input
stringclasses
1 value
output
stringlengths
45
2.38k
instruction
stringlengths
30
83
Potential assessment methods and objects for 3.13.6 include: Examine: System and communications protection policy; procedures addressing boundary protection; system security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; system developer; personnel with boundary protection responsibilities. Test: Mechanisms implementing traffic management at managed interfaces.
How is control 3.13.6 assessed?
Determine if: 3.13.6[a] network communications traffic is denied by default; 3.13.6[b] network communications traffic is allowed by exception.
What are the detailed objectives for assessing control 3.13.6?
Security Requirement 3.13.6: Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception). Assessment Objectives: Determine if: 3.13.6[a] network communications traffic is denied by default; 3.13.6[b] network communications traffic is allowed by exception. Potential Assessment Methods and Objects: Examine: System and communications protection policy; procedures addressing boundary protection; system security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; system developer; personnel with boundary protection responsibilities. Test: Mechanisms implementing traffic management at managed interfaces.
What is control 3.13.6 in NIST 800-171A?
Security Requirement 3.13.7: Prevent remote devices from simultaneously establishing non-remote connections with organizational systems and communicating via some other connection to resources in external networks (i.e., split tunneling).
What does control 3.13.7 entail?
Potential assessment methods and objects for 3.13.7 include: Examine: System and communications protection policy; procedures addressing boundary protection; system security plan; system design documentation; system hardware and software; system architecture; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; system developer; personnel with boundary protection responsibilities. Test: Mechanisms implementing boundary protection capability; mechanisms supporting or restricting non-remote connections.
How is control 3.13.7 assessed?
Determine if remote devices are prevented from simultaneously establishing non-remote connections with the system and communicating via some other connection to resources in external networks (i.e., split tunneling).
What are the detailed objectives for assessing control 3.13.7?
Security Requirement 3.13.7: Prevent remote devices from simultaneously establishing non-remote connections with organizational systems and communicating via some other connection to resources in external networks (i.e., split tunneling). Assessment Objectives: Determine if remote devices are prevented from simultaneously establishing non-remote connections with the system and communicating via some other connection to resources in external networks (i.e., split tunneling). Potential Assessment Methods and Objects: Examine: System and communications protection policy; procedures addressing boundary protection; system security plan; system design documentation; system hardware and software; system architecture; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; system developer; personnel with boundary protection responsibilities. Test: Mechanisms implementing boundary protection capability; mechanisms supporting or restricting non-remote connections.
What is control 3.13.7 in NIST 800-171A?
Security Requirement 3.13.8: Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission unless otherwise protected by alternative physical safeguards.
What does control 3.13.8 entail?
Potential assessment methods and objects for 3.13.8 include: Examine: System and communications protection policy; procedures addressing transmission confidentiality and integrity; system security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; system developer. Test: Cryptographic mechanisms or mechanisms supporting or implementing transmission confidentiality; organizational processes for defining and implementing alternative physical safeguards.
How is control 3.13.8 assessed?
Determine if: 3.13.8[a] cryptographic mechanisms intended to prevent unauthorized disclosure of CUI are identified; 3.13.8[b] alternative physical safeguards intended to prevent unauthorized disclosure of CUI are identified; 3.13.8[c] either cryptographic mechanisms or alternative physical safeguards are implemented to prevent unauthorized disclosure of CUI during transmission.
What are the detailed objectives for assessing control 3.13.8?
Security Requirement 3.13.8: Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission unless otherwise protected by alternative physical safeguards. Assessment Objectives: 3.13.8[a] cryptographic mechanisms intended to prevent unauthorized disclosure of CUI are identified; 3.13.8[b] alternative physical safeguards intended to prevent unauthorized disclosure of CUI are identified; 3.13.8[c] either cryptographic mechanisms or alternative physical safeguards are implemented to prevent unauthorized disclosure of CUI during transmission. Potential Assessment Methods and Objects: Examine: System and communications protection policy; procedures addressing transmission confidentiality and integrity; system security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; system developer. Test: Cryptographic mechanisms or mechanisms supporting or implementing transmission confidentiality; organizational processes for defining and implementing alternative physical safeguards.
