input
stringclasses
1 value
output
stringlengths
45
2.38k
instruction
stringlengths
30
83
Security Requirement 3.1.1: Limit system access to authorized users, processes acting on behalf of authorized users, and devices (including other systems).
What is the security requirement for 3.1.1 in NIST 800-171A?
There are 6 assessment objectives for 3.1.1: 3.1.1[a] Authorized users are identified. 3.1.1[b] Processes acting on behalf of authorized users are identified. 3.1.1[c] Devices (and other systems) authorized to connect to the system are identified. 3.1.1[d] System access is limited to authorized users. 3.1.1[e] System access is limited to processes acting on behalf of authorized users. 3.1.1[f] System access is limited to authorized devices (including other systems).
What are the assessment objectives for 3.1.1 in NIST 800-171A?
Potential assessment methods and objects for 3.1.1 include: Examine: Access control policy; procedures addressing account management; system security plan; system design documentation; system configuration settings and associated documentation; list of active system accounts and the name of the individual associated with each account; notifications or records of recently transferred, separated, or terminated employees; list of conditions for group and role membership; list of recently disabled system accounts along with the name of the individual associated with each account; access authorization records; account management compliance reviews; system monitoring records; system audit logs and records; list of devices and systems authorized to connect to organizational systems; other relevant documents or records. Interview: Personnel with account management responsibilities; system or network administrators; personnel with information security responsibilities. Test: Organizational processes for managing system accounts; mechanisms for implementing account management.
What are the potential assessment methods and objects for 3.1.1 in NIST 800-171A?
Security Requirement 3.1.2: Limit system access to the types of transactions and functions that authorized users are permitted to execute.
What is the security requirement for 3.1.2 in NIST 800-171A?
Assessment objectives for 3.1.2: 3.1.2[a] The types of transactions and functions that authorized users are permitted to execute are defined. 3.1.2[b] System access is limited to the defined types of transactions and functions for authorized users.
What are the assessment objectives for 3.1.2 in NIST 800-171A?
Potential assessment methods and objects for 3.1.2 include: Examine: Access control policy, procedures addressing access enforcement, system security plan, system design documentation, list of approved authorizations including remote access authorizations, system audit logs and records, system configuration settings and associated documentation, and other relevant documents or records. Interview: Personnel with access enforcement responsibilities, system or network administrators, personnel with information security responsibilities, system developers. Test: Mechanisms implementing access control policy.
What are the potential assessment methods and objects for 3.1.2 in NIST 800-171A?
Security Requirement 3.1.3: Control the flow of CUI in accordance with approved authorizations.
What is the security requirement for 3.1.3 in NIST 800-171A?
Assessment objectives for 3.1.3: 3.1.3[a] Information flow control policies are defined. 3.1.3[b] Methods and enforcement mechanisms for controlling the flow of CUI are defined. 3.1.3[c] Designated sources and destinations for CUI within the system and between interconnected systems are identified. 3.1.3[d] Authorizations for controlling the flow of CUI are defined. 3.1.3[e] Approved authorizations for controlling the flow of CUI are enforced.
What are the assessment objectives for 3.1.3 in NIST 800-171A?
Potential assessment methods and objects for 3.1.3 include: Examine: Access control policy, information flow control policies, procedures addressing information flow enforcement, system security plan, system design documentation, system configuration settings and associated documentation, list of information flow authorizations, system baseline configuration, system audit logs and records, and other relevant documents or records. Interview: System or network administrators, personnel with information security responsibilities, system developers. Test: Mechanisms implementing information flow enforcement policy.
What are the potential assessment methods and objects for 3.1.3 in NIST 800-171A?
Security Requirement 3.1.4: Separate the duties of individuals to reduce the risk of malevolent activity without collusion.
What is the security requirement for 3.1.4 in NIST 800-171A?
Assessment objectives for 3.1.4: 3.1.4[a] The duties of individuals requiring separation are defined. 3.1.4[b] Responsibilities for duties that require separation are assigned to separate individuals. 3.1.4[c] Access privileges that enable individuals to exercise the duties that require separation are granted to separate individuals.
What are the assessment objectives for 3.1.4 in NIST 800-171A?
Potential assessment methods and objects for 3.1.4 include: Examine: Access control policy, procedures addressing divisions of responsibility and separation of duties, system security plan, system configuration settings and associated documentation, list of divisions of responsibility and separation of duties, system access authorizations, system audit logs and records, and other relevant documents or records. Interview: Personnel with responsibilities for defining divisions of responsibility and separation of duties, personnel with information security responsibilities, system or network administrators. Test: Mechanisms implementing separation of duties policy.
What are the potential assessment methods and objects for 3.1.4 in NIST 800-171A?
Security Requirement 3.1.5: Employ the principle of least privilege including for specific security functions and privileged accounts.
What is the security requirement for 3.1.5 in NIST 800-171A?
Assessment objectives for 3.1.5: 3.1.5[a] Privileged accounts are identified. 3.1.5[b] Access to privileged accounts is authorized in accordance with the principle of least privilege. 3.1.5[c] Security functions are identified. 3.1.5[d] Access to security functions is authorized in accordance with the principle of least privilege.
What are the assessment objectives for 3.1.5 in NIST 800-171A?
Potential assessment methods and objects for 3.1.5 include: Examine: Access control policy, procedures addressing account management, system security plan, system design documentation, system configuration settings and associated documentation, list of active system accounts and the name of the individual associated with each account, list of conditions for group and role membership, notifications or records of recently transferred separated or terminated employees, list of recently disabled system accounts along with the name of the individual associated with each account, access authorization records, account management compliance reviews, system monitoring/audit records, procedures addressing least privilege, list of security functions deployed in hardware software and firmware and security-relevant information for which access is to be explicitly authorized, list of system-generated privileged accounts, list of system administration personnel, and other relevant documents or records. Interview: Personnel with account management responsibilities, system or network administrators, personnel with information security responsibilities, personnel with responsibilities for defining least privileges necessary to accomplish specified tasks. Test: Organizational processes for managing system accounts, mechanisms for implementing account management, mechanisms implementing least privilege functions, mechanisms prohibiting privileged access to the system.
What are the potential assessment methods and objects for 3.1.5 in NIST 800-171A?
Security Requirement 3.1.6: Use non-privileged accounts or roles when accessing nonsecurity functions.
What is the security requirement for 3.1.6 in NIST 800-171A?
Assessment objectives for 3.1.6: 3.1.6[a] Nonsecurity functions are identified. 3.1.6[b] Users are required to use non-privileged accounts or roles when accessing nonsecurity functions.
What are the assessment objectives for 3.1.6 in NIST 800-171A?
Potential assessment methods and objects for 3.1.6 include: Examine: Access control policy, procedures addressing least privilege, system security plan, list of system-generated security functions assigned to system accounts or roles, system configuration settings and associated documentation, system audit logs and records, and other relevant documents or records. Interview: Personnel with responsibilities for defining least privileges necessary to accomplish specified organizational tasks, personnel with information security responsibilities, system or network administrators. Test: Mechanisms implementing least privilege functions.
What are the potential assessment methods and objects for 3.1.6 in NIST 800-171A?
Security Requirement 3.1.7: Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs.
What is the security requirement for 3.1.7 in NIST 800-171A?
Assessment objectives for 3.1.7: 3.1.7[a] Privileged functions are defined. 3.1.7[b] Non-privileged users are defined. 3.1.7[c] Non-privileged users are prevented from executing privileged functions. 3.1.7[d] The execution of privileged functions is captured in audit logs.
What are the assessment objectives for 3.1.7 in NIST 800-171A?
Potential assessment methods and objects for 3.1.7 include: Examine: Access control policy; procedures addressing least privilege; system security plan; system design documentation; list of privileged functions and associated user account assignments; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records. Interview: Personnel with responsibilities for defining least privileges necessary to accomplish specified tasks; personnel with information security responsibilities; system developers. Test: Mechanisms implementing least privilege functions for non-privileged users; mechanisms auditing the execution of privileged functions.
