NIST SP 800-53Ar1 Assessment Procedure Catalog, with SP 800-53r3 Security Controls
SYSTEM AND INFORMATION INTEGRITY
SI-1 SYSTEM AND INFORMATION INTEGRITY POLICY AND PROCEDURES
FAMILY: SYSTEM AND INFORMATION INTEGRITY
|
CLASS: OPERATIONAL
|
- Security Control Baseline:
SI-1
|
System and Information Integrity Policy and Procedures
|
P1
|
LOW SI-1
|
MOD SI-1
|
HIGH SI-1
|
ASSESSMENT PROCEDURE
|
SI-1 |
SYSTEM AND INFORMATION INTEGRITY POLICY AND PROCEDURES
|
SI-1.1 |
ASSESSMENT OBJECTIVE:
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and information integrity policy and procedures; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with system and information integrity responsibilities].
|
SI-1.2 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization defines the frequency of system and information integrity policy reviews/updates;
- (ii) the organization reviews/updates system and information integrity policy in accordance with organization-defined frequency;
- (iii) the organization defines the frequency of system and information integrity procedure reviews/updates; and
- (iv) the organization reviews/updates system and information integrity procedures in accordance with organization-defined frequency.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and information integrity policy and procedures; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with system and information integrity responsibilities].
|
SI-2 FLAW REMEDIATION
FAMILY: SYSTEM AND INFORMATION INTEGRITY
|
CLASS: OPERATIONAL
|
- Security Control Baseline:
SI-2
|
Flaw Remediation
|
P1
|
LOW SI-2
|
MOD SI-2 (2)
|
HIGH SI-2 (1) (2)
|
ASSESSMENT PROCEDURE
|
SI-2 |
FLAW REMEDIATION
|
SI-2.1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization identifies, reports, and corrects information system flaws;
- (ii) the organization tests software updates related to flaw remediation for effectiveness before installation;
- (iii) the organization tests software updates related to flaw remediation for potential side effects on organizational information systems before installation; and
- (iv) the organization incorporates flaw remediation into the organizational configuration management process.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and information integrity policy; procedures addressing flaw remediation; list of flaws and vulnerabilities potentially affecting the information system; list of recent security flaw remediation actions performed on the information system (e.g., list of installed patches, service packs, hot fixes, and other software updates to correct information system flaws); test results from the installation of software to correct information system flaws; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with flaw remediation responsibilities].
|
SI-2(2) |
FLAW REMEDIATION
|
SI-2(2).1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization defines the frequency of employing automated mechanisms to determine the state of information system components with regard to flaw remediation; and
- (ii) the organization employs automated mechanisms in accordance with the organization-defined frequency to determine the state of information system components with regard to flaw remediation.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and information integrity policy; procedures addressing flaw remediation; automated mechanisms supporting flaw remediation; information system design documentation; information system configuration settings and associated documentation; list of information system flaws; list of recent security flaw remediation actions performed on the information system; information system audit records; other relevant documents or records].
- Test: [SELECT FROM: Automated mechanisms implementing information system flaw remediation update status].
|
SI-3 MALICIOUS CODE PROTECTION
FAMILY: SYSTEM AND INFORMATION INTEGRITY
|
CLASS: OPERATIONAL
|
- Security Control Baseline:
SI-3
|
Malicious Code Protection
|
P1
|
LOW SI-3
|
MOD SI-3 (1) (2) (3)
|
HIGH SI-3 (1) (2) (3)
|
ASSESSMENT PROCEDURE
|
SI-3 |
MALICIOUS CODE PROTECTION
|
SI-3.1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization employs malicious code protection mechanisms at information system entry and exit points to detect and eradicate malicious code:
- transported by electronic mail, electronic mail attachments, Web accesses, removable media, or other common means; or
- inserted through the exploitation of information system vulnerabilities;
- (ii) the organization employs malicious code protection mechanisms at workstations, servers, or mobile computing devices on the network to detect and eradicate malicious code:
- transported by electronic mail, electronic mail attachments, Web accesses, removable media, or other common means; or
- inserted through the exploitation of information system vulnerabilities;
- (iii) the organization updates malicious code protection mechanisms (including signature definitions) whenever new releases are available in accordance with configuration management policy and procedures defined in CM-1;
- (iv) the organization defines the frequency of periodic scans of the information system by malicious code protection mechanisms;
- (v) the organization defines one or more of the following actions to be taken in response to malicious code detection:
- (vi) the organization configures malicious code protection mechanisms to:
- perform periodic scans of the information system in accordance with organization-defined frequency;
- perform real-time scans of files from external sources as the files are downloaded, opened, or executed in accordance with organizational security policy; and
- take organization-defined action(s) in response to malicious code detection; and
- (vii) the organization addresses the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the information system.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and information integrity policy; procedures addressing malicious code protection; malicious code protection mechanisms; records of malicious code protection updates; information system configuration settings and associated documentation; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with malicious code protection responsibilities].
