input
stringclasses 1
value | output
stringlengths 45
2.38k
| instruction
stringlengths 30
83
|
---|---|---|
Potential assessment methods and objects for 3.13.6 include:
Examine: System and communications protection policy; procedures addressing boundary protection; system security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records.
Interview: System or network administrators; personnel with information security responsibilities; system developer; personnel with boundary protection responsibilities.
Test: Mechanisms implementing traffic management at managed interfaces. | How is control 3.13.6 assessed? |
|
Determine if: 3.13.6[a] network communications traffic is denied by default; 3.13.6[b] network communications traffic is allowed by exception. | What are the detailed objectives for assessing control 3.13.6? |
|
Security Requirement 3.13.6: Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception). Assessment Objectives: Determine if: 3.13.6[a] network communications traffic is denied by default; 3.13.6[b] network communications traffic is allowed by exception. Potential Assessment Methods and Objects:
Examine: System and communications protection policy; procedures addressing boundary protection; system security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records.
Interview: System or network administrators; personnel with information security responsibilities; system developer; personnel with boundary protection responsibilities.
Test: Mechanisms implementing traffic management at managed interfaces. | What is control 3.13.6 in NIST 800-171A? |
|
Security Requirement 3.13.7: Prevent remote devices from simultaneously establishing non-remote connections with organizational systems and communicating via some other connection to resources in external networks (i.e., split tunneling). | What does control 3.13.7 entail? |
|
Potential assessment methods and objects for 3.13.7 include:
Examine: System and communications protection policy; procedures addressing boundary protection; system security plan; system design documentation; system hardware and software; system architecture; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records.
Interview: System or network administrators; personnel with information security responsibilities; system developer; personnel with boundary protection responsibilities.
Test: Mechanisms implementing boundary protection capability; mechanisms supporting or restricting non-remote connections. | How is control 3.13.7 assessed? |
|
Determine if remote devices are prevented from simultaneously establishing non-remote connections with the system and communicating via some other connection to resources in external networks (i.e., split tunneling). | What are the detailed objectives for assessing control 3.13.7? |
|
Security Requirement 3.13.7: Prevent remote devices from simultaneously establishing non-remote connections with organizational systems and communicating via some other connection to resources in external networks (i.e., split tunneling). Assessment Objectives: Determine if remote devices are prevented from simultaneously establishing non-remote connections with the system and communicating via some other connection to resources in external networks (i.e., split tunneling). Potential Assessment Methods and Objects:
Examine: System and communications protection policy; procedures addressing boundary protection; system security plan; system design documentation; system hardware and software; system architecture; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records.
Interview: System or network administrators; personnel with information security responsibilities; system developer; personnel with boundary protection responsibilities.
Test: Mechanisms implementing boundary protection capability; mechanisms supporting or restricting non-remote connections. | What is control 3.13.7 in NIST 800-171A? |
|
Security Requirement 3.13.8: Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission unless otherwise protected by alternative physical safeguards. | What does control 3.13.8 entail? |
|
Potential assessment methods and objects for 3.13.8 include:
Examine: System and communications protection policy; procedures addressing transmission confidentiality and integrity; system security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records.
Interview: System or network administrators; personnel with information security responsibilities; system developer.
Test: Cryptographic mechanisms or mechanisms supporting or implementing transmission confidentiality; organizational processes for defining and implementing alternative physical safeguards. | How is control 3.13.8 assessed? |
|
Determine if: 3.13.8[a] cryptographic mechanisms intended to prevent unauthorized disclosure of CUI are identified; 3.13.8[b] alternative physical safeguards intended to prevent unauthorized disclosure of CUI are identified; 3.13.8[c] either cryptographic mechanisms or alternative physical safeguards are implemented to prevent unauthorized disclosure of CUI during transmission. | What are the detailed objectives for assessing control 3.13.8? |
|
Security Requirement 3.13.8: Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission unless otherwise protected by alternative physical safeguards. Assessment Objectives: 3.13.8[a] cryptographic mechanisms intended to prevent unauthorized disclosure of CUI are identified; 3.13.8[b] alternative physical safeguards intended to prevent unauthorized disclosure of CUI are identified; 3.13.8[c] either cryptographic mechanisms or alternative physical safeguards are implemented to prevent unauthorized disclosure of CUI during transmission. Potential Assessment Methods and Objects:
Examine: System and communications protection policy; procedures addressing transmission confidentiality and integrity; system security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records.
