Skip to content

feat: add NIST SP 800-137 Information Security Continuous Monitoring skill#40

Open
sjackson0109 wants to merge 1 commit intoSushegaad:mainfrom
sjackson0109:feature/nist-sp-800-137-skill
Open

feat: add NIST SP 800-137 Information Security Continuous Monitoring skill#40
sjackson0109 wants to merge 1 commit intoSushegaad:mainfrom
sjackson0109:feature/nist-sp-800-137-skill

Conversation

@sjackson0109
Copy link
Copy Markdown

NIST SP 800-137 — Information Security Continuous Monitoring (ISCM)

Source Publication: NIST Special Publication 800-137, September 2011
CSRC URL: https://csrc.nist.gov/publications/detail/sp/800-137/final

This pull request adds a complete Claude skill plugin for NIST SP 800-137, supporting ISSOs, ISOs, CIOs, SAISOs, and Authorizing Officials designing, implementing, and managing Information Security Continuous Monitoring programmes for federal information systems and organisations.


Files Added

plugins/nist-sp-800-137/
  .claude-plugin/plugin.json
  skills/nist-sp-800-137/
    SKILL.md
    references/
      iscm-process.md
      monitoring-strategy.md
      metrics-reporting.md

Framework Coverage

ISCM Definition: Maintaining ongoing awareness of information security, vulnerabilities, and threats to support organisational risk management decisions. Three requirements: situational awareness, visibility, and traceability.

Three-Tier Architecture: Tier 1 (Organisation — strategy, risk tolerance, CIO/SAISO), Tier 2 (Mission/Business Process — common controls, mission alignment), Tier 3 (Information System — ISO/ISSO, system-specific monitoring). Information flows upward; risk guidance flows downward.

Six-Step ISCM Process: Define ISCM strategy, Establish programme, Implement programme, Analyse and report findings, Respond to findings, Review and update strategy. Each step includes inputs, tasks, and outputs.

Monitoring Frequencies: Continuous/automated, daily, weekly, monthly, quarterly, annual. Frequency selection criteria: information volatility, adversary speed of exploitation, CIA impact, automation feasibility.

Security Metrics Catalogue: 15 defined metrics with full attribute sets covering patch compliance (critical and high), AV currency, configuration compliance, unauthorised software detection, inactive accounts, MFA coverage, audit log coverage, vulnerability scan coverage, ATO status, POA&M health. Each metric includes measurement formula, data source, threshold, and escalation rules.

Control Automation Tiers: Controls classified as Tier A (highly amenable to continuous/daily automation — SI-2, SI-3, CM-6, CM-7, etc.), Tier B (semi-automated periodic — AC-2, RA-5, SC-28, etc.), Tier C (primarily manual — AT-2, CA-2, CP-4, etc.).

SCAP Integration: CVE, CCE, CPE, CVSS, OVAL, XCCDF components explained. ARF (Asset Reporting Format) for aggregation. SCAP-validated tool requirements. Automation capability levels (fully automated, semi-automated, fully manual).

Roles and Responsibilities: CIO, SAISO, Risk Executive Function, Authorizing Official, Information System Owner, ISSO, Common Control Provider — with specific ISCM responsibilities per role.

RMF Integration: All seven RMF Step 6 Monitor tasks mapped to ISCM process steps. Ongoing authorisation model explained with AO threshold-based decision framework.

DHS CDM Programme: Four CDM capability layers mapped to ISCM tiers. Agency and Federal Dashboard feeds.

ISCM Programme Maturity: Five-level scale from Ad hoc through Optimised.


