Doc:NIST SP 800-53Ar1 Appendix F/Enhanced/SA/Moderate

From FISMApedia
Jump to: navigation, search

NIST SP 800-53Ar1 Assessment Procedure Catalog, with SP 800-53r3 Security Controls


SYSTEM AND SERVICES ACQUISITION

SA-1 SYSTEM AND SERVICES ACQUISITION POLICY AND PROCEDURES


FAMILY: SYSTEM AND SERVICES ACQUISITION CLASS: MANAGEMENT


Security Control Baseline:
SA-1 System and Services Acquisition Policy and Procedures P1 LOW SA-1 MOD SA-1 HIGH SA-1


SECURITY CONTROL

Template:Doc:NIST SP 800-53r3 Appendix F/SA-1


ASSESSMENT PROCEDURE
SA-1 SYSTEM AND SERVICES ACQUISITION POLICY AND PROCEDURES
SA-1.1 ASSESSMENT OBJECTIVE:
Determine if:
(i) the organization develops and formally documents system services and acquisition policy;
(ii) the organization system services and acquisition policy addresses:
(iii) the organization disseminates formal documented system services and acquisition policy to elements within the organization having associated system services and acquisition roles and responsibilities;
(iv) the organization develops and formally documents system services and acquisition procedures;
(v) the organization system services and acquisition procedures facilitate implementation of the system and services acquisition policy and associated system services and acquisition controls; and
(vi) the organization disseminates formal documented system services and acquisition procedures to elements within the organization having associated system services and acquisition roles and responsibilities.
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: System and services acquisition policy and procedures; other relevant documents or records].
Interview: [SELECT FROM: Organizational personnel with system and services acquisition responsibilities].
SA-1.2 ASSESSMENT OBJECTIVE:
Determine if:
(i) the organization defines the frequency of system services and acquisition policy reviews/updates;
(ii) the organization reviews/updates system services and acquisition policy in accordance with organization-defined frequency; and
(iii) the organization defines the frequency of system services and acquisition procedure reviews/updates;
(iv) the organization reviews/updates system services and acquisition procedures in accordance with organization-defined frequency.
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: System and services acquisition policy and procedures; other relevant documents or records].
Interview: [SELECT FROM: Organizational personnel with system and services acquisition responsibilities].


SA-2 ALLOCATION OF RESOURCES


FAMILY: SYSTEM AND SERVICES ACQUISITION CLASS: MANAGEMENT


Security Control Baseline:
SA-2 Allocation of Resources P1 LOW SA-2 MOD SA-2 HIGH SA-2


SECURITY CONTROL

Template:Doc:NIST SP 800-53r3 Appendix F/SA-2


ASSESSMENT PROCEDURE
SA-2 ALLOCATION OF RESOURCES
SA-2.1 ASSESSMENT OBJECTIVE:
Determine if:
(i) the organization includes a determination of the information security requirements for the information system in mission/business process planning;
(ii) the organization determines, documents, and allocates the resources required to protect the information system as part of its capital planning and investment control process; and
(iii) the organization establishes a discrete line item for information security in organizational programming and budgeting documentation.
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: System and services acquisition policy; procedures addressing the allocation of resources to information security requirements; organizational programming and budgeting documentation; other relevant documents or records].
Interview: [SELECT FROM: Organizational personnel with capital planning and investment responsibilities].



SA-3 LIFE CYCLE SUPPORT


FAMILY: SYSTEM AND SERVICES ACQUISITION CLASS: MANAGEMENT


Security Control Baseline:
SA-3 Life Cycle Support P1 LOW SA-3 MOD SA-3 HIGH SA-3


SECURITY CONTROL

Template:Doc:NIST SP 800-53r3 Appendix F/SA-3


ASSESSMENT PROCEDURE
SA-3 LIFE CYCLE SUPPORT
SA-3.1 ASSESSMENT OBJECTIVE:
Determine if:
(i) the organization manages the information system using a system development life cycle methodology that includes information security considerations;
(ii) the organization defines and documents information system security roles and responsibilities throughout the system development life cycle; and
(iii) the organization identifies individuals having information system security roles and responsibilities.
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: System and services acquisition policy; procedures addressing the integration of information security into the system development life cycle process; information system development life cycle documentation; other relevant documents or records].
Interview: [SELECT FROM: Organizational personnel with information security and system life cycle development responsibilities].



SA-4 ACQUISITIONS


FAMILY: SYSTEM AND SERVICES ACQUISITION CLASS: MANAGEMENT


Security Control Baseline:
SA-4 Acquisitions P1 LOW SA-4 MOD SA-4 (1) (4) HIGH SA-4 (1) (2) (4)


SECURITY CONTROL

Template:Doc:NIST SP 800-53r3 Appendix F/SA-4


ASSESSMENT PROCEDURE
SA-4 ACQUISITIONS
SA-4.1 ASSESSMENT OBJECTIVE:
Determine if the organization includes the following requirements and/or specifications, explicitly or by reference, in information system acquisition contracts based on an assessment of risk and in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards:
  • security functional requirements/specifications;
  • security-related documentation requirements; and
  • developmental and evaluation-related assurance requirements.
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: System and services acquisition policy; procedures addressing the integration of information security requirements and/or security specifications into the acquisition process; acquisition contracts for information systems or services; other relevant documents or records].
Interview: [SELECT FROM: Organizational personnel with information system security, acquisition, and contracting responsibilities].



SECURITY CONTROL ENHANCEMENT

Template:Doc:NIST SP 800-53r3 Appendix F/SA-4/1


SA-4(1) ACQUISITIONS
SA-4(1).1 ASSESSMENT OBJECTIVE:
Determine if the organization requires in acquisition documents that vendors/contractors provide information describing in the functional properties of the security controls to be employed within the information system, information system components, or information system services in sufficient detail to permit analysis and testing of the controls.
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: System and services acquisition policy; procedures addressing the integration of information security requirements and/or security specifications into the acquisition process; solicitation documents; acquisition documentation; acquisition contracts for information systems or services; other relevant documents or records].



SECURITY CONTROL ENHANCEMENT

Template:Doc:NIST SP 800-53r3 Appendix F/SA-4/4


SA-4(4) ACQUISITIONS
SA-4(4).1 ASSESSMENT OBJECTIVE:
Determine if:
(i) the organization explicitly assigns each acquired information system component to an information system; and
(ii) the owner of the system acknowledges each assignment of information system components to the information system.
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: System and services acquisition policy; procedures addressing the integration of information security requirements and/or security specifications into the acquisition process; solicitation documents; acquisition documentation; acquisition contracts for information systems or services; other relevant documents or records].
Interview: [SELECT FROM: Organizational personnel with information system security, acquisition, and contracting responsibilities; information system owner].


SA-5 INFORMATION SYSTEM DOCUMENTATION


FAMILY: SYSTEM AND SERVICES ACQUISITION CLASS: MANAGEMENT


Security Control Baseline:
SA-5 Information System Documentation P2 LOW SA-5 MOD SA-5 (1) (3) HIGH SA-5 (1) (2) (3)


SECURITY CONTROL

Template:Doc:NIST SP 800-53r3 Appendix F/SA-5


ASSESSMENT PROCEDURE
SA-5 INFORMATION SYSTEM DOCUMENTATION
SA-5.1 ASSESSMENT OBJECTIVE:
Determine if:
(i) the organization obtains, protects as required, and makes available to authorized personnel, administrator documentation for the information system that describes:
  • secure configuration, installation, and operation of the information system;
  • effective use and maintenance of the security features/functions; and
  • known vulnerabilities regarding configuration and use of administrative (i.e., privileged) functions;
(ii) the organization obtains, protects as required, and makes available to authorized personnel, user documentation for the information system that describes:
  • user-accessible security features/functions and how to effectively use those security features/functions;
  • methods for user interaction with the information system, which enables individuals to use the system in a more secure manner; and
  • user responsibilities in maintaining the security of the information and information system; and
(iii) the organization documents attempts to obtain information system documentation when such documentation is either unavailable or nonexistent.
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: System and services acquisition policy; procedures addressing information system documentation; information system documentation including administrator and user guides; records documenting attempts to obtain unavailable or nonexistent information system documentation; other relevant documents or records].
Interview: [SELECT FROM: Organizational personnel with information system documentation responsibilities; organizational personnel operating, using, and/or maintaining the information system].



