Criticality Analysis Process Model
Criticality Analysis Process Model
Criticality Analysis Process Model
Celia Paulsen
Jon Boyens
Nadya Bartol
Kris Winkler
Celia Paulsen
John Boyens
Computer Security Division
Information Technology Laboratory
Nadya Bartol
Boston Consulting Group
Bethesda, MD
Kris Winkler
Boston Consulting Group
Denver, CO
April 2018
Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental
procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by NIST,
nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose.
There may be references in this publication to other publications currently under development by NIST in accordance with
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, may be
used by federal agencies even before the completion of such companion publications. Thus, until each publication is
completed, current requirements, guidelines, and procedures, where they exist, remain operative. For planning and transition
purposes, federal agencies may wish to closely follow the development of these new publications by NIST.
Organizations are encouraged to review all draft publications during public comment periods and provide feedback to NIST.
Many NIST cybersecurity publications, other than the ones noted above, are available at https://csrc.nist.gov/publications.
All comments are subject to release under the Freedom of Information Act (FOIA).
i
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology
(NIST) promotes the U.S. economy and public welfare by providing technical leadership for the
Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data,
proof of concept implementations, and technical analyses to advance the development and productive
use of information technology. ITL’s responsibilities include the development of management,
administrative, technical, and physical standards and guidelines for the cost-effective security and
privacy of other than national security-related information in federal information systems.
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
Abstract
In the modern world, where complex systems and systems-of-systems are integral to the functioning
of society and businesses, it is increasingly important to be able to understand and manage risks that
these systems and components may present to the missions that they support. However, in the world
of finite resources, it is not possible to apply equal protection to all assets. This publication describes
a comprehensive Criticality Analysis Process Model – a structured method of prioritizing programs,
systems, and components based on their importance to the goals of an organization and the impact
that their inadequate operation or loss may present to those goals. A criticality analysis can help
organizations identify and better understand the systems, subsystems, components, and
subcomponents that are most essential to their operations and the environment in which they operate.
That understanding facilitates better decision making related to the management of an organization’s
information assets, including information security and privacy risk management, project
management, acquisition, maintenance, and upgrade decisions. The Model is structured to logically
follow how organizations design and implement projects and systems, can be used as a component of
a holistic and comprehensive risk management approach that considers all risks, and can be used with
a variety of risk management standards and guidelines.
Keywords
Baseline criticality; criticality; criticality analysis; critical components; critical programs; critical
systems; information security; prioritizing components; prioritizing programs; prioritizing systems;
prioritization; privacy.
Supplemental Content
ii
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Acknowledgments
The authors, Jon Boyens, National Institute of Standards and Technology (NIST), Celia Paulsen
(NIST), Nadya Bartol (Boston Consulting Group), and Kristina Winkler (Boston Consulting Group)
would like to acknowledge and thank a number of individuals who provided valuable insights and
helped to improve this publication. We would especially like to thank Kelley Dempsey (NIST),
Victoria Pillitteri (NIST), Dr. Ron Ross (NIST), Maureen Moore (NIST), Paul Black (NIST),
Elizabeth Lennon (NIST), Dr. Carol Woody (SEI CERT), and John Peterson (Redhorse Corporation)
for their contribution to the content during the document development and review.
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
Note to Readers
This document is meant to help its users prioritize critical programs, systems, and components. It is
not meant as a stand-alone process, rather it is meant to integrate into already existing processes, such
as risk management, information security, security engineering, system and software engineering,
privacy engineering, safety, quality, and other related disciplines. The model as described represents
an idealized process and may not match every organization’s existing processes; readers are
encouraged to adapt and integrate the process model described in this publication in a way that best
fits the needs and current operations of their organization(s).
iii
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Executive Summary
NISTIR 8179 describes a Criticality Analysis Process Model – a structured method of prioritizing
programs, systems, and components based on their importance to the mission and the risk that their
ineffective or unsatisfactory operation or loss may present to the mission. The Criticality Analysis
Process Model presented in this document adopts and adapts concepts presented in risk management,
system engineering, software engineering, security engineering, privacy engineering, safety
applications, business analysis, systems analysis, acquisition guidance, and cyber supply chain risk
management publications.
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
The Criticality Analysis Process Model can be used as a component of a holistic and comprehensive
risk management approach that considers all risks, including information security and privacy risks.
The Model can be used with a variety of risk management standards and guidelines including the
International Organization for Standardization/International Electrotechnical Commission (ISO/IEC)
27000 family of standards and the suite of National Institute of Standards and Technology (NIST)
Special Publications (SPs). The Model can also be used with systems and software engineering
frameworks.
The need for criticality analysis within information security emerged as systems have become more
complex and supply chains used to create software, hardware, and services have become extended,
geographically distributed, and vast. The first mention of criticality analysis in NIST publications is in
NIST SP 800-53 Revision 4 (Rev 4), Security and Privacy Controls for Federal Information Systems
and Organizations. Today, criticality analysis is referenced in several NIST special publications
including those addressing risk management, system security engineering, and supply chain risk
management.
The Model references and uses the outputs and artifacts of risk management, information security,
project management, system design, safety, privacy, and other activities that an organization may
already be performing. To reduce potential redundancy and duplication, the Model identifies
integration points with these existing processes.
The Criticality Analysis Process Model is structured to logically follow how organizations design and
implement projects and systems and can be adapted to fit organizations’ unique practices.
A. Define Criticality Analysis Procedure(s) where the organization develops or adopts a set of
procedures for performing a criticality analysis.
B. Conduct Program-Level Criticality Analysis where the program manager defines, reviews,
and analyzes the program to identify key activities that are vital to reaching the objectives of
the program and for reaching the overall goals of the organization.
C. Conduct System/Subsystem-Level Criticality Analysis where the system designer reviews and
analyzes the system or subsystem from the point of view of its criticality to the overall
organizational goals.
D. Conduct Component/Subcomponent-Level Criticality Analysis where the system or
component engineer reviews and analyzes component or subcomponent from the point of
iv
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
view of its criticality to a specific system or subsystem of which these components and
subcomponents are a part.
E. Conduct Detailed Review of Criticality for Processes B, C, and D where the program manager
or a collaborative group analyzes baseline criticality analysis results to create final criticality
levels for Systems/Subsystems and Components/Subcomponents.
Using this Criticality Analysis Process Model can help organizations to better understand the
systems, subsystems, components, and subcomponents that are most essential to their operations.
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
Having this information will facilitate holistic information security and privacy risk management and
integration of security and privacy considerations into project management and acquisition. The
Model can help increase robustness and granularity of the decisions made about levels of protection
afforded to systems and components during system development and acquisition life cycles. It also
provides a means for communicating and coordinating priorities with product and service providers.
v
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Table of Contents
Executive Summary ..........................................................................................................................iv
1 Introduction ............................................................................................................................... 1
1.1 Purpose and Scope 1
1.2 Background 2
1.3 Audience 3
1.4 Relationship to other standards and NIST publications 3
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
vi
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
List of Appendices
Appendix A— Acronyms ................................................................................................................ 54
Appendix B— References................................................................................................................ 56
B.1 Sources for the Model ........................................................................................................ 56
B.2 Related Standards & NIST Publications.......................................................................... 59
Appendix C— Methods ................................................................................................................... 62
Appendix D— Illustrative Examples of Using Criticality Analysis Process Model................... 66
D.1 Example A – Enterprise Resource Planning (ERP) System Design .............................. 66
D.2 Example B – SmartCity Concept Development............................................................... 76
Appendix E— Criticality Analysis Process Model ....................................................................... 83
List of Figures
vii
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
viii
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
1 Introduction
In the modern world, where complex systems and systems-of-systems are integral to the functioning
of society and businesses, it is increasingly important to be able to understand and manage risks that
these systems and components may present to the missions that they support. And in the world of
finite resources, it is not possible to apply equal protection to all assets. Managing risk can be
improved with processes, methods, and techniques to prioritize assets for a detailed risk analysis and
for applying information security and privacy controls. However, existing standards and guidelines
provide only high-level and fragmented guidance for how to prioritize systems and components in
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
relation to the goals of the organization, the mission, and the environment. Additionally, these
existing standards and guidelines are most often focused on prioritizing projects according to
organizational goals, or prioritizing components according to system functionality, which can result
in an incomplete understanding of the potentially critical nature of a component to organizational
goals.
This publication describes a comprehensive Criticality Analysis Process Model (hereafter referred to
as “the Model”) – a structured method of prioritizing programs, systems, and components based on
their importance to the goals of an organization and the impact that their inadequate operation or loss
may present to those goals. The Model adopts and adapts concepts presented in risk management,
system engineering, software engineering, security engineering, privacy engineering, safety
applications, business analysis, systems analysis, acquisition guidance, and cyber supply chain risk
management publications. It helps organizations to identify and prioritize information systems and
components that are vital to the success of organizational goals.
The Criticality Analysis Process Model is intended to be used as a component of a holistic and
comprehensive risk management approach that considers all risks, including information security and
privacy risks, to prioritize and tailor controls to those risks. The Model can be used with a variety of
risk management standards and guidelines including the International Organization for
Standardization/International Electrotechnical Commission (ISO/IEC) 27000 family of standards and
1 Operational technology: programmable systems or devices that interact with the physical environment (or manage devices that
interact with the physical environment). These systems/devices detect or cause a direct change through the monitoring and/or control
of devices, processes, and events. Examples include industrial control systems, building management systems, fire control systems,
and physical access control mechanisms.
1
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
the suite of National Institute of Standards and Technology (NIST) Special Publications (SPs). It can
also be used in conjunction with systems and software engineering, project management, and
auditing/attestation frameworks.
The Model can help increase robustness and granularity of the decisions made about levels of
protection afforded to systems and components during system development and acquisition life
cycles. It also provides a means for communicating and coordinating priorities with product and
service providers.
The Model uses existing artifacts, processes, and methods to a maximum extent. It references and
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
uses the outputs of risk management, information security, privacy, project management, system
design, safety, and other processes that an organization is already performing. The Model is not
intended to replace any of these processes. Rather, to reduce potential redundancy and leverage
existing efforts, the Model identifies integration points with these existing processes. An organization
may have additional processes not listed in this publication, which may also be performed alongside
and integrated with the Model.
1.2 Background
The notion of a formal criticality analysis originated from Failure Mode Effects and Criticality
Analysis (FMECA), used in safety applications. The need for a criticality analysis within information
security emerged as technology became more complex and supply chains used to create software,
hardware, and services became extended, geographically distributed, and vast. The first mention of
criticality analysis in NIST publications was in NIST SP 800-53 Revision 4 (Rev. 4), Security and
Privacy Controls for Federal Information Systems and Organizations. Today, it is mentioned in
several NIST special publications including those addressing risk management, system security
engineering, and supply chain risk management.
These documents provide high-level guidance on criticality analysis, including how to integrate it
into broader risk management, system engineering, or security or privacy engineering activities.
However, these publications do not provide detailed guidance for how to perform the criticality
analysis itself. A number of U.S. government agencies have implemented criticality analysis
processes, but these processes are nonstandard and are often not formally defined. Meanwhile, the
need for detailed information for how to identify what is critical and how to prioritize its protection
within a system has become more acute due to how modern systems and components are designed,
developed, manufactured, acquired, and deployed.