What is control 3.13.8 in NIST 800-171A?
Security Requirement 3.13.9: Terminate network connections associated with communications sessions at the end of the sessions or after a defined period of inactivity.
What does control 3.13.9 entail?
Potential assessment methods and objects for 3.13.9 include: Examine: System and communications protection policy; procedures addressing network disconnect; system design documentation; system security plan; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records. Interview: System or network administrators, personnel with information security responsibilities; system developer. Test: Mechanisms supporting or implementing network disconnect capability.
How is control 3.13.9 assessed?
Determine if: 3.13.9[a] a period of inactivity to terminate network connections associated with communications sessions is defined. 3.13.9[b] ] network connections associated with communications sessions are terminated at the end of the sessions. 3.13.9[c] ] network connections associated with communications sessions are terminated after the defined period of inactivity.
What are the detailed objectives for assessing control 3.13.9?
Security Requirement 3.13.9: Terminate network connections associated with communications sessions at the end of the sessions or after a defined period of inactivity. Assessment Objectives: Determine if: 3.13.9[a] a period of inactivity to terminate network connections associated with communications sessions is defined. 3.13.9[b] ] network connections associated with communications sessions are terminated at the end of the sessions. 3.13.9[c] ] network connections associated with communications sessions are terminated after the defined period of inactivity. Potential Assessment Methods and Objects: Examine: System and communications protection policy; procedures addressing network disconnect; system design documentation; system security plan; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records. Interview: System or network administrators, personnel with information security responsibilities; system developer. Test: Mechanisms supporting or implementing network disconnect capability.
What is control 3.13.9 in NIST 800-171A?
Security Requirement 3.13.10: Establish and manage cryptographic keys for cryptography employed in organizational systems.
What does control 3.13.10 entail?
Potential assessment methods and objects for 3.13.10 include: Examine: System and communications protection policy; procedures addressing cryptographic key establishment and management; system security plan; system design documentation; cryptographic mechanisms; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; personnel with responsibilities for cryptographic key establishment and management. Test: Mechanisms supporting or implementing cryptographic key establishment and management.
How is control 3.13.10 assessed?
Determine if: 3.13.10[a] cryptographic keys are established and managed whenever cryptography is employed. 3.13.10[b] cryptographic keys are managed whenever cryptography is employed.
What are the detailed objectives for assessing control 3.13.10?
Security Requirement 3.13.10: Establish and manage cryptographic keys for cryptography employed in organizational systems. Assessment Objectives:Determine if: 3.13.10[a] cryptographic keys are established and managed whenever cryptography is employed. 3.13.10[b] cryptographic keys are managed whenever cryptography is employed. Potential Assessment Methods and Objects: Examine: System and communications protection policy; procedures addressing cryptographic key establishment and management; system security plan; system design documentation; cryptographic mechanisms; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; personnel with responsibilities for cryptographic key establishment and management. Test: Mechanisms supporting or implementing cryptographic key establishment and management.
What is control 3.13.10 in NIST 800-171A?
Security Requirement 3.13.11: Employ FIPS-validated cryptography when used to protect the confidentiality of CUI.
What does control 3.13.11 entail?
Potential assessment methods and objects for 3.13.11 include: Examine: System and communications protection policy; procedures addressing cryptographic protection; system security plan; system design documentation; system configuration settings and associated documentation; cryptographic module validation certificates; list of FIPS-validated cryptographic modules; system audit logs and records; other relevant documents or records. Interview: System or network administrators, personnel with information security responsibilities, personnel with responsibilities for cryptographic protection. Test: Mechanisms supporting or implementing cryptographic protection.
