Skip to main content

Security Impact Analysis (SIA)

A process to determine the effect(s) a change can cause to the security posture of a FISMA system

Contact: ISPG Policy Team | CISO@cms.hhs.gov
slack logoCMS Slack Channel
  • #security_community

What is a Security Impact Analysis (SIA)

A Security Impact Analysis (SIA) is an assessment that reviews how a proposed change can impact the security and privacy posture of a FISMA system. It is a mandatory process that is required for all system changes. The SIA maps directly to the CMS Acceptable Risk Safeguards (ARS) 5.0 Configuration Management (CM) Control.

Who completes the SIA

The SIA is initiated by the Information System Security Officer (ISSO) or a designated team member if an ISSO is not available. The ISSO will work with the System/Business Owner and other relevant CMS staff and contractors to complete the SIA.

What changes to a system require an SIA?

There are a number of changes that can impact a system. Below are the changes that would warrant the completion of a SIA.

  • Changes to existing architecture, system, network, application, security boundary, or environment
  • Changes made to environments below the production environment (PROD) that will eventually be implemented in PROD
  • New data types, or new connection to data source, system, service, or association
  • Software or service solutions that are new to the system; especially those that are new to CMS and have yet to be approved under any CMS ATO or FedRAMP

Note: NIST Special Publication 800-128 “Guide for Security-Focused Configuration Management of Information Systemsindicates that the change management process (and by extension, Security Impact Analysis) is not required for changes that are expressly noted as being excluded in each organization’s Configuration Management Plan (CMP). If an anticipated change has not been noted in your organization’s CMP, you will need to perform an SIA.

Events that require a SIA

NIST Special Publication 800-37 Rev 2 “Risk Management Framework for Information Systems and Organizationsdefines a significant change as a change that is likely to affect the security or privacy posture of a system substantively. Significant changes to a system that may trigger an event-driven authorization action may include, but are not limited to:

  • Installation of a new or upgraded operating system, middleware component, or application
  • Modifications to system ports, protocols, or services
  • Installation of a new or upgraded hardware platform
  • Modifications to how information, including PII, is processed
  • Modifications to cryptographic modules or services
  • Changes in information types processed, stored, or transmitted by the system
  • Modifications to security and privacy controls (e.g. identity and access management)
  • Significant changes to the environment of operation that may trigger an event-driven authorization action may include, but are not limited to:
  • Moving to a new facility
  • Adding new core missions or business functions
  • Acquiring specific and credible threat information that the organization is being targeted by a threat source
  • Establishing new/modified laws, directives, policies, or regulations

Note: The examples of changes listed above are only significant when they represent a change that is likely to affect the security and privacy posture of the system.

What documentation is required?

The depth and intensity of your SIA varies significantly depending on the scope of the proposed change. Consider your SIA as a holistic process that will benefit the security of your system over time rather than a compliance exercise you must complete to move forward.

Your SIA may require limited documentation or it may be a detailed process that results in security testing, scans, and data reviews. Sometimes, information that surfaces about a system change during the SIA process can result in other documents and tests needing to be updated. This is part of the process required to keep your system secure.

Regardless of the significance of the change to a system, the analysis and outcomes must be documented. You can choose to utilize the Security Impact Analysis (SIA) Templatefor this purpose, or you can use a custom template that has been created for your system's specific needs. If you choose to use the generic CMS SIA Template, you will find it at the end of this page and will need to complete four sections:

Change information

A brief overview of information about the proposed change. The completion of this section will make identification easier for future record keeping/compliance efforts.

Technical representative information

The contact information for the ISSO or responsible party managing the system. The ISSO is the individual responsible for the completion of all actions related to the SIA even if a designated representative completes the paperwork on their behalf.

Trigger actions and events evaluation

An extensive list of “Trigger Events”. This section is the heart of the assessment. You will be prompted to answer a number of “yes or no” questions related to the change. To complete this section, you’ll need to review:

  • The scope of the change
  • The necessary updates or mitigation efforts
  • The ARS controls impacted by the change

If the change you’re proposing is related to the installation of an application or tool that has been pre-approved by FedRAMP on cloud.cms.gov, much of this information will be provided for you there. You’ll often find much of this information on the website of the company that created the application. For further help in determining system risk for new applications, you can always reach out to your Cyber Risk Advisor (CRA) for guidance.

