input
stringclasses
1 value
output
stringlengths
45
2.38k
instruction
stringlengths
30
83
Assessment objectives for 3.3.9: 3.3.9[a] A subset of privileged users authorized to manage audit functionality is identified. 3.3.9[b] Management of audit functionality is limited to the identified subset of privileged users.
What are the assessment objectives for 3.3.9 in NIST 800-171A?
Potential assessment methods and objects for 3.3.9 include: Examine: Audit and accountability policy; procedures addressing the management of audit functionality; system security plan; list of privileged users authorized to manage audit functionality; system configuration settings and associated documentation; other relevant documents or records. Interview: Privileged users with responsibilities for managing audit functionality. Test: Mechanisms limiting management of audit functionality to authorized privileged users.
What are the potential assessment methods and objects for 3.3.9 in NIST 800-171A?
Security Requirement 3.4.1: Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles.
What is the security requirement for 3.4.1 in NIST 800-171A?
Assessment objectives for 3.4.1: 3.4.1[a] Baseline configurations of organizational systems are established and maintained. 3.4.1[b] Inventories of organizational systems (including hardware, software, firmware, and documentation) are established and maintained.
What are the assessment objectives for 3.4.1 in NIST 800-171A?
Potential assessment methods and objects for 3.4.1 include: Examine: Configuration management policy; procedures addressing baseline configuration; system security plan; system configuration settings and associated documentation; inventory records; baseline configuration documentation; other relevant documents or records. Interview: Personnel with configuration management responsibilities. Test: Mechanisms implementing configuration management.
What are the potential assessment methods and objects for 3.4.1 in NIST 800-171A?
Security Requirement 3.4.2: Establish and enforce security configuration settings for information technology products employed in organizational systems.
What is the security requirement for 3.4.2 in NIST 800-171A?
Assessment objectives for 3.4.2: 3.4.2[a] Security configuration settings for information technology products are established. 3.4.2[b] Security configuration settings for information technology products are enforced.
What are the assessment objectives for 3.4.2 in NIST 800-171A?
Potential assessment methods and objects for 3.4.2 include: Examine: Configuration management policy; procedures addressing security configuration settings; system security plan; system configuration settings and associated documentation; other relevant documents or records. Interview: Personnel with responsibilities for establishing and enforcing security configuration settings. Test: Mechanisms enforcing security configuration settings.
What are the potential assessment methods and objects for 3.4.2 in NIST 800-171A?
Security Requirement 3.4.3: Track, review, approve/disapprove, and audit changes to organizational systems.
What is the security requirement for 3.4.3 in NIST 800-171A?
Assessment objectives for 3.4.3: 3.4.3[a] Changes to organizational systems are tracked. 3.4.3[b] Changes to organizational systems are reviewed. 3.4.3[c] Changes to organizational systems are approved or disapproved. 3.4.3[d] Changes to organizational systems are audited.
What are the assessment objectives for 3.4.3 in NIST 800-171A?
Potential assessment methods and objects for 3.4.3 include: Examine: Configuration management policy; change control procedures; system security plan; audit records of changes; change approval records; other relevant documents or records. Interview: Personnel with change management responsibilities. Test: Change management process and mechanisms.
What are the potential assessment methods and objects for 3.4.3 in NIST 800-171A?
Security Requirement 3.4.4: Analyze the security impact of changes prior to implementation.
What is the security requirement for 3.4.4 in NIST 800-171A?
Assessment objectives for 3.4.4: 3.4.4[a] The security impact of changes is analyzed prior to implementation.
What are the assessment objectives for 3.4.4 in NIST 800-171A?
Potential assessment methods and objects for 3.4.4 include: Examine: Configuration management policy; procedures addressing security impact analysis; security impact analysis reports; system security plan; other relevant documents or records. Interview: Personnel with responsibilities for security impact analysis. Test: Security impact analysis process.
What are the potential assessment methods and objects for 3.4.4 in NIST 800-171A?
Security Requirement 3.4.5: Define, document, approve, and enforce physical and logical access restrictions associated with changes to organizational systems.
What is the security requirement for 3.4.5 in NIST 800-171A?
Assessment objectives for 3.4.5: 3.4.5[a] Physical and logical access restrictions associated with changes to organizational systems are defined. 3.4.5[b] Physical and logical access restrictions associated with changes to organizational systems are documented. 3.4.5[c] Physical and logical access restrictions associated with changes to organizational systems are approved. 3.4.5[d] Physical and logical access restrictions associated with changes to organizational systems are enforced.
What are the assessment objectives for 3.4.5 in NIST 800-171A?
Potential assessment methods and objects for 3.4.5 include: Examine: Configuration management policy; procedures addressing access restrictions for change; system security plan; access approval records; change control records; other relevant documents or records. Interview: Personnel with responsibilities for managing access restrictions associated with system changes. Test: Mechanisms enforcing access restrictions for system changes.
What are the potential assessment methods and objects for 3.4.5 in NIST 800-171A?
Security Requirement 3.4.6: Employ the principle of least functionality by configuring organizational systems to provide only essential capabilities.
What is the security requirement for 3.4.6 in NIST 800-171A?
Assessment objectives for 3.4.6: 3.4.6[a] Organizational systems are configured to provide only essential capabilities. 3.4.6[b] The principle of least functionality is employed.
What are the assessment objectives for 3.4.6 in NIST 800-171A?
Potential assessment methods and objects for 3.4.6 include: Examine: Configuration management policy; procedures addressing least functionality; system configuration settings and associated documentation; system security plan; other relevant documents or records. Interview: Personnel with responsibilities for configuring organizational systems. Test: Mechanisms implementing the principle of least functionality.
What are the potential assessment methods and objects for 3.4.6 in NIST 800-171A?
Security Requirement 3.4.7: Prevent unauthorized and unintended information transfer via shared system resources.
What is the security requirement for 3.4.7 in NIST 800-171A?
Assessment objectives for 3.4.7: 3.4.7[a] Measures are implemented to prevent unauthorized information transfer via shared system resources. 3.4.7[b] Measures are implemented to prevent unintended information transfer via shared system resources.
What are the assessment objectives for 3.4.7 in NIST 800-171A?
Potential assessment methods and objects for 3.4.7 include: Examine: Configuration management policy; procedures addressing information transfer via shared system resources; system configuration settings and associated documentation; system security plan; other relevant documents or records. Interview: Personnel with responsibilities for preventing information transfer via shared system resources. Test: Mechanisms preventing unauthorized and unintended information transfer via shared system resources.
What are the potential assessment methods and objects for 3.4.7 in NIST 800-171A?
Security Requirement 3.4.8: Apply deny-by-exception (blacklist) policy to prevent the use of unauthorized software or deny-all, permit-by-exception (whitelist) policy to allow the use of authorized software.
What is the security requirement for 3.4.8 in NIST 800-171A?
Assessment objectives for 3.4.8: 3.4.8[a] A deny-by-exception (blacklist) policy is applied to prevent the use of unauthorized software. 3.4.8[b] A deny-all, permit-by-exception (whitelist) policy is applied to allow the use of authorized software.
What are the assessment objectives for 3.4.8 in NIST 800-171A?
Potential assessment methods and objects for 3.4.8 include: Examine: Configuration management policy; procedures addressing software use policies (blacklist/whitelist); system configuration settings and associated documentation; system security plan; other relevant documents or records. Interview: Personnel with responsibilities for managing software use policies. Test: Mechanisms implementing software use policies (blacklist/whitelist).
What are the potential assessment methods and objects for 3.4.8 in NIST 800-171A?
Security Requirement 3.4.9: Control and monitor user-installed software.
What is the security requirement for 3.4.9 in NIST 800-171A?
Assessment objectives for 3.4.9: 3.4.9[a] User-installed software is controlled. 3.4.9[b] User-installed software is monitored.
What are the assessment objectives for 3.4.9 in NIST 800-171A?
Potential assessment methods and objects for 3.4.9 include: Examine: Configuration management policy; procedures addressing user-installed software; system security plan; system configuration settings and associated documentation; monitoring records of user-installed software; other relevant documents or records. Interview: Personnel with responsibilities for controlling and monitoring user-installed software. Test: Mechanisms for controlling and monitoring user-installed software.
What are the potential assessment methods and objects for 3.4.9 in NIST 800-171A?
Security Requirement 3.5.1: Identify information system users, processes acting on behalf of users, or devices.
What is the security requirement for 3.5.1 in NIST 800-171A?
Assessment objectives for 3.5.1: 3.5.1[a] Information system users are identified. 3.5.1[b] Processes acting on behalf of users are identified. 3.5.1[c] Devices are identified.
