forked from intuitem/ciso-assistant-community
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathnist-800-171-rev2.yaml
2584 lines (2573 loc) · 161 KB
/
nist-800-171-rev2.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
urn: urn:intuitem:risk:library:nist-800-171-rev2
locale: en
ref_id: nist-800-171-rev2
name: NIST SP 800-171 Rev. 2
description: 'Protecting Controlled Unclassified Information in Nonfederal Systems
and Organizations
https://csrc.nist.gov/pubs/sp/800/171/r2/upd1/final'
copyright: NIST
version: 1
provider: NIST
packager: intuitem
objects:
framework:
urn: urn:intuitem:risk:framework:nist-800-171-rev2
ref_id: nist-800-171-rev2
name: NIST SP 800-171 Rev. 2
description: 'Protecting Controlled Unclassified Information in Nonfederal Systems
and Organizations
https://csrc.nist.gov/pubs/sp/800/171/r2/upd1/final'
requirement_nodes:
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node2
assessable: false
depth: 1
name: Access Control
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.1
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node2
ref_id: 3.1.1
description: Limit system access to authorized users, processes acting on behalf
of authorized users, and devices (including other systems).
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node4
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.1
description: 'Access control policies (e.g., identity- or role-based policies,
control matrices, and cryptography) control access between active entities
or subjects (i.e., users or processes acting on behalf of users) and passive
entities or objects (e.g., devices, files, records, and domains) in systems.
Access enforcement mechanisms can be employed at the application and service
level to provide increased information security. Other systems include systems
internal and external to the organization. This requirement focuses on account
management for systems and applications. The definition of and enforcement
of access authorizations, other than those determined by account
type (e.g., privileged verses non-privileged) are addressed in requirement
3.1.2.'
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.2
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node2
ref_id: 3.1.2
description: Limit system access to the types of transactions and functions
that authorized users are permitted to execute.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node6
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.2
description: Organizations may choose to define access privileges or other attributes
by account, by type of account, or a combination of both. System account types
include individual, shared, group, system, anonymous, guest, emergency, developer,
manufacturer, vendor, and temporary. Other attributes required for authorizing
access include restrictions on time-of-day, day-of-week, and point-of-origin.
In defining other account attributes, organizations consider system-related
requirements (e.g., system upgrades scheduled maintenance,) and mission or
business requirements, (e.g., time zone differences, customer requirements,
remote access to support travel requirements).
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.3
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node2
ref_id: 3.1.3
description: Control the flow of CUI in accordance with approved authorizations.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node8
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.3
description: 'Information flow control regulates where information can travel
within a system and between systems (versus who can access the information)
and without explicit regard to subsequent accesses to that information. Flow
control restrictions include the following: keeping export-controlled information
from being transmitted in the clear to the Internet; blocking outside traffic
that claims to be from within the organization; restricting requests to the
Internet that are not from the internal web proxy server; and limiting information
transfers between organizations based on data structures and content. Organizations
commonly use information flow control policies and enforcement mechanisms
to control the flow of information between designated sources and destinations
(e.g., networks, individuals, and devices) within systems and between interconnected
systems. Flow control is based on characteristics of the information or the
information path. Enforcement occurs in boundary protection devices (e.g.,
gateways, routers, guards, encrypted tunnels, firewalls) that employ rule
sets or establish configuration settings that restrict system services, provide
a packet-filtering capability based on header information, or message-filtering
capability based on message content (e.g., implementing key word searches
or using document characteristics). Organizations also consider the trustworthiness
of filtering and inspection mechanisms (i.e., hardware, firmware, and software
components) that are critical to information flow enforcement. Transferring
information between systems representing different security domains with different
security policies introduces risk that such transfers violate one or more
domain security policies. In such situations, information owners or stewards
provide guidance at designated policy enforcement points between interconnected
systems. Organizations consider mandating specific architectural solutions
when required to enforce specific security policies. Enforcement includes:
prohibiting information transfers between interconnected systems (i.e., allowing
access only); employing hardware mechanisms to enforce one-way information
flows; and implementing trustworthy regrading mechanisms to reassign security
attributes and security labels.'
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.4
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node2
ref_id: 3.1.4
description: Separate the duties of individuals to reduce the risk of malevolent
activity without collusion.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node10
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.4
description: Separation of duties addresses the potential for abuse of authorized
privileges and helps to reduce the risk of malevolent activity without collusion.
Separation of duties includes dividing mission functions and system support
functions among different individuals or roles; conducting system support
functions with different individuals (e.g., configuration management, quality
assurance and testing, system management, programming, and network security);
and ensuring that security personnel administering access control functions
do not also administer audit functions. Because separation of duty violations
can span systems and application domains, organizations consider the entirety
of organizational systems and system components when developing policy on
separation of duties.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.5
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node2
ref_id: 3.1.5
description: Employ the principle of least privilege, including for specific
security functions and privileged accounts.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node12
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.5
description: Organizations employ the principle of least privilege for specific
duties and authorized accesses for users and processes. The principle of least
privilege is applied with the goal of authorized privileges no higher than
necessary to accomplish required organizational missions or business functions.
Organizations consider the creation of additional processes, roles, and system
accounts as necessary, to achieve least privilege. Organizations also apply
least privilege to the development, implementation, and operation of organizational
systems. Security functions include establishing system accounts, setting
events to be logged, setting intrusion detection parameters, and configuring
access authorizations (i.e., permissions, privileges). Privileged accounts,
including super user accounts, are typically described as system administrator
for various types of commercial off-the-shelf operating systems. Restricting
privileged accounts to specific personnel or roles prevents day-to-day users
from having access to privileged information or functions. Organizations may
differentiate in the application of this requirement between allowed privileges
for local accounts and for domain accounts provided organizations retain the
ability to control system configurations for key security parameters and as
otherwise necessary to sufficiently mitigate risk.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.6
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node2
ref_id: 3.1.6
description: Use non-privileged accounts or roles when accessing nonsecurity
functions
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node14
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.6
description: This requirement limits exposure when operating from within privileged
accounts or roles. The inclusion of roles addresses situations where organizations
implement access control policies such as role-based access control and where
a change of role provides the same degree of assurance in the change of access
authorizations for the user and all processes acting on behalf of the user
as would be provided by a change between a privileged and non-privileged account.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.7
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node2
ref_id: 3.1.7
description: Prevent non-privileged users from executing privileged functions
and capture the execution of such functions in audit logs.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node16
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.7
description: Privileged functions include establishing system accounts, performing
system integrity checks, conducting patching operations, or administering
cryptographic key management activities. Non-privileged users are individuals
that do not possess appropriate authorizations. Circumventing intrusion detection
and prevention mechanisms or malicious code protection mechanisms are examples
of privileged functions that require protection from non-privileged users.
Note that this requirement represents a condition to be achieved by the definition
of authorized privileges in 3.1.2. Misuse of privileged functions, either
intentionally or unintentionally by authorized users, or by unauthorized external
entities that have compromised system accounts, is a serious and ongoing concern
and can have significant adverse impacts on organizations. Logging the use
of privileged functions is one way to detect such misuse, and in doing so,
help mitigate the risk from insider threats and the advanced persistent threat.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.8
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node2
ref_id: 3.1.8
description: Limit unsuccessful logon attempts.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node18
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.8
description: This requirement applies regardless of whether the logon occurs
via a local or network connection. Due to the potential for denial of service,
automatic lockouts initiated by systems are, in most cases, temporary and
automatically release after a predetermined period established by the organization
(i.e., a delay algorithm). If a delay algorithm is selected, organizations
may employ different algorithms for different system components based on the
capabilities of the respective components. Responses to unsuccessful logon
attempts may be implemented at the operating system and application levels.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.9
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node2
ref_id: 3.1.9
description: Provide privacy and security notices consistent with applicable
CUI rules.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node20
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.9
description: System use notifications can be implemented using messages or warning
banners displayed before individuals log in to organizational systems. System
use notifications are used only for access via logon interfaces with human
users and are not required when such human interfaces do not exist. Based
on a risk assessment, organizations consider whether a secondary system use
notification is needed to access applications or other system resources after
the initial network logon. Where necessary, posters or other printed materials
may be used in lieu of an automated system banner. Organizations consult with
the Office of General Counsel for legal review and approval of warning banner
content
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.10
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node2
ref_id: 3.1.10
description: Use session lock with pattern-hiding displays to prevent access
and viewing of data after a period of inactivity
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node22
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.10
description: Session locks are temporary actions taken when users stop work
and move away from the immediate vicinity of the system but do not want to
log out because of the temporary nature of their absences. Session locks are
implemented where session activities can be determined, typically at the operating
system level (but can also be at the application level). Session locks are
not an acceptable substitute for logging out of the system, for example, if
organizations require users to log out at the end of the workday. Pattern-hiding
displays can include static or dynamic images, for example, patterns used
with screen savers, photographic images, solid colors, clock, battery life
indicator, or a blank screen, with the additional caveat that none of the
images convey controlled unclassified information.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.11
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node2
ref_id: 3.1.11
description: Terminate (automatically) a user session after a defined condition.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node24
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.11
description: "This requirement addresses the termination of user-initiated logical\
\ sessions in contrast to the termination of network connections that are\
\ associated with communications sessions (i.e., disconnecting from the network).\
\ A logical session (for local, network, and remote access) is initiated whenever\
\ a user (or process acting on behalf of a user) accesses an organizational\
\ system. Such user sessions can be terminated (and thus terminate user access)\
\ without terminating network sessions. Session termination terminates all\
\ processes associated with a user\u2019s logical session except those processes\
\ that are specifically created by the user (i.e., session owner) to continue\
\ after the session is terminated. Conditions or trigger events requiring\
\ automatic session termination can include organization-defined periods of\
\ user inactivity, targeted responses to certain types of incidents, and time-of-day\
\ restrictions on system use"
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.12
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node2
ref_id: 3.1.12
description: Monitor and control remote access sessions.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node26
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.12
description: Remote access is access to organizational systems by users (or
processes acting on behalf of users) communicating through external networks
(e.g., the Internet). Remote access methods include dial-up, broadband, and
wireless. Organizations often employ encrypted virtual private networks (VPNs)
to enhance confidentiality over remote connections. The use of encrypted VPNs
does not make the access non-remote; however, the use of VPNs, when adequately
provisioned with appropriate control (e.g., employing encryption techniques
for confidentiality protection), may provide sufficient assurance to the organization
that it can effectively treat such connections as internal networks. VPNs
with encrypted tunnels can affect the capability to adequately monitor network
communications traffic for malicious code. Automated monitoring and control
of remote access sessions allows organizations to detect cyber-attacks and
help to ensure ongoing compliance with remote access policies by auditing
connection activities of remote users on a variety of system components (e.g.,
servers, workstations, notebook computers, smart phones, and tablets). [SP
800-46], [SP 800-77], and [SP 800-113] provide guidance on secure remote access
and virtual private networks.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.13
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node2
ref_id: 3.1.13
description: Employ cryptographic mechanisms to protect the confidentiality
of remote access sessions.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node28
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.13
description: Cryptographic standards include FIPS-validated cryptography and
NSA-approved cryptography. See [NIST CRYPTO]; [NIST CAVP]; [NIST CMVP]; National
Security Agency Cryptographic Standards.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.14
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node2
ref_id: 3.1.14
description: Route remote access via managed access control points.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node30
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.14
description: Routing remote access through managed access control points enhances
explicit, organizational control over such connections, reducing the susceptibility
to unauthorized access to organizational systems resulting in the unauthorized
disclosure of CUI.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.15
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node2
ref_id: 3.1.15
description: Authorize remote execution of privileged commands and remote access
to security-relevant information.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node32
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.15
description: A privileged command is a human-initiated (interactively or via
a process operating on behalf of the human) command executed on a system involving
the control, monitoring, or administration of the system including security
functions and associated security-relevant information. Security-relevant
information is any information within the system that can potentially impact
the operation of security functions or the provision of security services
in a manner that could result in failure to enforce the system security policy
or maintain isolation of code and data. Privileged commands give individuals
the ability to execute sensitive, security-critical, or security-relevant
system functions. Controlling such access from remote locations helps to ensure
that unauthorized individuals are not able to execute such commands freely
with the potential to do serious or catastrophic damage to organizational
systems. Note that the ability to affect the integrity of the system is considered
security-relevant as that could enable the means to by-pass security functions
although not directly impacting the function itself.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.16
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node2
ref_id: 3.1.16
description: Authorize wireless access prior to allowing such connections
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node34
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.16
description: Establishing usage restrictions and configuration/connection requirements
for wireless access to the system provides criteria for organizations to support
wireless access authorization decisions. Such restrictions and requirements
reduce the susceptibility to unauthorized access to the system through wireless
technologies. Wireless networks use authentication protocols which provide
credential protection and mutual authentication. [SP 800-97] provides guidance
on secure wireless networks.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.17
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node2
ref_id: 3.1.17
description: Protect wireless access using authentication and encryption
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node36
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.17
description: Organizations authenticate individuals and devices to help protect
wireless access to the system. Special attention is given to the wide variety
of devices that are part of the Internet of Things with potential wireless
access to organizational systems. See [NIST CRYPTO].
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.18
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node2
ref_id: 3.1.18
description: Control connection of mobile devices.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node38
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.18
description: 'A mobile device is a computing device that has a small form factor
such that it can easily be carried by a single individual; is designed to
operate without a physical connection (e.g., wirelessly transmit or receive
information); possesses local, non-removable or removable data storage; and
includes a self-contained power source. Mobile devices may also include voice
communication capabilities, on-board sensors that allow the device to capture
information, or built-in features for synchronizing local data with remote
locations. Examples of mobile devices include smart phones, e-readers, and
tablets. Due to the large variety of mobile devices with different technical
characteristics and capabilities, organizational restrictions may vary for
the different types of devices. Usage restrictions and implementation guidance
for mobile devices include: device identification and authentication; configuration
management; implementation of mandatory protective software (e.g., malicious
code detection, firewall); scanning devices for malicious code; updating virus
protection software; scanning for critical software updates and patches; conducting
primary operating system (and possibly other resident software) integrity
checks; and disabling unnecessary hardware (e.g., wireless, infrared). The
need to provide adequate security for mobile devices goes beyond this requirement.
Many controls for mobile devices are reflected in other CUI security requirements. [SP
800-124] provides guidance on mobile device security.'
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.19
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node2
ref_id: 3.1.19
description: 'Encrypt CUI on mobile devices and mobile computing platforms.[23] '
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node40
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.19
description: 'Organizations can employ full-device encryption or container-based
encryption to protect the confidentiality of CUI on mobile devices and computing
platforms. Container-based encryption provides a more fine-grained approach
to the encryption of data and information including encrypting selected data
structures such as files, records, or fields. See [NIST CRYPTO].
[23] Mobile devices and computing platforms include, for example, smartphones
and tablets.'
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.20
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node2
ref_id: 3.1.20
description: Verify and control/limit connections to and use of external systems.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node42
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.20
description: "External systems are systems or components of systems for which\
\ organizations typically have no direct supervision and authority over the\
\ application of security requirements and controls or the determination of\
\ the effectiveness of implemented controls on those systems. External systems\
\ include personally owned systems, components, or devices and privately-owned\
\ computing and communications devices resident in commercial or public facilities.\
\ This requirement also addresses the use of external systems for the processing,\
\ storage, or transmission of CUI, including accessing cloud services (e.g.,\
\ infrastructure as a service, platform as a service, or software as a service)\
\ from organizational systems. Organizations establish terms and conditions\
\ for the use of external systems in accordance with organizational security\
\ policies and procedures. Terms and conditions address as a minimum, the\
\ types of applications that can be accessed on organizational systems from\
\ external systems. If terms and conditions with the owners of external systems\
\ cannot be established, organizations may impose restrictions on organizational\
\ personnel using those external systems. This requirement recognizes that\
\ there are circumstances where individuals using external systems (e.g.,\
\ contractors, coalition partners) need to access organizational systems.\
\ In those situations, organizations need confidence that the external systems\
\ contain the necessary controls so as not to compromise, damage, or otherwise\
\ harm organizational systems. Verification that the required controls have\
\ been effectively implemented can be achieved by third-party, independent\
\ assessments, attestations, or other means, depending on the assurance or\
\ confidence level required by organizations. Note that while \u201Cexternal\u201D\
\ typically refers to outside of the organization\u2019s direct supervision\
\ and authority, that is not always the case. Regarding the protection of\
\ CUI across an organization, the organization may have systems that process\
\ CUI and others that do not. And among the systems that process CUI there\
\ are likely access restrictions for CUI that apply between systems. Therefore,\
\ from the perspective of a given system, other systems within the organization\
\ may be considered \u201Cexternal\" to that system."
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.21
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node2
ref_id: 3.1.21
description: Limit use of portable storage devices on external systems.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node44
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.21
description: "Limits on the use of organization-controlled portable storage\
\ devices in external systems include complete prohibition of the use of such\
\ devices or restrictions on how the devices may be used and under what conditions\
\ the devices may be used. Note that while \u201Cexternal\u201D typically\
\ refers to outside of the organization\u2019s direct supervision and authority,\
\ that is not always the case. Regarding the protection of CUI across an\
\ organization, the organization may have systems that process CUI and others\
\ that do not. Among the systems that process CUI there are likely access\
\ restrictions for CUI that apply between systems. Therefore, from the perspective\
\ of a given system, other systems within the organization may be considered\
\ \u201Cexternal\" to that system."
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.22
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node2
ref_id: 3.1.22
description: Control CUI posted or processed on publicly accessible systems.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node46
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.1.22
description: In accordance with laws, Executive Orders, directives, policies,
regulations, or standards, the public is not authorized access to nonpublic
information (e.g., information protected under the Privacy Act, CUI, and proprietary
information). This requirement addresses systems that are controlled by the
organization and accessible to the public, typically without identification
or authentication. Individuals authorized to post CUI onto publicly accessible
systems are designated. The content of information is reviewed prior to posting
onto publicly accessible systems to ensure that nonpublic information is not
included.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node47
assessable: false
depth: 1
name: Awareness and Training
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.2.1
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node47
ref_id: 3.2.1
description: Ensure that managers, systems administrators, and users of organizational
systems are made aware of the security risks associated with their activities
and of the applicable policies, standards, and procedures related to the security
of those systems.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node49
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.2.1
description: 'Organizations determine the content and frequency of security
awareness training and security awareness techniques based on the specific
organizational requirements and the systems to which personnel have authorized
access. The content includes a basic understanding of the need for information
security and user actions to maintain security and to respond to suspected
security incidents. The content also addresses awareness of the need for operations
security. Security awareness techniques include: formal training; offering
supplies inscribed with security reminders; generating email advisories or
notices from organizational officials; displaying logon screen messages; displaying
security awareness posters; and conducting information security awareness
events. [SP 800-50] provides guidance on security awareness and training
programs.'
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.2.2
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node47
ref_id: 3.2.2
description: Ensure that personnel are trained to carry out their assigned information
security-related duties and responsibilities.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node51
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.2.2
description: Organizations determine the content and frequency of security training
based on the assigned duties, roles, and responsibilities of individuals and
the security requirements of organizations and the systems to which personnel
have authorized access. In addition, organizations provide system developers,
enterprise architects, security architects, acquisition/procurement officials,
software developers, system developers, systems integrators, system/network
administrators, personnel conducting configuration management and auditing
activities, personnel performing independent verification and validation,
security assessors, and other personnel having access to system-level software,
security-related technical training specifically tailored for their assigned
duties. Comprehensive role-based training addresses management, operational,
and technical roles and responsibilities covering physical, personnel, and
technical controls. Such training can include policies, procedures, tools,
and artifacts for the security roles defined. Organizations also provide the
training necessary for individuals to carry out their responsibilities related
to operations and supply chain security within the context of organizational
information security programs. [SP 800-181] provides guidance on role-based
information security training in the workplace. [SP 800-161] provides guidance
on supply chain risk management.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.2.3
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node47
ref_id: 3.2.3
description: Provide security awareness training on recognizing and reporting
potential indicators of insider threat.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node53
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.2.3
description: 'Potential indicators and possible precursors of insider threat
include behaviors such as: inordinate, long-term job dissatisfaction; attempts
to gain access to information that is not required for job performance; unexplained
access to financial resources; bullying or sexual harassment of fellow employees;
workplace violence; and other serious violations of the policies, procedures,
directives, rules, or practices of organizations. Security awareness training
includes how to communicate employee and management concerns regarding potential
indicators of insider threat through appropriate organizational channels in
accordance with established organizational policies and procedures. Organizations
may consider tailoring insider threat awareness topics to the role (e.g.,
training for managers may be focused on specific changes in behavior of team
members, while training for employees may be focused on more general observations).'