Identifying the asset of greatest importance is not a new concept. A number of disciplines have well-
established methods for doing so, including business risk management, project management, safety,
supply chain management, supply chain risk management, critical infrastructure protection, and
others. These concepts are used in a variety of industries including banking and electric utilities. The
authors researched and compared these existing methods and approaches to develop the Model
described in this publication; it is anchored in these existing methods and approaches and is tailored
specifically to the needs of information security and privacy risk management.
2
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
1.3 Audience
The audience for this publication is a broad set of leaders and practitioners including those engaged
in cybersecurity/information security; privacy; information technology; contracting;
procurement/acquisitions; system and software development/engineering; security engineering;
auditors; program management; and system owners. Other personnel or entities are free to use the
guidance as appropriate to their situation.
The Model can be integrated into a variety of processes including information security, risk and
privacy management, system and software engineering, acquisition, auditing/attestation, and project
management. It can also be used in conjunction with safety, privacy, and business analysis processes.
This publication builds on a set of multidisciplinary publications, standards, and guidelines,
developed by NIST, the International Organization for Standardization (ISO), and other bodies.
“Criticality Analysis” is mentioned in and can be used with the following NIST SPs: 2
• NIST SP 800-53 Rev. 4, Security and Privacy Controls for Federal Information Systems and
Organizations, which describes security control SA-14: Criticality Analysis.
• NIST SP 800-160 Volume 1, Systems Security Engineering: Considerations for a
Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems, mentions
criticality analysis a part of performing control SA-2: Perform the security aspects of systems
analyses, as well as in Appendix G: Engineering and Security Fundamentals.
• NIST SP 800-161, Supply Chain Risk Management Practices for Federal Information
Systems and Organizations, mentions the concept of criticality several times:
o “Baseline Criticality” is mentioned in Task 1-1 to be determined as a part of the Frame
step of the Risk Management Process;
o In Task 2-0, Criticality Analysis, a task is to be performed at the beginning of the
Assess step in the Risk Management Process, and
o In the supplemental guidance for control SA-14: Criticality Analysis.
Through the above publications, criticality analysis is associated with, and integrated into, the
broader set of related NIST publications, including:
• Federal Information Processing Standard Publication (FIPS) 199, Standards for Security
Categorization of Federal Information and Information Systems;
• NIST SP 800-39, Managing Information Security Risk: Organization, Mission, and Information
System View, and
• NIST SP 800-30 Rev. 1, Guide for Conducting Risk Assessments.
2 Criticality analysis is a fundamental aspect or risk management and is expected to be included in all future versions of the listed
publications.
3
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
The Criticality Analysis Process Model presented in this document can be used in conjunction with
ISO standards focused on risk management or information security in supplier relationships:
ISO/IEC 20243 - Information technology – Open Trusted Technology Provider Standard (O-
TTPS) -- Mitigating maliciously tainted and counterfeit products.
The Criticality Analysis Process Model can also be used in conjunction with additional standards and
publications focused on system and software engineering:
4
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
This chapter provides an overview of the Criticality Analysis Process Model including:
2.1 Methodology
• Environmental scan that included identification and detailed review of publications (listed in
Appendix B) from different subject areas that describe methods for identifying critical assets.
• Comparative analysis and synthesis of the reviewed methodologies to derive a common set of
steps for a criticality analysis.
• Identification of steps relevant to information security and privacy and potential steps not
described in existing literature.
• Translation and transformation of the steps into the information security and privacy
practitioner language.
First, the authors identified and collected a number of methodologies that described a process for
identifying or prioritizing critical assets. A subset of methodologies was then selected for further
research, based on an initial assessment of their potential applicability to an information security and
privacy criticality analysis, their comprehensiveness, uniqueness, and usability by the intended
audience. The authors also contacted a small number of subject matter experts to provide insights into
the various methodologies and those methodologies’ usefulness to an information security and
privacy criticality analysis.
The authors then summarized and conducted a detailed review of each methodology using a
structured matrix format. The summaries included but were not limited to the following information:
• Applicability to an information security and privacy criticality analysis for projects, systems,
and components;
• Scalability to large and small projects/organizations;
• Investment/cost considerations;
• Applicability to an existing or new system;
• Inputs and outputs;
• Complexity and difficulty of use; and
• Demonstrated effectiveness in their respective domains.
Next, the authors conducted a comparative analysis and synthesis of the methodologies using another
matrix to derive a common set of steps. In addition, additional steps were described that filled gaps
related to the application of existing literature to an information security and privacy domain. Once
5
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
the authors were satisfied with the accuracy and completeness of the comparative analysis, they
validated the Model against relevant information security and privacy sources to ensure that the
terminology in and the general flow of the Model was consistent with information security and
privacy concepts and guidance. Next, the Model itself was constructed using commonly accepted
process modeling techniques. The finalized set of steps were translated and transformed into
information security and privacy practitioner language and aligned with existing NIST publications.
The Model was then edited and simplified for ease of use.
The Criticality Analysis Process Model is structured to logically follow how organizations design,
acquire, and implement projects and systems. Traditionally, organizations establish projects and
programs to accomplish mission and business objectives and to guide the performance of
corresponding activities. They design and/or deploy information systems to support those activities.
These systems are often a loosely defined, complex mixture of hardware, software, network
infrastructure, data, humans, and other elements, and may be composed of numerous subsystems (this
architecture is often called “systems of systems”). The IT/OT components and subcomponents used
to construct these systems and subsystems typically come from a variety of sources and are often
Commercial-off-the-Shelf (COTS) products. Different organizational units – including third parties –
naturally have different roles and responsibilities with respect to these projects, systems, and
components.
The structure of the Model defined in this document accommodates these dynamics and at the same
time, helps to facilitate a holistic view of criticality for a collection of programs, systems/subsystems,
and components/subcomponents. 3 The Model combines top-down and bottom-up analysis
approaches. The top-down approach in this model enables the organization to identify critical
processes and then to progressively narrow the analysis to critical systems that support those
processes, and then to critical components which ensure the critical functions of those systems. It
follows an ideal system development process while allowing the flexibility for analyzing systems and
components in a less ideal situation. The bottom-up approach progressively traces the impact of a
malfunctioning or compromised critical component would have on the system, and then on the
program. It allows for the identification of interactions, intersections, connections, and dependencies
between components, systems, and programs that are not easily identified in a top-down approach.
The combination of using top-down and bottom-up approaches ensures that the Model is thorough
and complete.
3 The model does not require organizations to use standard or identical definitions of program, system, subsystem, component, or
subcomponent to allow organizations the flexibility of using their existing definitions; however, the model was developed with the
assumption that the systems and components evaluated would be technological in nature (IT/OT). This is explained further in the
Model itself.
6
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Start Criticality
Analysis
A. Define Criticality
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
Analysis Procedure
D. Conduct
B. Conduct Program- C. Conduct System/
Component/
Level Criticality Subsystem-Level
Subcomponent-Level
Analysis Criticality Analysis
Criticality Analysis
E. Conduct Detailed
Review of Criticality
for Processes B, C,
and D
End
Process A is expected to be completed before other processes. Processes B, C, and D ideally will be
performed in sequence to provide a comprehensive top-down analysis, but may be performed at the
same time or out of sequence (this is shown in the model with dotted lines). Different individuals
typically perform these processes; process D in particular is likely to be done partially by a third party
in the case of, for example, COTS products. These three processes have iterative sub-processes and
can be conducted at increasing levels of detail to refine the results and accept additional inputs.
Process E is a bottom-up analysis using inputs from, and cutting across, processes B, C, and D. It is
performed at the very end to finalize criticality levels for programs, systems/subsystems, and
components/subcomponents.
Section 3, Model Process and Sub-Process Descriptions, describes each process and sub-process in
detail.
7
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
The Criticality Analysis Process Model was developed using formal process modeling techniques and
flowchart methods. This ensures maximum flexibility for organizations integrating the model and
facilitates the integration of the model into existing software-based tools. Users do not need a
thorough understanding of the techniques or methods to use the Model.
Output of a sub-process
Start/end of process
Decision point
Sub-process
Previous process/sub-process
The Model is intended to be read top-down and left-to-right. Boxes around a series of sub-processes
indicate that these sub-processes are iterative and can be performed in a loop until an acceptable
output is produced.
Each process has "start" and "end" and accepts inputs both from the Model and from other sources.
Each process produces outputs that serve as inputs into subsequent processes within the Model.
Note: Feedback loops are not included in this model due to the extent of iteration and
feedback required. Instead, organizations are encouraged to continuously iterate and
update throughout the analysis. This is shown in the model as an “Iterative Feedback Loop
box.”
4 Adapted from ISO 5807:1985, Documentation symbols and conventions for data, program and system flowcharts, program network
charts and system resources charts.
8
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
This chapter provides detailed descriptions of the Model’s processes and sub-processes. The five
processes of the Criticality Analysis Process Model are depicted in Figure 1 in Section 2, and a more
detailed version of the Model may be found in Appendix E. Each process consists of one or more
sub-processes. Detailed diagrams of each process, including the associated sub-processes, are
included in the sections below. Appendix D provides two examples of how the Model can be used
and adapted.
The first process, A. Define Criticality Analysis Procedure, provides guidance, structure, and
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
continuity for performing a criticality analysis, which is necessary due to the number of different
people and groups involved in completing a criticality analysis.
The last process, E. Conduct Detailed Review of Criticality for Processes B, C, and D, is performed
after Processes B, C, and D have been completed and cuts across these three processes. This process
is performed in a bottom-up manner for tracing dependencies and impact/risk from subcomponents to
components, components to subsystems, subsystems to systems, systems to programs, and programs
to higher-level programs using the information gathered in the previous three processes. It provides
connective tissue between Processes B, C, and D, and ensures that the criticality determination is
consistent across all layers of the Model – program, system/subsystem, and
component/subcomponent – in terms of considering impacts, dependencies, and risks across the
entire program. As such, Process E requires a high level of coordination and collaboration between
the actors in those other processes. Baseline Criticality levels assigned in Processes C and D are
finalized in process E; the Baseline Criticality levels determined in Process B are typically sufficient
for the program level and so do not need to be finalized in Process E.
The sections below describe inputs, outputs, and methods associated with each Process of the Model.
These are listed for informational purposes only, and it is expected that users will fill in these items
with information specific to their organization(s) when they tailor the Model as described in process
A.1. The inputs listed provide examples of the types of documents that may be useful in completing
9
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
the process/sub-process. Organizations may not have all the inputs mentioned in this publication. If a
specific input does not exist or is unavailable for any reason, the same type of information may exist
as part of another document or in another format. Similarly, outputs described in this publication do
not need to be stand-alone documents but may be part of an existing document or be available in
another format than is described herein.
The methods listed are intended to provide additional guidance on how to complete the sub-
processes. These methods are briefly described in Appendix C, with references for further guidance
where available. In tailoring the Model, it may be useful to more fully describe or provide
information on methods to be used.
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
This chapter describes each process and the associated sub-processes in detail. Each process is
described using the following template:
Outputs Documents that are created or modified as a result of completing the process.