Interview: System or network administrators; personnel with information security responsibilities; system developer.
Test: Cryptographic mechanisms or mechanisms supporting or implementing transmission confidentiality; organizational processes for defining and implementing alternative physical safeguards. | What is control 3.13.8 in NIST 800-171A? |
|
Security Requirement 3.13.9: Terminate network connections associated with communications sessions at the end of the sessions or after a defined period of inactivity. | What does control 3.13.9 entail? |
|
Potential assessment methods and objects for 3.13.9 include:
Examine: System and communications protection policy; procedures addressing network disconnect; system design documentation; system security plan; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records.
Interview: System or network administrators, personnel with information security responsibilities; system developer.
Test: Mechanisms supporting or implementing network disconnect capability. | How is control 3.13.9 assessed? |
|
Determine if: 3.13.9[a] a period of inactivity to terminate network connections associated with communications sessions is defined. 3.13.9[b] ] network connections associated with communications sessions are terminated at the end of the sessions. 3.13.9[c] ] network connections associated with communications sessions are terminated after the defined period of inactivity. | What are the detailed objectives for assessing control 3.13.9? |
|
Security Requirement 3.13.9: Terminate network connections associated with communications sessions at the end of the sessions or after a defined period of inactivity. Assessment Objectives: Determine if: 3.13.9[a] a period of inactivity to terminate network connections associated with communications sessions is defined. 3.13.9[b] ] network connections associated with communications sessions are terminated at the end of the sessions. 3.13.9[c] ] network connections associated with communications sessions are terminated after the defined period of inactivity. Potential Assessment Methods and Objects:
Examine: System and communications protection policy; procedures addressing network disconnect; system design documentation; system security plan; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records.
Interview: System or network administrators, personnel with information security responsibilities; system developer.
Test: Mechanisms supporting or implementing network disconnect capability. | What is control 3.13.9 in NIST 800-171A? |
|
Security Requirement 3.13.10: Establish and manage cryptographic keys for cryptography employed in organizational systems. | What does control 3.13.10 entail? |
|
Potential assessment methods and objects for 3.13.10 include:
Examine: System and communications protection policy; procedures addressing cryptographic key establishment and management; system security plan; system design documentation; cryptographic mechanisms; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records.
Interview: System or network administrators; personnel with information security responsibilities; personnel with responsibilities for cryptographic key establishment and management.
Test: Mechanisms supporting or implementing cryptographic key establishment and management. | How is control 3.13.10 assessed? |
|
Determine if: 3.13.10[a] cryptographic keys are established and managed whenever cryptography is employed. 3.13.10[b] cryptographic keys are managed whenever cryptography is employed. | What are the detailed objectives for assessing control 3.13.10? |
|
Security Requirement 3.13.10: Establish and manage cryptographic keys for cryptography employed in organizational systems. Assessment Objectives:Determine if: 3.13.10[a] cryptographic keys are established and managed whenever cryptography is employed. 3.13.10[b] cryptographic keys are managed whenever cryptography is employed. Potential Assessment Methods and Objects:
Examine: System and communications protection policy; procedures addressing cryptographic key establishment and management; system security plan; system design documentation; cryptographic mechanisms; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records.
Interview: System or network administrators; personnel with information security responsibilities; personnel with responsibilities for cryptographic key establishment and management.
Test: Mechanisms supporting or implementing cryptographic key establishment and management. | What is control 3.13.10 in NIST 800-171A? |
|
Security Requirement 3.13.11: Employ FIPS-validated cryptography when used to protect the confidentiality of CUI. | What does control 3.13.11 entail? |
|
Potential assessment methods and objects for 3.13.11 include:
Examine: System and communications protection policy; procedures addressing cryptographic protection; system security plan; system design documentation; system configuration settings and associated documentation; cryptographic module validation certificates; list of FIPS-validated cryptographic modules; system audit logs and records; other relevant documents or records.
Interview: System or network administrators, personnel with information security responsibilities, personnel with responsibilities for cryptographic protection.
Test: Mechanisms supporting or implementing cryptographic protection. | How is control 3.13.11 assessed? |
|
Determine if FIPS-validated cryptography is employed to protect the confidentiality of CUI. | What are the detailed objectives for assessing control 3.13.11? |
|
Security Requirement 3.13.11: Employ FIPS-validated cryptography to protect the confidentiality of CUI. Assessment Objectives: Determine if FIPS-validated cryptography is employed to protect the confidentiality of CUI. Potential Assessment Methods and Objects:
Examine: System and communications protection policy; procedures addressing cryptographic protection; system security plan; system design documentation; system configuration settings and associated documentation; cryptographic module validation certificates; list of FIPS-validated cryptographic modules; system audit logs and records; other relevant documents or records.
Interview: System or network administrators, personnel with information security responsibilities, personnel with responsibilities for cryptographic protection.
Test: Mechanisms supporting or implementing cryptographic protection. | What is control 3.13.11 in NIST 800-171A? |
|
Security Requirement 3.13.12: Prohibit remote activation of collaborative computing devices and provide indication of devices in use to users present at the device. | What does control 3.13.12 entail? |
|
Potential assessment methods and objects for 3.13.12 include:
Examine: System and communications protection policy; procedures addressing collaborative computing; access control policy and procedures; system security plan; system design documentation; system audit logs and records; system configuration settings and associated documentation; other relevant documents or records.
Interview: System or network administrators; personnel with information security responsibilities; system developer; personnel with responsibilities for managing collaborative computing devices.
Test: Mechanisms supporting or implementing management of remote activation of collaborative computing devices; mechanisms providing an indication of use of collaborative computing devices. | How is control 3.13.12 assessed? |
|
Determine if: 3.13.12[a] collaborative computing devices are identified; 3.13.12[b] collaborative computing devices provide indication to users of devices in use; 3.13.12[c] remote activation of collaborative computing devices is prohibited. | What are the detailed objectives for assessing control 3.13.12? |
|
Security Requirement 3.13.12: Prohibit remote activation of collaborative computing devices and provide indication of devices in use to users present at the device. Assessment Objectives: Determine if: 3.13.12[a] collaborative computing devices are identified; 3.13.12[b] collaborative computing devices provide indication to users of devices in use; 3.13.12[c] remote activation of collaborative computing devices is prohibited. Potential Assessment Methods and Objects:
Examine: System and communications protection policy; procedures addressing collaborative computing; access control policy and procedures; system security plan; system design documentation; system audit logs and records; system configuration settings and associated documentation; other relevant documents or records.
Interview: System or network administrators; personnel with information security responsibilities; system developer; personnel with responsibilities for managing collaborative computing devices.
Test: Mechanisms supporting or implementing management of remote activation of collaborative computing devices; mechanisms providing an indication of use of collaborative computing devices. | What is control 3.13.12 in NIST 800-171A? |
|
Security Requirement 3.13.13: Control and monitor the use of mobile code. | What does control 3.13.13 entail? |
|
Potential assessment methods and objects for 3.13.13 include:
Examine: System and communications protection policy; procedures addressing mobile code; mobile code usage restrictions, mobile code implementation policy and procedures; system audit logs and records; system security plan; list of acceptable mobile code and mobile code technologies; list of unacceptable mobile code and mobile technologies; authorization records; system monitoring records; system audit logs and records; other relevant documents or records.
Interview: System or network administrators, personnel with responsibilities for managing mobile code.