- Test: [SELECT FROM: Automated mechanisms implementing malicious code protection capability].
|
SI-3(1) |
MALICIOUS CODE PROTECTION
|
SI-3(1).1 |
ASSESSMENT OBJECTIVE:
Determine if the organization centrally manages malicious code protection mechanisms.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and information integrity policy; procedures addressing malicious code protection; information system design documentation; malicious code protection mechanisms; records of malicious code protection updates; information system configuration settings and associated documentation; other relevant documents or records].
|
SI-3(2) |
MALICIOUS CODE PROTECTION
|
SI-3(2).1 |
ASSESSMENT OBJECTIVE:
Determine if the information system automatically updates malicious code protection mechanisms, including signature definitions.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and information integrity policy; procedures addressing malicious code protection; information system design documentation; malicious code protection mechanisms; records of malicious code protection updates; information system configuration settings and associated documentation; other relevant documents or records].
|
SI-3(3) |
MALICIOUS CODE PROTECTION
|
SI-3(3).1 |
ASSESSMENT OBJECTIVE:
Determine if the information system prevents non-privileged users from circumventing malicious code protection capabilities.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and information integrity policy; procedures addressing malicious code protection; information system design documentation; malicious code protection mechanisms; records of malicious code protection updates; information system configuration settings and associated documentation; other relevant documents or records].
- Test: [SELECT FROM: Automated mechanisms implementing malicious code protection capability].
|
SI-4 INFORMATION SYSTEM MONITORING
FAMILY: SYSTEM AND INFORMATION INTEGRITY
|
CLASS: OPERATIONAL
|
- Security Control Baseline:
SI-4
|
Information System Monitoring
|
P1
|
LOW Not Selected
|
MOD SI-4 (2) (4) (5) (6)
|
HIGH SI-4 (2) (4) (5) (6)
|
ASSESSMENT PROCEDURE
|
SI-4 |
INFORMATION SYSTEM MONITORING
|
SI-4.1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization defines objectives for monitoring events on the information system;
- (ii) the organization monitors events on the information system in accordance with organization-defined objectives and detects information system attacks;
- (iii) the organization identifies unauthorized use of the information system;
- (iv) the organization deploys monitoring devices:
- strategically within the information system to collect organization-determined essential information; and
- at ad hoc locations within the system to track specific types of transactions of interest to the organization;
- (v) the organization heightens the level of information system monitoring activity whenever there is an indication of increased risk to organizational operations and assets, individuals, other organizations, or the Nation based on law enforcement information, intelligence information, or other credible sources of information; and
- (vi) the organization obtains legal opinion with regard to information system monitoring activities in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and information integrity policy; procedures addressing information system monitoring tools and techniques; information system design documentation; information system monitoring tools and techniques documentation; information system configuration settings and associated documentation; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with information system monitoring responsibilities].
|
SI-4(2) |
INFORMATION SYSTEM MONITORING
|
SI-4(2).1 |
ASSESSMENT OBJECTIVE:
Determine if the organization employs automated tools to support near real-time analysis of events.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and information integrity policy; procedures addressing information system monitoring tools and techniques; information system design documentation; information system monitoring tools and techniques documentation; information system configuration settings and associated documentation; information system protocols documentation; other relevant documents or records].
- Test: [SELECT FROM: Automated tools supporting near real-time event analysis].
|
SI-4(4) |
INFORMATION SYSTEM MONITORING
|
SI-4(4).1 |
ASSESSMENT OBJECTIVE:
Determine if the information system monitors inbound and outbound communications for unusual or unauthorized activities or conditions.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and information integrity policy; procedures addressing information system monitoring tools and techniques; information system design documentation; information system monitoring tools and techniques documentation; information system configuration settings and associated documentation; information system protocols; other relevant documents or records].
