GRC and Risk Management Projects

Exploring governance, regulations, and compliance in the evolving field of cyber security and risk management.

CISA and NIST Compliance for Colleges

a large building with columns and a flag on the corner
a large building with columns and a flag on the corner

Necessary Steps for NIST and CISA Compliance for the College Campus Security Manager and IT Manager

For colleges handling sensitive data, such as student health records, research data, and personal information, compliance with NIST (National Institute of Standards and Technology) and CISA (Cybersecurity and Infrastructure Security Agency) guidelines is essential. Both physical and cybersecurity need to be managed effectively, with the cooperation of the College Campus Security Manager and the IT Manager. Below are the necessary steps for achieving NIST and CISA compliance.

1. NIST Compliance Steps

NIST provides guidelines and frameworks for improving cybersecurity and data protection. Compliance with NIST standards ensures colleges protect sensitive data, including student health information and research data.

A. For the College Campus Security Manager:

1. Conduct Risk Assessments
The security manager should regularly assess both physical and cybersecurity risks. Identify threats to infrastructure such as unauthorized access, theft, or environmental damage to IT facilities. These assessments should inform security measures and align with NIST’s Risk Management Framework (RMF).

2. Physical Access Control
To prevent unauthorized access to critical areas like data centers and server rooms, implement strict access controls, including keycard access, biometric authentication, and security personnel. Regular audits should ensure only authorized individuals can access sensitive locations.

3. Staff Awareness and Training
The security manager must work with the IT team to ensure staff are trained on NIST’s security protocols, including recognizing and responding to cybersecurity threats. This training should cover everything from physical security procedures to the basics of identifying phishing and social engineering attempts.

B. For the IT Manager:

1. Implement the NIST Risk Management Framework (RMF)
The IT manager should adopt NIST’s RMF to evaluate risks to information systems, ensuring that appropriate security controls are implemented and evaluated regularly. This process involves categorizing the data, applying the necessary controls, and assessing the effectiveness of those controls.

2. Ensure Data Protection and Encryption
To protect sensitive data, the IT manager must implement robust encryption methods both for data at rest and in transit. NIST guidelines recommend using strong cryptographic protocols to ensure data security and prevent unauthorized access.

3. Continuous Monitoring and Incident Response
Implement NIST’s monitoring and logging requirements, such as using intrusion detection systems (IDS) and maintaining detailed logs of user activities. The IT manager should also have a well-defined incident response plan (IRP) for addressing security breaches, ensuring that the response follows NIST protocols.

2. CISA Compliance Steps

CISA provides guidelines focused on protecting critical infrastructure and ensuring the resilience of cybersecurity systems. For colleges, CISA compliance is important to safeguard both physical and digital resources from cyber threats.

A. For the College Campus Security Manager:

1. Secure Critical Infrastructure
CISA emphasizes protecting physical infrastructure that supports IT systems. The security manager should work with IT to protect server rooms, data centers, and network hubs. This includes physical barriers like fences, secure locks, and 24/7 surveillance.

2. Emergency Response and Recovery
Develop and test disaster recovery and business continuity plans in collaboration with the IT manager. This ensures the college is prepared for incidents, such as ransomware attacks, that could impact digital services or physical infrastructure.

B. For the IT Manager:

1. Vulnerability Management and Threat Intelligence
The IT manager must regularly assess vulnerabilities in the network and apply patches or updates to mitigate risks. Additionally, they should implement CISA’s guidance on using threat intelligence feeds to monitor emerging risks and update security systems accordingly.

2. Zero Trust Architecture
Adopt CISA’s Zero Trust framework, where access to resources is continuously verified, regardless of the user's location. The IT manager should enforce strict identity and access management policies, ensuring that only authorized users can access sensitive data.

3. Continuous Monitoring and Incident Reporting
CISA stresses the importance of continuous monitoring and real-time detection of cyber threats. The IT manager should use security tools to monitor for anomalies and work with CISA's cybersecurity resources to report and mitigate emerging threats.

By Jimmy Rodriguez 02/16/2024. All information was obtained within CISA and NIST SP 800-53, 800-171, Profiles, and framework.

GRC Compliance and Policies Projects

Governance, risk and compliance (GRC) is an organizational strategy to manage governance and risks while maintaining compliance with industry and government regulations.

CIS and NIST SP 800-53 tailored Acceptable Use Policy and Information Security Policy for small business of about 20 to 50 employees.

GRC Related Projects

Governance, Risk, and Compliance (GRC) is a structured way to align IT with business goals while managing risks and meeting all industry and government regulations. It includes tools and processes to unify an organization's governance and risk management with its technological innovation and adoption. Companies use GRC to achieve organizational goals reliably, remove uncertainty, and meet compliance requirements.

a man riding a skateboard down the side of a ramp
a man riding a skateboard down the side of a ramp
Project title

This project aims to develop a user-friendly mobile application.

a man riding a skateboard down a street next to tall buildings
a man riding a skateboard down a street next to tall buildings
black blue and yellow textile
black blue and yellow textile
photo of white staircase
photo of white staircase
Project title

This project aims to develop a user-friendly mobile application.