Test: Organizational process for controlling, authorizing, monitoring, and restricting mobile code; mechanisms supporting the management and monitoring of mobile code. | How is control 3.13.13 assessed? |
|
Determine if: 3.13.13[a] use of mobile code is controlled; 3.13.13[b] use of mobile code is monitored. | What are the detailed objectives for assessing control 3.13.13? |
|
Security Requirement 3.13.13: Control and monitor the use of mobile code. Assessment Objectives: Determine if: 3.13.13[a] use of mobile code is controlled; 3.13.13[b] use of mobile code is monitored. Potential Assessment Methods and Objects:
Examine: System and communications protection policy; procedures addressing mobile code; mobile code usage restrictions, mobile code implementation policy and procedures; system audit logs and records; system security plan; list of acceptable mobile code and mobile code technologies; list of unacceptable mobile code and mobile technologies; authorization records; system monitoring records; system audit logs and records; other relevant documents or records.
Interview: System or network administrators, personnel with responsibilities for managing mobile code.
Test: Organizational process for controlling, authorizing, monitoring, and restricting mobile code; mechanisms supporting the management and monitoring of mobile code. | What is control 3.13.13 in NIST 800-171A? |
|
Security Requirement 3.13.14: Control and monitor the use of Voice over Internet Protocol (VoIP) technologies. | What does control 3.13.14 entail? |
|
Potential assessment methods and objects for 3.13.14 include:
Examine:System and communications protection policy; procedures addressing VoIP; VoIP usage restrictions; VoIP implementation guidance; system security plan; system design documentation; system audit logs and records; system configuration settings and associated documentation; system monitoring records; other relevant documents or records.
Interview: System or network administrators, personnel with responsibilities for managing VoIP.
Test: Organizational process for authorizing, monitoring, and controlling VoIP; mechanisms supporting or implementing authorizing, monitoring, and controlling VoIP. | How is control 3.13.14 assessed? |
|
Determine if: 3.13.14[a] use of Voice over Internet Protocol (VoIP) technologies is controlled. 3.13.14[b] use of Voice over Internet Protocol (VoIP) technologies is monitored. | What are the detailed objectives for assessing control 3.13.14? |
|
Security Requirement 3.13.14: Control and monitor the use of Voice over Internet Protocol (VoIP) technologies. Assessment Objectives: Determine if: 3.13.14[a] use of Voice over Internet Protocol (VoIP) technologies is controlled. 3.13.14[b] use of Voice over Internet Protocol (VoIP) technologies is monitored. Potential Assessment Methods and Objects:
Examine:System and communications protection policy; procedures addressing VoIP; VoIP usage restrictions; VoIP implementation guidance; system security plan; system design documentation; system audit logs and records; system configuration settings and associated documentation; system monitoring records; other relevant documents or records.
Interview: System or network administrators, personnel with responsibilities for managing VoIP.
Test: Organizational process for authorizing, monitoring, and controlling VoIP; mechanisms supporting or implementing authorizing, monitoring, and controlling VoIP. | What is control 3.13.14 in NIST 800-171A? |
|
Security Requirement 3.13.15: Protect the authenticity of communications sessions. | What does control 3.13.15 entail? |
|
Potential assessment methods and objects for 3.13.15 include:
Examine: System and communications protection policy; procedures addressing session authenticity; system security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records.
Interview: System or network administrators, personnel with information security responsibilities.
Test: Mechanisms supporting or implementing session authenticity. | How is control 3.13.15 assessed? |
|
Determine if the authenticity of communications sessions is protected. | What are the detailed objectives for assessing control 3.13.15? |
|
Security Requirement 3.13.15: Protect the authenticity of communications sessions. Assessment Objectives: Determine if the authenticity of communications sessions is protected. Potential Assessment Methods and Objects:
Examine: System and communications protection policy; procedures addressing session authenticity; system security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records.
Interview: System or network administrators, personnel with information security responsibilities.
Test: Mechanisms supporting or implementing session authenticity. | What is control 3.13.15 in NIST 800-171A? |
|
Security Requirement 3.13.16: Protect the confidentiality of CUI at rest. | What does control 3.13.16 entail? |
|
Examine: System and communications protection policy; procedures addressing protection of information at rest; system security plan; system design documentation; list of information at rest requiring confidentiality protections; system configuration settings and associated documentation; cryptographic mechanisms and associated configuration documentation; other relevant documents or records.
