A Draft List of Software Assurance (SwA) Related NIST SP Revision 4 Controls*

Size: px
Start display at page:

Download "A Draft List of Software Assurance (SwA) Related NIST SP 800-53 Revision 4 Controls*"

Transcription

1 !!!!!!!!!!!!! A Draft List of Software Assurance (SwA) Related NIST SP Revision 4 Controls* Technical Report: UNO-TGRS Robin Gandhi, Harvey Siy, Sayonnha Mandal The University of Nebraska at Omaha Keesha Crosby Tri-Guard Risk Solutions, LTD. * This research is partially funded by DHS Science and Technology Directorate, Software Assurance program. RESTRICTED USE For review only, do not distribute without expressed written consent from the authors for any other purpose.

2 ! EXECUTIVE SUMMARY The objective of the effort documented in this report was to develop a draft list of NIST SP Rev 4 controls applicable to Software Assurance (SwA). In this report we summarize the method used to determine relevance of security controls for software assurance; observations and findings upon applying our method to NIST SP Rev 4 security control catalog; metrics computed to understand the breath and depth of software assurance concerns that cross-cut security control families in NIST SP Rev 4; and an enumeration of critical issues to address. Here are some of the key findings: 1. Relevance for software assurance can be seen through out security control families in NIST SP Rev 4. However, most security controls require expert interpretation to extract such relevance. 2. The control families in NIST SP Rev 4 that have an emphasis on controls for software developers, development processes, or supply-chain do not have detailed guidance about what common software weaknesses should be considered to satisfy or undermine compliance with a control. 3. Many widely accepted best practices to improve secure coding practices such as static and dynamic code analysis, threat modeling, code reviews, penetration testing of software, attack surface review, etc. are included in the control catalog as supplemental guidance or enhancements, but are not assigned to any baseline (low, mod, high). These practices are categorized as assurance controls. It may become very easy for a software developer or organization to tailor them out. 4. To maintain broad applicability NIST SP Rev 4 security controls are often specified independent of specific technologies and platforms. As a result, the controls naturally align well with abstract Class and Base software weaknesses in the Common Weakness Enumeration (CWE). Thus, relationships among CWEs such as parent, child and other non-taxonomic relationships will need to be used to determine relevance for specific technologies and platforms being acquired or certified, putting additional burden in the C&A process. 5. Community consensus and awareness on what qualifies as a software assurance related control and what criteria to use to generate CWE mappings will be key to the continued success of this effort. We expect to use our draft results to solicit feedback from relevant stakeholders such as NIST-FISMA implementation team and the MITRE CWE team. RESTRICTED USE For review only, do not distribute without expressed written consent from the authors for any other purpose.

3 ! REPORT ATTENTION: The findings in this report are preliminary in nature and should be considered in draft form only. The list of relevant software assurance controls is subject to change as the project continues and we receive feedback from relevant stakeholders. An Engagement to Look Forward to: Security Requirements and Software Weaknesses 1. Introduction Certification and Accreditation (C&A) activities are often the biggest driver of security efforts in enterprises of all sizes. Risks from software vulnerabilities are now a significant consideration during C&A activities. Unfortunately, the large collection of software weaknesses is not readily understood in the context of standard C&A security control baselines. The long-term objective of our team is to bridge the gap between C&A security controls and software weaknesses, such that the risks can be understood and effectively addressed. The objective of the effort documented in this report was to develop a draft list of NIST SP Rev 4 controls applicable to Software Assurance (SwA). The rest of the report is structured as follows. In the following method section we elaborate on the development of selection criteria for establishing security control relevance to software assurance and the process followed to review security controls. Next we present our findings and observations, including metrics related to the selection activities. We finally conclude with our plans for the next phase and issues to be addressed, followed by the detailed list of security controls in Appendix A. 2. Method What is Software Assurance? Many government agencies (e.g. NASA, CNSS, DHS, etc.), focus groups (e.g. SAFECode, BSIMM, etc.) as well as many academicians have put forth different definitions/criteria, which address different aspects of software assurance. To gain wide acceptance and community consensus it is important to adopt a definition of Software Assurance (SwA) that is universally accepted. Thus, we have adopted a recent definition that was developed through discussion among several stakeholders in the SwA community and the one that became the basis for the Masters in Software Assurance curriculum project by CERT [1]. The definition is as follows: Software Assurance is the application of technologies and processes to achieve a required level of confidence* that software systems and services function in the intended manner, are free from accidental or intentional vulnerabilities, provide security capabilities appropriate to the threat environment, and recover from intrusions and failures. [1] RESTRICTED USE For review only, do not distribute without expressed written consent from the authors for any other purpose.

4 ! * In this definition, the word confidence implies that there is a basis for the belief that software systems and services function in the intended manner. This was suggested by one of the authors of this report to the MS in SwA team during the curriculum review period to avoid the circular definition problem that the words Assurance and Confidence create. Selection Method In this project, we have used the above definition to establish the selection criteria for security and privacy controls from the NIST SP Rev 4 catalog that are relevant to software assurance. In particular, we identified controls that required the application of technology (T), process (P) or process and technology combined (P+T) to achieve a required level of confidence that software systems and services function in the intended manner, are free from accidental or intentional vulnerabilities, provide security capabilities appropriate to the threat environment, and recover from intrusions and failures. Controls that were found to be not applicable to software assurance were marked with a (N), whereas withdrawn controls were marked as (W) Security controls in all of the 26 families, including privacy families, in Appendix F and J of the NIST SP Rev 4 document were reviewed independently by each project member (total 4 team members) to assign the following categories: P, T, P+T, N or W. Finally, in a group session, each control with divergent categorizations were discussed extensively to reach consensus in a combined categorization, which is reported here. During the individual and group discussions, each team member adhered to the following criteria to determine relevance of a security control to software assurance: Control applicable to a software developer or development process Control applicable to implementation of software artifacts (requirements, design, source code, testing, documentation, build environments, etc.) Control applicable to software lifecycle Control applicable to policies to be enforced by software Control refers to software weaknesses to be avoided Controls that would fail due to a software weakness Control applicable to software configuration and maintenance Control applicable to accidental or intentional vulnerabilities in software Control applicable to security capabilities to be provided by software in a threat environment Control applicable to software recovery from intrusions and failures RESTRICTED USE For review only, do not distribute without expressed written consent from the authors for any other purpose.

5 ! A control with relevance to any of the above criteria was then placed into an appropriate category (P, T, P+T). If a control does not pertain to the above criteria, or is related to infrastructure or network controls then the control is categorized as not applicable (N). Controls that were already marked withdrawn in the NIST SP Rev 4 catalog were categorized as (W) 3. Observations and Findings The tables in Section 4 summarize key metrics for the outcomes of the selection controls relevant to software assurance. In this section, we first discuss the findings that are interesting for the software assurance community. The SwA relevant controls mostly come from Access Control (AC), Security Assessment and Authorization (CA), Configuration Management (CM), Identification and Authentication (IA), Maintenance (MA), Risk Assessment (RI), System and Services Acquisition (SA), System and Communications Protection (SC), and System and Information Integrity (SI). Most controls under Contingency Planning (CP) were considered not applicable because they specify manual recovery operations. All controls in Incident Response (IR) were also not applicable for similar reasons. Similarly, half or more of the controls under Planning (PL) and Program Management (PM) were also not applicable because they specify manual user operations or documentation procedures. All controls in Media Protection (MP), Physical and Environmental Protection (PE) and Personnel Security (PS) were not applicable because they specify steps and operations to physically or manually secure sensitive resources, rather than the internal characteristics of software and services. Most privacy-related controls, e.g., Accountability, Audit, and Risk Management (AR), Individual Participation and Redress (IP), Security (SE), Transparency (TR) and Use Limitation (UL), were also not applicable for similar reasons. While System and Communications Protection (SC) and System and Information Integrity (SI) controls are mostly relevant, nearly a third of the controls were not applicable because they specify security for the network infrastructure (e.g., border protection devices, firewalls, routers, honeypots, wireless devices, etc.). While these are important to system security, protection from network attacks on the software components are already covered elsewhere. We finally note that, many of the System and Services Acquisition (SA) family controls are related to software developers, development processes and practices. While nearly all controls under SA are relevant to software assurance, these controls do not explicitly mention relevant software weaknesses. All of these practices should be using common software weakness enumerations (CWEs) to guide development, acquisition and certification efforts. In future phases, we expect such controls to be mapped to a prioritized list of common software weaknesses for the system and organizational environment under consideration. RESTRICTED USE For review only, do not distribute without expressed written consent from the authors for any other purpose.

6 ! 4. Metrics In this section we report metrics that help to understand the breath and depth of software assurance coverage in the NIST SP Rev 4 control families. Details on the selected controls that become the basis of these metrics can be found in Appendix A of this report. Control Families Total # of control families (including Privacy families) 26 # of families with some or all controls relevant to SwA 17 # of families with no controls relevant to SwA 9 Controls and Control Enhancements Total # of controls and control enhancements (including Privacy families) 958 Total # of SwA related controls (T or P or P+T) 535 Total # of SwA controls that require application of technology (T) 221 Total # of SwA controls that require application of processes (P) 165 Total # of SwA controls that require application of processes and technology (P+T) 149 Total # of controls Not Applicable to SwA or Withdrawn (N or W) 423 Total # of controls Not Applicable to SwA (N) 343 Total # of controls that have been Withdrawn (W) 80 Control Priorities Total # of SwA related controls with priority P1 (highest priority) 185 Total # of SwA related controls with priority P2 (2 nd highest priority) 29 Total # of SwA related controls with priority P3 (3 rd highest priority) 9 Total # of SwA related controls with priority P0 (control not in any baseline) 53 Total # of SwA related controls with no priority code assigned 259 Control Baselines Total # of SwA related controls in Low baseline 66 Total # of SwA related controls in Moderate Baseline 130 Total # of SwA related controls in High Baseline 165 Total # of SwA related controls NOT in any Baseline 174 RESTRICTED USE For review only, do not distribute without expressed written consent from the authors for any other purpose.

