input
stringclasses 1
value | output
stringlengths 45
2.38k
| instruction
stringlengths 30
83
|
---|---|---|
Potential assessment methods and objects for 3.4.9 include:
Examine: Configuration management policy; procedures addressing user installed software; configuration management plan; system security plan; system design documentation; system configuration settings and associated documentation; list of rules governing user-installed software; system monitoring records; system audit logs and records; continuous monitoring strategy; other relevant documents or records.
Interview: Personnel with responsibilities for governing user-installed software; personnel operating, using, or maintaining the system; personnel monitoring compliance with user-installed software policy; personnel with information security responsibilities; system or network administrators.
Test: Organizational processes governing user-installed software on the system; mechanisms enforcing rules or methods for governing the installation of software by users; mechanisms monitoring policy compliance. | How is control 3.4.9 assessed? |
|
Determine if: 3.4.9[a] a policy for controlling the installation of software by users is established. 3.4.9[b] installation of software by users is controlled based on the established policy. 3.4.9[c] installation of software by users is monitored. | What are the detailed objectives for assessing control 3.4.9? |
|
Security Requirement 3.4.9: Control and monitor user-installed software. Assessment Objectives: Determine if: 3.4.9[a] a policy for controlling the installation of software by users is established. 3.4.9[b] installation of software by users is controlled based on the established policy. 3.4.9[c] installation of software by users is monitored. Potential Assessment Methods and Objects:
Examine: Configuration management policy; procedures addressing user installed software; configuration management plan; system security plan; system design documentation; system configuration settings and associated documentation; list of rules governing user-installed software; system monitoring records; system audit logs and records; continuous monitoring strategy; other relevant documents or records.
Interview: Personnel with responsibilities for governing user-installed software; personnel operating, using, or maintaining the system; personnel monitoring compliance with user-installed software policy; personnel with information security responsibilities; system or network administrators.
Test: Organizational processes governing user-installed software on the system; mechanisms enforcing rules or methods for governing the installation of software by users; mechanisms monitoring policy compliance. | What is control 3.4.9 in NIST 800-171A? |
|
Security Requirement 3.5.1: Identify information system users, processes acting on behalf of users, or devices. | What does control 3.5.1 entail? |
|
Potential assessment methods and objects for 3.5.1 include:
Examine: Identification and authentication policy; procedures addressing user identification and authentication; system security plan, system design documentation; system configuration settings and associated documentation; system audit logs and records; list of system accounts; other relevant documents or records.
Interview: Personnel with system operations responsibilities; personnel with information security responsibilities; system or network administrators; personnel with account management responsibilities; system developers.
Test: MOrganizational processes for uniquely identifying and authenticating users; mechanisms supporting or implementing identification and authentication capability. | How is control 3.5.1 assessed? |
|
Determine if: 3.5.1[a] Information system users are identified. 3.5.1[b] Processes acting on behalf of users are identified. 3.5.1[c] devices accessing the system are identified. | What are the detailed objectives for assessing control 3.5.1? |
|
Security Requirement 3.5.1: Identify information system users, processes acting on behalf of users, or devices. Assessment Objectives: 3.5.1[a] Information system users are identified. 3.5.1[b] Processes acting on behalf of users are identified. 3.5.1[c] devices accessing the system are identified. Potential Assessment Methods and Objects:
Examine: Identification and authentication policy; procedures addressing user identification and authentication; system security plan, system design documentation; system configuration settings and associated documentation; system audit logs and records; list of system accounts; other relevant documents or records.
Interview: Personnel with system operations responsibilities; personnel with information security responsibilities; system or network administrators; personnel with account management responsibilities; system developers.
Test: MOrganizational processes for uniquely identifying and authenticating users; mechanisms supporting or implementing identification and authentication capability. | What is control 3.5.1 in NIST 800-171A? |
|
Security Requirement 3.5.2: Authenticate (or verify) the identities of those users, processes, or devices as a prerequisite to allowing access to organizational information systems. | What does control 3.5.2 entail? |
|
Potential assessment methods and objects for 3.5.2 include:
Examine: Identification and authentication policy; system security plan; procedures addressing authenticator management; procedures addressing user identification and authentication; system design documentation; list of system authenticator types; system configuration settings and associated documentation; change control records associated with managing system authenticators; system audit logs and records; other relevant documents or records.
Interview: Personnel with authenticator management responsibilities; personnel with information security responsibilities; system or network administrators.
Test: Mechanisms supporting or implementing authenticator management capability. | How is control 3.5.2 assessed? |
|
Determine if: 3.5.2[a] the identity of each user is authenticated or verified as a prerequisite to system access. 3.5.2[b] the identity of each process acting on behalf of a user is authenticated or verified as a prerequisite to system access. 3.5.2[c] the identity of each device accessing or connecting to the system is authenticated or verified as a prerequisite to system access. | What are the detailed objectives for assessing control 3.5.2? |
|
Security Requirement 3.5.2: Authenticate (or verify) the identities of those users, processes, or devices as a prerequisite to allowing access to organizational information systems. Assessment Objectives: Determine if: 3.5.2[a] the identity of each user is authenticated or verified as a prerequisite to system access. 3.5.2[b] the identity of each process acting on behalf of a user is authenticated or verified as a prerequisite to system access. 3.5.2[c] the identity of each device accessing or connecting to the system is authenticated or verified as a prerequisite to system access. Potential Assessment Methods and Objects:
Examine: Identification and authentication policy; system security plan; procedures addressing authenticator management; procedures addressing user identification and authentication; system design documentation; list of system authenticator types; system configuration settings and associated documentation; change control records associated with managing system authenticators; system audit logs and records; other relevant documents or records.