Interview: System or network administrators, personnel with information security responsibilities, system developers.
Test: Mechanisms supporting or implementing confidentiality protections for information at rest. | How is control 3.13.16 assessed? |
|
Determine if the confidentiality of CUI at rest is protected. | What are the detailed objectives for assessing control 3.13.16? |
|
Security Requirement 3.13.16: Protect the confidentiality of CUI at rest. ASSESSMENT OBJECTIVE Determine if the confidentiality of CUI at rest is protected. POTENTIAL ASSESSMENT METHODS AND OBJECTS
Examine: System and communications protection policy; procedures addressing protection of information at rest; system security plan; system design documentation; list of information at rest requiring confidentiality protections; system configuration settings and associated documentation; cryptographic mechanisms and associated configuration documentation; other relevant documents or records.
Interview: System or network administrators, personnel with information security responsibilities, system developers.
Test: Mechanisms supporting or implementing confidentiality protections for information at rest. | What is control 3.13.16 in NIST 800-171A? |
|
Security Requirement 3.14.1: Identify, report, and correct system flaws in a timely manner. | What does control 3.14.1 entail? |
|
Potential assessment methods and objects for 3.14.1 include:
Examine: System and information integrity policy; procedures addressing flaw remediation; procedures addressing configuration management; system security plan; list of flaws and vulnerabilities potentially affecting the system; list of recent security flaw remediation actions performed on the system (e.g., list of installed patches, service packs, hot fixes, and other software updates to correct system flaws); test results from the installation of software and firmware updates to correct system flaws; installation/change control records for security-relevant software and firmware updates; other relevant documents or records.
Interview: System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility for flaw remediation; personnel with configuration management responsibility.
Test: Organizational processes for identifying, reporting, and correcting system flaws; organizational process for installing software and firmware updates; mechanisms supporting or implementing reporting, and correcting system flaws; mechanisms supporting or implementing testing software and firmware updates. | How is control 3.14.1 assessed? |
|
Determine if: 3.14.1[a] the time to identify system flaws is specified; 3.14.1[b] system flaws are identified within the specified time frame; 3.14.1[c] the time to report system flaws is specified; 3.14.1[d] system flaws are reported within the specified time frame; 3.14.1[e] the time to correct system flaws is specified; 3.14.1[f] system flaws are corrected within the specified time frame. | What are the detailed objectives for assessing control 3.14.1? |
|
Security Requirement 3.14.1: Identify, report, and correct system flaws in a timely manner. Assessment Objectives: Determine if: 3.14.1[a] the time to identify system flaws is specified; 3.14.1[b] system flaws are identified within the specified time frame; 3.14.1[c] the time to report system flaws is specified; 3.14.1[d] system flaws are reported within the specified time frame; 3.14.1[e] the time to correct system flaws is specified; 3.14.1[f] system flaws are corrected within the specified time frame. Potential Assessment Methods and Objects:
Examine: System and information integrity policy; procedures addressing flaw remediation; procedures addressing configuration management; system security plan; list of flaws and vulnerabilities potentially affecting the system; list of recent security flaw remediation actions performed on the system (e.g., list of installed patches, service packs, hot fixes, and other software updates to correct system flaws); test results from the installation of software and firmware updates to correct system flaws; installation/change control records for security-relevant software and firmware updates; other relevant documents or records.
Interview: System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility for flaw remediation; personnel with configuration management responsibility.
Test: Organizational processes for identifying, reporting, and correcting system flaws; organizational process for installing software and firmware updates; mechanisms supporting or implementing reporting, and correcting system flaws; mechanisms supporting or implementing testing software and firmware updates. | What is control 3.14.1 in NIST 800-171A? |
|
Security Requirement 3.14.2: Provide protection from malicious code at designated locations within organizational systems. | What does control 3.14.2 entail? |
|
Potential assessment methods and objects for 3.14.2 include:
Examine: System and information integrity policy; configuration management policy and procedures; procedures addressing malicious code protection; records of malicious code protection updates; malicious code protection mechanisms; system security plan; system configuration settings and associated documentation; record of actions initiated by malicious code protection mechanisms in response to malicious code detection; scan results from malicious code protection mechanisms; system design documentation; system audit logs and records; other relevant documents or records.
