NIST SP 800-171r3
Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
Ron Ross
Computer Security Division, Information Technology Laboratory
Victoria Pillitteri
Computer Security Division, Information Technology Laboratory
This publication is available free of charge from:
https://doi.org/10.6028/NIST.SP.800-171r3
May 2024
The protection of Controlled Unclassified Information (CUI) is of paramount importance to federal agencies and can directly impact the ability of the Federal Government to successfully conduct its essential missions and functions. This publication provides federal agencies with recommended security requirements for protecting the confidentiality of CUI when the information is resident in nonfederal systems and organizations. The requirements apply to components of nonfederal systems that process, store, or transmit CUI or that provide protection for such components. The security requirements are intended for use by federal agencies in contractual vehicles or other agreements established between those agencies and nonfederal organizations. This publication can be used in conjunction with its companion publication, NIST Special Publication 800-171A, which provides a comprehensive set of procedures to assess the security requirements.
Controlled Unclassified Information, Executive Order 13556, FIPS Publication 199, FIPS Publication 200, FISMA, NIST Special Publication 800-53, nonfederal organizations, nonfederal systems, organization-defined parameter, security assessment, security control, security requirement.
Certain equipment, instruments, software, or materials, commercial or non-commercial, are identified in this paper in order to specify the experimental procedure adequately. Such identification does not imply recommendation or endorsement of any product or service by NIST, nor does it imply that the materials or equipment identified are necessarily the best available for the purpose.
There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, may be used by federal agencies even before the completion of such companion publications. Thus, until each publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For planning and transition purposes, federal agencies may wish to closely follow the development of these new publications by NIST.
Organizations are encouraged to review all draft publications during public comment periods and provide feedback to NIST. Many NIST cybersecurity publications, other than the ones noted above, are available at https://csrc.nist.gov/publications.
This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et seq., Public Law (P.L.) 113-283. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130.
Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on federal agencies by the Secretary of Commerce under statutory authority. Nor should these guidelines be interpreted as altering or superseding the existing authorities of the Secretary of Commerce, Director of the OMB, or any other federal official. This publication may be used by nongovernmental organizations on a voluntary basis and is not subject to copyright in the United States. Attribution would, however, be appreciated by NIST.
Copyright, Use, and Licensing Statements
NIST Technical Series Publication Identifier Syntax
Approved by the NIST Editorial Review Board on 2024-04-23
Supersedes NIST Special Publication 800-171r2 (February 2020; Includes updates as of 01-28-2021) https://doi.org/10.6028/NIST.SP.800-171r2
Ross R, Pillitteri V (2024) Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-171r3. https://doi.org/10.6028/NIST.SP.800-171r3
Ron Ross: 0000-0002-1099-9757
Victoria Pillitteri: 0000-0002-7446-7506
National Institute of Standards and Technology
Attn: Computer Security Division, Information Technology Laboratory
100 Bureau Drive (Mail Stop 8930) Gaithersburg, MD 20899-8930
Additional information about this publication is available at https://csrc.nist.gov/pubs/sp/800/171/r3/final, including related content, potential updates, and document history.
All comments are subject to release under the Freedom of Information Act (FOIA).
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analyses to advance the development and productive use of information technology. ITL’s responsibilities include the development of management, administrative, technical, and physical standards and guidelines for the cost-effective security and privacy of other than national security-related information in federal information systems. The Special Publication 800-series reports on ITL’s research, guidelines, and outreach efforts in information system security, and its collaborative activities with industry, government, and academic organizations.
This publication serves a diverse group of individuals and organizations in the public and private sectors, including:
Federal agencies responsible for managing and protecting CUI
Nonfederal organizations responsible for protecting CUI
Individuals with system development life cycle responsibilities (e.g., program managers, mission/business owners, information owners/stewards, system designers and developers, system/security engineers, systems integrators)
Individuals with acquisition or procurement responsibilities (e.g., contracting officers)
Individuals with system, security, or risk management and oversight responsibilities (e.g., authorizing officials, chief information officers, chief information security officers, system owners, information security managers)
Individuals with security assessment and monitoring responsibilities (e.g., auditors, system evaluators, assessors, analysts, independent verifiers and validators)
The above roles and responsibilities can be viewed from two perspectives:
Federal perspective: The entity establishing and conveying the security requirements in contractual vehicles or other types of agreements
Nonfederal perspective: The entity responding to and complying with the security requirements set forth in contracts or agreements
NOTICE: ITL has requested that holders of patent claims whose use may be required for compliance with the guidance or requirements of this publication disclose such patent claims to ITL. However, holders of patents are not obligated to respond to ITL calls for patents and ITL has not undertaken a patent search in order to identify which, if any, patents may apply to this publication.
As of the date of publication and following call(s) for the identification of patent claims whose use may be required for compliance with the guidance or requirements of this publication, no such patent claims have been identified to ITL.
No representation is made or implied by ITL that licenses are not required to avoid patent infringement in the use of this publication.
The authors gratefully acknowledge and appreciate the significant contributions from individuals and organizations in the public and private sectors whose constructive comments improved the overall quality, thoroughness, and usefulness of this publication. The authors also wish to thank the NIST technical editing and production staff – Jim Foti, Jeff Brewer, Eduardo Takamura, Isabel Van Wyk, Cristina Ritfeld, Derek Sappington, and Carolyn Schmidt – for their outstanding support in preparing this document for publication. Finally, a special note of thanks goes out to Kelley Dempsey for the initial research and development of the content used in the prototype CUI overlay.
The authors also wish to acknowledge the following organizations and individuals for their historic contributions to this publication:
Organizations: National Archives and Records Administration, Department of Defense
Individuals: Carol Bales, Matthew Barrett, Jon Boyens, Devin Casey, Christian Enloe, Gary Guissanie, Peggy Himes, Robert Glenn, Elizabeth Lennon, Vicki Michetti, Dorian Pappas, Karen Quigg, Mark Riddle, Matthew Scholl, Mary Thomas, Murugiah Souppaya, Patricia Toth, and Patrick Viscuso
Executive Order (EO) 13556 [1] established a government-wide program to standardize the way the executive branch handles Controlled Unclassified Information (CUI).1 EO 13556 required that the CUI program emphasize openness, transparency, and uniformity of government-wide practices and that the program implementation take place in a manner consistent with Office of Management and Budget (OMB) policies and National Institute of Standards and Technology (NIST) standards and guidelines. As the CUI program Executive Agent, the National Archives and Records Administration (NARA) provides information, guidance, policy, and requirements on handling CUI [4]. This includes approved CUI categories and descriptions, the basis for safeguarding and dissemination controls, and procedures for the use of CUI.2 The CUI federal regulation [5] provides guidance to federal agencies on the designation, safeguarding, marking, dissemination, decontrolling, and disposition of CUI; establishes self-inspection and oversight requirements; and delineates other facets of the program.
The CUI regulation requires federal agencies that use federal information systems3 to process, store, or transmit CUI to comply with NIST standards and guidelines. The responsibility of federal agencies to protect CUI does not change when such information is shared with nonfederal organizations.4 Therefore, a similar level of protection is needed when CUI is processed, stored, or transmitted by nonfederal organizations using nonfederal systems.5 To maintain a consistent level of protection, the security requirements for safeguarding CUI in nonfederal systems and organizations must comply with Federal Information Processing Standards (FIPS 199) publication [6] and FIPS 200 [7]. The requirements are derived from the controls in NIST Special Publication (SP) 800-53 [8].
This publication provides federal agencies with recommended security requirements6 for protecting the confidentiality of CUI7 when such information is resident in nonfederal systems and organizations and where there are no specific safeguarding requirements prescribed by the authorizing law, regulation, or government-wide policy for the CUI category listed in the CUI registry [4]. The requirements do not apply to nonfederal organizations that are collecting or maintaining information on behalf of a federal agency or using or operating a system on behalf of an agency.8
The security requirements in this publication are only applicable to components of nonfederal systems that process, store, or transmit CUI or that provide protection for such components.9 The requirements are intended for use by federal agencies in contractual vehicles or other agreements that are established between those agencies and nonfederal organizations.
Appropriately scoping requirements is an important factor in determining protection-related investment decisions and managing security risks for nonfederal organizations. If nonfederal organizations designate system components for the processing, storage, or transmission of CUI, those organizations may limit the scope of the security requirements by isolating the system components in a separate security domain. Isolation can be achieved by applying architectural and design concepts (e.g., implementing subnetworks with firewalls or other boundary protection devices and using information flow control mechanisms). Security domains may employ physical separation, logical separation, or a combination of both. This approach can provide adequate security for CUI and avoid increasing the organization’s security posture beyond what it requires for protecting its missions, operations, and assets.
The remainder of this special publication is organized as follows:
• Section 2 describes the assumptions and methodology used to develop the security requirements for protecting the confidentiality of CUI, the format of the requirements, and the tailoring criteria applied to the NIST guidelines to obtain the requirements.
• Section 3 lists the security requirements for protecting the confidentiality of CUI in nonfederal systems and organizations.
The following sections provide additional information to support the protection of CUI:
References
Appendix A: Acronyms
Appendix B: Glossary
Appendix C: Tailoring Criteria
Appendix D: Organization-Defined Parameters
Appendix E: Change Log
This section describes the assumptions and methodology used to develop the requirements to protect the confidentiality of CUI in nonfederal systems and organizations. It also includes the tailoring10 criteria applied to the controls in SP 800-53 [8].
The security requirements in this publication are based on the following assumptions:
Federal information designated as CUI has the same value, whether such information resides in a federal or nonfederal system or organization.
Statutory and regulatory requirements for the protection of CUI are consistent in federal and nonfederal systems and organizations.
Safeguards implemented to protect CUI are consistent in federal and nonfederal systems and organizations.
The confidentiality impact value for CUI is no less than moderate.11
Nonfederal organizations can directly implement a variety of potential security solutions or use external service providers to satisfy security requirements.
Starting with the SP 800-53 controls in the SP 800-53B [12] moderate baseline, the controls are tailored to eliminate selected controls or parts of controls that are:
Primarily the responsibility of the Federal Government,
Not directly related to protecting the confidentiality of CUI,
Adequately addressed by other related controls,12 or
Not applicable.
SP 800-171 security requirements represent a subset of the controls that are necessary to protect the confidentiality of CUI. The security requirements are organized into 17 families, as illustrated in Table 1. Each family contains the requirements related to the general security topic of the family. Certain families from SP 800-53 are not included due to the tailoring criteria. For example, the PII Processing and Transparency (PT) family is not included because personally identifiable information (PII) is a category of CUI, and therefore, no additional requirements are specified for confidentiality protection. The Program Management (PM) family is not included because it is not associated with any control baseline. Finally, the Contingency Planning (CP) family is not included because it addresses availability.13
Table 1. Security Requirement Families
Access Control |
Maintenance |
Security Assessment and Monitoring |
Awareness and Training |
Media Protection |
System and Communications Protection |
Audit and Accountability |
Personnel Security |
System and Information Integrity |
Configuration Management |
Physical Protection |
Planning |
Identification and Authentication |
Risk Assessment |
System and Services Acquisition |
Incident Response |
Supply Chain Risk Management |
Organization-defined parameters (ODPs) are included in certain security requirements. ODPs provide flexibility through the use of assignment and selection operations to allow federal agencies and nonfederal organizations to specify values for the designated parameters in the requirements.14 Assignment and selection operations provide the capability to customize the security requirements based on specific protection needs. The determination of ODP values can be guided and informed by laws, Executive Orders, directives, regulations, policies, standards, guidance, or mission and business needs. Once specified, the values for the organization-defined parameters become part of the requirement.
ORGANIZATION-DEFINED PARAMETERS
Organization-defined parameters are an important part of a security requirement specification. ODPs provide both the flexibility and specificity needed by organizations to clearly define their CUI security requirements, given the diverse nature of their missions, business functions, operational environments, and risk tolerance. In addition, ODPs support consistent security assessments in determining whether specified security requirements have been satisfied. If a federal agency or a consortium of agencies do not specify a particular value or range of values for an ODP, nonfederal organizations must assign the value or values to complete the security requirement.
A discussion section is included with each requirement. It is derived from the control discussion sections in SP 800-53 and provides additional information to facilitate the implementation and assessment of the requirements. The discussion section is informative, not normative. It is not intended to extend the scope of a requirement or influence the solutions that organizations may use to satisfy a requirement. The use of examples is notional, not exhaustive, and does not reflect the potential options available to organizations. A references section provides the source controls15 from SP 800-53 and a list of NIST Special Publications with additional information on the topic described in the security requirement. The structure and content of a typical security requirement is provided in the example below.
03.13.11 Cryptographic Protection
Implement the following types of cryptography when used to protect the confidentiality of CUI: [Assignment: organization-defined types of cryptography].
DISCUSSION
Cryptography is implemented in accordance with applicable laws, Executive Orders, directives, policies, regulations, standards, and guidelines. FIPS-validated cryptography is recommended for the protection of CUI.
REFERENCES
Source Control: SC-13
Supporting Publications: FIPS 140-3 [38]
The term organization is used in many security requirements, and its meaning depends on context. For example, in a security requirement with an ODP, an organization can refer to either the federal agency or the nonfederal organization establishing the parameter values for the requirement.
Appendix C describes the security control tailoring criteria used to develop the security requirements and the results of the tailoring process. The appendix provides a list of controls from SP 800-53 that support the requirements and the controls that have been eliminated from the moderate baseline in accordance with the tailoring criteria.
ASSESSING SECURITY REQUIREMENTS
SP 800-171A [84] provides a set of procedures to assess the security requirements described in this publication. The assessment procedures are based on the procedures described in SP 800-53A [57].
This section describes 17 families of security requirements for protecting the confidentiality of CUI in nonfederal systems and organizations. When used in the context of the requirements in Sec. 3, the term system is defined to be nonfederal systems or system components that process, store, or transmit CUI or that provide protection for such systems or components. Not all security requirements mention CUI explicitly. However, the requirements are included because they directly affect the protection of CUI during processing, while in storage, and when in transmission between different locations.
Some systems, including specialized systems (e.g., industrial/process control systems, medical devices, computer numerical control machines), may have limitations on the application of certain security requirements. To accommodate such issues, the system security plan — as reflected in requirement 03.15.02 — is used to describe any enduring exceptions to the security requirements. Individual, isolated, or temporary deficiencies are managed though plans of action and milestones, as reflected in requirement 03.12.02.
SCOPE AND APPLICABILITY OF SECURITY REQUIREMENTS
The security requirements in this section are only applicable to components of nonfederal systems that process, store, or transmit CUI or that provide protection for such components.
Define the types of system accounts allowed and prohibited.
Create, enable, modify, disable, and remove system accounts in accordance with policy, procedures, prerequisites, and criteria.
Specify:
Authorized users of the system,
Group and role membership, and
Access authorizations (i.e., privileges) for each account.
Authorize access to the system based on:
A valid access authorization and
Intended system usage.
Monitor the use of system accounts.
Disable system accounts when:
The accounts have expired,
The accounts have been inactive for [Assignment: organization-defined time period],
The accounts are no longer associated with a user or individual,
The accounts are in violation of organizational policy, or
Significant risks associated with individuals are discovered.
Notify account managers and designated personnel or roles within:
[Assignment: organization-defined time period] when accounts are no longer required.
[Assignment: organization-defined time period] when users are terminated or transferred.
[Assignment: organization-defined time period] when system usage or the need-to-know changes for an individual.
Require that users log out of the system after [Assignment: organization-defined time period] of expected inactivity or when [Assignment: organization-defined circumstances].
This requirement focuses on account management for systems and applications. The definition and enforcement of access authorizations other than those determined by account type (e.g., privileged access, non-privileged access) are addressed in 03.01.02. System account types include individual, group, temporary, system, guest, anonymous, emergency, developer, and service. Users who require administrative privileges on system accounts receive additional scrutiny by personnel responsible for approving such accounts and privileged access. Types of accounts that organizations may prohibit due to increased risk include group, emergency, guest, anonymous, and temporary.
Organizations may choose to define access privileges or other attributes by account, type of account, or a combination of both. Other attributes required for authorizing access include restrictions on the time of day, day of the week, and point of origin. When defining other system account attributes, organizations consider system requirements (e.g., system upgrades, scheduled maintenance) and mission and business requirements (e.g., time zone differences, remote access to facilitate travel requirements).
Users who pose a significant security risk include individuals for whom reliable evidence indicates either the intention to use authorized access to the system to cause harm or that adversaries will cause harm through them. Close coordination among mission and business owners, system administrators, human resource managers, and legal staff is essential when disabling system accounts for high-risk individuals. Time periods for the notification of organizational personnel or roles may vary.
Inactivity logout is behavior- or policy-based and requires users to take physical action to log out when they are expecting inactivity longer than the defined period. Automatic enforcement of inactivity logout is addressed by 03.01.10.
Source Controls: AC-02, AC-02(03), AC-02(05), AC-02(13)
Supporting Publications: SP 800-46 [14], SP 800-57-1 [15], SP 800-57-2 [16], SP 800-57-3 [17], SP 800-77 [18], SP 800-113 [19], SP 800-114 [20], SP 800-121 [21], SP 800-162 [22], SP 800-178 [23], SP 800-192 [24], IR 7874 [25], IR 7966 [26]
Enforce approved authorizations for logical access to CUI and system resources in accordance with applicable access control policies.
Access control policies control access between active entities or subjects (i.e., users or system processes acting on behalf of users) and passive entities or objects (i.e., devices, files, records, domains) in organizational systems. Types of system access include remote access and access to systems that communicate through external networks, such as the internet. Access enforcement mechanisms can also be employed at the application and service levels to provide increased protection for CUI. This recognizes that the system can host many applications and services in support of mission and business functions. Access control policies are defined in 03.15.01.
Source Control: AC-03
Supporting Publications: SP 800-46 [14], SP 800-57-1 [15], SP 800-57-2 [16], SP 800-57-3 [17], SP 800-77 [18], SP 800-113 [19], SP 800-114 [20], SP 800-121 [21], SP 800-162 [22], SP 800-178 [23], SP 800-192 [24], IR 7874 [25], IR 7966 [26]
Enforce approved authorizations for controlling the flow of CUI within the system and between connected systems.
Information flow control regulates where CUI can transit within a system and between systems (in contrast to who is allowed to access the information) and without regard to subsequent accesses to that information. Flow control restrictions include keeping CUI from being transmitted in the clear to the internet, blocking external communications traffic that claims to be sourced from within the organization, restricting requests to the internet that are not from the internal web proxy server, and limiting CUI transfers between organizations based on data structures and content.
