Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ronald S. Ross is active.

Publication


Featured researches published by Ronald S. Ross.


Special Publication (NIST SP) - 800-128 | 2011

Guide for Security-Focused Configuration Management of Information Systems

L A. Johnson; Kelley L. Dempsey; Ronald S. Ross; Sarbari Gupta; Dennis Bailey

The purpose of the National Institute of Standards and Technology Special Publication 800-128, Guide for Security-Focused Configuration Management of Information Systems, is to provide guidelines for organizations responsible for managing and administering the security of federal information systems and associated environments of operation. Configuration management concepts and principles described in NIST SP 800-128, provide supporting information for NIST SP 800-53, Recommended Security Controls for Federal Information Systems and Organizations. NIST SP 800-128 assumes that information security is an integral part of an organizations overall configuration management. The focus of this document is on implementation of the information system security aspects of configuration management, and as such the term security-focused configuration management (SecCM) is used to emphasize the concentration on information security. In addition to the fundamental concepts associated with SecCM, the process of applying SecCM practices to information systems is described. The goal of SecCM activities is to manage and monitor the configurations of information systems to achieve adequate security and minimize organizational risk while supporting the desired business functionality and services.~


Special Publication (NIST SP) - 800-171 Rev. 1 | 2018

Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations [including updates as of 06-07-2018] | NIST

Ronald S. Ross; Kelley L. Dempsey; Mark Riddle; Gary Guissanie

The protection of Controlled Unclassified Information (CUI) resident in nonfederal systems and organizations is of paramount importance to federal agencies and can directly impact the ability of the federal government to successfully conduct its essential missions and functions. This publication provides agencies with recommended security requirements for protecting the confidentiality of CUI when the information is resident in nonfederal systems and organizations; when the nonfederal organization is not collecting or maintaining information on behalf of a federal agency or using or operating a system on behalf of an agency; and where there are no specific safeguarding requirements for protecting the confidentiality of CUI prescribed by the authorizing law, regulation, or governmentwide policy for the CUI category listed in the CUI Registry. The requirements apply to all components of nonfederal systems and organizations that process, store, or transmit CUI, or that provide security protection for such components. The requirements are intended for use by federal agencies in contractual vehicles or other agreements established between those agencies and nonfederal organizations.


National Institute of Standards and Technology (U.S.) | 2018

Assessing Security Requirements for Controlled Unclassified Information

Ronald S. Ross; Kelley L. Dempsey; Victoria Yan Pillitteri

The protection of Controlled Unclassified Information (CUI) resident in nonfederal systems and organizations is of paramount importance to federal agencies and can directly impact the ability of the federal government to successfully conduct its assigned missions and business operations. This publication provides federal and nonfederal organizations with assessment procedures and a methodology that can be employed to conduct assessments of the CUI security requirements in NIST Special Publication 800-171, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. The assessment procedures are flexible and can be customized to the needs of the organizations and the assessors conducting the assessments. Security assessments can be conducted as self-assessments; independent, third-party assessments; or governmentsponsored assessments and can be applied with various degrees of rigor, based on customerdefined depth and coverage attributes. The findings and evidence produced during the security assessments can facilitate risk-based decisions by organizations related to the CUI requirements.


Special Publication (NIST SP) - 800-171 | 2015

Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations

Ronald S. Ross; Kelley L. Dempsey; Mark Riddle; Gary Guissanie


Special Publication (NIST SP) - 800-171 | 2018

Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations [including updates as of 02-20-2018]

Ronald S. Ross; Gary Guissanie; Kelley L. Dempsey; Mark Riddle


Special Publication (NIST SP) - 800-171 Rev 1 | 2016

Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations

Ronald S. Ross; Gary Guissanie; Kelley L. Dempsey; Mark Riddle


Special Publication (NIST SP) - 800-171 | 2016

Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations [including updates as of 01-14-2016] | NIST

Ronald S. Ross; Kelley L. Dempsey; Mark Riddle; Gary Guissanie


ITL Bulletin - December 2016 | 2016

Rethinking Security through Systems Security Engineering

Ronald S. Ross; Larry Feldman; Gregory A. Witte


ITL Bulletin - | 2015

Protection of Controlled Unclassified Information

Ronald S. Ross; Kelley L. Dempsey; Larry Feldman; Gregory A. Witte


OTHER - | 2014

Supplemental Guidance on Ongoing Authorization: Transitioning to Near Real-Time Risk Management

Kelley L. Dempsey; Ronald S. Ross; Kevin M. Stine

Collaboration


Dive into the Ronald S. Ross's collaboration.

Top Co-Authors

Avatar

Kelley L. Dempsey

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Kevin M. Stine

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

L. Arnold Johnson

National Institute of Standards and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge