Catalog: NIST Special Publication 800-53 Revision 4: Security and Privacy Controls for Federal Information Systems and Organizations | Controls: 148
| Control ID | Title / Statement | Priority | Baseline Impact | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| SI-1 |
System and Information Integrity Policy and Procedures
3 params
The organization:
a. Develops, documents, and disseminates to {{ insert: param, si-1_prm_1 }}:
1. A system and information integrity policy that addresses purpose, scope, roles, responsibilit...
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-2 |
Flaw Remediation
1 param
The organization:
a. Identifies, reports, and corrects information system flaws;
b. Tests software and firmware updates related to flaw remediation for effectiveness and potential side effects ...
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-2(1) |
Central Management
The organization centrally manages the flaw remediation process.
|
— | — | ||||||||||||||||||||||||
| SI-2(2) |
Automated Flaw Remediation Status
1 param
The organization employs automated mechanisms {{ insert: param, si-2.2_prm_1 }} to determine the state of information system components with regard to flaw remediation.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-2(3) |
Time to Remediate Flaws / Benchmarks for Corrective Actions
1 param
The organization:
(a) Measures the time between flaw identification and flaw remediation; and
(b) Establishes {{ insert: param, si-2.3_prm_1 }} for taking corrective actions.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-2(4) |
Automated Patch Management Tools
|
— | — | ||||||||||||||||||||||||
| SI-2(5) |
Automatic Software / Firmware Updates
2 params
The organization installs {{ insert: param, si-2.5_prm_1 }} automatically to {{ insert: param, si-2.5_prm_2 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-2(6) |
Removal of Previous Versions of Software / Firmware
1 param
The organization removes {{ insert: param, si-2.6_prm_1 }} after updated versions have been installed.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-3 |
Malicious Code Protection
4 params
The organization:
a. Employs malicious code protection mechanisms at information system entry and exit points to detect and eradicate malicious code;
b. Updates malicious code protection mechan...
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-3(1) |
Central Management
The organization centrally manages malicious code protection mechanisms.
|
— | — | ||||||||||||||||||||||||
| SI-3(2) |
Automatic Updates
The information system automatically updates malicious code protection mechanisms.
|
— | — | ||||||||||||||||||||||||
| SI-3(3) |
Non-privileged Users
|
— | — | ||||||||||||||||||||||||
| SI-3(4) |
Updates Only by Privileged Users
The information system updates malicious code protection mechanisms only when directed by a privileged user.
|
— | — | ||||||||||||||||||||||||
| SI-3(5) |
Portable Storage Devices
|
— | — | ||||||||||||||||||||||||
| SI-3(6) |
Testing / Verification
1 param
The organization:
(a) Tests malicious code protection mechanisms {{ insert: param, si-3.6_prm_1 }} by introducing a known benign, non-spreading test case into the information system; and
(b) Ve...
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-3(7) |
Nonsignature-based Detection
The information system implements nonsignature-based malicious code detection mechanisms.
|
— | — | ||||||||||||||||||||||||
| SI-3(8) |
Detect Unauthorized Commands
3 params
The information system detects {{ insert: param, si-3.8_prm_1 }} through the kernel application programming interface at {{ insert: param, si-3.8_prm_2 }} and {{ insert: param, si-3.8_prm_3 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-3(9) |
Authenticate Remote Commands
2 params
The information system implements {{ insert: param, si-3.9_prm_1 }} to authenticate {{ insert: param, si-3.9_prm_2 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-3(10) |
Malicious Code Analysis
1 param
The organization:
(a) Employs {{ insert: param, si-3.10_prm_1 }} to analyze the characteristics and behavior of malicious code; and
(b) Incorporates the results from malicious code analysis int...
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-4 |
Information System Monitoring
6 params
The organization:
a. Monitors the information system to detect:
1. Attacks and indicators of potential attacks in accordance with {{ insert: param, si-4_prm_1 }}; and
2. Unauthorized loca...
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-4(1) |
System-wide Intrusion Detection System
The organization connects and configures individual intrusion detection tools into an information system-wide intrusion detection system.
|
— | — | ||||||||||||||||||||||||
| SI-4(2) |
Automated Tools for Real-time Analysis
The organization employs automated tools to support near real-time analysis of events.
|
— | — | ||||||||||||||||||||||||
| SI-4(3) |
Automated Tool Integration
The organization employs automated tools to integrate intrusion detection tools into access control and flow control mechanisms for rapid response to attacks by enabling reconfiguration of these me...
|
— | — | ||||||||||||||||||||||||
| SI-4(4) |
Inbound and Outbound Communications Traffic
1 param
The information system monitors inbound and outbound communications traffic {{ insert: param, si-4.4_prm_1 }} for unusual or unauthorized activities or conditions.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-4(5) |
System-generated Alerts
2 params
The information system alerts {{ insert: param, si-4.5_prm_1 }} when the following indications of compromise or potential compromise occur: {{ insert: param, si-4.5_prm_2 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-4(6) |
Restrict Non-privileged Users
|
— | — | ||||||||||||||||||||||||
| SI-4(7) |
Automated Response to Suspicious Events
2 params
The information system notifies {{ insert: param, si-4.7_prm_1 }} of detected suspicious events and takes {{ insert: param, si-4.7_prm_2 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-4(8) |
Protection of Monitoring Information
|
— | — | ||||||||||||||||||||||||
| SI-4(9) |
Testing of Monitoring Tools
1 param
The organization tests intrusion-monitoring tools {{ insert: param, si-4.9_prm_1 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-4(10) |
Visibility of Encrypted Communications
2 params
The organization makes provisions so that {{ insert: param, si-4.10_prm_1 }} is visible to {{ insert: param, si-4.10_prm_2 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-4(11) |
Analyze Communications Traffic Anomalies
1 param
The organization analyzes outbound communications traffic at the external boundary of the information system and selected {{ insert: param, si-4.11_prm_1 }} to discover anomalies.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-4(12) |
Automated Alerts
1 param
The organization employs automated mechanisms to alert security personnel of the following inappropriate or unusual activities with security implications: {{ insert: param, si-4.12_prm_1 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-4(13) |
Analyze Traffic / Event Patterns
The organization:
(a) Analyzes communications traffic/event patterns for the information system;
(b) Develops profiles representing common traffic patterns and/or events; and
(c) Uses the tra...
|
— | — | ||||||||||||||||||||||||
| SI-4(14) |
Wireless Intrusion Detection
The organization employs a wireless intrusion detection system to identify rogue wireless devices and to detect attack attempts and potential compromises/breaches to the information system.
|
— | — | ||||||||||||||||||||||||
| SI-4(15) |
Wireless to Wireline Communications
The organization employs an intrusion detection system to monitor wireless communications traffic as the traffic passes from wireless to wireline networks.
|
— | — | ||||||||||||||||||||||||
| SI-4(16) |
Correlate Monitoring Information
The organization correlates information from monitoring tools employed throughout the information system.
|
— | — | ||||||||||||||||||||||||
| SI-4(17) |
Integrated Situational Awareness
The organization correlates information from monitoring physical, cyber, and supply chain activities to achieve integrated, organization-wide situational awareness.
|
— | — | ||||||||||||||||||||||||
| SI-4(18) |
Analyze Traffic / Covert Exfiltration
1 param
The organization analyzes outbound communications traffic at the external boundary of the information system (i.e., system perimeter) and at {{ insert: param, si-4.18_prm_1 }} to detect covert exfi...
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-4(19) |
Individuals Posing Greater Risk
2 params
The organization implements {{ insert: param, si-4.19_prm_1 }} of individuals who have been identified by {{ insert: param, si-4.19_prm_2 }} as posing an increased level of risk.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-4(20) |
Privileged Users
1 param
The organization implements {{ insert: param, si-4.20_prm_1 }} of privileged users.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-4(21) |
Probationary Periods
2 params
The organization implements {{ insert: param, si-4.21_prm_1 }} of individuals during {{ insert: param, si-4.21_prm_2 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-4(22) |
Unauthorized Network Services
3 params
The information system detects network services that have not been authorized or approved by {{ insert: param, si-4.22_prm_1 }} and {{ insert: param, si-4.22_prm_2 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-4(23) |
Host-based Devices
2 params
The organization implements {{ insert: param, si-4.23_prm_1 }} at {{ insert: param, si-4.23_prm_2 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-4(24) |
Indicators of Compromise
The information system discovers, collects, distributes, and uses indicators of compromise.
|
— | — | ||||||||||||||||||||||||
| SI-5 |
Security Alerts, Advisories, and Directives
5 params
The organization:
a. Receives information system security alerts, advisories, and directives from {{ insert: param, si-5_prm_1 }} on an ongoing basis;
b. Generates internal security alerts, adv...