Recommendations for Business Owners

This final section provides a detailed list of the results of the SIA and recommendations from the ISSO to the System/Business Owner. SIA documentation may serve as a “to-do” list for ISSOs and System/Business Owners to make sure that documentation is updated appropriately, tests performed for identified controls, etc. It may also help justify further testing and potentially expensive processes to the Business Owner.

SIA outcomes

The SIA and associated documentation may highlight the need for future actions including:

SIA documentation, if properly tailored, is also particularly useful for a DevSecOps environment where multiple changes may occur within a relatively short time-frame and the ISSO can reuse existing documentation to quickly make any updates necessary.

Security Impact Analysis (SIA) Template

SIA Template Instructions

This template provides a suggested methodology to help ISSOs assess the potential security impact of a change or changes to FISMA systems.Individual ISSOs may find it necessary to alter the template to meet their organizational needs.Workflow associated with this template is also dependent on organizational requirements.

This template consists of four sections.They are:

Section 1 – An overview of the proposed change.If this document is maintained for record keeping/compliance, the completion of this section will make identification easier in the future.

Section 2 – Information on who is performing the SIA if a technical representative of the ISSO is performing the assessment on behalf of the ISSO.If a technical representative of the ISSO has performed this assessment, they will forward it to the ISSO for discussion and review.It remains the ISSO’s responsibility to complete all appropriate actions.

Section 3 – An extensive list of “Trigger Events”, most of which are a decomposition of the boxes checked in Section 2. This section is the heart of the assessment.To complete this section:

  1. The assessor examines each event under “Scope of Change” (column 2).
  2. If an event is part of the potential change, enter a “Y” under “Impact Y/N” (column 1).

At this point, an elaboration of the events noted is included in the section “Summary of Security Impact/ Technical Overview/ Risks Identified”.This includes detailing the technical overview of the item and a description of the potential impact and risk.Where other data associated with the change is available such as scan information, references should also be included in this area.

Section 4 – The ISSO recommendation to the Business Owner on the overall status of the change and what actions are necessary.This section should function as a high-level summarization of the necessary activities determined in Section 3 “Mitigation or Necessary Updates” and “Summary of Security Impact/Technical Overview/Risks Identified”.

Note that the “Mitigation or Necessary Updates” area within Section 3 provides recommended actions.Actions may individually or as a group indicate the requirement for a new ATO.At this point, the ISSO may choose to consult with their Cyber Risk Advisor or Privacy Advisor prior to providing the recommendation of activities to the Business Owner and System Maintainer.

Though every change requires a SIA, organizations may utilize their own internal methods or processes that can automate or streamline the security analysis rather than using a formal SIA form.

These types of changes may include processes for configuration control such as vendor-provided security patches, updated antivirus signatures, creation, or deletion of users, replacement of defective peripherals, motherboard or hard drives, etc.Processes associated with similar functions, may have built-in security components or controls that may not require a formal SIA form.Any of these processes -- whether automated or manual -- must capture the elements needed to properly analyze the security impacts of the particular change. The ISSO may at any time require a formal SIA for any change.

The SIA document, when completed and shared with the Business Owner, can be used as a checklist to make sure that any work such as documentation changes are performed.

To create your SIA document, start with the following for a title:

<FISMA SYSTEM NAME> < PRODUCT/FEATURE NAME> <DATE OF RELEASE TO PROD>

Section 1: Change Information

 Add information in this column
CR Number 
CR Submitter (Contact Information) 
System/Application/Tool 
Description of System Change
(Detailed description that includes the Drivers for the change)

 

 

 

Section 2: Technical Representative Information

If a technical representative of the ISSO is performing this assessment on behalf of the ISSO, please provide your contact information.

 Add information in this column
Representative performing the SIA 
Title of Representative performing the SIA 
Date 
Phone 
Email 

Section 3: Trigger Actions and Events Evaluation

Directions: Please complete the table below by indicating Y/N if a particular security event occurs and entering a description of the summary of security impacts/technical overview/risks identified. Highlight any rows where a possible significant change is detected. The ARS Controls impacted column is not all-inclusive.Note: this list is not all-inclusive.