What are the potential assessment methods and objects for 3.1.7 in NIST 800-171A?
Security Requirement 3.1.8: Limit unsuccessful logon attempts.
What is the security requirement for 3.1.8 in NIST 800-171A?
Assessment objectives for 3.1.8: 3.1.8[a] The means of limiting unsuccessful logon attempts is defined. 3.1.8[b] The defined means of limiting unsuccessful logon attempts is implemented.
What are the assessment objectives for 3.1.8 in NIST 800-171A?
Potential assessment methods and objects for 3.1.8 include: Examine: Access control policy; procedures addressing unsuccessful logon attempts; system security plan; system design documentation; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records. Interview: Personnel with information security responsibilities; system developers; system or network administrators. Test: Mechanisms implementing access control policy for unsuccessful logon attempts.
What are the potential assessment methods and objects for 3.1.8 in NIST 800-171A?
Security Requirement 3.1.9: Provide privacy and security notices consistent with applicable CUI rules.
What is the security requirement for 3.1.9 in NIST 800-171A?
Assessment objectives for 3.1.9: 3.1.9[a] Privacy and security notices required by CUI-specified rules are identified consistent and associated with the specific CUI category. 3.1.9[b] Privacy and security notices are displayed.
What are the assessment objectives for 3.1.9 in NIST 800-171A?
Potential assessment methods and objects for 3.1.9 include: Examine: Privacy and security policies; procedures addressing system use notification; documented approval of system use notification messages or banners; system audit logs and records; system design documentation; user acknowledgements of notification message or banner; system security plan; system use notification messages; system configuration settings and associated documentation; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; personnel with responsibility for providing legal advice; system developers. Test: Mechanisms implementing system use notification.
What are the potential assessment methods and objects for 3.1.9 in NIST 800-171A?
Security Requirement 3.1.10: Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity.
What is the security requirement for 3.1.10 in NIST 800-171A?
Assessment objectives for 3.1.10: 3.1.10[a] The period of inactivity after which the system initiates a session lock is defined. 3.1.10[b] Access to the system and viewing of data is prevented by initiating a session lock after the defined period of inactivity. 3.1.10[c] Previously visible information is concealed via a pattern-hiding display after the defined period of inactivity.
What are the assessment objectives for 3.1.10 in NIST 800-171A?
Potential assessment methods and objects for 3.1.10 include: Examine: Access control policy; procedures addressing session lock; procedures addressing identification and authentication; system design documentation; system configuration settings and associated documentation; system security plan; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; system developers. Test: Mechanisms implementing access control policy for session lock.
What are the potential assessment methods and objects for 3.1.10 in NIST 800-171A?
Security Requirement 3.1.11: Terminate (automatically) a user session after a defined condition.
What is the security requirement for 3.1.11 in NIST 800-171A?
Assessment objectives for 3.1.11: 3.1.11[a] Conditions requiring a user session to terminate are defined. 3.1.11[b] A user session is automatically terminated after any of the defined conditions occur.
What are the assessment objectives for 3.1.11 in NIST 800-171A?
Potential assessment methods and objects for 3.1.11 include: Examine: Access control policy; procedures addressing session termination; system design documentation; system security plan; system configuration settings and associated documentation; list of conditions or trigger events requiring session disconnect; system audit logs and records; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; system developers. Test: Mechanisms implementing user session termination.
What are the potential assessment methods and objects for 3.1.11 in NIST 800-171A?
Security Requirement 3.1.12: Monitor and control remote access sessions.
What is the security requirement for 3.1.12 in NIST 800-171A?
Assessment objectives for 3.1.12: 3.1.12[a] Remote access sessions are permitted. 3.1.12[b] The types of permitted remote access are identified. 3.1.12[c] Remote access sessions are controlled. 3.1.12[d] Remote access sessions are monitored.
What are the assessment objectives for 3.1.12 in NIST 800-171A?