Interview: Personnel with authenticator management responsibilities; personnel with information security responsibilities; system or network administrators.
Test: Mechanisms supporting or implementing authenticator management capability. | What is control 3.5.2 in NIST 800-171A? |
|
Security Requirement 3.5.3: Use multifactor authentication for local and network access to privileged accounts and for network access to non-privileged accounts. | What does control 3.5.3 entail? |
|
Potential assessment methods and objects for 3.5.3 include:
Examine: Identification and authentication policy; procedures addressing user identification and authentication; system security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; list of system accounts; other relevant documents or records.
Interview: Personnel with system operations responsibilities; personnel with account management responsibilities; personnel with information security responsibilities; system or network administrators; system developers.
Test: Mechanisms supporting or implementing multifactor authentication capability. | How is control 3.5.3 assessed? |
|
Determine if: 3.5.3[a] privileged accounts are identified. 3.5.3[b] multifactor authentication is implemented for local access to privileged accounts. 3.5.3[c] multifactor authentication is implemented for network access to privileged accounts. 3.5.3[d] multifactor authentication is implemented for network access to non-privileged accounts. | What are the detailed objectives for assessing control 3.5.3? |
|
Security Requirement 3.5.3: Use multifactor authentication for local and network access to privileged accounts and for network access to non-privileged accounts. Assessment Objectives: Determine if: 3.5.3[a] privileged accounts are identified. 3.5.3[b] multifactor authentication is implemented for local access to privileged accounts. 3.5.3[c] multifactor authentication is implemented for network access to privileged accounts. 3.5.3[d] multifactor authentication is implemented for network access to non-privileged accounts. Potential Assessment Methods and Objects:
Examine: Identification and authentication policy; procedures addressing user identification and authentication; system security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; list of system accounts; other relevant documents or records.
Interview: Personnel with system operations responsibilities; personnel with account management responsibilities; personnel with information security responsibilities; system or network administrators; system developers.
Test: Mechanisms supporting or implementing multifactor authentication capability. | What is control 3.5.3 in NIST 800-171A? |
|
Security Requirement 3.5.4: Employ replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts. | What does control 3.5.4 entail? |
|
Potential assessment methods and objects for 3.5.4 include:
Examine: Identification and authentication policy; procedures addressing user identification and authentication; system security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; list of privileged system accounts; other relevant documents or records.
Interview: Personnel with system operations responsibilities; personnel with account management responsibilities; personnel with information security responsibilities; system or network administrators; system developers.
Test: Mechanisms supporting or implementing identification and authentication capability or replay resistant authentication mechanisms. | How is control 3.5.4 assessed? |
|
Determine if: Determine if replay-resistant authentication mechanisms are implemented for network account access to privileged and non-privileged accounts. | What are the detailed objectives for assessing control 3.5.4? |
|
Security Requirement 3.5.4: Employ replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts. Assessment Objectives: Determine if: Determine if replay-resistant authentication mechanisms are implemented for network account access to privileged and non-privileged accounts. Potential Assessment Methods and Objects:
Examine: Identification and authentication policy; procedures addressing user identification and authentication; system security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; list of privileged system accounts; other relevant documents or records.
Interview: Personnel with system operations responsibilities; personnel with account management responsibilities; personnel with information security responsibilities; system or network administrators; system developers.
Test: Mechanisms supporting or implementing identification and authentication capability or replay resistant authentication mechanisms. | What is control 3.5.4 in NIST 800-171A? |
|
Security Requirement 3.5.5: Prevent reuse of identifiers for a defined period. | What does control 3.5.5 entail? |
|
Potential assessment methods and objects for 3.5.5 include:
Examine: Identification and authentication policy; procedures addressing identifier management; procedures addressing account management; system security plan; system design documentation; system configuration settings and associated documentation; list of system accounts; list of identifiers generated from physical access control devices; other relevant documents or records.
Interview: Personnel with identifier management responsibilities; personnel with information security responsibilities; system or network administrators; system developers.
Test: Mechanisms supporting or implementing identifier management. | How is control 3.5.5 assessed? |
|
Determine if: 3.5.5[a] a period within which identifiers cannot be reused is defined. 3.5.5[b] reuse of identifiers is prevented within the defined period. | What are the detailed objectives for assessing control 3.5.5? |
|
Security Requirement 3.5.5: Prevent reuse of identifiers for a defined period. Assessment Objectives: Determine if: 3.5.5[a] a period within which identifiers cannot be reused is defined. 3.5.5[b] reuse of identifiers is prevented within the defined period. Potential Assessment Methods and Objects:
Examine: Identification and authentication policy; procedures addressing identifier management; procedures addressing account management; system security plan; system design documentation; system configuration settings and associated documentation; list of system accounts; list of identifiers generated from physical access control devices; other relevant documents or records.
Interview: Personnel with identifier management responsibilities; personnel with information security responsibilities; system or network administrators; system developers.
Test: Mechanisms supporting or implementing identifier management. | What is control 3.5.5 in NIST 800-171A? |
|
Security Requirement 3.5.6: Disable identifiers after a defined period of inactivity. | What does control 3.5.6 entail? |
|
Potential assessment methods and objects for 3.5.6 include:
Examine:Identification and authentication policy; procedures addressing identifier management; procedures addressing account management; system security plan; system design documentation; system configuration settings and associated documentation; list of system accounts; list of identifiers generated from physical access control devices; other relevant documents or records.
