NIST SP 800-53Ar1 Assessment Procedure Catalog, with SP 800-53r3 Security Controls
SYSTEM AND COMMUNICATIONS PROTECTION
SC-1 SYSTEM AND COMMUNICATIONS PROTECTION POLICY AND PROCEDURES
FAMILY: SYSTEM AND COMMUNICATIONS PROTECTION
|
CLASS: TECHNICAL
|
- Security Control Baseline:
SC-1
|
System and Communications Protection Policy and Procedures
|
P1
|
LOW SC-1
|
MOD SC-1
|
HIGH SC-1
|
ASSESSMENT PROCEDURE
|
SC-1 |
SYSTEM AND COMMUNICATIONS PROTECTION POLICY AND PROCEDURES
|
SC-1.1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization develops and formally documents system and communications protection policy;
- (ii) the organization system and communications protection policy addresses:
- (iii) the organization disseminates formal documented system and communications protection policy to elements within the organization having associated system and communications protection roles and responsibilities;
- (iv) the organization develops and formally documents system and communications protection procedures;
- (v) the organization system and communications protection procedures facilitate implementation of the system and communications protection policy and associated system and communications protection controls; and
- (vi) the organization disseminates formal documented system and communications protection procedures to elements within the organization having associated system and communications protection roles and responsibilities.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy and procedures; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with system and communications protection responsibilities].
|
SC-1.2 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization defines the frequency of system and communications protection policy reviews/updates;
- (ii) the organization reviews/updates system and communications protection policy in accordance with organization-defined frequency; and
- (iii) the organization defines the frequency of system and communications protection procedure reviews/updates;
- (iv) the organization reviews/updates system and communications protection procedures in accordance with organization-defined frequency.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy and procedures; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with system and communications protection responsibilities].
|
SC-2 APPLICATION PARTITIONING
FAMILY: SYSTEM AND COMMUNICATIONS PROTECTION
|
CLASS: TECHNICAL
|
- Security Control Baseline:
SC-2
|
Application Partitioning
|
P1
|
LOW Not Selected
|
MOD SC-2
|
HIGH SC-2
|
ASSESSMENT PROCEDURE
|
SC-2 |
APPLICATION PARTITIONING
|
SC-2.1 |
ASSESSMENT OBJECTIVE:
Determine if the information system separates user functionality (including user interface services) from information system management functionality.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; procedures addressing application partitioning; information system design documentation; information system configuration settings and associated documentation; other relevant documents or records].
- Test: [SELECT FROM: Separation of user functionality from information system management functionality].
|
SC-4 INFORMATION IN SHARED RESOURCES
FAMILY: SYSTEM AND COMMUNICATIONS PROTECTION
|
CLASS: TECHNICAL
|
- Security Control Baseline:
SC-4
|
Information in Shared Resources
|
P1
|
LOW Not Selected
|
MOD SC-4
|
HIGH SC-4
|
ASSESSMENT PROCEDURE
|
SC-4 |
INFORMATION IN SHARED RESOURCES
|
SC-4.1 |
ASSESSMENT OBJECTIVE:
Determine if the information system prevents unauthorized and unintended information transfer via shared system resources.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; procedures addressing information remnance; information system design documentation; information system configuration settings and associated documentation; other relevant documents or records].
- Test: [SELECT FROM: Information system for unauthorized and unintended transfer of information via shared system resources].
|
SC-5 DENIAL OF SERVICE PROTECTION
FAMILY: SYSTEM AND COMMUNICATIONS PROTECTION
|
CLASS: TECHNICAL
|
- Security Control Baseline:
SC-5
|
Denial of Service Protection
|
P1
|
LOW SC-5
|
MOD SC-5
|
HIGH SC-5
|
ASSESSMENT PROCEDURE
|
SC-5 |
DENIAL OF SERVICE PROTECTION
|
SC-5.1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization defines the types of denial of service attacks (or provides references to sources of current denial of service attacks) that can be addressed by the information system; and
- (ii) the information system protects against or limits the effects of the organization-defined or referenced types of denial of service attacks.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; procedures addressing denial of service protection; information system design documentation; security plan; information system configuration settings and associated documentation; other relevant documents or records].
- Test: [SELECT FROM: Information system for protection against or limitation of the effects of denial of service attacks].
|
SC-7 BOUNDARY PROTECTION
FAMILY: SYSTEM AND COMMUNICATIONS PROTECTION
|
CLASS: TECHNICAL
|
- Security Control Baseline:
SC-7
|
Boundary Protection
|
P1
|
LOW SC-7
|
MOD SC-7 (1) (2) (3) (4) (5) (7)
|
HIGH SC-7 (1) (2) (3) (4) (5) (6) (7) (8)
|
ASSESSMENT PROCEDURE
|
SC-7 |
BOUNDARY PROTECTION
|
SC-7.1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization defines the external boundary of the information system;
- (ii) the organization defines key internal boundaries of the information system;
- (iii) the information system monitors and controls communications at the external boundary of the information system and at key internal boundaries within the system; and
- (iv) the information system connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; procedures addressing boundary protection; list of key internal boundaries of the information system; information system design documentation; boundary protection hardware and software; information system configuration settings and associated documentation; enterprise security architecture documentation; other relevant documents or records].
- Interview: [SELECT FROM: Selected organizational personnel with boundary protection responsibilities].
- Test: [SELECT FROM: Automated mechanisms implementing boundary protection capability within the information system].
|
SC-7(1) |
BOUNDARY PROTECTION
|
SC-7(1).1 |
ASSESSMENT OBJECTIVE:
Determine if the organization physically allocates publicly accessible information system components to separate subnetworks with separate, physical network interfaces.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; procedures addressing boundary protection; information system design documentation; information system hardware and software; information system architecture; information system configuration settings and associated documentation; other relevant documents or records].
|
SC-7(2) |
BOUNDARY PROTECTION
|
SC-7(2).1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization defines the mediation necessary for public access to the organization's internal networks; and
- (ii) the information system prevents public access into the organization's internal networks except as appropriately mediated by managed interfaces employing boundary protection devices.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; procedures addressing boundary protection; list of mediation vehicles for allowing public access to the organization's internal networks; information system design documentation; boundary protection hardware and software; information system configuration settings and associated documentation; other relevant documents or records].
- Test: [SELECT FROM: Automated mechanisms implementing access controls for public access to the organization's internal networks].
|
SC-7(3) |
BOUNDARY PROTECTION
|
SC-7(3).1 |
ASSESSMENT OBJECTIVE:
Determine if the organization limits the number of access points to the information system to allow for more comprehensive monitoring of inbound and outbound communications and network traffic.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; procedures addressing boundary protection; information system design documentation; boundary protection hardware and software; information system architecture and configuration documentation; information system configuration settings and associated documentation; communications and network traffic monitoring logs; other relevant documents or records].
|
SC-7(4) |
BOUNDARY PROTECTION
|
SC-7(4).1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization defines the frequency for reviewing exceptions to traffic flow policy;
- (ii) the organization implements a managed interface for each external telecommunication service;
- (iii) the organization establishes a traffic flow policy for each managed interface;
- (iv) the organization employs security controls as needed to protect the confidentiality and integrity of the information being transmitted;
- (v) the organization documents each exception to the traffic flow policy with a supporting mission/business need and duration of that need;
- (vi) the organization reviews exceptions to the traffic flow policy in accordance with the organization-defined frequency; and
- (vii) the organization removes traffic flow policy exceptions that are no longer supported by an explicit mission/business need.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; procedures addressing boundary protection; traffic flow policy; information system security architecture; information system design documentation; boundary protection hardware and software; information system architecture and configuration documentation; information system configuration settings and associated documentation; records of traffic flow policy exceptions; other relevant documents or records].
- Interview: [SELECT FROM: Selected organizational personnel with boundary protection responsibilities].
- Test: [SELECT FROM: Managed interfaces implementing organizational traffic flow policy].
|
SC-7(5) |
BOUNDARY PROTECTION
|
SC-7(5).1 |
ASSESSMENT OBJECTIVE:
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; procedures addressing boundary protection; information system design documentation; information system configuration settings and associated documentation; other relevant documents or records].
- Interview: [SELECT FROM: Selected organizational personnel with boundary protection responsibilities].
|
SC-7(7) |
BOUNDARY PROTECTION
|
SC-7(7).1 |
ASSESSMENT OBJECTIVE:
Determine if the information system prevents remote devices that have established a non-remote connection with the system from communicating outside of that communications path with resources in external networks.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; procedures addressing boundary protection; information system design documentation; information system hardware and software; information system architecture; information system configuration settings and associated documentation; other relevant documents or records].
- Test: [SELECT FROM: Automated mechanisms supporting non-remote connections with the information system].
|
SC-8 TRANSMISSION INTEGRITY
FAMILY: SYSTEM AND COMMUNICATIONS PROTECTION
|
CLASS: TECHNICAL
|
- Security Control Baseline:
SC-8
|
Transmission Integrity
|
P1
|
LOW Not Selected
|
MOD SC-8 (1)
|
HIGH SC-8 (1)
|
ASSESSMENT PROCEDURE
|
SC-8 |
TRANSMISSION INTEGRITY
|
SC-8.1 |
ASSESSMENT OBJECTIVE:
Determine if the information system protects the integrity of transmitted information.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; procedures addressing transmission integrity; information system design documentation; information system configuration settings and associated documentation; other relevant documents or records].
- Test: [SELECT FROM: Transmission integrity capability within the information system].
|
SC-8(1) |
TRANSMISSION INTEGRITY
|
SC-8(1).1 |
ASSESSMENT OBJECTIVE:
Determine if the organization employs cryptographic mechanisms to recognize changes to information during transmission unless otherwise protected by alternative physical measures.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; procedures addressing transmission integrity; information system design documentation; information system configuration settings and associated documentation; other relevant documents or records].
- Test: [SELECT FROM: Cryptographic mechanisms implementing transmission integrity capability within the information system].
|
SC-9 TRANSMISSION CONFIDENTIALITY
FAMILY: SYSTEM AND COMMUNICATIONS PROTECTION
|
CLASS: TECHNICAL
|
- Security Control Baseline:
SC-9
|
Transmission Confidentiality
|
P1
|
LOW Not Selected
|
MOD SC-9 (1)
|
HIGH SC-9 (1)
|
ASSESSMENT PROCEDURE
|
SC-9 |
TRANSMISSION CONFIDENTIALITY
|
SC-9.1 |
ASSESSMENT OBJECTIVE:
Determine if the information system protects the confidentiality of transmitted information.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; procedures addressing transmission confidentiality; information system design documentation; contracts for telecommunications services; information system configuration settings and associated documentation; other relevant documents or records].
- Test: [SELECT FROM: Transmission confidentiality capability within the information system].
|
SC-9(1) |
TRANSMISSION CONFIDENTIALITY
|
SC-9(1).1 |
ASSESSMENT OBJECTIVE:
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; procedures addressing transmission confidentiality; information system design documentation; information system communications hardware and software or Protected Distribution System protection mechanisms; information system configuration settings and associated documentation; other relevant documents or records].
- Test: [SELECT FROM: Cryptographic mechanisms implementing transmission confidentiality capability within the information system].
|
SC-10 NETWORK DISCONNECT
FAMILY: SYSTEM AND COMMUNICATIONS PROTECTION
|
CLASS: TECHNICAL
|
- Security Control Baseline:
SC-10
|
Network Disconnect
|
P2
|
LOW Not Selected
|
MOD SC-10
|
HIGH SC-10
|
ASSESSMENT PROCEDURE
|
SC-10 |
NETWORK DISCONNECT
|
SC-10.1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization defines the time period of inactivity before the information system terminates a network connection associated with a communications session; and
- (ii) the information system terminates a network connection associated with a communication session at the end of the session or after the organization-defined time period of inactivity.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; procedures addressing network disconnect; information system design documentation; organization-defined time period of inactivity before network disconnect; information system configuration settings and associated documentation; other relevant documents or records].