7 ! SwA relevance per Control Family Control Family P/T/P+T N/W Total Access Control (AC) Awareness and Training (AT) Audit and Accountability (AU) Security Assessment and Authorization (CA) Configuration Management (CM) Contingency Planning (CP) Identification and Authentication (IA) Incident Response (IR) Maintenance (MA) Media Protection (MP) Physical and Environmental Protection (PE) Planning (PL) Personnel Security (PS) Risk Assessment (RA) System and Services Acquisition (SA) System and Communications Protection (SC) System and Information Integrity (SI) Program Management (PM) Privacy-Authority and Purpose (AP) Privacy-Accountability, Audit, and Risk Management (AR) Privacy-Data Quality and Integrity (DI) Privacy-Data Minimization and Retention (DM) Privacy-Individual Participation and Redress (IP) Privacy-Security (SE) Privacy-Transparency (TR) Privacy-Use Limitation (UL) Total RESTRICTED USE For review only, do not distribute without expressed written consent from the authors for any other purpose.

8 ! Graph based summary of SwA relevance per Control Family 0" 20" 40" 60" 80" 100" 120" 140" 160" Access"Control"(AC)" Awareness"and"Training"(AT)" Audit"and"Accountability"(AU)" Security"Assessment"and"AuthorizaBon"(CA)" ConfiguraBon"Management"(CM)" ConBngency"Planning"(CP)" IdenBficaBon"and"AuthenBcaBon"(IA)" Incident"Response"(IR)" Maintenance"(MA)" Media"ProtecBon"(MP)" Physical"and"Environmental"ProtecBon"(PE)" Planning"(PL)" Personnel"Security"(PS)" Risk"Assessment"(RA)" P/T/P+T" N/W" System"and"Services"AcquisiBon"(SA)" System"and"CommunicaBons"ProtecBon"(SC)" System"and"InformaBon"Integrity"(SI)" Program"Management"(PM)" Authority"and"Purpose"(AP)" Accountability,"Audit,"and"Risk"Management"(AR)" Data"Quality"and"Integrity"(DI)" Data"MinimizaBon"and"RetenBon"(DM)" Individual"ParBcipaBon"and"Redress"(IP)" Security"(SE)" Transparency"(TR)" Use"LimitaBon"(UL)" RESTRICTED USE For review only, do not distribute without expressed written consent from the authors for any other purpose.

9 ! 5. Discussion of Key Issues and Next Steps Software is a key element in a majority of information system components. Thus, relevance for software assurance can be seen through out security control families in NIST SP Rev 4. However, we have identified several issues, as follows: Most security controls require expert interpretation to extract relevance. The granularity (e.g. firmware, hardware, software, system, environment, organization) at which a control is applicable is also often left for interpretation. The control families that have an emphasis on controls for software developers, development processes, or supply chain do not have detailed guidance about what common software weaknesses should be considered to satisfy or undermine compliance with a control. For example, consider the SA-11 control, its control enhancements and baseline assignment summary: RESTRICTED USE For review only, do not distribute without expressed written consent from the authors for any other purpose.

10 ! It is surprising that such an important software assurance related control is not applicable in the Low baseline and its control enhancements are not assigned to any baseline. While the top level control is selected for Moderate and High baselines, much of the rigor in implementing this control lies within the control enhancements. Lack of explicit inclusion of such fundamental software assurance best practices in the baselines limit the effectiveness of FISMA compliance in procuring secure software. These practices are categorized as assurance controls, but it may become very easy for a software developer or organization to just tailor them out. It is our observation that the NIST SP Rev 4 control catalog has a comprehensive set of requirements to develop or procure secure software, but these control assignments need to be elevated and included explicitly in the Low, Moderate and High baselines. To maintain broad applicability NIST SP Rev 4 security controls are often specified independent of specific technologies and platforms. As a result, the controls naturally align well with abstract Class and Base level software weaknesses in the Common Weakness Enumeration (CWE). Thus, relationships between the CWEs and the related controls relationship between NIST SP Rev 4 controls will be essential to unravel the dependencies that apply for specific technologies and platforms being acquired or certified. Going forward, community consensus and awareness on what qualifies as a software assurance related control and what criteria to use to generate CWE mappings will be key to the continued success of this effort. We expect to use our draft results reported here to solicit feedback from relevant stakeholders such as NIST-FISMA implementation team and the Mitre CWE team. Our planned next steps include a push to refine and finalize the list of NIST SP Rev 4 controls that are relevant to software assurance. This list will then be further categorized by extracting explicit and implicit parts for each control. Explicit parts of a control are those that are directly spelled out in the regulatory baseline that have without a doubt implications for software assurance and do not require any interpretation on part of the stakeholders in the C&A process. Implicit parts, on the other hand, require expert knowledge and additional interpretation to determine applicability to software assurance efforts. Once such categorization is available, the task of mapping the explicit and implicit parts to CWEs will commence. It should be noted that the search process for each CWE and Control mapping would require exploring related CWEs and related controls. 6. References [1] Mead, N., Allen, J., Ardis, M., Hilburn, T., Kornecki, A., Linger, R., & McDonald, J. (2010). Software Assurance Curriculum Project Volume I: Master of Software Assurance Reference Curriculum (CMU/SEI-2010-TR-005). Retrieved November 07, 2013, from the Software Engineering Institute, Carnegie Mellon University website: RESTRICTED USE For review only, do not distribute without expressed written consent from the authors for any other purpose.

11 ! APPENDIX A ATTENTION: The findings in this report are preliminary in nature and should be considered in draft form only. The list of relevant software assurance controls is subject to change as the project continues and we receive feedback from relevant stakeholders. This distribution is limited and review purposes only. Due to the nature of our research, please do not distribute without express written consent from UNO or Tri-Guard Risk Solutions. In this section we have identified NIST SP Rev 4 controls that require the application of technology (T), process (P) or process and technology combined (P+T) to achieve a required level of confidence that software systems and services function in the intended manner, are free from accidental or intentional vulnerabilities, provide security capabilities appropriate to the threat environment, and recover from intrusions and failures. Controls that were found to be not applicable to software assurance were marked with a (N), whereas withdrawn controls were marked as (W) Security controls in all of the 26 families, including privacy families, in Appendix F and J of the NIST SP Rev 4 document were reviewed independently by each project member (total 4 team members) to assign the following categories: P, T, P+T, N or W. Finally, in a group session, each control with divergent categorizations were discussed extensively to reach consensus in a combined categorization, which is reported here. Each control family is reported separately. Each page includes the header shown below. These headings are self explanatory, and are consistent with the summary tables in Appendix D of NIST SP Rev 4 document. CNTL NO. NAME SwA RELATED (P/T/N) PRIO RITY LOW MOD HIGH RESTRICTED USE For review only, do not distribute without expressed written consent from the authors for any other purpose.

12 NAME Access Control (AC) AC-1 Access Control Policy and Procedures P P1 X X X AC-2 Account Management P+T P1 X X X AC-2 (1) ACCOUNT MANAGEMENT AUTOMATED SYSTEM ACCOUNT MANAGEMENT T P1 AC-2 (2) ACCOUNT MANAGEMENT REMOVAL OF TEMPORARY / EMERGENCY ACCOUNTS T P1 AC-2 (3) ACCOUNT MANAGEMENT DISABLE INACTIVE ACCOUNTS T P1 AC-2 (4) ACCOUNT MANAGEMENT AUTOMATED AUDIT ACTIONS T P1 X X X AC-2 (5) ACCOUNT MANAGEMENT INACTIVITY LOGOUT P+T P1 AC-2 (6) ACCOUNT MANAGEMENT DYNAMIC PRIVILEGE MANAGEMENT T P1 AC-2 (7) ACCOUNT MANAGEMENT ROLE-BASED SCHEMES P+T P1 AC-2 (8) ACCOUNT MANAGEMENT DYNAMIC ACCOUNT CREATION T P1 AC-2 (9) ACCOUNT MANAGEMENT RESTRICTIONS ON USE OF SHARED GROUPS / ACCOUNTS P P1 AC-2 (10) ACCOUNT MANAGEMENT SHARED / GROUP ACCOUNT CREDENTIAL TERMINATION T P1 AC-2 (11) ACCOUNT MANAGEMENT USAGE CONDITIONS T P1 AC-2 (12) ACCOUNT MANAGEMENT ACCOUNT MONITORING / ATYPICAL USAGE P+T P1 AC-2 (13) ACCOUNT MANAGEMENT DISABLE ACCOUNTS FOR HIGH-RISK INDIVIDUALS P P1 AC-3 Access Enforcement T P1 AC-3 (1) ACCESS ENFORCEMENT RESTRICTED ACCESS TO PRIVILEGED FUNCTIONS W AC-3 (2) ACCESS ENFORCEMENT DUAL AUTHORIZATION T AC-3 (3) ACCESS ENFORCEMENT MANDATORY ACCESS T AC-3 (4) ACCESS ENFORCEMENT DISCRETIONARY ACCESS T AC-3 (5) ACCESS ENFORCEMENT SECURITY-RELEVANT INFORMATION T P1 AC-3 (6) ACCESS ENFORCEMENT PROTECTION OF USER AND SYSTEM INFORMATION W AC-3 (7) ACCESS ENFORCEMENT ROLE-BASED ACCESS T P1 AC-3 (8) ACCESS ENFORCEMENT REVOCATION OF ACCESS AUTHORIZATIONS T P1 AC-3 (9) ACCESS ENFORCEMENT LED RELEASE T P1 AC-3 (10) ACCESS ENFORCEMENT AUDITED OVERRIDE OF ACCESS MECHANISMS P+T P1 AC-4 Information Flow Enforcement T P1 X X AC-4 (1) INFORMATION FLOW ENFORCEMENT OBJECT SECURITY ATTRIBUTES T P1 AC-4 (2) INFORMATION FLOW ENFORCEMENT PROCESSING DOMAINS T P1 AC-4 (3) INFORMATION FLOW ENFORCEMENT DYNAMIC INFORMATION FLOW T P1 AC-4 (4) INFORMATION FLOW ENFORCEMENT CONTENT CHECK ENCRYPTED INFORMATION T P1 AC-4 (5) INFORMATION FLOW ENFORCEMENT EMBEDDED DATA TYPES T P1 AC-4 (6) INFORMATION FLOW ENFORCEMENT METADATA T P1 AC-4 (7) INFORMATION FLOW ENFORCEMENT ONE-WAY FLOW MECHANISMS N P1 AC-4 (8) INFORMATION FLOW ENFORCEMENT SECURITY POLICY FILTERS T P1 AC-4 (9) INFORMATION FLOW ENFORCEMENT HUMAN REVIEWS P P1 AC-4 (10) INFORMATION FLOW ENFORCEMENT ENABLE / DISABLE SECURITY POLICY FILTERS T P1 AC-4 (11) INFORMATION FLOW ENFORCEMENT CONFIGURATION OF SECURITY POLICY FILTERS T P1 AC-4 (12) INFORMATION FLOW ENFORCEMENT DATA TYPE IDENTIFIERS T P1 AC-4 (13) INFORMATION FLOW ENFORCEMENT DECOMPOSITION INTO POLICY- RELEVANT SUBCOMPONENTS T P1 AC-4 (14) INFORMATION FLOW ENFORCEMENT SECURITY POLICY FILTER CONSTRAINTS T P1 AC-4 (15) INFORMATION FLOW ENFORCEMENT DETECTION OF UNSANCTIONED INFORMATION T P1 AC-4 (16) INFORMATION FLOW ENFORCEMENT INFORMATION TRANSFERS ON INTERCONNECTED SYSTEMS W AC-4 (17) INFORMATION FLOW ENFORCEMENT DOMAIN AUTHENTICATION T P1 AC-4 (18) INFORMATION FLOW ENFORCEMENT SECURITY ATTRIBUTE BINDING T P1 AC-4 (19) INFORMATION FLOW ENFORCEMENT VALIDATION OF METADATA T P1 AC-4 (20) INFORMATION FLOW ENFORCEMENT APPROVED SOLUTIONS P+T P1