How is control 3.13.11 assessed?
Determine if FIPS-validated cryptography is employed to protect the confidentiality of CUI.
What are the detailed objectives for assessing control 3.13.11?
Security Requirement 3.13.11: Employ FIPS-validated cryptography to protect the confidentiality of CUI. Assessment Objectives: Determine if FIPS-validated cryptography is employed to protect the confidentiality of CUI. Potential Assessment Methods and Objects: Examine: System and communications protection policy; procedures addressing cryptographic protection; system security plan; system design documentation; system configuration settings and associated documentation; cryptographic module validation certificates; list of FIPS-validated cryptographic modules; system audit logs and records; other relevant documents or records. Interview: System or network administrators, personnel with information security responsibilities, personnel with responsibilities for cryptographic protection. Test: Mechanisms supporting or implementing cryptographic protection.
What is control 3.13.11 in NIST 800-171A?
Security Requirement 3.13.12: Prohibit remote activation of collaborative computing devices and provide indication of devices in use to users present at the device.
What does control 3.13.12 entail?
Potential assessment methods and objects for 3.13.12 include: Examine: System and communications protection policy; procedures addressing collaborative computing; access control policy and procedures; system security plan; system design documentation; system audit logs and records; system configuration settings and associated documentation; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; system developer; personnel with responsibilities for managing collaborative computing devices. Test: Mechanisms supporting or implementing management of remote activation of collaborative computing devices; mechanisms providing an indication of use of collaborative computing devices.
How is control 3.13.12 assessed?
Determine if: 3.13.12[a] collaborative computing devices are identified; 3.13.12[b] collaborative computing devices provide indication to users of devices in use; 3.13.12[c] remote activation of collaborative computing devices is prohibited.
What are the detailed objectives for assessing control 3.13.12?
Security Requirement 3.13.12: Prohibit remote activation of collaborative computing devices and provide indication of devices in use to users present at the device. Assessment Objectives: Determine if: 3.13.12[a] collaborative computing devices are identified; 3.13.12[b] collaborative computing devices provide indication to users of devices in use; 3.13.12[c] remote activation of collaborative computing devices is prohibited. Potential Assessment Methods and Objects: Examine: System and communications protection policy; procedures addressing collaborative computing; access control policy and procedures; system security plan; system design documentation; system audit logs and records; system configuration settings and associated documentation; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; system developer; personnel with responsibilities for managing collaborative computing devices. Test: Mechanisms supporting or implementing management of remote activation of collaborative computing devices; mechanisms providing an indication of use of collaborative computing devices.
What is control 3.13.12 in NIST 800-171A?
Security Requirement 3.13.13: Control and monitor the use of mobile code.
What does control 3.13.13 entail?
Potential assessment methods and objects for 3.13.13 include: Examine: System and communications protection policy; procedures addressing mobile code; mobile code usage restrictions, mobile code implementation policy and procedures; system audit logs and records; system security plan; list of acceptable mobile code and mobile code technologies; list of unacceptable mobile code and mobile technologies; authorization records; system monitoring records; system audit logs and records; other relevant documents or records. Interview: System or network administrators, personnel with responsibilities for managing mobile code. Test: Organizational process for controlling, authorizing, monitoring, and restricting mobile code; mechanisms supporting the management and monitoring of mobile code.
How is control 3.13.13 assessed?
Determine if: 3.13.13[a] use of mobile code is controlled; 3.13.13[b] use of mobile code is monitored.
What are the detailed objectives for assessing control 3.13.13?
Security Requirement 3.13.13: Control and monitor the use of mobile code. Assessment Objectives: Determine if: 3.13.13[a] use of mobile code is controlled; 3.13.13[b] use of mobile code is monitored. Potential Assessment Methods and Objects: Examine: System and communications protection policy; procedures addressing mobile code; mobile code usage restrictions, mobile code implementation policy and procedures; system audit logs and records; system security plan; list of acceptable mobile code and mobile code technologies; list of unacceptable mobile code and mobile technologies; authorization records; system monitoring records; system audit logs and records; other relevant documents or records. Interview: System or network administrators, personnel with responsibilities for managing mobile code. Test: Organizational process for controlling, authorizing, monitoring, and restricting mobile code; mechanisms supporting the management and monitoring of mobile code.
