input
stringclasses
1 value
output
stringlengths
45
2.38k
instruction
stringlengths
30
83
Security Requirement 3.13.14: Control and monitor the use of Voice over Internet Protocol (VoIP) technologies.
What is the security requirement for 3.13.14 in NIST 800-171A?
Determine if: 3.13.14[a] use of VoIP technologies is controlled; 3.13.14[b] use of VoIP technologies is monitored.
What are the assessment objectives for 3.13.14 in NIST 800-171A?
Potential assessment methods and objects for 3.13.14 include: Examine: System and communications protection policy, VoIP usage restrictions, system security plan, system design documentation. Interview: System or network administrators, personnel with responsibilities for managing VoIP. Test: Organizational process for authorizing, monitoring, and controlling VoIP; mechanisms supporting the management and monitoring of VoIP.
What are the potential assessment methods and objects for 3.13.14 in NIST 800-171A?
Security Requirement 3.13.15: Protect the authenticity of communications sessions.
What is the security requirement for 3.13.15 in NIST 800-171A?
Determine if the authenticity of communications sessions is protected.
What are the assessment objectives for 3.13.15 in NIST 800-171A?
Potential assessment methods and objects for 3.13.15 include: Examine: System and communications protection policy, procedures addressing session authenticity, system security plan, system design documentation. Interview: System or network administrators, personnel with information security responsibilities. Test: Mechanisms supporting or implementing session authenticity.
What are the potential assessment methods and objects for 3.13.15 in NIST 800-171A?
Security Requirement 3.13.16: Protect the confidentiality of CUI at rest.
What is the security requirement for 3.13.16 in NIST 800-171A?
Determine if the confidentiality of CUI at rest is protected.
What are the assessment objectives for 3.13.16 in NIST 800-171A?
Potential assessment methods and objects for 3.13.16 include: Examine: System and communications protection policy, procedures addressing protection of information at rest, system security plan, system design documentation, cryptographic mechanisms and their configuration. Interview: System or network administrators, personnel with information security responsibilities, system developers. Test: Mechanisms supporting or implementing confidentiality protections for information at rest.
What are the potential assessment methods and objects for 3.13.16 in NIST 800-171A?
Security Requirement 3.14.1: Identify, report, and correct system flaws in a timely manner.
What is the security requirement for 3.14.1 in NIST 800-171A?
Determine if: 3.14.1[a] the time to identify system flaws is specified; 3.14.1[b] system flaws are identified within the specified time frame; 3.14.1[c] the time to report system flaws is specified; 3.14.1[d] system flaws are reported within the specified time frame; 3.14.1[e] the time to correct system flaws is specified; 3.14.1[f] system flaws are corrected within the specified time frame.
What are the assessment objectives for 3.14.1 in NIST 800-171A?
Potential assessment methods and objects for 3.14.1 include: Examine: System and information integrity policy, flaw remediation procedures, system security plan, list of recent security flaw remediation actions. Interview: System or network administrators, personnel responsible for flaw remediation, personnel with configuration management responsibility. Test: Organizational processes for identifying, reporting, and correcting system flaws; mechanisms for installing software and firmware updates.
What are the potential assessment methods and objects for 3.14.1 in NIST 800-171A?
Security Requirement 3.14.2: Provide protection from malicious code at designated locations within organizational systems.
What is the security requirement for 3.14.2 in NIST 800-171A?
Determine if: 3.14.2[a] designated locations for malicious code protection are identified; 3.14.2[b] protection from malicious code at designated locations is provided.
What are the assessment objectives for 3.14.2 in NIST 800-171A?
Potential assessment methods and objects for 3.14.2 include: Examine: System and information integrity policy, malicious code protection procedures, records of malicious code protection updates, system security plan. Interview: System or network administrators, personnel responsible for malicious code protection. Test: Organizational processes for employing, updating, and configuring malicious code protection mechanisms; mechanisms supporting malicious code scanning and subsequent actions.
What are the potential assessment methods and objects for 3.14.2 in NIST 800-171A?
Security Requirement 3.14.3: Monitor system security alerts and advisories and take action in response.
What is the security requirement for 3.14.3 in NIST 800-171A?
Determine if: 3.14.3[a] response actions to system security alerts and advisories are identified; 3.14.3[b] system security alerts and advisories are monitored; 3.14.3[c] actions in response to system security alerts and advisories are taken.
What are the assessment objectives for 3.14.3 in NIST 800-171A?