Potential assessment methods and objects for 3.1.12 include: Examine: Access control policy; procedures addressing remote access implementation and usage (including restrictions); configuration management plan; system security plan; system design documentation; system configuration settings and associated documentation; remote access authorizations; system audit logs and records; other relevant documents or records. Interview: Personnel with responsibilities for managing remote access connections; system or network administrators; personnel with information security responsibilities. Test: Remote access management capability for the system.
What are the potential assessment methods and objects for 3.1.12 in NIST 800-171A?
Security Requirement 3.1.13: Employ cryptographic mechanisms to protect the confidentiality of remote access sessions.
What is the security requirement for 3.1.13 in NIST 800-171A?
Assessment objectives for 3.1.13: 3.1.13[a] Cryptographic mechanisms to protect the confidentiality of remote access sessions are identified. 3.1.13[b] Cryptographic mechanisms to protect the confidentiality of remote access sessions are implemented.
What are the assessment objectives for 3.1.13 in NIST 800-171A?
Potential assessment methods and objects for 3.1.13 include: Examine: Access control policy; procedures addressing remote access to the system; system security plan; system design documentation; system configuration settings and associated documentation; cryptographic mechanisms and associated configuration documentation; system audit logs and records; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; system developers. Test: Cryptographic mechanisms protecting remote access sessions.
What are the potential assessment methods and objects for 3.1.13 in NIST 800-171A?
Security Requirement 3.1.14: Route remote access via managed access control points.
What is the security requirement for 3.1.14 in NIST 800-171A?
Assessment objectives for 3.1.14: 3.1.14[a] Managed access control points are identified and implemented. 3.1.14[b] Remote access is routed through managed network access control points.
What are the assessment objectives for 3.1.14 in NIST 800-171A?
Potential assessment methods and objects for 3.1.14 include: Examine: Access control policy; procedures addressing remote access to the system; system security plan; system design documentation; list of all managed network access control points; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities. Test: Mechanisms routing all remote accesses through managed network access control points.
What are the potential assessment methods and objects for 3.1.14 in NIST 800-171A?
Security Requirement 3.1.15: Authorize remote execution of privileged commands and remote access to security-relevant information.
What is the security requirement for 3.1.15 in NIST 800-171A?
Assessment objectives for 3.1.15: 3.1.15[a] Privileged commands authorized for remote execution are identified. 3.1.15[b] Security-relevant information authorized to be accessed remotely is identified. 3.1.15[c] The execution of the identified privileged commands via remote access is authorized. 3.1.15[d] Access to the identified security-relevant information via remote access is authorized.
What are the assessment objectives for 3.1.15 in NIST 800-171A?
Potential assessment methods and objects for 3.1.15 include: Examine: Access control policy; procedures addressing remote access to the system; system configuration settings and associated documentation; system security plan; system audit logs and records; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities. Test: Mechanisms implementing remote access management.
What are the potential assessment methods and objects for 3.1.15 in NIST 800-171A?
Security Requirement 3.1.16: Authorize wireless access prior to allowing such connections.
What is the security requirement for 3.1.16 in NIST 800-171A?
Assessment objectives for 3.1.16: 3.1.16[a] Wireless access points are identified. 3.1.16[b] Wireless access is authorized prior to allowing such connections.
What are the assessment objectives for 3.1.16 in NIST 800-171A?
Potential assessment methods and objects for 3.1.16 include: Examine: Access control policy; configuration management plan; procedures addressing wireless access implementation and usage (including restrictions); system security plan; system design documentation; system configuration settings and associated documentation; wireless access authorizations; system audit logs and records; other relevant documents or records. Interview: Personnel with responsibilities for managing wireless access connections; personnel with information security responsibilities. Test: Wireless access management capability for the system.
What are the potential assessment methods and objects for 3.1.16 in NIST 800-171A?
Security Requirement 3.1.17: Protect wireless access using authentication and encryption.
What is the security requirement for 3.1.17 in NIST 800-171A?
Assessment objectives for 3.1.17: 3.1.17[a] Wireless access to the system is protected using authentication. 3.1.17[b] Wireless access to the system is protected using encryption.
What are the assessment objectives for 3.1.17 in NIST 800-171A?
