Professional Documents
Culture Documents
Revision 5
Last updated January 2023
Contact Information
CIS
31 Tech Valley Drive
East Greenbush, NY 12061
518.266.3460
controlsinfo@cisecurity.org
Editors
Thomas Sager
Contributors
Will Spier
License for Use
This work is licensed under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 International Publi
https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode
To further clarify the Creative Commons license related to the CIS ControlsTM content, you are authorized to copy a
organization and outside of your organization for non-commercial purposes only, provided that (i) appropriate credit
you remix, transform or build upon the CIS Controls, you may not distribute the modified materials. Users of the CIS
(http://www.cisecurity.org/controls/) when referring to the CIS Controls in order to ensure that users are employing th
subject to the prior approval of CIS® (Center for Internet Security, Inc.).
atives 4.0 International Public License (the link can be found at
you are authorized to copy and redistribute the content as a framework for use by you, within your
ed that (i) appropriate credit is given to CIS, and (ii) a link to the license is provided. Additionally, if
materials. Users of the CIS Controls framework are also required to refer to
e that users are employing the most up-to-date guidance. Commercial use of the CIS Controls is
Mapping Methodology
Mapping Methodology
This page describes the methodology used to map the CIS Critical Security Controls to NIST Special Publi
Reference link for NIST SP 800-53 R5: https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final
The methodology used to create the mapping can be useful to anyone attempting to understand the relatio
The overall goal for CIS mappings is to be as specific as possible, leaning towards under-mapping versus
It is not enough for two Controls to be related, it must be clear that implementing one Control will contribute
The general strategy used is to identify all of the aspects within a control and attempt to discern if both item
For a defensive mitigation to map to this CIS Safeguard it must have at least one of the following:
• A clearly documented process, covering both new employees and changes in access.
• All relevant enteprise access control must be covered under this process, there can be no seperation whe
• Automated tools are ideally used, such as a SSO provider or routing access control through a directory s
• The same process is followed every time a user's rights change, so a user never amasses greater rights
If the two concepts are effectively equal, they are mapped with the relationship "equivalent". If they are not
The relationships can be further analyzed to understand how similar or different the two defensive mitigatio
The relationship column will contain one of four possible values:
• Equivalent: The defensive mitigation contains the exact same security concept as the CIS Control.
• Superset: The CIS Control is partially or mostly related to the defensive mitigation in question, but the CIS
• Subset: The CIS Safeguard is partially or mostly related, yet is still subsumed within the defensive mitigat
• No relationship: This will be represented by a blank cell.
The relationships should be read from left to right, like a sentence. CIS Safeguard X is Equivalent to this <
Examples:
CIS Safeguard 16.8 "Separate Production and Non-Production Systems" is EQUIVALENT to NIST CSF PR
CIS Safeguard 3.5 "Securely Dispose of Data" is a SUBSET of NIST CSF PR.DS-3 "Assets are formally m
The CIS Controls are written with certain principles in mind, such as only having one ask per CIS Safeguar
relationship can often be "Subset."
Mappings are available from a variety of sources online, and different individuals may make their own deci
other mapping.
If you have comments, questions, or would like to report an error, please join the CIS Controls Mappings c
https://workbench.cisecurity.org/communities/94
Remember to download the CIS Controls Version 8 Guide where you can learn more about:
A free tool with a dynamic list of the CIS Safeguards that can be filtered by Implemtation Groups and
mappings to multiple frameworks.
https://www.cisecurity.org/controls/v8/
Join our community where you can discuss the CIS Controls with our global army of experts and
voluneers!
https://workbench.cisecurity.org/dashboard
CIS CIS Sub- Security
Asset Type Title
Control Control Function
1 Inventory and Control of Enterprise Assets
Actively manage (inventory, track, and correct)
network devices; non-computing/Internet of Th
virtually, remotely, and those within cloud envi
monitored and protected within the enterprise.
remove or remediate.
3 Data Protection
Develop processes and technical controls to id
Establish and Maintain a Data
3 3.1 Data Identify
Management Process
5 Account Management
Restrict Unnecessary or
9 9.4 Applications Protect Unauthorized Browser and Email
Client Extensions
Restrict Unnecessary or
9 9.4 Applications Protect Unauthorized Browser and Email
Client Extensions
Restrict Unnecessary or
9 9.4 Applications Protect Unauthorized Browser and Email
Client Extensions
9 9.5 Network Protect Implement DMARC
10 Malware Defenses
11 Data Recovery
Establish and maintain data recovery practices
trusted state.
Establish and Maintain a Data
11 11.1 Data Recover
Recovery Process
Network Infrastructure
12
Management
Establish, implement, and actively manage (tra
exploiting vulnerable network services and acc
Ensure Network Infrastructure is
12 12.1 Network Protect
Up-to-Date
18 Penetration Testing
of Enterprise Assets
tory, track, and correct) all enterprise assets (end-user devices, including portable and mobile;
omputing/Internet of Things (IoT) devices; and servers) connected to the infrastructure physically,
those within cloud environments, to accurately know the totality of assets that need to be
ed within the enterprise. This will also support identifying unauthorized and unmanaged assets to
Establish and maintain an accurate, detailed, and up-to-date inventory of all enterprise assets
with the potential to store or process data, to include: end-user devices (including portable and
mobile), network devices, non-computing/IoT devices, and servers. Ensure the inventory
records the network address (if static), hardware address, machine name, enterprise asset
owner, department for each asset, and whether the asset has been approved to connect to the
network. For mobile end-user devices, MDM type tools can support this process, where
appropriate. This inventory includes assets connected to the infrastructure physically, virtually,
remotely, and those within cloud environments. Additionally, it includes assets that are
regularly connected to the enterprise’s network infrastructure, even if they are not under control
of the enterprise. Review and update the inventory of all enterprise assets bi-annually, or more
frequently.
Establish and maintain an accurate, detailed, and up-to-date inventory of all enterprise assets
with the potential to store or process data, to include: end-user devices (including portable and
mobile), network devices, non-computing/IoT devices, and servers. Ensure the inventory
records the network address (if static), hardware address, machine name, enterprise asset
owner, department for each asset, and whether the asset has been approved to connect to the
network. For mobile end-user devices, MDM type tools can support this process, where
appropriate. This inventory includes assets connected to the infrastructure physically, virtually,
remotely, and those within cloud environments. Additionally, it includes assets that are
regularly connected to the enterprise’s network infrastructure, even if they are not under control
of the enterprise. Review and update the inventory of all enterprise assets bi-annually, or more
frequently.
Establish and maintain an accurate, detailed, and up-to-date inventory of all enterprise assets
with the potential to store or process data, to include: end-user devices (including portable and
mobile), network devices, non-computing/IoT devices, and servers. Ensure the inventory
records the network address (if static), hardware address, machine name, enterprise asset
owner, department for each asset, and whether the asset has been approved to connect to the
network. For mobile end-user devices, MDM type tools can support this process, where
appropriate. This inventory includes assets connected to the infrastructure physically, virtually,
remotely, and those within cloud environments. Additionally, it includes assets that are
regularly connected to the enterprise’s network infrastructure, even if they are not under control
of the enterprise. Review and update the inventory of all enterprise assets bi-annually, or more
frequently.
Ensure that a process exists to address unauthorized assets on a weekly basis. The enterprise
may choose to remove the asset from the network, deny the asset from connecting remotely to
the network, or quarantine the asset.
Utilize an active discovery tool to identify assets connected to the enterprise’s network.
Configure the active discovery tool to execute daily, or more frequently.
Use DHCP logging on all DHCP servers or Internet Protocol (IP) address management tools to
update the enterprise’s asset inventory. Review and use logs to update the enterprise’s asset
inventory weekly, or more frequently.
Use a passive discovery tool to identify assets connected to the enterprise’s network. Review
and use scans to update the enterprise’s asset inventory at least weekly, or more frequently.
Use a passive discovery tool to identify assets connected to the enterprise’s network. Review
and use scans to update the enterprise’s asset inventory at least weekly, or more frequently.
of Software Assets
tory, track, and correct) all software (operating systems and applications) on the network so that
re is installed and can execute, and that unauthorized and unmanaged software is found and
tion or execution.
Establish and maintain a detailed inventory of all licensed software installed on enterprise
assets. The software inventory must document the title, publisher, initial install/use date, and
business purpose for each entry; where appropriate, include the Uniform Resource Locator
(URL), app store(s), version(s), deployment mechanism, and decommission date. Review and
update the software inventory bi-annually, or more frequently.
Establish and maintain a detailed inventory of all licensed software installed on enterprise
assets. The software inventory must document the title, publisher, initial install/use date, and
business purpose for each entry; where appropriate, include the Uniform Resource Locator
(URL), app store(s), version(s), deployment mechanism, and decommission date. Review and
update the software inventory bi-annually, or more frequently.
Establish and maintain a detailed inventory of all licensed software installed on enterprise
assets. The software inventory must document the title, publisher, initial install/use date, and
business purpose for each entry; where appropriate, include the Uniform Resource Locator
(URL), app store(s), version(s), deployment mechanism, and decommission date. Review and
update the software inventory bi-annually, or more frequently.
Ensure that only currently supported software is designated as authorized in the software
inventory for enterprise assets. If software is unsupported, yet necessary for the fulfillment of
the enterprise’s mission, document an exception detailing mitigating controls and residual risk
acceptance. For any unsupported software without an exception documentation, designate as
unauthorized. Review the software list to verify software support at least monthly, or more
frequently.
Ensure that unauthorized software is either removed from use on enterprise assets or receives
a documented exception. Review monthly, or more frequently.
Ensure that unauthorized software is either removed from use on enterprise assets or receives
a documented exception. Review monthly, or more frequently.
Ensure that unauthorized software is either removed from use on enterprise assets or receives
a documented exception. Review monthly, or more frequently.
Ensure that unauthorized software is either removed from use on enterprise assets or receives
a documented exception. Review monthly, or more frequently.
Utilize software inventory tools, when possible, throughout the enterprise to automate the
discovery and documentation of installed software.
Use technical controls, such as application allowlisting, to ensure that only authorized software
can execute or be accessed. Reassess bi-annually, or more frequently.
Use technical controls, such as application allowlisting, to ensure that only authorized software
can execute or be accessed. Reassess bi-annually, or more frequently.
Use technical controls to ensure that only authorized software libraries, such as
specific .dll, .ocx, .so, etc., files, are allowed to load into a system process. Block unauthorized
libraries from loading into a system process. Reassess bi-annually, or more frequently.
Use technical controls to ensure that only authorized software libraries, such as
specific .dll, .ocx, .so, etc., files, are allowed to load into a system process. Block unauthorized
libraries from loading into a system process. Reassess bi-annually, or more frequently.
Use technical controls, such as digital signatures and version control, to ensure that only
authorized scripts, such as specific .ps1, .py, etc., files, are allowed to execute. Block
unauthorized scripts from executing. Reassess bi-annually, or more frequently.
Use technical controls, such as digital signatures and version control, to ensure that only
authorized scripts, such as specific .ps1, .py, etc., files, are allowed to execute. Block
unauthorized scripts from executing. Reassess bi-annually, or more frequently.
Use technical controls, such as digital signatures and version control, to ensure that only
authorized scripts, such as specific .ps1, .py, etc., files, are allowed to execute. Block
unauthorized scripts from executing. Reassess bi-annually, or more frequently.
Use technical controls, such as digital signatures and version control, to ensure that only
authorized scripts, such as specific .ps1, .py, etc., files, are allowed to execute. Block
unauthorized scripts from executing. Reassess bi-annually, or more frequently.
technical controls to identify, classify, securely handle, retain, and dispose of data.
Establish and maintain a data management process. In the process, address data sensitivity,
data owner, handling of data, data retention limits, and disposal requirements, based on
sensitivity and retention standards for the enterprise. Review and update documentation
annually, or when significant enterprise changes occur that could impact this Safeguard.
Establish and maintain a data management process. In the process, address data sensitivity,
data owner, handling of data, data retention limits, and disposal requirements, based on
sensitivity and retention standards for the enterprise. Review and update documentation
annually, or when significant enterprise changes occur that could impact this Safeguard.
Establish and maintain a data management process. In the process, address data sensitivity,
data owner, handling of data, data retention limits, and disposal requirements, based on
sensitivity and retention standards for the enterprise. Review and update documentation
annually, or when significant enterprise changes occur that could impact this Safeguard.
Establish and maintain a data inventory, based on the enterprise’s data management process.
Inventory sensitive data, at a minimum. Review and update inventory annually, at a minimum,
with a priority on sensitive data.
Establish and maintain a data inventory, based on the enterprise’s data management process.
Inventory sensitive data, at a minimum. Review and update inventory annually, at a minimum,
with a priority on sensitive data.
Establish and maintain a data inventory, based on the enterprise’s data management process.
Inventory sensitive data, at a minimum. Review and update inventory annually, at a minimum,
with a priority on sensitive data.
Establish and maintain a data inventory, based on the enterprise’s data management process.
Inventory sensitive data, at a minimum. Review and update inventory annually, at a minimum,
with a priority on sensitive data.
Establish and maintain a data inventory, based on the enterprise’s data management process.
Inventory sensitive data, at a minimum. Review and update inventory annually, at a minimum,
with a priority on sensitive data.
Configure data access control lists based on a user’s need to know. Apply data access control
lists, also known as access permissions, to local and remote file systems, databases, and
applications.
Configure data access control lists based on a user’s need to know. Apply data access control
lists, also known as access permissions, to local and remote file systems, databases, and
applications.
Configure data access control lists based on a user’s need to know. Apply data access control
lists, also known as access permissions, to local and remote file systems, databases, and
applications.
Configure data access control lists based on a user’s need to know. Apply data access control
lists, also known as access permissions, to local and remote file systems, databases, and
applications.
Retain data according to the enterprise’s data management process. Data retention must
include both minimum and maximum timelines.
Retain data according to the enterprise’s data management process. Data retention must
include both minimum and maximum timelines.
Securely dispose of data as outlined in the enterprise’s data management process. Ensure the
disposal process and method are commensurate with the data sensitivity.
Securely dispose of data as outlined in the enterprise’s data management process. Ensure the
disposal process and method are commensurate with the data sensitivity.
Encrypt data on end user devices, including workstations, laptops, tablets, and smartphones
containing sensitive data. Example implementations include, but are not limited to, Windows
BitLocker, Apple FileVault, Linux dm-crypt.
Establish and maintain an overall data classification scheme for the enterprise. Enterprises
may use labels, such as “Sensitive,” “Confidential,” and “Public,” and classify their data
according to those labels. Review and update the classification scheme annually, or when
significant enterprise changes occur that could impact this Safeguard.
Document data flows. Data flow documentation includes service provider data flows and should
be based on the enterprise’s data management process. Review and update documentation
annually, or when significant enterprise changes occur that could impact this Safeguard.
Document data flows. Data flow documentation includes service provider data flows and should
be based on the enterprise’s data management process. Review and update documentation
annually, or when significant enterprise changes occur that could impact this Safeguard.
Encrypt sensitive data in transit. Example implementations can include: Transport Layer
Security (TLS) and Open Secure Shell (OpenSSH).
Encrypt sensitive data in transit. Example implementations can include: Transport Layer
Security (TLS) and Open Secure Shell (OpenSSH).
Encrypt sensitive data in transit. Example implementations can include: Transport Layer
Security (TLS) and Open Secure Shell (OpenSSH).
Encrypt sensitive data in transit. Example implementations can include: Transport Layer
Security (TLS) and Open Secure Shell (OpenSSH).
Encrypt sensitive data in transit. Example implementations can include: Transport Layer
Security (TLS) and Open Secure Shell (OpenSSH).
Encrypt sensitive data at rest on servers, applications, and databases containing sensitive
data. Storage-layer encryption, also known as server-side encryption, meets the minimum
requirement of this Safeguard. Additional encryption methods may include application-layer
encryption, also known as client-side encryption, where access to the data storage device(s)
does not permit access to the plain-text data.
Encrypt sensitive data at rest on servers, applications, and databases containing sensitive
data. Storage-layer encryption, also known as server-side encryption, meets the minimum
requirement of this Safeguard. Additional encryption methods may include application-layer
encryption, also known as client-side encryption, where access to the data storage device(s)
does not permit access to the plain-text data.
Encrypt sensitive data at rest on servers, applications, and databases containing sensitive
data. Storage-layer encryption, also known as server-side encryption, meets the minimum
requirement of this Safeguard. Additional encryption methods may include application-layer
encryption, also known as client-side encryption, where access to the data storage device(s)
does not permit access to the plain-text data.
Segment data processing and storage based on the sensitivity of the data. Do not process
sensitive data on enterprise assets intended for lower sensitivity data.
Implement an automated tool, such as a host-based Data Loss Prevention (DLP) tool to
identify all sensitive data stored, processed, or transmitted through enterprise assets, including
those located onsite or at a remote service provider, and update the enterprise's sensitive data
inventory.
Implement an automated tool, such as a host-based Data Loss Prevention (DLP) tool to
identify all sensitive data stored, processed, or transmitted through enterprise assets, including
those located onsite or at a remote service provider, and update the enterprise's sensitive data
inventory.
Implement an automated tool, such as a host-based Data Loss Prevention (DLP) tool to
identify all sensitive data stored, processed, or transmitted through enterprise assets, including
those located onsite or at a remote service provider, and update the enterprise's sensitive data
inventory.
Implement an automated tool, such as a host-based Data Loss Prevention (DLP) tool to
identify all sensitive data stored, processed, or transmitted through enterprise assets, including
those located onsite or at a remote service provider, and update the enterprise's sensitive data
inventory.
Log sensitive data access, including modification and disposal.
Establish and maintain a secure configuration process for enterprise assets (end-user devices,
including portable and mobile, non-computing/IoT devices, and servers) and software
(operating systems and applications). Review and update documentation annually, or when
significant enterprise changes occur that could impact this Safeguard.
Establish and maintain a secure configuration process for enterprise assets (end-user devices,
including portable and mobile, non-computing/IoT devices, and servers) and software
(operating systems and applications). Review and update documentation annually, or when
significant enterprise changes occur that could impact this Safeguard.
Establish and maintain a secure configuration process for enterprise assets (end-user devices,
including portable and mobile, non-computing/IoT devices, and servers) and software
(operating systems and applications). Review and update documentation annually, or when
significant enterprise changes occur that could impact this Safeguard.
Establish and maintain a secure configuration process for enterprise assets (end-user devices,
including portable and mobile, non-computing/IoT devices, and servers) and software
(operating systems and applications). Review and update documentation annually, or when
significant enterprise changes occur that could impact this Safeguard.
Establish and maintain a secure configuration process for enterprise assets (end-user devices,
including portable and mobile, non-computing/IoT devices, and servers) and software
(operating systems and applications). Review and update documentation annually, or when
significant enterprise changes occur that could impact this Safeguard.
Establish and maintain a secure configuration process for enterprise assets (end-user devices,
including portable and mobile, non-computing/IoT devices, and servers) and software
(operating systems and applications). Review and update documentation annually, or when
significant enterprise changes occur that could impact this Safeguard.
Establish and maintain a secure configuration process for enterprise assets (end-user devices,
including portable and mobile, non-computing/IoT devices, and servers) and software
(operating systems and applications). Review and update documentation annually, or when
significant enterprise changes occur that could impact this Safeguard.
Establish and maintain a secure configuration process for enterprise assets (end-user devices,
including portable and mobile, non-computing/IoT devices, and servers) and software
(operating systems and applications). Review and update documentation annually, or when
significant enterprise changes occur that could impact this Safeguard.
Establish and maintain a secure configuration process for network devices. Review and update
documentation annually, or when significant enterprise changes occur that could impact this
Safeguard.
Establish and maintain a secure configuration process for network devices. Review and update
documentation annually, or when significant enterprise changes occur that could impact this
Safeguard.
Establish and maintain a secure configuration process for network devices. Review and update
documentation annually, or when significant enterprise changes occur that could impact this
Safeguard.
Establish and maintain a secure configuration process for network devices. Review and update
documentation annually, or when significant enterprise changes occur that could impact this
Safeguard.
Establish and maintain a secure configuration process for network devices. Review and update
documentation annually, or when significant enterprise changes occur that could impact this
Safeguard.
Establish and maintain a secure configuration process for network devices. Review and update
documentation annually, or when significant enterprise changes occur that could impact this
Safeguard.
Establish and maintain a secure configuration process for network devices. Review and update
documentation annually, or when significant enterprise changes occur that could impact this
Safeguard.
Establish and maintain a secure configuration process for network devices. Review and update
documentation annually, or when significant enterprise changes occur that could impact this
Safeguard.
Configure automatic session locking on enterprise assets after a defined period of inactivity.
For general purpose operating systems, the period must not exceed 15 minutes. For mobile
end-user devices, the period must not exceed 2 minutes.
Configure automatic session locking on enterprise assets after a defined period of inactivity.
For general purpose operating systems, the period must not exceed 15 minutes. For mobile
end-user devices, the period must not exceed 2 minutes.
Configure automatic session locking on enterprise assets after a defined period of inactivity.
For general purpose operating systems, the period must not exceed 15 minutes. For mobile
end-user devices, the period must not exceed 2 minutes.
Configure automatic session locking on enterprise assets after a defined period of inactivity.
For general purpose operating systems, the period must not exceed 15 minutes. For mobile
end-user devices, the period must not exceed 2 minutes.
Implement and manage a firewall on servers, where supported. Example implementations
include a virtual firewall, operating system firewall, or a third-party firewall agent.
Implement and manage a host-based firewall or port-filtering tool on end-user devices, with a
default-deny rule that drops all traffic except those services and ports that are explicitly
allowed.
Implement and manage a host-based firewall or port-filtering tool on end-user devices, with a
default-deny rule that drops all traffic except those services and ports that are explicitly
allowed.
Securely manage enterprise assets and software. Example implementations include managing
configuration through version-controlled-infrastructure-as-code and accessing administrative
interfaces over secure network protocols, such as Secure Shell (SSH) and Hypertext Transfer
Protocol Secure (HTTPS). Do not use insecure management protocols, such as Telnet
(Teletype Network) and HTTP, unless operationally essential.
Manage default accounts on enterprise assets and software, such as root, administrator, and
other pre-configured vendor accounts. Example implementations can include: disabling default
accounts or making them unusable.
Remotely wipe enterprise data from enterprise-owned portable end-user devices when deemed
appropriate such as lost or stolen devices, or when an individual no longer supports the
enterprise.
Remotely wipe enterprise data from enterprise-owned portable end-user devices when deemed
appropriate such as lost or stolen devices, or when an individual no longer supports the
enterprise.
Ensure separate enterprise workspaces are used on mobile end-user devices, where
supported. Example implementations include using an Apple® Configuration Profile or
Android™ Work Profile to separate enterprise applications and data from personal applications
and data.
Ensure separate enterprise workspaces are used on mobile end-user devices, where
supported. Example implementations include using an Apple® Configuration Profile or
Android™ Work Profile to separate enterprise applications and data from personal applications
and data.
ls to assign and manage authorization to credentials for user accounts, including administrator
rvice accounts, to enterprise assets and software.
Establish and maintain an inventory of all accounts managed in the enterprise. The inventory
must include both user and administrator accounts. The inventory, at a minimum, should
contain the person’s name, username, start/stop dates, and department. Validate that all active
accounts are authorized, on a recurring schedule at a minimum quarterly, or more frequently.
Use unique passwords for all enterprise assets. Best practice implementation includes, at a
minimum, an 8-character password for accounts using MFA and a 14-character password for
accounts not using MFA.
Delete or disable any dormant accounts after a period of 45 days of inactivity, where
supported.
ls to create, assign, manage, and revoke access credentials and privileges for user, administrator,
or enterprise assets and software.
Establish and follow a process, preferably automated, for granting access to enterprise assets
upon new hire, rights grant, or role change of a user.
Establish and follow a process, preferably automated, for granting access to enterprise assets
upon new hire, rights grant, or role change of a user.
Establish and follow a process, preferably automated, for granting access to enterprise assets
upon new hire, rights grant, or role change of a user.
Establish and follow a process, preferably automated, for granting access to enterprise assets
upon new hire, rights grant, or role change of a user.
Establish and follow a process, preferably automated, for granting access to enterprise assets
upon new hire, rights grant, or role change of a user.
Establish and follow a process, preferably automated, for revoking access to enterprise assets,
through disabling accounts immediately upon termination, rights revocation, or role change of a
user. Disabling accounts, instead of deleting accounts, may be necessary to preserve audit
trails.
Establish and follow a process, preferably automated, for revoking access to enterprise assets,
through disabling accounts immediately upon termination, rights revocation, or role change of a
user. Disabling accounts, instead of deleting accounts, may be necessary to preserve audit
trails.
Establish and follow a process, preferably automated, for revoking access to enterprise assets,
through disabling accounts immediately upon termination, rights revocation, or role change of a
user. Disabling accounts, instead of deleting accounts, may be necessary to preserve audit
trails.
Require all externally-exposed enterprise or third-party applications to enforce MFA, where
supported. Enforcing MFA through a directory service or SSO provider is a satisfactory
implementation of this Safeguard.
Require MFA for all administrative access accounts, where supported, on all enterprise assets,
whether managed on-site or through a third-party provider.
Establish and maintain an inventory of the enterprise’s authentication and authorization
systems, including those hosted on-site or at a remote service provider. Review and update the
inventory, at a minimum, annually, or more frequently.
Centralize access control for all enterprise assets through a directory service or SSO provider,
where supported.
Centralize access control for all enterprise assets through a directory service or SSO provider,
where supported.
Define and maintain role-based access control, through determining and documenting the
access rights necessary for each role within the enterprise to successfully carry out its
assigned duties. Perform access control reviews of enterprise assets to validate that all
privileges are authorized, on a recurring schedule at a minimum annually, or more frequently.
Define and maintain role-based access control, through determining and documenting the
access rights necessary for each role within the enterprise to successfully carry out its
assigned duties. Perform access control reviews of enterprise assets to validate that all
privileges are authorized, on a recurring schedule at a minimum annually, or more frequently.
Define and maintain role-based access control, through determining and documenting the
access rights necessary for each role within the enterprise to successfully carry out its
assigned duties. Perform access control reviews of enterprise assets to validate that all
privileges are authorized, on a recurring schedule at a minimum annually, or more frequently.
Define and maintain role-based access control, through determining and documenting the
access rights necessary for each role within the enterprise to successfully carry out its
assigned duties. Perform access control reviews of enterprise assets to validate that all
privileges are authorized, on a recurring schedule at a minimum annually, or more frequently.
Define and maintain role-based access control, through determining and documenting the
access rights necessary for each role within the enterprise to successfully carry out its
assigned duties. Perform access control reviews of enterprise assets to validate that all
privileges are authorized, on a recurring schedule at a minimum annually, or more frequently.
Define and maintain role-based access control, through determining and documenting the
access rights necessary for each role within the enterprise to successfully carry out its
assigned duties. Perform access control reviews of enterprise assets to validate that all
privileges are authorized, on a recurring schedule at a minimum annually, or more frequently.
ty Management
nuously assess and track vulnerabilities on all enterprise assets within the enterprise’s
to remediate, and minimize, the window of opportunity for attackers. Monitor public and private
w threat and vulnerability information.
Establish and maintain a documented vulnerability management process for enterprise assets.
Review and update documentation annually, or when significant enterprise changes occur that
could impact this Safeguard.
Perform operating system updates on enterprise assets through automated patch management
on a monthly, or more frequent, basis.
Perform operating system updates on enterprise assets through automated patch management
on a monthly, or more frequent, basis.
Perform operating system updates on enterprise assets through automated patch management
on a monthly, or more frequent, basis.
Perform operating system updates on enterprise assets through automated patch management
on a monthly, or more frequent, basis.
Perform application updates on enterprise assets through automated patch management on a
monthly, or more frequent, basis.
nd retain audit logs of events that could help detect, understand, or recover from an attack.
Establish and maintain an audit log management process that defines the enterprise’s logging
requirements. At a minimum, address the collection, review, and retention of audit logs for
enterprise assets. Review and update documentation annually, or when significant enterprise
changes occur that could impact this Safeguard.
Establish and maintain an audit log management process that defines the enterprise’s logging
requirements. At a minimum, address the collection, review, and retention of audit logs for
enterprise assets. Review and update documentation annually, or when significant enterprise
changes occur that could impact this Safeguard.
Collect audit logs. Ensure that logging, per the enterprise’s audit log management process, has
been enabled across enterprise assets.
Collect audit logs. Ensure that logging has been enabled across end-user devices,
applications, and network infrastructure.
Collect audit logs. Ensure that logging has been enabled across end-user devices,
applications, and network infrastructure.
Ensure that logging destinations maintain adequate storage to comply with the enterprise’s
audit log management process.
Standardize time synchronization. Configure at least two synchronized time sources across
enterprise assets, where supported.
Configure detailed audit logging for enterprise assets containing sensitive data. Include event
source, date, username, timestamp, source addresses, destination addresses, and other
useful elements that could assist in a forensic investigation.
Configure detailed audit logging for enterprise assets containing sensitive data. Include event
source, date, username, timestamp, source addresses, destination addresses, and other
useful elements that could assist in a forensic investigation.
Configure detailed audit logging for enterprise assets containing sensitive data. Include event
source, date, username, timestamp, source addresses, destination addresses, and other
useful elements that could assist in a forensic investigation.
Configure detailed audit logging for enterprise assets containing sensitive data. Include event
source, date, username, timestamp, source addresses, destination addresses, and other
useful elements that could assist in a forensic investigation.
Collect DNS query audit logs on enterprise assets, where appropriate and supported.
Collect URL request audit logs on enterprise assets, where appropriate and supported.
Collect command-line audit logs. Example implementations include collecting audit logs from
PowerShell®, BASH™, and remote administrative terminals.
Centralize, to the extent possible, audit log collection and retention across enterprise assets.
Conduct reviews of audit logs to detect anomalies or abnormal events that could indicate a
potential threat. Conduct reviews on a weekly, or more frequent, basis.
Conduct reviews of audit logs to detect anomalies or abnormal events that could indicate a
potential threat. Conduct reviews on a weekly, or more frequent, basis.
Conduct reviews of audit logs to detect anomalies or abnormal events that could indicate a
potential threat. Conduct reviews on a weekly, or more frequent, basis.
Collect service provider logs, where supported. Example implementations include collecting
authentication and authorization events, data creation and disposal events, and user
management events.
r Protections
d detections of threats from email and web vectors, as these are opportunities for attackers to
avior through direct engagement.
Ensure only fully supported browsers and email clients are allowed to execute in the enterprise,
only using the latest version of browsers and email clients provided through the vendor.
Ensure only fully supported browsers and email clients are allowed to execute in the enterprise,
only using the latest version of browsers and email clients provided through the vendor.
Use DNS filtering services on all enterprise assets to block access to known malicious
domains.
Enforce and update network-based URL filters to limit an enterprise asset from connecting to
potentially malicious or unapproved websites. Example implementations include category-
based filtering, reputation-based filtering, or through the use of block lists. Enforce filters for all
enterprise assets.
Enforce and update network-based URL filters to limit an enterprise asset from connecting to
potentially malicious or unapproved websites. Example implementations include category-
based filtering, reputation-based filtering, or through the use of block lists. Enforce filters for all
enterprise assets.
Block unnecessary file types attempting to enter the enterprise’s email gateway.
Block unnecessary file types attempting to enter the enterprise’s email gateway.
Deploy and maintain email server anti-malware protections, such as attachment scanning
and/or sandboxing.
Deploy and maintain email server anti-malware protections, such as attachment scanning
and/or sandboxing.
nstallation, spread, and execution of malicious applications, code, or scripts on enterprise assets.
Configure automatic updates for anti-malware signature files on all enterprise assets.
Disable autorun and autoplay auto-execute functionality for removable media.
Enable anti-exploitation features on enterprise assets and software, where possible, such as
Microsoft® Data Execution Prevention (DEP), Windows® Defender Exploit Guard (WDEG), or
Apple® System Integrity Protection (SIP) and Gatekeeper™.
data recovery practices sufficient to restore in-scope enterprise assets to a pre-incident and
Establish and maintain a data recovery process. In the process, address the scope of data
recovery activities, recovery prioritization, and the security of backup data. Review and update
documentation annually, or when significant enterprise changes occur that could impact this
Safeguard.
Establish and maintain a data recovery process. In the process, address the scope of data
recovery activities, recovery prioritization, and the security of backup data. Review and update
documentation annually, or when significant enterprise changes occur that could impact this
Safeguard.
Perform automated backups of in-scope enterprise assets. Run backups weekly, or more
frequently, based on the sensitivity of the data.
Perform automated backups of in-scope enterprise assets. Run backups weekly, or more
frequently, based on the sensitivity of the data.
Protect recovery data with equivalent controls to the original data. Reference encryption or data
separation, based on requirements.
Protect recovery data with equivalent controls to the original data. Reference encryption or data
separation, based on requirements.
Protect recovery data with equivalent controls to the original data. Reference encryption or data
separation, based on requirements.
Establish and maintain an isolated instance of recovery data. Example implementations
include, version controlling backup destinations through offline, cloud, or off-site systems or
services.
Establish and maintain an isolated instance of recovery data. Example implementations
include, version controlling backup destinations through offline, cloud, or off-site systems or
services.
Test backup recovery quarterly, or more frequently, for a sampling of in-scope enterprise
assets.
Test backup recovery quarterly, or more frequently, for a sampling of in-scope enterprise
assets.
nd actively manage (track, report, correct) network devices, in order to prevent attackers from
etwork services and access points.
Ensure network infrastructure is kept up-to-date. Example implementations include running the
latest stable release of software and/or using currently supported network-as-a-service (NaaS)
offerings. Review software versions monthly, or more frequently, to verify software support.
Establish and maintain a secure network architecture. A secure network architecture must
address segmentation, least privilege, and availability, at a minimum.
Establish and maintain a secure network architecture. A secure network architecture must
address segmentation, least privilege, and availability, at a minimum.
Establish and maintain a secure network architecture. A secure network architecture must
address segmentation, least privilege, and availability, at a minimum.
Establish and maintain a secure network architecture. A secure network architecture must
address segmentation, least privilege, and availability, at a minimum.
Establish and maintain a secure network architecture. A secure network architecture must
address segmentation, least privilege, and availability, at a minimum.
Establish and maintain a secure network architecture. A secure network architecture must
address segmentation, least privilege, and availability, at a minimum.
Establish and maintain a secure network architecture. A secure network architecture must
address segmentation, least privilege, and availability, at a minimum.
Establish and maintain architecture diagram(s) and/or other network system documentation.
Review and update documentation annually, or when significant enterprise changes occur that
could impact this Safeguard.
Use secure network management and communication protocols (e.g., 802.1X, Wi-Fi Protected
Access 2 (WPA2) Enterprise or greater).
Use secure network management and communication protocols (e.g., 802.1X, Wi-Fi Protected
Access 2 (WPA2) Enterprise or greater).
tooling to establish and maintain comprehensive network monitoring and defense against
the enterprise’s network infrastructure and user base.
Centralize security event alerting across enterprise assets for log correlation and analysis. Best
practice implementation requires the use of a SIEM, which includes vendor-defined event
correlation alerts. A log analytics platform configured with security-relevant correlation alerts
also satisfies this Safeguard.
Centralize security event alerting across enterprise assets for log correlation and analysis. Best
practice implementation requires the use of a SIEM, which includes vendor-defined event
correlation alerts. A log analytics platform configured with security-relevant correlation alerts
also satisfies this Safeguard.
Centralize security event alerting across enterprise assets for log correlation and analysis. Best
practice implementation requires the use of a SIEM, which includes vendor-defined event
correlation alerts. A log analytics platform configured with security-relevant correlation alerts
also satisfies this Safeguard.
Centralize security event alerting across enterprise assets for log correlation and analysis. Best
practice implementation requires the use of a SIEM, which includes vendor-defined event
correlation alerts. A log analytics platform configured with security-relevant correlation alerts
also satisfies this Safeguard.
Centralize security event alerting across enterprise assets for log correlation and analysis. Best
practice implementation requires the use of a SIEM, which includes vendor-defined event
correlation alerts. A log analytics platform configured with security-relevant correlation alerts
also satisfies this Safeguard.
