NIST sets FISMA standards for federal IT systems

The National Institute of Standards and Technology has released the final standard for securing agency computer systems under the Federal Information Security Management Act.

Federal Information Processing Standard 200 sets minimum security requirements for federal systems in 17 security areas. It is the third of three publications required from NIST under FISMA, which requires executive branch agencies to establish consistent, manageable IT security programs for non-national security systems. The intent of FISMA is to implement risk-based processes for selecting and implementing security controls.

FIPS 199, released two years ago, establishes standards for categorizing IT systems as low, moderate or high-impact, depending on the effect of a breach of confidentiality, integrity or availability of the system. Special Publication 800-53''Recommended Security Controls for Federal Information Systems', lays out the tools to be used under FIPS 200 to secure IT systems.

Agencies must be in compliance with FIPS 200 by March 2007.

Requirements are spelled out for:
  • Access control

  • Awareness and training

  • Audit and accountability

  • Certification, accreditation and security assessments

  • Configuration management

  • Contingency planning

  • Identification and authentication

  • Incident response

  • Maintenance

  • Media protection

  • Physical and environmental protection planning

  • Personnel security

  • Risk assessment

  • System and services acquisition

  • System and communications protection

  • System and information integrity.

Agencies must employ on each system the proper security controls in each of these areas depending on whether it is a low, moderate or high-impact system.

NIST also is updating its standards for digital signatures. A draft of FIPS 186-3, which would replace the current FIPS 186-2, has been released for comment.

The original digital signature standard was released in 1994 and has been updated twice, in 1998 and 1999. The current version authorizes the use of key sizes of 512 and 1024 bits with approved algorithms. Key sizes of 1024 now are considered the minimum acceptable level for security of digital signatures.

'With advances in technology, it is prudent to consider larger key sizes,' NIST said. 'Draft FIPS 186-3 allows the use of 1024, 2048 and 3072-bit keys.'

Comments on the proposed standard should be made by June 12 to [email protected], or mailed to the Chief, Computer Security Division, Information Technology Laboratory, Attention: Comments on Draft FIPS 186-3, 100 Bureau Drive, Stop 8930, National Institute of Standards and Technology, Gaithersburg, MD 20899-8930.

About the Author

William Jackson is a Maryland-based freelance writer.


  • Russia prying into state, local networks

    A Russian state-sponsored advanced persistent threat actor targeting state, local, territorial and tribal government networks exfiltrated data from at least two victims.

  • Marines on patrol (US Marines)

    Using AVs to tell friend from foe

    The Defense Advanced Research Projects Agency is looking for ways autonomous vehicles can make it easier for commanders to detect and track threats among civilians in complex urban environments without escalating tensions.

Stay Connected