Interview: Personnel with identifier management responsibilities; personnel with information security responsibilities; system or network administrators; system developers.
Test: Mechanisms supporting or implementing identifier management. | How is control 3.5.6 assessed? |
|
Determine if: 3.5.6[a] a period of inactivity after which an identifier is disabled is defined.3.5.6[b] identifiers are disabled after the defined period of inactivity. | What are the detailed objectives for assessing control 3.5.6? |
|
Security Requirement 3.5.6: Disable identifiers after a defined period of inactivity. Assessment Objectives: Determine if: 3.5.6[a] a period of inactivity after which an identifier is disabled is defined.3.5.6[b] identifiers are disabled after the defined period of inactivity. Potential Assessment Methods and Objects:
Examine:Identification and authentication policy; procedures addressing identifier management; procedures addressing account management; system security plan; system design documentation; system configuration settings and associated documentation; list of system accounts; list of identifiers generated from physical access control devices; other relevant documents or records.
Interview: Personnel with identifier management responsibilities; personnel with information security responsibilities; system or network administrators; system developers.
Test: Mechanisms supporting or implementing identifier management. | What is control 3.5.6 in NIST 800-171A? |
|
Security Requirement 3.5.7: Enforce a minimum password complexity and change of characters when new passwords are created. | What does control 3.5.7 entail? |
|
Potential assessment methods and objects for 3.5.7 include:
Examine: Identification and authentication policy; password policy; procedures addressing authenticator management; system security plan; system configuration settings and associated documentation; system design documentation; password configurations and associated documentation; other relevant documents or records.
Interview: Personnel with authenticator management responsibilities; personnel with information security responsibilities; system or network administrators; system developers.
Test: Mechanisms supporting or implementing password-based authenticator management capability. | How is control 3.5.7 assessed? |
|
Determine if: 3.5.7[a] password complexity requirements are defined. 3.5.7[b] password change of character requirements are defined. 3.5.7[c] minimum password complexity requirements as defined are enforced when new passwords are created. 3.5.7[d] minimum password change of character requirements as defined are enforced when new passwords are created. | What are the detailed objectives for assessing control 3.5.7? |
|
Security Requirement 3.5.7: Enforce a minimum password complexity and change of characters when new passwords are created. Assessment Objectives: Determine if: 3.5.7[a] password complexity requirements are defined. 3.5.7[b] password change of character requirements are defined. 3.5.7[c] minimum password complexity requirements as defined are enforced when new passwords are created. 3.5.7[d] minimum password change of character requirements as defined are enforced when new passwords are created. Potential Assessment Methods and Objects:
Examine: Identification and authentication policy; password policy; procedures addressing authenticator management; system security plan; system configuration settings and associated documentation; system design documentation; password configurations and associated documentation; other relevant documents or records.
Interview: Personnel with authenticator management responsibilities; personnel with information security responsibilities; system or network administrators; system developers.
Test: Mechanisms supporting or implementing password-based authenticator management capability. | What is control 3.5.7 in NIST 800-171A? |
|
Security Requirement 3.5.8: Prohibit password reuse for a specified number of generations. | What does control 3.5.8 entail? |
|
Potential assessment methods and objects for 3.5.8 include:
Examine: Identification and authentication policy; password policy; procedures addressing authenticator management; system security plan; system design documentation; system configuration settings and associated documentation; password configurations and associated documentation; other relevant documents or records.
Interview: Personnel with authenticator management responsibilities; personnel with information security responsibilities; system or network administrators; system developers.
Test: Mechanisms supporting or implementing password-based authenticator management capability. | How is control 3.5.8 assessed? |
|
Determine if: 3.5.8[a] the number of generations during which a password cannot be reused is specified. 3.5.8[b] reuse of passwords is prohibited during the specified number of generations. | What are the detailed objectives for assessing control 3.5.8? |
|
Security Requirement 3.5.8: Prohibit password reuse for a specified number of generations. Assessment Objectives: Determine if: 3.5.8[a] the number of generations during which a password cannot be reused is specified. 3.5.8[b] reuse of passwords is prohibited during the specified number of generations. Potential Assessment Methods and Objects:
Examine: Identification and authentication policy; password policy; procedures addressing authenticator management; system security plan; system design documentation; system configuration settings and associated documentation; password configurations and associated documentation; other relevant documents or records.
Interview: Personnel with authenticator management responsibilities; personnel with information security responsibilities; system or network administrators; system developers.
Test: Mechanisms supporting or implementing password-based authenticator management capability. | What is control 3.5.8 in NIST 800-171A? |
|
Security Requirement 3.5.9: Allow temporary password use for system logons with an immediate change to a permanent password. | What does control 3.5.9 entail? |
|
Potential assessment methods and objects for 3.5.9 include:
Examine: Identification and authentication policy; password policy; procedures addressing authenticator management; system security plan; system configuration settings and associated documentation; system design documentation; password configurations and associated documentation; other relevant documents or records.
Interview: Personnel with authenticator management responsibilities; personnel with information security responsibilities; system or network administrators; system developers.