Interview: System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility for malicious code protection; personnel with configuration management responsibility.
Test: Organizational processes for employing, updating, and configuring malicious code protection mechanisms; organizational process for addressing false positives and resulting potential impact; mechanisms supporting or implementing employing, updating, and configuring malicious code protection mechanisms; mechanisms supporting or implementing malicious code scanning and subsequent actions. | How is control 3.14.2 assessed? |
|
Determine if: 3.14.2[a] designated locations for malicious code protection are identified; 3.14.2[b] protection from malicious code at designated locations is provided. | What are the detailed objectives for assessing control 3.14.2? |
|
Security Requirement 3.14.2: Provide protection from malicious code at designated locations within organizational systems. Assessment Objectives:Determine if: 3.14.2[a] designated locations for malicious code protection are identified; 3.14.2[b] protection from malicious code at designated locations is provided. Potential Assessment Methods and Objects:
Examine: System and information integrity policy; configuration management policy and procedures; procedures addressing malicious code protection; records of malicious code protection updates; malicious code protection mechanisms; system security plan; system configuration settings and associated documentation; record of actions initiated by malicious code protection mechanisms in response to malicious code detection; scan results from malicious code protection mechanisms; system design documentation; system audit logs and records; other relevant documents or records.
Interview: System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility for malicious code protection; personnel with configuration management responsibility.
Test: Organizational processes for employing, updating, and configuring malicious code protection mechanisms; organizational process for addressing false positives and resulting potential impact; mechanisms supporting or implementing employing, updating, and configuring malicious code protection mechanisms; mechanisms supporting or implementing malicious code scanning and subsequent actions. | What is control 3.14.2 in NIST 800-171A? |
|
Security Requirement 3.14.3: Monitor system security alerts and advisories and take action in response. | What does control 3.14.3 entail? |
|
Potential assessment methods and objects for 3.14.3 include:
Examine: System and information integrity policy; procedures addressing security alerts, advisories, and directives; system security plan; records of security alerts and advisories; other relevant documents or records
Interview: Personnel with security alert and advisory responsibilities; personnel implementing, operating, maintaining, and using the system; personnel, organizational elements, and external organizations to whom alerts, advisories, and directives are to be disseminated; system or network administrators; personnel with information security responsibilities
Test: Organizational processes for defining, receiving, generating, disseminating, and complying with security alerts, advisories, and directives; mechanisms supporting or implementing definition, receipt, generation, and dissemination of security alerts, advisories, and directives; mechanisms supporting or implementing security directives. | How is control 3.14.3 assessed? |
|
Determine if: 3.14.3[a] response actions to system security alerts and advisories are identified; 3.14.3[b] system security alerts and advisories are monitored; 3.14.3[c] actions in response to system security alerts and advisories are taken. | What are the detailed objectives for assessing control 3.14.3? |
|
Security Requirement 3.14.3: Monitor system security alerts and advisories and take action in response. Assessment Objectives:Determine if: 3.14.3[a] response actions to system security alerts and advisories are identified; 3.14.3[b] system security alerts and advisories are monitored; 3.14.3[c] actions in response to system security alerts and advisories are taken. Potential Assessment Methods and Objects:
Examine: System and information integrity policy; procedures addressing security alerts, advisories, and directives; system security plan; records of security alerts and advisories; other relevant documents or records
Interview: Personnel with security alert and advisory responsibilities; personnel implementing, operating, maintaining, and using the system; personnel, organizational elements, and external organizations to whom alerts, advisories, and directives are to be disseminated; system or network administrators; personnel with information security responsibilities
Test: Organizational processes for defining, receiving, generating, disseminating, and complying with security alerts, advisories, and directives; mechanisms supporting or implementing definition, receipt, generation, and dissemination of security alerts, advisories, and directives; mechanisms supporting or implementing security directives. | What is control 3.14.3 in NIST 800-171A? |
|
Security Requirement 3.14.4: Update malicious code protection mechanisms when new releases are available. | What does control 3.14.4 entail? |
|
Potential assessment methods and objects for 3.14.4 include:
Examine: System and information integrity policy; configuration management policy and procedures; procedures addressing malicious code protection; malicious code protection mechanisms; records of malicious code protection updates; system security plan; system design documentation; system configuration settings and associated documentation; scan results from malicious code protection mechanisms; record of actions initiated by malicious code protection mechanisms in response to malicious code detection; system audit logs and records; other relevant documents or records.