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-5(1) |
Automated Alerts and Advisories
The organization employs automated mechanisms to make security alert and advisory information available throughout the organization.
|
— | — | ||||||||||||||||||||||||
| SI-6 |
Security Function Verification
7 params
The information system:
a. Verifies the correct operation of {{ insert: param, si-6_prm_1 }};
b. Performs this verification {{ insert: param, si-6_prm_2 }};
c. Notifies {{ insert: param, si-6...
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-6(1) |
Notification of Failed Security Tests
|
— | — | ||||||||||||||||||||||||
| SI-6(2) |
Automation Support for Distributed Testing
The information system implements automated mechanisms to support the management of distributed security testing.
|
— | — | ||||||||||||||||||||||||
| SI-6(3) |
Report Verification Results
1 param
The organization reports the results of security function verification to {{ insert: param, si-6.3_prm_1 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-7 |
Software, Firmware, and Information Integrity
1 param
The organization employs integrity verification tools to detect unauthorized changes to {{ insert: param, si-7_prm_1 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-7(1) |
Integrity Checks
4 params
The information system performs an integrity check of {{ insert: param, si-7.1_prm_1 }} {{ insert: param, si-7.1_prm_2 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-7(2) |
Automated Notifications of Integrity Violations
1 param
The organization employs automated tools that provide notification to {{ insert: param, si-7.2_prm_1 }} upon discovering discrepancies during integrity verification.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-7(3) |
Centrally-managed Integrity Tools
The organization employs centrally managed integrity verification tools.
|
— | — | ||||||||||||||||||||||||
| SI-7(4) |
Tamper-evident Packaging
|
— | — | ||||||||||||||||||||||||
| SI-7(5) |
Automated Response to Integrity Violations
2 params
The information system automatically {{ insert: param, si-7.5_prm_1 }} when integrity violations are discovered.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-7(6) |
Cryptographic Protection
The information system implements cryptographic mechanisms to detect unauthorized changes to software, firmware, and information.
|
— | — | ||||||||||||||||||||||||
| SI-7(7) |
Integration of Detection and Response
1 param
The organization incorporates the detection of unauthorized {{ insert: param, si-7.7_prm_1 }} into the organizational incident response capability.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-7(8) |
Auditing Capability for Significant Events
3 params
The information system, upon detection of a potential integrity violation, provides the capability to audit the event and initiates the following actions: {{ insert: param, si-7.8_prm_1 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-7(9) |
Verify Boot Process
1 param
The information system verifies the integrity of the boot process of {{ insert: param, si-7.9_prm_1 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-7(10) |
Protection of Boot Firmware
2 params
The information system implements {{ insert: param, si-7.10_prm_1 }} to protect the integrity of boot firmware in {{ insert: param, si-7.10_prm_2 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-7(11) |
Confined Environments with Limited Privileges
1 param
The organization requires that {{ insert: param, si-7.11_prm_1 }} execute in a confined physical or virtual machine environment with limited privileges.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-7(12) |
Integrity Verification
1 param
The organization requires that the integrity of {{ insert: param, si-7.12_prm_1 }} be verified prior to execution.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-7(13) |
Code Execution in Protected Environments
1 param
The organization allows execution of binary or machine-executable code obtained from sources with limited or no warranty and without the provision of source code only in confined physical or virtua...
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-7(14) |
Binary or Machine Executable Code
The organization:
(a) Prohibits the use of binary or machine-executable code from sources with limited or no warranty and without the provision of source code; and
(b) Provides exceptions to th...
|
— | — | ||||||||||||||||||||||||
| SI-7(15) |
Code Authentication
1 param
The information system implements cryptographic mechanisms to authenticate {{ insert: param, si-7.15_prm_1 }} prior to installation.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-7(16) |
Time Limit On Process Execution w/o Supervision
1 param
The organization does not allow processes to execute without supervision for more than {{ insert: param, si-7.16_prm_1 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-8 |
Spam Protection
The organization:
a. Employs spam protection mechanisms at information system entry and exit points to detect and take action on unsolicited messages; and
b. Updates spam protection mechanisms ...
|
— | — | ||||||||||||||||||||||||
| SI-8(1) |
Central Management
The organization centrally manages spam protection mechanisms.
|
— | — | ||||||||||||||||||||||||
| SI-8(2) |
Automatic Updates
The information system automatically updates spam protection mechanisms.
|
— | — | ||||||||||||||||||||||||
| SI-8(3) |
Continuous Learning Capability
The information system implements spam protection mechanisms with a learning capability to more effectively identify legitimate communications traffic.
|
— | — | ||||||||||||||||||||||||
| SI-9 |
Information Input Restrictions
|
— | — | ||||||||||||||||||||||||
| SI-10 |
Information Input Validation
1 param
The information system checks the validity of {{ insert: param, si-10_prm_1 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-10(1) |
Manual Override Capability
2 params
The information system:
(a) Provides a manual override capability for input validation of {{ insert: param, si-10.1_prm_1 }};
(b) Restricts the use of the manual override capability to only {{ ...
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-10(2) |
Review / Resolution of Errors
1 param
The organization ensures that input validation errors are reviewed and resolved within {{ insert: param, si-10.2_prm_1 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-10(3) |
Predictable Behavior
The information system behaves in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.
|
— | — | ||||||||||||||||||||||||
| SI-10(4) |
Review / Timing Interactions
The organization accounts for timing interactions among information system components in determining appropriate responses for invalid inputs.
|
— | — | ||||||||||||||||||||||||
| SI-10(5) |
Restrict Inputs to Trusted Sources and Approved Formats
2 params
The organization restricts the use of information inputs to {{ insert: param, si-10.5_prm_1 }} and/or {{ insert: param, si-10.5_prm_2 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||
| └ si-10.1.(a) | Provides a manual override capability for input validation of {{ insert: param, si-10.1_prm_1 }}; | — | — | ||||||||||||||||||||||||
| └ si-10.1.(b) | Restricts the use of the manual override capability to only {{ insert: param, si-10.1_prm_2 }}; and | — | — | ||||||||||||||||||||||||
| └ si-10.1.(c) | Audits the use of the manual override capability. | — | — | ||||||||||||||||||||||||
| SI-11 |
Error Handling
1 param
The information system:
a. Generates error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries; and
b. Reveal...
► View parameters
|
— | — | ||||||||||||||||||||||||
| └ si-11a | Generates error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversa... | — | — | ||||||||||||||||||||||||
| └ si-11b | Reveals error messages only to {{ insert: param, si-11_prm_1 }}. | — | — | ||||||||||||||||||||||||
| SI-12 |
Information Handling and Retention
The organization handles and retains information within the information system and information output from the system in accordance with applicable federal laws, Executive Orders, directives, polic...
|
— | — | ||||||||||||||||||||||||
| SI-13 |
Predictable Failure Prevention
2 params
The organization:
a. Determines mean time to failure (MTTF) for {{ insert: param, si-13_prm_1 }} in specific environments of operation; and
b. Provides substitute information system components ...
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-13(1) |
Transferring Component Responsibilities
1 param
The organization takes information system components out of service by transferring component responsibilities to substitute components no later than {{ insert: param, si-13.1_prm_1 }} of mean time...
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-13(2) |
Time Limit On Process Execution Without Supervision
|
— | — | ||||||||||||||||||||||||
| SI-13(3) |
Manual Transfer Between Components
2 params
The organization manually initiates transfers between active and standby information system components {{ insert: param, si-13.3_prm_1 }} if the mean time to failure exceeds {{ insert: param, si-13...
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-13(4) |
Standby Component Installation / Notification
3 params
The organization, if information system component failures are detected:
(a) Ensures that the standby components are successfully and transparently installed within {{ insert: param, si-13.4_prm_...
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-13(5) |
Failover Capability
2 params
The organization provides {{ insert: param, si-13.5_prm_1 }} {{ insert: param, si-13.5_prm_2 }} for the information system.