Transferring CUI between organizations may require an agreement that specifies how the information flow is enforced (see 03.12.05). Transferring CUI between systems that represent different security domains with different security policies introduces the risk that such transfers violate one or more domain security policies. In such situations, information owners or stewards provide guidance at designated policy enforcement points between interconnected systems. Organizations consider mandating specific architectural solutions when required to enforce specific security policies. Enforcement includes prohibiting CUI transfers between interconnected systems (i.e., allowing information access only), employing hardware mechanisms to enforce one-way information flows, and implementing trustworthy regrading mechanisms to reassign security attributes and security labels.
Organizations commonly use information flow control policies and enforcement mechanisms to control the flow of CUI between designated sources and destinations (e.g., networks, individuals, and devices) within systems and between interconnected systems. Flow control is based on characteristics of the information or the information path. Enforcement occurs in boundary protection devices (e.g., encrypted tunnels, routers, gateways, and firewalls) that use rule sets or establish configuration settings that restrict system services, provide a packet-filtering capability based on header information, or provide a message-filtering capability based on message content (e.g., implementing key word searches or using document characteristics). Organizations also consider the trustworthiness of filtering and inspection mechanisms (i.e., hardware, firmware, and software components) that are critical to information flow enforcement.
Source Control: AC-04
Supporting Publications: SP 800-160-1 [11], SP 800-162 [22], SP 800-178 [23]
Identify the duties of individuals requiring separation.
Define system access authorizations to support separation of duties.
Separation of duties addresses the potential for abuse of authorized privileges and reduces the risk of malevolent activity without collusion. Separation of duties includes dividing mission functions and support functions among different individuals or roles, conducting system support functions with different individuals or roles (e.g., quality assurance, configuration management, network security, system management, assessments, and programming), and ensuring that personnel who administer access control functions do not also administer audit functions. Because separation of duty violations can span systems and application domains, organizations consider the entirety of their systems and system components when developing policies on separation of duties. This requirement is enforced by 03.01.02.
Source Control: AC-05
Supporting Publications: SP 800-162 [22], SP 800-178 [23]
Allow only authorized system access for users (or processes acting on behalf of users) that is necessary to accomplish assigned organizational tasks.
Authorize access to [Assignment: organization-defined security functions] and [Assignment: organization-defined security-relevant information].
Review the privileges assigned to roles or classes of users [Assignment: organization-defined frequency] to validate the need for such privileges.
Reassign or remove privileges, as necessary.
Organizations employ the principle of least privilege for specific duties and authorized access for users and system processes. Least privilege is applied to the development, implementation, and operation of the system. Organizations consider creating additional processes, roles, and system accounts to achieve least privilege. Security functions include establishing system accounts and assigning privileges, installing software, configuring access authorizations, configuring settings for events to be audited, establishing vulnerability scanning parameters, establishing intrusion detection parameters, and managing audit information. Security-relevant information includes threat and vulnerability information, filtering rules for routers or firewalls, configuration parameters for security services, security architecture, cryptographic key management information, access control lists, and audit information.
Source Controls: AC-06, AC-06(01), AC-06(07), AU-09(04)
Supporting Publications: None
Restrict privileged accounts on the system to [Assignment: organization-defined personnel or roles].
Require that users (or roles) with privileged accounts use non-privileged accounts when accessing non-security functions or non-security information.
Privileged accounts refer to accounts that are granted elevated privileges to access resources (including security functions or security-relevant information) that are otherwise restricted for non-privileged accounts. These accounts are typically described as system administrator or super user accounts. For example, a privileged account is often required in order to perform privileged functions such as executing commands that could modify system behavior. Restricting privileged accounts to specific personnel or roles ensures that only those authorized users can access and manipulate security functions or security-relevant information. Requiring the use of non-privileged accounts when such access is not needed can limit unauthorized access to and manipulation of security functions or security-relevant information.
Source Controls: AC-06(02), AC-06(05)
Supporting Publications: None
Prevent non-privileged users from executing privileged functions.
Log the execution of privileged functions.
Privileged functions include establishing system accounts, performing system integrity checks, conducting patching operations, changing system configuration settings, or administering cryptographic key management activities. Non-privileged users do not possess the authorizations to execute privileged functions. Bypassing intrusion detection and prevention mechanisms or malicious code protection mechanisms are examples of privileged functions that require protection from non-privileged users. This requirement represents a condition achieved by the definition of authorized privileges in 03.01.01 and privilege enforcement in 03.01.02.
The misuse of privileged functions — whether intentionally or unintentionally by authorized users or by unauthorized external entities that have compromised system accounts — is a serious and ongoing concern that can have significant adverse impacts on organizations. Logging the use of privileged functions is one way to detect such misuse and mitigate risks from advanced persistent threats and insider threats.
Source Controls: AC-06(09), AC-06(10)
Supporting Publications: None
Enforce a limit of [Assignment: organization-defined number] consecutive invalid logon attempts by a user during a [Assignment: organization-defined time period].
Automatically [Selection (one or more): lock the account or node for an [Assignment: organization-defined time period]; lock the account or node until released by an administrator; delay next logon prompt; notify system administrator; take other action] when the maximum number of unsuccessful attempts is exceeded.
Due to the potential for denial of service, automatic system lockouts are in most cases, temporary and automatically release after a predetermined time period established by the organization (i.e., using a delay algorithm). Organizations may employ different delay algorithms for different system components based on the capabilities of the respective components. Responses to unsuccessful system logon attempts may be implemented at the system and application levels.
Organization-defined actions that may be taken include prompting the user to answer a secret question in addition to the username and password, invoking a lockdown mode with limited user capabilities (instead of a full lockout), allowing users to only logon from specified Internet Protocol (IP) addresses, requiring a CAPTCHA to prevent automated attacks, or applying user profiles, such as location, time of day, IP address, device, or Media Access Control (MAC) address.
Source Control: AC-07
Supporting Publications: SP 800-63-3 [27], SP 800-124 [28]
Display a system use notification message with privacy and security notices consistent with applicable CUI rules before granting access to the system.
System use notifications can be implemented using messages or warning banners. The messages or warning banners are displayed before individuals log in to a system that processes, stores, or transmits CUI. System use notifications are used for access via logon interfaces with human users and are not required when human interfaces do not exist. Organizations consider whether a secondary use notification is needed to access applications or other system resources after the initial network logon. Posters or other printed materials may be used in lieu of an automated system message. This requirement is related to 03.15.03.
Source Control: AC-08
Supporting Publications: None
Prevent access to the system by [Selection (one or more): initiating a device lock after [Assignment: organization-defined time period] of inactivity; requiring the user to initiate a device lock before leaving the system unattended].
Retain the device lock until the user reestablishes access using established identification and authentication procedures.
Conceal, via the device lock, information previously visible on the display with a publicly viewable image.
Device locks are temporary actions taken to prevent access to the system when users depart from the immediate vicinity of the system but do not want to log out due to the temporary nature of their absences. Device locks can be implemented at the operating system level or application level. User-initiated device locking is behavior- or policy-based and requires users to take physical action to initiate the device lock. Device locks are not an acceptable substitute for logging out of the system (e.g., when organizations require users to log out at the end of workdays). Publicly viewable images can include static or dynamic images, such as patterns used with screen savers, solid colors, photographic images, a clock, a battery life indicator, or a blank screen with the caveat that controlled unclassified information is not displayed.
Source Controls: AC-11, AC-11(01)
Supporting Publications: None
Terminate a user session automatically after [Assignment: organization-defined conditions or trigger events requiring session disconnect].
This requirement addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that are associated with communications sessions (i.e., disconnecting from the network) in 03.13.09. A logical session is initiated whenever a user (or processes acting on behalf of a user) accesses a system. Logical sessions can be terminated (and thus terminate user access) without terminating network sessions. Session termination ends all system processes associated with a user’s logical session except those processes that are created by the user (i.e., session owner) to continue after the session is terminated. Conditions or trigger events that require automatic session termination can include organization-defined periods of user inactivity, time-of-day restrictions on system use, and targeted responses to certain types of incidents.
Source Control: AC-12
Supporting Publications: None
Establish usage restrictions, configuration requirements, and connection requirements for each type of allowable remote system access.
Authorize each type of remote system access prior to establishing such connections.
Route remote access to the system through authorized and managed access control points.
Authorize the remote execution of privileged commands and remote access to security-relevant information.
Remote access is access to systems (or processes acting on behalf of users) that communicate through external networks, such as the internet. Monitoring and controlling remote access methods allows organizations to detect attacks and ensure compliance with remote access policies. Routing remote access through managed access control points enhances explicit control over such connections and reduces susceptibility to unauthorized access to the system, which could result in the unauthorized disclosure of CUI.
Remote access to the system represents a significant potential vulnerability that can be exploited by adversaries. Restricting the execution of privileged commands and access to security-relevant information via remote access reduces the exposure of the organization and its susceptibility to threats by adversaries. A privileged command is a human-initiated command executed on a system that involves the control, monitoring, or administration of the system, including security functions and security-relevant information. Security-relevant information is information that can potentially impact the operation of security functions or the provision of security services in a manner that could result in failure to enforce the system security policy or maintain isolation of code and data. Privileged commands give individuals the ability to execute sensitive, security-critical, or security-relevant system functions.
Source Controls: AC-17, AC-17(03), AC-17(04)
Supporting Publications: SP 800-46 [14], SP 800-77 [18], SP 800-113 [19], SP 800-114 [20], SP 800-121 [21], IR 7966 [26]
Addressed by 03.13.08.
Incorporated into 03.01.12.
Incorporated into 03.01.12.
Establish usage restrictions, configuration requirements, and connection requirements for each type of wireless access to the system.
Authorize each type of wireless access to the system prior to establishing such connections.
Disable, when not intended for use, wireless networking capabilities prior to issuance and deployment.
Protect wireless access to the system using authentication and encryption.
Wireless networking capabilities represent a significant potential vulnerability that can be exploited by adversaries. Establishing usage restrictions, configuration requirements, and connection requirements for wireless access to the system provides criteria to support access authorization decisions. These restrictions and requirements reduce susceptibility to unauthorized system access through wireless technologies. Wireless networks use authentication protocols that provide credential protection and mutual authentication. Organizations authenticate individuals and devices to protect wireless access to the system. Special attention is given to the variety of devices with potential wireless access to the system, including small form factor mobile devices (e.g., smart phones, tablets, smart watches). Wireless networking capabilities that are embedded within system components represent a potential vulnerability that can be exploited by adversaries. Strong authentication of users and devices, strong encryption, and disabling wireless capabilities that are not needed for essential mission or business functions can reduce susceptibility to threats by adversaries involving wireless technologies.
Source Controls: AC-18, AC-18(01), AC-18(03)
Supporting Publications: SP 800-94 [29], SP 800-97 [30], SP 800-124 [28]
Incorporated into 03.01.16.
Establish usage restrictions, configuration requirements, and connection requirements for mobile devices.
Authorize the connection of mobile devices to the system.
Implement full-device or container-based encryption to protect the confidentiality of CUI on mobile devices.
A mobile device is a computing device with a small form factor such that it can be carried by a single individual; is designed to operate without a physical connection; possesses local, non-removable, or removable data storage; and includes a self-contained power source. Mobile device functionality may include on-board sensors that allow the device to capture information, voice communication capabilities, and/or built-in features for synchronizing local data with remote locations. Examples include smart phones, smart watches, and tablets. Mobile devices are typically associated with a single individual. The processing, storage, and transmission capabilities of mobile devices may be comparable to or a subset of notebook or desktop systems, depending on the nature and intended purpose of the device. Some organizations may consider notebook computers to be mobile devices. The protection and control of mobile devices are behavior- or policy-based and require users to take physical action to protect and control such devices when outside of controlled areas. Controlled areas are spaces for which the organization provides physical or procedural controls to meet the requirements established for protecting CUI.
Due to the large variety of mobile devices with different characteristics and capabilities, organizational restrictions may vary for the different classes or types of such devices. Usage restrictions, configuration requirements, and connection requirements for mobile devices include configuration management, device identification and authentication, implementing mandatory protective software, scanning devices for malicious code, updating virus protection software, scanning for critical software updates and patches, conducting operating system and possibly other software integrity checks, and disabling unnecessary hardware. On mobile devices, secure containers provide software-based data isolation designed to segment enterprise applications and information from personal apps and data. Containers may present multiple user interfaces, one of the most common being a mobile application that acts as a portal to a suite of business productivity apps, such as email, contacts, and calendar. Organizations can employ full-device encryption or container-based encryption to protect the confidentiality of CUI on mobile devices.
Source Controls: AC-19, AC-19(05)
Supporting Publications: SP 800-46 [14], SP 800-114 [31], SP 800-124 [28]
Incorporated into 03.01.18.
Prohibit the use of external systems unless the systems are specifically authorized.
Establish the following security requirements to be satisfied on external systems prior to allowing use of or access to those systems by authorized individuals: [Assignment: organization-defined security requirements].
Permit authorized individuals to use external systems to access the organizational system or to process, store, or transmit CUI only after:
Verifying that the security requirements on the external systems as specified in the organization’s system security plans have been satisfied and
Retaining approved system connection or processing agreements with the organizational entities hosting the external systems.
Restrict the use of organization-controlled portable storage devices by authorized individuals on external systems.
External systems are systems that are used by but are not part of the organization. These systems include personally owned systems, system components, or devices; privately owned computing and communication devices in commercial or public facilities; systems owned or controlled by nonfederal organizations; and systems managed by contractors. Organizations have the option to prohibit the use of any type of external system or specified types of external systems (e.g., prohibit the use of external systems that are not organizationally owned). Terms and conditions are consistent with the trust relationships established with the entities that own, operate, or maintain external systems and include descriptions of shared responsibilities.
Authorized individuals include organizational personnel, contractors, or other individuals with authorized access to the organizational system and over whom organizations have the authority to impose specific rules of behavior regarding system access. Restrictions that organizations impose on authorized individuals may vary depending on the trust relationships between organizations. Organizations need assurance that external systems satisfy the necessary security requirements so as not to compromise, damage, or harm the system. This requirement is related to 03.16.03.
Source Controls: AC-20, AC-20(01), AC-20(02)
Supporting Publications: None
Incorporated into 03.01.20.
Train authorized individuals to ensure that publicly accessible information does not contain CUI.
Review the content on publicly accessible systems for CUI and remove such information, if discovered.
In accordance with applicable laws, Executive Orders, directives, policies, regulations, standards, and guidelines, the public is not authorized to have access to nonpublic information, including CUI.
Source Control: AC-22
Supporting Publications: None
Provide security literacy training to system users:
As part of initial training for new users and [Assignment: organization-defined frequency] thereafter,
When required by system changes or following [Assignment: organization-defined events], and
On recognizing and reporting indicators of insider threat, social engineering, and social mining.
Update security literacy training content [Assignment: organization-defined frequency] and following [Assignment: organization-defined events].
Organizations provide basic and advanced levels of security literacy training to system users (including managers, senior executives, system administrators, and contractors) and measures to test the knowledge level of users. Organizations determine the content of literacy training based on specific organizational requirements, the systems to which personnel have authorized access, and work environments (e.g., telework). The content includes an understanding of the need for security and the actions required of users to maintain security and respond to incidents. The content also addresses the need for operations security and the handling of CUI.
Security awareness techniques include displaying posters, offering supplies inscribed with security reminders, generating email advisories or notices from organizational officials, displaying logon screen messages, and conducting awareness events using podcasts, videos, and webinars. Security literacy training is conducted at a frequency consistent with applicable laws, directives, regulations, and policies. Updating literacy training content on a regular basis ensures that the content remains relevant. Events that may precipitate an update to literacy training content include assessment or audit findings, security incidents or breaches, or changes in applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines.
Potential indicators and possible precursors of insider threats include behaviors such as inordinate, long-term job dissatisfaction; attempts to gain access to information that is not required for job performance; unexplained access to financial resources; sexual harassment or bullying of fellow employees; workplace violence; and other serious violations of the policies, procedures, rules, directives, or practices of organizations. Organizations may consider tailoring insider threat awareness topics to roles (e.g., training for managers may be focused on specific changes in the behavior of team members, while training for employees may be focused on more general observations).
Social engineering is an attempt to deceive an individual into revealing information or taking an action that can be used to breach, compromise, or otherwise adversely impact a system. Social engineering includes phishing, pretexting, impersonation, baiting, quid pro quo, threadjacking, social media exploitation, and tailgating. Social mining is an attempt to gather information about the organization that may be used to support future attacks. Security literacy training includes how to communicate employee and management concerns regarding potential indicators of insider threat and potential and actual instances of social engineering and data mining through appropriate organizational channels in accordance with established policies and procedures.
Source Controls: AT-02, AT-02(02), AT-02(03)
Supporting Publications: SP 800-50 [32], SP 800-160-2 [10]
Provide role-based security training to organizational personnel:
Before authorizing access to the system or CUI, before performing assigned duties, and [Assignment: organization-defined frequency] thereafter
When required by system changes or following [Assignment: organization-defined events].
Update role-based training content [Assignment: organization-defined frequency] and following [Assignment: organization-defined events].
Organizations determine the content and frequency of security training based on the assigned duties, roles, and responsibilities of individuals and the security requirements of the systems to which personnel have authorized access. In addition, organizations provide system developers, enterprise architects, security architects, software developers, systems integrators, acquisition/procurement officials, system and network administrators, personnel conducting configuration management and auditing activities, personnel performing independent verification and validation, security assessors, and personnel with access to system-level software with security-related technical training specifically tailored for their assigned duties.
Comprehensive role-based training addresses management, operational, and technical roles and responsibilities that cover physical, personnel, and technical controls. Such training can include policies, procedures, tools, and artifacts for the security roles defined. Organizations also provide the training necessary for individuals to carry out their responsibilities related to operations and supply chain security within the context of organizational information security programs.
Source Control: AT-03
Supporting Publications: SP 800-161 [33], SP 800-181 [34]
Incorporated into 03.02.01.
Specify the following event types selected for logging within the system: [Assignment: organization-defined event types].
Review and update the event types selected for logging [Assignment: organization-defined frequency].
An event is any observable occurrence in a system, including unlawful or unauthorized system activity. Organizations identify event types for which a logging functionality is needed. This includes events that are relevant to the security of systems and the environments in which those systems operate to meet specific and ongoing auditing needs. Event types can include password changes, the execution of privileged functions, failed logons or accesses related to systems, administrative privilege usage, or third-party credential usage. In determining event types that require logging, organizations consider the system monitoring and auditing that are appropriate for each of the security requirements. When defining event types, organizations consider the logging necessary to cover related events, such as the steps in distributed, transaction-based processes (e.g., processes that are distributed across multiple organizations) and actions that occur in service-oriented or cloud-based architectures.
Monitoring and auditing requirements can be balanced with other system needs. For example, organizations may determine that systems must have the capability to log every file access — both successful and unsuccessful — but only activate that capability under specific circumstances due to the potential burden on system performance. The event types that are logged by organizations may change over time. Reviewing and updating the set of logged event types are necessary to ensure that the current set of event types remains relevant.