Potential assessment methods and objects for 3.14.3 include: Examine: System and information integrity policy, procedures addressing security alerts, advisories, system security plan, records of security alerts and advisories. Interview: Personnel with security alert and advisory responsibilities, personnel implementing and maintaining the system, system or network administrators. Test: Organizational processes for defining, receiving, generating, disseminating, and complying with security alerts, advisories, and directives.
What are the potential assessment methods and objects for 3.14.3 in NIST 800-171A?
Security Requirement 3.14.4: Update malicious code protection mechanisms when new releases are available.
What is the security requirement for 3.14.4 in NIST 800-171A?
Determine if malicious code protection mechanisms are updated when new releases are available.
What are the assessment objectives for 3.14.4 in NIST 800-171A?
Potential assessment methods and objects for 3.14.4 include: Examine: System and information integrity policy, configuration management policy, procedures addressing malicious code protection, records of malicious code protection updates, system security plan. Interview: System or network administrators, personnel responsible for malicious code protection. Test: Organizational processes for employing, updating, and configuring malicious code protection mechanisms; mechanisms supporting malicious code scanning and subsequent actions.
What are the potential assessment methods and objects for 3.14.4 in NIST 800-171A?
Security Requirement 3.14.5: Perform periodic scans of organizational systems and real-time scans of files from external sources as files are downloaded, opened, or executed.
What is the security requirement for 3.14.5 in NIST 800-171A?
Determine if: 3.14.5[a] the frequency for malicious code scans is defined; 3.14.5[b] malicious code scans are performed with the defined frequency; 3.14.5[c] real-time malicious code scans of files from external sources as files are downloaded, opened, or executed are performed.
What are the assessment objectives for 3.14.5 in NIST 800-171A?
Potential assessment methods and objects for 3.14.5 include: Examine: System and information integrity policy, malicious code protection procedures, system security plan, system design documentation, records of malicious code protection updates. Interview: System or network administrators, personnel responsible for malicious code protection, personnel with configuration management responsibility. Test: Organizational processes for employing, updating, and configuring malicious code protection mechanisms; mechanisms supporting malicious code scanning and actions.
What are the potential assessment methods and objects for 3.14.5 in NIST 800-171A?
Security Requirement 3.14.6: Monitor organizational systems, including inbound and outbound communications traffic, to detect attacks and indicators of potential attacks.
What is the security requirement for 3.14.6 in NIST 800-171A?
Determine if: 3.14.6[a] the system is monitored to detect attacks and indicators of potential attacks; 3.14.6[b] inbound communications traffic is monitored to detect attacks and indicators of potential attacks; 3.14.6[c] outbound communications traffic is monitored to detect attacks and indicators of potential attacks.
What are the assessment objectives for 3.14.6 in NIST 800-171A?
Potential assessment methods and objects for 3.14.6 include: Examine: System and information integrity policy, system monitoring tools and techniques, system security plan, system design documentation, system configuration settings. Interview: System or network administrators, personnel responsible for system monitoring, personnel with responsibility for the intrusion detection system. Test: Organizational processes for system monitoring; mechanisms supporting or implementing intrusion detection capability and system monitoring.
What are the potential assessment methods and objects for 3.14.6 in NIST 800-171A?
Security Requirement 3.14.7: Identify unauthorized use of organizational systems.
What is the security requirement for 3.14.7 in NIST 800-171A?
Determine if: 3.14.7[a] authorized use of the system is defined; 3.14.7[b] unauthorized use of the system is identified.
What are the assessment objectives for 3.14.7 in NIST 800-171A?
Potential assessment methods and objects for 3.14.7 include: Examine: Continuous monitoring strategy, system and information integrity policy, system monitoring tools and techniques, system security plan, system design documentation. Interview: System or network administrators, personnel with information security responsibilities, personnel responsible for monitoring the system. Test: Organizational processes for system monitoring; mechanisms supporting or implementing system monitoring capability.
What are the potential assessment methods and objects for 3.14.7 in NIST 800-171A?
Security Requirement 3.1.1: Limit system access to authorized users, processes acting on behalf of authorized users, and devices (including other systems).
What does control 3.1.1 entail?
Potential assessment methods and objects for 3.1.1 include: Examine: Access control policy; procedures addressing account management; system security plan; system design documentation; system configuration settings and associated documentation; list of active system accounts and the name of the individual associated with each account; notifications or records of recently transferred, separated, or terminated employees; list of conditions for group and role membership; list of recently disabled system accounts along with the name of the individual associated with each account; access authorization records; account management compliance reviews; system monitoring records; system audit logs and records; list of devices and systems authorized to connect to organizational systems; other relevant documents or records. Interview: Personnel with account management responsibilities; system or network administrators; personnel with information security responsibilities. Test: Organizational processes for managing system accounts; mechanisms for implementing account management.
