Catalog: Electronic (OSCAL) Version of NIST SP 800-53 Rev 5.2.0 Controls and SP 800-53A Rev 5.2.0 Assessment Procedures | Controls: 66
| Control ID | Title / Statement | Priority | Baseline Impact | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| RA-01 |
Policy and Procedures
9 params
a. Develop, document, and disseminate to {{ insert: param, ra-1_prm_1 }}:
1. {{ insert: param, ra-01_odp.03 }} risk assessment policy that:
(a) Addresses purpose, scope, roles, responsi...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| RA-02 |
Security Categorization
a. Categorize the system and information it processes, stores, and transmits;
b. Document the security categorization results, including supporting rationale, in the security plan for the syste...
|
— | — | ||||||||||||||||||||||||||||||
| RA-02(01) |
Impact-level Prioritization
Conduct an impact-level prioritization of organizational systems to obtain additional granularity on system impact levels.
|
— | — | ||||||||||||||||||||||||||||||
| RA-03 |
Risk Assessment
5 params
a. Conduct a risk assessment, including:
1. Identifying threats to and vulnerabilities in the system;
2. Determining the likelihood and magnitude of harm from unauthorized access, use, di...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| RA-03(01) |
Supply Chain Risk Assessment
2 params
(a) Assess supply chain risks associated with {{ insert: param, ra-03.01_odp.01 }} ; and
(b) Update the supply chain risk assessment {{ insert: param, ra-03.01_odp.02 }} , when there are signif...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| RA-03(02) |
Use of All-source Intelligence
Use all-source intelligence to assist in the analysis of risk.
|
— | — | ||||||||||||||||||||||||||||||
| RA-03(03) |
Dynamic Threat Awareness
1 param
Determine the current cyber threat environment on an ongoing basis using {{ insert: param, ra-03.03_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| RA-03(04) |
Predictive Cyber Analytics
4 params
Employ the following advanced automation and analytics capabilities to predict and identify risks to {{ insert: param, ra-03.04_odp.02 }}: {{ insert: param, ra-3.4_prm_2 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| RA-04 |
Risk Assessment Update
|
— | — | ||||||||||||||||||||||||||||||
| RA-05 |
Vulnerability Monitoring and Scanning
5 params
a. Monitor and scan for vulnerabilities in the system and hosted applications {{ insert: param, ra-5_prm_1 }} and when new vulnerabilities potentially affecting the system are identified and repo...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| RA-05(01) |
Update Tool Capability
|
— | — | ||||||||||||||||||||||||||||||
| RA-05(02) |
Update Vulnerabilities to Be Scanned
2 params
Update the system vulnerabilities to be scanned {{ insert: param, ra-05.02_odp.01 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| RA-05(03) |
Breadth and Depth of Coverage
Define the breadth and depth of vulnerability scanning coverage.
|
— | — | ||||||||||||||||||||||||||||||
| RA-05(04) |
Discoverable Information
1 param
Determine information about the system that is discoverable and take {{ insert: param, ra-05.04_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| RA-05(05) |
Privileged Access
2 params
Implement privileged access authorization to {{ insert: param, ra-05.05_odp.01 }} for {{ insert: param, ra-05.05_odp.02 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| RA-05(06) |
Automated Trend Analyses
1 param
Compare the results of multiple vulnerability scans using {{ insert: param, ra-05.06_odp }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| RA-05(07) |
Automated Detection and Notification of Unauthorized Components
|
— | — | ||||||||||||||||||||||||||||||
| RA-05(08) |
Review Historic Audit Logs
2 params
Review historic audit logs to determine if a vulnerability identified in a {{ insert: param, ra-05.08_odp.01 }} has been previously exploited within an {{ insert: param, ra-05.08_odp.02 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| RA-05(09) |
Penetration Testing and Analyses
|
— | — | ||||||||||||||||||||||||||||||
| RA-05(10) |
Correlate Scanning Information
Correlate the output from vulnerability scanning tools to determine the presence of multi-vulnerability and multi-hop attack vectors.