- Test: [SELECT FROM: Automated tools supporting the integration of intrusion detection tools and access/flow control mechanisms].
|
SI-4(5) |
INFORMATION SYSTEM MONITORING
|
SI-4(5).1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization defines indicators of compromise or potential compromise to the security of the information system; and
- (ii) the information system provides near real-time alerts when any of the organization-defined list of compromise or potential compromise indicators occurs.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and information integrity policy; procedures addressing information system monitoring tools and techniques; security plan; information system monitoring tools and techniques documentation; information system configuration settings and associated documentation; other relevant documents or records].
- Test: [SELECT FROM: Information system monitoring real-time alert capability].
|
SI-4(6) |
INFORMATION SYSTEM MONITORING
|
SI-4(6).1 |
ASSESSMENT OBJECTIVE:
Determine if the information system prevents non-privileged users from circumventing intrusion detection and prevention capabilities.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and information integrity policy; procedures addressing information system monitoring tools and techniques; information system design documentation; information system monitoring tools and techniques documentation; information system configuration settings and associated documentation; information system protocols; other relevant documents or records].
- Test: [SELECT FROM: Information system-wide intrusion detection and prevention capability].
|
SI-5 SECURITY ALERTS, ADVISORIES, AND DIRECTIVES
FAMILY: SYSTEM AND INFORMATION INTEGRITY
|
CLASS: OPERATIONAL
|
- Security Control Baseline:
SI-5
|
Security Alerts, Advisories, and Directives
|
P1
|
LOW SI-5
|
MOD SI-5
|
HIGH SI-5 (1)
|
ASSESSMENT PROCEDURE
|
SI-5 |
SECURITY ALERTS, ADVISORIES, AND DIRECTIVES
|
SI-5.1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization receives information system security alerts, advisories, and directives from designated external organizations on an ongoing basis;
- (ii) the organization generates internal security alerts, advisories, and directives;
- (iii) the organization defines personnel (identified by name and/or by role) who should receive security alerts, advisories, and directives;
- (iv) the organization disseminates security alerts, advisories, and directives to organization-identified personnel; and
- (v) the organization implements security directives in accordance with established time frames, or notifies the issuing organization of the degree of noncompliance.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and information integrity policy; procedures addressing security alerts and advisories; records of security alerts and advisories; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with security alert and advisory responsibilities; organizational personnel implementing, operating, maintaining, administering, and using the information system].
|
SI-7 SOFTWARE AND INFORMATION INTEGRITY
FAMILY: SYSTEM AND INFORMATION INTEGRITY
|
CLASS: OPERATIONAL
|
- Security Control Baseline:
SI-7
|
Software and Information Integrity
|
P1
|
LOW Not Selected
|
MOD SI-7 (1)
|
HIGH SI-7 (1) (2)
|
ASSESSMENT PROCEDURE
|
SI-7 |
SOFTWARE AND INFORMATION INTEGRITY
|
SI-7.1 |
ASSESSMENT OBJECTIVE:
Determine if the information system detects unauthorized changes to software and information.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and information integrity policy; procedures addressing software and information integrity; information system design documentation; information system configuration settings and associated documentation; integrity verification tools and applications documentation; other relevant documents or records].
- Test: [SELECT FROM: Software integrity protection and verification capability].
|
SI-7(1) |
SOFTWARE AND INFORMATION INTEGRITY
|
SI-7(1).1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization defines the frequency of integrity scans to be performed on the information system; and
- (ii) the organization reassesses the integrity of software and information by performing integrity scans of the information system in accordance with the organization-defined frequency.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and information integrity policy; procedures addressing software and information integrity; security plan; information system configuration settings and associated documentation; integrity verification tools and applications documentation; records of integrity scans; other relevant documents or records].