Potential assessment methods and objects for 3.1.17 include: Examine: Access control policy; system design documentation; procedures addressing wireless implementation and usage (including restrictions); system security plan; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records. Interview: System or network administrators; personnel with information security responsibilities; system developers. Test: Mechanisms implementing wireless access protections to the system.
What are the potential assessment methods and objects for 3.1.17 in NIST 800-171A?
Security Requirement 3.1.18: Control connection of mobile devices.
What is the security requirement for 3.1.18 in NIST 800-171A?
Assessment objectives for 3.1.18: 3.1.18[a] Mobile devices that process, store, or transmit CUI are identified. 3.1.18[b] Mobile device connections are authorized. 3.1.18[c] Mobile device connections are monitored and logged.
What are the assessment objectives for 3.1.18 in NIST 800-171A?
Potential assessment methods and objects for 3.1.18 include: Examine: Access control policy; authorizations for mobile device connections to organizational systems; procedures addressing access control for mobile device usage (including restrictions); system design documentation; configuration management plan; system security plan; system audit logs and records; system configuration settings and associated documentation; other relevant documents or records. Interview: Personnel using mobile devices to access organizational systems; system or network administrators; personnel with information security responsibilities. Test: Access control capability authorizing mobile device connections to organizational systems.
What are the potential assessment methods and objects for 3.1.18 in NIST 800-171A?
Security Requirement 3.1.19: Encrypt CUI on mobile devices and mobile computing platforms.
What is the security requirement for 3.1.19 in NIST 800-171A?
Assessment objectives for 3.1.19: 3.1.19[a] Mobile devices and mobile computing platforms that process, store, or transmit CUI are identified. 3.1.19[b] Encryption is employed to protect CUI on identified mobile devices and mobile computing platforms.
What are the assessment objectives for 3.1.19 in NIST 800-171A?
Potential assessment methods and objects for 3.1.19 include: Examine: Access control policy; procedures addressing access control for mobile devices; system design documentation; system configuration settings and associated documentation; encryption mechanisms and associated configuration documentation; system security plan; system audit logs and records; other relevant documents or records. Interview: Personnel with access control responsibilities for mobile devices; system or network administrators; personnel with information security responsibilities. Test: Encryption mechanisms protecting confidentiality of information on mobile devices.
What are the potential assessment methods and objects for 3.1.19 in NIST 800-171A?
Security Requirement 3.1.20: Verify and control/limit connections to and use of external systems.
What is the security requirement for 3.1.20 in NIST 800-171A?
Assessment objectives for 3.1.20: 3.1.20[a] Connections to external systems are identified. 3.1.20[b] The use of external systems is identified. 3.1.20[c] Connections to external systems are verified. 3.1.20[d] The use of external systems is verified. 3.1.20[e] Connections to external systems are controlled/limited. 3.1.20[f] The use of external systems is controlled/limited.
What are the assessment objectives for 3.1.20 in NIST 800-171A?
Potential assessment methods and objects for 3.1.20 include: Examine: Access control policy; procedures addressing the use of external systems; terms and conditions for external systems; system security plan; list of applications accessible from external systems; system configuration settings and associated documentation; system connection or processing agreements; account management documents; other relevant documents or records. Interview: Personnel with responsibilities for defining terms and conditions for use of external systems to access organizational systems; system or network administrators; personnel with information security responsibilities. Test: Mechanisms implementing terms and conditions on use of external systems.
What are the potential assessment methods and objects for 3.1.20 in NIST 800-171A?
Security Requirement 3.1.21: Limit use of portable storage devices on external systems.
What is the security requirement for 3.1.21 in NIST 800-171A?
Assessment objectives for 3.1.21: 3.1.21[a] The use of portable storage devices containing CUI on external systems is identified and documented. 3.1.21[b] Limits on the use of portable storage devices containing CUI on external systems are defined. 3.1.21[c] The use of portable storage devices containing CUI on external systems is limited as defined.
What are the assessment objectives for 3.1.21 in NIST 800-171A?