What are the assessment objectives for 3.5.1 in NIST 800-171A?
Potential assessment methods and objects for 3.5.1 include: Examine: Identification and authentication policy; procedures addressing user identification; system security plan; system configuration settings and associated documentation; list of system users; other relevant documents or records. Interview: Personnel with user identification responsibilities. Test: Mechanisms implementing user identification.
What are the potential assessment methods and objects for 3.5.1 in NIST 800-171A?
Security Requirement 3.5.2: Authenticate (or verify) the identities of those users, processes, or devices as a prerequisite to allowing access to organizational information systems.
What is the security requirement for 3.5.2 in NIST 800-171A?
Assessment objectives for 3.5.2: 3.5.2[a] The identities of users, processes, or devices are authenticated before allowing access to organizational information systems.
What are the assessment objectives for 3.5.2 in NIST 800-171A?
Potential assessment methods and objects for 3.5.2 include: Examine: Identification and authentication policy; procedures addressing identity verification; system security plan; system configuration settings and associated documentation; other relevant documents or records. Interview: Personnel with identity authentication responsibilities. Test: Mechanisms implementing identity authentication.
What are the potential assessment methods and objects for 3.5.2 in NIST 800-171A?
Security Requirement 3.5.3: Use multifactor authentication for local and network access to privileged accounts and for network access to non-privileged accounts.
What is the security requirement for 3.5.3 in NIST 800-171A?
Assessment objectives for 3.5.3: 3.5.3[a] Multifactor authentication is used for local and network access to privileged accounts. 3.5.3[b] Multifactor authentication is used for network access to non-privileged accounts.
What are the assessment objectives for 3.5.3 in NIST 800-171A?
Potential assessment methods and objects for 3.5.3 include: Examine: Identification and authentication policy; procedures addressing multifactor authentication; system security plan; system configuration settings and associated documentation; multifactor authentication system records; other relevant documents or records. Interview: Personnel with multifactor authentication responsibilities. Test: Mechanisms implementing multifactor authentication.
What are the potential assessment methods and objects for 3.5.3 in NIST 800-171A?
Security Requirement 3.5.4: Employ replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts.
What is the security requirement for 3.5.4 in NIST 800-171A?
Assessment objectives for 3.5.4: 3.5.4[a] Replay-resistant authentication mechanisms are employed for network access to privileged accounts. 3.5.4[b] Replay-resistant authentication mechanisms are employed for network access to non-privileged accounts.
What are the assessment objectives for 3.5.4 in NIST 800-171A?
Potential assessment methods and objects for 3.5.4 include: Examine: Identification and authentication policy; procedures addressing replay-resistant authentication; system security plan; system configuration settings and associated documentation; replay-resistant authentication mechanisms documentation; other relevant documents or records. Interview: Personnel with replay-resistant authentication responsibilities. Test: Replay-resistant authentication mechanisms.
What are the potential assessment methods and objects for 3.5.4 in NIST 800-171A?
Security Requirement 3.5.5: Prevent reuse of identifiers for a defined period.
What is the security requirement for 3.5.5 in NIST 800-171A?
Assessment objectives for 3.5.5: 3.5.5[a] Identifiers are prevented from reuse for a defined period.
What are the assessment objectives for 3.5.5 in NIST 800-171A?
Potential assessment methods and objects for 3.5.5 include: Examine: Identification and authentication policy; procedures addressing identifier management; system security plan; system configuration settings and associated documentation; identifier management records; other relevant documents or records. Interview: Personnel with identifier management responsibilities. Test: Identifier management mechanisms.
What are the potential assessment methods and objects for 3.5.5 in NIST 800-171A?
Security Requirement 3.5.6: Disable identifiers after a defined period of inactivity.
What is the security requirement for 3.5.6 in NIST 800-171A?
Assessment objectives for 3.5.6: 3.5.6[a] Identifiers are disabled after a defined period of inactivity.
What are the assessment objectives for 3.5.6 in NIST 800-171A?
Potential assessment methods and objects for 3.5.6 include: Examine: Identification and authentication policy; procedures addressing management of inactive identifiers; system security plan; system configuration settings and associated documentation; records of disabled identifiers due to inactivity; other relevant documents or records. Interview: Personnel with responsibilities for managing identifier inactivity. Test: Mechanisms enforcing identifier inactivity management.