Test: Mechanisms supporting or implementing password-based authenticator management capability. | How is control 3.5.9 assessed? |
|
Determine if an immediate change to a permanent password is required when a temporary password is used for system logon. | What are the detailed objectives for assessing control 3.5.9? |
|
Security Requirement 3.5.9: Allow temporary password use for system logons with an immediate change to a permanent password. Assessment Objectives: Determine if an immediate change to a permanent password is required when a temporary password is used for system logon. Potential Assessment Methods and Objects:
Examine: Identification and authentication policy; password policy; procedures addressing authenticator management; system security plan; system configuration settings and associated documentation; system design documentation; password configurations and associated documentation; other relevant documents or records.
Interview: Personnel with authenticator management responsibilities; personnel with information security responsibilities; system or network administrators; system developers.
Test: Mechanisms supporting or implementing password-based authenticator management capability. | What is control 3.5.9 in NIST 800-171A? |
|
Security Requirement 3.5.10: Store and transmit only cryptographically-protected passwords. | What does control 3.5.10 entail? |
|
Potential assessment methods and objects for 3.5.10 include:
Examine: Identification and authentication policy; password policy; procedures addressing authenticator management; system security plan; system configuration settings and associated documentation; system design documentation; password configurations and associated documentation; other relevant documents or records.
Interview: Personnel with authenticator management responsibilities; personnel with information security responsibilities; system or network administrators; system developers.
Test: Mechanisms supporting or implementing password-based authenticator management capability. | How is control 3.5.10 assessed? |
|
Determine if: 3.5.10[a] passwords are cryptographically protected in storage. 3.5.10[b] passwords are cryptographically protected in transit. | What are the detailed objectives for assessing control 3.5.10? |
|
Security Requirement 3.5.10: Store and transmit only cryptographically-protected passwords. Assessment Objectives: Determine if: 3.5.10[a] passwords are cryptographically protected in storage. 3.5.10[b] passwords are cryptographically protected in transit. Potential Assessment Methods and Objects:
Examine: Identification and authentication policy; password policy; procedures addressing authenticator management; system security plan; system configuration settings and associated documentation; system design documentation; password configurations and associated documentation; other relevant documents or records.
Interview: Personnel with authenticator management responsibilities; personnel with information security responsibilities; system or network administrators; system developers.
Test: Mechanisms supporting or implementing password-based authenticator management capability. | What is control 3.5.10 in NIST 800-171A? |
|
Security Requirement 3.5.11: Obscure feedback of authentication information. | What does control 3.5.11 entail? |
|
Potential assessment methods and objects for 3.5.11 include:
Examine: Identification and authentication policy; procedures addressing authenticator feedback; system security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records.
Interview: Personnel with information security responsibilities; system or network administrators; system developers.
Test: Mechanisms supporting or implementing the obscuring of feedback of authentication information during authentication. | How is control 3.5.11 assessed? |
|
Assessment objectives for 3.5.11: Determine if authentication information is obscured during the authentication process. | What are the detailed objectives for assessing control 3.5.11? |
|
Security Requirement 3.5.11: Obscure feedback of authentication information. Assessment Objectives: Determine if authentication information is obscured during the authentication process. Potential Assessment Methods and Objects:
Examine: Identification and authentication policy; procedures addressing authenticator feedback; system security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records.
Interview: Personnel with information security responsibilities; system or network administrators; system developers.
Test: Mechanisms supporting or implementing the obscuring of feedback of authentication information during authentication. | What is control 3.5.11 in NIST 800-171A? |
|
Security Requirement 3.6.1: Establish an operational incident-handling capability for organizational systems that includes preparation, detection, analysis, containment, recovery, and user response activities. | What does control 3.6.1 entail? |
|
Potential assessment methods and objects for 3.6.1 include:
Examine: Incident response policy; contingency planning policy; procedures addressing incident handling; procedures addressing incident response assistance; incident response plan; contingency plan; system security plan; procedures addressing incident response training; incident response training curriculum; incident response training materials; incident response training records; other relevant documents or records.
Personnel with incident handling responsibilities; personnel with contingency planning responsibilities; personnel with incident response training and operational responsibilities; personnel with incident response assistance and support responsibilities; personnel with access to incident response support and assistance capability; personnel with information security responsibilities.
Interview: Incident response team members.
Test: Incident-handling capability for the organization; organizational processes for incident response assistance; mechanisms supporting or implementing incident response assistance. | How is control 3.6.1 assessed? |
|
Assessment objectives for 3.6.1: 3.6.1[a] an operational incident-handling capability is established. 3.6.1[b] the operational incident-handling capability includes preparation. 3.6.1[c] the operational incident-handling capability includes detection. 3.6.1[d] the operational incident-handling capability includes analysis. 3.6.1[e] the operational incident-handling capability includes containment. 3.6.1[f] the operational incident-handling capability includes recovery. 3.6.1[g] the operational incident-handling capability includes user response activities. | What are the detailed objectives for assessing control 3.6.1? |
|
Security Requirement 3.6.1: Establish an operational incident-handling capability for organizational systems that includes preparation, detection, analysis, containment, recovery, and user response activities. Assessment Objectives: 3.6.1[a] an operational incident-handling capability is established. 3.6.1[b] the operational incident-handling capability includes preparation. 3.6.1[c] the operational incident-handling capability includes detection. 3.6.1[d] the operational incident-handling capability includes analysis. 3.6.1[e] the operational incident-handling capability includes containment. 3.6.1[f] the operational incident-handling capability includes recovery. 3.6.1[g] the operational incident-handling capability includes user response activities. Potential Assessment Methods and Objects:
Examine: Incident response policy; contingency planning policy; procedures addressing incident handling; procedures addressing incident response assistance; incident response plan; contingency plan; system security plan; procedures addressing incident response training; incident response training curriculum; incident response training materials; incident response training records; other relevant documents or records.