Source Control: AU-02
Supporting Publications: SP 800-92 [35]
Include the following content in audit records:
What type of event occurred
When the event occurred
Where the event occurred
Source of the event
Outcome of the event
Identity of the individuals, subjects, objects, or entities associated with the event
Provide additional information for audit records as needed.
Audit record content that may be necessary to support the auditing function includes time stamps, source and destination addresses, user or process identifiers, event descriptions, file names, and the access control or flow control rules that are invoked. Event outcomes can include indicators of event success or failure and event-specific results (e.g., the security state of the system after the event occurred). Detailed information that organizations consider in audit records may include a full text recording of privileged commands or the individual identities of group account users.
Source Controls: AU-03, AU-03(01)
Supporting Publications: None
Generate audit records for the selected event types and audit record content specified in 03.03.01 and 03.03.02.
Retain audit records for a time period consistent with the records retention policy.
Audit records can be generated at various levels of abstraction, including at the packet level as information traverses the network. Selecting the appropriate level of abstraction is a critical aspect of an audit logging capability and can facilitate the identification of root causes to problems. The ability to add information generated in audit records is dependent on system functionality to configure the audit record content. Organizations may consider additional information in audit records, including the access control or flow control rules invoked and the individual identities of group account users. Organizations may also consider limiting additional audit record information to only information that is explicitly needed for audit requirements.
Supporting Publications: SP 800-92 [35]
Alert organizational personnel or roles within [Assignment: organization-defined time period] in the event of an audit logging process failure.
Take the following additional actions: [Assignment: organization-defined additional actions].
Audit logging process failures include software and hardware errors, failures in audit log capturing mechanisms, and reaching or exceeding audit log storage capacity. Response actions include overwriting the oldest audit records, shutting down the system, and stopping the generation of audit records. Organizations may choose to define additional actions for audit logging process failures based on the type of failure, the location of the failure, the severity of the failure, or a combination of such factors. When the audit logging process failure is related to storage, the response is carried out for the audit log storage repository (i.e., the distinct system component where the audit logs are stored), the system on which the audit logs reside, the total audit log storage capacity of the organization (i.e., all audit log storage repositories combined), or all three. Organizations may decide to take no additional actions after alerting designated roles or personnel.
Source Control: AU-05
Supporting Publications: None
Review and analyze system audit records [Assignment: organization-defined frequency] for indications and the potential impact of inappropriate or unusual activity.
Report findings to organizational personnel or roles.
Analyze and correlate audit records across different repositories to gain organization-wide situational awareness.
Audit record review, analysis, and reporting cover information security logging performed by organizations and can include logging that results from the monitoring of account usage, remote access, wireless connectivity, configuration settings, the use of maintenance tools and nonlocal maintenance, system component inventory, mobile device connection, equipment delivery and removal, physical access, temperature and humidity, communications at system interfaces, and the use of mobile code. Findings can be reported to organizational entities, such as the incident response team, help desk, and security or privacy offices. If organizations are prohibited from reviewing and analyzing audit records or unable to conduct such activities, the review or analysis may be carried out by other organizations granted such authority. The scope, frequency, and/or depth of the audit record review, analysis, and reporting may be adjusted to meet organizational needs based on new information received. Correlating audit record review, analysis, and reporting processes helps to ensure that audit records collectively create a more complete view of events.
Source Controls: AU-06, AU-06(03)
Supporting Publications: SP 800-86 [36], SP 800-101 [37]
Implement an audit record reduction and report generation capability that supports audit record review, analysis, reporting requirements, and after-the-fact investigations of incidents.
Preserve the original content and time ordering of audit records.
Audit records are generated in 03.03.03. Audit record reduction and report generation occur after audit record generation. Audit record reduction is a process that manipulates collected audit information and organizes it in a summary format that is more meaningful to analysts. Audit record reduction and report generation capabilities do not always come from the same system or organizational entities that conduct auditing activities. An audit record reduction capability can include, for example, modern data mining techniques with advanced data filters to identify anomalous behavior in audit records. The report generation capability provided by the system can help generate customizable reports. The time ordering of audit records can be a significant issue if the granularity of the time stamp in the record is insufficient.
Source Control: AU-07
Supporting Publications: None
Use internal system clocks to generate time stamps for audit records.
Record time stamps for audit records that meet [Assignment: organization-defined granularity of time measurement] and that use Coordinated Universal Time (UTC), have a fixed local time offset from UTC, or include the local time offset as part of the time stamp.
Time stamps generated by the system include the date and time. Time is often expressed in Coordinated Universal Time (UTC) — a modern continuation of Greenwich Mean Time (GMT) — or local time with an offset from UTC. The granularity of time measurements refers to the degree of synchronization between system clocks and reference clocks (e.g., clocks synchronizing within hundreds or tens of milliseconds). Organizations may define different time granularities for system components. Time service can be critical to other security capabilities (e.g., access control and identification and authentication), depending on the nature of the mechanisms used to support those capabilities.
Source Control: AU-08
Supporting Publications: None
Protect audit information and audit logging tools from unauthorized access, modification, and deletion.
Authorize access to management of audit logging functionality to only a subset of privileged users or roles.
Audit information includes the information needed to successfully audit system activity, such as audit records, audit log settings, audit reports, and personally identifiable information. Audit logging tools are programs and devices used to conduct audit and logging activities. The protection of audit information focuses on technical protection and limits the ability to access and execute audit logging tools to authorized individuals. The physical protection of audit information is addressed by media and physical protection requirements.
Individuals or roles with privileged access to a system and who are also the subject of an audit by that system may affect the reliability of the audit information by inhibiting audit activities or modifying audit records. Requiring privileged access to be further defined between audit-related privileges and other privileges limits the number of users or roles with audit-related privileges.
Source Controls: AU-09, AU-09(04)
Supporting Publications: None
Incorporated into 03.03.08.
Develop and maintain under configuration control, a current baseline configuration of the system.
Review and update the baseline configuration of the system [Assignment: organization-defined frequency] and when system components are installed or modified.
Baseline configurations for the system and system components include aspects of connectivity, operation, and communications. Baseline configurations are documented, formally reviewed, and agreed-upon specifications for the system or configuration items within the system. Baseline configurations serve as a basis for future builds, releases, or changes to the system and include information about system components, operational procedures, network topology, and the placement of components in the system architecture. Maintaining baseline configurations requires creating new baselines as the system changes over time. Baseline configurations of the system reflect the current enterprise architecture.
Source Control: CM-02
Supporting Publications: SP 800-124 [28], SP 800-128 [41], IR 8011-2 [42], IR 8011-3 [43]
Establish, document, and implement the following configuration settings for the system that reflect the most restrictive mode consistent with operational requirements: [Assignment: organization-defined configuration settings].
Identify, document, and approve any deviations from established configuration settings.
Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the system and that affect the security posture or functionality of the system. Security-related configuration settings can be defined for systems (e.g., servers, workstations), input and output devices (e.g., scanners, copiers, printers), network components (e.g., firewalls, routers, gateways, voice and data switches, wireless access points, network appliances, sensors), operating systems, middleware, and applications.
Security parameters are those parameters that impact the security state of the system, including the parameters required to satisfy other security requirements. Security parameters include registry settings; account, file, and directory permission settings (i.e., privileges); and settings for functions, ports, protocols, and remote connections. Organizations establish organization-wide configuration settings and subsequently derive specific configuration settings for the system. The established settings become part of the system’s configuration baseline.
Common secure configurations (also referred to as security configuration checklists, lockdown and hardening guides, security reference guides, and security technical implementation guides) provide recognized, standardized, and established benchmarks that stipulate secure configuration settings for specific information technology platforms/products and instructions for configuring those system components to meet operational requirements. Common secure configurations can be developed by a variety of organizations, including information technology product developers, manufacturers, vendors, consortia, academia, industry, federal agencies, and other organizations in the public and private sectors.
Source Control: CM-06
Supporting Publications: SP 800-70 [44], SP 800-126 [45], SP 800-128 [41]
Define the types of changes to the system that are configuration-controlled.
Review proposed configuration-controlled changes to the system, and approve or disapprove such changes with explicit consideration for security impacts.
Implement and document approved configuration-controlled changes to the system.
Monitor and review activities associated with configuration-controlled changes to the system.
Configuration change control refers to tracking, reviewing, approving or disapproving, and logging changes to the system. Specifically, it involves the systematic proposal, justification, implementation, testing, review, and disposition of changes to the system, including system upgrades and modifications. Configuration change control includes changes to baseline configurations for system components (e.g., operating systems, applications, firewalls, routers, mobile devices) and configuration items of the system, changes to configuration settings, unscheduled and unauthorized changes, and changes to remediate vulnerabilities. This requirement is related to 03.04.04.
Source Control: CM-03
Supporting Publications: SP 800-124 [28], SP 800-128 [41]
Analyze changes to the system to determine potential security impacts prior to change implementation.
Verify that the security requirements for the system continue to be satisfied after the system changes have been implemented.
Organizational personnel with security responsibilities conduct impact analyses that include reviewing system security plans, policies, and procedures to understand security requirements; reviewing system design documentation and operational procedures to understand how system changes might affect the security state of the system; reviewing the impacts of system changes on supply chain partners with stakeholders; and determining how potential changes to a system create new risks and the ability to mitigate those risks. Impact analyses also include risk assessments to understand the impacts of changes and determine whether additional security requirements are needed. Changes to the system may affect the safeguards and countermeasures previously implemented. This requirement is related to 03.04.03. Not all changes to the system are configuration controlled.
Source Controls: CM-04, CM-04(02)
Supporting Publications: SP 800-128 [41]
Define, document, approve, and enforce physical and logical access restrictions associated with changes to the system.
Changes to the hardware, software, or firmware components of the system or the operational procedures related to the system can have potentially significant effects on the security of the system. Therefore, organizations permit only qualified and authorized individuals to access the system for the purpose of initiating changes. Access restrictions include physical and logical access controls, software libraries, workflow automation, media libraries, abstract layers (i.e., changes implemented into external interfaces rather than directly into the system), and change windows (i.e., changes occur only during specified times).
Source Control: CM-05
Supporting Publications: FIPS 140-3 [38], FIPS 180-4 [39], SP 800-128 [41]
Configure the system to provide only mission-essential capabilities.
Prohibit or restrict use of the following functions, ports, protocols, connections, and services: [Assignment: organization-defined functions, ports, protocols, connections, and services].
Review the system [Assignment: organization-defined frequency] to identify unnecessary or nonsecure functions, ports, protocols, connections, and services.
Disable or remove functions, ports, protocols, connections, and services that are unnecessary or nonsecure.
Systems can provide a variety of functions and services. Some functions and services that are routinely provided by default may not be necessary to support essential organizational missions, functions, or operations. It may be convenient to provide multiple services from single system components. However, doing so increases risk over limiting the services provided by any one component. Where feasible, organizations limit functionality to a single function per component.
Organizations review the functions and services provided by the system or system components to determine which functions and services are candidates for elimination. Organizations disable unused or unnecessary physical and logical ports and protocols to prevent the unauthorized connection of devices, the transfer of information, and tunneling. Organizations can employ network scanning tools, intrusion detection and prevention systems, and endpoint protection systems (e.g., firewalls and host-based intrusion detection systems) to identify and prevent the use of prohibited functions, ports, protocols, system connections, and services. Bluetooth, File Transfer Protocol (FTP), and peer-to-peer networking are examples of the types of protocols that organizations consider eliminating, restricting, or disabling.
Source Controls: CM-07, CM-07(01)
Supporting Publications: SP 800-160-1 [11], SP 800-167 [46]
Incorporated into 03.04.06 and 03.04.08.
Identify software programs authorized to execute on the system.
Implement a deny-all, allow-by-exception policy for the execution of authorized software programs on the system.
Review and update the list of authorized software programs [Assignment: organization-defined frequency].
If provided with the necessary privileges, users can install software in organizational systems. To maintain control over the software installed, organizations identify permitted and prohibited actions regarding software installation. Permitted software installations include updates and security patches to existing software and downloading new applications from organization-approved “app stores.” The policies selected for governing user-installed software are organization-developed or provided by some external entity. Policy enforcement methods can include procedural methods and automated methods.
Authorized software programs can be limited to specific versions or come from specific sources. To facilitate a comprehensive authorized software process and increase the strength of protection against attacks that bypass application-level authorized software, software programs may be decomposed into and monitored at different levels of detail. These levels include applications, application programming interfaces, application modules, scripts, system processes, system services, kernel functions, registries, drivers, and dynamic link libraries.
Source Control: CM-07(05)
Supporting Publications: SP 800-160-1 [11], SP 800-167 [46]
Addressed by 03.01.05, 03.04.08, and 03.12.03.
Develop and document an inventory of system components.
Review and update the system component inventory [Assignment: organization-defined frequency].
Update the system component inventory as part of installations, removals, and system updates.
System components are discrete, identifiable assets (i.e., hardware, software, and firmware elements) that compose a system. Organizations may implement centralized system component inventories that include components from all systems. In such situations, organizations ensure that the inventories include the system-specific information required for component accountability. The information necessary for effective accountability of system components includes the system name, software owners, software version numbers, software license information, hardware inventory specifications, and — for networked components — the machine names and network addresses for all implemented protocols (e.g., IPv4, IPv6). Inventory specifications include component type, physical location, date of receipt, manufacturer, cost, model, serial number, and supplier information.
Source Controls: CM-08, CM-08(01)
Supporting Publications: SP 800-124 [28], SP 800-128 [41], IR 8011-2 [42], IR 8011-3 [43]
Identify and document the location of CUI and the system components on which the information is processed and stored.
Document changes to the system or system component location where CUI is processed and stored.
Information location addresses the need to understand the specific system components where CUI is being processed and stored and the users who have access to CUI so that appropriate protection mechanisms can be provided, including information flow controls, access controls, and information management.
Source Control: CM-12
Supporting Publications: None
Issue systems or system components with the following configurations to individuals traveling to high-risk locations: [Assignment: organization-defined system configurations].
Apply the following security requirements to the systems or components when the individuals return from travel: [Assignment: organization-defined security requirements].
When it is known that a system or a system component will be in a high-risk area, additional security requirements may be needed to counter the increased threat. Organizations can implement protective measures on the systems or system components used by individuals departing on and returning from travel. Actions include determining whether the locations are of concern, defining the required configurations for the components, ensuring that the components are configured as intended before travel is initiated, and taking additional actions after travel is completed. For example, systems going into high-risk areas can be configured with sanitized hard drives, limited applications, and more stringent configuration settings. Actions applied to mobile devices upon return from travel include examining the device for signs of physical tampering and purging and reimaging the device storage.
Source Control: CM-02(07)
Supporting Publications: SP 800-124 [28], SP 800-128 [41]
Uniquely identify and authenticate system users, and associate that unique identification with processes acting on behalf of those users.
Re-authenticate users when [Assignment: organization-defined circumstances or situations requiring re-authentication].
System users include individuals (or system processes acting on behalf of individuals) who are authorized to access a system. Typically, individual identifiers are the usernames associated with the system accounts assigned to those individuals. Since system processes execute on behalf of groups and roles, organizations may require the unique identification of individuals in group accounts or the accountability of individual activity. The unique identification and authentication of users apply to all system accesses. Organizations use passwords, physical authenticators, biometrics, or some combination thereof to authenticate user identities. Organizations may re-authenticate individuals in certain situations, including when roles, authenticators, or credentials change; when the execution of privileged functions occurs; after a fixed time period; or periodically.
Supporting Publications: SP 800-63-3 [27]
Uniquely identify and authenticate [Assignment: organization-defined devices or types of devices] before establishing a system connection.
Devices that require unique device-to-device identification and authentication are defined by type, device, or a combination of type and device. Organization-defined device types include devices that are not owned by the organization. Systems use shared known information (e.g., Media Access Control [MAC], Transmission Control Protocol/Internet Protocol [TCP/IP] addresses) for device identification or organizational authentication solutions (e.g., Institute of Electrical and Electronics Engineers [IEEE] 802.1x and Extensible Authentication Protocol [EAP], RADIUS server with EAP-Transport Layer Security [TLS] authentication, Kerberos) to identify and authenticate devices on local and wide area networks. Public Key Infrastructure (PKI) and certificate revocation checking for the certificates exchanged can be included as part of device authentication.
Source Control: IA-03
Supporting Publications: SP 800-63-3 [27]
Implement multi-factor authentication for access to privileged and non-privileged accounts.
This requirement applies to user accounts. Multi-factor authentication requires the use of two or more different factors to achieve authentication. The authentication factors are defined as follows: something you know (e.g., a personal identification number [PIN]), something you have (e.g., a physical authenticator, such as a cryptographic private key), or something you are (e.g., a biometric). Multi-factor authentication solutions that feature physical authenticators include hardware authenticators that provide time-based or challenge-response outputs and smart cards. In addition to authenticating users at the system level, organizations may also employ authentication mechanisms at the application level to provide increased information security.
Source Controls: IA-02(01), IA-02(02)
Supporting Publications: SP 800-63-3 [27]
Implement replay-resistant authentication mechanisms for access to privileged and non-privileged accounts.
Authentication processes resist replay attacks if it is impractical to successfully authenticate by recording or replaying previous authentication messages. Replay-resistant techniques include protocols that use nonces or challenges, such as time synchronous or challenge-response one-time authenticators.
Source Control: IA-02(08)
Supporting Publications: SP 800-63-3 [27]
Receive authorization from organizational personnel or roles to assign an individual, group, role, service, or device identifier.
Select and assign an identifier that identifies an individual, group, role, service, or device.
Prevent the reuse of identifiers for [Assignment: organization-defined time period].
Manage individual identifiers by uniquely identifying each individual as [Assignment: organization-defined characteristic identifying individual status].
Identifiers are provided for users, processes acting on behalf of users, and devices. Prohibiting the reuse of identifiers prevents the assignment of previously used individual, group, role, service, or device identifiers to different individuals, groups, roles, services, or devices.
Characteristics that identify the status of individuals include contractors, foreign nationals, and non-organizational users. Identifying the status of individuals by these characteristics provides information about the people with whom organizational personnel are communicating. For example, it is useful for an employee to know that one of the individuals on an email message is a contractor.
Source Controls: IA-04, IA-04(04)
Supporting Publications: SP 800-63-3 [27]
Consistency with SP 800-53 [8].
Maintain a list of commonly-used, expected, or compromised passwords, and update the list [Assignment: organization-defined frequency] and when organizational passwords are suspected to have been compromised.
Verify that passwords are not found on the list of commonly used, expected, or compromised passwords when users create or update passwords.
Transmit passwords only over cryptographically protected channels.
Store passwords in a cryptographically protected form.
Select a new password upon first use after account recovery.
Enforce the following composition and complexity rules for passwords: [Assignment: organization-defined composition and complexity rules].