How is control 3.1.1 assessed?
Determine if: 3.1.1[a] Authorized users are identified; 3.1.1[b] Processes acting on behalf of authorized users are identified; 3.1.1[c] Devices (and other systems) authorized to connect to the system are identified; 3.1.1[d] System access is limited to authorized users; 3.1.1[e] System access is limited to processes acting on behalf of authorized users; 3.1.1[f] System access is limited to authorized devices (including other systems).
What are the detailed objectives for assessing control 3.1.1?
SECURITY REQUIREMENT: Limit system access to authorized users, processes acting on behalf of authorized users, and devices (including other systems). ASSESSMENT OBJECTIVE: Determine if: 3.1.1[a] authorized users are identified. 3.1.1[b] processes acting on behalf of authorized users are identified. 3.1.1[c] devices (and other systems) authorized to connect to the system are identified. 3.1.1[d] system access is limited to authorized users. 3.1.1[e] system access is limited to processes acting on behalf of authorized users. 3.1.1[f] system access is limited to authorized devices (including other systems). POTENTIAL ASSESSMENT METHODS AND OBJECTS Examine: [SELECT FROM: Access control policy; procedures addressing account management; system security plan; system design documentation; system configuration settings and associated documentation; list of active system accounts and the name of the individual associated with each account; notifications or records of recently transferred, separated, or terminated employees; list of conditions for group and role membership; list of recently disabled system accounts along with the name of the individual associated with each account; access authorization records; account management compliance reviews; system monitoring records; system audit logs and records; list of devices and systems authorized to connect to organizational systems; other relevant documents or records]. Interview: [SELECT FROM: Personnel with account management responsibilities; system or network administrators; personnel with information security responsibilities]. Test: [SELECT FROM: Organizational processes for managing system accounts; mechanisms for implementing account management].
What is control 3.1.1 in NIST 800-171A?
Security Requirement 3.1.2: Limit system access to the types of transactions and functions that authorized users are permitted to execute.
What does control 3.1.2 entail?
Potential assessment methods and objects for 3.1.2 include: Examine: Access control policy, procedures addressing access enforcement, system security plan, system design documentation, list of approved authorizations including remote access authorizations, system audit logs and records, system configuration settings and associated documentation, and other relevant documents or records. Interview: Personnel with access enforcement responsibilities, system or network administrators, personnel with information security responsibilities, system developers. Test: Mechanisms implementing access control policy.
How is control 3.1.2 assessed?
Determine if: 3.1.2[a] The types of transactions and functions that authorized users are permitted to execute are defined. 3.1.2[b] System access is limited to the defined types of transactions and functions for authorized users.
What are the detailed objectives for assessing control 3.1.2?
Security Requirement 3.1.2: Limit system access to the types of transactions and functions that authorized users are permitted to execute. Assessment Objectives: 3.1.2[a] The types of transactions and functions that authorized users are permitted to execute are defined. 3.1.2[b] System access is limited to the defined types of transactions and functions for authorized users. Potential Assessment Methods and Objects: Examine: Access control policy, procedures addressing access enforcement, system security plan, system design documentation, list of approved authorizations including remote access authorizations, system audit logs and records, system configuration settings and associated documentation, and other relevant documents or records. Interview: Personnel with access enforcement responsibilities, system or network administrators, personnel with information security responsibilities, system developers. Test: Mechanisms implementing access control policy.
What is control 3.1.2 in NIST 800-171A?
Security Requirement 3.1.3: Control the flow of CUI in accordance with approved authorizations.
What does control 3.1.3 entail?
Potential assessment methods and objects for 3.1.3 include: Examine: Access control policy, information flow control policies, procedures addressing information flow enforcement, system security plan, system design documentation, system configuration settings and associated documentation, list of information flow authorizations, system baseline configuration, system audit logs and records, and other relevant documents or records. Interview: System or network administrators, personnel with information security responsibilities, system developers. Test: Mechanisms implementing information flow enforcement policy.
How is control 3.1.3 assessed?
Determine if: 3.1.3[a] Information flow control policies are defined. 3.1.3[b] Methods and enforcement mechanisms for controlling the flow of CUI are defined. 3.1.3[c] Designated sources and destinations for CUI within the system and between interconnected systems are identified. 3.1.3[d] Authorizations for controlling the flow of CUI are defined. 3.1.3[e] Approved authorizations for controlling the flow of CUI are enforced.
What are the detailed objectives for assessing control 3.1.3?