SECURITY CONTROL ENHANCEMENT

Template:Doc:NIST SP 800-53r3 Appendix F/SA-5/1


SA-5(1) INFORMATION SYSTEM DOCUMENTATION
SA-5(1).1 ASSESSMENT OBJECTIVE:
Determine if the organization obtains, protects as required, and makes available to authorized personnel, vendor/manufacturer documentation that describes the functional properties of the security controls employed within the information system with sufficient detail to permit analysis and testing.
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: System and services acquisition policy; procedures addressing information system documentation; information system design documentation; other relevant documents or records].
Interview: [SELECT FROM: Organizational personnel with information system security, acquisition, and contracting responsibilities; organizational personnel operating, using, and/or maintaining the information system].


SECURITY CONTROL ENHANCEMENT

Template:Doc:NIST SP 800-53r3 Appendix F/SA-5/3


SA-5(3) INFORMATION SYSTEM DOCUMENTATION
SA-5(3).1 ASSESSMENT OBJECTIVE:
Determine if the organization obtains, protects as required, and makes available to authorized personnel, vendor/manufacturer documentation that describes the high-level design of the information system in terms of subsystems and implementation details of the security controls employed within the system with sufficient detail to permit analysis and testing.
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: System and services acquisition policy; procedures addressing information system documentation; information system design documentation; other relevant documents or records].
Interview: [SELECT FROM: Organizational personnel with information system security, acquisition, and contracting responsibilities; organizational personnel operating, using, and/or maintaining the information system].


SA-6 SOFTWARE USAGE RESTRICTIONS


FAMILY: SYSTEM AND SERVICES ACQUISITION CLASS: MANAGEMENT


Security Control Baseline:
SA-6 Software Usage Restrictions P1 LOW SA-6 MOD SA-6 HIGH SA-6


SECURITY CONTROL

Template:Doc:NIST SP 800-53r3 Appendix F/SA-6


ASSESSMENT PROCEDURE
SA-6 SOFTWARE USAGE RESTRICTIONS
SA-6.1 ASSESSMENT OBJECTIVE:
Determine if:
(i) the organization uses software and associated documentation in accordance with contract agreements and copyright laws;
(ii) the organization employs tracking systems for software and associated documentation protected by quantity licenses to control copying and distribution; and
(iii) the organization controls and documents the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work.
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: System and services acquisition policy; procedures addressing software usage restrictions; site license documentation; list of software usage restrictions; other relevant documents or records].
Interview: [SELECT FROM: Organizational personnel with information system administration responsibilities; organizational personnel operating, using, and/or maintaining the information system].



SA-7 USER-INSTALLED SOFTWARE


FAMILY: SYSTEM AND SERVICES ACQUISITION CLASS: MANAGEMENT


Security Control Baseline:
SA-7 User-Installed Software P1 LOW SA-7 MOD SA-7 HIGH SA-7


SECURITY CONTROL

Template:Doc:NIST SP 800-53r3 Appendix F/SA-7


ASSESSMENT PROCEDURE
SA-7 USER-INSTALLED SOFTWARE
SA-7.1 ASSESSMENT OBJECTIVE:
Determine if:
(i) the organization identifies and documents (as appropriate) explicit rules to be enforced when governing the installation of software by users; and
(ii) the organization (or information system) enforces explicit rules governing the installation of software by users.
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: System and services acquisition policy; procedures addressing user installed software; list of rules governing user installed software; network traffic on the information system; other relevant documents or records].
Interview: [SELECT FROM: Organizational personnel with information system administration responsibilities; organizational personnel operating, using, and/or maintaining the information system].
Test: [SELECT FROM: Enforcement of rules for user installed software on the information system; information system for prohibited software].