Potential assessment methods and objects for 3.1.21 include: Examine: Access control policy; procedures addressing the use of external systems; system security plan; system configuration settings and associated documentation; system connection or processing agreements; account management documents; other relevant documents or records. Interview: Personnel with responsibilities for restricting or prohibiting use of organization-controlled storage devices on external systems; system or network administrators; personnel with information security responsibilities. Test: Mechanisms implementing restrictions on use of portable storage devices.
What are the potential assessment methods and objects for 3.1.21 in NIST 800-171A?
Security Requirement 3.1.22: Control CUI posted or processed on publicly accessible systems.
What is the security requirement for 3.1.22 in NIST 800-171A?
Assessment objectives for 3.1.22: 3.1.22[a] Individuals authorized to post or process information on publicly accessible systems are identified. 3.1.22[b] Procedures to ensure CUI is not posted or processed on publicly accessible systems are identified. 3.1.22[c] A review process is in place prior to posting of any content to publicly accessible systems. 3.1.22[d] Content on publicly accessible systems is reviewed to ensure that it does not include CUI. 3.1.22[e] Mechanisms are in place to remove and address improper posting of CUI.
What are the assessment objectives for 3.1.22 in NIST 800-171A?
Potential assessment methods and objects for 3.1.22 include: Examine: Access control policy; procedures addressing publicly accessible content; system security plan; list of users authorized to post publicly accessible content on organizational systems; training materials and/or records; records of publicly accessible information reviews; records of response to nonpublic information on public websites; system audit logs and records; security awareness training records; other relevant documents or records. Interview: Personnel with responsibilities for managing publicly accessible information posted on organizational systems; personnel with information security responsibilities. Test: Mechanisms implementing management of publicly accessible content.
What are the potential assessment methods and objects for 3.1.22 in NIST 800-171A?
Security Requirement 3.2.1: Ensure that managers, system administrators, and users of organizational systems are made aware of the security risks associated with their activities and of the applicable policies, standards, and procedures related to the security of those systems.
What is the security requirement for 3.2.1 in NIST 800-171A?
Assessment objectives for 3.2.1: 3.2.1[a] Managers are made aware of the security risks associated with their activities. 3.2.1[b] System administrators are made aware of the security risks associated with their activities. 3.2.1[c] Users of organizational systems are made aware of the security risks associated with their activities. 3.2.1[d] managers, systems administrators, and users of the system are made aware of the applicable policies, standards, and procedures related to the security of the system.
What are the assessment objectives for 3.2.1 in NIST 800-171A?
Potential assessment methods and objects for 3.2.1 include: Examine: [SELECT FROM: Security awareness and training policy; procedures addressing security awareness training implementation; relevant codes of federal regulations; security awareness training curriculum; security awareness training materials; system security plan; training records; other relevant documents or records]. Interview: [SELECT FROM: Personnel with responsibilities for security awareness training; personnel with information security responsibilities; personnel composing the general system user community; personnel with responsibilities for role-based awareness training]. Test: [SELECT FROM: Mechanisms managing security awareness training; mechanisms managing role-based security training].
What are the potential assessment methods and objects for 3.2.1 in NIST 800-171A?
Security Requirement 3.2.2: Ensure that personnel are trained to carry out their assigned information security-related duties and responsibilities.
What is the security requirement for 3.2.2 in NIST 800-171A?
Assessment objectives for 3.2.2: 3.2.2[a] Personnel are identified who require training to carry out their assigned information security-related duties and responsibilities. 3.2.2[b] Personnel are provided training to carry out their assigned information security-related duties and responsibilities. 3.2.2[c] Personnel receive training in a time frame that enables them to carry out their assigned duties and responsibilities.
What are the assessment objectives for 3.2.2 in NIST 800-171A?
Potential assessment methods and objects for 3.2.2 include: Examine: Security awareness and training policy; training materials for specific information security-related duties and responsibilities; training records of personnel with assigned information security-related duties and responsibilities; other relevant documents or records. Interview: Personnel with information security responsibilities. Test: Security training mechanisms employed within the organization.
What are the potential assessment methods and objects for 3.2.2 in NIST 800-171A?