Deploy a host-based intrusion detection solution on enterprise assets, where appropriate
and/or supported.
Manage access control for assets remotely connecting to enterprise resources. Determine
amount of access to enterprise resources based on: up-to-date anti-malware software
installed, configuration compliance with the enterprise’s secure configuration process, and
ensuring the operating system and applications are up-to-date.
Manage access control for assets remotely connecting to enterprise resources. Determine
amount of access to enterprise resources based on: up-to-date anti-malware software
installed, configuration compliance with the enterprise’s secure configuration process, and
ensuring the operating system and applications are up-to-date.
Manage access control for assets remotely connecting to enterprise resources. Determine
amount of access to enterprise resources based on: up-to-date anti-malware software
installed, configuration compliance with the enterprise’s secure configuration process, and
ensuring the operating system and applications are up-to-date.
Manage access control for assets remotely connecting to enterprise resources. Determine
amount of access to enterprise resources based on: up-to-date anti-malware software
installed, configuration compliance with the enterprise’s secure configuration process, and
ensuring the operating system and applications are up-to-date.
Collect network traffic flow logs and/or network traffic to review and alert upon from network
devices.
Collect network traffic flow logs and/or network traffic to review and alert upon from network
devices.
Deploy port-level access control. Port-level access control utilizes 802.1x, or similar network
access control protocols, such as certificates, and may incorporate user and/or device
authentication.
Deploy port-level access control. Port-level access control utilizes 802.1x, or similar network
access control protocols, such as certificates, and may incorporate user and/or device
authentication.
d Skills Training
a security awareness program to influence behavior among the workforce to be security
y skilled to reduce cybersecurity risks to the enterprise.
Establish and maintain a security awareness program. The purpose of a security awareness
program is to educate the enterprise’s workforce on how to interact with enterprise assets and
data in a secure manner. Conduct training at hire and, at a minimum, annually. Review and
update content annually, or when significant enterprise changes occur that could impact this
Safeguard.
Establish and maintain a security awareness program. The purpose of a security awareness
program is to educate the enterprise’s workforce on how to interact with enterprise assets and
data in a secure manner. Conduct training at hire and, at a minimum, annually. Review and
update content annually, or when significant enterprise changes occur that could impact this
Safeguard.
Establish and maintain a security awareness program. The purpose of a security awareness
program is to educate the enterprise’s workforce on how to interact with enterprise assets and
data in a secure manner. Conduct training at hire and, at a minimum, annually. Review and
update content annually, or when significant enterprise changes occur that could impact this
Safeguard.
Train workforce members to recognize social engineering attacks, such as phishing, pre-
texting, and tailgating.
Train workforce members on authentication best practices. Example topics include MFA,
password composition, and credential management.
Train workforce members on how to identify and properly store, transfer, archive, and destroy
sensitive data. This also includes training workforce members on clear screen and desk best
practices, such as locking their screen when they step away from their enterprise asset,
erasing physical and virtual whiteboards at the end of meetings, and storing data and assets
securely.
Train workforce members to be aware of causes for unintentional data exposure. Example
topics include mis-delivery of sensitive data, losing a portable end-user device, or publishing
data to unintended audiences.
Train workforce members to be able to recognize a potential incident and be able to report
such an incident.
Train workforce to understand how to verify and report out-of-date software patches or any
failures in automated processes and tools. Part of this training should include notifying IT
personnel of any failures in automated processes and tools.
Train workforce members on the dangers of connecting to, and transmitting data over, insecure
networks for enterprise activities. If the enterprise has remote workers, training must include
guidance to ensure that all users securely configure their home network infrastructure.
Conduct role-specific security awareness and skills training. Example implementations include
secure system administration courses for IT professionals, OWASP® Top 10 vulnerability
awareness and prevention training for web application developers, and advanced social
engineering awareness training for high-profile roles.
valuate service providers who hold sensitive data, or are responsible for an enterprise’s critical IT
, to ensure these providers are protecting those platforms and data appropriately.
Establish and maintain an inventory of service providers. The inventory is to list all known
service providers, include classification(s), and designate an enterprise contact for each
service provider. Review and update the inventory annually, or when significant enterprise
changes occur that could impact this Safeguard.
Establish and maintain a service provider management policy. Ensure the policy addresses the
classification, inventory, assessment, monitoring, and decommissioning of service providers.
Review and update the policy annually, or when significant enterprise changes occur that could
impact this Safeguard.
Establish and maintain a service provider management policy. Ensure the policy addresses the
classification, inventory, assessment, monitoring, and decommissioning of service providers.
Review and update the policy annually, or when significant enterprise changes occur that could
impact this Safeguard.
Establish and maintain a service provider management policy. Ensure the policy addresses the
classification, inventory, assessment, monitoring, and decommissioning of service providers.
Review and update the policy annually, or when significant enterprise changes occur that could
impact this Safeguard.
Establish and maintain a service provider management policy. Ensure the policy addresses the
classification, inventory, assessment, monitoring, and decommissioning of service providers.
Review and update the policy annually, or when significant enterprise changes occur that could
impact this Safeguard.
Establish and maintain a service provider management policy. Ensure the policy addresses the
classification, inventory, assessment, monitoring, and decommissioning of service providers.
Review and update the policy annually, or when significant enterprise changes occur that could
impact this Safeguard.
Assess service providers consistent with the enterprise’s service provider management policy.
Assessment scope may vary based on classification(s), and may include review of
standardized assessment reports, such as Service Organization Control 2 (SOC 2) and
Payment Card Industry (PCI) Attestation of Compliance (AoC), customized questionnaires, or
other appropriately rigorous processes. Reassess service providers annually, at a minimum, or
with new and renewed contracts.
Assess service providers consistent with the enterprise’s service provider management policy.
Assessment scope may vary based on classification(s), and may include review of
standardized assessment reports, such as Service Organization Control 2 (SOC 2) and
Payment Card Industry (PCI) Attestation of Compliance (AoC), customized questionnaires, or
other appropriately rigorous processes. Reassess service providers annually, at a minimum, or
with new and renewed contracts.
Assess service providers consistent with the enterprise’s service provider management policy.
Assessment scope may vary based on classification(s), and may include review of
standardized assessment reports, such as Service Organization Control 2 (SOC 2) and
Payment Card Industry (PCI) Attestation of Compliance (AoC), customized questionnaires, or
other appropriately rigorous processes. Reassess service providers annually, at a minimum, or
with new and renewed contracts.
Monitor service providers consistent with the enterprise’s service provider management policy.
Monitoring may include periodic reassessment of service provider compliance, monitoring
service provider release notes, and dark web monitoring.
Monitor service providers consistent with the enterprise’s service provider management policy.
Monitoring may include periodic reassessment of service provider compliance, monitoring
service provider release notes, and dark web monitoring.
Monitor service providers consistent with the enterprise’s service provider management policy.
Monitoring may include periodic reassessment of service provider compliance, monitoring
service provider release notes, and dark web monitoring.
Securely decommission service providers. Example considerations include user and service
account deactivation; termination of data flows; and secure disposal of enterprise data within
service provider systems.
ecurity
e cycle of in-house developed, hosted, or acquired software to prevent, detect, and remediate
efore they can impact the enterprise.
Establish and maintain a secure application development process. In the process, address
such items as: secure application design standards, secure coding practices, developer
training, vulnerability management, security of third-party code, and application security testing
procedures. Review and update documentation annually, or when significant enterprise
changes occur that could impact this Safeguard.
Establish and maintain a secure application development process. In the process, address
such items as: secure application design standards, secure coding practices, developer
training, vulnerability management, security of third-party code, and application security testing
procedures. Review and update documentation annually, or when significant enterprise
changes occur that could impact this Safeguard.
Establish and maintain a process to accept and address reports of software vulnerabilities,
including providing a means for external entities to report. The process is to include such items
as: a vulnerability handling policy that identifies reporting process, responsible party for
handling vulnerability reports, and a process for intake, assignment, remediation, and
remediation testing. As part of the process, use a vulnerability tracking system that includes
severity ratings, and metrics for measuring timing for identification, analysis, and remediation of
vulnerabilities. Review and update documentation annually, or when significant enterprise
changes occur that could impact this Safeguard.
Third-party application developers need to consider this an externally-facing policy that helps to
set expectations for outside stakeholders.
Establish and maintain a process to accept and address reports of software vulnerabilities,
including providing a means for external entities to report. The process is to include such items
as: a vulnerability handling policy that identifies reporting process, responsible party for
handling vulnerability reports, and a process for intake, assignment, remediation, and
remediation testing. As part of the process, use a vulnerability tracking system that includes
severity ratings, and metrics for measuring timing for identification, analysis, and remediation of
vulnerabilities. Review and update documentation annually, or when significant enterprise
changes occur that could impact this Safeguard.
Third-party application developers need to consider this an externally-facing policy that helps to
set expectations for outside stakeholders.
Establish and maintain a process to accept and address reports of software vulnerabilities,
including providing a means for external entities to report. The process is to include such items
as: a vulnerability handling policy that identifies reporting process, responsible party for
handling vulnerability reports, and a process for intake, assignment, remediation, and
remediation testing. As part of the process, use a vulnerability tracking system that includes
severity ratings, and metrics for measuring timing for identification, analysis, and remediation of
vulnerabilities. Review and update documentation annually, or when significant enterprise
changes occur that could impact this Safeguard.
Third-party application developers need to consider this an externally-facing policy that helps to
set expectations for outside stakeholders.
Establish and maintain a process to accept and address reports of software vulnerabilities,
including providing a means for external entities to report. The process is to include such items
as: a vulnerability handling policy that identifies reporting process, responsible party for
handling vulnerability reports, and a process for intake, assignment, remediation, and
remediation testing. As part of the process, use a vulnerability tracking system that includes
severity ratings, and metrics for measuring timing for identification, analysis, and remediation of
vulnerabilities. Review and update documentation annually, or when significant enterprise
changes occur that could impact this Safeguard.
Third-party application developers need to consider this an externally-facing policy that helps to
set expectations for outside stakeholders.
Perform root cause analysis on security vulnerabilities. When reviewing vulnerabilities, root
cause analysis is the task of evaluating underlying issues that create vulnerabilities in code,
and allows development teams to move beyond just fixing individual vulnerabilities as they
arise.
Use up-to-date and trusted third-party software components. When possible, choose
established and proven frameworks and libraries that provide adequate security. Acquire these
components from trusted sources or evaluate the software for vulnerabilities before use.
Establish and maintain a severity rating system and process for application vulnerabilities that
facilitates prioritizing the order in which discovered vulnerabilities are fixed. This process
includes setting a minimum level of security acceptability for releasing code or applications.
Severity ratings bring a systematic way of triaging vulnerabilities that improves risk
management and helps ensure the most severe bugs are fixed first. Review and update the
system and process annually.
Use standard, industry-recommended hardening configuration templates for application
infrastructure components. This includes underlying servers, databases, and web servers, and
applies to cloud containers, Platform as a Service (PaaS) components, and SaaS components.
Do not allow in-house developed software to weaken configuration hardening.
Ensure that all software development personnel receive training in writing secure code for their
specific development environment and responsibilities. Training can include general security
principles and application security standard practices. Conduct training at least annually and
design in a way to promote security within the development team, and build a culture of
security among the developers.
Apply secure design principles in application architectures. Secure design principles include the
concept of least privilege and enforcing mediation to validate every operation that the user
makes, promoting the concept of "never trust user input." Examples include ensuring that
explicit error checking is performed and documented for all input, including for size, data type,
and acceptable ranges or formats. Secure design also means minimizing the application
infrastructure attack surface, such as turning off unprotected ports and services, removing
unnecessary programs and files, and renaming or removing default accounts.
Apply secure design principles in application architectures. Secure design principles include the
concept of least privilege and enforcing mediation to validate every operation that the user
makes, promoting the concept of "never trust user input." Examples include ensuring that
explicit error checking is performed and documented for all input, including for size, data type,
and acceptable ranges or formats. Secure design also means minimizing the application
infrastructure attack surface, such as turning off unprotected ports and services, removing
unnecessary programs and files, and renaming or removing default accounts.
Leverage vetted modules or services for application security components, such as identity
management, encryption, and auditing and logging. Using platform features in critical security
functions will reduce developers’ workload and minimize the likelihood of design or
implementation errors. Modern operating systems provide effective mechanisms for
identification, authentication, and authorization and make those mechanisms available to
applications. Use only standardized, currently accepted, and extensively reviewed encryption
algorithms. Operating systems also provide mechanisms to create and maintain secure audit
logs.
Apply static and dynamic analysis tools within the application life cycle to verify that secure
coding practices are being followed.
Apply static and dynamic analysis tools within the application life cycle to verify that secure
coding practices are being followed.
Conduct threat modeling. Threat modeling is the process of identifying and addressing
application security design flaws within a design, before code is created. It is conducted
through specially trained individuals who evaluate the application design and gauge security
risks for each entry point and access level. The goal is to map out the application, architecture,
and infrastructure in a structured way to understand its weaknesses.
develop and maintain an incident response capability (e.g., policies, plans, procedures, defined
mmunications) to prepare, detect, and quickly respond to an attack.
Designate one key person, and at least one backup, who will manage the enterprise’s incident
handling process. Management personnel are responsible for the coordination and
documentation of incident response and recovery efforts and can consist of employees internal
to the enterprise, third-party vendors, or a hybrid approach. If using a third-party vendor,
designate at least one person internal to the enterprise to oversee any third-party work. Review
annually, or when significant enterprise changes occur that could impact this Safeguard.
Designate one key person, and at least one backup, who will manage the enterprise’s incident
handling process. Management personnel are responsible for the coordination and
documentation of incident response and recovery efforts and can consist of employees internal
to the enterprise, third-party vendors, or a hybrid approach. If using a third-party vendor,
designate at least one person internal to the enterprise to oversee any third-party work. Review
annually, or when significant enterprise changes occur that could impact this Safeguard.
Designate one key person, and at least one backup, who will manage the enterprise’s incident
handling process. Management personnel are responsible for the coordination and
documentation of incident response and recovery efforts and can consist of employees internal
to the enterprise, third-party vendors, or a hybrid approach. If using a third-party vendor,
designate at least one person internal to the enterprise to oversee any third-party work. Review
annually, or when significant enterprise changes occur that could impact this Safeguard.
Establish and maintain contact information for parties that need to be informed of security
incidents. Contacts may include internal staff, third-party vendors, law enforcement, cyber
insurance providers, relevant government agencies, Information Sharing and Analysis Center
(ISAC) partners, or other stakeholders. Verify contacts annually to ensure that information is
up-to-date.
Establish and maintain contact information for parties that need to be informed of security
incidents. Contacts may include internal staff, third-party vendors, law enforcement, cyber
insurance providers, relevant government agencies, Information Sharing and Analysis Center
(ISAC) partners, or other stakeholders. Verify contacts annually to ensure that information is
up-to-date.
Establish and maintain contact information for parties that need to be informed of security
incidents. Contacts may include internal staff, third-party vendors, law enforcement, cyber
insurance providers, relevant government agencies, Information Sharing and Analysis Center
(ISAC) partners, or other stakeholders. Verify contacts annually to ensure that information is
up-to-date.
Establish and maintain an enterprise process for the workforce to report security incidents. The
process includes reporting timeframe, personnel to report to, mechanism for reporting, and the
minimum information to be reported. Ensure the process is publicly available to all of the
workforce. Review annually, or when significant enterprise changes occur that could impact
this Safeguard.
Establish and maintain an enterprise process for the workforce to report security incidents. The
process includes reporting timeframe, personnel to report to, mechanism for reporting, and the
minimum information to be reported. Ensure the process is publicly available to all of the
workforce. Review annually, or when significant enterprise changes occur that could impact
this Safeguard.
Establish and maintain an enterprise process for the workforce to report security incidents. The
process includes reporting timeframe, personnel to report to, mechanism for reporting, and the
minimum information to be reported. Ensure the process is publicly available to all of the
workforce. Review annually, or when significant enterprise changes occur that could impact
this Safeguard.
Establish and maintain an enterprise process for the workforce to report security incidents. The
process includes reporting timeframe, personnel to report to, mechanism for reporting, and the
minimum information to be reported. Ensure the process is publicly available to all of the
workforce. Review annually, or when significant enterprise changes occur that could impact
this Safeguard.
Establish and maintain an incident response process that addresses roles and responsibilities,
compliance requirements, and a communication plan. Review annually, or when significant
enterprise changes occur that could impact this Safeguard.
Establish and maintain an incident response process that addresses roles and responsibilities,
compliance requirements, and a communication plan. Review annually, or when significant
enterprise changes occur that could impact this Safeguard.
Establish and maintain an incident response process that addresses roles and responsibilities,
compliance requirements, and a communication plan. Review annually, or when significant
enterprise changes occur that could impact this Safeguard.
Establish and maintain an incident response process that addresses roles and responsibilities,
compliance requirements, and a communication plan. Review annually, or when significant
enterprise changes occur that could impact this Safeguard.
Establish and maintain an incident response process that addresses roles and responsibilities,
compliance requirements, and a communication plan. Review annually, or when significant
enterprise changes occur that could impact this Safeguard.
Assign key roles and responsibilities for incident response, including staff from legal, IT,
information security, facilities, public relations, human resources, incident responders, and
analysts, as applicable. Review annually, or when significant enterprise changes occur that
could impact this Safeguard.
Assign key roles and responsibilities for incident response, including staff from legal, IT,
information security, facilities, public relations, human resources, incident responders, and
analysts, as applicable. Review annually, or when significant enterprise changes occur that
could impact this Safeguard.
Determine which primary and secondary mechanisms will be used to communicate and report
during a security incident. Mechanisms can include phone calls, emails, or letters. Keep in
mind that certain mechanisms, such as emails, can be affected during a security incident.
Review annually, or when significant enterprise changes occur that could impact this
Safeguard.
Determine which primary and secondary mechanisms will be used to communicate and report
during a security incident. Mechanisms can include phone calls, emails, or letters. Keep in
mind that certain mechanisms, such as emails, can be affected during a security incident.
Review annually, or when significant enterprise changes occur that could impact this
Safeguard.