What is control 3.13.13 in NIST 800-171A?
Security Requirement 3.13.14: Control and monitor the use of Voice over Internet Protocol (VoIP) technologies.
What does control 3.13.14 entail?
Potential assessment methods and objects for 3.13.14 include: Examine:System and communications protection policy; procedures addressing VoIP; VoIP usage restrictions; VoIP implementation guidance; system security plan; system design documentation; system audit logs and records; system configuration settings and associated documentation; system monitoring records; other relevant documents or records. Interview: System or network administrators, personnel with responsibilities for managing VoIP. Test: Organizational process for authorizing, monitoring, and controlling VoIP; mechanisms supporting or implementing authorizing, monitoring, and controlling VoIP.
How is control 3.13.14 assessed?
Determine if: 3.13.14[a] use of Voice over Internet Protocol (VoIP) technologies is controlled. 3.13.14[b] use of Voice over Internet Protocol (VoIP) technologies is monitored.
What are the detailed objectives for assessing control 3.13.14?
Security Requirement 3.13.14: Control and monitor the use of Voice over Internet Protocol (VoIP) technologies. Assessment Objectives: Determine if: 3.13.14[a] use of Voice over Internet Protocol (VoIP) technologies is controlled. 3.13.14[b] use of Voice over Internet Protocol (VoIP) technologies is monitored. Potential Assessment Methods and Objects: Examine:System and communications protection policy; procedures addressing VoIP; VoIP usage restrictions; VoIP implementation guidance; system security plan; system design documentation; system audit logs and records; system configuration settings and associated documentation; system monitoring records; other relevant documents or records. Interview: System or network administrators, personnel with responsibilities for managing VoIP. Test: Organizational process for authorizing, monitoring, and controlling VoIP; mechanisms supporting or implementing authorizing, monitoring, and controlling VoIP.
What is control 3.13.14 in NIST 800-171A?
Security Requirement 3.13.15: Protect the authenticity of communications sessions.
What does control 3.13.15 entail?
Potential assessment methods and objects for 3.13.15 include: Examine: System and communications protection policy; procedures addressing session authenticity; system security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records. Interview: System or network administrators, personnel with information security responsibilities. Test: Mechanisms supporting or implementing session authenticity.
How is control 3.13.15 assessed?
Determine if the authenticity of communications sessions is protected.
What are the detailed objectives for assessing control 3.13.15?
Security Requirement 3.13.15: Protect the authenticity of communications sessions. Assessment Objectives: Determine if the authenticity of communications sessions is protected. Potential Assessment Methods and Objects: Examine: System and communications protection policy; procedures addressing session authenticity; system security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records. Interview: System or network administrators, personnel with information security responsibilities. Test: Mechanisms supporting or implementing session authenticity.
What is control 3.13.15 in NIST 800-171A?
Security Requirement 3.13.16: Protect the confidentiality of CUI at rest.
What does control 3.13.16 entail?
Examine: System and communications protection policy; procedures addressing protection of information at rest; system security plan; system design documentation; list of information at rest requiring confidentiality protections; system configuration settings and associated documentation; cryptographic mechanisms and associated configuration documentation; other relevant documents or records. Interview: System or network administrators, personnel with information security responsibilities, system developers. Test: Mechanisms supporting or implementing confidentiality protections for information at rest.
How is control 3.13.16 assessed?
Determine if the confidentiality of CUI at rest is protected.
What are the detailed objectives for assessing control 3.13.16?
Security Requirement 3.13.16: Protect the confidentiality of CUI at rest. ASSESSMENT OBJECTIVE Determine if the confidentiality of CUI at rest is protected. POTENTIAL ASSESSMENT METHODS AND OBJECTS Examine: System and communications protection policy; procedures addressing protection of information at rest; system security plan; system design documentation; list of information at rest requiring confidentiality protections; system configuration settings and associated documentation; cryptographic mechanisms and associated configuration documentation; other relevant documents or records. Interview: System or network administrators, personnel with information security responsibilities, system developers. Test: Mechanisms supporting or implementing confidentiality protections for information at rest.
What is control 3.13.16 in NIST 800-171A?
Security Requirement 3.14.1: Identify, report, and correct system flaws in a timely manner.
What does control 3.14.1 entail?
Potential assessment methods and objects for 3.14.1 include: Examine: System and information integrity policy; procedures addressing flaw remediation; procedures addressing configuration management; system security plan; list of flaws and vulnerabilities potentially affecting the system; list of recent security flaw remediation actions performed on the system (e.g., list of installed patches, service packs, hot fixes, and other software updates to correct system flaws); test results from the installation of software and firmware updates to correct system flaws; installation/change control records for security-relevant software and firmware updates; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility for flaw remediation; personnel with configuration management responsibility. Test: Organizational processes for identifying, reporting, and correcting system flaws; organizational process for installing software and firmware updates; mechanisms supporting or implementing reporting, and correcting system flaws; mechanisms supporting or implementing testing software and firmware updates.
How is control 3.14.1 assessed?
Determine if: 3.14.1[a] the time to identify system flaws is specified; 3.14.1[b] system flaws are identified within the specified time frame; 3.14.1[c] the time to report system flaws is specified; 3.14.1[d] system flaws are reported within the specified time frame; 3.14.1[e] the time to correct system flaws is specified; 3.14.1[f] system flaws are corrected within the specified time frame.
What are the detailed objectives for assessing control 3.14.1?
Security Requirement 3.14.1: Identify, report, and correct system flaws in a timely manner. Assessment Objectives: Determine if: 3.14.1[a] the time to identify system flaws is specified; 3.14.1[b] system flaws are identified within the specified time frame; 3.14.1[c] the time to report system flaws is specified; 3.14.1[d] system flaws are reported within the specified time frame; 3.14.1[e] the time to correct system flaws is specified; 3.14.1[f] system flaws are corrected within the specified time frame. Potential Assessment Methods and Objects: Examine: System and information integrity policy; procedures addressing flaw remediation; procedures addressing configuration management; system security plan; list of flaws and vulnerabilities potentially affecting the system; list of recent security flaw remediation actions performed on the system (e.g., list of installed patches, service packs, hot fixes, and other software updates to correct system flaws); test results from the installation of software and firmware updates to correct system flaws; installation/change control records for security-relevant software and firmware updates; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility for flaw remediation; personnel with configuration management responsibility. Test: Organizational processes for identifying, reporting, and correcting system flaws; organizational process for installing software and firmware updates; mechanisms supporting or implementing reporting, and correcting system flaws; mechanisms supporting or implementing testing software and firmware updates.
What is control 3.14.1 in NIST 800-171A?
Security Requirement 3.14.2: Provide protection from malicious code at designated locations within organizational systems.
What does control 3.14.2 entail?
Potential assessment methods and objects for 3.14.2 include: Examine: System and information integrity policy; configuration management policy and procedures; procedures addressing malicious code protection; records of malicious code protection updates; malicious code protection mechanisms; system security plan; system configuration settings and associated documentation; record of actions initiated by malicious code protection mechanisms in response to malicious code detection; scan results from malicious code protection mechanisms; system design documentation; system audit logs and records; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility for malicious code protection; personnel with configuration management responsibility. Test: Organizational processes for employing, updating, and configuring malicious code protection mechanisms; organizational process for addressing false positives and resulting potential impact; mechanisms supporting or implementing employing, updating, and configuring malicious code protection mechanisms; mechanisms supporting or implementing malicious code scanning and subsequent actions.
How is control 3.14.2 assessed?
Determine if: 3.14.2[a] designated locations for malicious code protection are identified; 3.14.2[b] protection from malicious code at designated locations is provided.
What are the detailed objectives for assessing control 3.14.2?
Security Requirement 3.14.2: Provide protection from malicious code at designated locations within organizational systems. Assessment Objectives:Determine if: 3.14.2[a] designated locations for malicious code protection are identified; 3.14.2[b] protection from malicious code at designated locations is provided. Potential Assessment Methods and Objects: Examine: System and information integrity policy; configuration management policy and procedures; procedures addressing malicious code protection; records of malicious code protection updates; malicious code protection mechanisms; system security plan; system configuration settings and associated documentation; record of actions initiated by malicious code protection mechanisms in response to malicious code detection; scan results from malicious code protection mechanisms; system design documentation; system audit logs and records; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility for malicious code protection; personnel with configuration management responsibility. Test: Organizational processes for employing, updating, and configuring malicious code protection mechanisms; organizational process for addressing false positives and resulting potential impact; mechanisms supporting or implementing employing, updating, and configuring malicious code protection mechanisms; mechanisms supporting or implementing malicious code scanning and subsequent actions.
What is control 3.14.2 in NIST 800-171A?
Security Requirement 3.14.3: Monitor system security alerts and advisories and take action in response.
What does control 3.14.3 entail?
Potential assessment methods and objects for 3.14.3 include: Examine: System and information integrity policy; procedures addressing security alerts, advisories, and directives; system security plan; records of security alerts and advisories; other relevant documents or records Interview: Personnel with security alert and advisory responsibilities; personnel implementing, operating, maintaining, and using the system; personnel, organizational elements, and external organizations to whom alerts, advisories, and directives are to be disseminated; system or network administrators; personnel with information security responsibilities Test: Organizational processes for defining, receiving, generating, disseminating, and complying with security alerts, advisories, and directives; mechanisms supporting or implementing definition, receipt, generation, and dissemination of security alerts, advisories, and directives; mechanisms supporting or implementing security directives.
How is control 3.14.3 assessed?
Determine if: 3.14.3[a] response actions to system security alerts and advisories are identified; 3.14.3[b] system security alerts and advisories are monitored; 3.14.3[c] actions in response to system security alerts and advisories are taken.
What are the detailed objectives for assessing control 3.14.3?
Security Requirement 3.14.3: Monitor system security alerts and advisories and take action in response. Assessment Objectives:Determine if: 3.14.3[a] response actions to system security alerts and advisories are identified; 3.14.3[b] system security alerts and advisories are monitored; 3.14.3[c] actions in response to system security alerts and advisories are taken. Potential Assessment Methods and Objects: Examine: System and information integrity policy; procedures addressing security alerts, advisories, and directives; system security plan; records of security alerts and advisories; other relevant documents or records Interview: Personnel with security alert and advisory responsibilities; personnel implementing, operating, maintaining, and using the system; personnel, organizational elements, and external organizations to whom alerts, advisories, and directives are to be disseminated; system or network administrators; personnel with information security responsibilities Test: Organizational processes for defining, receiving, generating, disseminating, and complying with security alerts, advisories, and directives; mechanisms supporting or implementing definition, receipt, generation, and dissemination of security alerts, advisories, and directives; mechanisms supporting or implementing security directives.
What is control 3.14.3 in NIST 800-171A?
Security Requirement 3.14.4: Update malicious code protection mechanisms when new releases are available.
What does control 3.14.4 entail?