13 NAME AC-4 (21) INFORMATION FLOW ENFORCEMENT PHYSICAL / LOGICAL SEPARATION OF INFORMATION FLOWS T P1 AC-4 (22) INFORMATION FLOW ENFORCEMENT ACCESS ONLY T P1 AC-5 Separation of Duties P+T P1 AC-6 Least Privilege P+T P1 AC-6 (1) LEAST PRIVILEGE AUTHORIZE ACCESS TO SECURITY FUNCTIONS P P1 X X AC-6 (2) LEAST PRIVILEGE NON-PRIVILEGED ACCESS FOR NONSECURITY FUNCTIONS P P1 X X AC-6 (3) LEAST PRIVILEGE NETWORK ACCESS TO PRIVILEGED COMMANDS P P1 X AC-6 (4) LEAST PRIVILEGE SEPARATE PROCESSING DOMAINS T P1 AC-6 (5) LEAST PRIVILEGE PRIVILEGED ACCOUNTS P P1 X X AC-6 (6) LEAST PRIVILEGE PRIVILEGED ACCESS BY NON-ORGANIZATIONAL USERS P P1 AC-6 (7) LEAST PRIVILEGE REVIEW OF USER PRIVILEGES P P1 AC-6 (8) LEAST PRIVILEGE PRIVILEGE LEVELS FOR CODE EXECUTION T P1 AC-6 (9) LEAST PRIVILEGE AUDITING USE OF PRIVILEGED FUNCTIONS T P1 X X AC-6 (10) LEAST PRIVILEGE PROHIBIT NON-PRIVILEGED USERS FROM EXECUTING PRIVILEGED FUNCTIONS T P1 X X AC-7 Unsuccessful Logon Attempts T P2 X X X AC-7 (1) UNSUCCESSFUL LOGON ATTEMPTS AUTOMATIC ACCOUNT LOCK W AC-7 (2) UNSUCCESSFUL LOGON ATTEMPTS PURGE / WIPE MOBILE DEVICE T P2 AC-8 System Use Notification T P1 X X X AC-9 Previous Logon (Access) Notification T P0 AC-9 (1) PREVIOUS LOGON NOTIFICATION UNSUCCESSFUL LOGONS T P0 AC-9 (2) PREVIOUS LOGON NOTIFICATION SUCCESSFUL / UNSUCCESSFUL LOGONS T P0 AC-9 (3) PREVIOUS LOGON NOTIFICATION NOTIFICATION OF ACCOUNT CHANGES T P0 AC-9 (4) PREVIOUS LOGON NOTIFICATION ADDITIONAL LOGON INFORMATION T P0 AC-10 Concurrent Session Control T P3 AC-11 Session Lock T P3 X AC-11 (1) SESSION LOCK PATTERN-HIDING DISPLAYS T P3 X X AC-12 Session Termination T P2 X X AC-12 (1) SESSION TERMINATION USER-INITIATED LOGOUTS / MESSAGE DISPLAYS T P2 AC-13 Supervision and Review Access Control W AC-14 Permitted Actions without Identification or Authentication P P3 X X X AC-14 (1) PERMITTED ACTIONS WITHOUT IDENTIFICATION OR AUTHENTICATION NECESSARY USES W AC-15 Automated Marking W AC-16 Security Attributes P+T P0 AC-16 (1) SECURITY ATTRIBUTES DYNAMIC ATTRIBUTE ASSOCIATION T P0 AC-16 (2) SECURITY ATTRIBUTES ATTRIBUTE VALUE CHANGES BY AUTHORIZED INDIVIDUALS T P0 AC-16 (3) SECURITY ATTRIBUTES MAINTENANCE OF ATTRIBUTE ASSOCIATIONS BY INFORMATION SYSTEM T P0 AC-16 (4) SECURITY ATTRIBUTES ASSOCIATION OF ATTRIBUTES BY AUTHORIZED INDIVIDUALS T P0 AC-16 (5) SECURITY ATTRIBUTES ATTRIBUTE DISPLAYS FOR OUTPUT DEVICES T P0 AC-16 (6) SECURITY ATTRIBUTES MAINTENANCE OF ATTRIBUTE ASSOCIATION BY ORGANIZATION N P0 AC-16 (7) SECURITY ATTRIBUTES CONSISTENT ATTRIBUTE INTERPRETATION T P0 AC-16 (8) SECURITY ATTRIBUTES ASSOCIATION TECHNIQUES / TECHNOLOGIES T P0 AC-16 (9) SECURITY ATTRIBUTES ATTRIBUTE REASSIGNMENT P+T P0 AC-16 (10) SECURITY ATTRIBUTES ATTRIBUTE CONFIGURATION BY AUTHORIZED INDIVIDUALS T P0 AC-17 Remote Access P P1 X X X AC-17 (1) REMOTE ACCESS AUTOMATED MONITORING / T P1 X X AC-17 (2) REMOTE ACCESS PROTECTION OF CONFIDENTIALITY / INTEGRITY USING ENCRYPTION T P1 X X AC-17 (3) REMOTE ACCESS MANAGED ACCESS POINTS T P1 X X AC-17 (4) REMOTE ACCESS PRIVILEGED COMMANDS / ACCESS P P1 X X

14 NAME AC-17 (5) REMOTE ACCESS MONITORING FOR UNAUTHORIZED CONNECTIONS W AC-17 (6) REMOTE ACCESS PROTECTION OF INFORMATION N P1 AC-17 (7) REMOTE ACCESS ADDITIONAL PROTECTION FOR SECURITY FUNCTION ACCESS W AC-17 (8) REMOTE ACCESS DISABLE NONSECURE NETWORK PROTOCOLS W AC-17 (9) REMOTE ACCESS DISCONNECT / DISABLE ACCESS P+T P1 AC-18 Wireless Access N X X X AC-18 (1) WIRELESS ACCESS AUTHENTICATION AND ENCRYPTION N X X AC-18 (2) WIRELESS ACCESS MONITORING UNAUTHORIZED CONNECTIONS N AC-18 (3) WIRELESS ACCESS DISABLE WIRELESS NETWORKING N AC-18 (4) WIRELESS ACCESS RESTRICT CONFIGURATIONS BY USERS N X AC-18 (5) WIRELESS ACCESS ANTENNAS / TRANSMISSION POWER LEVELS N X AC-19 Access Control for Mobile Devices N X X X AC-19 (1) ACCESS FOR MOBILE DEVICES USE OF WRITABLE / PORTABLE STORAGE DEVICES N AC-19 (2) ACCESS FOR MOBILE DEVICES USE OF PERSONALLY OWNED PORTABLE STORAGE DEVICES N AC-19 (3) ACCESS FOR MOBILE DEVICES USE OF PORTABLE STORAGE DEVICES WITH NO IDENTIFIABLE OWNER N AC-19 (4) ACCESS FOR MOBILE DEVICES RESTRICTIONS FOR CLASSIFIED INFORMATION N AC-19 (5) ACCESS FOR MOBILE DEVICES FULL DEVICE / CONTAINER- BASED ENCRYPTION N X X AC-20 Use of External Information Systems N P1 X X X AC-20 (1) USE OF EXTERNAL INFORMATION SYSTEMS LIMITS ON AUTHORIZED USE N P1 X X AC-20 (2) USE OF EXTERNAL INFORMATION SYSTEMS PORTABLE STORAGE DEVICES N P1 X X AC-20 (3) USE OF EXTERNAL INFORMATION SYSTEMS NON- ORGANIZATIONALLY OWNED SYSTEMS / COMPONENTS / DEVICES N P1 AC-20 (4) USE OF EXTERNAL INFORMATION SYSTEMS NETWORK ACCESSIBLE STORAGE DEVICES N P1 AC-21 Information Sharing P+T P2 X X AC-21 (1) INFORMATION SHARING AUTOMATED DECISION SUPPORT T P2 AC-21 (2) INFORMATION SHARING INFORMATION SEARCH AND RETRIEVAL T P2 AC-22 Publicly Accessible Content N P3 X X X AC-23 Data Mining Protection T P0 AC-24 Access Control Decisions P+T P0 AC-24 (1) ACCESS DECISIONS TRANSMIT ACCESS AUTHORIZATION INFORMATION T P0 AC-24 (2) ACCESS DECISIONS NO USER OR PROCESS IDENTITY T P0 AC-25 Reference Monitor T P0

15 NAME Awareness and Training (AT) AT-1 Security Awareness and Training Policy and Procedures P P1 X X X AT-2 Security Awareness Training P P1 X X X AT-2 (1) SECURITY AWARENESS PRACTICAL EXERCISES T P1 AT-2 (2) SECURITY AWARENESS INSIDER THREAT T P1 X X AT-3 Role-Based Security Training P P1 X X X AT-3 (1) SECURITY TRAINING ENVIRONMENTAL S N P1 AT-3 (2) SECURITY TRAINING PHYSICAL SECURITY S N P1 AT-3 (3) SECURITY TRAINING PRACTICAL EXERCISES P P1 AT-3 (4) SECURITY TRAINING SUSPICIOUS COMMUNICATIONS AND ANOMALOUS SYSTEM BEHAVIOR N P1 AT-4 Security Training Records N X X AT-5 Contacts with Security Groups and Associations W