Plan and conduct routine incident response exercises and scenarios for key personnel involved
in the incident response process to prepare for responding to real-world incidents. Exercises
need to test communication channels, decision making, and workflows. Conduct testing on an
annual basis, at a minimum.
Conduct post-incident reviews. Post-incident reviews help prevent incident recurrence through
identifying lessons learned and follow-up action.
Establish and maintain security incident thresholds, including, at a minimum, differentiating
between an incident and an event. Examples can include: abnormal activity, security
vulnerability, security weakness, data breach, privacy incident, etc. Review annually, or when
significant enterprise changes occur that could impact this Safeguard.
and resiliency of enterprise assets through identifying and exploiting weaknesses in controls
d technology), and simulating the objectives and actions of an attacker.
Establish and maintain a penetration testing program appropriate to the size, complexity, and
maturity of the enterprise. Penetration testing program characteristics should include scope,
such as network, web application, API, hosted services, and physical premise controls;
frequency; limitations, such as acceptable hours, and excluded attack types; point of contact
information; remediation, such as how findings will be routed internally; and, retrospective
requirements.
Perform periodic external penetration tests based on program requirements, but no less than
annually. External penetration testing should include enterprise and environmental
reconnaissance to detect exploitable information. Penetration testing requires specialized skills
and experience and must be conducted by a qualified party. The testing may be clear box or
opaque box. See the Cloud Companion Guide for cloud-specific guidance.
Remediate penetration test findings based on the enterprise’s policy for remediation scope and
prioritization.
Validate security measures after each penetration test. Enterprises should modify rulesets and
capabilities to detect the techniques used by testers.
Perform periodic internal penetration tests based on program requirements, but no less than
annually. The testing may be clear box or opaque box. See the Cloud Companion Guide for
cloud-specific guidance.
Control Control or Control
IG1 IG2 IG3 Relationship
Identifier Enhancement Name
Unsupported System
x x x Equivalent SA-22
Components
Protection of Information at
x x x Subset SC-28
Rest
Protection of Information at
x x Equivalent SC-28
Rest
Protection of Information at
x x Superset SC-28(1)
Rest | Cryptographic Protection
x x
Information Location |
x Subset CM-12(1) Automated Tools to Support
Information Location
Configuration Management
x x x Equivalent CM-9
Plan
Developer Configuration
x x x Superset SA-10
Management
x x x Superset AC-18 Wireless Access
Wireless Access |
x x x Superset AC-18(1)
Authentication and Encryption
Configuration Management
x x x Equivalent CM-9
Plan
Account Management |
x x x Subset AC-2(5)
Inactivity Logout
Secure Name/address
x x Subset SC-20 Resolution Service
(authoritative Source)
Secure Name/address
x x Subset SC-21 Resolution Service (recursive
or Caching Resolver)
Architecture and Provisioning
x x Subset SC-22 for Name/address Resolution
Service
Authenticator Management |
x x x Subset IA-5(1) Password-based
Authentication
Account Management |
x x Subset AC-2(1) Automated System Account
Management
Account Management |
x x x Subset AC-2(1) Automated System Account
Management
Identification and
Authentication (organizational
x x x Subset IA-2(1) Users) | Multi-factor
Authentication to Privileged
Accounts
Identification and
Authentication (organizational
x x x Subset IA-2(2) Users) | Multi-factor
Authentication to Non-
privileged Accounts
Access Control for Mobile
x x x Subset AC-19
Devices
Identification and
Authentication (organizational
x x x Subset IA-2(1) Users) | Multi-factor
Authentication to Privileged
Accounts
Identification and
Authentication (organizational
x x x Subset IA-2(2) Users) | Multi-factor
Authentication to Non-
privileged Accounts
Identification and
Authentication (organizational
x x x Equivalent IA-2(1) Users) | Multi-factor
Authentication to Privileged
Accounts
x x Subset CM-8 System Component Inventory
Identification and
Authentication (non-
x x Subset IA-8(2) organizational Users) |
Acceptance of External
Authenticators
Account Management |
x x Subset AC-2(1) Automated System Account
Management
Account Management |
x x Subset AC-2(1) Automated System Account
Management
x x
Protecting Controlled
x x Subset PM-17 Unclassified Information on
External Systems
Development Process,
x x Subset SA-15
Standards, and Tools
x x Superset CA-5 Plan of Action and Milestones
x x
Development Process,
x x Subset SA-15
Standards, and Tools
Developer Testing and
x Subset SA-11
Evaluation
Development Process,
x Subset SA-15
Standards, and Tools
x x
x x
x x
x
Control Text
Update the inventory of system components as part of component installations, removals, and system updates.
(a) Detect the presence of unauthorized hardware, software, and firmware components within the system using [Ass
organization-defined automated mechanisms] [Assignment: organization-defined frequency]; and
(b) Take the following actions when unauthorized components are detected: [Selection (one or more): disable netwo
components; isolate the components; notify [Assignment: organization-defined personnel or roles]].
a. Monitor the system to detect:
2. Unauthorized local, network, and remote connections;
b. Identify unauthorized use of the system through the following techniques and methods: [Assignment: organization
and methods];
(a) Detect the presence of unauthorized hardware, software, and firmware components within the system using [Ass
organization-defined automated mechanisms] [Assignment: organization-defined frequency]; and
(b) Take the following actions when unauthorized components are detected: [Selection (one or more): disable netwo
components; isolate the components; notify [Assignment: organization-defined personnel or roles]].
(a) Detect the presence of unauthorized hardware, software, and firmware components within the system using [Ass
organization-defined automated mechanisms] [Assignment: organization-defined frequency]; and
(b) Take the following actions when unauthorized components are detected: [Selection (one or more): disable netwo
components; isolate the components; notify [Assignment: organization-defined personnel or roles]].
(a) Review the system [Assignment: organization-defined frequency] to identify unnecessary and/or nonsecure func
protocols, software, and services; and
(b) Disable or remove [Assignment: organization-defined functions, ports, protocols, software, and services within th
be unnecessary and/or nonsecure].
a. Approve, control, and monitor the use of system maintenance tools; and
b. Review previously approved system maintenance tools [Assignment: organization-defined frequency].
a. Replace system components when support for the components is no longer available from the developer, vendor
b. Provide the following options for alternative sources for continued support for unsupported components [Selection
house support; [Assignment: organization-defined support from external providers]].
Prevent program execution in accordance with [Selection (one or more): [Assignment: organization-defined policies,
and/or access agreements regarding software program usage and restrictions]; rules authorizing the terms and cond
program usage].
(a) Detect the presence of unauthorized hardware, software, and firmware components within the system using [Ass
organization-defined automated mechanisms] [Assignment: organization-defined frequency]; and
(b) Take the following actions when unauthorized components are detected: [Selection (one or more): disable netwo
components; isolate the components; notify [Assignment: organization-defined personnel or roles]].
a. Use software and associated documentation in accordance with contract agreements and copyright laws;
b. Track the use of software and associated documentation protected by quantity licenses to control copying and dis
c. Control and document the use of peer-to-peer file sharing technology to ensure that this capability is not used for
distribution, display, performance, or reproduction of copyrighted work.
a. Establish [Assignment: organization-defined policies] governing the installation of software by users;
b. Enforce software installation policies through the following methods: [Assignment: organization-defined methods];
c. Monitor policy compliance [Assignment: organization-defined frequency].
(a) Detect the presence of unauthorized hardware, software, and firmware components within the system using [Ass
organization-defined automated mechanisms] [Assignment: organization-defined frequency]; and
(b) Take the following actions when unauthorized components are detected: [Selection (one or more): disable netwo
components; isolate the components; notify [Assignment: organization-defined personnel or roles]].
(a) Identify [Assignment: organization-defined software programs authorized to execute on the system];
(b) Employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs on the syst
(c) Review and update the list of authorized software programs [Assignment: organization-defined frequency].
a. Use software and associated documentation in accordance with contract agreements and copyright laws;
b. Track the use of software and associated documentation protected by quantity licenses to control copying and dis
c. Control and document the use of peer-to-peer file sharing technology to ensure that this capability is not used for
distribution, display, performance, or reproduction of copyrighted work.
a. Configure the system to provide only [Assignment: organization-defined mission essential capabilities]; and
b. Prohibit or restrict the use of the following functions, ports, protocols, software, and/or services: [Assignment: orga
prohibited or restricted functions, system ports, protocols, software, and/or services].
(a) Review the system [Assignment: organization-defined frequency] to identify unnecessary and/or nonsecure func
protocols, software, and services; and
(b) Disable or remove [Assignment: organization-defined functions, ports, protocols, software, and services within th
be unnecessary and/or nonsecure].
a. Configure the system to provide only [Assignment: organization-defined mission essential capabilities]; and
b. Prohibit or restrict the use of the following functions, ports, protocols, software, and/or services: [Assignment: orga
prohibited or restricted functions, system ports, protocols, software, and/or services].
(a) Review the system [Assignment: organization-defined frequency] to identify unnecessary and/or nonsecure func
protocols, software, and services; and
(b) Disable or remove [Assignment: organization-defined functions, ports, protocols, software, and services within th
be unnecessary and/or nonsecure].
a. Employ integrity verification tools to detect unauthorized changes to the following software, firmware, and informa
organization-defined software, firmware, and information]; and
b. Take the following actions when unauthorized changes to the software, firmware, and information are detected: [A
organization-defined actions].
Perform an integrity check of [Assignment: organization-defined software, firmware, and information] [Selection (one
at [Assignment: organization-defined transitional states or security-relevant events]; [Assignment: organization-defin
Retain audit records for [Assignment: organization-defined time period consistent with records retention policy] to pr
after-the-fact investigations of incidents and to meet regulatory and organizational information retention requirement
a. Identify and document the location of [Assignment: organization-defined information] and the specific system com
the information is processed and stored;
b. Identify and document the users who have access to the system and system components where the information i
stored; and
c. Document changes to the location (i.e., system or system components) where the information is processed and s
Manage and retain information within the system and information output from the system in accordance with applica
orders, directives, regulations, policies, standards, guidelines and operational requirements.
a. Identify and document the location of [Assignment: organization-defined information] and the specific system com
the information is processed and stored;
b. Identify and document the users who have access to the system and system components where the information i
stored; and
c. Document changes to the location (i.e., system or system components) where the information is processed and s
Establish, maintain, and update [Assignment: organization-defined frequency] an inventory of all systems, applicatio
process personally identifiable information.
Establish, maintain, and update [Assignment: organization-defined frequency] an inventory of all systems, applicatio
process personally identifiable information.
Establish, maintain, and update [Assignment: organization-defined frequency] an inventory of all systems, applicatio
process personally identifiable information.
a. Categorize the system and information it processes, stores, and transmits;
b. Document the security categorization results, including supporting rationale, in the security plan for the system; an
c. Verify that the authorizing official or authorizing official designated representative reviews and approves the secur
decision.
Enforce approved authorizations for logical access to information and system resources in accordance with applicab
policies.
a. Identify and document [Assignment: organization-defined duties of individuals requiring separation]; and
b. Define system access authorizations to support separation of duties.
Employ the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of
necessary to accomplish assigned organizational tasks.
Restrict access to [Assignment: organization-defined types of digital and/or non-digital media] to [Assignment: organ
personnel or roles].
Retain audit records for [Assignment: organization-defined time period consistent with records retention policy] to pr
after-the-fact investigations of incidents and to meet regulatory and organizational information retention requirement
Manage and retain information within the system and information output from the system in accordance with applica
orders, directives, regulations, policies, standards, guidelines and operational requirements.
a. Sanitize [Assignment: organization-defined system media] prior to disposal, release out of organizational control,
using [Assignment: organization-defined sanitization techniques and procedures]; and
b. Employ sanitization mechanisms with the strength and integrity commensurate with the security category or class
information.
Dispose of [Assignment: organization-defined data, documentation, tools, or system components] using the following
methods: [Assignment: organization-defined techniques and methods].
Protect the [Selection (one or more): confidentiality; integrity] of the following information at rest: [Assignment: organ
information at rest].
Enforce approved authorizations for controlling the flow of information within the system and between connected sys
[Assignment: organization-defined information flow control policies].
a. Identify and document the location of [Assignment: organization-defined information] and the specific system com
the information is processed and stored;
b. Identify and document the users who have access to the system and system components where the information i
stored; and
c. Document changes to the location (i.e., system or system components) where the information is processed and s
a. Protect and control [Assignment: organization-defined types of system media] during transport outside of controlle
[Assignment: organization-defined controls];
b. Maintain accountability for system media during transport outside of controlled areas;
c. Document activities associated with the transport of system media; and
d. Restrict the activities associated with the transport of system media to authorized personnel.
a. [Selection: Restrict; Prohibit] the use of [Assignment: organization-defined types of system media] on [Assignmen
defined systems or system components] using [Assignment: organization-defined controls];
Implement cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions.
Implement cryptographic mechanisms to [Selection (one or more): prevent unauthorized disclosure of information; d
information] during transmission.
(d) Store passwords using an approved salted key derivation function, preferably using a keyed hash;
Protect the [Selection (one or more): confidentiality; integrity] of the following information at rest: [Assignment: organ
information at rest].
Implement cryptographic mechanisms to prevent unauthorized disclosure and modification of the following informati
[Assignment: organization-defined system components or media]: [Assignment: organization-defined information].
d. Ongoing monitoring of system and organization-defined metrics in accordance with the continuous monitoring stra
a. Identify and document the location of [Assignment: organization-defined information] and the specific system com
the information is processed and stored;
b. Identify and document the users who have access to the system and system components where the information i
stored; and
c. Document changes to the location (i.e., system or system components) where the information is processed and s
Use automated tools to identify [Assignment: organization-defined information by information type] on [Assignment:
system components] to ensure controls are in place to protect organizational information and individual privacy.
Prevent unauthorized and unintended information transfer via shared system resources.
c. Specify the following event types for logging within the system: [Assignment: organization-defined event types (su
types defined in AU-2a.) along with the frequency of (or situation requiring) logging for each identified event type];
a. Provide audit record generation capability for the event types the system is capable of auditing as defined in AU-2
organization-defined system components];
b. Allow [Assignment: organization-defined personnel or roles] to select the event types that are to be logged by spe
the system; and
c. Generate audit records for the event types defined in AU-2c that include the audit record content defined in AU-3.
2. Procedures to facilitate the implementation of the configuration management policy and the associated configurat
controls;
a. Develop, document, and maintain under configuration control, a current baseline configuration of the system;
a. Establish and document configuration settings for components employed within the system that reflect the most re
consistent with operational requirements using [Assignment: organization-defined common secure configurations];
b. Implement the configuration settings;
a. Configure the system to provide only [Assignment: organization-defined mission essential capabilities];
(a) Review the system [Assignment: organization-defined frequency] to identify unnecessary and/or nonsecure func
protocols, software, and services; and
(b) Disable or remove [Assignment: organization-defined functions, ports, protocols, software, and services within th
be unnecessary and/or nonsecure].
Develop, document, and implement a configuration management plan for the system that:
a. Addresses roles, responsibilities, and configuration management processes and procedures;
b. Establishes a process for identifying configuration items throughout the system development life cycle and for ma
configuration of the configuration items;
c. Defines the configuration items for the system and places the configuration items under configuration managemen
d. Is reviewed and approved by [Assignment: organization-defined personnel or roles]; and
e. Protects the configuration management plan from unauthorized disclosure and modification.
a. Acquire, develop, and manage the system using [Assignment: organization-defined system development life cycle
information security and privacy considerations;
b. Define and document information security and privacy roles and responsibilities throughout the system developme
c. Identify individuals having information security and privacy roles and responsibilities; and
d. Integrate the organizational information security and privacy risk management process into system development l
Apply the following systems security and privacy engineering principles in the specification, design, development, im
modification of the system and system components: [Assignment: organization-defined systems security and privacy
principles].
Require the developer of the system, system component, or system service to:
a. Perform configuration management during system, component, or service [Selection (one or more): design; devel
implementation; operation; disposal];
b. Document, manage, and control the integrity of changes to [Assignment: organization-defined configuration items
management];
c. Implement only organization-approved changes to the system, component, or service;
d. Document approved changes to the system, component, or service and the potential security and privacy impacts
and
e. Track security flaws and flaw resolution within the system, component, or service and report findings to [Assignme
defined personnel].
a. Establish configuration requirements, connection requirements, and implementation guidance for each type of wir
b. Authorize each type of wireless access to the system prior to allowing such connections.
Protect wireless access to the system using authentication of [Selection (one or more): users; devices] and encryptio
Disable, when not intended for use, wireless networking capabilities embedded within system components prior to is
deployment.
a. Develop, document, and maintain under configuration control, a current baseline configuration of the system;
a. Establish and document configuration settings for components employed within the system that reflect the most re
consistent with operational requirements using [Assignment: organization-defined common secure configurations];
b. Implement the configuration settings;
c. Identify, document, and approve any deviations from established configuration settings for [Assignment: organiza
components] based on [Assignment: organization-defined operational requirements]; and
d. Monitor and control changes to the configuration settings in accordance with organizational policies and procedur
a. Configure the system to provide only [Assignment: organization-defined mission essential capabilities]; and
b. Prohibit or restrict the use of the following functions, ports, protocols, software, and/or services: [Assignment: orga
prohibited or restricted functions, system ports, protocols, software, and/or services].
(a) Review the system [Assignment: organization-defined frequency] to identify unnecessary and/or nonsecure func
protocols, software, and services; and
(b) Disable or remove [Assignment: organization-defined functions, ports, protocols, software, and services within th
be unnecessary and/or nonsecure].
Develop, document, and implement a configuration management plan for the system that:
a. Addresses roles, responsibilities, and configuration management processes and procedures;
b. Establishes a process for identifying configuration items throughout the system development life cycle and for ma
configuration of the configuration items;
c. Defines the configuration items for the system and places the configuration items under configuration managemen
d. Is reviewed and approved by [Assignment: organization-defined personnel or roles]; and
e. Protects the configuration management plan from unauthorized disclosure and modification.
Require that users log out when [Assignment: organization-defined time period of expected inactivity or description o
a. Prevent further access to the system by [Selection (one or more): initiating a device lock after [Assignment: organ
period] of inactivity; requiring the user to initiate a device lock before leaving the system unattended]; and
b. Retain the device lock until the user reestablishes access using established identification and authentication proce
Conceal, via the device lock, information previously visible on the display with a publicly viewable image.