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node54
assessable: false
depth: 1
name: Audit and Accountability
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.3.1
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node54
ref_id: 3.3.1
description: Create and retain system audit logs and records to the extent needed
to enable the monitoring, analysis, investigation, and reporting of unlawful
or unauthorized system activity
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node56
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.3.1
description: An event is any observable occurrence in a system, which includes
unlawful or unauthorized system activity. Organizations identify event types
for which a logging functionality is needed as those events which are significant
and relevant to the security of systems and the environments in which those
systems operate to meet specific and ongoing auditing needs. Event types can
include password changes, failed logons or failed accesses related to systems,
administrative privilege usage, or third-party credential usage. In determining
event types that require logging, organizations consider the monitoring and
auditing appropriate for each of the CUI security requirements. Monitoring
and auditing requirements can be balanced with other system needs. For example,
organizations may determine that systems must have the capability to log every
file access both successful and unsuccessful, but not activate that capability
except for specific circumstances due to the potential burden on system performance. Audit
records can be generated at various levels of abstraction, including at the
packet level as information traverses the network. Selecting the appropriate
level of abstraction is a critical aspect of an audit logging capability and
can facilitate the identification of root causes to problems. Organizations
consider in the definition of event types, the logging necessary to cover
related events such as the steps in distributed, transaction-based processes
(e.g., processes that are distributed across multiple organizations) and actions
that occur in service-oriented or cloud-based architectures. Audit record
content that may be necessary to satisfy this requirement includes time stamps,
source and destination addresses, user or process identifiers, event descriptions,
success or fail indications, filenames involved, and access control or flow
control rules invoked. Event outcomes can include indicators of event success
or failure and event-specific results (e.g., the security state of the system
after the event occurred). Detailed information that organizations may consider
in audit records includes full text recording of privileged commands or the
individual identities of group account users. Organizations consider limiting
the additional audit log information to only that information explicitly needed
for specific audit requirements. This facilitates the use of audit trails
and audit logs by not including information that could potentially be misleading
or could make it more difficult to locate information of interest. Audit logs
are reviewed and analyzed as often as needed to provide important information
to organizations to facilitate risk-based decision making. [SP 800-92] provides
guidance on security log management.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.3.2
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node54
ref_id: 3.3.2
description: Ensure that the actions of individual system users can be uniquely
traced to those users, so they can be held accountable for their actions.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node58
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.3.2
description: This requirement ensures that the contents of the audit record
include the information needed to link the audit event to the actions of an
individual to the extent feasible. Organizations consider logging for traceability
including results from monitoring of account usage, remote access, wireless
connectivity, mobile device connection, communications at system boundaries,
configuration settings, physical access, nonlocal maintenance, use of maintenance
tools, temperature and humidity, equipment delivery and removal, system component
inventory, use of mobile code, and use of Voice over Internet Protocol (VoIP).
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.3.3
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node54
ref_id: 3.3.3
description: Review and update logged events.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node60
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.3.3
description: The intent of this requirement is to periodically re-evaluate which
logged events will continue to be included in the list of events to be logged.
The event types that are logged by organizations may change over time. Reviewing
and updating the set of logged event types periodically is necessary to ensure
that the current set remains necessary and sufficient.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.3.4
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node54
ref_id: 3.3.4
description: Alert in the event of an audit logging process failure.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node62
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.3.4
description: Audit logging process failures include software and hardware errors,
failures in the audit record capturing mechanisms, and audit record storage
capacity being reached or exceeded. This requirement applies to each audit
record data storage repository (i.e., distinct system component where audit
records are stored), the total audit record storage capacity of organizations
(i.e., all audit record data storage repositories combined), or both.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.3.5
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node54
ref_id: 3.3.5
description: Correlate audit record review, analysis, and reporting processes
for investigation and response to indications of unlawful, unauthorized, suspicious,
or unusual activity.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node64
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.3.5
description: Correlating audit record review, analysis, and reporting processes
helps to ensure that they do not operate independently, but rather collectively.
Regarding the assessment of a given organizational system, the requirement
is agnostic as to whether this correlation is applied at the system level
or at the organization level across all systems.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.3.6
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node54
ref_id: 3.3.6
description: Provide audit record reduction and report generation to support
on-demand analysis and reporting.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node66
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.3.6
description: Audit record reduction is a process that manipulates collected
audit information and organizes such information in a summary format that
is more meaningful to analysts. Audit record reduction and report generation
capabilities do not always emanate from the same system or organizational
entities conducting auditing activities. Audit record reduction capability
can include, for example, modern data mining techniques with advanced data
filters to identify anomalous behavior in audit records. The report generation
capability provided by the system can help generate customizable reports.