There are two types of outputs:
Roles and List of roles regarding who will be Responsible, Accountable, Consulted, or
Responsibilities Informed of the sub-process and its outputs. Roles may vary according to size
and complexity of an organization. Many of the roles listed in this publication
are described in more detail in NIST SP 800-181, National Initiative for
Cybersecurity Education (NICE) Cybersecurity Workforce Framework.
Related processes A sample list of publications (with link to full citation in Appendix B.2)
outside of describing security, privacy, engineering, business, etc., processes that are
criticality related to, but not directly included in, criticality analysis. Knowing how
analysis these related processes relate to criticality analysis may help identify areas
where existing work may be leveraged and provide some context in
understanding the criticality analysis process.
10
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Outputs Documents that serve as outputs from the sub-process. There are two types of
outputs:
Related processes A sample list of publications (with link to full citation in Appendix B.2)
outside of describing security, privacy, engineering, business, or other processes that are
criticality related to or tie in with this sub-process, its inputs, or its outputs. Knowing
analysis how these related processes relate to the criticality analysis may help identify
areas where existing work may be leveraged and provide some context in
understanding the criticality analysis process.
11
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Do adequate,
documented CA No
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
procedures exist?
End
Process A, Criticality Analysis Procedure Definition, depicted in Figure 2, is completed before the
rest of the criticality analysis is performed. This process ensures that there is a set of documented
procedures to guide the criticality analysis. It helps set up for a successful execution of the criticality
analysis by providing scoping, framing, and procedural guidance for conducting a criticality analysis.
• Check if documented procedures exist and if they are sufficient and appropriate for the needs
of the criticality analysis;
• If procedures exist, then Process A can end and Process B can begin;
• If procedures do not exist or are not sufficient or appropriate for the needs of the criticality
analysis, sub-process A.1, Define/Taylor Criticality Analysis Procedures, is performed to
develop or tailor procedures for the criticality analysis; and
• Once the procedures have been satisfactorily defined or tailored in sub-process A.1, Process A
can end and Process B can begin.
The output of this process is “Documented Criticality Analysis Procedures.” The intent of this
process is to ensure there is a document that provides guidance on how to conduct a criticality
analysis; a document named “Criticality Analysis Procedure” is not necessary. A project plan,
program plan, program implementation plan, or other kind of plan may provide sufficient guidance.
12
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Process number A
Process summary The organization either develops procedures that would guide the criticality
analysis, or, if such procedures exist, finds them and, if needed, tailors them
to the specific needs of the program.
Inputs None
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
Sub-process ID A.1
13
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Include in the procedure what events or conditions (i.e., triggers) result in the
need for a criticality analysis. Some organizations may also define the events
or conditions (i.e., triggers) that will launch each stage(s) of the analysis.
14
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
15
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
16
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Process B, Conduct Program-Level Criticality Analysis, depicted in Figure 3, is the first layer of the
top-down portion of the criticality analysis. It is used to identify and prioritize mission/business
objectives, goals, and requirements. While these priorities may be sometimes predefined, at other
times, it is through this process that they may be defined or refined. This process is closely tied to
Step 1 – Risk Framing described in [NIST SP 800-39] .
For this publication, a program does not necessarily mean an official government program; it may be
a collection of programs, an initiative, or an idea. It is defined by a set of mission/business objectives
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
and encompasses the activities that the organization performs to accomplish those objectives. The
program may be formally defined in a mission statement, project plan, or other similar document, it
may be a concept under development, or it may be a situation that the organization routinely faces but
does not fall under any single program’s responsibilities. Ideally, Process B would start at the highest
level of an organization and repeat iteratively with increasing granularity until the lowest hierarchy of
programs is reached. In most cases, this is impractical, and so this Model allows users to begin with
any program for which the information required to perform a criticality analysis is available.
Appendix D provides examples of how the Model may be used both with an existing, well-defined
program and one that is not as well defined.
Process B helps the user define the program and identify key activities that are necessary to ensure
that the main goals and objectives of the program are met. It consists of the following:
Much of this process may already be conducted as part of strategic planning or project planning
efforts.
Process B
Process summary Define, review, and analyze the program to identify key activities that are
vital to reaching the objectives of the program and for reaching the overall
goals of the organization. This process ensures that that the criticality
determinations for systems/subsystems and components/subcomponents can
17
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
be directly traced back to the objectives of the program and the goals of the
organization.
Roles and Responsible: Program Manager responsible for the performance of this
Responsibilities process. Business Analyst and Lead Security Engineer may serve as a co-
lead for sub-processes B.4, Define Operating States, and B5, Assign
Baseline Criticality Levels to Workflow Path(s).
[ISO/IEC 27001]
[NIST SP 800-34]
18
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
B.1 – Define or Obtain Program Level Needs, Goals, Objectives, Assumptions, and
Constraints
Sub-process ID B.1
Sub-process This process helps define the program being analyzed. It lays the foundation
description for the criticality analysis, establishes context, and provides a common
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
Define how the success or failure of the program will be measured. Identify
a high-level objective or set of related objectives. It is best if there is only
one objective or if the set of objectives are closely related to focus the
analysis. Measurable goals for the objective(s) are described and include
any high-level organizational goals that apply. Consider security, safety,
privacy, and other related goals. If there are several objectives and goals,
consider their priorities and documenting these priorities.
Inputs Documented Criticality Analysis Procedures (or project plan) from Process
A; Relevant Laws, Regulations, Directives (including organizational
policies), and other high-level guiding documents that may have the right
information; Strategic Plan(s); any documentation that describes
organizational mission/vision; needs, goals, objectives, and projects; Risk
Management Strategy (including risk tolerance); Budgets and Project
Plan(s)
19
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Sub-process ID B.2
20
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Sub-process ID B.3
Sub-process This sub-process helps define workflow paths and identify connection
description points within the program that may be stressed in an adverse situation.
21
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Examine the workflow paths and determine where they intersect and/or
depend on each other. Highlight or otherwise clearly identify any activity or
output that multiple workflows depend upon.
Consider the boundaries defined in B.2 and identify situations where one
activity is dependent on an output or activity located in a different
boundary, is outside of the defined workflow path(s), or is outside the scope
of the criticality analysis. Consider identifying the amount of control the
organization has over certain dependencies (e.g., weather). Also, consider
the individuals/responsibilities defined in B.2 and identify where multiple
activities are conducted by a single individual or organizational unit. If
appropriate, create or update the process diagram or other representation
depicting the workflow paths to include interactions, intersections,
connections, and dependencies.
5 The workflow paths will traverse multiple systems that are supporting the program, which means that there will be handoffs between
systems, traversing of system boundaries, transfer between different organizations or individuals, and other events that involve
transition.
22
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Sub-process ID B.4
Sub-process This sub-process describes regular operation of the program and what might
description happen if the activities or workflow paths defined in B.2 are compromised.
For each activity defined in B.2 and B.3, describe the condition of the
activity (i.e., what the activity could look like) and the impact on the
workflow if the activity is forced into different conditions, including but not
limited to:
23
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Determine the severity of the operating states other than normal (adverse
operating states) on the workflow. This could be a ranking (e.g., low,
moderate, high) or measure (e.g., time lost; cost in time/resources).
Then, using the Process Description and/or Diagram created in B.3, identify
specific interactions, intersections, connections, and dependencies in the
workflow paths that would be impacted by each adverse operating state.
The purpose is to identify how the adverse operating states of the activity
impact other activities in the process and in turn, which interactions or
dependencies have the most influence on normal operation of the program
and thus are more critical.
24
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Sub-process ID B.5
Using the Process Description and/or Diagram created in B.2 and B.3,
consider how the program would be affected by each of the operating states
defined in B.4. Rank the activities, workflow paths, and/or bounded areas
according to how vital they are to the success of the objectives/goals
defined in B.1 and how strongly an adverse operating state will affect the
program objectives and goals.
The user creates a way to measure or rank the workflow paths according to
how important they are to the success of the program. This could be a
ranking (e.g., low, moderate, high), or measure (e.g., time lost; cost in
time/resources; probability of being able to complete activity). The user
could also use ranges and thresholds to define such rankings. 6
Consider the life cycle of the activities and workflow paths in relation to the
project. Considerations may include end dates of activities or workflow
paths, and conditions that influence the criticality of activities.
6 For further guidance on example security measures and metrics, see Appendix A of NIST SP 800-55 Revision 1, Performance
Measurement Guide for Information Security. Future updates to this publication will also address privacy considerations [NIST SP
800-55].
25
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
26
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
27
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Much of this process may be conducted as part of project planning, system design, and acquisition
processes.
Process C
Process summary This process reviews and analyzes the system or subsystem from the point
of view of its criticality to the overall organizational goals.
7 System: Any organized assembly of resources and procedures united and regulated by interaction or interdependence to accomplish a
set of specific functions. See also information system. (SOURCE: [CNSSI 4009])
Subsystem: A major subdivision or component of an information system consisting of information, information technology, and
personnel that perform one or more specific functions. (SOURCE: [NIST SP 800-53]; [NIST SP 800-53A]; [NIST SP 800-37])
System: Combination of interacting elements organized to achieve one or more stated purposes.
Note 1: There are many types of systems. Examples include: general and special-purpose information systems; command, control,
and communication systems; crypto modules; central processing unit and graphics processor boards; industrial/process control
systems; flight control systems; weapons, targeting, and fire control systems; medical devices and treatment systems; financial,
banking, and merchandising transaction systems; and social networking systems.
Note 2: The interacting elements in the definition of system include hardware, software, data, humans, processes, facilities,
materials, and naturally occurring physical entities.
Note 3: System of systems is included in the definition of system. (SOURCE: [ISO/IEC/IEEE 15288])
28
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Roles and Responsible: Lead System Architect or a similar role is responsible for the
Responsibilities performance of this sub-process. Lead Security Engineer serves as a co-lead
for sub-processes C.4, Define Operating States, and C.5, Assign Baseline
Criticality Levels to System(s)/Subsystem(s).
Sub-process ID C.1
Sub-process This sub-process involves identifying which critical process path will be
description examined further and is necessary for performing a criticality analysis for
systems/subsystems. Ideally, it is performed once Baseline Criticality
Levels of Activity(ies) and/or Workflow Path(s) have been determined. If
29
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Ensure that the scope has definitive boundaries. Define any assumptions or
constraints that will help limit the analysis.
30
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
C.2 – Identify Functionalities and Capabilities Needed and What System(s)/Subsystem(s) will
be Used
Sub-process ID C.2
Sub-process This sub-process defines those functionalities and capabilities that are
description critical for successful operation of the system/subsystem.
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
Inputs Scope from C.1; Existing Infrastructure and Processes; Existing Contractual
Obligations
8
For this publication, the data life cycle is defined as the flow of data from conception through retirement. (Adapted from
[ISO/IEC/IEEE 15288]). It includes the set of operations performed upon the data, including but not limited to creation/collection,
ingestion, storage, retrieval, alteration, disclosure, dissemination, archiving, and destruction (adapted from [ISO/IEC 29100]
definition of “Processing of PII”). It may be applied to all types of data, including electronic data, metadata, sensor data, human
knowledge, Personally Identifiable Information (PII), and other data.