Password-based authentication applies to passwords used in single-factor or multi-factor authentication. Long passwords or passphrases are preferable to shorter passwords. Enforced composition rules provide marginal security benefits while decreasing usability. However, organizations may choose to establish and enforce certain rules for password generation (e.g., minimum character length) under certain circumstances. For example, account recovery can occur when a password is forgotten. Cryptographically protected passwords include salted one-way cryptographic hashes of passwords. The list of commonly used, compromised, or expected passwords includes passwords obtained from previous breach corpuses, dictionary words, and repetitive or sequential characters. The list includes context-specific words, such as the name of the service, username, and derivatives thereof. Changing temporary passwords to permanent passwords immediately after system logon ensures that the necessary strength of the authentication mechanism is implemented at the earliest opportunity and reduces susceptibility to authenticator compromises. Long passwords and passphrases can be used to increase the complexity of passwords.
Source Control: IA-05(01)
Supporting Publications: SP 800-63-3 [27]
Consistency with SP 800-53 [8].
Consistency with SP 800-53 [8].
Incorporated into 03.05.07.
Obscure feedback of authentication information during the authentication process.
Authentication feedback does not provide information that would allow unauthorized individuals to compromise authentication mechanisms. For example, for desktop or notebook systems with relatively large monitors, the threat may be significant (commonly referred to as shoulder surfing). For mobile devices with small displays, this threat may be less significant and is balanced against the increased likelihood of input errors due to small keyboards. Therefore, the means of obscuring authenticator feedback is selected accordingly. Obscuring feedback includes displaying asterisks when users type passwords into input devices or displaying feedback for a limited time before fully obscuring it.
Source Control: IA-06
Supporting Publications: None
Verify the identity of the individual, group, role, service, or device receiving the authenticator as part of the initial authenticator distribution.
Establish initial authenticator content for any authenticators issued by the organization.
Establish and implement administrative procedures for initial authenticator distribution; for lost, compromised, or damaged authenticators; and for revoking authenticators.
Change default authenticators at first use.
Change or refresh authenticators [Assignment: organization-defined frequency] or when the following events occur: [Assignment: organization-defined events].
Protect authenticator content from unauthorized disclosure and modification.
Authenticators include passwords, cryptographic devices, biometrics, certificates, one-time password devices, and ID badges. The initial authenticator content is the actual content of the authenticator (e.g., the initial password). In contrast, requirements for authenticator content contain specific characteristics. Authenticator management is supported by organization-defined settings and restrictions for various authenticator characteristics (e.g., password complexity and composition rules, validation time window for time synchronous one-time tokens, and the number of allowed rejections during the verification stage of biometric authentication).
The requirement to protect individual authenticators may be implemented by 03.15.03 for authenticators in the possession of individuals and by 03.01.01, 03.01.02, 03.01.05, and 03.13.08 for authenticators stored in organizational systems. This includes passwords stored in hashed or encrypted formats or files that contain hashed or encrypted passwords that are accessible with administrator privileges. Actions can be taken to protect authenticators, including maintaining possession of authenticators, not sharing authenticators with others, and immediately reporting lost, stolen, or compromised authenticators.
Developers may deliver system components with factory default authentication credentials to allow for initial installation and configuration. Default authentication credentials are often well-known, easily discoverable, and present a significant risk. Authenticator management includes issuing and revoking authenticators for temporary access when they are no longer needed. The use of long passwords or passphrases may obviate the need to periodically change authenticators.
Source Control: IA-05
Supporting Publications: SP 800-63-3 [27]
Implement an incident-handling capability that is consistent with the incident response plan and includes preparation, detection and analysis, containment, eradication, and recovery.
Incident-related information can be obtained from a variety of sources, including audit monitoring, network monitoring, physical access monitoring, user and administrator reports, and reported supply chain events. An effective incident handling capability involves coordination among many organizational entities, including mission and business owners, system owners, human resources offices, physical and personnel security offices, legal departments, operations personnel, and procurement offices.
Source Controls: IR-04
Supporting Publications: SP 800-50 [32], SP 800-61 [47], SP 800-161 [33]
Track and document system security incidents.
[Assignment: organization-defined time period].
Report incident information to [Assignment: organization-defined authorities].
Provide an incident response support resource that offers advice and assistance to system users on handling and reporting incidents.
Documenting incidents includes maintaining records about each incident, the status of the incident, and other pertinent information necessary for forensics as well as evaluating incident details, trends, and handling. Incident information can be obtained from many sources, including network monitoring, incident reports, incident response teams, user complaints, supply chain partners, audit monitoring, physical access monitoring, and user and administrator reports. 03.06.01 provides information on the types of incidents that are appropriate for monitoring. The types of incidents reported, the content and timeliness of the reports, and the reporting authorities reflect applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines. Incident information informs risk assessments, the effectiveness of security assessments, the security requirements for acquisitions, and the selection criteria for technology products. Incident response support resources provided by organizations include help desks, assistance groups, automated ticketing systems to open and track incident response tickets, and access to forensic services or consumer redress services, when required.
Source Controls: IR-05, IR-06, IR-07
Supporting Publications: SP 800-61 [47], SP 800-86 [36]
Test the effectiveness of the incident response capability [Assignment: organization-defined frequency].
Organizations test incident response capabilities to determine their effectiveness and identify potential weaknesses or deficiencies. Incident response testing includes the use of checklists, walk-through or tabletop exercises, and simulations. Incident response testing can include a determination of the effects of incident response on organizational operations, organizational assets, and individuals. Qualitative and quantitative data can help determine the effectiveness of incident response processes.
Source Control: IR-03
Supporting Publications: SP 800-84 [48]
Provide incident response training to system users consistent with assigned roles and responsibilities:
Within [Assignment: organization-defined time period] of assuming an incident response role or responsibility or acquiring system access,
When required by system changes, and
[Assignment: organization-defined frequency] thereafter.
Review and update incident response training content [Assignment: organization-defined frequency] and following [Assignment: organization-defined events].
Incident response training is associated with the assigned roles and responsibilities of organizational personnel to ensure that the appropriate content and level of detail are included in such training. For example, users may only need to know how to recognize an incident or whom to call; system administrators may require additional training on how to handle incidents; and incident responders may receive specific training on data collection techniques, forensics, reporting, system recovery, and system restoration. Incident response training includes user training in identifying and reporting suspicious activities from external and internal sources. Incident response training for users may be provided as part of 03.02.02. Events that may cause an update to incident response training content include incident response plan testing, response to an actual incident, audit or assessment findings, or changes in applicable laws, Executive Orders, policies, directives, regulations, standards, and guidelines.
Source Control: IR-02
Supporting Publications: SP 800-86 [36], SP 800-137 [49]
Develop an incident response plan that:
Provides the organization with a roadmap for implementing its incident response capability,
Describes the structure and organization of the incident response capability,
Provides a high-level approach for how the incident response capability fits into the overall organization,
Defines reportable incidents,
Addresses the sharing of incident information, and
Designates responsibilities to organizational entities, personnel, or roles.
Distribute copies of the incident response plan to designated incident response personnel (identified by name and/or by role) and organizational elements.
Update the incident response plan to address system and organizational changes or problems encountered during plan implementation, execution, or testing.
Protect the incident response plan from unauthorized disclosure.
It is important that organizations develop and implement a coordinated approach to incident response. Organizational mission and business functions determine the structure of incident response capabilities. As part of the incident response capabilities, organizations consider the coordination and sharing of information with external organizations, including external service providers and other organizations involved in the supply chain.
Source Control: IR-08
Supporting Publications: SP 800-86 [36], SP 800-137 [49]
Recategorized as NCO.
Incorporated into 03.07.04 and 03.07.06.
Incorporated into 03.08.03.
Approve, control, and monitor the use of system maintenance tools.
Check media with diagnostic and test programs for malicious code before it is used in the system.
Prevent the removal of system maintenance equipment containing CUI by verifying that there is no CUI on the equipment, sanitizing or destroying the equipment, or retaining the equipment within the facility.
Approving, controlling, monitoring, and reviewing maintenance tools address security-related issues associated with the tools that are used for diagnostic and repair actions on the system. Maintenance tools can include hardware and software diagnostic and test equipment as well as packet sniffers. The tools may be pre-installed, brought in with maintenance personnel on media, cloud-based, or downloaded from a website. Diagnostic and test programs are potential vehicles for transporting malicious code into the system, either intentionally or unintentionally. Examples of media inspection include checking the cryptographic hash or digital signatures of diagnostic and test programs and media.
If organizations inspect media that contain diagnostic and test programs and determine that the media also contain malicious code, the incident is handled consistent with incident handling policies and procedures. A periodic review of system maintenance tools can result in the withdrawal of approval for outdated, unsupported, irrelevant, or no-longer-used tools. Maintenance tools do not address the hardware and software components that support maintenance and are considered a part of the system.
Source Controls: MA-03, MA-03(01), MA-03(02), MA-03(03)
Supporting Publications: SP 800-88 [50]
Approve and monitor nonlocal maintenance and diagnostic activities.
Implement multi-factor authentication and replay resistance in the establishment of nonlocal maintenance and diagnostic sessions.
Terminate session and network connections when nonlocal maintenance is completed.
Nonlocal maintenance and diagnostic activities are conducted by individuals who communicate through an external or internal network. Local maintenance and diagnostic activities are carried out by individuals who are physically present at the location of the system and not communicating across a network connection. Authentication techniques used to establish nonlocal maintenance and diagnostic sessions reflect the requirements in 03.05.01.
Source Control: MA-04
Supporting Publications: SP 800-63-3 [27], SP 800-88 [50]
Establish a process for maintenance personnel authorization.
Maintain a list of authorized maintenance organizations or personnel.
Verify that non-escorted personnel who perform maintenance on the system possess the required access authorizations.
Designate organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations.
Maintenance personnel refers to individuals who perform hardware or software maintenance on the system, while 03.10.01 addresses physical access for individuals whose maintenance duties place them within the physical protection perimeter of the system. The technical competence of supervising individuals relates to the maintenance performed on the system, while having required access authorizations refers to maintenance on and near the system. Individuals who have not been previously identified as authorized maintenance personnel (e.g., manufacturers, consultants, systems integrators, and vendors) may require privileged access to the system, such as when they are required to conduct maintenance with little or no notice. Organizations may choose to issue temporary credentials to these individuals based on their risk assessments. Temporary credentials may be for one-time use or for very limited time periods.
Source Control: MA-05
Supporting Publications: None
Physically control and securely store system media that contain CUI.
System media include digital and non-digital media. Digital media include diskettes, flash drives, magnetic tapes, external or removable solid state or magnetic drives, compact discs, and digital versatile discs. Non-digital media include paper and microfilm. Physically controlling stored media includes conducting inventories, establishing procedures to allow individuals to check out and return media to libraries, and maintaining accountability for stored media. Secure storage includes a locked drawer, desk, or cabinet or a controlled media library. Controlled areas provide physical and procedural controls to meet the requirements established for protecting information and systems. Sanitization techniques (e.g., destroying, cryptographically erasing, clearing, and purging) prevent the disclosure of CUI to unauthorized individuals. The sanitization process removes CUI from media such that the information cannot be retrieved or reconstructed.
Source Control: MP-04
Supporting Publications: SP 800-88 [50], SP 800-111 [51]
Restrict access to CUI on system media to authorized personnel or roles.
System media include digital and non-digital media. Access to CUI on system media can be restricted by physically controlling such media. This includes conducting inventories, ensuring that procedures are in place to allow individuals to check out and return media to the media library, and maintaining accountability for stored media. For digital media, access to CUI can be restricted by using cryptographic means. Encrypting data in storage or at rest is addressed in 03.13.08.
Source Control: MP-02
Supporting Publications: SP 800-111 [51]
Sanitize system media that contain CUI prior to disposal, release out of organizational control, or release for reuse.
Media sanitization applies to digital and non-digital media that are subject to disposal or reuse, whether or not the media are considered removable. Examples include digital media in scanners, copiers, printers, notebook computers, mobile devices, workstations, network components, and non-digital media. The sanitization process removes CUI from media such that the information cannot be retrieved or reconstructed. Sanitization techniques (e.g., cryptographically erasing, clearing, purging, and destroying) prevent the disclosure of CUI to unauthorized individuals when such media are reused or released for disposal. NARA policies control the sanitization process for media that contain CUI and may require destruction when other methods cannot be applied to the media.
Source Control: MP-06
Supporting Publications: SP 800-88 [50]
Mark system media that contain CUI to indicate distribution limitations, handling caveats, and applicable CUI markings.
System media include digital and non-digital media. Marking refers to the use or application of human-readable security attributes. Labeling refers to the use of security attributes for internal system data structures. Digital media include diskettes, magnetic tapes, external or removable solid state or magnetic drives, flash drives, compact discs, and digital versatile discs. Non-digital media include paper and microfilm. CUI is defined by NARA along with marking, safeguarding, and dissemination requirements for such information.
Source Control: MP-03
Supporting Publications: None
Protect and control system media that contain CUI during transport outside of controlled areas.
Maintain accountability of system media that contain CUI during transport outside of controlled areas.
Document activities associated with the transport of system media that contain CUI.
System media include digital and non-digital media. Digital media include flash drives, diskettes, magnetic tapes, external or removable solid state or magnetic drives, compact discs, and digital versatile discs. Non-digital media include microfilm and paper. Controlled areas are spaces for which organizations provide physical or procedural measures to meet the requirements established for protecting CUI and systems. Media protection during transport can include cryptography and/or locked containers. Activities associated with media transport include releasing media for transport, ensuring that media enter the appropriate transport processes, and the actual transport. Authorized transport and courier personnel may include individuals external to the organization. Maintaining accountability of media during transport includes restricting transport activities to authorized personnel and tracking or obtaining the records of transport activities as the media move through the transportation system to prevent and detect loss, destruction, or tampering. This requirement is related to 03.13.08 and 03.13.11.
Supporting Publications: SP 800-111 [51]
Addressed by 03.13.08.
Restrict or prohibit the use of [Assignment: organization-defined types of system media].
Prohibit the use of removable system media without an identifiable owner.
In contrast to requirement 03.08.01, which restricts user access to media, this requirement restricts or prohibits the use of certain types of media, such as external hard drives, flash drives, or smart displays. Organizations can use technical and non-technical measures (e.g., policies, procedures, and rules of behavior) to control the use of system media. For example, organizations may control the use of portable storage devices by using physical cages on workstations to prohibit access to external ports or disabling or removing the ability to insert, read, or write to devices.
Organizations may limit the use of portable storage devices to only approved devices, including devices provided by the organization, devices provided by other approved organizations, and devices that are not personally owned. Organizations may also control the use of portable storage devices based on the type of device — prohibiting the use of writeable, portable devices — and implement this restriction by disabling or removing the capability to write to such devices. Limits on the use of organization-controlled system media in external systems include restrictions on how the media may be used and under what conditions. Requiring identifiable owners (e.g., individuals, organizations, or projects) for removable system media reduces the risk of using such technologies by allowing organizations to assign responsibility and accountability for addressing known vulnerabilities in the media (e.g., insertion of malicious code).
Source Control: MP-07
Supporting Publications: SP 800-111 [51]
Incorporated into 03.08.07.
Protect the confidentiality of backup information.
Implement cryptographic mechanisms to prevent the unauthorized disclosure of CUI at backup storage locations.
The selection of cryptographic mechanisms is based on the need to protect the confidentiality of backup information. Hardware security module (HSM) devices safeguard and manage cryptographic keys and provide cryptographic processing. Cryptographic operations (e.g., encryption, decryption, and signature generation and verification) are typically hosted on the HSM device, and many implementations provide hardware-accelerated mechanisms for cryptographic operations. This requirement is related to 03.13.11.
Source Controls: CP-09, CP-09(08)
Supporting Publications: SP 800-34 [52], SP 800-130 [53], SP 800-152 [54]
Screen individuals prior to authorizing access to the system.
Rescreen individuals in accordance with [Assignment: organization-defined conditions requiring rescreening].
Personnel security screening activities involve the assessment of the conduct, integrity, judgment, loyalty, reliability, and stability of an individual (i.e., the individual’s trustworthiness) prior to authorizing access to the system or when elevating system access. The screening and rescreening activities reflect applicable federal laws, Executive Orders, directives, policies, regulations, and criteria established for the level of access required for the assigned position.
Source Control: PS-03
Supporting Publications: SP 800-181 [34]
When individual employment is terminated:
Disable system access within [Assignment: organization-defined time period],
Terminate or revoke authenticators and credentials associated with the individual, and
Retrieve security-related system property.
When individuals are reassigned or transferred to other positions in the organization:
Review and confirm the ongoing operational need for current logical and physical access authorizations to the system and facility, and
Modify access authorization to correspond with any changes in operational need.
Security-related system property includes hardware authentication tokens, system administration technical manuals, keys, identification cards, and building passes. Exit interviews ensure that terminated individuals understand the security constraints imposed by being former employees and that accountability is achieved for the organizational property. Security topics at exit interviews include reminding individuals of potential limitations on future employment and non-disclosure agreements. Exit interviews may not always be possible for some individuals, including in cases related to the unavailability of supervisors, illnesses, or job abandonment.
The timely execution of termination actions is essential for individuals who have been terminated for cause. Organizations may consider disabling the accounts of individuals who are being terminated prior to the individuals being notified. This requirement applies to the reassignment or transfer of individuals when the personnel action is permanent or of such extended duration as to require protection. Protections that may be required for transfers or reassignments to other positions within organizations include returning old and issuing new identification cards, keys, and building passes; changing system access authorizations (i.e., privileges); closing system accounts and establishing new accounts; and providing access to official records to which individuals had access at previous work locations in previous system accounts.
Supporting Publications: None
Develop, approve, and maintain a list of individuals with authorized access to the facility where the system resides.
Issue authorization credentials for facility access.
Review the facility access list [Assignment: organization-defined frequency].
Remove individuals from the facility access list when access is no longer required.
A facility can include one or more physical locations containing systems or system components that process, store, or transmit CUI. Physical access authorizations apply to employees and visitors. Individuals with permanent physical access authorization credentials are not considered visitors. Authorization credentials include identification badges, identification cards, and smart cards. Organizations determine the strength of the authorization credentials consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines. Physical access authorizations may not be necessary to access certain areas within facilities that are designated as publicly accessible.
Source Control: PE-02
Supporting Publications: None
Monitor physical access to the facility where the system resides to detect and respond to physical security incidents.
Review physical access logs [Assignment: organization-defined frequency] and upon occurrence of [Assignment: organization-defined events or potential indications of events].