► View parameters
|
— | — | ||||||||||||||||||||||||
| └ si-13.4.(a) | Ensures that the standby components are successfully and transparently installed within {{ insert: param, si-13.4_prm_1 }}; and | — | — | ||||||||||||||||||||||||
| └ si-13.4.(b) | {{ insert: param, si-13.4_prm_2 }}. | — | — | ||||||||||||||||||||||||
| └ si-13a | Determines mean time to failure (MTTF) for {{ insert: param, si-13_prm_1 }} in specific environments of operation; and | — | — | ||||||||||||||||||||||||
| └ si-13b | Provides substitute information system components and a means to exchange active and standby components at {{ insert: param, si-13_prm_2 }}. | — | — | ||||||||||||||||||||||||
| SI-14 |
Non-persistence
3 params
The organization implements non-persistent {{ insert: param, si-14_prm_1 }} that are initiated in a known state and terminated {{ insert: param, si-14_prm_2 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-14(1) |
Refresh from Trusted Sources
1 param
The organization ensures that software and data employed during information system component and service refreshes are obtained from {{ insert: param, si-14.1_prm_1 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-15 |
Information Output Filtering
1 param
The information system validates information output from {{ insert: param, si-15_prm_1 }} to ensure that the information is consistent with the expected content.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-16 |
Memory Protection
1 param
The information system implements {{ insert: param, si-16_prm_1 }} to protect its memory from unauthorized code execution.
► View parameters
|
— | — | ||||||||||||||||||||||||
| SI-17 |
Fail-safe Procedures
2 params
The information system implements {{ insert: param, si-17_prm_1 }} when {{ insert: param, si-17_prm_2 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||
| └ si-1a | Develops, documents, and disseminates to {{ insert: param, si-1_prm_1 }}: | — | — | ||||||||||||||||||||||||
| └ si-1a.1 | A system and information integrity policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organiz... | — | — | ||||||||||||||||||||||||
| └ si-1a.2 | Procedures to facilitate the implementation of the system and information integrity policy and associated system and information integrity controls... | — | — | ||||||||||||||||||||||||
| └ si-1b | Reviews and updates the current: | — | — | ||||||||||||||||||||||||
| └ si-1b.1 | System and information integrity policy {{ insert: param, si-1_prm_2 }}; and | — | — | ||||||||||||||||||||||||
| └ si-1b.2 | System and information integrity procedures {{ insert: param, si-1_prm_3 }}. | — | — | ||||||||||||||||||||||||
| └ si-2.3.(a) | Measures the time between flaw identification and flaw remediation; and | — | — | ||||||||||||||||||||||||
| └ si-2.3.(b) | Establishes {{ insert: param, si-2.3_prm_1 }} for taking corrective actions. | — | — | ||||||||||||||||||||||||
| └ si-2a | Identifies, reports, and corrects information system flaws; | — | — | ||||||||||||||||||||||||
| └ si-2b | Tests software and firmware updates related to flaw remediation for effectiveness and potential side effects before installation; | — | — | ||||||||||||||||||||||||
| └ si-2c | Installs security-relevant software and firmware updates within {{ insert: param, si-2_prm_1 }} of the release of the updates; and | — | — | ||||||||||||||||||||||||
| └ si-2d | Incorporates flaw remediation into the organizational configuration management process. | — | — | ||||||||||||||||||||||||
| └ si-3.10.(a) | Employs {{ insert: param, si-3.10_prm_1 }} to analyze the characteristics and behavior of malicious code; and | — | — | ||||||||||||||||||||||||
| └ si-3.10.(b) | Incorporates the results from malicious code analysis into organizational incident response and flaw remediation processes. | — | — | ||||||||||||||||||||||||
| └ si-3.6.(a) | Tests malicious code protection mechanisms {{ insert: param, si-3.6_prm_1 }} by introducing a known benign, non-spreading test case into the inform... | — | — | ||||||||||||||||||||||||
| └ si-3.6.(b) | Verifies that both detection of the test case and associated incident reporting occur. | — | — | ||||||||||||||||||||||||
| └ si-3a | Employs malicious code protection mechanisms at information system entry and exit points to detect and eradicate malicious code; | — | — | ||||||||||||||||||||||||