31
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
C.3 – Identify Interactions, Intersections, Connections, and Dependencies Within the Critical
Workflow Path
Sub-process ID C.3
32
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Inputs List of functionalities and capabilities from C.2; Existing Infrastructure and
Processes
outside of
criticality analysis [NIST SP 800-47]
Sub-process ID C.4
Sub-process This sub-process defines scenarios for how the system/subsystem would
description operate normally and what would constitute abnormal operations of the
system/subsystem.
Review the functions and capabilities defined in C.2. Describe the condition
of the functions and capabilities (i.e., how will it operate). Determine the
impact on both the system and the activity the system is intended to support
(defined in C.2 and C.3) in each of the following conditions:
Non-operational;
Impaired (i.e., the function or capability operates at a reduced pace or in an
unsafe/insecure/privacy-invasive manner);
Normal operation;
Increased operations (i.e., the function or capability performs quicker or
with more output than normal); and
Unintended operations (i.e., the function or capability performs but with
additional outputs or actions that are not part of the expected routine).
33
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Sub-process ID C.5
Determine the severity of the operating states on the activity that the
function/capability is intended to support. Consider:
34
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
The user may rank systems and subsystems that are on the critical workflow
path. This could be a ranking (e.g., low, moderate, high) or measure (e.g.,
time lost; cost in time/resources; probability of being able to complete
activity). The user could also use ranges and thresholds to define such
rankings.
[NIST SP 800-55]
[NIST SP 800-60]
35
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
36
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
increasingly granular levels to break a complex set of components down into their smallest parts,
until the lowest hierarchical level of component is analyzed. As the components could be
decomposed into extremely fine detail (e.g., raw materials), it is important to define what level of
granularity is necessary for this analysis.
Much of this process is conducted as part of system architecture and design processes.
Process D
Process summary This process reviews and analyzes a specific system to identify critical
components and/or subcomponents.
Roles and Responsible: Lead System Engineer or a similar role is responsible for the
Responsibilities performance of this sub-process. Lead Security Engineer serves as a co-lead
37
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
for sub-processes D.4, Define Operating States, and D.5, Assign Baseline
Criticality Levels to Components/Subcomponents.
Sub-process ID D.1
Sub-process This sub-process narrows the scope of the analysis to a specific system or
description subsystem. Ideally, it is performed once Baseline Criticality Levels of
systems/subsystems have been determined. If criticality levels have not been
determined, strongly consider returning to Process C, Conduct
38
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
are often varied even if the systems seem identical. Ensure that the scope has
definitive boundaries.
Define any assumptions or constraints, which will help limit the analysis.
Components and subcomponents are sometimes guided by specific legal and
regulatory requirements, such as sourcing requirements (where those
can/cannot come from); take those into account.
39
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Sub-process ID D.2
Sub-process name Identify System Functions and Capabilities Workflow Needed and What
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
Sub-process This sub-process analyzes the system to identify the components and
description subcomponents required to ensure that the system functions as intended.
Review the activities identified in D.1. For existing systems, list the
functions and capabilities of the system being analyzed. For systems under
development, list functions and capabilities needed. If the system is complex,
consider scoping the analysis to only the functions and capabilities
determined as critical. Consider configurations, settings, routines,
performance parameters, etc.
Define the processes or data actions that are activated or that the system uses
to perform the identified functions and capabilities. Those processes can be
extracted from existing system documentation, such as functional
requirements, system diagrams, process flow diagrams, system concept of
operations, or any other documentation that describes what the system does.
Consider defining what information/data is needed to perform a function:
how will that data be processed and how it will be secured.
40
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Sub-process ID D.3
Identify all workflow paths required to execute each system function or, if
the system is complex, each critical function. In many cases, a single
component, or identical components, will be used to support multiple
workflow paths. Document these components matched to workflow paths in
a matrix, spreadsheet, database, function diagram, or a similar tool.
41
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Sensitivity/Uncertainty Analysis
Sub-process ID D.4
Sub-process This sub-process defines normal operational states, as well as the states in
description which the system will be operating abnormally.
Non-operational;
Impaired (i.e., the component/subcomponent operates at a reduced
capability or in an unsafe/insecure/privacy-invasive manner);
Normal operation;
Increased operations (i.e., the function or capability performs quicker or
with more output than normal); and
Unintended operations (i.e., the function or capability performs but with
additional outputs or actions that are not part of the expected routine).
42
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Using the Function Diagram with Workflow Paths, identify specific points
within the workflow paths where the system will be particularly stressed as
a result of any of these operating states. This would include any points that
would exacerbate the situation.
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
Define the severity of the impact of the operating states. This may be a
ranking (e.g., low, moderate, high) or measure (e.g., processing speed;
downtime; percentage of remaining functionality).
Sub-process ID D.5
43
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Rank the components and subcomponents in a way that gives the highest
ranking to components and subcomponents that are on the critical workflow
path, perform vital functions and capabilities, and would be most impacted
by adverse operating states.
The user can create a ranking schema that would, for example, rank those
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
activities and workflow paths that are impacted by the highest number of
scenarios as “High Criticality” and those that are impacted by the lowest
number of scenarios as “Low Criticality.” The user could also use ranges
and thresholds to define such rankings.
44
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
45
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Process E, Conduct Detailed Review of Criticality for Processes B, C, and D, depicted in Figure 6,
provides a bottom-up review of impacts and ensures cross-process interaction and collaboration.
Process E consists of the following:
• Identify and map interactions, intersections, connections, and dependencies across Program;
System/Subsystem; or Component/Subcomponent;
• Identify controls protecting the system to be used;
• Review impact of operating states; and
• Validate, apply, and trace any available risk information through interactions, intersections,
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
Process E is a bottom-up process where information is iteratively validated across the entire Model.
Process E is performed after sub-processes B.5, C.5, and D.5. The output of these sub-processes,
Baseline Criticality, is used as an input to Process E.
Process E
Process summary This is a bottom-up sub-process conducted after Baseline Criticality levels
have been defined under Processes B, C and D. It is used to create final
criticality levels for Systems/Subsystems and Components/Subcomponents.
Roles and Responsible: Lead System Architect or a similar role is responsible for the
Responsibilities performance of this sub-process. Lead Security Engineer serves as a co-lead
for this process.
46
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
E.1 – Identify and Map Interactions, Intersections, Connections, and Dependencies Across
Components/ Subcomponents, Systems/Subsystems, and Programs
Sub-process ID E.1
Sub-process This sub-process uses the process diagrams, design documents, or other
description artifacts created in processes B, C, and D, to trace subcomponents through
to program goals and objectives.
47
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
[NIST SP 800-47]
Sub-process ID E.2
48
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Beginning at the subcomponent level, identify all controls that ensure that
the program, systems, and components operate within acceptable
parameters. Identify system components that monitor or protect critical
subcomponents. Then review critical components and identify any system
functions that provide those same assurances. Next, identify external
systems, programmatic activities, processes, procedures, and practices that
serve to monitor or protect the system. Identify any programmatic activities
that serve to monitor or protect the program itself.
Methods Document Review; Security and Privacy Control Selection and Allocation
(Risk Management)
Related processes [CSF] – (ID.GV) Governance; (ID.RA-6) Risk Assessment; (ID.RM) Risk
outside of Management Strategy
criticality analysis
[FIPS 199]
[ISO/IEC 22301]
[ISO/IEC 27001]
[NIST SP 800-34]
49
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Sub-process ID E.3
Sub-process Beginning at the subcomponent level, trace the impact of each adverse
description operating state at the system level (defined in C.4) would have on the
operations of the activity or workflow path it is meant to support (defined in
B), and what each adverse operating state at the activity level would have
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
Using the controls identified in E.2, review the likelihood of the adverse
operating states and associated impact(s) occurring. For example, if there
are no controls monitoring and protecting a vital component, this may need
to be reflected in the criticality level of the component.
Inputs Listing of controls protecting the system to be used from E.2; Descriptions
of operating states from B.4, C.4, and D.4; Results of Root Cause Analysis;
Results of Hazard Analysis; Contingency Plans
[NISTIR 8062]
50
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
E.4 – Validate, Apply and Trace any Available Risk Information Through Interactions,
Intersections, Connections, and Dependencies
Sub-process ID E.4
Sub-process name Validate, Apply and Trace any Available Risk Information Through
Interactions, Intersections, Connections, and Dependencies
Inputs Refined list of adverse operating states from E.3; Risk Assessment (esp.
Threat Assessment; Vulnerability Assessment, Impact Analysis).
Outputs Detailed review results to pass to E.5, Assign Final Criticality Levels to
Systems, Subsystems, Components, and Subcomponents.
Sub-process ID E.5
51
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Whatever method is used to score the criticality levels, ensure that the
method is sufficiently detailed so that a reasonably small number of
components are given a high criticality score. The process described in
this publication usually will not result in a large number of components
being given a high criticality score. If this occurs, it may be assumed that
many of these components are either outside the scope or control of the
program or do not have highest criticality.
Determine the duration for the final criticality level to be valid. Consider
the life cycle of the components, systems, and projects under evaluation.
52
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
53
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Appendix A—Acronyms
Selected acronyms and abbreviations used in this paper are defined below.
CA Criticality Analysis
IT Information Technology
OT Operational Technology
54
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
SP Special Publication
US United States
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
55
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Appendix B—References
[1] International Institute of Business Analysis, A Guide to the Business Analysis Body
of Knowledge (BABOK Guide) v. 3, April 15, 2015.
[2] Warwick Manufacturing Group, Product Excellence Using Six Sigma, Section 12:
Failure Modes, Effects & Criticality Analysis, University of Warwick, Coventry,
CV4 7AL, UK, 32pp,
http://www2.warwick.ac.uk/fac/sci/wmg/ftmsc/modules/modulelist/peuss/slides/sect
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
[3] H. Salim, Cyber Safety: A Systems Thinking and Systems Theory Approach to
Managing Cyber Security Risks, Working Paper CISL# 2014-07, Massachusetts
Institute of Technology, Cambridge, MA, September 2014, 157 pp,
http://web.mit.edu/smadnick/www/wp/2014-07.pdf [accessed 4/3/2018].
[4] H. Salim and S. Madnick, Cyber Safety: A Systems Theory Approach to Managing
Cyber Security Risks – Applied to TJX Cyber Attack, Working Paper CISL# 2016-
09, Massachusetts Institute of Technology, Cambridge, MA, August 2016, 17pp,
http://web.mit.edu/smadnick/www/wp/2016-09.pdf [accessed 4/3/2018].
[6] N. Leveson, Engineering a Safer and More Secure World, MIT Press, June 2011,
72pp http://psas.scripts.mit.edu/home/wp-content/uploads/2016/04/STAMP-Intro-
2016.pdf [accessed 4/3/2018].
[8] D. Reddy, “Criticality analysis and the supply chain: Leveraging representational
assurance,” Technovation 34(7), July 2014, pp. 362-379.
https://doi.org/10.1016/j.technovation.2014.01.009.
[10] INCOSE, INCOSE Systems Engineering Handbook: A Guide for System Life Cycle
Processes and Activities, 4th Edition, [New York: Wiley, 2015], Chapters 4, 6, 10.