16 NAME Audit and Accountability (AU) AU-1 Audit And Accountability Policy and Procedures P P1 x x x AU-2 Audit Events P+T P1 x AU-2 (1) AUDIT EVENTS COMPILATION OF AUDIT RECORDS FROM MULTIPLE SOURCES W AU-2 (2) AUDIT EVENTS SELECTION OF AUDIT EVENTS BY COMPONENT W AU-2 (3) AUDIT EVENTS REVIEWS AND UPDATES N P1 x x AU-2 (4) AUDIT EVENTS PRIVILEGED FUNCTIONS W AU-3 Content of Audit Records P+T P1 x AU-3 (1) CONTENT OF AUDIT RECORDS ADDITIONAL AUDIT INFORMATION P+T P1 x x AU-3 (2) CONTENT OF AUDIT RECORDS CENTRALIZED MANAGEMENT OF PLANNED AUDIT RECORD CONTENT P+T P1 x AU-4 Audit Storage Capacity N P1 x x x AU-4 (1) AUDIT STORAGE CAPACITY TRANSFER TO ALTERNATE STORAGE N AU-5 Response to Audit Processing Failures T P1 x x AU-5 (1) RESPONSE TO AUDIT PROCESSING FAILURES AUDIT STORAGE CAPACITY T P1 x AU-5 (2) RESPONSE TO AUDIT PROCESSING FAILURES REAL-TIME ALERTS T P1 x AU-5 (3) RESPONSE TO AUDIT PROCESSING FAILURES CONFIGURABLE TRAFFIC VOLUME THRESHOLDS T AU-5 (4) RESPONSE TO AUDIT PROCESSING FAILURES SHUTDOWN ON FAILURE T AU-6 Audit Review, Analysis, and Reporting P+T P1 x AU-6 (1) AUDIT REVIEW, ANALYSIS, AND REPORTING PROCESS INTEGRATION N P1 x x AU-6 (2) AUDIT REVIEW, ANALYSIS, AND REPORTING AUTOMATED SECURITY ALERTS N AU-6 (3) AUDIT REVIEW, ANALYSIS, AND REPORTING CORRELATE AUDIT REPOSITORIES N x x AU-6 (4) AUDIT REVIEW, ANALYSIS, AND REPORTING CENTRAL REVIEW AND ANALYSIS P+T AU-6 (5) AUDIT REVIEW, ANALYSIS, AND REPORTING INTEGRATION / SCANNING AND MONITORING CAPABILITIES P+T x AU-6 (6) AUDIT REVIEW, ANALYSIS, AND REPORTING CORRELATION WITH PHYSICAL MONITORING N x AU-6 (7) AUDIT REVIEW, ANALYSIS, AND REPORTING PERMITTED ACTIONS P+T AU-6 (8) AUDIT REVIEW, ANALYSIS, AND REPORTING FULL TEXT ANALYSIS OF PRIVILEGED COMMANDS N AU-6 (9) AUDIT REVIEW, ANALYSIS, AND REPORTING CORRELATION WITH INFORMATION FROM NONTECHNICAL SOURCES N AU-6 (10) AUDIT REVIEW, ANALYSIS, AND REPORTING AUDIT LEVEL ADJUSTMENT N AU-7 Audit Reduction and Report Generation P+T AU-7 (1) AUDIT REDUCTION AND REPORT GENERATION AUTOMATIC PROCESSING P+T P2 x x AU-7 (2) AUDIT REDUCTION AND REPORT GENERATION AUTOMATIC SORT AND SEARCH T AU-8 Time Stamps T P1 x AU-8 (1) TIME STAMPS SYNCHRONIZATION WITH AUTHORITATIVE TIME SOURCE T P1 x x AU-8 (2) TIME STAMPS SECONDARY AUTHORITATIVE TIME SOURCE T AU-9 Protection of Audit Information N P1 x AU-9 (1) PROTECTION OF AUDIT INFORMATION HARDWARE WRITE-ONCE MEDIA N AU-9 (2) PROTECTION OF AUDIT INFORMATION AUDIT BACKUP ON SEPARATE PHYSICAL SYSTEMS / COMPONENTS N P1 x AU-9 (3) PROTECTION OF AUDIT INFORMATION CRYPTOGRAPHIC PROTECTION N P1 x AU-9 (4) PROTECTION OF AUDIT INFORMATION ACCESS BY SUBSET OF PRIVILEGED USERS N P1 x x AU-9 (5) PROTECTION OF AUDIT INFORMATION DUAL AUTHORIZATION N AU-9 (6) PROTECTION OF AUDIT INFORMATION READ ONLY ACCESS N AU-10 Non- Repudiation T P2 X

17 NAME AU-10 (1) NON-REPUDIATION ASSOCIATION OF IDENTITIES T AU-10 (2) NON-REPUDIATION VALIDATE BINDING OF INFORMATION PRODUCER IDENTITY T AU-10 (3) NON-REPUDIATION CHAIN OF CUSTODY P+T AU-10 (4) NON-REPUDIATION VALIDATE BINDING OF INFORMATION REVIEWER IDENTITY T AU-10 (5) NON-REPUDIATION DIGITAL SIGNATURES W AU-11 Audit Record Retention N AU-11 (1) AUDIT RECORD RETENTION LONG-TERM RETRIEVAL CAPABILITY N AU-12 Audit Generation T AU-12 (1) AUDIT GENERATION SYSTEM-WIDE / TIME-CORRELATED AUDIT TRAIL T AU-12 (2) AUDIT GENERATION STANDARDIZED FORMATS T AU-12 (3) AUDIT GENERATION CHANGES BY AUTHORIZED INDIVIDUALS P+T AU-13 Monitoring for Information Disclosure N AU-13 (1) MONITORING FOR INFORMATION DISCLOSURE USE OF AUTOMATED TOOLS N AU-13 (2) MONITORING FOR INFORMATION DISCLOSURE REVIEW OF MONITORED SITES N AU-14 Session Audit T AU-14 (1) SESSION AUDIT SYSTEM START-UP T AU-14 (2) SESSION AUDIT CAPTURE/RECORD AND LOG CONTENT T AU-14 (3) SESSION AUDIT REMOTE VIEWING / LISTENING T AU-15 Alternate Audit Capability N AU-16 Cross- Organizational Auditing N AU-16 (1) CROSS-ORGANIZATIONAL AUDITING IDENTITY PRESERVATION N AU-16 (2) CROSS-ORGANIZATIONAL AUDITING SHARING OF AUDIT INFORMATION N

18 NAME Security Assessment and Authorization (CA) CA-1 Security Assessment and Authorization Policy and Procedures P P1 x x x CA-2 Security Assessments P+T P2 x CA-2 (1) SECURITY ASSESSMENTS INDEPENDENT ASSESSORS P+T x CA-2 (2) SECURITY ASSESSMENTS SPECIALIZED ASSESSMENTS P+T x x CA-2 (3) SECURITY ASSESSMENTS EXTERNAL ORGANIZATIONS P+T CA-3 System Interconnections N P2 x CA-3 (1) SYSTEM INTERCONNECTIONS UNCLASSIFIED NATIONAL SECURITY SYSTEM CONNECTIONS N CA-3 (2) SYSTEM INTERCONNECTIONS CLASSIFIED NATIONAL SECURITY SYSTEM CONNECTIONS N CA-3 (3) SYSTEM INTERCONNECTIONS UNCLASSIFIED NON-NATIONAL SECURITY SYSTEM CONNECTIONS N CA-3 (4) SYSTEM INTERCONNECTIONS CONNECTIONS TO PUBLIC NETWORKS N CA-3 (5) SYSTEM INTERCONNECTIONS RESTRICTIONS ON EXTERNAL SYSTEM CONNECTIONS N x x CA-4 Security Certification W CA-5 Plan of Action and Milestones P P3 x x x CA-5 (1) PLAN OF ACTION AND MILESTONES AUTOMATION SUPPORT FOR ACCURACY / CURRENCY T CA-6 Security Authorization N P2 x x x CA-7 Continuous Monitoring P+T P2 x CA-7 (1) CONTINUOUS MONITORING INDEPENDENT ASSESSMENT P+T x x CA-7 (2) CONTINUOUS MONITORING TYPES OF ASSESSMENTS P+T CA-7 (3) CONTINUOUS MONITORING TREND ANALYSES N CA-8 Penetration Testing P+T P2 x CA-8 (1) PENETRATION TESTING INDEPENDENT PENETRATION AGENT OR TEAM P+T CA-8 (2) PENETRATION TESTING RED TEAM EXERCISES P+T CA-9 Internal System Connections N P2 x x x CA-9 (1) INTERNAL SYSTEM CONNECTIONS SECURITY COMPLIANCE CHECKS N