Potential assessment methods and objects for 3.14.4 include: Examine: System and information integrity policy; configuration management policy and procedures; procedures addressing malicious code protection; malicious code protection mechanisms; records of malicious code protection updates; system security plan; system design documentation; system configuration settings and associated documentation; scan results from malicious code protection mechanisms; record of actions initiated by malicious code protection mechanisms in response to malicious code detection; system audit logs and records; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility for malicious code protection; personnel with configuration management responsibility
How is control 3.14.4 assessed?
Determine if malicious code protection mechanisms are updated when new releases are available.
What are the detailed objectives for assessing control 3.14.4?
Security Requirement 3.14.4: Update malicious code protection mechanisms when new releases are available. Assessment Objectives: Ensure updates to malicious code protection mechanisms are applied as needed. Potential Assessment Methods and Objects: Examine: System and information integrity policy; configuration management policy and procedures; procedures addressing malicious code protection; malicious code protection mechanisms; records of malicious code protection updates; system security plan; system design documentation; system configuration settings and associated documentation; scan results from malicious code protection mechanisms; record of actions initiated by malicious code protection mechanisms in response to malicious code detection; system audit logs and records; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility for malicious code protection; personnel with configuration management responsibility
What is control 3.14.4 in NIST 800-171A?
Security Requirement 3.14.5: Perform periodic scans of organizational systems and real-time scans of files from external sources as files are downloaded, opened, or executed.
What does control 3.14.5 entail?
Potential assessment methods and objects for 3.14.5 include: Examine: System and information integrity policy; configuration management policy and procedures; procedures addressing malicious code protection; malicious code protection mechanisms; records of malicious code protection updates; system security plan; system design documentation; system configuration settings and associated documentation; scan results from malicious code protection mechanisms; record of actions initiated by malicious code protection mechanisms in response to malicious code detection; system audit logs and records; other relevant documents or records. Interview: System or network administrators, personnel responsible for malicious code protection, personnel with configuration management responsibility. Test: Organizational processes for employing, updating, and configuring malicious code protection mechanisms; organizational process for addressing false positives and resulting potential impact; mechanisms supporting or implementing malicious code protection mechanisms (including updates and configurations); mechanisms supporting or implementing malicious code scanning and subsequent actions.
How is control 3.14.5 assessed?
Determine if: 3.14.5[a] the frequency for malicious code scans is defined; 3.14.5[b] malicious code scans are performed with the defined frequency; 3.14.5[c] real-time malicious code scans of files from external sources as files are downloaded, opened, or executed are performed.
What are the detailed objectives for assessing control 3.14.5?
Security Requirement 3.14.5: Perform periodic scans of organizational systems and real-time scans of files from external sources as files are downloaded, opened, or executed. Assessment Objectives:Determine if: 3.14.5[a] the frequency for malicious code scans is defined; 3.14.5[b] malicious code scans are performed with the defined frequency; 3.14.5[c] real-time malicious code scans of files from external sources as files are downloaded, opened, or executed are performed. Potential Assessment Methods and Objects: Examine: System and information integrity policy; configuration management policy and procedures; procedures addressing malicious code protection; malicious code protection mechanisms; records of malicious code protection updates; system security plan; system design documentation; system configuration settings and associated documentation; scan results from malicious code protection mechanisms; record of actions initiated by malicious code protection mechanisms in response to malicious code detection; system audit logs and records; other relevant documents or records. Interview: System or network administrators, personnel responsible for malicious code protection, personnel with configuration management responsibility. Test: Organizational processes for employing, updating, and configuring malicious code protection mechanisms; organizational process for addressing false positives and resulting potential impact; mechanisms supporting or implementing malicious code protection mechanisms (including updates and configurations); mechanisms supporting or implementing malicious code scanning and subsequent actions.
What is control 3.14.5 in NIST 800-171A?
Security Requirement 3.14.6: Monitor organizational systems, including inbound and outbound communications traffic, to detect attacks and indicators of potential attacks.
What does control 3.14.6 entail?