Security Requirement 3.2.3: Provide security awareness training on recognizing and reporting potential indicators of insider threat.
What is the security requirement for 3.2.3 in NIST 800-171A?
Assessment objectives for 3.2.3: 3.2.3[a] Personnel are provided security awareness training on recognizing potential indicators of insider threat. 3.2.3[b] Personnel are provided security awareness training on reporting potential indicators of insider threat.
What are the assessment objectives for 3.2.3 in NIST 800-171A?
Potential assessment methods and objects for 3.2.3 include: Examine: Security awareness and training policy; training materials on recognizing and reporting insider threats; records of insider threat awareness training; other relevant documents or records. Interview: Personnel who have received insider threat awareness training. Test: Insider threat awareness mechanisms employed within the organization.
What are the potential assessment methods and objects for 3.2.3 in NIST 800-171A?
Security Requirement 3.3.1: Create and retain system audit logs and records to enable the monitoring, analysis, investigation, and reporting of unlawful, unauthorized, or inappropriate information system activity.
What is the security requirement for 3.3.1 in NIST 800-171A?
Assessment objectives for 3.3.1: 3.3.1[a] System audit logs and records are created. 3.3.1[b] System audit logs and records are retained. 3.3.1[c] System audit logs and records enable the monitoring, analysis, investigation, and reporting of unlawful, unauthorized, or inappropriate information system activity.
What are the assessment objectives for 3.3.1 in NIST 800-171A?
Potential assessment methods and objects for 3.3.1 include: Examine: Audit and accountability policy; procedures addressing audit record generation and retention; system security plan; system audit logs and records; system configuration settings and associated documentation; other relevant documents or records. Interview: Personnel with audit log generation, retention, and analysis responsibilities. Test: Mechanisms implementing audit record generation and retention.
What are the potential assessment methods and objects for 3.3.1 in NIST 800-171A?
Security Requirement 3.3.2: Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions.
What is the security requirement for 3.3.2 in NIST 800-171A?
Assessment objectives for 3.3.2: 3.3.2[a] System users are uniquely identified. 3.3.2[b] Actions taken by system users can be traced to the individual users.
What are the assessment objectives for 3.3.2 in NIST 800-171A?
Potential assessment methods and objects for 3.3.2 include: Examine: Audit and accountability policy; procedures addressing audit record generation and retention; system security plan; system audit logs and records; system configuration settings and associated documentation; other relevant documents or records. Interview: Personnel with responsibilities for audit record generation and analysis. Test: Mechanisms implementing user identification and accountability.
What are the potential assessment methods and objects for 3.3.2 in NIST 800-171A?
Security Requirement 3.3.3: Review and update logged events.
What is the security requirement for 3.3.3 in NIST 800-171A?
Assessment objectives for 3.3.3: 3.3.3[a] Logged events are reviewed. 3.3.3[b] Logged events are updated.
What are the assessment objectives for 3.3.3 in NIST 800-171A?
Potential assessment methods and objects for 3.3.3 include: Examine: Audit and accountability policy; procedures addressing audit log review and update; system security plan; system audit logs and records; system configuration settings and associated documentation; other relevant documents or records. Interview: Personnel with responsibilities for reviewing and updating audit logs. Test: Mechanisms implementing audit log review and update.
What are the potential assessment methods and objects for 3.3.3 in NIST 800-171A?
Security Requirement 3.3.4: Alert in the event of an audit logging process failure.
What is the security requirement for 3.3.4 in NIST 800-171A?
Assessment objectives for 3.3.4: 3.3.4[a] An alert mechanism is in place for audit logging process failures. 3.3.4[b] Alerts are generated in the event of an audit logging process failure.
What are the assessment objectives for 3.3.4 in NIST 800-171A?
Potential assessment methods and objects for 3.3.4 include: Examine: Audit and accountability policy; procedures addressing audit logging process failure alerts; system security plan; system audit logs and records; system configuration settings and associated documentation; other relevant documents or records. Interview: Personnel with responsibilities for managing audit logging process failure alerts. Test: Mechanisms implementing audit logging process failure alerts.