What are the potential assessment methods and objects for 3.5.6 in NIST 800-171A?
Security Requirement 3.5.7: Enforce a minimum password complexity and change of characters when new passwords are created.
What is the security requirement for 3.5.7 in NIST 800-171A?
Assessment objectives for 3.5.7: 3.5.7[a] Minimum password complexity is enforced. 3.5.7[b] A change of characters is required when new passwords are created.
What are the assessment objectives for 3.5.7 in NIST 800-171A?
Potential assessment methods and objects for 3.5.7 include: Examine: Identification and authentication policy; procedures addressing password management; system security plan; system configuration settings and associated documentation; password complexity settings; password history records; other relevant documents or records. Interview: Personnel with password management responsibilities. Test: Mechanisms enforcing password complexity and change of characters.
What are the potential assessment methods and objects for 3.5.7 in NIST 800-171A?
Security Requirement 3.5.8: Prohibit password reuse for a specified number of generations.
What is the security requirement for 3.5.8 in NIST 800-171A?
Assessment objectives for 3.5.8: 3.5.8[a] Password reuse is prohibited for the specified number of generations.
What are the assessment objectives for 3.5.8 in NIST 800-171A?
Potential assessment methods and objects for 3.5.8 include: Examine: Identification and authentication policy; procedures addressing password reuse; system security plan; system configuration settings and associated documentation; password history records; other relevant documents or records. Interview: Personnel with responsibilities for managing password reuse. Test: Mechanisms enforcing prohibition of password reuse.
What are the potential assessment methods and objects for 3.5.8 in NIST 800-171A?
Security Requirement 3.5.9: Allow temporary password use for system logons with an immediate change to a permanent password.
What is the security requirement for 3.5.9 in NIST 800-171A?
Assessment objectives for 3.5.9: 3.5.9[a] Temporary passwords are allowed for system logons. 3.5.9[b] An immediate change to a permanent password is required after system logon with a temporary password.
What are the assessment objectives for 3.5.9 in NIST 800-171A?
Potential assessment methods and objects for 3.5.9 include: Examine: Identification and authentication policy; procedures addressing temporary passwords; system security plan; system configuration settings and associated documentation; temporary password issuance records; other relevant documents or records. Interview: Personnel with responsibilities for temporary password management. Test: Mechanisms enforcing the change from temporary to permanent passwords.
What are the potential assessment methods and objects for 3.5.9 in NIST 800-171A?
Security Requirement 3.5.10: Store and transmit only cryptographically-protected passwords.
What is the security requirement for 3.5.10 in NIST 800-171A?
Assessment objectives for 3.5.10: 3.5.10[a] Passwords are stored and transmitted only in cryptographically protected form.
What are the assessment objectives for 3.5.10 in NIST 800-171A?
Potential assessment methods and objects for 3.5.10 include: Examine: Identification and authentication policy; procedures addressing password storage and transmission; system security plan; system configuration settings and associated documentation; cryptographic mechanisms used for password protection; other relevant documents or records. Interview: Personnel with responsibilities for managing password storage and transmission. Test: Mechanisms protecting passwords during storage and transmission.
What are the potential assessment methods and objects for 3.5.10 in NIST 800-171A?
Security Requirement 3.5.11: Obscure feedback of authentication information.
What is the security requirement for 3.5.11 in NIST 800-171A?
Assessment objectives for 3.5.11: 3.5.11[a] Determine if authentication information is obscured during the authentication process.
What are the assessment objectives for 3.5.11 in NIST 800-171A?
Potential assessment methods and objects for 3.5.11 include: Examine: Identification and authentication policy; procedures addressing authenticator feedback; system security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records. Interview: Personnel with information security responsibilities; system or network administrators; system developers. Test: Mechanisms supporting or implementing the obscuring of feedback of authentication information during authentication.
What are the potential assessment methods and objects for 3.5.11 in NIST 800-171A?
Security Requirement 3.6.1: Establish an operational incident-handling capability for organizational systems that includes preparation, detection, analysis, containment, recovery, and user response activities.
What is the security requirement for 3.6.1 in NIST 800-171A?
Assessment objectives for 3.6.1: 3.6.1[a] An operational incident-handling capability for organizational systems is established. 3.6.1[b] The incident-handling capability includes preparation, detection, analysis, containment, recovery, and user response activities.
What are the assessment objectives for 3.6.1 in NIST 800-171A?