19 NAME Configuration Mangement (CM) CM-1 Configuration Management Policy and Procedures P P1 X X X CM-2 Baseline Configuration P+T P1 X X X CM-2 (1) BASELINE CONFIGURATION REVIEWS AND UPDATES P P1 X X CM-2 (2) BASELINE CONFIGURATION AUTOMATION SUPPORT FOR ACCURACY / CURRENCY T P1 X CM-2 (3) BASELINE CONFIGURATION RETENTION OF PREVIOUS CONFIGURATIONS P+T P1 X X CM-2 (4) BASELINE CONFIGURATION UNAUTHORIZED SOFTWARE W CM-2 (5) BASELINE CONFIGURATION AUTHORIZED SOFTWARE W CM-2 (6) BASELINE CONFIGURATION DEVELOPMENT AND TEST ENVIRONMENTS P+T CM-2 (7) BASELINE CONFIGURATION CONFIGURE SYSTEMS, COMPONENTS,OR DEVICES FOR HIGH-RISK AREAS N P1 X X CM-3 Configuration Change Control P P1 X X CM-3 (1) CONFIGURATION CHANGE AUTOMATED DOCUMENT/NOTIFICATION / PROHIBITION OF CHANGES P+T P1 X CM-3 (2) CONFIGURATION CHANGE TEST / VALIDATE / DOCUMENT CHANGE P P1 X X CM-3 (3) CONFIGURATION CHANGE AUTOMATED CHANGE IMPLEMENTATION P+T CM-3 (4) CONFIGURATION CHANGE SECURITY REPRESENTATIVE N CM-3 (5) CONFIGURATION CHANGE AUTOMATED SECURITY RESPONSE T CM-3 (6) CONFIGURATION CHANGE CRYPTOGRAPHY MANAGEMENT T CM-4 Security Impact Analysis P+T P2 X X X CM-4 (1) SECURITY IMPACT ANALYSIS SEPARATE TEST ENVIRONMENTS P+T P2 X CM-4 (2) SECURITY IMPACT ANALYSIS VERIFICATION OF SECURITY FUNCTIONS P+T CM-5 Access Restrictions for Change P+T P1 X X CM-5 (1) ACCESS RESTRICTIONS FOR CHANGE AUTOMATED ACCESS ENFORCEMENT / AUDITING T P1 X CM-5 (2) ACCESS RESTRICTIONS FOR CHANGE REVIEW SYSTEM CHANGES P P1 X CM-5 (3) ACCESS RESTRICTIONS FOR CHANGE SIGNED COMPONENTS T P1 X CM-5 (4) ACCESS RESTRICTIONS FOR CHANGE DUAL AUTHORIZATION P+T CM-5 (5) ACCESS RESTRICTIONS FOR CHANGE LIMIT PRODUCTION / OPERATIONAL PRIVILEGES P+T CM-5 (6) ACCESS RESTRICTIONS FOR CHANGE LIMIT LIBRARY PRIVILEGES P+T CM-5 (7) ACCESS RESTRICTIONS FOR CHANGE AUTOMATIC IMPLEMENTATION OF SECURITY SAFEGUARDS W CM-6 Configuration Settings P+T P1 X X X CM-6 (1) CONFIGURATION SETTINGS AUTOMATED CENTRAL MANAGEMENT / APPLICATION / VERIFICATION T P1 X CM-6 (2 CONFIGURATION SETTINGS RESPOND TO UNAUTHORIZED CHANGES P P1 X CM-6 (3) CONFIGURATION SETTINGS UNAUTHORIZED CHANGE DETECTION W CM-6 (4) CONFIGURATION SETTINGS CONFORMANCE DEMONSTRATION W CM-7 Least Functionality P+T P1 X X X CM-7 (1) LEAST FUNCTIONALITY PERIODIC REVIEW P P1 X X CM-7 (2) LEAST FUNCTIONALITY PREVENT PROGRAM EXECUTION T P1 X X CM-7 (3) LEAST FUNCTIONALITY REGISTRATION COMPLIANCE P P1 CM-7 (4) LEAST FUNCTIONALITY UNAUTHORIZED SOFTWARE / BLACKLISTING T P1 X CM-7 (5) LEAST FUNCTIONALITY AUTHORIZED SOFTWARE / WHITELISTING T P1 X CM-8 Information System Component Inventory P+T P1 X X X CM-8 (1) INFORMATION SYSTEM COMPONENT INVENTORY UPDATES DURING INSTALLATIONS / REMOVALS P P1 X X CM-8 (2) INFORMATION SYSTEM COMPONENT INVENTORY AUTOMATED MAINTENANCE T P1 X

20 NAME CM-8 (3) INFORMATION SYSTEM COMPONENT INVENTORY AUTOMATED UNAUTHORIZED COMPONENT DETECTION T P1 X X CM-8 (4) INFORMATION SYSTEM COMPONENT INVENTORY ACCOUNTABILITY INFORMATION P+T P1 X CM-8 (5) INFORMATION SYSTEM COMPONENT INVENTORY NO DUPLICATE ACCOUNTING OF COMPONENTS P+T P1 X X CM-8 (6) INFORMATION SYSTEM COMPONENT INVENTORY ASSESSED CONFIGURATIONS / APPROVED DEVIATIONS P+T CM-8 (7) INFORMATION SYSTEM COMPONENT INVENTORY CENTRALIZED REPOSITORY P+T CM-8 (8) INFORMATION SYSTEM COMPONENT INVENTORY AUTOMATED LOCATION TRACKING T CM-8 (9) INFORMATION SYSTEM COMPONENT INVENTORY ASSIGNMENT OF COMPONENTS TO SYSTEMS P CM-9 Configuration Management Plan P X X CM-9 (1) CONFIGURATION MANAGEMENT PLAN ASSIGNMENT OF RESPONSIBILITY P CM-10 Software Usage Restrictions P X X X CM-10 (1) SOFTWARE USAGE RESTRICTIONS OPEN SOURCE SOFTWARE P CM-11 User-Installed Software P+T X X X CM-11 (1) USER-INSTALLED SOFTWARE ALERTS FOR UNAUTHORIZED INSTALLATIONS T CM-11 (2) USER-INSTALLED SOFTWARE PROHIBIT INSTALLATION WITHOUT PRIVILEGED STATUS T

21 NAME Contingency Planning (CP) CP-1 Contingency Planning Policy and Procedures N P1 x x x CP-2 Contingency Plan N P1 x CP-2 (1) CONTINGENCY PLAN COORDINATE WITH RELATED PLANS N x x CP-2 (2) CONTINGENCY PLAN CAPACITY PLANNING N x CP-2 (3) CONTINGENCY PLAN RESUME ESSENTIAL MISSIONS / BUSINESS FUNCTIONS N x x CP-2 (4) CONTINGENCY PLAN RESUME ALL MISSIONS / BUSINESS FUNCTIONS N x CP-2 (5) CONTINGENCY PLAN CONTINUE ESSENTIAL MISSIONS / BUSINESS FUNCTIONS N x CP-2 (6) CONTINGENCY PLAN ALTERNATE PROCESSING / STORAGE SITE N CP-2 (7) CONTINGENCY PLAN COORDINATE WITH EXTERNAL SERVICE PROVIDERS N CP-2 (8) CONTINGENCY PLAN IDENTIFY CRITICAL ASSETS N x x CP-3 Contingency Training N P2 x x CP-3 (1) CONTINGENCY TRAINING SIMULATED EVENTS N x CP-3 (2) CONTINGENCY TRAINING AUTOMATED TRAINING ENVIRONMENTS N CP-4 Contingency Plan Testing N P2 x CP-4 (1) CONTINGENCY PLAN TESTING COORDINATE WITH RELATED PLANS N x x CP-4 (2) CONTINGENCY PLAN TESTING ALTERNATE PROCESSING SITE N x CP-4 (3) CONTINGENCY PLAN TESTING AUTOMATED TESTING N CP-4 (4) CONTINGENCY PLAN TESTING FULL RECOVERY / RECONSTITUTION N CP-5 Contingency Plan Update W CP-6 Alternate Storage Site N P1 CP-6 (1) ALTERNATE STORAGE SITE SEPARATION FROM PRIMARY SITE N x x CP-6 (2) ALTERNATE STORAGE SITE RECOVERY TIME / POINT OBJECTIVES N x CP-6 (3) ALTERNATE STORAGE SITE ACCESSIBILITY N x x CP-7 Alternate Processing Site N P1 CP-7 (1) ALTERNATE PROCESSING SITE SEPARATION FROM PRIMARY SITE N x x CP-7 (2) ALTERNATE PROCESSING SITE ACCESSIBILITY N x x CP-7 (3) ALTERNATE PROCESSING SITE PRIORITY OF SERVICE N x x CP-7 (4) ALTERNATE PROCESSING SITE PREPARATION FOR USE N x CP-7 (5) ALTERNATE PROCESSING SITE EQUIVALENT INFORMATION SECURITY SAFEGUARDS W CP-7 (6) ALTERNATE PROCESSING SITE INABILITY TO RETURN TO PRIMARY SITE N CP-8 Telecommunications Services N P1 CP-8 (1) TELECOMMUNICATIONS SERVICES PRIORITY OF SERVICE PROVISIONS N x x CP-8 (2) TELECOMMUNICATIONS SERVICES SINGLE POINTS OF FAILURE N x x CP-8 (3) TELECOMMUNICATIONS SERVICES SEPARATION OF PRIMARY / ALTERNATE PROVIDERS N x CP-8 (4) TELECOMMUNICATIONS SERVICES PROVIDER CONTINGENCY PLAN N x CP-8 (5) TELECOMMUNICATIONS SERVICES ALTERNATE TELECOMMUNICATION SERVICE TESTING N CP-9 Information System Backup P+T P1 x CP-9 (1) INFORMATION SYSTEM BACKUP TESTING FOR RELIABILITY / INTEGRITY P x x CP-9 (2) INFORMATION SYSTEM BACKUP TEST RESTORATION USING SAMPLING P x CP-9 (3) INFORMATION SYSTEM BACKUP SEPARATE STORAGE FOR CRITICAL INFORMATION P x CP-9 (4) INFORMATION SYSTEM BACKUP PROTECTION FROM UNAUTHORIZED MODIFICATION W

22 NAME CP-9 (5) INFORMATION SYSTEM BACKUP TRANSFER TO ALTERNATE STORAGE SITE N x CP-9 (6) INFORMATION SYSTEM BACKUP REDUNDANT SECONDARY SYSTEM N CP-9 (7) INFORMATION SYSTEM BACKUP DUAL AUTHORIZATION P+T CP-10 Information System Recovery and Reconstitution P+T P1 x CP-10 (1) INFORMATION SYSTEM RECOVERY AND RECONSTITUTION CONTINGENCY PLAN TESTING W CP-10 (2) INFORMATION SYSTEM RECOVERY AND RECONSTITUTION TRANSACTION RECOVERY N X X CP-10 (3) INFORMATION SYSTEM RECOVERY AND RECONSTITUTION COMPENSATING SECURITY S W CP-10 (4) INFORMATION SYSTEM RECOVERY AND RECONSTITUTION RESTORE WITHIN TIME PERIOD N X CP-10 (5) INFORMATION SYSTEM RECOVERY AND RECONSTITUTION FAILOVER CAPABILITY W CP-10 (6) INFORMATION SYSTEM RECOVERY AND RECONSTITUTION COMPONENT PROTECTION N CP-11 Alternate Communications Protocols T P0 CP-12 Safe Mode N P0 CP-13 Alternative Security Mechanisms N P0

