POA&Ms because they may contain pre-decisional budget or other sensitive information.

Although only system-level POA&Ms are the only ones discussed in DoDI 8510.01 there are three types of DoD RMF related POA&Ms, as reflected in the table 3-1 and further described in paragraphs below.

3. When a POA&M is required. POA&Ms are required to be submitted for:

  1. systems with an expired or incomplete authorization
  2. systems with an outdated annual contingency plan and/or security controls test
  3. systems with identified security weaknesses with assigned severity code (see paragraph 5)
  4. systems with an outdated annual security review
  5. systems with an ATOwith Conditions
  6. systems with identified security weaknesses (non-severity code) directed by the AO or ISO

4. The POA&M Document. AnRMF POA&M is a living document designed as a management tool to assist the RMF team in closing their security performance gaps, assist inspectors general (IGs) in their evaluation of agency security performance, and assist SAF/CIO with oversight responsibilities. They may contain pre-decisional budget information and the DoD has a responsibility to maintain the confidentiality of this type of information. Air Force System Level POA&Ms shall:

4.1. Be tied to the organization’s budget submission when required through the unique project identifier of a system. This links the security costs for a system with the security performance of a system.[1]

4.2. Include all IT security weaknesses found during any other review done by, for, or on behalf of the agency, including but not limited to DoD IG and Air Force Audit Agency (AFAA) audits, financial system audits, official security test and evaluation or compliance review and critical infrastructure vulnerability assessments.

5. Types of RMF POA&Ms and Severity Codes

5.1 There are three types of DoD IT Security POA&Ms.

Table 3-1

Types of DoD RMF POA&Ms

Report / Responsibility / Submit To / Dates
System Level RMF POA&Ms
(Table 3-2) / PMs/ISOs / DoD Component CIO (Also toDoD SISO for all systems with a Level 1 deficiency or on OMB Watch List (Exhibit 300) for security / 1 Dec, 1 Mar,
1 Jun, 1 Sep
Component RMF POA&M / DoD Component CIO / DoD CIO (As directed) / 1 Dec, 1 Mar,
1 Jun, 1 Sep
DoD Enterprise RMF POA&M / DoD CIO / OMB (As directed) / OMB (As directed)

System-Level RMF POA&M

The system-level POA&M addresses: (1) why the system needs to operate; (2) any operational restrictions imposed to lessen the risk during a conditional authorization; (3) specific corrective actions necessary to demonstrate that all assigned security controls have been implemented correctly and are effective; (4) the agreed upon timeline for completing and validating corrective actions; and (5) the resources necessary and available to properly complete the corrective actions. POA&Ms may be active or inactive throughout a system’s life cycle as deficiencies are newly identified or closed.

The DoD Component CIOs are responsible for monitoring and tracking the overall execution of system-level POA&Ms until identified security deficiencies have been closed and the RMF process documentation appropriately adjusted. The AOs are responsible for monitoring and tracking overall execution of system-level POA&Ms. The PM is responsible for implementing the corrective actions identified in the POA&M and, with the support and assistance of the ISO, provides visibility and status to the AO, the CISO, and the governing DoD Component CIO.

In order to reflect the complete cybersecurity posture of a DoD IS or PIT system at all times in a single document, the POA&M is also used to document AO-accepted NC security controls, baseline security controls, overlays applied and security controls that have been tailored out because of the unique nature of the system. POA&Ms listing security controls with “High” or “Very High” risk shall be assessed for classification. For instance, the fact that an IS or PIT system has a ”Very High” risk that has not been mitigated to a degree that will preclude immediate unauthorized access dictates a minimum classification of CONFIDENTIAL. Other factors that would influence a classification decision include the number of ”High” risks identified for a single system and whether the system itself is classified. At a minimum a POA&M will be treated as and marked Controlled Unclassified Information (CUI). Classified RMF POA&Ms for unclassified systems must be maintained in an appropriate environment separate from the unclassified security authorization package. Security controls that are subtracted due to the application of an overlay are not recorded on POA&M.

Component-Level RMF POA&M

DoD Components are required to complete and submit a DoD Component-level POA&M for systemic deficiencies (significant cybersecurity deficiencies) identified across the DoD Component, or for systemic deficiencies (significant cybersecurity deficiencies) identified by GAO and IG audits and reviews.

DoD Enterprise-Level RMF POA&M

The DoD CIO is responsible for completing and submitting a DoD Enterprise-level RMF POA&M. Systemic cybersecurity deficiencies reported on the DoD Enterprise-level RMF POA&M are derived from the DoD Component-level IT Security POA&Ms, GAO and IG DoD audits, and other reviews and events. The information required by the Enterprise-Level POA&M is similar to that in the Component-Level POA&M.