Reference Files

references/iscm-process.md — Six-step ISCM process with per-step inputs, tasks, and outputs. All 24 ISCM tasks with step-by-step detail. Tier 3/2/1 and AO reporting task breakdown. Remediation timeframe table (Critical 15 days through Low 180 days). Event-driven and periodic triggers for Step 6 review. Complete ISCM programme checklist covering all six steps.

references/monitoring-strategy.md — ISCM strategy document structure with 10 required sections. Monitoring frequency assignment table template with SP 800-53 control examples. Control automation tiers (A/B/C) with representative controls per tier. Programme establishment procedures: tool selection criteria, baseline procedures (configuration/software/patch), data repository architecture. ISCM maturity model (Levels 1-5). CDM programme layer mapping.

references/metrics-reporting.md — Metric attribute set (11-field standard format). Full 15-metric ISCM catalogue with measurements, frequencies, thresholds, and escalation rules. Complete Tier 3 system-level report template with all sections. Tier 2 mission/business process aggregated report template. Tier 1 organisation-level dashboard template. AO threshold-exceeded notification template. POA&M format with all required fields.


Integration Points

  • SP 800-37 Rev 2 RMF Step 6: ISCM implements all seven Monitor tasks (M-1 through M-7)
  • SP 800-53 Rev 5: ISCM metrics map to SP 800-53 control families (all metric IDs reference control IDs)
  • SP 800-53A Rev 5: ongoing assessments supplement ISCM automated monitoring data
  • SP 800-30 Rev 1: risk determination scales used for finding severity classification in reporting
  • SP 800-39: three-tier risk management hierarchy is the structural basis for ISCM architecture

Tests

python -m pytest tests/test_plugin_structure.py -v -k "nist-sp-800-137"

tests/test_plugin_structure.py::TestPluginDirectory::test_plugin_json_exists[nist-sp-800-137] PASSED
tests/test_plugin_structure.py::TestPluginDirectory::test_plugin_json_is_valid[nist-sp-800-137] PASSED
tests/test_plugin_structure.py::TestPluginDirectory::test_plugin_json_required_fields[nist-sp-800-137] PASSED
tests/test_plugin_structure.py::TestPluginDirectory::test_plugin_version_semver[nist-sp-800-137] PASSED
tests/test_plugin_structure.py::TestPluginDirectory::test_skills_directory_exists[nist-sp-800-137] PASSED
tests/test_plugin_structure.py::TestPluginDirectory::test_skills_directory_has_one_skill_folder[nist-sp-800-137] PASSED
tests/test_plugin_structure.py::TestPluginDirectory::test_skill_md_exists[nist-sp-800-137] PASSED
tests/test_plugin_structure.py::TestPluginDirectory::test_skill_md_not_empty[nist-sp-800-137] PASSED
tests/test_plugin_structure.py::TestPluginDirectory::test_no_files_outside_skill_folder[nist-sp-800-137] PASSED
tests/test_plugin_structure.py::TestPluginDirectory::test_references_are_markdown[nist-sp-800-137] PASSED

10 passed, 95 deselected in 0.07s

…skill

PLUGIN: nist-sp-800-137
VERSION: 1.0.0
SOURCE: NIST Special Publication 800-137, September 2011
TITLE: Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations
CSRC: https://csrc.nist.gov/publications/detail/sp/800-137/final

PLUGIN STRUCTURE:
  plugins/nist-sp-800-137/.claude-plugin/plugin.json
  plugins/nist-sp-800-137/skills/nist-sp-800-137/SKILL.md
  plugins/nist-sp-800-137/skills/nist-sp-800-137/references/iscm-process.md
  plugins/nist-sp-800-137/skills/nist-sp-800-137/references/monitoring-strategy.md
  plugins/nist-sp-800-137/skills/nist-sp-800-137/references/metrics-reporting.md

