forked from ComplianceAsCode/content
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathnist_satellite6.yml
5591 lines (5296 loc) · 382 KB
/
nist_satellite6.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
policy: NIST
title: Configuration Recommendations for Satellite 6
id: nist_satellite6
version: Revision 4
source: https://www.fedramp.gov/assets/resources/documents/FedRAMP_Security_Controls_Baseline.xlsx
levels:
- id: low
- id: moderate
- id: high
controls:
- id: AC-1
status: not applicable
notes: |-
Section a: (O) The organization will be responsible for developing, documenting,
and disseminating access control policy and procedures. A successful
control response will need to address the content of the policy (which
must include purpose, scope, roles, responsibilities, management
commitment, coordination, and compliance) and procedures (which must
facilitate the implementation of the policies and associated controls).
Section a.1: (O) The organization will be responsible for developing, documenting,
and disseminating an access control policy that addresses purpose,
scope, roles, responsibilities, management commitment, coordination
among organizational entities, and compliance. A successful control
response will need to address the content of the policy (which must
include purpose, scope, roles, responsibilities, management commitment,
coordination, and compliance).
Section a.2: (O) The organization will be responsible for developing, documenting,
and disseminating the procedures to facilitate the implementation of the
access control policy and associated access controls. A successful
control response will need to address the procedures (which must
facilitate the implementation of the policies and associated controls).
Section b: (O) The organization will be responsible for reviewing and updating the
current access control policies and procedures. A successful control
response will need to address the review and update process, including
the role(s) responsible for initiating the review process, updating the
policy and procedures, and providing approval of the updates.
Section b.1: (O) The organization will be responsible for reviewing and updating the
current access control policies. A successful control response will need
to address the review and update process, including the role(s)
responsible for initiating the review process, updating the policy, and
providing approval of the updates.
Section b.2: (O) The organization will be responsible for reviewing and updating the
current access control procedures. A successful control response will
need to address the review and update process, including the role(s)
responsible for initiating the review process, updating the procedures,
and providing approval of the updates.
rules: []
description: "The organization:\n a. Develops, documents, and disseminates to [Assignment:\
\ organization-defined personnel or roles]:\n 1. An access control policy that\
\ addresses purpose, scope, roles, responsibilities, management commitment, coordination\
\ among organizational entities, and compliance; and\n 2. Procedures to facilitate\
\ the implementation of the access control policy and associated access controls;\
\ and\n b. Reviews and updates the current:\n 1. Access control policy [Assignment:\
\ organization-defined frequency]; and\n 2. Access control procedures [Assignment:\
\ organization-defined frequency].\n\nSupplemental Guidance: This control addresses\
\ the establishment of policy and procedures for the effective implementation\
\ of selected security controls and control enhancements in the AC family. Policy\
\ and procedures reflect applicable federal laws, Executive Orders, directives,\
\ regulations, policies, standards, and guidance. Security program policies and\
\ procedures at the organization level may make the need for system-specific policies\
\ and procedures unnecessary. The policy can be included as part of the general\
\ information security policy for organizations or conversely, can be represented\
\ by multiple policies reflecting the complex nature of certain organizations.\
\ The procedures can be established for the security program in general and for\
\ particular information systems, if needed. \n\nThe organizational risk management\
\ strategy is a key factor in establishing policy and procedures. Related control:\
\ PM-9.\nControl Enhancements: None.\nReferences: NIST Special Publications 800-12,\
\ 800-100.\n\nAC-1 (b) (1) [at least annually] \nAC-1 (b) (2) [at least annually\
\ or whenever a significant change occurs]"
title: >-
AC-1 - ACCESS CONTROL POLICY AND PROCEDURES
levels:
- high
- moderate
- low
- id: AC-2
status: not applicable
notes: |-
Section a: (O) The organization will be responsible for identifying and selecting
the types of accounts required to support the organizations application.
Examples of account types include individual, shared, group, system,
guest/anonymous, emergency, developer/manufacturer/vendor, temporary,
and service. A successful control response will need to address the
specific requirements fulfulled by each account type in use.
Section b: (O) The organization will be responsible for assigning account managers,
who will have responsibilities related to the creation, management, and
removal of accounts. A successful control response will need to discuss
how account managers are identified within the organization.
Section c: (O) The organization will be responsible for setting conditions for
group and role memberships. A successful control response will need to
outline these conditions and how they are enforced.
Section d: (O) The organization will be responsible for specifying authorized
users, group and role memberships, and privileges for each account. A
successful control response will need to addess the process by which
authorized users are specified and privilege levels are determined.
Section e: (O) The organization will be responsible for requiring approval by
designated personnel or roles prior to creating information system
accounts. A successful control response will need to outline the
personnel or roles responsible for approving information system accounts
and the process by which those personnel or roles are notified and
approval is granted.
Section f: (O) The organization will be repsonsible for defining and enforcing
procedures or conditions for the creation, management, and removal of
information system accounts. A successful control response will outline
the conditions for each action and the tools or procedures used to
enforce those conditions.
Section g: (O) The organization will be responsible for monitoring the use of
information system accounts. This may include reviewing records of
account management activities. A successful control response will relate
the monitoring activities required for this control to the auditing
activities in the AU control family.
Section h: (O) The organization will be responsible for notifying account managers
when triggering events occur. A successful control response will need to
address the methods by which these triggering events are identified and
the managers are notified.
Section h.1: (O) The organization will be responsible for notifying account managers
when accounts are no longer required. A successful control response will
need to address the methods by which this triggering event is identified
and the managers are notified.
Section h.2: (O) The organization will be responsible for notifying account managers
when when users are terminated. A successful control response will need
to address the methods by which this triggering event is identified and
the managers are notified.
Section h.3: (O) The organization will be responsible for notifying account managers
when when system usage or need-to-know changes. A successful control
response will need to address the methods by which this triggering event
is identified and the managers are notified.
Section i: (O) The organization will be responsible for authorizing access to the
organizations information system based on a valid access authorization.
A successful control response will need to address ensuring that all
accounts are granted access based on a valid authorization.
Section i.1: (O) The organization will be responsible for authorizing access to the
organizations application. A successful control response will need to
address ensuring that all accounts are granted access based on a valid
authorization.
Section i.2: (O) The organization will be responsible for authorizing access to the
organizations application based on . A successful control response will
need to address ensuring that all accounts are granted access based on a
valid authorization for a specific intended usage.