56
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
[13] M. Reed, “Comprehensive Program Protection Planning for the Materiel Solution
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
Analysis (MSA) Phase,” presented at the 15th Annual NDIA Systems Engineering
Conference, San Diego, CA, October 24, 2012,
http://www.acq.osd.mil/se/briefs/14761-2012_10_24-NDIA-SEC-Reed-SSE-PP-
MSA-Phase.pdf [accessed 4/3/2018].
[15] A Guide to Fault Detection and Diagnosis, Greg Stanley and Associates [Website]
http://gregstanleyandassociates.com/whitepapers/FaultDiagnosis/faultdiagnosis.htm
[accessed 4/3/2018].
[16] SAE International, ARP4761, Guidelines and Methods for Conducting the Safety
Assessment Process on Civil Airborne Systems and Equipment, 331pp, December 1,
1996, http://standards.sae.org/arp4761/ [accessed 4/3/2018].
57
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
paper/1999/10/21/proceedings-of-the-22nd-nissc-1999/documents/papers/p31.pdf,
[accessed 4/3/2018].
[24] What is a Process Flowchart?, American Society for Quality (ASQ) [Website],
http://asq.org/learn-about-quality/process-analysis-tools/overview/flowchart.html
[accessed 4/3/2018].
[27] The Open Group, The Open Group Architecture Framework TOGAF, Version 9,
2009.
[28] U.S. Department of Health and Human Services, Enterprise Performance Life Cycle
Framework Practices Guide: Requirements Definition, [Website]
https://www.hhs.gov/sites/default/files/ocio/eplc-lifecycle-framework.pdf [accessed
4/3/2018].
[31] D. Chen and G. Doumeingts, “The GRAI-GIM reference model, architecture and
methodology,” Architectures for Enterprise Integration. IFIP Advances in
Information and Communication Technology, Springer: Boston, MA, 1996, pp.
102-126, https://doi.org/10.1007/978-0-387-34941-1_7.
[32] C. Cacuci, “Sensitivity and Uncertainty Analysis Theory,” Volume 1, Chapman &
Hall/CRC (2003), http://inis.jinr.ru/sl/tot_ra/0/0/3/Cacuci-Sensitiv.pdf [accessed
4/3/2018].
58
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
[CNSSI Committee on National Security Systems Instruction (CNSSI) No. 4009, Committee
4009] on National Security Systems (CNSS) Glossary, April 2015
[CSF] National Institute of Standards and Technology, Framework for Improving Critical
Infrastructure Cybersecurity. Version 1.0, February 12, 2014, 41pp,
https://doi.org/10.6028/NIST.CSWP.02122014 .
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
[FIPS 199] Federal Information Processing Standards Publication (FIPS PUB) 199, Standards
for Security Categorization of Federal Information and Information Systems,
National Institute of Standards and Technology, Gaithersburg, Maryland, February
2004, 13pp. https://doi.org/10.6028/NIST.FIPS.199.
59
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
[NIST SP NIST Special Publication (SP) 800-160 Volume 1, Systems Security Engineering
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
[NIST SP NIST Special Publication (SP) 800-161, Supply Chain Risk Management Practices
800-161] for Federal Information Systems and Organizations, National Institute of Standards
and Technology, Gaithersburg, Maryland, April 2015, 282pp,
https://doi.org/10.6028/NIST.SP.800-161.
[NIST SP NIST Special Publication (SP) 800-181, National Initiative for Cybersecurity
800-181] Education (NICE) Cybersecurity Workforce Framework, National Institute of
Standards and Technology, Gaithersburg, Maryland, August 2017, 135pp,
https://doi.org/10.6028/NIST.SP.800-181.
[NIST SP NIST Special Publication (SP) 800-30 Revision 1, Guide for Conducting Risk
800-30] Assessments, National Institute of Standards and Technology, Gaithersburg,
Maryland, September 2012, 95pp, https://doi.org/10.6028/NIST.SP.800-30r1.
[NIST SP NIST Special Publication (SP) 800-34 Revision 1, Contingency Planning Guide for
800-34] Federal Information Systems, National Institute of Standards and Technology,
Gaithersburg, Maryland, November 2010, 149pp,
https://doi.org/10.6028/NIST.SP.800-34r1.
[NIST SP NIST Special Publication (SP) 800-37 Revision 1, Guide for Applying the Risk
800-37] Management Framework to Federal Information Systems: A Security Life Cycle
Approach, National Institute of Standards and Technology, Gaithersburg, Maryland,
June 2014, 102pp, https://doi.org/10.6028/NIST.SP.800-37r1.
[NIST SP NIST Special Publication (SP) 800-39, Managing Information Security Risk:
800-39] Organization, Mission, and Information System View, National Institute of
Standards and Technology, Gaithersburg, Maryland, March 2011, 88pp,
https://doi.org/10.6028/NIST.SP.800-39.
[NIST SP NIST Special Publication (SP) 800-47, Security Guide for Interconnecting
800-47] Information Technology Systems, National Institute of Standards and Technology,
60
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
[NIST SP NIST Special Publication (SP) 800-53 Revision 4, Security and Privacy Controls for
800-53] Federal Information Systems and Organizations, National Institute of Standards and
Technology, Gaithersburg, Maryland, April 2013 (updated 1/15/2014), 462pp,
https://doi.org/10.6028/NIST.SP.800-53r4.
[NIST SP NIST Special Publication (SP) 800-53A Revision 4, Assessing Security and Privacy
800-53A] Controls in Federal Information Systems and Organizations: Building Effective
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
[NIST SP NIST Special Publication (SP) 800-60 Volume 1, Revision 1, Guide for Mapping
800-60] Types of Information and Information Systems to Security Categories, National
Institute of Standards and Technology, Gaithersburg, Maryland, August 2008, 53pp,
http://doi.org/10.6028/NIST.SP.800-60v1r1.
61
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Appendix C—Methods
This appendix does not give detailed information on any given method, but provides a short
description and reference where more information can be found on how to perform the method.
Activity Network Diagram – “an activity network diagram, also known as arrow diagram, pert
chart, and critical path method, is used to show activities that are in parallel and/or in series. It
will show the most likely times, the most pessimistic times, and the most likely times for the
completion of projects.” [25]
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
Context Diagram – “an analysis model that illustrates product scope by showing the system in its
environment with the external entities (people and systems) that give to and receive from the
system.” [1]
Security Control Selection and Allocation – A process for identifying what security measures are
or will be taken. [NIST SP 800-37]
Data Flow Diagrams – “an analysis model that illustrates processes that occur, along with the
flows of data to and from those processes.” [1]
Data Modeling – describes the concepts and relationships relevant to the solution or business
domain. [1]
Decision Analysis – “an approach to decision-making that examines and models the possible
consequences of different decisions. Decision analysis assists in making an optimal decision
under conditions of uncertainty.” [1]
Document Review – data collection method for the review of documentation received throughout
the criticality analysis process(es)/sub-process(es). This may involve the review of an intranet
site, document management system, or use of a librarian or other document management
specialist. [1]
Gantt Chart – a visual representation of a project schedule. A Gantt chart is a type of bar chart in
which a series of horizontal lines shows the amount of work done or production completed in
62
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
certain periods of time in relation to the amount planned for those periods. [23]
Hazard Analysis – “the identification of material properties, system elements, or events that lead to
harm or loss. The term hazard analysis may also include evaluation of consequences from an
event or incident.” [26]
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
Interface Analysis – elicitation technique used “to identify interfaces between solutions and/or
solution components and define requirements that describe how they will interact.” [1]
“Mission Thread – A sequence of end-to-end activities and events that take place to accomplish
the execution an SoS capability. The context of a mission thread is defined by a vignette. A
mission thread is given as a series of steps. There are three main types of mission thread:
operational, development, and sustainment. Chairman of the Joint Chiefs of Staff 6212.01F
defines a Joint Mission Thread (JMT) as an operational and technical description of the end-
to-end set of activities and systems that accomplish the execution of a joint mission (CJCSI
2012).” [22]
Procedure Development – system of creating defined steps and tasks to complete a task performed.
Process Flow Diagram – Also called process flowchart. “A flowchart is a picture of the separate
steps of a process in sequential order. Elements that may be included are: sequence of actions,
materials or services entering or leaving the process (inputs and outputs), decisions that must
be made, people who become involved, time involved at each step, and/or process
measurements. [24]
63
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Project Plan – “a formal, approved document used to guide both project execution and project
control. The primary uses of the project plan are to document planning assumptions and
decisions, to facilitate communication among stakeholders, and to document approved scope,
cost, and schedule baselines. A project plan may be summary or detailed.” [23]
Requirements Definition – “often the main practice that serves as a bridge between project teams
and business stakeholders. The practice should define both product and project requirements
as well as related functional and nonfunctional requirements. Requirements definition should
begin early in the analysis phase.” [28]
[C]onsulted - must be consulted prior to the work and gives input, and
Review and Analysis of Process Description and/or Diagram – a way of collecting data (or
additional data) by reviewing and conducting further analysis on (e.g., existing process
descriptions or diagrams, listing of intersections and dependencies, relevant project plans,
strategic plans, implementation plans, or any documentation that can point to critical or
limiting activities for this program; process description and/or diagram against the listing of
chokepoints and bottlenecks that could degrade process’s ability to fulfill the mission.)
Risk Analysis – “The process of identifying, estimating, and prioritizing risks to organizational
operations (including mission, functions, image, reputation), organizational assets,
individuals, other organizations, and the Nation, resulting from the operation of an
information system.
Part of risk management incorporates threat and vulnerability analyses, and considers
mitigations provided by security controls planned or in place.”. [NIST SP 800-39] and
[NISTIR 8062]
Scenario – “an analysis model that describes a series of actions or tasks that respond to an event.
64
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Scope Modeling – “used to define the scope of the analysis or the scope of the solution.” [1]
Sequence Diagrams – “type of diagram that shows objects participating in interactions and the
messages exchanged between them.” [1]
Survey – “administers a set of written questions to stakeholders in order to collect responses from
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
Systems Analysis – “the act, process, or profession of studying an activity (such as a procedure, a
business, or a physiological function) typically by mathematical means in order to define its
goals or purposes and to discover operations and procedures for accomplishing them most
efficiently.” [20]
Use Case – “an analysis model that describes the tasks that the system will perform for actors and
the goals that the system achieves for those actors along the way.” [1]
Visualization – “1: formation of mental visual images; or 2: the act or process of interpreting in
visual terms or of putting into visible form.” [20]
Workflow Analysis – “entails reviewing all processes in an organization with a view toward
identifying inefficiencies and recommending improvements.” [29]
65
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Exposition/Situation
An organization is replacing the asset management portion of their Enterprise Resource Planning
(ERP) system. The new system will process a variety of data including potentially sensitive personnel
and mission data. It will connect to other portions of the ERP system, including human resources,
acquisition/supply chain, and finance applications. The system will consist of a mixture of custom-
built and COTS hardware and software components.
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
The organization does not have a set of standardized security requirements for acquisition. Criticality
levels for systems and components have not been established. A FIPS 199 Impact Level for the
system has been established.