Automatically terminate a user session after [Assignment: organization-defined conditions or trigger events requiring
disconnect].
b. Document, for each internal connection, the interface characteristics, security and privacy requirements, and the n
information communicated;
a. Monitor and control communications at the external managed interfaces to the system and at key internal manage
the system;
b. Implement subnetworks for publicly accessible system components that are [Selection: physically; logically] separ
organizational networks; and
c. Connect to external networks or systems only through managed interfaces consisting of boundary protection devi
accordance with an organizational security and privacy architecture.
Deny network communications traffic by default and allow network communications traffic by exception [Selection (o
managed interfaces; for [Assignment: organization-defined systems]].
a. Monitor and control communications at the external managed interfaces to the system and at key internal manage
the system;
b. Implement subnetworks for publicly accessible system components that are [Selection: physically; logically] separ
organizational networks; and
c. Connect to external networks or systems only through managed interfaces consisting of boundary protection devi
accordance with an organizational security and privacy architecture.
Deny network communications traffic by default and allow network communications traffic by exception [Selection (o
managed interfaces; for [Assignment: organization-defined systems]].
a. Establish and document configuration settings for components employed within the system that reflect the most re
consistent with operational requirements using [Assignment: organization-defined common secure configurations];
b. Implement the configuration settings;
c. Identify, document, and approve any deviations from established configuration settings for [Assignment: organiza
components] based on [Assignment: organization-defined operational requirements]; and
d. Monitor and control changes to the configuration settings in accordance with organizational policies and procedur
a. Configure the system to provide only [Assignment: organization-defined mission essential capabilities]; and
b. Prohibit or restrict the use of the following functions, ports, protocols, software, and/or services: [Assignment: orga
prohibited or restricted functions, system ports, protocols, software, and/or services].
a. Provide additional data origin authentication and integrity verification artifacts along with the authoritative name re
system returns in response to external name/address resolution queries; and
b. Provide the means to indicate the security status of child zones and (if the child supports secure resolution servic
verification of a chain of trust among parent and child domains, when operating as part of a distributed, hierarchical
Request and perform data origin authentication and data integrity verification on the name/address resolution respon
receives from authoritative sources.
Ensure the systems that collectively provide name/address resolution service for an organization are fault-tolerant a
internal and external role separation.
a. Enforce a limit of [Assignment: organization-defined number] consecutive invalid logon attempts by a user during
organization-defined time period]
a. Establish configuration requirements, connection requirements, and implementation guidance for organization-con
devices, to include when such devices are outside of controlled areas; and
b. Authorize the connection of mobile devices to organizational systems.
a. Establish configuration requirements, connection requirements, and implementation guidance for organization-con
devices, to include when such devices are outside of controlled areas; and
b. Authorize the connection of mobile devices to organizational systems.
a. [Selection (one or more): Establish [Assignment: organization-defined terms and conditions]; Identify [Assignment
defined controls asserted to be implemented on external systems]], consistent with the trust relationships establishe
organizations owning, operating, and/or maintaining external systems, allowing authorized individuals to:
1. Access the system from external systems; and
2. Process, store, or transmit organization-controlled information using external systems; or
b. Prohibit the use of [Assignment: organizationally-defined types of external systems].
Employ [Selection: full-device encryption; container-based encryption] to protect the confidentiality and integrity of in
[Assignment: organization-defined mobile devices].
(f) Allow user selection of long passwords and passphrases, including spaces and all printable characters;
(g) Employ automated tools to assist the user in selecting strong password authenticators; and
(h) Enforce the following composition and complexity rules: [Assignment: organization-defined composition and com
Disable accounts within [Assignment: organization-defined time period] when the accounts:
(a) Have expired;
(b) Are no longer associated with a user or individual;
(c) Are in violation of organizational policy; or
(d) Have been inactive for [Assignment: organization-defined time period].
Require that users of system accounts (or roles) with access to [Assignment: organization-defined security functions
information] use non-privileged accounts or roles, when accessing nonsecurity functions.
Support the management of system accounts using [Assignment: organization-defined automated mechanisms].
d. Establishing and implementing administrative procedures for initial authenticator distribution, for lost or compromis
authenticators, and for revoking authenticators;
f. Changing or refreshing authenticators [Assignment: organization-defined time period by authenticator type] or whe
organization-defined events] occur;
3. Access authorizations (i.e., privileges) and [Assignment: organization-defined attributes (as required)] for each ac
e. Require approvals by [Assignment: organization-defined personnel or roles] for requests to create accounts;
f. Create, enable, modify, disable, and remove accounts in accordance with [Assignment: organization-defined polic
prerequisites, and criteria];
f. Create, enable, modify, disable, and remove accounts in accordance with [Assignment: organization-defined polic
prerequisites, and criteria];
Support the management of system accounts using [Assignment: organization-defined automated mechanisms].
k. Establish and implement a process for changing shared or group account authenticators (if deployed) when indivi
from the group; and
l. Align account management processes with personnel termination and transfer processes.
Support the management of system accounts using [Assignment: organization-defined automated mechanisms].
a. Establish configuration requirements, connection requirements, and implementation guidance for organization-con
devices, to include when such devices are outside of controlled areas; and
b. Authorize the connection of mobile devices to organizational systems.
Support the management of system accounts using [Assignment: organization-defined automated mechanisms].
Enforce approved authorizations for logical access to information and system resources in accordance with applicab
policies.
2. Group and role membership; and
3. Access authorizations (i.e., privileges) and [Assignment: organization-defined attributes (as required)] for each ac
e. Require approvals by [Assignment: organization-defined personnel or roles] for requests to create accounts;
f. Create, enable, modify, disable, and remove accounts in accordance with [Assignment: organization-defined polic
prerequisites, and criteria];
a. Identify and document [Assignment: organization-defined duties of individuals requiring separation]; and
b. Define system access authorizations to support separation of duties.
Employ the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of
necessary to accomplish assigned organizational tasks.
(a) Review [Assignment: organization-defined frequency] the privileges assigned to [Assignment: organization-define
users] to validate the need for such privileges; and
(b) Reassign or remove privileges, if necessary, to correctly reflect organizational mission and business needs.
Authorize access to management of audit logging functionality to only [Assignment: organization-defined subset of p
roles].
a. Monitor and scan for vulnerabilities in the system and hosted applications [Assignment: organization-defined frequ
randomly in accordance with organization-defined process] and when new vulnerabilities potentially affecting the sys
and reported;
b. Employ vulnerability monitoring tools and techniques that facilitate interoperability among tools and automate part
management process by using standards for:
1. Enumerating platforms, software flaws, and improper configurations;
2. Formatting checklists and test procedures; and
3. Measuring vulnerability impact;
a. Monitor and scan for vulnerabilities in the system and hosted applications [Assignment: organization-defined frequ
randomly in accordance with organization-defined process] and when new vulnerabilities potentially affecting the sys
and reported;
b. Employ vulnerability monitoring tools and techniques that facilitate interoperability among tools and automate part
management process by using standards for:
1. Enumerating platforms, software flaws, and improper configurations;
2. Formatting checklists and test procedures; and
3. Measuring vulnerability impact;
c. Analyze vulnerability scan reports and results from vulnerability monitoring;
d. Remediate legitimate vulnerabilities [Assignment: organization-defined response times] in accordance with an org
assessment of risk;
e. Share information obtained from the vulnerability monitoring process and control assessments with [Assignment:
personnel or roles] to help eliminate similar vulnerabilities in other systems; and
f. Employ vulnerability monitoring tools that include the capability to readily update the vulnerabilities to be scanned.
Respond to findings from security and privacy assessments, monitoring, and audits in accordance with organization
c. Install security-relevant software and firmware updates within [Assignment: organization-defined time period] of th
updates; and
Determine if system components have applicable security-relevant software and firmware updates installed using [A
organization-defined automated mechanisms] [Assignment: organization-defined frequency].
a. Monitor and scan for vulnerabilities in the system and hosted applications [Assignment: organization-defined frequ
randomly in accordance with organization-defined process] and when new vulnerabilities potentially affecting the sys
and reported;
b. Employ vulnerability monitoring tools and techniques that facilitate interoperability among tools and automate part
management process by using standards for:
1. Enumerating platforms, software flaws, and improper configurations;
2. Formatting checklists and test procedures; and
3. Measuring vulnerability impact;
c. Analyze vulnerability scan reports and results from vulnerability monitoring;
d. Remediate legitimate vulnerabilities [Assignment: organization-defined response times] in accordance with an org
assessment of risk;
e. Share information obtained from the vulnerability monitoring process and control assessments with [Assignment:
personnel or roles] to help eliminate similar vulnerabilities in other systems; and
f. Employ vulnerability monitoring tools that include the capability to readily update the vulnerabilities to be scanned.
Respond to findings from security and privacy assessments, monitoring, and audits in accordance with organization
c. Install security-relevant software and firmware updates within [Assignment: organization-defined time period] of th
updates; and
Determine if system components have applicable security-relevant software and firmware updates installed using [A
organization-defined automated mechanisms] [Assignment: organization-defined frequency].
a. Monitor and scan for vulnerabilities in the system and hosted applications [Assignment: organization-defined frequ
randomly in accordance with organization-defined process] and when new vulnerabilities potentially affecting the sys
and reported;
b. Employ vulnerability monitoring tools and techniques that facilitate interoperability among tools and automate part
management process by using standards for:
1. Enumerating platforms, software flaws, and improper configurations;
2. Formatting checklists and test procedures; and
3. Measuring vulnerability impact;
a. Monitor and scan for vulnerabilities in the system and hosted applications [Assignment: organization-defined frequ
randomly in accordance with organization-defined process] and when new vulnerabilities potentially affecting the sys
and reported;
b. Employ vulnerability monitoring tools and techniques that facilitate interoperability among tools and automate part
management process by using standards for:
1. Enumerating platforms, software flaws, and improper configurations;
2. Formatting checklists and test procedures; and
3. Measuring vulnerability impact;
a. Monitor and scan for vulnerabilities in the system and hosted applications [Assignment: organization-defined frequ
randomly in accordance with organization-defined process] and when new vulnerabilities potentially affecting the sys
and reported;
b. Employ vulnerability monitoring tools and techniques that facilitate interoperability among tools and automate part
management process by using standards for:
1. Enumerating platforms, software flaws, and improper configurations;
2. Formatting checklists and test procedures; and
3. Measuring vulnerability impact;
Update the system vulnerabilities to be scanned [Selection (one or more): [Assignment: organization-defined freque
scan; when new vulnerabilities are identified and reported].
Respond to findings from security and privacy assessments, monitoring, and audits in accordance with organization
a. Identify, report, and correct system flaws;
2. Procedures to facilitate the implementation of the audit and accountability policy and the associated audit and acc
c. Specify the following event types for logging within the system: [Assignment: organization-defined event types (su
types defined in AU-2a.) along with the frequency of (or situation requiring) logging for each identified event type];
a. Identify the types of events that the system is capable of logging in support of the audit function: [Assignment: org
event types that the system is capable of logging];
b. Coordinate the event logging function with other organizational entities requiring audit-related information to guide
selection criteria for events to be logged;
Provide and implement an audit record reduction and report generation capability that:
a. Supports on-demand audit record review, analysis, and reporting requirements and after-the-fact investigations o
b. Does not alter the original content or time ordering of audit records.
a. Provide audit record generation capability for the event types the system is capable of auditing as defined in AU-2
organization-defined system components];
Allocate audit log storage capacity to accommodate [Assignment: organization-defined audit log retention requireme
a. Use internal system clocks to generate time stamps for audit records; and
b. Record time stamps for audit records that meet [Assignment: organization-defined granularity of time measureme
Coordinated Universal Time, have a fixed local time offset from Coordinated Universal Time, or that include the loca
of the time stamp.
Ensure that audit records contain information that establishes the following:
a. What type of event occurred;
b. When the event occurred;
c. Where the event occurred;
d. Source of the event;
e. Outcome of the event; and
f. Identity of any individuals, subjects, or objects/entities associated with the event.
Generate audit records containing the following additional information: [Assignment: organization-defined additional
Provide and implement an audit record reduction and report generation capability that:
a. Supports on-demand audit record review, analysis, and reporting requirements and after-the-fact investigations o
b. Does not alter the original content or time ordering of audit records.
a. Provide audit record generation capability for the event types the system is capable of auditing as defined in AU-2
organization-defined system components];
a. Identify the types of events that the system is capable of logging in support of the audit function: [Assignment: org
event types that the system is capable of logging];
b. Coordinate the event logging function with other organizational entities requiring audit-related information to guide
selection criteria for events to be logged;
c. Specify the following event types for logging within the system: [Assignment: organization-defined event types (su
types defined in AU-2a.) along with the frequency of (or situation requiring) logging for each identified event type];
d. Provide a rationale for why the event types selected for logging are deemed to be adequate to support after-the-fa
incidents; and
e. Review and update the event types selected for logging [Assignment: organization-defined frequency].
a. Identify the types of events that the system is capable of logging in support of the audit function: [Assignment: org
event types that the system is capable of logging];
b. Coordinate the event logging function with other organizational entities requiring audit-related information to guide
selection criteria for events to be logged;
c. Specify the following event types for logging within the system: [Assignment: organization-defined event types (su
types defined in AU-2a.) along with the frequency of (or situation requiring) logging for each identified event type];
d. Provide a rationale for why the event types selected for logging are deemed to be adequate to support after-the-fa
incidents; and
e. Review and update the event types selected for logging [Assignment: organization-defined frequency].
a. Identify the types of events that the system is capable of logging in support of the audit function: [Assignment: org
event types that the system is capable of logging];
b. Coordinate the event logging function with other organizational entities requiring audit-related information to guide
selection criteria for events to be logged;
c. Specify the following event types for logging within the system: [Assignment: organization-defined event types (su
types defined in AU-2a.) along with the frequency of (or situation requiring) logging for each identified event type];
d. Provide a rationale for why the event types selected for logging are deemed to be adequate to support after-the-fa
incidents; and
e. Review and update the event types selected for logging [Assignment: organization-defined frequency].
Analyze and correlate audit records across different repositories to gain organization-wide situational awareness.
Retain audit records for [Assignment: organization-defined time period consistent with records retention policy] to pr
after-the-fact investigations of incidents and to meet regulatory and organizational information retention requirement
a. Review and analyze system audit records [Assignment: organization-defined frequency] for indications of [Assign
defined inappropriate or unusual activity] and the potential impact of the inappropriate or unusual activity;
Integrate audit record review, analysis, and reporting processes using [Assignment: organization-defined automated
Provide and implement the capability to process, sort, and search audit records for events of interest based on the f
[Assignment: organization-defined fields within audit records].
a. Identify the types of events that the system is capable of logging in support of the audit function: [Assignment: org
event types that the system is capable of logging];
b. Coordinate the event logging function with other organizational entities requiring audit-related information to guide
selection criteria for events to be logged;
c. Specify the following event types for logging within the system: [Assignment: organization-defined event types (su
types defined in AU-2a.) along with the frequency of (or situation requiring) logging for each identified event type];
d. Provide a rationale for why the event types selected for logging are deemed to be adequate to support after-the-fa
incidents; and
e. Review and update the event types selected for logging [Assignment: organization-defined frequency].
a. Use software and associated documentation in accordance with contract agreements and copyright laws;
b. Track the use of software and associated documentation protected by quantity licenses to control copying and dis
c. Control and document the use of peer-to-peer file sharing technology to ensure that this capability is not used for
distribution, display, performance, or reproduction of copyrighted work.
a. Define acceptable and unacceptable mobile code and mobile code technologies; and
b. Authorize, monitor, and control the use of mobile code within the system.
a. Employ spam protection mechanisms at system entry and exit points to detect and act on unsolicited messages;
b. Update spam protection mechanisms when new releases are available in accordance with organizational configur
policy and procedures.
a. Use software and associated documentation in accordance with contract agreements and copyright laws;
b. Track the use of software and associated documentation protected by quantity licenses to control copying and dis
c. Control and document the use of peer-to-peer file sharing technology to ensure that this capability is not used for
distribution, display, performance, or reproduction of copyrighted work.
a. Establish [Assignment: organization-defined policies] governing the installation of software by users;
b. Enforce software installation policies through the following methods: [Assignment: organization-defined methods];
c. Monitor policy compliance [Assignment: organization-defined frequency].
a. Define acceptable and unacceptable mobile code and mobile code technologies; and
b. Authorize, monitor, and control the use of mobile code within the system.
a. Monitor and control communications at the external managed interfaces to the system and at key internal manage
the system;
b. Implement subnetworks for publicly accessible system components that are [Selection: physically; logically] separ
organizational networks; and
c. Connect to external networks or systems only through managed interfaces consisting of boundary protection devi
accordance with an organizational security and privacy architecture.
a. Implement [Selection (one or more): signature based; non-signature based] malicious code protection mechanism
and exit points to detect and eradicate malicious code;
b. Automatically update malicious code protection mechanisms as new releases are available in accordance with or
configuration management policy and procedures;
c. Configure malicious code protection mechanisms to:
1. Perform periodic scans of the system [Assignment: organization-defined frequency] and real-time scans of files fr
at [Selection (one or more): endpoint; network entry and exit points] as the files are downloaded, opened, or execute
with organizational policy; and
2. [Selection (one or more): block malicious code; quarantine malicious code; take [Assignment: organization-define
alert to [Assignment: organization-defined personnel or roles] in response to malicious code detection; and
d. Address the receipt of false positives during malicious code detection and eradication and the resulting potential i
availability of the system.
a. Employ spam protection mechanisms at system entry and exit points to detect and act on unsolicited messages;
b. Update spam protection mechanisms when new releases are available in accordance with organizational configur
policy and procedures.
a. Implement [Selection (one or more): signature based; non-signature based] malicious code protection mechanism
and exit points to detect and eradicate malicious code;
b. Automatically update malicious code protection mechanisms as new releases are available in accordance with or
configuration management policy and procedures;
c. Configure malicious code protection mechanisms to:
1. Perform periodic scans of the system [Assignment: organization-defined frequency] and real-time scans of files fr
at [Selection (one or more): endpoint; network entry and exit points] as the files are downloaded, opened, or execute
with organizational policy; and
2. [Selection (one or more): block malicious code; quarantine malicious code; take [Assignment: organization-define
alert to [Assignment: organization-defined personnel or roles] in response to malicious code detection; and
d. Address the receipt of false positives during malicious code detection and eradication and the resulting potential i
availability of the system.
a. Employ spam protection mechanisms at system entry and exit points to detect and act on unsolicited messages;
b. Update spam protection mechanisms when new releases are available in accordance with organizational configur
policy and procedures.
a. Implement [Selection (one or more): signature based; non-signature based] malicious code protection mechanism
and exit points to detect and eradicate malicious code;
b. Automatically update malicious code protection mechanisms as new releases are available in accordance with or
configuration management policy and procedures;
a. [Selection: Restrict; Prohibit] the use of [Assignment: organization-defined types of system media] on [Assignmen
defined systems or system components] using [Assignment: organization-defined controls]; and
b. Prohibit the use of portable storage devices in organizational systems when such devices have no identifiable ow
a. [Selection: Restrict; Prohibit] the use of [Assignment: organization-defined types of system media] on [Assignmen
defined systems or system components] using [Assignment: organization-defined controls]; and
b. Prohibit the use of portable storage devices in organizational systems when such devices have no identifiable ow
1. Perform periodic scans of the system [Assignment: organization-defined frequency] and real-time scans of files fr
at [Selection (one or more): endpoint; network entry and exit points] as the files are downloaded, opened, or execute
with organizational policy; and
Implement the following controls to protect the system memory from unauthorized code execution: [Assignment: org
controls].
a. Implement [Selection (one or more): signature based; non-signature based] malicious code protection mechanism
and exit points to detect and eradicate malicious code;
b. Automatically update malicious code protection mechanisms as new releases are available in accordance with or
configuration management policy and procedures;
c. Configure malicious code protection mechanisms to:
1. Perform periodic scans of the system [Assignment: organization-defined frequency] and real-time scans of files fr
at [Selection (one or more): endpoint; network entry and exit points] as the files are downloaded, opened, or execute
with organizational policy; and
2. [Selection (one or more): block malicious code; quarantine malicious code; take [Assignment: organization-define
alert to [Assignment: organization-defined personnel or roles] in response to malicious code detection; and
d. Address the receipt of false positives during malicious code detection and eradication and the resulting potential i
availability of the system.