Interview: System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility for malicious code protection; personnel with configuration management responsibility | How is control 3.14.4 assessed? |
|
Determine if malicious code protection mechanisms are updated when new releases are available. | What are the detailed objectives for assessing control 3.14.4? |
|
Security Requirement 3.14.4: Update malicious code protection mechanisms when new releases are available. Assessment Objectives: Ensure updates to malicious code protection mechanisms are applied as needed. Potential Assessment Methods and Objects:
Examine: System and information integrity policy; configuration management policy and procedures; procedures addressing malicious code protection; malicious code protection mechanisms; records of malicious code protection updates; system security plan; system design documentation; system configuration settings and associated documentation; scan results from malicious code protection mechanisms; record of actions initiated by malicious code protection mechanisms in response to malicious code detection; system audit logs and records; other relevant documents or records.
Interview: System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility for malicious code protection; personnel with configuration management responsibility | What is control 3.14.4 in NIST 800-171A? |
|
Security Requirement 3.14.5: Perform periodic scans of organizational systems and real-time scans of files from external sources as files are downloaded, opened, or executed. | What does control 3.14.5 entail? |
|
Potential assessment methods and objects for 3.14.5 include:
Examine: System and information integrity policy; configuration management policy and procedures; procedures addressing malicious code protection; malicious code protection mechanisms; records of malicious code protection updates; system security plan; system design documentation; system configuration settings and associated documentation; scan results from malicious code protection mechanisms; record of actions initiated by malicious code protection mechanisms in response to malicious code detection; system audit logs and records; other relevant documents or records.
Interview: System or network administrators, personnel responsible for malicious code protection, personnel with configuration management responsibility.
Test: Organizational processes for employing, updating, and configuring malicious code protection mechanisms; organizational process for addressing false positives and resulting potential impact; mechanisms supporting or implementing malicious code protection mechanisms (including updates and configurations); mechanisms supporting or implementing malicious code scanning and subsequent actions. | How is control 3.14.5 assessed? |
|
Determine if: 3.14.5[a] the frequency for malicious code scans is defined; 3.14.5[b] malicious code scans are performed with the defined frequency; 3.14.5[c] real-time malicious code scans of files from external sources as files are downloaded, opened, or executed are performed. | What are the detailed objectives for assessing control 3.14.5? |
|
Security Requirement 3.14.5: Perform periodic scans of organizational systems and real-time scans of files from external sources as files are downloaded, opened, or executed. Assessment Objectives:Determine if: 3.14.5[a] the frequency for malicious code scans is defined; 3.14.5[b] malicious code scans are performed with the defined frequency; 3.14.5[c] real-time malicious code scans of files from external sources as files are downloaded, opened, or executed are performed. Potential Assessment Methods and Objects:
Examine: System and information integrity policy; configuration management policy and procedures; procedures addressing malicious code protection; malicious code protection mechanisms; records of malicious code protection updates; system security plan; system design documentation; system configuration settings and associated documentation; scan results from malicious code protection mechanisms; record of actions initiated by malicious code protection mechanisms in response to malicious code detection; system audit logs and records; other relevant documents or records.
Interview: System or network administrators, personnel responsible for malicious code protection, personnel with configuration management responsibility.