Due to the complexity of the project and the potential risk involved, the Project Manager decides to
use the Criticality Analysis Process Model to prioritize different subsystems, components, and
subcomponents within the system to ensure that appropriate levels of care are applied to those
subsystems, components, and subcomponents.
Action
The Project Manager reviews the organization’s strategic plan, risk management plan, and other
documentation and determines that the organization does not have any formal criticality analysis
procedures. The Project Manager does not have the authority nor the time and ability to perform a
criticality analysis of the entire organization, which would be ideal. However, it is early enough in the
ERP project that an analysis can be written into the project plan prior to and concordant with system
procurement and implementation.
A.1 The Project Manager delegates to an employee with business analysis training, the process of
integrating criticality analysis activities into the project plan. The Business Analyst 9 uses the
Criticality Analysis Process Model in this publication to determine appropriate tasks, roles, and
responsibilities based on Processes B, C, D, and E of the Model. The Project Manager and Business
Analyst coordinate with a legal representative to identify laws, regulations, and organizational
policies which may impact the project; they discuss with the rest of the project team how the
criticality analysis may align with or impact their normal activities and discuss ways to address any
concerns they have. The Business Analyst works with the project team to compare the guidance in
the Related Processes Outside of Criticality Analysis in each Process and Sub-process description
9Inthe context of this document, any role mentioned, such as “Business Analyst,” is not a specific title but a role of a person engaged in
the program.
66
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
with the organization’s existing processes to ensure that security engineering and risk management
processes are appropriately integrated and planned for.
Once the Business Analyst and Project Manager determine they have designed a process that is
appropriately integrated into their project plan, they meet with the rest of the project team along with
others who will be participating in the criticality analysis to review and finalize the process. The plan
they have designed follows the process defined in this document, with the addition of organizational-
specific policies and procedures mentioned.
Once the project begins, the Project Manager ensures that procedures for conducting a criticality
analysis have been adequately defined and are appropriate to be used for this system integration
effort. Although there have been a few changes to the project plan, none impact the criticality
analysis procedure defined in Process A. The Project Manager checks with the individual responsible
for the broader ERP system and individuals responsible for the programs which the system will
support – mostly inventory managers - to see if Criticality Levels have been assigned to those
systems/programs or the information they process/store/transmit. Although some information is
labeled as sensitive to the organization (i.e. “controlled unclassified information”), criticality or
priority levels have not been defined. The Project Manager works with the inventory managers to
execute Process B, with the help of the Business Analyst, a legal representative, the chief ERP
program manager, and others when necessary.
B.1 As part of the project planning process, the Project Manager works with relevant stakeholders to
define assumptions about the project, including the expected budget and timeline. He also defines
how much detail is needed regarding goals and assumptions of the project to ensure that those are
usable and appropriately inform the overall system development. Within the scope defined, the
Project, ERP, and Inventory Managers collect documentation that contains organizational and
program goals and objectives, such as the organizational strategic plan, mission and vision statement,
shareholder reports, program board reviews, and management goals. They also identify relevant
security, safety, privacy, and industry-specific laws and regulations [e.g., Federal Information
Security Management Act (FISMA), North American Electric Reliability Corporation (NERC)
Critical Infrastructure Protection (CIP), Federal Financial Institutions Examination Council (FFIEC)
IT Handbook]. They define several program goals related to information security and safety that were
not already documented.
B.2 The Project Manager uses the information from B.1 to develop a high-level description for how
the inventory and ERP program goals and objectives are currently accomplished and how this will
change with the new system. The Project Manager interviews senior managers to determine why they
decided to implement a new system – their main concern was that the current system was outdated
and did not allow real-time information sharing between organizational units and suppliers.
The Program Manager delegates to a Business Analyst the task of developing a representation of
processes. The Business Analyst interviews several personnel responsible for inventory management
on how they perform their duties and how they expect to use the system, including what they would
like the system to do which is not possible with the existing process. This person conducts
brainstorming discussions with relevant personnel, asking the following questions (among others):
67
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
• What information and tools do you use? Where do they come from? Is that information
sensitive or does it have an impact/risk categorization associated with it?
• What information or tools would you require to perform the bare minimum necessary, such as
during a severe weather event, even at a reduced speed or quality?
• What information, tools, or other products do you create? Where do they go?
• What is the biggest roadblock you face in performing your tasks?
• How long can a process be delayed before the organization is noticeably affected?
• Which processes must be completed before another process begins?
• How do you know when a process you depend on is completed, or the information/tool you
need is available?
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
• How do you know that information you rely on is correct or tools you use are operating
correctly?
• What organizational unit(s) or personnel do you work most closely with?
The Business Analyst uses the gathered information to develop a draft, high-level visual mapping of
an updated inventory management process. This information will also be used in developing design
requirements for the new system.
B.3 The Business Analyst analyzes the interactions, intersections, connections, and dependencies
within the high-level visual mapping developed in B.2. Four main workflows in the inventory
management process are identifiable – one for costly technological equipment (e.g., servers), one for
costly, non-technological assets (e.g., real estate), one for raw materials used in products, and one for
changes to equipment (e.g., change in location, project, owner). Several chokepoints in the process
are highlighted.
The Business Analyst reviews this information with the Project Manager who compares the
information with the goals defined in B.1. With this information, the Project Manager identifies areas
where the new inventory management system may help the existing process better align with
organizational goals. He updates the visual mapping created in B.2 to include details related to the
flow of information, show the workflow paths, and highlight concerns. The Business Analyst reviews
the updated process map with the inventory management personnel to validate it, address any
concerns they have, and obtain their buy-in regarding any changes to their existing processes.
B.4 The Business Analyst conducts further interviews and brainstorming sessions with key personnel
in the inventory management process along with representatives from the legal, safety, security,
privacy, and acquisition departments to discuss how the planned workflow is expected to operate
under both normal and abnormal conditions. The Business Analyst broadly scopes the discussion to
the four identified workflow paths. The following questions (among others) are used to help the
discussion:
• What other processes within a workflow will be impacted if one of the processes is
compromised?
• Which organizational goals and objectives will be directly affected if a workflow output is
compromised?
• How much of a delay in a workflow path can occur before other processes are impacted?
68
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
The Business Analyst then narrows the discussion to individual processes or activities within the
workflow paths. Using the mapping developed in B.3, the Business Analyst uses the following
questions to help guide the discussion:
• What might happen to the process if an input (e.g., information) is received early?
• What might happen to the process if an input is received late?
• What might happen to the process if an input received is noticeably incorrect or missing
something?
• What might happen to the process if an input received is functional or has all required pieces
but also has additional, unexpected pieces (e.g., extra, information that have not been
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
requested)?
• How might a delay or compromise in one process impact the overall goals of the program
(including safety, privacy, and security goals)?
• How might a problem in the process (e.g., delay, compromise of information, corruption of
information, privacy problems for individuals) be identified?
B.5 Next, the Business Analyst and Project Manager use this information to rank or prioritize each of
the process workflow paths from most important to least important by how vital they are to the
success of the goals and objectives defined in B.1, applicable laws and regulations, and how strongly
an adverse operating state will affect the program goals and objectives. They initially rank each
process or activity defined in the process map in an ordinal list, but with more deliberation, decide to
group the list into categories of “highly critical,” “moderately critical,” and “less critical,” which
becomes the Baseline Criticality of those activities. By comparing the criticality levels of each
process, the Project Manager can rank the associated workflow paths.
Process C
With the project goals and assumptions defined and program-level Baseline Criticality Levels
completed, the Project Manager decides to hire a company to help with the system design process;
the project then moves to the system design phase. This portion of the criticality analysis is delegated
to the contractor in charge of systems architecture (the Lead Systems Architect). She reviews the
artifacts produced so far with the Project Manager.
C.1 The Lead Systems Architect and Project Manager start by defining how the system being
designed will support the workflow paths that were defined in Process B. Because the scope of the
criticality analysis is already limited by the scope of the project to a single system (the inventory
management system), they decide to make the analysis more detailed and scope the analysis to only
those subsystems that support activities and workflow paths that have been designated “highly
critical” in Process B. The Lead Systems Architect collects and reviews the relevant artifacts of
Process B, plus more detailed documentation of the existing inventory management and ERP systems
that was not included in Process B, including backup plans, the FIPS 199 impact level for the system,
and relevant High Value Asset (HVA) designations. She also reviews other documentation describing
the existing infrastructure, including the network topology, power requirements, etc.
C.2 Early in the system design process, using documentation gathered in Process C.1 along with the
map and interview results from Process B, the Lead Systems Architect works with the Project
69
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Manager and the team of engineers to identify functionalities and capabilities needed to support the
critical processes identified in Process B. She identifies existing subsystems – hardware, software,
procedures, personnel, or other tools - which may be used to provide those functionalities and
capabilities. She includes existing subsystems meant to protect or monitor those subsystems (i.e.,
controls). She identifies those functionalities and capabilities which will require a subsystem to be
developed, modified, or purchased.
C.3 Once the Lead Engineer has roughly defined all functions required for the new system and
developed a draft system diagram as part of the project design process, she and her team identify
interactions, intersections, connections, and dependencies between the subsystems, focusing on
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
identifying any subsystem outside the scope of the project with which a subsystem interacts,
especially in the ERP system. Their review questions may include:
Using this information, they identify those subsystems and functions which directly perform or
support a highly critical process, those which indirectly support a highly critical process, and those
which are immaterial to the critical process. The Lead Systems Architect uses this information to
modify the draft system diagram developed in C.2 slightly and to highlight key areas of importance.
C.4 The Lead Systems Architect works with her team of engineers to document generally the
characteristics of each subsystem and how the subsystems should function when operating normally.
They then analyze how each subsystem will behave under the following conditions:
70
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
This information helps the engineers to identify areas where additional controls are needed to protect
the system. They modify the system design multiple times to include appropriate security, safety,
privacy and other controls and to incorporate different types of subsystems, then repeat the analysis.
In the analysis, the engineers view each control as if it were a subsystem. For example, the engineers
consider the value of using a distributed or a centralized database based on the organization’s
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
confidentiality, integrity, and availability needs. The Lead Systems Architect documents the results of
this analysis in a series of descriptions of operating states.
C.5 Using this information, the Lead Systems Architect works with the Project Manager to rank the
subsystems (including controls) from most important to least important. They ask the following
questions (among others):
• What will happen to the system functions and operations if a subsystem’s operating state is
abnormal?
• How many connected or related subsystems would be impacted?
• Which of the subsystems are absolutely necessary for the system to operate, even at a reduced
state or slower speed?
The Lead Systems Architect then decides on the thresholds for grouping the subsystems into High,
Moderate, and Low, which become the Baseline Criticality levels of each subsystem. She validates
all the information garnered from this process with the Project Manager, who in turn reviews it with
the ERP Program Manager to ensure consistency and to identify any potential concerns.
Process D
Based on the Baseline Criticality Levels for the subsystems, the Program Manager and Lead Engineer
narrow the scope of the criticality analysis to the most critical subsystems. For the purposes of this
example, two subsystems were identified for further analysis: the inventory database and the in-house
application used to access and modify that database. The Lead Engineer reviews the artifacts
produced so far with the Program Manager.