Impact? (Y/N)CategoryScope of ChangeMitigation or Necessary UpdatesARS Controls ImpactedSummary of Security Impact/ Technical Overview/ Risks Identified
 Mission/ Business requirementsNew Users or
New User Roles Added

ISRA updates, potential PIA update, CFACTS system description updates.

 

AC-2, AC-6 
 Mission/ Business requirementsChange in data collection, storage, sharing

PIA update.

Potential SORN updates.

 

AC-21, AP-1, AR-2, AR-8, DM-2, SE-1, TR-1, UL-1 
 

Mission/

Business requirements

Cessation of mission or function.Potential update to SSP, CFACTS system description updates.Potential impact to multiple controls depending on nature of mission/function. 
 

Policy/

Standards

New revisions of ARS and CMS policy; or Issue or Update of NIST documents

 

Updates to FISMA artifacts including SSP.

Potential impact to multiple controls depending on nature of the policy/

standards.

 
 Laws, Regulations, DirectivesNew or ChangedUpdates to FISMA artifacts including SSP.Potential impact to multiple controls depending on nature of laws, regulations, directives. 
 System boundaryInterconnections and New connection to FISMA system or Service

Updates to ISA and MOU must occur. If not standard connection service/inheritance from another accredited FISMA system, SCA will be required.

 

Updates to FISMA artifacts must be made, including SSP, XLC/TLC System Slides, CFACTS Boundary information, etc

AC-4, CA-3, CA-9, PL-2, AC-3, AC-20, AU-2, AU-12, AU-16, CA-7, IA-3, SA-9, SC-7, SI-4 
 System boundaryArchitecture, Topology, Port/Protocol/Service change

Zone changes

Implementation or inheritance of new services

Updates to FISMA artifacts must be made, including SSP, XLC System Slides, CFACTS Boundary information, etc

CM-2, PL-2, PL-8, SA-3, CM-6, CM-8, CM-9, SA-10, PM-5, PM-7 
 Security components

Identification, Authentication, Authorization

 

New methods for authentication and/or identifiers added

 

Migrations between Single Factor and MFA

New and modified control implementations must be tested. SCA required unless inheriting from existing FISMA system.

 

Updates to all FISMA artifacts must be made, including SSP, XLC/TLC System Slides, CFACTS Boundary information, etc

IA (all) 
 Security ComponentsSecurity Controls – Change in implementation standard or statusNew and modified control implementations must be tested via existing security processes. All changes must be documented within the SSP and the Controls tab within CFACTS. Changes in controls that cause controls to no longer be “Satisfied” must be submitted as a POA&M and documented within the ISRA.

List specific controls changed

 

PL-2 (SSP)

 
 User InterfaceUpdates to GUI including addition of new pages, new inputsNew pages must go through 508 testing, Static and Dynamic code analysis to determine no additional threats from XSS or other new vulnerabilities.

CM-2, CM-3, CM-4

 

SI-10

 
 New or Updated HardwareServers, Communication DevicesIf the equipment is updated with similar vendor and models, then minimal testing may be needed. However, if they are new models or vendors, with different configurations and settings, then it is considered a significant change. Equipment will need to be hardened, and at minimum, have vulnerability and configuration scans performed on them.

CM-2, CM-3, CM-4, CM-6, CM-7

 

PL-2 (SSP)

 

HW/SW List

 

AC-19, SI-4

 

CP-2

 
 New or Updated Operating SystemChange in Operating SystemIf the software is updated with similar vendor and versions, then minimal testing may be needed. However, if they are significantly different versions (i.e.., not an “incremental version update”) or different vendors, with different configurations and settings, then it is considered a significant change. Affected systems will need to be hardened and, at minimum, have vulnerability and configuration scans performed on them.

CM-2, CM-3, CM-4, CM-6, CM-7

 

RA-5 Vulnerability Scanning

 

CA-9(1) Compliance Checks

 

PL-2 (SSP)

 

HW/SW List

 

CP-2

 
 New or Updated Security SoftwareNew Security Software or Perimeter Security ChangeIf the software is updated with similar vendor and versions, then minimal testing may be needed. However, if they are significantly different versions (i.e.., not an “incremental version update”) or different vendors, with different configurations and settings, then it is considered a significant change. Affected systems will need to be hardened and, at minimum, have vulnerability and configuration scans performed on them.