Potential assessment methods and objects for 3.6.1 include: Examine: Incident response policy; procedures addressing incident handling; system security plan; incident response plan; incident response training materials; incident response test results; other relevant documents or records. Interview: Incident response team members. Test: Incident response capabilities.
What are the potential assessment methods and objects for 3.6.1 in NIST 800-171A?
Security Requirement 3.6.2: Track, document, and report incidents to designated officials and/or authorities both internal and external to the organization.
What is the security requirement for 3.6.2 in NIST 800-171A?
Assessment objectives for 3.6.2: 3.6.2[a] Incidents are tracked. 3.6.2[b] Incidents are documented. 3.6.2[c] Incidents are reported to designated officials and/or authorities both internal and external to the organization.
What are the assessment objectives for 3.6.2 in NIST 800-171A?
Potential assessment methods and objects for 3.6.2 include: Examine: Incident response policy; procedures addressing incident tracking, documentation, and reporting; system security plan; incident reports; incident tracking records; other relevant documents or records. Interview: Personnel involved in incident response. Test: Incident tracking and reporting systems.
What are the potential assessment methods and objects for 3.6.2 in NIST 800-171A?
Security Requirement 3.6.3: Test the organizational incident response capability.
What is the security requirement for 3.6.3 in NIST 800-171A?
Assessment objectives for 3.6.3: 3.6.3[a] The organizational incident response capability is tested.
What are the assessment objectives for 3.6.3 in NIST 800-171A?
Potential assessment methods and objects for 3.6.3 include: Examine: Incident response policy; procedures addressing incident response testing; system security plan; incident response testing records; test results; other relevant documents or records. Interview: Personnel involved in incident response testing. Test: Incident response testing procedures and mechanisms.
What are the potential assessment methods and objects for 3.6.3 in NIST 800-171A?
Security Requirement 3.7.1: Perform maintenance on organizational systems.
What is the security requirement for 3.7.1 in NIST 800-171A?
Assessment objectives for 3.7.1: 3.7.1[a] Maintenance on organizational systems is performed.
What are the assessment objectives for 3.7.1 in NIST 800-171A?
Potential assessment methods and objects for 3.7.1 include: Examine: Maintenance policy; maintenance records; system security plan; other relevant documents or records. Interview: Personnel performing maintenance. Test: Maintenance procedures and processes.
What are the potential assessment methods and objects for 3.7.1 in NIST 800-171A?
Security Requirement 3.7.2: Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance.
What is the security requirement for 3.7.2 in NIST 800-171A?
Assessment objectives for 3.7.2: 3.7.2[a] Controls are provided on the tools, techniques, mechanisms, and personnel used to conduct system maintenance.
What are the assessment objectives for 3.7.2 in NIST 800-171A?
Potential assessment methods and objects for 3.7.2 include: Examine: Maintenance policy; procedures addressing maintenance tools and personnel; list of approved maintenance tools and personnel; system security plan; maintenance records; other relevant documents or records. Interview: Maintenance personnel. Test: Controls on maintenance tools and activities.
What are the potential assessment methods and objects for 3.7.2 in NIST 800-171A?
Security Requirement 3.7.3: Ensure equipment removed for off-site maintenance is sanitized of any CUI.
What is the security requirement for 3.7.3 in NIST 800-171A?
Assessment objectives for 3.7.3: 3.7.3[a] Equipment removed for off-site maintenance is sanitized of any CUI.
What are the assessment objectives for 3.7.3 in NIST 800-171A?
Potential assessment methods and objects for 3.7.3 include: Examine: Maintenance policy; procedures addressing the sanitization of equipment; sanitization records; system security plan; other relevant documents or records. Interview: Personnel responsible for equipment sanitization. Test: Sanitization procedures and mechanisms.
What are the potential assessment methods and objects for 3.7.3 in NIST 800-171A?
Security Requirement 3.7.4: Check media containing diagnostic and test programs for malicious code before the media are used in organizational systems.
What is the security requirement for 3.7.4 in NIST 800-171A?
Assessment objectives for 3.7.4: 3.7.4[a] Media containing diagnostic and test programs are checked for malicious code before use in organizational systems.
What are the assessment objectives for 3.7.4 in NIST 800-171A?
Potential assessment methods and objects for 3.7.4 include: Examine: Maintenance policy; procedures addressing checking media for malicious code; media check records; system security plan; other relevant documents or records. Interview: Personnel responsible for checking media. Test: Mechanisms for checking media for malicious code.