Personnel with incident handling responsibilities; personnel with contingency planning responsibilities; personnel with incident response training and operational responsibilities; personnel with incident response assistance and support responsibilities; personnel with access to incident response support and assistance capability; personnel with information security responsibilities.
Interview: Incident response team members.
Test: Incident-handling capability for the organization; organizational processes for incident response assistance; mechanisms supporting or implementing incident response assistance. | What is control 3.6.1 in NIST 800-171A? |
|
Security Requirement 3.6.2: Track, document, and report incidents to designated officials and/or authorities both internal and external to the organization. | What does control 3.6.2 entail? |
|
Potential assessment methods and objects for 3.6.2 include:
Examine: Incident response policy; procedures addressing incident monitoring; incident response records and documentation; procedures addressing incident reporting; incident reporting records and documentation; incident response plan; system security plan; other relevant documents or records.
Interview: Personnel with incident monitoring responsibilities; personnel with incident reporting responsibilities; personnel who have or should have reported incidents; personnel (authorities) to whom incident information is to be reported; personnel with information security responsibilities.
Test: Incident monitoring capability for the organization; mechanisms supporting or implementing tracking and documenting of system security incidents; organizational processes for incident reporting; mechanisms supporting or implementing incident reporting. | How is control 3.6.2 assessed? |
|
Assessment objectives for 3.6.2: 3.6.2[a] Incidents are tracked. 3.6.2[b] Incidents are documented. 3.6.2[c] authorities to whom incidents are to be reported are identified. 3.6.2[d] organizational officials to whom incidents are to be reported are identified. 3.6.2[e] identified authorities are notified of incidents. 3.6.2[f] identified organizational officials are notified of incidents. | What are the detailed objectives for assessing control 3.6.2? |
|
Security Requirement 3.6.2: Track, document, and report incidents to designated officials and/or authorities both internal and external to the organization. Assessment Objectives: 3.6.2[a] Incidents are tracked. 3.6.2[b] Incidents are documented. 3.6.2[c] authorities to whom incidents are to be reported are identified. 3.6.2[d] organizational officials to whom incidents are to be reported are identified. 3.6.2[e] identified authorities are notified of incidents. 3.6.2[f] identified organizational officials are notified of incidents. Potential Assessment Methods and Objects:
Examine: Incident response policy; procedures addressing incident monitoring; incident response records and documentation; procedures addressing incident reporting; incident reporting records and documentation; incident response plan; system security plan; other relevant documents or records.
Interview: Personnel with incident monitoring responsibilities; personnel with incident reporting responsibilities; personnel who have or should have reported incidents; personnel (authorities) to whom incident information is to be reported; personnel with information security responsibilities.
Test: Incident monitoring capability for the organization; mechanisms supporting or implementing tracking and documenting of system security incidents; organizational processes for incident reporting; mechanisms supporting or implementing incident reporting. | What is control 3.6.2 in NIST 800-171A? |
|
Security Requirement 3.6.3: Test the organizational incident response capability. | What does control 3.6.3 entail? |
|
Potential assessment methods and objects for 3.6.3 include:
Examine: Incident response policy; contingency planning policy; procedures addressing incident response testing; procedures addressing contingency plan testing; incident response testing material; incident response test results; incident response test plan; incident response plan; contingency plan; system security plan; other relevant documents or records.
Interview: Personnel with incident response testing responsibilities; personnel with information security responsibilities; personnel with responsibilities for testing plans related to incident response.
Test: Mechanisms and processes for incident response. | How is control 3.6.3 assessed? |
|
Assessment objectives for 3.6.3: Determine if the incident response capability is tested. | What are the detailed objectives for assessing control 3.6.3? |
|
Security Requirement 3.6.3: Test the organizational incident response capability. Assessment objectives for 3.6.3: Determine if the incident response capability is tested. Potential Assessment Methods and Objects:
Examine: Incident response policy; contingency planning policy; procedures addressing incident response testing; procedures addressing contingency plan testing; incident response testing material; incident response test results; incident response test plan; incident response plan; contingency plan; system security plan; other relevant documents or records.
Interview: Personnel with incident response testing responsibilities; personnel with information security responsibilities; personnel with responsibilities for testing plans related to incident response.
Test: Mechanisms and processes for incident response. | What is control 3.6.3 in NIST 800-171A? |
|
Security Requirement 3.7.1: Perform maintenance on organizational systems. | What does control 3.7.1 entail? |
|
Potential assessment methods and objects for 3.7.1 include:
Examine: System maintenance policy; procedures addressing controlled system maintenance; maintenance records; manufacturer or vendor maintenance specifications; equipment sanitization records; media sanitization records; system security plan; other relevant documents or records.
Interview: Personnel with system maintenance responsibilities; personnel with information security responsibilities; personnel responsible for media sanitization; system or network administrators.
Test: Organizational processes for scheduling, performing, documenting, reviewing, approving, and monitoring maintenance and repairs for systems; organizational processes for sanitizing system components; mechanisms supporting or implementing controlled maintenance; mechanisms implementing sanitization of system components. | How is control 3.7.1 assessed? |
|
Determine if system maintenance is performed. | What are the detailed objectives for assessing control 3.7.1? |
|
Security Requirement 3.7.1: Perform maintenance on organizational systems. Assessment Objectives: Determine if system maintenance is performed. Potential Assessment Methods and Objects:
Examine: System maintenance policy; procedures addressing controlled system maintenance; maintenance records; manufacturer or vendor maintenance specifications; equipment sanitization records; media sanitization records; system security plan; other relevant documents or records.