Time ordering of audit records can be a significant issue if the granularity
of the time stamp in the record is insufficient.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.3.7
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node54
ref_id: 3.3.7
description: Provide a system capability that compares and synchronizes internal
system clocks with an authoritative source to generate time stamps for audit
records
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node68
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.3.7
description: 'Internal system clocks are used to generate time stamps, which
include date and time. Time is expressed in Coordinated Universal Time (UTC),
a modern continuation of Greenwich Mean Time (GMT), or local time with an
offset from UTC. The granularity of time measurements refers to the degree
of synchronization between system clocks and reference clocks, for example,
clocks synchronizing within hundreds of milliseconds or within tens of milliseconds.
Organizations may define different time granularities for different system
components. Time service can also be critical to other security capabilities
such as access control and identification and authentication, depending on
the nature of the mechanisms used to support those capabilities. This requirement
provides uniformity of time stamps for systems with multiple system clocks
and systems connected over a network. See [IETF 5905]. '
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.3.8
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node54
ref_id: 3.3.8
description: Protect audit information and audit logging tools from unauthorized
access, modification, and deletion.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node70
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.3.8
description: Audit information includes all information (e.g., audit records,
audit log settings, and audit reports) needed to successfully audit system
activity. Audit logging tools are those programs and devices used to conduct
audit and logging activities. This requirement focuses on the technical protection
of audit information and limits the ability to access and execute audit logging
tools to authorized individuals. Physical protection of audit information
is addressed by media protection and physical and environmental protection
requirements.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.3.9
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node54
ref_id: 3.3.9
description: Limit management of audit logging functionality to a subset of
privileged users.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node72
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.3.9
description: Individuals with privileged access to a system and who are also
the subject of an audit by that system, may affect the reliability of audit
information by inhibiting audit logging activities or modifying audit records.
This requirement specifies that privileged access be further defined between
audit-related privileges and other privileges, thus limiting the users with
audit-related privileges
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node73
assessable: false
depth: 1
name: Configuration Management
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.4.1
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node73
ref_id: 3.4.1
description: Establish and maintain baseline configurations and inventories
of organizational systems (including hardware, software, firmware, and documentation)
throughout the respective system development life cycles.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node75
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.4.1
description: 'Baseline configurations are documented, formally reviewed, and
agreed-upon specifications for systems or configuration items within those
systems. Baseline configurations serve as a basis for future builds, releases,
and changes to systems. Baseline configurations include information about
system components (e.g., standard software packages installed on workstations,
notebook computers, servers, network components, or mobile devices; current
version numbers and update and patch information on operating systems and
applications; and configuration settings and parameters), network topology,
and the logical placement of those components within the system architecture.
Baseline configurations of systems also reflect the current enterprise architecture.
Maintaining effective baseline configurations requires creating new baselines
as organizational systems change over time. Baseline configuration maintenance
includes reviewing and updating the baseline configuration when changes are
made based on security risks and deviations from the established baseline
configuration. Organizations can implement centralized system component inventories
that include components from multiple organizational systems. In such situations,
organizations ensure that the resulting inventories include system-specific
information required for proper component accountability (e.g., system association,
system owner). Information deemed necessary for effective accountability of
system components includes hardware inventory specifications, software license
information, software version numbers, component owners, and for networked
components or devices, machine names and network addresses. Inventory specifications
include manufacturer, device type, model, serial number, and physical location. [SP
800-128] provides guidance on security-focused configuration management. '
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.4.2
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node73
ref_id: 3.4.2
description: Establish and enforce security configuration settings for information
technology products employed in organizational systems.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node77
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.4.2
description: 'Configuration settings are the set of parameters that can be changed
in hardware, software, or firmware components of the system that affect the
security posture or functionality of the system. Information technology products
for which security-related configuration settings can be defined include mainframe
computers, servers, workstations, input and output devices (e.g., scanners,
copiers, and printers), network components (e.g., firewalls, routers, gateways,
voice and data switches, wireless access points, network appliances, sensors),
operating systems, middleware, and applications. Security parameters are
those parameters impacting the security state of systems including the parameters
required to satisfy other security requirements. Security parameters include:
registry settings; account, file, directory permission settings; and settings
for functions, ports, protocols, and remote connections. Organizations establish
organization-wide configuration settings and subsequently derive specific
configuration settings for systems. The established settings become part of
the systems configuration baseline. Common secure configurations (also referred
to as security configuration checklists, lockdown and hardening guides, security
reference guides, security technical implementation guides) provide recognized,
standardized, and established benchmarks that stipulate secure configuration
settings for specific information technology platforms/products and instructions
for configuring those system components to meet operational requirements.