Security Requirement 3.1.3: Control the flow of CUI in accordance with approved authorizations. Assessment Objectives: 3.1.3[a] Information flow control policies are defined. 3.1.3[b] Methods and enforcement mechanisms for controlling the flow of CUI are defined. 3.1.3[c] Designated sources and destinations for CUI within the system and between interconnected systems are identified. 3.1.3[d] Authorizations for controlling the flow of CUI are defined. 3.1.3[e] Approved authorizations for controlling the flow of CUI are enforced. Potential Assessment Methods and Objects: Examine: Access control policy, information flow control policies, procedures addressing information flow enforcement, system security plan, system design documentation, system configuration settings and associated documentation, list of information flow authorizations, system baseline configuration, system audit logs and records, and other relevant documents or records. Interview: System or network administrators, personnel with information security responsibilities, system developers. Test: Mechanisms implementing information flow enforcement policy.
What is control 3.1.3 in NIST 800-171A?
Security Requirement 3.1.4: Separate the duties of individuals to reduce the risk of malevolent activity without collusion.
What does control 3.1.4 entail?
Potential assessment methods and objects for 3.1.4 include: Examine: Access control policy, procedures addressing divisions of responsibility and separation of duties, system security plan, system configuration settings and associated documentation, list of divisions of responsibility and separation of duties, system access authorizations, system audit logs and records, and other relevant documents or records. Interview: Personnel with responsibilities for defining divisions of responsibility and separation of duties, personnel with information security responsibilities, system or network administrators. Test: Mechanisms implementing separation of duties policy.
How is control 3.1.4 assessed?
Determine if: 3.1.4[a] The duties of individuals requiring separation are defined. 3.1.4[b] Responsibilities for duties that require separation are assigned to separate individuals. 3.1.4[c] Access privileges that enable individuals to exercise the duties that require separation are granted to separate individuals.
What are the detailed objectives for assessing control 3.1.4?
Security Requirement 3.1.4: Separate the duties of individuals to reduce the risk of malevolent activity without collusion. Assessment Objectives: 3.1.4[a] The duties of individuals requiring separation are defined. 3.1.4[b] Responsibilities for duties that require separation are assigned to separate individuals. 3.1.4[c] Access privileges that enable individuals to exercise the duties that require separation are granted to separate individuals. Potential Assessment Methods and Objects: Examine: Access control policy, procedures addressing divisions of responsibility and separation of duties, system security plan, system configuration settings and associated documentation, list of divisions of responsibility and separation of duties, system access authorizations, system audit logs and records, and other relevant documents or records. Interview: Personnel with responsibilities for defining divisions of responsibility and separation of duties, personnel with information security responsibilities, system or network administrators. Test: Mechanisms implementing separation of duties policy.
What is control 3.1.4 in NIST 800-171A?
Security Requirement 3.1.5: Employ the principle of least privilege, including for specific security functions and privileged accounts.
What does control 3.1.5 entail?
Potential assessment methods and objects for 3.1.5 include: Examine: Access control policy; procedures addressing account management; system security plan; system design documentation; system configuration settings and associated documentation; list of active system accounts and the name of the individual associated with each account; list of conditions for group and role membership; notifications or records of recently transferred, separated, or terminated employees; list of recently disabled system accounts along with the name of the individual associated with each account; access authorization records; account management compliance reviews; system monitoring/audit records; procedures addressing least privilege; list of security functions deployed in hardware, software, and firmware, and security-relevant information for which access is to be explicitly authorized; list of system-generated privileged accounts; list of system administration personnel, and other relevant documents or records. Interview: Personnel with account management responsibilities; system or network administrators; personnel with information security responsibilities; personnel with responsibilities for defining least privileges necessary to accomplish specified tasks. Test: Organizational processes for managing system accounts; mechanisms for implementing account management; mechanisms implementing least privilege functions; mechanisms prohibiting privileged access to the system.
How is control 3.1.5 assessed?
Determine if: 3.1.5[a] Privileged accounts are identified; 3.1.5[b] Access to privileged accounts is authorized in accordance with the principle of least privilege; 3.1.5[c] Security functions are identified; 3.1.5[d] Access to security functions is authorized in accordance with the principle of least privilege.
What are the detailed objectives for assessing control 3.1.5?
Security Requirement 3.1.5: Employ the principle of least privilege, including for specific security functions and privileged accounts. Assessment Objectives: 3.1.5[a] Privileged accounts are identified; 3.1.5[b] Access to privileged accounts is authorized in accordance with the principle of least privilege; 3.1.5[c] Security functions are identified; 3.1.5[d] Access to security functions is authorized in accordance with the principle of least privilege. Potential Assessment Methods and Objects: Examine: Access control policy; procedures addressing account management; system security plan; system design documentation; system configuration settings and associated documentation; list of active system accounts and the name of the individual associated with each account; list of conditions for group and role membership; notifications or records of recently transferred, separated, or terminated employees; list of recently disabled system accounts along with the name of the individual associated with each account; access authorization records; account management compliance reviews; system monitoring/audit records; procedures addressing least privilege; list of security functions deployed in hardware, software, and firmware, and security-relevant information for which access is to be explicitly authorized; list of system-generated privileged accounts; list of system administration personnel, and other relevant documents or records. Interview: Personnel with account management responsibilities; system or network administrators; personnel with information security responsibilities; personnel with responsibilities for defining least privileges necessary to accomplish specified tasks. Test: Organizational processes for managing system accounts; mechanisms for implementing account management; mechanisms implementing least privilege functions; mechanisms prohibiting privileged access to the system.
What is control 3.1.5 in NIST 800-171A?
Security Requirement 3.1.6: Use non-privileged accounts or roles when accessing nonsecurity functions.
What does control 3.1.6 entail?
Potential assessment methods and objects for 3.1.6 include: Examine: Access control policy; procedures addressing least privilege; system security plan; list of system-generated security functions assigned to system accounts or roles; system configuration settings and associated documentation; system audit logs and records; and other relevant documents or records. Interview: Personnel with responsibilities for defining least privileges necessary to accomplish specified organizational tasks; personnel with information security responsibilities; system or network administrators. Test: Mechanisms implementing least privilege functions.
How is control 3.1.6 assessed?
Determine if: 3.1.6[a] Nonsecurity functions are identified; 3.1.6[b] Users are required to use non-privileged accounts or roles when accessing nonsecurity functions.
What are the detailed objectives for assessing control 3.1.6?
Security Requirement 3.1.6: Use non-privileged accounts or roles when accessing nonsecurity functions. Assessment Objectives: 3.1.6[a] Nonsecurity functions are identified; 3.1.6[b] Users are required to use non-privileged accounts or roles when accessing nonsecurity functions. Potential Assessment Methods and Objects: Examine: Access control policy; procedures addressing least privilege; system security plan; list of system-generated security functions assigned to system accounts or roles; system configuration settings and associated documentation; system audit logs and records; and other relevant documents or records. Interview: Personnel with responsibilities for defining least privileges necessary to accomplish specified organizational tasks; personnel with information security responsibilities; system or network administrators. Test: Mechanisms implementing least privilege functions.
What is control 3.1.6 in NIST 800-171A?
Security Requirement 3.1.7: Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs.
What does control 3.1.7 entail?
Potential assessment methods and objects for 3.1.7 include: Examine: [SELECT FROM: Access control policy; procedures addressing least privilege; system security plan; system design documentation; list of privileged functions and associated user account assignments; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records]. Interview: [SELECT FROM: Personnel with responsibilities for defining least privileges necessary to accomplish specified tasks; personnel with information security responsibilities; system developers]. Test: [SELECT FROM: Mechanisms implementing least privilege functions for non-privileged users; mechanisms auditing the execution of privileged functions].
How is control 3.1.7 assessed?
Determine if: 3.1.7[a] Privileged functions are defined; 3.1.7[b] Non-privileged users are defined; 3.1.7[c] Non-privileged users are prevented from executing privileged functions; 3.1.7[d] The execution of privileged functions is captured in audit logs.
What are the detailed objectives for assessing control 3.1.7?
Security Requirement 3.1.7: Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs. Assessment Objectives: 3.1.7[a] Privileged functions are defined; 3.1.7[b] Non-privileged users are defined; 3.1.7[c] Non-privileged users are prevented from executing privileged functions; 3.1.7[d] The execution of privileged functions is captured in audit logs. Potential Assessment Methods and Objects: Examine: [SELECT FROM: Access control policy; procedures addressing least privilege; system security plan; system design documentation; list of privileged functions and associated user account assignments; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records]. Interview: [SELECT FROM: Personnel with responsibilities for defining least privileges necessary to accomplish specified tasks; personnel with information security responsibilities; system developers]. Test: [SELECT FROM: Mechanisms implementing least privilege functions for non-privileged users; mechanisms auditing the execution of privileged functions].
What is control 3.1.7 in NIST 800-171A?
Security Requirement 3.1.8: Limit unsuccessful logon attempts.
What does control 3.1.8 entail?
Potential assessment methods and objects for 3.1.8 include: Examine: Access control policy; procedures addressing unsuccessful logon attempts; system security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records. Interview: Personnel with information security responsibilities; system developers; system or network administrators. Test: Mechanisms implementing access control policy for unsuccessful logon attempts.