Interview: Personnel with system maintenance responsibilities; personnel with information security responsibilities; personnel responsible for media sanitization; system or network administrators.
Test: Organizational processes for scheduling, performing, documenting, reviewing, approving, and monitoring maintenance and repairs for systems; organizational processes for sanitizing system components; mechanisms supporting or implementing controlled maintenance; mechanisms implementing sanitization of system components. | What is control 3.7.1 in NIST 800-171A? |
|
Security Requirement 3.7.2: Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance. | What does control 3.7.2 entail? |
|
Potential assessment methods and objects for 3.7.2 include:
Examine: System maintenance policy; procedures addressing system maintenance tools and media; maintenance records; system maintenance tools and associated documentation; maintenance tool inspection records; system security plan; other relevant documents or records.
Interview: Personnel with system maintenance responsibilities; personnel with information security responsibilities.
Test: Organizational processes for approving, controlling, and monitoring maintenance tools; mechanisms supporting or implementing approval, control, and monitoring of maintenance tools; organizational processes for inspecting maintenance tools; mechanisms supporting or implementing inspection of maintenance tools; organizational process for inspecting media for malicious code; mechanisms supporting or implementing inspection of media used for maintenance. | How is control 3.7.2 assessed? |
|
Assessment objectives for 3.7.2: 3.7.2[a] tools used to conduct system maintenance are controlled. 3.7.2[b] techniques used to conduct system maintenance are controlled. 3.7.2[c] mechanisms used to conduct system maintenance are controlled. 3.7.2[d] personnel used to conduct system maintenance are controlled. | What are the detailed objectives for assessing control 3.7.2? |
|
Security Requirement 3.7.2: Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance. Assessment objectives for 3.7.2: 3.7.2[a] tools used to conduct system maintenance are controlled. 3.7.2[b] techniques used to conduct system maintenance are controlled. 3.7.2[c] mechanisms used to conduct system maintenance are controlled. 3.7.2[d] personnel used to conduct system maintenance are controlled. Potential Assessment Methods and Objects:
Examine: System maintenance policy; procedures addressing system maintenance tools and media; maintenance records; system maintenance tools and associated documentation; maintenance tool inspection records; system security plan; other relevant documents or records.
Interview: Personnel with system maintenance responsibilities; personnel with information security responsibilities.
Test: Organizational processes for approving, controlling, and monitoring maintenance tools; mechanisms supporting or implementing approval, control, and monitoring of maintenance tools; organizational processes for inspecting maintenance tools; mechanisms supporting or implementing inspection of maintenance tools; organizational process for inspecting media for malicious code; mechanisms supporting or implementing inspection of media used for maintenance. | What is control 3.7.2 in NIST 800-171A? |
|
Security Requirement 3.7.3: Ensure equipment removed for off-site maintenance is sanitized of any CUI. | What does control 3.7.3 entail? |
|
Potential assessment methods and objects for 3.7.3 include:
Examine: System maintenance policy; procedures addressing controlled system maintenance; maintenance records; manufacturer or vendor maintenance specifications; equipment sanitization records; media sanitization records; system security plan; other relevant documents or records.
Interview: Personnel with system maintenance responsibilities; personnel with information security responsibilities; personnel responsible for media sanitization; system or network administrators.
Test: Organizational processes for scheduling, performing, documenting, reviewing, approving, and monitoring maintenance and repairs for systems; organizational processes for sanitizing system components; mechanisms supporting or implementing controlled maintenance; mechanisms implementing sanitization of system components. | How is control 3.7.3 assessed? |
|
Determine if equipment to be removed from organizational spaces for off-site maintenance is sanitized of any CUI. | What are the detailed objectives for assessing control 3.7.3? |
|
Security Requirement 3.7.3: Ensure equipment removed for off-site maintenance is sanitized of any CUI. Assessment Objectives: Determine if equipment to be removed from organizational spaces for off-site maintenance is sanitized of any CUI. Potential Assessment Methods and Objects:
Examine: System maintenance policy; procedures addressing controlled system maintenance; maintenance records; manufacturer or vendor maintenance specifications; equipment sanitization records; media sanitization records; system security plan; other relevant documents or records.
Interview: Personnel with system maintenance responsibilities; personnel with information security responsibilities; personnel responsible for media sanitization; system or network administrators.
Test: Organizational processes for scheduling, performing, documenting, reviewing, approving, and monitoring maintenance and repairs for systems; organizational processes for sanitizing system components; mechanisms supporting or implementing controlled maintenance; mechanisms implementing sanitization of system components. | What is control 3.7.3 in NIST 800-171A? |
|
Security Requirement 3.7.4: Check media containing diagnostic and test programs for malicious code before the media are used in organizational systems. | What does control 3.7.4 entail? |
|
Potential assessment methods and objects for 3.7.4 include:
Examine: System maintenance policy; procedures addressing system maintenance tools; system maintenance tools and associated documentation; maintenance records; system security plan; other relevant documents or records.
Interview: Personnel with system maintenance responsibilities; personnel with information security responsibilities.