A facility can include one or more physical locations containing systems or system components that process, store, or transmit CUI. Physical access monitoring includes publicly accessible areas within organizational facilities. Examples of physical access monitoring include guards, video surveillance equipment (i.e., cameras), and sensor devices. Reviewing physical access logs can help to identify suspicious activities, anomalous events, or potential threats. The reviews can be supported by audit logging controls if the access logs are part of an automated system. Incident response capabilities include investigations of physical security incidents and responses to those incidents. Incidents include security violations or suspicious physical access activities, such as access outside of normal work hours, repeated access to areas not normally accessed, access for unusual lengths of time, and out-of-sequence access.
Source Control: PE-06
Supporting Publications: None
Incorporated into 03.10.07.
Incorporated into 03.10.07.
Incorporated into 03.10.07.
Determine alternate work sites allowed for use by employees.
Employ the following security requirements at alternate work sites: [Assignment: organization-defined security requirements].
Alternate work sites include the private residences of employees or other facilities designated by the organization. Alternate work sites can provide readily available alternate locations during contingency operations. Organizations can define different security requirements for specific alternate work sites or types of sites, depending on the work-related activities conducted at the sites. Assessing the effectiveness of the requirements and providing a means to communicate incidents at alternate work sites supports the contingency planning activities of organizations.
Source Control: PE-17
Supporting Publications: SP 800-46 [14], SP 800-114 [20]
Enforce physical access authorizations at entry and exit points to the facility where the system resides by:
Verifying individual physical access authorizations before granting access to the facility and
Controlling ingress and egress with physical access control systems, devices, or guards.
Maintain physical access audit logs for entry or exit points.
Escort visitors, and control visitor activity.
Secure keys, combinations, and other physical access devices.
Control physical access to output devices to prevent unauthorized individuals from obtaining access to CUI.
This requirement addresses physical locations containing systems or system components that process, store, or transmit CUI. Organizations determine the types of guards needed, including professional security staff or administrative staff. Physical access devices include keys, locks, combinations, biometric readers, and card readers. Physical access control systems comply with applicable laws, Executive Orders, directives, policies, regulations, standards, and guidelines. Organizations have flexibility in the types of audit logs employed. Audit logs can be procedural, automated, or some combination thereof. Physical access points can include exterior access points, interior access points to systems that require supplemental access controls, or both. Physical access control applies to employees and visitors. Individuals with permanent physical access authorizations are not considered visitors.
Controlling physical access to output devices includes placing output devices in locked rooms or other secured areas with keypad or card reader access controls and only allowing access to authorized individuals, placing output devices in locations that can be monitored by personnel, installing monitor or screen filters, and using headphones. Examples of output devices include monitors, printers, scanners, facsimile machines, audio devices, and copiers.
Supporting Publications: None
Control physical access to system distribution and transmission lines within organizational facilities.
Safeguarding measures applied to system distribution and transmission lines prevent accidental damage, disruption, and physical tampering. Such measures may also be necessary to prevent eavesdropping or the modification of unencrypted transmissions. Safeguarding measures used to control physical access to system distribution and transmission lines include disconnected or locked spare jacks, locked wiring closets, cabling protection with conduit or cable trays, and wiretapping sensors.
Source Control: PE-04
Supporting Publications: None
Assess the risk (including supply chain risk) of unauthorized disclosure resulting from the processing, storage, or transmission of CUI.
Update risk assessments [Assignment: organization-defined frequency].
Establishing the system boundary is a prerequisite to assessing the risk of the unauthorized disclosure of CUI. Risk assessments consider threats, vulnerabilities, likelihood, and adverse impacts to organizational operations and assets based on the operation and use of the system and the unauthorized disclosure of CUI. Risk assessments also consider risks from external parties (e.g., contractors operating systems on behalf of the organization, service providers, individuals accessing systems, and outsourcing entities). Risk assessments can be conducted at the organization level, the mission or business process level, or the system level and at any phase in the system development life cycle. Risk assessments include supply chain-related risks associated with suppliers or contractors and the system, system component, or system service that they provide.
Source Controls: RA-03, RA-03(01), SR-06
Supporting Publications: SP 800-30 [55], SP 800-161 [33]
Monitor and scan the system for vulnerabilities [Assignment: organization-defined frequency] and when new vulnerabilities affecting the system are identified.
Remediate system vulnerabilities within [Assignment: organization-defined response times].
Update system vulnerabilities to be scanned [Assignment: organization-defined frequency] and when new vulnerabilities are identified and reported.
Organizations determine the required vulnerability scanning for system components and ensure that potential sources of vulnerabilities (e.g., networked printers, scanners, and copiers) are not overlooked. Vulnerability analyses for custom software may require additional approaches, such as static analysis, dynamic analysis, or binary analysis. Organizations can use these approaches in source code reviews and tools (e.g., static analysis tools, web-based application scanners, binary analyzers). Vulnerability scanning includes scanning for patch levels; scanning for functions, ports, protocols, and services that should not be accessible to users or devices; and scanning for improperly configured or incorrectly operating flow control mechanisms.
To facilitate interoperability, organizations consider using scanning tools that express vulnerabilities in the Common Vulnerabilities and Exposures (CVE) naming convention. Sources for vulnerability information also include the Common Weakness Enumeration (CWE) listing, the National Vulnerability Database (NVD), and the Common Vulnerability Scoring System (CVSS).
Source Controls: RA-05, RA-05(02)
Supporting Publications: SP 800-40 [56], SP 800-53A [57], SP 800-70 [44], SP 800-115 [58], SP 800-126 [45]
Incorporated into 03.11.02.
Respond to findings from security assessments, monitoring, and audits.
This requirement addresses the need to determine an appropriate response to risk before generating a plan of action and milestones (POAM) entry. It may be possible to mitigate the risk immediately so that a POAM entry is not needed. However, a POAM entry is generated if the risk response is to mitigate the identified risk and the mitigation cannot be completed immediately.
Source Control: RA-07
Supporting Publications: SP 800-30 [55], SP 800-37 [59], SP 800-39 [60], SP 800-160-1 [11]
Assess the security requirements for the system and its environment of operation [Assignment: organization-defined frequency] to determine if the requirements have been satisfied.
By assessing the security requirements, organizations determine whether the necessary safeguards and countermeasures are implemented correctly, operating as intended, and producing the desired outcome. Security assessments identify weaknesses in the system and provide the essential information needed to make risk-based decisions. Security assessment reports document assessment results in sufficient detail as deemed necessary by the organization to determine the accuracy and completeness of the reports. Security assessment results are provided to the individuals or roles appropriate for the types of assessments being conducted.
Source Control: CA-02
Supporting Publications: SP 800-53 [8], SP 800-53A [57], SP 800-37 [59], SP 800-115 [58]
Develop a plan of action and milestones for the system:
To document the planned remediation actions to correct weaknesses or deficiencies noted during security assessments and
To reduce or eliminate known system vulnerabilities.
Update the existing plan of action and milestones based on the findings from:
Security assessments,
Audits or reviews, and
Continuous monitoring activities.
Plans of action and milestones (POAMs) are important documents in organizational security programs. Organizations use POAMs to describe how unsatisfied security requirements will be met and how planned mitigations will be implemented. Organizations can document system security plans and POAMs as separate or combined documents in any format. Federal agencies may consider system security plans and POAMs as inputs to risk-based decisions on whether to process, store, or transmit CUI on a system hosted by a nonfederal organization.
Source Control: CA-05
Supporting Publications: SP 800-37 [59]
Develop and implement a system-level continuous monitoring strategy that includes ongoing monitoring and security assessments.
Continuous monitoring at the system level facilitates ongoing awareness of the system security posture to support risk management decisions. The terms continuous and ongoing imply that organizations assess and monitor their systems at a frequency that is sufficient to support risk-based decisions. Different types of security requirements may require different monitoring frequencies.
Source Control: CA-07
Supporting Publications: SP 800-37 [59], SP 800-39 [60], SP 800-53A [57], SP 800-115 [58], SP 800-137 [49]
Incorporated into 03.15.02.
Approve and manage the exchange of CUI between the system and other systems using [Selection (one or more): interconnection security agreements; information exchange security agreements; memoranda of understanding or agreement; service-level agreements; user agreements; non-disclosure agreements; other types of agreements].
Document interface characteristics, security requirements, and responsibilities for each system as part of the exchange agreements.
Review and update the exchange agreements [Assignment: organization-defined frequency].
Information exchange applies to information exchanges between two or more systems, both internal and external to the organization. Organizations consider the risks related to new or increased threats that may be introduced when systems exchange information with other systems that may have different security requirements or policies. The types of agreements selected are based on factors such as the relationship between the organizations exchanging information (e.g., government to government, business to business, government to business, government or business, or government or business to individual) and the level of access to the organizational system by users of the other system. The types of agreements can include information exchange security agreements, interconnection security agreements, memoranda of understanding or agreement, service-level agreements, or other types of agreements.
Organizations may incorporate agreement information into formal contracts, especially for information exchanges established between federal agencies and nonfederal organizations (e.g., service providers, contractors, system developers, and system integrators). The types of information contained in exchange agreements include the interface characteristics, security requirements, controls, and responsibilities for each system.
Source Control: CA-03
Supporting Publications: SP 800-47 [83]
Monitor and control communications at external managed interfaces to the system and key internal managed interfaces within the system.
Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks.
Connect to external systems only through managed interfaces that consist of boundary protection devices arranged in accordance with an organizational security architecture.
Managed interfaces include gateways, routers, firewalls, network-based malicious code analysis, virtualization systems, and encrypted tunnels implemented within a security architecture. Subnetworks that are either physically or logically separated from internal networks are referred to as demilitarized zones or DMZs. Restricting or prohibiting interfaces within organizational systems includes restricting external web traffic to designated web servers within managed interfaces, prohibiting external traffic that appears to be spoofing internal addresses, and prohibiting internal traffic that appears to be spoofing external addresses.
Source Control: SC-07
Supporting Publications: SP 800-41 [64], SP 800-125B [65], SP 800-160-1 [11], SP 800-189 [67], SP 800-207 [66]
Recategorized as NCO.
Addressed by 03.01.01, 03.01.02, 03.01.03, 03.01.04, 03.01.05, 03.01.06, and 03.01.07.
Prevent unauthorized and unintended information transfer via shared system resources.
Preventing unauthorized and unintended information transfer via shared system resources stops information produced by the actions of prior users or roles (or actions of processes acting on behalf of prior users or roles) from being available to current users or roles (or current processes acting on behalf of current users or roles) that obtain access to shared system resources after those resources have been released back to the system. Information in shared system resources also applies to encrypted representations of information. In other contexts, the control of information in shared system resources is referred to as object reuse and residual information protection. Information in shared system resources does not address information remanence, which refers to the residual representation of data that has been nominally deleted, covert channels (including storage and timing channels) in which shared system resources are manipulated to violate information flow restrictions, or components within systems for which there are only single users or roles.
Source Control: SC-04
Supporting Publications: None
Incorporated into 03.13.01.
Deny network communications traffic by default, and allow network communications traffic by exception.
This requirement applies to inbound and outbound network communications traffic at the system boundary and at identified points within the system. A deny-all, allow-by-exception network communications traffic policy ensures that only essential and approved connections are allowed.
Source Control: SC-07(05)
Supporting Publications: SP 800-41 [64], SP 800-77 [18], SP 800-189 [67]
Addressed by 03.01.12, 03.04.02 and 03.04.06.
Implement cryptographic mechanisms to prevent the unauthorized disclosure of CUI during transmission and while in storage.
This requirement applies to internal and external networks and any system components that can transmit CUI, including servers, notebook computers, desktop computers, mobile devices, printers, copiers, scanners, facsimile machines, and radios. Unprotected communication paths are susceptible to interception and modification. Encryption protects CUI from unauthorized disclosure during transmission and while in storage. Cryptographic mechanisms that protect the confidentiality of CUI during transmission include TLS and IPsec. Information in storage (i.e., information at rest) refers to the state of CUI when it is not in process or in transit and resides on internal or external storage devices, storage area network devices, and databases. Protecting CUI in storage does not focus on the type of storage device or the frequency of access to that device but rather on the state of the information. This requirement relates to 03.13.11.
Source Controls: SC-08, SC-08(01), SC-28, SC-28(01)
Supporting Publications: FIPS 140-3 [38], FIPS 197 [68], SP 800-46 [14], SP 800-52 [69], SP 800-56A [73], SP 800-56B [74], SP 800-56C [75], SP 800-57-1 [15], SP 800-57-2 [16], SP 800-57-3 [17], SP 800-77 [18], SP 800-111 [51], SP 800-113 [19], SP 800-114 [20], SP 800-121 [21], SP 800-124 [28], SP 800-177 [70]
Terminate the network connection associated with a communications session at the end of the session or after [Assignment: organization-defined time period] of inactivity.
This requirement applies to internal and external networks. Terminating network connections associated with communications sessions includes deallocating TCP/IP addresses or port pairs at the operating system level or deallocating networking assignments at the application level if multiple application sessions are using a single network connection. Time periods of inactivity may be established by organizations and include time periods by type of network access or for specific network accesses.
Source Control: SC-10
Supporting Publications: None
Establish and manage cryptographic keys in the system in accordance with the following key management requirements: [Assignment: organization-defined requirements for key generation, distribution, storage, access, and destruction].
Cryptographic keys can be established and managed using either manual procedures or automated mechanisms supported by manual procedures. Organizations satisfy key establishment and management requirements in accordance with applicable federal laws, Executive Orders, policies, directives, regulations, and standards that specify appropriate options, levels, and parameters. This requirement is related to 03.13.11.
Source Control: SC-12
Supporting Publications: FIPS 140-3 [38], SP 800-56A [73], SP 800-56B [74], SP 800-56C [75], SP 800-57-1 [15], SP 800-57-2 [16], SP 800-57-3 [17], SP 800-63-3 [27]
Implement the following types of cryptography to protect the confidentiality of CUI: [Assignment: organization-defined types of cryptography].
Cryptography is implemented in accordance with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines. FIPS-validated cryptography is recommended for the protection of CUI.
Source Control: SC-13
Supporting Publications: FIPS 140-3 [38]
Prohibit the remote activation of collaborative computing devices and applications with the following exceptions: [Assignment: organization-defined exceptions where remote activation is to be allowed].
Provide an explicit indication of use to users physically present at the devices.
Collaborative computing devices include white boards, microphones, and cameras. Notebook computers, smartphones, display monitors, and tablets containing cameras and microphones are considered part of collaborative computing devices when conferencing software is in use. Indication of use includes notifying users (e.g., a pop-up menu stating that recording is in progress or that the microphone has been turned on) when collaborative computing devices are activated. Dedicated video conferencing systems, which typically rely on one of the participants calling or connecting to the other party to activate the video conference, are excluded. Solutions to prevent device usage include webcam covers and buttons to disable microphones.
Source Control: SC-15
Supporting Publications: None
Define acceptable mobile code and mobile code technologies.
Authorize, monitor, and control the use of mobile code.
Mobile code includes software programs or parts of programs that are obtained from remote systems, transmitted across a network, and executed on a local system without explicit installation or execution by the recipient. Decisions regarding the use of mobile code are based on the potential for the code to cause damage to the system if used maliciously. Mobile code technologies include Java applets, JavaScript, HTML5, VBScript, and WebGL. Usage restrictions and implementation guidelines apply to the selection and use of mobile code installed on servers and downloaded and executed on individual workstations and devices, including notebook computers, smart phones, and smart devices. Mobile code policies and procedures address the actions taken to prevent the development, acquisition, and use of unacceptable mobile code within the system, including requiring mobile code to be digitally signed by a trusted source.
Source Control: SC-18
Supporting Publications: SP 800-28 [71]
Technology-specific.
Protect the authenticity of communications sessions.
Protecting session authenticity addresses communications protection at the session level, not at the packet level. Such protection establishes grounds for confidence at both ends of the communications sessions in the ongoing identities of other parties and the validity of the transmitted information. Authenticity protection includes protecting against adversary-in-the-middle attacks, session hijacking, and the insertion of false information into sessions.
Source Control: SC-23
Supporting Publications: SP 800-52 [69], SP 800-77 [18], SP 800-95 [72], SP 800-113 [19]
Incorporated into 03.13.08.
Identify, report, and correct system flaws.
Install security-relevant software and firmware updates within [Assignment: organization-defined time period] of the release of the updates.
Organizations identify systems that are affected by announced software and firmware flaws, including potential vulnerabilities that result from those flaws, and report this information to designated personnel with information security responsibilities. Security-relevant updates include patches, service packs, hot fixes, and anti-virus signatures. Organizations address the flaws discovered during security assessments, continuous monitoring, incident response activities, and system error handling. Organizations can take advantage of available resources (e.g., CWE or CVE databases) when remediating system flaws. Organization-defined time periods for updating security-relevant software and firmware may vary based on a variety of factors, including the criticality of the update (i.e., severity of the vulnerability related to the discovered flaw). Some types of flaw remediation may require more testing than other types.
Source Control: SI-02
Supporting Publications: SP 800-39 [60], SP 800-40 [56], SP 800-128 [41]
Implement malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code.
Update malicious code protection mechanisms as new releases are available in accordance with configuration management policies and procedures.
Configure malicious code protection mechanisms to:
Perform scans of the system [Assignment: organization-defined frequency] and real-time scans of files from external sources at endpoints or system entry and exit points as the files are downloaded, opened, or executed; and
Block malicious code, quarantine malicious code, or take other mitigation actions in response to malicious code detection.
Malicious code insertions occur through the exploitation of system vulnerabilities. Malicious code can be inserted into the system in a variety of ways, including email, the internet, and portable storage devices. Malicious code includes viruses, worms, Trojan horses, and spyware. Malicious code can be encoded in various formats, contained in compressed or hidden files, or hidden in files using techniques such as steganography. Malicious code may be present in commercial off-the-shelf software and custom-built software and could include logic bombs, backdoors, and other types of attacks that could affect organizational mission and business functions. Periodic scans of the system and real-time scans of files from external sources as files are downloaded, opened, or executed can detect malicious code. Malicious code protection mechanisms can also monitor systems for anomalous or unexpected behaviors and take appropriate actions.
Malicious code protection mechanisms include signature- and non-signature-based technologies. Non-signature-based detection mechanisms include artificial intelligence techniques that use heuristics to detect, analyze, and describe the characteristics or behavior of malicious code and to provide controls against such code for which signatures do not yet exist or for which existing signatures may not be effective. Malicious code for which active signatures do not yet exist or may be ineffective includes polymorphic malicious code (i.e., code that changes signatures when it replicates). Non-signature-based mechanisms include reputation-based technologies. Pervasive configuration management, anti-exploitation software, and software integrity controls may also be effective in preventing unauthorized code execution.
If malicious code cannot be detected by detection methods or technologies, organizations can rely on secure coding practices, configuration management and control, trusted procurement processes, and monitoring practices to help ensure that the software only performs intended functions. Organizations may determine that different actions are warranted in response to the detection of malicious code. For example, organizations can define actions to be taken in response to the detection of malicious code during scans, malicious downloads, or malicious activity when attempting to open or execute files.