23 NAME IA-1 Identification and Authentication Policy and Procedures P P1 x x x IA-2 Identification and Authentication (Organizational Users) T IA-2 (1) IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS) NETWORK ACCESS TO PRIVILEGED ACCOUNTS T P1 x x x IA-2 (2) IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS) NETWORK ACCESS TO NON-PRIVILEGED ACCOUNTS T P1 x x IA-2 (3) IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS) LOCAL ACCESS TO PRIVILEGED ACCOUNTS T P1 x x IA-2 (4) IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS) LOCAL ACCESS TO NON-PRIVILEGED ACCOUNTS T P1 x IA-2 (5) IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS) GROUP AUTHENTICATION P+T IA-2 (6) IA-2 (7) IA-2 (8) IA-2 (9) Identification and Authentication (IA) IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS) NETWORK ACCESS TO PRIVILEGED ACCOUNTS - SEPARATE TDEVICE IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS) NETWORK ACCESS TO NON-PRIVILEGED ACCOUNTS - SEPARATE T DEVICE IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS) NETWORK ACCESS TO PRIVILEGED ACCOUNTS - REPLAY RESISTANT T P1 x x IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS) NETWORK ACCESS TO NON-PRIVILEGED ACCOUNTS - REPLAY T RESISTANT P1 x IA-2 (10) IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS) SINGLE SIGN-ON T IA-2 (11) IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS) REMOTE ACCESS - SEPARATE DEVICE T P1 x x IA-2 (12) IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS) ACCEPTANCE OF PIV CREDENTIALS T P1 x x x IA-2 (13) IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS) OUT-OF-BAND AUTHENTICATION T IA-3 Device Identification and Authentication T P1 x x IA-3 (1) DEVICE IDENTIFICATION AND AUTHENTICATION CRYPTOGRAPHIC BIDIRECTIONAL AUTHENTICATION T IA-3 (2) DEVICE IDENTIFICATION AND AUTHENTICATION CRYPTOGRAPHIC BIDIRECTIONAL NETWORK AUTHENTICATION W IA-3 (3) DEVICE IDENTIFICATION AND AUTHENTICATION DYNAMIC ADDRESS ALLOCATION T IA-3 (4) DEVICE IDENTIFICATION AND AUTHENTICATION DEVICE ATTESTATION T IA-4 Identifier Management P P1 x x x IA-4 (1) IDENTIFIER MANAGEMENT PROHIBIT ACCOUNT IDENTIFIERS AS PUBLIC IDENTIFIERS P IA-4 (2) IDENTIFIER MANAGEMENT SUPERVISOR AUTHORIZATION P IA-4 (3) IDENTIFIER MANAGEMENT MULTIPLE FORMS OF CERTIFICATION P IA-4 (4) IDENTIFIER MANAGEMENT IDENTIFY USER STATUS P IA-4 (5) IDENTIFIER MANAGEMENT DYNAMIC MANAGEMENT T IA-4 (6) IDENTIFIER MANAGEMENT CROSS-ORGANIZATION MANAGEMENT P IA-4 (7) IDENTIFIER MANAGEMENT IN-PERSON REGISTRATION P IA-5 Authenticator Management P+T IA-5 (1) AUTHENTICATOR MANAGEMENT PASSWORD-BASED AUTHENTICATION T P1 x x x IA-5 (2) AUTHENTICATOR MANAGEMENT PKI-BASED AUTHENTICATION T P1 x x IA-5 (3) AUTHENTICATOR MANAGEMENT IN-PERSON OR TRUSTED THIRD-PARTY REGISTRATION P P1 x x IA-5 (4) AUTHENTICATOR MANAGEMENT AUTOMATED SUPPORT FOR PASSWORD STRENGTH DETERMINATION T IA-5 (5) AUTHENTICATOR MANAGEMENT CHANGE AUTHENTICATORS PRIOR TO DELIVERY P IA-5 (6) AUTHENTICATOR MANAGEMENT PROTECTION OF AUTHENTICATORS P+T IA-5 (7) AUTHENTICATOR MANAGEMENT NO EMBEDDED UNENCRYPTED STATIC AUTHENTICATORS P+T IA-5 (8) AUTHENTICATOR MANAGEMENT MULTIPLE INFORMATION SYSTEM ACCOUNTS P+T IA-5 (9) AUTHENTICATOR MANAGEMENT CROSS-ORGANIZATION CREDENTIAL MANAGEMENT P+T IA-5 (10) AUTHENTICATOR MANAGEMENT DYNAMIC CREDENTIAL ASSOCIATION T IA-5 (11) AUTHENTICATOR MANAGEMENT HARDWARE TOKEN-BASED AUTHENTICATION T P1 x x x IA-5 (12) AUTHENTICATOR MANAGEMENT BIOMETRIC AUTHENTICATION T

24 NAME IA-5 (13) AUTHENTICATOR MANAGEMENT EXPIRATION OF CACHED AUTHENTICATORS T IA-5 (14) AUTHENTICATOR MANAGEMENT MANAGING CONTENT OF PKI TRUST STORES N IA-5 (15) AUTHENTICATOR MANAGEMENT FICAM-APPROVED PRODUCTS AND SERVICES N IA-6 Authenticator Feedback T P2 x x x IA-7 Cryptographic Module Authentication T P1 x x x IA-8 Identification and Authentication (Non-Organizational Users) T IA-8 (1) IDENTIFICATION AND AUTHENTICATION (NON-ORGANIZATIONAL USERS) ACCEPTANCE OF PIV CREDENTIALS FROM OTHER AGENCIES T P1 x x x IA-8 (2) IDENTIFICATION AND AUTHENTICATION (NON-ORGANIZATIONAL USERS) ACCEPTANCE OF THIRD-PARTY CREDENTIALS T P1 x x x IA-8 (3) IDENTIFICATION AND AUTHENTICATION (NON-ORGANIZATIONAL USERS) USE OF FICAM-APPROVED PRODUCTS P+T P1 x x x IA-8 (4) IDENTIFICATION AND AUTHENTICATION (NON-ORGANIZATIONAL USERS) USE OF FICAM-ISSUED PROFILES T P1 x x x IA-8 (5) IDENTIFICATION AND AUTHENTICATION (NON-ORGANIZATIONAL USERS) ACCEPTANCE OF PIV-I CREDENTIALS T IA-9 Service Identification and Authentication T P0 IA-9 (1) SERVICE IDENTIFICATION AND AUTHENTICATION INFORMATION EXCHANGE P+T IA-9 (2) SERVICE IDENTIFICATION AND AUTHENTICATION TRANSMISSION OF DECISIONS P+T IA-10 Adaptive Identification and Authentication P+T P0 IA-11 Re-authentication P+T P0

25 NAME Incident Response (IR) IR-1 Incident Response Policy and Procedures N P1 x x x IR-2 Incident Response Training N P2 x x IR-2 (1) INCIDENT RESPONSE TRAINING SIMULATED EVENTS N x IR-2 (2) INCIDENT RESPONSE TRAINING AUTOMATED TRAINING ENVIRONMENTS N x IR-3 Incident Response Testing N P2 x IR-3 (1) INCIDENT RESPONSE TESTING AUTOMATED TESTING N IR-3 (2) INCIDENT RESPONSE TESTING COORDINATION WITH RELATED PLANS N x x IR-4 Incident Handling N P1 x IR-4 (1) INCIDENT HANDLING AUTOMATED INCIDENT HANDLING PROCESSES N x x IR-4 (2) INCIDENT HANDLING DYNAMIC RECONFIGURATION N IR-4 (3) INCIDENT HANDLING CONTINUITY OF OPERATIONS N IR-4 (4) INCIDENT HANDLING INFORMATION CORRELATION N x IR-4 (5) INCIDENT HANDLING AUTOMATIC DISABLING OF INFORMATION SYSTEM N IR-4 (6) INCIDENT HANDLING INSIDER THREATS - SPECIFIC CAPABILITIES N IR-4 (7) INCIDENT HANDLING INSIDER THREATS - INTRA-ORGANIZATION COORDINATION N IR-4 (8) INCIDENT HANDLING CORRELATION WITH EXTERNAL ORGANIZATIONS N IR-4 (9) INCIDENT HANDLING DYNAMIC RESPONSE CAPABILITY N IR-4 (10) INCIDENT HANDLING SUPPLY CHAIN COORDINATION N IR-5 Incident Monitoring N P1 x x IR-5 (1) INCIDENT MONITORING AUTOMATED TRACKING / DATA COLLECTION / ANALYSIS N x IR-6 Incident Reporting N P1 x IR-6 (1) INCIDENT REPORTING AUTOMATED REPORTING N x x IR-6 (2) INCIDENT REPORTING VULNERABILITIES RELATED TO INCIDENTS N IR-6 (3) INCIDENT REPORTING COORDINATION WITH SUPPLY CHAIN N IR-7 Incident Response Assistance N P2 x IR-7 (1) INCIDENT RESPONSE ASSISTANCE AUTOMATION SUPPORT FOR AVAILABILITY OF INFORMATION / SUPPORT N x x IR-7 (2) INCIDENT RESPONSE ASSISTANCE COORDINATION WITH EXTERNAL PROVIDERS N IR-8 Incident Response Plan N P1 x x x IR-9 Information Spillage Response N P0 IR-9 (1) INFORMATION SPILLAGE RESPONSE RESPONSIBLE PERSONNEL N IR-9 (2) INFORMATION SPILLAGE RESPONSE TRAINING N IR-9 (3) INFORMATION SPILLAGE RESPONSE POST-SPILL OPERATIONS N IR-9 (4) INFORMATION SPILLAGE RESPONSE EXPOSURE TO UNAUTHORIZED PERSONNEL N IR-10 Integrated Information Security Analysis Team N P0

26 NAME Maintenance (MA) MA-1 System Maintenance Policy and Procedures P P1 x x x MA-2 Controlled Maintenance P P2 x x MA-2 (1) LED MAINTENANCE RECORD CONTENT P MA-2 (2) LED MAINTENANCE AUTOMATED MAINTENANCE ACTIVITIES P P2 x MA-3 Maintenance Tools P+T P3 MA-3 (1) MAINTENANCE TOOLS INSPECT TOOLS P P3 x x MA-3 (2) MAINTENANCE TOOLS INSPECT MEDIA P P3 x x MA-3 (3) MAINTENANCE TOOLS PREVENT UNAUTHORIZED REMOVAL P P3 x MA-3 (4) MAINTENANCE TOOLS RESTRICTED TOOL USE P MA-4 Nonlocal Maintenance P+T P2 x MA-4 (1) NONLOCAL MAINTENANCE AUDITING AND REVIEW P MA-4 (2) NONLOCAL MAINTENANCE DOCUMENT NONLOCAL MAINTENANCE P P2 x x MA-4 (3) NONLOCAL MAINTENANCE COMPARABLE SECURITY / SANITIZATION P P2 x MA-4 (4) NONLOCAL MAINTENANCE AUTHENTICATION / SEPARATION OF MAINTENANCE SESSIONS P+T MA-4 (5) NONLOCAL MAINTENANCE APPROVALS AND NOTIFICATIONS P MA-4 (6) NONLOCAL MAINTENANCE CRYPTOGRAPHIC PROTECTION T MA-4 (7) NONLOCAL MAINTENANCE REMOTE DISCONNECT VERIFICATION P+T MA-5 Maintenance Personnel P P2 x x MA-5 (1) MAINTENANCE PERSONNEL INDIVIDUALS WITHOUT APPROPRIATE ACCESS P P2 x MA-5 (2) MAINTENANCE PERSONNEL SECURITY CLEARANCES FOR CLASSIFIED SYSTEMS P MA-5 (3) MAINTENANCE PERSONNEL CITIZENSHIP REQUIREMENTS FOR CLASSIFIED SYSTEMS P MA-5 (4) MAINTENANCE PERSONNEL FOREIGN NATIONALS P MA-5 (5) MAINTENANCE PERSONNEL NONSYSTEM-RELATED MAINTENANCE P MA-6 Timely Maintenance P P2 x x MA-6 (1) TIMELY MAINTENANCE PREVENTIVE MAINTENANCE P MA-6 (2) TIMELY MAINTENANCE PREDICTIVE MAINTENANCE P MA-6 (3) TIMELY MAINTENANCE AUTOMATED SUPPORT FOR PREDICTIVE MAINTENANCE T