How is control 3.1.8 assessed?
Determine if: 3.1.8[a] The means of limiting unsuccessful logon attempts is defined; 3.1.8[b] The defined means of limiting unsuccessful logon attempts is implemented.
What are the detailed objectives for assessing control 3.1.8?
Security Requirement 3.1.8: Limit unsuccessful logon attempts. Assessment Objectives: 3.1.8[a] The means of limiting unsuccessful logon attempts is defined; 3.1.8[b] The defined means of limiting unsuccessful logon attempts is implemented. Potential Assessment Methods and Objects: Examine: Access control policy; procedures addressing unsuccessful logon attempts; system security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records. Interview: Personnel with information security responsibilities; system developers; system or network administrators. Test: Mechanisms implementing access control policy for unsuccessful logon attempts.
What is control 3.1.8 in NIST 800-171A?
Security Requirement 3.1.9: Provide privacy and security notices consistent with applicable CUI rules.
What does control 3.1.9 entail?
Potential assessment methods and objects for 3.1.9 include: Examine: Privacy and security policies; procedures addressing system use notification; documented approval of system use notification messages or banners; system audit logs and records; system design documentation; user acknowledgements of notification message or banner; system security plan; system use notification messages; system configuration settings and associated documentation; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; personnel with responsibility for providing legal advice; system developers. Test: Mechanisms implementing system use notification.
How is control 3.1.9 assessed?
Determine if: 3.1.9[a] Privacy and security notices required by CUI-specified rules are identified consistent and associated with the specific CUI category. 3.1.9[b] Privacy and security notices are displayed.
What are the detailed objectives for assessing control 3.1.9?
Security Requirement 3.1.9: Provide privacy and security notices consistent with applicable CUI rules. Assessment Objectives: 3.1.9[a] Privacy and security notices required by CUI-specified rules are identified consistent and associated with the specific CUI category. 3.1.9[b] Privacy and security notices are displayed. Potential Assessment Methods and Objects: Examine: Privacy and security policies; procedures addressing system use notification; documented approval of system use notification messages or banners; system audit logs and records; system design documentation; user acknowledgements of notification message or banner; system security plan; system use notification messages; system configuration settings and associated documentation; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; personnel with responsibility for providing legal advice; system developers. Test: Mechanisms implementing system use notification.
What is control 3.1.9 in NIST 800-171A?
Security Requirement 3.1.10: Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity.
What does control 3.1.10 entail?
Potential assessment methods and objects for 3.1.10 include: Examine: Access control policy; procedures addressing session lock; procedures addressing identification and authentication; system design documentation; system configuration settings and associated documentation; system security plan; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; system developers. Test: Mechanisms implementing access control policy for session lock.
How is control 3.1.10 assessed?
Determine if: 3.1.10[a] The period of inactivity after which the system initiates a session lock is defined. 3.1.10[b] Access to the system and viewing of data is prevented by initiating a session lock after the defined period of inactivity. 3.1.10[c] Previously visible information is concealed via a pattern-hiding display after the defined period of inactivity.
What are the detailed objectives for assessing control 3.1.10?
Security Requirement 3.1.10: Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity. Assessment Objectives: 3.1.10[a] The period of inactivity after which the system initiates a session lock is defined. 3.1.10[b] Access to the system and viewing of data is prevented by initiating a session lock after the defined period of inactivity. 3.1.10[c] Previously visible information is concealed via a pattern-hiding display after the defined period of inactivity. Potential Assessment Methods and Objects: Examine: Access control policy; procedures addressing session lock; procedures addressing identification and authentication; system design documentation; system configuration settings and associated documentation; system security plan; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; system developers. Test: Mechanisms implementing access control policy for session lock.
What is control 3.1.10 in NIST 800-171A?
Security Requirement 3.1.11: Terminate (automatically) a user session after a defined condition.
What does control 3.1.11 entail?
Potential assessment methods and objects for 3.1.11 include: Examine: Access control policy; procedures addressing session termination; system design documentation; system security plan; system configuration settings and associated documentation; list of conditions or trigger events requiring session disconnect; system audit logs and records; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; system developers. Test: Mechanisms implementing user session termination.
How is control 3.1.11 assessed?
Determine if: 3.1.11[a] Conditions requiring a user session to terminate are defined. 3.1.11[b] A user session is automatically terminated after any of the defined conditions occur.
What are the detailed objectives for assessing control 3.1.11?