Source Control: SI-03
Supporting Publications: SP 800-83 [76], SP 800-125B [65], SP 800-177 [70]
Receive system security alerts, advisories, and directives from external organizations on an ongoing basis.
Generate and disseminate internal system security alerts, advisories, and directives, as necessary.
There are many publicly available sources of system security alerts and advisories. The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) generate security alerts and advisories to maintain situational awareness across the Federal Government and in nonfederal organizations. Software vendors, subscription services, and industry Information Sharing and Analysis Centers (ISACs) may also provide security alerts and advisories. Compliance with security directives is essential due to the critical nature of many of these directives and the potential immediate adverse effects on organizational operations and assets, individuals, other organizations, and the Nation should the directives not be implemented in a timely manner.
Source Control: SI-05
Supporting Publications: SP 800-161 [33]
Incorporated into 03.14.02.
Addressed by 03.14.02.
Monitor the system to detect:
Attacks and indicators of potential attacks and
Unauthorized connections.
Identify unauthorized use of the system.
Monitor inbound and outbound communications traffic to detect unusual or unauthorized activities or conditions.
System monitoring involves external and internal monitoring. Internal monitoring includes the observation of events that occur within the system. External monitoring includes the observation of events that occur at the system boundary. Organizations can monitor the system by observing audit record activities in real time or by observing other system aspects, such as access patterns, characteristics of access, and other actions. The monitoring objectives may guide determination of the events.
A system monitoring capability is achieved through a variety of tools and techniques (e.g., audit record monitoring software, intrusion detection systems, intrusion prevention systems, malicious code protection software, scanning tools, network monitoring software). Strategic locations for monitoring devices include selected perimeter locations and near server farms that support critical applications with such devices being employed at managed system interfaces. The granularity of monitoring the information collected is based on organizational monitoring objectives and the capability of the system to support such objectives.
Systems connections can be network, remote, or local. A network connection is any connection with a device that communicates through a network (e.g., local area network, the internet). A remote connection is any connection with a device that communicates through an external network (e.g., the internet). Network, remote, and local connections can be either wired or wireless.
Unusual or unauthorized activities or conditions related to inbound and outbound communications traffic include internal traffic that indicates the presence of malicious code in the system or propagating among system components, the unauthorized export of information, or signaling to external systems. Evidence of malicious code is used to identify a potentially compromised system. System monitoring requirements, including the need for types of system monitoring, may be referenced in other requirements.
Source Controls: SI-04, SI-04(04)
Supporting Publications: SP 800-61 [47], SP 800-83 [76], SP 800-92 [35], SP 800-94 [29], SP 800-137 [49], SP 800-177 [70]
Incorporated into 03.14.06.
Manage and retain CUI within the system and CUI output from the system in accordance with applicable laws, Executive Orders, directives, regulations, policies, standards, guidelines, and operational requirements.
Federal agencies consider data retention requirements for nonfederal organizations. Retaining CUI on nonfederal systems after contracts or agreements have concluded increases the attack surface for those systems and the risk of the information being compromised. NARA provides federal policy and guidance on records retention and schedules.
Source Control: SI-12
Supporting Publications: None
Develop, document, and disseminate to organizational personnel or roles the policies and procedures needed to satisfy the security requirements for the protection of CUI.
Review and update policies and procedures [Assignment: organization-defined frequency].
This requirement addresses policies and procedures for the protection of CUI. Policies and procedures contribute to security assurance and should address each family of the CUI security requirements. Policies can be included as part of the organizational security policy or be represented by separate policies that address each family of security requirements. Procedures describe how policies are implemented and can be directed at the individual or role that is the object of the procedure. Procedures can be documented in system security plans or in one or more separate documents.
Source Controls: AC-01, AT-01, AU-01, CA-01, CM-01, IA-01, IR-01, MA-01, MP-01, PE-01, PL-01, PS-01, RA-01, SA-01, SC-01, SI-01, SR-01
Supporting Publications: SP 800-12 [61], SP 800-100 [62]
Develop a system security plan that:
Defines the constituent system components;
Identifies the information types processed, stored, and transmitted by the system;
Describes specific threats to the system that are of concern to the organization;
Describes the operational environment for the system and any dependencies on or connections to other systems or system components;
Provides an overview of the security requirements for the system;
Describes the safeguards in place or planned for meeting the security requirements;
Identifies individuals that fulfill system roles and responsibilities; and
Includes other relevant information necessary for the protection of CUI.
Review and update the system security plan [Assignment: organization-defined frequency].
Protect the system security plan from unauthorized disclosure.
System security plans provide key characteristics of the system that is processing, storing, and transmitting CUI and how the system and information are protected. System security plans contain sufficient information to enable a design and implementation that are unambiguously compliant with the intent of the plans and the subsequent determinations of risk if the plan is implemented as intended. System security plans can be a collection of documents, including documents that already exist. Effective system security plans reference policies, procedures, and documents (e.g., design specifications) that provide additional detailed information. This reduces the documentation requirements associated with security programs and maintains security information in other established management or operational areas related to enterprise architecture, the system development life cycle, systems engineering, and acquisition.
Source Control: PL-02
Supporting Publications: SP 800-18 [63]
Establish rules that describe the responsibilities and expected behavior for system usage and protecting CUI.
Provide rules to individuals who require access to the system.
Receive a documented acknowledgement from individuals indicating that they have read, understand, and agree to abide by the rules of behavior before authorizing access to CUI and the system.
Review and update the rules of behavior [Assignment: organization-defined frequency].
Rules of behavior represent a type of access agreement for system users. Organizations consider rules of behavior for the handling of CUI based on individual user roles and responsibilities and differentiate between rules that apply to privileged users and rules that apply to general users.
Source Control: PL-04
Supporting Publications: SP 800-18 [63]
Apply the following systems security engineering principles to the development or modification of the system and system components: [Assignment: organization-defined systems security engineering principles].
Organizations apply systems security engineering principles to new development systems. For legacy systems, organizations apply systems security engineering principles to system modifications to the extent feasible, given the current state of hardware, software, and firmware components. The application of systems security engineering principles helps to develop trustworthy, secure, and resilient systems and reduce the susceptibility of organizations to disruptions, hazards, and threats. Examples include developing layered protections; establishing security policies, architectures, and controls as the foundation for system design; incorporating security requirements into the system development life cycle; delineating physical and logical security boundaries; ensuring that developers are trained on how to build trustworthy secure software; and performing threat modeling to identify use cases, threat agents, attack vectors and patterns, design patterns, and compensating controls needed to mitigate risk. Organizations that apply security engineering principles can facilitate the development of trustworthy, secure systems, system components, and system services; reduce risks to acceptable levels; and make informed risk-management decisions.
Source Control: SA-08
Supporting Publications: SP 800-160-1 [11], SP 800-160-2 [10], SP 800-207 [66]
Replace system components when support for the components is no longer available from the developer, vendor, or manufacturer.
Provide options for risk mitigation or alternative sources for continued support for unsupported components that cannot be replaced.
Support for system components includes software patches, firmware updates, replacement parts, and maintenance contracts. An example of unsupported components includes when vendors no longer provide critical software patches or product updates, which can result in opportunities for adversaries to exploit weaknesses or deficiencies in the installed components. Exceptions to replacing unsupported system components include systems that provide critical mission or business capabilities when newer technologies are unavailable or when the systems are so isolated that installing replacement components is not an option.
Alternative sources of support address the need to provide continued support for system components that are no longer supported by the original manufacturers, developers, or vendors when such components remain essential to organizational missions and business functions. If necessary, organizations can establish in-house support by developing customized patches for critical software components or obtain the services of external service providers who provide ongoing support for unsupported components through contractual relationships. Such contractual relationships can include open-source software value-added vendors. The increased risk of using unsupported system components can be mitigated by prohibiting the connection of such components to public or uncontrolled networks or implementing other forms of isolation.
Source Control: SA-22
Supporting Publications: None
Require the providers of external system services used for the processing, storage, or transmission of CUI to comply with the following security requirements: [Assignment: organization-defined security requirements].
Define and document user roles and responsibilities with regard to external system services, including shared responsibilities with external service providers.
Implement processes, methods, and techniques to monitor security requirement compliance by external service providers on an ongoing basis.
External system services are provided by external service providers. Organizations establish relationships with external service providers in a variety of ways, including through business partnerships, contracts, interagency agreements, lines of business arrangements, licensing agreements, joint ventures, and supply chain exchanges. The responsibility for managing risks from the use of external system services remains with the organization charged with protecting CUI. Service-level agreements define expectations of performance, describe measurable outcomes, and identify remedies, mitigations, and response requirements for instances of noncompliance. Information from external service providers regarding the specific functions, ports, protocols, and services used in the provision of such services can be useful when there is a need to understand the trade-offs involved in restricting certain functions and services or blocking certain ports and protocols. This requirement is related to 03.01.20.
Source Control: SA-09
Supporting Publications: SP 800-160-1 [11], SP 800-161 [33]
Develop a plan for managing supply chain risks associated with the research and development, design, manufacturing, acquisition, delivery, integration, operations, maintenance, and disposal of the system, system components, or system services.
Review and update the supply chain risk management plan [Assignment: organization-defined frequency].
Protect the supply chain risk management plan from unauthorized disclosure.
Dependence on the products, systems, and services of external providers and the nature of the relationships with those providers present an increasing level of risk to an organization. Threat actions that may increase security risks include unauthorized production, the insertion or use of counterfeits, tampering, poor manufacturing and development practices in the supply chain, theft, and the insertion of malicious software, firmware, and hardware. Supply chain risks can be endemic or systemic within a system, component, or service. Managing supply chain risks is a complex, multifaceted undertaking that requires a coordinated effort across an organization to build trust relationships and communicate with internal and external stakeholders.
Supply chain risk management (SCRM) activities include identifying and assessing risks, determining appropriate risk response actions, developing SCRM plans to document response actions, and monitoring performance against the plans. The system-level SCRM plan is implementation-specific and provides constraints, policy implementation, requirements, and implications. It can either be stand-alone or incorporated into system security plans. The SCRM plan addresses the management, implementation, and monitoring of SCRM requirements and the development or sustainment of systems across the system development life cycle to support mission and business functions. Because supply chains can differ significantly across and within organizations, SCRM plans are tailored to individual program, organizational, and operational contexts.
Source Control: SR-02
Supporting Publications: SP 800-30 [55], SP 800-39 [60], SP 800-161 [33], SP 800-181 [34]
Develop and implement acquisition strategies, contract tools, and procurement methods to identify, protect against, and mitigate supply chain risks.
The acquisition process provides an important vehicle for protecting the supply chain. There are many useful tools and techniques available, including obscuring the end use of a system or system component, using blind purchases, requiring tamper-evident packaging, or using trusted or controlled distribution. The results from a supply chain risk assessment can inform the strategies, tools, and methods that are most applicable to the situation. Tools and techniques may provide protections against unauthorized production, theft, tampering, the insertion of counterfeits, the insertion of malicious software or backdoors, and poor development practices throughout the system life cycle.
Organizations also consider providing incentives for suppliers to implement safeguards, promote transparency in their processes and security practices, provide contract language that addresses the prohibition of tainted or counterfeit components, and restrict purchases from untrustworthy suppliers. Organizations consider providing training, education, and awareness programs for personnel regarding supply chain risks, available mitigation strategies, and when the programs should be employed. Methods for reviewing and protecting development plans, documentation, and evidence are commensurate with the security requirements of the organization. Contracts may specify documentation protection requirements.
Source Control: SR-05
Supporting Publications: SP 800-30 [55], SP 800-161 [33]
Establish a process for identifying and addressing weaknesses or deficiencies in the supply chain elements and processes.
Enforce the following security requirements to protect against supply chain risks to the system, system components, or system services and to limit the harm or consequences from supply chain-related events: [Assignment: organization-defined security requirements].
Supply chain elements include organizations, entities, or tools that are employed for the research, development, design, manufacturing, acquisition, delivery, integration, operations, maintenance, and disposal of systems and system components. Supply chain processes include hardware, software, firmware, and systems development processes; shipping and handling procedures; physical security programs; personnel security programs; configuration management tools, techniques, and measures to maintain provenance; or other programs, processes, or procedures associated with the development, acquisition, maintenance, and disposal of systems and system components. Supply chain elements and processes are provided by organizations, system integrators, or external service providers. Weaknesses or deficiencies in supply chain elements or processes represent potential vulnerabilities that can be exploited by adversaries to harm the organization and affect its ability to carry out its core missions or business functions.
Source Control: SR-03
Supporting Publications: SP 800-30 [55], SP 800-161 [33]
[1] Executive Order 13556 (2010) Controlled Unclassified Information. (The White House, Washington, DC), DCPD-201000942, November 4, 2010. Available at https://www.govinfo.gov/app/details/DCPD-201000942
[2] Executive Order 13526 (2009) Classified National Security Information. (The White House, Washington, DC), DCPD-200901022, December 29, 2009. Available at https://www.govinfo.gov/app/details/DCPD-200901022
[3] Atomic Energy Act (P.L. 83-703), August 1954. Available at https://www.govinfo.gov/app/details/STATUTE-68/STATUTE-68-Pg919
[4] National Archives and Records Administration (2019) Controlled Unclassified Information (CUI) Registry. Available at https://www.archives.gov/cui
[5] 32 CFR Part 2002 (2016), Controlled Unclassified Information (CUI), September 2016. Available at https://www.govinfo.gov/content/pkg/CFR-2018-title32-vol6/pdf/CFR-2018-title32-vol6-part2002.pdf
[6] National Institute of Standards and Technology (2004) Standards for Security Categorization of Federal Information and Information Systems. (U.S. Department of Commerce, Washington, DC), Federal Information Processing Standards Publication (FIPS) 199. https://doi.org/10.6028/NIST.FIPS.199
[7] National Institute of Standards and Technology (2006) Minimum Security Requirements for Federal Information and Information Systems. (U.S. Department of Commerce, Washington, DC), Federal Information Processing Standards Publication (FIPS) 200. https://doi.org/10.6028/NIST.FIPS.200
[8] Joint Task Force (2020) Security and Privacy Controls for Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-53, Rev. 5, Includes updates as of December 10, 2020. https://doi.org/10.6028/NIST.SP.800-53r5
[9] Federal Information Security Modernization Act (P.L. 113-283), December 2014. Available at https://www.govinfo.gov/app/details/PLAW-113publ283