FRAMEWORK COVERAGE:
  1. ISCM definition: maintaining ongoing awareness of information security, vulnerabilities, and threats to support organisational risk management decisions
  2. Three-tier ISCM architecture: Tier 1 (Organisation), Tier 2 (Mission/Business Process), Tier 3 (Information System) with information flows between tiers
  3. Six-step ISCM process: Define strategy, Establish programme, Implement programme, Analyse and report findings, Respond to findings, Review and update strategy
  4. Monitoring frequency criteria: information volatility, adversary speed, CIA impact, automation feasibility
  5. Monitoring frequencies: continuous/automated, daily, weekly, monthly, quarterly, annual with use case guidance
  6. Security metrics: implementation status metrics, operational effectiveness metrics, risk management metrics
  7. ISCM metrics catalogue: 15 defined metrics covering SI-2/SI-3/SI-4/CM-6/CM-7/AC-2/IA-2/AT-2/AT-3/AU-2/RA-5/CA-5/CA-6 with thresholds and collection sources
  8. Automation: SCAP ecosystem mapping (CVE, CCE, CPE, CVSS, OVAL, XCCDF), ARF reporting format, SCAP-validated tool requirements
  9. Control tiering by automation amenability: Tier A (continuous/daily automation), Tier B (semi-automated periodic), Tier C (manual periodic)
  10. Roles and responsibilities: CIO, SAISO, Risk Executive Function, AO, ISO, ISSO, Common Control Provider
  11. Integration with RMF Step 6 (Monitor): mapping of all RMF Step 6 tasks to ISCM process steps
  12. Ongoing authorisation: AO threshold-based decision framework using ISCM data
  13. Significant change triggers for re-evaluation and re-authorisation
  14. DHS CDM programme integration: capability layers and feed into agency ISCM infrastructure
  15. ISCM programme maturity levels: Ad hoc through Optimised (5-level scale)
  16. FISMA compliance: ISCM as fulfilment of FISMA continuous monitoring requirement

REFERENCE FILES:
  iscm-process.md:
    - Six-step ISCM process with per-step inputs, tasks, and outputs
    - Task-level detail for all 24 ISCM tasks across six steps
    - Step 4 Analyse/Report: Tier 3, Tier 2, Tier 1, and AO reporting tasks
    - Step 5 Respond: remediation timeframe table (Critical 15 days through Low 180 days)
    - Step 6 Review: periodic and event-driven triggers for ISCM strategy updates
    - Complete ISCM programme checklist covering all six steps
  monitoring-strategy.md:
    - ISCM strategy document structure: 10 required sections
    - Monitoring frequency assignment table template with SP 800-53 control mapping
    - Control selection tiers (A/B/C) by automation amenability with example controls
    - ISCM programme establishment procedure: tool selection criteria, baseline setup, data repository architecture
    - ISCM programme maturity model (Levels 1-5: Ad hoc to Optimised)
    - CDM programme integration: four capability layers mapped to ISCM tiers
  metrics-reporting.md:
    - Metric attribute set: 11-field standard format for every ISCM metric
    - Full ISCM metrics catalogue with 15 defined metrics, measurements, frequencies, and thresholds
    - Tier 3 system-level security status report template (complete with all sections)
    - Tier 2 mission/business process aggregated report template
    - Tier 1 organisation-level dashboard summary template
    - AO threshold-exceeded notification template
    - POA&M format table with all required fields

INTEGRATION POINTS:
  - SP 800-37 Rev 2 RMF Step 6: ISCM implements all seven Step 6 monitoring tasks
  - SP 800-53 Rev 5: ISCM metrics map to SP 800-53 control families
  - SP 800-53A Rev 5: ongoing assessments supplement ISCM automated monitoring
  - SP 800-30 Rev 1: risk determination scales used for finding severity classification
  - SP 800-39: three-tier risk management hierarchy is the ISCM architecture structure
  - FISMA: ISCM is the primary mechanism for FISMA continuous monitoring compliance
  - DHS CDM: agency CDM deployments provide the tooling for Tier A ISCM controls

TESTS:
  test_plugin_json_exists[nist-sp-800-137] PASSED
  test_plugin_json_is_valid[nist-sp-800-137] PASSED
  test_plugin_json_required_fields[nist-sp-800-137] PASSED
  test_plugin_version_semver[nist-sp-800-137] PASSED
  test_skills_directory_exists[nist-sp-800-137] PASSED
  test_skills_directory_has_one_skill_folder[nist-sp-800-137] PASSED
  test_skill_md_exists[nist-sp-800-137] PASSED
  test_skill_md_not_empty[nist-sp-800-137] PASSED
  test_no_files_outside_skill_folder[nist-sp-800-137] PASSED
  test_references_are_markdown[nist-sp-800-137] PASSED
  10 passed, 95 deselected
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant