Risk Management Framework Rev. 5
Information security controls protect the confidentiality, integrity and/or availability of information (the so-called CIA Triad). Again, some would add further categories such as non-repudiation and accountability, depending on how narrowly or broadly the CIA Triad is defined.
Individual controls are often designed to act together to increase effective protection. Systems of controls can be referred to as frameworks or standards. Frameworks can enable an organization to manage security controls across different types of assets with consistency. For example, a framework can help an organization manage controls over access regardless of the type of computer operating system. This also enables an organization to assess overall risk. Risk-aware organizations may choose proactively to specify, design, implement, operate and maintain their security controls, usually by assessing the risks and implementing a comprehensive security management framework such as ISO27001:2013, the Information Security Forum’s Standard of Good Practice for Information Security, or NIST SP 800-53.
- RMF Control
- AC-1
- Subject Area
- ACCESS CONTROL
- Baselines
- CH NP FS FH CP CX NH FM CC FL CL NL NM CM
- AC-1a.
- Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
- AC-1b.
- Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the access control policy and procedures; and
- AC-1c.
- Review and update the current access control:
- AC-1.1 - CCI-002107
- The organization defines the personnel or roles to be recipients of the access control policy necessary to facilitate the implementation of the access control policy and associated access controls.
- AC-1.2 - CCI-002108
- The organization defines the personnel or roles to be recipients of the procedures necessary to facilitate the implementation of the access control policy and associated access controls.
- AC-1.3 - CCI-000001
- The organization develops and documents an access control policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- AC-1.4 - CCI-000002
- The organization disseminates the access control policy to organization-defined personnel or roles.
- AC-1.5 - CCI-000004
- The organization develops and documents procedures to facilitate the implementation of the access control policy and associated access controls.
- AC-1.6 - CCI-000005
- The organization disseminates the procedures to facilitate access control policy and associated access controls to the organization-defined personnel or roles.
- AC-1.8 - CCI-001545
- The organization defines a frequency for reviewing and updating the access control policy.
- AC-1.7 - CCI-000003
- The organization reviews and updates the access control policy in accordance with organization-defined frequency.
- AC-1.10 - CCI-001546
- The organization defines a frequency for reviewing and updating the access control procedures.
- AC-1.9 - CCI-000006
- The organization reviews and updates the access control procedures in accordance with organization-defined frequency.
- Bowen P, Hash J, Wilson M (2006) Information Security Handbook: A Guide for Managers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-100, Includes updates as of March 7, 2007., "SP 800-100" https://doi.org/10.6028/NIST.SP.800-100
- Hu VC, Scarfone KA (2012) Guidelines for Access Control System Evaluation Metrics. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7874., "IR 7874" https://doi.org/10.6028/NIST.IR.7874
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- Nieles M, Pillitteri VY, Dempsey KL (2017) An Introduction to Information Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-12, Rev. 1., "SP 800-12" https://doi.org/10.6028/NIST.SP.800-12r1
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- RMF Control
- AC-2
- Subject Area
- ACCESS CONTROL
- Baselines
- CH FS FH CX NH FM FL CL NL NM CM
- AC-2a.
- Define and document the types of accounts allowed and specifically prohibited for use within the system;
- AC-2b.
- Assign account managers;
- AC-2c.
- Require [Assignment: organization-defined prerequisites and criteria] for group and role membership;
- AC-2d.
- Specify:
- AC-2e.
- Require approvals by [Assignment: organization-defined personnel or roles] for requests to create accounts;
- AC-2f.
- Create, enable, modify, disable, and remove accounts in accordance with [Assignment: organization-defined policy, procedures, prerequisites, and criteria];
- AC-2g.
- Monitor the use of accounts;
- AC-2h.
- Notify account managers and [Assignment: organization-defined personnel or roles] within:
- AC-2i.
- Authorize access to the system based on:
- AC-2j.
- Review accounts for compliance with account management requirements [Assignment: organization-defined frequency];
- AC-2k.
- Establish and implement a process for changing shared or group account authenticators (if deployed) when individuals are removed from the group; and
- AC-2l.
- Align account management processes with personnel termination and transfer processes.
- AC-2.1 - CCI-002110
- The organization defines the information system account types that support the organizational missions/business functions.
- AC-2.2 - CCI-002111
- The organization identifies and selects the organization-defined information system account types of information system accounts which support organizational missions/business functions.
- AC-2.3 - CCI-002112
- The organization assigns account managers for information system accounts.
- AC-2.4 - CCI-000008
- The organization establishes conditions for group membership.
- AC-2.5 - CCI-002113
- The organization establishes conditions for role membership.
- AC-2.6 - CCI-002115
- The organization specifies authorized users of the information system.
- AC-2.7 - CCI-002116
- The organization specifies authorized group membership on the information system.
- AC-2.8 - CCI-002117
- The organization specifies authorized role membership on the information system.
- AC-2.9 - CCI-002118
- The organization specifies access authorizations (i.e., privileges) for each account on the information system.
- AC-2.10 - CCI-002119
- The organization specifies other attributes for each account on the information system.
- AC-2.12 - CCI-002120
- The organization defines the personnel or roles authorized to approve the creation of information system accounts.
- AC-2.11 - CCI-000010
- The organization requires approvals by organization-defined personnel or roles for requests to create information system accounts.
- AC-2.14 - CCI-002121
- The organization defines the procedures or conditions to be employed when creating, enabling, modifying, disabling, and removing information system accounts.
- AC-2.13 - CCI-000011
- The organization creates, enables, modifies, disables, and removes information system accounts in accordance with organization-defined procedures or conditions.
- AC-2.15 - CCI-002122
- The organization monitors the use of information system accounts.
- AC-2.16 - CCI-002123
- The organization notifies account managers when accounts are no longer required.
- AC-2.17 - CCI-002124
- The organization notifies account managers when users are terminated or transferred.
- AC-2.18 - CCI-002125
- The organization notifies account managers when individual information system usage or need-to-know changes.
- AC-2.19 - CCI-002126
- The organization authorizes access to the information system based on a valid access authorization.
- AC-2.20 - CCI-002127
- The organization authorizes access to the information system based on intended system usage.
- AC-2.21 - CCI-002128
- The organization authorizes access to the information system based on other attributes as required by the organization or associated missions/business functions.
- AC-2.22 - CCI-000012
- The organization reviews information system accounts for compliance with account management requirements per organization-defined frequency.
- AC-2.23 - CCI-001547
- The organization defines the frequency on which it will review information system accounts for compliance with account management requirements.
- AC-2.24 - CCI-002129
- The organization establishes a process for reissuing shared/group account credentials (if deployed) when individuals are removed from the group.
- AC-3 - Access Enforcement
- AC-5 - Separation Of Duties
- AC-6 - Least Privilege
- AC-17 - Remote Access
- AC-18 - Wireless Access
- AC-20 - Use Of External Systems
- AC-24 - Access Control Decisions
- AU-2 - Event Logging
- AU-12 - Audit Record Generation
- CM-5 - Access Restrictions For Change
- IA-2 - Identification And Authentication (Organizational Users)
- IA-4 - Identifier Management
- IA-5 - Authenticator Management
- IA-8 - Identification And Authentication (Non-Organizational Users)
- MA-3 - Maintenance Tools
- MA-5 - Maintenance Personnel
- PE-2 - Physical Access Authorizations
- PL-4 - Rules Of Behavior
- PS-2 - Position Risk Designation
- PS-4 - Personnel Termination
- PS-5 - Personnel Transfer
- PS-7 - External Personnel Security
- PT-2 - Authority To Process Personally Identifiable Information
- PT-3 - Personally Identifiable Information Processing Purposes
- SC-7 - Boundary Protection
- SC-12 - Cryptographic Key Establishment And Management
- SC-13 - Cryptographic Protection
- SC-37 - Out-Of-Band Channels
- Ferraiolo DF, Hu VC, Kuhn R, Chandramouli R (2016) A Comparison of Attribute Based Access Control (ABAC) Standards for Data Service Applications: Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-178., "SP 800-178" https://doi.org/10.6028/NIST.SP.800-178
- Hu VC, Ferraiolo DF, Kuhn R, Schnitzer A, Sandlin K, Miller R, Scarfone KA (2014) Guide to Attribute Based Access Control (ABAC) Definition and Considerations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-162, Includes updates as of August 2, 2019., "SP 800-162" https://doi.org/10.6028/NIST.SP.800-162
- Yaga DJ, Kuhn R, Hu VC (2017) Verification and Test Methods for Access Control Policies/Models. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-192., "SP 800-192" https://doi.org/10.6028/NIST.SP.800-192
- AC-2(1) - Automated System Account Management
- Support the management of system accounts using [Assignment: organization-defined automated mechanisms].
- AC-2(2) - Automated Temporary And Emergency Account Management
- Automatically [Selection: remove; disable] temporary and emergency accounts after [Assignment: organization-defined time period for each type of account].
- AC-2(3) - Disable Accounts
- Disable accounts within [Assignment: organization-defined time period] when the accounts:
- AC-2(4) - Automated Audit Actions
- Automatically audit account creation, modification, enabling, disabling, and removal actions.
- AC-2(5) - Inactivity Logout
- Require that users log out when [Assignment: organization-defined time period of expected inactivity or description of when to log out].
- AC-2(6) - Dynamic Privilege Management
- Implement [Assignment: organization-defined dynamic privilege management capabilities].
- AC-2(7) - Privileged User Accounts
- AC-2(8) - Dynamic Account Management
- Create, activate, manage, and deactivate [Assignment: organization-defined system accounts] dynamically.
- AC-2(9) - Restrictions On Use Of Shared And Group Accounts
- Only permit the use of shared and group accounts that meet [Assignment: organization-defined conditions for establishing shared and group accounts].
- AC-2(10) - Shared And Group Account Credential Change
- [Withdrawn: Incorporated into AC-2].
- AC-2(11) - Usage Conditions
- Enforce [Assignment: organization-defined circumstances and/or usage conditions] for [Assignment: organization-defined system accounts].
- AC-2(12) - Account Monitoring For Atypical Usage
- AC-2(13) - Disable Accounts For High-Risk Individuals
- Disable accounts of individuals within [Assignment: organization-defined time period] of discovery of [Assignment: organization-defined significant risks].
- RMF Control
- AC-3
- Subject Area
- ACCESS CONTROL
- Baselines
- CH NP FS FH CX NH FM CC FL CL NL NM CM
- AC-3.1 - CCI-000213
- The information system enforces approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
- AC-2 - Account Management
- AC-4 - Information Flow Enforcement
- AC-5 - Separation Of Duties
- AC-6 - Least Privilege
- AC-16 - Security And Privacy Attributes
- AC-17 - Remote Access
- AC-18 - Wireless Access
- AC-19 - Access Control For Mobile Devices
- AC-20 - Use Of External Systems
- AC-21 - Information Sharing
- AC-22 - Publicly Accessible Content
- AC-24 - Access Control Decisions
- AC-25 - Reference Monitor
- AT-2 - Literacy Training And Awareness
- AT-3 - Role-Based Training
- AU-9 - Protection Of Audit Information
- CA-9 - Internal System Connections
- CM-5 - Access Restrictions For Change
- CM-11 - User-Installed Software
- IA-2 - Identification And Authentication (Organizational Users)
- IA-5 - Authenticator Management
- IA-6 - Authentication Feedback
- IA-7 - Cryptographic Module Authentication
- IA-11 - Re-Authentication
- MA-3 - Maintenance Tools
- MA-4 - Nonlocal Maintenance
- MA-5 - Maintenance Personnel
- MP-4 - Media Storage
- PM-2 - Information Security Program Leadership Role
- PS-3 - Personnel Screening
- PT-2 - Authority To Process Personally Identifiable Information
- PT-3 - Personally Identifiable Information Processing Purposes
- SA-17 - Developer Security And Privacy Architecture And Design
- SC-2 - Separation Of System And User Functionality
- SC-3 - Security Function Isolation
- SC-4 - Information In Shared System Resources
- SC-12 - Cryptographic Key Establishment And Management
- SC-13 - Cryptographic Protection
- SC-28 - Protection Of Information At Rest
- SC-31 - Covert Channel Analysis
- SC-34 - Non-Modifiable Executable Programs
- SI-4 - System Monitoring
- SI-8 - Spam Protection
- Barker EB (2020) Recommendation for Key Management: Part 1 – General. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-57 Part 1, Rev. 5., "SP 800-57-1" https://doi.org/10.6028/NIST.SP.800-57pt1r5
- Barker EB, Barker WC (2019) Recommendation for Key Management: Part 2 – Best Practices for Key Management Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-57 Part 2, Rev. 1., "SP 800-57-2" https://doi.org/10.6028/NIST.SP.800-57pt2r1
- Barker EB, Dang QH (2015) Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-57 Part 3, Rev. 1., "SP 800-57-3" https://doi.org/10.6028/NIST.SP.800-57pt3r1
- Ferraiolo DF, Hu VC, Kuhn R, Chandramouli R (2016) A Comparison of Attribute Based Access Control (ABAC) Standards for Data Service Applications: Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-178., "SP 800-178" https://doi.org/10.6028/NIST.SP.800-178
- Hu VC, Ferraiolo DF, Kuhn R, Schnitzer A, Sandlin K, Miller R, Scarfone KA (2014) Guide to Attribute Based Access Control (ABAC) Definition and Considerations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-162, Includes updates as of August 2, 2019., "SP 800-162" https://doi.org/10.6028/NIST.SP.800-162
- Hu VC, Scarfone KA (2012) Guidelines for Access Control System Evaluation Metrics. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7874., "IR 7874" https://doi.org/10.6028/NIST.IR.7874
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Privacy Act (P.L. 93-579), December 1974., "PRIVACT" https://www.govinfo.gov/content/pkg/STATUTE-88/pdf
- AC-3(1) - Restricted Access To Privileged Functions
- [Withdrawn: Incorporated into AC-6].
- AC-3(2) - Dual Authorization
- Enforce dual authorization for [Assignment: organization-defined privileged commands and/or other organization-defined actions].
- AC-3(3) - Mandatory Access Control
- Enforce [Assignment: organization-defined mandatory access control policy] over the set of covered subjects and objects specified in the policy, and where the policy:
- AC-3(4) - Discretionary Access Control
- Enforce [Assignment: organization-defined discretionary access control policy] over the set of covered subjects and objects specified in the policy, and where the policy specifies that a subject that has been granted access to information can do one or more of the following:
- AC-3(5) - Security-Relevant Information
- Prevent access to [Assignment: organization-defined security-relevant information] except during secure, non-operable system states.
- AC-3(6) - Protection Of User And System Information
- [Withdrawn: Incorporated into MP-4, SC-28].
- AC-3(7) - Role-Based Access Control
- Enforce a role-based access control policy over defined subjects and objects and control access based upon [Assignment: organization-defined roles and users authorized to assume such roles].
- AC-3(8) - Revocation Of Access Authorizations
- Enforce the revocation of access authorizations resulting from changes to the security attributes of subjects and objects based on [Assignment: organization-defined rules governing the timing of revocations of access authorizations].
- AC-3(9) - Controlled Release
- Release information outside of the system only if:
- AC-3(10) - Audited Override Of Access Control Mechanisms
- Employ an audited override of automated access control mechanisms under [Assignment: organization-defined conditions] by [Assignment: organization-defined roles].
- AC-3(11) - Restrict Access To Specific Information Types
- Restrict access to data repositories containing [Assignment: organization-defined information types].
- AC-3(12) - Assert And Enforce Application Access
- AC-3(13) - Attribute-Based Access Control
- Enforce attribute-based access control policy over defined subjects and objects and control access based upon [Assignment: organization-defined attributes to assume access permissions].
- AC-3(14) - Individual Access
- Provide [Assignment: organization-defined mechanisms] to enable individuals to have access to the following elements of their personally identifiable information: [Assignment: organization-defined elements].
- AC-3(15) - Discretionary And Mandatory Access Control
- RMF Control
- AC-4
- Subject Area
- ACCESS CONTROL
- Baselines
- CH FH CX NH FM NM CM
- AC-4.1 - CCI-001368
- The information system enforces approved authorizations for controlling the flow of information within the system based on organization-defined information flow control policies.
- AC-4.2 - CCI-001414
- The information system enforces approved authorizations for controlling the flow of information between interconnected systems based on organization-defined information flow control policies.
- AC-4.3 - CCI-001548
- The organization defines the information flow control policies for controlling the flow of information within the system.
- AC-4.4 - CCI-001549
- The organization defines the information flow control policies for controlling the flow of information between interconnected systems.
- AC-4.5 - CCI-001550
- The organization defines approved authorizations for controlling the flow of information within the system.
- AC-4.6 - CCI-001551
- The organization defines approved authorizations for controlling the flow of information between interconnected systems.
- AC-3 - Access Enforcement
- AC-6 - Least Privilege
- AC-16 - Security And Privacy Attributes
- AC-17 - Remote Access
- AC-19 - Access Control For Mobile Devices
- AC-21 - Information Sharing
- AU-10 - Non-Repudiation
- CA-3 - Information Exchange
- CA-9 - Internal System Connections
- CM-7 - Least Functionality
- PL-9 - Central Management
- PM-24 - Data Integrity Board
- SA-17 - Developer Security And Privacy Architecture And Design
- SC-4 - Information In Shared System Resources
- SC-7 - Boundary Protection
- SC-16 - Transmission Of Security And Privacy Attributes
- SC-31 - Covert Channel Analysis
- Ferraiolo DF, Hu VC, Kuhn R, Chandramouli R (2016) A Comparison of Attribute Based Access Control (ABAC) Standards for Data Service Applications: Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-178., "SP 800-178" https://doi.org/10.6028/NIST.SP.800-178
- Grassi P, Lefkovitz N, Nadeau E, Galluzzo R, Dinh, A (2018) Attribute Metadata: A Proposed Schema for Evaluating Federated Attributes. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8112., "IR 8112" https://doi.org/10.6028/NIST.IR.8112
- Hu VC, Ferraiolo DF, Kuhn R, Schnitzer A, Sandlin K, Miller R, Scarfone KA (2014) Guide to Attribute Based Access Control (ABAC) Definition and Considerations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-162, Includes updates as of August 2, 2019., "SP 800-162" https://doi.org/10.6028/NIST.SP.800-162
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- AC-4(1) - Object Security And Privacy Attributes
- Use [Assignment: organization-defined security and privacy attributes] associated with [Assignment: organization-defined information, source, and destination objects] to enforce [Assignment: organization-defined information flow control policies] as a basis for flow control decisions.
- AC-4(2) - Processing Domains
- Use protected processing domains to enforce [Assignment: organization-defined information flow control policies] as a basis for flow control decisions.
- AC-4(3) - Dynamic Information Flow Control
- Enforce [Assignment: organization-defined information flow control policies].
- AC-4(4) - Flow Control Of Encrypted Information
- Prevent encrypted information from bypassing [Assignment: organization-defined information flow control mechanisms] by [Selection (one or more): decrypting the information; blocking the flow of the encrypted information; terminating communications sessions attempting to pass encrypted information; [Assignment: organization-defined procedure or method]].
- AC-4(5) - Embedded Data Types
- Enforce [Assignment: organization-defined limitations] on embedding data types within other data types.
- AC-4(6) - Metadata
- Enforce information flow control based on [Assignment: organization-defined metadata].
- AC-4(7) - One-Way Flow Mechanisms
- Enforce one-way information flows through hardware-based flow control mechanisms.
- AC-4(8) - Security And Privacy Policy Filters
- AC-4(9) - Human Reviews
- Enforce the use of human reviews for [Assignment: organization-defined information flows] under the following conditions: [Assignment: organization-defined conditions].
- AC-4(10) - Enable And Disable Security Or Privacy Policy Filters
- Provide the capability for privileged administrators to enable and disable [Assignment: organization-defined security or privacy policy filters] under the following conditions: [Assignment: organization-defined conditions].
- AC-4(11) - Configuration Of Security Or Privacy Policy Filters
- Provide the capability for privileged administrators to configure [Assignment: organization-defined security or privacy policy filters] to support different security or privacy policies.
- AC-4(12) - Data Type Identifiers
- When transferring information between different security domains, use [Assignment: organization-defined data type identifiers] to validate data essential for information flow decisions.
- AC-4(13) - Decomposition Into Policy-Relevant Subcomponents
- When transferring information between different security domains, decompose information into [Assignment: organization-defined policy-relevant subcomponents] for submission to policy enforcement mechanisms.
- AC-4(14) - Security Or Privacy Policy Filter Constraints
- When transferring information between different security domains, implement [Assignment: organization-defined security or privacy policy filters] requiring fully enumerated formats that restrict data structure and content.
- AC-4(15) - Detection Of Unsanctioned Information
- When transferring information between different security domains, examine the information for the presence of [Assignment: organization-defined unsanctioned information] and prohibit the transfer of such information in accordance with the [Assignment: organization-defined security or privacy policy].
- AC-4(16) - Information Transfers On Interconnected Systems
- [Withdrawn: Incorporated into AC-4].
- AC-4(17) - Domain Authentication
- Uniquely identify and authenticate source and destination points by [Selection (one or more): organization; system; application; service; individual] for information transfer.
- AC-4(18) - Security Attribute Binding
- [Withdrawn: Incorporated into AC-16].
- AC-4(19) - Validation Of Metadata
- When transferring information between different security domains, implement [Assignment: organization-defined security or privacy policy filters] on metadata.
- AC-4(20) - Approved Solutions
- Employ [Assignment: organization-defined solutions in approved configurations] to control the flow of [Assignment: organization-defined information] across security domains.
- AC-4(21) - Physical Or Logical Separation Of Information Flows
- Separate information flows logically or physically using [Assignment: organization-defined mechanisms and/or techniques] to accomplish [Assignment: organization-defined required separations by types of information].
- AC-4(22) - Access Only
- Provide access from a single device to computing platforms, applications, or data residing in multiple different security domains, while preventing information flow between the different security domains.
- AC-4(23) - Modify Non-Releasable Information
- When transferring information between different security domains, modify non-releasable information by implementing [Assignment: organization-defined modification action].
- AC-4(24) - Internal Normalized Format
- When transferring information between different security domains, parse incoming data into an internal normalized format and regenerate the data to be consistent with its intended specification.
- AC-4(25) - Data Sanitization
- When transferring information between different security domains, sanitize data to minimize [Selection (one or more): delivery of malicious content, command and control of malicious code, malicious code augmentation, and steganography encoded data; spillage of sensitive information] in accordance with [Assignment: organization-defined policy].
- AC-4(26) - Audit Filtering Actions
- When transferring information between different security domains, record and audit content filtering actions and results for the information being filtered.
- AC-4(27) - Redundant/Independent Filtering Mechanisms
- When transferring information between different security domains, implement content filtering solutions that provide redundant and independent filtering mechanisms for each data type.
- AC-4(28) - Linear Filter Pipelines
- When transferring information between different security domains, implement a linear content filter pipeline that is enforced with discretionary and mandatory access controls.
- AC-4(29) - Filter Orchestration Engines
- When transferring information between different security domains, employ content filter orchestration engines to ensure that:
- AC-4(30) - Filter Mechanisms Using Multiple Processes
- When transferring information between different security domains, implement content filtering mechanisms using multiple processes.
- AC-4(31) - Failed Content Transfer Prevention
- When transferring information between different security domains, prevent the transfer of failed content to the receiving domain.
- AC-4(32) - Process Requirements For Information Transfer
- When transferring information between different security domains, the process that transfers information between filter pipelines:
- RMF Control
- AC-5
- Subject Area
- ACCESS CONTROL
- Baselines
- CH FH NH FM CC CL NM CM
- AC-5a.
- Identify and document [Assignment: organization-defined duties of individuals requiring separation]; and
- AC-5b.
- Define system access authorizations to support separation of duties.
- AC-5.2 - CCI-002219
- The organization defines the duties of individuals that are to be separated.
- AC-5.1 - CCI-000036
- The organization separates organization-defined duties of individuals.
- AC-5.3 - CCI-001380
- The organization documents separation of duties of individuals.
- AC-5.4 - CCI-002220
- The organization defines information system access authorizations to support separation of duties.
- AC-2 - Account Management
- AC-3 - Access Enforcement
- AC-6 - Least Privilege
- AU-9 - Protection Of Audit Information
- CM-5 - Access Restrictions For Change
- CM-11 - User-Installed Software
- CP-9 - System Backup
- IA-2 - Identification And Authentication (Organizational Users)
- IA-4 - Identifier Management
- IA-5 - Authenticator Management
- IA-12 - Identity Proofing
- MA-3 - Maintenance Tools
- MA-5 - Maintenance Personnel
- PS-2 - Position Risk Designation
- SA-8 - Security And Privacy Engineering Principles
- SA-17 - Developer Security And Privacy Architecture And Design
- RMF Control
- AC-6
- Subject Area
- ACCESS CONTROL
- Baselines
- CH FH CX NH FM CC CL NM CM
- AC-6.1 - CCI-000225
- The organization employs the concept of least privilege, allowing only authorized accesses for users (and processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions.
- AC-2 - Account Management
- AC-3 - Access Enforcement
- AC-5 - Separation Of Duties
- AC-16 - Security And Privacy Attributes
- CM-5 - Access Restrictions For Change
- CM-11 - User-Installed Software
- PL-2 - System Security And Privacy Plans
- PM-12 - Insider Threat Program
- SA-8 - Security And Privacy Engineering Principles
- SA-15 - Development Process, Standards, And Tools
- SA-17 - Developer Security And Privacy Architecture And Design
- SC-38 - Operations Security
- AC-6(1) - Authorize Access To Security Functions
- Authorize access for [Assignment: organization-defined individuals or roles] to:
- AC-6(2) - Non-Privileged Access For Nonsecurity Functions
- Require that users of system accounts (or roles) with access to [Assignment: organization-defined security functions or security-relevant information] use non-privileged accounts or roles, when accessing nonsecurity functions.
- AC-6(3) - Network Access To Privileged Commands
- Authorize network access to [Assignment: organization-defined privileged commands] only for [Assignment: organization-defined compelling operational needs] and document the rationale for such access in the security plan for the system.
- AC-6(4) - Separate Processing Domains
- Provide separate processing domains to enable finer-grained allocation of user privileges.
- AC-6(5) - Privileged Accounts
- Restrict privileged accounts on the system to [Assignment: organization-defined personnel or roles].
- AC-6(6) - Privileged Access By Non-Organizational Users
- Prohibit privileged access to the system by non-organizational users.
- AC-6(7) - Review Of User Privileges
- AC-6(8) - Privilege Levels For Code Execution
- Prevent the following software from executing at higher privilege levels than users executing the software: [Assignment: organization-defined software].
- AC-6(9) - Log Use Of Privileged Functions
- Log the execution of privileged functions.
- AC-6(10) - Prohibit Non-Privileged Users From Executing Privileged Functions
- Prevent non-privileged users from executing privileged functions.
- RMF Control
- AC-7
- Subject Area
- ACCESS CONTROL
- Baselines
- CH FS FH CX NH FM FL CL NL NM CM
- AC-7a.
- Enforce a limit of [Assignment: organization-defined number] consecutive invalid logon attempts by a user during a [Assignment: organization-defined time period]; and
- AC-7b.
- Automatically [Selection (one or more): lock the account or node for an [Assignment: organization-defined time period]; lock the account or node until released by an administrator; delay next logon prompt per [Assignment: organization-defined delay algorithm]; notify system administrator; take other [Assignment: organization-defined action]] when the maximum number of unsuccessful attempts is exceeded.
- AC-7.1 - CCI-000043
- The organization defines the maximum number of consecutive invalid logon attempts to the information system by a user during an organization-defined time period.
- AC-7.2 - CCI-000044
- The information system enforces the organization-defined limit of consecutive invalid logon attempts by a user during the organization-defined time period.
- AC-7.3 - CCI-001423
- The organization defines the time period in which the organization-defined maximum number of consecutive invalid logon attempts occur.
- AC-7.4 - CCI-002236
- The organization defines the time period the information system will automatically lock the account or node when the maximum number of unsuccessful attempts is exceeded.
- AC-7.5 - CCI-002237
- The organization defines the delay algorithm to be employed by the information system to delay the next login prompt when the maximum number of unsuccessful attempts is exceeded.
- AC-7.6 - CCI-002238
- The information system automatically locks the account or node for either an organization-defined time period, until the locked account or node is released by an administrator, or delays the next login prompt according to the organization-defined delay algorithm when the maximum number of unsuccessful attempts is exceeded.
- Grassi PA, Garcia ME, Fenton JL (2017) Digital Identity Guidelines. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-63-3, Includes updates as of March 2, 2020., "SP 800-63-3" https://doi.org/10.6028/NIST.SP.800-63-3
- Souppaya MP, Scarfone KA (2013) Guidelines for Managing the Security of Mobile Devices in the Enterprise. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-124, Rev. 1., "SP 800-124" https://doi.org/10.6028/NIST.SP.800-124r1
- AC-7(1) - Automatic Account Lock
- [Withdrawn: Incorporated into AC-7].
- AC-7(2) - Purge Or Wipe Mobile Device
- Purge or wipe information from [Assignment: organization-defined mobile devices] based on [Assignment: organization-defined purging or wiping requirements and techniques] after [Assignment: organization-defined number] consecutive, unsuccessful device logon attempts.
- AC-7(3) - Biometric Attempt Limiting
- Limit the number of unsuccessful biometric logon attempts to [Assignment: organization-defined number].
- AC-7(4) - Use Of Alternate Authentication Factor
- RMF Control
- AC-8
- Subject Area
- ACCESS CONTROL
- Baselines
- CH FS FH CP NH FM FL CL NL NM CM
- AC-8a.
- Display [Assignment: organization-defined system use notification message or banner] to users before granting access to the system that provides privacy and security notices consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines and state that:
- AC-8b.
- Retain the notification message or banner on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access the system; and
- AC-8c.
- For publicly accessible systems:
- AC-8.2 - CCI-002247
- The organization defines the use notification message or banner the information system displays to users before granting access to the system.
- AC-8.1 - CCI-000048
- The information system displays an organization-defined system use notification message or banner before granting access to the system that provides privacy and security notices consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.
- AC-8.3 - CCI-002243
- The organization-defined information system use notification message or banner is to state that users are accessing a U.S. Government information system.
- AC-8.4 - CCI-002244
- The organization-defined information system use notification message or banner is to state that information system usage may be monitored, recorded, and subject to audit.
- AC-8.5 - CCI-002245
- The organization-defined information system use notification message or banner is to state that unauthorized use of the information system is prohibited and subject to criminal and civil penalties.
- AC-8.6 - CCI-002246
- The organization-defined information system use notification message or banner is to state that use of the information system indicates consent to monitoring and recording.
- AC-8.7 - CCI-000050
- The information system retains the notification message or banner on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access.
- AC-8.8 - CCI-001384
- The information system, for publicly accessible systems, displays system use information organization-defined conditions before granting further access.
- AC-8.10 - CCI-001385
- The information system, for publicly accessible systems, displays references, if any, to monitoring that are consistent with privacy accommodations for such systems that generally prohibit those activities.
- AC-8.11 - CCI-001386
- The information system for publicly accessible systems displays references, if any, to recording that are consistent with privacy accommodations for such systems that generally prohibit those activities.
- AC-8.12 - CCI-001387
- The information system for publicly accessible systems displays references, if any, to auditing that are consistent with privacy accommodations for such systems that generally prohibit those activities.
- AC-8.13 - CCI-001388
- The information system, for publicly accessible systems, includes a description of the authorized uses of the system.
- AC-8.9 - CCI-002248
- The organization defines the conditions of use which are to be displayed to users of the information system before granting further access.
- RMF Control
- AC-9
- Subject Area
- ACCESS CONTROL
- Baselines
- —
- AC-9.1 - CCI-000052
- The information system notifies the user, upon successful logon (access) to the system, of the date and time of the last logon (access).
- AC-9(1) - Unsuccessful Logons
- Notify the user, upon successful logon, of the number of unsuccessful logon attempts since the last successful logon.
- AC-9(2) - Successful And Unsuccessful Logons
- Notify the user, upon successful logon, of the number of [Selection: successful logons; unsuccessful logon attempts; both] during [Assignment: organization-defined time period].
- AC-9(3) - Notification Of Account Changes
- Notify the user, upon successful logon, of changes to [Assignment: organization-defined security-related characteristics or parameters of the user’s account] during [Assignment: organization-defined time period].
- AC-9(4) - Additional Logon Information
- Notify the user, upon successful logon, of the following additional information: [Assignment: organization-defined additional information].
- RMF Control
- AC-10
- Subject Area
- ACCESS CONTROL
- Baselines
- CH FH NH CM
- AC-10.1 - CCI-000054
- The information system limits the number of concurrent sessions for each organization-defined account and/or account type to an organization-defined number of sessions.
- AC-10.2 - CCI-000055
- The organization defines the maximum number of concurrent sessions to be allowed for each organization-defined account and/or account type.
- AC-10.3 - CCI-002252
- The organization defines the accounts for which the information system will limit the number of concurrent sessions.
- SC-23 - Session Authenticity
- RMF Control
- AC-11
- Subject Area
- ACCESS CONTROL
- Baselines
- CH FH NH FM CC CL NM CM
- AC-11a.
- Prevent further access to the system by [Selection (one or more): initiating a device lock after [Assignment: organization-defined time period] of inactivity; requiring the user to initiate a device lock before leaving the system unattended]; and
- AC-11b.
- Retain the device lock until the user reestablishes access using established identification and authentication procedures.
- AC-11.3 - CCI-000059
- The organization defines the time period of inactivity after which the information system initiates a session lock.
- AC-11.2 - CCI-000058
- The information system provides the capability for users to directly initiate session lock mechanisms.
- AC-11.4 - CCI-000056
- The information system retains the session lock until the user reestablishes access using established identification and authentication procedures.
- AC-11(1) - Pattern-Hiding Displays
- Conceal, via the device lock, information previously visible on the display with a publicly viewable image.
- RMF Control
- AC-12
- Subject Area
- ACCESS CONTROL
- Baselines
- CH FH CX NH FM CL NM CM
- AC-12.1 - CCI-002360
- The organization defines the conditions or trigger events requiring session disconnect to be employed by the information system when automatically terminating a user session.
- AC-12.2 - CCI-002361
- The information system automatically terminates a user session after organization-defined conditions or trigger events requiring session disconnect.
- AC-12(1) - User-Initiated Logouts
- Provide a logout capability for user-initiated communications sessions whenever authentication is used to gain access to [Assignment: organization-defined information resources].
- AC-12(2) - Termination Message
- Display an explicit logout message to users indicating the termination of authenticated communications sessions.
- AC-12(3) - Timeout Warning Message
- Display an explicit message to users indicating that the session will end in [Assignment: organization-defined time until end of session].
- RMF Control
- AC-13
- Subject Area
- ACCESS CONTROL
- Baselines
- —
- RMF Control
- AC-14
- Subject Area
- ACCESS CONTROL
- Baselines
- CH FS FH CX NH FM FL CL NL NM CM
- AC-14a.
- Identify [Assignment: organization-defined user actions] that can be performed on the system without identification or authentication consistent with organizational mission and business functions; and
- AC-14b.
- Document and provide supporting rationale in the security plan for the system, user actions not requiring identification or authentication.
- AC-14.1 - CCI-000061
- The organization identifies and defines organization-defined user actions that can be performed on the information system without identification or authentication consistent with organizational missions/business functions.
- AC-14.2 - CCI-000232
- The organization documents and provides supporting rationale in the security plan for the information system, user actions not requiring identification and authentication.
- AC-14(1) - Necessary Uses
- [Withdrawn: Incorporated into AC-14].
- RMF Control
- AC-15
- Subject Area
- ACCESS CONTROL
- Baselines
- —
- RMF Control
- AC-16
- Subject Area
- ACCESS CONTROL
- Baselines
- CH CC CM
- AC-16a.
- Provide the means to associate [Assignment: organization-defined types of security and privacy attributes] with [Assignment: organization-defined security and privacy attribute values] for information in storage, in process, and/or in transmission;
- AC-16b.
- Ensure that the attribute associations are made and retained with the information;
- AC-16c.
- Establish the following permitted security and privacy attributes from the attributes defined in AC-16a for [Assignment: organization-defined systems]: [Assignment: organization-defined security and privacy attributes];
- AC-16d.
- Determine the following permitted attribute values or ranges for each of the established attributes: [Assignment: organization-defined attribute values or ranges for established attributes];
- AC-16e.
- Audit changes to attributes; and
- AC-16f.
- Review [Assignment: organization-defined security and privacy attributes] for applicability [Assignment: organization-defined frequency].
- AC-16.1 - CCI-002256
- The organization defines security attributes having organization-defined types of security attribute values which are associated with information in storage.
- AC-16.2 - CCI-002257
- The organization defines security attributes having organization-defined types of security attribute values which are associated with information in process.
- AC-16.3 - CCI-002258
- The organization defines security attributes, having organization-defined types of security attribute values, which are associated with information in transmission.
- AC-16.4 - CCI-002259
- The organization defines security attribute values associated with organization-defined types of security attributes for information in storage.
- AC-16.5 - CCI-002260
- The organization defines security attribute values associated with organization-defined types of security attributes for information in process.
- AC-16.6 - CCI-002261
- The organization defines security attribute values associated with organization-defined types of security attributes for information in transmission.
- AC-16.7 - CCI-002262
- The organization provides the means to associate organization-defined types of security attributes having organization-defined security attribute values with information in storage.
- AC-16.8 - CCI-002263
- The organization provides the means to associate organization-defined types of security attributes having organization-defined security attribute values with information in process.
- AC-16.9 - CCI-002264
- The organization provides the means to associate organization-defined types of security attributes having organization-defined security attribute values with information in transmission.
- AC-16.10 - CCI-002265
- The organization ensures that the security attribute associations are made with the information.
- AC-16.11 - CCI-002266
- The organization ensures that the security attribute associations are retained with the information.
- AC-16.12 - CCI-002267
- The organization defines the security attributes that are permitted for organization-defined information systems.
- AC-16.13 - CCI-002268
- The organization defines the information systems for which permitted organization-defined attributes are to be established.
- AC-16.14 - CCI-002269
- The organization establishes the permitted organization-defined security attributes for organization-defined information systems.
- AC-16.15 - CCI-002270
- The organization defines the values or ranges permitted for each of the established security attributes.
- AC-16.16 - CCI-002271
- The organization determines the permitted organization-defined values or ranges for each of the established security attributes.
- AC-3 - Access Enforcement
- AC-4 - Information Flow Enforcement
- AC-6 - Least Privilege
- AC-21 - Information Sharing
- AC-25 - Reference Monitor
- AU-2 - Event Logging
- AU-10 - Non-Repudiation
- MP-3 - Media Marking
- PE-22 - Component Marking
- PT-2 - Authority To Process Personally Identifiable Information
- PT-3 - Personally Identifiable Information Processing Purposes
- PT-4 - Consent
- SC-11 - Trusted Path
- SC-16 - Transmission Of Security And Privacy Attributes
- SI-12 - Information Management And Retention
- SI-18 - Personally Identifiable Information Quality Operations
- Ferraiolo DF, Hu VC, Kuhn R, Chandramouli R (2016) A Comparison of Attribute Based Access Control (ABAC) Standards for Data Service Applications: Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-178., "SP 800-178" https://doi.org/10.6028/NIST.SP.800-178
- Hu VC, Ferraiolo DF, Kuhn R, Schnitzer A, Sandlin K, Miller R, Scarfone KA (2014) Guide to Attribute Based Access Control (ABAC) Definition and Considerations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-162, Includes updates as of August 2, 2019., "SP 800-162" https://doi.org/10.6028/NIST.SP.800-162
- National Institute of Standards and Technology (2013) Digital Signature Standard (DSS). (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 186-4., "FIPS 186-4" https://doi.org/10.6028/NIST.FIPS.186-4
- National Institute of Standards and Technology (2019) Security Requirements for Cryptographic Modules. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 140-3. , "FIPS 140-3" https://doi.org/10.6028/NIST.FIPS.140-3
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- AC-16(1) - Dynamic Attribute Association
- Dynamically associate security and privacy attributes with [Assignment: organization-defined subjects and objects] in accordance with the following security and privacy policies as information is created and combined: [Assignment: organization-defined security and privacy policies].
- AC-16(2) - Attribute Value Changes By Authorized Individuals
- Provide authorized individuals (or processes acting on behalf of individuals) the capability to define or change the value of associated security and privacy attributes.
- AC-16(3) - Maintenance Of Attribute Associations By System
- Maintain the association and integrity of [Assignment: organization-defined security and privacy attributes] to [Assignment: organization-defined subjects and objects].
- AC-16(4) - Association Of Attributes By Authorized Individuals
- Provide the capability to associate [Assignment: organization-defined security and privacy attributes] with [Assignment: organization-defined subjects and objects] by authorized individuals (or processes acting on behalf of individuals).
- AC-16(5) - Attribute Displays On Objects To Be Output
- Display security and privacy attributes in human-readable form on each object that the system transmits to output devices to identify [Assignment: organization-defined special dissemination, handling, or distribution instructions] using [Assignment: organization-defined human-readable, standard naming conventions].
- AC-16(6) - Maintenance Of Attribute Association
- Require personnel to associate and maintain the association of [Assignment: organization-defined security and privacy attributes] with [Assignment: organization-defined subjects and objects] in accordance with [Assignment: organization-defined security and privacy policies].
- AC-16(7) - Consistent Attribute Interpretation
- Provide a consistent interpretation of security and privacy attributes transmitted between distributed system components.
- AC-16(8) - Association Techniques And Technologies
- Implement [Assignment: organization-defined techniques and technologies] in associating security and privacy attributes to information.
- AC-16(9) - Attribute Reassignment — Regrading Mechanisms
- Change security and privacy attributes associated with information only via regrading mechanisms validated using [Assignment: organization-defined techniques or procedures].
- AC-16(10) - Attribute Configuration By Authorized Individuals
- Provide authorized individuals the capability to define or change the type and value of security and privacy attributes available for association with subjects and objects.
- RMF Control
- AC-17
- Subject Area
- ACCESS CONTROL
- Baselines
- CH FS FH CX NH FM FL CL NL NM CM
- AC-17a.
- Establish and document usage restrictions, configuration/connection requirements, and implementation guidance for each type of remote access allowed; and
- AC-17b.
- Authorize each type of remote access to the system prior to allowing such connections.
- AC-17.1 - CCI-000063
- The organization defines allowed methods of remote access to the information system.
- AC-17.2 - CCI-002310
- The organization establishes and documents usage restrictions for each type of remote access allowed.
- AC-17.3 - CCI-002311
- The organization establishes and documents configuration/connection requirements for each type of remote access allowed.
- AC-17.4 - CCI-002312
- The organization establishes and documents implementation guidance for each type of remote access allowed.
- AC-17.5 - CCI-000065
- The organization authorizes remote access to the information system prior to allowing such connections.
- AC-2 - Account Management
- AC-3 - Access Enforcement
- AC-4 - Information Flow Enforcement
- AC-18 - Wireless Access
- AC-19 - Access Control For Mobile Devices
- AC-20 - Use Of External Systems
- CA-3 - Information Exchange
- CM-10 - Software Usage Restrictions
- IA-2 - Identification And Authentication (Organizational Users)
- IA-3 - Device Identification And Authentication
- IA-8 - Identification And Authentication (Non-Organizational Users)
- MA-4 - Nonlocal Maintenance
- PE-17 - Alternate Work Site
- PL-2 - System Security And Privacy Plans
- PL-4 - Rules Of Behavior
- SC-10 - Network Disconnect
- SC-12 - Cryptographic Key Establishment And Management
- SC-13 - Cryptographic Protection
- SI-4 - System Monitoring
- Barker EB, Dang QH, Frankel SE, Scarfone KA, Wouters P (2020) Guide to IPsec VPNs. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-77, Rev. 1., "SP 800-77" https://doi.org/10.6028/NIST.SP.800-77r1
- Frankel SE, Hoffman P, Orebaugh AD, Park R (2008) Guide to SSL VPNs. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-113., "SP 800-113" https://doi.org/10.6028/NIST.SP.800-113
- Padgette J, Bahr J, Holtmann M, Batra M, Chen L, Smithbey R, Scarfone KA (2017) Guide to Bluetooth Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-121, Rev. 2., "SP 800-121" https://doi.org/10.6028/NIST.SP.800-121r2
- Souppaya MP, Scarfone KA (2016) Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-46, Rev. 2., "SP 800-46" https://doi.org/10.6028/NIST.SP.800-46r2
- Souppaya MP, Scarfone KA (2016) User's Guide to Telework and Bring Your Own Device (BYOD) Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-114, Rev. 1., "SP 800-114" https://doi.org/10.6028/NIST.SP.800-114r1
- Ylonen T, Turner P, Scarfone KA, Souppaya MP (2015) Security of Interactive and Automated Access Management Using Secure Shell (SSH). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7966., "IR 7966" https://doi.org/10.6028/NIST.IR.7966
- AC-17(1) - Monitoring And Control
- Employ automated mechanisms to monitor and control remote access methods.
- AC-17(2) - Protection Of Confidentiality And Integrity Using Encryption
- Implement cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions.
- AC-17(3) - Managed Access Control Points
- Route remote accesses through authorized and managed network access control points.
- AC-17(4) - Privileged Commands And Access
- AC-17(5) - Monitoring For Unauthorized Connections
- [Withdrawn: Incorporated into SI-4].
- AC-17(6) - Protection Of Mechanism Information
- Protect information about remote access mechanisms from unauthorized use and disclosure.
- AC-17(7) - Additional Protection For Security Function Access
- [Withdrawn: Incorporated into AC-3(10)].
- AC-17(8) - Disable Nonsecure Network Protocols
- [Withdrawn: Incorporated into CM-7].
- AC-17(9) - Disconnect Or Disable Access
- Provide the capability to disconnect or disable remote access to the system within [Assignment: organization-defined time period].
- AC-17(10) - Authenticate Remote Commands
- Implement [Assignment: organization-defined mechanisms] to authenticate [Assignment: organization-defined remote commands].
- RMF Control
- AC-18
- Subject Area
- ACCESS CONTROL
- Baselines
- CH FS FH NH FM CC FL CL NL NM CM
- AC-18a.
- Establish configuration requirements, connection requirements, and implementation guidance for each type of wireless access; and
- AC-18b.
- Authorize each type of wireless access to the system prior to allowing such connections.
- AC-18.1 - CCI-001438
- The organization establishes usage restrictions for wireless access.
- AC-18.3 - CCI-002323
- The organization establishes configuration/connection requirements for wireless access.
- AC-18.2 - CCI-001439
- The organization establishes implementation guidance for wireless access.
- AC-18.4 - CCI-001441
- The organization authorizes wireless access to the information system prior to allowing such connections.
- AC-2 - Account Management
- AC-3 - Access Enforcement
- AC-17 - Remote Access
- AC-19 - Access Control For Mobile Devices
- CA-9 - Internal System Connections
- CM-7 - Least Functionality
- IA-2 - Identification And Authentication (Organizational Users)
- IA-3 - Device Identification And Authentication
- IA-8 - Identification And Authentication (Non-Organizational Users)
- PL-4 - Rules Of Behavior
- SC-40 - Wireless Link Protection
- SC-43 - Usage Restrictions
- SI-4 - System Monitoring
- Frankel SE, Eydt B, Owens L, Scarfone KA (2007) Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-97., "SP 800-97" https://doi.org/10.6028/NIST.SP.800-97
- Scarfone KA, Mell PM (2007) Guide to Intrusion Detection and Prevention Systems (IDPS). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-94., "SP 800-94" https://doi.org/10.6028/NIST.SP.800-94
- AC-18(1) - Authentication And Encryption
- Protect wireless access to the system using authentication of [Selection (one or more): users; devices] and encryption.
- AC-18(2) - Monitoring Unauthorized Connections
- [Withdrawn: Incorporated into SI-4].
- AC-18(3) - Disable Wireless Networking
- Disable, when not intended for use, wireless networking capabilities embedded within system components prior to issuance and deployment.
- AC-18(4) - Restrict Configurations By Users
- Identify and explicitly authorize users allowed to independently configure wireless networking capabilities.
- AC-18(5) - Antennas And Transmission Power Levels
- Select radio antennas and calibrate transmission power levels to reduce the probability that signals from wireless access points can be received outside of organization-controlled boundaries.
- RMF Control
- AC-19
- Subject Area
- ACCESS CONTROL
- Baselines
- CH FS FH NH FM CC FL CL NL NM CM
- AC-19a.
- Establish configuration requirements, connection requirements, and implementation guidance for organization-controlled mobile devices, to include when such devices are outside of controlled areas; and
- AC-19b.
- Authorize the connection of mobile devices to organizational systems.
- AC-19.1 - CCI-000082
- The organization establishes usage restrictions for organization controlled mobile devices.
- AC-19.3 - CCI-002325
- The organization establishes configuration requirements for organization controlled mobile devices.
- AC-19.4 - CCI-002326
- The organization establishes connection requirements for organization controlled mobile devices.
- AC-19.2 - CCI-000083
- The organization establishes implementation guidance for organization controlled mobile devices.
- AC-19.5 - CCI-000084
- The organization authorizes connection of mobile devices to organizational information systems.
- AC-3 - Access Enforcement
- AC-4 - Information Flow Enforcement
- AC-7 - Unsuccessful Logon Attempts
- AC-11 - Device Lock
- AC-17 - Remote Access
- AC-18 - Wireless Access
- AC-20 - Use Of External Systems
- CA-9 - Internal System Connections
- CM-2 - Baseline Configuration
- CM-6 - Configuration Settings
- IA-2 - Identification And Authentication (Organizational Users)
- IA-3 - Device Identification And Authentication
- MP-2 - Media Access
- MP-4 - Media Storage
- MP-5 - Media Transport
- MP-7 - Media Use
- PL-4 - Rules Of Behavior
- SC-7 - Boundary Protection
- SC-34 - Non-Modifiable Executable Programs
- SC-43 - Usage Restrictions
- SI-3 - Malicious Code Protection
- SI-4 - System Monitoring
- Souppaya MP, Scarfone KA (2013) Guidelines for Managing the Security of Mobile Devices in the Enterprise. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-124, Rev. 1., "SP 800-124" https://doi.org/10.6028/NIST.SP.800-124r1
- Souppaya MP, Scarfone KA (2016) User's Guide to Telework and Bring Your Own Device (BYOD) Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-114, Rev. 1., "SP 800-114" https://doi.org/10.6028/NIST.SP.800-114r1
- AC-19(1) - Use Of Writable And Portable Storage Devices
- [Withdrawn: Incorporated into MP-7].
- AC-19(2) - Use Of Personally Owned Portable Storage Devices
- [Withdrawn: Incorporated into MP-7].
- AC-19(3) - Use Of Portable Storage Devices With No Identifiable Owner
- [Withdrawn: Incorporated into MP-7].
- AC-19(4) - Restrictions For Classified Information
- AC-19(5) - Full Device Or Container-Based Encryption
- Employ [Selection: full-device encryption; container-based encryption] to protect the confidentiality and integrity of information on [Assignment: organization-defined mobile devices].
- RMF Control
- AC-20
- Subject Area
- ACCESS CONTROL
- Baselines
- CH FS FH CX NH FM CC FL CL NL NM CM
- AC-20a.
- [Selection (one or more): Establish [Assignment: organization-defined terms and conditions]; Identify [Assignment: organization-defined controls asserted to be implemented on external systems]], consistent with the trust relationships established with other organizations owning, operating, and/or maintaining external systems, allowing authorized individuals to:
- AC-20b.
- Prohibit the use of [Assignment: organizationally-defined types of external systems].
- AC-20.1 - CCI-000093
- The organization establishes terms and conditions, consistent with any trust relationships established with other organizations owning, operating, and/or maintaining external information systems, allowing authorized individuals to access the information system from the external information systems.
- AC-20.2 - CCI-002332
- The organization establishes terms and conditions, consistent with any trust relationships established with other organizations owning, operating, and/or maintaining external information systems, allowing authorized individuals to process, store or transmit organization-controlled information using the external information systems.
- National Institute of Standards and Technology (2004) Standards for Security Categorization of Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 199., "FIPS 199" https://doi.org/10.6028/NIST.FIPS.199
- Ross RS, Pillitteri VY, Dempsey KL, Riddle M, Guissanie G (2020) Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-171, Rev. 2., "SP 800-171" https://doi.org/10.6028/NIST.SP.800-171r2
- Ross RS, Pillitteri VY, Graubart RD, Guissanie G, Wagner R, Bodeau D (2020) Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800-171 (Final Public Draft). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-172., "SP 800-172" https://doi.org/10.6028/NIST.SP.800-172-draft
- AC-20(1) - Limits On Authorized Use
- Permit authorized individuals to use an external system to access the system or to process, store, or transmit organization-controlled information only after:
- AC-20(2) - Portable Storage Devices — Restricted Use
- Restrict the use of organization-controlled portable storage devices by authorized individuals on external systems using [Assignment: organization-defined restrictions].
- AC-20(3) - Non-Organizationally Owned Systems — Restricted Use
- Restrict the use of non-organizationally owned systems or system components to process, store, or transmit organizational information using [Assignment: organization-defined restrictions].
- AC-20(4) - Network Accessible Storage Devices — Prohibited Use
- Prohibit the use of [Assignment: organization-defined network accessible storage devices] in external systems.
- AC-20(5) - Portable Storage Devices — Prohibited Use
- Prohibit the use of organization-controlled portable storage devices by authorized individuals on external systems.
- RMF Control
- AC-21
- Subject Area
- ACCESS CONTROL
- Baselines
- CH FH NH FM CC NM CM
- AC-21a.
- Enable authorized users to determine whether access authorizations assigned to a sharing partner match the information’s access and use restrictions for [Assignment: organization-defined information sharing circumstances where user discretion is required]; and
- AC-21b.
- Employ [Assignment: organization-defined automated mechanisms or manual processes] to assist users in making information sharing and collaboration decisions.
- AC-21.1 - CCI-000098
- The organization facilitates information sharing by enabling authorized users to determine whether access authorizations assigned to the sharing partner match the access restrictions on the information for organization-defined information circumstances where user discretion is required.
- AC-21.2 - CCI-001470
- The organization defines information sharing circumstances where user discretion is required.
- AC-21.3 - CCI-001471
- The organization employs organization-defined automated mechanisms or manual processes required to assist users in making information sharing/collaboration decisions.
- AC-21.4 - CCI-001472
- The organization defines the automated mechanisms or manual processes required to assist users in making information sharing/collaboration decisions.
- AC-3 - Access Enforcement
- AC-4 - Information Flow Enforcement
- AC-16 - Security And Privacy Attributes
- PT-2 - Authority To Process Personally Identifiable Information
- PT-7 - Specific Categories Of Personally Identifiable Information
- RA-3 - Risk Assessment
- SC-15 - Collaborative Computing Devices And Applications
- Brooks S, Garcia M, Lefkovitz N, Lightman S, Nadeau E (2017) An Introduction to Privacy Engineering and Risk Management in Federal Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8062., "IR 8062" https://doi.org/10.6028/NIST.IR.8062
- Johnson CS, Waltermire DA, Badger ML, Skorupka C, Snyder J (2016) Guide to Cyber Threat Information Sharing. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-150., "SP 800-150" https://doi.org/10.6028/NIST.SP.800-150
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- AC-21(1) - Automated Decision Support
- Employ [Assignment: organization-defined automated mechanisms] to enforce information-sharing decisions by authorized users based on access authorizations of sharing partners and access restrictions on information to be shared.
- AC-21(2) - Information Search And Retrieval
- Implement information search and retrieval services that enforce [Assignment: organization-defined information sharing restrictions].
- RMF Control
- AC-22
- Subject Area
- ACCESS CONTROL
- Baselines
- CH FS FH NH FM FL CL NL NM CM
- AC-22a.
- Designate individuals authorized to make information publicly accessible;
- AC-22b.
- Train authorized individuals to ensure that publicly accessible information does not contain nonpublic information;
- AC-22c.
- Review the proposed content of information prior to posting onto the publicly accessible system to ensure that nonpublic information is not included; and
- AC-22d.
- Review the content on the publicly accessible system for nonpublic information [Assignment: organization-defined frequency] and remove such information, if discovered.
- AC-22.1 - CCI-001473
- The organization designates individuals authorized to post information onto a publicly accessible information system.
- AC-22.2 - CCI-001474
- The organization trains authorized individuals to ensure that publicly accessible information does not contain nonpublic information.
- AC-22.3 - CCI-001475
- The organization reviews the proposed content of information prior to posting onto the publicly accessible information system to ensure that nonpublic information is not included.
- AC-22.4 - CCI-001476
- The organization reviews the content on the publicly accessible information system for nonpublic information on an organization-defined frequency.
- AC-22.5 - CCI-001477
- The organization defines a frequency for reviewing the content on the publicly accessible information system for nonpublic information.
- AC-22.6 - CCI-001478
- The organization removes nonpublic information from the publicly accessible information system, if discovered.
- Privacy Act (P.L. 93-579), December 1974., "PRIVACT" https://www.govinfo.gov/content/pkg/STATUTE-88/pdf
- RMF Control
- AC-23
- Subject Area
- ACCESS CONTROL
- Baselines
- CH CC CM
- AC-23.1 - CCI-002343
- The organization defines the data mining prevention techniques to be employed to adequately protect organization-defined data storage objects against data mining.
- AC-23.2 - CCI-002344
- The organization defines the data mining detection techniques to be employed to adequately detect data mining attempts against organization-defined data storage objects.
- AC-23.3 - CCI-002345
- The organization defines the data storage objects that are to be protected against data mining attempts.
- AC-23.4 - CCI-002346
- The organization employs organization-defined data mining prevention techniques for organization-defined data storage objects to adequately protect against data mining.
- AC-23.5 - CCI-002347
- The organization employs organization-defined data mining detection techniques for organization-defined data storage objects to adequately detect data mining attempts.
- Executive Order 13587, , October 2011., "EO 13587" https://obamawhitehouse.archives.gov/the-press-off
- RMF Control
- AC-24
- Subject Area
- ACCESS CONTROL
- Baselines
- —
- AC-24.1 - CCI-002348
- The organization defines the access control decisions that are to be applied to each access request prior to access enforcement.
- AC-24.2 - CCI-002349
- The organization establishes procedures to ensure organization-defined access control decisions are applied to each access request prior to access enforcement.
- Ferraiolo DF, Hu VC, Kuhn R, Chandramouli R (2016) A Comparison of Attribute Based Access Control (ABAC) Standards for Data Service Applications: Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-178., "SP 800-178" https://doi.org/10.6028/NIST.SP.800-178
- Hu VC, Ferraiolo DF, Kuhn R, Schnitzer A, Sandlin K, Miller R, Scarfone KA (2014) Guide to Attribute Based Access Control (ABAC) Definition and Considerations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-162, Includes updates as of August 2, 2019., "SP 800-162" https://doi.org/10.6028/NIST.SP.800-162
- AC-24(1) - Transmit Access Authorization Information
- Transmit [Assignment: organization-defined access authorization information] using [Assignment: organization-defined controls] to [Assignment: organization-defined systems] that enforce access control decisions.
- AC-24(2) - No User Or Process Identity
- Enforce access control decisions based on [Assignment: organization-defined security or privacy attributes] that do not include the identity of the user or process acting on behalf of the user.
- RMF Control
- AC-25
- Subject Area
- ACCESS CONTROL
- Baselines
- CX
- AC-25.1 - CCI-002356
- The organization defines the access control policies to be implemented by the information system's reference monitor.
- AC-25.2 - CCI-002357
- The information system implements a reference monitor for organization-defined access control policies that is tamperproof.
- AC-25.3 - CCI-002358
- The information system implements a reference monitor for organization-defined access control policies that is always invoked.
- AC-25.4 - CCI-002359
- The information system implements a reference monitor for organization-defined access control policies that is small enough to be subject to analysis and testing, the completeness of which can be assured.
- AC-3 - Access Enforcement
- AC-16 - Security And Privacy Attributes
- SA-8 - Security And Privacy Engineering Principles
- SA-17 - Developer Security And Privacy Architecture And Design
- SC-3 - Security Function Isolation
- SC-11 - Trusted Path
- SC-39 - Process Isolation
- SI-13 - Predictable Failure Prevention
- RMF Control
- AT-1
- Subject Area
- AWARENESS AND TRAINING
- Baselines
- CH NP FS FH CP NH FM FL CL NL NM CM
- AT-1a.
- Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
- AT-1b.
- Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the awareness and training policy and procedures; and
- AT-1c.
- Review and update the current awareness and training:
- AT-1.1 - CCI-002048
- The organization defines the personnel or roles to whom the security awareness and training policy is disseminated.
- AT-1.2 - CCI-002049
- The organization defines the personnel or roles to whom the security awareness and training procedures are disseminated.
- AT-1.3 - CCI-000100
- The organization develops and documents a security awareness and training policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- AT-1.4 - CCI-000101
- The organization disseminates a security awareness and training policy to organization-defined personnel or roles.
- AT-1.6 - CCI-000103
- The organization develops and documents procedures to facilitate the implementation of the security awareness and training policy and associated security awareness and training controls.
- AT-1.7 - CCI-000104
- The organization disseminates security awareness and training procedures to organization-defined personnel or roles.
- AT-1.8 - CCI-000102
- The organization reviews and updates the current security awareness and training policy in accordance with organization-defined frequency.
- AT-1.5 - CCI-001564
- The organization defines the frequency of security awareness and training policy reviews and updates.
- AT-1.9 - CCI-000105
- The organization reviews and updates the current security awareness and training procedures in accordance with organization-defined frequency.
- AT-1.10 - CCI-001565
- The organization defines the frequency of security awareness and training procedure reviews and updates.
- Bowen P, Hash J, Wilson M (2006) Information Security Handbook: A Guide for Managers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-100, Includes updates as of March 7, 2007., "SP 800-100" https://doi.org/10.6028/NIST.SP.800-100
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- Nieles M, Pillitteri VY, Dempsey KL (2017) An Introduction to Information Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-12, Rev. 1., "SP 800-12" https://doi.org/10.6028/NIST.SP.800-12r1
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Wilson M, Hash J (2003) Building an Information Technology Security Awareness and Training Program. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-50., "SP 800-50" https://doi.org/10.6028/NIST.SP.800-50
- RMF Control
- AT-2
- Subject Area
- AWARENESS AND TRAINING
- Baselines
- CH NP FS FH CP NH FM CC FL CL NL NM CM
- AT-2a.
- Provide security and privacy literacy training to system users (including managers, senior executives, and contractors):
- AT-2b.
- Employ the following techniques to increase the security and privacy awareness of system users [Assignment: organization-defined awareness techniques];
- AT-2c.
- Update literacy training and awareness content [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]; and
- AT-2d.
- Incorporate lessons learned from internal or external security incidents or breaches into literacy training and awareness techniques.
- AT-2.1 - CCI-001480
- The organization defines the frequency for providing refresher security awareness training to all information system users (including managers, senior executives, and contractors).
- AT-2.2 - CCI-000106
- The organization provides basic security awareness training to information system users (including managers, senior executives, and contractors) as part of initial training for new users.
- AT-2.3 - CCI-000112
- The organization provides basic security awareness training to information system users (including managers, senior executives, and contractors) when required by information system changes.
- AT-2.4 - CCI-001479
- The organization provides refresher security awareness training to all information system users (including managers, senior executives, and contractors) in accordance with the organization-defined frequency.
- AC-3 - Access Enforcement
- AC-17 - Remote Access
- AC-22 - Publicly Accessible Content
- AT-3 - Role-Based Training
- AT-4 - Training Records
- CP-3 - Contingency Training
- IA-4 - Identifier Management
- IR-2 - Incident Response Training
- IR-7 - Incident Response Assistance
- IR-9 - Information Spillage Response
- PL-4 - Rules Of Behavior
- PM-13 - Security And Privacy Workforce
- PM-21 - Accounting Of Disclosures
- PS-7 - External Personnel Security
- PT-2 - Authority To Process Personally Identifiable Information
- SA-8 - Security And Privacy Engineering Principles
- SA-16 - Developer-Provided Training
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Office of the Director of National Intelligence (ODNI) Cyber Threat Framework., "ODNI CTF" https://www.dni.gov/index.php/cyber-threat-framewo
- Petersen R, Santos D, Smith MC, Wetzel KA, Witte G (2020) Workforce Framework for Cybersecurity (NICE Framework). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-181, Rev. 1., "SP 800-181" https://doi.org/10.6028/NIST.SP.800-181r1
- Ross RS, Pillitteri VY, Graubart R, Bodeau D, McQuaid R (2019) Developing Cyber Resilient Systems: A Systems Security Engineering Approach. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 2., "SP 800-160-2" https://doi.org/10.6028/NIST.SP.800-160v2
- Wilson M, Hash J (2003) Building an Information Technology Security Awareness and Training Program. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-50., "SP 800-50" https://doi.org/10.6028/NIST.SP.800-50
- AT-2(1) - Practical Exercises
- Provide practical exercises in literacy training that simulate events and incidents.
- AT-2(2) - Insider Threat
- Provide literacy training on recognizing and reporting potential indicators of insider threat.
- AT-2(3) - Social Engineering And Mining
- Provide literacy training on recognizing and reporting potential and actual instances of social engineering and social mining.
- AT-2(4) - Suspicious Communications And Anomalous System Behavior
- Provide literacy training on recognizing suspicious communications and anomalous behavior in organizational systems using [Assignment: organization-defined indicators of malicious code].
- AT-2(5) - Advanced Persistent Threat
- Provide literacy training on the advanced persistent threat.
- AT-2(6) - Cyber Threat Environment
- RMF Control
- AT-3
- Subject Area
- AWARENESS AND TRAINING
- Baselines
- CH NP FS FH CP NH FM FL CL NL NM CM
- AT-3a.
- Provide role-based security and privacy training to personnel with the following roles and responsibilities: [Assignment: organization-defined roles and responsibilities]:
- AT-3b.
- Update role-based training content [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]; and
- AT-3c.
- Incorporate lessons learned from internal or external security incidents or breaches into role-based training.
- AT-3.1 - CCI-000108
- The organization provides role-based security training to personnel with assigned security roles and responsibilities before authorizing access to the information system or performing assigned duties
- AT-3.2 - CCI-000109
- The organization provides role-based security training to personnel with assigned security roles and responsibilities when required by information system changes.
- AT-3.3 - CCI-000110
- The organization provides refresher role-based security training to personnel with assigned security roles and responsibilities in accordance with organization-defined frequency.
- AT-3.4 - CCI-000111
- The organization defines a frequency for providing refresher role-based security training.
- AC-3 - Access Enforcement
- AC-17 - Remote Access
- AC-22 - Publicly Accessible Content
- AT-2 - Literacy Training And Awareness
- AT-4 - Training Records
- CP-3 - Contingency Training
- IR-2 - Incident Response Training
- IR-4 - Incident Handling
- IR-7 - Incident Response Assistance
- IR-9 - Information Spillage Response
- PL-4 - Rules Of Behavior
- PM-13 - Security And Privacy Workforce
- PM-23 - Data Governance Body
- PS-7 - External Personnel Security
- PS-9 - Position Descriptions
- SA-3 - System Development Life Cycle
- SA-8 - Security And Privacy Engineering Principles
- SA-11 - Developer Testing And Evaluation
- SA-16 - Developer-Provided Training
- SR-5 - Acquisition Strategies, Tools, And Methods
- SR-6 - Supplier Assessments And Reviews
- SR-11 - Component Authenticity
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Petersen R, Santos D, Smith MC, Wetzel KA, Witte G (2020) Workforce Framework for Cybersecurity (NICE Framework). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-181, Rev. 1., "SP 800-181" https://doi.org/10.6028/NIST.SP.800-181r1
- Wilson M, Hash J (2003) Building an Information Technology Security Awareness and Training Program. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-50., "SP 800-50" https://doi.org/10.6028/NIST.SP.800-50
- AT-3(1) - Environmental Controls
- Provide [Assignment: organization-defined personnel or roles] with initial and [Assignment: organization-defined frequency] training in the employment and operation of environmental controls.
- AT-3(2) - Physical Security Controls
- Provide [Assignment: organization-defined personnel or roles] with initial and [Assignment: organization-defined frequency] training in the employment and operation of physical security controls.
- AT-3(3) - Practical Exercises
- Provide practical exercises in security and privacy training that reinforce training objectives.
- AT-3(4) - Suspicious Communications And Anomalous System Behavior
- [Withdrawn: Moved to AT-2(4)].
- AT-3(5) - Processing Personally Identifiable Information
- Provide [Assignment: organization-defined personnel or roles] with initial and [Assignment: organization-defined frequency] training in the employment and operation of personally identifiable information processing and transparency controls.
- RMF Control
- AT-4
- Subject Area
- AWARENESS AND TRAINING
- Baselines
- CH NP FS FH CP NH FM FL CL NL NM CM
- AT-4a.
- Document and monitor information security and privacy training activities, including security and privacy awareness training and specific role-based security and privacy training; and
- AT-4b.
- Retain individual training records for [Assignment: organization-defined time period].
- AT-4.1 - CCI-000113
- The organization documents individual information system security training activities, including basic security awareness training and specific information system security training.
- AT-4.2 - CCI-000114
- The organization monitors individual information system security training activities, including basic security awareness training and specific information system security training.
- AT-4.3 - CCI-001336
- The organization retains individual training records for an organization-defined time period.
- AT-4.4 - CCI-001337
- The organization defines a time period for retaining individual training records.
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- RMF Control
- AT-5
- Subject Area
- AWARENESS AND TRAINING
- Baselines
- —
- RMF Control
- AT-6
- Subject Area
- AWARENESS AND TRAINING
- Baselines
- CH CP
- RMF Control
- AU-1
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baselines
- CH NP FS FH CP CX NH FM FL CL NL NM CM
- AU-1a.
- Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
- AU-1b.
- Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the audit and accountability policy and procedures; and
- AU-1c.
- Review and update the current audit and accountability:
- AU-1.1 - CCI-001930
- The organization defines the organizational personnel or roles to whom the audit and accountability policy is to be disseminated.
- AU-1.2 - CCI-001931
- The organization defines the organizational personnel or roles to whom the audit and accountability procedures are to be disseminated.
- AU-1.3 - CCI-000117
- The organization develops and documents an audit and accountability policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- AU-1.4 - CCI-001832
- The organization disseminates the audit and accountability policy to organization-defined personnel or roles.
- AU-1.5 - CCI-000120
- The organization develops and documents procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls.
- AU-1.6 - CCI-001834
- The organization disseminates to organization-defined personnel or roles procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls.
- AU-1.7 - CCI-000119
- The organization reviews and updates the audit and accountability policy on an organization-defined frequency.
- AU-1.8 - CCI-001569
- The organization defines the frequency on which it will review and update the audit and accountability policy.
- AU-1.9 - CCI-000122
- The organization reviews and updates the audit and accountability procedures on an organization-defined frequency.
- AU-1.10 - CCI-001570
- The organization defines the frequency on which it will review and update the audit and accountability procedures.
- Bowen P, Hash J, Wilson M (2006) Information Security Handbook: A Guide for Managers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-100, Includes updates as of March 7, 2007., "SP 800-100" https://doi.org/10.6028/NIST.SP.800-100
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- Nieles M, Pillitteri VY, Dempsey KL (2017) An Introduction to Information Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-12, Rev. 1., "SP 800-12" https://doi.org/10.6028/NIST.SP.800-12r1
- RMF Control
- AU-2
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baselines
- CH NP FS FH CP CX NH FM FL CL NL NM CM
- AU-2a.
- Identify the types of events that the system is capable of logging in support of the audit function: [Assignment: organization-defined event types that the system is capable of logging];
- AU-2b.
- Coordinate the event logging function with other organizational entities requiring audit-related information to guide and inform the selection criteria for events to be logged;
- AU-2c.
- Specify the following event types for logging within the system: [Assignment: organization-defined event types (subset of the event types defined in AU-2a.) along with the frequency of (or situation requiring) logging for each identified event type];
- AU-2d.
- Provide a rationale for why the event types selected for logging are deemed to be adequate to support after-the-fact investigations of incidents; and
- AU-2e.
- Review and update the event types selected for logging [Assignment: organization-defined frequency].
- AU-2.1 - CCI-000123
- The organization determines the information system must be capable of auditing an organization-defined list of auditable events.
- AU-2.2 - CCI-001571
- The organization defines the information system auditable events.
- AU-2.3 - CCI-000124
- The organization coordinates the security audit function with other organizational entities requiring audit-related information to enhance mutual support and to help guide the selection of auditable events.
- AU-2.4 - CCI-000125
- The organization provides a rationale for why the list of auditable events is deemed to be adequate to support after-the-fact investigations of security incidents.
- AU-2.7 - CCI-001485
- The organization defines the events which are to be audited on the information system on an organization-defined frequency of (or situation requiring) auditing for each identified event.
- AU-2.6 - CCI-001484
- The organization defines frequency of (or situation requiring) auditing for each identified event.
- AU-2.5 - CCI-000126
- The organization determines that the organization-defined subset of the auditable events defined in AU-2 are to be audited within the information system.
- AC-2 - Account Management
- AC-3 - Access Enforcement
- AC-6 - Least Privilege
- AC-7 - Unsuccessful Logon Attempts
- AC-8 - System Use Notification
- AC-16 - Security And Privacy Attributes
- AC-17 - Remote Access
- AU-3 - Content Of Audit Records
- AU-4 - Audit Log Storage Capacity
- AU-5 - Response To Audit Logging Process Failures
- AU-6 - Audit Record Review, Analysis, And Reporting
- AU-7 - Audit Record Reduction And Report Generation
- AU-11 - Audit Record Retention
- AU-12 - Audit Record Generation
- CM-3 - Configuration Change Control
- CM-5 - Access Restrictions For Change
- CM-6 - Configuration Settings
- CM-13 - Data Action Mapping
- IA-3 - Device Identification And Authentication
- MA-4 - Nonlocal Maintenance
- MP-4 - Media Storage
- PE-3 - Physical Access Control
- PM-21 - Accounting Of Disclosures
- PT-2 - Authority To Process Personally Identifiable Information
- PT-7 - Specific Categories Of Personally Identifiable Information
- RA-8 - Privacy Impact Assessments
- SA-8 - Security And Privacy Engineering Principles
- SC-7 - Boundary Protection
- SC-18 - Mobile Code
- SI-3 - Malicious Code Protection
- SI-4 - System Monitoring
- SI-7 - Software, Firmware, And Information Integrity
- SI-10 - Information Input Validation
- SI-11 - Error Handling
- Kent K, Souppaya MP (2006) Guide to Computer Security Log Management. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-92., "SP 800-92" https://doi.org/10.6028/NIST.SP.800-92
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- AU-2(1) - Compilation Of Audit Records From Multiple Sources
- [Withdrawn: Incorporated into AU-12].
- AU-2(2) - Selection Of Audit Events By Component
- [Withdrawn: Incorporated into AU-12].
- AU-2(3) - Reviews And Updates
- [Withdrawn: Incorporated into AU-2].
- AU-2(4) - Privileged Functions
- [Withdrawn: Incorporated into AC-6(9)].
- RMF Control
- AU-3
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baselines
- CH NP FS FH CP CX NH FM FL CL NL NM CM
- AU-3a.
- What type of event occurred;
- AU-3b.
- When the event occurred;
- AU-3c.
- Where the event occurred;
- AU-3d.
- Source of the event;
- AU-3e.
- Outcome of the event; and
- AU-3f.
- Identity of any individuals, subjects, or objects/entities associated with the event.
- AU-3.1 - CCI-000130
- The information system generates audit records containing information that establishes what type of event occurred.
- AU-3.2 - CCI-000131
- The information system generates audit records containing information that establishes when an event occurred.
- AU-3.3 - CCI-000132
- The information system generates audit records containing information that establishes where the event occurred.
- AU-3.4 - CCI-000133
- The information system generates audit records containing information that establishes the source of the event.
- AU-3.5 - CCI-000134
- The information system generates audit records containing information that establishes the outcome of the event.
- AU-3.6 - CCI-001487
- The information system generates audit records containing information that establishes the identity of any individuals or subjects associated with the event.
- Brooks S, Garcia M, Lefkovitz N, Lightman S, Nadeau E (2017) An Introduction to Privacy Engineering and Risk Management in Federal Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8062., "IR 8062" https://doi.org/10.6028/NIST.IR.8062
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- AU-3(1) - Additional Audit Information
- Generate audit records containing the following additional information: [Assignment: organization-defined additional information].
- AU-3(2) - Centralized Management Of Planned Audit Record Content
- [Withdrawn: Incorporated into PL-9].
- AU-3(3) - Limit Personally Identifiable Information Elements
- Limit personally identifiable information contained in audit records to the following elements identified in the privacy risk assessment: [Assignment: organization-defined elements].
- RMF Control
- AU-4
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baselines
- CH FS FH CX NH FM FL CL NL NM CM
- AU-4.1 - CCI-001848
- The organization defines the audit record storage requirements.
- AU-4.2 - CCI-001849
- The organization allocates audit record storage capacity in accordance with organization-defined audit record storage requirements.
- AU-2 - Event Logging
- AU-5 - Response To Audit Logging Process Failures
- AU-6 - Audit Record Review, Analysis, And Reporting
- AU-7 - Audit Record Reduction And Report Generation
- AU-9 - Protection Of Audit Information
- AU-11 - Audit Record Retention
- AU-12 - Audit Record Generation
- AU-14 - Session Audit
- SI-4 - System Monitoring
- AU-4(1) - Transfer To Alternate Storage
- Transfer audit logs [Assignment: organization-defined frequency] to a different system, system component, or media other than the system or system component conducting the logging.
- RMF Control
- AU-5
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baselines
- CH FS FH CX NH FM FL CL NL NM CM
- AU-5a.
- Alert [Assignment: organization-defined personnel or roles] within [Assignment: organization-defined time period] in the event of an audit logging process failure; and
- AU-5b.
- Take the following additional actions: [Assignment: organization-defined additional actions].
- AU-5.1 - CCI-000139
- The information system alerts designated organization-defined personnel or roles in the event of an audit processing failure.
- AU-5.2 - CCI-001572
- The organization defines the personnel or roles to be alerted in the event of an audit processing failure.
- AU-5.3 - CCI-000140
- The information system takes organization defined actions upon audit failure (e.g., shut down information system, overwrite oldest audit records, stop generating audit records).
- AU-5.4 - CCI-001490
- The organization defines actions to be taken by the information system upon audit failure (e.g., shut down information system, overwrite oldest audit records, stop generating audit records).
- AU-2 - Event Logging
- AU-4 - Audit Log Storage Capacity
- AU-7 - Audit Record Reduction And Report Generation
- AU-9 - Protection Of Audit Information
- AU-11 - Audit Record Retention
- AU-12 - Audit Record Generation
- AU-14 - Session Audit
- SI-4 - System Monitoring
- SI-12 - Information Management And Retention
- AU-5(1) - Storage Capacity Warning
- Provide a warning to [Assignment: organization-defined personnel, roles, and/or locations] within [Assignment: organization-defined time period] when allocated audit log storage volume reaches [Assignment: organization-defined percentage] of repository maximum audit log storage capacity.
- AU-5(2) - Real-Time Alerts
- Provide an alert within [Assignment: organization-defined real-time period] to [Assignment: organization-defined personnel, roles, and/or locations] when the following audit failure events occur: [Assignment: organization-defined audit logging failure events requiring real-time alerts].
- AU-5(3) - Configurable Traffic Volume Thresholds
- Enforce configurable network communications traffic volume thresholds reflecting limits on audit log storage capacity and [Selection: reject; delay] network traffic above those thresholds.
- AU-5(4) - Shutdown On Failure
- Invoke a [Selection: full system shutdown; partial system shutdown; degraded operational mode with limited mission or business functionality available] in the event of [Assignment: organization-defined audit logging failures], unless an alternate audit logging capability exists.
- AU-5(5) - Alternate Audit Logging Capability
- Provide an alternate audit logging capability in the event of a failure in primary audit logging capability that implements [Assignment: organization-defined alternate audit logging functionality].
- RMF Control
- AU-6
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baselines
- CH FS FH CX NH FM CC FL CL NL NM CM
- AU-6a.
- Review and analyze system audit records [Assignment: organization-defined frequency] for indications of [Assignment: organization-defined inappropriate or unusual activity] and the potential impact of the inappropriate or unusual activity;
- AU-6b.
- Report findings to [Assignment: organization-defined personnel or roles]; and
- AU-6c.
- Adjust the level of audit record review, analysis, and reporting within the system when there is a change in risk based on law enforcement information, intelligence information, or other credible sources of information.
- AU-6.1 - CCI-000148
- The organization reviews and analyzes information system audit records on an organization defined frequency for indications of organization-defined inappropriate or unusual activity.
- AU-6.2 - CCI-000151
- The organization defines the frequency for the review and analysis of information system audit records for organization-defined inappropriate or unusual activity.
- AU-6.3 - CCI-001862
- The organization defines the types of inappropriate or unusual activity to be reviewed and analyzed in the audit records.
- AU-6.4 - CCI-000149
- The organization reports any findings to organization-defined personnel or roles for indications of organization-defined inappropriate or unusual activity.
- AU-6.5 - CCI-001863
- The organization defines the personnel or roles to receive the reports of organization-defined inappropriate or unusual activity.
- AC-2 - Account Management
- AC-3 - Access Enforcement
- AC-5 - Separation Of Duties
- AC-6 - Least Privilege
- AC-7 - Unsuccessful Logon Attempts
- AC-17 - Remote Access
- AU-7 - Audit Record Reduction And Report Generation
- AU-16 - Cross-Organizational Audit Logging
- CA-2 - Control Assessments
- CA-7 - Continuous Monitoring
- CM-2 - Baseline Configuration
- CM-5 - Access Restrictions For Change
- CM-6 - Configuration Settings
- CM-10 - Software Usage Restrictions
- CM-11 - User-Installed Software
- IA-2 - Identification And Authentication (Organizational Users)
- IA-3 - Device Identification And Authentication
- IA-5 - Authenticator Management
- IA-8 - Identification And Authentication (Non-Organizational Users)
- IR-5 - Incident Monitoring
- MA-4 - Nonlocal Maintenance
- MP-4 - Media Storage
- PE-3 - Physical Access Control
- PE-6 - Monitoring Physical Access
- RA-5 - Vulnerability Monitoring And Scanning
- SA-8 - Security And Privacy Engineering Principles
- SC-7 - Boundary Protection
- SI-3 - Malicious Code Protection
- SI-4 - System Monitoring
- SI-7 - Software, Firmware, And Information Integrity
- Ayers RP, Brothers S, Jansen W (2014) Guidelines on Mobile Device Forensics. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-101, Rev. 1., "SP 800-101" https://doi.org/10.6028/NIST.SP.800-101r1
- Kent K, Chevalier S, Grance T, Dang H (2006) Guide to Integrating Forensic Techniques into Incident Response. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-86., "SP 800-86" https://doi.org/10.6028/NIST.SP.800-86
- AU-6(1) - Automated Process Integration
- Integrate audit record review, analysis, and reporting processes using [Assignment: organization-defined automated mechanisms].
- AU-6(2) - Automated Security Alerts
- [Withdrawn: Incorporated into SI-4].
- AU-6(3) - Correlate Audit Record Repositories
- Analyze and correlate audit records across different repositories to gain organization-wide situational awareness.
- AU-6(4) - Central Review And Analysis
- Provide and implement the capability to centrally review and analyze audit records from multiple components within the system.
- AU-6(5) - Integrated Analysis Of Audit Records
- Integrate analysis of audit records with analysis of [Selection (one or more): vulnerability scanning information; performance data; system monitoring information; [Assignment: organization-defined data/information collected from other sources]] to further enhance the ability to identify inappropriate or unusual activity.
- AU-6(6) - Correlation With Physical Monitoring
- Correlate information from audit records with information obtained from monitoring physical access to further enhance the ability to identify suspicious, inappropriate, unusual, or malevolent activity.
- AU-6(7) - Permitted Actions
- Specify the permitted actions for each [Selection (one or more): system process; role; user] associated with the review, analysis, and reporting of audit record information.
- AU-6(8) - Full Text Analysis Of Privileged Commands
- Perform a full text analysis of logged privileged commands in a physically distinct component or subsystem of the system, or other system that is dedicated to that analysis.
- AU-6(9) - Correlation With Information From Nontechnical Sources
- Correlate information from nontechnical sources with audit record information to enhance organization-wide situational awareness.
- AU-6(10) - Audit Level Adjustment
- [Withdrawn: Incorporated into AU-6].
- RMF Control
- AU-7
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baselines
- CH FH CX NH FM NM CM
- AU-7a.
- Supports on-demand audit record review, analysis, and reporting requirements and after-the-fact investigations of incidents; and
- AU-7b.
- Does not alter the original content or time ordering of audit records.
- AU-7.1 - CCI-001875
- The information system provides an audit reduction capability that supports on-demand audit review and analysis.
- AU-7.2 - CCI-001876
- The information system provides an audit reduction capability that supports on-demand reporting requirements.
- AU-7.3 - CCI-001877
- The information system provides an audit reduction capability that supports after-the-fact investigations of security incidents.
- AU-7.4 - CCI-001878
- The information system provides a report generation capability that supports on-demand audit review and analysis.
- AU-7.5 - CCI-001879
- The information system provides a report generation capability that supports on-demand reporting requirements.
- AU-7.6 - CCI-001880
- The information system provides a report generation capability that supports after-the-fact investigations of security incidents.
- AU-7.7 - CCI-001881
- The information system provides an audit reduction capability that does not alter original content or time ordering of audit records.
- AU-7.8 - CCI-001882
- The information system provides a report generation capability that does not alter original content or time ordering of audit records.
- AC-2 - Account Management
- AU-2 - Event Logging
- AU-3 - Content Of Audit Records
- AU-4 - Audit Log Storage Capacity
- AU-5 - Response To Audit Logging Process Failures
- AU-6 - Audit Record Review, Analysis, And Reporting
- AU-12 - Audit Record Generation
- AU-16 - Cross-Organizational Audit Logging
- CM-5 - Access Restrictions For Change
- IA-5 - Authenticator Management
- IR-4 - Incident Handling
- PM-12 - Insider Threat Program
- SI-4 - System Monitoring
- AU-7(1) - Automatic Processing
- Provide and implement the capability to process, sort, and search audit records for events of interest based on the following content: [Assignment: organization-defined fields within audit records].
- AU-7(2) - Automatic Sort And Search
- [Withdrawn: Incorporated into AU-7(1)].
- RMF Control
- AU-8
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baselines
- CH FS FH CX NH FM FL CL NL NM CM
- AU-8a.
- Use internal system clocks to generate time stamps for audit records; and
- AU-8b.
- Record time stamps for audit records that meet [Assignment: organization-defined granularity of time measurement] and that use Coordinated Universal Time, have a fixed local time offset from Coordinated Universal Time, or that include the local time offset as part of the time stamp.
- AU-8.1 - CCI-000159
- The information system uses internal system clocks to generate time stamps for audit records.
- AU-8.2 - CCI-001888
- The organization defines the granularity of time measurement for time stamps generated for audit records.
- AU-8.3 - CCI-001889
- The information system records time stamps for audit records that meets organization-defined granularity of time measurement.
- AU-8.4 - CCI-001890
- The information system records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
- AU-8(1) - Synchronization With Authoritative Time Source
- [Withdrawn: Moved to SC-45(1)].
- AU-8(2) - Secondary Authoritative Time Source
- [Withdrawn: Moved to SC-45(2)].
- RMF Control
- AU-9
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baselines
- CH FS FH CP CX NH FM FL CL NL NM CM
- AU-9a.
- Protect audit information and audit logging tools from unauthorized access, modification, and deletion; and
- AU-9b.
- Alert [Assignment: organization-defined personnel or roles] upon detection of unauthorized access, modification, or deletion of audit information.
- AU-9.1 - CCI-000162
- The information system protects audit information from unauthorized access.
- AU-9.2 - CCI-000163
- The information system protects audit information from unauthorized modification.
- AU-9.3 - CCI-000164
- The information system protects audit information from unauthorized deletion.
- AU-9.4 - CCI-001493
- The information system protects audit tools from unauthorized access.
- AU-9.5 - CCI-001494
- The information system protects audit tools from unauthorized modification.
- AU-9.6 - CCI-001495
- The information system protects audit tools from unauthorized deletion.
- AC-3 - Access Enforcement
- AC-6 - Least Privilege
- AU-6 - Audit Record Review, Analysis, And Reporting
- AU-11 - Audit Record Retention
- AU-14 - Session Audit
- AU-15 - Alternate Audit Logging Capability
- MP-2 - Media Access
- MP-4 - Media Storage
- PE-2 - Physical Access Authorizations
- PE-3 - Physical Access Control
- PE-6 - Monitoring Physical Access
- SA-8 - Security And Privacy Engineering Principles
- SC-8 - Transmission Confidentiality And Integrity
- SI-4 - System Monitoring
- National Institute of Standards and Technology (2015) Secure Hash Standard (SHS). (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 180-4., "FIPS 180-4" https://doi.org/10.6028/NIST.FIPS.180-4
- National Institute of Standards and Technology (2015) SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 202., "FIPS 202" https://doi.org/10.6028/NIST.FIPS.202
- National Institute of Standards and Technology (2019) Security Requirements for Cryptographic Modules. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 140-3. , "FIPS 140-3" https://doi.org/10.6028/NIST.FIPS.140-3
- AU-9(1) - Hardware Write-Once Media
- Write audit trails to hardware-enforced, write-once media.
- AU-9(2) - Store On Separate Physical Systems Or Components
- Store audit records [Assignment: organization-defined frequency] in a repository that is part of a physically different system or system component than the system or component being audited.
- AU-9(3) - Cryptographic Protection
- Implement cryptographic mechanisms to protect the integrity of audit information and audit tools.
- AU-9(4) - Access By Subset Of Privileged Users
- Authorize access to management of audit logging functionality to only [Assignment: organization-defined subset of privileged users or roles].
- AU-9(5) - Dual Authorization
- Enforce dual authorization for [Selection (one or more): movement; deletion] of [Assignment: organization-defined audit information].
- AU-9(6) - Read-Only Access
- Authorize read-only access to audit information to [Assignment: organization-defined subset of privileged users or roles].
- AU-9(7) - Store On Component With Different Operating System
- Store audit information on a component running a different operating system than the system or component being audited.
- RMF Control
- AU-10
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baselines
- CH FH CP NH CM
- AU-10.1 - CCI-000166
- The information system protects against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation.
- AU-10.2 - CCI-001899
- The organization defines the action to be covered by non-repudiation.
- AU-9 - Protection Of Audit Information
- PM-12 - Insider Threat Program
- SA-8 - Security And Privacy Engineering Principles
- SC-8 - Transmission Confidentiality And Integrity
- SC-12 - Cryptographic Key Establishment And Management
- SC-13 - Cryptographic Protection
- SC-16 - Transmission Of Security And Privacy Attributes
- SC-17 - Public Key Infrastructure Certificates
- SC-23 - Session Authenticity
- National Institute of Standards and Technology (2013) Digital Signature Standard (DSS). (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 186-4., "FIPS 186-4" https://doi.org/10.6028/NIST.FIPS.186-4
- National Institute of Standards and Technology (2015) Secure Hash Standard (SHS). (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 180-4., "FIPS 180-4" https://doi.org/10.6028/NIST.FIPS.180-4
- National Institute of Standards and Technology (2015) SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 202., "FIPS 202" https://doi.org/10.6028/NIST.FIPS.202
- National Institute of Standards and Technology (2019) Security Requirements for Cryptographic Modules. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 140-3. , "FIPS 140-3" https://doi.org/10.6028/NIST.FIPS.140-3
- Rose SW, Nightingale S, Garfinkel SL, Chandramouli R (2019) Trustworthy Email. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-177, Rev. 1., "SP 800-177" https://doi.org/10.6028/NIST.SP.800-177r1
- AU-10(1) - Association Of Identities
- AU-10(2) - Validate Binding Of Information Producer Identity
- AU-10(3) - Chain Of Custody
- Maintain reviewer or releaser credentials within the established chain of custody for information reviewed or released.
- AU-10(4) - Validate Binding Of Information Reviewer Identity
- AU-10(5) - Digital Signatures
- [Withdrawn: Incorporated into SI-7].
- RMF Control
- AU-11
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baselines
- CH NP FS FH CP NH FM FL CL NL NM CM
- AU-11.1 - CCI-000167
- The organization retains audit records for an organization defined time period to provide support for after-the-fact investigations of security incidents and to meet regulatory and organizational information retention requirements.
- AU-11.2 - CCI-000168
- The organization defines the time period for retention of audit records which is consistent with its records retention policy, to provide support for after-the-fact investigations of security incidents, and meet regulatory and organizational information retention requirements.
- AU-2 - Event Logging
- AU-4 - Audit Log Storage Capacity
- AU-5 - Response To Audit Logging Process Failures
- AU-6 - Audit Record Review, Analysis, And Reporting
- AU-9 - Protection Of Audit Information
- AU-14 - Session Audit
- MP-6 - Media Sanitization
- RA-5 - Vulnerability Monitoring And Scanning
- SI-12 - Information Management And Retention
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- AU-11(1) - Long-Term Retrieval Capability
- Employ [Assignment: organization-defined measures] to ensure that long-term audit records generated by the system can be retrieved.
- RMF Control
- AU-12
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baselines
- CH FS FH CP CX NH FM CC FL CL NL NM CM
- AU-12a.
- Provide audit record generation capability for the event types the system is capable of auditing as defined in AU-2a on [Assignment: organization-defined system components];
- AU-12b.
- Allow [Assignment: organization-defined personnel or roles] to select the event types that are to be logged by specific components of the system; and
- AU-12c.
- Generate audit records for the event types defined in AU-2c that include the audit record content defined in AU-3.
- AU-12.1 - CCI-000169
- The information system provides audit record generation capability for the auditable events defined in AU-2 a at organization defined information system components.
- AU-12.2 - CCI-001459
- The organization defines information system components that provide audit record generation capability.
- AU-12.3 - CCI-000171
- The information system allows organization-defined personnel or roles to select which auditable events are to be audited by specific components of the information system.
- AU-12.4 - CCI-001910
- The organization defines the personnel or roles allowed select which auditable events are to be audited by specific components of the information system.
- AU-12.5 - CCI-000172
- The information system generates audit records for the events defined in AU-2 d with the content defined in AU-3.
- AC-6 - Least Privilege
- AC-17 - Remote Access
- AU-2 - Event Logging
- AU-3 - Content Of Audit Records
- AU-4 - Audit Log Storage Capacity
- AU-5 - Response To Audit Logging Process Failures
- AU-6 - Audit Record Review, Analysis, And Reporting
- AU-7 - Audit Record Reduction And Report Generation
- AU-14 - Session Audit
- CM-5 - Access Restrictions For Change
- MA-4 - Nonlocal Maintenance
- MP-4 - Media Storage
- PM-12 - Insider Threat Program
- SA-8 - Security And Privacy Engineering Principles
- SC-18 - Mobile Code
- SI-3 - Malicious Code Protection
- SI-4 - System Monitoring
- SI-7 - Software, Firmware, And Information Integrity
- SI-10 - Information Input Validation
- AU-12(1) - System-Wide And Time-Correlated Audit Trail
- Compile audit records from [Assignment: organization-defined system components] into a system-wide (logical or physical) audit trail that is time-correlated to within [Assignment: organization-defined level of tolerance for the relationship between time stamps of individual records in the audit trail].
- AU-12(2) - Standardized Formats
- Produce a system-wide (logical or physical) audit trail composed of audit records in a standardized format.
- AU-12(3) - Changes By Authorized Individuals
- Provide and implement the capability for [Assignment: organization-defined individuals or roles] to change the logging to be performed on [Assignment: organization-defined system components] based on [Assignment: organization-defined selectable event criteria] within [Assignment: organization-defined time thresholds].
- AU-12(4) - Query Parameter Audits Of Personally Identifiable Information
- Provide and implement the capability for auditing the parameters of user query events for data sets containing personally identifiable information.
- RMF Control
- AU-13
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baselines
- —
- AU-13a.
- Monitor [Assignment: organization-defined open-source information and/or information sites] [Assignment: organization-defined frequency] for evidence of unauthorized disclosure of organizational information; and
- AU-13b.
- If an information disclosure is discovered:
- AU-13.1 - CCI-001460
- The organization monitors organization-defined open source information and/or information sites per organization-defined frequency for evidence of unauthorized exfiltration or disclosure of organizational information.
- AU-13.2 - CCI-001461
- The organization defines a frequency for monitoring open source information and/or information sites for evidence of unauthorized exfiltration or disclosure of organizational information.
- AU-13.3 - CCI-001915
- The organization defines the open source information and/or information sites to be monitored for evidence of unauthorized exfiltration or disclosure of organizational information.
- AU-13(1) - Use Of Automated Tools
- Monitor open-source information and information sites using [Assignment: organization-defined automated mechanisms].
- AU-13(2) - Review Of Monitored Sites
- Review the list of open-source information sites being monitored [Assignment: organization-defined frequency].
- AU-13(3) - Unauthorized Replication Of Information
- Employ discovery techniques, processes, and tools to determine if external entities are replicating organizational information in an unauthorized manner.
- RMF Control
- AU-14
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baselines
- CH CC CL CM
- AU-14a.
- Provide and implement the capability for [Assignment: organization-defined users or roles] to [Selection (one or more): record; view; hear; log] the content of a user session under [Assignment: organization-defined circumstances]; and
- AU-14b.
- Develop, integrate, and use session auditing activities in consultation with legal counsel and in accordance with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.
- AU-14.1 - CCI-001919
- The information system provides the capability for authorized users to select a user session to capture/record or view/hear.
- AC-3 - Access Enforcement
- AC-8 - System Use Notification
- AU-2 - Event Logging
- AU-3 - Content Of Audit Records
- AU-4 - Audit Log Storage Capacity
- AU-5 - Response To Audit Logging Process Failures
- AU-8 - Time Stamps
- AU-9 - Protection Of Audit Information
- AU-11 - Audit Record Retention
- AU-12 - Audit Record Generation
- AU-14(1) - System Start-Up
- Initiate session audits automatically at system start-up.
- AU-14(2) - Capture And Record Content
- [Withdrawn: Incorporated into AU-14].
- AU-14(3) - Remote Viewing And Listening
- Provide and implement the capability for authorized users to remotely view and hear content related to an established user session in real time.
- RMF Control
- AU-15
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baselines
- —
- AU-15.1 - CCI-001921
- The organization defines the alternative audit functionality to be provided in the event of a failure in the primary audit capability.
- AU-15.2 - CCI-001922
- The organization provides an alternative audit capability in the event of a failure in primary audit capability that provides organization-defined alternative audit functionality.
- RMF Control
- AU-16
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baselines
- CH CC CM
- AU-16.1 - CCI-001923
- The organization defines the audit information to be coordinated among external organizations when audit information is transmitted across organizational boundaries.
- AU-16.2 - CCI-001924
- The organization defines the methods to be employed when coordinating audit information among external organizations when audit information is transmitted across organizational boundaries.
- AU-16.3 - CCI-001925
- The organization employs organization-defined methods for coordinating organization-defined audit information among external organizations when audit information is transmitted across organizational boundaries.
- AU-16(1) - Identity Preservation
- Preserve the identity of individuals in cross-organizational audit trails.
- AU-16(2) - Sharing Of Audit Information
- Provide cross-organizational audit information to [Assignment: organization-defined organizations] based on [Assignment: organization-defined cross-organizational sharing agreements].
- AU-16(3) - Disassociability
- Implement [Assignment: organization-defined measures] to disassociate individuals from audit information transmitted across organizational boundaries.
- RMF Control
- CA-1
- Subject Area
- ASSESSMENT, AUTHORIZATION, AND MONITORING
- Baselines
- CH NP FS FH CP CX NH FM FL CL NL NM CM
- CA-1a.
- Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
- CA-1b.
- Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the assessment, authorization, and monitoring policy and procedures; and
- CA-1c.
- Review and update the current assessment, authorization, and monitoring:
- CA-1.1 - CCI-002061
- The organization defines the personnel or roles to whom security assessment and authorization policy is to be disseminated.
- CA-1.2 - CCI-002062
- The organization defines the personnel or roles to whom the security assessment and authorization procedures are to be disseminated.
- CA-1.3 - CCI-000239
- The organization develops and documents a security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- CA-1.4 - CCI-000240
- The organization disseminates to organization-defined personnel or roles a security assessment and authorization policy.
- CA-1.5 - CCI-000242
- The organization develops and documents procedures to facilitate the implementation of the security assessment and authorization policy and associated security assessment and authorization controls.
- CA-1.6 - CCI-000243
- The organization disseminates to organization-defined personnel or roles procedures to facilitate the implementation of the security assessment and authorization policy and associated security assessment and authorization controls.
- CA-1.7 - CCI-000238
- The organization defines the frequency to review and update the current security assessment and authorization policy.
- CA-1.8 - CCI-000241
- The organization reviews and updates the current security assessment and authorization policy in accordance with organization-defined frequency.
- CA-1.9 - CCI-000244
- The organization reviews and updates the current security assessment and authorization procedures in accordance with organization-defined frequency.
- CA-1.10 - CCI-001578
- The organization defines the frequency to review and update the current security assessment and authorization procedures.
- Bowen P, Hash J, Wilson M (2006) Information Security Handbook: A Guide for Managers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-100, Includes updates as of March 7, 2007., "SP 800-100" https://doi.org/10.6028/NIST.SP.800-100
- Brooks S, Garcia M, Lefkovitz N, Lightman S, Nadeau E (2017) An Introduction to Privacy Engineering and Risk Management in Federal Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8062., "IR 8062" https://doi.org/10.6028/NIST.IR.8062
- Dempsey KL, Pillitteri VY, Baer C, Niemeyer R, Rudman R, Urban S (2020) Assessing Information Security Continuous Monitoring (ISCM) Programs: Developing an ISCM Program Assessment. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-137A., "SP 800-137A" https://doi.org/10.6028/NIST.SP.800-137A
- Dempsey KL, Chawla NS, Johnson LA, Johnston R, Jones AC, Orebaugh AD, Scholl MA, Stine KM (2011) Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-137., "SP 800-137" https://doi.org/10.6028/NIST.SP.800-137
- Joint Task Force (2018) Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2., "SP 800-37" https://doi.org/10.6028/NIST.SP.800-37r2
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- Joint Task Force Transformation Initiative (2014) Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-53A, Rev. 4, Includes updates as of December 18, 2014., "SP 800-53A" https://doi.org/10.6028/NIST.SP.800-53Ar4
- Nieles M, Pillitteri VY, Dempsey KL (2017) An Introduction to Information Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-12, Rev. 1., "SP 800-12" https://doi.org/10.6028/NIST.SP.800-12r1
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- RMF Control
- CA-2
- Subject Area
- ASSESSMENT, AUTHORIZATION, AND MONITORING
- Baselines
- CH NP FS FH CP CX NH FM FL CL NL NM CM
- CA-2a.
- Select the appropriate assessor or assessment team for the type of assessment to be conducted;
- CA-2b.
- Develop a control assessment plan that describes the scope of the assessment including:
- CA-2c.
- Ensure the control assessment plan is reviewed and approved by the authorizing official or designated representative prior to conducting the assessment;
- CA-2d.
- Assess the controls in the system and its environment of operation [Assignment: organization-defined frequency] to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security and privacy requirements;
- CA-2e.
- Produce a control assessment report that document the results of the assessment; and
- CA-2f.
- Provide the results of the control assessment to [Assignment: organization-defined individuals or roles].
- CA-2.1 - CCI-000245
- The organization develops a security assessment plan for the information system and its environment of operation. IG&VP WG Note: *For DoD, the security assessment plan information is included in the Security Plan and the security assessment report and is not a separate document/artifact.*
- CA-2.2 - CCI-000246
- The organization's security assessment plan describes the security controls and control enhancements under assessment. IG&VP WG Note *For DoD, the security assessment plan information is included in the Security Plan and the security assessment report and is not a separate document/artifact.*
- CA-2.3 - CCI-000247
- The organization's security assessment plan describes assessment procedures to be used to determine security control effectiveness. IG&VP WG Note: *For DoD, the security assessment plan information is included in the Security Plan and the security assessment report and is not a separate document/artifact.*
- CA-2.4 - CCI-000248
- The organization's security assessment plan describes assessment environment. *For DoD, the security assessment plan information is included in the Security Plan and the security assessment report and is not a separate document/artifact.*
- CA-2.5 - CCI-002070
- The organization's security assessment plan describes assessment team, assessment roles and responsibilities.
- CA-2.6 - CCI-000251
- The organization assesses, on an organization-defined frequency, the security controls in the information system and its environment of operation to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements. IG&VP WG Note: *For DoD, the security assessment plan information is included in the Security Plan and the security assessment report and is not a separate document/artifact.*
- CA-2.7 - CCI-000252
- The organization defines the frequency on which the security controls in the information system and its environment of operation are assessed. IG&VP WG Note: *For DoD, the security assessment plan information is included in the Security Plan and the security assessment report and is not a separate document/artifact.*
- CA-2.8 - CCI-000253
- The organization produces a security assessment report that documents the results of the assessment against the information system and its environment of operation. IG&VP WG Note: *For DoD, the security assessment plan information is included in the Security Plan and the security assessment report and is not a separate document/artifact.*
- CA-2.9 - CCI-000254
- The organization provides the results of the security control assessment against information system and its environment of operation to organization-defined individuals or roles. IG&VP WG Note: *For DoD, the security assessment plan information is included in the Security Plan and the security assessment report and is not a separate document/artifact.*
- CA-2.10 - CCI-002071
- The organization defines the individuals or roles to whom the results of the security control assessment is to be provided.
- AC-20 - Use Of External Systems
- CA-5 - Plan Of Action And Milestones
- CA-6 - Authorization
- CA-7 - Continuous Monitoring
- PM-9 - Risk Management Strategy
- RA-5 - Vulnerability Monitoring And Scanning
- RA-10 - Threat Hunting
- SA-11 - Developer Testing And Evaluation
- SC-38 - Operations Security
- SI-3 - Malicious Code Protection
- SI-12 - Information Management And Retention
- SR-2 - Supply Chain Risk Management Plan
- SR-3 - Supply Chain Controls And Processes
- Brooks S, Garcia M, Lefkovitz N, Lightman S, Nadeau E (2017) An Introduction to Privacy Engineering and Risk Management in Federal Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8062., "IR 8062" https://doi.org/10.6028/NIST.IR.8062
- Dempsey KL, Chawla NS, Johnson LA, Johnston R, Jones AC, Orebaugh AD, Scholl MA, Stine KM (2011) Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-137., "SP 800-137" https://doi.org/10.6028/NIST.SP.800-137
- Dempsey KL, Eavy P, Moore G (2017) Automation Support for Security Control Assessments: Volume 1: Overview. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8011, Volume 1., "IR 8011-1" https://doi.org/10.6028/NIST.IR.8011-1
- Joint Task Force (2018) Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2., "SP 800-37" https://doi.org/10.6028/NIST.SP.800-37r2
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Joint Task Force Transformation Initiative (2014) Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-53A, Rev. 4, Includes updates as of December 18, 2014., "SP 800-53A" https://doi.org/10.6028/NIST.SP.800-53Ar4
- National Institute of Standards and Technology (2004) Standards for Security Categorization of Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 199., "FIPS 199" https://doi.org/10.6028/NIST.FIPS.199
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Scarfone KA, Souppaya MP, Cody A, Orebaugh AD (2008) Technical Guide to Information Security Testing and Assessment. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-115., "SP 800-115" https://doi.org/10.6028/NIST.SP.800-115
- Swanson MA, Hash J, Bowen P (2006) Guide for Developing Security Plans for Federal Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-18, Rev. 1., "SP 800-18" https://doi.org/10.6028/NIST.SP.800-18r1
- CA-2(1) - Independent Assessors
- Employ independent assessors or assessment teams to conduct control assessments.
- CA-2(2) - Specialized Assessments
- Include as part of control assessments, [Assignment: organization-defined frequency], [Selection: announced; unannounced], [Selection (one or more): in-depth monitoring; security instrumentation; automated security test cases; vulnerability scanning; malicious user testing; insider threat assessment; performance and load testing; data leakage or data loss assessment; [Assignment: organization-defined other forms of assessment]].
- CA-2(3) - Leveraging Results From External Organizations
- Leverage the results of control assessments performed by [Assignment: organization-defined external organization] on [Assignment: organization-defined system] when the assessment meets [Assignment: organization-defined requirements].
- RMF Control
- CA-3
- Subject Area
- ASSESSMENT, AUTHORIZATION, AND MONITORING
- Baselines
- CH FS FH CX NH FM CC FL CL NL NM CM
- CA-3a.
- Approve and manage the exchange of information between the system and other systems using [Selection (one or more): interconnection security agreements; information exchange security agreements; memoranda of understanding or agreement; service level agreements; user agreements; nondisclosure agreements; [Assignment: organization-defined type of agreement]];
- CA-3b.
- Document, as part of each exchange agreement, the interface characteristics, security and privacy requirements, controls, and responsibilities for each system, and the impact level of the information communicated; and
- CA-3c.
- Review and update the agreements [Assignment: organization-defined frequency].
- CA-3.1 - CCI-000257
- The organization authorizes connections from the information system to other information systems through the use of Interconnection Security Agreements.
- CA-3.2 - CCI-000258
- The organization documents, for each interconnection, the interface characteristics.
- CA-3.3 - CCI-000259
- The organization documents, for each interconnection, the security requirements.
- CA-3.4 - CCI-000260
- The organization documents, for each interconnection, the nature of the information communicated.
- CA-3.5 - CCI-002083
- The organization reviews and updates Interconnection Security Agreements on an organization-defined frequency.
- CA-3.6 - CCI-002084
- The organization defines the frequency that reviews and updates to the Interconnection Security Agreements must be conducted.
- AC-4 - Information Flow Enforcement
- AC-20 - Use Of External Systems
- AU-16 - Cross-Organizational Audit Logging
- CA-6 - Authorization
- IA-3 - Device Identification And Authentication
- IR-4 - Incident Handling
- PL-2 - System Security And Privacy Plans
- PT-7 - Specific Categories Of Personally Identifiable Information
- RA-3 - Risk Assessment
- SA-9 - External System Services
- SC-7 - Boundary Protection
- SI-12 - Information Management And Retention
- Grance T, Hash J, Peck S, Smith J, Korow-Diks K (2002) Security Guide for Interconnecting Information Technology Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-47., "SP 800-47" https://doi.org/10.6028/NIST.SP.800-47
- National Institute of Standards and Technology (2004) Standards for Security Categorization of Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 199., "FIPS 199" https://doi.org/10.6028/NIST.FIPS.199
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- CA-3(1) - Unclassified National Security System Connections
- [Withdrawn: Moved to SC-7(25)].
- CA-3(2) - Classified National Security System Connections
- [Withdrawn: Moved to SC-7(26)].
- CA-3(3) - Unclassified Non-National Security System Connections
- [Withdrawn: Moved to SC-7(27)].
- CA-3(4) - Connections To Public Networks
- [Withdrawn: Moved to SC-7(28)].
- CA-3(5) - Restrictions On External System Connections
- [Withdrawn: Moved to SC-7(5)].
- CA-3(6) - Transfer Authorizations
- Verify that individuals or systems transferring data between interconnecting systems have the requisite authorizations (i.e., write permissions or privileges) prior to accepting such data.
- CA-3(7) - Transitive Information Exchanges
- RMF Control
- CA-4
- Subject Area
- ASSESSMENT, AUTHORIZATION, AND MONITORING
- Baselines
- —
- RMF Control
- CA-5
- Subject Area
- ASSESSMENT, AUTHORIZATION, AND MONITORING
- Baselines
- CH NP FS FH CP CX NH FM FL CL NL NM CM
- CA-5a.
- Develop a plan of action and milestones for the system to document the planned remediation actions of the organization to correct weaknesses or deficiencies noted during the assessment of the controls and to reduce or eliminate known vulnerabilities in the system; and
- CA-5b.
- Update existing plan of action and milestones [Assignment: organization-defined frequency] based on the findings from control assessments, independent audits or reviews, and continuous monitoring activities.
- CA-5.1 - CCI-000264
- The organization develops a plan of action and milestones for the information system to document the organizations planned remedial actions to correct weaknesses or deficiencies noted during the assessment of the security controls and to reduce or eliminate known vulnerabilities in the system.
- CA-5.2 - CCI-000265
- The organization defines the frequency to update existing plan of action and milestones for the information system.
- CA-5.3 - CCI-000266
- The organization updates, on an organization-defined frequency, existing plan of action and milestones based on the findings from security controls assessments, security impact analyses, and continuous monitoring activities.
- Joint Task Force (2018) Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2., "SP 800-37" https://doi.org/10.6028/NIST.SP.800-37r2
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- CA-5(1) - Automation Support For Accuracy And Currency
- Ensure the accuracy, currency, and availability of the plan of action and milestones for the system using [Assignment: organization-defined automated mechanisms].
- RMF Control
- CA-6
- Subject Area
- ASSESSMENT, AUTHORIZATION, AND MONITORING
- Baselines
- CH NP FS FH CP CX NH FM FL CL NL NM CM
- CA-6a.
- Assign a senior official as the authorizing official for the system;
- CA-6b.
- Assign a senior official as the authorizing official for common controls available for inheritance by organizational systems;
- CA-6c.
- Ensure that the authorizing official for the system, before commencing operations:
- CA-6d.
- Ensure that the authorizing official for common controls authorizes the use of those controls for inheritance by organizational systems;
- CA-6e.
- Update the authorizations [Assignment: organization-defined frequency].
- CA-6.1 - CCI-000270
- The organization assigns a senior-level executive or manager as the authorizing official for the information system.
- CA-6.2 - CCI-000271
- The organization ensures the authorizing official authorizes the information system for processing before commencing operations.
- CA-6.4 - CCI-000273
- The organization defines the frequency of updating the security authorization.
- CA-6.3 - CCI-000272
- The organization updates the security authorization on an organization-defined frequency.
- Dempsey KL, Chawla NS, Johnson LA, Johnston R, Jones AC, Orebaugh AD, Scholl MA, Stine KM (2011) Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-137., "SP 800-137" https://doi.org/10.6028/NIST.SP.800-137
- Joint Task Force (2018) Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2., "SP 800-37" https://doi.org/10.6028/NIST.SP.800-37r2
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- CA-6(1) - Joint Authorization — Intra-Organization
- Employ a joint authorization process for the system that includes multiple authorizing officials from the same organization conducting the authorization.
- CA-6(2) - Joint Authorization — Inter-Organization
- Employ a joint authorization process for the system that includes multiple authorizing officials with at least one authorizing official from an organization external to the organization conducting the authorization.
- RMF Control
- CA-7
- Subject Area
- ASSESSMENT, AUTHORIZATION, AND MONITORING
- Baselines
- CH NP FS FH CP CX NH FM FL CL NL NM CM
- CA-7a.
- Establishing the following system-level metrics to be monitored: [Assignment: organization-defined system-level metrics];
- CA-7b.
- Establishing [Assignment: organization-defined frequencies] for monitoring and [Assignment: organization-defined frequencies] for assessment of control effectiveness;
- CA-7c.
- Ongoing control assessments in accordance with the continuous monitoring strategy;
- CA-7d.
- Ongoing monitoring of system and organization-defined metrics in accordance with the continuous monitoring strategy;
- CA-7e.
- Correlation and analysis of information generated by control assessments and monitoring;
- CA-7f.
- Response actions to address results of the analysis of control assessment and monitoring information; and
- CA-7g.
- Reporting the security and privacy status of the system to [Assignment: organization-defined personnel or roles] [Assignment: organization-defined frequency].
- CA-7.1 - CCI-000274
- The organization develops a continuous monitoring strategy.
- CA-7.2 - CCI-002087
- The organization establishes and defines the metrics to be monitored for the continuous monitoring program.
- CA-7.3 - CCI-002088
- The organization establishes and defines the frequencies for continuous monitoring.
- CA-7.4 - CCI-002089
- The organization establishes and defines the frequencies for assessments supporting continuous monitoring.
- CA-7.5 - CCI-000279
- The organization implements a continuous monitoring program that includes ongoing security control assessments in accordance with the organizational continuous monitoring strategy.
- CA-7.6 - CCI-002090
- The organization implements a continuous monitoring program that includes ongoing security status monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy.
- CA-7.7 - CCI-002091
- The organization implements a continuous monitoring program that includes correlation and analysis of security-related information generated by assessments and monitoring.
- CA-7.8 - CCI-002092
- The organization implements a continuous monitoring program that includes response actions to address results of the analysis of security-related information.
- CA-7.10 - CCI-000281
- The organization defines the frequency to report the security status of organization and the information system to organization-defined personnel or roles.
- CA-7.11 - CCI-001581
- The organization defines personnel or roles to whom the security status of organization and the information system should be reported.
- CA-7.9 - CCI-000280
- The organization implements a continuous monitoring program that includes reporting the security status of organization and the information system to organization-defined personnel or roles on an organization-defined frequency.
- AC-2 - Account Management
- AC-6 - Least Privilege
- AC-17 - Remote Access
- AT-4 - Training Records
- AU-6 - Audit Record Review, Analysis, And Reporting
- AU-13 - Monitoring For Information Disclosure
- CA-2 - Control Assessments
- CA-5 - Plan Of Action And Milestones
- CA-6 - Authorization
- CM-3 - Configuration Change Control
- CM-4 - Impact Analyses
- CM-6 - Configuration Settings
- CM-11 - User-Installed Software
- IA-5 - Authenticator Management
- IR-5 - Incident Monitoring
- MA-2 - Controlled Maintenance
- MA-3 - Maintenance Tools
- MA-4 - Nonlocal Maintenance
- PE-3 - Physical Access Control
- PE-6 - Monitoring Physical Access
- PE-14 - Environmental Controls
- PE-16 - Delivery And Removal
- PE-20 - Asset Monitoring And Tracking
- PL-2 - System Security And Privacy Plans
- PM-4 - Plan Of Action And Milestones Process
- PM-6 - Measures Of Performance
- PM-9 - Risk Management Strategy
- PM-10 - Authorization Process
- PM-12 - Insider Threat Program
- PM-14 - Testing, Training, And Monitoring
- PM-23 - Data Governance Body
- PM-28 - Risk Framing
- PM-31 - Continuous Monitoring Strategy
- PS-7 - External Personnel Security
- PT-7 - Specific Categories Of Personally Identifiable Information
- RA-3 - Risk Assessment
- RA-5 - Vulnerability Monitoring And Scanning
- RA-7 - Risk Response
- RA-10 - Threat Hunting
- SA-8 - Security And Privacy Engineering Principles
- SA-9 - External System Services
- SA-11 - Developer Testing And Evaluation
- SC-5 - Denial-Of-Service Protection
- SC-7 - Boundary Protection
- SC-18 - Mobile Code
- SC-38 - Operations Security
- SC-43 - Usage Restrictions
- SI-3 - Malicious Code Protection
- SI-4 - System Monitoring
- SI-12 - Information Management And Retention
- SR-6 - Supplier Assessments And Reviews
- Brooks S, Garcia M, Lefkovitz N, Lightman S, Nadeau E (2017) An Introduction to Privacy Engineering and Risk Management in Federal Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8062., "IR 8062" https://doi.org/10.6028/NIST.IR.8062
- Dempsey KL, Chawla NS, Johnson LA, Johnston R, Jones AC, Orebaugh AD, Scholl MA, Stine KM (2011) Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-137., "SP 800-137" https://doi.org/10.6028/NIST.SP.800-137
- Dempsey KL, Eavy P, Moore G (2017) Automation Support for Security Control Assessments: Volume 1: Overview. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8011, Volume 1., "IR 8011-1" https://doi.org/10.6028/NIST.IR.8011-1
- Joint Task Force (2018) Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2., "SP 800-37" https://doi.org/10.6028/NIST.SP.800-37r2
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Joint Task Force Transformation Initiative (2014) Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-53A, Rev. 4, Includes updates as of December 18, 2014., "SP 800-53A" https://doi.org/10.6028/NIST.SP.800-53Ar4
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Scarfone KA, Souppaya MP, Cody A, Orebaugh AD (2008) Technical Guide to Information Security Testing and Assessment. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-115., "SP 800-115" https://doi.org/10.6028/NIST.SP.800-115
- CA-7(1) - Independent Assessment
- Employ independent assessors or assessment teams to monitor the controls in the system on an ongoing basis.
- CA-7(2) - Types Of Assessments
- [Withdrawn: Incorporated into CA-2].
- CA-7(3) - Trend Analyses
- Employ trend analyses to determine if control implementations, the frequency of continuous monitoring activities, and the types of activities used in the continuous monitoring process need to be modified based on empirical data.
- CA-7(4) - Risk Monitoring
- Ensure risk monitoring is an integral part of the continuous monitoring strategy that includes the following:
- CA-7(5) - Consistency Analysis
- Employ the following actions to validate that policies are established and implemented controls are operating in a consistent manner: [Assignment: organization-defined actions].
- CA-7(6) - Automation Support For Monitoring
- Ensure the accuracy, currency, and availability of monitoring results for the system using [Assignment: organization-defined automated mechanisms].
- RMF Control
- CA-8
- Subject Area
- ASSESSMENT, AUTHORIZATION, AND MONITORING
- Baselines
- CH FS FH CX NH FM FL
- CA-8.2 - CCI-002094
- The organization defines the frequency for conducting penetration testing on organization-defined information systems or system components.
- CA-8.3 - CCI-002095
- The organization defines the information systems or system components on which penetration testing will be conducted.
- CA-8.1 - CCI-002093
- The organization conducts penetration testing in accordance with organization-defined frequency on organization-defined information systems or system components.
- CA-8(1) - Independent Penetration Testing Agent Or Team
- Employ an independent penetration testing agent or team to perform penetration testing on the system or system components.
- CA-8(2) - Red Team Exercises
- Employ the following red-team exercises to simulate attempts by adversaries to compromise organizational systems in accordance with applicable rules of engagement: [Assignment: organization-defined red team exercises].
- CA-8(3) - Facility Penetration Testing
- Employ a penetration testing process that includes [Assignment: organization-defined frequency] [Selection: announced; unannounced] attempts to bypass or circumvent controls associated with physical access points to the facility.
- RMF Control
- CA-9
- Subject Area
- ASSESSMENT, AUTHORIZATION, AND MONITORING
- Baselines
- CH FS FH CX NH FM FL CL NL NM CM
- CA-9a.
- Authorize internal connections of [Assignment: organization-defined system components or classes of components] to the system;
- CA-9b.
- Document, for each internal connection, the interface characteristics, security and privacy requirements, and the nature of the information communicated;
- CA-9c.
- Terminate internal system connections after [Assignment: organization-defined conditions]; and
- CA-9d.
- Review [Assignment: organization-defined frequency] the continued need for each internal connection.
- CA-9.1 - CCI-002101
- The organization authorizes internal connections of organization-defined information system components or classes of components to the information system.
- CA-9.2 - CCI-002102
- The organization defines the information system components or classes of components that that are authorized internal connections to the information system.
- CA-9.3 - CCI-002103
- The organization documents, for each internal connection, the interface characteristics.
- CA-9.4 - CCI-002104
- The organization documents, for each internal connection, the security requirements.
- CA-9.5 - CCI-002105
- The organization documents, for each internal connection, the nature of the information communicated.
- Dempsey KL, Paulsen C (2015) Risk Management for Replication Devices. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8023., "IR 8023" https://doi.org/10.6028/NIST.IR.8023
- Souppaya MP, Scarfone KA (2013) Guidelines for Managing the Security of Mobile Devices in the Enterprise. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-124, Rev. 1., "SP 800-124" https://doi.org/10.6028/NIST.SP.800-124r1
- CA-9(1) - Compliance Checks
- Perform security and privacy compliance checks on constituent system components prior to the establishment of the internal connection.
- RMF Control
- CM-1
- Subject Area
- CONFIGURATION MANAGEMENT
- Baselines
- CH NP FS FH CP CX NH FM FL CL NL NM CM
- CM-1a.
- Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
- CM-1b.
- Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the configuration management policy and procedures; and
- CM-1c.
- Review and update the current configuration management:
- CM-1.1 - CCI-001821
- The organization defines the organizational personnel or roles to whom the configuration management policy is to be disseminated.
- CM-1.2 - CCI-001824
- The organization defines the organizational personnel or roles to whom the configuration management procedures are to be disseminated.
- CM-1.3 - CCI-000287
- The organization develops and documents a configuration management policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- CM-1.4 - CCI-001822
- The organization disseminates the configuration management policy to organization defined personnel or roles.
- CM-1.5 - CCI-000290
- The organization develops and documents procedures to facilitate the implementation of the configuration management policy and associated configuration management controls.
- CM-1.6 - CCI-001825
- The organization disseminates to organization defined personnel or roles the procedures to facilitate the implementation of the configuration management policy and associated configuration management controls.
- CM-1.8 - CCI-000289
- The organization reviews and updates, on an organization defined frequency, the configuration management policy.
- CM-1.7 - CCI-000286
- The organization defines a frequency to review and update the configuration management policies.
- CM-1.9 - CCI-000292
- The organization reviews and updates, on an organization defined frequency, the procedures to facilitate the implementation of the configuration management policy and associated configuration management controls.
- CM-1.10 - CCI-001584
- The organization defines the frequency to review and update configuration management procedures.
- Bowen P, Hash J, Wilson M (2006) Information Security Handbook: A Guide for Managers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-100, Includes updates as of March 7, 2007., "SP 800-100" https://doi.org/10.6028/NIST.SP.800-100
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- Nieles M, Pillitteri VY, Dempsey KL (2017) An Introduction to Information Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-12, Rev. 1., "SP 800-12" https://doi.org/10.6028/NIST.SP.800-12r1
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- RMF Control
- CM-2
- Subject Area
- CONFIGURATION MANAGEMENT
- Baselines
- CH FS FH CX NH FM FL CL NL NM CM
- CM-2a.
- Develop, document, and maintain under configuration control, a current baseline configuration of the system; and
- CM-2b.
- Review and update the baseline configuration of the system:
- CM-2.1 - CCI-000293
- The organization develops and documents a current baseline configuration of the information system.
- CM-2.2 - CCI-000295
- The organization maintains under configuration control, a current baseline configuration of the information system.
- AC-19 - Access Control For Mobile Devices
- AU-6 - Audit Record Review, Analysis, And Reporting
- CA-9 - Internal System Connections
- CM-1 - Policy And Procedures
- CM-3 - Configuration Change Control
- CM-5 - Access Restrictions For Change
- CM-6 - Configuration Settings
- CM-8 - System Component Inventory
- CM-9 - Configuration Management Plan
- CP-9 - System Backup
- CP-10 - System Recovery And Reconstitution
- CP-12 - Safe Mode
- MA-2 - Controlled Maintenance
- PL-8 - Security And Privacy Architectures
- PM-5 - System Inventory
- SA-8 - Security And Privacy Engineering Principles
- SA-10 - Developer Configuration Management
- SA-15 - Development Process, Standards, And Tools
- SC-18 - Mobile Code
- Johnson LA, Dempsey KL, Ross RS, Gupta S, Bailey D (2011) Guide for Security-Focused Configuration Management of Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-128, Includes updates as of October 10, 2019., "SP 800-128" https://doi.org/10.6028/NIST.SP.800-128
- Souppaya MP, Scarfone KA (2013) Guidelines for Managing the Security of Mobile Devices in the Enterprise. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-124, Rev. 1., "SP 800-124" https://doi.org/10.6028/NIST.SP.800-124r1
- CM-2(1) - Reviews And Updates
- [Withdrawn: Incorporated into CM-2].
- CM-2(2) - Automation Support For Accuracy And Currency
- Maintain the currency, completeness, accuracy, and availability of the baseline configuration of the system using [Assignment: organization-defined automated mechanisms].
- CM-2(3) - Retention Of Previous Configurations
- Retain [Assignment: organization-defined number] of previous versions of baseline configurations of the system to support rollback.
- CM-2(4) - Unauthorized Software
- [Withdrawn: Incorporated into CM-7(4)].
- CM-2(5) - Authorized Software
- [Withdrawn: Incorporated into CM-7(5)].
- CM-2(6) - Development And Test Environments
- Maintain a baseline configuration for system development and test environments that is managed separately from the operational baseline configuration.
- CM-2(7) - Configure Systems And Components For High-Risk Areas
- RMF Control
- CM-3
- Subject Area
- CONFIGURATION MANAGEMENT
- Baselines
- CH FH CX NH FM CC CL NM CM
- CM-3a.
- Determine and document the types of changes to the system that are configuration-controlled;
- CM-3b.
- Review proposed configuration-controlled changes to the system and approve or disapprove such changes with explicit consideration for security and privacy impact analyses;
- CM-3c.
- Document configuration change decisions associated with the system;
- CM-3d.
- Implement approved configuration-controlled changes to the system;
- CM-3e.
- Retain records of configuration-controlled changes to the system for [Assignment: organization-defined time period];
- CM-3f.
- Monitor and review activities associated with configuration-controlled changes to the system; and
- CM-3g.
- Coordinate and provide oversight for configuration change control activities through [Assignment: organization-defined configuration change control element] that convenes [Selection (one or more): [Assignment: organization-defined frequency]; when [Assignment: organization-defined configuration change conditions]].
- CM-3.1 - CCI-000313
- The organization determines the types of changes to the information system that are configuration controlled.
- CM-3.3 - CCI-001740
- The organization reviews proposed configuration controlled changes to the information system.
- CM-3.2 - CCI-000314
- The organization approves or disapproves configuration controlled changes to the information system with explicit consideration for security impact analysis.
- CM-3.4 - CCI-001741
- The organization documents configuration change decisions associated with the information system.
- CM-3.5 - CCI-001819
- The organization implements approved configuration-controlled changes to the information system.
- CM-3.6 - CCI-000316
- The organization retains records of configuration-controlled changes to the information system for an organization-defined time period.
- CM-3.7 - CCI-002056
- The organization defines the time period the record of configuration-controlled changes are to be retained.
- CM-3.8 - CCI-000318
- The organization audits and reviews activities associated with configuration controlled changes to the system.
- CM-3.9 - CCI-000319
- The organization coordinates and provides oversight for configuration change control activities through an organization defined configuration change control element (e.g., committee, board) that convenes at the organization defined frequency and/or for any organization defined configuration change conditions.
- CM-3.10 - CCI-000320
- The organization defines frequency to convene configuration change control element.
- CM-3.11 - CCI-000321
- The organization defines configuration change conditions that prompt the configuration change control element to convene.
- CM-3.12 - CCI-001586
- The organization defines the configuration change control element (e.g., committee, board) responsible for coordinating and providing oversight for configuration change control activities.
- CA-7 - Continuous Monitoring
- CM-2 - Baseline Configuration
- CM-4 - Impact Analyses
- CM-5 - Access Restrictions For Change
- CM-6 - Configuration Settings
- CM-9 - Configuration Management Plan
- CM-11 - User-Installed Software
- IA-3 - Device Identification And Authentication
- MA-2 - Controlled Maintenance
- PE-16 - Delivery And Removal
- PT-6 - System Of Records Notice
- RA-8 - Privacy Impact Assessments
- SA-8 - Security And Privacy Engineering Principles
- SA-10 - Developer Configuration Management
- SC-28 - Protection Of Information At Rest
- SC-34 - Non-Modifiable Executable Programs
- SC-37 - Out-Of-Band Channels
- SI-2 - Flaw Remediation
- SI-3 - Malicious Code Protection
- SI-4 - System Monitoring
- SI-7 - Software, Firmware, And Information Integrity
- SI-10 - Information Input Validation
- SR-11 - Component Authenticity
- Brooks S, Garcia M, Lefkovitz N, Lightman S, Nadeau E (2017) An Introduction to Privacy Engineering and Risk Management in Federal Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8062., "IR 8062" https://doi.org/10.6028/NIST.IR.8062
- Johnson LA, Dempsey KL, Ross RS, Gupta S, Bailey D (2011) Guide for Security-Focused Configuration Management of Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-128, Includes updates as of October 10, 2019., "SP 800-128" https://doi.org/10.6028/NIST.SP.800-128
- Souppaya MP, Scarfone KA (2013) Guidelines for Managing the Security of Mobile Devices in the Enterprise. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-124, Rev. 1., "SP 800-124" https://doi.org/10.6028/NIST.SP.800-124r1
- CM-3(1) - Automated Documentation, Notification, And Prohibition Of Changes
- Use [Assignment: organization-defined automated mechanisms] to:
- CM-3(2) - Testing, Validation, And Documentation Of Changes
- Test, validate, and document changes to the system before finalizing the implementation of the changes.
- CM-3(3) - Automated Change Implementation
- Implement changes to the current system baseline and deploy the updated baseline across the installed base using [Assignment: organization-defined automated mechanisms].
- CM-3(4) - Security And Privacy Representatives
- Require [Assignment: organization-defined security and privacy representatives] to be members of the [Assignment: organization-defined configuration change control element].
- CM-3(5) - Automated Security Response
- Implement the following security responses automatically if baseline configurations are changed in an unauthorized manner: [Assignment: organization-defined security responses].
- CM-3(6) - Cryptography Management
- Ensure that cryptographic mechanisms used to provide the following controls are under configuration management: [Assignment: organization-defined controls].
- CM-3(7) - Review System Changes
- Review changes to the system [Assignment: organization-defined frequency] or when [Assignment: organization-defined circumstances] to determine whether unauthorized changes have occurred.
- CM-3(8) - Prevent Or Restrict Configuration Changes
- Prevent or restrict changes to the configuration of the system under the following circumstances: [Assignment: organization-defined circumstances].
- RMF Control
- CM-4
- Subject Area
- CONFIGURATION MANAGEMENT
- Baselines
- CH NP FS FH CP CX NH FM FL CL NL NM CM
- CM-4.1 - CCI-000333
- The organization analyzes changes to the information system to determine potential security impacts prior to change implementation.
- CA-7 - Continuous Monitoring
- CM-3 - Configuration Change Control
- CM-8 - System Component Inventory
- CM-9 - Configuration Management Plan
- MA-2 - Controlled Maintenance
- RA-3 - Risk Assessment
- RA-5 - Vulnerability Monitoring And Scanning
- RA-8 - Privacy Impact Assessments
- SA-5 - System Documentation
- SA-8 - Security And Privacy Engineering Principles
- SA-10 - Developer Configuration Management
- SI-2 - Flaw Remediation
- Johnson LA, Dempsey KL, Ross RS, Gupta S, Bailey D (2011) Guide for Security-Focused Configuration Management of Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-128, Includes updates as of October 10, 2019., "SP 800-128" https://doi.org/10.6028/NIST.SP.800-128
- CM-4(1) - Separate Test Environments
- Analyze changes to the system in a separate test environment before implementation in an operational environment, looking for security and privacy impacts due to flaws, weaknesses, incompatibility, or intentional malice.
- CM-4(2) - Verification Of Controls
- After system changes, verify that the impacted controls are implemented correctly, operating as intended, and producing the desired outcome with regard to meeting the security and privacy requirements for the system.
- RMF Control
- CM-5
- Subject Area
- CONFIGURATION MANAGEMENT
- Baselines
- CH FS FH CX NH FM CC FL CL NL NM CM
- CM-5.1 - CCI-000338
- The organization defines physical access restrictions associated with changes to the information system.
- CM-5.2 - CCI-000339
- The organization documents physical access restrictions associated with changes to the information system.
- CM-5.3 - CCI-000340
- The organization approves physical access restrictions associated with changes to the information system.
- CM-5.4 - CCI-000341
- The organization enforces physical access restrictions associated with changes to the information system.
- CM-5.5 - CCI-000342
- The organization defines logical access restrictions associated with changes to the information system.
- CM-5.6 - CCI-000343
- The organization documents logical access restrictions associated with changes to the information system.
- CM-5.7 - CCI-000344
- The organization approves logical access restrictions associated with changes to the information system.
- CM-5.8 - CCI-000345
- The organization enforces logical access restrictions associated with changes to the information system.
- AC-3 - Access Enforcement
- AC-5 - Separation Of Duties
- AC-6 - Least Privilege
- CM-9 - Configuration Management Plan
- PE-3 - Physical Access Control
- SC-28 - Protection Of Information At Rest
- SC-34 - Non-Modifiable Executable Programs
- SC-37 - Out-Of-Band Channels
- SI-2 - Flaw Remediation
- SI-10 - Information Input Validation
- National Institute of Standards and Technology (2013) Digital Signature Standard (DSS). (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 186-4., "FIPS 186-4" https://doi.org/10.6028/NIST.FIPS.186-4
- National Institute of Standards and Technology (2019) Security Requirements for Cryptographic Modules. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 140-3. , "FIPS 140-3" https://doi.org/10.6028/NIST.FIPS.140-3
- CM-5(1) - Automated Access Enforcement And Audit Records
- CM-5(2) - Review System Changes
- [Withdrawn: Incorporated into CM-3(7)].
- CM-5(3) - Signed Components
- [Withdrawn: Moved to CM-14].
- CM-5(4) - Dual Authorization
- Enforce dual authorization for implementing changes to [Assignment: organization-defined system components and system-level information].
- CM-5(5) - Privilege Limitation For Production And Operation
- CM-5(6) - Limit Library Privileges
- Limit privileges to change software resident within software libraries.
- CM-5(7) - Automatic Implementation Of Security Safeguards
- [Withdrawn: Incorporated into SI-7].
- RMF Control
- CM-6
- Subject Area
- CONFIGURATION MANAGEMENT
- Baselines
- CH FS FH CX NH FM FL CL NL NM CM
- CM-6a.
- Establish and document configuration settings for components employed within the system that reflect the most restrictive mode consistent with operational requirements using [Assignment: organization-defined common secure configurations];
- CM-6b.
- Implement the configuration settings;
- CM-6c.
- Identify, document, and approve any deviations from established configuration settings for [Assignment: organization-defined system components] based on [Assignment: organization-defined operational requirements]; and
- CM-6d.
- Monitor and control changes to the configuration settings in accordance with organizational policies and procedures.
- CM-6.1 - CCI-000363
- The organization defines security configuration checklists to be used to establish and document configuration settings for the information system technology products employed.
- CM-6.2 - CCI-000364
- The organization establishes configuration settings for information technology products employed within the information system using organization-defined security configuration checklists.
- CM-6.3 - CCI-000365
- The organization documents configuration settings for information technology products employed within the information system using organization-defined security configuration checklists that reflect the most restrictive mode consistent with operational requirements.
- CM-6.4 - CCI-001588
- The organization-defined security configuration checklists reflect the most restrictive mode consistent with operational requirements.
- CM-6.5 - CCI-000366
- The organization implements the security configuration settings.
- CM-6.6 - CCI-000367
- The organization identifies any deviations from the established configuration settings for organization-defined information system components based on organization-defined operational requirements.
- CM-6.7 - CCI-000368
- The organization documents any deviations from the established configuration settings for organization-defined information system components based on organization-defined operational requirements.
- CM-6.8 - CCI-000369
- The organization approves any deviations from the established configuration settings for organization-defined information system components based on organization-defined operational requirements.
- CM-6.9 - CCI-001755
- The organization defines the information system components for which any deviation from the established configuration settings are to be identified, documented and approved.
- CM-6.10 - CCI-001756
- The organization defines the operational requirements on which the configuration settings for the organization-defined information system components are to be based.
- CM-6.11 - CCI-001502
- The organization monitors changes to the configuration settings in accordance with organizational policies and procedures.
- CM-6.12 - CCI-001503
- The organization controls changes to the configuration settings in accordance with organizational policies and procedures.
- AC-3 - Access Enforcement
- AC-19 - Access Control For Mobile Devices
- AU-2 - Event Logging
- AU-6 - Audit Record Review, Analysis, And Reporting
- CA-9 - Internal System Connections
- CM-2 - Baseline Configuration
- CM-3 - Configuration Change Control
- CM-5 - Access Restrictions For Change
- CM-7 - Least Functionality
- CM-11 - User-Installed Software
- CP-7 - Alternate Processing Site
- CP-9 - System Backup
- CP-10 - System Recovery And Reconstitution
- IA-3 - Device Identification And Authentication
- IA-5 - Authenticator Management
- PL-8 - Security And Privacy Architectures
- PL-9 - Central Management
- RA-5 - Vulnerability Monitoring And Scanning
- SA-4 - Acquisition Process
- SA-5 - System Documentation
- SA-8 - Security And Privacy Engineering Principles
- SA-9 - External System Services
- SC-18 - Mobile Code
- SC-28 - Protection Of Information At Rest
- SC-43 - Usage Restrictions
- SI-2 - Flaw Remediation
- SI-4 - System Monitoring
- SI-6 - Security And Privacy Function Verification
- Defense Information Systems Agency, ., "DOD STIG" https://public.cyber.mil/stigs
- Johnson LA, Dempsey KL, Ross RS, Gupta S, Bailey D (2011) Guide for Security-Focused Configuration Management of Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-128, Includes updates as of October 10, 2019., "SP 800-128" https://doi.org/10.6028/NIST.SP.800-128
- National Institute of Standards and Technology (2020) . Available at, "NCPR" https://nvd.nist.gov/ncp/repository
- National Institute of Standards and Technology (2020) . Available at, "USGCB" https://csrc.nist.gov/projects/united-states-gover
- Quinn SD, Souppaya MP, Cook MR, Scarfone KA (2018) National Checklist Program for IT Products: Guidelines for Checklist Users and Developers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-70, Rev. 4., "SP 800-70" https://doi.org/10.6028/NIST.SP.800-70r4
- Waltermire DA, Quinn SD, Booth H, III, Scarfone KA, Prisaca D (2018) The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-126, Rev. 3., "SP 800-126" https://doi.org/10.6028/NIST.SP.800-126r3
- CM-6(1) - Automated Management, Application, And Verification
- Manage, apply, and verify configuration settings for [Assignment: organization-defined system components] using [Assignment: organization-defined automated mechanisms].
- CM-6(2) - Respond To Unauthorized Changes
- Take the following actions in response to unauthorized changes to [Assignment: organization-defined configuration settings]: [Assignment: organization-defined actions].
- CM-6(3) - Unauthorized Change Detection
- [Withdrawn: Incorporated into SI-7].
- CM-6(4) - Conformance Demonstration
- [Withdrawn: Incorporated into CM-4].
- RMF Control
- CM-7
- Subject Area
- CONFIGURATION MANAGEMENT
- Baselines
- CH FS FH CP CX NH FM FL CL NL NM CM
- CM-7a.
- Configure the system to provide only [Assignment: organization-defined mission essential capabilities]; and
- CM-7b.
- Prohibit or restrict the use of the following functions, ports, protocols, software, and/or services: [Assignment: organization-defined prohibited or restricted functions, system ports, protocols, software, and/or services].
- CM-7.2 - CCI-000380
- The organization defines for the information system prohibited or restricted functions, ports, protocols, and/or services.
- CM-7.1 - CCI-000381
- The organization configures the information system to provide only essential capabilities.
- CM-7.3 - CCI-000382
- The organization configures the information system to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services.
- AC-3 - Access Enforcement
- AC-4 - Information Flow Enforcement
- CM-2 - Baseline Configuration
- CM-5 - Access Restrictions For Change
- CM-6 - Configuration Settings
- CM-11 - User-Installed Software
- RA-5 - Vulnerability Monitoring And Scanning
- SA-4 - Acquisition Process
- SA-5 - System Documentation
- SA-8 - Security And Privacy Engineering Principles
- SA-9 - External System Services
- SA-15 - Development Process, Standards, And Tools
- SC-2 - Separation Of System And User Functionality
- SC-3 - Security Function Isolation
- SC-7 - Boundary Protection
- SC-37 - Out-Of-Band Channels
- SI-4 - System Monitoring
- National Institute of Standards and Technology (2013) Digital Signature Standard (DSS). (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 186-4., "FIPS 186-4" https://doi.org/10.6028/NIST.FIPS.186-4
- National Institute of Standards and Technology (2015) Secure Hash Standard (SHS). (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 180-4., "FIPS 180-4" https://doi.org/10.6028/NIST.FIPS.180-4
- National Institute of Standards and Technology (2015) SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 202., "FIPS 202" https://doi.org/10.6028/NIST.FIPS.202
- National Institute of Standards and Technology (2019) Security Requirements for Cryptographic Modules. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 140-3. , "FIPS 140-3" https://doi.org/10.6028/NIST.FIPS.140-3
- Sedgewick A, Souppaya MP, Scarfone KA (2015) Guide to Application Whitelisting. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-167., "SP 800-167" https://doi.org/10.6028/NIST.SP.800-167
- CM-7(1) - Periodic Review
- CM-7(2) - Prevent Program Execution
- Prevent program execution in accordance with [Selection (one or more): [Assignment: organization-defined policies, rules of behavior, and/or access agreements regarding software program usage and restrictions]; rules authorizing the terms and conditions of software program usage].
- CM-7(3) - Registration Compliance
- Ensure compliance with [Assignment: organization-defined registration requirements for functions, ports, protocols, and services].
- CM-7(4) - Unauthorized Software — Deny-By-Exception
- CM-7(5) - Authorized Software — Allow-By-Exception
- CM-7(6) - Confined Environments With Limited Privileges
- Require that the following user-installed software execute in a confined physical or virtual machine environment with limited privileges: [Assignment: organization-defined user-installed software].
- CM-7(7) - Code Execution In Protected Environments
- Allow execution of binary or machine-executable code only in confined physical or virtual machine environments and with the explicit approval of [Assignment: organization-defined personnel or roles] when such code is:
- CM-7(8) - Binary Or Machine Executable Code
- CM-7(9) - Prohibiting The Use Of Unauthorized Hardware
- RMF Control
- CM-8
- Subject Area
- CONFIGURATION MANAGEMENT
- Baselines
- CH FS FH CX NH FM FL CL NL NM CM
- CM-8a.
- Develop and document an inventory of system components that:
- CM-8b.
- Review and update the system component inventory [Assignment: organization-defined frequency].
- CM-8.1 - CCI-000389
- The organization develops and documents an inventory of information system components that accurately reflects the current information system.
- CM-8.2 - CCI-000392
- The organization develops and documents an inventory of information system components that includes all components within the authorization boundary of the information system.
- CM-8.3 - CCI-000395
- The organization develops and documents an inventory of information system components that is at the level of granularity deemed necessary for tracking and reporting.
- CM-8.4 - CCI-000398
- The organization defines information deemed necessary to achieve effective information system component accountability.
- CM-8.5 - CCI-000399
- The organization develops and documents an inventory of information system components that includes organization defined information deemed necessary to achieve effective information system component accountability.
- CM-8.6 - CCI-001779
- The organization defines the frequency on which the information system component inventory is to be reviewed and updated
- CM-8.7 - CCI-001780
- The organization reviews and updates the information system component inventory per organization-defined frequency.
- CM-2 - Baseline Configuration
- CM-7 - Least Functionality
- CM-9 - Configuration Management Plan
- CM-10 - Software Usage Restrictions
- CM-11 - User-Installed Software
- CM-13 - Data Action Mapping
- CP-2 - Contingency Plan
- CP-9 - System Backup
- MA-2 - Controlled Maintenance
- MA-6 - Timely Maintenance
- PE-20 - Asset Monitoring And Tracking
- PL-9 - Central Management
- PM-5 - System Inventory
- SA-4 - Acquisition Process
- SA-5 - System Documentation
- SI-2 - Flaw Remediation
- SR-4 - Provenance
- Barker EB (2020) Recommendation for Key Management: Part 1 – General. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-57 Part 1, Rev. 5., "SP 800-57-1" https://doi.org/10.6028/NIST.SP.800-57pt1r5
- Barker EB, Barker WC (2019) Recommendation for Key Management: Part 2 – Best Practices for Key Management Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-57 Part 2, Rev. 1., "SP 800-57-2" https://doi.org/10.6028/NIST.SP.800-57pt2r1
- Barker EB, Dang QH (2015) Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-57 Part 3, Rev. 1., "SP 800-57-3" https://doi.org/10.6028/NIST.SP.800-57pt3r1
- Dempsey KL, Eavy P, Goren N, Moore G (2018) Automation Support for Security Control Assessments: Volume 3: Software Asset Management. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8011, Volume 3., "IR 8011-3" https://doi.org/10.6028/NIST.IR.8011-3
- Dempsey KL, Eavy P, Moore G (2017) Automation Support for Security Control Assessments: Volume 2: Hardware Asset Management. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8011, Volume 2., "IR 8011-2" https://doi.org/10.6028/NIST.IR.8011-2
- Johnson LA, Dempsey KL, Ross RS, Gupta S, Bailey D (2011) Guide for Security-Focused Configuration Management of Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-128, Includes updates as of October 10, 2019., "SP 800-128" https://doi.org/10.6028/NIST.SP.800-128
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- CM-8(1) - Updates During Installation And Removal
- Update the inventory of system components as part of component installations, removals, and system updates.
- CM-8(2) - Automated Maintenance
- Maintain the currency, completeness, accuracy, and availability of the inventory of system components using [Assignment: organization-defined automated mechanisms].
- CM-8(3) - Automated Unauthorized Component Detection
- CM-8(4) - Accountability Information
- Include in the system component inventory information, a means for identifying by [Selection (one or more): name; position; role], individuals responsible and accountable for administering those components.
- CM-8(5) - No Duplicate Accounting Of Components
- [Withdrawn: Incorporated into CM-8].
- CM-8(6) - Assessed Configurations And Approved Deviations
- Include assessed component configurations and any approved deviations to current deployed configurations in the system component inventory.
- CM-8(7) - Centralized Repository
- Provide a centralized repository for the inventory of system components.
- CM-8(8) - Automated Location Tracking
- Support the tracking of system components by geographic location using [Assignment: organization-defined automated mechanisms].
- CM-8(9) - Assignment Of Components To Systems
- RMF Control
- CM-9
- Subject Area
- CONFIGURATION MANAGEMENT
- Baselines
- CH FH CX NH FM CL NM CM
- CM-9a.
- Addresses roles, responsibilities, and configuration management processes and procedures;
- CM-9b.
- Establishes a process for identifying configuration items throughout the system development life cycle and for managing the configuration of the configuration items;
- CM-9c.
- Defines the configuration items for the system and places the configuration items under configuration management;
- CM-9d.
- Is reviewed and approved by [Assignment: organization-defined personnel or roles]; and
- CM-9e.
- Protects the configuration management plan from unauthorized disclosure and modification.
- CM-9.1 - CCI-000421
- The organization develops and documents a configuration management plan for the information system that addresses roles, responsibilities, and configuration management processes and procedures.
- CM-9.2 - CCI-000423
- The organization implements a configuration management plan for the information system that addresses roles, responsibilities, and configuration management processes and procedures.
- CM-9.7 - CCI-000424
- The organization develops and documents a configuration management plan for the information system that defines the configuration items for the information system.
- CM-9.8 - CCI-000426
- The organization implements a configuration management plan for the information system that defines the configuration items for the information system.
- CM-9.3 - CCI-001790
- The organization develops and documents a configuration management plan for the information system that establishes a process for identifying configuration items throughout the system development life cycle.
- CM-9.4 - CCI-001792
- The organization implements a configuration management plan for the information system that establishes a process for identifying configuration items throughout the system development life cycle.
- CM-9.5 - CCI-001793
- The organization develops and documents a configuration management plan for the information system that establishes a process for managing the configuration of the configuration items.
- CM-9.6 - CCI-001795
- The organization implements a configuration management plan for the information system that establishes a process for managing the configuration of the configuration items.
- CM-9.9 - CCI-001796
- The organization develops and documents a configuration management plan for the information system that places the configuration items under configuration management.
- CM-9.10 - CCI-001798
- The organization implements a configuration management plan for the information system that places the configuration items under configuration management.
- CM-9.11 - CCI-001799
- The organization develops a configuration management plan for the information system that protects the configuration management plan from unauthorized disclosure and modification.
- CM-9.12 - CCI-001801
- The organization implements a configuration management plan for the information system that protects the configuration management plan from unauthorized disclosure and modification.
- CM-2 - Baseline Configuration
- CM-3 - Configuration Change Control
- CM-4 - Impact Analyses
- CM-5 - Access Restrictions For Change
- CM-8 - System Component Inventory
- PL-2 - System Security And Privacy Plans
- RA-8 - Privacy Impact Assessments
- SA-10 - Developer Configuration Management
- SI-12 - Information Management And Retention
- Johnson LA, Dempsey KL, Ross RS, Gupta S, Bailey D (2011) Guide for Security-Focused Configuration Management of Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-128, Includes updates as of October 10, 2019., "SP 800-128" https://doi.org/10.6028/NIST.SP.800-128
- CM-9(1) - Assignment Of Responsibility
- Assign responsibility for developing the configuration management process to organizational personnel that are not directly involved in system development.
- RMF Control
- CM-10
- Subject Area
- CONFIGURATION MANAGEMENT
- Baselines
- CH FS FH CX NH FM FL CL NL NM CM
- CM-10a.
- Use software and associated documentation in accordance with contract agreements and copyright laws;
- CM-10b.
- Track the use of software and associated documentation protected by quantity licenses to control copying and distribution; and
- CM-10c.
- Control and document the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work.
- CM-10.1 - CCI-001726
- The organization uses software in accordance with contract agreements.
- CM-10.2 - CCI-001727
- The organization uses software documentation in accordance with contract agreements.
- CM-10.3 - CCI-001728
- The organization uses software in accordance with copyright laws.
- CM-10.4 - CCI-001729
- The organization uses software documentation in accordance with copyright laws.
- CM-10.5 - CCI-001730
- The organization tracks the use of software protected by quantity licenses to control copying of the software.
- CM-10.7 - CCI-001802
- The organization tracks the use of software documentation protected by quantity licenses to control copying of the software documentation.
- CM-10.8 - CCI-001803
- The organization tracks the use of software protected by quantity licenses to control distribution of the software.
- CM-10.6 - CCI-001731
- The organization tracks the use of software documentation protected by quantity licenses to control distribution of the software documentation.
- CM-10.9 - CCI-001732
- The organization controls the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work.
- CM-10.10 - CCI-001733
- The organization documents the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work.
- CM-10(1) - Open-Source Software
- Establish the following restrictions on the use of open-source software: [Assignment: organization-defined restrictions].
- RMF Control
- CM-11
- Subject Area
- CONFIGURATION MANAGEMENT
- Baselines
- CH FS FH NH FM FL CL NL NM CM
- CM-11a.
- Establish [Assignment: organization-defined policies] governing the installation of software by users;
- CM-11b.
- Enforce software installation policies through the following methods: [Assignment: organization-defined methods]; and
- CM-11c.
- Monitor policy compliance [Assignment: organization-defined frequency].
- CM-11.1 - CCI-001804
- The organization defines the policies for governing the installation of software by users.
- CM-11.2 - CCI-001805
- The organization establishes organization-defined policies governing the installation of software by users.
- CM-11.3 - CCI-001806
- The organization defines methods to be employed to enforce the software installation policies.
- CM-11.4 - CCI-001807
- The organization enforces software installation policies through organization-defined methods.
- CM-11.5 - CCI-001808
- The organization defines the frequency on which it will monitor software installation policy compliance.
- CM-11.6 - CCI-001809
- The organization monitors software installation policy compliance per organization-defined frequency.
- AC-3 - Access Enforcement
- AU-6 - Audit Record Review, Analysis, And Reporting
- CM-2 - Baseline Configuration
- CM-3 - Configuration Change Control
- CM-5 - Access Restrictions For Change
- CM-6 - Configuration Settings
- CM-7 - Least Functionality
- CM-8 - System Component Inventory
- PL-4 - Rules Of Behavior
- SI-4 - System Monitoring
- SI-7 - Software, Firmware, And Information Integrity
- CM-11(1) - Alerts For Unauthorized Installations
- [Withdrawn: Incorporated into CM-8(3)].
- CM-11(2) - Software Installation With Privileged Status
- Allow user installation of software only with explicit privileged status.
- CM-11(3) - Automated Enforcement And Monitoring
- Enforce and monitor compliance with software installation policies using [Assignment: organization-defined automated mechanisms].
- RMF Control
- CM-12
- Subject Area
- CONFIGURATION MANAGEMENT
- Baselines
- CH FH CX NH FM NM CM
- CM-12a.
- Identify and document the location of [Assignment: organization-defined information] and the specific system components on which the information is processed and stored;
- CM-12b.
- Identify and document the users who have access to the system and system components where the information is processed and stored; and
- CM-12c.
- Document changes to the location (i.e., system or system components) where the information is processed and stored.
- AC-2 - Account Management
- AC-3 - Access Enforcement
- AC-4 - Information Flow Enforcement
- AC-6 - Least Privilege
- AC-23 - Data Mining Protection
- CM-8 - System Component Inventory
- PM-5 - System Inventory
- RA-2 - Security Categorization
- SA-4 - Acquisition Process
- SA-8 - Security And Privacy Engineering Principles
- SA-17 - Developer Security And Privacy Architecture And Design
- SC-4 - Information In Shared System Resources
- SC-16 - Transmission Of Security And Privacy Attributes
- SC-28 - Protection Of Information At Rest
- SI-4 - System Monitoring
- SI-7 - Software, Firmware, And Information Integrity
- National Institute of Standards and Technology (2004) Standards for Security Categorization of Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 199., "FIPS 199" https://doi.org/10.6028/NIST.FIPS.199
- Stine KM, Kissel RL, Barker WC, Fahlsing J, Gulick J (2008) Guide for Mapping Types of Information and Information Systems to Security Categories. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-60, Vol. 1, Rev. 1., "SP 800-60-1" https://doi.org/10.6028/NIST.SP.800-60v1r1
- Stine KM, Kissel RL, Barker WC, Lee A, Fahlsing J (2008) Guide for Mapping Types of Information and Information Systems to Security Categories: Appendices. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-60, Vol. 2, Rev. 1., "SP 800-60-2" https://doi.org/10.6028/NIST.SP.800-60v2r1
- CM-12(1) - Automated Tools To Support Information Location
- Use automated tools to identify [Assignment: organization-defined information by information type] on [Assignment: organization-defined system components] to ensure controls are in place to protect organizational information and individual privacy.
- RMF Control
- CM-13
- Subject Area
- CONFIGURATION MANAGEMENT
- Baselines
- —
- AC-3 - Access Enforcement
- CM-4 - Impact Analyses
- CM-12 - Information Location
- PM-5 - System Inventory
- PM-27 - Privacy Reporting
- PT-2 - Authority To Process Personally Identifiable Information
- PT-3 - Personally Identifiable Information Processing Purposes
- RA-3 - Risk Assessment
- RA-8 - Privacy Impact Assessments
- RMF Control
- CM-14
- Subject Area
- CONFIGURATION MANAGEMENT
- Baselines
- CH FH CX CM
- Brooks S, Garcia M, Lefkovitz N, Lightman S, Nadeau E (2017) An Introduction to Privacy Engineering and Risk Management in Federal Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8062., "IR 8062" https://doi.org/10.6028/NIST.IR.8062
- RMF Control
- CP-1
- Subject Area
- CONTINGENCY PLANNING
- Baselines
- CH FS FH CP CX NH FM FL CL NL NM CM
- CP-1a.
- Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
- CP-1b.
- Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the contingency planning policy and procedures; and
- CP-1c.
- Review and update the current contingency planning:
- CP-1.3 - CCI-002825
- The organization defines personnel or roles to whom the contingency planning policy is to be disseminated.
- CP-1.1 - CCI-000438
- The organization develops and documents a contingency planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- CP-1.2 - CCI-000439
- The organization disseminates a contingency planning policy to organization-defined personnel or roles.
- CP-1.6 - CCI-002826
- The organization defines personnel or roles to whom the contingency planning procedures are disseminated.
- CP-1.4 - CCI-000441
- The organization develops and documents procedures to facilitate the implementation of the contingency planning policy and associated contingency planning controls.
- CP-1.5 - CCI-001597
- The organization disseminates contingency planning procedures to organization-defined personnel or roles.
- CP-1.7 - CCI-000437
- The organization defines the frequency to review and update the current contingency planning policy.
- CP-1.8 - CCI-000440
- The organization reviews and updates the current contingency planning policy in accordance with organization-defined frequency.
- CP-1.9 - CCI-001596
- The organization defines the frequency to review and update the current contingency planning procedures.
- CP-1.10 - CCI-001598
- The organization reviews and updates the current contingency planning procedures in accordance with the organization-defined frequency.
- Bowen P, Hash J, Wilson M (2006) Information Security Handbook: A Guide for Managers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-100, Includes updates as of March 7, 2007., "SP 800-100" https://doi.org/10.6028/NIST.SP.800-100
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- Nieles M, Pillitteri VY, Dempsey KL (2017) An Introduction to Information Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-12, Rev. 1., "SP 800-12" https://doi.org/10.6028/NIST.SP.800-12r1
- Swanson MA, Bowen P, Phillips AW, Gallup D, Lynes D (2010) Contingency Planning Guide for Federal Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-34, Rev. 1, Includes updates as of November 11, 2010., "SP 800-34" https://doi.org/10.6028/NIST.SP.800-34r1
- Wilson M, Hash J (2003) Building an Information Technology Security Awareness and Training Program. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-50., "SP 800-50" https://doi.org/10.6028/NIST.SP.800-50
- RMF Control
- CP-2
- Subject Area
- CONTINGENCY PLANNING
- Baselines
- CH FS FH CX NH FM FL CL NL NM CM
- CP-2a.
- Develop a contingency plan for the system that:
- CP-2b.
- Distribute copies of the contingency plan to [Assignment: organization-defined key contingency personnel (identified by name and/or by role) and organizational elements];
- CP-2c.
- Coordinate contingency planning activities with incident handling activities;
- CP-2d.
- Review the contingency plan for the system [Assignment: organization-defined frequency];
- CP-2e.
- Update the contingency plan to address changes to the organization, system, or environment of operation and problems encountered during contingency plan implementation, execution, or testing;
- CP-2f.
- Communicate contingency plan changes to [Assignment: organization-defined key contingency personnel (identified by name and/or by role) and organizational elements];
- CP-2g.
- Incorporate lessons learned from contingency plan testing, training, or actual contingency activities into contingency testing and training; and
- CP-2h.
- Protect the contingency plan from unauthorized disclosure and modification.
- CP-2.1 - CCI-000443
- The organization develops a contingency plan for the information system that identifies essential missions.
- CP-2.2 - CCI-000444
- The organization develops a contingency plan for the information system that identifies essential business functions.
- CP-2.3 - CCI-000445
- The organization develops a contingency plan for the information system that identifies associated contingency requirements.
- CP-2.4 - CCI-000446
- The organization develops a contingency plan for the information system that provides recovery objectives.
- CP-2.5 - CCI-000447
- The organization develops a contingency plan for the information system that provides restoration priorities.
- CP-2.6 - CCI-000448
- The organization develops a contingency plan for the information system that provides metrics.
- CP-2.7 - CCI-000449
- The organization develops a contingency plan for the information system that addresses contingency roles, responsibilities, assigned individuals with contact information.
- CP-2.8 - CCI-000450
- The organization develops a contingency plan for the information system that addresses maintaining essential missions despite an information system disruption.
- CP-2.9 - CCI-000451
- The organization develops a contingency plan for the information system that addresses maintaining essential business functions despite an information system disruption.
- CP-2.10 - CCI-000452
- The organization develops a contingency plan for the information system that addresses maintaining essential missions despite an information system compromise.
- CP-2.11 - CCI-000453
- The organization develops a contingency plan for the information system that addresses maintaining essential business functions despite an information system compromise.
- CP-2.12 - CCI-000454
- The organization develops a contingency plan for the information system that addresses maintaining essential missions despite an information system failure.
- CP-2.13 - CCI-000455
- The organization develops a contingency plan for the information system that addresses maintaining essential business functions despite an information system failure.
- CP-2.14 - CCI-000456
- The organization develops a contingency plan for the information system that addresses eventual, full information system restoration without deterioration of the security safeguards originally planned and implemented.
- CP-2.15 - CCI-000457
- The organization develops a contingency plan for the information system that is reviewed and approved by organization-defined personnel or roles.
- CP-2.17 - CCI-000458
- The organization defines a list of key contingency personnel (identified by name and/or by role) and organizational elements designated to receive copies of the contingency plan.
- CP-2.18 - CCI-000459
- The organization distributes copies of the contingency plan to an organization-defined list of key contingency personnel (identified by name and/or by role) and organizational elements.
- CP-2.19 - CCI-000460
- The organization coordinates contingency planning activities with incident handling activities.
- CP-2.20 - CCI-000461
- The organization defines the frequency to review the contingency plan for the information system.
- CP-2.21 - CCI-000462
- The organization reviews the contingency plan for the information system in accordance with organization-defined frequency.
- CP-2.22 - CCI-000463
- The organization updates the contingency plan to address changes to the organization.
- CP-2.23 - CCI-000464
- The organization updates the contingency plan to address changes to the information system.
- CP-2.24 - CCI-000465
- The organization updates the contingency plan to address changes to the environment of operation.
- CP-2.25 - CCI-000466
- The organization updates the contingency plan to address problems encountered during contingency plan implementation, execution, or testing.
- CP-2.26 - CCI-000468
- The organization communicates contingency plan changes to organization-defined list of key contingency personnel (identified by name and/or by role) and organizational elements.
- CP-2.16 - CCI-002830
- The organization defines the personnel or roles who review and approve the contingency plan for the information system.
- CP-2.27 - CCI-002831
- The organization defines a list of key contingency personnel (identified by name and/or by role) and organizational elements to whom contingency plan changes are to be communicated.
- CP-2.28 - CCI-002832
- The organization protects the contingency plan from unauthorized disclosure and modification.
- CP-3 - Contingency Training
- CP-4 - Contingency Plan Testing
- CP-6 - Alternate Storage Site
- CP-7 - Alternate Processing Site
- CP-8 - Telecommunications Services
- CP-9 - System Backup
- CP-10 - System Recovery And Reconstitution
- CP-11 - Alternate Communications Protocols
- CP-13 - Alternative Security Mechanisms
- IR-4 - Incident Handling
- IR-6 - Incident Reporting
- IR-8 - Incident Response Plan
- IR-9 - Information Spillage Response
- MA-6 - Timely Maintenance
- MP-2 - Media Access
- MP-4 - Media Storage
- MP-5 - Media Transport
- PL-2 - System Security And Privacy Plans
- PM-8 - Critical Infrastructure Plan
- PM-11 - Mission And Business Process Definition
- SA-15 - Development Process, Standards, And Tools
- SA-20 - Customized Development Of Critical Components
- SC-7 - Boundary Protection
- SC-23 - Session Authenticity
- SI-12 - Information Management And Retention
- Paulsen C, Boyens JM, Bartol N, Winkler K (2018) Criticality Analysis Process Model: Prioritizing Systems and Components. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8179., "IR 8179" https://doi.org/10.6028/NIST.IR.8179
- Swanson MA, Bowen P, Phillips AW, Gallup D, Lynes D (2010) Contingency Planning Guide for Federal Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-34, Rev. 1, Includes updates as of November 11, 2010., "SP 800-34" https://doi.org/10.6028/NIST.SP.800-34r1
- CP-2(1) - Coordinate With Related Plans
- Coordinate contingency plan development with organizational elements responsible for related plans.
- CP-2(2) - Capacity Planning
- Conduct capacity planning so that necessary capacity for information processing, telecommunications, and environmental support exists during contingency operations.
- CP-2(3) - Resume Mission And Business Functions
- Plan for the resumption of [Selection: all; essential] mission and business functions within [Assignment: organization-defined time period] of contingency plan activation.
- CP-2(4) - Resume All Mission And Business Functions
- [Withdrawn: Incorporated into CP-2(3)].
- CP-2(5) - Continue Mission And Business Functions
- Plan for the continuance of [Selection: all; essential] mission and business functions with minimal or no loss of operational continuity and sustains that continuity until full system restoration at primary processing and/or storage sites.
- CP-2(6) - Alternate Processing And Storage Sites
- Plan for the transfer of [Selection: all; essential] mission and business functions to alternate processing and/or storage sites with minimal or no loss of operational continuity and sustain that continuity through system restoration to primary processing and/or storage sites.
- CP-2(7) - Coordinate With External Service Providers
- Coordinate the contingency plan with the contingency plans of external service providers to ensure that contingency requirements can be satisfied.
- CP-2(8) - Identify Critical Assets
- Identify critical system assets supporting [Selection: all; essential] mission and business functions.
- RMF Control
- CP-3
- Subject Area
- CONTINGENCY PLANNING
- Baselines
- CH FS FH NH FM FL CL NL NM CM
- CP-3a.
- Provide contingency training to system users consistent with assigned roles and responsibilities:
- CP-3b.
- Review and update contingency training content [Assignment: organization-defined frequency] and following [Assignment: organization-defined events].
- CP-3.2 - CCI-002833
- The organization defines the time period that contingency training is to be provided to information system users consistent with assigned roles and responsibilities within assuming a contingency role or responsibility.
- CP-3.1 - CCI-000486
- The organization provides contingency training to information system users consistent with assigned roles and responsibilities within an organization-defined time period of assuming a contingency role or responsibility.
- CP-3.3 - CCI-002834
- The organization provides contingency training to information system users consistent with assigned roles and responsibilities when required by information system changes.
- CP-3.4 - CCI-000485
- The organization defines the frequency of refresher contingency training to information system users.
- CP-3.5 - CCI-000487
- The organization provides refresher contingency training to information system users consistent with assigned roles and responsibilities in accordance with organization-defined frequency.
- Wilson M, Hash J (2003) Building an Information Technology Security Awareness and Training Program. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-50., "SP 800-50" https://doi.org/10.6028/NIST.SP.800-50
- CP-3(1) - Simulated Events
- Incorporate simulated events into contingency training to facilitate effective response by personnel in crisis situations.
- CP-3(2) - Mechanisms Used In Training Environments
- Employ mechanisms used in operations to provide a more thorough and realistic contingency training environment.
- RMF Control
- CP-4
- Subject Area
- CONTINGENCY PLANNING
- Baselines
- CH FS FH CX NH FM FL CL NL NM CM
- CP-4a.
- Test the contingency plan for the system [Assignment: organization-defined frequency] using the following tests to determine the effectiveness of the plan and the readiness to execute the plan: [Assignment: organization-defined tests].
- CP-4b.
- Review the contingency plan test results; and
- CP-4c.
- Initiate corrective actions, if needed.
- CP-4.1 - CCI-000490
- The organization defines the frequency to test the contingency plan for the information system.
- CP-4.2 - CCI-000492
- The organization defines contingency plan tests to be conducted for the information system.
- CP-4.3 - CCI-000494
- The organization tests the contingency plan for the information system in accordance with organization-defined frequency using organization-defined tests to determine the effectiveness of the plan and the organizational readiness to execute the plan.
- CP-4.4 - CCI-000496
- The organization reviews the contingency plan test results.
- CP-4.5 - CCI-000497
- The organization initiates corrective actions, if needed, after reviewing the contingency plan test results.
- AT-3 - Role-Based Training
- CP-2 - Contingency Plan
- CP-3 - Contingency Training
- CP-8 - Telecommunications Services
- CP-9 - System Backup
- IR-3 - Incident Response Testing
- IR-4 - Incident Handling
- PL-2 - System Security And Privacy Plans
- PM-14 - Testing, Training, And Monitoring
- SR-2 - Supply Chain Risk Management Plan
- Grance T, Nolan T, Burke K, Dudley R, White G, Good T (2006) Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-84., "SP 800-84" https://doi.org/10.6028/NIST.SP.800-84
- National Institute of Standards and Technology (2004) Standards for Security Categorization of Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 199., "FIPS 199" https://doi.org/10.6028/NIST.FIPS.199
- Ross RS, Pillitteri VY, Graubart R, Bodeau D, McQuaid R (2019) Developing Cyber Resilient Systems: A Systems Security Engineering Approach. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 2., "SP 800-160-2" https://doi.org/10.6028/NIST.SP.800-160v2
- Swanson MA, Bowen P, Phillips AW, Gallup D, Lynes D (2010) Contingency Planning Guide for Federal Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-34, Rev. 1, Includes updates as of November 11, 2010., "SP 800-34" https://doi.org/10.6028/NIST.SP.800-34r1
- CP-4(1) - Coordinate With Related Plans
- Coordinate contingency plan testing with organizational elements responsible for related plans.
- CP-4(2) - Alternate Processing Site
- Test the contingency plan at the alternate processing site:
- CP-4(3) - Automated Testing
- Test the contingency plan using [Assignment: organization-defined automated mechanisms].
- CP-4(4) - Full Recovery And Reconstitution
- Include a full recovery and reconstitution of the system to a known state as part of contingency plan testing.
- CP-4(5) - Self-Challenge
- Employ [Assignment: organization-defined mechanisms] to [Assignment: organization-defined system or system component] to disrupt and adversely affect the system or system component.
- RMF Control
- CP-5
- Subject Area
- CONTINGENCY PLANNING
- Baselines
- —
- RMF Control
- CP-6
- Subject Area
- CONTINGENCY PLANNING
- Baselines
- CH FH NH FM NM CM
- CP-6a.
- Establish an alternate storage site, including necessary agreements to permit the storage and retrieval of system backup information; and
- CP-6b.
- Ensure that the alternate storage site provides controls equivalent to that of the primary site.
- CP-6.1 - CCI-000505
- The organization establishes an alternate storage site including necessary agreements to permit the storage and retrieval of information system backup information.
- CP-6.2 - CCI-002836
- The organization ensures that the alternate storage site provides information security safeguards equivalent to that of the primary site.
- CP-2 - Contingency Plan
- CP-7 - Alternate Processing Site
- CP-8 - Telecommunications Services
- CP-9 - System Backup
- CP-10 - System Recovery And Reconstitution
- MP-4 - Media Storage
- MP-5 - Media Transport
- PE-3 - Physical Access Control
- SC-36 - Distributed Processing And Storage
- SI-13 - Predictable Failure Prevention
- Swanson MA, Bowen P, Phillips AW, Gallup D, Lynes D (2010) Contingency Planning Guide for Federal Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-34, Rev. 1, Includes updates as of November 11, 2010., "SP 800-34" https://doi.org/10.6028/NIST.SP.800-34r1
- CP-6(1) - Separation From Primary Site
- Identify an alternate storage site that is sufficiently separated from the primary storage site to reduce susceptibility to the same threats.
- CP-6(2) - Recovery Time And Recovery Point Objectives
- Configure the alternate storage site to facilitate recovery operations in accordance with recovery time and recovery point objectives.
- CP-6(3) - Accessibility
- Identify potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster and outline explicit mitigation actions.
- RMF Control
- CP-7
- Subject Area
- CONTINGENCY PLANNING
- Baselines
- CH FH NH FM NM CM
- CP-7a.
- Establish an alternate processing site, including necessary agreements to permit the transfer and resumption of [Assignment: organization-defined system operations] for essential mission and business functions within [Assignment: organization-defined time period consistent with recovery time and recovery point objectives] when the primary processing capabilities are unavailable;
- CP-7b.
- Make available at the alternate processing site, the equipment and supplies required to transfer and resume operations or put contracts in place to support delivery to the site within the organization-defined time period for transfer and resumption; and
- CP-7c.
- Provide controls at the alternate processing site that are equivalent to those at the primary site.
- CP-7.1 - CCI-000510
- The organization defines the time period consistent with recovery time and recovery point objectives for essential missions/business functions to permit the transfer and resumption of organization-defined information system operations at an alternate processing site when the primary processing capabilities are unavailable.
- CP-7.2 - CCI-000513
- The organization establishes an alternate processing site including necessary agreements to permit the transfer and resumption of organization-defined information system operations for essential missions within organization-defined time period consistent with recovery time and recovery point objectives when the primary processing capabilities are unavailable.
- CP-7.3 - CCI-000514
- The organization establishes an alternate processing site including necessary agreements to permit the transfer and resumption of organization-defined information system operations for essential business functions within organization-defined time period consistent with recovery time and recovery point objectives when the primary processing capabilities are unavailable.
- CP-7.5 - CCI-000515
- The organization ensures that equipment and supplies required to transfer and resume operations are available at the alternate processing site or contracts are in place to support delivery to the site within the organization-defined time period for transfer/resumption.
- CP-7.6 - CCI-000521
- The organization ensures that the alternate processing site provides information security safeguards equivalent to that of the primary site.
- CP-7.4 - CCI-002839
- The organization defines information system operations that are permitted to transfer and resume at an alternate processing sites for essential missions/business functions when the primary processing capabilities are unavailable.
- CP-2 - Contingency Plan
- CP-6 - Alternate Storage Site
- CP-8 - Telecommunications Services
- CP-9 - System Backup
- CP-10 - System Recovery And Reconstitution
- MA-6 - Timely Maintenance
- PE-3 - Physical Access Control
- PE-11 - Emergency Power
- PE-12 - Emergency Lighting
- PE-17 - Alternate Work Site
- SC-36 - Distributed Processing And Storage
- SI-13 - Predictable Failure Prevention
- Swanson MA, Bowen P, Phillips AW, Gallup D, Lynes D (2010) Contingency Planning Guide for Federal Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-34, Rev. 1, Includes updates as of November 11, 2010., "SP 800-34" https://doi.org/10.6028/NIST.SP.800-34r1
- CP-7(1) - Separation From Primary Site
- Identify an alternate processing site that is sufficiently separated from the primary processing site to reduce susceptibility to the same threats.
- CP-7(2) - Accessibility
- Identify potential accessibility problems to alternate processing sites in the event of an area-wide disruption or disaster and outlines explicit mitigation actions.
- CP-7(3) - Priority Of Service
- Develop alternate processing site agreements that contain priority-of-service provisions in accordance with availability requirements (including recovery time objectives).
- CP-7(4) - Preparation For Use
- Prepare the alternate processing site so that the site can serve as the operational site supporting essential mission and business functions.
- CP-7(5) - Equivalent Information Security Safeguards
- [Withdrawn: Incorporated into CP-7].
- CP-7(6) - Inability To Return To Primary Site
- Plan and prepare for circumstances that preclude returning to the primary processing site.
- RMF Control
- CP-8
- Subject Area
- CONTINGENCY PLANNING
- Baselines
- CH FH NH FM NM CM
- CP-8.1 - CCI-000522
- The organization defines the time period to permit the resumption of organization-defined information system operations for essential missions when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.
- CP-8.2 - CCI-000523
- The organization defines the time period to permit the resumption of organization-defined information system operations for essential business functions when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.
- CP-8.3 - CCI-000524
- The organization establishes alternate telecommunication services including necessary agreements to permit the resumption of organization-defined information system operations for essential missions within organization-defined time period when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.
- CP-8.4 - CCI-000525
- The organization establishes alternate telecommunication services including necessary agreements to permit the resumption of organization-defined information system operations for essential business functions within organization-defined time period when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.
- CP-8.5 - CCI-002840
- The organization defines the information system operations to be resumed for essential missions within the organization-defined time period when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.
- CP-8.6 - CCI-002841
- The organization defines the information system operations to be resumed for essential business functions within the organization-defined time period when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.
- Swanson MA, Bowen P, Phillips AW, Gallup D, Lynes D (2010) Contingency Planning Guide for Federal Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-34, Rev. 1, Includes updates as of November 11, 2010., "SP 800-34" https://doi.org/10.6028/NIST.SP.800-34r1
- CP-8(1) - Priority Of Service Provisions
- CP-8(2) - Single Points Of Failure
- Obtain alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary telecommunications services.
- CP-8(3) - Separation Of Primary And Alternate Providers
- Obtain alternate telecommunications services from providers that are separated from primary service providers to reduce susceptibility to the same threats.
- CP-8(4) - Provider Contingency Plan
- CP-8(5) - Alternate Telecommunication Service Testing
- Test alternate telecommunication services [Assignment: organization-defined frequency].
- RMF Control
- CP-9
- Subject Area
- CONTINGENCY PLANNING
- Baselines
- CH FS FH NH FM FL CL NL NM CM
- CP-9a.
- Conduct backups of user-level information contained in [Assignment: organization-defined system components] [Assignment: organization-defined frequency consistent with recovery time and recovery point objectives];
- CP-9b.
- Conduct backups of system-level information contained in the system [Assignment: organization-defined frequency consistent with recovery time and recovery point objectives];
- CP-9c.
- Conduct backups of system documentation, including security- and privacy-related documentation [Assignment: organization-defined frequency consistent with recovery time and recovery point objectives]; and
- CP-9d.
- Protect the confidentiality, integrity, and availability of backup information.
- CP-9.1 - CCI-000534
- The organization defines frequency of conducting user-level information backups to support recovery time objectives and recovery point objectives.
- CP-9.2 - CCI-000535
- The organization conducts backups of user-level information contained in the information system per organization-defined frequency that is consistent with recovery time and recovery point objectives.
- CP-9.3 - CCI-000536
- The organization defines frequency of conducting system-level information backups to support recovery time objectives and recovery point objectives.
- CP-9.4 - CCI-000537
- The organization conducts backups of system-level information contained in the information system per organization-defined frequency that is consistent with recovery time and recovery point objectives.
- CP-9.5 - CCI-000538
- The organization defines the frequency of conducting information system documentation backups including security-related documentation to support recovery time objectives and recovery point objectives.
- CP-9.6 - CCI-000539
- The organization conducts backups of information system documentation including security-related documentation per organization-defined frequency that is consistent with recovery time and recovery point objectives.
- CP-9.7 - CCI-000540
- The organization protects the confidentiality, integrity, and availability of backup information at storage locations.
- CP-2 - Contingency Plan
- CP-6 - Alternate Storage Site
- CP-10 - System Recovery And Reconstitution
- MP-4 - Media Storage
- MP-5 - Media Transport
- SC-8 - Transmission Confidentiality And Integrity
- SC-12 - Cryptographic Key Establishment And Management
- SC-13 - Cryptographic Protection
- SI-4 - System Monitoring
- SI-13 - Predictable Failure Prevention
- Barker EB, Branstad DK, Smid ME (2015) A Profile for U.S. Federal Cryptographic Key Management Systems (CKMS). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-152., "SP 800-152" https://doi.org/10.6028/NIST.SP.800-152
- Barker EB, Smid ME, Branstad DK, Chokhani S (2013) A Framework for Designing Cryptographic Key Management Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-130., "SP 800-130" https://doi.org/10.6028/NIST.SP.800-130
- National Institute of Standards and Technology (2013) Digital Signature Standard (DSS). (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 186-4., "FIPS 186-4" https://doi.org/10.6028/NIST.FIPS.186-4
- National Institute of Standards and Technology (2019) Security Requirements for Cryptographic Modules. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 140-3. , "FIPS 140-3" https://doi.org/10.6028/NIST.FIPS.140-3
- Swanson MA, Bowen P, Phillips AW, Gallup D, Lynes D (2010) Contingency Planning Guide for Federal Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-34, Rev. 1, Includes updates as of November 11, 2010., "SP 800-34" https://doi.org/10.6028/NIST.SP.800-34r1
- CP-9(1) - Testing For Reliability And Integrity
- Test backup information [Assignment: organization-defined frequency] to verify media reliability and information integrity.
- CP-9(2) - Test Restoration Using Sampling
- Use a sample of backup information in the restoration of selected system functions as part of contingency plan testing.
- CP-9(3) - Separate Storage For Critical Information
- Store backup copies of [Assignment: organization-defined critical system software and other security-related information] in a separate facility or in a fire rated container that is not collocated with the operational system.
- CP-9(4) - Protection From Unauthorized Modification
- [Withdrawn: Incorporated into CP-9].
- CP-9(5) - Transfer To Alternate Storage Site
- Transfer system backup information to the alternate storage site [Assignment: organization-defined time period and transfer rate consistent with the recovery time and recovery point objectives].
- CP-9(6) - Redundant Secondary System
- Conduct system backup by maintaining a redundant secondary system that is not collocated with the primary system and that can be activated without loss of information or disruption to operations.
- CP-9(7) - Dual Authorization For Deletion Or Destruction
- Enforce dual authorization for the deletion or destruction of [Assignment: organization-defined backup information].
- CP-9(8) - Cryptographic Protection
- Implement cryptographic mechanisms to prevent unauthorized disclosure and modification of [Assignment: organization-defined backup information].
- RMF Control
- CP-10
- Subject Area
- CONTINGENCY PLANNING
- Baselines
- CH FS FH CX NH FM FL CL NL NM CM
- CP-10.1 - CCI-000550
- The organization provides for the recovery and reconstitution of the information system to a known state after a disruption.
- CP-10.2 - CCI-000551
- The organization provides for the recovery and reconstitution of the information system to a known state after a compromise.
- CP-10.3 - CCI-000552
- The organization provides for the recovery and reconstitution of the information system to a known state after a failure.
- Swanson MA, Bowen P, Phillips AW, Gallup D, Lynes D (2010) Contingency Planning Guide for Federal Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-34, Rev. 1, Includes updates as of November 11, 2010., "SP 800-34" https://doi.org/10.6028/NIST.SP.800-34r1
- CP-10(1) - Contingency Plan Testing
- [Withdrawn: Incorporated into CP-4].
- CP-10(2) - Transaction Recovery
- Implement transaction recovery for systems that are transaction-based.
- CP-10(3) - Compensating Security Controls
- Addressed through tailoring.
- CP-10(4) - Restore Within Time Period
- Provide the capability to restore system components within [Assignment: organization-defined restoration time periods] from configuration-controlled and integrity-protected information representing a known, operational state for the components.
- CP-10(5) - Failover Capability
- [Withdrawn: Incorporated into SI-13].
- CP-10(6) - Component Protection
- Protect system components used for recovery and reconstitution.
- RMF Control
- CP-11
- Subject Area
- CONTINGENCY PLANNING
- Baselines
- —
- CP-11.1 - CCI-002853
- The information system provides the capability to employ organization-defined alternative communications protocols in support of maintaining continuity of operations.
- CP-11.2 - CCI-002854
- The organization defines the alternative communications protocols the information systems must be capable of providing in support of maintaining continuity of operations.
- RMF Control
- CP-12
- Subject Area
- CONTINGENCY PLANNING
- Baselines
- CX
- CP-12.1 - CCI-002855
- The information system, when organization-defined conditions are detected, enters a safe mode of operation with organization-defined restrictions of safe mode of operation.
- CP-12.2 - CCI-002856
- The organization defines the conditions, that when detected, the information system enters a safe mode of operation with organization-defined restrictions of safe mode of operation.
- CP-12.3 - CCI-002857
- The organization defines the restrictions of safe mode of operation that the information system will enter when organization-defined conditions are detected.
- RMF Control
- CP-13
- Subject Area
- CONTINGENCY PLANNING
- Baselines
- CX
- CP-13.1 - CCI-002858
- The organization employs organization-defined alternative or supplemental security mechanisms for satisfying organization-defined security functions when the primary means of implementing the security function is unavailable or compromised.
- CP-13.2 - CCI-002859
- The organization defines the alternative or supplemental security mechanisms that will be employed for satisfying organization-defined security functions when the primary means of implementing the security function is unavailable or compromised.
- CP-13.3 - CCI-002860
- The organization defines the security functions that must be satisfied when the primary means of implementing the security function is unavailable or compromised.
- RMF Control
- IA-1
- Subject Area
- IDENTIFICATION AND AUTHENTICATION
- Baselines
- CH FS FH CP CX NH FM FL CL NL NM CM
- IA-1a.
- Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
- IA-1b.
- Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the identification and authentication policy and procedures; and
- IA-1c.
- Review and update the current identification and authentication:
- IA-1.1 - CCI-001933
- The organization defines the personnel or roles to be recipients of the identification and authentication policy and the procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls.
- IA-1.2 - CCI-000756
- The organization develops and documents an identification and authentication policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- IA-1.3 - CCI-000757
- The organization disseminates to organization defined personnel or roles an identification and authentication policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- IA-1.4 - CCI-000760
- The organization develops and documents procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls.
- IA-1.5 - CCI-000761
- The organization disseminates to organization-defined personnel or roles procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls.
- IA-1.6 - CCI-000758
- The organization reviews and updates identification and authentication policy in accordance with the organization defined frequency.
- IA-1.7 - CCI-000759
- The organization defines a frequency for reviewing and updating the identification and authentication policy.
- IA-1.8 - CCI-000762
- The organization reviews and updates identification and authentication procedures in accordance with the organization defined frequency.
- IA-1.9 - CCI-000763
- The organization defines a frequency for reviewing and updating the identification and authentication procedures.
- Bowen P, Hash J, Wilson M (2006) Information Security Handbook: A Guide for Managers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-100, Includes updates as of March 7, 2007., "SP 800-100" https://doi.org/10.6028/NIST.SP.800-100
- Cooper DA, Ferraiolo H, Mehta KL, Francomacaro S, Chandramouli R, Mohler J (2015) Interfaces for Personal Identity Verification. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-73-4, Includes updates as of February 8, 2016., "SP 800-73-4" https://doi.org/10.6028/NIST.SP.800-73-4
- Grassi PA, Garcia ME, Fenton JL (2017) Digital Identity Guidelines. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-63-3, Includes updates as of March 2, 2020., "SP 800-63-3" https://doi.org/10.6028/NIST.SP.800-63-3
- Grother PJ, Salamon WJ, Chandramouli R (2013) Biometric Specifications for Personal Identity Verification. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-76-2., "SP 800-76-2" https://doi.org/10.6028/NIST.SP.800-76-2
- Hu VC, Scarfone KA (2012) Guidelines for Access Control System Evaluation Metrics. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7874., "IR 7874" https://doi.org/10.6028/NIST.IR.7874
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- National Institute of Standards and Technology (2013) Personal Identity Verification (PIV) of Federal Employees and Contractors. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 201-2., "FIPS 201-2" https://doi.org/10.6028/NIST.FIPS.201-2
- Nieles M, Pillitteri VY, Dempsey KL (2017) An Introduction to Information Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-12, Rev. 1., "SP 800-12" https://doi.org/10.6028/NIST.SP.800-12r1
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Polk T, Dodson DF, Burr WE, Ferraiolo H, Cooper DA (2015) Cryptographic Algorithms and Key Sizes for Personal Identity Verification. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-78-4., "SP 800-78-4" https://doi.org/10.6028/NIST.SP.800-78-4
- RMF Control
- IA-2
- Subject Area
- IDENTIFICATION AND AUTHENTICATION
- Baselines
- CH FS FH NH FM CC FL CL NL NM CM
- IA-2.1 - CCI-000764
- The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users).
- AC-2 - Account Management
- AC-3 - Access Enforcement
- AC-4 - Information Flow Enforcement
- AC-14 - Permitted Actions Without Identification Or Authentication
- AC-17 - Remote Access
- AC-18 - Wireless Access
- AU-1 - Policy And Procedures
- AU-6 - Audit Record Review, Analysis, And Reporting
- IA-4 - Identifier Management
- IA-5 - Authenticator Management
- IA-8 - Identification And Authentication (Non-Organizational Users)
- MA-4 - Nonlocal Maintenance
- MA-5 - Maintenance Personnel
- PE-2 - Physical Access Authorizations
- PL-4 - Rules Of Behavior
- SA-4 - Acquisition Process
- SA-8 - Security And Privacy Engineering Principles
- Chandramouli R (2014) A Methodology for Developing Authentication Assurance Level Taxonomy for Smart Card-based Identity Verification. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7849., "IR 7849" https://doi.org/10.6028/NIST.IR.7849
- Cooper DA (2010) Maintaining and Using Key History on Personal Identity Verification (PIV) Cards. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7676., "IR 7676" https://doi.org/10.6028/NIST.IR.7676
- Cooper DA (2012) NIST Test Personal Identity Verification (PIV) Cards. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7870., "IR 7870" https://doi.org/10.6028/NIST.IR.7870
- Cooper DA, Ferraiolo H, Chandramouli R, Ghadiali N, Mohler J, Brady S (2016) Derived PIV Application and Data Model Test Guidelines. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-166., "SP 800-166" https://doi.org/10.6028/NIST.SP.800-166
- Cooper DA, Ferraiolo H, Mehta KL, Francomacaro S, Chandramouli R, Mohler J (2015) Interfaces for Personal Identity Verification. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-73-4, Includes updates as of February 8, 2016., "SP 800-73-4" https://doi.org/10.6028/NIST.SP.800-73-4
- Cooper DA, MacGregor WI (2008) Symmetric Key Injection onto Smart Cards. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7539., "IR 7539" https://doi.org/10.6028/NIST.IR.7539
- Ferraiolo H (2012) A Credential Reliability and Revocation Model for Federated Identities. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7817., "IR 7817" https://doi.org/10.6028/NIST.IR.7817
- Ferraiolo H, Chandramouli R, Ghadiali N, Mohler J, Shorter S (2015) Guidelines for the Authorization of Personal Identity Verification Card Issuers (PCI) and Derived PIV Credential Issuers (DPCI). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-79-2., "SP 800-79-2" https://doi.org/10.6028/NIST.SP.800-79-2
- Ferraiolo H, Chandramouli R, Mehta KL, Mohler J, Skordinski S, Brady S (2016) Representation of PIV Chain-of-Trust for Import and Export. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-156., "SP 800-156" https://doi.org/10.6028/NIST.SP.800-156
- Grassi PA, Garcia ME, Fenton JL (2017) Digital Identity Guidelines. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-63-3, Includes updates as of March 2, 2020., "SP 800-63-3" https://doi.org/10.6028/NIST.SP.800-63-3
- Grother PJ, Salamon WJ, Chandramouli R (2013) Biometric Specifications for Personal Identity Verification. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-76-2., "SP 800-76-2" https://doi.org/10.6028/NIST.SP.800-76-2
- Hu VC, Scarfone KA (2012) Guidelines for Access Control System Evaluation Metrics. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7874., "IR 7874" https://doi.org/10.6028/NIST.IR.7874
- National Institute of Standards and Technology (2013) Personal Identity Verification (PIV) of Federal Employees and Contractors. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 201-2., "FIPS 201-2" https://doi.org/10.6028/NIST.FIPS.201-2
- National Institute of Standards and Technology (2015) SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 202., "FIPS 202" https://doi.org/10.6028/NIST.FIPS.202
- National Institute of Standards and Technology (2019) Security Requirements for Cryptographic Modules. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 140-3. , "FIPS 140-3" https://doi.org/10.6028/NIST.FIPS.140-3
- Polk T, Dodson DF, Burr WE, Ferraiolo H, Cooper DA (2015) Cryptographic Algorithms and Key Sizes for Personal Identity Verification. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-78-4., "SP 800-78-4" https://doi.org/10.6028/NIST.SP.800-78-4
- Ylonen T, Turner P, Scarfone KA, Souppaya MP (2015) Security of Interactive and Automated Access Management Using Secure Shell (SSH). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7966., "IR 7966" https://doi.org/10.6028/NIST.IR.7966
- IA-2(1) - Multi-Factor Authentication To Privileged Accounts
- Implement multi-factor authentication for access to privileged accounts.
- IA-2(2) - Multi-Factor Authentication To Non-Privileged Accounts
- Implement multi-factor authentication for access to non-privileged accounts.
- IA-2(3) - Local Access To Privileged Accounts
- [Withdrawn: Incorporated into IA-2(1)].
- IA-2(4) - Local Access To Non-Privileged Accounts
- [Withdrawn: Incorporated into IA-2(2)].
- IA-2(5) - Individual Authentication With Group Authentication
- When shared accounts or authenticators are employed, require users to be individually authenticated before granting access to the shared accounts or resources.
- IA-2(6) - Access To Accounts —Separate Device
- Implement multi-factor authentication for [Selection (one or more): local; network; remote] access to [Selection (one or more): privileged accounts; non-privileged accounts] such that:
- IA-2(7) - Network Access To Non-Privileged Accounts — Separate Device
- [Withdrawn: Incorporated into IA-2(6)].
- IA-2(8) - Access To Accounts — Replay Resistant
- Implement replay-resistant authentication mechanisms for access to [Selection (one or more): privileged accounts; non-privileged accounts].
- IA-2(9) - Network Access To Non-Privileged Accounts — Replay Resistant
- [Withdrawn: Incorporated into IA-2(8)].
- IA-2(10) - Single Sign-On
- Provide a single sign-on capability for [Assignment: organization-defined system accounts and services].
- IA-2(11) - Remote Access — Separate Device
- [Withdrawn: Incorporated into IA-2(6)].
- IA-2(12) - Acceptance Of Piv Credentials
- Accept and electronically verify Personal Identity Verification-compliant credentials.
- IA-2(13) - Out-Of-Band Authentication
- Implement the following out-of-band authentication mechanisms under [Assignment: organization-defined conditions]: [Assignment: organization-defined out-of-band authentication].
- RMF Control
- IA-3
- Subject Area
- IDENTIFICATION AND AUTHENTICATION
- Baselines
- CH FH CX NH FM CL NM CM
- IA-3.1 - CCI-000777
- The organization defines a list of specific and/or types of devices for which identification and authentication is required before establishing a connection to the information system.
- IA-3.2 - CCI-000778
- The information system uniquely identifies an organization defined list of specific and/or types of devices before establishing a local, remote, or network connection.
- IA-3.3 - CCI-001958
- The information system authenticates an organization defined list of specific and/or types of devices before establishing a local, remote, or network connection.
- AC-17 - Remote Access
- AC-18 - Wireless Access
- AC-19 - Access Control For Mobile Devices
- AU-6 - Audit Record Review, Analysis, And Reporting
- CA-3 - Information Exchange
- CA-9 - Internal System Connections
- IA-4 - Identifier Management
- IA-5 - Authenticator Management
- IA-9 - Service Identification And Authentication
- IA-11 - Re-Authentication
- SI-4 - System Monitoring
- IA-3(1) - Cryptographic Bidirectional Authentication
- Authenticate [Assignment: organization-defined devices and/or types of devices] before establishing [Selection (one or more): local; remote; network] connection using bidirectional authentication that is cryptographically based.
- IA-3(2) - Cryptographic Bidirectional Network Authentication
- [Withdrawn: Incorporated into IA-3(1)].
- IA-3(3) - Dynamic Address Allocation
- IA-3(4) - Device Attestation
- Handle device identification and authentication based on attestation by [Assignment: organization-defined configuration management process].
- RMF Control
- IA-4
- Subject Area
- IDENTIFICATION AND AUTHENTICATION
- Baselines
- CH FS FH CX NH FM FL CL NL NM CM
- IA-4a.
- Receiving authorization from [Assignment: organization-defined personnel or roles] to assign an individual, group, role, service, or device identifier;
- IA-4b.
- Selecting an identifier that identifies an individual, group, role, service, or device;
- IA-4c.
- Assigning the identifier to the intended individual, group, role, service, or device; and
- IA-4d.
- Preventing reuse of identifiers for [Assignment: organization-defined time period].
- IA-4.1 - CCI-001970
- The organization defines the personnel or roles that authorize the assignment of individual, group, role, and device identifiers.
- IA-4.2 - CCI-001971
- The organization manages information system identifiers by receiving authorization from organization-defined personnel or roles to assign an individual, group, role or device identifier.
- IA-4.3 - CCI-001972
- The organization manages information system identifiers by selecting an identifier that identifies an individual, group, role, or device.
- IA-4.4 - CCI-001973
- The organization manages information system identifiers by assigning the identifier to the intended individual, group, role, or device.
- IA-4.5 - CCI-001974
- The organization defines the time period for which the reuse of identifiers is prohibited.
- IA-4.6 - CCI-001975
- The organization manages information system identifiers by preventing reuse of identifiers for an organization-defined time period.
- IA-4.7 - CCI-000794
- The organization defines a time period of inactivity after which the identifier is disabled.
- IA-4.8 - CCI-000795
- The organization manages information system identifiers by disabling the identifier after an organization defined time period of inactivity.
- AC-5 - Separation Of Duties
- IA-2 - Identification And Authentication (Organizational Users)
- IA-3 - Device Identification And Authentication
- IA-5 - Authenticator Management
- IA-8 - Identification And Authentication (Non-Organizational Users)
- IA-9 - Service Identification And Authentication
- IA-12 - Identity Proofing
- MA-4 - Nonlocal Maintenance
- PE-2 - Physical Access Authorizations
- PE-3 - Physical Access Control
- PE-4 - Access Control For Transmission
- PL-4 - Rules Of Behavior
- PM-12 - Insider Threat Program
- PS-3 - Personnel Screening
- PS-4 - Personnel Termination
- PS-5 - Personnel Transfer
- SC-37 - Out-Of-Band Channels
- Cooper DA, Ferraiolo H, Mehta KL, Francomacaro S, Chandramouli R, Mohler J (2015) Interfaces for Personal Identity Verification. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-73-4, Includes updates as of February 8, 2016., "SP 800-73-4" https://doi.org/10.6028/NIST.SP.800-73-4
- Grassi PA, Garcia ME, Fenton JL (2017) Digital Identity Guidelines. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-63-3, Includes updates as of March 2, 2020., "SP 800-63-3" https://doi.org/10.6028/NIST.SP.800-63-3
- Grother PJ, Salamon WJ, Chandramouli R (2013) Biometric Specifications for Personal Identity Verification. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-76-2., "SP 800-76-2" https://doi.org/10.6028/NIST.SP.800-76-2
- National Institute of Standards and Technology (2013) Personal Identity Verification (PIV) of Federal Employees and Contractors. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 201-2., "FIPS 201-2" https://doi.org/10.6028/NIST.FIPS.201-2
- Polk T, Dodson DF, Burr WE, Ferraiolo H, Cooper DA (2015) Cryptographic Algorithms and Key Sizes for Personal Identity Verification. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-78-4., "SP 800-78-4" https://doi.org/10.6028/NIST.SP.800-78-4
- IA-4(1) - Prohibit Account Identifiers As Public Identifiers
- Prohibit the use of system account identifiers that are the same as public identifiers for individual accounts.
- IA-4(2) - Supervisor Authorization
- [Withdrawn: Incorporated into IA-12(1)].
- IA-4(3) - Multiple Forms Of Certification
- [Withdrawn: Incorporated into IA-12(2)].
- IA-4(4) - Identify User Status
- Manage individual identifiers by uniquely identifying each individual as [Assignment: organization-defined characteristic identifying individual status].
- IA-4(5) - Dynamic Management
- Manage individual identifiers dynamically in accordance with [Assignment: organization-defined dynamic identifier policy].
- IA-4(6) - Cross-Organization Management
- Coordinate with the following external organizations for cross-organization management of identifiers: [Assignment: organization-defined external organizations].
- IA-4(7) - In-Person Registration
- [Withdrawn: Incorporated into IA-12(4)].
- IA-4(8) - Pairwise Pseudonymous Identifiers
- Generate pairwise pseudonymous identifiers.
- IA-4(9) - Attribute Maintenance And Protection
- Maintain the attributes for each uniquely identified individual, device, or service in [Assignment: organization-defined protected central storage].
- RMF Control
- IA-5
- Subject Area
- IDENTIFICATION AND AUTHENTICATION
- Baselines
- CH FS FH CX NH FM CC FL CL NL NM CM
- IA-5a.
- Verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, service, or device receiving the authenticator;
- IA-5b.
- Establishing initial authenticator content for any authenticators issued by the organization;
- IA-5c.
- Ensuring that authenticators have sufficient strength of mechanism for their intended use;
- IA-5d.
- Establishing and implementing administrative procedures for initial authenticator distribution, for lost or compromised or damaged authenticators, and for revoking authenticators;
- IA-5e.
- Changing default authenticators prior to first use;
- IA-5f.
- Changing or refreshing authenticators [Assignment: organization-defined time period by authenticator type] or when [Assignment: organization-defined events] occur;
- IA-5g.
- Protecting authenticator content from unauthorized disclosure and modification;
- IA-5h.
- Requiring individuals to take, and having devices implement, specific controls to protect authenticators; and
- IA-5i.
- Changing authenticators for group or role accounts when membership to those accounts changes.
- IA-5.14 - CCI-000180
- The organization manages information system authenticators by establishing maximum lifetime restrictions for authenticators.
- IA-5.2 - CCI-000176
- The organization manages information system authenticators by establishing initial authenticator content for authenticators defined by the organization.
- IA-5.3 - CCI-001544
- The organization manages information system authenticators by ensuring that authenticators have sufficient strength of mechanism for their intended use.
- IA-5.7 - CCI-001984
- The organization manages information system authenticators by establishing administrative procedures for revoking authenticators.
- IA-5.15 - CCI-000181
- The organization manages information system authenticators by establishing reuse conditions for authenticators.
- IA-5.19 - CCI-000183
- The organization manages information system authenticators by protecting authenticator content from unauthorized disclosure.
- IA-5.8 - CCI-001985
- The organization manages information system authenticators by implementing administrative procedures for initial authenticator distribution.
- IA-5.9 - CCI-001986
- The organization manages information system authenticators by implementing administrative procedures for lost/compromised authenticators.
- IA-5.10 - CCI-001987
- The organization manages information system authenticators by implementing administrative procedures for damaged authenticators.
- IA-5(5).1 - CCI-001998
- The organization manages information system authenticators by implementing administrative procedures for revoking authenticators.
- IA-5.5 - CCI-001982
- The organization manages information system authenticators by establishing administrative procedures for lost/compromised authenticators.
- IA-5.12 - CCI-001989
- The organization manages information system authenticators by changing default content of authenticators prior to information system installation.
- IA-5.13 - CCI-000179
- The organization manages information system authenticators by establishing minimum lifetime restrictions for authenticators.
- IA-5.1 - CCI-001980
- The organization manages information system authenticators by verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, or device receiving the authenticator.
- IA-5.4 - CCI-001981
- The organization manages information system authenticators by establishing administrative procedures for initial authenticator distribution.
- IA-5.16 - CCI-000182
- The organization manages information system authenticators by changing/refreshing authenticators in accordance with the organization defined time period by authenticator type.
- IA-5.17 - CCI-001610
- The organization defines the time period (by authenticator type) for changing/refreshing authenticators.
- IA-5.6 - CCI-001983
- The organization manages information system authenticators by establishing administrative procedures for damaged authenticators.
- IA-5.18 - CCI-002042
- The organization manages information system authenticators by protecting authenticator content from unauthorized modification.
- IA-5.21 - CCI-002366
- The organization manages information system authenticators by having devices implement specific security safeguards to protect authenticators.
- IA-5.20 - CCI-002365
- The organization manages information system authenticators by requiring individuals to take specific security safeguards to protect authenticators.
- IA-5.22 - CCI-001990
- The organization manages information system authenticators by changing authenticators for group/role accounts when membership to those accounts changes.
- AC-3 - Access Enforcement
- AC-6 - Least Privilege
- CM-6 - Configuration Settings
- IA-2 - Identification And Authentication (Organizational Users)
- IA-4 - Identifier Management
- IA-7 - Cryptographic Module Authentication
- IA-8 - Identification And Authentication (Non-Organizational Users)
- IA-9 - Service Identification And Authentication
- MA-4 - Nonlocal Maintenance
- PE-2 - Physical Access Authorizations
- PL-4 - Rules Of Behavior
- SC-12 - Cryptographic Key Establishment And Management
- SC-13 - Cryptographic Protection
- Chandramouli R (2014) A Methodology for Developing Authentication Assurance Level Taxonomy for Smart Card-based Identity Verification. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7849., "IR 7849" https://doi.org/10.6028/NIST.IR.7849
- Cooper DA (2012) NIST Test Personal Identity Verification (PIV) Cards. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7870., "IR 7870" https://doi.org/10.6028/NIST.IR.7870
- Cooper DA, Ferraiolo H, Mehta KL, Francomacaro S, Chandramouli R, Mohler J (2015) Interfaces for Personal Identity Verification. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-73-4, Includes updates as of February 8, 2016., "SP 800-73-4" https://doi.org/10.6028/NIST.SP.800-73-4
- Cooper DA, MacGregor WI (2008) Symmetric Key Injection onto Smart Cards. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7539., "IR 7539" https://doi.org/10.6028/NIST.IR.7539
- Ferraiolo H (2012) A Credential Reliability and Revocation Model for Federated Identities. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7817., "IR 7817" https://doi.org/10.6028/NIST.IR.7817
- Grassi PA, Garcia ME, Fenton JL (2017) Digital Identity Guidelines. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-63-3, Includes updates as of March 2, 2020., "SP 800-63-3" https://doi.org/10.6028/NIST.SP.800-63-3
- Greene KK, Kelsey JM, Franklin JM (2016) Measuring the Usability and Security of Permuted Passwords on Mobile Platforms. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8040., "IR 8040" https://doi.org/10.6028/NIST.IR.8040
- Grother PJ, Salamon WJ, Chandramouli R (2013) Biometric Specifications for Personal Identity Verification. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-76-2., "SP 800-76-2" https://doi.org/10.6028/NIST.SP.800-76-2
- National Institute of Standards and Technology (2013) Personal Identity Verification (PIV) of Federal Employees and Contractors. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 201-2., "FIPS 201-2" https://doi.org/10.6028/NIST.FIPS.201-2
- National Institute of Standards and Technology (2015) Secure Hash Standard (SHS). (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 180-4., "FIPS 180-4" https://doi.org/10.6028/NIST.FIPS.180-4
- National Institute of Standards and Technology (2015) SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 202., "FIPS 202" https://doi.org/10.6028/NIST.FIPS.202
- National Institute of Standards and Technology (2019) Security Requirements for Cryptographic Modules. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 140-3. , "FIPS 140-3" https://doi.org/10.6028/NIST.FIPS.140-3
- Polk T, Dodson DF, Burr WE, Ferraiolo H, Cooper DA (2015) Cryptographic Algorithms and Key Sizes for Personal Identity Verification. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-78-4., "SP 800-78-4" https://doi.org/10.6028/NIST.SP.800-78-4
- IA-5(1) - Password-Based Authentication
- For password-based authentication:
- IA-5(2) - Public Key-Based Authentication
- IA-5(3) - In-Person Or Trusted External Party Registration
- [Withdrawn: Incorporated into IA-12(4)].
- IA-5(4) - Automated Support For Password Strength Determination
- [Withdrawn: Incorporated into IA-5(1)].
- IA-5(5) - Change Authenticators Prior To Delivery
- Require developers and installers of system components to provide unique authenticators or change default authenticators prior to delivery and installation.
- IA-5(6) - Protection Of Authenticators
- Protect authenticators commensurate with the security category of the information to which use of the authenticator permits access.
- IA-5(7) - No Embedded Unencrypted Static Authenticators
- Ensure that unencrypted static authenticators are not embedded in applications or other forms of static storage.
- IA-5(8) - Multiple System Accounts
- Implement [Assignment: organization-defined security controls] to manage the risk of compromise due to individuals having accounts on multiple systems.
- IA-5(9) - Federated Credential Management
- Use the following external organizations to federate credentials: [Assignment: organization-defined external organizations].
- IA-5(10) - Dynamic Credential Binding
- Bind identities and authenticators dynamically using the following rules: [Assignment: organization-defined binding rules].
- IA-5(11) - Hardware Token-Based Authentication
- [Withdrawn: Incorporated into IA-2(1), IA-2(2)].
- IA-5(12) - Biometric Authentication Performance
- For biometric-based authentication, employ mechanisms that satisfy the following biometric quality requirements [Assignment: organization-defined biometric quality requirements].
- IA-5(13) - Expiration Of Cached Authenticators
- Prohibit the use of cached authenticators after [Assignment: organization-defined time period].
- IA-5(14) - Managing Content Of Pki Trust Stores
- For PKI-based authentication, employ an organization-wide methodology for managing the content of PKI trust stores installed across all platforms, including networks, operating systems, browsers, and applications.
- IA-5(15) - Gsa-Approved Products And Services
- Use only General Services Administration-approved products and services for identity, credential, and access management.
- IA-5(16) - In-Person Or Trusted External Party Authenticator Issuance
- Require that the issuance of [Assignment: organization-defined types of and/or specific authenticators] be conducted [Selection: in person; by a trusted external party] before [Assignment: organization-defined registration authority] with authorization by [Assignment: organization-defined personnel or roles].
- IA-5(17) - Presentation Attack Detection For Biometric Authenticators
- Employ presentation attack detection mechanisms for biometric-based authentication.
- IA-5(18) - Password Managers
- RMF Control
- IA-6
- Subject Area
- IDENTIFICATION AND AUTHENTICATION
- Baselines
- CH FS FH NH FM FL CL NL NM CM
- IA-6.1 - CCI-000206
- The information system obscures feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
- AC-3 - Access Enforcement
- RMF Control
- IA-7
- Subject Area
- IDENTIFICATION AND AUTHENTICATION
- Baselines
- CH FS FH CX NH FM FL CL NL NM CM
- IA-7.1 - CCI-000803
- The information system implements mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.
- National Institute of Standards and Technology (2019) Security Requirements for Cryptographic Modules. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 140-3. , "FIPS 140-3" https://doi.org/10.6028/NIST.FIPS.140-3
- RMF Control
- IA-8
- Subject Area
- IDENTIFICATION AND AUTHENTICATION
- Baselines
- CH FS FH CX NH FM FL CL NL NM CM
- IA-8.1 - CCI-000804
- The information system uniquely identifies and authenticates non-organizational users (or processes acting on behalf of non-organizational users).
- AC-2 - Account Management
- AC-6 - Least Privilege
- AC-14 - Permitted Actions Without Identification Or Authentication
- AC-17 - Remote Access
- AC-18 - Wireless Access
- AU-6 - Audit Record Review, Analysis, And Reporting
- IA-2 - Identification And Authentication (Organizational Users)
- IA-4 - Identifier Management
- IA-5 - Authenticator Management
- IA-10 - Adaptive Authentication
- IA-11 - Re-Authentication
- MA-4 - Nonlocal Maintenance
- RA-3 - Risk Assessment
- SA-4 - Acquisition Process
- SC-8 - Transmission Confidentiality And Integrity
- Brooks S, Garcia M, Lefkovitz N, Lightman S, Nadeau E (2017) An Introduction to Privacy Engineering and Risk Management in Federal Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8062., "IR 8062" https://doi.org/10.6028/NIST.IR.8062
- Ferraiolo H, Chandramouli R, Ghadiali N, Mohler J, Shorter S (2015) Guidelines for the Authorization of Personal Identity Verification Card Issuers (PCI) and Derived PIV Credential Issuers (DPCI). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-79-2., "SP 800-79-2" https://doi.org/10.6028/NIST.SP.800-79-2
- Ferraiolo H, Mehta KL, Ghadiali N, Mohler J, Johnson V, Brady S (2018) A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-116, Rev. 1., "SP 800-116" https://doi.org/10.6028/NIST.SP.800-116r1
- General Services Administration, ., "FED PKI" https://www.idmanagement.gov/topics/fpki
- Grassi PA, Garcia ME, Fenton JL (2017) Digital Identity Guidelines. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-63-3, Includes updates as of March 2, 2020., "SP 800-63-3" https://doi.org/10.6028/NIST.SP.800-63-3
- National Institute of Standards and Technology (2013) Personal Identity Verification (PIV) of Federal Employees and Contractors. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 201-2., "FIPS 201-2" https://doi.org/10.6028/NIST.FIPS.201-2
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- IA-8(1) - Acceptance Of Piv Credentials From Other Agencies
- Accept and electronically verify Personal Identity Verification-compliant credentials from other federal agencies.
- IA-8(2) - Acceptance Of External Authenticators
- IA-8(3) - Use Of Ficam-Approved Products
- [Withdrawn: Incorporated into IA-8(2)].
- IA-8(4) - Use Of Defined Profiles
- Conform to the following profiles for identity management [Assignment: organization-defined identity management profiles].
- IA-8(5) - Acceptance Of Piv-I Credentials
- Accept and verify federated or PKI credentials that meet [Assignment: organization-defined policy].
- IA-8(6) - Disassociability
- Implement the following measures to disassociate user attributes or identifier assertion relationships among individuals, credential service providers, and relying parties: [Assignment: organization-defined measures].
- RMF Control
- IA-9
- Subject Area
- IDENTIFICATION AND AUTHENTICATION
- Baselines
- CH CX CL CM
- IA-9.1 - CCI-002017
- The organization defines the information system services requiring identification.
- IA-9.2 - CCI-002018
- The organization defines the information system services requiring authentication.
- IA-9.3 - CCI-002019
- The organization defines the security safeguards to be used when identifying information system services.
- IA-9.4 - CCI-002020
- The organization defines the security safeguards to be used when authenticating information system services.
- IA-9.5 - CCI-002021
- The organization identifies organization-defined information system services using organization-defined security safeguards.
- IA-9.6 - CCI-002022
- The organization authenticates organization-defined information system services using organization-defined security safeguards.
- IA-9(1) - Information Exchange
- [Withdrawn: Incorporated into IA-9].
- IA-9(2) - Transmission Of Decisions
- [Withdrawn: Incorporated into IA-9].
- RMF Control
- IA-10
- Subject Area
- IDENTIFICATION AND AUTHENTICATION
- Baselines
- CH CX
- IA-10.1 - CCI-002033
- The organization defines the specific circumstances or situations when individuals accessing an information system employ organization-defined supplemental authentication techniques or mechanisms.
- IA-10.2 - CCI-002034
- The organization defines the supplemental authentication techniques or mechanisms to be employed in specific organization-defined circumstances or situations by individuals accessing the information system.
- IA-10.3 - CCI-002035
- The organization requires that individuals accessing the information system employ organization-defined supplemental authentication techniques or mechanisms under specific organization-defined circumstances or situations.
- Grassi PA, Garcia ME, Fenton JL (2017) Digital Identity Guidelines. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-63-3, Includes updates as of March 2, 2020., "SP 800-63-3" https://doi.org/10.6028/NIST.SP.800-63-3
- RMF Control
- IA-11
- Subject Area
- IDENTIFICATION AND AUTHENTICATION
- Baselines
- CH FS FH NH FM FL CL NL NM CM
- IA-11.1 - CCI-002036
- The organization defines the circumstances or situations when users will be required to reauthenticate.
- IA-11.2 - CCI-002037
- The organization defines the circumstances or situations when devices will be required to reauthenticate.
- IA-11.3 - CCI-002038
- The organization requires users to reauthenticate when organization-defined circumstances or situations requiring reauthentication.
- IA-11.4 - CCI-002039
- The organization requires devices to reauthenticate when organization-defined circumstances or situations requiring reauthentication.
- RMF Control
- IA-12
- Subject Area
- IDENTIFICATION AND AUTHENTICATION
- Baselines
- CH FH NH FM CL NM CM
- IA-12a.
- Identity proof users that require accounts for logical access to systems based on appropriate identity assurance level requirements as specified in applicable standards and guidelines;
- IA-12b.
- Resolve user identities to a unique individual; and
- IA-12c.
- Collect, validate, and verify identity evidence.
- AC-5 - Separation Of Duties
- IA-1 - Policy And Procedures
- IA-2 - Identification And Authentication (Organizational Users)
- IA-3 - Device Identification And Authentication
- IA-4 - Identifier Management
- IA-5 - Authenticator Management
- IA-6 - Authentication Feedback
- IA-8 - Identification And Authentication (Non-Organizational Users)
- Ferraiolo H, Chandramouli R, Ghadiali N, Mohler J, Shorter S (2015) Guidelines for the Authorization of Personal Identity Verification Card Issuers (PCI) and Derived PIV Credential Issuers (DPCI). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-79-2., "SP 800-79-2" https://doi.org/10.6028/NIST.SP.800-79-2
- Grassi PA, Fenton JL, Lefkovitz NB, Danker JM, Choong Y-Y, Greene KK, Theofanos MF (2017) Digital Identity Guidelines: Enrollment and Identity Proofing. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-63A, Includes updates as of March 2, 2020., "SP 800-63A" https://doi.org/10.6028/NIST.SP.800-63a
- Grassi PA, Garcia ME, Fenton JL (2017) Digital Identity Guidelines. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-63-3, Includes updates as of March 2, 2020., "SP 800-63-3" https://doi.org/10.6028/NIST.SP.800-63-3
- National Institute of Standards and Technology (2013) Personal Identity Verification (PIV) of Federal Employees and Contractors. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 201-2., "FIPS 201-2" https://doi.org/10.6028/NIST.FIPS.201-2
- IA-12(1) - Supervisor Authorization
- Require that the registration process to receive an account for logical access includes supervisor or sponsor authorization.
- IA-12(2) - Identity Evidence
- Require evidence of individual identification be presented to the registration authority.
- IA-12(3) - Identity Evidence Validation And Verification
- Require that the presented identity evidence be validated and verified through [Assignment: organizational defined methods of validation and verification].
- IA-12(4) - In-Person Validation And Verification
- Require that the validation and verification of identity evidence be conducted in person before a designated registration authority.
- IA-12(5) - Address Confirmation
- Require that a [Selection: registration code; notice of proofing] be delivered through an out-of-band channel to verify the users address (physical or digital) of record.
- IA-12(6) - Accept Externally-Proofed Identities
- Accept externally-proofed identities at [Assignment: organization-defined identity assurance level].
- RMF Control
- IR-1
- Subject Area
- INCIDENT RESPONSE
- Baselines
- CH NP FS FH CP CX NH FM FL CL NL NM CM
- IR-1a.
- Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
- IR-1b.
- Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the incident response policy and procedures; and
- IR-1c.
- Review and update the current incident response:
- IR-1.1 - CCI-002776
- The organization defines the personnel or roles to whom the incident response policy is disseminated.
- IR-1.2 - CCI-002777
- The organization defines the personnel or roles to whom the incident response procedures are disseminated.
- IR-1.3 - CCI-000805
- The organization develops and documents an incident response policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- IR-1.4 - CCI-000806
- The organization disseminates an incident response policy to organization-defined personnel or roles.
- IR-1.6 - CCI-000809
- The organization develops and documents procedures to facilitate the implementation of the incident response policy and associated incident response controls.
- IR-1.5 - CCI-000810
- The organization disseminates incident response procedures to organization-defined personnel or roles.
- IR-1.8 - CCI-000808
- The organization defines the frequency to review and update the current incident response policy.
- IR-1.7 - CCI-000807
- The organization reviews and updates the current incident response policy in accordance with organization-defined frequency.
- IR-1.10 - CCI-000812
- The organization defines the frequency to review and update the current incident response procedures.
- IR-1.9 - CCI-000811
- The organization reviews and updates the current incident response procedures in accordance with organization-defined frequency.
- Bowen P, Hash J, Wilson M (2006) Information Security Handbook: A Guide for Managers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-100, Includes updates as of March 7, 2007., "SP 800-100" https://doi.org/10.6028/NIST.SP.800-100
- Cichonski PR, Millar T, Grance T, Scarfone KA (2012) Computer Security Incident Handling Guide. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-61, Rev. 2., "SP 800-61" https://doi.org/10.6028/NIST.SP.800-61r2
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- Nieles M, Pillitteri VY, Dempsey KL (2017) An Introduction to Information Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-12, Rev. 1., "SP 800-12" https://doi.org/10.6028/NIST.SP.800-12r1
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Souppaya MP, Scarfone KA (2013) Guide to Malware Incident Prevention and Handling for Desktops and Laptops. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-83, Rev. 1., "SP 800-83" https://doi.org/10.6028/NIST.SP.800-83r1
- Wilson M, Hash J (2003) Building an Information Technology Security Awareness and Training Program. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-50., "SP 800-50" https://doi.org/10.6028/NIST.SP.800-50
- RMF Control
- IR-2
- Subject Area
- INCIDENT RESPONSE
- Baselines
- CH NP FS FH CP NH FM FL CL NL NM CM
- IR-2a.
- Provide incident response training to system users consistent with assigned roles and responsibilities:
- IR-2b.
- Review and update incident response training content [Assignment: organization-defined frequency] and following [Assignment: organization-defined events].
- IR-2.2 - CCI-002778
- The organization defines the time period in which information system users whom assume an incident response role or responsibility receive incident response training.
- IR-2.1 - CCI-000813
- The organization provides incident response training to information system users consistent with assigned roles and responsibilities within an organization-defined time period of assuming an incident response role or responsibility.
- IR-2.5 - CCI-002779
- The organization provides incident response training to information system users consistent with assigned roles and responsibilities when required by information system changes.
- IR-2.3 - CCI-000814
- The organization provides refresher incident response training in accordance with organization-defined frequency.
- IR-2.4 - CCI-000815
- The organization defines a frequency for refresher incident response training.
- Office of Management and Budget Memorandum M-17-12, , January 2017., "OMB M-17-12" https://obamawhitehouse.archives.gov/sites/default
- Wilson M, Hash J (2003) Building an Information Technology Security Awareness and Training Program. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-50., "SP 800-50" https://doi.org/10.6028/NIST.SP.800-50
- IR-2(1) - Simulated Events
- Incorporate simulated events into incident response training to facilitate the required response by personnel in crisis situations.
- IR-2(2) - Automated Training Environments
- Provide an incident response training environment using [Assignment: organization-defined automated mechanisms].
- IR-2(3) - Breach
- Provide incident response training on how to identify and respond to a breach, including the organization’s process for reporting a breach.
- RMF Control
- IR-3
- Subject Area
- INCIDENT RESPONSE
- Baselines
- CH NP FH CP CX NH FM CL NM CM
- IR-3.1 - CCI-000818
- The organization tests the incident response capability for the information system on an organization-defined frequency using organization-defined tests to determine the incident response effectiveness.
- IR-3.2 - CCI-000819
- The organization defines a frequency for incident response tests.
- IR-3.3 - CCI-000820
- The organization defines tests for incident response.
- IR-3.4 - CCI-001624
- The organization documents the results of incident response tests.
- Grance T, Nolan T, Burke K, Dudley R, White G, Good T (2006) Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-84., "SP 800-84" https://doi.org/10.6028/NIST.SP.800-84
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Scarfone KA, Souppaya MP, Cody A, Orebaugh AD (2008) Technical Guide to Information Security Testing and Assessment. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-115., "SP 800-115" https://doi.org/10.6028/NIST.SP.800-115
- IR-3(1) - Automated Testing
- Test the incident response capability using [Assignment: organization-defined automated mechanisms].
- IR-3(2) - Coordination With Related Plans
- Coordinate incident response testing with organizational elements responsible for related plans.
- IR-3(3) - Continuous Improvement
- Use qualitative and quantitative data from testing to:
- RMF Control
- IR-4
- Subject Area
- INCIDENT RESPONSE
- Baselines
- CH NP FS FH CP CX NH FM FL CL NL NM CM
- IR-4a.
- Implement an incident handling capability for incidents that is consistent with the incident response plan and includes preparation, detection and analysis, containment, eradication, and recovery;
- IR-4b.
- Coordinate incident handling activities with contingency planning activities;
- IR-4c.
- Incorporate lessons learned from ongoing incident handling activities into incident response procedures, training, and testing, and implement the resulting changes accordingly; and
- IR-4d.
- Ensure the rigor, intensity, scope, and results of incident handling activities are comparable and predictable across the organization.
- IR-4.1 - CCI-000822
- The organization implements an incident handling capability for security incidents that includes preparation, detection and analysis, containment, eradication, and recovery.
- IR-4.2 - CCI-000823
- The organization coordinates incident handling activities with contingency planning activities.
- IR-4.3 - CCI-000824
- The organization incorporates lessons learned from ongoing incident handling activities into incident response procedures, training, and testing/exercises.
- IR-4.4 - CCI-001625
- The organization implements the resulting incident handling activity changes to incident response procedures, training and testing/exercise accordingly.
- AC-19 - Access Control For Mobile Devices
- AU-6 - Audit Record Review, Analysis, And Reporting
- AU-7 - Audit Record Reduction And Report Generation
- CM-6 - Configuration Settings
- CP-2 - Contingency Plan
- CP-3 - Contingency Training
- CP-4 - Contingency Plan Testing
- IR-2 - Incident Response Training
- IR-3 - Incident Response Testing
- IR-5 - Incident Monitoring
- IR-6 - Incident Reporting
- IR-8 - Incident Response Plan
- PE-6 - Monitoring Physical Access
- PL-2 - System Security And Privacy Plans
- PM-12 - Insider Threat Program
- SA-8 - Security And Privacy Engineering Principles
- SC-5 - Denial-Of-Service Protection
- SC-7 - Boundary Protection
- SI-3 - Malicious Code Protection
- SI-4 - System Monitoring
- SI-7 - Software, Firmware, And Information Integrity
- 85 Federal Register 54263 (September 1, 2020), pp 54263-54271., "41 CFR 201" https://www.federalregister.gov/d/2020-18939
- Ayers RP, Brothers S, Jansen W (2014) Guidelines on Mobile Device Forensics. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-101, Rev. 1., "SP 800-101" https://doi.org/10.6028/NIST.SP.800-101r1
- Bartock M, Scarfone KA, Smith MC, Witte GA, Cichonski JA, Souppaya MP (2016) Guide for Cybersecurity Event Recovery. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-184., "SP 800-184" https://doi.org/10.6028/NIST.SP.800-184
- Cichonski PR, Millar T, Grance T, Scarfone KA (2012) Computer Security Incident Handling Guide. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-61, Rev. 2., "SP 800-61" https://doi.org/10.6028/NIST.SP.800-61r2
- Johnson CS, Waltermire DA, Badger ML, Skorupka C, Snyder J (2016) Guide to Cyber Threat Information Sharing. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-150., "SP 800-150" https://doi.org/10.6028/NIST.SP.800-150
- Kent K, Chevalier S, Grance T, Dang H (2006) Guide to Integrating Forensic Techniques into Incident Response. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-86., "SP 800-86" https://doi.org/10.6028/NIST.SP.800-86
- Office of Management and Budget Memorandum M-17-12, , January 2017., "OMB M-17-12" https://obamawhitehouse.archives.gov/sites/default
- Ross RS, Pillitteri VY, Graubart R, Bodeau D, McQuaid R (2019) Developing Cyber Resilient Systems: A Systems Security Engineering Approach. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 2., "SP 800-160-2" https://doi.org/10.6028/NIST.SP.800-160v2
- Secure Technology Act [includes Federal Acquisition Supply Chain Security Act] (P.L. 115-390), December 2018., "FASC18" https://www.congress.gov/bill/115th-congress/senat
- Singhal A, Gunestas M, Wijesekera D (2010) Forensics Web Services (FWS). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7559., "IR 7559" https://doi.org/10.6028/NIST.IR.7559
- IR-4(1) - Automated Incident Handling Processes
- Support the incident handling process using [Assignment: organization-defined automated mechanisms].
- IR-4(2) - Dynamic Reconfiguration
- Include the following types of dynamic reconfiguration for [Assignment: organization-defined system components] as part of the incident response capability: [Assignment: organization-defined types of dynamic reconfiguration].
- IR-4(3) - Continuity Of Operations
- Identify [Assignment: organization-defined classes of incidents] and take the following actions in response to those incidents to ensure continuation of organizational mission and business functions: [Assignment: organization-defined actions to take in response to classes of incidents].
- IR-4(4) - Information Correlation
- Correlate incident information and individual incident responses to achieve an organization-wide perspective on incident awareness and response.
- IR-4(5) - Automatic Disabling Of System
- Implement a configurable capability to automatically disable the system if [Assignment: organization-defined security violations] are detected.
- IR-4(6) - Insider Threats
- Implement an incident handling capability for incidents involving insider threats.
- IR-4(7) - Insider Threats — Intra-Organization Coordination
- Coordinate an incident handling capability for insider threats that includes the following organizational entities [Assignment: organization-defined entities].
- IR-4(8) - Correlation With External Organizations
- Coordinate with [Assignment: organization-defined external organizations] to correlate and share [Assignment: organization-defined incident information] to achieve a cross-organization perspective on incident awareness and more effective incident responses.
- IR-4(9) - Dynamic Response Capability
- Employ [Assignment: organization-defined dynamic response capabilities] to respond to incidents.
- IR-4(10) - Supply Chain Coordination
- Coordinate incident handling activities involving supply chain events with other organizations involved in the supply chain.
- IR-4(11) - Integrated Incident Response Team
- Establish and maintain an integrated incident response team that can be deployed to any location identified by the organization in [Assignment: organization-defined time period].
- IR-4(12) - Malicious Code And Forensic Analysis
- Analyze malicious code and/or other residual artifacts remaining in the system after the incident.
- IR-4(13) - Behavior Analysis
- Analyze anomalous or suspected adversarial behavior in or related to [Assignment: organization-defined environments or resources].
- IR-4(14) - Security Operations Center
- Establish and maintain a security operations center.
- IR-4(15) - Public Relations And Reputation Repair
- RMF Control
- IR-5
- Subject Area
- INCIDENT RESPONSE
- Baselines
- CH NP FS FH CP CX NH FM FL CL NL NM CM
- IR-5.1 - CCI-000832
- The organization tracks and documents information system security incidents.
- AU-6 - Audit Record Review, Analysis, And Reporting
- AU-7 - Audit Record Reduction And Report Generation
- IR-4 - Incident Handling
- IR-6 - Incident Reporting
- IR-8 - Incident Response Plan
- PE-6 - Monitoring Physical Access
- PM-5 - System Inventory
- SC-5 - Denial-Of-Service Protection
- SC-7 - Boundary Protection
- SI-3 - Malicious Code Protection
- SI-4 - System Monitoring
- SI-7 - Software, Firmware, And Information Integrity
- Cichonski PR, Millar T, Grance T, Scarfone KA (2012) Computer Security Incident Handling Guide. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-61, Rev. 2., "SP 800-61" https://doi.org/10.6028/NIST.SP.800-61r2
- IR-5(1) - Automated Tracking, Data Collection, And Analysis
- Track incidents and collect and analyze incident information using [Assignment: organization-defined automated mechanisms].
- RMF Control
- IR-6
- Subject Area
- INCIDENT RESPONSE
- Baselines
- CH NP FS FH CP CX NH FM CC FL CL NL NM CM
- IR-6a.
- Require personnel to report suspected incidents to the organizational incident response capability within [Assignment: organization-defined time period]; and
- IR-6b.
- Report incident information to [Assignment: organization-defined authorities].
- IR-6.1 - CCI-000834
- The organization defines a time period for personnel to report suspected security incidents to the organizational incident response capability.
- IR-6.2 - CCI-000835
- The organization requires personnel to report suspected security incidents to the organizational incident response capability within the organization-defined time period.
- IR-6.3 - CCI-000836
- The organization reports security incident information to organization-defined authorities.
- IR-6.4 - CCI-002791
- The organization defines authorities to whom security incident information is reported.
- 85 Federal Register 54263 (September 1, 2020), pp 54263-54271., "41 CFR 201" https://www.federalregister.gov/d/2020-18939
- Cichonski PR, Millar T, Grance T, Scarfone KA (2012) Computer Security Incident Handling Guide. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-61, Rev. 2., "SP 800-61" https://doi.org/10.6028/NIST.SP.800-61r2
- Department of Homeland Security, , April 2017., "USCERT IR" https://us-cert.cisa.gov/incident-notification-gui
- Secure Technology Act [includes Federal Acquisition Supply Chain Security Act] (P.L. 115-390), December 2018., "FASC18" https://www.congress.gov/bill/115th-congress/senat
- IR-6(1) - Automated Reporting
- Report incidents using [Assignment: organization-defined automated mechanisms].
- IR-6(2) - Vulnerabilities Related To Incidents
- Report system vulnerabilities associated with reported incidents to [Assignment: organization-defined personnel or roles].
- IR-6(3) - Supply Chain Coordination
- Provide incident information to the provider of the product or service and other organizations involved in the supply chain or supply chain governance for systems or system components related to the incident.
- RMF Control
- IR-7
- Subject Area
- INCIDENT RESPONSE
- Baselines
- CH NP FS FH CP NH FM FL CL NL NM CM
- IR-7.1 - CCI-000839
- The organization provides an incident response support resource, integral to the organizational incident response capability, that offers advice and assistance to users of the information system for the handling and reporting of security incidents.
- AT-2 - Literacy Training And Awareness
- AT-3 - Role-Based Training
- IR-4 - Incident Handling
- IR-6 - Incident Reporting
- IR-8 - Incident Response Plan
- PM-22 - Personally Identifiable Information Quality Management
- PM-26 - Complaint Management
- SA-9 - External System Services
- SI-18 - Personally Identifiable Information Quality Operations
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Singhal A, Gunestas M, Wijesekera D (2010) Forensics Web Services (FWS). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7559., "IR 7559" https://doi.org/10.6028/NIST.IR.7559
- IR-7(1) - Automation Support For Availability Of Information And Support
- Increase the availability of incident response information and support using [Assignment: organization-defined automated mechanisms].
- IR-7(2) - Coordination With External Providers
- RMF Control
- IR-8
- Subject Area
- INCIDENT RESPONSE
- Baselines
- CH NP FS FH CP CX NH FM FL CL NL NM CM
- IR-8a.
- Develop an incident response plan that:
- IR-8b.
- Distribute copies of the incident response plan to [Assignment: organization-defined incident response personnel (identified by name and/or by role) and organizational elements];
- IR-8c.
- Update the incident response plan to address system and organizational changes or problems encountered during plan implementation, execution, or testing;
- IR-8d.
- Communicate incident response plan changes to [Assignment: organization-defined incident response personnel (identified by name and/or by role) and organizational elements]; and
- IR-8e.
- Protect the incident response plan from unauthorized disclosure and modification.
- IR-8.1 - CCI-002794
- The organization develops an incident response plan.
- IR-8.2 - CCI-002795
- The organization's incident response plan provides the organization with a roadmap for implementing its incident response capability.
- IR-8.3 - CCI-002796
- The organization's incident response plan describes the structure and organization of the incident response capability.
- IR-8.4 - CCI-002797
- The organization's incident response plan provides a high-level approach for how the incident response capability fits into the overall organization.
- IR-8.5 - CCI-002798
- The organization's incident response plan meets the unique requirements of the organization, which relate to mission, size, structure, and functions.
- IR-8.6 - CCI-002799
- The organization's incident response plan defines reportable incidents.
- IR-8.7 - CCI-002800
- The organization's incident response plan provides metrics for measuring the incident response capability within the organization.
- IR-8.8 - CCI-002801
- The organization's incident response plan defines the resources and management support needed to effectively maintain and mature an incident response capability.
- IR-8.9 - CCI-002802
- The organization defines personnel or roles to review and approve the incident response plan.
- IR-8.10 - CCI-000844
- The organization develops an incident response plan that is reviewed and approved by organization-defined personnel or roles.
- IR-8.11 - CCI-000845
- The organization defines incident response personnel (identified by name and/or by role) and organizational elements to whom copies of the incident response plan is distributed.
- IR-8.12 - CCI-000846
- The organization distributes copies of the incident response plan to organization-defined incident response personnel (identified by name and/or by role) and organizational elements.
- IR-8.13 - CCI-000847
- The organization defines the frequency for reviewing the incident response plan.
- IR-8.14 - CCI-000848
- The organization reviews the incident response plan on an organization-defined frequency.
- IR-8.15 - CCI-000849
- The organization updates the incident response plan to address system/organizational changes or problems encountered during plan implementation, execution, or testing.
- IR-8.17 - CCI-002803
- The organization defines incident response personnel (identified by name and/or by role) and organizational elements to whom the incident response plan changes will be communicated.
- IR-8.16 - CCI-000850
- The organization communicates incident response plan changes to organization-defined incident response personnel (identified by name and/or by role) and organizational elements.
- IR-8.18 - CCI-002804
- The organization protects the incident response plan from unauthorized disclosure and modification.
- AC-2 - Account Management
- CP-2 - Contingency Plan
- CP-4 - Contingency Plan Testing
- IR-4 - Incident Handling
- IR-7 - Incident Response Assistance
- IR-9 - Information Spillage Response
- PE-6 - Monitoring Physical Access
- PL-2 - System Security And Privacy Plans
- SA-15 - Development Process, Standards, And Tools
- SI-12 - Information Management And Retention
- SR-8 - Notification Agreements
- Cichonski PR, Millar T, Grance T, Scarfone KA (2012) Computer Security Incident Handling Guide. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-61, Rev. 2., "SP 800-61" https://doi.org/10.6028/NIST.SP.800-61r2
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Office of Management and Budget Memorandum M-17-12, , January 2017., "OMB M-17-12" https://obamawhitehouse.archives.gov/sites/default
- IR-8(1) - Breaches
- Include the following in the Incident Response Plan for breaches involving personally identifiable information:
- RMF Control
- IR-9
- Subject Area
- INCIDENT RESPONSE
- Baselines
- CH FH FM CC CL CM
- IR-9a.
- Assigning [Assignment: organization-defined personnel or roles] with responsibility for responding to information spills;
- IR-9b.
- Identifying the specific information involved in the system contamination;
- IR-9c.
- Alerting [Assignment: organization-defined personnel or roles] of the information spill using a method of communication not associated with the spill;
- IR-9d.
- Isolating the contaminated system or system component;
- IR-9e.
- Eradicating the information from the contaminated system or component;
- IR-9f.
- Identifying other systems or system components that may have been subsequently contaminated; and
- IR-9g.
- Performing the following additional actions: [Assignment: organization-defined actions].
- IR-9.1 - CCI-002805
- The organization responds to information spills by identifying the specific information involved in the information system contamination.
- IR-9.2 - CCI-002806
- The organization responds to information spills by alerting organization-defined personnel or roles of the information spill using a method of communication not associated with the spill.
- IR-9.3 - CCI-002807
- The organization defines personnel or roles to be alerted of the information spill using a method of communication not associated with the spill.
- IR-9.4 - CCI-002808
- The organization responds to information spills by isolating the contaminated information system or system component.
- IR-9.5 - CCI-002809
- The organization responds to information spills by eradicating the information from the contaminated information system or component.
- IR-9.6 - CCI-002810
- The organization responds to information spills by identifying other information systems or system components that may have been subsequently contaminated.
- IR-9.7 - CCI-002811
- The organization responds to information spills by performing other organization-defined actions.
- IR-9.8 - CCI-002812
- The organization defines other actions required to respond to information spills.
- CP-2 - Contingency Plan
- IR-6 - Incident Reporting
- PM-26 - Complaint Management
- PM-27 - Privacy Reporting
- PT-2 - Authority To Process Personally Identifiable Information
- PT-3 - Personally Identifiable Information Processing Purposes
- PT-7 - Specific Categories Of Personally Identifiable Information
- RA-7 - Risk Response
- IR-9(1) - Responsible Personnel
- [Withdrawn: Incorporated into IR-9].
- IR-9(2) - Training
- Provide information spillage response training [Assignment: organization-defined frequency].
- IR-9(3) - Post-Spill Operations
- Implement the following procedures to ensure that organizational personnel impacted by information spills can continue to carry out assigned tasks while contaminated systems are undergoing corrective actions: [Assignment: organization-defined procedures].
- IR-9(4) - Exposure To Unauthorized Personnel
- Employ the following controls for personnel exposed to information not within assigned access authorizations: [Assignment: organization-defined controls].
- RMF Control
- IR-10
- Subject Area
- INCIDENT RESPONSE
- Baselines
- —
- IR-10.1 - CCI-002822
- The organization establishes an integrated team of forensic/malicious code analysts, tool developers, and real-time operations personnel.
- RMF Control
- MA-1
- Subject Area
- MAINTENANCE
- Baselines
- CH FS FH NH FM FL CL NL NM CM
- MA-1a.
- Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
- MA-1b.
- Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the maintenance policy and procedures; and
- MA-1c.
- Review and update the current maintenance:
- MA-1.1 - CCI-002861
- The organization defines the personnel or roles to whom a system maintenance policy is disseminated.
- MA-1.2 - CCI-002862
- The organization defines the personnel or roles to whom system maintenance procedures are to be disseminated.
- MA-1.3 - CCI-000852
- The organization develops and documents a system maintenance policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- MA-1.4 - CCI-000853
- The organization disseminates to organization-defined personnel or roles a system maintenance policy.
- MA-1.5 - CCI-000855
- The organization develops and documents procedures to facilitate the implementation of the system maintenance policy and associated system maintenance controls.
- MA-1.6 - CCI-000856
- The organization disseminates to organization-defined personnel or roles procedures to facilitate the implementation of the system maintenance policy and associated system maintenance controls.
- MA-1.7 - CCI-000851
- The organization defines the frequency to review and update the current system maintenance policy.
- MA-1.8 - CCI-000854
- The organization reviews and updates the current system maintenance policy in accordance with organization-defined frequency.
- MA-1.10 - CCI-001628
- The organization defines a frequency to review and update the current system maintenance procedures.
- MA-1.9 - CCI-000857
- The organization reviews and updates the current system maintenance procedures in accordance with organization-defined frequency.
- Bowen P, Hash J, Wilson M (2006) Information Security Handbook: A Guide for Managers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-100, Includes updates as of March 7, 2007., "SP 800-100" https://doi.org/10.6028/NIST.SP.800-100
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- Nieles M, Pillitteri VY, Dempsey KL (2017) An Introduction to Information Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-12, Rev. 1., "SP 800-12" https://doi.org/10.6028/NIST.SP.800-12r1
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- RMF Control
- MA-2
- Subject Area
- MAINTENANCE
- Baselines
- CH FS FH NH FM FL CL NL NM CM
- MA-2a.
- Schedule, document, and review records of maintenance, repair, and replacement on system components in accordance with manufacturer or vendor specifications and/or organizational requirements;
- MA-2b.
- Approve and monitor all maintenance activities, whether performed on site or remotely and whether the system or system components are serviced on site or removed to another location;
- MA-2c.
- Require that [Assignment: organization-defined personnel or roles] explicitly approve the removal of the system or system components from organizational facilities for off-site maintenance, repair, or replacement;
- MA-2d.
- Sanitize equipment to remove the following information from associated media prior to removal from organizational facilities for off-site maintenance, repair, or replacement: [Assignment: organization-defined information];
- MA-2e.
- Check all potentially impacted controls to verify that the controls are still functioning properly following maintenance, repair, or replacement actions; and
- MA-2f.
- Include the following information in organizational maintenance records: [Assignment: organization-defined information].
- MA-2.5 - CCI-002870
- The organization schedules repairs on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements
- MA-2.1 - CCI-002866
- The organization schedules maintenance on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements.
- MA-2.7 - CCI-002872
- The organization documents repairs on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements.
- MA-2.3 - CCI-002868
- The organization documents maintenance on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements.
- MA-2.8 - CCI-002873
- The organization reviews records of repairs on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements.
- MA-2.4 - CCI-002869
- The organization reviews records of maintenance on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements.
- MA-2.6 - CCI-002871
- The organization performs repairs on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements.
- MA-2.2 - CCI-002867
- The organization performs maintenance on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements.
- MA-2.9 - CCI-000859
- The organization approves and monitors all maintenance activities, whether performed on site or remotely and whether the equipment is serviced on site or removed to another location.
- MA-2.11 - CCI-002874
- The organization defines the personnel or roles who can explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs.
- MA-2.10 - CCI-000860
- The organization requires that organization-defined personnel or roles explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs.
- MA-2.12 - CCI-000861
- The organization sanitizes equipment to remove all information from associated media prior to removal from organizational facilities for off-site maintenance or repairs.
- MA-2.13 - CCI-000862
- The organization checks all potentially impacted security controls to verify that the controls are still functioning properly following maintenance or repair actions.
- MA-2.15 - CCI-002876
- The organization defines the maintenance-related information to include in organizational maintenance records.
- MA-2.14 - CCI-002875
- The organization includes organization-defined maintenance-related information in organizational maintenance records.
- CM-2 - Baseline Configuration
- CM-3 - Configuration Change Control
- CM-4 - Impact Analyses
- CM-5 - Access Restrictions For Change
- CM-8 - System Component Inventory
- MA-4 - Nonlocal Maintenance
- MP-6 - Media Sanitization
- PE-16 - Delivery And Removal
- SI-2 - Flaw Remediation
- SR-3 - Supply Chain Controls And Processes
- SR-4 - Provenance
- SR-11 - Component Authenticity
- Dempsey KL, Paulsen C (2015) Risk Management for Replication Devices. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8023., "IR 8023" https://doi.org/10.6028/NIST.IR.8023
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- MA-2(1) - Record Content
- [Withdrawn: Incorporated into MA-2].
- MA-2(2) - Automated Maintenance Activities
- RMF Control
- MA-3
- Subject Area
- MAINTENANCE
- Baselines
- CH FH CX NH FM CC CL NM CM
- MA-3a.
- Approve, control, and monitor the use of system maintenance tools; and
- MA-3b.
- Review previously approved system maintenance tools [Assignment: organization-defined frequency].
- MA-3.1 - CCI-000865
- The organization approves information system maintenance tools.
- MA-3.2 - CCI-000866
- The organization controls information system maintenance tools.
- MA-3.3 - CCI-000867
- The organization monitors information system maintenance tools.
- Kissel RL, Regenscheid AR, Scholl MA, Stine KM (2014) Guidelines for Media Sanitization. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-88, Rev. 1., "SP 800-88" https://doi.org/10.6028/NIST.SP.800-88r1
- MA-3(1) - Inspect Tools
- Inspect the maintenance tools used by maintenance personnel for improper or unauthorized modifications.
- MA-3(2) - Inspect Media
- Check media containing diagnostic and test programs for malicious code before the media are used in the system.
- MA-3(3) - Prevent Unauthorized Removal
- Prevent the removal of maintenance equipment containing organizational information by:
- MA-3(4) - Restricted Tool Use
- Restrict the use of maintenance tools to authorized personnel only.
- MA-3(5) - Execution With Privilege
- Monitor the use of maintenance tools that execute with increased privilege.
- MA-3(6) - Software Updates And Patches
- Inspect maintenance tools to ensure the latest software updates and patches are installed.
- RMF Control
- MA-4
- Subject Area
- MAINTENANCE
- Baselines
- CH FS FH NH FM FL CL NL NM CM
- MA-4a.
- Approve and monitor nonlocal maintenance and diagnostic activities;
- MA-4b.
- Allow the use of nonlocal maintenance and diagnostic tools only as consistent with organizational policy and documented in the security plan for the system;
- MA-4c.
- Employ strong authentication in the establishment of nonlocal maintenance and diagnostic sessions;
- MA-4d.
- Maintain records for nonlocal maintenance and diagnostic activities; and
- MA-4e.
- Terminate session and network connections when nonlocal maintenance is completed.
- MA-4.1 - CCI-000873
- The organization approves nonlocal maintenance and diagnostic activities.
- MA-4.2 - CCI-000874
- The organization monitors nonlocal maintenance and diagnostic activities.
- MA-4.3 - CCI-000876
- The organization allows the use of nonlocal maintenance and diagnostic tools only as consistent with organizational policy and documented in the security plan for the information system.
- MA-4.4 - CCI-000877
- The organization employs strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.
- MA-4.5 - CCI-000878
- The organization maintains records for nonlocal maintenance and diagnostic activities.
- MA-4.6 - CCI-000879
- The organization terminates sessions and network connections when nonlocal maintenance is completed.
- AC-2 - Account Management
- AC-3 - Access Enforcement
- AC-6 - Least Privilege
- AC-17 - Remote Access
- AU-2 - Event Logging
- AU-3 - Content Of Audit Records
- IA-2 - Identification And Authentication (Organizational Users)
- IA-4 - Identifier Management
- IA-5 - Authenticator Management
- IA-8 - Identification And Authentication (Non-Organizational Users)
- MA-2 - Controlled Maintenance
- MA-5 - Maintenance Personnel
- PL-2 - System Security And Privacy Plans
- SC-7 - Boundary Protection
- SC-10 - Network Disconnect
- Grassi PA, Garcia ME, Fenton JL (2017) Digital Identity Guidelines. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-63-3, Includes updates as of March 2, 2020., "SP 800-63-3" https://doi.org/10.6028/NIST.SP.800-63-3
- Kissel RL, Regenscheid AR, Scholl MA, Stine KM (2014) Guidelines for Media Sanitization. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-88, Rev. 1., "SP 800-88" https://doi.org/10.6028/NIST.SP.800-88r1
- National Institute of Standards and Technology (2001) Advanced Encryption Standard (AES). (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 197., "FIPS 197" https://doi.org/10.6028/NIST.FIPS.197
- National Institute of Standards and Technology (2013) Personal Identity Verification (PIV) of Federal Employees and Contractors. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 201-2., "FIPS 201-2" https://doi.org/10.6028/NIST.FIPS.201-2
- National Institute of Standards and Technology (2019) Security Requirements for Cryptographic Modules. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 140-3. , "FIPS 140-3" https://doi.org/10.6028/NIST.FIPS.140-3
- MA-4(1) - Logging And Review
- MA-4(2) - Document Nonlocal Maintenance
- [Withdrawn: Incorporated into MA-1, MA-4].
- MA-4(3) - Comparable Security And Sanitization
- MA-4(4) - Authentication And Separation Of Maintenance Sessions
- Protect nonlocal maintenance sessions by:
- MA-4(5) - Approvals And Notifications
- MA-4(6) - Cryptographic Protection
- Implement the following cryptographic mechanisms to protect the integrity and confidentiality of nonlocal maintenance and diagnostic communications: [Assignment: organization-defined cryptographic mechanisms].
- MA-4(7) - Disconnect Verification
- Verify session and network connection termination after the completion of nonlocal maintenance and diagnostic sessions.
- RMF Control
- MA-5
- Subject Area
- MAINTENANCE
- Baselines
- CH FS FH NH FM CC FL CL NL NM CM
- MA-5a.
- Establish a process for maintenance personnel authorization and maintain a list of authorized maintenance organizations or personnel;
- MA-5b.
- Verify that non-escorted personnel performing maintenance on the system possess the required access authorizations; and
- MA-5c.
- Designate organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations.
- MA-5.1 - CCI-000890
- The organization establishes a process for maintenance personnel authorization.
- MA-5.2 - CCI-000891
- The organization maintains a list of authorized maintenance organizations or personnel.
- MA-5.3 - CCI-002894
- The organization ensures that non-escorted personnel performing maintenance on the information system have required access authorizations.
- MA-5.4 - CCI-002895
- The organization designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations.
- AC-2 - Account Management
- AC-3 - Access Enforcement
- AC-5 - Separation Of Duties
- AC-6 - Least Privilege
- IA-2 - Identification And Authentication (Organizational Users)
- IA-8 - Identification And Authentication (Non-Organizational Users)
- MA-4 - Nonlocal Maintenance
- MP-2 - Media Access
- PE-2 - Physical Access Authorizations
- PE-3 - Physical Access Control
- PS-7 - External Personnel Security
- RA-3 - Risk Assessment
- MA-5(1) - Individuals Without Appropriate Access
- MA-5(2) - Security Clearances For Classified Systems
- Verify that personnel performing maintenance and diagnostic activities on a system processing, storing, or transmitting classified information possess security clearances and formal access approvals for at least the highest classification level and for compartments of information on the system.
- MA-5(3) - Citizenship Requirements For Classified Systems
- Verify that personnel performing maintenance and diagnostic activities on a system processing, storing, or transmitting classified information are U.S. citizens.
- MA-5(4) - Foreign Nationals
- Ensure that:
- MA-5(5) - Non-System Maintenance
- Ensure that non-escorted personnel performing maintenance activities not directly associated with the system but in the physical proximity of the system, have required access authorizations.
- RMF Control
- MA-6
- Subject Area
- MAINTENANCE
- Baselines
- CH FH NH FM NM CM
- MA-6.1 - CCI-000903
- The organization obtains maintenance support and/or spare parts for organization-defined information system components within an organization-defined time period of failure.
- MA-6.2 - CCI-002896
- The organization defines the information system components for which it obtains maintenance support and/or spare parts.
- MA-6.3 - CCI-002897
- The organization defines a time period for obtaining maintenance support and/or spare parts for organization-defined information system components after a failure.
- CM-8 - System Component Inventory
- CP-2 - Contingency Plan
- CP-7 - Alternate Processing Site
- RA-7 - Risk Response
- SA-15 - Development Process, Standards, And Tools
- SI-13 - Predictable Failure Prevention
- SR-2 - Supply Chain Risk Management Plan
- SR-3 - Supply Chain Controls And Processes
- SR-4 - Provenance
- MA-6(1) - Preventive Maintenance
- Perform preventive maintenance on [Assignment: organization-defined system components] at [Assignment: organization-defined time intervals].
- MA-6(2) - Predictive Maintenance
- Perform predictive maintenance on [Assignment: organization-defined system components] at [Assignment: organization-defined time intervals].
- MA-6(3) - Automated Support For Predictive Maintenance
- Transfer predictive maintenance data to a maintenance management system using [Assignment: organization-defined automated mechanisms].
- RMF Control
- MA-7
- Subject Area
- MAINTENANCE
- Baselines
- —
- RMF Control
- MP-1
- Subject Area
- MEDIA PROTECTION
- Baselines
- CH NP FS FH CP NH FM CC FL CL NL NM CM
- MP-1a.
- Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
- MP-1b.
- Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the media protection policy and procedures; and
- MP-1c.
- Review and update the current media protection:
- MP-1.3 - CCI-002566
- The organization defines personnel or roles to whom a documented media protection policy and procedures will be disseminated.
- MP-1.1 - CCI-000995
- The organization develops and documents a media protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- MP-1.2 - CCI-000996
- The organization disseminates to organization-defined personnel or roles a media protection policy.
- MP-1.4 - CCI-000999
- The organization develops and documents procedures to facilitate the implementation of the media protection policy and associated media protection controls.
- MP-1.5 - CCI-001000
- The organization disseminates to organization-defined personnel or roles procedures to facilitate the implementation of the media protection policy and associated media protection controls.
- MP-1.7 - CCI-000998
- The organization defines a frequency for reviewing and updating the current media protection policy.
- MP-1.6 - CCI-000997
- The organization reviews and updates the current media protection policy in accordance with organization-defined frequency.
- MP-1.9 - CCI-001002
- The organization defines a frequency for reviewing and updating the current media protection procedures.
- MP-1.8 - CCI-001001
- The organization reviews and updates the current media protection procedures in accordance with organization-defined frequency.
- Bowen P, Hash J, Wilson M (2006) Information Security Handbook: A Guide for Managers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-100, Includes updates as of March 7, 2007., "SP 800-100" https://doi.org/10.6028/NIST.SP.800-100
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- Nieles M, Pillitteri VY, Dempsey KL (2017) An Introduction to Information Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-12, Rev. 1., "SP 800-12" https://doi.org/10.6028/NIST.SP.800-12r1
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- RMF Control
- MP-2
- Subject Area
- MEDIA PROTECTION
- Baselines
- CH FS FH NH FM CC FL CL NL NM CM
- MP-2.1 - CCI-001003
- The organization restricts access to organization-defined types of digital and/or non-digital media to organization-defined personnel or roles.
- MP-2.2 - CCI-001004
- The organization defines types of digital and/or non-digital media for which the organization restricts access.
- MP-2.3 - CCI-001005
- The organization defines personnel or roles to restrict access to organization-defined types of digital and/or non-digital media.
- AC-19 - Access Control For Mobile Devices
- AU-9 - Protection Of Audit Information
- CP-2 - Contingency Plan
- CP-9 - System Backup
- CP-10 - System Recovery And Reconstitution
- MA-5 - Maintenance Personnel
- MP-4 - Media Storage
- MP-6 - Media Sanitization
- PE-2 - Physical Access Authorizations
- PE-3 - Physical Access Control
- SC-12 - Cryptographic Key Establishment And Management
- SC-13 - Cryptographic Protection
- SC-34 - Non-Modifiable Executable Programs
- SI-12 - Information Management And Retention
- National Institute of Standards and Technology (2004) Standards for Security Categorization of Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 199., "FIPS 199" https://doi.org/10.6028/NIST.FIPS.199
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Scarfone KA, Souppaya MP, Sexton M (2007) Guide to Storage Encryption Technologies for End User Devices. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-111., "SP 800-111" https://doi.org/10.6028/NIST.SP.800-111
- MP-2(1) - Automated Restricted Access
- [Withdrawn: Incorporated into MP-4(2)].
- MP-2(2) - Cryptographic Protection
- [Withdrawn: Incorporated into SC-28(1)].
- RMF Control
- MP-3
- Subject Area
- MEDIA PROTECTION
- Baselines
- CH FH NH FM CC CL NM CM
- MP-3a.
- Mark system media indicating the distribution limitations, handling caveats, and applicable security markings (if any) of the information; and
- MP-3b.
- Exempt [Assignment: organization-defined types of system media] from marking if the media remain within [Assignment: organization-defined controlled areas].
- MP-3.1 - CCI-001010
- The organization marks information system media indicating the distribution limitations, handling caveats, and applicable security markings (if any) of the information.
- MP-3.2 - CCI-001011
- The organization exempts organization-defined types of information system media from marking as long as the media remain within organization-defined controlled areas.
- MP-3.3 - CCI-001012
- The organization defines types of information system media to exempt from marking as long as the media remain within organization-defined controlled areas.
- MP-3.4 - CCI-001013
- The organization defines controlled areas where organization-defined types of information system media are exempt from being marked.
- Code of Federal Regulations, Title 32, (32 C.F.R. 2002)., "32 CFR 2002" https://www.federalregister.gov/documents/2016/09/
- Executive Order 13556, , November 2010., "EO 13556" https://obamawhitehouse.archives.gov/the-press-off
- National Institute of Standards and Technology (2004) Standards for Security Categorization of Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 199., "FIPS 199" https://doi.org/10.6028/NIST.FIPS.199
- RMF Control
- MP-4
- Subject Area
- MEDIA PROTECTION
- Baselines
- CH FH NH FM CC CL NM CM
- MP-4a.
- Physically control and securely store [Assignment: organization-defined types of digital and/or non-digital media] within [Assignment: organization-defined controlled areas]; and
- MP-4b.
- Protect system media types defined in MP-4a until the media are destroyed or sanitized using approved equipment, techniques, and procedures.
- MP-4.1 - CCI-001014
- The organization physically controls and securely stores organization-defined types of digital and/or non-digital media within organization-defined controlled areas.
- MP-4.2 - CCI-001015
- The organization defines types of digital and/or non-digital media to physically control and securely store within organization-defined controlled areas.
- MP-4.3 - CCI-001016
- The organization defines controlled areas where organization-defined types of digital and/or non-digital media are physically controlled and securely stored.
- MP-4.4 - CCI-001018
- The organization protects information system media until the media are destroyed or sanitized using approved equipment, techniques, and procedures.
- AC-19 - Access Control For Mobile Devices
- CP-2 - Contingency Plan
- CP-6 - Alternate Storage Site
- CP-9 - System Backup
- CP-10 - System Recovery And Reconstitution
- MP-2 - Media Access
- MP-7 - Media Use
- PE-3 - Physical Access Control
- PL-2 - System Security And Privacy Plans
- SC-12 - Cryptographic Key Establishment And Management
- SC-13 - Cryptographic Protection
- SC-28 - Protection Of Information At Rest
- SC-34 - Non-Modifiable Executable Programs
- SI-12 - Information Management And Retention
- Barker EB (2020) Recommendation for Key Management: Part 1 – General. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-57 Part 1, Rev. 5., "SP 800-57-1" https://doi.org/10.6028/NIST.SP.800-57pt1r5
- Barker EB, Barker WC (2019) Recommendation for Key Management: Part 2 – Best Practices for Key Management Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-57 Part 2, Rev. 1., "SP 800-57-2" https://doi.org/10.6028/NIST.SP.800-57pt2r1
- Barker EB, Chen L, Davis R (2020) Recommendation for Key-Derivation Methods in Key-Establishment Schemes. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-56C, Rev. 2., "SP 800-56C" https://doi.org/10.6028/NIST.SP.800-56Cr2
- Barker EB, Chen L, Roginsky A, Vassilev A, Davis R (2018) Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-56A, Rev. 3., "SP 800-56A" https://doi.org/10.6028/NIST.SP.800-56Ar3
- Barker EB, Chen L, Roginsky A, Vassilev A, Davis R, Simon S (2019) Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-56B, Rev. 2., "SP 800-56B" https://doi.org/10.6028/NIST.SP.800-56Br2
- Barker EB, Dang QH (2015) Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-57 Part 3, Rev. 1., "SP 800-57-3" https://doi.org/10.6028/NIST.SP.800-57pt3r1
- National Institute of Standards and Technology (2004) Standards for Security Categorization of Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 199., "FIPS 199" https://doi.org/10.6028/NIST.FIPS.199
- Scarfone KA, Souppaya MP, Sexton M (2007) Guide to Storage Encryption Technologies for End User Devices. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-111., "SP 800-111" https://doi.org/10.6028/NIST.SP.800-111
- MP-4(1) - Cryptographic Protection
- [Withdrawn: Incorporated into SC-28(1)].
- MP-4(2) - Automated Restricted Access
- Restrict access to media storage areas and log access attempts and access granted using [Assignment: organization-defined automated mechanisms].
- RMF Control
- MP-5
- Subject Area
- MEDIA PROTECTION
- Baselines
- CH FH NH FM CC CL NM CM
- MP-5a.
- Protect and control [Assignment: organization-defined types of system media] during transport outside of controlled areas using [Assignment: organization-defined controls];
- MP-5b.
- Maintain accountability for system media during transport outside of controlled areas;
- MP-5c.
- Document activities associated with the transport of system media; and
- MP-5d.
- Restrict the activities associated with the transport of system media to authorized personnel.
- MP-5.1 - CCI-001020
- The organization protects and controls organization-defined types of information system media during transport outside of controlled areas using organization-defined security safeguards.
- MP-5.2 - CCI-001021
- The organization defines types of information system media protected and controlled during transport outside of controlled areas.
- MP-5.3 - CCI-001022
- The organization defines security safeguards to be used to protect and control organization-defined types of information system media during transport outside of controlled areas.
- MP-5.4 - CCI-001023
- The organization maintains accountability for information system media during transport outside of controlled areas.
- MP-5.6 - CCI-001024
- The organization restricts the activities associated with the transport of information system media to authorized personnel.
- MP-5.5 - CCI-001025
- The organization documents activities associated with the transport of information system media.
- AC-7 - Unsuccessful Logon Attempts
- AC-19 - Access Control For Mobile Devices
- CP-2 - Contingency Plan
- CP-9 - System Backup
- MP-3 - Media Marking
- MP-4 - Media Storage
- PE-16 - Delivery And Removal
- PL-2 - System Security And Privacy Plans
- SC-12 - Cryptographic Key Establishment And Management
- SC-13 - Cryptographic Protection
- SC-28 - Protection Of Information At Rest
- SC-34 - Non-Modifiable Executable Programs
- National Institute of Standards and Technology (2004) Standards for Security Categorization of Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 199., "FIPS 199" https://doi.org/10.6028/NIST.FIPS.199
- Stine KM, Kissel RL, Barker WC, Fahlsing J, Gulick J (2008) Guide for Mapping Types of Information and Information Systems to Security Categories. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-60, Vol. 1, Rev. 1., "SP 800-60-1" https://doi.org/10.6028/NIST.SP.800-60v1r1
- Stine KM, Kissel RL, Barker WC, Lee A, Fahlsing J (2008) Guide for Mapping Types of Information and Information Systems to Security Categories: Appendices. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-60, Vol. 2, Rev. 1., "SP 800-60-2" https://doi.org/10.6028/NIST.SP.800-60v2r1
- MP-5(1) - Protection Outside Of Controlled Areas
- [Withdrawn: Incorporated into MP-5].
- MP-5(2) - Documentation Of Activities
- [Withdrawn: Incorporated into MP-5].
- MP-5(3) - Custodians
- Employ an identified custodian during transport of system media outside of controlled areas.
- MP-5(4) - Cryptographic Protection
- [Withdrawn: Incorporated into SC-28(1)].
- RMF Control
- MP-6
- Subject Area
- MEDIA PROTECTION
- Baselines
- CH NP FS FH NH FM CC FL CL NL NM CM
- MP-6a.
- Sanitize [Assignment: organization-defined system media] prior to disposal, release out of organizational control, or release for reuse using [Assignment: organization-defined sanitization techniques and procedures]; and
- MP-6b.
- Employ sanitization mechanisms with the strength and integrity commensurate with the security category or classification of the information.
- MP-6.1 - CCI-001028
- The organization sanitizes organization-defined information system media prior to disposal, release out of organizational control, or release for reuse using organization-defined sanitization techniques and procedures in accordance with applicable federal and organizational standards and policies.
- MP-6.2 - CCI-002578
- The organization defines information system media to sanitize prior to disposal, release out of organizational control, or release for reuse using organization-defined sanitization techniques and procedures in accordance with applicable federal and organizational standards and policies.
- MP-6.3 - CCI-002579
- The organization defines the sanitization techniques and procedures in accordance with applicable federal and organization standards and policies to be used to sanitize organization-defined information system media prior to disposal, release out of organizational control, or release for reuse.
- MP-6.4 - CCI-002580
- The organization employs sanitization mechanisms with the strength and integrity commensurate with the security category or classification of the information.
- AC-3 - Access Enforcement
- AC-7 - Unsuccessful Logon Attempts
- AU-11 - Audit Record Retention
- MA-2 - Controlled Maintenance
- MA-3 - Maintenance Tools
- MA-4 - Nonlocal Maintenance
- MA-5 - Maintenance Personnel
- PM-22 - Personally Identifiable Information Quality Management
- SI-12 - Information Management And Retention
- SI-18 - Personally Identifiable Information Quality Operations
- SI-19 - De-Identification
- SR-11 - Component Authenticity
- Code of Federal Regulations, Title 32, (32 C.F.R. 2002)., "32 CFR 2002" https://www.federalregister.gov/documents/2016/09/
- Dempsey KL, Paulsen C (2015) Risk Management for Replication Devices. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8023., "IR 8023" https://doi.org/10.6028/NIST.IR.8023
- Kissel RL, Regenscheid AR, Scholl MA, Stine KM (2014) Guidelines for Media Sanitization. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-88, Rev. 1., "SP 800-88" https://doi.org/10.6028/NIST.SP.800-88r1
- National Archives and Records Administration, Controlled Unclassified Information (CUI) Registry., "NARA CUI" https://www.archives.gov/cui
- National Institute of Standards and Technology (2004) Standards for Security Categorization of Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 199., "FIPS 199" https://doi.org/10.6028/NIST.FIPS.199
- National Security Agency, ., "NSA MEDIA" https://www.nsa.gov/resources/everyone/media-destr
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Souppaya MP, Scarfone KA (2013) Guidelines for Managing the Security of Mobile Devices in the Enterprise. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-124, Rev. 1., "SP 800-124" https://doi.org/10.6028/NIST.SP.800-124r1
- Stine KM, Kissel RL, Barker WC, Fahlsing J, Gulick J (2008) Guide for Mapping Types of Information and Information Systems to Security Categories. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-60, Vol. 1, Rev. 1., "SP 800-60-1" https://doi.org/10.6028/NIST.SP.800-60v1r1
- Stine KM, Kissel RL, Barker WC, Lee A, Fahlsing J (2008) Guide for Mapping Types of Information and Information Systems to Security Categories: Appendices. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-60, Vol. 2, Rev. 1., "SP 800-60-2" https://doi.org/10.6028/NIST.SP.800-60v2r1
- MP-6(1) - Review, Approve, Track, Document, And Verify
- Review, approve, track, document, and verify media sanitization and disposal actions.
- MP-6(2) - Equipment Testing
- Test sanitization equipment and procedures [Assignment: organization-defined frequency] to ensure that the intended sanitization is being achieved.
- MP-6(3) - Nondestructive Techniques
- Apply nondestructive sanitization techniques to portable storage devices prior to connecting such devices to the system under the following circumstances: [Assignment: organization-defined circumstances requiring sanitization of portable storage devices].
- MP-6(4) - Controlled Unclassified Information
- [Withdrawn: Incorporated into MP-6].
- MP-6(5) - Classified Information
- [Withdrawn: Incorporated into MP-6].
- MP-6(6) - Media Destruction
- [Withdrawn: Incorporated into MP-6].
- MP-6(7) - Dual Authorization
- Enforce dual authorization for the sanitization of [Assignment: organization-defined system media].
- MP-6(8) - Remote Purging Or Wiping Of Information
- Provide the capability to purge or wipe information from [Assignment: organization-defined systems or system components] [Selection: remotely; under the following conditions: [Assignment: organization-defined conditions]].
- RMF Control
- MP-7
- Subject Area
- MEDIA PROTECTION
- Baselines
- CH FS FH NH FM CC FL CL NL NM CM
- MP-7a.
- [Selection: Restrict; Prohibit] the use of [Assignment: organization-defined types of system media] on [Assignment: organization-defined systems or system components] using [Assignment: organization-defined controls]; and
- MP-7b.
- Prohibit the use of portable storage devices in organizational systems when such devices have no identifiable owner.
- MP-7.1 - CCI-002581
- The organization defines the types of information system media to restrict or prohibit on organization-defined information systems or system components using organization-defined security safeguards.
- MP-7.2 - CCI-002582
- The organization defines the information systems or system components to restrict or prohibit the use of organization-defined types of information system media using organization-defined security safeguards.
- MP-7.3 - CCI-002583
- The organization defines the security safeguards to use for restricting or prohibiting the use of organization-defined types of information system media on organization-defined information systems or system components.
- MP-7.4 - CCI-002584
- The organization restricts or prohibits the use of organization-defined types of information system media on organization-defined information systems or system components using organization-defined security safeguards.
- National Institute of Standards and Technology (2004) Standards for Security Categorization of Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 199., "FIPS 199" https://doi.org/10.6028/NIST.FIPS.199
- Scarfone KA, Souppaya MP, Sexton M (2007) Guide to Storage Encryption Technologies for End User Devices. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-111., "SP 800-111" https://doi.org/10.6028/NIST.SP.800-111
- MP-7(1) - Prohibit Use Without Owner
- [Withdrawn: Incorporated into MP-7].
- MP-7(2) - Prohibit Use Of Sanitization-Resistant Media
- Prohibit the use of sanitization-resistant media in organizational systems.
- RMF Control
- MP-8
- Subject Area
- MEDIA PROTECTION
- Baselines
- CC
- MP-8a.
- Establish [Assignment: organization-defined system media downgrading process] that includes employing downgrading mechanisms with strength and integrity commensurate with the security category or classification of the information;
- MP-8b.
- Verify that the system media downgrading process is commensurate with the security category and/or classification level of the information to be removed and the access authorizations of the potential recipients of the downgraded information;
- MP-8c.
- Identify [Assignment: organization-defined system media requiring downgrading]; and
- MP-8d.
- Downgrade the identified system media using the established process.
- MP-8.5 - CCI-002600
- The organization downgrades the identified information system media using the established process.
- MP-8.1 - CCI-002596
- The organization establishes and defines an information system media downgrading process that includes employing downgrading mechanisms with organization-defined strength and integrity.
- MP-8.2 - CCI-002597
- The organization defines strength and integrity for downgrading mechanisms to establish an organization-defined information system media downgrading process.
- MP-8.3 - CCI-002598
- The organization ensures that the information system media downgrading process is commensurate with the security category and/or classification level of the information to be removed and the access authorizations of the potential recipients of the downgraded information
- MP-8.4 - CCI-002599
- The organization defines and identifies the information system media requiring downgrading.
- Code of Federal Regulations, Title 32, (32 C.F.R. 2002)., "32 CFR 2002" https://www.federalregister.gov/documents/2016/09/
- National Security Agency, ., "NSA MEDIA" https://www.nsa.gov/resources/everyone/media-destr
- MP-8(1) - Documentation Of Process
- Document system media downgrading actions.
- MP-8(2) - Equipment Testing
- Test downgrading equipment and procedures [Assignment: organization-defined frequency] to ensure that downgrading actions are being achieved.
- MP-8(3) - Controlled Unclassified Information
- Downgrade system media containing controlled unclassified information prior to public release.
- MP-8(4) - Classified Information
- Downgrade system media containing classified information prior to release to individuals without required access authorizations.
- RMF Control
- PE-1
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baselines
- CH FS FH CP CX NH FM FL CL NL NM CM
- PE-1a.
- Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
- PE-1b.
- Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the physical and environmental protection policy and procedures; and
- PE-1c.
- Review and update the current physical and environmental protection:
- PE-1.1 - CCI-002908
- The organization defines the personnel or roles to whom a physical and environmental protection policy is disseminated.
- PE-1.2 - CCI-002909
- The organization defines the personnel or roles to whom the physical and environmental protection procedures are disseminated.
- PE-1.3 - CCI-000904
- The organization develops and documents a physical and environment protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- PE-1.4 - CCI-000905
- The organization disseminates a physical and environmental protection policy to organization-defined personnel or roles.
- PE-1.5 - CCI-000908
- The organization develops and documents procedures to facilitate the implementation of the physical and environmental protection policy and associated physical and environmental protection controls.
- PE-1.6 - CCI-000909
- The organization disseminates physical and environmental protection procedures to organization-defined personnel or roles.
- PE-1.8 - CCI-000907
- The organization defines the frequency to review and update the physical and environmental protection policy.
- PE-1.7 - CCI-000906
- The organization reviews and updates the current physical and environmental protection policy in accordance with organization-defined frequency.
- PE-1.10 - CCI-000911
- The organization defines the frequency to review and update the physical and environmental protection procedures.
- PE-1.9 - CCI-000910
- The organization reviews and updates the current physical and environmental protection procedures in accordance with organization-defined frequency.
- Bowen P, Hash J, Wilson M (2006) Information Security Handbook: A Guide for Managers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-100, Includes updates as of March 7, 2007., "SP 800-100" https://doi.org/10.6028/NIST.SP.800-100
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- Nieles M, Pillitteri VY, Dempsey KL (2017) An Introduction to Information Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-12, Rev. 1., "SP 800-12" https://doi.org/10.6028/NIST.SP.800-12r1
- RMF Control
- PE-2
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baselines
- CH FS FH CP NH FM CC FL CL NL NM CM
- PE-2a.
- Develop, approve, and maintain a list of individuals with authorized access to the facility where the system resides;
- PE-2b.
- Issue authorization credentials for facility access;
- PE-2c.
- Review the access list detailing authorized facility access by individuals [Assignment: organization-defined frequency]; and
- PE-2d.
- Remove individuals from the facility access list when access is no longer required.
- PE-2.1 - CCI-000912
- The organization develops a list of individuals with authorized access to the facility where the information system resides.
- PE-2.2 - CCI-002910
- The organization approves a list of individuals with authorized access to the facility where the information system resides.
- PE-2.3 - CCI-002911
- The organization maintains a list of individuals with authorized access to the facility where the information system resides.
- PE-2.4 - CCI-000913
- The organization issues authorization credentials for facility access.
- PE-2.5 - CCI-000914
- The organization reviews the access list detailing authorized facility access by individuals in accordance with organization-defined frequency.
- PE-2.6 - CCI-000915
- The organization defines the frequency to review the access list detailing authorized facility access by individuals.
- PE-2.7 - CCI-001635
- The organization removes individuals from the facility access list when access is no longer required.
- AT-3 - Role-Based Training
- AU-9 - Protection Of Audit Information
- IA-4 - Identifier Management
- MA-5 - Maintenance Personnel
- MP-2 - Media Access
- PE-3 - Physical Access Control
- PE-4 - Access Control For Transmission
- PE-5 - Access Control For Output Devices
- PE-8 - Visitor Access Records
- PM-12 - Insider Threat Program
- PS-3 - Personnel Screening
- PS-4 - Personnel Termination
- PS-5 - Personnel Transfer
- PS-6 - Access Agreements
- Cooper DA, Ferraiolo H, Mehta KL, Francomacaro S, Chandramouli R, Mohler J (2015) Interfaces for Personal Identity Verification. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-73-4, Includes updates as of February 8, 2016., "SP 800-73-4" https://doi.org/10.6028/NIST.SP.800-73-4
- Grother PJ, Salamon WJ, Chandramouli R (2013) Biometric Specifications for Personal Identity Verification. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-76-2., "SP 800-76-2" https://doi.org/10.6028/NIST.SP.800-76-2
- National Institute of Standards and Technology (2013) Personal Identity Verification (PIV) of Federal Employees and Contractors. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 201-2., "FIPS 201-2" https://doi.org/10.6028/NIST.FIPS.201-2
- Polk T, Dodson DF, Burr WE, Ferraiolo H, Cooper DA (2015) Cryptographic Algorithms and Key Sizes for Personal Identity Verification. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-78-4., "SP 800-78-4" https://doi.org/10.6028/NIST.SP.800-78-4
- PE-2(1) - Access By Position Or Role
- Authorize physical access to the facility where the system resides based on position or role.
- PE-2(2) - Two Forms Of Identification
- Require two forms of identification from the following forms of identification for visitor access to the facility where the system resides: [Assignment: organization-defined list of acceptable forms of identification].
- PE-2(3) - Restrict Unescorted Access
- Restrict unescorted access to the facility where the system resides to personnel with [Selection (one or more): security clearances for all information contained within the system; formal access authorizations for all information contained within the system; need for access to all information contained within the system; [Assignment: organization-defined physical access authorizations]].
- RMF Control
- PE-3
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baselines
- CH FS FH NH FM CC FL CL NL NM CM
- PE-3a.
- Enforce physical access authorizations at [Assignment: organization-defined entry and exit points to the facility where the system resides] by:
- PE-3b.
- Maintain physical access audit logs for [Assignment: organization-defined entry or exit points];
- PE-3c.
- Control access to areas within the facility designated as publicly accessible by implementing the following controls: [Assignment: organization-defined physical access controls];
- PE-3d.
- Escort visitors and control visitor activity [Assignment: organization-defined circumstances requiring visitor escorts and control of visitor activity];
- PE-3e.
- Secure keys, combinations, and other physical access devices;
- PE-3f.
- Inventory [Assignment: organization-defined physical access devices] every [Assignment: organization-defined frequency]; and
- PE-3g.
- Change combinations and keys [Assignment: organization-defined frequency] and/or when keys are lost, combinations are compromised, or when individuals possessing the keys or combinations are transferred or terminated.
- PE-3.2 - CCI-002915
- The organization defines the entry/exit points to the facility where the information system resides.
- PE-3.1 - CCI-000919
- The organization enforces physical access authorizations at organization-defined entry/exit points to the facility where the information system resides.
- PE-3.3 - CCI-000920
- The organization verifies individual access authorizations before granting access to the facility.
- PE-3.5 - CCI-002916
- The organization defines the physical access control systems/devices or guards that control ingress/egress to the facility.
- PE-3.4 - CCI-000921
- The organization controls ingress/egress to the facility using one or more organization-defined physical access control systems/devices or guards.
- PE-3.7 - CCI-002918
- The organization defines entry/exit points that require physical access audit logs be maintained.
- PE-3.6 - CCI-002917
- The organization maintains physical access audit logs for organization-defined entry/exit points.
- PE-3.9 - CCI-002920
- The organization defines security safeguards to control access to areas within the facility officially designated as publicly accessible.
- PE-3.8 - CCI-002919
- The organization provides organization-defined security safeguards to control access to areas within the facility officially designated as publicly accessible.
- PE-3.11 - CCI-002922
- The organization defines circumstances requiring visitor escorts.
- PE-3.10 - CCI-002921
- The organization escorts visitors during organization-defined circumstances requiring visitor escorts.
- PE-3.13 - CCI-002924
- The organization defines circumstances requiring visitor monitoring.
- PE-3.12 - CCI-002923
- The organization monitors visitor activity during organization-defined circumstances requiring visitor monitoring.
- PE-3.14 - CCI-000923
- The organization secures keys, combinations, and other physical access devices.
- PE-3.17 - CCI-002925
- The organization defines the physical access devices to inventory.
- PE-3.16 - CCI-000925
- The organization defines the frequency for conducting inventories of organization-defined physical access devices.
- PE-3.15 - CCI-000924
- The organization inventories organization-defined physical access devices every organization-defined frequency.
- PE-3.19 - CCI-000927
- The organization defines a frequency for changing combinations and keys.
- PE-3.18 - CCI-000926
- The organization changes combinations and keys in accordance with organization-defined frequency and/or when keys are lost, combinations are compromised, or individuals are transferred or terminated.
- AT-3 - Role-Based Training
- AU-2 - Event Logging
- AU-6 - Audit Record Review, Analysis, And Reporting
- AU-9 - Protection Of Audit Information
- AU-13 - Monitoring For Information Disclosure
- CP-10 - System Recovery And Reconstitution
- IA-3 - Device Identification And Authentication
- IA-8 - Identification And Authentication (Non-Organizational Users)
- MA-5 - Maintenance Personnel
- MP-2 - Media Access
- MP-4 - Media Storage
- PE-2 - Physical Access Authorizations
- PE-4 - Access Control For Transmission
- PE-5 - Access Control For Output Devices
- PE-8 - Visitor Access Records
- PS-2 - Position Risk Designation
- PS-3 - Personnel Screening
- PS-6 - Access Agreements
- PS-7 - External Personnel Security
- RA-3 - Risk Assessment
- SC-28 - Protection Of Information At Rest
- SI-4 - System Monitoring
- SR-3 - Supply Chain Controls And Processes
- Cooper DA, Ferraiolo H, Mehta KL, Francomacaro S, Chandramouli R, Mohler J (2015) Interfaces for Personal Identity Verification. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-73-4, Includes updates as of February 8, 2016., "SP 800-73-4" https://doi.org/10.6028/NIST.SP.800-73-4
- Ferraiolo H, Mehta KL, Ghadiali N, Mohler J, Johnson V, Brady S (2018) A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-116, Rev. 1., "SP 800-116" https://doi.org/10.6028/NIST.SP.800-116r1
- Grother PJ, Salamon WJ, Chandramouli R (2013) Biometric Specifications for Personal Identity Verification. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-76-2., "SP 800-76-2" https://doi.org/10.6028/NIST.SP.800-76-2
- National Institute of Standards and Technology (2013) Personal Identity Verification (PIV) of Federal Employees and Contractors. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 201-2., "FIPS 201-2" https://doi.org/10.6028/NIST.FIPS.201-2
- Polk T, Dodson DF, Burr WE, Ferraiolo H, Cooper DA (2015) Cryptographic Algorithms and Key Sizes for Personal Identity Verification. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-78-4., "SP 800-78-4" https://doi.org/10.6028/NIST.SP.800-78-4
- PE-3(1) - System Access
- Enforce physical access authorizations to the system in addition to the physical access controls for the facility at [Assignment: organization-defined physical spaces containing one or more components of the system].
- PE-3(2) - Facility And Systems
- Perform security checks [Assignment: organization-defined frequency] at the physical perimeter of the facility or system for exfiltration of information or removal of system components.
- PE-3(3) - Continuous Guards
- Employ guards to control [Assignment: organization-defined physical access points] to the facility where the system resides 24 hours per day, 7 days per week.
- PE-3(4) - Lockable Casings
- Use lockable physical casings to protect [Assignment: organization-defined system components] from unauthorized physical access.
- PE-3(5) - Tamper Protection
- Employ [Assignment: organization-defined anti-tamper technologies] to [Selection (one or more): detect; prevent] physical tampering or alteration of [Assignment: organization-defined hardware components] within the system.
- PE-3(6) - Facility Penetration Testing
- [Withdrawn: Incorporated into CA-8].
- PE-3(7) - Physical Barriers
- Limit access using physical barriers.
- PE-3(8) - Access Control Vestibules
- Employ access control vestibules at [Assignment: organization-defined locations within the facility].
- RMF Control
- PE-4
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baselines
- CH FH NH FM CC NM CM
- PE-4.1 - CCI-000936
- The organization controls physical access to organization-defined information system distribution and transmission lines within organizational facilities using organization-defined security safeguards.
- PE-4.2 - CCI-002930
- The organization defines information system distribution and transmission lines within organizational facilities to control physical access using organization-defined security safeguards.
- PE-4.3 - CCI-002931
- The organization defines security safeguards to control physical access to organization-defined information system distribution and transmission lines within organizational facilities.
- AT-3 - Role-Based Training
- IA-4 - Identifier Management
- MP-2 - Media Access
- MP-4 - Media Storage
- PE-2 - Physical Access Authorizations
- PE-3 - Physical Access Control
- PE-5 - Access Control For Output Devices
- PE-9 - Power Equipment And Cabling
- SC-7 - Boundary Protection
- SC-8 - Transmission Confidentiality And Integrity
- RMF Control
- PE-5
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baselines
- CH FH NH FM NM CM
- PE-5.1 - CCI-000937
- The organization controls physical access to information system output devices to prevent unauthorized individuals from obtaining the output.
- Dempsey KL, Paulsen C (2015) Risk Management for Replication Devices. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8023., "IR 8023" https://doi.org/10.6028/NIST.IR.8023
- PE-5(1) - Access To Output By Authorized Individuals
- [Withdrawn: Incorporated into PE-5].
- PE-5(2) - Link To Individual Identity
- Link individual identity to receipt of output from output devices.
- PE-5(3) - Marking Output Devices
- [Withdrawn: Incorporated into PE-22].
- RMF Control
- PE-6
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baselines
- CH FS FH CX NH FM FL CL NL NM CM
- PE-6a.
- Monitor physical access to the facility where the system resides to detect and respond to physical security incidents;
- PE-6b.
- Review physical access logs [Assignment: organization-defined frequency] and upon occurrence of [Assignment: organization-defined events or potential indications of events]; and
- PE-6c.
- Coordinate results of reviews and investigations with the organizational incident response capability.
- PE-6.1 - CCI-002939
- The organization monitors physical access to the facility where the information system resides to detect and respond to physical security incidents.
- PE-6.5 - CCI-000940
- The organization defines a frequency for reviewing physical access logs.
- PE-6.4 - CCI-000939
- The organization reviews physical access logs in accordance with organization-defined frequency.
- PE-6.3 - CCI-002941
- The organization defines events or potential indications of events requiring review of physical access logs.
- PE-6.2 - CCI-002940
- The organization reviews physical access logs upon occurrence of organization-defined events or potential indications of events
- PE-6.6 - CCI-000941
- The organization coordinates results of reviews and investigations with the organizations incident response capability.
- PE-6(1) - Intrusion Alarms And Surveillance Equipment
- Monitor physical access to the facility where the system resides using physical intrusion alarms and surveillance equipment.
- PE-6(2) - Automated Intrusion Recognition And Responses
- Recognize [Assignment: organization-defined classes or types of intrusions] and initiate [Assignment: organization-defined response actions] using [Assignment: organization-defined automated mechanisms].
- PE-6(3) - Video Surveillance
- PE-6(4) - Monitoring Physical Access To Systems
- Monitor physical access to the system in addition to the physical access monitoring of the facility at [Assignment: organization-defined physical spaces containing one or more components of the system].
- RMF Control
- PE-7
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baselines
- —
- RMF Control
- PE-8
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baselines
- CH NP FS FH CP NH FM FL CL NL NM CM
- PE-8a.
- Maintain visitor access records to the facility where the system resides for [Assignment: organization-defined time period];
- PE-8b.
- Review visitor access records [Assignment: organization-defined frequency]; and
- PE-8c.
- Report anomalies in visitor access records to [Assignment: organization-defined personnel].
- PE-8.2 - CCI-002952
- The organization defines the time period to maintain visitor access records to the facility where the information system resides.
- PE-8.1 - CCI-000947
- The organization maintains visitor access records to the facility where the information system resides for organization-defined time period.
- PE-8.4 - CCI-000949
- The organization defines the frequency to review the visitor access records for the facility where the information system resides.
- PE-8.3 - CCI-000948
- The organization reviews visitor access records in accordance with organization-defined frequency.
- PE-8(1) - Automated Records Maintenance And Review
- Maintain and review visitor access records using [Assignment: organization-defined automated mechanisms].
- PE-8(2) - Physical Access Records
- [Withdrawn: Incorporated into PE-2].
- PE-8(3) - Limit Personally Identifiable Information Elements
- Limit personally identifiable information contained in visitor access records to the following elements identified in the privacy risk assessment: [Assignment: organization-defined elements].
- RMF Control
- PE-9
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baselines
- CH FH CX NH FM NM CM
- PE-9.1 - CCI-000952
- The organization protects power equipment and power cabling for the information system from damage and destruction.
- PE-4 - Access Control For Transmission
- PE-9(1) - Redundant Cabling
- Employ redundant power cabling paths that are physically separated by [Assignment: organization-defined distance].
- PE-9(2) - Automatic Voltage Controls
- Employ automatic voltage controls for [Assignment: organization-defined critical system components].
- RMF Control
- PE-10
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baselines
- CH FH CX NH FM NM CM
- PE-10a.
- Provide the capability of shutting off power to [Assignment: organization-defined system or individual system components] in emergency situations;
- PE-10b.
- Place emergency shutoff switches or devices in [Assignment: organization-defined location by system or system component] to facilitate access for authorized personnel; and
- PE-10c.
- Protect emergency power shutoff capability from unauthorized activation.
- PE-10.1 - CCI-000956
- The organization provides the capability of shutting off power to the information system or individual system components in emergency situations.
- PE-10.2 - CCI-000957
- The organization places emergency shutoff switches or devices in an organization-defined location by information system or system component to facilitate safe and easy access for personnel.
- PE-10.3 - CCI-000958
- The organization defines a location for emergency shutoff switches or devices by information system or system component.
- PE-10.4 - CCI-000959
- The organization protects emergency power shutoff capability from unauthorized activation.
- PE-15 - Water Damage Protection
- PE-10(1) - Accidental And Unauthorized Activation
- [Withdrawn: Incorporated into PE-10].
- RMF Control
- PE-11
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baselines
- CH FH CX NH FM NM CM
- PE-11.1 - CCI-002955
- The organization provides a short-term uninterruptible power supply to facilitate an orderly shutdown of the information system and/or transition of the information system to long-term alternate power in the event of a primary power source loss.
- PE-11(1) - Alternate Power Supply — Minimal Operational Capability
- Provide an alternate power supply for the system that is activated [Selection: manually; automatically] and that can maintain minimally required operational capability in the event of an extended loss of the primary power source.
- PE-11(2) - Alternate Power Supply — Self-Contained
- Provide an alternate power supply for the system that is activated [Selection: manually; automatically] and that is:
- RMF Control
- PE-12
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baselines
- CH FS FH NH FM FL CL NL NM CM
- PE-12.1 - CCI-000963
- The organization employs and maintains automatic emergency lighting for the information system that activates in the event of a power outage or disruption and that covers emergency exits and evacuation routes within the facility.
- PE-12(1) - Essential Mission And Business Functions
- Provide emergency lighting for all areas within the facility supporting essential mission and business functions.
- RMF Control
- PE-13
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baselines
- CH FS FH NH FM FL CL NL NM CM
- PE-13.1 - CCI-000965
- The organization employs and maintains fire suppression and detection devices/systems for the information system that are supported by an independent energy source.
- AT-3 - Role-Based Training
- PE-13(1) - Detection Systems — Automatic Activation And Notification
- Employ fire detection systems that activate automatically and notify [Assignment: organization-defined personnel or roles] and [Assignment: organization-defined emergency responders] in the event of a fire.
- PE-13(2) - Suppression Systems — Automatic Activation And Notification
- PE-13(3) - Automatic Fire Suppression
- [Withdrawn: Incorporated into PE-13(2)].
- PE-13(4) - Inspections
- Ensure that the facility undergoes [Assignment: organization-defined frequency] fire protection inspections by authorized and qualified inspectors and identified deficiencies are resolved within [Assignment: organization-defined time period].
- RMF Control
- PE-14
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baselines
- CH FS FH CX NH FM FL CL NL NM CM
- PE-14a.
- Maintain [Selection (one or more): temperature; humidity; pressure; radiation; [Assignment: organization-defined environmental control]] levels within the facility where the system resides at [Assignment: organization-defined acceptable levels]; and
- PE-14b.
- Monitor environmental control levels [Assignment: organization-defined frequency].
- PE-14.1 - CCI-000971
- The organization maintains temperature and humidity levels within the facility where the information system resides at organization-defined acceptable levels.
- PE-14.2 - CCI-000972
- The organization defines acceptable temperature and humidity levels to be maintained within the facility where the information system resides.
- PE-14.3 - CCI-000973
- The organization monitors temperature and humidity levels in accordance with organization-defined frequency.
- PE-14.4 - CCI-000974
- The organization defines a frequency for monitoring temperature and humidity levels.
- PE-14(1) - Automatic Controls
- Employ the following automatic environmental controls in the facility to prevent fluctuations potentially harmful to the system: [Assignment: organization-defined automatic environmental controls].
- PE-14(2) - Monitoring With Alarms And Notifications
- Employ environmental control monitoring that provides an alarm or notification of changes potentially harmful to personnel or equipment to [Assignment: organization-defined personnel or roles].
- RMF Control
- PE-15
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baselines
- CH FS FH NH FM FL CL NL NM CM
- PE-15.1 - CCI-000977
- The organization protects the information system from damage resulting from water leakage by providing master shutoff or isolation valves that are accessible.
- PE-15.2 - CCI-000978
- The organization protects the information system from damage resulting from water leakage by providing master shutoff or isolation valves that are working properly.
- PE-15.3 - CCI-000979
- Key personnel have knowledge of the master water shutoff or isolation valves.
- PE-15(1) - Automation Support
- Detect the presence of water near the system and alert [Assignment: organization-defined personnel or roles] using [Assignment: organization-defined automated mechanisms].
- RMF Control
- PE-16
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baselines
- CH FS FH NH FM FL CL NL NM CM
- PE-16a.
- Authorize and control [Assignment: organization-defined types of system components] entering and exiting the facility; and
- PE-16b.
- Maintain records of the system components.
- PE-16.1 - CCI-000981
- The organization authorizes organization-defined types of information system components entering and exiting the facility.
- PE-16.2 - CCI-000982
- The organization monitors organization-defined types of information system components entering and exiting the facility.
- PE-16.3 - CCI-000983
- The organization controls organization-defined types of information system components entering and exiting the facility.
- PE-16.4 - CCI-000984
- The organization maintains records of information system components entering and exiting the facility.
- PE-16.5 - CCI-002974
- The organization defines types of information system components to authorize, monitor, and control entering and exiting the facility and to maintain records.
- CM-3 - Configuration Change Control
- CM-8 - System Component Inventory
- MA-2 - Controlled Maintenance
- MA-3 - Maintenance Tools
- MP-5 - Media Transport
- PE-20 - Asset Monitoring And Tracking
- SR-2 - Supply Chain Risk Management Plan
- SR-3 - Supply Chain Controls And Processes
- SR-4 - Provenance
- SR-6 - Supplier Assessments And Reviews
- RMF Control
- PE-17
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baselines
- CH FH NH FM NM CM
- PE-17a.
- Determine and document the [Assignment: organization-defined alternate work sites] allowed for use by employees;
- PE-17b.
- Employ the following controls at alternate work sites: [Assignment: organization-defined controls];
- PE-17c.
- Assess the effectiveness of controls at alternate work sites; and
- PE-17d.
- Provide a means for employees to communicate with information security and privacy personnel in case of incidents.
- PE-17.1 - CCI-000985
- The organization employs organization-defined security controls at alternate work sites.
- PE-17.3 - CCI-000987
- The organization assesses as feasible, the effectiveness of security controls at alternate work sites.
- PE-17.4 - CCI-000988
- The organization provides a means for employees to communicate with information security personnel in case of security incidents or problems.
- PE-17.2 - CCI-002975
- The organization defines security controls to employ at alternate work sites.
- Souppaya MP, Scarfone KA (2016) Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-46, Rev. 2., "SP 800-46" https://doi.org/10.6028/NIST.SP.800-46r2
- RMF Control
- PE-18
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baselines
- CH FH CX NH
- PE-18.1 - CCI-000989
- The organization positions information system components within the facility to minimize potential damage from organization-defined physical and environmental hazards.
- PE-18.2 - CCI-000991
- The organization positions information system components within the facility to minimize the opportunity for unauthorized access.
- PE-18.3 - CCI-002976
- The organization defines physical and environmental hazards that could cause potential damage to information system components within the facility.
- PE-18(1) - Facility Site
- [Withdrawn: Moved to PE-23].
- RMF Control
- PE-19
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baselines
- CX CC
- PE-19.1 - CCI-000993
- The organization protects the information system from information leakage due to electromagnetic signals emanations.
- National Institute of Standards and Technology (2004) Standards for Security Categorization of Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 199., "FIPS 199" https://doi.org/10.6028/NIST.FIPS.199
- PE-19(1) - National Emissions Policies And Procedures
- Protect system components, associated data communications, and networks in accordance with national Emissions Security policies and procedures based on the security category or classification of the information.
- RMF Control
- PE-20
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baselines
- CX
- PE-20.1 - CCI-002979
- The organization employs organization-defined asset location technologies to track and monitor the location and movement of organization-defined assets within organization-defined controlled areas.
- PE-20.2 - CCI-002980
- The organization defines asset location technologies to track and monitor the location and movement of organization-defined assets within organization-defined controlled areas.
- PE-20.3 - CCI-002981
- The organization defines the assets within the organization-defined controlled areas which are to be tracked and monitored for their location and movement.
- PE-20.4 - CCI-002982
- The organization defines controlled areas that the location and movement of organization-defined assets are tracked and monitored.
- PE-20.5 - CCI-002983
- The organization ensures that asset location technologies are employed in accordance with applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance.
- RMF Control
- PE-21
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baselines
- CX
- RMF Control
- PE-22
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baselines
- CH CC CL CM
- Dempsey KL, Paulsen C (2015) Risk Management for Replication Devices. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8023., "IR 8023" https://doi.org/10.6028/NIST.IR.8023
- RMF Control
- PE-23
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baselines
- CH CL
- PE-23a.
- Plan the location or site of the facility where the system resides considering physical and environmental hazards; and
- PE-23b.
- For existing facilities, consider the physical and environmental hazards in the organizational risk management strategy.
- RMF Control
- PL-1
- Subject Area
- PLANNING
- Baselines
- CH NP FS FH CP CX NH FM FL CL NL NM CM
- PL-1a.
- Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
- PL-1b.
- Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the planning policy and procedures; and
- PL-1c.
- Review and update the current planning:
- PL-1.1 - CCI-003047
- The organization defines the personnel or roles to whom a security planning policy is disseminated.
- PL-1.2 - CCI-003048
- The organization defines the personnel or roles to whom the security planning procedures are disseminated.
- PL-1.3 - CCI-000563
- The organization develops and documents a security planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- PL-1.4 - CCI-000564
- The organization disseminates a security planning policy to organization-defined personnel or roles.
- PL-1.5 - CCI-000566
- The organization develops and documents procedures to facilitate the implementation of the security planning policy and associated security planning controls.
- PL-1.6 - CCI-001636
- The organization defines the frequency to review and update the current security planning policy.
- PL-1.7 - CCI-001637
- The organization reviews and updates the current security planning policy in accordance with organization-defined frequency.
- PL-1.10 - CCI-001638
- The organization defines the frequency to review and update the current security planning procedures.
- PL-1.9 - CCI-000568
- The organization reviews and updates the current security planning procedures in accordance with organization-defined frequency.
- PL-1.8 - CCI-000567
- The organization disseminates security planning procedures to organization-defined personnel or roles.
- Bowen P, Hash J, Wilson M (2006) Information Security Handbook: A Guide for Managers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-100, Includes updates as of March 7, 2007., "SP 800-100" https://doi.org/10.6028/NIST.SP.800-100
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- Nieles M, Pillitteri VY, Dempsey KL (2017) An Introduction to Information Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-12, Rev. 1., "SP 800-12" https://doi.org/10.6028/NIST.SP.800-12r1
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Swanson MA, Hash J, Bowen P (2006) Guide for Developing Security Plans for Federal Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-18, Rev. 1., "SP 800-18" https://doi.org/10.6028/NIST.SP.800-18r1
- RMF Control
- PL-2
- Subject Area
- PLANNING
- Baselines
- CH NP FS FH CP CX NH FM FL CL NL NM CM
- PL-2a.
- Develop security and privacy plans for the system that:
- PL-2b.
- Distribute copies of the plans and communicate subsequent changes to the plans to [Assignment: organization-defined personnel or roles];
- PL-2c.
- Review the plans [Assignment: organization-defined frequency];
- PL-2d.
- Update the plans to address changes to the system and environment of operation or problems identified during plan implementation or control assessments; and
- PL-2e.
- Protect the plans from unauthorized disclosure and modification.
- PL-2.1 - CCI-003049
- The organization develops a security plan for the information system.
- PL-2.2 - CCI-003050
- The organization's security plan for the information system is consistent with the organization's enterprise architecture.
- PL-2.3 - CCI-003051
- The organization's security plan for the information system explicitly defines the authorization boundary for the system.
- PL-2.4 - CCI-003052
- The organization's security plan for the information system describes the operational context of the information system in terms of missions and business processes.
- PL-2.5 - CCI-003053
- The organization's security plan for the information system provides the security categorization of the information system including supporting rationale.
- PL-2.6 - CCI-003054
- The organization's security plan for the information system describes the operational environment for the information system and relationships with or connections to other information systems.
- PL-2.7 - CCI-003055
- The organization's security plan for the information system provides an overview of the security requirements for the system
- PL-2.8 - CCI-003056
- The organization's security plan for the information system identifies any relevant overlays, if applicable.
- PL-2.9 - CCI-003057
- The organization's security plan for the information system describes the security controls in place or planned for meeting those requirements including a rationale for the tailoring decisions.
- PL-2.10 - CCI-000571
- The organization's security plan for the information system is reviewed and approved by the authorizing official or designated representative prior to plan implementation.
- PL-2.11 - CCI-003059
- The organization distributes copies of the security plan to organization-defined personnel or roles.
- PL-2.12 - CCI-003060
- The organization defines the personnel or roles to whom copies of the security plan is distributed.
- PL-2.13 - CCI-003061
- The organization communicates subsequent changes to the security plan to organization-defined personnel or roles.
- PL-2.14 - CCI-003062
- The organization defines the personnel or roles to whom changes to the security plan are communicated.
- PL-2.15 - CCI-000572
- The organization defines the frequency for reviewing the security plan for the information system.
- PL-2.16 - CCI-000573
- The organization reviews the security plan for the information system in accordance with organization-defined frequency.
- PL-2.17 - CCI-000574
- The organization updates the plan to address changes to the information system/environment of operation or problems identified during plan implementation or security control assessments.
- PL-2.18 - CCI-003063
- The organization protects the security plan from unauthorized disclosure.
- PL-2.19 - CCI-003064
- The organization protects the security plan from unauthorized modification.
- AC-2 - Account Management
- AC-6 - Least Privilege
- AC-14 - Permitted Actions Without Identification Or Authentication
- AC-17 - Remote Access
- AC-20 - Use Of External Systems
- CA-2 - Control Assessments
- CA-3 - Information Exchange
- CA-7 - Continuous Monitoring
- CM-9 - Configuration Management Plan
- CM-13 - Data Action Mapping
- CP-2 - Contingency Plan
- CP-4 - Contingency Plan Testing
- IR-4 - Incident Handling
- IR-8 - Incident Response Plan
- MA-4 - Nonlocal Maintenance
- MA-5 - Maintenance Personnel
- MP-4 - Media Storage
- MP-5 - Media Transport
- PL-7 - Concept Of Operations
- PL-8 - Security And Privacy Architectures
- PL-10 - Baseline Selection
- PL-11 - Baseline Tailoring
- PM-1 - Information Security Program Plan
- PM-7 - Enterprise Architecture
- PM-8 - Critical Infrastructure Plan
- PM-9 - Risk Management Strategy
- PM-10 - Authorization Process
- PM-11 - Mission And Business Process Definition
- RA-3 - Risk Assessment
- RA-8 - Privacy Impact Assessments
- RA-9 - Criticality Analysis
- SA-5 - System Documentation
- SA-17 - Developer Security And Privacy Architecture And Design
- SA-22 - Unsupported System Components
- SI-12 - Information Management And Retention
- SR-2 - Supply Chain Risk Management Plan
- SR-4 - Provenance
- Joint Task Force (2018) Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2., "SP 800-37" https://doi.org/10.6028/NIST.SP.800-37r2
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- Ross RS, Pillitteri VY, Graubart R, Bodeau D, McQuaid R (2019) Developing Cyber Resilient Systems: A Systems Security Engineering Approach. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 2., "SP 800-160-2" https://doi.org/10.6028/NIST.SP.800-160v2
- Swanson MA, Hash J, Bowen P (2006) Guide for Developing Security Plans for Federal Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-18, Rev. 1., "SP 800-18" https://doi.org/10.6028/NIST.SP.800-18r1
- PL-2(1) - Concept Of Operations
- [Withdrawn: Incorporated into PL-7].
- PL-2(2) - Functional Architecture
- [Withdrawn: Incorporated into PL-8].
- PL-2(3) - Plan And Coordinate With Other Organizational Entities
- [Withdrawn: Incorporated into PL-2].
- RMF Control
- PL-3
- Subject Area
- PLANNING
- Baselines
- —
- RMF Control
- PL-4
- Subject Area
- PLANNING
- Baselines
- CH NP FS FH CP NH FM FL CL NL NM CM
- PL-4a.
- Establish and provide to individuals requiring access to the system, the rules that describe their responsibilities and expected behavior for information and system usage, security, and privacy;
- PL-4b.
- Receive a documented acknowledgment from such individuals, indicating that they have read, understand, and agree to abide by the rules of behavior, before authorizing access to information and the system;
- PL-4c.
- Review and update the rules of behavior [Assignment: organization-defined frequency]; and
- PL-4d.
- Require individuals who have acknowledged a previous version of the rules of behavior to read and re-acknowledge [Selection (one or more): [Assignment: organization-defined frequency]; when the rules are revised or updated].
- PL-4.1 - CCI-000592
- The organization establishes the rules describing the responsibilities and expected behavior, with regard to information and information system usage, for individuals requiring access to the information system.
- PL-4.2 - CCI-001639
- The organization makes readily available to individuals requiring access to the information system, the rules that describe their responsibilities and expected behavior with regard to information and information system usage.
- PL-4.3 - CCI-000593
- The organization receives a signed acknowledgment from individuals requiring access the system, indicating that they have read, understand, and agree to abide by the rules of behavior, before authorizing access to information and the information system.
- PL-4.5 - CCI-003069
- The organization defines the frequency to review and update the rules of behavior.
- PL-4.4 - CCI-003068
- The organization reviews and updates the rules of behavior in accordance with organization-defined frequency.
- PL-4.6 - CCI-003070
- The organization requires individuals who have signed a previous version of the rules of behavior to read and resign when the rules of behavior are revised/updated.
- AC-2 - Account Management
- AC-6 - Least Privilege
- AC-8 - System Use Notification
- AC-9 - Previous Logon Notification
- AC-17 - Remote Access
- AC-18 - Wireless Access
- AC-19 - Access Control For Mobile Devices
- AC-20 - Use Of External Systems
- AT-2 - Literacy Training And Awareness
- AT-3 - Role-Based Training
- CM-11 - User-Installed Software
- IA-2 - Identification And Authentication (Organizational Users)
- IA-4 - Identifier Management
- IA-5 - Authenticator Management
- MP-7 - Media Use
- PS-6 - Access Agreements
- PS-8 - Personnel Sanctions
- SA-5 - System Documentation
- SI-12 - Information Management And Retention
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Swanson MA, Hash J, Bowen P (2006) Guide for Developing Security Plans for Federal Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-18, Rev. 1., "SP 800-18" https://doi.org/10.6028/NIST.SP.800-18r1
- PL-4(1) - Social Media And External Site/Application Usage Restrictions
- Include in the rules of behavior, restrictions on:
- RMF Control
- PL-5
- Subject Area
- PLANNING
- Baselines
- —
- RMF Control
- PL-6
- Subject Area
- PLANNING
- Baselines
- —
- RMF Control
- PL-7
- Subject Area
- PLANNING
- Baselines
- CH CX CL CM
- PL-7a.
- Develop a Concept of Operations (CONOPS) for the system describing how the organization intends to operate the system from the perspective of information security and privacy; and
- PL-7b.
- Review and update the CONOPS [Assignment: organization-defined frequency].
- PL-7.1 - CCI-003071
- The organization develops a security Concept of Operations (CONOPS) for the information system containing at a minimum, how the organization intends to operate the system from the perspective of information security.
- PL-7.2 - CCI-000577
- The organization defines the frequency to review and update the security CONOPS.
- PL-7.3 - CCI-000578
- The organization reviews and updates the security CONOPS in accordance with organization-defined frequency.
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- RMF Control
- PL-8
- Subject Area
- PLANNING
- Baselines
- CH NP FS FH CX NH FM FL CL NM CM
- PL-8a.
- Develop security and privacy architectures for the system that:
- PL-8b.
- Review and update the architectures [Assignment: organization-defined frequency] to reflect changes in the enterprise architecture; and
- PL-8c.
- Reflect planned architecture changes in security and privacy plans, Concept of Operations (CONOPS), criticality analysis, organizational procedures, and procurements and acquisitions.
- PL-8.1 - CCI-003072
- The organization develops an information security architecture for the information system.
- PL-8.2 - CCI-003073
- The organization's information security architecture for the information system describes the overall philosophy, requirements, and approach to be taken with regard to protecting the confidentiality, integrity, and availability of organizational information.
- PL-8.3 - CCI-003074
- The organization's information security architecture for the information system describes how the information security architecture is integrated into and supports the enterprise architecture.
- PL-8.4 - CCI-003075
- The organization's information security architecture for the information system describes any information security assumptions about, and dependencies on, external services.
- PL-8.5 - CCI-003076
- The organization reviews and updates the information security architecture in accordance with organization-defined frequency to reflect updates in the enterprise architecture.
- PL-8.6 - CCI-003077
- The organization defines the frequency to review and update the information system architecture.
- PL-8.7 - CCI-003078
- The organization ensures that planned information security architecture changes are reflected in the security plan.
- PL-8.8 - CCI-003079
- The organization ensures that planned information security architecture changes are reflected in the security Concept of Operations (CONOPS).
- PL-8.9 - CCI-003080
- The organization ensures that planned information security architecture changes are reflected in organizational procurements/acquisitions.
- CM-2 - Baseline Configuration
- CM-6 - Configuration Settings
- PL-2 - System Security And Privacy Plans
- PL-7 - Concept Of Operations
- PL-9 - Central Management
- PM-5 - System Inventory
- PM-7 - Enterprise Architecture
- RA-9 - Criticality Analysis
- SA-3 - System Development Life Cycle
- SA-5 - System Documentation
- SA-8 - Security And Privacy Engineering Principles
- SA-17 - Developer Security And Privacy Architecture And Design
- SC-7 - Boundary Protection
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- Ross RS, Pillitteri VY, Graubart R, Bodeau D, McQuaid R (2019) Developing Cyber Resilient Systems: A Systems Security Engineering Approach. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 2., "SP 800-160-2" https://doi.org/10.6028/NIST.SP.800-160v2
- PL-8(1) - Defense In Depth
- Design the security and privacy architectures for the system using a defense-in-depth approach that:
- PL-8(2) - Supplier Diversity
- Require that [Assignment: organization-defined controls] allocated to [Assignment: organization-defined locations and architectural layers] are obtained from different suppliers.
- RMF Control
- PL-9
- Subject Area
- PLANNING
- Baselines
- CH NP CP CL CM
- PL-9.1 - CCI-003117
- The organization centrally manages organization-defined security controls and related processes.
- PL-9.2 - CCI-003118
- The organization defines security controls and related processes to be centrally managed.
- Joint Task Force (2018) Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2., "SP 800-37" https://doi.org/10.6028/NIST.SP.800-37r2
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- RMF Control
- PL-10
- Subject Area
- PLANNING
- Baselines
- CH FS FH CP CX NH FM FL CL NL NM CM
- Committee on National Security Systems Instruction No. 1253, , March 2014., "CNSSI 1253" https://www.cnss.gov/CNSS/issuances/Instructions.c
- Joint Task Force (2018) Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2., "SP 800-37" https://doi.org/10.6028/NIST.SP.800-37r2
- Joint Task Force (2020) Control Baselines and Tailoring Guidance for Federal Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-53B., "SP 800-53B" https://doi.org/10.6028/NIST.SP.800-53B
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- National Institute of Standards and Technology (2004) Standards for Security Categorization of Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 199., "FIPS 199" https://doi.org/10.6028/NIST.FIPS.199
- National Institute of Standards and Technology (2006) Minimum Security Requirements for Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 200., "FIPS 200" https://doi.org/10.6028/NIST.FIPS.200
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- Stine KM, Kissel RL, Barker WC, Fahlsing J, Gulick J (2008) Guide for Mapping Types of Information and Information Systems to Security Categories. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-60, Vol. 1, Rev. 1., "SP 800-60-1" https://doi.org/10.6028/NIST.SP.800-60v1r1
- Stine KM, Kissel RL, Barker WC, Lee A, Fahlsing J (2008) Guide for Mapping Types of Information and Information Systems to Security Categories: Appendices. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-60, Vol. 2, Rev. 1., "SP 800-60-2" https://doi.org/10.6028/NIST.SP.800-60v2r1
- RMF Control
- PL-11
- Subject Area
- PLANNING
- Baselines
- CH FS FH CP CX NH FM FL CL NL NM CM
- Committee on National Security Systems Instruction No. 1253, , March 2014., "CNSSI 1253" https://www.cnss.gov/CNSS/issuances/Instructions.c
- Joint Task Force (2018) Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2., "SP 800-37" https://doi.org/10.6028/NIST.SP.800-37r2
- Joint Task Force (2020) Control Baselines and Tailoring Guidance for Federal Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-53B., "SP 800-53B" https://doi.org/10.6028/NIST.SP.800-53B
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- National Institute of Standards and Technology (2004) Standards for Security Categorization of Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 199., "FIPS 199" https://doi.org/10.6028/NIST.FIPS.199
- National Institute of Standards and Technology (2006) Minimum Security Requirements for Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 200., "FIPS 200" https://doi.org/10.6028/NIST.FIPS.200
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- Stine KM, Kissel RL, Barker WC, Fahlsing J, Gulick J (2008) Guide for Mapping Types of Information and Information Systems to Security Categories. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-60, Vol. 1, Rev. 1., "SP 800-60-1" https://doi.org/10.6028/NIST.SP.800-60v1r1
- Stine KM, Kissel RL, Barker WC, Lee A, Fahlsing J (2008) Guide for Mapping Types of Information and Information Systems to Security Categories: Appendices. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-60, Vol. 2, Rev. 1., "SP 800-60-2" https://doi.org/10.6028/NIST.SP.800-60v2r1
- RMF Control
- PM-1
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- CX
- PM-1a.
- Develop and disseminate an organization-wide information security program plan that:
- PM-1b.
- Review and update the organization-wide information security program plan [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]; and
- PM-1c.
- Protect the information security program plan from unauthorized disclosure and modification.
- PM-1.1 - CCI-000073
- The organization develops an organization-wide information security program plan that provides an overview of the requirements for the security program and a description of the security program management controls and common controls in place or planned for meeting those requirements.
- PM-1.2 - CCI-002985
- The organization disseminates an organization-wide information security program plan that provides an overview of the requirements for the security program and a description of the security program management controls and common controls in place or planned for meeting those requirements.
- PM-1.4 - CCI-001680
- The organization develops an organization-wide information security program plan that includes the identification and assignment of roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- PM-1.3 - CCI-002986
- The organization disseminates an organization-wide information security program plan that includes the identification and assignment of roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- PM-1.5 - CCI-002984
- The organization develops an organization-wide information security program plan that reflects coordination among organizational entities responsible for the different aspects of information security (i.e., technical, physical, personnel, cyber-physical).
- PM-1.6 - CCI-002987
- The organization disseminates an organization-wide information security program plan that reflects coordination among organizational entities responsible for the different aspects of information security (i.e., technical, physical, personnel, cyber-physical).
- PM-1.8 - CCI-000074
- The organization develops an organization-wide information security program plan that is approved by a senior official with responsibility and accountability for the risk being incurred to organizational operations (including mission, functions, image, and reputation), organizational assets, individuals, other organizations, and the Nation.
- PM-1.7 - CCI-002988
- The organization disseminates an organization-wide information security program plan that is approved by a senior official with responsibility and accountability for the risk being incurred to organizational operations (including mission, functions, image, and reputation), organizational assets, individuals, other organizations, and the Nation.
- PM-1.10 - CCI-000076
- The organization defines the frequency to review the organization-wide information security program plan.
- PM-1.9 - CCI-000075
- The organization reviews the organization-wide information security program plan on an organization-defined frequency.
- PM-1.11 - CCI-000077
- The organization updates the plan to address organizational changes and problems identified during plan implementation or security control assessments.
- PM-1.12 - CCI-002989
- The organization protects the information security program plan from unauthorized disclosure.
- PM-1.13 - CCI-002990
- The organization protects the information security program plan from unauthorized modification.
- Federal Information Security Modernization Act (P.L. 113-283), December 2014., "FISMA" https://www.congress.gov/113/plaws/publ283/PLAW-11
- Joint Task Force (2018) Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2., "SP 800-37" https://doi.org/10.6028/NIST.SP.800-37r2
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- RMF Control
- PM-2
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- —
- PM-2.1 - CCI-000078
- The organization appoints a senior information security officer with the mission and resources to coordinate, develop, implement, and maintain an organization-wide information security program.
- Joint Task Force (2018) Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2., "SP 800-37" https://doi.org/10.6028/NIST.SP.800-37r2
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Office of Management and Budget Memorandum M-17-25, , May 2017., "OMB M-17-25" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Petersen R, Santos D, Smith MC, Wetzel KA, Witte G (2020) Workforce Framework for Cybersecurity (NICE Framework). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-181, Rev. 1., "SP 800-181" https://doi.org/10.6028/NIST.SP.800-181r1
- RMF Control
- PM-3
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- NP
- PM-3a.
- Include the resources needed to implement the information security and privacy programs in capital planning and investment requests and document all exceptions to this requirement;
- PM-3b.
- Prepare documentation required for addressing information security and privacy programs in capital planning and investment requests in accordance with applicable laws, executive orders, directives, policies, regulations, standards; and
- PM-3c.
- Make available for expenditure, the planned information security and privacy resources.
- PM-3.1 - CCI-000080
- The organization ensures that all capital planning and investment requests include the resources needed to implement the information security program and documents all exceptions to this requirement.
- PM-3.2 - CCI-000081
- The organization employs a business case/Exhibit 300/Exhibit 53 to record the resources required.
- PM-3.3 - CCI-000141
- The organization ensures that information security resources are available for expenditure as planned.
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- RMF Control
- PM-4
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- NP
- PM-4a.
- Implement a process to ensure that plans of action and milestones for the information security, privacy, and supply chain risk management programs and associated organizational systems:
- PM-4b.
- Review plans of action and milestones for consistency with the organizational risk management strategy and organization-wide priorities for risk response actions.
- PM-4.2 - CCI-002991
- The organization implements a process for ensuring that plans of action and milestones for the security program and associated organizational information systems are developed.
- PM-4.1 - CCI-000142
- The organization implements a process for ensuring that plans of action and milestones for the security program and the associated organizational information systems are maintained.
- PM-4.3 - CCI-000170
- The organization implements a process for ensuring that plans of action and milestones for the security program and associated organizational information systems document the remedial information security actions to adequately respond to risk to organizational operations and assets, individuals, other organizations, and the Nation.
- PM-4.4 - CCI-002992
- The organization implements a process for ensuring that plans of action and milestones for the security program and associated organizational information systems are reported in accordance with OMB FISMA reporting requirements.
- PM-4.5 - CCI-002993
- The organization reviews plans of action and milestones for the security program and associated organization information systems for consistency with the organizational risk management strategy and organization-wide priorities for risk response actions.
- Joint Task Force (2018) Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2., "SP 800-37" https://doi.org/10.6028/NIST.SP.800-37r2
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Privacy Act (P.L. 93-579), December 1974., "PRIVACT" https://www.govinfo.gov/content/pkg/STATUTE-88/pdf
- RMF Control
- PM-5
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- NP
- PM-5.1 - CCI-000207
- The organization develops and maintains an inventory of its information systems.
- Brooks S, Garcia M, Lefkovitz N, Lightman S, Nadeau E (2017) An Introduction to Privacy Engineering and Risk Management in Federal Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8062., "IR 8062" https://doi.org/10.6028/NIST.IR.8062
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- PM-5(1) - Inventory Of Personally Identifiable Information
- Establish, maintain, and update [Assignment: organization-defined frequency] an inventory of all systems, applications, and projects that process personally identifiable information.
- RMF Control
- PM-6
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- NP CP
- PM-6.1 - CCI-000209
- The organization develops the results of information security measures of performance.
- PM-6.2 - CCI-000210
- The organization monitors the results of information security measures of performance.
- PM-6.3 - CCI-000211
- The organization reports on the results of information security measures of performance.
- Chew E, Swanson MA, Stine KM, Bartol N, Brown A, Robinson W (2008) Performance Measurement Guide for Information Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-55, Rev. 1., "SP 800-55" https://doi.org/10.6028/NIST.SP.800-55r1
- Dempsey KL, Chawla NS, Johnson LA, Johnston R, Jones AC, Orebaugh AD, Scholl MA, Stine KM (2011) Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-137., "SP 800-137" https://doi.org/10.6028/NIST.SP.800-137
- Joint Task Force (2018) Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2., "SP 800-37" https://doi.org/10.6028/NIST.SP.800-37r2
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- RMF Control
- PM-7
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- NP CP
- PM-7.1 - CCI-000212
- The organization develops an enterprise architecture with consideration for information security and the resulting risk to organizational operations, organizational assets, individuals, other organizations, and the Nation.
- AU-6 - Audit Record Review, Analysis, And Reporting
- PL-2 - System Security And Privacy Plans
- PL-8 - Security And Privacy Architectures
- PM-11 - Mission And Business Process Definition
- RA-2 - Security Categorization
- SA-3 - System Development Life Cycle
- SA-8 - Security And Privacy Engineering Principles
- SA-17 - Developer Security And Privacy Architecture And Design
- Joint Task Force (2018) Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2., "SP 800-37" https://doi.org/10.6028/NIST.SP.800-37r2
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- Ross RS, Pillitteri VY, Graubart R, Bodeau D, McQuaid R (2019) Developing Cyber Resilient Systems: A Systems Security Engineering Approach. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 2., "SP 800-160-2" https://doi.org/10.6028/NIST.SP.800-160v2
- PM-7(1) - Offloading
- Offload [Assignment: organization-defined non-essential functions or services] to other systems, system components, or an external provider.
- RMF Control
- PM-8
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- NP
- PM-8.1 - CCI-000216
- The organization develops and documents a critical infrastructure and key resource protection plan that addresses information security issues.
- PM-8.2 - CCI-001640
- The organization updates the critical infrastructure and key resources protection plan that addresses information security issues.
- CP-2 - Contingency Plan
- CP-4 - Contingency Plan Testing
- PE-18 - Location Of System Components
- PL-2 - System Security And Privacy Plans
- PM-9 - Risk Management Strategy
- PM-11 - Mission And Business Process Definition
- PM-18 - Privacy Program Plan
- RA-3 - Risk Assessment
- SI-12 - Information Management And Retention
- Department of Homeland Security, , 2009., "DHS NIPP" https://www.dhs.gov/xlibrary/assets/NIPP_Plan.pdf
- Executive Order 13636, , February 2013., "EO 13636" https://obamawhitehouse.archives.gov/the-press-off
- Homeland Security Presidential Directive 7, , December 2003., "HSPD 7" https://www.dhs.gov/homeland-security-presidential
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- RMF Control
- PM-9
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- NP
- PM-9a.
- Develops a comprehensive strategy to manage:
- PM-9b.
- Implement the risk management strategy consistently across the organization; and
- PM-9c.
- Review and update the risk management strategy [Assignment: organization-defined frequency] or as required, to address organizational changes.
- PM-9.1 - CCI-000227
- The organization develops a comprehensive strategy to manage risk to organizational operations and assets, individuals, other organizations, and the Nation associated with the operation and use of information systems.
- PM-9.2 - CCI-000228
- The organization implements a comprehensive strategy to manage risk to organization operations and assets, individuals, other organizations, and the Nation associated with the operation and use of information systems consistently across the organization.
- PM-9.3 - CCI-002994
- The organization reviews and updates the risk management strategy in accordance with organization-defined frequency or as required, to address organizational changes.
- PM-9.4 - CCI-002995
- The organization defines the frequency to review and update the risk management strategy to address organizational changes.
- AC-1 - Policy And Procedures
- AT-1 - Policy And Procedures
- AU-1 - Policy And Procedures
- CA-1 - Policy And Procedures
- CA-2 - Control Assessments
- CA-5 - Plan Of Action And Milestones
- CA-6 - Authorization
- CA-7 - Continuous Monitoring
- CM-1 - Policy And Procedures
- CP-1 - Policy And Procedures
- IA-1 - Policy And Procedures
- IR-1 - Policy And Procedures
- MA-1 - Policy And Procedures
- MP-1 - Policy And Procedures
- PE-1 - Policy And Procedures
- PL-1 - Policy And Procedures
- PL-2 - System Security And Privacy Plans
- PM-2 - Information Security Program Leadership Role
- PM-8 - Critical Infrastructure Plan
- PM-18 - Privacy Program Plan
- PM-28 - Risk Framing
- PM-30 - Supply Chain Risk Management Strategy
- PS-1 - Policy And Procedures
- PT-1 - Policy And Procedures
- PT-2 - Authority To Process Personally Identifiable Information
- PT-3 - Personally Identifiable Information Processing Purposes
- RA-1 - Policy And Procedures
- RA-3 - Risk Assessment
- RA-9 - Criticality Analysis
- SA-1 - Policy And Procedures
- SA-4 - Acquisition Process
- SC-1 - Policy And Procedures
- SC-38 - Operations Security
- SI-1 - Policy And Procedures
- SI-12 - Information Management And Retention
- SR-1 - Policy And Procedures
- SR-2 - Supply Chain Risk Management Plan
- Boyens JM, Paulsen C, Moorthy R, Bartol N (2015) Supply Chain Risk Management Practices for Federal Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-161., "SP 800-161" https://doi.org/10.6028/NIST.SP.800-161
- Dempsey KL, Paulsen C (2015) Risk Management for Replication Devices. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8023., "IR 8023" https://doi.org/10.6028/NIST.IR.8023
- Joint Task Force (2018) Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2., "SP 800-37" https://doi.org/10.6028/NIST.SP.800-37r2
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- RMF Control
- PM-10
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- NP CP
- PM-10a.
- Manage the security and privacy state of organizational systems and the environments in which those systems operate through authorization processes;
- PM-10b.
- Designate individuals to fulfill specific roles and responsibilities within the organizational risk management process; and
- PM-10c.
- Integrate the authorization processes into an organization-wide risk management program.
- PM-10.1 - CCI-000229
- The organization documents the security state of organizational information systems and the environments in which those systems operate through security authorization processes.
- PM-10.2 - CCI-000230
- The organization tracks the security state of organizational information systems and the environments in which those systems operate through security authorization processes.
- PM-10.3 - CCI-000231
- The organization reports the security state of organizational information systems and the environments in which those systems operate through security authorization processes.
- PM-10.4 - CCI-000233
- The organization designates individuals to fulfill specific roles and responsibilities within the organizational risk management process.
- PM-10.5 - CCI-000234
- The organization fully integrates the security authorization processes into an organization-wide risk management program.
- Joint Task Force (2018) Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2., "SP 800-37" https://doi.org/10.6028/NIST.SP.800-37r2
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Petersen R, Santos D, Smith MC, Wetzel KA, Witte G (2020) Workforce Framework for Cybersecurity (NICE Framework). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-181, Rev. 1., "SP 800-181" https://doi.org/10.6028/NIST.SP.800-181r1
- RMF Control
- PM-11
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- NP CP CX
- PM-11a.
- Define organizational mission and business processes with consideration for information security and privacy and the resulting risk to organizational operations, organizational assets, individuals, other organizations, and the Nation; and
- PM-11b.
- Determine information protection and personally identifiable information processing needs arising from the defined mission and business processes; and
- PM-11c.
- Review and revise the mission and business processes [Assignment: organization-defined frequency].
- PM-11.1 - CCI-000235
- The organization defines mission/business processes with consideration for information security and the resulting risk to organizational operations, organizational assets, individuals, other organizations, and the Nation.
- PM-11.2 - CCI-000236
- The organization determines information protection needs arising from the defined mission/business processes and revises the processes as necessary, until an achievable set of protection needs are obtained.
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- National Institute of Standards and Technology (2004) Standards for Security Categorization of Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 199., "FIPS 199" https://doi.org/10.6028/NIST.FIPS.199
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- Stine KM, Kissel RL, Barker WC, Fahlsing J, Gulick J (2008) Guide for Mapping Types of Information and Information Systems to Security Categories. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-60, Vol. 1, Rev. 1., "SP 800-60-1" https://doi.org/10.6028/NIST.SP.800-60v1r1
- Stine KM, Kissel RL, Barker WC, Lee A, Fahlsing J (2008) Guide for Mapping Types of Information and Information Systems to Security Categories: Appendices. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-60, Vol. 2, Rev. 1., "SP 800-60-2" https://doi.org/10.6028/NIST.SP.800-60v2r1
- RMF Control
- PM-12
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- CX CC
- PM-12.1 - CCI-002996
- The organization implements an insider threat program that includes a cross-discipline insider threat incident handling team.
- AC-6 - Least Privilege
- AT-2 - Literacy Training And Awareness
- AU-6 - Audit Record Review, Analysis, And Reporting
- AU-7 - Audit Record Reduction And Report Generation
- AU-10 - Non-Repudiation
- AU-12 - Audit Record Generation
- AU-13 - Monitoring For Information Disclosure
- CA-7 - Continuous Monitoring
- IA-4 - Identifier Management
- IR-4 - Incident Handling
- MP-7 - Media Use
- PE-2 - Physical Access Authorizations
- PM-14 - Testing, Training, And Monitoring
- PM-16 - Threat Awareness Program
- PS-3 - Personnel Screening
- PS-4 - Personnel Termination
- PS-5 - Personnel Transfer
- PS-7 - External Personnel Security
- PS-8 - Personnel Sanctions
- SC-7 - Boundary Protection
- SC-38 - Operations Security
- SI-4 - System Monitoring
- Executive Order 13587, , October 2011., "EO 13587" https://obamawhitehouse.archives.gov/the-press-off
- Office of the Director National Intelligence, , "ODNI NITP" https://www.dni.gov/files/NCSC/documents/nittf/Nat
- Presidential Memorandum for the Heads of Executive Departments and Agencies, , November 2012., "NITP12" https://obamawhitehouse.archives.gov/the-press-off
- RMF Control
- PM-13
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- NP CP
- PM-13.1 - CCI-002997
- The organization establishes an information security workforce development and improvement program.
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Petersen R, Santos D, Smith MC, Wetzel KA, Witte G (2020) Workforce Framework for Cybersecurity (NICE Framework). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-181, Rev. 1., "SP 800-181" https://doi.org/10.6028/NIST.SP.800-181r1
- RMF Control
- PM-14
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- NP CP CX
- PM-14a.
- Implement a process for ensuring that organizational plans for conducting security and privacy testing, training, and monitoring activities associated with organizational systems:
- PM-14b.
- Review testing, training, and monitoring plans for consistency with the organizational risk management strategy and organization-wide priorities for risk response actions.
- PM-14.1 - CCI-002998
- The organization implements a process for ensuring that organizational plans for conducting security testing activities associated with organizational information systems are developed.
- PM-14.2 - CCI-002999
- The organization implements a process for ensuring that organizational plans for conducting security testing activities associated with organizational information systems are maintained.
- PM-14.3 - CCI-003000
- The organization implements a process for ensuring that organizational plans for conducting security training activities associated with organizational information systems are developed.
- PM-14.4 - CCI-003001
- The organization implements a process for ensuring that organizational plans for conducting security training activities associated with organizational information systems are maintained.
- PM-14.5 - CCI-003002
- The organization implements a process for ensuring that organizational plans for conducting security monitoring activities associated with organizational information systems are developed.
- PM-14.6 - CCI-003003
- The organization implements a process for ensuring that organizational plans for conducting security monitoring activities associated with organizational information systems are maintained.
- PM-14.7 - CCI-003004
- The organization implements a process for ensuring that organizational plans for conducting security testing associated with organizational information systems continue to be executed in a timely manner.
- PM-14.8 - CCI-003005
- The organization implements a process for ensuring that organizational plans for conducting security training associated with organizational information systems continue to be executed in a timely manner.
- PM-14.9 - CCI-003006
- The organization implements a process for ensuring that organizational plans for conducting security monitoring activities associated with organizational information systems continue to be executed in a timely manner.
- PM-14.10 - CCI-003007
- The organization reviews testing plans for consistency with the organizational risk management strategy and organization-wide priorities for risk response actions.
- PM-14.11 - CCI-003008
- The organization reviews training plans for consistency with the organizational risk management strategy and organization-wide priorities for risk response actions.
- PM-14.12 - CCI-003009
- The organization reviews monitoring plans for consistency with the organizational risk management strategy and organization-wide priorities for risk response actions.
- Dempsey KL, Chawla NS, Johnson LA, Johnston R, Jones AC, Orebaugh AD, Scholl MA, Stine KM (2011) Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-137., "SP 800-137" https://doi.org/10.6028/NIST.SP.800-137
- Joint Task Force (2018) Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2., "SP 800-37" https://doi.org/10.6028/NIST.SP.800-37r2
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Joint Task Force Transformation Initiative (2014) Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-53A, Rev. 4, Includes updates as of December 18, 2014., "SP 800-53A" https://doi.org/10.6028/NIST.SP.800-53Ar4
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Scarfone KA, Souppaya MP, Cody A, Orebaugh AD (2008) Technical Guide to Information Security Testing and Assessment. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-115., "SP 800-115" https://doi.org/10.6028/NIST.SP.800-115
- RMF Control
- PM-15
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- —
- PM-15a.
- To facilitate ongoing security and privacy education and training for organizational personnel;
- PM-15b.
- To maintain currency with recommended security and privacy practices, techniques, and technologies; and
- PM-15c.
- To share current security and privacy information, including threats, vulnerabilities, and incidents.
- PM-15.1 - CCI-003010
- The organization establishes and institutionalizes contact with selected groups and associations within the security community to facilitate ongoing security education and training for organizational personnel.
- PM-15.2 - CCI-003011
- The organization establishes and institutionalizes contact with selected groups and associations within the security community to maintain currency with recommended security practices, techniques, and technologies.
- PM-15.3 - CCI-003012
- The organization establishes and institutionalizes contact with selected groups and associations within the security community to share current security-related information including threats, vulnerabilities, and incidents.
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- RMF Control
- PM-16
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- CX
- PM-16.1 - CCI-003013
- The organization implements a threat awareness program that includes a cross-organization information-sharing capability.
- PM-16(1) - Automated Means For Sharing Threat Intelligence
- Employ automated mechanisms to maximize the effectiveness of sharing threat intelligence information.
- RMF Control
- PM-17
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- NP CP CX
- PM-17a.
- Establish policy and procedures to ensure that requirements for the protection of controlled unclassified information that is processed, stored or transmitted on external systems, are implemented in accordance with applicable laws, executive orders, directives, policies, regulations, and standards; and
- PM-17b.
- Review and update the policy and procedures [Assignment: organization-defined frequency].
- Code of Federal Regulations, Title 32, (32 C.F.R. 2002)., "32 CFR 2002" https://www.federalregister.gov/documents/2016/09/
- National Archives and Records Administration, Controlled Unclassified Information (CUI) Registry., "NARA CUI" https://www.archives.gov/cui
- Ross RS, Pillitteri VY, Dempsey KL, Riddle M, Guissanie G (2020) Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-171, Rev. 2., "SP 800-171" https://doi.org/10.6028/NIST.SP.800-171r2
- Ross RS, Pillitteri VY, Graubart RD, Guissanie G, Wagner R, Bodeau D (2020) Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800-171 (Final Public Draft). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-172., "SP 800-172" https://doi.org/10.6028/NIST.SP.800-172-draft
- RMF Control
- PM-18
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- NP CP
- PM-18a.
- Develop and disseminate an organization-wide privacy program plan that provides an overview of the agency’s privacy program, and:
- PM-18b.
- Update the plan [Assignment: organization-defined frequency] and to address changes in federal privacy laws and policy and organizational changes and problems identified during plan implementation or privacy control assessments.
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Privacy Act (P.L. 93-579), December 1974., "PRIVACT" https://www.govinfo.gov/content/pkg/STATUTE-88/pdf
- RMF Control
- PM-19
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- NP CP
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- RMF Control
- PM-20
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- NP CP
- PM-20a.
- Ensures that the public has access to information about organizational privacy activities and can communicate with its senior agency official for privacy;
- PM-20b.
- Ensures that organizational privacy practices and reports are publicly available; and
- PM-20c.
- Employs publicly facing email addresses and/or phone lines to enable the public to provide feedback and/or direct questions to privacy offices regarding privacy practices.
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Office of Management and Budget Memorandum M-17-06, , November 2016., "OMB M-17-06" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Privacy Act (P.L. 93-579), December 1974., "PRIVACT" https://www.govinfo.gov/content/pkg/STATUTE-88/pdf
- PM-20(1) - Privacy Policies On Websites, Applications, And Digital Services
- Develop and post privacy policies on all external-facing websites, mobile applications, and other digital services, that:
- RMF Control
- PM-21
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- NP
- PM-21a.
- Develop and maintain an accurate accounting of disclosures of personally identifiable information, including:
- PM-21b.
- Retain the accounting of disclosures for the length of the time the personally identifiable information is maintained or five years after the disclosure is made, whichever is longer; and
- PM-21c.
- Make the accounting of disclosures available to the individual to whom the personally identifiable information relates upon request.
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Privacy Act (P.L. 93-579), December 1974., "PRIVACT" https://www.govinfo.gov/content/pkg/STATUTE-88/pdf
- RMF Control
- PM-22
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- NP CP
- PM-22a.
- Reviewing for the accuracy, relevance, timeliness, and completeness of personally identifiable information across the information life cycle;
- PM-22b.
- Correcting or deleting inaccurate or outdated personally identifiable information;
- PM-22c.
- Disseminating notice of corrected or deleted personally identifiable information to individuals or other appropriate entities; and
- PM-22d.
- Appeals of adverse decisions on correction or deletion requests.
- Garfinkel S (2016) De-Identifying Government Datasets. (National Institute of Standards and Technology, Gaithersburg, MD), Second Draft NIST Special Publication (SP) 800-188., "SP 800-188" https://csrc.nist.gov/publications/detail/sp/800-1
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Office of Management and Budget Memorandum M-19-15, , April 2019., "OMB M-19-15" https://www.whitehouse.gov/wp-content/uploads/2019
- RMF Control
- PM-23
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- CP
- AT-2 - Literacy Training And Awareness
- AT-3 - Role-Based Training
- PM-19 - Privacy Program Leadership Role
- PM-22 - Personally Identifiable Information Quality Management
- PM-24 - Data Integrity Board
- PT-7 - Specific Categories Of Personally Identifiable Information
- SI-4 - System Monitoring
- SI-19 - De-Identification
- Foundations for Evidence-Based Policymaking Act of 2018 (P.L. 115-435), January 2019., "EVIDACT" https://www.congress.gov/115/plaws/publ435/PLAW-11
- Garfinkel S (2016) De-Identifying Government Datasets. (National Institute of Standards and Technology, Gaithersburg, MD), Second Draft NIST Special Publication (SP) 800-188., "SP 800-188" https://csrc.nist.gov/publications/detail/sp/800-1
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Office of Management and Budget Memorandum M-19-23, , July 2019., "OMB M-19-23" https://www.whitehouse.gov/wp-content/uploads/2019
- RMF Control
- PM-24
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- NP CP
- PM-24a.
- Review proposals to conduct or participate in a matching program; and
- PM-24b.
- Conduct an annual review of all matching programs in which the agency has participated.
- Office of Management and Budget Memorandum Circular A-108, , December 2016., "OMB A-108" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Privacy Act (P.L. 93-579), December 1974., "PRIVACT" https://www.govinfo.gov/content/pkg/STATUTE-88/pdf
- RMF Control
- PM-25
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- NP CP
- PM-25a.
- Develop, document, and implement policies and procedures that address the use of personally identifiable information for internal testing, training, and research;
- PM-25b.
- Limit or minimize the amount of personally identifiable information used for internal testing, training, and research purposes;
- PM-25c.
- Authorize the use of personally identifiable information when such information is required for internal testing, training, and research; and
- PM-25d.
- Review and update policies and procedures [Assignment: organization-defined frequency].
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- RMF Control
- PM-26
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- NP CP
- PM-26a.
- Mechanisms that are easy to use and readily accessible by the public;
- PM-26b.
- All information necessary for successfully filing complaints;
- PM-26c.
- Tracking mechanisms to ensure all complaints received are reviewed and addressed within [Assignment: organization-defined time period];
- PM-26d.
- Acknowledgement of receipt of complaints, concerns, or questions from individuals within [Assignment: organization-defined time period]; and
- PM-26e.
- Response to complaints, concerns, or questions from individuals within [Assignment: organization-defined time period].
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- RMF Control
- PM-27
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- NP CP
- PM-27a.
- Develop [Assignment: organization-defined privacy reports] and disseminate to:
- PM-27b.
- Review and update privacy reports [Assignment: organization-defined frequency].
- Federal Information Security Modernization Act (P.L. 113-283), December 2014., "FISMA" https://www.congress.gov/113/plaws/publ283/PLAW-11
- Office of Management and Budget Memorandum Circular A-108, , December 2016., "OMB A-108" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- RMF Control
- PM-28
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- NP CP
- PM-28a.
- Identify and document:
- PM-28b.
- Distribute the results of risk framing activities to [Assignment: organization-defined personnel]; and
- PM-28c.
- Review and update risk framing considerations [Assignment: organization-defined frequency].
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- RMF Control
- PM-29
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- CP
- PM-29a.
- Appoint a Senior Accountable Official for Risk Management to align organizational information security and privacy management processes with strategic, operational, and budgetary planning processes; and
- PM-29b.
- Establish a Risk Executive (function) to view and analyze risk from an organization-wide perspective and ensure management of risk is consistent across the organization.
- Joint Task Force (2018) Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2., "SP 800-37" https://doi.org/10.6028/NIST.SP.800-37r2
- Petersen R, Santos D, Smith MC, Wetzel KA, Witte G (2020) Workforce Framework for Cybersecurity (NICE Framework). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-181, Rev. 1., "SP 800-181" https://doi.org/10.6028/NIST.SP.800-181r1
- RMF Control
- PM-30
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- CP CX
- PM-30a.
- Develop an organization-wide strategy for managing supply chain risks associated with the development, acquisition, maintenance, and disposal of systems, system components, and system services;
- CM-10 - Software Usage Restrictions
- PM-9 - Risk Management Strategy
- SR-1 - Policy And Procedures
- SR-2 - Supply Chain Risk Management Plan
- SR-3 - Supply Chain Controls And Processes
- SR-4 - Provenance
- SR-5 - Acquisition Strategies, Tools, And Methods
- SR-6 - Supplier Assessments And Reviews
- SR-7 - Supply Chain Operations Security
- SR-8 - Notification Agreements
- SR-9 - Tamper Resistance And Detection
- SR-11 - Component Authenticity
- 85 Federal Register 54263 (September 1, 2020), pp 54263-54271., "41 CFR 201" https://www.federalregister.gov/d/2020-18939
- Boyens JM, Paulsen C, Moorthy R, Bartol N (2015) Supply Chain Risk Management Practices for Federal Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-161., "SP 800-161" https://doi.org/10.6028/NIST.SP.800-161
- Committee on National Security Systems Directive No. 505, , August 2017., "CNSSD 505" https://www.cnss.gov/CNSS/issuances/Directives.cfm
- Executive Order 13873, , May 2019., "EO 13873" https://www.whitehouse.gov/presidential-actions/ex
- International Organization for Standardization/International Electrotechnical Commission 20243-1:2018, , February 2018., "ISO 20243" https://www.iso.org/standard/74399.html
- International Organization for Standardization/International Electrotechnical Commission 27036-1:2014, , April 2014., "ISO 27036" https://www.iso.org/standard/59648.html
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Office of Management and Budget Memorandum M-17-06, , November 2016., "OMB M-17-06" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Paulsen C, Winkler K, Boyens JM, Ng J, Gimbi J (2020) Impact Analysis Tool for Interdependent Cyber Supply Chain Risks. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8272., "IR 8272" https://doi.org/10.6028/NIST.IR.8272
- Privacy Act (P.L. 93-579), December 1974., "PRIVACT" https://www.govinfo.gov/content/pkg/STATUTE-88/pdf
- Secure Technology Act [includes Federal Acquisition Supply Chain Security Act] (P.L. 115-390), December 2018., "FASC18" https://www.congress.gov/bill/115th-congress/senat
- PM-30(1) - Suppliers Of Critical Or Mission-Essential Items
- Identify, prioritize, and assess suppliers of critical or mission-essential technologies, products, and services.
- RMF Control
- PM-31
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- NP CP CX
- PM-31a.
- Establishing the following organization-wide metrics to be monitored: [Assignment: organization-defined metrics];
- PM-31b.
- Establishing [Assignment: organization-defined frequencies] for monitoring and [Assignment: organization-defined frequencies] for assessment of control effectiveness;
- PM-31c.
- Ongoing monitoring of organizationally-defined metrics in accordance with the continuous monitoring strategy;
- PM-31d.
- Correlation and analysis of information generated by control assessments and monitoring;
- PM-31e.
- Response actions to address results of the analysis of control assessment and monitoring information; and
- PM-31f.
- Reporting the security and privacy status of organizational systems to [Assignment: organization-defined personnel or roles] [Assignment: organization-defined frequency].
- AC-2 - Account Management
- AC-6 - Least Privilege
- AC-17 - Remote Access
- AT-4 - Training Records
- AU-6 - Audit Record Review, Analysis, And Reporting
- AU-13 - Monitoring For Information Disclosure
- CA-2 - Control Assessments
- CA-5 - Plan Of Action And Milestones
- CA-6 - Authorization
- CA-7 - Continuous Monitoring
- CM-3 - Configuration Change Control
- CM-4 - Impact Analyses
- CM-6 - Configuration Settings
- CM-11 - User-Installed Software
- IA-5 - Authenticator Management
- IR-5 - Incident Monitoring
- MA-2 - Controlled Maintenance
- MA-3 - Maintenance Tools
- MA-4 - Nonlocal Maintenance
- PE-3 - Physical Access Control
- PE-6 - Monitoring Physical Access
- PE-14 - Environmental Controls
- PE-16 - Delivery And Removal
- PE-20 - Asset Monitoring And Tracking
- PL-2 - System Security And Privacy Plans
- PM-4 - Plan Of Action And Milestones Process
- PM-6 - Measures Of Performance
- PM-9 - Risk Management Strategy
- PM-10 - Authorization Process
- PM-12 - Insider Threat Program
- PM-14 - Testing, Training, And Monitoring
- PM-23 - Data Governance Body
- PM-28 - Risk Framing
- PS-7 - External Personnel Security
- PT-7 - Specific Categories Of Personally Identifiable Information
- RA-3 - Risk Assessment
- RA-5 - Vulnerability Monitoring And Scanning
- RA-7 - Risk Response
- SA-9 - External System Services
- SA-11 - Developer Testing And Evaluation
- SC-5 - Denial-Of-Service Protection
- SC-7 - Boundary Protection
- SC-18 - Mobile Code
- SC-38 - Operations Security
- SC-43 - Usage Restrictions
- SI-3 - Malicious Code Protection
- SI-4 - System Monitoring
- SI-12 - Information Management And Retention
- SR-2 - Supply Chain Risk Management Plan
- SR-4 - Provenance
- Dempsey KL, Pillitteri VY, Baer C, Niemeyer R, Rudman R, Urban S (2020) Assessing Information Security Continuous Monitoring (ISCM) Programs: Developing an ISCM Program Assessment. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-137A., "SP 800-137A" https://doi.org/10.6028/NIST.SP.800-137A
- Dempsey KL, Chawla NS, Johnson LA, Johnston R, Jones AC, Orebaugh AD, Scholl MA, Stine KM (2011) Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-137., "SP 800-137" https://doi.org/10.6028/NIST.SP.800-137
- Joint Task Force (2018) Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2., "SP 800-37" https://doi.org/10.6028/NIST.SP.800-37r2
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- RMF Control
- PM-32
- Subject Area
- PROGRAM MANAGEMENT
- Baselines
- CX
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- Ross RS, Pillitteri VY, Graubart R, Bodeau D, McQuaid R (2019) Developing Cyber Resilient Systems: A Systems Security Engineering Approach. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 2., "SP 800-160-2" https://doi.org/10.6028/NIST.SP.800-160v2
- RMF Control
- PS-1
- Subject Area
- PERSONNEL SECURITY
- Baselines
- CH FS FH CP NH FM FL CL NL NM CM
- PS-1a.
- Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
- PS-1b.
- Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the personnel security policy and procedures; and
- PS-1c.
- Review and update the current personnel security:
- PS-1.1 - CCI-003017
- The organization defines the personnel or roles to whom a personnel security policy is disseminated.
- PS-1.2 - CCI-003018
- The organization defines the personnel or roles to whom the personnel security procedures are disseminated.
- PS-1.3 - CCI-001504
- The organization develops and documents a personnel security policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- PS-1.4 - CCI-001505
- The organization disseminates a personnel security policy to organization-defined personnel or roles.
- PS-1.6 - CCI-001509
- The organization develops and documents procedures to facilitate the implementation of the personnel security policy and associated personnel security controls.
- PS-1.5 - CCI-001510
- The organization disseminates personnel security procedures to organization-defined personnel or roles.
- PS-1.8 - CCI-001507
- The organization defines the frequency to review and update the current personnel security policy.
- PS-1.7 - CCI-001506
- The organization reviews and updates the current personnel security policy in accordance with organization-defined frequency.
- PS-1.10 - CCI-001508
- The organization defines the frequency to review and update the current personnel security procedures.
- PS-1.9 - CCI-001511
- The organization reviews and updates the current personnel security procedures in accordance with organization-defined frequency.
- Bowen P, Hash J, Wilson M (2006) Information Security Handbook: A Guide for Managers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-100, Includes updates as of March 7, 2007., "SP 800-100" https://doi.org/10.6028/NIST.SP.800-100
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- Nieles M, Pillitteri VY, Dempsey KL (2017) An Introduction to Information Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-12, Rev. 1., "SP 800-12" https://doi.org/10.6028/NIST.SP.800-12r1
- RMF Control
- PS-2
- Subject Area
- PERSONNEL SECURITY
- Baselines
- CH FS FH NH FM FL CL NL NM CM
- PS-2a.
- Assign a risk designation to all organizational positions;
- PS-2b.
- Establish screening criteria for individuals filling those positions; and
- PS-2c.
- Review and update position risk designations [Assignment: organization-defined frequency].
- PS-2.1 - CCI-001512
- The organization assigns a risk designation to all organizational positions.
- PS-2.2 - CCI-001513
- The organization establishes screening criteria for individuals filling organizational positions.
- PS-2.3 - CCI-001514
- The organization reviews and updates position risk designations in accordance with organization-defined frequency.
- PS-2.4 - CCI-001515
- The organization defines the frequency to review and update position risk designations.
- AC-5 - Separation Of Duties
- AT-3 - Role-Based Training
- PE-2 - Physical Access Authorizations
- PE-3 - Physical Access Control
- PL-2 - System Security And Privacy Plans
- PS-3 - Personnel Screening
- PS-6 - Access Agreements
- SA-5 - System Documentation
- SA-21 - Developer Screening
- SI-12 - Information Management And Retention
- Code of Federal Regulations, Title 5, , Section 731.106, (5 C.F.R. 731.106)., "5 CFR 731" https://www.govinfo.gov/content/pkg/CFR-2012-title
- Petersen R, Santos D, Smith MC, Wetzel KA, Witte G (2020) Workforce Framework for Cybersecurity (NICE Framework). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-181, Rev. 1., "SP 800-181" https://doi.org/10.6028/NIST.SP.800-181r1
- RMF Control
- PS-3
- Subject Area
- PERSONNEL SECURITY
- Baselines
- CH FS FH NH FM CC FL CL NL NM CM
- PS-3a.
- Screen individuals prior to authorizing access to the system; and
- PS-3b.
- Rescreen individuals in accordance with [Assignment: organization-defined conditions requiring rescreening and, where rescreening is so indicated, the frequency of rescreening].
- PS-3.1 - CCI-001516
- The organization screens individuals prior to authorizing access to the information system.
- PS-3.2 - CCI-001517
- The organization rescreens individuals with authorized access to the information system according to organization-defined conditions requiring rescreening, and where rescreening is so indicated, the organization-defined frequency of such rescreening.
- PS-3.3 - CCI-001518
- The organization defines the conditions requiring rescreening of individuals with authorized access to the information system.
- PS-3.4 - CCI-001519
- The organization defines the frequency for rescreening individuals with authorized access to the information system when organization-defined conditions requiring rescreening are met.
- Cooper DA, Ferraiolo H, Mehta KL, Francomacaro S, Chandramouli R, Mohler J (2015) Interfaces for Personal Identity Verification. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-73-4, Includes updates as of February 8, 2016., "SP 800-73-4" https://doi.org/10.6028/NIST.SP.800-73-4
- Executive Order 13526, , December 2009., "EO 13526" https://www.archives.gov/isoo/policy-documents/cns
- Executive Order 13587, , October 2011., "EO 13587" https://obamawhitehouse.archives.gov/the-press-off
- Grother PJ, Salamon WJ, Chandramouli R (2013) Biometric Specifications for Personal Identity Verification. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-76-2., "SP 800-76-2" https://doi.org/10.6028/NIST.SP.800-76-2
- National Institute of Standards and Technology (2004) Standards for Security Categorization of Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 199., "FIPS 199" https://doi.org/10.6028/NIST.FIPS.199
- National Institute of Standards and Technology (2013) Personal Identity Verification (PIV) of Federal Employees and Contractors. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 201-2., "FIPS 201-2" https://doi.org/10.6028/NIST.FIPS.201-2
- Polk T, Dodson DF, Burr WE, Ferraiolo H, Cooper DA (2015) Cryptographic Algorithms and Key Sizes for Personal Identity Verification. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-78-4., "SP 800-78-4" https://doi.org/10.6028/NIST.SP.800-78-4
- Stine KM, Kissel RL, Barker WC, Fahlsing J, Gulick J (2008) Guide for Mapping Types of Information and Information Systems to Security Categories. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-60, Vol. 1, Rev. 1., "SP 800-60-1" https://doi.org/10.6028/NIST.SP.800-60v1r1
- Stine KM, Kissel RL, Barker WC, Lee A, Fahlsing J (2008) Guide for Mapping Types of Information and Information Systems to Security Categories: Appendices. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-60, Vol. 2, Rev. 1., "SP 800-60-2" https://doi.org/10.6028/NIST.SP.800-60v2r1
- PS-3(1) - Classified Information
- Verify that individuals accessing a system processing, storing, or transmitting classified information are cleared and indoctrinated to the highest classification level of the information to which they have access on the system.
- PS-3(2) - Formal Indoctrination
- Verify that individuals accessing a system processing, storing, or transmitting types of classified information that require formal indoctrination, are formally indoctrinated for all the relevant types of information to which they have access on the system.
- PS-3(3) - Information Requiring Special Protective Measures
- Verify that individuals accessing a system processing, storing, or transmitting information requiring special protection:
- PS-3(4) - Citizenship Requirements
- Verify that individuals accessing a system processing, storing, or transmitting [Assignment: organization-defined information types] meet [Assignment: organization-defined citizenship requirements].
- RMF Control
- PS-4
- Subject Area
- PERSONNEL SECURITY
- Baselines
- CH FS FH NH FM CC FL CL NL NM CM
- PS-4a.
- Disable system access within [Assignment: organization-defined time period];
- PS-4b.
- Terminate or revoke any authenticators and credentials associated with the individual;
- PS-4c.
- Conduct exit interviews that include a discussion of [Assignment: organization-defined information security topics];
- PS-4d.
- Retrieve all security-related organizational system-related property; and
- PS-4e.
- Retain access to organizational information and systems formerly controlled by terminated individual.
- PS-4.2 - CCI-003022
- The organization defines the time period to disable information system access upon termination of individual employment.
- PS-4.1 - CCI-001522
- The organization, upon termination of individual employment, disables information system access within organization-defined time period.
- PS-4.3 - CCI-003023
- The organization, upon termination of individual employment, terminates/revokes any authenticators/credentials associated with the individual.
- PS-4.5 - CCI-003024
- The organization defines information security topics to be discussed while conducting exit interviews.
- PS-4.4 - CCI-001523
- The organization, upon termination of individual employment, conducts exit interviews that include a discussion of organization-defined information security topics.
- PS-4.6 - CCI-001524
- The organization, upon termination of individual employment, retrieves all security-related organizational information systems-related property.
- PS-4.7 - CCI-001525
- The organization, upon termination of individual employment, retains access to organizational information formerly controlled by terminated individual.
- PS-4.8 - CCI-001526
- The organization, upon termination of individual employment, retains access to organizational information systems formerly controlled by terminated individual.
- PS-4.10 - CCI-003025
- The organization defines personnel or roles to notify upon termination of individual employment.
- PS-4.11 - CCI-003026
- The organization defines the time period in which to notify organization-defined personnel or roles upon termination of individual employment.
- PS-4.9 - CCI-003016
- The organization, upon termination of individual employment, notifies organization-defined personnel or roles within an organization-defined time period.
- PS-4(1) - Post-Employment Requirements
- PS-4(2) - Automated Actions
- Use [Assignment: organization-defined automated mechanisms] to [Selection (one or more): notify [Assignment: organization-defined personnel or roles] of individual termination actions; disable access to system resources].
- RMF Control
- PS-5
- Subject Area
- PERSONNEL SECURITY
- Baselines
- CH FS FH NH FM FL CL NL NM CM
- PS-5a.
- Review and confirm ongoing operational need for current logical and physical access authorizations to systems and facilities when individuals are reassigned or transferred to other positions within the organization;
- PS-5b.
- Initiate [Assignment: organization-defined transfer or reassignment actions] within [Assignment: organization-defined time period following the formal transfer action];
- PS-5c.
- Modify access authorization as needed to correspond with any changes in operational need due to reassignment or transfer; and
- PS-5d.
- Notify [Assignment: organization-defined personnel or roles] within [Assignment: organization-defined time period].
- PS-5.1 - CCI-001527
- The organization reviews and confirms ongoing operational need for current logical and physical access authorizations to information systems/facilities when individuals are reassigned or transferred to other positions within the organization.
- PS-5.2 - CCI-001528
- The organization initiates organization-defined transfer or reassignment actions within an organization-defined time period following the formal personnel transfer action.
- PS-5.3 - CCI-001529
- The organization defines transfer or reassignment actions to initiate within an organization-defined time period following the formal personnel transfer action.
- PS-5.4 - CCI-001530
- The organization defines the time period within which the organization initiates organization-defined transfer or reassignment actions, following the formal personnel transfer action.
- PS-5.5 - CCI-003031
- The organization modifies access authorization as needed to correspond with any changes in operational need due to reassignment or transfer.
- PS-5.6 - CCI-003032
- The organization notifies organization-defined personnel or roles within an organization-defined time period when individuals are transferred or reassigned to other positions within the organization.
- PS-5.7 - CCI-003033
- The organization defines personnel or roles to be notified when individuals are transferred or reassigned to other positions within the organization.
- PS-5.8 - CCI-003034
- The organization defines the time period within which organization-defined personnel or roles are to be notified when individuals are transferred or reassigned to other positions within the organization.
- RMF Control
- PS-6
- Subject Area
- PERSONNEL SECURITY
- Baselines
- CH NP FS FH CP NH FM CC FL CL NL NM CM
- PS-6a.
- Develop and document access agreements for organizational systems;
- PS-6b.
- Review and update the access agreements [Assignment: organization-defined frequency]; and
- PS-6c.
- Verify that individuals requiring access to organizational information and systems:
- PS-6.1 - CCI-003035
- The organization develops and documents access agreements for organizational information systems.
- PS-6.3 - CCI-001533
- The organization defines the frequency to review and update the access agreements.
- PS-6.2 - CCI-001532
- The organization reviews and updates the access agreements in accordance with organization-defined frequency.
- PS-6.4 - CCI-001531
- The organization ensures that individuals requiring access to organizational information and information systems sign appropriate access agreements prior to being granted access.
- PS-6.6 - CCI-003037
- The organization defines the frequency for individuals requiring access to organization information and information systems to re-sign access agreements.
- PS-6.5 - CCI-003036
- The organization ensures that individuals requiring access to organizational information and information systems re-sign access agreements to maintain access to organizational information systems when access agreements have been updated or in accordance with organization-defined frequency.
- AC-17 - Remote Access
- PE-2 - Physical Access Authorizations
- PL-4 - Rules Of Behavior
- PS-2 - Position Risk Designation
- PS-3 - Personnel Screening
- PS-6 - Access Agreements
- PS-7 - External Personnel Security
- PS-8 - Personnel Sanctions
- SA-21 - Developer Screening
- SI-12 - Information Management And Retention
- PS-6(1) - Information Requiring Special Protection
- [Withdrawn: Incorporated into PS-3].
- PS-6(2) - Classified Information Requiring Special Protection
- Verify that access to classified information requiring special protection is granted only to individuals who:
- PS-6(3) - Post-Employment Requirements
- RMF Control
- PS-7
- Subject Area
- PERSONNEL SECURITY
- Baselines
- CH FS FH NH FM FL CL NL NM CM
- PS-7a.
- Establish personnel security requirements, including security roles and responsibilities for external providers;
- PS-7b.
- Require external providers to comply with personnel security policies and procedures established by the organization;
- PS-7c.
- Document personnel security requirements;
- PS-7d.
- Require external providers to notify [Assignment: organization-defined personnel or roles] of any personnel transfers or terminations of external personnel who possess organizational credentials and/or badges, or who have system privileges within [Assignment: organization-defined time period]; and
- PS-7e.
- Monitor provider compliance with personnel security requirements.
- PS-7.1 - CCI-001539
- The organization establishes personnel security requirements including security roles and responsibilities for third-party providers.
- PS-7.2 - CCI-003040
- The organization requires third-party providers to comply with personnel security policies and procedures established by the organization.
- PS-7.3 - CCI-001540
- The organization documents personnel security requirements for third-party providers.
- PS-7.5 - CCI-003042
- The organization defines personnel or roles whom third-party providers are to notify when third-party personnel who possess organizational credentials and /or badges or who have information system privileges are transferred or terminated.
- PS-7.6 - CCI-003043
- The organization defines the time period for third-party providers to notify organization-defined personnel or roles when third-party personnel who possess organizational credentials and /or badges or who have information system privileges are transferred or terminated.
- PS-7.4 - CCI-003041
- The organization requires third-party providers to notify organization-defined personnel or roles of any personnel transfers or terminations of third-party personnel who possess organizational credentials and/or badges, or who have information system privileges within an organization-defined time period.
- PS-7.7 - CCI-001541
- The organization monitors third-party provider compliance with personnel security requirements.
- AT-2 - Literacy Training And Awareness
- AT-3 - Role-Based Training
- MA-5 - Maintenance Personnel
- PE-3 - Physical Access Control
- PS-2 - Position Risk Designation
- PS-3 - Personnel Screening
- PS-4 - Personnel Termination
- PS-5 - Personnel Transfer
- PS-6 - Access Agreements
- SA-5 - System Documentation
- SA-9 - External System Services
- SA-21 - Developer Screening
- Grance T, Hash J, Stevens M, O'Neal K, Bartol N (2003) Guide to Information Technology Security Services. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-35., "SP 800-35" https://doi.org/10.6028/NIST.SP.800-35
- Grassi PA, Garcia ME, Fenton JL (2017) Digital Identity Guidelines. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-63-3, Includes updates as of March 2, 2020., "SP 800-63-3" https://doi.org/10.6028/NIST.SP.800-63-3
- RMF Control
- PS-8
- Subject Area
- PERSONNEL SECURITY
- Baselines
- CH FS FH CP NH FM FL CL NL NM CM
- PS-8a.
- Employ a formal sanctions process for individuals failing to comply with established information security and privacy policies and procedures; and
- PS-8b.
- Notify [Assignment: organization-defined personnel or roles] within [Assignment: organization-defined time period] when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction.
- PS-8.1 - CCI-001542
- The organization employs a formal sanctions process for individuals failing to comply with established information security policies and procedures.
- PS-8.2 - CCI-003046
- The organization defines the time period to notify organization-defined personnel or roles when a formal employee sanctions process is initiated.
- PS-8.3 - CCI-003044
- The organization notifies organization-defined personnel or roles within an organization-defined time period when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction.
- PS-8.4 - CCI-003045
- The organization defines personnel or roles whom are to be notified when a formal employee sanctions process is initiated.
- RMF Control
- PS-9
- Subject Area
- PERSONNEL SECURITY
- Baselines
- CH FS FH CP NH FM CC FL CL NL NM CM
- Petersen R, Santos D, Smith MC, Wetzel KA, Witte G (2020) Workforce Framework for Cybersecurity (NICE Framework). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-181, Rev. 1., "SP 800-181" https://doi.org/10.6028/NIST.SP.800-181r1
- RMF Control
- PT-1
- Subject Area
- PERSONALLY IDENTIFIABLE INFORMATION PROCESSING AND TRANSPARENCY
- Baselines
- NP CP
- PT-1a.
- Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
- PT-1b.
- Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the personally identifiable information processing and transparency policy and procedures; and
- PT-1c.
- Review and update the current personally identifiable information processing and transparency:
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- RMF Control
- PT-2
- Subject Area
- PERSONALLY IDENTIFIABLE INFORMATION PROCESSING AND TRANSPARENCY
- Baselines
- NP
- PT-2a.
- Determine and document the [Assignment: organization-defined authority] that permits the [Assignment: organization-defined processing] of personally identifiable information; and
- PT-2b.
- Restrict the [Assignment: organization-defined processing] of personally identifiable information to only that which is authorized.
- AC-2 - Account Management
- AC-3 - Access Enforcement
- CM-13 - Data Action Mapping
- IR-9 - Information Spillage Response
- PM-9 - Risk Management Strategy
- PM-24 - Data Integrity Board
- PT-1 - Policy And Procedures
- PT-3 - Personally Identifiable Information Processing Purposes
- PT-5 - Privacy Notice
- PT-6 - System Of Records Notice
- RA-3 - Risk Assessment
- RA-8 - Privacy Impact Assessments
- SI-12 - Information Management And Retention
- SI-18 - Personally Identifiable Information Quality Operations
- Grassi P, Lefkovitz N, Nadeau E, Galluzzo R, Dinh, A (2018) Attribute Metadata: A Proposed Schema for Evaluating Federated Attributes. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8112., "IR 8112" https://doi.org/10.6028/NIST.IR.8112
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Privacy Act (P.L. 93-579), December 1974., "PRIVACT" https://www.govinfo.gov/content/pkg/STATUTE-88/pdf
- PT-2(1) - Data Tagging
- Attach data tags containing [Assignment: organization-defined authorized processing] to [Assignment: organization-defined elements of personally identifiable information].
- PT-2(2) - Automation
- Manage enforcement of the authorized processing of personally identifiable information using [Assignment: organization-defined automated mechanisms].
- RMF Control
- PT-3
- Subject Area
- PERSONALLY IDENTIFIABLE INFORMATION PROCESSING AND TRANSPARENCY
- Baselines
- NP
- PT-3a.
- Identify and document the [Assignment: organization-defined purpose(s)] for processing personally identifiable information;
- PT-3b.
- Describe the purpose(s) in the public privacy notices and policies of the organization;
- PT-3c.
- Restrict the [Assignment: organization-defined processing] of personally identifiable information to only that which is compatible with the identified purpose(s); and
- PT-3d.
- Monitor changes in processing personally identifiable information and implement [Assignment: organization-defined mechanisms] to ensure that any changes are made in accordance with [Assignment: organization-defined requirements].
- AC-2 - Account Management
- AC-3 - Access Enforcement
- AT-3 - Role-Based Training
- CM-13 - Data Action Mapping
- IR-9 - Information Spillage Response
- PM-9 - Risk Management Strategy
- PM-25 - Minimization Of Personally Identifiable Information Used In Testing, Training, And Research
- PT-2 - Authority To Process Personally Identifiable Information
- PT-5 - Privacy Notice
- PT-6 - System Of Records Notice
- PT-7 - Specific Categories Of Personally Identifiable Information
- RA-8 - Privacy Impact Assessments
- SC-43 - Usage Restrictions
- SI-12 - Information Management And Retention
- SI-18 - Personally Identifiable Information Quality Operations
- Grassi P, Lefkovitz N, Nadeau E, Galluzzo R, Dinh, A (2018) Attribute Metadata: A Proposed Schema for Evaluating Federated Attributes. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8112., "IR 8112" https://doi.org/10.6028/NIST.IR.8112
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Privacy Act (P.L. 93-579), December 1974., "PRIVACT" https://www.govinfo.gov/content/pkg/STATUTE-88/pdf
- PT-3(1) - Data Tagging
- Attach data tags containing the following purposes to [Assignment: organization-defined elements of personally identifiable information]: [Assignment: organization-defined processing purposes].
- PT-3(2) - Automation
- Track processing purposes of personally identifiable information using [Assignment: organization-defined automated mechanisms].
- RMF Control
- PT-4
- Subject Area
- PERSONALLY IDENTIFIABLE INFORMATION PROCESSING AND TRANSPARENCY
- Baselines
- NP
- Grassi PA, Garcia ME, Fenton JL (2017) Digital Identity Guidelines. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-63-3, Includes updates as of March 2, 2020., "SP 800-63-3" https://doi.org/10.6028/NIST.SP.800-63-3
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Privacy Act (P.L. 93-579), December 1974., "PRIVACT" https://www.govinfo.gov/content/pkg/STATUTE-88/pdf
- PT-4(1) - Tailored Consent
- Provide [Assignment: organization-defined mechanisms] to allow individuals to tailor processing permissions to selected elements of personally identifiable information.
- PT-4(2) - Just-In-Time Consent
- Present [Assignment: organization-defined consent mechanisms] to individuals at [Assignment: organization-defined frequency] and in conjunction with [Assignment: organization-defined personally identifiable information processing].
- PT-4(3) - Revocation
- Implement [Assignment: organization-defined tools or mechanisms] for individuals to revoke consent to the processing of their personally identifiable information.
- RMF Control
- PT-5
- Subject Area
- PERSONALLY IDENTIFIABLE INFORMATION PROCESSING AND TRANSPARENCY
- Baselines
- NP
- PT-5a.
- Is available to individuals upon first interacting with an organization, and subsequently at [Assignment: organization-defined frequency];
- PT-5b.
- Is clear and easy-to-understand, expressing information about personally identifiable information processing in plain language;
- PT-5c.
- Identifies the authority that authorizes the processing of personally identifiable information;
- PT-5d.
- Identifies the purposes for which personally identifiable information is to be processed; and
- PT-5e.
- Includes [Assignment: organization-defined information].
- PM-20 - Dissemination Of Privacy Program Information
- PM-22 - Personally Identifiable Information Quality Management
- PT-2 - Authority To Process Personally Identifiable Information
- PT-3 - Personally Identifiable Information Processing Purposes
- PT-4 - Consent
- PT-7 - Specific Categories Of Personally Identifiable Information
- RA-3 - Risk Assessment
- SC-42 - Sensor Capability And Data
- SI-18 - Personally Identifiable Information Quality Operations
- Office of Management and Budget Memorandum Circular A-108, , December 2016., "OMB A-108" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Privacy Act (P.L. 93-579), December 1974., "PRIVACT" https://www.govinfo.gov/content/pkg/STATUTE-88/pdf
- PT-5(1) - Just-In-Time Notice
- Present notice of personally identifiable information processing to individuals at a time and location where the individual provides personally identifiable information or in conjunction with a data action, or [Assignment: organization-defined frequency].
- PT-5(2) - Privacy Act Statements
- Include Privacy Act statements on forms that collect information that will be maintained in a Privacy Act system of records, or provide Privacy Act statements on separate forms that can be retained by individuals.
- RMF Control
- PT-6
- Subject Area
- PERSONALLY IDENTIFIABLE INFORMATION PROCESSING AND TRANSPARENCY
- Baselines
- NP
- PT-6a.
- Draft system of records notices in accordance with OMB guidance and submit new and significantly modified system of records notices to the OMB and appropriate congressional committees for advance review;
- PT-6b.
- Publish system of records notices in the Federal Register; and
- PT-6c.
- Keep system of records notices accurate, up-to-date, and scoped in accordance with policy.
- Office of Management and Budget Memorandum Circular A-108, , December 2016., "OMB A-108" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Privacy Act (P.L. 93-579), December 1974., "PRIVACT" https://www.govinfo.gov/content/pkg/STATUTE-88/pdf
- PT-6(1) - Routine Uses
- Review all routine uses published in the system of records notice at [Assignment: organization-defined frequency] to ensure continued accuracy, and to ensure that routine uses continue to be compatible with the purpose for which the information was collected.
- PT-6(2) - Exemption Rules
- Review all Privacy Act exemptions claimed for the system of records at [Assignment: organization-defined frequency] to ensure they remain appropriate and necessary in accordance with law, that they have been promulgated as regulations, and that they are accurately described in the system of records notice.
- RMF Control
- PT-7
- Subject Area
- PERSONALLY IDENTIFIABLE INFORMATION PROCESSING AND TRANSPARENCY
- Baselines
- NP
- National Archives and Records Administration, Controlled Unclassified Information (CUI) Registry., "NARA CUI" https://www.archives.gov/cui
- Office of Management and Budget Memorandum Circular A-108, , December 2016., "OMB A-108" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Privacy Act (P.L. 93-579), December 1974., "PRIVACT" https://www.govinfo.gov/content/pkg/STATUTE-88/pdf
- PT-7(1) - Social Security Numbers
- When a system processes Social Security numbers:
- PT-7(2) - First Amendment Information
- Prohibit the processing of information describing how any individual exercises rights guaranteed by the First Amendment unless expressly authorized by statute or by the individual or unless pertinent to and within the scope of an authorized law enforcement activity.
- RMF Control
- PT-8
- Subject Area
- PERSONALLY IDENTIFIABLE INFORMATION PROCESSING AND TRANSPARENCY
- Baselines
- NP
- PT-8a.
- Obtain approval from the Data Integrity Board to conduct the matching program;
- PT-8b.
- Develop and enter into a computer matching agreement;
- PT-8c.
- Publish a matching notice in the Federal Register;
- PT-8d.
- Independently verify the information produced by the matching program before taking adverse action against an individual, if required; and
- PT-8e.
- Provide individuals with notice and an opportunity to contest the findings before taking adverse action against an individual.
- PM-24 - Data Integrity Board
- Computer Matching and Privacy Protection Act of 1988 (P.L. 100-503), October 1988., "CMPPA" https://www.govinfo.gov/content/pkg/STATUTE-102/pd
- Office of Management and Budget Memorandum Circular A-108, , December 2016., "OMB A-108" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Privacy Act (P.L. 93-579), December 1974., "PRIVACT" https://www.govinfo.gov/content/pkg/STATUTE-88/pdf
- RMF Control
- RA-1
- Subject Area
- RISK ASSESSMENT
- Baselines
- NP FS FH NH FM FL NL NM
- RA-1a.
- Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
- RA-1b.
- Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the risk assessment policy and procedures; and
- RA-1c.
- Review and update the current risk assessment:
- RA-1.1 - CCI-002368
- The organization defines the personnel or roles to whom the risk assessment policy is disseminated.
- RA-1.2 - CCI-002369
- The organization defines the personnel or roles to whom the risk assessment procedures are disseminated.
- RA-1.3 - CCI-001037
- The organization develops and documents a risk assessment policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- RA-1.4 - CCI-001038
- The organization disseminates a risk assessment policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance to organization-defined personnel or roles.
- RA-1.5 - CCI-001041
- The organization develops and documents procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls.
- RA-1.6 - CCI-001042
- The organization disseminates risk assessment procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls to organization-defined personnel or roles.
- RA-1.7 - CCI-001039
- The organization reviews and updates the current risk assessment policy in accordance with organization-defined frequency.
- RA-1.8 - CCI-001040
- The organization defines the frequency to review and update the current risk assessment policy.
- RA-1.9 - CCI-001043
- The organization reviews and updates the current risk assessment procedures in accordance with organization-defined frequency.
- RA-1.10 - CCI-001044
- The organization defines the frequency to review and update the current risk assessment procedures.
- Bowen P, Hash J, Wilson M (2006) Information Security Handbook: A Guide for Managers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-100, Includes updates as of March 7, 2007., "SP 800-100" https://doi.org/10.6028/NIST.SP.800-100
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- Nieles M, Pillitteri VY, Dempsey KL (2017) An Introduction to Information Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-12, Rev. 1., "SP 800-12" https://doi.org/10.6028/NIST.SP.800-12r1
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- RMF Control
- RA-2
- Subject Area
- RISK ASSESSMENT
- Baselines
- FS FH NH FM FL NL NM
- RA-2a.
- Categorize the system and information it processes, stores, and transmits;
- RA-2b.
- Document the security categorization results, including supporting rationale, in the security plan for the system; and
- RA-2c.
- Verify that the authorizing official or authorizing official designated representative reviews and approves the security categorization decision.
- RA-2.1 - CCI-001045
- The organization categorizes information and the information system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.
- RA-2.2 - CCI-001046
- The organization documents the security categorization results (including supporting rationale) in the security plan for the information system.
- RA-2.3 - CCI-001047
- The organization ensures the security categorization decision is reviewed and approved by the authorizing official or authorizing official designated representative.
- CM-8 - System Component Inventory
- MP-4 - Media Storage
- PL-2 - System Security And Privacy Plans
- PL-10 - Baseline Selection
- PL-11 - Baseline Tailoring
- PM-7 - Enterprise Architecture
- RA-3 - Risk Assessment
- RA-5 - Vulnerability Monitoring And Scanning
- RA-7 - Risk Response
- RA-8 - Privacy Impact Assessments
- SA-8 - Security And Privacy Engineering Principles
- SC-7 - Boundary Protection
- SC-38 - Operations Security
- SI-12 - Information Management And Retention
- Committee on National Security Systems Instruction No. 1253, , March 2014., "CNSSI 1253" https://www.cnss.gov/CNSS/issuances/Instructions.c
- Joint Task Force (2018) Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2., "SP 800-37" https://doi.org/10.6028/NIST.SP.800-37r2
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- National Archives and Records Administration, Controlled Unclassified Information (CUI) Registry., "NARA CUI" https://www.archives.gov/cui
- National Institute of Standards and Technology (2004) Standards for Security Categorization of Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 199., "FIPS 199" https://doi.org/10.6028/NIST.FIPS.199
- National Institute of Standards and Technology (2006) Minimum Security Requirements for Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 200., "FIPS 200" https://doi.org/10.6028/NIST.FIPS.200
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- Stine KM, Kissel RL, Barker WC, Fahlsing J, Gulick J (2008) Guide for Mapping Types of Information and Information Systems to Security Categories. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-60, Vol. 1, Rev. 1., "SP 800-60-1" https://doi.org/10.6028/NIST.SP.800-60v1r1
- Stine KM, Kissel RL, Barker WC, Lee A, Fahlsing J (2008) Guide for Mapping Types of Information and Information Systems to Security Categories: Appendices. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-60, Vol. 2, Rev. 1., "SP 800-60-2" https://doi.org/10.6028/NIST.SP.800-60v2r1
- RA-2(1) - Impact-Level Prioritization
- Conduct an impact-level prioritization of organizational systems to obtain additional granularity on system impact levels.
- RMF Control
- RA-3
- Subject Area
- RISK ASSESSMENT
- Baselines
- NP FS FH CX NH FM CC FL NL NM
- RA-3a.
- Conduct a risk assessment, including:
- RA-3b.
- Integrate risk assessment results and risk management decisions from the organization and mission or business process perspectives with system-level risk assessments;
- RA-3c.
- Document risk assessment results in [Selection: security and privacy plans; risk assessment report; [Assignment: organization-defined document]];
- RA-3d.
- Review risk assessment results [Assignment: organization-defined frequency];
- RA-3e.
- Disseminate risk assessment results to [Assignment: organization-defined personnel or roles]; and
- RA-3f.
- Update the risk assessment [Assignment: organization-defined frequency] or when there are significant changes to the system, its environment of operation, or other conditions that may impact the security or privacy state of the system.
- RA-3.1 - CCI-001048
- The organization conducts an assessment of risk of the information system and the information it processes, stores, or transmits that includes the likelihood and magnitude of harm from the unauthorized access, use, disclosure, disruption, modification, or destruction.
- RA-3.3 - CCI-001642
- The organization defines the organizational document in which risk assessment results are documented (e.g., security plan, risk assessment report).
- RA-3.2 - CCI-001049
- The organization documents risk assessment results in the organization-defined document.
- RA-3.4 - CCI-001050
- The organization reviews risk assessment results on an organization-defined frequency.
- RA-3.5 - CCI-001051
- The organization defines a frequency for reviewing risk assessment results.
- RA-3.7 - CCI-002371
- The organization defines the personnel or roles whom the risk assessment results will be disseminated.
- RA-3.6 - CCI-002370
- The organization disseminates risk assessment results to organization-defined personnel or roles.
- RA-3.8 - CCI-001052
- The organization updates the risk assessment on an organization-defined frequency or whenever there are significant changes to the information system or environment of operation (including the identification of new threats and vulnerabilities), or other conditions that may impact the security state of the system.
- RA-3.9 - CCI-001053
- The organization defines a frequency for updating the risk assessment.
- CA-3 - Information Exchange
- CA-6 - Authorization
- CM-4 - Impact Analyses
- CM-13 - Data Action Mapping
- CP-6 - Alternate Storage Site
- CP-7 - Alternate Processing Site
- IA-8 - Identification And Authentication (Non-Organizational Users)
- MA-5 - Maintenance Personnel
- PE-3 - Physical Access Control
- PE-8 - Visitor Access Records
- PE-18 - Location Of System Components
- PL-2 - System Security And Privacy Plans
- PL-10 - Baseline Selection
- PL-11 - Baseline Tailoring
- PM-8 - Critical Infrastructure Plan
- PM-9 - Risk Management Strategy
- PM-28 - Risk Framing
- PT-2 - Authority To Process Personally Identifiable Information
- PT-7 - Specific Categories Of Personally Identifiable Information
- RA-2 - Security Categorization
- RA-5 - Vulnerability Monitoring And Scanning
- RA-7 - Risk Response
- SA-8 - Security And Privacy Engineering Principles
- SA-9 - External System Services
- SC-38 - Operations Security
- SI-12 - Information Management And Retention
- Boyens JM, Paulsen C, Moorthy R, Bartol N (2015) Supply Chain Risk Management Practices for Federal Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-161., "SP 800-161" https://doi.org/10.6028/NIST.SP.800-161
- Brooks S, Garcia M, Lefkovitz N, Lightman S, Nadeau E (2017) An Introduction to Privacy Engineering and Risk Management in Federal Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8062., "IR 8062" https://doi.org/10.6028/NIST.IR.8062
- Dempsey KL, Paulsen C (2015) Risk Management for Replication Devices. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8023., "IR 8023" https://doi.org/10.6028/NIST.IR.8023
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Paulsen C, Winkler K, Boyens JM, Ng J, Gimbi J (2020) Impact Analysis Tool for Interdependent Cyber Supply Chain Risks. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8272., "IR 8272" https://doi.org/10.6028/NIST.IR.8272
- RA-3(1) - Supply Chain Risk Assessment
- RA-3(2) - Use Of All-Source Intelligence
- Use all-source intelligence to assist in the analysis of risk.
- RA-3(3) - Dynamic Threat Awareness
- Determine the current cyber threat environment on an ongoing basis using [Assignment: organization-defined means].
- RA-3(4) - Predictive Cyber Analytics
- Employ the following advanced automation and analytics capabilities to predict and identify risks to [Assignment: organization-defined systems or system components]: [Assignment: organization-defined advanced automation and analytics capabilities].
- RMF Control
- RA-4
- Subject Area
- RISK ASSESSMENT
- Baselines
- —
- RMF Control
- RA-5
- Subject Area
- RISK ASSESSMENT
- Baselines
- FS FH CX NH FM CC FL NL NM
- RA-5a.
- Monitor and scan for vulnerabilities in the system and hosted applications [Assignment: organization-defined frequency and/or randomly in accordance with organization-defined process] and when new vulnerabilities potentially affecting the system are identified and reported;
- RA-5b.
- Employ vulnerability monitoring tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for:
- RA-5c.
- Analyze vulnerability scan reports and results from vulnerability monitoring;
- RA-5d.
- Remediate legitimate vulnerabilities [Assignment: organization-defined response times] in accordance with an organizational assessment of risk;
- RA-5e.
- Share information obtained from the vulnerability monitoring process and control assessments with [Assignment: organization-defined personnel or roles] to help eliminate similar vulnerabilities in other systems; and
- RA-5f.
- Employ vulnerability monitoring tools that include the capability to readily update the vulnerabilities to be scanned.
- RA-5.2 - CCI-001055
- The organization defines a frequency for scanning for vulnerabilities in the information system and hosted applications.
- RA-5.1 - CCI-001054
- The organization scans for vulnerabilities in the information system and hosted applications on an organization-defined frequency.
- RA-5.3 - CCI-001056
- The organization scans for vulnerabilities in the information system and hosted applications when new vulnerabilities potentially affecting the system/applications are identified and reported.
- RA-5.4 - CCI-001641
- The organization defines the process for conducting random vulnerability scans on the information system and hosted applications.
- RA-5.5 - CCI-001643
- The organization scans for vulnerabilities in the information system and hosted applications in accordance with the organization-defined process for random scans.
- RA-5.6 - CCI-001057
- The organization employs vulnerability scanning tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for: enumerating platforms, software flaws, and improper configurations; formatting checklists and test procedures; and measuring vulnerability impact.
- RA-5.7 - CCI-001058
- The organization analyzes vulnerability scan reports and results from security control assessments.
- RA-5.8 - CCI-001059
- The organization remediates legitimate vulnerabilities in organization-defined response times in accordance with an organizational assessment risk.
- RA-5.9 - CCI-001060
- The organization defines response times for remediating legitimate vulnerabilities in accordance with an organization assessment of risk.
- RA-5.11 - CCI-002376
- The organization defines the personnel or roles whom the information obtained from the vulnerability scanning process and security control assessments will be shared.
- RA-5.10 - CCI-001061
- The organization shares information obtained from the vulnerability scanning process and security control assessments with organization-defined personnel or roles to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies).
- CA-2 - Control Assessments
- CA-7 - Continuous Monitoring
- CA-8 - Penetration Testing
- CM-2 - Baseline Configuration
- CM-4 - Impact Analyses
- CM-6 - Configuration Settings
- CM-8 - System Component Inventory
- RA-2 - Security Categorization
- RA-3 - Risk Assessment
- SA-11 - Developer Testing And Evaluation
- SA-15 - Development Process, Standards, And Tools
- SC-38 - Operations Security
- SI-2 - Flaw Remediation
- SI-3 - Malicious Code Protection
- SI-4 - System Monitoring
- SI-7 - Software, Firmware, And Information Integrity
- SR-11 - Component Authenticity
- Dempsey KL, Paulsen C (2015) Risk Management for Replication Devices. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8023., "IR 8023" https://doi.org/10.6028/NIST.IR.8023
- Dempsey KL, Takamura E, Eavy P, Moore G (2020) Automation Support for Security Control Assessments: Volume 4: Software Vulnerability Management. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8011, Volume 4., "IR 8011-4" https://doi.org/10.6028/NIST.IR.8011-4
- International Organization for Standardization/International Electrotechnical Commission 29147:2018, , October 2018., "ISO 29147" https://www.iso.org/standard/72311.html
- Joint Task Force Transformation Initiative (2014) Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-53A, Rev. 4, Includes updates as of December 18, 2014., "SP 800-53A" https://doi.org/10.6028/NIST.SP.800-53Ar4
- Quinn SD, Souppaya MP, Cook MR, Scarfone KA (2018) National Checklist Program for IT Products: Guidelines for Checklist Users and Developers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-70, Rev. 4., "SP 800-70" https://doi.org/10.6028/NIST.SP.800-70r4
- Scarfone KA, Souppaya MP, Cody A, Orebaugh AD (2008) Technical Guide to Information Security Testing and Assessment. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-115., "SP 800-115" https://doi.org/10.6028/NIST.SP.800-115
- Singhal A, Ou X (2011) Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7788., "IR 7788" https://doi.org/10.6028/NIST.IR.7788
- Souppaya MP, Scarfone KA (2013) Guide to Enterprise Patch Management Technologies. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-40, Rev. 3., "SP 800-40" https://doi.org/10.6028/NIST.SP.800-40r3
- Waltermire DA, Quinn SD, Booth H, III, Scarfone KA, Prisaca D (2018) The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-126, Rev. 3., "SP 800-126" https://doi.org/10.6028/NIST.SP.800-126r3
- RA-5(1) - Update Tool Capability
- [Withdrawn: Incorporated into RA-5].
- RA-5(2) - Update Vulnerabilities To Be Scanned
- Update the system vulnerabilities to be scanned [Selection (one or more): [Assignment: organization-defined frequency]; prior to a new scan; when new vulnerabilities are identified and reported].
- RA-5(3) - Breadth And Depth Of Coverage
- Define the breadth and depth of vulnerability scanning coverage.
- RA-5(4) - Discoverable Information
- Determine information about the system that is discoverable and take [Assignment: organization-defined corrective actions].
- RA-5(5) - Privileged Access
- Implement privileged access authorization to [Assignment: organization-defined system components] for [Assignment: organization-defined vulnerability scanning activities].
- RA-5(6) - Automated Trend Analyses
- Compare the results of multiple vulnerability scans using [Assignment: organization-defined automated mechanisms].
- RA-5(7) - Automated Detection And Notification Of Unauthorized Components
- [Withdrawn: Incorporated into CM-8].
- RA-5(8) - Review Historic Audit Logs
- Review historic audit logs to determine if a vulnerability identified in a [Assignment: organization-defined system] has been previously exploited within an [Assignment: organization-defined time period].
- RA-5(9) - Penetration Testing And Analyses
- [Withdrawn: Incorporated into CA-8].
- RA-5(10) - Correlate Scanning Information
- Correlate the output from vulnerability scanning tools to determine the presence of multi-vulnerability and multi-hop attack vectors.
- RA-5(11) - Public Disclosure Program
- Establish a public reporting channel for receiving reports of vulnerabilities in organizational systems and system components.
- RMF Control
- RA-6
- Subject Area
- RISK ASSESSMENT
- Baselines
- CX CC
- RA-6.1 - CCI-003119
- The organization employs a technical surveillance countermeasures survey at organization-defined locations on an organization-defined frequency or when organization-defined events or indicators occur.
- RA-6.2 - CCI-003120
- The organization defines the locations where technical surveillance countermeasures surveys are to be employed.
- RA-6.3 - CCI-003121
- The organization defines the frequency on which to employ technical surveillance countermeasures surveys.
- RA-6.4 - CCI-003122
- The organization defines the events or indicators upon which technical surveillance countermeasures surveys are to be employed.
- RMF Control
- RA-7
- Subject Area
- RISK ASSESSMENT
- Baselines
- NP FS FH NH FM FL NL NM
- Joint Task Force (2018) Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2., "SP 800-37" https://doi.org/10.6028/NIST.SP.800-37r2
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- National Institute of Standards and Technology (2004) Standards for Security Categorization of Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 199., "FIPS 199" https://doi.org/10.6028/NIST.FIPS.199
- National Institute of Standards and Technology (2006) Minimum Security Requirements for Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 200., "FIPS 200" https://doi.org/10.6028/NIST.FIPS.200
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- RMF Control
- RA-8
- Subject Area
- RISK ASSESSMENT
- Baselines
- NP
- RA-8a.
- Developing or procuring information technology that processes personally identifiable information; and
- RA-8b.
- Initiating a new collection of personally identifiable information that:
- CM-4 - Impact Analyses
- CM-9 - Configuration Management Plan
- CM-13 - Data Action Mapping
- PT-2 - Authority To Process Personally Identifiable Information
- PT-3 - Personally Identifiable Information Processing Purposes
- PT-5 - Privacy Notice
- RA-1 - Policy And Procedures
- RA-2 - Security Categorization
- RA-3 - Risk Assessment
- RA-7 - Risk Response
- E-Government Act [includes FISMA] (P.L. 107-347), December 2002. , "EGOV" https://www.congress.gov/107/plaws/publ347/PLAW-10
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Office of Management and Budget Memorandum M-03-22, , September 2003. , "OMB M-03-22" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- RMF Control
- RA-9
- Subject Area
- RISK ASSESSMENT
- Baselines
- FH NH FM NM
- CP-2 - Contingency Plan
- PL-2 - System Security And Privacy Plans
- PL-8 - Security And Privacy Architectures
- PL-11 - Baseline Tailoring
- PM-1 - Information Security Program Plan
- PM-11 - Mission And Business Process Definition
- RA-2 - Security Categorization
- SA-8 - Security And Privacy Engineering Principles
- SA-15 - Development Process, Standards, And Tools
- SA-20 - Customized Development Of Critical Components
- SR-5 - Acquisition Strategies, Tools, And Methods
- Paulsen C, Boyens JM, Bartol N, Winkler K (2018) Criticality Analysis Process Model: Prioritizing Systems and Components. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8179., "IR 8179" https://doi.org/10.6028/NIST.IR.8179
- RMF Control
- RA-10
- Subject Area
- RISK ASSESSMENT
- Baselines
- CC
- RA-10a.
- Establish and maintain a cyber threat hunting capability to:
- RA-10b.
- Employ the threat hunting capability [Assignment: organization-defined frequency].
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- RMF Control
- SA-1
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baselines
- NP FS FH NH FM FL NL NM
- SA-1a.
- Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
- SA-1b.
- Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the system and services acquisition policy and procedures; and
- SA-1c.
- Review and update the current system and services acquisition:
- SA-1.1 - CCI-003089
- The organization defines the personnel or roles to whom the system and services acquisition policy is disseminated.
- SA-1.2 - CCI-003090
- The organization defines the personnel or roles to whom procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls are disseminated.
- SA-1.4 - CCI-000602
- The organization develops and documents a system and services acquisition policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- SA-1.3 - CCI-000603
- The organization disseminates to organization-defined personnel or roles a system and services acquisition policy.
- SA-1.5 - CCI-000605
- The organization develops and documents procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls.
- SA-1.6 - CCI-000606
- The organization disseminates to organization-defined personnel or roles procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls.
- SA-1.7 - CCI-000601
- The organization defines the frequency to review and update the current system and services acquisition policy.
- SA-1.8 - CCI-000604
- The organization reviews and updates the current system and services acquisition policy in accordance with organization-defined frequency.
- SA-1.10 - CCI-001646
- The organization defines the frequency to review and update the current system and services acquisition procedures.
- SA-1.9 - CCI-000607
- The organization reviews and updates the current system and services acquisition procedures in accordance with organization-defined frequency.
- Bowen P, Hash J, Wilson M (2006) Information Security Handbook: A Guide for Managers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-100, Includes updates as of March 7, 2007., "SP 800-100" https://doi.org/10.6028/NIST.SP.800-100
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- Nieles M, Pillitteri VY, Dempsey KL (2017) An Introduction to Information Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-12, Rev. 1., "SP 800-12" https://doi.org/10.6028/NIST.SP.800-12r1
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- RMF Control
- SA-2
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baselines
- NP FS FH NH FM FL NL NM
- SA-2a.
- Determine the high-level information security and privacy requirements for the system or system service in mission and business process planning;
- SA-2b.
- Determine, document, and allocate the resources required to protect the system or system service as part of the organizational capital planning and investment control process; and
- SA-2c.
- Establish a discrete line item for information security and privacy in organizational programming and budgeting documentation.
- SA-2.1 - CCI-003091
- The organization determines information security requirements for the information system or information system service in mission/business process planning.
- SA-2.2 - CCI-000610
- The organization determines the resources required to protect the information system or information system service as part of its capital planning and investment control process.
- SA-2.3 - CCI-000611
- The organization documents the resources required to protect the information system or information system service as part of its capital planning and investment control process.
- SA-2.4 - CCI-000612
- The organization allocates the resources required to protect the information system or information system service as part of its capital planning and investment control process.
- SA-2.5 - CCI-000613
- The organization establishes a discrete line item for information security in organizational programming documentation.
- SA-2.6 - CCI-000614
- The organization establishes a discrete line item for information security in organizational budgeting documentation.
- Joint Task Force (2018) Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2., "SP 800-37" https://doi.org/10.6028/NIST.SP.800-37r2
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- RMF Control
- SA-3
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baselines
- NP FS FH NH FM CC FL NL NM
- SA-3a.
- Acquire, develop, and manage the system using [Assignment: organization-defined system development life cycle] that incorporates information security and privacy considerations;
- SA-3b.
- Define and document information security and privacy roles and responsibilities throughout the system development life cycle;
- SA-3c.
- Identify individuals having information security and privacy roles and responsibilities; and
- SA-3d.
- Integrate the organizational information security and privacy risk management process into system development life cycle activities.
- SA-3.2 - CCI-003092
- The organization defines a system development life cycle that is used to manage the information system.
- SA-3.1 - CCI-000615
- The organization manages the information system using organization-defined system development life cycle that incorporates information security considerations.
- SA-3.3 - CCI-000616
- The organization defines and documents information system security roles and responsibilities throughout the system development life cycle.
- SA-3.4 - CCI-000618
- The organization identifies individuals having information system security roles and responsibilities.
- SA-3.5 - CCI-003093
- The organization integrates the organizational information security risk management process into system development life cycle activities.
- AT-3 - Role-Based Training
- PL-8 - Security And Privacy Architectures
- PM-7 - Enterprise Architecture
- SA-4 - Acquisition Process
- SA-5 - System Documentation
- SA-8 - Security And Privacy Engineering Principles
- SA-11 - Developer Testing And Evaluation
- SA-15 - Development Process, Standards, And Tools
- SA-17 - Developer Security And Privacy Architecture And Design
- SA-22 - Unsupported System Components
- SR-3 - Supply Chain Controls And Processes
- SR-4 - Provenance
- SR-5 - Acquisition Strategies, Tools, And Methods
- SR-9 - Tamper Resistance And Detection
- Joint Task Force (2018) Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2., "SP 800-37" https://doi.org/10.6028/NIST.SP.800-37r2
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- Ross RS, Pillitteri VY, Dempsey KL, Riddle M, Guissanie G (2020) Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-171, Rev. 2., "SP 800-171" https://doi.org/10.6028/NIST.SP.800-171r2
- Ross RS, Pillitteri VY, Graubart RD, Guissanie G, Wagner R, Bodeau D (2020) Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800-171 (Final Public Draft). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-172., "SP 800-172" https://doi.org/10.6028/NIST.SP.800-172-draft
- SA-3(1) - Manage Preproduction Environment
- Protect system preproduction environments commensurate with risk throughout the system development life cycle for the system, system component, or system service.
- SA-3(2) - Use Of Live Or Operational Data
- SA-3(3) - Technology Refresh
- Plan for and implement a technology refresh schedule for the system throughout the system development life cycle.
- RMF Control
- SA-4
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baselines
- NP FS FH CX NH FM CC FL NL NM
- SA-4a.
- Security and privacy functional requirements;
- SA-4b.
- Strength of mechanism requirements;
- SA-4c.
- Security and privacy assurance requirements;
- SA-4d.
- Controls needed to satisfy the security and privacy requirements.
- SA-4e.
- Security and privacy documentation requirements;
- SA-4f.
- Requirements for protecting security and privacy documentation;
- SA-4g.
- Description of the system development environment and environment in which the system is intended to operate;
- SA-4h.
- Allocation of responsibility or identification of parties responsible for information security, privacy, and supply chain risk management; and
- SA-4i.
- Acceptance criteria.
- SA-4.1 - CCI-003094
- The organization includes the security functional requirements, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission/business needs.
- SA-4.2 - CCI-003095
- The organization includes the security strength requirements, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission/business needs.
- SA-4.3 - CCI-003096
- The organization includes the security assurance requirements, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission/business needs.
- SA-4.4 - CCI-003097
- The organization includes the security-related documentation requirements, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission/business needs.
- SA-4.5 - CCI-003098
- The organization includes requirements for protecting security-related documentation, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission/business needs.
- SA-4.6 - CCI-003099
- The organization includes description of the information system development environment and environment in which the system is intended to operate, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission/business needs.
- SA-4.7 - CCI-003100
- The organization includes acceptance criteria, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission/business needs.
- CM-6 - Configuration Settings
- CM-8 - System Component Inventory
- PS-7 - External Personnel Security
- SA-3 - System Development Life Cycle
- SA-5 - System Documentation
- SA-8 - Security And Privacy Engineering Principles
- SA-11 - Developer Testing And Evaluation
- SA-15 - Development Process, Standards, And Tools
- SA-16 - Developer-Provided Training
- SA-17 - Developer Security And Privacy Architecture And Design
- SA-21 - Developer Screening
- SR-3 - Supply Chain Controls And Processes
- SR-5 - Acquisition Strategies, Tools, And Methods
- Boyens JM, Paulsen C, Bartol N, Shankles S, Moorthy R (2012) Notional Supply Chain Risk Management Practices for Federal Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7622., "IR 7622" https://doi.org/10.6028/NIST.IR.7622
- Boyens JM, Paulsen C, Moorthy R, Bartol N (2015) Supply Chain Risk Management Practices for Federal Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-161., "SP 800-161" https://doi.org/10.6028/NIST.SP.800-161
- Brooks S, Garcia M, Lefkovitz N, Lightman S, Nadeau E (2017) An Introduction to Privacy Engineering and Risk Management in Federal Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8062., "IR 8062" https://doi.org/10.6028/NIST.IR.8062
- Cooper DA (2010) Maintaining and Using Key History on Personal Identity Verification (PIV) Cards. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7676., "IR 7676" https://doi.org/10.6028/NIST.IR.7676
- Cooper DA (2012) NIST Test Personal Identity Verification (PIV) Cards. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7870., "IR 7870" https://doi.org/10.6028/NIST.IR.7870
- Cooper DA, Ferraiolo H, Mehta KL, Francomacaro S, Chandramouli R, Mohler J (2015) Interfaces for Personal Identity Verification. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-73-4, Includes updates as of February 8, 2016., "SP 800-73-4" https://doi.org/10.6028/NIST.SP.800-73-4
- Cooper DA, MacGregor WI (2008) Symmetric Key Injection onto Smart Cards. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7539., "IR 7539" https://doi.org/10.6028/NIST.IR.7539
- Dempsey KL, Chawla NS, Johnson LA, Johnston R, Jones AC, Orebaugh AD, Scholl MA, Stine KM (2011) Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-137., "SP 800-137" https://doi.org/10.6028/NIST.SP.800-137
- Grance T, Hash J, Stevens M, O'Neal K, Bartol N (2003) Guide to Information Technology Security Services. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-35., "SP 800-35" https://doi.org/10.6028/NIST.SP.800-35
- International Organization for Standardization/International Electrotechnical Commission 15408-1:2009, , April 2017., "ISO 15408-1" https://www.commoncriteriaportal.org/files/ccfiles
- International Organization for Standardization/International Electrotechnical Commission 15408-2:2008, , April 2017., "ISO 15408-2" https://www.commoncriteriaportal.org/files/ccfiles
- International Organization for Standardization/International Electrotechnical Commission 15408-3:2008, , April 2017., "ISO 15408-3" https://www.commoncriteriaportal.org/files/ccfiles
- International Organization for Standardization/International Electrotechnical Commission/Institute of Electrical and Electronics Engineers (ISO/IEC/IEEE) 29148:2018, , November 2018., "ISO 29148" https://www.iso.org/standard/72089.html
- Joint Task Force (2018) Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2., "SP 800-37" https://doi.org/10.6028/NIST.SP.800-37r2
- National Information Assurance Partnership, ., "NIAP CCEVS" https://www.niap-ccevs.org
- National Institute of Standards and Technology (2013) Personal Identity Verification (PIV) of Federal Employees and Contractors. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 201-2., "FIPS 201-2" https://doi.org/10.6028/NIST.FIPS.201-2
- National Institute of Standards and Technology (2019) Security Requirements for Cryptographic Modules. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 140-3. , "FIPS 140-3" https://doi.org/10.6028/NIST.FIPS.140-3
- National Security Agency, ., "NSA CSFC" https://www.nsa.gov/resources/everyone/csfc
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Privacy Act (P.L. 93-579), December 1974., "PRIVACT" https://www.govinfo.gov/content/pkg/STATUTE-88/pdf
- Quinn SD, Souppaya MP, Cook MR, Scarfone KA (2018) National Checklist Program for IT Products: Guidelines for Checklist Users and Developers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-70, Rev. 4., "SP 800-70" https://doi.org/10.6028/NIST.SP.800-70r4
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- SA-4(1) - Functional Properties Of Controls
- Require the developer of the system, system component, or system service to provide a description of the functional properties of the controls to be implemented.
- SA-4(2) - Design And Implementation Information For Controls
- Require the developer of the system, system component, or system service to provide design and implementation information for the controls that includes: [Selection (one or more): security-relevant external system interfaces; high-level design; low-level design; source code or hardware schematics; [Assignment: organization-defined design and implementation information]] at [Assignment: organization-defined level of detail].
- SA-4(3) - Development Methods, Techniques, And Practices
- Require the developer of the system, system component, or system service to demonstrate the use of a system development life cycle process that includes:
- SA-4(4) - Assignment Of Components To Systems
- [Withdrawn: Incorporated into CM-8(9)].
- SA-4(5) - System, Component, And Service Configurations
- Require the developer of the system, system component, or system service to:
- SA-4(6) - Use Of Information Assurance Products
- SA-4(7) - Niap-Approved Protection Profiles
- SA-4(8) - Continuous Monitoring Plan For Controls
- Require the developer of the system, system component, or system service to produce a plan for continuous monitoring of control effectiveness that is consistent with the continuous monitoring program of the organization.
- SA-4(9) - Functions, Ports, Protocols, And Services In Use
- Require the developer of the system, system component, or system service to identify the functions, ports, protocols, and services intended for organizational use.
- SA-4(10) - Use Of Approved Piv Products
- Employ only information technology products on the FIPS 201-approved products list for Personal Identity Verification (PIV) capability implemented within organizational systems.
- SA-4(11) - System Of Records
- Include [Assignment: organization-defined Privacy Act requirements] in the acquisition contract for the operation of a system of records on behalf of an organization to accomplish an organizational mission or function.
- SA-4(12) - Data Ownership
- RMF Control
- SA-5
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baselines
- FS FH NH FM FL NL NM
- SA-5a.
- Obtain or develop administrator documentation for the system, system component, or system service that describes:
- SA-5b.
- Obtain or develop user documentation for the system, system component, or system service that describes:
- SA-5c.
- Document attempts to obtain system, system component, or system service documentation when such documentation is either unavailable or nonexistent and take [Assignment: organization-defined actions] in response; and
- SA-5d.
- Distribute documentation to [Assignment: organization-defined personnel or roles].
- SA-5.1 - CCI-003124
- The organization obtains administrator documentation for the information system, system component, or information system services that describes secure configuration of the system, component, or service.
- SA-5.2 - CCI-003125
- The organization obtains administrator documentation for the information system, system component, or information system services that describes secure installation of the system, component, or service.
- SA-5.3 - CCI-003126
- The organization obtains administrator documentation for the information system, system component, or information system services that describes secure operation of the system, component, or service.
- SA-5.4 - CCI-003127
- The organization obtains administrator documentation for the information system, system component, or information system services that describes effective use and maintenance of security functions/mechanisms.
- SA-5.5 - CCI-003128
- The organization obtains administrator documentation for the information system, system component, or information system services that describes known vulnerabilities regarding configuration and use of administrative (i.e. privileged) functions.
- SA-5.6 - CCI-003129
- The organization obtains user documentation for the information system, system component, or information system service that describes user-accessible security functions/mechanisms and how to effectively use those security functions/mechanisms.
- SA-5.7 - CCI-003130
- The organization obtains user documentation for the information system, system component or information system service that describes methods for user interaction which enables individuals to use the system, component, or service in a more secure manner.
- SA-5.8 - CCI-003131
- The organization obtains user documentation for the information system, system component or information system service that describes user responsibilities in maintaining the security of the system, component, or service.
- SA-5.11 - CCI-000642
- The organization documents attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent.
- SA-5.9 - CCI-003132
- The organization takes organization-defined actions in response to attempts to obtain either unavailable or nonexistent documentation for information system, system component, or information system service.
- SA-5.10 - CCI-003133
- The organization defines actions to be taken in response to attempts to obtain either unavailable or nonexistent documentation for information system, system component, or information system service.
- SA-5.12 - CCI-003134
- The organization protects information system, system component, or information system service documentation as required, in accordance with the risk management strategy.
- SA-5.13 - CCI-003135
- The organization distributes information system, system component, or information system service documentation to organization-defined personnel or roles.
- SA-5.14 - CCI-003136
- The organization defines the personnel or roles the information system, system component, or information system service documentation is to be distributed.
- CM-4 - Impact Analyses
- CM-6 - Configuration Settings
- CM-7 - Least Functionality
- CM-8 - System Component Inventory
- PL-2 - System Security And Privacy Plans
- PL-4 - Rules Of Behavior
- PL-8 - Security And Privacy Architectures
- PS-2 - Position Risk Designation
- SA-3 - System Development Life Cycle
- SA-4 - Acquisition Process
- SA-8 - Security And Privacy Engineering Principles
- SA-9 - External System Services
- SA-10 - Developer Configuration Management
- SA-11 - Developer Testing And Evaluation
- SA-15 - Development Process, Standards, And Tools
- SA-16 - Developer-Provided Training
- SA-17 - Developer Security And Privacy Architecture And Design
- SI-12 - Information Management And Retention
- SR-3 - Supply Chain Controls And Processes
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- SA-5(1) - Functional Properties Of Security Controls
- [Withdrawn: Incorporated into SA-4(1)].
- SA-5(2) - Security-Relevant External System Interfaces
- [Withdrawn: Incorporated into SA-4(2)].
- SA-5(3) - High-Level Design
- [Withdrawn: Incorporated into SA-4(2)].
- SA-5(4) - Low-Level Design
- [Withdrawn: Incorporated into SA-4(2)].
- SA-5(5) - Source Code
- [Withdrawn: Incorporated into SA-4(2)].
- RMF Control
- SA-6
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baselines
- —
- RMF Control
- SA-7
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baselines
- —
- RMF Control
- SA-8
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baselines
- NP FS FH NH FM FL NL NM
- SA-8.1 - CCI-000664
- The organization applies information system security engineering principles in the specification of the information system.
- SA-8.2 - CCI-000665
- The organization applies information system security engineering principles in the design of the information system.
- SA-8.3 - CCI-000666
- The organization applies information system security engineering principles in the development of the information system.
- SA-8.4 - CCI-000667
- The organization applies information system security engineering principles in the implementation of the information system.
- SA-8.5 - CCI-000668
- The organization applies information system security engineering principles in the modification of the information system.
- PL-8 - Security And Privacy Architectures
- PM-7 - Enterprise Architecture
- RA-2 - Security Categorization
- RA-3 - Risk Assessment
- RA-9 - Criticality Analysis
- SA-3 - System Development Life Cycle
- SA-4 - Acquisition Process
- SA-15 - Development Process, Standards, And Tools
- SA-17 - Developer Security And Privacy Architecture And Design
- SA-20 - Customized Development Of Critical Components
- SC-2 - Separation Of System And User Functionality
- SC-3 - Security Function Isolation
- SC-32 - System Partitioning
- SC-39 - Process Isolation
- SR-2 - Supply Chain Risk Management Plan
- SR-3 - Supply Chain Controls And Processes
- SR-4 - Provenance
- SR-5 - Acquisition Strategies, Tools, And Methods
- Brooks S, Garcia M, Lefkovitz N, Lightman S, Nadeau E (2017) An Introduction to Privacy Engineering and Risk Management in Federal Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8062., "IR 8062" https://doi.org/10.6028/NIST.IR.8062
- Joint Task Force (2018) Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2., "SP 800-37" https://doi.org/10.6028/NIST.SP.800-37r2
- Joint Task Force Transformation Initiative (2014) Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-53A, Rev. 4, Includes updates as of December 18, 2014., "SP 800-53A" https://doi.org/10.6028/NIST.SP.800-53Ar4
- National Institute of Standards and Technology (2004) Standards for Security Categorization of Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 199., "FIPS 199" https://doi.org/10.6028/NIST.FIPS.199
- National Institute of Standards and Technology (2006) Minimum Security Requirements for Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 200., "FIPS 200" https://doi.org/10.6028/NIST.FIPS.200
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Privacy Act (P.L. 93-579), December 1974., "PRIVACT" https://www.govinfo.gov/content/pkg/STATUTE-88/pdf
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- Stine KM, Kissel RL, Barker WC, Fahlsing J, Gulick J (2008) Guide for Mapping Types of Information and Information Systems to Security Categories. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-60, Vol. 1, Rev. 1., "SP 800-60-1" https://doi.org/10.6028/NIST.SP.800-60v1r1
- Stine KM, Kissel RL, Barker WC, Lee A, Fahlsing J (2008) Guide for Mapping Types of Information and Information Systems to Security Categories: Appendices. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-60, Vol. 2, Rev. 1., "SP 800-60-2" https://doi.org/10.6028/NIST.SP.800-60v2r1
- SA-8(1) - Clear Abstractions
- Implement the security design principle of clear abstractions.
- SA-8(2) - Least Common Mechanism
- Implement the security design principle of least common mechanism in [Assignment: organization-defined systems or system components].
- SA-8(3) - Modularity And Layering
- Implement the security design principles of modularity and layering in [Assignment: organization-defined systems or system components].
- SA-8(4) - Partially Ordered Dependencies
- Implement the security design principle of partially ordered dependencies in [Assignment: organization-defined systems or system components].
- SA-8(5) - Efficiently Mediated Access
- Implement the security design principle of efficiently mediated access in [Assignment: organization-defined systems or system components].
- SA-8(6) - Minimized Sharing
- Implement the security design principle of minimized sharing in [Assignment: organization-defined systems or system components].
- SA-8(7) - Reduced Complexity
- Implement the security design principle of reduced complexity in [Assignment: organization-defined systems or system components].
- SA-8(8) - Secure Evolvability
- Implement the security design principle of secure evolvability in [Assignment: organization-defined systems or system components].
- SA-8(9) - Trusted Components
- Implement the security design principle of trusted components in [Assignment: organization-defined systems or system components].
- SA-8(10) - Hierarchical Trust
- Implement the security design principle of hierarchical trust in [Assignment: organization-defined systems or system components].
- SA-8(11) - Inverse Modification Threshold
- Implement the security design principle of inverse modification threshold in [Assignment: organization-defined systems or system components].
- SA-8(12) - Hierarchical Protection
- Implement the security design principle of hierarchical protection in [Assignment: organization-defined systems or system components].
- SA-8(13) - Minimized Security Elements
- Implement the security design principle of minimized security elements in [Assignment: organization-defined systems or system components].
- SA-8(14) - Least Privilege
- Implement the security design principle of least privilege in [Assignment: organization-defined systems or system components].
- SA-8(15) - Predicate Permission
- Implement the security design principle of predicate permission in [Assignment: organization-defined systems or system components].
- SA-8(16) - Self-Reliant Trustworthiness
- Implement the security design principle of self-reliant trustworthiness in [Assignment: organization-defined systems or system components].
- SA-8(17) - Secure Distributed Composition
- Implement the security design principle of secure distributed composition in [Assignment: organization-defined systems or system components].
- SA-8(18) - Trusted Communications Channels
- Implement the security design principle of trusted communications channels in [Assignment: organization-defined systems or system components].
- SA-8(19) - Continuous Protection
- Implement the security design principle of continuous protection in [Assignment: organization-defined systems or system components].
- SA-8(20) - Secure Metadata Management
- Implement the security design principle of secure metadata management in [Assignment: organization-defined systems or system components].
- SA-8(21) - Self-Analysis
- Implement the security design principle of self-analysis in [Assignment: organization-defined systems or system components].
- SA-8(22) - Accountability And Traceability
- Implement the security design principle of accountability and traceability in [Assignment: organization-defined systems or system components].
- SA-8(23) - Secure Defaults
- Implement the security design principle of secure defaults in [Assignment: organization-defined systems or system components].
- SA-8(24) - Secure Failure And Recovery
- Implement the security design principle of secure failure and recovery in [Assignment: organization-defined systems or system components].
- SA-8(25) - Economic Security
- Implement the security design principle of economic security in [Assignment: organization-defined systems or system components].
- SA-8(26) - Performance Security
- Implement the security design principle of performance security in [Assignment: organization-defined systems or system components].
- SA-8(27) - Human Factored Security
- Implement the security design principle of human factored security in [Assignment: organization-defined systems or system components].
- SA-8(28) - Acceptable Security
- Implement the security design principle of acceptable security in [Assignment: organization-defined systems or system components].
- SA-8(29) - Repeatable And Documented Procedures
- Implement the security design principle of repeatable and documented procedures in [Assignment: organization-defined systems or system components].
- SA-8(30) - Procedural Rigor
- Implement the security design principle of procedural rigor in [Assignment: organization-defined systems or system components].
- SA-8(31) - Secure System Modification
- Implement the security design principle of secure system modification in [Assignment: organization-defined systems or system components].
- SA-8(32) - Sufficient Documentation
- Implement the security design principle of sufficient documentation in [Assignment: organization-defined systems or system components].
- SA-8(33) - Minimization
- Implement the privacy principle of minimization using [Assignment: organization-defined processes].
- RMF Control
- SA-9
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baselines
- NP FS FH CX NH FM CC FL NL NM
- SA-9a.
- Require that providers of external system services comply with organizational security and privacy requirements and employ the following controls: [Assignment: organization-defined controls];
- SA-9b.
- Define and document organizational oversight and user roles and responsibilities with regard to external system services; and
- SA-9c.
- Employ the following processes, methods, and techniques to monitor control compliance by external service providers on an ongoing basis: [Assignment: organization-defined processes, methods, and techniques].
- SA-9.3 - CCI-003137
- The organization defines security controls that providers of external information system services employ in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.
- SA-9.1 - CCI-000669
- The organization requires that providers of external information system services comply with organizational information security requirements.
- SA-9.2 - CCI-000670
- The organization requires that providers of external information system services employ organization-defined security controls in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.
- SA-9.4 - CCI-000671
- The organization defines government oversight with regard to external information system services.
- SA-9.5 - CCI-000672
- The organization documents government oversight with regard to external information system services.
- SA-9.6 - CCI-000673
- The organization defines user roles and responsibilities with regard to external information system services.
- SA-9.7 - CCI-000674
- The organization documents user roles and responsibilities with regard to external information system services.
- SA-9.8 - CCI-003138
- The organization employs organization-defined processes, methods, and techniques to monitor security control compliance by external service providers on an ongoing basis.
- SA-9.9 - CCI-003139
- The organization defines processes, methods, and techniques to employ to monitor security control compliance by external service providers on an ongoing basis.
- AC-20 - Use Of External Systems
- CA-3 - Information Exchange
- CP-2 - Contingency Plan
- IR-4 - Incident Handling
- IR-7 - Incident Response Assistance
- PL-10 - Baseline Selection
- PL-11 - Baseline Tailoring
- PS-7 - External Personnel Security
- SA-2 - Allocation Of Resources
- SA-4 - Acquisition Process
- SR-3 - Supply Chain Controls And Processes
- SR-5 - Acquisition Strategies, Tools, And Methods
- Boyens JM, Paulsen C, Moorthy R, Bartol N (2015) Supply Chain Risk Management Practices for Federal Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-161., "SP 800-161" https://doi.org/10.6028/NIST.SP.800-161
- Grance T, Hash J, Stevens M, O'Neal K, Bartol N (2003) Guide to Information Technology Security Services. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-35., "SP 800-35" https://doi.org/10.6028/NIST.SP.800-35
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- Ross RS, Pillitteri VY, Dempsey KL, Riddle M, Guissanie G (2020) Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-171, Rev. 2., "SP 800-171" https://doi.org/10.6028/NIST.SP.800-171r2
- SA-9(1) - Risk Assessments And Organizational Approvals
- SA-9(2) - Identification Of Functions, Ports, Protocols, And Services
- Require providers of the following external system services to identify the functions, ports, protocols, and other services required for the use of such services: [Assignment: organization-defined external system services].
- SA-9(3) - Establish And Maintain Trust Relationship With Providers
- Establish, document, and maintain trust relationships with external service providers based on the following requirements, properties, factors, or conditions: [Assignment: organization-defined security and privacy requirements, properties, factors, or conditions defining acceptable trust relationships].
- SA-9(4) - Consistent Interests Of Consumers And Providers
- Take the following actions to verify that the interests of [Assignment: organization-defined external service providers] are consistent with and reflect organizational interests: [Assignment: organization-defined actions].
- SA-9(5) - Processing, Storage, And Service Location
- Restrict the location of [Selection (one or more): information processing; information or data; system services] to [Assignment: organization-defined locations] based on [Assignment: organization-defined requirements or conditions].
- SA-9(6) - Organization-Controlled Cryptographic Keys
- Maintain exclusive control of cryptographic keys for encrypted material stored or transmitted through an external system.
- SA-9(7) - Organization-Controlled Integrity Checking
- Provide the capability to check the integrity of information while it resides in the external system.
- SA-9(8) - Processing And Storage Location — U.s. Jurisdiction
- Restrict the geographic location of information processing and data storage to facilities located within in the legal jurisdictional boundary of the United States.
- RMF Control
- SA-10
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baselines
- FH CX NH FM NM
- SA-10a.
- Perform configuration management during system, component, or service [Selection (one or more): design; development; implementation; operation; disposal];
- SA-10b.
- Document, manage, and control the integrity of changes to [Assignment: organization-defined configuration items under configuration management];
- SA-10c.
- Implement only organization-approved changes to the system, component, or service;
- SA-10d.
- Document approved changes to the system, component, or service and the potential security and privacy impacts of such changes; and
- SA-10e.
- Track security flaws and flaw resolution within the system, component, or service and report findings to [Assignment: organization-defined personnel].
- SA-10.1 - CCI-003155
- The organization requires the developer of the information system, system component, or information system service to perform configuration management during system, component or service design, development, implementation and/or operation.
- SA-10.2 - CCI-003156
- The organization requires the developer of the information system, system component, or information system service to document the integrity of changes to organization-defined configuration items under configuration management.
- SA-10.3 - CCI-003157
- The organization requires the developer of the information system, system component, or information system service to manage the integrity of changes to organization-defined configuration items under configuration management.
- SA-10.4 - CCI-003158
- The organization requires the developer of the information system, system component, or information system service to control the integrity of changes to organization-defined configuration items under configuration management.
- SA-10.5 - CCI-003159
- The organization defines the configuration items under configuration management that require the integrity of changes to be documented, managed and controlled.
- SA-10.6 - CCI-000692
- The organization requires the developer of the information system, system component, or information system service to implement only organization-approved changes to the system, component, or service.
- SA-10.7 - CCI-000694
- The organization requires the developer of the information system, system component, or information system service to document approved changes to the system, component, or service.
- SA-10.8 - CCI-003160
- The organization requires the developer of the information system, system component, or information system service to document the potential security impacts of approved changes to the system, component, or service.
- SA-10.9 - CCI-003161
- The organization requires the developer of the information system, system component, or information system service to track security flaws within the system, component, or service.
- SA-10.10 - CCI-003162
- The organization requires the developer of the information system, system component, or information system service to track flaw resolution within the system, component, or service.
- SA-10.11 - CCI-003163
- The organization requires the developer of the information system, system component, or information system service to report security flaws and flaw resolution within the system, component, or service findings to organization-defined personnel.
- SA-10.12 - CCI-003164
- The organization defines the personnel to whom security flaw findings and flaw resolution within the system, component, or service are reported.
- CM-2 - Baseline Configuration
- CM-3 - Configuration Change Control
- CM-4 - Impact Analyses
- CM-7 - Least Functionality
- CM-9 - Configuration Management Plan
- SA-4 - Acquisition Process
- SA-5 - System Documentation
- SA-8 - Security And Privacy Engineering Principles
- SA-15 - Development Process, Standards, And Tools
- SI-2 - Flaw Remediation
- SR-3 - Supply Chain Controls And Processes
- SR-4 - Provenance
- SR-5 - Acquisition Strategies, Tools, And Methods
- SR-6 - Supplier Assessments And Reviews
- Johnson LA, Dempsey KL, Ross RS, Gupta S, Bailey D (2011) Guide for Security-Focused Configuration Management of Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-128, Includes updates as of October 10, 2019., "SP 800-128" https://doi.org/10.6028/NIST.SP.800-128
- National Institute of Standards and Technology (2015) Secure Hash Standard (SHS). (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 180-4., "FIPS 180-4" https://doi.org/10.6028/NIST.FIPS.180-4
- National Institute of Standards and Technology (2015) SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 202., "FIPS 202" https://doi.org/10.6028/NIST.FIPS.202
- National Institute of Standards and Technology (2019) Security Requirements for Cryptographic Modules. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 140-3. , "FIPS 140-3" https://doi.org/10.6028/NIST.FIPS.140-3
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- SA-10(1) - Software And Firmware Integrity Verification
- Require the developer of the system, system component, or system service to enable integrity verification of software and firmware components.
- SA-10(2) - Alternative Configuration Management Processes
- Provide an alternate configuration management process using organizational personnel in the absence of a dedicated developer configuration management team.
- SA-10(3) - Hardware Integrity Verification
- Require the developer of the system, system component, or system service to enable integrity verification of hardware components.
- SA-10(4) - Trusted Generation
- Require the developer of the system, system component, or system service to employ tools for comparing newly generated versions of security-relevant hardware descriptions, source code, and object code with previous versions.
- SA-10(5) - Mapping Integrity For Version Control
- Require the developer of the system, system component, or system service to maintain the integrity of the mapping between the master build data describing the current version of security-relevant hardware, software, and firmware and the on-site master copy of the data for the current version.
- SA-10(6) - Trusted Distribution
- Require the developer of the system, system component, or system service to execute procedures for ensuring that security-relevant hardware, software, and firmware updates distributed to the organization are exactly as specified by the master copies.
- SA-10(7) - Security And Privacy Representatives
- Require [Assignment: organization-defined security and privacy representatives] to be included in the [Assignment: organization-defined configuration change management and control process].
- RMF Control
- SA-11
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baselines
- NP FH CX NH FM NM
- SA-11a.
- Develop and implement a plan for ongoing security and privacy control assessments;
- SA-11b.
- Perform [Selection (one or more): unit; integration; system; regression] testing/evaluation [Assignment: organization-defined frequency] at [Assignment: organization-defined depth and coverage];
- SA-11c.
- Produce evidence of the execution of the assessment plan and the results of the testing and evaluation;
- SA-11d.
- Implement a verifiable flaw remediation process; and
- SA-11e.
- Correct flaws identified during testing and evaluation.
- SA-11.1 - CCI-003171
- The organization requires the developer of the information system, system component, or information system service to create a security assessment plan.
- SA-11.2 - CCI-003172
- The organization requires the developer of the information system, system component, or information system service to implement a security assessment plan.
- SA-11.3 - CCI-003173
- The organization requires the developer of the information system, system component, or information system service to perform unit, integration, system, and/or regression testing/evaluation at organization-defined depth and coverage.
- SA-11.4 - CCI-003174
- The organization defines the depth and coverage to perform unit, integration, system, and/or regression testing/evaluation.
- SA-11.5 - CCI-003175
- The organization requires the developer of the information system, system component, or information system service to produce evidence of the execution of the security assessment plan.
- SA-11.6 - CCI-003176
- The organization requires the developer of the information system, system component, or information system service to produce the results of the security testing/evaluation.
- SA-11.7 - CCI-003177
- The organization requires the developer of the information system, system component, or information system service to implement a verifiable flaw remediation process.
- SA-11.8 - CCI-003178
- The organization requires the developer of the information system, system component, or information system service to correct flaws identified during security testing/evaluation.
- CA-2 - Control Assessments
- CA-7 - Continuous Monitoring
- CM-4 - Impact Analyses
- SA-3 - System Development Life Cycle
- SA-4 - Acquisition Process
- SA-5 - System Documentation
- SA-8 - Security And Privacy Engineering Principles
- SA-15 - Development Process, Standards, And Tools
- SA-17 - Developer Security And Privacy Architecture And Design
- SI-2 - Flaw Remediation
- SR-5 - Acquisition Strategies, Tools, And Methods
- SR-6 - Supplier Assessments And Reviews
- SR-7 - Supply Chain Operations Security
- International Organization for Standardization/International Electrotechnical Commission 15408-3:2008, , April 2017., "ISO 15408-3" https://www.commoncriteriaportal.org/files/ccfiles
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- Joint Task Force Transformation Initiative (2014) Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-53A, Rev. 4, Includes updates as of December 18, 2014., "SP 800-53A" https://doi.org/10.6028/NIST.SP.800-53Ar4
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- Souppaya MP, Scarfone KA (2016) Guide to Data-Centric System Threat Modeling. (National Institute of Standards and Technology, Gaithersburg, MD), Draft NIST Special Publication (SP) 800-154., "SP 800-154" https://csrc.nist.gov/publications/detail/sp/800-1
- SA-11(1) - Static Code Analysis
- Require the developer of the system, system component, or system service to employ static code analysis tools to identify common flaws and document the results of the analysis.
- SA-11(2) - Threat Modeling And Vulnerability Analyses
- Require the developer of the system, system component, or system service to perform threat modeling and vulnerability analyses during development and the subsequent testing and evaluation of the system, component, or service that:
- SA-11(3) - Independent Verification Of Assessment Plans And Evidence
- SA-11(4) - Manual Code Reviews
- Require the developer of the system, system component, or system service to perform a manual code review of [Assignment: organization-defined specific code] using the following processes, procedures, and/or techniques: [Assignment: organization-defined processes, procedures, and/or techniques].
- SA-11(5) - Penetration Testing
- Require the developer of the system, system component, or system service to perform penetration testing:
- SA-11(6) - Attack Surface Reviews
- Require the developer of the system, system component, or system service to perform attack surface reviews.
- SA-11(7) - Verify Scope Of Testing And Evaluation
- Require the developer of the system, system component, or system service to verify that the scope of testing and evaluation provides complete coverage of the required controls at the following level of rigor: [Assignment: organization-defined breadth and depth of testing and evaluation].
- SA-11(8) - Dynamic Code Analysis
- Require the developer of the system, system component, or system service to employ dynamic code analysis tools to identify common flaws and document the results of the analysis.
- SA-11(9) - Interactive Application Security Testing
- Require the developer of the system, system component, or system service to employ interactive application security testing tools to identify flaws and document the results.
- RMF Control
- SA-12
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baselines
- —
- SA-12.1 - CCI-000722
- The organization defines the security safeguards to employ to protect against supply chain threats to the information system, system component, or information system service.
- SA-12.2 - CCI-000723
- The organization protects against supply chain threats to the information system, system component, or information system service by employing organization-defined security safeguards as part of a comprehensive, defense-in-breadth information security strategy.
- SA-12(1) - Acquisition Strategies / Tools / Methods
- [Withdrawn: Moved to SR-5].
- SA-12(2) - Supplier Reviews
- [Withdrawn: Moved to SR-6].
- SA-12(3) - Trusted Shipping And Warehousing
- [Withdrawn: Incorporated into SR-3].
- SA-12(4) - Diversity Of Suppliers
- [Withdrawn: Moved to SR-3(1)].
- SA-12(5) - Limitation Of Harm
- [Withdrawn: Moved to SR-3(2)].
- SA-12(6) - Minimizing Procurement Time
- [Withdrawn: Incorporated into SR-5(1)].
- SA-12(7) - Assessments Prior To Selection / Acceptance / Update
- [Withdrawn: Moved to SR-5(2)].
- SA-12(8) - Use Of All-Source Intelligence
- [Withdrawn: Incorporated into RA-3(2)].
- SA-12(9) - Operations Security
- [Withdrawn: Moved to SR-7].
- SA-12(10) - Validate As Genuine And Not Altered
- [Withdrawn: Moved to SR-4(3)].
- SA-12(11) - Penetration Testing / Analysis Of Elements, Processes, And Actors
- [Withdrawn: Moved to SR-6(1)].
- SA-12(12) - Inter-Organizational Agreements
- [Withdrawn: Moved to SR-8].
- SA-12(13) - Critical Information System Components
- [Withdrawn: Incorporated into MA-6, RA-9].
- SA-12(14) - Identity And Traceability
- [Withdrawn: Incorporated into SR-4(1), SR-4(2)].
- SA-12(15) - Processes To Address Weaknesses Or Deficiencies
- [Withdrawn: Incorporated into SR-3].
- RMF Control
- SA-13
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baselines
- —
- SA-13.1 - CCI-003225
- The organization describes the trustworthiness required in the organization-defined information system, information system component, or information system service supporting its critical missions/business functions.
- SA-13.2 - CCI-003226
- The organization defines the information system, information system component, or information system service supporting its critical missions/business functions in which the trustworthiness must be described.
- SA-13.3 - CCI-003227
- The organization implements an organization-defined assurance overlay to achieve trustworthiness required to support its critical missions/business functions.
- SA-13.4 - CCI-003228
- The organization defines an assurance overlay to be implemented to achieve trustworthiness required to support its critical missions/business functions.
- RMF Control
- SA-14
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baselines
- —
- SA-14.1 - CCI-003229
- The organization identifies critical information system components by performing a criticality analysis for organization-defined information systems, information system components, or information system services at organization-defined decision points in the system development life cycle.
- SA-14.2 - CCI-003230
- The organization identifies critical information system functions by performing a criticality analysis for organization-defined information systems, information system components, or information system services at organization-defined decision points in the system development life cycle.
- SA-14.3 - CCI-003231
- The organization defines the information systems, information system components, or information system services for which the organization identifies critical information system components and functions for criticality analysis.
- SA-14.4 - CCI-003232
- The organization defines the decision points in the system development life cycle at which to perform a criticality analysis to identify critical information system components and functions for organization-defined information systems, information system components , or information system services.
- SA-14(1) - Critical Components With No Viable Alternative Sourcing
- [Withdrawn: Incorporated into SA-20].
- RMF Control
- SA-15
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baselines
- FH CX NH FM NM
- SA-15a.
- Require the developer of the system, system component, or system service to follow a documented development process that:
- SA-15b.
- Review the development process, standards, tools, tool options, and tool configurations [Assignment: organization-defined frequency] to determine if the process, standards, tools, tool options and tool configurations selected and employed can satisfy the following security and privacy requirements: [Assignment: organization-defined security and privacy requirements].
- SA-15.1 - CCI-003233
- The organization requires the developer of the information system, system component, or information system service to follow a documented development process.
- SA-15.2 - CCI-003234
- The documented information system, system component, or information system service development process explicitly addresses security requirements.
- SA-15.3 - CCI-003235
- The documented information system, system component, or information system service development process identifies the standards used in the development process.
- SA-15.4 - CCI-003236
- The documented information system, system component, or information system service development process identifies the tools used in the development process.
- SA-15.5 - CCI-003237
- The documented information system, system component, or information system service development process documents the specific tool options and tool configurations used in the development process.
- SA-15.6 - CCI-003238
- The documented information system, system component, or information system service development process documents changes to the process and/or tools used in development.
- SA-15.7 - CCI-003239
- The documented information system, system component, or information system service development process manages changes to the process and/or tools used in development.
- SA-15.8 - CCI-003240
- The documented information system, system component, or information system service development process ensures the integrity of changes to the process and/or tools used in development.
- SA-15.9 - CCI-003241
- The organization reviews the development process in accordance with organization-defined frequency to determine if the development process selected and employed can satisfy organization-defined security requirements.
- SA-15.10 - CCI-003242
- The organization reviews the development standards in accordance with organization-defined frequency to determine if the development standards selected and employed can satisfy organization-defined security requirements.
- SA-15.11 - CCI-003243
- The organization reviews the development tools in accordance with organization-defined frequency to determine if the development tools selected and employed can satisfy organization-defined security requirements.
- SA-15.12 - CCI-003244
- The organization reviews the development tool options/configurations in accordance with organization-defined frequency to determine if the development tool options/configurations selected and employed can satisfy organization-defined security requirements.
- SA-15.13 - CCI-003245
- The organization defines the frequency on which to review the development process, standards, tools, and tool options/configurations to determine if the process, standards, tools, and tool options/configurations selected and employed can satisfy organization-defined security requirements.
- SA-15.14 - CCI-003246
- The organization defines the security requirements that must be satisfied by conducting a review of the development process, standards, tools, and tool options/configurations.
- MA-6 - Timely Maintenance
- SA-3 - System Development Life Cycle
- SA-4 - Acquisition Process
- SA-8 - Security And Privacy Engineering Principles
- SA-10 - Developer Configuration Management
- SA-11 - Developer Testing And Evaluation
- SR-3 - Supply Chain Controls And Processes
- SR-4 - Provenance
- SR-5 - Acquisition Strategies, Tools, And Methods
- SR-6 - Supplier Assessments And Reviews
- SR-9 - Tamper Resistance And Detection
- Paulsen C, Boyens JM, Bartol N, Winkler K (2018) Criticality Analysis Process Model: Prioritizing Systems and Components. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8179., "IR 8179" https://doi.org/10.6028/NIST.IR.8179
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- SA-15(1) - Quality Metrics
- Require the developer of the system, system component, or system service to:
- SA-15(2) - Security And Privacy Tracking Tools
- Require the developer of the system, system component, or system service to select and employ security and privacy tracking tools for use during the development process.
- SA-15(3) - Criticality Analysis
- Require the developer of the system, system component, or system service to perform a criticality analysis:
- SA-15(4) - Threat Modeling And Vulnerability Analysis
- [Withdrawn: Incorporated into SA-11(2)].
- SA-15(5) - Attack Surface Reduction
- Require the developer of the system, system component, or system service to reduce attack surfaces to [Assignment: organization-defined thresholds].
- SA-15(6) - Continuous Improvement
- Require the developer of the system, system component, or system service to implement an explicit process to continuously improve the development process.
- SA-15(7) - Automated Vulnerability Analysis
- Require the developer of the system, system component, or system service [Assignment: organization-defined frequency] to:
- SA-15(8) - Reuse Of Threat And Vulnerability Information
- Require the developer of the system, system component, or system service to use threat modeling and vulnerability analyses from similar systems, components, or services to inform the current development process.
- SA-15(9) - Use Of Live Data
- [Withdrawn: Incorporated into SA-3(2)].
- SA-15(10) - Incident Response Plan
- Require the developer of the system, system component, or system service to provide, implement, and test an incident response plan.
- SA-15(11) - Archive System Or Component
- Require the developer of the system or system component to archive the system or component to be released or delivered together with the corresponding evidence supporting the final security and privacy review.
- SA-15(12) - Minimize Personally Identifiable Information
- Require the developer of the system or system component to minimize the use of personally identifiable information in development and test environments.
- RMF Control
- SA-16
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baselines
- FH NH
- SA-16.1 - CCI-003291
- The organization requires the developer of the information system, system component, or information system service to provide organization-defined training on the correct use and operation of the implemented security functions, controls, and/or mechanisms.
- SA-16.2 - CCI-003292
- The organization defines the training the developer of the information system, system component, or information system service is required to provide on the correct use and operation of the implemented security functions, controls, and/or mechanisms.
- RMF Control
- SA-17
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baselines
- FH CX NH
- SA-17a.
- Is consistent with the organization’s security and privacy architecture that is an integral part the organization’s enterprise architecture;
- SA-17b.
- Accurately and completely describes the required security and privacy functionality, and the allocation of controls among physical and logical components; and
- SA-17c.
- Expresses how individual security and privacy functions, mechanisms, and services work together to provide required security and privacy capabilities and a unified approach to protection.
- SA-17.1 - CCI-003293
- The organization requires the developer of the information system, system component, or information system service to produce a design specification and security architecture.
- SA-17.2 - CCI-003294
- The design specification and security architecture is consistent with and supportive of the organization's security architecture which is established within and is interrogated part of the organization's enterprise architecture.
- SA-17.3 - CCI-003295
- The design specification and security architecture accurately and completely describes the required security functionality
- SA-17.4 - CCI-003296
- The design specification and security architecture accurately and completely describes the allocation of security controls among physical and logical components.
- SA-17.5 - CCI-003297
- The design specification and security architecture expresses how individual security functions, mechanisms, and services work together to provide required security capabilities and a unified approach to protection.
- International Organization for Standardization/International Electrotechnical Commission 15408-2:2008, , April 2017., "ISO 15408-2" https://www.commoncriteriaportal.org/files/ccfiles
- International Organization for Standardization/International Electrotechnical Commission 15408-3:2008, , April 2017., "ISO 15408-3" https://www.commoncriteriaportal.org/files/ccfiles
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- SA-17(1) - Formal Policy Model
- Require the developer of the system, system component, or system service to:
- SA-17(2) - Security-Relevant Components
- Require the developer of the system, system component, or system service to:
- SA-17(3) - Formal Correspondence
- Require the developer of the system, system component, or system service to:
- SA-17(4) - Informal Correspondence
- Require the developer of the system, system component, or system service to:
- SA-17(5) - Conceptually Simple Design
- Require the developer of the system, system component, or system service to:
- SA-17(6) - Structure For Testing
- Require the developer of the system, system component, or system service to structure security-relevant hardware, software, and firmware to facilitate testing.
- SA-17(7) - Structure For Least Privilege
- Require the developer of the system, system component, or system service to structure security-relevant hardware, software, and firmware to facilitate controlling access with least privilege.
- SA-17(8) - Orchestration
- Design [Assignment: organization-defined critical systems or system components] with coordinated behavior to implement the following capabilities: [Assignment: organization-defined capabilities, by system or component].
- SA-17(9) - Design Diversity
- Use different designs for [Assignment: organization-defined critical systems or system components] to satisfy a common set of requirements or to provide equivalent functionality.
- RMF Control
- SA-18
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baselines
- —
- SA-18.1 - CCI-003346
- The organization implements a tamper protection program for the information system, system component, or information system service.
- SA-18(1) - Multiple Phases Of System Development Life Cycle
- [Withdrawn: Moved to SR-9(1)].
- SA-18(2) - Inspection Of Systems Or Components
- [Withdrawn: Moved to SR-10].
- RMF Control
- SA-19
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baselines
- —
- SA-19.1 - CCI-003356
- The organization develops anti-counterfeit policy that include the means to detect counterfeit components from entering the information system.
- SA-19.2 - CCI-003357
- The organization develops anti-counterfeit policy that include the means to prevent counterfeit components from entering the information system.
- SA-19.3 - CCI-003358
- The organization develops anti-counterfeit procedures that include the means to detect counterfeit components from entering the information system.
- SA-19.4 - CCI-003359
- The organization develops anti-counterfeit procedures that include the means to prevent counterfeit components from entering the information system.
- SA-19.5 - CCI-003360
- The organization implements anti-counterfeit policy that include the means to detect counterfeit components from entering the information system.
- SA-19.6 - CCI-003361
- The organization implements anti-counterfeit policy that include the means to prevent counterfeit components from entering the information system.
- SA-19.7 - CCI-003362
- The organization implements anti-counterfeit procedures that include the means to detect counterfeit components from entering the information system.
- SA-19.8 - CCI-003363
- The organization implements anti-counterfeit procedures that include the means to prevent counterfeit components from entering the information system.
- SA-19.9 - CCI-003364
- The organization reports counterfeit information system components to source of counterfeit component, organization-defined external reporting organizations and/or organization-defined personnel or roles.
- SA-19.10 - CCI-003365
- The organization defines the external reporting organizations to whom counterfeit information system components are to be reported.
- SA-19.11 - CCI-003366
- The organization defines the personnel or roles to whom counterfeit information system components are to be reported.
- SA-19(1) - Anti-Counterfeit Training
- [Withdrawn: Moved to SR-11(1)].
- SA-19(2) - Configuration Control For Component Service And Repair
- [Withdrawn: Moved to SR-11(2)].
- SA-19(3) - Component Disposal
- [Withdrawn: Moved to SR-12].
- SA-19(4) - Anti-Counterfeit Scanning
- [Withdrawn: Moved to SR-11(3)].
- RMF Control
- SA-20
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baselines
- —
- SA-20.1 - CCI-003386
- The organization defines the critical information system components to re-implement or custom develop.
- SA-20.2 - CCI-003387
- The organization re-implements or custom develops organization-defined critical information system components.
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- RMF Control
- SA-21
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baselines
- FH NH
- SA-21a.
- Has appropriate access authorizations as determined by assigned [Assignment: organization-defined official government duties]; and
- SA-21b.
- Satisfies the following additional personnel screening criteria: [Assignment: organization-defined additional personnel screening criteria].
- SA-21.1 - CCI-003384
- The organization defines the information system, system component, or information system service which require the information system developer to have appropriate access authorizations and satisfy additional personnel screening criteria.
- SA-21.2 - CCI-003383
- The organization defines the official government duties to be assigned to the developer of organization-defined information system, system component, or information system service.
- SA-21.3 - CCI-003385
- The organization requires that the developer of organization-defined information system, system component, or information system service have appropriate access authorizations as determined by assigned organization-defined official government duties.
- SA-21.5 - CCI-003382
- The organization requires that the developer of organization-defined information system, system component, or information system service satisfy organization-defined additional personnel screening criteria.
- SA-21.4 - CCI-003381
- The organization defines additional personnel screening criteria that must be satisfied by the developer of organization-defined information system, system component, or information system service.
- SA-21(1) - Validation Of Screening
- [Withdrawn: Incorporated into SA-21].
- RMF Control
- SA-22
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baselines
- FS FH NH FM FL NL NM
- SA-22a.
- Replace system components when support for the components is no longer available from the developer, vendor, or manufacturer; or
- SA-22b.
- Provide the following options for alternative sources for continued support for unsupported components [Selection (one or more): in-house support; [Assignment: organization-defined support from external providers]].
- SA-22.2 - CCI-003374
- The organization documents approval for the continued use of unsupported system components required to satisfy mission/business needs.
- SA-22.3 - CCI-003375
- The organization provides justification for the continued use of unsupported system components required to satisfy mission/business needs.
- SA-22.1 - CCI-003376
- The organization replaces information system components when support for the components is no longer available from the developer, vendor, or manufacturer.
- SA-22(1) - Alternative Sources For Continued Support
- [Withdrawn: Incorporated into SA-22].
- RMF Control
- SA-23
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baselines
- —
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- Ross RS, Pillitteri VY, Graubart R, Bodeau D, McQuaid R (2019) Developing Cyber Resilient Systems: A Systems Security Engineering Approach. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 2., "SP 800-160-2" https://doi.org/10.6028/NIST.SP.800-160v2
- RMF Control
- SC-1
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- FS FH NH FM FL NL NM
- SC-1a.
- Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
- SC-1b.
- Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the system and communications protection policy and procedures; and
- SC-1c.
- Review and update the current system and communications protection:
- SC-1.2 - CCI-002380
- The organization defines the personnel or roles to be recipients of the procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls.
- SC-1.1 - CCI-002378
- The organization defines the personnel or roles to be recipients of the system and communications protection policy.
- SC-1.3 - CCI-001074
- The organization develops and documents a system and communications protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance
- SC-1.4 - CCI-001075
- The organization disseminates to organization-defined personnel or roles the system and communications protection policy.
- SC-1.5 - CCI-001078
- The organization develops and documents system and communications protection procedures to facilitate the implementation of the system and communications protection policy and communications protection controls and associated system and communications protection controls.
- SC-1.6 - CCI-001079
- The organization disseminates to organization-defined personnel or roles the procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls.
- SC-1.8 - CCI-001077
- The organization defines the frequency for reviewing and updating the system and communications protection policy.
- SC-1.7 - CCI-001076
- The organization reviews and updates the system and communications protection policy in accordance with organization-defined frequency.
- SC-1.10 - CCI-001081
- The organization defines the frequency of system and communications protection procedure reviews and updates.
- SC-1.9 - CCI-001080
- The organization reviews and updates the system and communications protection procedures in accordance with organization-defined frequency.
- Bowen P, Hash J, Wilson M (2006) Information Security Handbook: A Guide for Managers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-100, Includes updates as of March 7, 2007., "SP 800-100" https://doi.org/10.6028/NIST.SP.800-100
- Nieles M, Pillitteri VY, Dempsey KL (2017) An Introduction to Information Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-12, Rev. 1., "SP 800-12" https://doi.org/10.6028/NIST.SP.800-12r1
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- RMF Control
- SC-2
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- FH CX NH FM CC NM
- SC-2.1 - CCI-001082
- The information system separates user functionality (including user interface services) from information system management functionality.
- SC-2(1) - Interfaces For Non-Privileged Users
- Prevent the presentation of system management functionality at interfaces to non-privileged users.
- SC-2(2) - Disassociability
- Store state information from applications and software separately.
- RMF Control
- SC-3
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- FH CX NH CC
- SC-3.1 - CCI-001084
- The information system isolates security functions from nonsecurity functions.
- AC-3 - Access Enforcement
- AC-6 - Least Privilege
- AC-25 - Reference Monitor
- CM-2 - Baseline Configuration
- CM-4 - Impact Analyses
- SA-4 - Acquisition Process
- SA-5 - System Documentation
- SA-8 - Security And Privacy Engineering Principles
- SA-15 - Development Process, Standards, And Tools
- SA-17 - Developer Security And Privacy Architecture And Design
- SC-2 - Separation Of System And User Functionality
- SC-7 - Boundary Protection
- SC-32 - System Partitioning
- SC-39 - Process Isolation
- SI-16 - Memory Protection
- SC-3(1) - Hardware Separation
- Employ hardware separation mechanisms to implement security function isolation.
- SC-3(2) - Access And Flow Control Functions
- Isolate security functions enforcing access and information flow control from nonsecurity functions and from other security functions.
- SC-3(3) - Minimize Nonsecurity Functionality
- Minimize the number of nonsecurity functions included within the isolation boundary containing security functions.
- SC-3(4) - Module Coupling And Cohesiveness
- Implement security functions as largely independent modules that maximize internal cohesiveness within modules and minimize coupling between modules.
- SC-3(5) - Layered Structures
- Implement security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers.
- RMF Control
- SC-4
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- FH NH FM NM
- SC-4.1 - CCI-001090
- The information system prevents unauthorized and unintended information transfer via shared system resources.
- SC-4(1) - Security Levels
- [Withdrawn: Incorporated into SC-4].
- SC-4(2) - Multilevel Or Periods Processing
- Prevent unauthorized information transfer via shared resources in accordance with [Assignment: organization-defined procedures] when system processing explicitly switches between different information classification levels or security categories.
- RMF Control
- SC-5
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- FS FH NH FM FL NL NM
- SC-5a.
- [Selection: Protect against; Limit] the effects of the following types of denial-of-service events: [Assignment: organization-defined types of denial-of-service events]; and
- SC-5b.
- Employ the following controls to achieve the denial-of-service objective: [Assignment: organization-defined controls by type of denial-of-service event].
- SC-5.1 - CCI-001093
- The organization defines the types of denial of service attacks (or provides references to sources of current denial of service attacks) that can be addressed by the information system.
- SC-5.3 - CCI-002386
- The organization defines the security safeguards to be employed to protect the information system against, or limit the effects of, denial of service attacks.
- SC-5.2 - CCI-002385
- The information system protects against or limits the effects of organization-defined types of denial of service attacks by employing organization-defined security safeguards.
- Sriram K, Montgomery D (2019) Resilient Interdomain Traffic Exchange: BGP Security and DDoS Mitigation. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-189., "SP 800-189" https://doi.org/10.6028/NIST.SP.800-189
- SC-5(1) - Restrict Ability To Attack Other Systems
- Restrict the ability of individuals to launch the following denial-of-service attacks against other systems: [Assignment: organization-defined denial-of-service attacks].
- SC-5(2) - Capacity, Bandwidth, And Redundancy
- Manage capacity, bandwidth, or other redundancy to limit the effects of information flooding denial-of-service attacks.
- SC-5(3) - Detection And Monitoring
- RMF Control
- SC-6
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- CX
- SC-6.1 - CCI-002392
- The organization defines the resources to be allocated to protect the availability of information system resources.
- SC-6.2 - CCI-002393
- The organization defines the security safeguards to be employed to protect the availability of information system resources.
- SC-6.3 - CCI-002394
- The information system protects the availability of resources by allocating organization-defined resources based on priority, quota, and/or organization-defined security safeguards.
- SC-5 - Denial-Of-Service Protection
- Department of Homeland Security, ., "DHS TIC" https://www.dhs.gov/trusted-internet-connections
- Office of Management and Budget Memorandum M-08-05, , November 2007., "OMB M-08-05" https://obamawhitehouse.archives.gov/sites/default
- RMF Control
- SC-7
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- NP FS FH CX NH FM CC FL NL NM
- SC-7a.
- Monitor and control communications at the external managed interfaces to the system and at key internal managed interfaces within the system;
- SC-7b.
- Implement subnetworks for publicly accessible system components that are [Selection: physically; logically] separated from internal organizational networks; and
- SC-7c.
- Connect to external networks or systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security and privacy architecture.
- SC-7.1 - CCI-001097
- The information system monitors and controls communications at the external boundary of the system and at key internal boundaries within the system.
- SC-7.2 - CCI-002395
- The information system implements subnetworks for publicly accessible system components that are physically and/or logically separated from internal organizational networks.
- SC-7.3 - CCI-001098
- The information system connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture.
- AC-4 - Information Flow Enforcement
- AC-17 - Remote Access
- AC-18 - Wireless Access
- AC-19 - Access Control For Mobile Devices
- AC-20 - Use Of External Systems
- AU-13 - Monitoring For Information Disclosure
- CA-3 - Information Exchange
- CM-2 - Baseline Configuration
- CM-4 - Impact Analyses
- CM-7 - Least Functionality
- CM-10 - Software Usage Restrictions
- CP-8 - Telecommunications Services
- CP-10 - System Recovery And Reconstitution
- IR-4 - Incident Handling
- MA-4 - Nonlocal Maintenance
- PE-3 - Physical Access Control
- PL-8 - Security And Privacy Architectures
- PM-12 - Insider Threat Program
- SA-8 - Security And Privacy Engineering Principles
- SA-17 - Developer Security And Privacy Architecture And Design
- SC-5 - Denial-Of-Service Protection
- SC-26 - Decoys
- SC-32 - System Partitioning
- SC-35 - External Malicious Code Identification
- SC-43 - Usage Restrictions
- Barker EB, Dang QH, Frankel SE, Scarfone KA, Wouters P (2020) Guide to IPsec VPNs. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-77, Rev. 1., "SP 800-77" https://doi.org/10.6028/NIST.SP.800-77r1
- Joint Task Force (2018) Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2., "SP 800-37" https://doi.org/10.6028/NIST.SP.800-37r2
- National Institute of Standards and Technology (2004) Standards for Security Categorization of Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 199., "FIPS 199" https://doi.org/10.6028/NIST.FIPS.199
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Scarfone KA, Hoffman P (2009) Guidelines on Firewalls and Firewall Policy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-41, Rev. 1., "SP 800-41" https://doi.org/10.6028/NIST.SP.800-41r1
- Sriram K, Montgomery D (2019) Resilient Interdomain Traffic Exchange: BGP Security and DDoS Mitigation. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-189., "SP 800-189" https://doi.org/10.6028/NIST.SP.800-189
- SC-7(1) - Physically Separated Subnetworks
- [Withdrawn: Incorporated into SC-7].
- SC-7(2) - Public Access
- [Withdrawn: Incorporated into SC-7].
- SC-7(3) - Access Points
- Limit the number of external network connections to the system.
- SC-7(4) - External Telecommunications Services
- SC-7(5) - Deny By Default — Allow By Exception
- Deny network communications traffic by default and allow network communications traffic by exception [Selection (one or more): at managed interfaces; for [Assignment: organization-defined systems]].
- SC-7(6) - Response To Recognized Failures
- [Withdrawn: Incorporated into SC-7(18)].
- SC-7(7) - Split Tunneling For Remote Devices
- Prevent split tunneling for remote devices connecting to organizational systems unless the split tunnel is securely provisioned using [Assignment: organization-defined safeguards].
- SC-7(8) - Route Traffic To Authenticated Proxy Servers
- Route [Assignment: organization-defined internal communications traffic] to [Assignment: organization-defined external networks] through authenticated proxy servers at managed interfaces.
- SC-7(9) - Restrict Threatening Outgoing Communications Traffic
- SC-7(10) - Prevent Exfiltration
- SC-7(11) - Restrict Incoming Communications Traffic
- Only allow incoming communications from [Assignment: organization-defined authorized sources] to be routed to [Assignment: organization-defined authorized destinations].
- SC-7(12) - Host-Based Protection
- Implement [Assignment: organization-defined host-based boundary protection mechanisms] at [Assignment: organization-defined system components].
- SC-7(13) - Isolation Of Security Tools, Mechanisms, And Support Components
- Isolate [Assignment: organization-defined information security tools, mechanisms, and support components] from other internal system components by implementing physically separate subnetworks with managed interfaces to other components of the system.
- SC-7(14) - Protect Against Unauthorized Physical Connections
- Protect against unauthorized physical connections at [Assignment: organization-defined managed interfaces].
- SC-7(15) - Networked Privileged Accesses
- Route networked, privileged accesses through a dedicated, managed interface for purposes of access control and auditing.
- SC-7(16) - Prevent Discovery Of System Components
- Prevent the discovery of specific system components that represent a managed interface.
- SC-7(17) - Automated Enforcement Of Protocol Formats
- Enforce adherence to protocol formats.
- SC-7(18) - Fail Secure
- Prevent systems from entering unsecure states in the event of an operational failure of a boundary protection device.
- SC-7(19) - Block Communication From Non-Organizationally Configured Hosts
- Block inbound and outbound communications traffic between [Assignment: organization-defined communication clients] that are independently configured by end users and external service providers.
- SC-7(20) - Dynamic Isolation And Segregation
- Provide the capability to dynamically isolate [Assignment: organization-defined system components] from other system components.
- SC-7(21) - Isolation Of System Components
- Employ boundary protection mechanisms to isolate [Assignment: organization-defined system components] supporting [Assignment: organization-defined missions and/or business functions].
- SC-7(22) - Separate Subnets For Connecting To Different Security Domains
- Implement separate network addresses to connect to systems in different security domains.
- SC-7(23) - Disable Sender Feedback On Protocol Validation Failure
- Disable feedback to senders on protocol format validation failure.
- SC-7(24) - Personally Identifiable Information
- For systems that process personally identifiable information:
- SC-7(25) - Unclassified National Security System Connections
- Prohibit the direct connection of [Assignment: organization-defined unclassified national security system] to an external network without the use of [Assignment: organization-defined boundary protection device].
- SC-7(26) - Classified National Security System Connections
- Prohibit the direct connection of a classified national security system to an external network without the use of [Assignment: organization-defined boundary protection device].
- SC-7(27) - Unclassified Non-National Security System Connections
- Prohibit the direct connection of [Assignment: organization-defined unclassified non-national security system] to an external network without the use of [Assignment: organization-defined boundary protection device].
- SC-7(28) - Connections To Public Networks
- Prohibit the direct connection of [Assignment: organization-defined system] to a public network.
- SC-7(29) - Separate Subnets To Isolate Functions
- Implement [Selection: physically; logically] separate subnetworks to isolate the following critical system components and functions: [Assignment: organization-defined critical system components and functions].
- RMF Control
- SC-8
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- FS FH CX NH FM CC FL NM
- SC-8.1 - CCI-002418
- The information system protects the confidentiality and/or integrity of transmitted information.
- AC-17 - Remote Access
- AC-18 - Wireless Access
- AU-10 - Non-Repudiation
- IA-3 - Device Identification And Authentication
- IA-8 - Identification And Authentication (Non-Organizational Users)
- IA-9 - Service Identification And Authentication
- MA-4 - Nonlocal Maintenance
- PE-4 - Access Control For Transmission
- SA-4 - Acquisition Process
- SA-8 - Security And Privacy Engineering Principles
- SC-7 - Boundary Protection
- SC-16 - Transmission Of Security And Privacy Attributes
- SC-20 - Secure Name/Address Resolution Service (Authoritative Source)
- SC-23 - Session Authenticity
- SC-28 - Protection Of Information At Rest
- Barker EB, Dang QH, Frankel SE, Scarfone KA, Wouters P (2020) Guide to IPsec VPNs. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-77, Rev. 1., "SP 800-77" https://doi.org/10.6028/NIST.SP.800-77r1
- Chandramouli R, Rose SW (2013) Secure Domain Name System (DNS) Deployment Guide. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-81-2., "SP 800-81-2" https://doi.org/10.6028/NIST.SP.800-81-2
- Dempsey KL, Paulsen C (2015) Risk Management for Replication Devices. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8023., "IR 8023" https://doi.org/10.6028/NIST.IR.8023
- Frankel SE, Hoffman P, Orebaugh AD, Park R (2008) Guide to SSL VPNs. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-113., "SP 800-113" https://doi.org/10.6028/NIST.SP.800-113
- McKay KA, Cooper DA (2019) Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-52, Rev. 2., "SP 800-52" https://doi.org/10.6028/NIST.SP.800-52r2
- National Institute of Standards and Technology (2001) Advanced Encryption Standard (AES). (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 197., "FIPS 197" https://doi.org/10.6028/NIST.FIPS.197
- National Institute of Standards and Technology (2019) Security Requirements for Cryptographic Modules. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 140-3. , "FIPS 140-3" https://doi.org/10.6028/NIST.FIPS.140-3
- Rose SW, Nightingale S, Garfinkel SL, Chandramouli R (2019) Trustworthy Email. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-177, Rev. 1., "SP 800-177" https://doi.org/10.6028/NIST.SP.800-177r1
- SC-8(1) - Cryptographic Protection
- Implement cryptographic mechanisms to [Selection (one or more): prevent unauthorized disclosure of information; detect changes to information] during transmission.
- SC-8(2) - Pre- And Post-Transmission Handling
- Maintain the [Selection (one or more): confidentiality; integrity] of information during preparation for transmission and during reception.
- SC-8(3) - Cryptographic Protection For Message Externals
- Implement cryptographic mechanisms to protect message externals unless otherwise protected by [Assignment: organization-defined alternative physical controls].
- SC-8(4) - Conceal Or Randomize Communications
- Implement cryptographic mechanisms to conceal or randomize communication patterns unless otherwise protected by [Assignment: organization-defined alternative physical controls].
- SC-8(5) - Protected Distribution System
- Implement [Assignment: organization-defined protected distribution system] to [Selection (one or more): prevent unauthorized disclosure of information; detect changes to information] during transmission.
- RMF Control
- SC-9
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- —
- RMF Control
- SC-10
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- FH NH FM NM
- SC-10.1 - CCI-001133
- The information system terminates the network connection associated with a communications session at the end of the session or after an organization-defined time period of inactivity.
- SC-10.2 - CCI-001134
- The organization defines the time period of inactivity after which the information system terminates a network connection associated with a communications session.
- RMF Control
- SC-11
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- —
- SC-11a.
- Provide a [Selection: physically; logically] isolated trusted communications path for communications between the user and the trusted components of the system; and
- SC-11b.
- Permit users to invoke the trusted communications path for communications between the user and the following security functions of the system, including at a minimum, authentication and re-authentication: [Assignment: organization-defined security functions].
- SC-11.1 - CCI-001135
- The information system establishes a trusted communications path between the user and organization-defined security functions within the information system.
- SC-11.2 - CCI-001661
- The organization defines the security functions, to minimally include information system authentication and re-authentication, within the information system to be included in a trusted communications path.
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- SC-11(1) - Irrefutable Communications Path
- RMF Control
- SC-12
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- FS FH NH FM CC FL NL NM
- SC-12.1 - CCI-002428
- The organization defines the requirements for cryptographic key generation to be employed within the information system.
- SC-12.2 - CCI-002429
- The organization defines the requirements for cryptographic key distribution to be employed within the information system.
- SC-12.3 - CCI-002430
- The organization defines the requirements for cryptographic key storage to be employed within the information system.
- SC-12.4 - CCI-002431
- The organization defines the requirements for cryptographic key access to be employed within the information system.
- SC-12.5 - CCI-002432
- The organization defines the requirements for cryptographic key destruction to be employed within the information system.
- SC-12.6 - CCI-002433
- The organization establishes cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key generation.
- SC-12.7 - CCI-002434
- The organization establishes cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key distribution.
- SC-12.8 - CCI-002435
- The organization establishes cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key storage.
- SC-12.9 - CCI-002436
- The organization establishes cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key access.
- SC-12.10 - CCI-002437
- The organization establishes cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key destruction.
- SC-12.11 - CCI-002438
- The organization manages cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key generation.
- SC-12.12 - CCI-002439
- The organization manages cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key distribution.
- SC-12.13 - CCI-002440
- The organization manages cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key storage.
- SC-12.14 - CCI-002441
- The organization manages cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key access.
- SC-12.15 - CCI-002442
- The organization manages cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key destruction.
- AC-17 - Remote Access
- AU-9 - Protection Of Audit Information
- AU-10 - Non-Repudiation
- CM-3 - Configuration Change Control
- IA-3 - Device Identification And Authentication
- IA-7 - Cryptographic Module Authentication
- SA-4 - Acquisition Process
- SA-8 - Security And Privacy Engineering Principles
- SA-9 - External System Services
- SC-8 - Transmission Confidentiality And Integrity
- SC-11 - Trusted Path
- SC-12 - Cryptographic Key Establishment And Management
- SC-13 - Cryptographic Protection
- SC-17 - Public Key Infrastructure Certificates
- SC-20 - Secure Name/Address Resolution Service (Authoritative Source)
- SC-37 - Out-Of-Band Channels
- SC-40 - Wireless Link Protection
- SI-3 - Malicious Code Protection
- SI-7 - Software, Firmware, And Information Integrity
- Barker EB (2020) Recommendation for Key Management: Part 1 – General. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-57 Part 1, Rev. 5., "SP 800-57-1" https://doi.org/10.6028/NIST.SP.800-57pt1r5
- Barker EB, Barker WC (2019) Recommendation for Key Management: Part 2 – Best Practices for Key Management Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-57 Part 2, Rev. 1., "SP 800-57-2" https://doi.org/10.6028/NIST.SP.800-57pt2r1
- Barker EB, Chen L, Davis R (2020) Recommendation for Key-Derivation Methods in Key-Establishment Schemes. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-56C, Rev. 2., "SP 800-56C" https://doi.org/10.6028/NIST.SP.800-56Cr2
- Barker EB, Chen L, Roginsky A, Vassilev A, Davis R (2018) Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-56A, Rev. 3., "SP 800-56A" https://doi.org/10.6028/NIST.SP.800-56Ar3
- Barker EB, Chen L, Roginsky A, Vassilev A, Davis R, Simon S (2019) Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-56B, Rev. 2., "SP 800-56B" https://doi.org/10.6028/NIST.SP.800-56Br2
- Barker EB, Dang QH (2015) Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-57 Part 3, Rev. 1., "SP 800-57-3" https://doi.org/10.6028/NIST.SP.800-57pt3r1
- Chandramouli R, Iorga M, Chokhani S (2013) Cryptographic Key Management Issues & Challenges in Cloud Services. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7956., "IR 7956" https://doi.org/10.6028/NIST.IR.7956
- Grassi PA, Garcia ME, Fenton JL (2017) Digital Identity Guidelines. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-63-3, Includes updates as of March 2, 2020., "SP 800-63-3" https://doi.org/10.6028/NIST.SP.800-63-3
- National Institute of Standards and Technology (2019) Security Requirements for Cryptographic Modules. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 140-3. , "FIPS 140-3" https://doi.org/10.6028/NIST.FIPS.140-3
- Ylonen T, Turner P, Scarfone KA, Souppaya MP (2015) Security of Interactive and Automated Access Management Using Secure Shell (SSH). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7966., "IR 7966" https://doi.org/10.6028/NIST.IR.7966
- SC-12(1) - Availability
- Maintain availability of information in the event of the loss of cryptographic keys by users.
- SC-12(2) - Symmetric Keys
- Produce, control, and distribute symmetric cryptographic keys using [Selection: NIST FIPS-validated; NSA-approved] key management technology and processes.
- SC-12(3) - Asymmetric Keys
- Produce, control, and distribute asymmetric cryptographic keys using [Selection: NSA-approved key management technology and processes; prepositioned keying material; DoD-approved or DoD-issued Medium Assurance PKI certificates; DoD-approved or DoD-issued Medium Hardware Assurance PKI certificates and hardware security tokens that protect the user’s private key; certificates issued in accordance with organization-defined requirements].
- SC-12(4) - Pki Certificates
- [Withdrawn: Incorporated into SC-12(3)].
- SC-12(5) - Pki Certificates / Hardware Tokens
- [Withdrawn: Incorporated into SC-12(3)].
- SC-12(6) - Physical Control Of Keys
- Maintain physical control of cryptographic keys when stored information is encrypted by external service providers.
- RMF Control
- SC-13
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- FS FH NH FM CC FL NL NM
- SC-13a.
- Determine the [Assignment: organization-defined cryptographic uses]; and
- SC-13b.
- Implement the following types of cryptography required for each specified cryptographic use: [Assignment: organization-defined types of cryptography for each specified cryptographic use].
- SC-13.1 - CCI-002449
- The organization defines the cryptographic uses, and type of cryptography required for each use, to be implemented by the information system.
- SC-13.2 - CCI-002450
- The information system implements organization-defined cryptographic uses and type of cryptography required for each use in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
- AC-2 - Account Management
- AC-3 - Access Enforcement
- AC-7 - Unsuccessful Logon Attempts
- AC-17 - Remote Access
- AC-18 - Wireless Access
- AC-19 - Access Control For Mobile Devices
- AU-9 - Protection Of Audit Information
- AU-10 - Non-Repudiation
- CM-11 - User-Installed Software
- CP-9 - System Backup
- IA-3 - Device Identification And Authentication
- IA-5 - Authenticator Management
- IA-7 - Cryptographic Module Authentication
- MA-4 - Nonlocal Maintenance
- MP-2 - Media Access
- MP-4 - Media Storage
- MP-5 - Media Transport
- SA-4 - Acquisition Process
- SA-8 - Security And Privacy Engineering Principles
- SA-9 - External System Services
- SC-8 - Transmission Confidentiality And Integrity
- SC-12 - Cryptographic Key Establishment And Management
- SC-20 - Secure Name/Address Resolution Service (Authoritative Source)
- SC-23 - Session Authenticity
- SC-28 - Protection Of Information At Rest
- SC-40 - Wireless Link Protection
- SI-3 - Malicious Code Protection
- SI-7 - Software, Firmware, And Information Integrity
- National Institute of Standards and Technology (2019) Security Requirements for Cryptographic Modules. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 140-3. , "FIPS 140-3" https://doi.org/10.6028/NIST.FIPS.140-3
- SC-13(1) - Fips-Validated Cryptography
- [Withdrawn: Incorporated into SC-13].
- SC-13(2) - Nsa-Approved Cryptography
- [Withdrawn: Incorporated into SC-13].
- SC-13(3) - Individuals Without Formal Access Approvals
- [Withdrawn: Incorporated into SC-13].
- SC-13(4) - Digital Signatures
- [Withdrawn: Incorporated into SC-13].
- RMF Control
- SC-14
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- —
- RMF Control
- SC-15
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- FS FH NH FM CC FL NL NM
- SC-15a.
- Prohibit remote activation of collaborative computing devices and applications with the following exceptions: [Assignment: organization-defined exceptions where remote activation is to be allowed]; and
- SC-15b.
- Provide an explicit indication of use to users physically present at the devices.
- SC-15.1 - CCI-001150
- The information system prohibits remote activation of collaborative computing devices excluding the organization-defined exceptions where remote activation is to be allowed.
- SC-15.2 - CCI-001151
- The organization defines exceptions to the prohibiting of collaborative computing devices where remote activation is to be allowed.
- SC-15.3 - CCI-001152
- The information system provides an explicit indication of use to users physically present at collaborative computing devices.
- SC-15(1) - Physical Or Logical Disconnect
- Provide [Selection (one or more): physical; logical] disconnect of collaborative computing devices in a manner that supports ease of use.
- SC-15(2) - Blocking Inbound And Outbound Communications Traffic
- [Withdrawn: Incorporated into SC-7].
- SC-15(3) - Disabling And Removal In Secure Work Areas
- Disable or remove collaborative computing devices and applications from [Assignment: organization-defined systems or system components] in [Assignment: organization-defined secure work areas].
- SC-15(4) - Explicitly Indicate Current Participants
- Provide an explicit indication of current participants in [Assignment: organization-defined online meetings and teleconferences].
- RMF Control
- SC-16
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- —
- SC-16.1 - CCI-001157
- The information system associates organization-defined security attributes with information exchanged between information systems.
- SC-16.2 - CCI-002454
- The organization defines the security attributes the information system is to associate with the information being exchanged between information systems and between information system components.
- SC-16.3 - CCI-002455
- The information system associates organization-defined security attributes with information exchanged between information system components.
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- SC-16(1) - Integrity Verification
- Verify the integrity of transmitted security and privacy attributes.
- SC-16(2) - Anti-Spoofing Mechanisms
- Implement anti-spoofing mechanisms to prevent adversaries from falsifying the security attributes indicating the successful application of the security process.
- SC-16(3) - Cryptographic Binding
- Implement [Assignment: organization-defined mechanisms or techniques] to bind security and privacy attributes to transmitted information.
- RMF Control
- SC-17
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- FH NH FM NM
- SC-17a.
- Issue public key certificates under an [Assignment: organization-defined certificate policy] or obtain public key certificates from an approved service provider; and
- SC-17b.
- Include only approved trust anchors in trust stores or certificate stores managed by the organization.
- SC-17.1 - CCI-001159
- The organization issues public key certificates under an organization-defined certificate policy or obtains public key certificates from an approved service provider.
- SC-17.2 - CCI-002456
- The organization defines the certificate policy employed to issue public key certificates.
- Barker EB (2020) Recommendation for Key Management: Part 1 – General. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-57 Part 1, Rev. 5., "SP 800-57-1" https://doi.org/10.6028/NIST.SP.800-57pt1r5
- Barker EB, Barker WC (2019) Recommendation for Key Management: Part 2 – Best Practices for Key Management Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-57 Part 2, Rev. 1., "SP 800-57-2" https://doi.org/10.6028/NIST.SP.800-57pt2r1
- Barker EB, Dang QH (2015) Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-57 Part 3, Rev. 1., "SP 800-57-3" https://doi.org/10.6028/NIST.SP.800-57pt3r1
- Grassi PA, Garcia ME, Fenton JL (2017) Digital Identity Guidelines. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-63-3, Includes updates as of March 2, 2020., "SP 800-63-3" https://doi.org/10.6028/NIST.SP.800-63-3
- Kuhn R, Hu VC, Polk T, Chang S-J (2001) Introduction to Public Key Technology and the Federal PKI Infrastructure. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-32., "SP 800-32" https://doi.org/10.6028/NIST.SP.800-32
- RMF Control
- SC-18
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- FH NH FM NM
- SC-18a.
- Define acceptable and unacceptable mobile code and mobile code technologies; and
- SC-18b.
- Authorize, monitor, and control the use of mobile code within the system.
- SC-18.1 - CCI-001160
- The organization defines acceptable and unacceptable mobile code and mobile code technologies.
- SC-18.2 - CCI-001161
- The organization establishes usage restrictions for acceptable mobile code and mobile code technologies.
- SC-18.3 - CCI-001162
- The organization establishes implementation guidance for acceptable mobile code and mobile code technologies.
- SC-18.4 - CCI-001163
- The organizations authorizes the use of mobile code within the information system.
- SC-18.5 - CCI-001164
- The organization monitors the use of mobile code within the information system.
- SC-18.6 - CCI-001165
- The organization controls the use of mobile code within the information system.
- Jansen W, Winograd T, Scarfone KA (2008) Guidelines on Active Content and Mobile Code. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-28, Version 2., "SP 800-28" https://doi.org/10.6028/NIST.SP.800-28ver2
- SC-18(1) - Identify Unacceptable Code And Take Corrective Actions
- Identify [Assignment: organization-defined unacceptable mobile code] and take [Assignment: organization-defined corrective actions].
- SC-18(2) - Acquisition, Development, And Use
- Verify that the acquisition, development, and use of mobile code to be deployed in the system meets [Assignment: organization-defined mobile code requirements].
- SC-18(3) - Prevent Downloading And Execution
- Prevent the download and execution of [Assignment: organization-defined unacceptable mobile code].
- SC-18(4) - Prevent Automatic Execution
- Prevent the automatic execution of mobile code in [Assignment: organization-defined software applications] and enforce [Assignment: organization-defined actions] prior to executing the code.
- SC-18(5) - Allow Execution Only In Confined Environments
- Allow execution of permitted mobile code only in confined virtual machine environments.
- RMF Control
- SC-19
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- —
- SC-19.1 - CCI-001173
- The organization establishes usage restrictions for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously.
- SC-19.2 - CCI-001174
- The organization establishes implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously.
- SC-19.3 - CCI-001175
- The organization authorizes the use of VoIP within the information system.
- SC-19.4 - CCI-001176
- The organization monitors the use of VoIP within the information system.
- SC-19.5 - CCI-001177
- The organization controls the use of VoIP within the information system.
- RMF Control
- SC-20
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- FS FH NH FM FL NL NM
- SC-20a.
- Provide additional data origin authentication and integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name/address resolution queries; and
- SC-20b.
- Provide the means to indicate the security status of child zones and (if the child supports secure resolution services) to enable verification of a chain of trust among parent and child domains, when operating as part of a distributed, hierarchical namespace.
- SC-20.1 - CCI-001178
- The information system provides additional data origin authentication artifacts along with the authoritative name resolution data the system returns in response to external name/address resolution queries.
- SC-20.2 - CCI-002462
- The information system provides additional integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name/address resolution queries.
- SC-20.3 - CCI-001179
- The information system, when operating as part of a distributed, hierarchical namespace, provides the means to indicate the security status of child zones.
- SC-20.4 - CCI-001663
- The information system, when operating as part of a distributed, hierarchical namespace, provides the means to enable verification of a chain of trust among parent and child domains (if the child supports secure resolution services).
- AU-10 - Non-Repudiation
- SC-8 - Transmission Confidentiality And Integrity
- SC-12 - Cryptographic Key Establishment And Management
- SC-13 - Cryptographic Protection
- SC-21 - Secure Name/Address Resolution Service (Recursive Or Caching Resolver)
- SC-22 - Architecture And Provisioning For Name/Address Resolution Service
- Chandramouli R, Rose SW (2013) Secure Domain Name System (DNS) Deployment Guide. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-81-2., "SP 800-81-2" https://doi.org/10.6028/NIST.SP.800-81-2
- National Institute of Standards and Technology (2013) Digital Signature Standard (DSS). (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 186-4., "FIPS 186-4" https://doi.org/10.6028/NIST.FIPS.186-4
- National Institute of Standards and Technology (2019) Security Requirements for Cryptographic Modules. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 140-3. , "FIPS 140-3" https://doi.org/10.6028/NIST.FIPS.140-3
- SC-20(1) - Child Subspaces
- [Withdrawn: Incorporated into SC-20].
- SC-20(2) - Data Origin And Integrity
- Provide data origin and integrity protection artifacts for internal name/address resolution queries.
- RMF Control
- SC-21
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- FS FH NH FM FL NL NM
- SC-21.1 - CCI-002465
- The information system requests data origin authentication verification on the name/address resolution responses the system receives from authoritative sources.
- SC-21.2 - CCI-002466
- The information system requests data integrity verification on the name/address resolution responses the system receives from authoritative sources.
- SC-21.3 - CCI-002467
- The information system performs data integrity verification on the name/address resolution responses the system receives from authoritative sources.
- SC-21.4 - CCI-002468
- The information system performs data origin verification authentication on the name/address resolution responses the system receives from authoritative sources.
- Chandramouli R, Rose SW (2013) Secure Domain Name System (DNS) Deployment Guide. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-81-2., "SP 800-81-2" https://doi.org/10.6028/NIST.SP.800-81-2
- SC-21(1) - Data Origin And Integrity
- [Withdrawn: Incorporated into SC-21].
- RMF Control
- SC-22
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- FS FH NH FM FL NL NM
- SC-22.1 - CCI-001182
- The information systems that collectively provide name/address resolution service for an organization are fault-tolerant.
- SC-22.2 - CCI-001183
- The information systems that collectively provide name/address resolution service for an organization implement internal/external role separation.
- Chandramouli R, Rose SW (2013) Secure Domain Name System (DNS) Deployment Guide. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-81-2., "SP 800-81-2" https://doi.org/10.6028/NIST.SP.800-81-2
- RMF Control
- SC-23
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- FH NH FM NM
- SC-23.1 - CCI-001184
- The information system protects the authenticity of communications sessions.
- Barker EB, Dang QH, Frankel SE, Scarfone KA, Wouters P (2020) Guide to IPsec VPNs. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-77, Rev. 1., "SP 800-77" https://doi.org/10.6028/NIST.SP.800-77r1
- Frankel SE, Hoffman P, Orebaugh AD, Park R (2008) Guide to SSL VPNs. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-113., "SP 800-113" https://doi.org/10.6028/NIST.SP.800-113
- McKay KA, Cooper DA (2019) Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-52, Rev. 2., "SP 800-52" https://doi.org/10.6028/NIST.SP.800-52r2
- Singhal A, Winograd T, Scarfone KA (2007) Guide to Secure Web Services. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-95., "SP 800-95" https://doi.org/10.6028/NIST.SP.800-95
- SC-23(1) - Invalidate Session Identifiers At Logout
- Invalidate session identifiers upon user logout or other session termination.
- SC-23(2) - User-Initiated Logouts And Message Displays
- [Withdrawn: Incorporated into AC-12(1)].
- SC-23(3) - Unique System-Generated Session Identifiers
- Generate a unique session identifier for each session with [Assignment: organization-defined randomness requirements] and recognize only session identifiers that are system-generated.
- SC-23(4) - Unique Session Identifiers With Randomization
- [Withdrawn: Incorporated into SC-23(3)].
- SC-23(5) - Allowed Certificate Authorities
- Only allow the use of [Assignment: organization-defined certificate authorities] for verification of the establishment of protected sessions.
- RMF Control
- SC-24
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- FH NH
- SC-24.1 - CCI-001190
- The information system fails to an organization-defined known-state for organization-defined types of failures.
- SC-24.2 - CCI-001191
- The organization defines the known states the information system should fail to in the event of a organization-defined system failure.
- SC-24.3 - CCI-001192
- The organization defines types of failures for which the information system should fail to an organization-defined known state.
- SC-24.4 - CCI-001193
- The organization defines system state information that should be preserved in the event of a system failure.
- SC-24.5 - CCI-001665
- The information system preserves organization-defined system state information in the event of a system failure.
- CP-2 - Contingency Plan
- CP-4 - Contingency Plan Testing
- CP-10 - System Recovery And Reconstitution
- CP-12 - Safe Mode
- SA-8 - Security And Privacy Engineering Principles
- SC-7 - Boundary Protection
- SC-22 - Architecture And Provisioning For Name/Address Resolution Service
- SI-13 - Predictable Failure Prevention
- RMF Control
- SC-25
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- —
- SC-25.1 - CCI-001194
- The information system employs organization-defined information system components with minimal functionality and information storage.
- SC-25.2 - CCI-002471
- The organization defines the information system components, with minimal functionality and information storage, to be employed.
- RMF Control
- SC-26
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- —
- SC-26.1 - CCI-001195
- The information system includes components specifically designed to be the target of malicious attacks for the purpose of detecting, deflecting, and analyzing such attacks.
- SC-26(1) - Detection Of Malicious Code
- [Withdrawn: Incorporated into SC-35].
- RMF Control
- SC-27
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- —
- SC-27.1 - CCI-001197
- The information system includes organization-defined platform-independent applications.
- SC-27.2 - CCI-001198
- The organization defines applications that are platform independent.
- SC-29 - Heterogeneity
- RMF Control
- SC-28
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- FS FH NH FM CC FL NM
- SC-28.1 - CCI-001199
- The information system protects the confidentiality and/or integrity of organization-defined information at rest.
- SC-28.2 - CCI-002472
- The organization defines the information at rest that is to be protected by the information system.
- AC-3 - Access Enforcement
- AC-4 - Information Flow Enforcement
- AC-6 - Least Privilege
- AC-19 - Access Control For Mobile Devices
- CA-7 - Continuous Monitoring
- CM-3 - Configuration Change Control
- CM-5 - Access Restrictions For Change
- CM-6 - Configuration Settings
- CP-9 - System Backup
- MP-4 - Media Storage
- MP-5 - Media Transport
- PE-3 - Physical Access Control
- SC-8 - Transmission Confidentiality And Integrity
- SC-12 - Cryptographic Key Establishment And Management
- SC-13 - Cryptographic Protection
- SC-34 - Non-Modifiable Executable Programs
- SI-3 - Malicious Code Protection
- SI-7 - Software, Firmware, And Information Integrity
- SI-16 - Memory Protection
- Barker EB (2020) Recommendation for Key Management: Part 1 – General. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-57 Part 1, Rev. 5., "SP 800-57-1" https://doi.org/10.6028/NIST.SP.800-57pt1r5
- Barker EB, Barker WC (2019) Recommendation for Key Management: Part 2 – Best Practices for Key Management Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-57 Part 2, Rev. 1., "SP 800-57-2" https://doi.org/10.6028/NIST.SP.800-57pt2r1
- Barker EB, Chen L, Davis R (2020) Recommendation for Key-Derivation Methods in Key-Establishment Schemes. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-56C, Rev. 2., "SP 800-56C" https://doi.org/10.6028/NIST.SP.800-56Cr2
- Barker EB, Chen L, Roginsky A, Vassilev A, Davis R (2018) Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-56A, Rev. 3., "SP 800-56A" https://doi.org/10.6028/NIST.SP.800-56Ar3
- Barker EB, Chen L, Roginsky A, Vassilev A, Davis R, Simon S (2019) Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-56B, Rev. 2., "SP 800-56B" https://doi.org/10.6028/NIST.SP.800-56Br2
- Barker EB, Dang QH (2015) Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-57 Part 3, Rev. 1., "SP 800-57-3" https://doi.org/10.6028/NIST.SP.800-57pt3r1
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Scarfone KA, Souppaya MP, Sexton M (2007) Guide to Storage Encryption Technologies for End User Devices. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-111., "SP 800-111" https://doi.org/10.6028/NIST.SP.800-111
- Souppaya MP, Scarfone KA (2013) Guidelines for Managing the Security of Mobile Devices in the Enterprise. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-124, Rev. 1., "SP 800-124" https://doi.org/10.6028/NIST.SP.800-124r1
- SC-28(1) - Cryptographic Protection
- Implement cryptographic mechanisms to prevent unauthorized disclosure and modification of the following information at rest on [Assignment: organization-defined system components or media]: [Assignment: organization-defined information].
- SC-28(2) - Offline Storage
- Remove the following information from online storage and store offline in a secure location: [Assignment: organization-defined information].
- SC-28(3) - Cryptographic Keys
- Provide protected storage for cryptographic keys [Selection: [Assignment: organization-defined safeguards]; hardware-protected key store].
- RMF Control
- SC-29
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- —
- SC-29.1 - CCI-001201
- The organization employs a diverse set of information technologies for organization-defined information system components in the implementation of the information system.
- SC-29.2 - CCI-002480
- The organization defines the information system components for which a diverse set of information technologies are to be employed.
- SC-29(1) - Virtualization Techniques
- Employ virtualization techniques to support the deployment of a diversity of operating systems and applications that are changed [Assignment: organization-defined frequency].
- RMF Control
- SC-30
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- CX
- SC-30.1 - CCI-002482
- The organization defines the concealment and misdirection techniques employed for organization-defined information systems to confuse and mislead adversaries.
- SC-30.2 - CCI-002483
- The organization defines the information systems for which organization-defined concealment and misdirection techniques are to be employed.
- SC-30.3 - CCI-002484
- The organization defines the time periods at which it will employ organization-defined concealment and misdirection techniques on organization-defined information systems.
- SC-30.4 - CCI-002485
- The organization employs organization-defined concealment and misdirection techniques for organization-defined information systems at organization-defined time periods to confuse and mislead adversaries.
- SC-30(1) - Virtualization Techniques
- [Withdrawn: Incorporated into SC-29(1)].
- SC-30(2) - Randomness
- Employ [Assignment: organization-defined techniques] to introduce randomness into organizational operations and assets.
- SC-30(3) - Change Processing And Storage Locations
- Change the location of [Assignment: organization-defined processing and/or storage] [Selection: [Assignment: organization-defined time frequency]; at random time intervals].
- SC-30(4) - Misleading Information
- Employ realistic, but misleading information in [Assignment: organization-defined system components] about its security state or posture.
- SC-30(5) - Concealment Of System Components
- Employ the following techniques to hide or conceal [Assignment: organization-defined system components]: [Assignment: organization-defined techniques].
- RMF Control
- SC-31
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- —
- SC-31a.
- Perform a covert channel analysis to identify those aspects of communications within the system that are potential avenues for covert [Selection (one or more): storage; timing] channels; and
- SC-31b.
- Estimate the maximum bandwidth of those channels.
- SC-31.1 - CCI-002498
- The organization performs a covert channel analysis to identify those aspects of communications within the information system that are potential avenues for covert storage and/or timing channels.
- SC-31.2 - CCI-002499
- The organization estimates the maximum bandwidth of the covert storage and timing channels.
- SC-31(1) - Test Covert Channels For Exploitability
- Test a subset of the identified covert channels to determine the channels that are exploitable.
- SC-31(2) - Maximum Bandwidth
- Reduce the maximum bandwidth for identified covert [Selection (one or more): storage; timing] channels to [Assignment: organization-defined values].
- SC-31(3) - Measure Bandwidth In Operational Environments
- Measure the bandwidth of [Assignment: organization-defined subset of identified covert channels] in the operational environment of the system.
- RMF Control
- SC-32
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- CX
- SC-32.1 - CCI-002504
- The organization defines the information system components into which the information system is partitioned.
- SC-32.2 - CCI-002505
- The organization defines the circumstances under which the information system components are to be physically separated to support partitioning.
- SC-32.3 - CCI-002506
- The organization partitions the information system into organization-defined information system components residing in separate physical domains or environments based on organization-defined circumstances for physical separation of components.
- National Institute of Standards and Technology (2004) Standards for Security Categorization of Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 199., "FIPS 199" https://doi.org/10.6028/NIST.FIPS.199
- Paulsen C, Boyens JM, Bartol N, Winkler K (2018) Criticality Analysis Process Model: Prioritizing Systems and Components. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8179., "IR 8179" https://doi.org/10.6028/NIST.IR.8179
- SC-32(1) - Separate Physical Domains For Privileged Functions
- Partition privileged functions into separate physical domains.
- RMF Control
- SC-33
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- —
- RMF Control
- SC-34
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- —
- SC-34a.
- The operating environment from hardware-enforced, read-only media; and
- SC-34b.
- The following applications from hardware-enforced, read-only media: [Assignment: organization-defined applications].
- SC-34.1 - CCI-001212
- The organization defines information system components for which the operating environment and organization-defined applications are loaded and executed from hardware-enforced, read-only media.
- SC-34.2 - CCI-001210
- The information system, at organization-defined information system components, loads and executes the operating environment from hardware-enforced, read-only media.
- SC-34.3 - CCI-001211
- The information system, at organization-defined information system components, loads and executes organization-defined applications from hardware-enforced, read-only media.
- SC-34.4 - CCI-001213
- The organization defines applications that will be loaded and executed from hardware-enforced, read-only media.
- SC-34(1) - No Writable Storage
- Employ [Assignment: organization-defined system components] with no writeable storage that is persistent across component restart or power on/off.
- SC-34(2) - Integrity Protection On Read-Only Media
- Protect the integrity of information prior to storage on read-only media and control the media after such information has been recorded onto the media.
- SC-34(3) - Hardware-Based Protection
- [Withdrawn: Moved to SC-51].
- RMF Control
- SC-35
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- —
- SC-35.1 - CCI-001196
- The information system includes components that proactively seek to identify malicious websites and/or web-based malicious code.
- RMF Control
- SC-36
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- —
- SC-36.1 - CCI-002513
- The organization defines the processing that is to be distributed across multiple physical locations.
- SC-36.2 - CCI-002514
- The organization defines the storage that is to be distributed across multiple physical locations.
- SC-36.3 - CCI-002515
- The organization distributes organization-defined processing across multiple physical locations.
- SC-36.4 - CCI-002516
- The organization distributes organization-defined storage across multiple physical locations.
- Ross RS, Pillitteri VY, Graubart R, Bodeau D, McQuaid R (2019) Developing Cyber Resilient Systems: A Systems Security Engineering Approach. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 2., "SP 800-160-2" https://doi.org/10.6028/NIST.SP.800-160v2
- SC-36(1) - Polling Techniques
- SC-36(2) - Synchronization
- Synchronize the following duplicate systems or system components: [Assignment: organization-defined duplicate systems or system components].
- RMF Control
- SC-37
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- —
- SC-37.1 - CCI-002521
- The organization defines the out-of-band channels to be employed for the physical delivery or electronic transmission of organization-defined information, information system components, or devices.
- SC-37.2 - CCI-002522
- The organization defines the information, information system components or devices that are to be electronically transmitted or physically delivered via organization-defined out-of-band channels.
- SC-37(1).1 - CCI-002523
- The organization defines the individuals or information systems authorized to be recipients of organization-defined information, information system components, or devices to be delivered by employing organization-defined out-of-band channels for electronic transmission or physical delivery.
- SC-37.4 - CCI-002524
- The organization employs organization-defined out-of-band channels for the electronic transmission or physical delivery of organization-defined information, information system components, or devices to organization-defined individuals or information systems.
- AC-2 - Account Management
- CM-3 - Configuration Change Control
- CM-5 - Access Restrictions For Change
- CM-7 - Least Functionality
- IA-2 - Identification And Authentication (Organizational Users)
- IA-4 - Identifier Management
- IA-5 - Authenticator Management
- MA-4 - Nonlocal Maintenance
- SC-12 - Cryptographic Key Establishment And Management
- SI-3 - Malicious Code Protection
- SI-4 - System Monitoring
- SI-7 - Software, Firmware, And Information Integrity
- Barker EB (2020) Recommendation for Key Management: Part 1 – General. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-57 Part 1, Rev. 5., "SP 800-57-1" https://doi.org/10.6028/NIST.SP.800-57pt1r5
- Barker EB, Barker WC (2019) Recommendation for Key Management: Part 2 – Best Practices for Key Management Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-57 Part 2, Rev. 1., "SP 800-57-2" https://doi.org/10.6028/NIST.SP.800-57pt2r1
- Barker EB, Dang QH (2015) Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-57 Part 3, Rev. 1., "SP 800-57-3" https://doi.org/10.6028/NIST.SP.800-57pt3r1
- SC-37(1) - Ensure Delivery And Transmission
- Employ [Assignment: organization-defined controls] to ensure that only [Assignment: organization-defined individuals or systems] receive the following information, system components, or devices: [Assignment: organization-defined information, system components, or devices].
- RMF Control
- SC-38
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- —
- SC-38.1 - CCI-002528
- The organization defines the operations security safeguards to be employed to protect key organizational information throughout the system development life cycle.
- SC-38.2 - CCI-002529
- The organization employs organization-defined operations security safeguards to protect key organizational information throughout the system development life cycle.
- CA-2 - Control Assessments
- CA-7 - Continuous Monitoring
- PL-1 - Policy And Procedures
- PM-9 - Risk Management Strategy
- PM-12 - Insider Threat Program
- RA-2 - Security Categorization
- RA-3 - Risk Assessment
- RA-5 - Vulnerability Monitoring And Scanning
- SC-7 - Boundary Protection
- SR-3 - Supply Chain Controls And Processes
- SR-7 - Supply Chain Operations Security
- RMF Control
- SC-39
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- FS FH NH FM FL NL NM
- SC-39.1 - CCI-002530
- The information system maintains a separate execution domain for each executing process.