- Test: [SELECT FROM: Network disconnect capability within the information system].
|
SC-12 CRYPTOGRAPHIC KEY ESTABLISHMENT AND MANAGEMENT
FAMILY: SYSTEM AND COMMUNICATIONS PROTECTION
|
CLASS: TECHNICAL
|
- Security Control Baseline:
SC-12
|
Cryptographic Key Establishment and Management
|
P1
|
LOW SC-12
|
MOD SC-12
|
HIGH SC-12 (1)
|
ASSESSMENT PROCEDURE
|
SC-12 |
CRYPTOGRAPHIC KEY ESTABLISHMENT AND MANAGEMENT
|
SC-12.1 |
ASSESSMENT OBJECTIVE:
Determine if the organization establishes and manages cryptographic keys for required cryptography employed within the information system.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; procedures addressing cryptographic key management and establishment; information system design documentation; information system configuration settings and associated documentation; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with responsibilities for cryptographic key establishment or management].
- Test: [SELECT FROM: Automated mechanisms implementing cryptographic key management and establishment within the information system].
|
SC-13 USE OF CRYPTOGRAPHY
FAMILY: SYSTEM AND COMMUNICATIONS PROTECTION
|
CLASS: TECHNICAL
|
- Security Control Baseline:
SC-13
|
Use of Cryptography
|
P1
|
LOW SC-13
|
MOD SC-13
|
HIGH SC-13
|
ASSESSMENT PROCEDURE
|
SC-13 |
USE OF CRYPTOGRAPHY
|
SC-13.1 |
ASSESSMENT OBJECTIVE:
Determine if the information system implements cryptographic protections using cryptographic modules that comply with applicable laws, Executive Orders, directives, policies, regulations, standards, and guidance.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; procedures addressing use of cryptography; information system design documentation; information system configuration settings and associated documentation; cryptographic module validation certificates; other relevant documents or records].
|
SC-14 PUBLIC ACCESS PROTECTIONS
FAMILY: SYSTEM AND COMMUNICATIONS PROTECTION
|
CLASS: TECHNICAL
|
- Security Control Baseline:
SC-14
|
Public Access Protections
|
P1
|
LOW SC-14
|
MOD SC-14
|
HIGH SC-14
|
ASSESSMENT PROCEDURE
|
SC-14 |
PUBLIC ACCESS PROTECTIONS
|
SC-14.1 |
ASSESSMENT OBJECTIVE:
Determine if the information system protects the integrity and availability of publicly available information and applications.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; procedures addressing public access protections; access control policy and procedures; boundary protection procedures; information system design documentation; information system configuration settings and associated documentation; other relevant documents or records].
- Test: [SELECT FROM: Automated mechanisms protecting the integrity and availability of publicly available information and applications within the information system].
|
SC-15 COLLABORATIVE COMPUTING DEVICES
FAMILY: SYSTEM AND COMMUNICATIONS PROTECTION
|
CLASS: TECHNICAL
|
- Security Control Baseline:
SC-15
|
Collaborative Computing Devices
|
P1
|
LOW SC-15
|
MOD SC-15
|
HIGH SC-15
|
ASSESSMENT PROCEDURE
|
SC-15 |
COLLABORATIVE COMPUTING DEVICES
|
SC-15.1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization defines exceptions to the prohibiting of collaborative computing devices where remote activation is to be allowed;
- (ii) the organization prohibits remote activation of collaborative computing devices, excluding the organization-defined exceptions where remote activation is to be allowed; and
- (iii) the organization provides an explicit indication of use to users physically present at the devices.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; procedures addressing collaborative computing; access control policy and procedures; information system design documentation; information system configuration settings and associated documentation; other relevant documents or records].