Test: Organizational processes for employing, updating, and configuring malicious code protection mechanisms; organizational process for addressing false positives and resulting potential impact; mechanisms supporting or implementing malicious code protection mechanisms (including updates and configurations); mechanisms supporting or implementing malicious code scanning and subsequent actions. | What is control 3.14.5 in NIST 800-171A? |
|
Security Requirement 3.14.6: Monitor organizational systems, including inbound and outbound communications traffic, to detect attacks and indicators of potential attacks. | What does control 3.14.6 entail? |
|
Potential assessment methods and objects for 3.14.6 include:
Examine: System and information integrity policy; procedures addressing system monitoring tools and techniques; continuous monitoring strategy; system and information integrity policy; procedures addressing system monitoring tools and techniques; facility diagram or layout; system security plan; system monitoring tools and techniques documentation; system design documentation; locations within system where monitoring devices are deployed; system protocols; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records.
Interview:System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility monitoring the system; personnel with responsibility for the intrusion detection system.
Test: Organizational processes for system monitoring; mechanisms supporting orimplementing intrusion detection capability and system monitoring; mechanisms supporting or implementing system monitoring capability; organizational processes for intrusion detection and system monitoring; mechanisms supporting or implementing the monitoring of inbound and outbound communications traffic. | How is control 3.14.6 assessed? |
|
Determine if: 3.14.6[a] the system is monitored to detect attacks and indicators of potential attacks; 3.14.6[b] inbound communications traffic is monitored to detect attacks and indicators of potential attacks; 3.14.6[c] outbound communications traffic is monitored to detect attacks and indicators of potential attacks. | What are the detailed objectives for assessing control 3.14.6? |
|
Security Requirement 3.14.6: Monitor organizational systems, including inbound and outbound communications traffic, to detect attacks and indicators of potential attacks. Assessment Objectives: Determine if: 3.14.6[a] the system is monitored to detect attacks and indicators of potential attacks; 3.14.6[b] inbound communications traffic is monitored to detect attacks and indicators of potential attacks; 3.14.6[c] outbound communications traffic is monitored to detect attacks and indicators of potential attacks.
Examine System and information integrity policy; procedures addressing system monitoring tools and techniques; continuous monitoring strategy; system and information integrity policy; procedures addressing system monitoring tools and techniques; facility diagram or layout; system security plan; system monitoring tools and techniques documentation; system design documentation; locations within system where monitoring devices are deployed; system protocols; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records
Interview System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility monitoring the system; personnel with responsibility for the intrusion detection system
Test Organizational processes for system monitoring; mechanisms supporting or implementing intrusion detection capability and system monitoring; mechanisms supporting or implementing system monitoring capability; organizational processes for intrusion detection and system monitoring; mechanisms supporting or implementing the monitoring of inbound and outbound communications traffic. | What is control 3.14.6 in NIST 800-171A? |
|
Security Requirement 3.14.7: Identify unauthorized use of organizational systems. | What does control 3.14.7 entail? |
|
Potential assessment methods and objects for 3.14.7 include:
Examine: Continuous monitoring strategy, system and information integrity policy, system monitoring tools and techniques, system security plan, system design documentation.
Interview: System or network administrators, personnel with information security responsibilities, personnel responsible for monitoring the system.
Test: Organizational processes for system monitoring; mechanisms supporting or implementing system monitoring capability. | How is control 3.14.7 assessed? |
|
Determine if: 3.14.7[a] authorized use of the system is defined; 3.14.7[b] unauthorized use of the system is identified. | What are the detailed objectives for assessing control 3.14.7? |
|
Security Requirement 3.14.7: Identify unauthorized use of organizational systems. Assessment Objectives: Determine if: 3.14.7[a] authorized use of the system is defined; 3.14.7[b] unauthorized use of the system is identified. Potential Assessment Methods and Objects:
Examine Continuous monitoring strategy; system and information integrity policy; procedures addressing system monitoring tools and techniques; facility diagram/layout; system security plan; system design documentation; system monitoring tools and techniques documentation; locations within system where monitoring devices are deployed; system configuration settings and associated documentation; other relevant documents or records.
Interview System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility for monitoring the system.
Test Organizational processes for system monitoring; mechanisms supporting or implementing system monitoring capability. | What is control 3.14.7 in NIST 800-171A? |
|
There are 110 total controls in NIST 800-171A. | How many controls are there in NIST 800-171A? |