|
— | — | ||||||||||||||||||||||||||||||
| RA-05(11) |
Public Disclosure Program
Establish a public reporting channel for receiving reports of vulnerabilities in organizational systems and system components.
|
— | — | ||||||||||||||||||||||||||||||
| RA-06 |
Technical Surveillance Countermeasures Survey
4 params
Employ a technical surveillance countermeasures survey at {{ insert: param, ra-06_odp.01 }} {{ insert: param, ra-06_odp.02 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| RA-07 |
Risk Response
Respond to findings from security and privacy assessments, monitoring, and audits in accordance with organizational risk tolerance.
|
— | — | ||||||||||||||||||||||||||||||
| RA-08 |
Privacy Impact Assessments
Conduct privacy impact assessments for systems, programs, or other activities before:
a. Developing or procuring information technology that processes personally identifiable information; and
b...
|
— | — | ||||||||||||||||||||||||||||||
| RA-09 |
Criticality Analysis
2 params
Identify critical system components and functions by performing a criticality analysis for {{ insert: param, ra-09_odp.01 }} at {{ insert: param, ra-09_odp.02 }}.
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| RA-10 |
Threat Hunting
1 param
a. Establish and maintain a cyber threat hunting capability to:
1. Search for indicators of compromise in organizational systems; and
2. Detect, track, and disrupt threats that evade exis...
► View parameters
|
— | — | ||||||||||||||||||||||||||||||
| └ ra-10a | Establish and maintain a cyber threat hunting capability to: | — | — | ||||||||||||||||||||||||||||||
| └ ra-10a.1 | Search for indicators of compromise in organizational systems; and | — | — | ||||||||||||||||||||||||||||||
| └ ra-10a.2 | Detect, track, and disrupt threats that evade existing controls; and | — | — | ||||||||||||||||||||||||||||||
| └ ra-10b | Employ the threat hunting capability {{ insert: param, ra-10_odp }}. | — | — | ||||||||||||||||||||||||||||||
| └ ra-1a | Develop, document, and disseminate to {{ insert: param, ra-1_prm_1 }}: | — | — | ||||||||||||||||||||||||||||||
| └ ra-1a.1 | {{ insert: param, ra-01_odp.03 }} risk assessment policy that: | — | — | ||||||||||||||||||||||||||||||
| └ ra-1a.1.(a) | Addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and | — | — | ||||||||||||||||||||||||||||||
| └ ra-1a.1.(b) | Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and | — | — | ||||||||||||||||||||||||||||||
| └ ra-1a.2 | Procedures to facilitate the implementation of the risk assessment policy and the associated risk assessment controls; | — | — | ||||||||||||||||||||||||||||||
| └ ra-1b | Designate an {{ insert: param, ra-01_odp.04 }} to manage the development, documentation, and dissemination of the risk assessment policy and proced... | — | — | ||||||||||||||||||||||||||||||
| └ ra-1c | Review and update the current risk assessment: | — | — | ||||||||||||||||||||||||||||||
| └ ra-1c.1 | Policy {{ insert: param, ra-01_odp.05 }} and following {{ insert: param, ra-01_odp.06 }} ; and | — | — | ||||||||||||||||||||||||||||||
| └ ra-1c.2 | Procedures {{ insert: param, ra-01_odp.07 }} and following {{ insert: param, ra-01_odp.08 }}. | — | — | ||||||||||||||||||||||||||||||
| └ ra-2a | Categorize the system and information it processes, stores, and transmits; | — | — | ||||||||||||||||||||||||||||||
| └ ra-2b | Document the security categorization results, including supporting rationale, in the security plan for the system; and | — | — | ||||||||||||||||||||||||||||||
| └ ra-2c | Verify that the authorizing official or authorizing official designated representative reviews and approves the security categorization decision. | — | — | ||||||||||||||||||||||||||||||