Common secure configurations can be developed by a variety of organizations
including information technology product developers, manufacturers, vendors,
consortia, academia, industry, federal agencies, and other organizations in
the public and private sectors. [SP 800-70] and [SP 800-128] provide guidance
on security configuration settings.'
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.4.3
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node73
ref_id: 3.4.3
description: Track, review, approve or disapprove, and log changes to organizational
systems.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node79
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.4.3
description: Tracking, reviewing, approving/disapproving, and logging changes
is called configuration change control. Configuration change control for organizational
systems involves the systematic proposal, justification, implementation, testing,
review, and disposition of changes to the systems, including system upgrades
and modifications. Configuration change control includes changes to baseline
configurations for components and configuration items of systems, changes
to configuration settings for information technology products (e.g., operating
systems, applications, firewalls, routers, and mobile devices), unscheduled
and unauthorized changes, and changes to remediate vulnerabilities. Processes
for managing configuration changes to systems include Configuration Control
Boards or Change Advisory Boards that review and approve proposed changes
to systems. For new development systems or systems undergoing major upgrades,
organizations consider including representatives from development organizations
on the Configuration Control Boards or Change Advisory Boards. Audit logs
of changes include activities before and after changes are made to organizational
systems and the activities required to implement such changes. [SP 800-128]
provides guidance on configuration change control.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.4.4
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node73
ref_id: 3.4.4
description: Analyze the security impact of changes prior to implementation.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node81
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.4.4
description: Organizational personnel with information security responsibilities
(e.g., system administrators, system security officers, system security managers,
and systems security engineers) conduct security impact analyses. Individuals
conducting security impact analyses possess the necessary skills and technical
expertise to analyze the changes to systems and the associated security ramifications.
Security impact analysis may include reviewing security plans to understand
security requirements and reviewing system design documentation to understand
the implementation of controls and how specific changes might affect the controls.
Security impact analyses may also include risk assessments to better understand
the impact of the changes and to determine if additional controls are required. [SP
800-128] provides guidance on configuration change control and security impact
analysis.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.4.5
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node73
ref_id: 3.4.5
description: Define, document, approve, and enforce physical and logical access
restrictions associated with changes to organizational systems.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node83
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.4.5
description: Any changes to the hardware, software, or firmware components of
systems can potentially have significant effects on the overall security of
the systems. Therefore, organizations permit only qualified and authorized
individuals to access systems for purposes of initiating changes, including
upgrades and modifications. Access restrictions for change also include software
libraries. Access restrictions include physical and logical access control
requirements, workflow automation, media libraries, abstract layers (e.g.,
changes implemented into external interfaces rather than directly into systems),
and change windows (e.g., changes occur only during certain specified times).
In addition to security concerns, commonly-accepted due diligence for configuration
management includes access restrictions as an essential part in ensuring the
ability to effectively manage the configuration. [SP 800-128] provides guidance
on configuration change control.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.4.6
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node73
ref_id: 3.4.6
description: Employ the principle of least functionality by configuring organizational
systems to provide only essential capabilities.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node85
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.4.6
description: Systems can provide a wide variety of functions and services. Some
of the functions and services routinely provided by default, may not be necessary
to support essential organizational missions, functions, or operations. It
is sometimes convenient to provide multiple services from single system components.
However, doing so increases risk over limiting the services provided by any
one component. Where feasible, organizations limit component functionality
to a single function per component. Organizations review functions and services
provided by systems or components of systems, to determine which functions
and services are candidates for elimination. Organizations disable unused
or unnecessary physical and logical ports and protocols to prevent unauthorized
connection of devices, transfer of information, and tunneling. Organizations
can utilize network scanning tools, intrusion detection and prevention systems,
and end-point protections such as firewalls and host-based intrusion detection
systems to identify and prevent the use of prohibited functions, ports, protocols,
and services.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.4.7
assessable: true
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node73
ref_id: 3.4.7
description: Restrict, disable, or prevent the use of nonessential programs,
functions, ports, protocols, and services.
- urn: urn:intuitem:risk:req_node:nist-800-171-rev2:node87
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-800-171-rev2:3.4.7
description: Restricting the use of nonessential software (programs) includes
restricting the roles allowed to approve program execution; prohibiting auto-execute;
program blacklisting and whitelisting; or restricting the number of program
instances executed at the same time. The organization makes a security-based