- Test: [SELECT FROM: Automated mechanisms implementing access controls for collaborative computing environments; alert notification for local users].
|
SC-17 PUBLIC KEY INFRASTRUCTURE CERTIFICATES
FAMILY: SYSTEM AND COMMUNICATIONS PROTECTION
|
CLASS: TECHNICAL
|
- Security Control Baseline:
SC-17
|
Public Key Infrastructure Certificates
|
P1
|
LOW Not Selected
|
MOD SC-17
|
HIGH SC-17
|
ASSESSMENT PROCEDURE
|
SC-17 |
PUBLIC KEY INFRASTRUCTURE CERTIFICATES
|
SC-17.1 |
ASSESSMENT OBJECTIVE:
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; procedures addressing public key infrastructure certificates; public key certificate policy or policies; public key issuing process; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with public key infrastructure certificate issuing responsibilities].
|
SC-18 MOBILE CODE
FAMILY: SYSTEM AND COMMUNICATIONS PROTECTION
|
CLASS: TECHNICAL
|
- Security Control Baseline:
SC-18
|
Mobile Code
|
P1
|
LOW Not Selected
|
MOD SC-18
|
HIGH SC-18
|
ASSESSMENT PROCEDURE
|
SC-18 |
MOBILE CODE
|
SC-18.1 |
ASSESSMENT OBJECTIVE:
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; procedures addressing mobile code; mobile code usage restrictions, mobile code implementation policy and procedures; list of acceptable mobile code and mobile code technologies; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with mobile code authorization, monitoring, and control responsibilities].
- Test: [SELECT FROM: Mobile code authorization and monitoring capability for the organization].
|
SC-19 VOICE OVER INTERNET PROTOCOL
FAMILY: SYSTEM AND COMMUNICATIONS PROTECTION
|
CLASS: TECHNICAL
|
- Security Control Baseline:
SC-19
|
Voice Over Internet Protocol
|
P1
|
LOW Not Selected
|
MOD SC-19
|
HIGH SC-19
|
ASSESSMENT PROCEDURE
|
SC-19 |
VOICE OVER INTERNET PROTOCOL
|
SC-19.1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization establishes usage restrictions and implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously; and
- (ii) the organization authorizes, monitors, and controls the use of VoIP within the information system.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; procedures addressing VoIP; VoIP usage restrictions; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with VoIP authorization and monitoring responsibilities].
- Test: [SELECT FROM: VoIP authorization and monitoring capability for the organization].
|
SC-20 SECURE NAME / ADDRESS RESOLUTION SERVICE (AUTHORITATIVE SOURCE)
FAMILY: SYSTEM AND COMMUNICATIONS PROTECTION
|
CLASS: TECHNICAL
|
- Security Control Baseline:
SC-20
|
Secure Name /Address Resolution Service (Authoritative Source)
|
P1
|
LOW SC-20 (1)
|
MOD SC-20 (1)
|
HIGH SC-20 (1)
|
ASSESSMENT PROCEDURE
|
SC-20 |
SECURE NAME / ADDRESS RESOLUTION SERVICE (AUTHORITATIVE SOURCE)
|
SC-20.1 |
ASSESSMENT OBJECTIVE:
Determine if the information system provides additional data origin and integrity artifacts along with the authoritative data the system returns in response to name/address resolution queries.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; procedures addressing secure name/address resolution service (authoritative source); information system design documentation; information system configuration settings and associated documentation; other relevant documents or records].
- Test: [SELECT FROM: Automated mechanisms implementing secure name/address resolution service (authoritative source)].
|
SC-20(1) |
SECURE NAME / ADDRESS RESOLUTION SERVICE (AUTHORITATIVE SOURCE)
|
SC-20(1).1 |
ASSESSMENT OBJECTIVE:
Determine if
- (i) the information system, when operating as part of a distributed, hierarchical namespace, provides the means to indicate the security status of child subspaces; and
- (ii) the information system, when operating as part of a distributed, hierarchical namespace, enable verification of a chain of trust among parent and child domains (if the child supports secure resolution services).