5.2. Impact Values are assigned to a system weakness by the ISO or security control assessorto indicate (1) the risk level associated with the security weakness and (2) the urgency with which the corrective action must be completed.Impact Values are expressed as “Very High, High, Moderate, Low, Very Low” where Very High is the indicator of greatest risk and urgency. Very High weaknesses shall receive the highest priority for correction or mitigation. Severity codes are assigned after consideration of all possible mitigation measures have been taken within system design/architecture limitations for the AF information system in question.

TABLE 3-2

VULNERABILITY SEVERITY

Qualitative ValuesDescription

Very High / The vulnerability is exposed and exploitable, and its exploitation could result in severe impacts. Relevant security control or other remediation is not implemented and not planned; or no security measure can be identified to remediate the vulnerability.
High / The vulnerability is of high concern, based on the exposure of the vulnerability and ease of exploitation and/or on the severity of impacts that could result from its exploitation. Relevant security control or other remediation is planned but not implemented; compensating controls are in place and at least minimally effective.
Moderate / The vulnerability is of moderate concern, based on the exposure of the vulnerability and ease of exploitation and/or on the severity of impacts that could result from its exploitation. Relevant security control or other remediation is partially implemented and somewhat effective.
Low / The vulnerability is of minor concern, but effectiveness of remediation could be improved. Relevant security control or other remediation is fully implemented and somewhat effective.
Very Low / The vulnerability is not of concern. Relevant security control or other remediation is fully implemented, assessed, and effective.

5.2.1. Very High and High weaknesses allow primary security protections or perimeters to be bypassed, allowing immediate access by unauthorized personnel or unauthorized assumption of super-user privileges (e.g., root privileges), and cannot be satisfactorily mitigated. Very High and Highweaknesses shall be corrected before an Authorization to Operate (ATO) is granted. A system can operate with a Very High or High weakness only when the system is critical to military operations and failure to deploy or allow continued operation for deployed systems would preclude mission accomplishment. Only SAF/CIO, with coordination from AFSPC/CC, can authorize operation of a system with a Very High or High weakness and this can only be done through an ATO with Conditions. In accordance with DoD policy, this responsibility cannot be delegated below the Component CIO and a signed copy of the authorization memorandum with supporting rationale shall be provided to the DoD SISO. Note: POA&Ms identifying Very High or High weaknesses on classified systems must be submitted on the SIPRNET and the POA&M will assumes the highest classification of the system.

5.2.2. Moderate weaknesses are those that can lead to unauthorized system access or activity but can usually be corrected or mitigated to a point where any residual risk is acceptable. Moderate weaknesses must be corrected or satisfactorily mitigated before an ATO can be granted. If a Moderate weakness cannot be corrected or satisfactorily mitigated within the time limitation imposed in the ATO with Conditions, the system AO or ISO must certify in writing that continued system operation is critical to mission accomplishment or terminate system operation. A copy of the authorization to continue system operation with supporting rationale shall be provided to SAF/ CIO (through SAF/CIO A6CS).

5.2.3. Low and Very Low weaknesses, if corrected, will improve the system’s cybersecurity posture but do not preclude an authorization to operate. The system AOor information system owner will determine if these weaknesses will be corrected or the risk accepted. Low and Very Low weaknesses accepted by the AO will show scheduled completion date as N/A, note acceptance by AO in the milestone column, and risk accepted in the status column.

5.3. A RMF Security POA&M shall be prepared for any Air Force information system with a current authorization that is found to be operating in an unacceptable cybersecurity posture through DoD IG or AFAA audits, or other reviews or events, such as an annual security review or compliance validation. An unacceptable cybersecurity posture results when the security controls compliance posture does not match that authorized by the AuthorizationDecision. For example an security control is found to be non-compliant or a satisfactory mitigation is not in place, leading to a newly identified weakness. If the AF information system already has a RMF Security POA&M, the newly identified weakness will be added to that documentation.

5.3.1. If a newly discovered Very High or High weakness on an Air Force information system operating with an ATO cannot be corrected within 30 days, the system can only continue operation under the terms prescribed in paragraph 5.2.1.

5.3.2. If a newly discovered Moderate weakness on a DoD information system operating with a current ATO cannot be corrected or satisfactorily mitigated within 90 days, the system can only continue operation under the terms prescribed in paragraph 5.2.2.