| └ si-3b | Updates malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy ... | — | — | ||||||||||||||||||||||||
| └ si-3c | Configures malicious code protection mechanisms to: | — | — | ||||||||||||||||||||||||
| └ si-3c.1 | Perform periodic scans of the information system {{ insert: param, si-3_prm_1 }} and real-time scans of files from external sources at {{ insert: p... | — | — | ||||||||||||||||||||||||
| └ si-3c.2 | {{ insert: param, si-3_prm_3 }} in response to malicious code detection; and | — | — | ||||||||||||||||||||||||
| └ si-3d | Addresses the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of ... | — | — | ||||||||||||||||||||||||
| └ si-4.13.(a) | Analyzes communications traffic/event patterns for the information system; | — | — | ||||||||||||||||||||||||
| └ si-4.13.(b) | Develops profiles representing common traffic patterns and/or events; and | — | — | ||||||||||||||||||||||||
| └ si-4.13.(c) | Uses the traffic/event profiles in tuning system-monitoring devices to reduce the number of false positives and the number of false negatives. | — | — | ||||||||||||||||||||||||
| └ si-4a | Monitors the information system to detect: | — | — | ||||||||||||||||||||||||
| └ si-4a.1 | Attacks and indicators of potential attacks in accordance with {{ insert: param, si-4_prm_1 }}; and | — | — | ||||||||||||||||||||||||
| └ si-4a.2 | Unauthorized local, network, and remote connections; | — | — | ||||||||||||||||||||||||
| └ si-4b | Identifies unauthorized use of the information system through {{ insert: param, si-4_prm_2 }}; | — | — | ||||||||||||||||||||||||
| └ si-4c | Deploys monitoring devices: | — | — | ||||||||||||||||||||||||
| └ si-4c.1 | Strategically within the information system to collect organization-determined essential information; and | — | — | ||||||||||||||||||||||||
| └ si-4c.2 | At ad hoc locations within the system to track specific types of transactions of interest to the organization; | — | — | ||||||||||||||||||||||||
| └ si-4d | Protects information obtained from intrusion-monitoring tools from unauthorized access, modification, and deletion; | — | — | ||||||||||||||||||||||||
| └ si-4e | Heightens the level of information system monitoring activity whenever there is an indication of increased risk to organizational operations and as... | — | — | ||||||||||||||||||||||||
| └ si-4f | Obtains legal opinion with regard to information system monitoring activities in accordance with applicable federal laws, Executive Orders, directi... | — | — | ||||||||||||||||||||||||
| └ si-4g | Provides {{ insert: param, si-4_prm_3 }} to {{ insert: param, si-4_prm_4 }} {{ insert: param, si-4_prm_5 }}. | — | — | ||||||||||||||||||||||||
| └ si-5a | Receives information system security alerts, advisories, and directives from {{ insert: param, si-5_prm_1 }} on an ongoing basis; | — | — | ||||||||||||||||||||||||
| └ si-5b | Generates internal security alerts, advisories, and directives as deemed necessary; | — | — | ||||||||||||||||||||||||
| └ si-5c | Disseminates security alerts, advisories, and directives to: {{ insert: param, si-5_prm_2 }}; and | — | — | ||||||||||||||||||||||||
| └ si-5d | Implements security directives in accordance with established time frames, or notifies the issuing organization of the degree of noncompliance. | — | — | ||||||||||||||||||||||||
| └ si-6a | Verifies the correct operation of {{ insert: param, si-6_prm_1 }}; | — | — | ||||||||||||||||||||||||
| └ si-6b | Performs this verification {{ insert: param, si-6_prm_2 }}; | — | — | ||||||||||||||||||||||||
| └ si-6c | Notifies {{ insert: param, si-6_prm_5 }} of failed security verification tests; and | — | — | ||||||||||||||||||||||||
| └ si-6d | {{ insert: param, si-6_prm_6 }} when anomalies are discovered. | — | — | ||||||||||||||||||||||||
| └ si-7.14.(a) | Prohibits the use of binary or machine-executable code from sources with limited or no warranty and without the provision of source code; and | — | — | ||||||||||||||||||||||||
| └ si-7.14.(b) | Provides exceptions to the source code requirement only for compelling mission/operational requirements and with the approval of the authorizing of... | — | — | ||||||||||||||||||||||||
| └ si-8a | Employs spam protection mechanisms at information system entry and exit points to detect and take action on unsolicited messages; and | — | — | ||||||||||||||||||||||||
| └ si-8b | Updates spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures. | — | — |