COORDINATION DRAFT. FISCAM to NIST Special Publication 800-53 Revision 4. Title / Description (Critical Element)

COORDINATION DRAFT. FISCAM to NIST Special Publication 800-53 Revision 4. Title / Description (Critical Element) FISCAM FISCAM 3.1 Security (SM) Critical Element SM-1: Establish a SM-1.1.1 The security management program is adequately An agency/entitywide security management program has been developed, An agency/entitywide

More information

Security and Privacy Controls for Federal Information Systems and Organizations

Security and Privacy Controls for Federal Information Systems and Organizations NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems JOINT TASK FORCE TRANSFORMATION INITIATIVE This document contains excerpts from NIST Special Publication

More information

NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich

NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems Samuel R. Ashmore Margarita Castillo Barry Gavrich CS589 Information & Risk Management New Mexico Tech Spring 2007

More information

CTR System Report - 2008 FISMA

CTR System Report - 2008 FISMA CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control

More information

Security Control Standards Catalog

Security Control Standards Catalog Security Control Standards Catalog Version 1.2 Texas Department of Information Resources April 3, 2015 Contents About the Security Control Standards Catalog... 1 Document Life Cycle... 1 Revision History...

More information

Security Self-Assessment Tool

Security Self-Assessment Tool Security Self-Assessment Tool State Agencies Receiving FPLS Information, 7/15/2015 Contents Overview... 2 Access Control (AC)... 3 Awareness and Training (AT)... 8 Audit and Accountability (AU)... 10 Security

More information

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &

More information

Looking at the SANS 20 Critical Security Controls

Looking at the SANS 20 Critical Security Controls Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of

More information

Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat

Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat Centers for Disease and Prevention National Center for Chronic Disease Prevention and Health

More information

Security Controls Assessment for Federal Information Systems

Security Controls Assessment for Federal Information Systems Security Controls Assessment for Federal Information Systems Census Software Process Improvement Program September 11, 2008 Kevin Stine Computer Security Division National Institute of Standards and Technology

More information

Get Confidence in Mission Security with IV&V Information Assurance

Get Confidence in Mission Security with IV&V Information Assurance Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving

More information

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal

More information

FISMA NIST 800-53 (Rev 4) Audit and Accountability: Shared Public Cloud Infrastructure Standards

FISMA NIST 800-53 (Rev 4) Audit and Accountability: Shared Public Cloud Infrastructure Standards FISMA NIST 800-53 (Rev 4) Audit and Accountability: Shared Public Cloud Infrastructure Standards Standard Requirement per NIST 800-53 (Rev. 4) CloudCheckr Action AU-3/ AU3(1) AU-3 CONTENT OF AUDIT RECORDS

More information

HHS Information System Security Controls Catalog V 1.0

HHS Information System Security Controls Catalog V 1.0 Information System Security s Catalog V 1.0 Table of Contents DOCUMENT HISTORY... 3 1. Purpose... 4 2. Security s Scope... 4 3. Security s Compliance... 4 4. Security s Catalog Ownership... 4 5. Security

More information

CONTINUOUS MONITORING

CONTINUOUS MONITORING CONTINUOUS MONITORING Monitoring Strategy Part 2 of 3 ABSTRACT This white paper is Part 2 in a three-part series of white papers on the sometimes daunting subject of continuous monitoring (CM) and how

More information

Altius IT Policy Collection Compliance and Standards Matrix

Altius IT Policy Collection Compliance and Standards Matrix Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy

More information

Security Standards Compliance NIST SP 800-53 Release 4 Trend Micro Products (Deep Security and SecureCloud) - Version 1.00

Security Standards Compliance NIST SP 800-53 Release 4 Trend Micro Products (Deep Security and SecureCloud) - Version 1.00 Security Standards Compliance NIST SP 800-53 Release 4 Trend Micro Products (Deep Security and SecureCloud) - Version 1.00 Document TMIC-003-N Version 1.00. 15 August 2012 1 Security and Privacy Controls

More information

5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE

5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-510 GENERAL (Office of Origin: IRM/IA) 5 FAH-11 H-511 INTRODUCTION 5 FAH-11 H-511.1 Purpose a. This subchapter implements the policy

More information

Industrial Security Field Operations

Industrial Security Field Operations Defense Security Service Industrial Security Field Operations NISP Authorization Office (NAO) (Formerly Office of the Designated Approving Authority) NISPOM to NIST (800-53r4) Security Control Mapping

More information

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft sarbari@electrosoft-inc.com 703-437-9451 ext 12 The Foundation

More information

Security Control Standard

Security Control Standard Department of the Interior Security Control Standard Maintenance January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information Officer

More information

DIVISION OF INFORMATION SECURITY (DIS)

DIVISION OF INFORMATION SECURITY (DIS) DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Information Systems Acquisitions, Development, and Maintenance v1.0 October 15, 2013 Revision History Update this table every time a new

More information

Government of Canada Managed Security Services (GCMSS) Appendix D: Security Control Catalogue ITSG-33 - Annex 3 DRAFT 3.1

Government of Canada Managed Security Services (GCMSS) Appendix D: Security Control Catalogue ITSG-33 - Annex 3 DRAFT 3.1 Government of Canada Managed Security Services (GCMSS) Appendix D: Security Control Catalogue ITSG-33 - Annex 3 DRAFT 3.1 Date: June 15, 2012 Information Technology Security Guidance Guide to Managing

More information

IT Security Management Risk Analysis and Controls

IT Security Management Risk Analysis and Controls IT Security Management Risk Analysis and Controls Steven Gordon Document No: Revision 770 3 December 2013 1 Introduction This document summarises several steps of an IT security risk analysis and subsequent

More information

Complying with National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 An Assessment of Cyber-Ark's Solutions

Complying with National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 An Assessment of Cyber-Ark's Solutions Complying with National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 An Assessment of Cyber-Ark's Solutions z September 2011 Table of Contents EXECUTIVE SUMMARY... 3 CYBER-ARK

More information

POSTAL REGULATORY COMMISSION

POSTAL REGULATORY COMMISSION POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1

More information

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance WHITE paper Complying with the Federal Information Security Management Act How Tripwire Change Auditing Solutions Help page 2 page 3 page 3 page 3 page 4 page 4 page 5 page 5 page 6 page 6 page 7 Introduction

More information

Security Standards Compliance CSEC ITSG-33 Trend Micro Products (Deep Security and SecureCloud) - Version 1.0

Security Standards Compliance CSEC ITSG-33 Trend Micro Products (Deep Security and SecureCloud) - Version 1.0 Security Standards Compliance CSEC ITSG-33 Trend Micro Products (Deep Security and SecureCloud) - Version 1.0 Document TMIC-003-C Version 1.0, 24 August 2012 1 Guide to Managing Security Risks from Using

More information

INFORMATION TECHNOLOGY SECURITY POLICY 60-702. Table of Contents

INFORMATION TECHNOLOGY SECURITY POLICY 60-702. Table of Contents Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE INSTRUCTION 60-702 December 21, 2009 Information Technology INFORMATION TECHNOLOGY

More information

WRITTEN INFORMATION SECURITY PROGRAM (WISP) ACME Consulting Services, Inc.

WRITTEN INFORMATION SECURITY PROGRAM (WISP) ACME Consulting Services, Inc. WRITTEN INFORMATION SECURITY PROGRAM (WISP) ACME Consulting Services, Inc. Copyright 2016 Table of Contents WRITTEN INFORMATION SECURITY PROGRAM (WISP) OVERVIEW 10 INTRODUCTION 10 PURPOSE 10 SCOPE & APPLICABILITY

More information

ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT

ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT INTERNATIONAL CIVIL AVIATION ORGANIZATION ASIA AND PACIFIC OFFICE ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT DRAFT Second Edition June 2010 3.4H - 1 TABLE OF CONTENTS 1.

More information

Security Control Standard

Security Control Standard Department of the Interior Security Control Standard Security Assessment and Authorization January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,

More information

Office of Inspector General

Office of Inspector General DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,

More information

Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer

Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer IPSWITCH FILE TRANSFER WHITE PAPER Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer www.ipswitchft.com Adherence to United States government security standards can be complex to plan

More information

System Security Certification and Accreditation (C&A) Framework

System Security Certification and Accreditation (C&A) Framework System Security Certification and Accreditation (C&A) Framework Dave Dickinson, IOAT ISSO Chris Tillison, RPMS ISSO Indian Health Service 5300 Homestead Road, NE Albuquerque, NM 87110 (505) 248-4500 fax:

More information

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016 National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy Version 1.1 February 2, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents TABLE OF CONTENTS I 1 INTRODUCTION

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

VIRGINIA DEPARTMENT OF MOTOR VEHICLES IT SECURITY POLICY. Version 2.