What are the potential assessment methods and objects for 3.3.4 in NIST 800-171A?
Security Requirement 3.3.5: Correlate audit record review, analysis, and reporting processes for investigation and response to indications of inappropriate, suspicious, or unusual activity.
What is the security requirement for 3.3.5 in NIST 800-171A?
Assessment objectives for 3.3.5: 3.3.5[a] Audit record review, analysis, and reporting processes are correlated for investigation. 3.3.5[b] Audit record review, analysis, and reporting processes are correlated for response to indications of inappropriate, suspicious, or unusual activity.
What are the assessment objectives for 3.3.5 in NIST 800-171A?
Potential assessment methods and objects for 3.3.5 include: Examine: Audit and accountability policy; procedures addressing audit record review, analysis, and reporting; system security plan; system audit logs and records; system configuration settings and associated documentation; other relevant documents or records. Interview: Personnel with responsibilities for audit record review, analysis, and reporting. Test: Mechanisms implementing correlation of audit record review, analysis, and reporting processes.
What are the potential assessment methods and objects for 3.3.5 in NIST 800-171A?
Security Requirement 3.3.6: Provide audit record reduction and report generation to support on-demand analysis and reporting.
What is the security requirement for 3.3.6 in NIST 800-171A?
Assessment objectives for 3.3.6: 3.3.6[a] Audit record reduction capability is provided to support on-demand analysis and reporting. 3.3.6[b] Audit report generation capability is provided to support on-demand analysis and reporting.
What are the assessment objectives for 3.3.6 in NIST 800-171A?
Potential assessment methods and objects for 3.3.6 include: Examine: Audit and accountability policy; procedures addressing audit record reduction and report generation; system security plan; system configuration settings and associated documentation; audit record reduction and report generation tools; other relevant documents or records. Interview: Personnel with responsibilities for audit record reduction and report generation. Test: Audit record reduction and report generation tools.
What are the potential assessment methods and objects for 3.3.6 in NIST 800-171A?
Security Requirement 3.3.7: Provide a system capability that compares and synchronizes internal system clocks with an authoritative source to generate time stamps for audit records.
What is the security requirement for 3.3.7 in NIST 800-171A?
Assessment objectives for 3.3.7: 3.3.7[a] A system capability is provided to compare and synchronize internal system clocks with an authoritative source. 3.3.7[b] System clocks are synchronized with the authoritative source to generate time stamps for audit records.
What are the assessment objectives for 3.3.7 in NIST 800-171A?
Potential assessment methods and objects for 3.3.7 include: Examine: Audit and accountability policy; procedures addressing time synchronization for audit records; system security plan; system configuration settings and associated documentation; other relevant documents or records. Interview: Personnel with responsibilities for time synchronization of internal system clocks. Test: Time synchronization mechanisms within the system.
What are the potential assessment methods and objects for 3.3.7 in NIST 800-171A?
Security Requirement 3.3.8: Protect audit information and audit tools from unauthorized access, modification, and deletion.
What is the security requirement for 3.3.8 in NIST 800-171A?
Assessment objectives for 3.3.8: 3.3.8[a] Audit information is protected from unauthorized access, modification, and deletion. 3.3.8[b] Audit tools are protected from unauthorized access, modification, and deletion.
What are the assessment objectives for 3.3.8 in NIST 800-171A?
Potential assessment methods and objects for 3.3.8 include: Examine: Audit and accountability policy; procedures addressing the protection of audit information and audit tools; system security plan; system configuration settings and associated documentation; access controls implemented for audit information and audit tools; other relevant documents or records. Interview: Personnel with responsibilities for protecting audit information and audit tools. Test: Protection mechanisms for audit information and audit tools.
What are the potential assessment methods and objects for 3.3.8 in NIST 800-171A?
Security Requirement 3.3.9: Limit management of audit functionality to a subset of privileged users.
What is the security requirement for 3.3.9 in NIST 800-171A?
README.md exists but content is empty. Use the Edit dataset card button to edit it.
Downloads last month
33
Edit dataset card