Visible to the public Criticality Analysis Process Model: Prioritizing Systems and ComponentsConflict Detection Enabled

TitleCriticality Analysis Process Model: Prioritizing Systems and Components
Publication TypeReport
Year of Publication2018
AuthorsCelia Paulsen, Jon M. Boyens, Nadya Bartol, Kris Winkler
Series TitleCriticality Analysis Process Model
Pagination1 - 94
Date PublishedApril 2018
InstitutionNational Institute for Standards and Technology
TypeReport
Report NumberNISTIR 8179
KeywordsBaseline criticality, critical components, critical programs, critical systems, criticality, criticality analysis, Information security, prioritization, prioritizing components, prioritizing programs, prioritizing systems, privacy
Abstract

NISTIR 8179 describes a Criticality Analysis Process Model – a structured method of prioritizing programs, systems, and components based on their importance to the mission and the risk that their ineffective or unsatisfactory operation or loss may present to the mission. The Criticality Analysis Process Model presented in this document adopts and adapts concepts presented in risk management, system engineering, software engineering, security engineering, privacy engineering, safety applications, business analysis, systems analysis, acquisition guidance, and cyber supply chain risk management publications. The Criticality Analysis Process Model can be used as a component of a holistic and comprehensive risk management approach that considers all risks, including information security and privacy risks. The Model can be used with a variety of risk management standards and guidelines including the International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 27000 family of standards and the suite of National Institute of Standards and Technology (NIST) Special Publications (SPs). The Model can also be used with systems and software engineering frameworks. The need for criticality analysis within information security emerged as systems have become more complex and supply chains used to create software, hardware, and services have become extended, geographically distributed, and vast

URLhttps://nvlpubs.nist.gov/nistpubs/ir/2018/NIST.IR.8179.pdf
DOIhttps://doi.org/10.6028/nist.ir.8179
Short TitlePrioritizing Systems and Components
Citation KeyPaulsen2018CriticalityAP