Test: Organizational process for inspecting media for malicious code; mechanisms supporting or implementing inspection of media used for maintenance. | How is control 3.7.4 assessed? |
|
Determine if media containing diagnostic and test programs are checked for malicious code before being used in organizational systems that process, store, or transmit CUI. | What are the detailed objectives for assessing control 3.7.4? |
|
Security Requirement 3.7.4: Check media containing diagnostic and test programs for malicious code before the media are used in organizational systems. Assessment Objectives: Determine if media containing diagnostic and test programs are checked for malicious code before being used in organizational systems that process, store, or transmit CUI. Potential Assessment Methods and Objects:
Examine: System maintenance policy; procedures addressing system maintenance tools; system maintenance tools and associated documentation; maintenance records; system security plan; other relevant documents or records.
Interview: Personnel with system maintenance responsibilities; personnel with information security responsibilities.
Test: Organizational process for inspecting media for malicious code; mechanisms supporting or implementing inspection of media used for maintenance. | What is control 3.7.4 in NIST 800-171A? |
|
Security Requirement 3.7.5: Require multifactor authentication to establish nonlocal maintenance sessions via external network connections and terminate such connections when nonlocal maintenance is complete. | What does control 3.7.5 entail? |
|
Potential assessment methods and objects for 3.7.5 include:
Examine: System maintenance policy; procedures addressing nonlocal system maintenance; system security plan; system design documentation; system configuration settings and associated documentation; maintenance records; diagnostic records; other relevant documents or records.
Interview: Personnel with system maintenance responsibilities; personnel with information security responsibilities; system or network administrators.
Test: Organizational processes for managing nonlocal maintenance; mechanisms implementing, supporting, and managing nonlocal maintenance; mechanisms for strong authentication of nonlocal maintenance diagnostic sessions; mechanisms for terminating nonlocal maintenance sessions and network connections. | How is control 3.7.5 assessed? |
|
Determine if: 3.7.5[a] multifactor authentication is used to establish nonlocal maintenance sessions via external network connections. 3.7.5[b] nonlocal maintenance sessions established via external network connections are terminated when nonlocal maintenance is complete. | What are the detailed objectives for assessing control 3.7.5? |
|
Security Requirement 3.7.5: Require multifactor authentication to establish nonlocal maintenance sessions via external network connections and terminate such connections when nonlocal maintenance is complete. Assessment Objectives: Determine if: 3.7.5[a] multifactor authentication is used to establish nonlocal maintenance sessions via external network connections. 3.7.5[b] nonlocal maintenance sessions established via external network connections are terminated when nonlocal maintenance is complete. Potential Assessment Methods and Objects:
Examine: System maintenance policy; procedures addressing nonlocal system maintenance; system security plan; system design documentation; system configuration settings and associated documentation; maintenance records; diagnostic records; other relevant documents or records.
Interview: Personnel with system maintenance responsibilities; personnel with information security responsibilities; system or network administrators.
Test: Organizational processes for managing nonlocal maintenance; mechanisms implementing, supporting, and managing nonlocal maintenance; mechanisms for strong authentication of nonlocal maintenance diagnostic sessions; mechanisms for terminating nonlocal maintenance sessions and network connections. | What is control 3.7.5 in NIST 800-171A? |
|
Security Requirement 3.7.6: Supervise the maintenance activities of maintenance personnel without required access authorization. | What does control 3.7.6 entail? |
|
Potential assessment methods and objects for 3.7.6 include:
Examine: System maintenance policy; procedures addressing maintenance personnel; service provider contracts; service-level agreements; list of authorized personnel; maintenance records; access control records; system security plan; other relevant documents or records.
Interview: Personnel with system maintenance responsibilities; personnel with information security responsibilities.
Test: Organizational processes for authorizing and managing maintenance personnel; mechanisms supporting or implementing authorization of maintenance personnel. | How is control 3.7.6 assessed? |
|
Determine if maintenance personnel without required access authorization are supervised during maintenance activities. | What are the detailed objectives for assessing control 3.7.6? |
|
Security Requirement 3.7.6: Supervise the maintenance activities of maintenance personnel without required access authorization. Assessment Objectives: Determine if maintenance personnel without required access authorization are supervised during maintenance activities. Potential Assessment Methods and Objects:
Examine: System maintenance policy; procedures addressing maintenance personnel; service provider contracts; service-level agreements; list of authorized personnel; maintenance records; access control records; system security plan; other relevant documents or records.
Interview: Personnel with system maintenance responsibilities; personnel with information security responsibilities.
Test: Organizational processes for authorizing and managing maintenance personnel; mechanisms supporting or implementing authorization of maintenance personnel. | What is control 3.7.6 in NIST 800-171A? |
|
Security Requirement 3.8.1: Protect (i.e., physically control and securely store) system media containing CUI, both paper and digital. | What does control 3.8.1 entail? |
|
Potential assessment methods and objects for 3.8.1 include:
Examine: System media protection policy; procedures addressing media storage; procedures addressing media access restrictions; access control policy and procedures; physical and environmental protection policy and procedures; system security plan; media storage facilities; access control records; other relevant documents or records.
Interview: Personnel with system media protection responsibilities; personnel with information security responsibilities; system or network administrators.