6.Monitoring and Tracking POA&M. SAF/CIO is responsible for monitoring and tracking the overall execution of system-level RMF Security POA&Ms. The PMs or Information System Security Managers (ISSMs) are responsible for implementing the corrective actions identified in RMF Security POA&Ms and providing visibility and status to the AO, the CISO and SAF CIO. POA&Ms must be submitted as follows:

6.1. Be submitted to SAF/CIO and Chief Information Security Officer (CISO). POA&M submission requirements are met by updating POA&Ms in eMASS or SIPR eMASS and updating Information Technology Investment Portfolio System(ITIPS) questions 16a and 16b. Ensure question S209 is updated in the ITIPS as well. POA&Ms must be updated quarterly and provided upon request from SAF/CIO or CISO.

6.2. Be shared with the AFAA through SAF/CIO A6/CS to ensure independent verification and validation of identified weaknesses and completed corrective actions.

6.3. Follow the format detailed in the examples provided in the attachment. The system level POA&M template is available in section 7 of this document and can also be downloaded from the DoD RMF Knowledge Service web site:

6.4. When there is a compelling operational necessity Air Force information systems may be allowed to operate despite IT security weaknesses that cannot be corrected or adequately mitigated within prescribed timeframes because of technology limitations or, in rare cases, prohibitive costs. Such instances must be fully justified, approved, and documented as described below.

6.5.RMF Security POA&Ms are permanent records and are included in the Security Authorization Package (SAP). Weaknesses posted become part of that record and will be updated, but not removed after correction or mitigation actions are completed. RMF Security POA&Ms may be active or inactive throughout a system’s life cycle as weaknesses are newly identified or closed. If the POA&M is classified, the authorization package becomes classified unless a statement is included in the authorization package or SAP stating, “When the POA&M is separated from this assessment package or SAP, the assessment package or SAP becomes FOUO”. Another option is to provide a reference to the classified POA&M in the accreditation package or SAP, and store the POA&M in accordance with information security policies.

6.6. Table 3-3 is an example of a completed system-level RMF Security POA&M, illustrating the appropriate level of detail required. Included in the heading of the system-level RMF Security POA&M template is a field for OMB Project Identification (ID) and Security Costs which must be filled in from Exhibits 300 and 53, where applicable.

6.7. Once an initial system-level RMF Security POA&M weakness has been opened, no changes may be made to the data in columns 1 (Weakness), 6 (Scheduled Completion Data), 7 (Milestones with Completion Dates), and 9 (Identified in Chief Financial Officer (CFO) Audit or other Review).

6.8. RMF Security POA&Ms listing Very High, High, or Moderate weaknesses shall be assessed for classification. For instance, the fact that a Mission Assurance Category (MAC) I or II information system has a Very High or High weakness that has not been mitigated to a degree that will preclude immediate unauthorized access dictates a minimum classification of CONFIDENTIAL. Other factors that would influence a classification decision include the number of Moderate weaknesses identified for a single system and whether the system itself is classified.

6.9.SAF/CIO will coordinate all POA&M decisions with the AFSPC/CC.

6.10. The following instructions explain how a system-level RMF Security POA&M should be completed.

Column 1 – Type of security weakness. Describe security weaknesses identified during assessment or by the annual program review, IG independent evaluation or any other work done by or on behalf of the program office or Component. Sensitive descriptions of specific weaknesses are not necessary, but sufficient data must be provided to permit oversight and tracking. Where it is necessary to provide more sensitive data, the RMF Security POA&M should note the fact of its special sensitivity and should be classified accordingly. Where more than one weakness has been identified, number each individual security weakness as shown in the examples.

Column 2 – Severity Code. Code assigned to a system deficiency by a Security Control Assessor (SCA) as part of certification analysisto indicate (1) the risk level associated with the deficiency and (2) the urgency with which the corrective action must be completed. Severity codes are expressed as “Very High, High, Moderate, Low, Very Low.”RMF Security POA&Ms with Very High or High weaknesses will normally be classified.

Column 3 – Security Control. A security control describes an objective cybersecurity condition achieved through the application of specific safeguards or through the regulation of specific activities. The objective condition is testable, compliance is measurable, and the activities required to achieve the security control are assignable and thus accountable. Security controls are assigned according to impact values (for Integrity and Availability) and Confidentiality Level in accordance with DoDI 8500.2 and CNSSI 1253.

Column 4 – POC. Identifies of the office or organization that the Air Force will hold responsible for resolving the security weakness.

Column 5 – Resources Required. Estimated funding or manpower (i.e., full-time equivalents (FTE)) resources required to resolve the security weakness. Include the anticipated source of funding (i.e., within the system or as a part of a cross-cutting security infrastructure program). Include whether a reallocation of base resources or a request for new funding is anticipated. This column should also identify other, non-funding, obstacles and challenges to resolving the security weakness (e.g., lack of personnel or expertise, development of new system to replace insecure legacy system, etc).