Potential assessment methods and objects for 3.14.6 include: Examine: System and information integrity policy; procedures addressing system monitoring tools and techniques; continuous monitoring strategy; system and information integrity policy; procedures addressing system monitoring tools and techniques; facility diagram or layout; system security plan; system monitoring tools and techniques documentation; system design documentation; locations within system where monitoring devices are deployed; system protocols; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records. Interview:System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility monitoring the system; personnel with responsibility for the intrusion detection system. Test: Organizational processes for system monitoring; mechanisms supporting orimplementing intrusion detection capability and system monitoring; mechanisms supporting or implementing system monitoring capability; organizational processes for intrusion detection and system monitoring; mechanisms supporting or implementing the monitoring of inbound and outbound communications traffic.
How is control 3.14.6 assessed?
Determine if: 3.14.6[a] the system is monitored to detect attacks and indicators of potential attacks; 3.14.6[b] inbound communications traffic is monitored to detect attacks and indicators of potential attacks; 3.14.6[c] outbound communications traffic is monitored to detect attacks and indicators of potential attacks.
What are the detailed objectives for assessing control 3.14.6?
Security Requirement 3.14.6: Monitor organizational systems, including inbound and outbound communications traffic, to detect attacks and indicators of potential attacks. Assessment Objectives: Determine if: 3.14.6[a] the system is monitored to detect attacks and indicators of potential attacks; 3.14.6[b] inbound communications traffic is monitored to detect attacks and indicators of potential attacks; 3.14.6[c] outbound communications traffic is monitored to detect attacks and indicators of potential attacks. Examine System and information integrity policy; procedures addressing system monitoring tools and techniques; continuous monitoring strategy; system and information integrity policy; procedures addressing system monitoring tools and techniques; facility diagram or layout; system security plan; system monitoring tools and techniques documentation; system design documentation; locations within system where monitoring devices are deployed; system protocols; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records Interview System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility monitoring the system; personnel with responsibility for the intrusion detection system Test Organizational processes for system monitoring; mechanisms supporting or implementing intrusion detection capability and system monitoring; mechanisms supporting or implementing system monitoring capability; organizational processes for intrusion detection and system monitoring; mechanisms supporting or implementing the monitoring of inbound and outbound communications traffic.
What is control 3.14.6 in NIST 800-171A?
Security Requirement 3.14.7: Identify unauthorized use of organizational systems.
What does control 3.14.7 entail?
Potential assessment methods and objects for 3.14.7 include: Examine: Continuous monitoring strategy, system and information integrity policy, system monitoring tools and techniques, system security plan, system design documentation. Interview: System or network administrators, personnel with information security responsibilities, personnel responsible for monitoring the system. Test: Organizational processes for system monitoring; mechanisms supporting or implementing system monitoring capability.
How is control 3.14.7 assessed?
Determine if: 3.14.7[a] authorized use of the system is defined; 3.14.7[b] unauthorized use of the system is identified.
What are the detailed objectives for assessing control 3.14.7?
Security Requirement 3.14.7: Identify unauthorized use of organizational systems. Assessment Objectives: Determine if: 3.14.7[a] authorized use of the system is defined; 3.14.7[b] unauthorized use of the system is identified. Potential Assessment Methods and Objects: Examine Continuous monitoring strategy; system and information integrity policy; procedures addressing system monitoring tools and techniques; facility diagram/layout; system security plan; system design documentation; system monitoring tools and techniques documentation; locations within system where monitoring devices are deployed; system configuration settings and associated documentation; other relevant documents or records. Interview System or network administrators; personnel with information security responsibilities; personnel installing, configuring, and maintaining the system; personnel with responsibility for monitoring the system. Test Organizational processes for system monitoring; mechanisms supporting or implementing system monitoring capability.
What is control 3.14.7 in NIST 800-171A?
There are 110 total controls in NIST 800-171A.
How many controls are there in NIST 800-171A?