Security Requirement 3.1.11: Terminate (automatically) a user session after a defined condition. Assessment Objectives: 3.1.11[a] Conditions requiring a user session to terminate are defined. 3.1.11[b] A user session is automatically terminated after any of the defined conditions occur. Potential Assessment Methods and Objects: Examine: Access control policy; procedures addressing session termination; system design documentation; system security plan; system configuration settings and associated documentation; list of conditions or trigger events requiring session disconnect; system audit logs and records; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; system developers. Test: Mechanisms implementing user session termination.
What is control 3.1.11 in NIST 800-171A?
Security Requirement 3.1.12: Monitor and control remote access sessions.
What does control 3.1.12 entail?
Potential assessment methods and objects for 3.1.12 include: Examine: Access control policy; procedures addressing remote access implementation and usage (including restrictions); configuration management plan; system security plan; system design documentation; system configuration settings and associated documentation; remote access authorizations; system audit logs and records; other relevant documents or records. Interview: Personnel with responsibilities for managing remote access connections; system or network administrators; personnel with information security responsibilities. Test: Remote access management capability for the system.
How is control 3.1.12 assessed?
Determine if: 3.1.12[a] Remote access sessions are permitted. 3.1.12[b] The types of permitted remote access are identified. 3.1.12[c] Remote access sessions are controlled. 3.1.12[d] Remote access sessions are monitored.
What are the detailed objectives for assessing control 3.1.12?
Security Requirement 3.1.12: Monitor and control remote access sessions. Assessment Objectives: 3.1.12[a] Remote access sessions are permitted. 3.1.12[b] The types of permitted remote access are identified. 3.1.12[c] Remote access sessions are controlled. 3.1.12[d] Remote access sessions are monitored. Potential Assessment Methods and Objects: Examine: Access control policy; procedures addressing remote access implementation and usage (including restrictions); configuration management plan; system security plan; system design documentation; system configuration settings and associated documentation; remote access authorizations; system audit logs and records; other relevant documents or records. Interview: Personnel with responsibilities for managing remote access connections; system or network administrators; personnel with information security responsibilities. Test: Remote access management capability for the system.
What is control 3.1.12 in NIST 800-171A?
Security Requirement 3.1.13: Employ cryptographic mechanisms to protect the confidentiality of remote access sessions.
What does control 3.1.13 entail?
Potential assessment methods and objects for 3.1.13 include: Examine: Access control policy; procedures addressing remote access to the system; system security plan; system design documentation; system configuration settings and associated documentation; cryptographic mechanisms and associated configuration documentation; system audit logs and records; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; system developers. Test: Cryptographic mechanisms protecting remote access sessions.
How is control 3.1.13 assessed?
Determine if: 3.1.13[a] Cryptographic mechanisms to protect the confidentiality of remote access sessions are identified. 3.1.13[b] Cryptographic mechanisms to protect the confidentiality of remote access sessions are implemented.
What are the detailed objectives for assessing control 3.1.13?
Security Requirement 3.1.13: Employ cryptographic mechanisms to protect the confidentiality of remote access sessions. Assessment Objectives: 3.1.13[a] Cryptographic mechanisms to protect the confidentiality of remote access sessions are identified. 3.1.13[b] Cryptographic mechanisms to protect the confidentiality of remote access sessions are implemented. Potential Assessment Methods and Objects: Examine: Access control policy; procedures addressing remote access to the system; system security plan; system design documentation; system configuration settings and associated documentation; cryptographic mechanisms and associated configuration documentation; system audit logs and records; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; system developers. Test: Cryptographic mechanisms protecting remote access sessions.
What is control 3.1.13 in NIST 800-171A?
Security Requirement 3.1.14: Route remote access via managed access control points.
What does control 3.1.14 entail?
Potential assessment methods and objects for 3.1.14 include: Examine: Access control policy; procedures addressing remote access to the system; system security plan; system design documentation; list of all managed network access control points; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities. Test: Mechanisms routing all remote accesses through managed network access control points.
How is control 3.1.14 assessed?
Determine if: 3.1.14[a] Managed access control points are identified and implemented. 3.1.14[b] Remote access is routed through managed network access control points.
What are the detailed objectives for assessing control 3.1.14?
Security Requirement 3.1.14: Route remote access via managed access control points. Assessment Objectives: 3.1.14[a] Managed access control points are identified and implemented. 3.1.14[b] Remote access is routed through managed network access control points. Potential Assessment Methods and Objects: Examine: Access control policy; procedures addressing remote access to the system; system security plan; system design documentation; list of all managed network access control points; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities. Test: Mechanisms routing all remote accesses through managed network access control points.