| └ ra-3.1.(a) | Assess supply chain risks associated with {{ insert: param, ra-03.01_odp.01 }} ; and | — | — | ||||||||||||||||||||||||||||||
| └ ra-3.1.(b) | Update the supply chain risk assessment {{ insert: param, ra-03.01_odp.02 }} , when there are significant changes to the relevant supply chain, or ... | — | — | ||||||||||||||||||||||||||||||
| └ ra-3a | Conduct a risk assessment, including: | — | — | ||||||||||||||||||||||||||||||
| └ ra-3a.1 | Identifying threats to and vulnerabilities in the system; | — | — | ||||||||||||||||||||||||||||||
| └ ra-3a.2 | Determining the likelihood and magnitude of harm from unauthorized access, use, disclosure, disruption, modification, or destruction of the system,... | — | — | ||||||||||||||||||||||||||||||
| └ ra-3a.3 | Determining the likelihood and impact of adverse effects on individuals arising from the processing of personally identifiable information; | — | — | ||||||||||||||||||||||||||||||
| └ ra-3b | Integrate risk assessment results and risk management decisions from the organization and mission or business process perspectives with system-leve... | — | — | ||||||||||||||||||||||||||||||
| └ ra-3c | Document risk assessment results in {{ insert: param, ra-03_odp.01 }}; | — | — | ||||||||||||||||||||||||||||||
| └ ra-3d | Review risk assessment results {{ insert: param, ra-03_odp.03 }}; | — | — | ||||||||||||||||||||||||||||||
| └ ra-3e | Disseminate risk assessment results to {{ insert: param, ra-03_odp.04 }} ; and | — | — | ||||||||||||||||||||||||||||||
| └ ra-3f | Update the risk assessment {{ insert: param, ra-03_odp.05 }} or when there are significant changes to the system, its environment of operation, or ... | — | — | ||||||||||||||||||||||||||||||
| └ ra-5a | Monitor and scan for vulnerabilities in the system and hosted applications {{ insert: param, ra-5_prm_1 }} and when new vulnerabilities potentially... | — | — | ||||||||||||||||||||||||||||||
| └ ra-5b | Employ vulnerability monitoring tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability managemen... | — | — | ||||||||||||||||||||||||||||||
| └ ra-5b.1 | Enumerating platforms, software flaws, and improper configurations; | — | — | ||||||||||||||||||||||||||||||
| └ ra-5b.2 | Formatting checklists and test procedures; and | — | — | ||||||||||||||||||||||||||||||
| └ ra-5b.3 | Measuring vulnerability impact; | — | — | ||||||||||||||||||||||||||||||
| └ ra-5c | Analyze vulnerability scan reports and results from vulnerability monitoring; | — | — | ||||||||||||||||||||||||||||||
| └ ra-5d | Remediate legitimate vulnerabilities {{ insert: param, ra-05_odp.03 }} in accordance with an organizational assessment of risk; | — | — | ||||||||||||||||||||||||||||||
| └ ra-5e | Share information obtained from the vulnerability monitoring process and control assessments with {{ insert: param, ra-05_odp.04 }} to help elimina... | — | — | ||||||||||||||||||||||||||||||
| └ ra-5f | Employ vulnerability monitoring tools that include the capability to readily update the vulnerabilities to be scanned. | — | — | ||||||||||||||||||||||||||||||
| └ ra-8a | Developing or procuring information technology that processes personally identifiable information; and | — | — | ||||||||||||||||||||||||||||||
| └ ra-8b | Initiating a new collection of personally identifiable information that: | — | — | ||||||||||||||||||||||||||||||
| └ ra-8b.1 | Will be processed using information technology; and | — | — | ||||||||||||||||||||||||||||||
| └ ra-8b.2 | Includes personally identifiable information permitting the physical or virtual (online) contacting of a specific individual, if identical question... | — | — |