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- SC-39(1) - Hardware Separation
- Implement hardware separation mechanisms to facilitate process isolation.
- SC-39(2) - Separate Execution Domain Per Thread
- Maintain a separate execution domain for each thread in [Assignment: organization-defined multi-threaded processing].
- RMF Control
- SC-40
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- CX
- SC-40.1 - CCI-002534
- The organization defines types of signal parameter attacks or references to sources for such attacks from which the information system protects organization-defined wireless links.
- SC-40.2 - CCI-002535
- The organization defines the external and internal wireless links the information system is to protect from organization-defined types of signal parameter attacks or references to sources for such attacks.
- SC-40.3 - CCI-002536
- The information system protects organization-defined external and internal wireless links from organization-defined types of signal parameter attacks or references to sources for such attacks.
- SC-40(1) - Electromagnetic Interference
- Implement cryptographic mechanisms that achieve [Assignment: organization-defined level of protection] against the effects of intentional electromagnetic interference.
- SC-40(2) - Reduce Detection Potential
- Implement cryptographic mechanisms to reduce the detection potential of wireless links to [Assignment: organization-defined level of reduction].
- SC-40(3) - Imitative Or Manipulative Communications Deception
- Implement cryptographic mechanisms to identify and reject wireless transmissions that are deliberate attempts to achieve imitative or manipulative communications deception based on signal parameters.
- SC-40(4) - Signal Parameter Identification
- Implement cryptographic mechanisms to prevent the identification of [Assignment: organization-defined wireless transmitters] by using the transmitter signal parameters.
- RMF Control
- SC-41
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- CC
- SC-41.1 - CCI-002544
- The organization defines the information systems or information system components on which organization-defined connection ports or input/output devices are to be physically disabled or removed.
- SC-41.2 - CCI-002545
- The organization defines the connection ports or input/output devices that are to be physically disabled or removed from organization-defined information systems or information system components.
- SC-41.3 - CCI-002546
- The organization physically disables or removes organization-defined connection ports or input/output devices on organization-defined information systems or information system components.
- RMF Control
- SC-42
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- CC
- SC-42a.
- Prohibit [Selection (one or more): the use of devices possessing [Assignment: organization-defined environmental sensing capabilities] in [Assignment: organization-defined facilities, areas, or systems]; the remote activation of environmental sensing capabilities on organizational systems or system components with the following exceptions: [Assignment: organization-defined exceptions where remote activation of sensors is allowed]]; and
- SC-42b.
- Provide an explicit indication of sensor use to [Assignment: organization-defined group of users].
- SC-42.1 - CCI-002547
- The organization defines the exceptions where remote activation of sensors is allowed.
- SC-42.2 - CCI-002548
- The information system prohibits the remote activation of environmental sensing capabilities except for the organization-defined exceptions where remote activation of sensors is allowed.
- SC-42.3 - CCI-002549
- The organization defines the class of users to receive explicit indication of sensor use.
- SC-42.4 - CCI-002550
- The information system provides an explicit indication of sensor use to the organization-defined class of users.
- SC-15 - Collaborative Computing Devices And Applications
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Souppaya MP, Scarfone KA (2013) Guidelines for Managing the Security of Mobile Devices in the Enterprise. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-124, Rev. 1., "SP 800-124" https://doi.org/10.6028/NIST.SP.800-124r1
- SC-42(1) - Reporting To Authorized Individuals Or Roles
- Verify that the system is configured so that data or information collected by the [Assignment: organization-defined sensors] is only reported to authorized individuals or roles.
- SC-42(2) - Authorized Use
- Employ the following measures so that data or information collected by [Assignment: organization-defined sensors] is only used for authorized purposes: [Assignment: organization-defined measures].
- SC-42(3) - Prohibit Use Of Devices
- [Withdrawn: Incorporated into SC-42].
- SC-42(4) - Notice Of Collection
- Employ the following measures to facilitate an individual’s awareness that personally identifiable information is being collected by [Assignment: organization-defined sensors]: [Assignment: organization-defined measures].
- SC-42(5) - Collection Minimization
- Employ [Assignment: organization-defined sensors] that are configured to minimize the collection of information about individuals that is not needed.
- RMF Control
- SC-43
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- —
- SC-43a.
- Establish usage restrictions and implementation guidelines for the following system components: [Assignment: organization-defined system components]; and
- SC-43b.
- Authorize, monitor, and control the use of such components within the system.
- SC-43.1 - CCI-002559
- The organization defines the information system components for which usage restrictions and implementation guidance are to be established.
- SC-43.2 - CCI-002560
- The organization establishes usage restrictions and implementation guidance for organization-defined information system components based on the potential to cause damage to the information system if used maliciously.
- SC-43.3 - CCI-002561
- The organization authorizes the use of organization-defined information system components which have the potential to cause damage to the information system if used maliciously.
- SC-43.4 - CCI-002562
- The organization monitors the use of organization-defined information system components which have the potential to cause damage to the information system if used maliciously.
- SC-43.5 - CCI-002563
- The organization controls the use of organization-defined information system components which have the potential to cause damage to the information system if used maliciously.
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Souppaya MP, Scarfone KA (2013) Guidelines for Managing the Security of Mobile Devices in the Enterprise. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-124, Rev. 1., "SP 800-124" https://doi.org/10.6028/NIST.SP.800-124r1
- RMF Control
- SC-44
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- —
- SC-44.1 - CCI-002564
- The organization defines the information system, system components, or location where a detonation chamber (i.e., dynamic execution environments) capability is employed.
- SC-44.2 - CCI-002565
- The organization employs a detonation chamber (i.e., dynamic execution environments) capability within an organization-defined information system, system component, or location.
- Rose SW, Nightingale S, Garfinkel SL, Chandramouli R (2019) Trustworthy Email. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-177, Rev. 1., "SP 800-177" https://doi.org/10.6028/NIST.SP.800-177r1
- RMF Control
- SC-45
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- FH CX FM
- Internet Engineering Task Force (IETF), Request for Comments: 5905, , June 2010., "IETF 5905" https://tools.ietf.org/pdf/rfc5905.pdf
- SC-45(1) - Synchronization With Authoritative Time Source
- SC-45(2) - Secondary Authoritative Time Source
- RMF Control
- SC-46
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- —
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- RMF Control
- SC-47
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- —
- Cichonski PR, Millar T, Grance T, Scarfone KA (2012) Computer Security Incident Handling Guide. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-61, Rev. 2., "SP 800-61" https://doi.org/10.6028/NIST.SP.800-61r2
- Ross RS, Pillitteri VY, Graubart R, Bodeau D, McQuaid R (2019) Developing Cyber Resilient Systems: A Systems Security Engineering Approach. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 2., "SP 800-160-2" https://doi.org/10.6028/NIST.SP.800-160v2
- Swanson MA, Bowen P, Phillips AW, Gallup D, Lynes D (2010) Contingency Planning Guide for Federal Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-34, Rev. 1, Includes updates as of November 11, 2010., "SP 800-34" https://doi.org/10.6028/NIST.SP.800-34r1
- RMF Control
- SC-48
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- —
- Ross RS, Pillitteri VY, Graubart R, Bodeau D, McQuaid R (2019) Developing Cyber Resilient Systems: A Systems Security Engineering Approach. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 2., "SP 800-160-2" https://doi.org/10.6028/NIST.SP.800-160v2
- SC-48(1) - Dynamic Relocation Of Sensors Or Monitoring Capabilities
- Dynamically relocate [Assignment: organization-defined sensors and monitoring capabilities] to [Assignment: organization-defined locations] under the following conditions or circumstances: [Assignment: organization-defined conditions or circumstances].
- RMF Control
- SC-49
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- —
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- RMF Control
- SC-50
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- —
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- RMF Control
- SC-51
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baselines
- CX
- SC-51a.
- Employ hardware-based, write-protect for [Assignment: organization-defined system firmware components]; and
- SC-51b.
- Implement specific procedures for [Assignment: organization-defined authorized individuals] to manually disable hardware write-protect for firmware modifications and re-enable the write-protect prior to returning to operational mode.
- RMF Control
- SI-1
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baselines
- NP FS FH NH FM FL NL NM
- SI-1a.
- Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
- SI-1b.
- Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the system and information integrity policy and procedures; and
- SI-1c.
- Review and update the current system and information integrity:
- SI-1.1 - CCI-002601
- The organization defines the personnel or roles to whom the system and information integrity policy and procedures are to be disseminated.
- SI-1.2 - CCI-001217
- The organization develops and documents a system and information integrity policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- SI-1.3 - CCI-001218
- The organization disseminates the system and information integrity policy to organization-defined personnel or roles.
- SI-1.4 - CCI-001220
- The organization develops and documents procedures to facilitate the implementation of the system and information integrity policy and associated system integrity controls.
- SI-1.5 - CCI-001221
- The organization disseminates to organization-defined personnel or roles procedures to facilitate the implementation of the system and information integrity policy and associated system integrity controls.
- SI-1.7 - CCI-001223
- The organization defines the frequency of system and information integrity policy reviews and updates.
- SI-1.6 - CCI-001219
- The organization reviews and updates system and information integrity policy in accordance with organization-defined frequency.
- SI-1.9 - CCI-001224
- The organization defines the frequency of system and information integrity procedure reviews and updates
- SI-1.8 - CCI-001222
- The organization reviews and updates system and information integrity procedures in accordance with organization-defined frequency.
- Bowen P, Hash J, Wilson M (2006) Information Security Handbook: A Guide for Managers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-100, Includes updates as of March 7, 2007., "SP 800-100" https://doi.org/10.6028/NIST.SP.800-100
- Nieles M, Pillitteri VY, Dempsey KL (2017) An Introduction to Information Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-12, Rev. 1., "SP 800-12" https://doi.org/10.6028/NIST.SP.800-12r1
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- RMF Control
- SI-2
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baselines
- FS FH NH FM FL NL NM
- SI-2a.
- Identify, report, and correct system flaws;
- SI-2b.
- Test software and firmware updates related to flaw remediation for effectiveness and potential side effects before installation;
- SI-2c.
- Install security-relevant software and firmware updates within [Assignment: organization-defined time period] of the release of the updates; and
- SI-2d.
- Incorporate flaw remediation into the organizational configuration management process.
- SI-2.1 - CCI-001225
- The organization identifies information system flaws.
- SI-2.2 - CCI-001226
- The organization reports information system flaws.
- SI-2.3 - CCI-001227
- The organization corrects information system flaws.
- SI-2.4 - CCI-001228
- The organization tests software updates related to flaw remediation for effectiveness before installation.
- SI-2.5 - CCI-001229
- The organization tests software updates related to flaw remediation for potential side effects before installation.
- SI-2.12 - CCI-001230
- The organization incorporates flaw remediation into the organizational configuration management process.
- SI-2.6 - CCI-002602
- The organization tests firmware updates related to flaw remediation for effectiveness before installation.
- SI-2.7 - CCI-002603
- The organization tests firmware updates related to flaw remediation for potential side effects before installation.
- SI-2.8 - CCI-002604
- The organization defines the time period within the release of updates that security-related software updates are to be installed.
- SI-2.9 - CCI-002605
- The organization installs security-relevant software updates within organization-defined time period of the release of the updates
- SI-2.10 - CCI-002606
- The organization defines the time period within the release of updates that security-related firmware updates are to be installed.
- SI-2.11 - CCI-002607
- The organization installs security-relevant firmware updates within organization-defined time period of the release of the updates
- CA-5 - Plan Of Action And Milestones
- CM-3 - Configuration Change Control
- CM-4 - Impact Analyses
- CM-5 - Access Restrictions For Change
- CM-6 - Configuration Settings
- CM-8 - System Component Inventory
- MA-2 - Controlled Maintenance
- RA-5 - Vulnerability Monitoring And Scanning
- SA-8 - Security And Privacy Engineering Principles
- SA-10 - Developer Configuration Management
- SA-11 - Developer Testing And Evaluation
- SI-3 - Malicious Code Protection
- SI-5 - Security Alerts, Advisories, And Directives
- SI-7 - Software, Firmware, And Information Integrity
- SI-11 - Error Handling
- Johnson LA, Dempsey KL, Ross RS, Gupta S, Bailey D (2011) Guide for Security-Focused Configuration Management of Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-128, Includes updates as of October 10, 2019., "SP 800-128" https://doi.org/10.6028/NIST.SP.800-128
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- National Institute of Standards and Technology (2013) Digital Signature Standard (DSS). (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 186-4., "FIPS 186-4" https://doi.org/10.6028/NIST.FIPS.186-4
- National Institute of Standards and Technology (2019) Security Requirements for Cryptographic Modules. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 140-3. , "FIPS 140-3" https://doi.org/10.6028/NIST.FIPS.140-3
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Singhal A, Ou X (2011) Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7788., "IR 7788" https://doi.org/10.6028/NIST.IR.7788
- Souppaya MP, Scarfone KA (2013) Guide to Enterprise Patch Management Technologies. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-40, Rev. 3., "SP 800-40" https://doi.org/10.6028/NIST.SP.800-40r3
- SI-2(1) - Central Management
- [Withdrawn: Incorporated into PL-9].
- SI-2(2) - Automated Flaw Remediation Status
- Determine if system components have applicable security-relevant software and firmware updates installed using [Assignment: organization-defined automated mechanisms] [Assignment: organization-defined frequency].
- SI-2(3) - Time To Remediate Flaws And Benchmarks For Corrective Actions
- SI-2(4) - Automated Patch Management Tools
- Employ automated patch management tools to facilitate flaw remediation to the following system components: [Assignment: organization-defined system components].
- SI-2(5) - Automatic Software And Firmware Updates
- Install [Assignment: organization-defined security-relevant software and firmware updates] automatically to [Assignment: organization-defined system components].
- SI-2(6) - Removal Of Previous Versions Of Software And Firmware
- Remove previous versions of [Assignment: organization-defined software and firmware components] after updated versions have been installed.
- RMF Control
- SI-3
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baselines
- FS FH CX NH FM FL NL NM
- SI-3a.
- Implement [Selection (one or more): signature based; non-signature based] malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code;
- SI-3b.
- Automatically update malicious code protection mechanisms as new releases are available in accordance with organizational configuration management policy and procedures;
- SI-3c.
- Configure malicious code protection mechanisms to:
- SI-3d.
- Address the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the system.
- SI-3.1 - CCI-002619
- The organization employs malicious code protection mechanisms at information system entry points to detect malicious code.
- SI-3.3 - CCI-002621
- The organization employs malicious code protection mechanisms at information system entry points to eradicate malicious code.
- SI-3.2 - CCI-002620
- The organization employs malicious code protection mechanisms at information system exit points to detect malicious code.
- SI-3.4 - CCI-002622
- The organization employs malicious code protection mechanisms at information system exit points to eradicate malicious code.
- SI-3.5 - CCI-001240
- The organization updates malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures.
- SI-3.6 - CCI-002623
- The organization defines the frequency for performing periodic scans of the information system for malicious code.
- SI-3.7 - CCI-002624
- The organization configures malicious code protection mechanisms to perform real-time scans of files from external sources at network entry/exit points as the files are downloaded, opened, or executed in accordance with organizational security policy.
- SI-3.9 - CCI-001242
- The organization configures malicious code protection mechanisms to perform real-time scans of files from external sources at endpoints as the files are downloaded, opened, or executed in accordance with organizational security policy.
- SI-3.8 - CCI-001241
- The organization configures malicious code protection mechanisms to perform periodic scans of the information system on an organization-defined frequency.
- SI-3.11 - CCI-001244
- The organization defines one or more actions to perform in response to malicious code detection, such as blocking malicious code, quarantining malicious code, or sending alert to administrator.
- SI-3.10 - CCI-001243
- The organization configures malicious code protection mechanisms to perform organization-defined action(s) in response to malicious code detection.
- SI-3.12 - CCI-001245
- The organization addresses the receipt of false positives during malicious code detection and eradication, and the resulting potential impact on the availability of the information system.
- AC-4 - Information Flow Enforcement
- AC-19 - Access Control For Mobile Devices
- CM-3 - Configuration Change Control
- CM-8 - System Component Inventory
- IR-4 - Incident Handling
- MA-3 - Maintenance Tools
- MA-4 - Nonlocal Maintenance
- PL-9 - Central Management
- RA-5 - Vulnerability Monitoring And Scanning
- SC-7 - Boundary Protection
- SC-23 - Session Authenticity
- SC-26 - Decoys
- SC-28 - Protection Of Information At Rest
- SC-44 - Detonation Chambers
- SI-2 - Flaw Remediation
- SI-4 - System Monitoring
- SI-7 - Software, Firmware, And Information Integrity
- SI-8 - Spam Protection
- SI-15 - Information Output Filtering
- Chandramouli R (2016) Secure Virtual Network Configuration for Virtual Machine (VM) Protection. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-125B., "SP 800-125B" https://doi.org/10.6028/NIST.SP.800-125B
- Rose SW, Nightingale S, Garfinkel SL, Chandramouli R (2019) Trustworthy Email. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-177, Rev. 1., "SP 800-177" https://doi.org/10.6028/NIST.SP.800-177r1
- Souppaya MP, Scarfone KA (2013) Guide to Malware Incident Prevention and Handling for Desktops and Laptops. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-83, Rev. 1., "SP 800-83" https://doi.org/10.6028/NIST.SP.800-83r1
- SI-3(1) - Central Management
- [Withdrawn: Incorporated into PL-9].
- SI-3(2) - Automatic Updates
- [Withdrawn: Incorporated into SI-3].
- SI-3(3) - Non-Privileged Users
- [Withdrawn: Incorporated into AC-6(10)].
- SI-3(4) - Updates Only By Privileged Users
- Update malicious code protection mechanisms only when directed by a privileged user.
- SI-3(5) - Portable Storage Devices
- [Withdrawn: Incorporated into MP-7].
- SI-3(6) - Testing And Verification
- SI-3(7) - Nonsignature-Based Detection
- [Withdrawn: Incorporated into SI-3].
- SI-3(8) - Detect Unauthorized Commands
- SI-3(9) - Authenticate Remote Commands
- [Withdrawn: Moved to AC-17(10)].
- SI-3(10) - Malicious Code Analysis
- RMF Control
- SI-4
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baselines
- FS FH CX NH FM CC FL NL NM
- SI-4a.
- Monitor the system to detect:
- SI-4b.
- Identify unauthorized use of the system through the following techniques and methods: [Assignment: organization-defined techniques and methods];
- SI-4c.
- Invoke internal monitoring capabilities or deploy monitoring devices:
- SI-4d.
- Analyze detected events and anomalies;
- SI-4e.
- Adjust the level of system monitoring activity when there is a change in risk to organizational operations and assets, individuals, other organizations, or the Nation;
- SI-4f.
- Obtain legal opinion regarding system monitoring activities; and
- SI-4g.
- Provide [Assignment: organization-defined system monitoring information] to [Assignment: organization-defined personnel or roles] [Selection (one or more): as needed; [Assignment: organization-defined frequency]].
- SI-4.1 - CCI-001253
- The organization defines the objectives of monitoring for attacks and indicators of potential attacks on the information system.
- SI-4.2 - CCI-002641
- The organization monitors the information system to detect attacks and indicators of potential attacks in accordance with organization-defined monitoring objectives.
- SI-4.3 - CCI-002642
- The organization monitors the information system to detect unauthorized local connections.
- SI-4.4 - CCI-002643
- The organization monitors the information system to detect unauthorized network connections.
- SI-4.5 - CCI-002644
- The organization monitors the information system to detect unauthorized remote connections.
- SI-4.6 - CCI-002645
- The organization defines the techniques and methods to be used to identify unauthorized use of the information system.
- SI-4.7 - CCI-002646
- The organization identifies unauthorized use of the information system through organization-defined techniques and methods.
- SI-4.8 - CCI-001255
- The organization deploys monitoring devices strategically within the information system to collect organization determined essential information.
- SI-4.9 - CCI-001256
- The organization deploys monitoring devices at ad hoc locations within the system to track specific types of transactions of interest to the organization.
- SI-4.10 - CCI-002647
- The organization protects information obtained from intrusion-monitoring tools from unauthorized access.
- SI-4.11 - CCI-002648
- The organization protects information obtained from intrusion-monitoring tools from unauthorized modification.
- SI-4.12 - CCI-002649
- The organization protects information obtained from intrusion-monitoring tools from unauthorized deletion.
- SI-4.13 - CCI-001257
- The organization heightens the level of information system monitoring activity whenever there is an indication of increased risk to organizational operations and assets, individuals, other organizations, or the Nation based on law enforcement information, intelligence information, or other credible sources of information.
- SI-4.14 - CCI-001258
- The organization obtains legal opinion with regard to information system monitoring activities in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations.
- SI-4.15 - CCI-002650
- The organization defines the information system monitoring information that is to be provided the organization-defined personnel or roles.
- SI-4.16 - CCI-002651
- The organization defines the personnel or roles that are to be provided organization-defined information system monitoring information.
- SI-4.17 - CCI-002652
- The organization defines the frequency at which the organization will provide the organization-defined information system monitoring information to organization-defined personnel or roles
- SI-4.18 - CCI-002654
- The organization provides organization-defined information system monitoring information to organization-defined personnel or roles as needed or per organization-defined frequency.
- AC-2 - Account Management
- AC-3 - Access Enforcement
- AC-4 - Information Flow Enforcement
- AC-8 - System Use Notification
- AC-17 - Remote Access
- AU-2 - Event Logging
- AU-6 - Audit Record Review, Analysis, And Reporting
- AU-7 - Audit Record Reduction And Report Generation
- AU-9 - Protection Of Audit Information
- AU-12 - Audit Record Generation
- AU-13 - Monitoring For Information Disclosure
- AU-14 - Session Audit
- CA-7 - Continuous Monitoring
- CM-3 - Configuration Change Control
- CM-6 - Configuration Settings
- CM-8 - System Component Inventory
- CM-11 - User-Installed Software
- IA-10 - Adaptive Authentication
- IR-4 - Incident Handling
- MA-3 - Maintenance Tools
- MA-4 - Nonlocal Maintenance
- PL-9 - Central Management
- PM-12 - Insider Threat Program
- RA-5 - Vulnerability Monitoring And Scanning
- RA-10 - Threat Hunting
- SC-5 - Denial-Of-Service Protection
- SC-7 - Boundary Protection
- SC-18 - Mobile Code
- SC-26 - Decoys
- SC-31 - Covert Channel Analysis
- SC-35 - External Malicious Code Identification
- SC-36 - Distributed Processing And Storage
- SC-37 - Out-Of-Band Channels
- SC-43 - Usage Restrictions
- SI-3 - Malicious Code Protection
- SI-6 - Security And Privacy Function Verification
- SI-7 - Software, Firmware, And Information Integrity
- SR-9 - Tamper Resistance And Detection
- SR-10 - Inspection Of Systems Or Components
- Cichonski PR, Millar T, Grance T, Scarfone KA (2012) Computer Security Incident Handling Guide. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-61, Rev. 2., "SP 800-61" https://doi.org/10.6028/NIST.SP.800-61r2
- Dempsey KL, Chawla NS, Johnson LA, Johnston R, Jones AC, Orebaugh AD, Scholl MA, Stine KM (2011) Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-137., "SP 800-137" https://doi.org/10.6028/NIST.SP.800-137
- Kent K, Souppaya MP (2006) Guide to Computer Security Log Management. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-92., "SP 800-92" https://doi.org/10.6028/NIST.SP.800-92
- National Institute of Standards and Technology (2019) Security Requirements for Cryptographic Modules. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 140-3. , "FIPS 140-3" https://doi.org/10.6028/NIST.FIPS.140-3
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Scarfone KA, Mell PM (2007) Guide to Intrusion Detection and Prevention Systems (IDPS). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-94., "SP 800-94" https://doi.org/10.6028/NIST.SP.800-94
- Souppaya MP, Scarfone KA (2013) Guide to Malware Incident Prevention and Handling for Desktops and Laptops. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-83, Rev. 1., "SP 800-83" https://doi.org/10.6028/NIST.SP.800-83r1
- SI-4(1) - System-Wide Intrusion Detection System
- Connect and configure individual intrusion detection tools into a system-wide intrusion detection system.
- SI-4(2) - Automated Tools And Mechanisms For Real-Time Analysis
- Employ automated tools and mechanisms to support near real-time analysis of events.
- SI-4(3) - Automated Tool And Mechanism Integration
- Employ automated tools and mechanisms to integrate intrusion detection tools and mechanisms into access control and flow control mechanisms.
- SI-4(4) - Inbound And Outbound Communications Traffic
- SI-4(5) - System-Generated Alerts
- Alert [Assignment: organization-defined personnel or roles] when the following system-generated indications of compromise or potential compromise occur: [Assignment: organization-defined compromise indicators].
- SI-4(6) - Restrict Non-Privileged Users
- [Withdrawn: Incorporated into AC-6(10)].
- SI-4(7) - Automated Response To Suspicious Events
- SI-4(8) - Protection Of Monitoring Information
- [Withdrawn: Incorporated into SI-4].
- SI-4(9) - Testing Of Monitoring Tools And Mechanisms
- Test intrusion-monitoring tools and mechanisms [Assignment: organization-defined frequency].
- SI-4(10) - Visibility Of Encrypted Communications
- Make provisions so that [Assignment: organization-defined encrypted communications traffic] is visible to [Assignment: organization-defined system monitoring tools and mechanisms].
- SI-4(11) - Analyze Communications Traffic Anomalies
- Analyze outbound communications traffic at the external interfaces to the system and selected [Assignment: organization-defined interior points within the system] to discover anomalies.
- SI-4(12) - Automated Organization-Generated Alerts
- Alert [Assignment: organization-defined personnel or roles] using [Assignment: organization-defined automated mechanisms] when the following indications of inappropriate or unusual activities with security or privacy implications occur: [Assignment: organization-defined activities that trigger alerts].
- SI-4(13) - Analyze Traffic And Event Patterns
- SI-4(14) - Wireless Intrusion Detection
- Employ a wireless intrusion detection system to identify rogue wireless devices and to detect attack attempts and potential compromises or breaches to the system.
- SI-4(15) - Wireless To Wireline Communications
- Employ an intrusion detection system to monitor wireless communications traffic as the traffic passes from wireless to wireline networks.
- SI-4(16) - Correlate Monitoring Information
- Correlate information from monitoring tools and mechanisms employed throughout the system.
- SI-4(17) - Integrated Situational Awareness
- Correlate information from monitoring physical, cyber, and supply chain activities to achieve integrated, organization-wide situational awareness.
- SI-4(18) - Analyze Traffic And Covert Exfiltration
- Analyze outbound communications traffic at external interfaces to the system and at the following interior points to detect covert exfiltration of information: [Assignment: organization-defined interior points within the system].
- SI-4(19) - Risk For Individuals
- Implement [Assignment: organization-defined additional monitoring] of individuals who have been identified by [Assignment: organization-defined sources] as posing an increased level of risk.
- SI-4(20) - Privileged Users
- Implement the following additional monitoring of privileged users: [Assignment: organization-defined additional monitoring].
- SI-4(21) - Probationary Periods
- Implement the following additional monitoring of individuals during [Assignment: organization-defined probationary period]: [Assignment: organization-defined additional monitoring].
- SI-4(22) - Unauthorized Network Services
- SI-4(23) - Host-Based Devices
- Implement the following host-based monitoring mechanisms at [Assignment: organization-defined system components]: [Assignment: organization-defined host-based monitoring mechanisms].
- SI-4(24) - Indicators Of Compromise
- Discover, collect, and distribute to [Assignment: organization-defined personnel or roles], indicators of compromise provided by [Assignment: organization-defined sources].
- SI-4(25) - Optimize Network Traffic Analysis
- Provide visibility into network traffic at external and key internal system interfaces to optimize the effectiveness of monitoring devices.
- RMF Control
- SI-5
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baselines
- FS FH NH FM FL NL NM
- SI-5a.
- Receive system security alerts, advisories, and directives from [Assignment: organization-defined external organizations] on an ongoing basis;
- SI-5b.
- Generate internal security alerts, advisories, and directives as deemed necessary;
- SI-5c.
- Disseminate security alerts, advisories, and directives to: [Selection (one or more): [Assignment: organization-defined personnel or roles]; [Assignment: organization-defined elements within the organization]; [Assignment: organization-defined external organizations]]; and
- SI-5d.
- Implement security directives in accordance with established time frames, or notify the issuing organization of the degree of noncompliance.
- SI-5.2 - CCI-002692
- The organization defines the external organizations from which it receives information system security alerts, advisories and directives.
- SI-5.1 - CCI-001285
- The organization receives information system security alerts, advisories, and directives from organization-defined external organizations on an ongoing basis.
- SI-5.3 - CCI-001286
- The organization generates internal security alerts, advisories, and directives as deemed necessary.
- SI-5.5 - CCI-001288
- The organization defines the personnel or roles to whom the organization will disseminate security alerts, advisories and directives.
- SI-5.6 - CCI-002693
- The organization defines the elements within the organization to whom the organization will disseminate security alerts, advisories and directives.
- SI-5.7 - CCI-002694
- The organization defines the external organizations to whom the organization will disseminate security alerts, advisories and directives.
- SI-5.4 - CCI-001287
- The organization disseminates security alerts, advisories, and directives to organization-defined personnel or roles, organization-defined elements within the organization, and/or organization-defined external organizations.
- SI-5.8 - CCI-001289
- The organization implements security directives in accordance with established time frames, or notifies the issuing organization of the degree of noncompliance.
- Souppaya MP, Scarfone KA (2013) Guide to Enterprise Patch Management Technologies. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-40, Rev. 3., "SP 800-40" https://doi.org/10.6028/NIST.SP.800-40r3
- SI-5(1) - Automated Alerts And Advisories
- Broadcast security alert and advisory information throughout the organization using [Assignment: organization-defined automated mechanisms].
- RMF Control
- SI-6
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baselines
- FH NH FM
- SI-6a.
- Verify the correct operation of [Assignment: organization-defined security and privacy functions];
- SI-6b.
- Perform the verification of the functions specified in SI-6a [Selection (one or more): [Assignment: organization-defined system transitional states]; upon command by user with appropriate privilege; [Assignment: organization-defined frequency]];
- SI-6c.
- Alert [Assignment: organization-defined personnel or roles] to failed security and privacy verification tests; and
- SI-6d.
- [Selection (one or more): Shut the system down; Restart the system; [Assignment: organization-defined alternative action(s)]] when anomalies are discovered.
- SI-6.1 - CCI-002695
- The organization defines the security functions that require verification of correct operation.
- SI-6.2 - CCI-002696
- The information system verifies correct operation of organization-defined security functions.
- SI-6.4 - CCI-002698
- The organization defines the system transitional states when the information system will verify correct operation of organization-defined security functions.
- SI-6.3 - CCI-002697
- The organization defines the frequency at which it will verify correct operation of organization-defined security functions.
- SI-6.5 - CCI-002699
- The information system performs verification of the correct operation of organization-defined security functions: when the system is in an organization-defined transitional state; upon command by a user with appropriate privileges; and/or on an organization-defined frequency.
- SI-6.7 - CCI-002700
- The organization defines the personnel or roles to be notified when security verification tests fail.
- SI-6.8 - CCI-002701
- The organization defines alternative action(s) to be taken when the information system discovers anomalies in the operation of organization-defined security functions.
- SI-6.6 - CCI-001294
- The information system notifies organization-defined personnel or roles of failed security verification tests.
- SI-6.9 - CCI-002702
- The information system shuts the information system down, restarts the information system, and/or initiates organization-defined alternative action(s) when anomalies in the operation of the organization-defined security functions are discovered.
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- SI-6(1) - Notification Of Failed Security Tests
- [Withdrawn: Incorporated into SI-6].
- SI-6(2) - Automation Support For Distributed Testing
- Implement automated mechanisms to support the management of distributed security and privacy function testing.
- SI-6(3) - Report Verification Results
- Report the results of security and privacy function verification to [Assignment: organization-defined personnel or roles].
- RMF Control
- SI-7
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baselines
- FH CX NH FM NM
- SI-7a.
- Employ integrity verification tools to detect unauthorized changes to the following software, firmware, and information: [Assignment: organization-defined software, firmware, and information]; and
- SI-7b.
- Take the following actions when unauthorized changes to the software, firmware, and information are detected: [Assignment: organization-defined actions].
- SI-7.1 - CCI-002703
- The organization defines the software, firmware, and information which will be subjected to integrity verification tools to detect unauthorized changes.
- SI-7.2 - CCI-002704
- The organization employs integrity verification tools to detect unauthorized changes to organization-defined software, firmware, and information.
- AC-4 - Information Flow Enforcement
- CM-3 - Configuration Change Control
- CM-7 - Least Functionality
- CM-8 - System Component Inventory
- MA-3 - Maintenance Tools
- MA-4 - Nonlocal Maintenance
- RA-5 - Vulnerability Monitoring And Scanning
- SA-8 - Security And Privacy Engineering Principles
- SA-9 - External System Services
- SA-10 - Developer Configuration Management
- SC-8 - Transmission Confidentiality And Integrity
- SC-12 - Cryptographic Key Establishment And Management
- SC-13 - Cryptographic Protection
- SC-28 - Protection Of Information At Rest
- SC-37 - Out-Of-Band Channels
- SI-3 - Malicious Code Protection
- SR-3 - Supply Chain Controls And Processes
- SR-4 - Provenance
- SR-5 - Acquisition Strategies, Tools, And Methods
- SR-6 - Supplier Assessments And Reviews
- SR-9 - Tamper Resistance And Detection
- SR-10 - Inspection Of Systems Or Components
- SR-11 - Component Authenticity
- Cooper DA, Polk T, Regenscheid AR, Souppaya MP (2011) BIOS Protection Guidelines. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-147., "SP 800-147" https://doi.org/10.6028/NIST.SP.800-147
- National Institute of Standards and Technology (2013) Digital Signature Standard (DSS). (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 186-4., "FIPS 186-4" https://doi.org/10.6028/NIST.FIPS.186-4
- National Institute of Standards and Technology (2015) Secure Hash Standard (SHS). (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 180-4., "FIPS 180-4" https://doi.org/10.6028/NIST.FIPS.180-4
- National Institute of Standards and Technology (2015) SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 202., "FIPS 202" https://doi.org/10.6028/NIST.FIPS.202
- National Institute of Standards and Technology (2019) Security Requirements for Cryptographic Modules. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 140-3. , "FIPS 140-3" https://doi.org/10.6028/NIST.FIPS.140-3
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Quinn SD, Souppaya MP, Cook MR, Scarfone KA (2018) National Checklist Program for IT Products: Guidelines for Checklist Users and Developers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-70, Rev. 4., "SP 800-70" https://doi.org/10.6028/NIST.SP.800-70r4
- SI-7(1) - Integrity Checks
- Perform an integrity check of [Assignment: organization-defined software, firmware, and information] [Selection (one or more): at startup; at [Assignment: organization-defined transitional states or security-relevant events]; [Assignment: organization-defined frequency]].
- SI-7(2) - Automated Notifications Of Integrity Violations
- Employ automated tools that provide notification to [Assignment: organization-defined personnel or roles] upon discovering discrepancies during integrity verification.
- SI-7(3) - Centrally Managed Integrity Tools
- Employ centrally managed integrity verification tools.
- SI-7(4) - Tamper-Evident Packaging
- [Withdrawn: Incorporated into SR-9].
- SI-7(5) - Automated Response To Integrity Violations
- Automatically [Selection (one or more): shut the system down; restart the system; implement [Assignment: organization-defined controls]] when integrity violations are discovered.
- SI-7(6) - Cryptographic Protection
- Implement cryptographic mechanisms to detect unauthorized changes to software, firmware, and information.
- SI-7(7) - Integration Of Detection And Response
- Incorporate the detection of the following unauthorized changes into the organizational incident response capability: [Assignment: organization-defined security-relevant changes to the system].
- SI-7(8) - Auditing Capability For Significant Events
- Upon detection of a potential integrity violation, provide the capability to audit the event and initiate the following actions: [Selection (one or more): generate an audit record; alert current user; alert [Assignment: organization-defined personnel or roles]; [Assignment: organization-defined other actions]].
- SI-7(9) - Verify Boot Process
- Verify the integrity of the boot process of the following system components: [Assignment: organization-defined system components].
- SI-7(10) - Protection Of Boot Firmware
- Implement the following mechanisms to protect the integrity of boot firmware in [Assignment: organization-defined system components]: [Assignment: organization-defined mechanisms].
- SI-7(11) - Confined Environments With Limited Privileges
- [Withdrawn: Moved to CM-7(6)].
- SI-7(12) - Integrity Verification
- Require that the integrity of the following user-installed software be verified prior to execution: [Assignment: organization-defined user-installed software].
- SI-7(13) - Code Execution In Protected Environments
- [Withdrawn: Moved to CM-7(7)].
- SI-7(14) - Binary Or Machine Executable Code
- [Withdrawn: Moved to CM-7(8)].
- SI-7(15) - Code Authentication
- Implement cryptographic mechanisms to authenticate the following software or firmware components prior to installation: [Assignment: organization-defined software or firmware components].
- SI-7(16) - Time Limit On Process Execution Without Supervision
- Prohibit processes from executing without supervision for more than [Assignment: organization-defined time period].
- SI-7(17) - Runtime Application Self-Protection
- Implement [Assignment: organization-defined controls] for application self-protection at runtime.
- RMF Control
- SI-8
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baselines
- FH NH FM NM
- SI-8a.
- Employ spam protection mechanisms at system entry and exit points to detect and act on unsolicited messages; and
- SI-8b.
- Update spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures.
- SI-8.1 - CCI-002741
- The organization employs spam protection mechanisms at information system entry points to detect and take action on unsolicited messages.
- SI-8.2 - CCI-002742
- The organization employs spam protection mechanisms at information system exit points to detect and take action on unsolicited messages.
- SI-8.3 - CCI-001306
- The organization updates spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures.
- Rose SW, Nightingale S, Garfinkel SL, Chandramouli R (2019) Trustworthy Email. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-177, Rev. 1., "SP 800-177" https://doi.org/10.6028/NIST.SP.800-177r1
- Tracy MC, Jansen W, Scarfone KA, Butterfield J (2007) Guidelines on Electronic Mail Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-45, Version 2., "SP 800-45" https://doi.org/10.6028/NIST.SP.800-45ver2
- SI-8(1) - Central Management
- [Withdrawn: Incorporated into PL-9].
- SI-8(2) - Automatic Updates
- Automatically update spam protection mechanisms [Assignment: organization-defined frequency].
- SI-8(3) - Continuous Learning Capability
- Implement spam protection mechanisms with a learning capability to more effectively identify legitimate communications traffic.
- RMF Control
- SI-9
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baselines
- —
- RMF Control
- SI-10
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baselines
- FH NH FM NM
- SI-10.2 - CCI-002744
- The organization defines the inputs the information system is to conduct validity checks.
- SI-10.1 - CCI-001310
- The information system checks the validity of organization-defined inputs.
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- SI-10(1) - Manual Override Capability
- SI-10(2) - Review And Resolve Errors
- Review and resolve input validation errors within [Assignment: organization-defined time period].
- SI-10(3) - Predictable Behavior
- Verify that the system behaves in a predictable and documented manner when invalid inputs are received.
- SI-10(4) - Timing Interactions
- Account for timing interactions among system components in determining appropriate responses for invalid inputs.
- SI-10(5) - Restrict Inputs To Trusted Sources And Approved Formats
- Restrict the use of information inputs to [Assignment: organization-defined trusted sources] and/or [Assignment: organization-defined formats].
- SI-10(6) - Injection Prevention
- Prevent untrusted data injections.
- RMF Control
- SI-11
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baselines
- FH NH FM NM
- SI-11a.
- Generate error messages that provide information necessary for corrective actions without revealing information that could be exploited; and
- SI-11b.
- Reveal error messages only to [Assignment: organization-defined personnel or roles].
- SI-11.1 - CCI-001312
- The information system generates error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
- SI-11.3 - CCI-002759
- The organization defines the personnel or roles to whom error messages are to be revealed.
- SI-11.2 - CCI-001314
- The information system reveals error messages only to organization-defined personnel or roles.
- RMF Control
- SI-12
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baselines
- NP FS FH NH FM FL NL NM
- SI-12.1 - CCI-001315
- The organization handles information within the information system and information output from the system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements.
- SI-12.2 - CCI-001678
- The organization retains information within the information system and information output from the system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements.
- AC-16 - Security And Privacy Attributes
- AU-5 - Response To Audit Logging Process Failures
- AU-11 - Audit Record Retention
- CA-2 - Control Assessments
- CA-3 - Information Exchange
- CA-5 - Plan Of Action And Milestones
- CA-6 - Authorization
- CA-7 - Continuous Monitoring
- CA-9 - Internal System Connections
- CM-5 - Access Restrictions For Change
- CM-9 - Configuration Management Plan
- CP-2 - Contingency Plan
- IR-8 - Incident Response Plan
- MP-2 - Media Access
- MP-3 - Media Marking
- MP-4 - Media Storage
- MP-6 - Media Sanitization
- PL-2 - System Security And Privacy Plans
- PL-4 - Rules Of Behavior
- PM-4 - Plan Of Action And Milestones Process
- PM-8 - Critical Infrastructure Plan
- PM-9 - Risk Management Strategy
- PS-2 - Position Risk Designation
- PS-6 - Access Agreements
- PT-2 - Authority To Process Personally Identifiable Information
- PT-3 - Personally Identifiable Information Processing Purposes
- RA-2 - Security Categorization
- RA-3 - Risk Assessment
- SA-5 - System Documentation
- SA-8 - Security And Privacy Engineering Principles
- SR-2 - Supply Chain Risk Management Plan
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- United States Code, 2008 Edition, Title 44 - , Chapters 29, 31, and 33, January 2012., "USC 2901" https://www.govinfo.gov/content/pkg/USCODE-2011-ti
- SI-12(1) - Limit Personally Identifiable Information Elements
- Limit personally identifiable information being processed in the information life cycle to the following elements of personally identifiable information: [Assignment: organization-defined elements of personally identifiable information].
- SI-12(2) - Minimize Personally Identifiable Information In Testing, Training, And Research
- Use the following techniques to minimize the use of personally identifiable information for research, testing, or training: [Assignment: organization-defined techniques].
- SI-12(3) - Information Disposal
- Use the following techniques to dispose of, destroy, or erase information following the retention period: [Assignment: organization-defined techniques].
- RMF Control
- SI-13
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baselines
- CX
- SI-13a.
- Determine mean time to failure (MTTF) for the following system components in specific environments of operation: [Assignment: organization-defined system components]; and
- SI-13b.
- Provide substitute system components and a means to exchange active and standby components in accordance with the following criteria: [Assignment: organization-defined MTTF substitution criteria].
- SI-13.2 - CCI-002761
- The organization defines the system components in specific environments of operation for which the mean time to failure (MTTF) is to be determined.
- SI-13.1 - CCI-002760
- The organization determines mean time to failure (MTTF) for organization-defined information system components in specific environments of operation.
- SI-13.4 - CCI-002762
- The organization defines the mean time to failure substitution criteria to be employed as a means to determine the need to exchange active and standby components.
- SI-13.3 - CCI-001318
- The organization provides substitute information system components.
- SI-13.5 - CCI-002763
- The organization provides a means to exchange active and standby components in accordance with the organization-defined mean time to failure substitution criteria.
- SI-13(1) - Transferring Component Responsibilities
- Take system components out of service by transferring component responsibilities to substitute components no later than [Assignment: organization-defined fraction or percentage] of mean time to failure.
- SI-13(2) - Time Limit On Process Execution Without Supervision
- [Withdrawn: Incorporated into SI-7(16)].
- SI-13(3) - Manual Transfer Between Components
- Manually initiate transfers between active and standby system components when the use of the active component reaches [Assignment: organization-defined percentage] of the mean time to failure.
- SI-13(4) - Standby Component Installation And Notification
- If system component failures are detected:
- SI-13(5) - Failover Capability
- Provide [Selection: real-time; near real-time] [Assignment: organization-defined failover capability] for the system.
- RMF Control
- SI-14
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baselines
- CX
- SI-14.1 - CCI-002764
- The organization defines non-persistent information system components and services to be implemented.
- SI-14.2 - CCI-002765
- The organization defines the frequency at which it will terminate organization-defined non-persistent information system components and services.
- SI-14.3 - CCI-002766
- The organization implements organization-defined non-persistence information system components and services that are initiated in a known state.
- SI-14.4 - CCI-002767
- The organization implements organization-defined non-persistence information system components and services that are terminated upon end of session of use and/or periodically at organization-defined frequency.
- SI-14(1) - Refresh From Trusted Sources
- Obtain software and data employed during system component and service refreshes from the following trusted sources: [Assignment: organization-defined trusted sources].
- SI-14(2) - Non-Persistent Information
- SI-14(3) - Non-Persistent Connectivity
- Establish connections to the system on demand and terminate connections after [Selection: completion of a request; a period of non-use].
- RMF Control
- SI-15
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baselines
- —
- SI-15.1 - CCI-002770
- The organization defines the software programs and/or applications from which the information system is to validate the information output to ensure the information is consistent with expected content.
- SI-15.2 - CCI-002771
- The information system validates information output from organization-defined software programs and/or applications to ensure that the information is consistent with the expected content.
- RMF Control
- SI-16
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baselines
- FH NH FM NM
- SI-16.1 - CCI-002823
- The organization defines the security safeguards to be implemented to protect the information system's memory from unauthorized code execution.
- SI-16.2 - CCI-002824
- The information system implements organization-defined security safeguards to protect its memory from unauthorized code execution.
- RMF Control
- SI-17
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baselines
- CX
- SI-17.1 - CCI-002773
- The organization defines the fail-safe procedures to be implemented by the information system when organization-defined failure conditions occur.
- SI-17.2 - CCI-002774
- The organization defines the failure conditions which, when they occur, will result in the information system implementing organization-defined fail-safe procedures.
- SI-17.3 - CCI-002775
- The information system implements organization-defined fail-safe procedures when organization-defined failure conditions occur.
- RMF Control
- SI-18
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baselines
- NP
- SI-18a.
- Check the accuracy, relevance, timeliness, and completeness of personally identifiable information across the information life cycle [Assignment: organization-defined frequency]; and
- SI-18b.
- Correct or delete inaccurate or outdated personally identifiable information.
- Garfinkel S (2016) De-Identifying Government Datasets. (National Institute of Standards and Technology, Gaithersburg, MD), Second Draft NIST Special Publication (SP) 800-188., "SP 800-188" https://csrc.nist.gov/publications/detail/sp/800-1
- Grassi P, Lefkovitz N, Nadeau E, Galluzzo R, Dinh, A (2018) Attribute Metadata: A Proposed Schema for Evaluating Federated Attributes. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8112., "IR 8112" https://doi.org/10.6028/NIST.IR.8112
- Office of Management and Budget Memorandum M-19-15, , April 2019., "OMB M-19-15" https://www.whitehouse.gov/wp-content/uploads/2019
- SI-18(1) - Automation Support
- Correct or delete personally identifiable information that is inaccurate or outdated, incorrectly determined regarding impact, or incorrectly de-identified using [Assignment: organization-defined automated mechanisms].
- SI-18(2) - Data Tags
- Employ data tags to automate the correction or deletion of personally identifiable information across the information life cycle within organizational systems.
- SI-18(3) - Collection
- Collect personally identifiable information directly from the individual.
- SI-18(4) - Individual Requests
- Correct or delete personally identifiable information upon request by individuals or their designated representatives.
- SI-18(5) - Notice Of Correction Or Deletion
- Notify [Assignment: organization-defined recipients of personally identifiable information] and individuals that the personally identifiable information has been corrected or deleted.
- RMF Control
- SI-19
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baselines
- NP
- SI-19a.
- Remove the following elements of personally identifiable information from datasets: [Assignment: organization-defined elements of personally identifiable information]; and
- SI-19b.
- Evaluate [Assignment: organization-defined frequency] for effectiveness of de-identification.
- Garfinkel S (2016) De-Identifying Government Datasets. (National Institute of Standards and Technology, Gaithersburg, MD), Second Draft NIST Special Publication (SP) 800-188., "SP 800-188" https://csrc.nist.gov/publications/detail/sp/800-1
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- SI-19(1) - Collection
- De-identify the dataset upon collection by not collecting personally identifiable information.
- SI-19(2) - Archiving
- Prohibit archiving of personally identifiable information elements if those elements in a dataset will not be needed after the dataset is archived.
- SI-19(3) - Release
- Remove personally identifiable information elements from a dataset prior to its release if those elements in the dataset do not need to be part of the data release.
- SI-19(4) - Removal, Masking, Encryption, Hashing, Or Replacement Of Direct Identifiers
- Remove, mask, encrypt, hash, or replace direct identifiers in a dataset.
- SI-19(5) - Statistical Disclosure Control
- Manipulate numerical data, contingency tables, and statistical findings so that no individual or organization is identifiable in the results of the analysis.
- SI-19(6) - Differential Privacy
- Prevent disclosure of personally identifiable information by adding non-deterministic noise to the results of mathematical operations before the results are reported.
- SI-19(7) - Validated Algorithms And Software
- Perform de-identification using validated algorithms and software that is validated to implement the algorithms.
- SI-19(8) - Motivated Intruder
- Perform a motivated intruder test on the de-identified dataset to determine if the identified data remains or if the de-identified data can be re-identified.
- RMF Control
- SI-20
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baselines
- CC
- AU-13 - Monitoring For Information Disclosure
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Ross RS, Pillitteri VY, Graubart R, Bodeau D, McQuaid R (2019) Developing Cyber Resilient Systems: A Systems Security Engineering Approach. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 2., "SP 800-160-2" https://doi.org/10.6028/NIST.SP.800-160v2
- RMF Control
- SI-21
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baselines
- —
- SI-14 - Non-Persistence
- Office of Management and Budget Memorandum Circular A-130, , July 2016., "OMB A-130" https://www.whitehouse.gov/sites/whitehouse.gov/fi
- Ross RS, Pillitteri VY, Graubart R, Bodeau D, McQuaid R (2019) Developing Cyber Resilient Systems: A Systems Security Engineering Approach. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 2., "SP 800-160-2" https://doi.org/10.6028/NIST.SP.800-160v2
- RMF Control
- SI-22
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baselines
- —
- SI-22a.
- Identify the following alternative sources of information for [Assignment: organization-defined essential functions and services]: [Assignment: organization-defined alternative information sources]; and
- SI-22b.
- Use an alternative information source for the execution of essential functions or services on [Assignment: organization-defined systems or system components] when the primary source of information is corrupted or unavailable.
- Ross RS, Pillitteri VY, Graubart R, Bodeau D, McQuaid R (2019) Developing Cyber Resilient Systems: A Systems Security Engineering Approach. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 2., "SP 800-160-2" https://doi.org/10.6028/NIST.SP.800-160v2
- RMF Control
- SI-23
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baselines
- —
- SI-23a.
- Fragment the following information: [Assignment: organization-defined information]; and
- SI-23b.
- Distribute the fragmented information across the following systems or system components: [Assignment: organization-defined systems or system components].
- Ross RS, Pillitteri VY, Graubart R, Bodeau D, McQuaid R (2019) Developing Cyber Resilient Systems: A Systems Security Engineering Approach. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 2., "SP 800-160-2" https://doi.org/10.6028/NIST.SP.800-160v2
- RMF Control
- SR-1
- Subject Area
- SUPPLY CHAIN RISK MANAGEMENT
- Baselines
- FS FH NH FM FL NL NM
- SR-1a.
- Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
- SR-1b.
- Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissemination of the supply chain risk management policy and procedures; and
- SR-1c.
- Review and update the current supply chain risk management:
- 85 Federal Register 54263 (September 1, 2020), pp 54263-54271., "41 CFR 201" https://www.federalregister.gov/d/2020-18939
- Bowen P, Hash J, Wilson M (2006) Information Security Handbook: A Guide for Managers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-100, Includes updates as of March 7, 2007., "SP 800-100" https://doi.org/10.6028/NIST.SP.800-100
- Boyens JM, Paulsen C, Moorthy R, Bartol N (2015) Supply Chain Risk Management Practices for Federal Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-161., "SP 800-161" https://doi.org/10.6028/NIST.SP.800-161
- Committee on National Security Systems Directive No. 505, , August 2017., "CNSSD 505" https://www.cnss.gov/CNSS/issuances/Directives.cfm
- Executive Order 13873, , May 2019., "EO 13873" https://www.whitehouse.gov/presidential-actions/ex
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- Nieles M, Pillitteri VY, Dempsey KL (2017) An Introduction to Information Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-12, Rev. 1., "SP 800-12" https://doi.org/10.6028/NIST.SP.800-12r1
- Secure Technology Act [includes Federal Acquisition Supply Chain Security Act] (P.L. 115-390), December 2018., "FASC18" https://www.congress.gov/bill/115th-congress/senat
- RMF Control
- SR-2
- Subject Area
- SUPPLY CHAIN RISK MANAGEMENT
- Baselines
- FS FH NH FM FL NL NM
- SR-2a.
- Develop a plan for managing supply chain risks associated with the research and development, design, manufacturing, acquisition, delivery, integration, operations and maintenance, and disposal of the following systems, system components or system services: [Assignment: organization-defined systems, system components, or system services];
- SR-2b.
- Review and update the supply chain risk management plan [Assignment: organization-defined frequency] or as required, to address threat, organizational or environmental changes; and
- SR-2c.
- Protect the supply chain risk management plan from unauthorized disclosure and modification.
- CA-2 - Control Assessments
- CP-4 - Contingency Plan Testing
- IR-4 - Incident Handling
- MA-2 - Controlled Maintenance
- MA-6 - Timely Maintenance
- PE-16 - Delivery And Removal
- PL-2 - System Security And Privacy Plans
- PM-9 - Risk Management Strategy
- PM-30 - Supply Chain Risk Management Strategy
- RA-3 - Risk Assessment
- RA-7 - Risk Response
- SA-8 - Security And Privacy Engineering Principles
- SI-4 - System Monitoring
- 85 Federal Register 54263 (September 1, 2020), pp 54263-54271., "41 CFR 201" https://www.federalregister.gov/d/2020-18939
- Boyens JM, Paulsen C, Bartol N, Shankles S, Moorthy R (2012) Notional Supply Chain Risk Management Practices for Federal Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7622., "IR 7622" https://doi.org/10.6028/NIST.IR.7622
- Boyens JM, Paulsen C, Moorthy R, Bartol N (2015) Supply Chain Risk Management Practices for Federal Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-161., "SP 800-161" https://doi.org/10.6028/NIST.SP.800-161
- Committee on National Security Systems Directive No. 505, , August 2017., "CNSSD 505" https://www.cnss.gov/CNSS/issuances/Directives.cfm
- Executive Order 13873, , May 2019., "EO 13873" https://www.whitehouse.gov/presidential-actions/ex
- Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-39., "SP 800-39" https://doi.org/10.6028/NIST.SP.800-39
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- Paulsen C, Winkler K, Boyens JM, Ng J, Gimbi J (2020) Impact Analysis Tool for Interdependent Cyber Supply Chain Risks. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8272., "IR 8272" https://doi.org/10.6028/NIST.IR.8272
- Petersen R, Santos D, Smith MC, Wetzel KA, Witte G (2020) Workforce Framework for Cybersecurity (NICE Framework). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-181, Rev. 1., "SP 800-181" https://doi.org/10.6028/NIST.SP.800-181r1
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- Secure Technology Act [includes Federal Acquisition Supply Chain Security Act] (P.L. 115-390), December 2018., "FASC18" https://www.congress.gov/bill/115th-congress/senat
- SR-2(1) - Establish Scrm Team
- Establish a supply chain risk management team consisting of [Assignment: organization-defined personnel, roles, and responsibilities] to lead and support the following SCRM activities: [Assignment: organization-defined supply chain risk management activities].
- RMF Control
- SR-3
- Subject Area
- SUPPLY CHAIN RISK MANAGEMENT
- Baselines
- FS FH NH FM CC FL NL NM
- SR-3a.
- Establish a process or processes to identify and address weaknesses or deficiencies in the supply chain elements and processes of [Assignment: organization-defined system or system component] in coordination with [Assignment: organization-defined supply chain personnel];
- SR-3b.
- Employ the following controls to protect against supply chain risks to the system, system component, or system service and to limit the harm or consequences from supply chain-related events: [Assignment: organization-defined supply chain controls]; and
- SR-3c.
- Document the selected and implemented supply chain processes and controls in [Selection: security and privacy plans; supply chain risk management plan; [Assignment: organization-defined document]].
- CA-2 - Control Assessments
- MA-2 - Controlled Maintenance
- MA-6 - Timely Maintenance
- PE-3 - Physical Access Control
- PE-16 - Delivery And Removal
- PL-8 - Security And Privacy Architectures
- PM-30 - Supply Chain Risk Management Strategy
- SA-2 - Allocation Of Resources
- SA-3 - System Development Life Cycle
- SA-4 - Acquisition Process
- SA-5 - System Documentation
- SA-8 - Security And Privacy Engineering Principles
- SA-9 - External System Services
- SA-10 - Developer Configuration Management
- SA-15 - Development Process, Standards, And Tools
- SC-7 - Boundary Protection
- SC-29 - Heterogeneity
- SC-30 - Concealment And Misdirection
- SC-38 - Operations Security
- SI-7 - Software, Firmware, And Information Integrity
- SR-6 - Supplier Assessments And Reviews
- SR-9 - Tamper Resistance And Detection
- SR-11 - Component Authenticity
- 85 Federal Register 54263 (September 1, 2020), pp 54263-54271., "41 CFR 201" https://www.federalregister.gov/d/2020-18939
- Boyens JM, Paulsen C, Bartol N, Shankles S, Moorthy R (2012) Notional Supply Chain Risk Management Practices for Federal Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7622., "IR 7622" https://doi.org/10.6028/NIST.IR.7622
- Boyens JM, Paulsen C, Moorthy R, Bartol N (2015) Supply Chain Risk Management Practices for Federal Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-161., "SP 800-161" https://doi.org/10.6028/NIST.SP.800-161
- Executive Order 13873, , May 2019., "EO 13873" https://www.whitehouse.gov/presidential-actions/ex
- International Organization for Standardization/International Electrotechnical Commission 20243-1:2018, , February 2018., "ISO 20243" https://www.iso.org/standard/74399.html
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- Secure Technology Act [includes Federal Acquisition Supply Chain Security Act] (P.L. 115-390), December 2018., "FASC18" https://www.congress.gov/bill/115th-congress/senat
- SR-3(1) - Diverse Supply Base
- Employ a diverse set of sources for the following system components and services: [Assignment: organization-defined system components and services].
- SR-3(2) - Limitation Of Harm
- Employ the following controls to limit harm from potential adversaries identifying and targeting the organizational supply chain: [Assignment: organization-defined controls].
- SR-3(3) - Sub-Tier Flow Down
- Ensure that the controls included in the contracts of prime contractors are also included in the contracts of subcontractors.
- RMF Control
- SR-4
- Subject Area
- SUPPLY CHAIN RISK MANAGEMENT
- Baselines
- CX CC
- 85 Federal Register 54263 (September 1, 2020), pp 54263-54271., "41 CFR 201" https://www.federalregister.gov/d/2020-18939
- Boyens JM, Paulsen C, Bartol N, Shankles S, Moorthy R (2012) Notional Supply Chain Risk Management Practices for Federal Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7622., "IR 7622" https://doi.org/10.6028/NIST.IR.7622
- Boyens JM, Paulsen C, Moorthy R, Bartol N (2015) Supply Chain Risk Management Practices for Federal Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-161., "SP 800-161" https://doi.org/10.6028/NIST.SP.800-161
- Executive Order 13873, , May 2019., "EO 13873" https://www.whitehouse.gov/presidential-actions/ex
- Grassi P, Lefkovitz N, Nadeau E, Galluzzo R, Dinh, A (2018) Attribute Metadata: A Proposed Schema for Evaluating Federated Attributes. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8112., "IR 8112" https://doi.org/10.6028/NIST.IR.8112
- International Organization for Standardization/International Electrotechnical Commission 20243-1:2018, , February 2018., "ISO 20243" https://www.iso.org/standard/74399.html
- International Organization for Standardization/International Electrotechnical Commission 27036-1:2014, , April 2014., "ISO 27036" https://www.iso.org/standard/59648.html
- Paulsen C, Winkler K, Boyens JM, Ng J, Gimbi J (2020) Impact Analysis Tool for Interdependent Cyber Supply Chain Risks. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8272., "IR 8272" https://doi.org/10.6028/NIST.IR.8272
- Ross RS, Oren JC, McEvilley M (2016) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Includes updates as of March 21, 2018., "SP 800-160-1" https://doi.org/10.6028/NIST.SP.800-160v1
- Secure Technology Act [includes Federal Acquisition Supply Chain Security Act] (P.L. 115-390), December 2018., "FASC18" https://www.congress.gov/bill/115th-congress/senat
- SR-4(1) - Identity
- Establish and maintain unique identification of the following supply chain elements, processes, and personnel associated with the identified system and critical system components: [Assignment: organization-defined supply chain elements, processes, and personnel associated with organization-defined systems and critical system components].
- SR-4(2) - Track And Trace
- Establish and maintain unique identification of the following systems and critical system components for tracking through the supply chain: [Assignment: organization-defined systems and critical system components].
- SR-4(3) - Validate As Genuine And Not Altered
- Employ the following controls to validate that the system or system component received is genuine and has not been altered: [Assignment: organization-defined controls].
- SR-4(4) - Supply Chain Integrity — Pedigree
- Employ [Assignment: organization-defined controls] and conduct [Assignment: organization-defined analysis] to ensure the integrity of the system and system components by validating the internal composition and provenance of critical or mission-essential technologies, products, and services.
- RMF Control
- SR-5
- Subject Area
- SUPPLY CHAIN RISK MANAGEMENT
- Baselines
- FS FH NH FM FL NL NM
- AT-3 - Role-Based Training
- SA-2 - Allocation Of Resources
- SA-3 - System Development Life Cycle
- SA-4 - Acquisition Process
- SA-5 - System Documentation
- SA-8 - Security And Privacy Engineering Principles
- SA-9 - External System Services
- SA-10 - Developer Configuration Management
- SA-15 - Development Process, Standards, And Tools
- SR-6 - Supplier Assessments And Reviews
- SR-9 - Tamper Resistance And Detection
- SR-10 - Inspection Of Systems Or Components
- SR-11 - Component Authenticity
- 85 Federal Register 54263 (September 1, 2020), pp 54263-54271., "41 CFR 201" https://www.federalregister.gov/d/2020-18939
- Boyens JM, Paulsen C, Bartol N, Shankles S, Moorthy R (2012) Notional Supply Chain Risk Management Practices for Federal Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7622., "IR 7622" https://doi.org/10.6028/NIST.IR.7622
- Boyens JM, Paulsen C, Moorthy R, Bartol N (2015) Supply Chain Risk Management Practices for Federal Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-161., "SP 800-161" https://doi.org/10.6028/NIST.SP.800-161
- Executive Order 13873, , May 2019., "EO 13873" https://www.whitehouse.gov/presidential-actions/ex
- International Organization for Standardization/International Electrotechnical Commission 20243-1:2018, , February 2018., "ISO 20243" https://www.iso.org/standard/74399.html
- International Organization for Standardization/International Electrotechnical Commission 27036-1:2014, , April 2014., "ISO 27036" https://www.iso.org/standard/59648.html
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- Paulsen C, Winkler K, Boyens JM, Ng J, Gimbi J (2020) Impact Analysis Tool for Interdependent Cyber Supply Chain Risks. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8272., "IR 8272" https://doi.org/10.6028/NIST.IR.8272
- Secure Technology Act [includes Federal Acquisition Supply Chain Security Act] (P.L. 115-390), December 2018., "FASC18" https://www.congress.gov/bill/115th-congress/senat
- SR-5(1) - Adequate Supply
- Employ the following controls to ensure an adequate supply of [Assignment: organization-defined critical system components]: [Assignment: organization-defined controls].
- SR-5(2) - Assessments Prior To Selection, Acceptance, Modification, Or Update
- Assess the system, system component, or system service prior to selection, acceptance, modification, or update.
- RMF Control
- SR-6
- Subject Area
- SUPPLY CHAIN RISK MANAGEMENT
- Baselines
- FH NH FM NM
- 85 Federal Register 54263 (September 1, 2020), pp 54263-54271., "41 CFR 201" https://www.federalregister.gov/d/2020-18939
- Boyens JM, Paulsen C, Bartol N, Shankles S, Moorthy R (2012) Notional Supply Chain Risk Management Practices for Federal Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7622., "IR 7622" https://doi.org/10.6028/NIST.IR.7622
- Boyens JM, Paulsen C, Moorthy R, Bartol N (2015) Supply Chain Risk Management Practices for Federal Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-161., "SP 800-161" https://doi.org/10.6028/NIST.SP.800-161
- Executive Order 13873, , May 2019., "EO 13873" https://www.whitehouse.gov/presidential-actions/ex
- International Organization for Standardization/International Electrotechnical Commission 20243-1:2018, , February 2018., "ISO 20243" https://www.iso.org/standard/74399.html
- International Organization for Standardization/International Electrotechnical Commission 27036-1:2014, , April 2014., "ISO 27036" https://www.iso.org/standard/59648.html
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- National Institute of Standards and Technology (2013) Digital Signature Standard (DSS). (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 186-4., "FIPS 186-4" https://doi.org/10.6028/NIST.FIPS.186-4
- National Institute of Standards and Technology (2015) Secure Hash Standard (SHS). (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 180-4., "FIPS 180-4" https://doi.org/10.6028/NIST.FIPS.180-4
- National Institute of Standards and Technology (2015) SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 202., "FIPS 202" https://doi.org/10.6028/NIST.FIPS.202
- National Institute of Standards and Technology (2019) Security Requirements for Cryptographic Modules. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 140-3. , "FIPS 140-3" https://doi.org/10.6028/NIST.FIPS.140-3
- Paulsen C, Winkler K, Boyens JM, Ng J, Gimbi J (2020) Impact Analysis Tool for Interdependent Cyber Supply Chain Risks. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8272., "IR 8272" https://doi.org/10.6028/NIST.IR.8272
- Secure Technology Act [includes Federal Acquisition Supply Chain Security Act] (P.L. 115-390), December 2018., "FASC18" https://www.congress.gov/bill/115th-congress/senat
- SR-6(1) - Testing And Analysis
- Employ [Selection (one or more): organizational analysis; independent third-party analysis; organizational testing; independent third-party testing] of the following supply chain elements, processes, and actors associated with the system, system component, or system service: [Assignment: organization-defined supply chain elements, processes, and actors].
- RMF Control
- SR-7
- Subject Area
- SUPPLY CHAIN RISK MANAGEMENT
- Baselines
- CC
- SC-38 - Operations Security
- Boyens JM, Paulsen C, Bartol N, Shankles S, Moorthy R (2012) Notional Supply Chain Risk Management Practices for Federal Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7622., "IR 7622" https://doi.org/10.6028/NIST.IR.7622
- Boyens JM, Paulsen C, Moorthy R, Bartol N (2015) Supply Chain Risk Management Practices for Federal Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-161., "SP 800-161" https://doi.org/10.6028/NIST.SP.800-161
- Executive Order 13873, , May 2019., "EO 13873" https://www.whitehouse.gov/presidential-actions/ex
- International Organization for Standardization/International Electrotechnical Commission 27036-1:2014, , April 2014., "ISO 27036" https://www.iso.org/standard/59648.html
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- RMF Control
- SR-8
- Subject Area
- SUPPLY CHAIN RISK MANAGEMENT
- Baselines
- FS FH NH FM FL NL NM
- 85 Federal Register 54263 (September 1, 2020), pp 54263-54271., "41 CFR 201" https://www.federalregister.gov/d/2020-18939
- Boyens JM, Paulsen C, Bartol N, Shankles S, Moorthy R (2012) Notional Supply Chain Risk Management Practices for Federal Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7622., "IR 7622" https://doi.org/10.6028/NIST.IR.7622
- Boyens JM, Paulsen C, Moorthy R, Bartol N (2015) Supply Chain Risk Management Practices for Federal Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-161., "SP 800-161" https://doi.org/10.6028/NIST.SP.800-161
- Executive Order 13873, , May 2019., "EO 13873" https://www.whitehouse.gov/presidential-actions/ex
- International Organization for Standardization/International Electrotechnical Commission 27036-1:2014, , April 2014., "ISO 27036" https://www.iso.org/standard/59648.html
- Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1., "SP 800-30" https://doi.org/10.6028/NIST.SP.800-30r1
- Secure Technology Act [includes Federal Acquisition Supply Chain Security Act] (P.L. 115-390), December 2018., "FASC18" https://www.congress.gov/bill/115th-congress/senat
- RMF Control
- SR-9
- Subject Area
- SUPPLY CHAIN RISK MANAGEMENT
- Baselines
- FH NH
- PE-3 - Physical Access Control
- PM-30 - Supply Chain Risk Management Strategy
- SA-15 - Development Process, Standards, And Tools
- SI-4 - System Monitoring
- SI-7 - Software, Firmware, And Information Integrity
- SR-3 - Supply Chain Controls And Processes
- SR-4 - Provenance
- SR-5 - Acquisition Strategies, Tools, And Methods
- SR-10 - Inspection Of Systems Or Components
- SR-11 - Component Authenticity
- International Organization for Standardization/International Electrotechnical Commission 20243-1:2018, , February 2018., "ISO 20243" https://www.iso.org/standard/74399.html
- SR-9(1) - Multiple Stages Of System Development Life Cycle
- Employ anti-tamper technologies, tools, and techniques throughout the system development life cycle.
- RMF Control
- SR-10
- Subject Area
- SUPPLY CHAIN RISK MANAGEMENT
- Baselines
- FS FH NH FM FL NL NM
- AT-3 - Role-Based Training
- PM-30 - Supply Chain Risk Management Strategy
- SI-4 - System Monitoring
- SI-7 - Software, Firmware, And Information Integrity
- SR-3 - Supply Chain Controls And Processes
- SR-4 - Provenance
- SR-5 - Acquisition Strategies, Tools, And Methods
- SR-9 - Tamper Resistance And Detection
- SR-11 - Component Authenticity
- International Organization for Standardization/International Electrotechnical Commission 20243-1:2018, , February 2018., "ISO 20243" https://www.iso.org/standard/74399.html
- RMF Control
- SR-11
- Subject Area
- SUPPLY CHAIN RISK MANAGEMENT
- Baselines
- FS FH CX NH FM FL NL NM
- SR-11a.
- Develop and implement anti-counterfeit policy and procedures that include the means to detect and prevent counterfeit components from entering the system; and
- SR-11b.
- Report counterfeit system components to [Selection (one or more): source of counterfeit component; [Assignment: organization-defined external reporting organizations]; [Assignment: organization-defined personnel or roles]].
- International Organization for Standardization/International Electrotechnical Commission 20243-1:2018, , February 2018., "ISO 20243" https://www.iso.org/standard/74399.html
- SR-11(1) - Anti-Counterfeit Training
- Train [Assignment: organization-defined personnel or roles] to detect counterfeit system components (including hardware, software, and firmware).
- SR-11(2) - Configuration Control For Component Service And Repair
- Maintain configuration control over the following system components awaiting service or repair and serviced or repaired components awaiting return to service: [Assignment: organization-defined system components].
- SR-11(3) - Anti-Counterfeit Scanning
- Scan for counterfeit system components [Assignment: organization-defined frequency].
- RMF Control
- SR-12
- Subject Area
- SUPPLY CHAIN RISK MANAGEMENT
- Baselines
- FS FH NH FM CC FL NL NM
- MP-6 - Media Sanitization