VIRGINIA DEPARTMENT OF MOTOR VEHICLES IT SECURITY POLICY. Version 2. VIRGINIA DEPARTMENT OF MOTOR VEHICLES IT SECURITY POLICY Version 2., 2012 Revision History Version Date Purpose of Revision 2.0 Base Document 2.1 07/23/2012 Draft 1 Given to ISO for Review 2.2 08/15/2012

More information

FISMA / NIST 800-53 REVISION 3 COMPLIANCE

FISMA / NIST 800-53 REVISION 3 COMPLIANCE Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security

More information

CRR-NIST CSF Crosswalk 1

CRR-NIST CSF Crosswalk 1 IDENTIFY (ID) Asset Management (AM): The data, personnel, devices, systems, and facilities that enable the organization to achieve business purposes are identified and managed consistent with their relative

More information

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014 DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014 Revision History Update this table every time a new edition of the document is published Date Authored

More information

Cloud Security for Federal Agencies

Cloud Security for Federal Agencies Experience the commitment ISSUE BRIEF Rev. April 2014 Cloud Security for Federal Agencies This paper helps federal agency executives evaluate security and privacy features when choosing a cloud service

More information

GE Measurement & Control. Cyber Security for NEI 08-09

GE Measurement & Control. Cyber Security for NEI 08-09 GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4

More information

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft sarbari@electrosoft-inc.com 703-437-9451 ext 12 The Foundation

More information

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

Written Information Security Program (WISP)

Written Information Security Program (WISP) Your Logo Will Be Placed Here Written Information Security Program (WISP) ACME Consulting, LLC Copyright 2014 Table of Contents WRITTEN INFORMATION SECURITY PROGRAM (WISP) OVERVIEW 10 INTRODUCTION 10 PURPOSE

More information

Compliance Overview: FISMA / NIST SP800 53

Compliance Overview: FISMA / NIST SP800 53 Compliance Overview: FISMA / NIST SP800 53 FISMA / NIST SP800 53: Compliance Overview With Huntsman SIEM The US Federal Information Security Management Act (FISMA) is now a key element of the US Government

More information

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security

More information

A Taxonomy of Operational Cyber Security Risks

A Taxonomy of Operational Cyber Security Risks A Taxonomy of Operational Cyber Security Risks James J. Cebula Lisa R. Young December 2010 TECHNICAL NOTE CMU/SEI-2010-TN-028 CERT Program Unlimited distribution subject to the copyright. http://www.sei.cmu.edu

More information

Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program

Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Information Technology Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program Report.

More information

Security Control Standard

Security Control Standard Department of the Interior Security Control Standard Risk Assessment January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information

More information

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 financial_nccoe@nist.gov This revision incorporates comments from the public. Page Use case 1 Comments

More information

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07 EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014

More information

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12 Evaluation Report Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review April 30, 2014 Report Number 14-12 U.S. Small Business Administration Office of Inspector General

More information

CMS POLICY FOR THE INFORMATION SECURITY PROGRAM

CMS POLICY FOR THE INFORMATION SECURITY PROGRAM Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS POLICY FOR THE INFORMATION SECURITY PROGRAM FINAL Version 4.0 August 31, 2010 Document Number: CMS-CIO-POL-SEC02-04.0

More information

EPA Classification No.: CIO-2150.3-P-09.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015

EPA Classification No.: CIO-2150.3-P-09.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015 Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM MAINTENANCE PROCEDURES V1.8 JULY 18, 2012 1. PURPOSE The purpose of this procedure

More information

Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)

Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU) Privacy Impact Assessment (PIA) for the Cyber Security Assessment and Management (CSAM) Certification & Accreditation (C&A) Web (SBU) Department of Justice Information Technology Security Staff (ITSS)

More information

Security Language for IT Acquisition Efforts CIO-IT Security-09-48

Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Office of the Senior Agency Information Security Officer VERSION HISTORY/CHANGE RECORD Change Number Person Posting Change Change Reason

More information

Compliance and Industry Regulations

Compliance and Industry Regulations Compliance and Industry Regulations Table of Contents Introduction...1 Executive Summary...1 General Federal Regulations and Oversight Agencies...1 Agency or Industry Specific Regulations...2 Hierarchy

More information

Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples

Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples The

More information

Security Compliance In a Post-ACA World

Security Compliance In a Post-ACA World 1 Security Compliance In a Post-ACA World Security Compliance in a Post-ACA World Discussion of building a security compliance framework as part of an ACA Health Insurance Exchange implementation. Further

More information

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY POLICY Name Of Policy: Security Audit Logging Policy Domain: Security Date Issued: 05/23/11 Date

More information

INFORMATION PROCEDURE

INFORMATION PROCEDURE INFORMATION PROCEDURE Information Security - Identification and Authentication Procedure Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY

More information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Controls What Works. Southside Virginia Community College: Security Awareness Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction

More information

Information Technology Branch Access Control Technical Standard

Information Technology Branch Access Control Technical Standard Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,

More information

NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO-6011-09 TABLE OF CONTENTS

NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO-6011-09 TABLE OF CONTENTS OFFICE OF THE CHIEF INFORMATION OFFICER NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO-6011-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section

More information

Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013

Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013 Audit Report The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013 A-14-13-13086 November 2013 MEMORANDUM Date: November 26,

More information

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.

More information

Privacy Impact Assessment. For ecampus-based System (e/cb) Date: April 26, 2014. Point of Contact: Calvin Whitaker Calvin.Whitaker@ed.

Privacy Impact Assessment. For ecampus-based System (e/cb) Date: April 26, 2014. Point of Contact: Calvin Whitaker Calvin.Whitaker@ed. For ecampus-based System (e/cb) Date: April 26, 2014 Point of Contact: Calvin Whitaker Calvin.Whitaker@ed.gov System Owner: Keith Wilson Keith.Wilson@ed.gov Author: Calvin Whitaker Office of Federal Student

More information

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) Whitepaper North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) NERC-CIP Overview The North American Electric Reliability Corporation (NERC) is a

More information

Enterprise Audit Management Instruction for National Security Systems (NSS)

Enterprise Audit Management Instruction for National Security Systems (NSS) UNCLASSIFIED September 2013 Enterprise Audit Management Instruction for National Security Systems (NSS) THIS DOCUMENT PRESCRIBES STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION UNCLASSIFIED

More information

FY 2016 Inspector General Federal Information Security Modernization Act of 2014 Reporting Metrics V1.0

FY 2016 Inspector General Federal Information Security Modernization Act of 2014 Reporting Metrics V1.0 FY 2016 Inspector General Federal Information Security Modernization Act of 2014 Reporting Metrics V1.0 June 20, 2016 Document History Version Date Comments Sec/Page 1.0 19 June 2016 Aligned questions

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - 45 min Webinar: November 14th, 2014 The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - www.cunesoft.com Rainer Schwarz Cunesoft Holger Spalt ivigilance 2014 Cunesoft GmbH PART

More information

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation) It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The

More information

Appendix A CMSR High Impact Level Data

Appendix A CMSR High Impact Level Data Office of Information Services Centers for Medicare & Medicaid Services 7500 Security Boulevard Baltimore, Maryland 21244-1850 Appendix A CMSR High Impact Level Data FINAL Version 2.0 September 20, 2013

More information

Standard: Event Monitoring

Standard: Event Monitoring Standard: Event Monitoring Page 1 Executive Summary The Event Monitoring Standard defines the requirements for Information Security event monitoring within SJSU computing resources to ensure that information

More information

Privacy Impact Assessment (PIA) Waiver Review System (WRS) Version 03.06.01.01. Last Updated: December 2, 2013

Privacy Impact Assessment (PIA) Waiver Review System (WRS) Version 03.06.01.01. Last Updated: December 2, 2013 United States Department of State (PIA) Waiver Review System (WRS) Version 03.06.01.01 Last Updated: December 2, 2013 Bureau of Administration 1. Contact Information Department of State Privacy Coordinator

More information

STATE OF NEW JERSEY Security Controls Assessment Checklist

STATE OF NEW JERSEY Security Controls Assessment Checklist STATE OF NEW JERSEY Security Controls Assessment Checklist Appendix D to 09-11-P1-NJOIT P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 Agency/Business (Extranet) Entity Response

More information

ISO 27001 COMPLIANCE WITH OBSERVEIT

ISO 27001 COMPLIANCE WITH OBSERVEIT ISO 27001 COMPLIANCE WITH OBSERVEIT OVERVIEW ISO/IEC 27001 is a framework of policies and procedures that include all legal, physical and technical controls involved in an organization s information risk

More information

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL AU7087_C013.fm Page 173 Friday, April 28, 2006 9:45 AM 13 Access Control The Access Control clause is the second largest clause, containing 25 controls and 7 control objectives. This clause contains critical

More information

Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview

Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve

More information

United States Citizenship and Immigration Services (USCIS) Enterprise Service Bus (ESB)

United States Citizenship and Immigration Services (USCIS) Enterprise Service Bus (ESB) for the United States Citizenship and Immigration Services (USCIS) June 22, 2007 Contact Point Harry Hopkins Office of Information Technology (OIT) (202) 272-8953 Reviewing Official Hugo Teufel III Chief

More information

FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS

FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS TABLE OF CONTENTS General Topics Purpose and Authorities Roles and Responsibilities Policy and Program Waiver Process Contact Abbreviated Sections/Questions 7.1 What is the purpose of this chapter? 7.2

More information

FISMA NIST 800-53 (Rev 4) Shared Public Cloud Infrastructure Standards

FISMA NIST 800-53 (Rev 4) Shared Public Cloud Infrastructure Standards FISMA NIST 800-53 (Rev 4) Shared Public Cloud Infrastructure Standards NIST CONTROL CLOUDCHECKR SUPPORT ACTIVITY AC-2 ACCOUNT MANAGEMENT Control: The organization: a. Identifies and selects the following

More information

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model--- ---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of

More information

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

John Essner, CISO Office of Information Technology State of New Jersey

John Essner, CISO Office of Information Technology State of New Jersey John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management

More information

Privacy Impact Assessment

Privacy Impact Assessment For: Great Lakes Computer System (GLCS) Great Lakes Educational Loan Services, Inc. (GOALS) Date: June 18, 2013 Point of Contact: Gregory Plenty (202) 377-3253 Gregory.Plenty@ed.gov System Owner: Keith

More information

Information Security for Managers

Information Security for Managers Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

FedRAMP Standard Contract Language

FedRAMP Standard Contract Language FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal

More information

Standard: Web Application Development

Standard: Web Application Development Information Security Standards Web Application Development Standard IS-WAD Effective Date TBD Email security@sjsu.edu # Version 2.0 Contact Mike Cook Phone 408-924-1705 Standard: Web Application Development

More information

Spillemyndigheden s Certification Programme Information Security Management System

Spillemyndigheden s Certification Programme Information Security Management System SCP.03.00.EN.1.0 Table of contents Table of contents... 2 1 Introduction... 3 1.1 Spillemyndigheden s certification programme... 3 1.2 Objectives of the... 3 1.3 Scope of this document... 4 1.4 Definitions...

More information

SECURITY CATEGORIZATION AND CONTROL SELECTION FOR NATIONAL SECURITY SYSTEMS

SECURITY CATEGORIZATION AND CONTROL SELECTION FOR NATIONAL SECURITY SYSTEMS 1 CNSSI No. 1253 15 March 2012 SECURITY CATEGORIZATION AND CONTROL SELECTION FOR NATIONAL SECURITY SYSTEMS Version 2 THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information