What are the potential assessment methods and objects for 3.7.4 in NIST 800-171A?
Security Requirement 3.7.5: Require multifactor authentication to establish nonlocal maintenance sessions via external network connections and terminate such connections when nonlocal maintenance is complete.
What is the security requirement for 3.7.5 in NIST 800-171A?
Assessment objectives for 3.7.5: 3.7.5[a] Multifactor authentication is required to establish nonlocal maintenance sessions via external network connections. 3.7.5[b] Nonlocal maintenance sessions are terminated when complete.
What are the assessment objectives for 3.7.5 in NIST 800-171A?
Potential assessment methods and objects for 3.7.5 include: Examine: Maintenance policy; procedures addressing nonlocal maintenance; system security plan; authentication records; session termination records; other relevant documents or records. Interview: Personnel responsible for nonlocal maintenance. Test: Nonlocal maintenance connections and authentication mechanisms.
What are the potential assessment methods and objects for 3.7.5 in NIST 800-171A?
Security Requirement 3.7.6: Supervise the maintenance activities of maintenance personnel without required access authorization.
What is the security requirement for 3.7.6 in NIST 800-171A?
Assessment objectives for 3.7.6: 3.7.6[a] Maintenance activities of personnel without required access authorization are supervised.
What are the assessment objectives for 3.7.6 in NIST 800-171A?
Potential assessment methods and objects for 3.7.6 include: Examine: Maintenance policy; procedures addressing the supervision of maintenance personnel; maintenance records; system security plan; other relevant documents or records. Interview: Supervised maintenance personnel and their supervisors. Test: Supervision mechanisms for maintenance activities.
What are the potential assessment methods and objects for 3.7.6 in NIST 800-171A?
Security Requirement 3.8.1: Protect (i.e., physically control and securely store) system media containing CUI, both paper and digital.
What is the security requirement for 3.8.1 in NIST 800-171A?
Assessment objectives for 3.8.1: 3.8.1[a] System media containing CUI is protected. 3.8.1[b] System media containing CUI is physically controlled. 3.8.1[c] System media containing CUI is securely stored.
What are the assessment objectives for 3.8.1 in NIST 800-171A?
Potential assessment methods and objects for 3.8.1 include: Examine: Media protection policy; procedures addressing media storage and handling; system security plan; media storage locations; other relevant documents or records. Interview: Personnel responsible for media protection. Test: Media storage and handling controls.
What are the potential assessment methods and objects for 3.8.1 in NIST 800-171A?
Security Requirement 3.8.2: Limit access to CUI on system media to authorized users.
What is the security requirement for 3.8.2 in NIST 800-171A?
Assessment objectives for 3.8.2: 3.8.2[a] Access to CUI on system media is limited to authorized users.
What are the assessment objectives for 3.8.2 in NIST 800-171A?
Potential assessment methods and objects for 3.8.2 include: Examine: Media protection policy; procedures addressing access to media; system security plan; access control lists; audit logs; other relevant documents or records. Interview: Personnel responsible for media access control. Test: Media access control mechanisms.
What are the potential assessment methods and objects for 3.8.2 in NIST 800-171A?
Security Requirement 3.8.3: Sanitize or destroy system media containing CUI before disposal or release for reuse.
What is the security requirement for 3.8.3 in NIST 800-171A?
Assessment objectives for 3.8.3: 3.8.3[a] System media containing CUI is sanitized or destroyed before disposal or release for reuse.
What are the assessment objectives for 3.8.3 in NIST 800-171A?
Potential assessment methods and objects for 3.8.3 include: Examine: Media protection policy; procedures addressing media sanitization and destruction; sanitization and destruction records; system security plan; other relevant documents or records. Interview: Personnel responsible for media sanitization and destruction. Test: Media sanitization and destruction mechanisms.
What are the potential assessment methods and objects for 3.8.3 in NIST 800-171A?
Security Requirement 3.8.4: Mark media with necessary CUI markings and distribution limitations.
What is the security requirement for 3.8.4 in NIST 800-171A?
Assessment objectives for 3.8.4: 3.8.4[a] Media is marked with necessary CUI markings. 3.8.4[b] Media is marked with necessary distribution limitations.
What are the assessment objectives for 3.8.4 in NIST 800-171A?