Provide for the recovery and reconstitution of the system to a known state within [Assignment: organization-defined
consistent with recovery time and recovery point objectives] after a disruption, compromise, or failure.
Implement cryptographic mechanisms to prevent unauthorized disclosure and modification of [Assignment: organiza
information].
Protect the [Selection (one or more): confidentiality; integrity] of the following information at rest: [Assignment: organ
information at rest].
a. Establish an alternate storage site, including necessary agreements to permit the storage and retrieval of system
and
b. Ensure that the alternate storage site provides controls equivalent to that of the primary site.
Identify an alternate storage site that is sufficiently separated from the primary storage site to reduce susceptibility to
a. Test the contingency plan for the system [Assignment: organization-defined frequency] using the following tests t
effectiveness of the plan and the readiness to execute the plan:
Test backup information [Assignment: organization-defined frequency] to verify media reliability and information inte
Update the inventory of system components as part of component installations, removals, and system updates.
a. Develop security and privacy architectures for the system that:
1. Describe the requirements and approach to be taken for protecting the confidentiality, integrity, and availability of
information;
2. Describe the requirements and approach to be taken for processing personally identifiable information to minimize
individuals;
3. Describe how the architectures are integrated into and support the enterprise architecture; and
4. Describe any assumptions about, and dependencies on, external systems and services;
b. Review and update the architectures [Assignment: organization-defined frequency] to reflect changes in the enter
and
c. Reflect planned architecture changes in security and privacy plans, Concept of Operations (CONOPS), criticality a
organizational procedures, and procurements and acquisitions.
Develop and maintain an enterprise architecture with consideration for information security, privacy, and the resultin
organizational operations and assets, individuals, other organizations, and the Nation.
Apply the following systems security and privacy engineering principles in the specification, design, development, im
modification of the system and system components: [Assignment: organization-defined systems security and privacy
principles].
b. Prohibit or restrict the use of the following functions, ports, protocols, software, and/or services: [Assignment: orga
prohibited or restricted functions, system ports, protocols, software, and/or services].
a. Establish an alternate storage site, including necessary agreements to permit the storage and retrieval of system
and
b. Ensure that the alternate storage site provides controls equivalent to that of the primary site.
a. Establish an alternate processing site, including necessary agreements to permit the transfer and resumption of [A
organization-defined system operations] for essential mission and business functions within [Assignment: organizati
period consistent with recovery time and recovery point objectives] when the primary processing capabilities are una
b. Make available at the alternate processing site, the equipment and supplies required to transfer and resume oper
contracts in place to support delivery to the site within the organization-defined time period for transfer and resumpti
c. Provide controls at the alternate processing site that are equivalent to those at the primary site.
a. Monitor and control communications at the external managed interfaces to the system and at key internal manage
the system;
b. Implement subnetworks for publicly accessible system components that are [Selection: physically; logically] separ
organizational networks; and
c. Connect to external networks or systems only through managed interfaces consisting of boundary protection devi
accordance with an organizational security and privacy architecture.
a. Establish and document configuration settings for components employed within the system that reflect the most re
consistent with operational requirements using [Assignment: organization-defined common secure configurations];
b. Implement the configuration settings;
c. Identify, document, and approve any deviations from established configuration settings for [Assignment: organiza
components] based on [Assignment: organization-defined operational requirements]; and
d. Monitor and control changes to the configuration settings in accordance with organizational policies and procedur
a. Configure the system to provide only [Assignment: organization-defined mission essential capabilities]; and
b. Prohibit or restrict the use of the following functions, ports, protocols, software, and/or services: [Assignment: orga
prohibited or restricted functions, system ports, protocols, software, and/or services].
Support the management of system accounts using [Assignment: organization-defined automated mechanisms].
a. Establish configuration requirements, connection requirements, and implementation guidance for each type of wir
b. Authorize each type of wireless access to the system prior to allowing such connections.
a. Establish and document usage restrictions, configuration/connection requirements, and implementation guidance
remote access allowed; and
b. Authorize each type of remote access to the system prior to allowing such connections.
Route remote accesses through authorized and managed network access control points.
Integrate audit record review, analysis, and reporting processes using [Assignment: organization-defined automated
Provide and implement an audit record reduction and report generation capability that:
a. Supports on-demand audit record review, analysis, and reporting requirements and after-the-fact investigations o
b. Does not alter the original content or time ordering of audit records.
Support the incident handling process using [Assignment: organization-defined automated mechanisms].
Employ automated tools and mechanisms to support near real-time analysis of events.
Alert [Assignment: organization-defined personnel or roles] when the following system-generated indications of com
compromise occur: [Assignment: organization-defined compromise indicators].
a. Establish and document usage restrictions, configuration/connection requirements, and implementation guidance
remote access allowed; and
b. Authorize each type of remote access to the system prior to allowing such connections.
a. Monitor and control communications at the external managed interfaces to the system and at key internal manage
the system;
b. Implement subnetworks for publicly accessible system components that are [Selection: physically; logically] separ
organizational networks; and
c. Connect to external networks or systems only through managed interfaces consisting of boundary protection devi
accordance with an organizational security and privacy architecture.
a. Monitor the system to detect:
1. Attacks and indicators of potential attacks in accordance with the following monitoring objectives: [Assignment: or
monitoring objectives]; and
2. Unauthorized local, network, and remote connections;
(a) Determine criteria for unusual or unauthorized activities or conditions for inbound and outbound communications
(b) Monitor inbound and outbound communications traffic [Assignment: organization-defined frequency] for [Assignm
defined unusual or unauthorized activities or conditions].
a. Establish and document configuration settings for components employed within the system that reflect the most re
consistent with operational requirements using [Assignment: organization-defined common secure configurations];
b. Implement the configuration settings;
c. Identify, document, and approve any deviations from established configuration settings for [Assignment: organiza
components] based on [Assignment: organization-defined operational requirements]; and
d. Monitor and control changes to the configuration settings in accordance with organizational policies and procedur
a. Configure the system to provide only [Assignment: organization-defined mission essential capabilities]; and
b. Prohibit or restrict the use of the following functions, ports, protocols, software, and/or services: [Assignment: orga
prohibited or restricted functions, system ports, protocols, software, and/or services].
1. [Selection (one or more): Organization-level; Mission/business process-level; System-level] awareness and trainin
c. Review and update the current awareness and training:
a. Provide security and privacy literacy training to system users (including managers, senior executives, and contrac
Provide literacy training on recognizing and reporting potential and actual instances of social engineering and social
a. Provide security and privacy literacy training to system users (including managers, senior executives, and contrac
a. Provide security and privacy literacy training to system users (including managers, senior executives, and contrac
a. Provide security and privacy literacy training to system users (including managers, senior executives, and contrac
a. Provide security and privacy literacy training to system users (including managers, senior executives, and contrac
a. Provide security and privacy literacy training to system users (including managers, senior executives, and contrac
a. Provide role-based security and privacy training to personnel with the following roles and responsibilities:
Identify, prioritize, and assess suppliers of critical or mission-essential technologies, products, and services.
a. Enable authorized users to determine whether access authorizations assigned to a sharing partner match the info
and use restrictions for [Assignment: organization-defined information sharing circumstances where user discretion
b. Employ [Assignment: organization-defined automated mechanisms or manual processes] to assist users in makin
sharing and collaboration decisions.
a. Require that providers of external system services comply with organizational security and privacy requirements a
following controls: [Assignment: organization-defined controls]
Require providers of the following external system services to identify the functions, ports, protocols, and other servi
use of such services: [Assignment: organization-defined external system services].
a. Develop an organization-wide strategy for managing supply chain risks associated with the development, acquisit
and disposal of systems, system components, and system services;
1. Implement the supply chain risk management strategy consistently across the organization; and
(a) Review and update the supply chain risk management strategy on [Assignment: organization-defined frequency]
address organizational changes.
a. [Selection (one or more): Establish [Assignment: organization-defined terms and conditions]; Identify [Assignment
defined controls asserted to be implemented on external systems]], consistent with the trust relationships establishe
organizations owning, operating, and/or maintaining external systems, allowing authorized individuals to:
1. Access the system from external systems; and
2. Process, store, or transmit organization-controlled information using external systems; or
b. Prohibit the use of [Assignment: organizationally-defined types of external systems].
Assess and review the supply chain-related risks associated with suppliers or contractors and the system, system co
service they provide [Assignment: organization-defined frequency].
Permit authorized individuals to use an external system to access the system or to process, store, or transmit organ
information only after:
(a) Verification of the implementation of controls on the external system as specified in the organization’s security an
and security and privacy plans; or
(b) Retention of approved system connection or processing agreements with the organizational entity hosting the ex
Restrict the use of organization-controlled portable storage devices by authorized individuals on external systems us
organization-defined restrictions].
a. Establish policy and procedures to ensure that requirements for the protection of controlled unclassified informatio
stored or transmitted on external systems, are implemented in accordance with applicable laws, executive orders, di
regulations, and standards; and
b. Review and update the policy and procedures [Assignment: organization-defined frequency].
Employ the following acquisition strategies, contract tools, and procurement methods to protect against, identify, and
chain risks: [Assignment: organization-defined acquisition strategies, contract tools, and procurement methods].
Employ the following acquisition strategies, contract tools, and procurement methods to protect against, identify, and
chain risks: [Assignment: organization-defined acquisition strategies, contract tools, and procurement methods].
Assess and review the supply chain-related risks associated with suppliers or contractors and the system, system co
service they provide [Assignment: organization-defined frequency].
Permit authorized individuals to use an external system to access the system or to process, store, or transmit organ
information only after:
(a) Verification of the implementation of controls on the external system as specified in the organization’s security an
and security and privacy plans; or
(b) Retention of approved system connection or processing agreements with the organizational entity hosting the ex
a. Monitor the system to detect:
1. Attacks and indicators of potential attacks in accordance with the following monitoring objectives: [Assignment: or
monitoring objectives]; and
2. Unauthorized local, network, and remote connections;
b. Identify unauthorized use of the system through the following techniques and methods: [Assignment: organization
and methods];
c. Invoke internal monitoring capabilities or deploy monitoring devices:
1. Strategically within the system to collect organization-determined essential information; and
2. At ad hoc locations within the system to track specific types of transactions of interest to the organization;
d. Analyze detected events and anomalies;
e. Adjust the level of system monitoring activity when there is a change in risk to organizational operations and asse
organizations, or the Nation;
f. Obtain legal opinion regarding system monitoring activities; and
g. Provide [Assignment: organization-defined system monitoring information] to [Assignment: organization-defined p
[Selection (one or more): as needed; [Assignment: organization-defined frequency]].
Assess and review the supply chain-related risks associated with suppliers or contractors and the system, system co
service they provide [Assignment: organization-defined frequency].
a. Acquire, develop, and manage the system using [Assignment: organization-defined system development life cycle
information security and privacy considerations;
b. Define and document information security and privacy roles and responsibilities throughout the system developme
c. Identify individuals having information security and privacy roles and responsibilities; and
d. Integrate the organizational information security and privacy risk management process into system development l
a. Require the developer of the system, system component, or system service to follow a documented development
1. Explicitly addresses security and privacy requirements;
2. Identifies the standards and tools used in the development process;
3. Documents the specific tool options and tool configurations used in the development process; and
4. Documents, manages, and ensures the integrity of changes to the process and/or tools used in development; and
b. Review the development process, standards, tools, tool options, and tool configurations [Assignment: organization
to determine if the process, standards, tools, tool options and tool configurations selected and employed can satisfy
security and privacy requirements: [Assignment: organization-defined security and privacy requirements].
a. Develop a plan of action and milestones for the system to document the planned remediation actions of the organ
weaknesses or deficiencies noted during the assessment of the controls and to reduce or eliminate known vulnerabi
and
b. Update existing plan of action and milestones [Assignment: organization-defined frequency] based on the findings
assessments, independent audits or reviews, and continuous monitoring activities.
a. Monitor and scan for vulnerabilities in the system and hosted applications [Assignment: organization-defined frequ
randomly in accordance with organization-defined process] and when new vulnerabilities potentially affecting the sys
and reported;
b. Employ vulnerability monitoring tools and techniques that facilitate interoperability among tools and automate part
management process by using standards for:
1. Enumerating platforms, software flaws, and improper configurations;
2. Formatting checklists and test procedures; and
3. Measuring vulnerability impact;
c. Analyze vulnerability scan reports and results from vulnerability monitoring;
d. Remediate legitimate vulnerabilities [Assignment: organization-defined response times] in accordance with an org
assessment of risk;
e. Share information obtained from the vulnerability monitoring process and control assessments with [Assignment:
personnel or roles] to help eliminate similar vulnerabilities in other systems; and
f. Employ vulnerability monitoring tools that include the capability to readily update the vulnerabilities to be scanned.
Respond to findings from security and privacy assessments, monitoring, and audits in accordance with organization
a. Develop and implement anti-counterfeit policy and procedures that include the means to detect and prevent coun
from entering the system; and
b. Report counterfeit system components to [Selection (one or more): source of counterfeit component; [Assignmen
defined external reporting organizations]; [Assignment: organization-defined personnel or roles]].
a. Monitor and scan for vulnerabilities in the system and hosted applications [Assignment: organization-defined frequ
randomly in accordance with organization-defined process] and when new vulnerabilities potentially affecting the sys
and reported;
b. Employ vulnerability monitoring tools and techniques that facilitate interoperability among tools and automate part
management process by using standards for:
1. Enumerating platforms, software flaws, and improper configurations;
2. Formatting checklists and test procedures; and
3. Measuring vulnerability impact;
c. Analyze vulnerability scan reports and results from vulnerability monitoring;
d. Remediate legitimate vulnerabilities [Assignment: organization-defined response times] in accordance with an org
assessment of risk;
e. Share information obtained from the vulnerability monitoring process and control assessments with [Assignment:
personnel or roles] to help eliminate similar vulnerabilities in other systems; and
f. Employ vulnerability monitoring tools that include the capability to readily update the vulnerabilities to be scanned.
a. Establish and document configuration settings for components employed within the system that reflect the most re
consistent with operational requirements using [Assignment: organization-defined common secure configurations];
b. Implement the configuration settings;
c. Identify, document, and approve any deviations from established configuration settings for [Assignment: organiza
components] based on [Assignment: organization-defined operational requirements]; and
d. Monitor and control changes to the configuration settings in accordance with organizational policies and procedur
a. Configure the system to provide only [Assignment: organization-defined mission essential capabilities]; and
b. Prohibit or restrict the use of the following functions, ports, protocols, software, and/or services: [Assignment: orga
prohibited or restricted functions, system ports, protocols, software, and/or services].
Apply the following systems security and privacy engineering principles in the specification, design, development, im
modification of the system and system components: [Assignment: organization-defined systems security and privacy
principles].
Apply the following systems security and privacy engineering principles in the specification, design, development, im
modification of the system and system components: [Assignment: organization-defined systems security and privacy
principles].
a. Require the developer of the system, system component, or system service to follow a documented development
1. Explicitly addresses security and privacy requirements;
2. Identifies the standards and tools used in the development process;
3. Documents the specific tool options and tool configurations used in the development process; and
4. Documents, manages, and ensures the integrity of changes to the process and/or tools used in development; and
b. Review the development process, standards, tools, tool options, and tool configurations [Assignment: organization
to determine if the process, standards, tools, tool options and tool configurations selected and employed can satisfy
security and privacy requirements: [Assignment: organization-defined security and privacy requirements].