Test: Organizational processes for restricting information media; mechanisms supporting or implementing media access restrictions. | How is control 3.8.1 assessed? |
|
Determine if: 3.8.1[a] paper media containing CUI is physically controlled. 3.8.1[b] digital media containing CUI is physically controlled. 3.8.1[c] paper media containing CUI is securely stored. 3.8.1[d] digital media containing CUI is securely stored. | What are the detailed objectives for assessing control 3.8.1? |
|
Security Requirement 3.8.1: Protect (i.e., physically control and securely store) system media containing CUI, both paper and digital. Assessment Objectives: Determine if: 3.8.1[a] paper media containing CUI is physically controlled. 3.8.1[b] digital media containing CUI is physically controlled. 3.8.1[c] paper media containing CUI is securely stored. 3.8.1[d] digital media containing CUI is securely stored. Potential Assessment Methods and Objects:
Examine: System media protection policy; procedures addressing media storage; procedures addressing media access restrictions; access control policy and procedures; physical and environmental protection policy and procedures; system security plan; media storage facilities; access control records; other relevant documents or records.
Interview: Personnel with system media protection responsibilities; personnel with information security responsibilities; system or network administrators.
Test: Organizational processes for restricting information media; mechanisms supporting or implementing media access restrictions. | What is control 3.8.1 in NIST 800-171A? |
|
Security Requirement 3.8.2: Limit access to CUI on system media to authorized users. | What does control 3.8.2 entail? |
|
Potential assessment methods and objects for 3.8.2 include:
Examine: System media protection policy; procedures addressing media storage; physical and environmental protection policy and procedures; access control policy and procedures; system security plan; system media; designated controlled areas; other relevant documents or records.
Interview: Personnel with system media protection and storage responsibilities; personnel with information security responsibilities.
Test: Organizational processes for storing media; mechanisms supporting or implementing secure media storage and media protection. | How is control 3.8.2 assessed? |
|
Determine if access to CUI on system media is limited to authorized users. | What are the detailed objectives for assessing control 3.8.2? |
|
Security Requirement 3.8.2: Limit access to CUI on system media to authorized users. Assessment Objectives: Determine if access to CUI on system media is limited to authorized users. Potential Assessment Methods and Objects:
Examine: System media protection policy; procedures addressing media storage; physical and environmental protection policy and procedures; access control policy and procedures; system security plan; system media; designated controlled areas; other relevant documents or records.
Interview: Personnel with system media protection and storage responsibilities; personnel with information security responsibilities.
Test: Organizational processes for storing media; mechanisms supporting or implementing secure media storage and media protection. | What is control 3.8.2 in NIST 800-171A? |
|
Security Requirement 3.8.3: Sanitize or destroy system media containing CUI before disposal or release for reuse. | What does control 3.8.3 entail? |
|
Potential assessment methods and objects for 3.8.3 include:
Examine: System media protection policy; procedures addressing media sanitization and disposal; applicable standards and policies addressing media sanitization; system security plan; media sanitization records; system audit logs and records; system design documentation; system configuration settings and associated documentation; other relevant documents or records.
Interview: Personnel with media sanitization responsibilities; personnel with information security responsibilities; system or network administrators.
Test: Organizational processes for media sanitization; mechanisms supporting or implementing media sanitization. | How is control 3.8.3 assessed? |
|
Determine if: 3.8.3[a] system media containing CUI is sanitized or destroyed before disposal. 3.8.3[b] system media containing CUI is sanitized before it is released for reuse. | What are the detailed objectives for assessing control 3.8.3? |
|
Security Requirement 3.8.3: Sanitize or destroy media containing CUI before disposal or release for reuse. Assessment Objectives: Determine if: 3.8.3[a] system media containing CUI is sanitized or destroyed before disposal. 3.8.3[b] system media containing CUI is sanitized before it is released for reuse. Potential Assessment Methods and Objects:
Examine: System media protection policy; procedures addressing media sanitization and disposal; applicable standards and policies addressing media sanitization; system security plan; media sanitization records; system audit logs and records; system design documentation; system configuration settings and associated documentation; other relevant documents or records.
Interview: Personnel with media sanitization responsibilities; personnel with information security responsibilities; system or network administrators.
Test: Organizational processes for media sanitization; mechanisms supporting or implementing media sanitization. | What is control 3.8.3 in NIST 800-171A? |
|
Security Requirement 3.8.4: Mark media with necessary CUI markings and distribution limitations. | What does control 3.8.4 entail? |
|
Potential assessment methods and objects for 3.8.4 include:
Examine: System media protection policy; procedures addressing media marking; physical and environmental protection policy and procedures; system security plan; list of system media marking security attributes; designated controlled areas; other relevant documents or records.
Interview: Personnel with system media protection and marking responsibilities; personnel with information security responsibilities.
Test: Organizational processes for marking information media; mechanisms supporting or implementing media marking. | How is control 3.8.4 assessed? |
|
Determine if: 3.8.4[a] media containing CUI is marked with applicable CUI markings. 3.8.4[b] media containing CUI is marked with distribution limitations. | What are the detailed objectives for assessing control 3.8.4? |
|
Security Requirement 3.8.4: Security Requirement 3.8.4: Mark media with necessary CUI markings and distribution limitations. Assessment Objectives: Determine if: 3.8.4[a] media containing CUI is marked with applicable CUI markings. 3.8.4[b] media containing CUI is marked with distribution limitations. Potential Assessment Methods and Objects:
Examine: System media protection policy; procedures addressing media marking; physical and environmental protection policy and procedures; system security plan; list of system media marking security attributes; designated controlled areas; other relevant documents or records.
Interview: Personnel with system media protection and marking responsibilities; personnel with information security responsibilities.
Test: Organizational processes for marking information media; mechanisms supporting or implementing media marking. | What is control 3.8.4 in NIST 800-171A? |
|
Control access to media containing CUI and maintain accountability for media during transport outside of controlled areas. | What does control 3.8.5 entail? |
Subsets and Splits