|
SI-8 SPAM PROTECTION
FAMILY: SYSTEM AND INFORMATION INTEGRITY
|
CLASS: OPERATIONAL
|
- Security Control Baseline:
SI-8
|
Spam Protection
|
P1
|
LOW Not Selected
|
MOD SI-8
|
HIGH SI-8 (1)
|
ASSESSMENT PROCEDURE
|
SI-8 |
SPAM PROTECTION
|
SI-8.1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization employs spam protection mechanisms at information system entry and exit points to detect and take action on unsolicited messages transported by electronic mail, electronic mail attachments, Web accesses, removable media, or other common means;
- (ii) the organization employs spam protection mechanisms at workstations, servers, or mobile computing devices on the network to detect and take action on unsolicited messages transported by electronic mail, electronic mail attachments, Web accesses, removable media, or other common means; and
- (iii) the organization updates spam protection mechanisms (including signature definitions) when new releases are available in accordance with organizational configuration management policy and procedures defined in CM-1.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and information integrity policy; procedures addressing spam protection; information system design documentation; spam protection mechanisms; information system configuration settings and associated documentation; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with spam protection responsibilities].
- Test: [SELECT FROM: Automated mechanisms implementing spam detection and handling capability].
|
SI-9 INFORMATION INPUT RESTRICTIONS
FAMILY: SYSTEM AND INFORMATION INTEGRITY
|
CLASS: OPERATIONAL
|
- Security Control Baseline:
SI-9
|
Information Input Restrictions
|
P2
|
LOW Not Selected
|
MOD SI-9
|
HIGH SI-9
|
ASSESSMENT PROCEDURE
|
SI-9 |
INFORMATION INPUT RESTRICTIONS
|
SI-9.1 |
ASSESSMENT OBJECTIVE:
Determine if the organization restricts the capability to input information to the information system to authorized personnel.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and information integrity policy; procedures addressing information input restrictions; access control policy and procedures; separation of duties policy and procedures; information system design documentation; information system configuration settings and associated documentation; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with responsibilities for implementing restrictions on individual authorizations to input information into the information system].
|
SI-10 INFORMATION INPUT VALIDATION
FAMILY: SYSTEM AND INFORMATION INTEGRITY
|
CLASS: OPERATIONAL
|
- Security Control Baseline:
SI-10
|
Information Input Validation
|
P1
|
LOW Not Selected
|
MOD SI-10
|
HIGH SI-10
|
ASSESSMENT PROCEDURE
|
SI-10 |
INFORMATION INPUT VALIDATION
|
SI-10.1 |
ASSESSMENT OBJECTIVE:
Determine if the information system checks the validity of information inputs.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and information integrity policy; procedures addressing information validity; access control policy and procedures; separation of duties policy and procedures; documentation for automated tools and applications to verify validity of information; information system design documentation; information system configuration settings and associated documentation; other relevant documents or records].
- Test: [SELECT FROM: Information system capability for checking validity of information inputs].
|
SI-11 ERROR HANDLING
FAMILY: SYSTEM AND INFORMATION INTEGRITY
|
CLASS: OPERATIONAL
|
- Security Control Baseline:
SI-11
|
Error Handling
|
P2
|
LOW Not Selected
|
MOD SI-11
|
HIGH SI-11
|
ASSESSMENT PROCEDURE
|
SI-11 |
ERROR HANDLING
|
SI-11.1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the information system identifies potentially security-relevant error conditions;
- (ii) the organization defines sensitive or potentially harmful information that should not be contained in error logs and administrative messages;
- (iii) the information system generates error messages that provide information necessary for corrective actions without revealing organization-defined sensitive or potentially harmful information in error logs and administrative messages that could be exploited by adversaries; and
- (iv) the information system reveals error messages only to authorized personnel.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and information integrity policy; procedures addressing information system error handling; information system design documentation; information system configuration settings and associated documentation; other relevant documents or records].
- Test: [SELECT FROM: Information system error handling capability].
|
SI-12 INFORMATION OUTPUT HANDLING AND RETENTION
FAMILY: SYSTEM AND INFORMATION INTEGRITY
|
CLASS: OPERATIONAL
|
- Security Control Baseline:
SI-12
|
Information Output Handling and Retention
|
P2
|
LOW SI-12
|
MOD SI-12
|
HIGH SI-12
|
ASSESSMENT PROCEDURE
|
SI-12 |
INFORMATION OUTPUT HANDLING AND RETENTION
|
SI-12.1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization handles both information within and output from the information system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements; and
- (ii) the organization retains both information within and output from the information system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: System and information integrity policy; procedures addressing information system output handling and retention; media protection policy and procedures; information retention records, other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with information output handling and retention responsibilities].
|
Source