[10] Ross RS, Pillitteri VY, Graubart R, Bodeau D, McQuaid R, (2021) Developing Cyber-Resilient Systems: A Systems Security Engineering Approach. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 2, Rev. 1. https://doi.org/10.6028/NIST.SP.800-160v2r1
[11] Ross R, Winstead M, McEvilley M, (2022) Engineering Trustworthy Secure Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-160, Vol. 1, Rev. 1. https://doi.org/10.6028/NIST.SP.800-160v1r1
[12] Joint Task Force (2020) Control Baselines for Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-53B, Includes updates as of December 10, 2020. https://doi.org/10.6028/NIST.SP.800-53B
[13] Office of Management and Budget Circular A-130, Managing Information as a Strategic Resource, July 2016. Available at https://www.whitehouse.gov/wp-content/uploads/legacy_drupal_files/omb/circulars/A130/a130revised.pdf
[14] Souppaya MP, Scarfone KA, (2016) Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-46, Rev. 2. https://doi.org/10.6028/NIST.SP.800-46r2
[15] Barker EB, (2020) Recommendation for Key Management: Part 1 – General. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-57 Part 1, Rev. 5. https://doi.org/10.6028/NIST.SP.800-57pt1r5
[16] Barker EB, Barker WC, (2019) Recommendation for Key Management: Part 2 – Best Practices for Key Management Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-57 Part 2, Rev. 1. https://doi.org/10.6028/NIST.SP.800-57pt2r1
[17] Barker EB, Dang QH, (2015) Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-57 Part 3, Rev. 1. https://doi.org/10.6028/NIST.SP.800-57pt3r1
[18] Barker EB, Dang QH, Frankel SE, Scarfone KA, Wouters P, (2020) Guide to IPsec VPNs. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-77, Rev. 1. https://doi.org/10.6028/NIST.SP.800-77r1
[19] Frankel SE, Hoffman P, Orebaugh AD, Park R, (2008) Guide to SSL VPNs. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication ( SP) 800-113. https://doi.org/10.6028/NIST.SP.800-113
[20] Souppaya MP, Scarfone KA, (2016) User’s Guide to Telework and Bring Your Own Device (BYOD) Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-114, Rev. 1. https://doi.org/10.6028/NIST.SP.800-114r1
[21] Padgette J, Bahr J, Holtmann M, Batra M, Chen L, Smithbey R, Scarfone KA, (2017) Guide to Bluetooth Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-121, Rev. 2, Includes updates as of January 19, 2022. https://doi.org/10.6028/NIST.SP.800-121r2-upd1
[22] Hu VC, Ferraiolo DF, Kuhn R, Schnitzer A, Sandlin K, Miller R, Scarfone KA, (2014) Guide to Attribute Based Access Control (ABAC) Definition and Considerations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-162, Includes updates as of August 2, 2019. https://doi.org/10.6028/NIST.SP.800-162
[23] Ferraiolo DF, Hu VC, Kuhn R, Chandramouli R, (2016) A Comparison of Attribute Based Access Control (ABAC) Standards for Data Service Applications: Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication ( SP) 800-178. https://doi.org/10.6028/NIST.SP.800-178
[24] Yaga DJ, Kuhn R, Hu VC, (2017) Verification and Test Methods for Access Control Policies/Models. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication ( SP) 800-192. https://doi.org/10.6028/NIST.SP.800-192
[25] Hu VC, Scarfone KA, (2012) Guidelines for Access Control System Evaluation Metrics. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7874. https://doi.org/10.6028/NIST.IR.7874
[26] Ylonen T, Turner P, Scarfone KA, Souppaya MP, (2015) Security of Interactive and Automated Access Management Using Secure Shell (SSH). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 7966. https://doi.org/10.6028/NIST.IR.7966
[27] Grassi PA, Garcia ME, Fenton JL, (2017) Digital Identity Guidelines. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-63-3, Includes updates as of March 2, 2020. https://doi.org/10.6028/NIST.SP.800-63-3
[28] Howell G, Franklin JM, Sritapan V, Souppaya M, Scarfone K, (2023) Guidelines for Managing the Security of Mobile Devices in the Enterprise. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-124, Rev. 2. https://doi.org/10.6028/NIST.SP.800-124r2
[29] Scarfone KA, Mell PM, (2007) Guide to Intrusion Detection and Prevention Systems (IDPS). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication ( SP) 800-94. https://doi.org/10.6028/NIST.SP.800-94
[30] Frankel SE, Eydt B, Owens L, Scarfone KA, (2007) Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication ( SP) 800-97. https://doi.org/10.6028/NIST.SP.800-97
[31] Souppaya MP, Scarfone KA, (2016) User’s Guide to Telework and Bring Your Own Device (BYOD) Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-114, Rev. 1. https://doi.org/10.6028/NIST.SP.800-114r1
[32] Wilson M, Hash J, (2003) Building an Information Technology Security Awareness and Training Program. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication ( SP) 800-50. https://doi.org/10.6028/NIST.SP.800-50
[33] Boyens JM, Smith A, Bartol N, Winkler K, Holbrook A, Fallon M, (2022) Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-161, Rev. 1. https://doi.org/10.6028/NIST.SP.800-161r1
[34] Petersen R, Santos D, Smith MC, Wetzel KA, Witte G, (2020) Workforce Framework for Cybersecurity (NICE Framework). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-181, Rev. 1. https://doi.org/10.6028/NIST.SP.800-181r1
[35] Kent K, Souppaya MP, (2006) Guide to Computer Security Log Management. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication ( SP) 800-92. https://doi.org/10.6028/NIST.SP.800-92
[36] Kent K, Chevalier S, Grance T, Dang H, (2006) Guide to Integrating Forensic Techniques into Incident Response. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication ( SP) 800-86. https://doi.org/10.6028/NIST.SP.800-86
[37] Ayers RP, Brothers S, Jansen W, (2014) Guidelines on Mobile Device Forensics. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-101, Rev. 1. https://doi.org/10.6028/NIST.SP.800-101r1
[38] National Institute of Standards and Technology (2019) Security Requirements for Cryptographic Modules. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 140-3. https://doi.org/10.6028/NIST.FIPS.140-3
[39] National Institute of Standards and Technology (2015) Secure Hash Standard (SHS). (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 180-4. https://doi.org/10.6028/NIST.FIPS.180-4
[40] National Institute of Standards and Technology (2015) SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 202. https://doi.org/10.6028/NIST.FIPS.202
[41] Johnson LA, Dempsey KL, Ross RS, Gupta S, Bailey D, (2011) Guide for Security-Focused Configuration Management of Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-128, Includes updates as of October 10, 2019. https://doi.org/10.6028/NIST.SP.800-128
[42] Dempsey KL, Eavy P, Moore G, (2017) Automation Support for Security Control Assessments: Volume 2: Hardware Asset Management. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8011, Volume 2. https://doi.org/10.6028/NIST.IR.8011-2
[43] Dempsey KL, Eavy P, Goren N, Moore G, (2018) Automation Support for Security Control Assessments: Volume 3: Software Asset Management. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) 8011, Volume 3. https://doi.org/10.6028/NIST.IR.8011-3
[44] Quinn SD, Souppaya MP, Cook MR, Scarfone KA, (2018) National Checklist Program for IT Products: Guidelines for Checklist Users and Developers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-70, Rev. 4. https://doi.org/10.6028/NIST.SP.800-70r4
[45] Waltermire DA, Quinn SD, Booth H, Scarfone KA, Prisaca D, (2018) The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.3. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-126, Rev. 3. https://doi.org/10.6028/NIST.SP.800-126r3
[46] Sedgewick A, Souppaya MP, Scarfone KA, (2015) Guide to Application Whitelisting. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication ( SP) 800-167. https://doi.org/10.6028/NIST.SP.800-167
[47] Cichonski PR, Millar T, Grance T, Scarfone KA, (2012) Computer Security Incident Handling Guide. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-61, Rev. 2. https://doi.org/10.6028/NIST.SP.800-61r2
[48] Grance T, Nolan T, Burke K, Dudley R, White G, Good T, (2006) Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication ( SP) 800-84. https://doi.org/10.6028/NIST.SP.800-84
[49] Dempsey KL, Chawla NS, Johnson LA, Johnston R, Jones AC, Orebaugh AD, Scholl MA, Stine KM, (2011) Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication ( SP) 800-137. https://doi.org/10.6028/NIST.SP.800-137
[50] Kissel RL, Regenscheid AR, Scholl MA, Stine KM, (2014) Guidelines for Media Sanitization. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-88, Rev. 1. https://doi.org/10.6028/NIST.SP.800-88r1
[51] Scarfone KA, Souppaya MP, Sexton M, (2007) Guide to Storage Encryption Technologies for End User Devices. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication ( SP) 800-111. https://doi.org/10.6028/NIST.SP.800-111
[52] Swanson MA, Bowen P, Phillips AW, Gallup D, Lynes D, (2010) Contingency Planning Guide for Federal Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-34, Rev. 1, Includes updates as of November 11, 2010. https://doi.org/10.6028/NIST.SP.800-34r1
[53] Barker EB, Smid ME, Branstad DK, Chokhani S, (2013) A Framework for Designing Cryptographic Key Management Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication ( SP) 800-130. https://doi.org/10.6028/NIST.SP.800-130
[54] Barker EB, Branstad DK, Smid ME, (2015) A Profile for U.S. Federal Cryptographic Key Management Systems (CKMS). (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication ( SP) 800-152. https://doi.org/10.6028/NIST.SP.800-152
[55] Joint Task Force Transformation Initiative (2012) Guide for Conducting Risk Assessments. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-30, Rev. 1. https://doi.org/10.6028/NIST.SP.800-30r1
[56] Souppaya MP, Scarfone KA, (2022) Guide to Enterprise Patch Management Planning: Preventive Maintenance for Technology. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-40, Rev. 4. https://doi.org/10.6028/NIST.SP.800-40r4
[57] Joint Task Force Transformation Initiative (2022) Assessing Security and Privacy Controls in Information Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-53A, Rev. 5. https://doi.org/10.6028/NIST.SP.800-53Ar5
[58] Scarfone KA, Souppaya MP, Cody A, Orebaugh AD, (2008) Technical Guide to Information Security Testing and Assessment. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication ( SP) 800-115. https://doi.org/10.6028/NIST.SP.800-115
[59] Joint Task Force (2018) Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2. https://doi.org/10.6028/NIST.SP.800-37r2
[60] Joint Task Force Transformation Initiative (2011) Managing Information Security Risk: Organization, Mission, and Information System View. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication ( SP) 800-39. https://doi.org/10.6028/NIST.SP.800-39
[61] Nieles M, Pillitteri VY, Dempsey KL, (2017) An Introduction to Information Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-12, Rev. 1. https://doi.org/10.6028/NIST.SP.800-12r1
[62] Bowen P, Hash J, Wilson M, (2006) Information Security Handbook: A Guide for Managers. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-100, Includes updates as of March 7, 2007. https://doi.org/10.6028/NIST.SP.800-100
[63] Swanson MA, Hash J, Bowen P, (2006) Guide for Developing Security Plans for Federal Information Systems. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-18, Rev. 1. https://doi.org/10.6028/NIST.SP.800-18r1
[64] Scarfone KA, Hoffman P, (2009) Guidelines on Firewalls and Firewall Policy. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-41, Rev. 1. https://doi.org/10.6028/NIST.SP.800-41r1
[65] Chandramouli R, (2016) Secure Virtual Network Configuration for Virtual Machine (VM) Protection. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication ( SP) 800-125B. https://doi.org/10.6028/NIST.SP.800-125B
[66] Rose S, Borchert O, Mitchell S, Connelly S, (2017) Zero Trust Architecture. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication ( SP) 800-207. https://doi.org/10.6028/NIST.SP.800-207
[67] Sriram K, Montgomery D, (2019) Resilient Interdomain Traffic Exchange: BGP Security and DDoS Mitigation. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication ( SP) 800-189. https://doi.org/10.6028/NIST.SP.800-189
[68] National Institute of Standards and Technology (2001) Advanced Encryption Standard (AES). (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 197, updated May 9, 2023. https://doi.org/10.6028/NIST.FIPS.197-upd1
[69] McKay KA, Cooper DA, (2019) Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-52, Rev. 2. https://doi.org/10.6028/NIST.SP.800-52r2
[70] Rose SW, Nightingale S, Garfinkel SL, Chandramouli R, (2019) Trustworthy Email. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-177, Rev. 1. https://doi.org/10.6028/NIST.SP.800-177r1
[71] Jansen W, Winograd T, Scarfone KA, (2008) Guidelines on Active Content and Mobile Code. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-28, Version 2. https://doi.org/10.6028/NIST.SP.800-28ver2
[72] Singhal A, Winograd T, Scarfone KA, (2007) Guide to Secure Web Services. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication ( SP) 800-95. https://doi.org/10.6028/NIST.SP.800-95
[73] Barker EB, Chen L, Roginsky A, Vassilev A, Davis R, (2018) Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-56A, Rev. 3. https://doi.org/10.6028/NIST.SP.800-56Ar3
[74] Barker EB, Chen L, Roginsky A, Vassilev A, Davis R, Simon S, (2019) Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-56B, Rev. 2. https://doi.org/10.6028/NIST.SP.800-56Br2
[75] Barker EB, Chen L, Davis R, (2020) Recommendation for Key-Derivation Methods in Key-Establishment Schemes. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-56C, Rev. 2. https://doi.org/10.6028/NIST.SP.800-56Cr2
[76] Souppaya MP, Scarfone KA, (2013) Guide to Malware Incident Prevention and Handling for Desktops and Laptops. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-83, Rev. 1. https://doi.org/10.6028/NIST.SP.800-83r1
[77] Tracy MC, Jansen W, Scarfone KA, Butterfield J, (2007) Guidelines on Electronic Mail Security. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-45, Version 2. https://doi.org/10.6028/NIST.SP.800-45ver2
[78] Committee on National Security Systems (2022) Committee on National Security Systems (CNSS) Glossary. (National Security Agency, Fort George G. Meade, MD), CNSS Instruction 4009. Available at https://www.cnss.gov/CNSS/issuances/Instructions.cfm
[79] Title 44 U.S. Code, Sec. 3552, Definitions. 2017 ed. Available at https://www.govinfo.gov/app/details/USCODE-2017-title44/USCODE-2017-title44-chap35-subchapII-sec3552
[80] Title 40 U.S. Code, Sec. 11331, Responsibilities for Federal information systems standards. 2017 ed. Available at https://www.govinfo.gov/app/details/USCODE-2017-title40/USCODE-2017-title40-subtitleIII-chap113-subchapIII-sec11331
[81] Title 44 U.S. Code, Sec. 3502, Definitions. 2017 ed. Available at https://www.govinfo.gov/app/details/USCODE-2021-title44/USCODE-2021-title44-chap35-subchapI-sec3502
[82] Chandramouli R, Rose SW, (2013) Secure Domain Name System (DNS) Deployment Guide. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-81-2. https://doi.org/10.6028/NIST.SP.800-81-2
[83] Dempsey K, Pillitteri V, Regenscheid A, (2021) Managing the Security of Information Exchanges. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-47, Rev. 1. https://doi.org/10.6028/NIST.SP.800-47r1
[84] Ross R, Pillitteri V, (2024) Assessing Security Requirements for Controlled Unclassified Information. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-171A, Rev. 3. https://doi.org/10.6028/NIST.SP.800-171Ar3
Appendix B provides definitions for the terminology used in SP 800-171r3. The definitions are consistent with the definitions contained in the National Information Assurance Glossary [78] unless otherwise noted.
This appendix describes the security control tailoring criteria used to develop the CUI security requirements. Table 2 lists the available tailoring options and the shorthand tailoring symbols. Table 3 through Table 22 specify the tailoring actions applied to the controls in the SP 800-53 moderate baseline [12] to obtain the security requirements in Sec. 3. The controls and control enhancements are hyperlinked to the NIST Cybersecurity and Privacy Reference Tool, which provides online access to the specific control language and supplemental materials in SP 800-53.
Table 2. Security Control Tailoring Criteria
TAILORING |
TAILORING CRITERIA |
NCO |
The control is not directly related to protecting the confidentiality of CUI. |
FED |
The control is primarily the responsibility of the Federal Government. |
ORC |
The outcome of the control related to protecting the confidentiality of CUI is adequately covered by other related controls.16 The security controls in SP 800-53 provide a comprehensive set of security capabilities needed to protect organizational systems and support the concept of defense in depth. Some of the security controls may address similar or overlapping security topics that are covered by other related controls. These controls have been designated as ORC in the tailoring criteria. |
N/A |
The control is not applicable. |
CUI |
The control is directly related to protecting the confidentiality of CUI. |
Table 3. Access Control (AC)
NIST SP 800-53 CONTROLS MODERATE BASELINE |
TAILORING |
SECURITY |
|
Policy and Procedures |
CUI |
||
Account Management |
CUI |
||
Account Management | Automated System Account Management |
NCO |
— |
|
Account Management | Automated Temporary and Emergency Account Management |
NCO |
— |
|
Account Management | Disable Accounts |
CUI |
||
Account Management | Automated Audit Actions |
NCO |
— |
|
Account Management | Inactivity Logout |
CUI |
||
Account Management | Disable Accounts for High-Risk Individuals |
CUI |
||
Access Enforcement |
CUI |
||
Information Flow Enforcement |
CUI |
||
Separation of Duties |
CUI |
||
Least Privilege |
CUI |
||
Least Privilege | Authorize Access to Security Functions |
CUI |
||
Least Privilege | Non-Privileged Access for Non-Security Functions |
CUI |
||
Least Privilege | Privileged Accounts |
CUI |
||
Least Privilege | Review of User Privileges |
CUI |
||
Least Privilege | Log Use of Privileged Functions |
CUI |
||
Least Privilege | Prohibit Non-Privileged Users From Executing Privileged Functions |
CUI |
||
Unsuccessful Logon Attempts |
CUI |
||
System Use Notification |
CUI |
||
Device Lock |
CUI |
||
Device Lock | Pattern-Hiding Displays |
CUI |
||
Session Termination |
CUI |
||
Permitted Actions Without Identification or Authentication |
FED |
— |
|
Remote Access |
CUI |
||
Remote Access | Monitoring and Control |
NCO |
— |
|
Remote Access | Protection of Confidentiality and Integrity Using Encryption |
CUI |
||
Remote Access | Managed Access Control Points |
CUI |
||
Remote Access | Privileged Commands and Access |
CUI |
||
Wireless Access |
CUI |
||
Wireless Access | Authentication and Encryption |
CUI |
||
Wireless Access | Disable Wireless Networking |
CUI |
||
Access Control for Mobile Devices |
CUI |
||
Access Control for Mobile Devices | Full Device or Container-Based Encryption |
CUI |
||
Use of External Systems |
CUI |
||
Use of External Systems | Limits on Authorized Use |
CUI |
||
Use of External Systems | Portable Storage Devices – Restricted Use |
CUI |
||
Information Sharing |
FED |
— |
|
Publicly Accessible Content |
CUI |
Table 4. Awareness and Training (AT)
NIST SP 800-53 CONTROLS MODERATE BASELINE |
TAILORING |
SECURITY |
|
Policy and Procedures |
CUI |
||
Literacy Training and Awareness |
CUI |
||
Literacy Training and Awareness | Insider Threat |
CUI |
||
Literacy Training and Awareness | Social Engineering and Mining |
CUI |
||
Role-Based Training |
CUI |
||
Training Records |
NCO |
— |
Table 5. Audit and Accountability (AU)