Section i.3: (O) The organization will be responsible for authorizing access to the
organizations application. A successful control response will need to
address ensuring that all accounts are granted access based on a valid
authorization for a specific intended usage.
Section j: (O) The organization will be responsible for reviewing accounts for
compliance with account management requirements at the specified
frequency. A successful control response will need to address the
process used to review accounts, the means by which compliance is
verified, and the process for remediation of any accounts found not to
be in compliance.
Section k: (O) The organization will be responsible for reissing shared/group
account credentials when individuals are removed from the group. A
successful control response will need to discuss how a triggering event
is notified, what the process and timeframe for reissuing credentials
is, and how the process is enforced.
rules: []
description: |-
The organization:
a. Identifies and selects the following types of information system accounts to support organizational missions/business functions: [Assignment: organization-defined information system account types];
b. Assigns account managers for information system accounts;
c. Establishes conditions for group and role membership;
d. Specifies authorized users of the information system, group and role membership, and access authorizations (i.e., privileges) and other attributes (as required) for each account;
e. Requires approvals by [Assignment: organization-defined personnel or roles] for requests to create information system accounts;
f. Creates, enables, modifies, disables, and removes information system accounts in accordance with [Assignment: organization-defined procedures or conditions];
g. Monitors the use of, information system accounts;
h. Notifies account managers:
1. When accounts are no longer required;
2. When users are terminated or transferred; and
3. When individual information system usage or need-to-know changes;
i. Authorizes access to the information system based on:
1. A valid access authorization;
2. Intended system usage; and
3. Other attributes as required by the organization or associated missions/business functions;
j. Reviews accounts for compliance with account management requirements [Assignment: organization-defined frequency]; and
k. Establishes a process for reissuing shared/group account credentials (if deployed) when individuals are removed from the group.
Supplemental Guidance: Information system account types include individual, shared, group, system, guest/anonymous, emergency, developer/manufacturer/vendor, temporary, and service. Some of the account management requirements listed above can be implemented by organizational information systems. The identification of authorized users of the information system and the specification of access privileges reflects the requirements in other security controls in the security plan. Users requiring administrative privileges on information system accounts receive additional scrutiny by appropriate organizational personnel (e.g., system owner, mission/business owner, or chief information security officer) responsible for approving such accounts and privileged access. Organizations may choose to define access privileges or other attributes by account, by type of account, or a combination of both. Other attributes required for authorizing access include, for example, restrictions on time-of-day, day-of-week, and point-of-origin. In defining other account attributes, organizations consider system-related requirements (e.g., scheduled maintenance, system upgrades) and mission/business requirements, (e.g., time zone differences, customer requirements, remote access to support travel requirements). Failure to consider these factors could affect information system availability. Temporary and emergency accounts are accounts intended for short-term use. Organizations establish temporary accounts as a part of normal account activation procedures when there is a need for short-term accounts without the demand for immediacy in account activation. Organizations establish emergency accounts in response to crisis situations and with the need for rapid account activation. Therefore, emergency account activation may bypass normal account authorization processes. Emergency and temporary accounts are not to be confused with infrequently used accounts (e.g., local logon accounts used for special tasks defined by organizations or when network resources are unavailable). Such accounts remain available and are not subject to automatic disabling or removal dates. Conditions for disabling or deactivating accounts include, for example: (i) when shared/group, emergency, or temporary accounts are no longer required; or (ii) when individuals are transferred or terminated. Some types of information system accounts may require specialized training. Related controls: AC-3, AC-4, AC-5, AC-6, AC-10, AC-17, AC-19, AC-20, AU-9, IA-2, IA-4, IA-5, IA-8, CM-5, CM-6, CM-11, MA-3, MA-4, MA-5, PL-4, SC-13.
References: None.
AC-2 (j) [monthly for privileged accessed, every six (6) months for non-privileged access]
title: >-
AC-2 - ACCOUNT MANAGEMENT
levels:
- high
- moderate
- low
- id: AC-2(1)
status: not applicable
notes: |-
(O) The organization will be responsible for employing automated
mechanisms to support account management activities. A successful
control response will need to address all automated mechanisms used for
account management.
rules: []
description: |-
The organization employs automated mechanisms to support the management of information system accounts.
Supplemental Guidance: The use of automated mechanisms can include, for example: using email or text messaging to automatically notify account managers when users are terminated or transferred; using the information system to monitor account usage; and using telephonic notification to report atypical system account usage.
title: >-
AC-2(1) - ACCOUNT MANAGEMENT | AUTOMATED SYSTEM ACCOUNT MANAGEMENT
levels:
- high
- moderate
- id: AC-2(2)
status: pending
notes: |-
(S) The information system will be responsible for automatically
removing or disabling emergency and temporary accounts within the
required timeframe. A successful control response will need to address
all of the procedures and mechanisms involved in disabling these
accounts.
rules: []
description: "The information system automatically [Selection: removes; disables]\
\ temporary and emergency accounts after [Assignment: organization-defined time\
\ period for each type of account].\n\nSupplemental Guidance: This control enhancement\
\ requires the removal of both temporary and emergency accounts automatically\
\ after a predefined period of time has elapsed, rather than at the convenience\
\ of the systems administrator.\n\nAC-2 (2) [Selection: disables] \n[Assignment:\
\ 24 hours from last use]"
title: >-
AC-2(2) - ACCOUNT MANAGEMENT | REMOVAL OF TEMPORARY / EMERGENCY ACCOUNTS
levels:
- high
- moderate
- id: AC-2(3)
status: pending
notes: |-
(S) The information system will be responsible for automatically
disabling user accounts after the specified period of inactivity. A
successful control response will need to address all automated
mechanisms involved in disabling inactive accounts.
rules: []
description: |-
The information system automatically disables inactive accounts after [Assignment: organization-defined time period].