Require the developer of the system, system component, or system service, at all post-design stages of the system
cycle, to:
a. Develop and implement a plan for ongoing security and privacy control assessments;
b. Perform [Selection (one or more): unit; integration; system; regression] testing/evaluation [Assignment: organizati
frequency] at [Assignment: organization-defined depth and coverage];
c. Produce evidence of the execution of the assessment plan and the results of the testing and evaluation;
d. Implement a verifiable flaw remediation process; and
e. Correct flaws identified during testing and evaluation.
a. Require the developer of the system, system component, or system service to follow a documented development
1. Explicitly addresses security and privacy requirements;
2. Identifies the standards and tools used in the development process;
3. Documents the specific tool options and tool configurations used in the development process; and
4. Documents, manages, and ensures the integrity of changes to the process and/or tools used in development; and
b. Review the development process, standards, tools, tool options, and tool configurations [Assignment: organization
to determine if the process, standards, tools, tool options and tool configurations selected and employed can satisfy
security and privacy requirements: [Assignment: organization-defined security and privacy requirements].
b. Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissem
incident response policy and procedures; and
Provide an incident response support resource, integral to the organizational incident response capability, that offers
assistance to users of the system for the handling and reporting of incidents.
10. Explicitly designates responsibility for incident response to [Assignment: organization-defined entities, personnel
b. Distribute copies of the incident response plan to [Assignment: organization-defined incident response personnel
and/or by role) and organizational elements];
a. Require personnel to report suspected incidents to the organizational incident response capability within [Assignm
defined time period]; and
b. Report incident information to [Assignment: organization-defined authorities].
a. Require personnel to report suspected incidents to the organizational incident response capability within [Assignm
defined time period]; and
b. Report incident information to [Assignment: organization-defined authorities].
Provide incident information to the provider of the product or service and other organizations involved in the supply c
governance for systems or system components related to the incident.
a. Require personnel to report suspected incidents to the organizational incident response capability within [Assignm
defined time period]; and
b. Report incident information to [Assignment: organization-defined authorities].
a. Require personnel to report suspected incidents to the organizational incident response capability within [Assignm
defined time period]; and
b. Report incident information to [Assignment: organization-defined authorities].
b. Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissem
incident response policy and procedures; and
10. Explicitly designates responsibility for incident response to [Assignment: organization-defined entities, personnel
b. Distribute copies of the incident response plan to [Assignment: organization-defined incident response personnel
and/or by role) and organizational elements];
Establish alternate telecommunications services, including necessary agreements to permit the resumption of [Assig
organization-defined system operations] for essential mission and business functions within [Assignment: organizati
period] when the primary telecommunications capabilities are unavailable at either the primary or alternate processin
a. Develop an incident response plan that:
1. Provides the organization with a roadmap for implementing its incident response capability;
2. Describes the structure and organization of the incident response capability;
3. Provides a high-level approach for how the incident response capability fits into the overall organization;
4. Meets the unique requirements of the organization, which relate to mission, size, structure, and functions;
5. Defines reportable incidents;
6. Provides metrics for measuring the incident response capability within the organization;
7. Defines the resources and management support needed to effectively maintain and mature an incident response
8. Addresses the sharing of incident information;
9. Is reviewed and approved by [Assignment: organization-defined personnel or roles] [Assignment: organization-de
and
10. Explicitly designates responsibility for incident response to [Assignment: organization-defined entities, personnel
b. Distribute copies of the incident response plan to [Assignment: organization-defined incident response personnel
and/or by role) and organizational elements];
c. Update the incident response plan to address system and organizational changes or problems encountered durin
implementation, execution, or testing;
d. Communicate incident response plan changes to [Assignment: organization-defined incident response personnel
and/or by role) and organizational elements]; and
e. Protect the incident response plan from unauthorized disclosure and modification.
Test the effectiveness of the incident response capability for the system [Assignment: organization-defined frequenc
following tests: [Assignment: organization-defined tests].
c. Incorporate lessons learned from ongoing incident handling activities into incident response procedures, training,
implement the resulting changes accordingly; and
a. Require personnel to report suspected incidents to the organizational incident response capability within [Assignm
defined time period]; and
b. Report incident information to [Assignment: organization-defined authorities].
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
N/A - Deployed organiation-wide
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
The following are Controls from NIST SP 800-53 MODERATE baseline that are NOT mapped to CIS Controls
Control
Control (or Control Enhancement) Name
Identifier
Account Management | Automated Temporary and
AC-2(2)
Emergency Account Management
AC-2(4) Account Management | Automated Audit Actions
Account Management | Disable Accounts for High-risk
AC-2(13)
Individuals
Least Privilege | Prohibit Non-privileged Users from
AC-6(10)
Executing Privileged Functions
PM-32 Purposing
PT-4 Consent
Control Text
Automatically [Selection: remove; disable] temporary and emergency accounts after [Assignment: organization-defin
time period for each type of account].
Automatically audit account creation, modification, enabling, disabling, and removal actions.
Disable accounts of individuals within [Assignment: organization-defined time period] of discovery of [Assignment:
organization-defined significant risks].
Automatically terminate a user session after [Assignment: organization-defined conditions or trigger events requiring
session disconnect].
(a) Authorize the execution of privileged commands and access to security-relevant information via remote access o
in a format that provides assessable evidence and for the following needs: [Assignment: organization-defined needs
and
(b) Document the rationale for remote access in the security plan for the system.
Employ independent assessors or assessment teams to conduct control assessments.
Employ independent assessors or assessment teams to monitor the controls in the system on an ongoing basis.
Maintain the currency, completeness, accuracy, and availability of the baseline configuration of the system using
[Assignment: organization-defined automated mechanisms].
Retain [Assignment: organization-defined number] of previous versions of baseline configurations of the system to
support rollback.
(a) Issue [Assignment: organization-defined systems or system components] with [Assignment: organization-defined
configurations] to individuals traveling to locations that the organization deems to be of significant risk; and
(b) Apply the following controls to the systems or components when the individuals return from travel: [Assignment:
organization-defined controls].
a. Determine and document the types of changes to the system that are configuration-controlled;
b. Review proposed configuration-controlled changes to the system and approve or disapprove such changes with
explicit consideration for security and privacy impact analyses;
c. Document configuration change decisions associated with the system;
d. Implement approved configuration-controlled changes to the system;
e. Retain records of configuration-controlled changes to the system for [Assignment: organization-defined time perio
f. Monitor and review activities associated with configuration-controlled changes to the system; and
g. Coordinate and provide oversight for configuration change control activities through [Assignment: organization-
defined configuration change control element] that convenes [Selection (one or more): [Assignment: organization-
defined frequency]; when [Assignment: organization-defined configuration change conditions]].
Test, validate, and document changes to the system before finalizing the implementation of the changes.
Require [Assignment: organization-defined security and privacy representatives] to be members of the [Assignment:
organization-defined configuration change control element].
Coordinate contingency plan development with organizational elements responsible for related plans.
Plan for the resumption of [Selection: all; essential] mission and business functions within [Assignment: organization
defined time period] of contingency plan activation.
Identify critical system assets supporting [Selection: all; essential] mission and business functions.
Coordinate contingency plan testing with organizational elements responsible for related plans.
Identify potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaste
and outline explicit mitigation actions.
Identify an alternate processing site that is sufficiently separated from the primary processing site to reduce
susceptibility to the same threats.
Identify potential accessibility problems to alternate processing sites in the event of an area-wide disruption or disas
and outlines explicit mitigation actions.
Develop alternate processing site agreements that contain priority-of-service provisions in accordance with availabili
requirements (including recovery time objectives).
(a) Develop primary and alternate telecommunications service agreements that contain priority-of-service provisions
accordance with availability requirements (including recovery time objectives); and
(b) Request Telecommunications Service Priority for all telecommunications services used for national security
emergency preparedness if the primary and/or alternate telecommunications services are provided by a common
carrier.
Obtain alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary
telecommunications services.
Uniquely identify and authenticate [Assignment: organization-defined devices and/or types of devices] before
establishing a [Selection (one or more): local; remote; network] connection.
Manage individual identifiers by uniquely identifying each individual as [Assignment: organization-defined characteris
identifying individual status].
Protect authenticators commensurate with the security category of the information to which use of the authenticator
permits access.
a. Identity proof users that require accounts for logical access to systems based on appropriate identity assurance le
requirements as specified in applicable standards and guidelines;
b. Resolve user identities to a unique individual; and
c. Collect, validate, and verify identity evidence.
Require evidence of individual identification be presented to the registration authority.
Require that the presented identity evidence be validated and verified through [Assignment: organizational defined
methods of validation and verification].
Require that a [Selection: registration code; notice of proofing] be delivered through an out-of-band channel to verify
users address (physical or digital) of record.
Coordinate incident response testing with organizational elements responsible for related plans.
Increase the availability of incident response information and support using [Assignment: organization-defined
automated mechanisms].
Inspect the maintenance tools used by maintenance personnel for improper or unauthorized modifications.
Check media containing diagnostic and test programs for malicious code before the media are used in the system.
Prevent the removal of maintenance equipment containing organizational information by:
(a) Verifying that there is no organizational information contained on the equipment;
(b) Sanitizing or destroying the equipment;
(c) Retaining the equipment within the facility; or
(d) Obtaining an exemption from [Assignment: organization-defined personnel or roles] explicitly authorizing remova
the equipment from the facility.
Obtain maintenance support and/or spare parts for [Assignment: organization-defined system components] within
[Assignment: organization-defined time period] of failure.
a. Mark system media indicating the distribution limitations, handling caveats, and applicable security markings (if an
of the information; and
b. Exempt [Assignment: organization-defined types of system media] from marking if the media remain within
[Assignment: organization-defined controlled areas].
a. Physically control and securely store [Assignment: organization-defined types of digital and/or non-digital media]
within [Assignment: organization-defined controlled areas]; and
b. Protect system media types defined in MP-4a until the media are destroyed or sanitized using approved equipme
techniques, and procedures.
Control physical access to [Assignment: organization-defined system distribution and transmission lines] within
organizational facilities using [Assignment: organization-defined security controls].
Control physical access to output from [Assignment: organization-defined output devices] to prevent unauthorized
individuals from obtaining the output.
Monitor physical access to the facility where the system resides using physical intrusion alarms and surveillance
equipment.
Protect power equipment and power cabling for the system from damage and destruction.
a. Provide the capability of shutting off power to [Assignment: organization-defined system or individual system
components] in emergency situations;
b. Place emergency shutoff switches or devices in [Assignment: organization-defined location by system or system
component] to facilitate access for authorized personnel; and
c. Protect emergency power shutoff capability from unauthorized activation.
Provide an uninterruptible power supply to facilitate [Selection (one or more): an orderly shutdown of the system;
transition of the system to long-term alternate power] in the event of a primary power source loss.
Employ fire detection systems that activate automatically and notify [Assignment: organization-defined personnel or
roles] and [Assignment: organization-defined emergency responders] in the event of a fire.
a. Determine and document the [Assignment: organization-defined alternate work sites] allowed for use by employee
b. Employ the following controls at alternate work sites: [Assignment: organization-defined controls];
c. Assess the effectiveness of controls at alternate work sites; and
d. Provide a means for employees to communicate with information security and privacy personnel in case of incide
a. Develop and disseminate an organization-wide information security program plan that:
1. Provides an overview of the requirements for the security program and a description of the security program
management controls and common controls in place or planned for meeting those requirements;
2. Includes the identification and assignment of roles, responsibilities, management commitment, coordination amon
organizational entities, and compliance;
3. Reflects the coordination among organizational entities responsible for information security; and
4. Is approved by a senior official with responsibility and accountability for the risk being incurred to organizational
operations (including mission, functions, image, and reputation), organizational assets, individuals, other organizatio
and the Nation;
b. Review and update the organization-wide information security program plan [Assignment: organization-defined
frequency] and following [Assignment: organization-defined events]; and
c. Protect the information security program plan from unauthorized disclosure and modification.
Appoint a senior agency information security officer with the mission and resources to coordinate, develop, impleme
and maintain an organization-wide information security program.
a. Include the resources needed to implement the information security and privacy programs in capital planning and
investment requests and document all exceptions to this requirement;
b. Prepare documentation required for addressing information security and privacy programs in capital planning and
investment requests in accordance with applicable laws, executive orders, directives, policies, regulations, standard
and
c. Make available for expenditure, the planned information security and privacy resources.
a. Implement a process to ensure that plans of action and milestones for the information security, privacy, and supp
chain risk management programs and associated organizational systems:
1. Are developed and maintained;
2. Document the remedial information security, privacy, and supply chain risk management actions to adequately
respond to risk to organizational operations and assets, individuals, other organizations, and the Nation; and
3. Are reported in accordance with established reporting requirements.
b. Review plans of action and milestones for consistency with the organizational risk management strategy and
organization-wide priorities for risk response actions.
Develop, monitor, and report on the results of information security and privacy measures of performance.
Offload [Assignment: organization-defined non-essential functions or services] to other systems, system component
or an external provider.
Address information security and privacy issues in the development, documentation, and updating of a critical
infrastructure and key resources protection plan.
Establish and institutionalize contact with selected groups and associations within the security and privacy communi
a. To facilitate ongoing security and privacy education and training for organizational personnel;
b. To maintain currency with recommended security and privacy practices, techniques, and technologies; and
c. To share current security and privacy information, including threats, vulnerabilities, and incidents.
Implement a threat awareness program that includes a cross-organization information-sharing capability for threat
intelligence.
Employ automated mechanisms to maximize the effectiveness of sharing threat intelligence information.
a. Develop and disseminate an organization-wide privacy program plan that provides an overview of the agency’s
privacy program, and:
1. Includes a description of the structure of the privacy program and the resources dedicated to the privacy program
2. Provides an overview of the requirements for the privacy program and a description of the privacy program
management controls and common controls in place or planned for meeting those requirements;
3. Includes the role of the senior agency official for privacy and the identification and assignment of roles of other
privacy officials and staff and their responsibilities;
4. Describes management commitment, compliance, and the strategic goals and objectives of the privacy program;
5. Reflects coordination among organizational entities responsible for the different aspects of privacy; and
6. Is approved by a senior official with responsibility and accountability for the privacy risk being incurred to
organizational operations (including mission, functions, image, and reputation), organizational assets, individuals, ot
organizations, and the Nation; and
b. Update the plan [Assignment: organization-defined frequency] and to address changes in federal privacy laws and
policy and organizational changes and problems identified during plan implementation or privacy control assessmen
Appoint a senior agency official for privacy with the authority, mission, accountability, and resources to coordinate,
develop, and implement, applicable privacy requirements and manage privacy risks through the organization-wide
privacy program.
Maintain a central resource webpage on the organization’s principal public website that serves as a central source o
information about the organization’s privacy program and that:
a. Ensures that the public has access to information about organizational privacy activities and can communicate wi
its senior agency official for privacy;
b. Ensures that organizational privacy practices and reports are publicly available; and
c. Employs publicly facing email addresses and/or phone lines to enable the public to provide feedback and/or direc
questions to privacy offices regarding privacy practices.
Develop and post privacy policies on all external-facing websites, mobile applications, and other digital services, tha
(a) Are written in plain language and organized in a way that is easy to understand and navigate;
(b) Provide information needed by the public to make an informed decision about whether and how to interact with th
organization; and
(c) Are updated whenever the organization makes a substantive change to the practices it describes and includes a
time/date stamp to inform the public of the date of the most recent changes.
a. Develop and maintain an accurate accounting of disclosures of personally identifiable information, including:
1. Date, nature, and purpose of each disclosure; and
2. Name and address, or other contact information of the individual or organization to which the disclosure was mad
b. Retain the accounting of disclosures for the length of the time the personally identifiable information is maintained
five years after the disclosure is made, whichever is longer; and
c. Make the accounting of disclosures available to the individual to whom the personally identifiable information relat
upon request.
Establish a Data Governance Body consisting of [Assignment: organization-defined roles] with [Assignment:
organization-defined responsibilities].
Establish a Data Integrity Board to:
a. Review proposals to conduct or participate in a matching program; and
b. Conduct an annual review of all matching programs in which the agency has participated.
a. Develop, document, and implement policies and procedures that address the use of personally identifiable
information for internal testing, training, and research;
b. Limit or minimize the amount of personally identifiable information used for internal testing, training, and research
purposes;
c. Authorize the use of personally identifiable information when such information is required for internal testing, train
and research; and
d. Review and update policies and procedures [Assignment: organization-defined frequency].
Implement a process for receiving and responding to complaints, concerns, or questions from individuals about the
organizational security and privacy practices that includes:
a. Mechanisms that are easy to use and readily accessible by the public;
b. All information necessary for successfully filing complaints;
c. Tracking mechanisms to ensure all complaints received are reviewed and addressed within [Assignment:
organization-defined time period];
d. Acknowledgement of receipt of complaints, concerns, or questions from individuals within [Assignment: organizati
defined time period]; and
e. Response to complaints, concerns, or questions from individuals within [Assignment: organization-defined time
period].
a. Develop [Assignment: organization-defined privacy reports] and disseminate to:
1. [Assignment: organization-defined oversight bodies] to demonstrate accountability with statutory, regulatory, and
policy privacy mandates; and
2. [Assignment: organization-defined officials] and other personnel with responsibility for monitoring privacy program
compliance; and
b. Review and update privacy reports [Assignment: organization-defined frequency].
a. Appoint a Senior Accountable Official for Risk Management to align organizational information security and privac
management processes with strategic, operational, and budgetary planning processes; and
b. Establish a Risk Executive (function) to view and analyze risk from an organization-wide perspective and ensure
management of risk is consistent across the organization.
Develop an organization-wide continuous monitoring strategy and implement continuous monitoring programs that
include:
a. Establishing the following organization-wide metrics to be monitored: [Assignment: organization-defined metrics];
b. Establishing [Assignment: organization-defined frequencies] for monitoring and [Assignment: organization-defined
frequencies] for assessment of control effectiveness;
c. Ongoing monitoring of organizationally-defined metrics in accordance with the continuous monitoring strategy;
d. Correlation and analysis of information generated by control assessments and monitoring;
e. Response actions to address results of the analysis of control assessment and monitoring information; and
f. Reporting the security and privacy status of organizational systems to [Assignment: organization-defined personne
roles] [Assignment: organization-defined frequency].
Analyze [Assignment: organization-defined systems or systems components] supporting mission essential services
functions to ensure that the information resources are being used consistent with their intended purpose.
a. Determine and document the [Assignment: organization-defined authority] that permits the [Assignment:
organization-defined processing] of personally identifiable information; and
b. Restrict the [Assignment: organization-defined processing] of personally identifiable information to only that which
authorized.
Attach data tags containing [Assignment: organization-defined authorized processing] to [Assignment: organization-
defined elements of personally identifiable information].