NIST SP 800-53 CONTROLS MODERATE BASELINE |
TAILORING |
SECURITY |
|
Policy and Procedures |
CUI |
||
Event Logging |
CUI |
||
Content of Audit Records |
CUI |
||
Additional Audit Information |
CUI |
||
Audit Log Storage Capacity |
NCO |
— |
|
Response to Audit Logging Process Failures |
CUI |
||
Audit Record Review, Analysis, and Reporting |
CUI |
||
Audit Record Review, Analysis, and Reporting | Automated Process Integration |
NCO |
— |
|
Audit Record Review, Analysis, and Reporting | Correlate Audit Record Repositories |
CUI |
||
Audit Record Reduction and Report Generation |
CUI |
||
Audit Record Reduction and Report Generation | Automatic Processing |
NCO |
— |
|
Time Stamps |
CUI |
||
Protection of Audit Information |
CUI |
||
Protection of Audit Information | Access by Subset of Privileged Users |
CUI |
||
Audit Record Retention |
CUI |
||
Audit Record Generation |
CUI |
Table 6. Assessment, Authorization, and Monitoring (CA)
NIST SP 800-53 CONTROLS MODERATE BASELINE |
TAILORING |
SECURITY |
|
Policy and Procedures |
CUI |
||
Control Assessments |
CUI |
||
Control Assessments | Independent Assessors |
NCO |
— |
|
Information Exchange |
CUI |
||
Plan of Action and Milestones |
CUI |
||
Authorization |
FED |
— |
|
Continuous Monitoring |
CUI |
||
Continuous Monitoring | Independent Assessment |
NCO |
— |
|
Continuous Monitoring | Risk Monitoring |
NCO |
— |
|
Internal System Connections |
NCO |
— |
Table 7. Configuration Management (CM)
NIST SP 800-53 CONTROLS MODERATE BASELINE |
TAILORING |
SECURITY |
|
Policy and Procedures |
CUI |
||
Baseline Configuration |
CUI |
||
Baseline Configuration | Automation Support for Accuracy and Currency |
NCO |
— |
|
Baseline Configuration | Retention of Previous Configurations |
NCO |
— |
|
Baseline Configuration | Configure Systems and Components for High-Risk Areas |
CUI |
||
Configuration Change Control |
CUI |
||
Configuration Change Control | Testing, Validation, and Documentation of Changes |
NCO |
— |
|
Configuration Change Control | Security and Privacy Representatives |
NCO |
— |
|
Impact Analyses |
CUI |
||
Impact Analyses | Verification of Controls |
CUI |
||
Access Restrictions for Change |
CUI |
||
Configuration Settings |
CUI |
||
Least Functionality |
CUI |
||
Least Functionality | Periodic Review |
CUI |
||
Least Functionality | Prevent Program Execution |
ORC |
— |
|
Least Functionality | Authorized Software – Allow by Exception |
CUI |
||
System Component Inventory |
CUI |
||
System Component Inventory | Updates During Installation and Removal |
CUI |
||
System Component Inventory | Automated Unauthorized Component Detection |
NCO |
— |
|
Configuration Management Plan |
NCO |
— |
|
Software Usage Restrictions |
NCO |
— |
|
User-Installed Software |
ORC |
— |
|
Information Location |
CUI |
||
Information Location | Automated Tools to Support Information Location |
NCO |
— |
Table 8. Contingency Planning (CP)
NIST SP 800-53 CONTROLS MODERATE BASELINE |
TAILORING |
SECURITY |
|
Policy and Procedures |
NCO |
— |
|
Contingency Plan |
NCO |
— |
|
Contingency Plan | Coordinate With Related Plans |
NCO |
— |
|
Contingency Plan | Resume Mission and Business Functions |
NCO |
— |
|
Contingency Plan | Identify Critical Assets |
NCO |
— |
|
Contingency Training |
NCO |
— |
|
Contingency Plan Testing |
NCO |
— |
|
Contingency Plan Testing | Coordinate Related Plans |
NCO |
— |
|
Alternate Storage Site |
NCO |
— |
|
Alternate Storage Site | Separation of Primary Site |
NCO |
— |
|
Alternate Storage Site | Accessibility |
NCO |
— |
|
Alternate Processing Site |
NCO |
— |
|
Alternate Processing Site | Separation of Primary Site |
NCO |
— |
|
Alternate Processing Site | Accessibility |
NCO |
— |
|
Alternate Processing Site | Priority of Service |
NCO |
— |
|
Telecommunications Services |
NCO |
— |
|
Telecommunications Services | Priority of Service Provisions |
NCO |
— |
|
Telecommunications Services | Single Points of Failure |
NCO |
— |
|
System Backup |
CUI |
||
System Backup | Testing for Reliability and Integrity |
NCO |
— |
|
System Backup | Cryptographic Protection |
CUI |
||
System Recovery and Reconstitution |
NCO |
— |
|
System Recovery and Reconstitution | Transaction Recovery |
NCO |
— |
Table 9. Identification and Authentication (IA)
NIST SP 800-53 CONTROLS MODERATE BASELINE |
TAILORING |
SECURITY |
|
Policy and Procedures |
CUI |
||
Identification and Authentication (Organizational Users) |
CUI |
||
Identification and Authentication (Organizational Users) | Multi-Factor Authentication to Privileged Accounts |
CUI |
||
Identification and Authentication (Organizational Users) | Multi-Factor Authentication to Non-Privileged Accounts |
CUI |
||
Identification and Authentication (Organizational Users) | Access to Accounts – Replay Resistant |
CUI |
||
Identification and Authentication (Organizational Users) | Acceptance of PIV Credentials |
FED |
— |
|
Device Identification and Authentication |
CUI |
||
Identifier Management |
CUI |
||
Identifier Management | Identify User Status |
CUI |
||
Authenticator Management |
CUI |
||
Authenticator Management | Password-Based Authentication |
CUI |
||
Authenticator Management | Public Key-Based Authentication |
FED |
— |
|
Authenticator Management | Protection of Authenticators |
FED |
— |
|
Authentication Feedback |
CUI |
||
Cryptographic Module Authentication |
FED |
— |
|
Identification and Authentication (Non-Organizational Users) |
FED |
— |
|
Identification and Authentication (Non-Organizational Users) | Acceptance of PIV Credentials From Other Agencies |
FED |
— |
|
Identification and Authentication (Non-Organizational Users) | Acceptance of External Authenticators |
FED |
— |
|
Identification and Authentication (Non-Organizational Users) | Use of Defined Profiles |
FED |
— |
|
Re-Authentication |
CUI |
||
Identity Proofing |
FED |
— |
|
Identity Proofing | Identity Evidence |
FED |
— |
|
Identity Proofing | Identity Evidence Validation and Verification |
FED |
— |
|
Identity Proofing | Address Confirmation |
FED |
— |
Table 10. Incident Response (IR)
NIST SP 800-53 CONTROLS MODERATE BASELINE |
TAILORING |
SECURITY |
|
Policy and Procedures |
CUI |
||
Incident Response Training |
CUI |
||
Incident Response Testing |
CUI |
||
Incident Response Testing | Coordinate With Related Plans |
NCO |
— |
|
Incident Handling |
CUI |
||
Incident Handling | Automated Incident Handling Processes |
NCO |
— |
|
Incident Monitoring |
CUI |
||
Incident Reporting |
CUI |
||
Incident Reporting | Automated Reporting |
NCO |
— |
|
Incident Reporting | Supply Chain Coordination |
NCO |
— |
|
Incident Response Assistance |
CUI |
||
Incident Response Assistance | Automation Support for Availability of Information and Support |
NCO |
— |
|
Incident Response Plan |
CUI |
Table 11. Maintenance (MA)
NIST SP 800-53 CONTROLS MODERATE BASELINE |
TAILORING |
SECURITY |
|
System Maintenance Policy and Procedures |
CUI |
||
Controlled Maintenance |
NCO |
— |
|
Maintenance Tools |
CUI |
||
Maintenance Tools | Inspect Tools |
CUI |
||
Maintenance Tools | Inspect Media |
CUI |
||
Maintenance Tools | Prevent Unauthorized Removal |
CUI |
||
Nonlocal Maintenance |
CUI |
||
Maintenance Personnel |
CUI |
||
Timely Maintenance |
NCO |
— |
Table 12. Media Protection (MP)
NIST SP 800-53 CONTROLS MODERATE BASELINE |
TAILORING |
SECURITY |
|
Policy and Procedures |
CUI |
||
Media Access |
CUI |
||
Media Marking |
CUI |
||
Media Storage |
CUI |
||
Media Transport |
CUI |
||
Media Sanitization |
CUI |
||
Media Use |
CUI |
Table 13. Physical and Environmental Protection (PE)
NIST SP 800-53 CONTROLS MODERATE BASELINE |
TAILORING |
SECURITY |
|
Policy and Procedures |
CUI |
||
Physical Access Authorizations |
CUI |
||
Physical Access Control |
CUI |
||
Access Control for Transmission |
CUI |
||
Access Control for Output Devices |
CUI |
||
Monitoring Physical Access |
CUI |
||
Monitoring Physical Access | Intrusion Alarms and Surveillance Equipment |
NCO |
— |
|
Visitor Access Records |
NCO |
— |
|
Power Equipment and Cabling |
NCO |
— |
|
Emergency Shutoff |
NCO |
— |
|
Emergency Power |
NCO |
— |
|
Emergency Lighting |
NCO |
— |
|
Fire Protection |
NCO |
— |
|
Fire Protection | Detection Systems – Automatic Activation and Notification |
NCO |
— |
|
Environmental Controls |
NCO |
— |
|
Water Damage Protection |
NCO |
— |
|
Delivery and Removal |
NCO |
— |
|
Alternate Work Site |
CUI |
Table 14. Planning (PL)
NIST SP 800-53 CONTROLS MODERATE BASELINE |
TAILORING |
SECURITY |
|
Policy and Procedures |
CUI |
||
System Security and Privacy Plans |
CUI |
||
Rules of Behavior |
CUI |
||
Rules of Behavior | Social Media and External Site/Application Usage Restrictions |
NCO |
— |
|
Security and Privacy Architectures |
NCO |
— |
|
Baseline Selection |
FED |
— |
|
Baseline Tailoring |
FED |
— |
Table 15. Program Management (PM)
NIST SP 800-53 CONTROLS MODERATE BASELINE |
TAILORING |
SECURITY |
|
Information Security Program Plan |
N/A |
— |
|
Information Security Program Leadership Role |
N/A |
— |
|
Information Security and Privacy Resources |
N/A |
— |
|
Plan of Action and Milestones Process |
N/A |
— |
|
System Inventory |
N/A |
— |
|
System Inventory | Inventory of Personally Identifiable Information |
N/A |
— |
|
Measures of Performance |
N/A |
— |
|
Enterprise Architecture |
N/A |
— |
|
Enterprise Architecture | Offloading |
N/A |
— |
|
Critical Infrastructure Plan |
N/A |
— |
|
Risk Management Strategy |
N/A |
— |
|
Authorization Process |
N/A |
— |
|
Mission and Business Process Definition |
N/A |
— |
|
Insider Threat Program |
N/A |
— |
|
Security and Privacy Workforce |
N/A |
— |
|
Testing, Training, and Monitoring |
N/A |
— |
|
Security and Privacy Groups and Associations |
N/A |
— |
|
Threat Awareness Program |
N/A |
— |
|
Threat Awareness Program | Automated Means for Sharing Threat Intelligence |
N/A |
— |
|
Protecting Controlled Unclassified Information on External Systems |
N/A |
— |
|
Privacy Program Plan |
N/A |
— |
|
Privacy Program Leadership Role |
N/A |
— |
|
Dissemination of Privacy Program Information |
N/A |
— |
|
Dissemination of Privacy Program Information | Privacy Policies on Websites, Applications, and Digital Services |
N/A |
— |
|
Accounting of Disclosures |
N/A |
— |
|
Personally Identifiable Information Quality Management |
N/A |
— |
|
Data Governance Body |
N/A |
— |
|
Data Integrity Board |
N/A |
— |
|
Minimization of PII Used in Testing, Training, and Research |
N/A |
— |
|
Complaint Management |
N/A |
— |
|
Privacy Reporting |
N/A |
— |
|
Risk Framing |
N/A |
— |
|
Risk Management Program Leadership Roles |
N/A |
— |
|
Supply Chain Risk Management Strategy |
N/A |
— |
|
Supply Chain Risk Management Strategy | Suppliers of Critical or Mission-Essential Items |
N/A |
— |
|
Continuous Monitoring Strategy |
N/A |
— |
|
Purposing |
N/A |
— |
Table 16. Personnel Security (PS)
NIST SP 800-53 CONTROLS MODERATE BASELINE |
TAILORING |
SECURITY |
|
Policy and Procedures |
CUI |
||
Position Risk Designation |
FED |
— |
|
Personnel Screening |
CUI |
||
Personnel Termination |
CUI |
||
Personnel Transfer |
CUI |
||
Access Agreements |
NCO |
— |
|
External Personnel Security |
NCO |
— |
|
Personnel Sanctions |
NCO |
— |
|
Position Descriptions |
FED |
— |
Table 17. PII Processing and Transparency (PT)
NIST SP 800-53 CONTROLS MODERATE BASELINE |
TAILORING |
SECURITY |
|
Policy and Procedures |
N/A |
— |
|
Authority to Process Personally Identifiable Information |
N/A |
— |
|
Authority to Process Personally Identifiable Information | Data Tagging |
N/A |
— |
|
Authority to Process Personally Identifiable Information | Automation |
N/A |
— |
|
Personally Identifiable Information Processing Purposes |
N/A |
— |
|
Personally Identifiable Information Processing Purposes | Data Tagging |
N/A |
— |
|
Personally Identifiable Information Processing Purposes | Automation |
N/A |
— |
|
Consent |
N/A |
— |
|
Consent | Tailored Consent |
N/A |
— |
|
Consent | Just-in-Time Consent |
N/A |
— |
|
Consent | Revocation |
N/A |
— |
|
Privacy Notice |
N/A |
— |
|
Privacy Notice | Just-in-Time Notice |
N/A |
— |
|
Privacy Notice | Privacy Act Statements |
N/A |
— |
|
System of Records Notice |
N/A |
— |
|
System of Records Notice | Routine Uses |
N/A |
— |
|
System of Records Notice | Exemption Rules |
N/A |
— |
|
Specific Categories of Personally Identifiable Information |
N/A |
— |
|
Specific Categories of Personally Identifiable Information | Social Security Numbers |
N/A |
— |
|
Specific Categories of Personally Identifiable Information | First Amendment Information |
N/A |
— |
|
Computer Matching Requirements |
N/A |
— |
Table 18. Risk Assessment (RA)
NIST SP 800-53 CONTROLS MODERATE BASELINE |
TAILORING |
SECURITY |
|
Policy and Procedures |
CUI |
||
Security Categorization |
FED |
— |
|
Risk Assessment |
CUI |
||
Risk Assessment | Supply Chain Risk Assessment |
CUI |
||
Vulnerability Monitoring and Scanning |
CUI |
||
Vulnerability Monitoring and Scanning | Update Vulnerabilities to be Scanned |
CUI |
||
Vulnerability Monitoring and Scanning | Privileged Access |
ORC |
— |
|
Vulnerability Monitoring and Scanning | Public Disclosure Program |
NCO |
— |
|
Risk Response |
CUI |
||
Criticality Analysis |
NCO |
— |
Table 19. System and Services Acquisition (SA)
NIST SP 800-53 CONTROLS MODERATE BASELINE |
TAILORING |
SECURITY |
|
Policy and Procedures |
CUI |
||
Allocation of Resources |
NCO |
— |
|
System Development Life Cycle |
NCO |
— |
|
Acquisition Process |
NCO |
— |
|
Acquisition Process | Functional Properties of Controls |
NCO |
— |
|
Acquisition Process | Design and Implementation Information for Controls |
NCO |
— |
|
Acquisition Process | Functions, Ports, Protocols, and Services in Use |
NCO |
— |
|
Acquisition Process | Use of Approved PIV Products |
FED |
— |
|
System Documentation |
NCO |
— |
|
Security and Privacy Engineering Principles |
CUI |
||
External System Services |
CUI |
||
External System Services | Identification of Functions, Ports, Protocols, and Services |
ORC |
— |
|
Developer Configuration Management |
NCO |
— |
|
Developer Testing and Evaluation |
NCO |
— |
|
Development Process, Standards, and Tools |
NCO |
— |
|
Development Process, Standards, and Tools | Criticality Analysis |
NCO |
— |
|
Unsupported System Components |
CUI |
Table 20. System and Communications Protection (SC)
NIST SP 800-53 CONTROLS MODERATE BASELINE |
TAILORING |
SECURITY |
|
Policy and Procedures |
CUI |
||
Separation of System and User Functionality |
ORC |
— |
|
Information in Shared System Resources |
CUI |
||
Denial-of-Service Protection |
NCO |
— |
|
Boundary Protection |
CUI |
||
Boundary Protection | Access Points |
ORC |
— |
|
Boundary Protection | External Telecommunications Services |
ORC |
— |
|
Boundary Protection | Deny by Default – Allow by Exception |
CUI |
||
Boundary Protection | Split Tunneling for Remote Devices |
ORC |
— |
|
Boundary Protection | Route Traffic to Authenticated Proxy Servers |
ORC |
— |
|
Transmission Confidentiality and Integrity |
CUI |
||
Transmission Confidentiality and Integrity | Cryptographic Protection |
CUI |
||
Network Disconnect |
CUI |
||
Cryptographic Key Establishment and Management |
CUI |
||
Cryptographic Protection |
CUI |
||
Collaborative Computing Devices and Applications |
CUI |
||
Public Key Infrastructure Certificates |
FED |
— |
|
Mobile Code |
CUI |
||
Secure Name/Address Resolution Service (Authoritative Source) |
NCO |
— |
|
Secure Name/Address Resolution Service (Recursive or Caching Resolver) |
NCO |
— |
|
Architecture and Provisioning for Name/Address Resolution Service |
NCO |
— |
|
Session Authenticity |
CUI |
||
Protection of Information at Rest |
CUI |
||
Protection of Information at Rest | Cryptographic Protection |
CUI |
||
Process Isolation |
NCO |
— |
Table 21. System and Information Integrity (SI)
NIST SP 800-53 CONTROLS MODERATE BASELINE |
TAILORING |
SECURITY |
|
Policy and Procedures |
CUI |
||
Flaw Remediation |
CUI |
||
Flaw Remediation | Automated Flaw Remediation Status |
NCO |
— |
|
Malicious Code Protection |
CUI |
||
System Monitoring |
CUI |
||
System Monitoring | Automated Tools and Mechanisms for Real-Time Analysis |
NCO |
— |
|
System Monitoring | Inbound and Outbound Communications Traffic |
CUI |
||
System Monitoring | System-Generated Alerts |
NCO |
— |
|
Security Alerts, Advisories, and Directives |
CUI |
||
Software, Firmware, and Information Integrity |
NCO |
— |
|
Software, Firmware, and Information Integrity | Integrity Checks |
NCO |
— |
|
Software, Firmware, and Information Integrity | Integration of Detection and Response |
NCO |
— |
|
Spam Protection |
ORC |
— |
|
Spam Protection | Automatic Updates |
NCO |
— |
|
Information Input Validation |
NCO |
— |
|
Error Handling |
NCO |
— |
|
Information Management and Retention |
CUI |
||
Memory Protection |
NCO |
— |
Table 22. Supply Chain Risk Management (SR)
NIST SP 800-53 CONTROLS MODERATE BASELINE |
TAILORING |
SECURITY |
|
Policy and Procedures |
CUI |
||
Supply Chain Risk Management Plan |
CUI |
||
Supply Chain Risk Management Plan | Establish SCRM Team |
NCO |
— |
|
Supply Chain Controls and Processes |
CUI |
||
Acquisition Strategies, Tools, and Methods |
CUI |
||
Supplier Assessments and Reviews |
CUI |
||
Notification Agreements |
NCO |
— |
|
Inspection of Systems or Components |
NCO |
— |
|
Component Authenticity |
NCO |
— |
|
Component Authenticity | Anti-Counterfeit Training |
NCO |
— |
|
Component Authenticity | Configuration Control for Component Service and Repair |
NCO |
— |
|
Component Disposal |
ORC |
— |
This appendix lists the organization-defined parameters (ODPs) that are included in the security requirements in Sec. 3. The ODPs are listed sequentially by requirement family, beginning with the first requirement containing an ODP in the Access Control (AC) family and ending with the last requirement containing an ODP in the Supply Chain Risk Management (SR) family.
Table 23. Organization-Defined Parameters
SECURITY |
ORGANIZATION-DEFINED PARAMETER |
|
[Assignment: organization-defined time period] |
||
[Assignment: organization-defined time period] |
||
[Assignment: organization-defined time period] |
||
[Assignment: organization-defined time period] |
||
[Assignment: organization-defined time period] |
||
[Assignment: organization-defined circumstances] |
||
[Assignment: organization-defined security functions] |
||
[Assignment: organization-defined security-relevant information] |
||
[Assignment: organization-defined frequency] |
||
[Assignment: organization-defined personnel or roles] |
||
[Assignment: organization-defined number] |
||
[Assignment: organization-defined time period] |
||
[Selection (one or more): lock the account or node for an [Assignment: organization-defined time period]; lock the account or node until released by an administrator; delay next logon prompt;notify system administrator; take otheraction] |
||
[Selection (one or more): initiating a device lock after [Assignment: organization-defined time period] of inactivity; requiring the user to initiate a device lock before leaving the system unattended] |
||
[Assignment: organization-defined conditions or trigger events requiring session disconnect] |
||
[Assignment: organization-defined security requirements] |
||
[Assignment: organization-defined frequency] |
||
[Assignment: organization-defined events] |
||
[Assignment: organization-defined frequency] |
||
[Assignment: organization-defined events] |
||
[Assignment: organization-defined frequency] |
||
[Assignment: organization-defined events] |
||
[Assignment: organization-defined frequency] |
||
[Assignment: organization-defined events] |
||
[Assignment: organization-defined event types] |
||
[Assignment: organization-defined frequency] |
||
[Assignment: organization-defined time period] |
||
[Assignment: organization-defined additional actions] |
||
[Assignment: organization-defined frequency] |