AC-2 (3) [35 days for user accounts]
AC-2 (3) Requirement: The service provider defines the time period for non-user accounts (e.g., accounts associated with devices). The time periods are approved and accepted by the JAB/AO. Where user management is a function of the service, reports of activity of consumer users shall be made available.
title: >-
AC-2(3) - ACCOUNT MANAGEMENT | DISABLE INACTIVE ACCOUNTS
levels:
- high
- moderate
- id: AC-2(4)
status: pending
notes: |-
(S) The information system will be responsible for audting changes to
accounts and integrity of accounts to improve situational awareness. A
successful control response Automatically auditing account creation,
modification, enabling, disabling, and removal actions, and notifying
appropriate individuals is outside the scope of Red Hat Advanced Cluster
Management for Kubernetes.
rules: []
description: |-
The information system automatically audits account creation, modification, enabling, disabling, and removal actions, and notifies [Assignment: organization-defined personnel or roles].
Supplemental Guidance: Related controls: AU-2, AU-12.
AC-2 (4) [organization and/or service provider system owner]
title: >-
AC-2(4) - ACCOUNT MANAGEMENT | AUTOMATED AUDIT ACTIONS
levels:
- high
- moderate
- id: AC-2(5)
status: pending
notes: |-
(O|S) The organization will be responsible for requiring that users logout
when an organization-defined time-period of expected inactivity or
description of when to log out. A successful control response will
define account timeout and conditions when users shall log out. This
control is expected to be addressed at the organizational level for
policy guidance, and at the information system level for implimentation.
rules: []
description: |-
The organization requires that users log out when [Assignment: organization-defined time-period of expected inactivity or description of when to log out].
Supplemental Guidance: Related control: SC-23.
AC-2 (5) [inactivity is anticipated to exceed Fifteen (15) minutes]
AC-2 (5) Guidance: Should use a shorter timeframe than AC-12.
title: >-
AC-2(5) - ACCOUNT MANAGEMENT | INACTIVITY LOGOUT
levels:
- high
- moderate
- id: AC-2(6)
status: pending
notes: |-
(S) The information system will be responsible for implementing dynamic
privilege management capabilities for account management. A successful
control response will detail the mechanisms and processes used for
dynamic privilege management.
rules: []
- id: AC-2(7)
status: not applicable
notes: |-
Section a: (O) The organization will be responsible for establishing and
administering privileged accounts in accordance with a role-based access
(RBAC) scheme. A successful control response will need to address the
types of users or rules that receive privileged access as well as the
organization of the RBAC scheme.
Section b: (O) The organization will be responsible for monitoring privileged role
assignments. A successful control response will need to address the
process by which role assignments are reviewed for continued
appropriateness.
Section c: (O) The organization will be responsible for defining and executing
actions to take when privileged role assignments are no longer
appropriate. A successful control response will need to address the
criteria for determining whether assignments are no longer appropriate,
the actions to be taken, and the roles or personnel responsible for
taking those actions.
rules: []
description: |-
The organization:
(a) Establishes and administers privileged user accounts in accordance with a role-based access scheme that organizes allowed information system access and privileges into roles;
(b) Monitors privileged role assignments; and
(c) Takes [Assignment: organization-defined actions] when privileged role assignments are no longer appropriate.
Supplemental Guidance: Privileged roles are organization-defined roles assigned to individuals that allow those individuals to perform certain security-relevant functions that ordinary users are not authorized to perform. These privileged roles include, for example, key management, account management, network and system administration, database administration, and web administration.
AC-2 (7) (c) [disables/revokes access within a organization-specified timeframe]
title: >-
AC-2(7) - ACCOUNT MANAGEMENT | ROLE-BASED SCHEMES
levels:
- high
- moderate
- id: AC-2(8)
status: pending
notes: |-
(S) The information system will be responsible for creating system
accounts dynamically. A successful control response will need to address
the mechanisms used to create accounts dynamically.
rules: []
- id: AC-2(9)
status: not applicable
notes: |-
The customer will be responsible for defining and enforcing
conditions for the use of shared group accounts. A successful control
response will need to address the specific need for the existing of
a shared or group account versus multiple individual accounts, as well
as the process for reviewing membership of shared or group accounts to
verify that all individuals with access still require that access.
rules: []
description: |-
The organization only permits the use of shared/group accounts that meet [Assignment: organization-defined conditions for establishing shared/group accounts].
AC-2 (9) [organization-defined need with justification statement that explains why such accounts are necessary]
AC-2 (9) Required if shared/group accounts are deployed
title: >-
AC-2(9) - ACCOUNT MANAGEMENT | RESTRICTIONS ON USE OF SHARED GROUPS / ACCOUNTS
levels:
- high
- moderate
- id: AC-2(12)
status: pending
notes: |-
Section a: The organization will be responsible for monitoring information system
accounts for atypical use. A successful control response will relate
the monitoring activities required for this control to the auditing
activities in the AU control family, and will discuss the criteria
for atypical use.
Section b: The organization will be responsible for reporting atypical use of
information system accounts. A successful control response will
discuss the personnel or roles that must be notified and the process
for notification.
rules: []
description: |-
The organization:
(a) Monitors information system accounts for [Assignment: organization-defined atypical use]; and
(b) Reports atypical usage of information system accounts to [Assignment: organization-defined personnel or roles].
Supplemental Guidance: Atypical usage includes, for example, accessing information systems at certain times of the day and from locations that are not consistent with the normal usage patterns of individuals working in organizations. Related control: CA-7.
AC-2 (12) (b)[at a minimum, the ISSO and/or similar role within the organization]
AC-2 (12)(a) Guidance: Required for privileged accounts.
AC-2 (12)(b) Guidance: Required for privileged accounts.
title: >-
AC-2(12) - ACCOUNT MANAGEMENT | ACCOUNT MONITORING / ATYPICAL USAGE
levels:
- high
- moderate
- id: AC-2(13)
status: pending
notes: |-
The organization will be responsible for disabling accounts of users
posing a significant risk within an organizational-defined time
period of discovery of the risk. A successful control response defines
the time period and the processes to disable the account(s).
rules: []
description: |-
The organization disables accounts of users posing a significant risk within [Assignment: organization-defined time period] of discovery of the risk.
Supplemental Guidance: Users posing a significant risk to organizations include individuals for whom reliable evidence or intelligence indicates either the intention to use authorized access to information systems to cause harm or through whom adversaries will cause harm. Harm includes potential adverse impacts to organizational operations and assets, individuals, other organizations, or the Nation. Close coordination between authorizing officials, information system administrators, and human resource managers is essential in order for timely execution of this control enhancement. Related control: PS-4.
AC-2 (13) [one (1) hour]
title: >-
AC-2(13) - ACCOUNT MANAGEMENT | DISABLE ACCOUNTS FOR HIGH-RISK INDIVIDUALS
levels:
- high
- id: AC-5
status: pending
notes: |-
Section a: The customer will be responsible for defining separation of duties
between individuals so as to reduce the risk of insider threat without
collusion. A successful control response will need to consider the
possible actions a malicious insider could take to undermine the
security of the system, and delineate how duties are separated to
prevent or reduce the likelihood of those actions.
Section b: The customer will be responsible for documenting separation of duties.
A successful control response will need to address the location of this
documentation and the process for reviewing it if necessary.
Section c: The customer will be responsible for defining access authorizations
to support separation of duties, for example by using Role Based
Access Control. A successful control response will need to address
policy and technical enforcement of separation of duties.
rules: []
description: "The organization:\n a. Separates [Assignment: organization-defined\
\ duties of individuals];\n b. Documents separation of duties of individuals;\
\ and\n c. Defines information system access authorizations to support separation\
\ of duties.\n\nSupplemental Guidance: Separation of duties addresses the potential\
\ for abuse of authorized privileges and helps to reduce the risk of malevolent\
\ activity without collusion. Separation of duties includes, for example: (i)\
\ dividing mission functions and information system support functions among different\
\ individuals and/or roles; (ii) conducting information system support functions\
\ with different individuals (e.g., system management, programming, configuration\
\ management, quality assurance and testing, and network security); and (iii)\
\ ensuring security personnel administering access control functions do not also\
\ administer audit functions. Related controls: AC-3, AC-6, PE-3, PE-4, PS-2.\n\
\nControl Enhancements: None.\n\nReferences: None.\n\n \nAC-5 Guidance: CSPs\
\ have the option to provide a separation of duties matrix as an attachment to\
\ the SSP."
title: >-
AC-5 - SEPARATION OF DUTIES
levels:
- high
- moderate
- id: AC-6
status: pending
notes: |-
The customer will be responsible for following least-privilege
principles when granting authorized access. A successful control
response will need to address the use of business requirements
to determine the level of access required to perform each job function,
and how that is related to the role-based access control scheme used
within the system.
rules: []
description: |-
The organization employs the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions.
Supplemental Guidance: Organizations employ least privilege for specific duties and information systems. The principle of least privilege is also applied to information system processes, ensuring that the processes operate at privilege levels no higher than necessary to accomplish required organizational missions/business functions. Organizations consider the creation of additional processes, roles, and information system accounts as necessary, to achieve least privilege. Organizations also apply least privilege to the development, implementation, and operation of organizational information systems. Related controls: AC-2, AC-3, AC-5, CM-6, CM-7, PL-2.
References: None.
title: >-
AC-6 - LEAST PRIVILEGE
levels:
- high
- moderate
- id: AC-6(1)
status: pending
notes: |-
The customer will be responsible for defining key security functions
and security-relevant information, and for explicitly authorizing
access to those functions and information. A successful control response
will need to address the criteria used to determine which functions
and information require explicit access authorization.
rules: []
description: |-
The organization explicitly authorizes access to [Assignment: organization-defined security functions (deployed in hardware, software, and firmware) and security-relevant information].
Supplemental Guidance: Security functions include, for example, establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters. Security-relevant information includes, for example, filtering rules for routers/firewalls, cryptographic key management information, configuration parameters for security services, and access control lists. Explicitly authorized personnel include, for example, security administrators, system and network administrators, system security officers, system maintenance personnel, system programmers, and other privileged users. Related controls: AC-17, AC-18, AC-19.
AC-6 (1) [all functions not publicly accessible and all security-relevant information not publicly available]
title: >-
AC-6(1) - LEAST PRIVILEGE | AUTHORIZE ACCESS TO SECURITY FUNCTIONS
levels:
- high
- moderate
- id: AC-6(5)
status: pending
notes: |-
The customer will be responsible for defining specific personnel
or roles who require privileged access, and restricting privileged
access to those personnel or roles. A successful response will need
to address the job functions or responsibilities for which
privileged access is required.
rules: []
description: |-
The organization restricts privileged accounts on the information system to [Assignment:
organization-defined personnel or roles].
Supplemental Guidance: Privileged accounts, including super user accounts, are typically described as system administrator for various types of commercial off-the-shelf operating systems. Restricting privileged accounts to specific personnel or roles prevents day-to-day users from having access to privileged information/functions. Organizations may differentiate in the application of this control enhancement between allowed privileges for local accounts and for domain accounts provided organizations retain the ability to control information system configurations for key security parameters and as otherwise necessary to sufficiently mitigate risk. Related control: CM-6.
title: >-
AC-6(5) - LEAST PRIVILEGE | PRIVILEGED ACCOUNTS
levels:
- high
- moderate
- id: AC-14
status: pending
notes: |-
Section a: The customer will be responsible for identifying user actions that can
be performed on the information system without identification or
authentication consistent with missions/business functions. A
successful control response will identify such actions.
rules: []
description: "The organization:\n a. Identifies [Assignment: organization-defined\
\ user actions] that can be performed on the information system without identification\
\ or authentication consistent with organizational missions/business functions;\
\ and\n b. Documents and provides supporting rationale in the security plan for\
\ the information system, user actions not requiring identification or authentication.\n\
\nSupplemental Guidance: This control addresses situations in which organizations\
\ determine that no identification or authentication is required in organizational\
\ information systems. Organizations may allow a limited number of user actions\
\ without identification or authentication including, for example, when individuals\
\ access public websites or other publicly accessible federal information systems,\
\ when individuals use mobile phones to receive calls, or when facsimiles are\
\ received. Organizations also identify actions that normally require identification\
\ or authentication but may under certain circumstances (e.g., emergencies), allow\
\ identification or authentication mechanisms to be bypassed. Such bypasses may\
\ occur, for example, via a software-readable physical switch that commands bypass\
\ of the logon functionality and is protected from accidental or unmonitored use.\
\ This control does not apply to situations where identification and authentication\
\ have already occurred and are not repeated, but rather to situations where identification\
\ and authentication have not yet occurred. Organizations may decide that there\
\ are no user actions that can be performed on organizational information systems\
\ without identification and authentication and thus, the values for assignment\
\ statements can be none. Related controls: CP-2, IA-2.\n\nControl Enhancements:\
\ None.\n\n(1) PERMITTED ACTIONS WITHOUT IDENTIFICATION OR AUTHENTICATION |\
\ NECESSARY USES\n[Withdrawn: Incorporated into AC-14]. \n\nReferences: None."
title: >-
AC-14 - PERMITTED ACTIONS WITHOUT IDENTIFICATION OR
AUTHENTICATION
levels:
- high
- moderate
- low
- id: AC-17
status: pending
notes: |-
Section a: The customer will be responsible for establishing and documenting
usage restrictions, configuration and connection requirements, and
implementation guidance for access to the customer application
(note that in a cloud environment, all user access will be remote
access).
Section b: The customer will be responsible for authorizing remote access before
allowing such connections. Due to the nature of the cloud environment,
a successful control response will need to indicate that authorizing
remote access is equivalent to authorizing any access, and relate this
control to AC-2.
rules: []
description: |-
The organization:
a. Establishes and documents usage restrictions, configuration/connection requirements, and implementation guidance for each type of remote access allowed; and
b. Authorizes remote access to the information system prior to allowing such connections.
Supplemental Guidance: Remote access is access to organizational information systems by users (or processes acting on behalf of users) communicating through external networks (e.g., the Internet). Remote access methods include, for example, dial-up, broadband, and wireless. Organizations often employ encrypted virtual private networks (VPNs) to enhance confidentiality and integrity over remote connections. The use of encrypted VPNs does not make the access non-remote; however, the use of VPNs, when adequately provisioned with appropriate security controls (e.g., employing appropriate encryption techniques for confidentiality and integrity protection) may provide sufficient assurance to the organization that it can effectively treat such connections as internal networks. Still, VPN connections traverse external networks, and the encrypted VPN does not enhance the availability of remote connections. Also, VPNs with encrypted tunnels can affect the organizational capability to adequately monitor network communications traffic for malicious code. Remote access controls apply to information systems other than public web servers or systems designed for public access. This control addresses authorization prior to allowing remote access without specifying the formats for such authorization. While organizations may use interconnection security agreements to authorize remote access connections, such agreements are not required by this control. Enforcing access restrictions for remote connections is addressed in AC-3. Related controls: AC-2, AC-3, AC-18, AC-19, AC-20, CA-3, CA-7, CM-8, IA-2, IA-3, IA-8, MA-4, PE-17, PL-4, SC-10, SI-4.
References: NIST Special Publications 800-46, 800-77, 800-113, 800-114, 800-121.
title: >-
AC-17 - REMOTE ACCESS
levels:
- high
- moderate
- low
- id: AC-17(4)
status: pending
notes: |-
Section a: The customer will be responsible for authoring the execution of
privileged commands and access to security-relevant information via
remote access. Due to the nature of the cloud environment, a
successful control response will need to indicate that authorizing
these activities over remote access is equivalent to authorizing them
at all, and refer to AC-2.
Section b: The customer will be responsible for authorizing the execution of
privileged commands and access to security-relevant information via
remote access. Due to the nature of the cloud environment, a successful
control response will need to indicate that authorizing these activities
over remote access is equivalent to authorizing them at all, and refer
to AC-2.
rules: []
description: |-
The organization:
(a) Authorizes the execution of privileged commands and access to security-relevant information via remote access only for [Assignment: organization-defined needs]; and
(b) Documents the rationale for such access in the security plan for the information system.
Supplemental Guidance: Related control: AC-6.
title: >-
AC-17(4) - REMOTE ACCESS | PRIVILEGED COMMANDS / ACCESS
levels:
- high
- moderate
- id: AC-18
status: pending
notes: |-
Section a: Given the data center focus of the infrastructure running OpenShift,
it is likely this control is not applicable. A successful response
will document if wireless connectivity is enabled, and if so,
how usage and connection requirements were created.
Section b: A successful control response will document how connections are
authorized prior to recieving full connectivity to the wireless
network. This is frequently accomplished via WEP2 and other
encrption and/or passphrase requirements.
rules: []
description: |-
The organization:
a. Establishes usage restrictions, configuration/connection requirements, and implementation guidance for wireless access; and
b. Authorizes wireless access to the information system prior to allowing such connections.
Supplemental Guidance: Wireless technologies include, for example, microwave, packet radio (UHF/VHF), 802.11x, and Bluetooth. Wireless networks use authentication protocols (e.g., EAP/TLS, PEAP), which provide credential protection and mutual authentication. Related controls: AC-2, AC-3, AC-17, AC-19, CA-3, CA-7, CM-8, IA-2, IA-3, IA-8, PL-4, SI-4.
References: NIST Special Publications 800-48, 800-94, 800-97.
title: >-
AC-18 - WIRELESS ACCESS
levels:
- high
- moderate
- low
- id: AC-19
status: pending
notes: |-
Section a: A successful control response will document how, if wireless
connectivity is permitted, end-user devices are organizationally
managed (configurations, connections, and applications).
Section b: A successful control response will document how, if wireless
connectivity is permitted, mobile devices are authorized to
connect to organizational networks (e.g. MDM).
rules: []
description: |-
The organization:
a. Establishes usage restrictions, configuration requirements, connection requirements, and implementation guidance for organization-controlled mobile devices; and
b. Authorizes the connection of mobile devices to organizational information systems.
Supplemental Guidance: A mobile device is a computing device that: (i) has a small form factor such that it can easily be carried by a single individual; (ii) is designed to operate without a physical connection (e.g., wirelessly transmit or receive information); (iii) possesses local, non- removable or removable data storage; and (iv) includes a self-contained power source. Mobile devices may also include voice communication capabilities, on-board sensors that allow the device to capture information, and/or built-in features for synchronizing local data with remote locations. Examples include smart phones, E-readers, and tablets. Mobile devices are typically associated with a single individual and the device is usually in close proximity to the individual; however, the degree of proximity can vary depending upon on the form factor and size of the device. The processing, storage, and transmission capability of the mobile device may be comparable to or merely a subset of desktop systems, depending upon the nature and intended purpose of the device. Due to the large variety of mobile devices with different technical characteristics and capabilities, organizational restrictions may vary for the different classes/types of such devices. Usage restrictions and specific implementation guidance for mobile devices include, for example, configuration management, device identification and authentication, implementation of mandatory protective software (e.g., malicious code detection, firewall), scanning devices for malicious code, updating virus protection software, scanning for critical software updates and patches, conducting primary operating system (and possibly other resident software) integrity checks, and disabling unnecessary hardware (e.g., wireless, infrared). Organizations are cautioned that the need to provide adequate security for mobile devices goes beyond the requirements in this control. Many safeguards and countermeasures for mobile devices are reflected in other security controls in the catalog allocated in the initial control baselines as starting points for the development of security plans and overlays using the tailoring process. There may also be some degree of overlap in the requirements articulated by the security controls within the different families of controls. AC-20 addresses mobile devices that are not organization-controlled. Related controls: AC-3, AC-7, AC-18, AC-20, CA-9, CM-2, IA-2, IA-3, MP-2, MP-4, MP-5, PL-4, SC-7, SC-43, SI-3, SI-4.
References: OMB Memorandum 06-16; NIST Special Publications 800-114, 800-124, 800-164.
title: >-
AC-19 - ACCESS CONTROL FOR MOBILE DEVICES
levels:
- high
- moderate
- low
- id: AC-19(5)
status: pending
notes: |-
A successful control response will document how either full-device
encryption on mobile devices is being used. This is only applicable
if mobile is within scope of your security package.
rules: []
description: |-
The organization employs [Selection: full-device encryption; container encryption] to protect the confidentiality and integrity of information on [Assignment: organization-defined mobile devices].
Supplemental Guidance: Container-based encryption provides a more fine-grained approach to the encryption of data/information on mobile devices, including for example, encrypting selected data structures such as files, records, or fields. Related controls: MP-5, SC-13, SC-28.
References: OMB Memorandum 06-16; NIST Special Publications 800-114, 800-124, 800-164.
title: >-
AC-19(5) - ACCESS CONTROL FOR MOBILE DEVICES | FULL DEVICE / CONTAINER-BASED ENCRYPTION
levels:
- high
- moderate
- id: AC-20
status: pending
notes: |-
Section a: The organization will be responsible for establishing terms and conditions
allowing authorized individuals to access the organization application
from external information sysetms. A successful control response will
need to outline the terms and conditions and the external information
systems to which those terms and conditions apply.
Section b: The organization will be responsible for establishing terms and conditions
allowing authorized individuals to process, store, or transmit
customer-controlled information using external information systems. A
successful control response will need to outline the terms and
conditions and the external information systems to which those terms
and conditions apply.
rules: []
description: |-
The organization establishes terms and conditions, consistent with any trust relationships established with other organizations owning, operating, and/or maintaining external information systems, allowing authorized individuals to:
a. Access the information system from external information systems; and
b. Process, store, or transmit organization-controlled information using external information systems.
Supplemental Guidance: External information systems are information systems or components of information systems that are outside of the authorization boundary established by organizations and for which organizations typically have no direct supervision and authority over the application of required security controls or the assessment of control effectiveness. External information systems include, for example: (i) personally owned information systems/devices (e.g., notebook computers, smart phones, tablets, personal digital assistants); (ii) privately owned computing and communications devices resident in commercial or public facilities (e.g., hotels, train stations, convention centers, shopping malls, or airports); (iii) information systems owned or controlled by nonfederal governmental organizations; and (iv) federal information systems that are not owned by, operated by, or under the direct supervision and authority of organizations. This control also addresses the use of external information systems for the processing, storage, or transmission of
organizational information, including, for example, accessing cloud services (e.g., infrastructure as a service, platform as a service, or software as a service) from organizational information systems.
For some external information systems (i.e., information systems operated by other federal agencies, including organizations subordinate to those agencies), the trust relationships that have been established between those organizations and the originating organization may be such, that no explicit terms and conditions are required. Information systems within these organizations
would not be considered external. These situations occur when, for example, there are pre-existing sharing/trust agreements (either implicit or explicit) established between federal agencies or organizations subordinate to those agencies, or when such trust agreements are specified by applicable laws, Executive Orders, directives, or policies. Authorized individuals include, for example, organizational personnel, contractors, or other individuals with authorized access to organizational information systems and over which organizations have the authority to impose rules of behavior with regard to system access. Restrictions that organizations impose on authorized individuals need not be uniform, as those restrictions may vary depending upon the
trust relationships between organizations. Therefore, organizations may choose to impose different security restrictions on contractors than on state, local, or tribal governments.
This control does not apply to the use of external information systems to access public interfaces to organizational information systems (e.g., individuals accessing federal information through www.usa.gov). Organizations establish terms and conditions for the use of external information systems in accordance with organizational security policies and procedures. Terms and conditions address as a minimum: types of applications that can be accessed on organizational information systems from external information systems; and the highest security category of information that can be processed, stored, or transmitted on external information systems. If terms and conditions with the owners of external information systems cannot be established, organizations may impose restrictions on organizational personnel using those external systems. Related controls: AC-3, AC-17, AC-19, CA-3, PL-4, SA-9.
References: FIPS Publication 199.
title: >-
AC-20 - USE OF EXTERNAL INFORMATION SYSTEMS
levels:
- high
- moderate
- low
- id: AC-20(1)
status: pending
notes: |-
Section a: The organization will be responsible for verifying the implementation of
required security controls on external information systems used to
access the organization application. A successful control response will
need to address how this verification occurs (e.g. through an
independent assessment).
Section b: If part (a) is not possible, then the organization will be responsible
for establishing and retaining approved information system connection
or processing agreements with the external entity hosting the external
information system used to access the organization application.
rules: []
description: "The organization permits authorized individuals to use an external\
\ information system to access the information system or to process, store, or\
\ transmit organization-controlled information only when the organization:\n (a)\
\ Verifies the implementation of required security controls on the external\
\ system as specified in the organization\u2019s information security policy and\
\ security plan; or\n (b) Retains approved information system connection or\
\ processing agreements with the organizational entity hosting the external information\
\ system.\n\nSupplemental Guidance: This control enhancement recognizes that\
\ there are circumstances where individuals using external information systems\
\ (e.g., contractors, coalition partners) need to access organizational information\
\ systems. In those situations, organizations need confidence that the external\
\ information systems contain the necessary security safeguards (i.e., security\
\ controls), so as not to compromise, damage, or otherwise harm organizational\
\ information systems. Verification that the required security controls have been\
\ implemented can be achieved, for example, by third-party, independent assessments,\
\ attestations, or other means, depending on the confidence level required by\
\ organizations. Related control: CA-2."
title: >-
AC-20(1) - USE OF EXTERNAL INFORMATION SYSTEMS | LIMITS ON AUTHORIZED USE
levels:
- high
- moderate
- id: AC-20(2)
status: pending
notes: |-
The organization will be responsible for restricting or prohibiting the
use of customer-controlled portable storage devices on external
information systems. If such use is not prohibited, a successful
control repsonse will need to address specific restrictions on how
or under what conditions such use may occur.
rules: []
description: |-
The organization [Selection: restricts; prohibits] the use of organization-controlled portable storage devices by authorized individuals on external information systems.
Supplemental Guidance: Limits on the use of organization-controlled portable storage devices in external information systems include, for example, complete prohibition of the use of such devices or restrictions on how the devices may be used and under what conditions the devices may be used.
title: >-
AC-20(2) - USE OF EXTERNAL INFORMATION SYSTEMS | PORTABLE STORAGE DEVICES
levels:
- high
- moderate
- id: AC-21
status: pending
notes: |-
Section a: The organization will be responsible for determining when authorized users
are required to use discretion as to whether to share information. A
successful control response will need to address the circumstances
where user direction (rather than automatic access enforcement) is
required.
Section b: The organization will be responsible for defining and employing automated
mechanisms or manual processes to assist users in making information
sharing decisions.
rules: []
description: "The organization:\na. Facilitates information sharing by enabling\
\ authorized users to determine whether access authorizations assigned to the\
\ sharing partner match the access restrictions on the information for [Assignment:\
\ organization-defined information sharing circumstances where user discretion\
\ is required]; and\nb. Employs [Assignment: organization-defined automated mechanisms\
\ or manual processes] to assist users in making information sharing/collaboration\
\ decisions.\n\_\nSupplemental Guidance:\_This control applies to information\
\ that may be restricted in some manner (e.g., privileged medical information,\
\ contract-sensitive information, proprietary information, personally identifiable\
\ information, classified information related to special access programs or compartments)\
\ based on some formal or administrative determination. Depending on the particular\
\ information-sharing circumstances, sharing partners may be defined at the individual,\
\ group, or organizational level. Information may be defined by content, type,\
\ security category, or special access program/compartment. Related control: AC-3.\n\
\nReferences: None."
title: >-
AC-21 - INFORMATION SHARING
levels:
- high
- moderate
- id: AC-22
status: pending
notes: |-
Section a: The organization will be responsible for designating individuals
authorized to post information publicly. A successful control response
will need to address the specific business requirements or job functions
that justify such access.
Section b: The organization will be responsible for trianing designated authorized
individuals to prevent disclosure of nonpublic information. A
successful control response will need to outline the training
provided.
Section c: The organization will be responsible for reviewing information prior to
public posting to ensure that nonpublic information is not included. A
successful control response will need to address the roles or personnel
responsible for this review and the process for signoff.
Section d: The organization will be responsible for reviewing publicly available
information at the reqired frequency and removing nonpublic information
when discovered. A successful control response will need to address the
roles or personnel responsible for the review, the process used to
review publicly available information, and the process for removal of
nonpublic information.
rules: []
description: |-
The organization:
a. Designates individuals authorized to post information onto a publicly accessible information system;
b. Trains authorized individuals to ensure that publicly accessible information does not contain nonpublic information;
c. Reviews the proposed content of information prior to posting onto the publicly accessible information system to ensure that nonpublic information is not included; and
d. Reviews the content on the publicly accessible information system for nonpublic information [Assignment: organization-defined frequency] and removes such information, if discovered.
Supplemental Guidance: In accordance with federal laws, Executive Orders, directives, policies, regulations, standards, and/or guidance, the general public is not authorized access to nonpublic information (e.g., information protected under the Privacy Act and proprietary information). This control addresses information systems that are controlled by the organization and accessible to the general public, typically without identification or authentication. The posting of information on
non-organization information systems is covered by organizational policy. Related controls: AC-3, AC-4, AT-2, AT-3, AU-13.
Control Enhancements: None.
References: None.
AC-22 (d) [at least quarterly]
title: >-
AC-22 - PUBLICLY ACCESSIBLE CONTENT
levels:
- high
- moderate
- low
- id: AT-1
status: pending
notes: |-
Section a: The organization will be responsible for developing, documenting, and
disseminating Security Awareness and Training policy and procedures.
A successful control response will need to address the content of the
policy (which must include purpose, scope, roles, responsibilities,
management commitment, coordination, and compliance) and procedures
(which must facilitate the implementation of the policies and
associated controls).
Section b: The organization will be responsible for reviewing and updating the
Security Awareness and Training policy every 3 years, and procedures
annually. A successful control response will need to address the
review and update process, including the role(s) responsible for
initiating the review process, updating the policy and procedures,
and providing approval of the updates.
rules: []
description: "The organization:\n a. Develops, documents, and disseminates to [Assignment:\
\ organization-defined personnel or roles]:\n 1. A security awareness and training\
\ policy that addresses purpose, scope, roles, responsibilities, management commitment,\
\ coordination among organizational entities, and compliance; and\n 2. Procedures\
\ to facilitate the implementation of the security awareness and training policy\
\ and associated security awareness and training controls; and\n b. Reviews and\
\ updates the current:\n 1. Security awareness and training policy [Assignment:\
\ organization-defined frequency]; and\n 2. Security awareness and training\
\ procedures [Assignment: organization-defined frequency].\n\nSupplemental Guidance:\
\ This control addresses the establishment of policy and procedures for the effective\
\ implementation of selected security controls and control enhancements in the\
\ AT family. Policy and procedures reflect applicable federal laws, Executive\
\ Orders, directives, regulations, policies, standards, and guidance. Security\
\ program policies and procedures at the organization level may make the need\
\ for system-specific policies and procedures unnecessary. The policy can be included\
\ as part of the general information security policy for organizations or conversely,\
\ can be represented by multiple policies reflecting the complex nature of certain\
\ organizations. The procedures can be established for the security program in\
\ general and for particular information systems, if needed. The organizational\
\ risk management strategy is a key factor in establishing policy and procedures.\
\ Related control: PM-9.\n\nControl Enhancements: None.\n\nReferences: NIST\
\ Special Publications 800-12, 800-16, 800-50, 800-100.\n\nAT-1 (b) (1) [at least\
\ annually or whenever a significant change occurs] \nAT-1 (b) (2) [at least annually\
\ or whenever a significant change occurs]"
title: >-
AT-1 - SECURITY AWARENESS AND TRAINING POLICY ANDPROCEDURES
levels:
- high
- moderate
- low
- id: AT-2
status: pending
notes: |-
Section a: The customer will be responsible for providing basic security
awareness training as part of initial training. A successful control
response will outline the content of the training and will discuss the
process for ensuring that all users undergo the required training.
Section b: The customer will be responsible for providing updated basic security
awareness training as required by information system changes. A
succesful control response will discuss the process for determining
what information system changes require updated training, how the
training content is updated, and how users are notified of the need for
re-training.
Section c: The customer will be responsible for refreshing the basic security
awareness training annually. A successful control response will
discuss the process for ensuring that all users undergo the required
re-trianing.
rules: []
description: |-
The organization provides basic security awareness training to information system users (including managers, senior executives, and contractors):
a. As part of initial training for new users;
b. When required by information system changes; and
c. [Assignment: organization-defined frequency] thereafter.
Supplemental Guidance: Organizations determine the appropriate content of security awareness training and security awareness techniques based on the specific organizational requirements and the information systems to which personnel have authorized access. The content includes a basic understanding of the need for information security and user actions to maintain security and to respond to suspected security incidents. The content also addresses awareness of the need for operations security. Security awareness techniques can include, for example, displaying posters, offering supplies inscribed with security reminders, generating email advisories/notices from senior organizational officials, displaying logon screen messages, and conducting information security awareness events. Related controls: AT-3, AT-4, PL-4.
References: C.F.R. Part 5 Subpart C (5 C.F.R. 930.301); Executive Order 13587; NIST Special Publication 800-50.
AT-2 (c) [at least annually]
title: >-
AT-2 - SECURITY AWARENESS TRAINING
levels:
- high
- moderate
- low
- id: AT-2(2)
status: pending
notes: |-
The organization will be responsible for including information about
indicators of insider threat in security awareness training materials.
A successful control response will summarize potential indicators of
insider threat and outline the process for reporting them to appropriate
organizational officials.
rules: []
description: |-
The organization includes security awareness training on recognizing and reporting potential indicators of insider threat.
Supplemental Guidance: Potential indicators and possible precursors of insider threat can include behaviors such as inordinate, long-term job dissatisfaction, attempts to gain access to information not required for job performance, unexplained access to financial resources, bullying or sexual harassment of fellow employees, workplace violence, and other serious violations of organizational policies, procedures, directives, rules, or practices. Security awareness training includes how to communicate employee and management concerns regarding potential indicators of insider threat through appropriate organizational channels in accordance with established organizational policies and procedures. Related controls: PL-4, PM-12, PS-3, PS-6.
References: C.F.R. Part 5 Subpart C (5 C.F.R 930.301); Executive Order 13587; NIST Special Publication 800-50.
title: >-
AT-2(2) - SECURITY AWARENESS | INSIDER THREAT
levels:
- high
- moderate
- id: AT-3
status: pending
notes: |-
Section a: The organization will be responsible for providing role-based security
training prior to users commencing work on their system. A successful
control response will outline the content of the training (including
how the content varies by assigned role) and will discuss the process
for ensuring that all users undergo the required training for their
roles.
Section b: The organization will be responsible for providing updated role-based
security training as required by information system changes. A
successful control response will discuss the process for determining
what information system changes require updated training, how the
training content is updated, and hw users are notified of the need
for re-training.
Section c: The custmoer will be responsible for refreshing role-based security
training annually. A successful control response will discuss the
process for ensuring that all users undergo the required re-training.
rules: []
description: |-
The organization provides role-based security training to personnel with assigned security roles and responsibilities:
a. Before authorizing access to the information system or performing assigned duties;
b. When required by information system changes; and
c. [Assignment: organization-defined frequency] thereafter.
Supplemental Guidance: Organizations determine the appropriate content of security training based on the assigned roles and responsibilities of individuals and the specific security requirements of organizations and the information systems to which personnel have authorized access. In addition, organizations provide enterprise architects, information system developers, software developers, acquisition/procurement officials, information system managers, system/network administrators, personnel conducting configuration management and auditing activities, personnel performing independent verification and validation activities, security control assessors, and other personnel having access to system-level software, adequate security-related technical training specifically tailored for their assigned duties. Comprehensive role-based training addresses management, operational, and technical roles and responsibilities covering physical, personnel, and technical safeguards and countermeasures. Such training can include for example, policies, procedures, tools, and artifacts for the organizational security roles defined. Organizations also provide the training necessary for individuals to carry out their responsibilities related to operations and
supply chain security within the context of organizational information security programs. Role-based security training also applies to contractors providing services to federal agencies. Related controls: AT-2, AT-4, PL-4, PS-7, SA-3, SA-12, SA-16.
References: C.F.R. Part 5 Subpart C (5 C.F.R. 930.301); NIST Special Publications 800-16, 800-50.
AT-3 (c) [at least annually]
title: >-
AT-3 - ROLE-BASED SECURITY TRAINING
levels:
- high
- moderate
- low
- id: AT-4
status: pending
notes: |-
Section a: The organization will be responsible for tracking successful completion
of basic security awareness training and role-based training
security training activities. A successful control response will discuss
the process or system used to monitor and document completion of
training for each user.
Section b: The organization will be responsible for retaining training records for
the required timeframe. A successful control response will outline the
methods by which required retention is achieved.
rules: []
description: |-
The organization:
a. Documents and monitors individual information system security training activities including basic security awareness training and specific information system security training; and
b. Retains individual training records for [Assignment: organization-defined time period].
Supplemental Guidance: Documentation for specialized training may be maintained by individual supervisors at the option of the organization. Related controls: AT-2, AT-3, PM-14.
Control Enhancements: None.
References: None.
AT-4 (b) [five (5) years or 5 years after completion of a specific training program]
title: >-
AT-4 - SECURITY TRAINING RECORDS
levels:
- high
- moderate
- low
- id: AU-1
status: pending
notes: |-
Section a: The organization will be responsible for developing, documenting, and
disseminating Audit and Accountability policy and procedures. A
successful control repsonse will need to address the content of the
policy (which must include purpose, scope, roles, responsibilities,