D.1 The Lead Systems Engineer starts with identifying those subsystems that were assigned High
Baseline Criticality Level in Process C: the inventory database which is stored with a cloud service
provider, and a software application which has yet to be developed. The analysis for the database is
led by the Project Manager as it deals with a third-party service provider’s equipment and security
controls; the analysis of the application is delegated to the System Engineer in charge of the
application. He reviews the artifacts of Processes B and C and discusses with a legal representative
relevant laws and regulations to help provide additional information about any requirements for
components and subcomponents. For each analysis, the Program Manager defines, with input from
the legal representative and Lead System Engineer, the level of detail that is necessary and possible
for the analysis.
71
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
D.2 The Project Manager and Lead Engineer begin the process of identifying which third-party
service provider they will use for hosting the inventory database, based on input from Process C.
They request any documentation available related to the design of the service, including security,
privacy, and availability features and how the provider will assure that the project’s needs are met.
The System Engineer for the software application requests any documentation available related to the
design of the application, including a description of relevant processes, functions, policies, and
constraints (e.g., organization-specific security requirements, types of equipment used to access the
application, etc.). Using this information, the systems engineer and his team create a preliminary
listing of major functionalities and capabilities that will be performed by the subsystem. Because the
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
System Engineer’s team will be using an agile method to develop the software application, they will
use this analysis to frame their initial scope of work.
D.3 The system engineers identify interactions, intersections, connections, and dependencies within
the software application, including non-software components such as user input and behavior. The
following questions are used but not limited to:
• Which components accept data inputs, process and/or store that data, and present the data
when requested as an output? What is the sensitivity level or categorization of that data?
• What inputs are required for the subsystem to function as expected (timely, accurate, and
complete)?
• Who or what provides those inputs?
• Which component must be operational or completed before another can begin?
• What software language(s), software libraries, or other components will be used?
• How will updates, upgrades, and other changes to components impact the subsystem?
The system engineers develop rough wireframes and flowcharts to express this information, then
validates it with the lead engineer.
D.4 The systems engineers, working with security and privacy engineers, document how each
component of the subsystem will function when operating normally and abnormally. The following
situations are considered but not limited to:
• Insufficient power;
• Data overload;
• Incorrect data input;
• Operation in extreme temperatures;
• Failed or malfunctioning microchip component;
• Unsuccessful or erroneous firmware update; and
• Unexpected shortage of subcomponents.
System engineers document results of each of their analyses in a series of descriptions of operating
states.
72
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
The Project Manager reviews the third-party cloud provider documentation to identify how the
various components of their service will operate in both normal and adverse situations, and how it
will impact the database. System engineers develop a high-level description of operating states
focusing on the loss of confidentiality, integrity, and/or availability of the database.
D.5 Both groups work with their relevant stakeholders to assign Baseline Criticality levels to
components using the information developed in D.2 to D.5. The following questions are used but not
limited to:
• What will happen to the functions/capabilities delivered by the subsystem when components
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
The system engineer ranks the components of the software application (including non-software
components such as user behavior) from most important to least important. They use this information
to determine what functions to prioritize in the development process and which may be left to later.
They then decide on the thresholds grouping the components into High, Moderate, and Low groups,
which become the Baseline Criticality levels for each component.
D.1-5 (multiple iterations) Because the development of the software application is following an
agile methodology, they repeat the criticality analysis in parallel with the development of the
application. D.1 and D.2 are used to help scope the tasks and identify the functions which will be
developed or improved and are conducted during sprint planning meetings; D.3 is completed during
the sprint as part of documentation; D.4 and D.5 are done during the testing and evaluation portions
of the sprint. In a few cases, the systems engineers decided to do an additional, more detailed
iteration of the analysis to identify critical subcomponents of highly critical components. This was
done, for example, with the user interface, and helped identify user inputs that might exploit a
vulnerability resulting in an impact to the integrity or availability of the database.
Process E
With Baseline Criticalities assigned across the program activities/workflow paths, subsystems of the
system under development, and components/subcomponents, the Project Manager, Lead Systems
Architect, Lead Systems Engineer, and lead security engineer and privacy engineer begin to review
baseline criticalities for consistency, interdependencies, and to develop final subsystem and
component/subcomponent criticality levels. They also include the ERP program manager in this
analysis as the system is closely connected to and tied with others under the ERP system umbrella.
E.1 Those persons responsible for conducting processes B, C, and D, meet to review the artifacts and
results from their respective processes. They identify connection points where data or information
will flow between components, any components across the different subsystems which are very
similar in functionality, which components or component types will be used to support more than one
subsystem, groups of components supplied by the same manufacturer, and finally groups of
components expected to fail around the same time frame. The group performs this same analysis for
73
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
the subsystems, identifying connections, commonalities, and repetitions. The tracing of components
all the way through the program activities and workflows helps to identify any interdependencies that
have not been considered in the analysis up to this point. The group documents result of this analysis
using diagrams of interdependencies. They determine that there was a set of interdependencies and
duplications across the inventory management system and the broader ERP system related to
modifying inventory information.
E.2 The group then identifies what existing controls have been designated to monitor and protect the
system, subsystems, and components. These controls include traditional security controls such as
access control, configuration management, secure design principles, network and system activity
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
monitoring functions, software switches, etc., as well as privacy controls such as notices, de-
identification measures, privacy-enhancing cryptographic protocols, data tags, privacy-protective
sensor configurations, etc.; they may be automated, technical, or manual. These controls can be
documented in a variety of places, including security and privacy requirements, security and privacy
plans, risk treatment plans, etc. The group determines that some controls included in the design may
be excessive and that no control existed to prevent a resource shortage with regards to the
interdependencies identified in E.1. The engineers responsible for those components modify their
design slightly to compensate and the group reanalyzes the impact of the operating states of the
components and controls.
E.3 The group then traces the impact of operating states that were defined in B.4, C.4, and D.4 to
determine what adverse operating states may have a cascading effect across the subsystems, system,
and project processes. The group reviews the controls in place at each level and what would happen
to the program if the control(s) entered an adverse operating state. The group finds that a failure in
one portion of the software application could lead to a cascading failure of the broader ERP system.
E.4 Next, the group reviews available security and privacy risk documentation to see if
components/subcomponents, the subsystems, or the system itself should be assigned a higher
criticality level than what has been assigned during the process thus far. Using existing risk
assessment, threat assessment, impact analysis, or any similar documentation, the group evaluates the
controls identified in E.2, the impact of operating states on those controls in E.3, and the Baseline
Criticality Levels assigned in processes B, C, and D. It was determined that some of the components
originally designated as lower criticality were connected to portions of the ERP system which, if an
incorrect input was provided, would have significant impact. The criticality levels of these
components were increased. The criticality levels of controls which may protect against such an event
were also increased.
E.5 Finally, the group reviews analysis results from Process E to determine how Baseline Criticality
Levels that were assigned to the system, its subsystems, and components/subcomponents should be
revised to assign final Criticality Levels. This analysis considers identified interdependencies,
controls, and any aspects of the system, subsystem, and component/subcomponent operations that
may be vulnerable due to systems architecture and design, reliance on a single supplier, or any other
factors that were discovered in the overall analysis.
Once Criticality Levels have been finalized, the program manager distributes the results to the groups
performing risk analysis, threat analysis, impact analysis, contingency planning, and systems
engineering activities. Criticality Levels are then used to inform these activities and help refine how
74
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
they are planned and performed in the future. Criticality Levels also provide valuable inputs into the
design and refinement of security requirements and controls, help shape system and component
(hardware and software) testing, determine if any components should be bought in advance and
stockpiled, and to inform supplier diversification decisions.
Later, Criticality Levels are used to inform future system development and integration efforts, as well
as future procurements and modernization efforts.
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
75
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
An organization is considering developing a plot of land encompassing about 200 acres. The CEO of
the organization would like to use the land to create a futuristic “smart city” (called “Smartstown,
USA”). Because there is a lot of talk about privacy and cybersecurity, the CEO wants Smartstown,
USA, to be safe, secure, and attractive to both businesses and residents. The organization is
concerned that such a goal is unreasonable, and that this large and innovative project has a high
likelihood of failure. They have spoken with many subject matter experts, both inside and outside of
the organization, and found that there is little consensus regarding an approach to take; each expert
views their area of expertise as being critical to the success of the project and experts are unwilling to
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
compromise. The organization decides to conduct a high-level criticality analysis to identify key
areas of risk, which they can then focus on in more depth.
Process A
The organization develops a working group to brainstorm the project at a high level. This group
consists of experienced urban planners as well as legal, technology, and health/safety representatives.
None of the players have conducted a criticality analysis before, but some have conducted similar
analyses such as project risk analyses, business process analyses, and failure/hazard analyses.
A.1 The group reviews the criticality analysis process in this publication and tailors it to their own
purposes. They define rules of behavior and a time limit for the analysis. Since much is unknown at
this point, they decide that the scope, method of analysis, and participants will be defined separately
at the beginning of each Process (Processes B, C, D, and E). They determine that the scope of the
analysis will be limited to a thought exercise, meaning they will not commit to any specific
technologies or solutions at this point. Once the project begins in earnest, they will review and revise
the analysis to include specific solutions.
Process B
The group decides to perform most of Process B in a two-day workshop with all the working group
participants.
B.1 Prior to the workshop, the working group develops a high-level scope for the analysis based on
input from the CEO and other key stakeholders. The plan will include commercial, living, civic, and
recreational spaces. The smart city concept will utilize different types of electronic data collection
sensors to help manage resources. The group will consider emerging trends such as driverless
vehicles, modular building structures, automated utility management and control, alternative energy
sources, electric vehicles, a large number of interconnected/Internet of Things (IoT) devices, next-
generation optical fibers, high-tech waste management solutions, and other relevant trends.
The group gathers any relevant documents that they feel they may need.
They decide to modify the model described in this publication by combining processes B.2 and B.3.
B.2/B.3 During the workshop, the group brainstorms a list of everything they would like the city to
have. They separate into groups to run through scenarios of the types of lives people might live in
Smartstown, detailing what they would need to be happy. For example, a family with three children
76
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
would need easy access to day care, schools, school buses or other transportation, grocery stores,
clothing outlets, sporting good outlets, after-school activities, dental, medical, urgent care, and
emergency services. The groups review surveys and research conducted on what people want in their
neighborhoods. For example, they find that residents with children place an emphasis on safety,
quality school systems/day care, and a place where children can safely go without the parents. They
review their list and visually link the resources. They find that all the resources rely on access to
transportation.
The workshop participants create a set of workflow paths for each scenario showing what the
residents do on a typical weekday, a typical weekend, on a holiday, and if something bad happens.
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
For example, one workflow path for the family of three may look like this:
The group decides to develop separate workflow paths describing events if one of the children
becomes injured and in the event of adverse weather (e.g., snowstorm or hurricane).
The workshop participants get back together and compare the scenarios they have developed. They
review how the scenarios intersect by asking the question: “At what point might these people cross
paths?” They group activities into categories: travel, work, school, eating, shopping, recreation,
medical/dental, and home-life. The participants find that each scenario includes a significant amount
of traveling, either using public transportation, walking, or driving. During this review period, some
of the groups add or modify their scenarios slightly to include things they forgot or wanted to express
differently.