What is control 3.1.14 in NIST 800-171A?
Security Requirement 3.1.15: Authorize remote execution of privileged commands and remote access to security-relevant information.
What does control 3.1.15 entail?
Potential assessment methods and objects for 3.1.15 include: Examine: Access control policy; procedures addressing remote access to the system; system configuration settings and associated documentation; system security plan; system audit logs and records; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities. Test: Mechanisms implementing remote access management.
How is control 3.1.15 assessed?
Determine if: 3.1.15[a] Privileged commands authorized for remote execution are identified; 3.1.15[b] Security-relevant information authorized to be accessed remotely is identified; 3.1.15[c] The execution of the identified privileged commands via remote access is authorized; 3.1.15[d] Access to the identified security-relevant information via remote access is authorized.
What are the detailed objectives for assessing control 3.1.15?
Security Requirement 3.1.15: Authorize remote execution of privileged commands and remote access to security-relevant information. Assessment Objectives: 3.1.15[a] Privileged commands authorized for remote execution are identified. 3.1.15[b] Security-relevant information authorized to be accessed remotely is identified. 3.1.15[c] The execution of the identified privileged commands via remote access is authorized. 3.1.15[d] Access to the identified security-relevant information via remote access is authorized. Potential Assessment Methods and Objects: Examine: Access control policy; procedures addressing remote access to the system; system configuration settings and associated documentation; system security plan; system audit logs and records; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities. Test: Mechanisms implementing remote access management.
What is control 3.1.15 in NIST 800-171A?
Security Requirement 3.1.16: Authorize wireless access prior to allowing such connections.
What does control 3.1.16 entail?
Potential assessment methods and objects for 3.1.16 include: Examine: Access control policy; configuration management plan; procedures addressing wireless access implementation and usage (including restrictions); system security plan; system design documentation; system configuration settings and associated documentation; wireless access authorizations; system audit logs and records; other relevant documents or records. Interview: Personnel with responsibilities for managing wireless access connections; personnel with information security responsibilities. Test: Wireless access management capability for the system.
How is control 3.1.16 assessed?
Determine if: 3.1.16[a] Wireless access points are identified. 3.1.16[b] Wireless access is authorized prior to allowing such connections.
What are the detailed objectives for assessing control 3.1.16?
Security Requirement 3.1.16: Authorize wireless access prior to allowing such connections. Assessment Objectives: 3.1.16[a] Wireless access points are identified. 3.1.16[b] Wireless access is authorized prior to allowing such connections. Potential Assessment Methods and Objects: Examine: Access control policy; configuration management plan; procedures addressing wireless access implementation and usage (including restrictions); system security plan; system design documentation; system configuration settings and associated documentation; wireless access authorizations; system audit logs and records; other relevant documents or records. Interview: Personnel with responsibilities for managing wireless access connections; personnel with information security responsibilities. Test: Wireless access management capability for the system.
What is control 3.1.16 in NIST 800-171A?
Security Requirement 3.1.17: Protect wireless access using authentication and encryption.
What does control 3.1.17 entail?
Potential assessment methods and objects for 3.1.17 include: Examine: Access control policy; system design documentation; procedures addressing wireless implementation and usage (including restrictions); system security plan; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; system developers. Test: Mechanisms implementing wireless access protections to the system.
How is control 3.1.17 assessed?
Determine if: 3.1.17[a] Wireless access to the system is protected using authentication. 3.1.17[b] Wireless access to the system is protected using encryption.
What are the detailed objectives for assessing control 3.1.17?
Security Requirement 3.1.17: Protect wireless access using authentication and encryption. Assessment Objectives: 3.1.17[a] Wireless access to the system is protected using authentication. 3.1.17[b] Wireless access to the system is protected using encryption. Potential Assessment Methods and Objects: Examine: Access control policy; system design documentation; procedures addressing wireless implementation and usage (including restrictions); system security plan; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; system developers. Test: Mechanisms implementing wireless access protections to the system.
What is control 3.1.17 in NIST 800-171A?
Security Requirement 3.1.18: Control connection of mobile devices.
What does control 3.1.18 entail?
Potential assessment methods and objects for 3.1.18 include: Examine: Access control policy; authorizations for mobile device connections to organizational systems; procedures addressing access control for mobile device usage (including restrictions); system design documentation; configuration management plan; system security plan; system audit logs and records; system configuration settings and associated documentation; other relevant documents or records. Interview: Personnel using mobile devices to access organizational systems; system or network administrators; personnel with information security responsibilities. Test: Access control capability authorizing mobile device connections to organizational systems.
How is control 3.1.18 assessed?