SA-8 SECURITY ENGINEERING PRINCIPLES


FAMILY: SYSTEM AND SERVICES ACQUISITION CLASS: MANAGEMENT


Security Control Baseline:
SA-8 Security Engineering Principles P1 LOW Not Selected MOD SA-8 HIGH SA-8


SECURITY CONTROL

Template:Doc:NIST SP 800-53r3 Appendix F/SA-8


ASSESSMENT PROCEDURE
SA-8 SECURITY ENGINEERING PRINCIPLES
SA-8.1 ASSESSMENT OBJECTIVE:
Determine if:
(i) The organization applies information system security engineering principles in the specification of the information system;
(ii) the organization applies information system security engineering principles in the design of the information system;
(iii) the organization applies information system security engineering principles in the development of the information system;
(iv) the organization applies information system security engineering principles in the implementation of the information system; and
(v) the organization applies information system security engineering principles in the modification of the information system.
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: System and services acquisition policy; procedures addressing security engineering principles used in the development and implementation of the information system; information system design documentation; security requirements and security specifications for the information system; other relevant documents or records].
Interview: [SELECT FROM: Organizational personnel with information system design, development, implementation, and modification responsibilities].



SA-9 EXTERNAL INFORMATION SYSTEM SERVICES


FAMILY: SYSTEM AND SERVICES ACQUISITION CLASS: MANAGEMENT


Security Control Baseline:
SA-9 External Information System Services P1 LOW SA-9 MOD SA-9 HIGH SA-9


SECURITY CONTROL

Template:Doc:NIST SP 800-53r3 Appendix F/SA-9


ASSESSMENT PROCEDURE
SA-9 EXTERNAL INFORMATION SYSTEM SERVICES
SA-9.1 ASSESSMENT OBJECTIVE:
Determine if:
(i) the organization requires that providers of external information system services comply with organizational information security requirements and employ appropriate security controls in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;
(ii) the organization defines and documents government oversight, and user roles and responsibilities with regard to external information system services; and
(iii) the organization monitors security control compliance by external service providers.
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: System and services acquisition policy; procedures addressing external information system services; acquisition contracts and service level agreements; organizational security requirements and security specifications for external provider services; security control assessment evidence from external providers of information system services; other relevant documents or records].
Interview: [SELECT FROM: Organizational personnel with system and services acquisition responsibilities; external providers of information system services].



SA-10 DEVELOPER CONFIGURATION MANAGEMENT


FAMILY: SYSTEM AND SERVICES ACQUISITION CLASS: MANAGEMENT


Security Control Baseline:
SA-10 Developer Configuration Management P1 LOW Not Selected MOD SA-10 HIGH SA-10


SECURITY CONTROL

Template:Doc:NIST SP 800-53r3 Appendix F/SA-10


ASSESSMENT PROCEDURE
SA-10 DEVELOPER CONFIGURATION MANAGEMENT
SA-10.1 ASSESSMENT OBJECTIVE:
Determine if the organization requires that information system developers/integrators:
(i) perform configuration management during information system:
  • design;
  • development;
  • implementation; and
  • operation;
(ii) manage and control changes to the information system during:
  • design;
  • development;
  • implementation; and
  • modification;
(iii) implement only organization-approved changes;
(iv) document approved changes to the information system; and
(v) track security flaws and flaw resolution.
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: System and services acquisition policy; procedures addressing information system developer/integrator configuration management; acquisition contracts and service level agreements; information system developer/integrator configuration management plan; security flaw tracking records; system change authorization records; other relevant documents or records].
Interview: [SELECT FROM: Organization personnel with information system security, acquisition, and contracting responsibilities; organization personnel with configuration management responsibilities].



SA-11 DEVELOPER SECURITY TESTING


FAMILY: SYSTEM AND SERVICES ACQUISITION CLASS: MANAGEMENT


Security Control Baseline:
SA-11 Developer Security Testing P2 LOW Not Selected MOD SA-11 HIGH SA-11


SECURITY CONTROL

Template:Doc:NIST SP 800-53r3 Appendix F/SA-11


ASSESSMENT PROCEDURE
SA-11 DEVELOPER SECURITY TESTING
SA-11.1 ASSESSMENT OBJECTIVE:
Determine if the organization requires that information system developers/integrators, in consultation with associated security personnel (including security engineers):
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: System and services acquisition policy; procedures addressing information system developer/integrator security testing; acquisition contracts and service level agreements; information system developer/integrator security test plans; records of developer/integrator security testing results for the information system; security flaw tracking records; other relevant documents or records].
Interview: [SELECT FROM: Organizational personnel with developer security testing responsibilities].



Source