B.4 On the second day of the workshop, the group again separates into sub-groups and begins
defining operating states. They review each activity and how the rest of the scenario would be
impacted if that activity: (1) did not happen, (2) happened slower than it should, (3) happened in an
unsafe, insecure or privacy-invasive manner, (4) happened quicker than normal, and (5) happened on
time but with an unexpected addition. At the same time, the groups rank the operating states in terms
of severity for the scenario. For example, taking the youngest child to day care:
77
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
(1 - moderate) If the child is not taken to day care, the parents will have to take care of it. One
of them will have to stay home from work or they will need to find a baby sitter.
(2 - moderate) If the child is late to day care, one of the parents may be late to work and as a
result, may be late leaving work. Also, the day care provider may limit the number of times a
child can be late which may eventually result in the parents needing to find a new day care
provider or pay a fine to the current day care for late pickup.
(3 - high) If the child is taken to day care in an unsafe manner (for example, by a parent who
is driving recklessly or the child is not properly restrained in its seat), the child may be
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
seriously injured. For this example, the group developed a scenario where the child arrives at
the day care provider with signs of whiplash. The day care provider recognizes the child is
injured and calls emergency services. The child is taken by ambulance to the hospital, child
protective services arrives to investigate, the parents leave work to go to the hospital, and they
arrange for transportation and childcare for the other two children. Privacy as a concern was
brought up at this time. The group discussed what information related to this situation may
represent a privacy risk, for example the child’s healthcare records, any camera recordings of
the event, and any paper or digital recording of any legal action taken.
(4 - low) If the child arrives at day care early, the facility may not be open yet and so the
parent and child must wait in the parking lot until they open.
(5 – moderate to high) For this example, the group devised a scenario where the child arrives
at day care as planned, but is carrying a germ. The other children and adults in the day care
may catch the germ. If it is something like norovirus, the day care may be shut down for a few
days and will need to be sanitized.
B.5 Once operating states are defined for each activity in each scenario, the groups meet again to
review the results of their analysis. They use the same categories as before and use sticky-notes to put
up the severity rankings developed in B.4. They roughly develop histograms of the severity rankings
for each category and discuss them. As a group, they create baseline criticality levels for each
category. (This is modified from the model described in this publication which recommends
developing criticality levels for each workflow path. This shows one way the model may be adapted.)
It is found that there are a lot of similarities in the operating states for the activities related to travel.
Although the scenarios generally ranked the adverse operating states of travel-related activities as
“moderate,” because of the number of activities relying on travel, the group decided to give the travel
category an overall baseline criticality ranking of “high.” Medical/dental was also ranked “high” as
many scenarios identified adverse operating states related to injury/illness and rated them between
moderate and high.
Process C
Using the information garnered from Process C, the organization conducts system-level analyses.
They decide that they will be performing at least two system-level analyses: one for the transportation
infrastructure, and one for the medical/dental infrastructure. This example will focus on the
transportation infrastructure.
78
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
C-1 The organization develops working groups for each analysis. The transportation working group
is composed of urban planners, legal representatives, transportation experts, automotive vehicle
researchers, and others. Each workshop agrees to a set of rules. They set a time limit of ½ day for
their analyses. Prior to the workshop, the participants are given information from Process B to
review.
C-2 The working group reviews the scenarios developed in Process B. They brainstorm a list of every
transportation-related function and capability needed to support those scenarios. To help with this
process, they ask the questions “Who uses the infrastructure?” and “How is it used?” They use both
the information from Process B as well as their own expert knowledge to answer this question.
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
They decide that the roads should allow for smooth flow of traffic allowing residents a predictable
travel time. There must be infrastructure in place to support newer vehicle types such as electric,
hybrid, and autonomous vehicles. The group decides to plan for the increased use of delivery services
and to ensure that delivery vehicles do not obstruct traffic. Public transportation is heavily used in the
nearby metropolitan area, and so the group decides to support commuters who wish to travel to the
metropolitan area by providing connecting public transportation services. During this brainstorming
exercise, the group roughly prioritizes the functions and criticalities listed.
C-3 The group begins identifying what types of systems might be used to support the functions and
requirements defined in C-2. This process often results in the identification of additional
requirements and functions. They list things such as roads, crosswalks/bridges, gas stations, electric
vehicle charging stations, signage and painting that support automated vehicles, the vehicles
themselves, and the communications systems that allow vehicles to communicate with other systems
(e.g., GPS). They also identify the means to clean the streets and drains to ensure that the signage and
painting remain visible, accessible transportation stations, reliable and fast train or similar system,
reliable bus or tram system, school bus or other transport, support for taxi or other service, parking
(public, delivery, bus, repair, long-term, etc.), bicycle and pedestrian paths/lanes, etc. They identify
some technologies that are futuristic and bring in experts to identify what sort of things those
technologies will need to operate to expand their list.
C-4 The group loosely defines a set of rules for each function/requirement by which one could tell
that the system is operating at peak efficiency. For example, the drive time between point X and point
Y will be 30 to 35 minutes. The group then loosely defines adverse operating states for each function
and requirement defined. They also roughly assign significance levels for the operating states. For
example, in the case GPS functionality:
(1-Low) If GPS does not work in the area, drivers may be unable to reach their destinations
and may create congestion as they drive around trying to find places.
(2-Low-Moderate) If GPS works sporadically or slowly in the area, it may distract or cause
drivers to miss a turn, which may cause them to swerve and potentially cause an accident.
(3-Moderate-High) If GPS in the area is compromised, it could result in the theft of personally
identifiable information (PII) and potentially the modification of GPS data, and aggregation of
travel points could permit the tracking of persons (including high-profile persons and
79
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
children) and could reveal sensitive information, including health information, religious
activity, and other personal habits.
(4-Low) GPS operating more efficiently than needed would waste resources.
(5-Low) If GPS in the area has extraneous information, it could cause confusion.
C-5 The group reviews the operation states of each function/requirement and ranks them in terms of
impact. The group finds that communications between vehicles and the transportation infrastructure
is by far the most impactful element, whether it is the drivers reading road signs or autonomous
vehicles registering an approaching emergency vehicle.
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
Process D
The organization decides to narrow the analysis further to identify critical components of the system.
They tailor this analysis to their organization and to the scope of the analysis. They perform step D-4
prior to step D-3 (for this example, the steps are numbered as in the model, but are rearranged). A
group is formed consisting of experts in the fields of transportation, including urban planners,
automated vehicle researchers, network and vehicle designers/engineers, and cybersecurity and
privacy professionals.
D-1 Because the analysis is limited in scope to theoretical applications without identifying any
specific technology solutions, the working group cannot conduct a thorough analysis of risks in this
area. Non-electronic communication was determined to be out of scope for this analysis. They decide
to have a one-day workshop to collect what they can from a high-level perspective.
D-2 The group begins by identifying all the components that are involved in the concept of
communicating between a vehicle and the infrastructure. They list things such as: the car itself; the
driver; the sensors in a car used to aid the driver; the mechanisms in an automated vehicle used to
process data from sensors; the mechanisms in an automated vehicle to translate that data into
commands which the car will follow; and the electronic communication between the vehicle and the
infrastructure. (e.g., GPS communications or if a stop light notifies cars in the area that it is turning
red. Non-electronic communication is out of scope for this example.)
The group reviews the components listed and identifies how each of them are connected. In some
cases, additional components are included. The group finds that there are several workflow paths
depending on the communication origin, but that all the workflow paths use the same set of processes
to register and interpret the communication.
D-4 The group defines operating states for each component type. For example, for a sensor:
(1-Moderate-High) If a sensor does not function, the vehicle will not register a warning such
as an approaching obstacle and may cause an accident.
(2-Moderate-High) If a sensor is slow, it may have the same results as if it didn’t operate at
all.
80
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
(5-High) If a sensor operates as expected, but has an added feature which allows a malicious
entity to view the information the sensor collects, it could represent a significant privacy
concern.
D-3 The group decides that, because of the scope of this analysis, they cannot reasonably identify the
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
individual components which will be used. Instead, they list the types of components used, such as
“sensor,” “interpreter,” “analyzer,” and “operator.” They create a system diagram showing the
workflow paths as they move through each process and component type.
D-5 The group collects all the various operating states and scenarios to develop baseline criticality
levels for the components. They decide that the sensors and the operator component types are the
most critical as they had the most significant impact in this scope.
Process E
The organization collects all the information that was created in each of the component-level
analyses. They find that, overall, there were five different components that were considered “critical.”
They chose to continue the analysis with these five components. Again, for this analysis, they chose
to tailor the analysis to their needs.
E-1 The organization assigns representatives from each component-level analysis to meet with
representatives from the system-level analysis. They will in turn meet with representatives from the
process-level analysis. They set a time limit for this portion of the analysis.
E-2 The component-level teams review their analysis with the system-level and process-level
representatives. For the communication component group, they review how sensors connect to and
interact with other components in the system, and then other components of the smartcity, including
those identified by the Medical/Dental working group (the other process besides transportation that
was identified as highly critical). They find that sensors play a major role in the transportation system
beyond the scope of their analysis. For example, sensors detecting congestion may activate a traffic
response such as opening an additional lane, increasing tolls, or rerouting vehicles. The group
brainstorms various controls at each level which may help prevent, detect, or respond to a problem.
They review what might happen if the control fails and the likelihood of that happening.
E-3 The component-level teams review their operating states and scenarios with the rest of the group.
They review how the controls identified in E-2 reduce the likelihood of the impact. In certain cases,
they identify areas where they feel the baseline criticality levels don’t represent the levels of impact
or likelihood. For example, when comparing all the critical components, they find that the sensors
which were identified as critical in the transportation process were also found to be critical in the
medical/dental process because the emergency response vehicles are expected to communicate with
the traffic signals and with automated vehicles to allow them safe and speedy passage. In addition,
they use GPS and other communication technologies. It was found that most every process used a
81
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
significant amount of wireless communication, and this might place a strain on the communications
network.
E-4 The group has no threat, vulnerability, or other risk information to apply at this time. However,
they identified a collection of resources to help them obtain this information. This included
documents (e.g. NIST SP 800-30, NISTIR 8062), personnel (e.g. risk specialist), and organizations
(e.g. the local InfraGard chapter).
E-5 The group reviews all the baseline criticality levels, along with their operating states and the
potential controls which may be used. They alter several of the criticality levels to align with the
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
The organization uses this information to begin financing and designing their smart city concept.
They approach the CEO with several design options and explain to him why certain decisions were
made. They approach several potential builders and explain to them what their priorities are. The
builders each have their own opinions on the matter and often the organization must reevaluate the
criticality analysis to ensure that any changes to the design of the city are in alignment with the
criticality analysis and the organization’s priorities.
82
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
Detailed version of high-level criticality process. Please note that this image is split into two parts for ease of printing. For alternate formats
of the entire image, please see the Supplemental Content section of this publication.
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
83
NISTIR 8179 CRITICALITY ANALYSIS PROCESS MODEL:
PRIORITIZING SYSTEMS AND COMPONENTS
This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8179
84