CM-2, CM-3, CM-4, CM-6, CM-7

 

RA-5 Vulnerability Scanning

 

CA-9(1) Compliance Checks

 

PL-2 (SSP)

 

HW/SW List

 

 

Potential impact to multiple controls depending on nature of software

 
 Support Software

New Support Software

 

If the software is updated with similar vendor and versions, then minimal testing may be needed. However, if they are significantly different versions (i.e.., not an “incremental version update”) or different vendors, with different configurations and settings, then it is considered a significant change. Affected systems will need to be hardened and, at minimum, have vulnerability and configuration scans performed on them.

CM-2, CM-3, CM-4, CM-6, CM-7

RA-5

 

PL-2 (SSP)

 

HW/SW List

 

Potential TRB review/approval

 
 Vendor PatchesSoftware, ServersSoftware patch updates that cause the baseline configuration, or security controls implementations, to change will need a re-authorization. All Software upgrades need to be tested pre-launch to prevent any issues. Affected systems will need to be hardened and, at minimum, have vulnerability and configuration scans performed on them.

CM-2, CM-3, CM-4

 

PL-2 (SSP)

 

HW/SW List

 

 

 

 System BoundaryChange to Logical Access PointsVulnerability Scan is required

AC-17, AC-2, AC-3, AC-18, AC-19, AC-20,

 

CA-3, CA-7,

 

CM-8, IA-2, IA-3, IA-8, MA-4, PE-17, PL-4, SC-10, SI-4

 
 Vulnerability (New or Existing)Attacks DevelopedRisk Assessment update, additional work as required. New and modified control implementations must be tested as part of the Configuration (Change) Management processes.RA-2, RA-3, CM-8, MP-4, SC-7, SI-2, CA-2, CA-7, CM-3, CM-5, CM-8, MA-2, IR-4, RA-5, SA-10, SA-11, SI-11 
 Vulnerability (New or Existing)Attacks Succeed ElsewhereRisk Assessment update, additional work as required. New and modified control implementations must be tested as part of the Configuration (Change) Management processes.RA-2, RA-3, CM-8, MP-4, SC-7, SI-2, CA-2, CA-7, CM-3, CM-5, CM-8, MA-2, IR-4, RA-5, SA-10, SA-11, SI-11 
 Vulnerability (New or Existing)Found (No Attacks Known)Add to Risk Assessment. New and modified control implementations must be tested as part of the Configuration (Change) Management processes.RA-2, RA-3, CM-8, MP-4, SC-7, SI-2, CA-2, CA-7, CM-3, CM-5, CM-8, MA-2, IR-4, RA-5, SA-10, SA-11, SI-11 
 System boundaryNew processing location(s)A new processing location will need to go thru an re-authorization to ensure the system is secure from any issues or attacks

PE(family)

 

CM-2, CM-3, CM-4, CM-6, CM-7

 
 System boundary (environment)Change or Addition of Hosting Infrastructure or SiteFull authorization of the GSS is required. New and modified control implementations (for applicable applications) must be tested as part of the Configuration (Change) Management processes. Application obtains a new/updated ATO.

PE(family)

 

CM-2, CM-3, CM-4, CM-6, CM-7

 

Section 3: Validation/Security Testing

Please provide validation/security testing process as they relate to the change or any additional testing being done pertaining to this specific change.

Tool/Scan Type(Y/N)Testing Performed byTesting /MethodTesting FrequencyTest Result LocationNotes
Compliance Scans      
Vulnerability Scans      
Dynamic WAPT Testing      
Static WPT Testing      
Optional      
Optional      

Section 4: Overall Recommendation for Business Owners

Using the information collected in Section 3: “Mitigation or Necessary Updates” and “Summary of Security Impact/Technical Overview/Risks Identified”, please provide a recommendation to the Business Owner on the status of the change.

ISSO recommendation(s):

ISSO should indicate which of the following are recommended, and provide details using additional pages.

  • Deploy to Production Environment without additional testing
  • Undergo Targeted Third Party Security Testing
  • Undergo SCA/CSRAP
  • Require Business Owner Risk Acceptance to field to Production
  • Apply for a new ATO
  • Other (e.g. update documentation. Specify on following page)

 

Signed by:

 

_____________________________________________

System ISSO

 

_____________________________________________

Business Owner