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; procedures addressing secure name/address resolution service (authoritative source); information system design documentation; information system configuration settings and associated documentation; other relevant documents or records].
- Test: [SELECT FROM: Automated mechanisms implementing child subspace security status indicators and chain of trust verification for resolution services].
|
SC-22 ARCHITECTURE AND PROVISIONING FOR NAME / ADDRESS RESOLUTION SERVICE
FAMILY: SYSTEM AND COMMUNICATIONS PROTECTION
|
CLASS: TECHNICAL
|
- Security Control Baseline:
SC-22
|
Architecture and Provisioning for Name/Address Resolution Service
|
P1
|
LOW Not Selected
|
MOD SC-22
|
HIGH SC-22
|
ASSESSMENT PROCEDURE
|
SC-22 |
ARCHITECTURE AND PROVISIONING FOR NAME / ADDRESS RESOLUTION SERVICE
|
SC-22.1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the information systems that collectively provide name/address resolution service for an organization are fault tolerant; and
- (ii) the information systems that collectively provide name/address resolution service for an organization implement internal/external role separation.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; procedures addressing architecture and provisioning for name/address resolution service; access control policy and procedures; information system design documentation; assessment results from independent, testing organizations; information system configuration settings and associated documentation; other relevant documents or records].
- Test: [SELECT FROM: Automated mechanisms supporting name/address resolution service for fault tolerance and role separation].
|
SC-23 SESSION AUTHENTICITY
FAMILY: SYSTEM AND COMMUNICATIONS PROTECTION
|
CLASS: TECHNICAL
|
- Security Control Baseline:
SC-23
|
Session Authenticity
|
P1
|
LOW Not Selected
|
MOD SC-23
|
HIGH SC-23
|
ASSESSMENT PROCEDURE
|
SC-23 |
SESSION AUTHENTICITY
|
SC-23.1 |
ASSESSMENT OBJECTIVE:
Determine if the information system provides mechanisms to protect the authenticity of communications sessions.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; procedures addressing session authenticity; information system design documentation; information system configuration settings and associated documentation; other relevant documents or records].
- Test: [SELECT FROM: Automated mechanisms implementing session authenticity].
|
SC-28 PROTECTION OF INFORMATION AT REST
FAMILY: SYSTEM AND COMMUNICATIONS PROTECTION
|
CLASS: TECHNICAL
|
- Security Control Baseline:
SC-28
|
Protection of Information at Rest
|
P1
|
LOW Not Selected
|
MOD SC-28
|
HIGH SC-28
|
ASSESSMENT PROCEDURE
|
SC-28 |
PROTECTION OF INFORMATION AT REST
|
SC-28.1 |
ASSESSMENT OBJECTIVE:
Determine if the information system protects the confidentiality and integrity of information at rest.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; procedures addressing protection of information at rest; information system design documentation; information system configuration settings and associated documentation; cryptographic mechanisms and associated configuration documentation; list of information at rest requiring confidentiality and integrity protections; other relevant documents or records].
- Test: [SELECT FROM: Automated mechanisms implementing confidentiality and integrity protections for information at-rest].
|
SC-32 INFORMATION SYSTEM PARTITIONING
FAMILY: SYSTEM AND COMMUNICATIONS PROTECTION
|
CLASS: TECHNICAL
|
- Security Control Baseline:
SC-32
|
Information System Partitioning
|
P0
|
LOW Not Selected
|
MOD SC-32
|
HIGH SC-32
|
ASSESSMENT PROCEDURE
|
SC-32 |
INFORMATION SYSTEM PARTITIONING
|
SC-32.1 |
ASSESSMENT OBJECTIVE:
Determine if the organization partitions the information system into components residing in separate physical domains (or environments) as deemed necessary.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and communications protection policy; information system design documentation; information system configuration settings and associated documentation; information system architecture; list of information system physical domains (or environments); information system facility diagrams; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel installing, configuring, and/or maintaining the information system].
|
Source