Manage enforcement of the authorized processing of personally identifiable information using [Assignment:
organization-defined automated mechanisms].
a. Identify and document the [Assignment: organization-defined purpose(s)] for processing personally identifiable
information;
b. Describe the purpose(s) in the public privacy notices and policies of the organization;
c. Restrict the [Assignment: organization-defined processing] of personally identifiable information to only that which
compatible with the identified purpose(s); and
d. Monitor changes in processing personally identifiable information and implement [Assignment: organization-define
mechanisms] to ensure that any changes are made in accordance with [Assignment: organization-defined
requirements].
Attach data tags containing the following purposes to [Assignment: organization-defined elements of personally
identifiable information]: [Assignment: organization-defined processing purposes].
Track processing purposes of personally identifiable information using [Assignment: organization-defined automated
mechanisms].
Implement [Assignment: organization-defined tools or mechanisms] for individuals to consent to the processing of th
personally identifiable information prior to its collection that facilitate individuals’ informed decision-making.
Provide [Assignment: organization-defined mechanisms] to allow individuals to tailor processing permissions to sele
elements of personally identifiable information.
Present [Assignment: organization-defined consent mechanisms] to individuals at [Assignment: organization-defined
frequency] and in conjunction with [Assignment: organization-defined personally identifiable information processing].
Implement [Assignment: organization-defined tools or mechanisms] for individuals to revoke consent to the processi
of their personally identifiable information.
Provide notice to individuals about the processing of personally identifiable information that:
a. Is available to individuals upon first interacting with an organization, and subsequently at [Assignment: organizatio
defined frequency];
b. Is clear and easy-to-understand, expressing information about personally identifiable information processing in pla
language;
c. Identifies the authority that authorizes the processing of personally identifiable information;
d. Identifies the purposes for which personally identifiable information is to be processed; and
e. Includes [Assignment: organization-defined information].
Present notice of personally identifiable information processing to individuals at a time and location where the individ
provides personally identifiable information or in conjunction with a data action, or [Assignment: organization-defined
frequency].
Include Privacy Act statements on forms that collect information that will be maintained in a Privacy Act system of
records, or provide Privacy Act statements on separate forms that can be retained by individuals.
For systems that process information that will be maintained in a Privacy Act system of records:
a. Draft system of records notices in accordance with OMB guidance and submit new and significantly modified syst
of records notices to the OMB and appropriate congressional committees for advance review;
b. Publish system of records notices in the Federal Register; and
c. Keep system of records notices accurate, up-to-date, and scoped in accordance with policy.
Review all routine uses published in the system of records notice at [Assignment: organization-defined frequency] to
ensure continued accuracy, and to ensure that routine uses continue to be compatible with the purpose for which th
information was collected.
Review all Privacy Act exemptions claimed for the system of records at [Assignment: organization-defined frequency
ensure they remain appropriate and necessary in accordance with law, that they have been promulgated as regulati
and that they are accurately described in the system of records notice.
Apply [Assignment: organization-defined processing conditions] for specific categories of personally identifiable
information.
When a system processes Social Security numbers:
(a) Eliminate unnecessary collection, maintenance, and use of Social Security numbers, and explore alternatives to
their use as a personal identifier;
(b) Do not deny any individual any right, benefit, or privilege provided by law because of such individual’s refusal to
disclose his or her Social Security number; and
(c) Inform any individual who is asked to disclose his or her Social Security number whether that disclosure is
mandatory or voluntary, by what statutory or other authority such number is solicited, and what uses will be made of
Prohibit the processing of information describing how any individual exercises rights guaranteed by the First
Amendment unless expressly authorized by statute or by the individual or unless pertinent to and within the scope o
authorized law enforcement activity.
When a system or organization processes information for the purpose of conducting a matching program:
a. Obtain approval from the Data Integrity Board to conduct the matching program;
b. Develop and enter into a computer matching agreement;
c. Publish a matching notice in the Federal Register;
d. Independently verify the information produced by the matching program before taking adverse action against an
individual, if required; and
e. Provide individuals with notice and an opportunity to contest the findings before taking adverse action against an
individual.
Implement privileged access authorization to [Assignment: organization-defined system components] for [Assignmen
organization-defined vulnerability scanning activities].
Identify critical system components and functions by performing a criticality analysis for [Assignment: organization-
defined systems, system components, or system services] at [Assignment: organization-defined decision points in th
system development life cycle].
Require the developer of the system, system component, or system service to provide a description of the functiona
properties of the controls to be implemented.
Require the developer of the system, system component, or system service to provide design and implementation
information for the controls that includes: [Selection (one or more): security-relevant external system interfaces; high
level design; low-level design; source code or hardware schematics; [Assignment: organization-defined design and
implementation information]] at [Assignment: organization-defined level of detail].
Require the developer of the system, system component, or system service to identify the functions, ports, protocols
and services intended for organizational use.
Require the developer of the system, system component, or system service, at all post-design stages of the system
development life cycle, to:
a. Develop and implement a plan for ongoing security and privacy control assessments;
b. Perform [Selection (one or more): unit; integration; system; regression] testing/evaluation [Assignment: organizati
defined frequency] at [Assignment: organization-defined depth and coverage];
c. Produce evidence of the execution of the assessment plan and the results of the testing and evaluation;
d. Implement a verifiable flaw remediation process; and
e. Correct flaws identified during testing and evaluation.
a. Require the developer of the system, system component, or system service to follow a documented development
process that:
1. Explicitly addresses security and privacy requirements;
2. Identifies the standards and tools used in the development process;
3. Documents the specific tool options and tool configurations used in the development process; and
4. Documents, manages, and ensures the integrity of changes to the process and/or tools used in development; and
b. Review the development process, standards, tools, tool options, and tool configurations [Assignment: organization
defined frequency] to determine if the process, standards, tools, tool options and tool configurations selected and
employed can satisfy the following security and privacy requirements: [Assignment: organization-defined security an
privacy requirements].
Require the developer of the system, system component, or system service to perform a criticality analysis:
(a) At the following decision points in the system development life cycle: [Assignment: organization-defined decision
points in the system development life cycle]; and
(b) At the following level of rigor: [Assignment: organization-defined breadth and depth of criticality analysis].
Separate user functionality, including user interface services, from system management functionality.
Limit the number of external network connections to the system.
(a) Implement a managed interface for each external telecommunication service;
(b) Establish a traffic flow policy for each managed interface;
(c) Protect the confidentiality and integrity of the information being transmitted across each interface;
(d) Document each exception to the traffic flow policy with a supporting mission or business need and duration of tha
need;
(e) Review exceptions to the traffic flow policy [Assignment: organization-defined frequency] and remove exceptions
that are no longer supported by an explicit mission or business need;
(f) Prevent unauthorized exchange of control plane traffic with external networks;
(g) Publish information to enable remote networks to detect unauthorized control plane traffic from internal networks
and
(h) Filter unauthorized control plane traffic from external networks.
Prevent split tunneling for remote devices connecting to organizational systems unless the split tunnel is securely
provisioned using [Assignment: organization-defined safeguards].
Terminate the network connection associated with a communications session at the end of the session or after
[Assignment: organization-defined time period] of inactivity.
a. Issue public key certificates under an [Assignment: organization-defined certificate policy] or obtain public key
certificates from an approved service provider; and
b. Include only approved trust anchors in trust stores or certificate stores managed by the organization.
a. Define acceptable and unacceptable mobile code and mobile code technologies; and
b. Authorize, monitor, and control the use of mobile code within the system.
Implement spam protection mechanisms with a learning capability to more effectively identify legitimate
communications traffic.
Check the validity of the following information inputs: [Assignment: organization-defined information inputs to the
system].
a. Generate error messages that provide information necessary for corrective actions without revealing information t
could be exploited; and
b. Reveal error messages only to [Assignment: organization-defined personnel or roles].
Implement the following controls to protect the system memory from unauthorized code execution: [Assignment:
organization-defined controls].
The following are Controls from NIST SP 800-53 LOW baseline that are NOT mapped to CIS Controls v8
CA-6 Authorization
PL-4(1) Rules of Behavior | Social Media and External Site/application Usage Res
PL-10 Baseline Selection
PL-11 Baseline Tailoring
PS-1 Policy and Procedures
a. Approve and manage the exchange of information between the system and other systems using [Selection (one o
information exchange security agreements; memoranda of understanding or agreement; service level agreements; u
[Assignment: organization-defined type of agreement]];
b. Document, as part of each exchange agreement, the interface characteristics, security and privacy requirements,
the impact level of the information communicated; and
c. Review and update the agreements [Assignment: organization-defined frequency].
a. Develop a plan of action and milestones for the system to document the planned remediation actions of the organ
during the assessment of the controls and to reduce or eliminate known vulnerabilities in the system; and
b. Update existing plan of action and milestones [Assignment: organization-defined frequency] based on the findings
reviews, and continuous monitoring activities.
Ensure risk monitoring is an integral part of the continuous monitoring strategy that includes the following:
(a) Effectiveness monitoring;
(b) Compliance monitoring; and
(c) Change monitoring.
Analyze changes to the system to determine potential security and privacy impacts prior to change implementation.
Define, document, approve, and enforce physical and logical access restrictions associated with changes to the sys
a. Provide contingency training to system users consistent with assigned roles and responsibilities:
1. Within [Assignment: organization-defined time period] of assuming a contingency role or responsibility;
2. When required by system changes; and
3. [Assignment: organization-defined frequency] thereafter; and
b. Review and update contingency training content [Assignment: organization-defined frequency] and following [Ass
a. Schedule, document, and review records of maintenance, repair, and replacement on system components in acco
and/or organizational requirements;
b. Approve and monitor all maintenance activities, whether performed on site or remotely and whether the system o
removed to another location;
c. Require that [Assignment: organization-defined personnel or roles] explicitly approve the removal of the system or
for off-site maintenance, repair, or replacement;
d. Sanitize equipment to remove the following information from associated media prior to removal from organizationa
replacement: [Assignment: organization-defined information];
e. Check all potentially impacted controls to verify that the controls are still functioning properly following maintenanc
f. Include the following information in organizational maintenance records: [Assignment: organization-defined inform
a. Establish a process for maintenance personnel authorization and maintain a list of authorized maintenance organ
b. Verify that non-escorted personnel performing maintenance on the system possess the required access authoriza
c. Designate organizational personnel with required access authorizations and technical competence to supervise th
possess the required access authorizations.
a. Develop, approve, and maintain a list of individuals with authorized access to the facility where the system resides
b. Issue authorization credentials for facility access;
c. Review the access list detailing authorized facility access by individuals [Assignment: organization-defined freque
d. Remove individuals from the facility access list when access is no longer required.
a. Enforce physical access authorizations at [Assignment: organization-defined entry and exit points to the facility wh
1. Verifying individual access authorizations before granting access to the facility; and
2. Controlling ingress and egress to the facility using [Selection (one or more): [Assignment: organization-defined ph
b. Maintain physical access audit logs for [Assignment: organization-defined entry or exit points];
c. Control access to areas within the facility designated as publicly accessible by implementing the following controls
access controls];
d. Escort visitors and control visitor activity [Assignment: organization-defined circumstances requiring visitor escorts
e. Secure keys, combinations, and other physical access devices;
f. Inventory [Assignment: organization-defined physical access devices] every [Assignment: organization-defined fre
g. Change combinations and keys [Assignment: organization-defined frequency] and/or when keys are lost, combina
possessing the keys or combinations are transferred or terminated.
a. Monitor physical access to the facility where the system resides to detect and respond to physical security inciden
b. Review physical access logs [Assignment: organization-defined frequency] and upon occurrence of [Assignment:
of events]; and
c. Coordinate results of reviews and investigations with the organizational incident response capability.
a. Maintain visitor access records to the facility where the system resides for [Assignment: organization-defined time
b. Review visitor access records [Assignment: organization-defined frequency]; and
c. Report anomalies in visitor access records to [Assignment: organization-defined personnel].
Employ and maintain automatic emergency lighting for the system that activates in the event of a power outage or d
evacuation routes within the facility.
Employ and maintain fire detection and suppression systems that are supported by an independent energy source.
a. Maintain [Selection (one or more): temperature; humidity; pressure; radiation; [Assignment: organization-defined e
where the system resides at [Assignment: organization-defined acceptable levels]; and
b. Monitor environmental control levels [Assignment: organization-defined frequency].
Protect the system from damage resulting from water leakage by providing master shutoff or isolation valves that are
personnel.
a. Authorize and control [Assignment: organization-defined types of system components] entering and exiting the fa
b. Maintain records of the system components.
a. Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
1. [Selection (one or more): Organization-level; Mission/business process-level; System-level] planning policy that:
(a) Addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational
(b) Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; a
2. Procedures to facilitate the implementation of the planning policy and the associated planning controls;
b. Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissem
c. Review and update the current planning:
1. Policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]; and
2. Procedures [Assignment: organization-defined frequency] and following [Assignment: organization-defined events
a. Establish and provide to individuals requiring access to the system, the rules that describe their responsibilities an
usage, security, and privacy;
b. Receive a documented acknowledgment from such individuals, indicating that they have read, understand, and ag
authorizing access to information and the system;
c. Review and update the rules of behavior [Assignment: organization-defined frequency]; and
d. Require individuals who have acknowledged a previous version of the rules of behavior to read and re-acknowled
organization-defined frequency]; when the rules are revised or updated].
a. Review and confirm ongoing operational need for current logical and physical access authorizations to systems a
transferred to other positions within the organization;
b. Initiate [Assignment: organization-defined transfer or reassignment actions] within [Assignment: organization-defin
c. Modify access authorization as needed to correspond with any changes in operational need due to reassignment
d. Notify [Assignment: organization-defined personnel or roles] within [Assignment: organization-defined time period
a. Develop and document access agreements for organizational systems;
b. Review and update the access agreements [Assignment: organization-defined frequency]; and
c. Verify that individuals requiring access to organizational information and systems:
1. Sign appropriate access agreements prior to being granted access; and
2. Re-sign access agreements to maintain access to organizational systems when access agreements have been u
frequency].
a. Establish personnel security requirements, including security roles and responsibilities for external providers;
b. Require external providers to comply with personnel security policies and procedures established by the organiza
c. Document personnel security requirements;
d. Require external providers to notify [Assignment: organization-defined personnel or roles] of any personnel transf
possess organizational credentials and/or badges, or who have system privileges within [Assignment: organization-d
e. Monitor provider compliance with personnel security requirements.
a. Employ a formal sanctions process for individuals failing to comply with established information security and priva
b. Notify [Assignment: organization-defined personnel or roles] within [Assignment: organization-defined time period
initiated, identifying the individual sanctioned and the reason for the sanction.
Incorporate security and privacy roles and responsibilities into organizational position descriptions.
a. Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]:
1. [Selection (one or more): Organization-level; Mission/business process-level; System-level] risk assessment polic
(a) Addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational
(b) Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; a
2. Procedures to facilitate the implementation of the risk assessment policy and the associated risk assessment con
b. Designate an [Assignment: organization-defined official] to manage the development, documentation, and dissem
procedures; and
c. Review and update the current risk assessment:
1. Policy [Assignment: organization-defined frequency] and following [Assignment: organization-defined events]; and
2. Procedures [Assignment: organization-defined frequency] and following [Assignment: organization-defined events
a. Determine the high-level information security and privacy requirements for the system or system service in missio
b. Determine, document, and allocate the resources required to protect the system or system service as part of the o
control process; and
c. Establish a discrete line item for information security and privacy in organizational programming and budgeting do
Employ only information technology products on the FIPS 201-approved products list for Personal Identity Verificatio
organizational systems.
a. Obtain or develop administrator documentation for the system, system component, or system service that describ
1. Secure configuration, installation, and operation of the system, component, or service;
2. Effective use and maintenance of security and privacy functions and mechanisms; and
3. Known vulnerabilities regarding configuration and use of administrative or privileged functions;
b. Obtain or develop user documentation for the system, system component, or system service that describes:
1. User-accessible security and privacy functions and mechanisms and how to effectively use those functions and m
2. Methods for user interaction, which enables individuals to use the system, component, or service in a more secur
3. User responsibilities in maintaining the security of the system, component, or service and privacy of individuals;
c. Document attempts to obtain system, system component, or system service documentation when such document
[Assignment: organization-defined actions] in response; and
d. Distribute documentation to [Assignment: organization-defined personnel or roles].
a. Develop a plan for managing supply chain risks associated with the research and development, design, manufact
and maintenance, and disposal of the following systems, system components or system services: [Assignment: orga
system services];
b. Review and update the supply chain risk management plan [Assignment: organization-defined frequency] or as re
environmental changes; and
c. Protect the supply chain risk management plan from unauthorized disclosure and modification.
Establish a supply chain risk management team consisting of [Assignment: organization-defined personnel, roles, an
SCRM activities: [Assignment: organization-defined supply chain risk management activities].
a. Establish a process or processes to identify and address weaknesses or deficiencies in the supply chain elements
defined system or system component] in coordination with [Assignment: organization-defined supply chain personne
b. Employ the following controls to protect against supply chain risks to the system, system component, or system s
supply chain-related events: [Assignment: organization-defined supply chain controls]; and
c. Document the selected and implemented supply chain processes and controls in [Selection: security and privacy
[Assignment: organization-defined document]].
Establish agreements and procedures with entities involved in the supply chain for the system, system component, o
notification of supply chain compromises; results of assessments or audits; [Assignment: organization-defined inform
Inspect the following systems or system components [Selection (one or more): at random; at [Assignment: organiza
organization-defined indications of need for inspection]] to detect tampering: [Assignment: organization-defined syst
a. Develop and implement anti-counterfeit policy and procedures that include the means to detect and prevent coun
b. Report counterfeit system components to [Selection (one or more): source of counterfeit component; [Assignmen
organizations]; [Assignment: organization-defined personnel or roles]].
Train [Assignment: organization-defined personnel or roles] to detect counterfeit system components (including hard
Maintain configuration control over the following system components awaiting service or repair and serviced or repa
[Assignment: organization-defined system components].
The following CIS Safeguards were NOT mapped to NIST SP 800-53
3.12 Segment Data Processing and Storage Based on Sensitivity
12.8 Establish and Maintain Dedicated Computing Resources for All Administrative Work
13.2 Deploy a Host-Based Intrusion Detection Solution