NIST SP 800-53Ar1 Assessment Procedure Catalog, with SP 800-53r3 Security Controls
SECURITY ASSESSMENT AND AUTHORIZATION
CA-1 SECURITY ASSESSMENT AND AUTHORIZATION POLICIES AND PROCEDURES
FAMILY: SECURITY ASSESSMENT AND AUTHORIZATION
|
CLASS: MANAGEMENT
|
- Security Control Baseline:
CA-1
|
Security Assessment and Authorization Policies and Procedures
|
P1
|
LOW CA-1
|
MOD CA-1
|
HIGH CA-1
|
ASSESSMENT PROCEDURE
|
CA-1 |
SECURITY ASSESSMENT AND AUTHORIZATION POLICIES AND PROCEDURES
|
CA-1.1 |
ASSESSMENT OBJECTIVE:
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: Security assessment and authorization policies and procedures; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with security assessment and authorization responsibilities].
|
CA-1.2 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization defines the frequency of security assessment and authorization policy reviews/updates;
- (ii) the organization reviews/updates security assessment and authorization policy in accordance with organization-defined frequency;
- (iii) the organization defines the frequency of security assessment and authorization procedure reviews/updates; and
- (iv) the organization reviews/updates security assessment and authorization procedures in accordance with organization-defined frequency.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: Security assessment and authorization policies and procedures; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with security assessment and authorization responsibilities].
|
CA-2 SECURITY ASSESSMENTS
FAMILY: SECURITY ASSESSMENT AND AUTHORIZATION
|
CLASS: MANAGEMENT
|
- Security Control Baseline:
CA-2
|
Security Assessments
|
P2
|
LOW CA-2
|
MOD CA-2 (1)
|
HIGH CA-2 (1) (2)
|
ASSESSMENT PROCEDURE
|
CA-2 |
SECURITY ASSESSMENTS
|
CA-2.2 |
ASSESSMENT OBJECTIVE:
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: Security assessment and authorization policy; procedures addressing security assessments; security assessment plan; other relevant documents or records].
|
CA-2(2) |
SECURITY ASSESSMENTS
|
CA-2(2).1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization defines:
- (ii) the organization conducts security control assessments using organization-defined forms of testing in accordance with organization-defined frequency and assessment techniques established for each form of testing.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: Security assessment and authorization policy; procedures addressing security assessments; security plan; security assessment plan; security assessment report; assessment evidence; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with security assessment responsibilities].
|
CA-3 INFORMATION SYSTEM CONNECTIONS
FAMILY: SECURITY ASSESSMENT AND AUTHORIZATION
|
CLASS: MANAGEMENT
|
- Security Control Baseline:
CA-3
|
Information System Connections
|
P1
|
LOW CA-3
|
MOD CA-3
|
HIGH CA-3
|
ASSESSMENT PROCEDURE
|
CA-3 |
INFORMATION SYSTEM CONNECTIONS
|
CA-3.1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization identifies connections to external information systems (i.e., information systems outside of the authorization boundary);
- (ii) the organization authorizes connections from the information system to external information systems through the use of Interconnection Security Agreements;
- (iii) the organization documents, for each connection, the interface characteristics, security requirements, and the nature of the information communicated; and
- (iv) the organization monitors the information system connections on an ongoing basis to verify enforcement of security requirements.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: Access control policy; procedures addressing information system connections; system and communications protection policy; information system interconnection security agreements; security plan; information system design documentation; security assessment report; plan of action and milestones; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with responsibility for developing, implementing, or approving information system interconnection agreements].
|
CA-5 PLAN OF ACTION AND MILESTONES
FAMILY: SECURITY ASSESSMENT AND AUTHORIZATION
|
CLASS: MANAGEMENT
|
- Security Control Baseline:
CA-5
|
Plan of Action and Milestones
|
P3
|
LOW CA-5
|
MOD CA-5
|
HIGH CA-5
|
CA-6 SECURITY AUTHORIZATION
FAMILY: SECURITY ASSESSMENT AND AUTHORIZATION
|
CLASS: MANAGEMENT
|
- Security Control Baseline:
CA-6
|
Security Authorization
|
P3
|
LOW CA-6
|
MOD CA-6
|
HIGH CA-6
|
CA-7 CONTINUOUS MONITORING
FAMILY: SECURITY ASSESSMENT AND AUTHORIZATION
|
CLASS: MANAGEMENT
|
- Security Control Baseline:
CA-7
|
Continuous Monitoring
|
P3
|
LOW CA-7
|
MOD CA-7
|
HIGH CA-7
|
ASSESSMENT PROCEDURE
|
CA-7 |
CONTINUOUS MONITORING
|
CA-7.1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization establishes a continuous monitoring strategy and program;
- (ii) the organization defines the frequency for reporting the security state of the information system to appropriate organizational officials;
- (iii) the organization defines organizational officials to whom the security state of the information system should be reported; and
- (iv) the organization implements a continuous monitoring program that includes:
- a configuration management process for the information system and its constituent components;
- a determination of the security impact of changes to the information system and environment of operation;
- ongoing security control assessments in accordance with the organizational continuous monitoring strategy; and
- reporting the security state of the information system to appropriate organizational officials in accordance with organization-defined frequency.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: Security assessment and authorization policy; procedures addressing continuous monitoring of information system security controls; procedures addressing configuration management; security plan; security assessment report; plan of action and milestones; information system monitoring records; configuration management records, security impact analyses; status reports; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with continuous monitoring responsibilities; organizational personnel with configuration management responsibilities].
|
Source