diff --git a/.github/workflows/content-artifacts.yml b/.github/workflows/content-artifacts.yml
index dcacd666..ef5eb49a 100644
--- a/.github/workflows/content-artifacts.yml
+++ b/.github/workflows/content-artifacts.yml
@@ -34,7 +34,7 @@ jobs:
- name: Install xmllint
run: sudo apt-get install -y libxml2-utils
- name: Cache generated content for OSCAL build artifacts
- uses: actions/cache@704facf57e6136b1bc63b828d79edcd491f0ee84
+ uses: actions/cache@13aacd865c20de90d75de3b17ebe84f7a17d57d2
with:
path: |
build/oscal/build/node_modules
@@ -51,7 +51,7 @@ jobs:
run: |
zip ${{ runner.temp }}/generated-content.zip -r README.md examples/ nist.gov/
working-directory: ${{ github.workspace }}
- - uses: actions/upload-artifact@a8a3f3ad30e3422c9c7b888a15615d19a852ae32
+ - uses: actions/upload-artifact@5d5d22a31266ced268874388b861e4b58bb5c2f3
if: always()
with:
name: generated-content
diff --git a/.gitignore b/.gitignore
index 5569c20d..32d93e87 100644
--- a/.gitignore
+++ b/.gitignore
@@ -3,3 +3,5 @@ generated/
# Downloaded utilities for content transformation
yq
jq
+.DS_Store
+build/oscal-cli/
diff --git a/build/Makefile b/build/Makefile
index 8e10f851..048447a3 100644
--- a/build/Makefile
+++ b/build/Makefile
@@ -17,7 +17,7 @@ all: artifacts checks ## Run all steps for content preparation
artifacts: copy-readmes copy-xml-content resolve-xml-profiles convert-min-json-content reformat-json-content convert-yaml-content ## Generate all artifacts
.PHONY: checks
-checks: validate-xml-content validate-json-content validate-yaml-content ## Check all content with schema and other validation methods
+checks: validate-xml-content validate-json-content validate-yaml-content validate-xml-by-cli ## Check all content with schema and other validation methods
.PHONY: clean
clean: clean-core-artifacts clean-readmes clean-json-content clean-xml-content clean-yaml-content ## Clean all generated content
@@ -26,6 +26,10 @@ clean: clean-core-artifacts clean-readmes clean-json-content clean-xml-content c
# Dependencies
#
+
+
+
+
CURL_INSTALL_OPTS:=--silent --location
# Used to automatically install certain executables
@@ -62,8 +66,25 @@ NPM_PKGS_DIR:=node_modules
$(NPM_PKGS_DIR):
$(MAKE) -C $(OSCAL_CORE_DIR) dependencies
+OSCAL_CLI_VERSION=`curl -s https://api.github.com/repos/usnistgov/oscal-cli/releases/latest | jq -r '.name[1:]'`
+OSCAL_CLI_BIN:=oscal-cli
+OSCAL_CLI_INSTALL_URL:=https://repo1.maven.org/maven2/gov/nist/secauto/oscal/tools/oscal-cli/cli-core/$(OSCAL_CLI_VERSION)/cli-core-$(OSCAL_CLI_VERSION)-oscal-cli.zip
+OSCAL_CLI_INSTALL_PATH := $(shell which oscal-cli 2>/dev/null)
+ifeq ($(OSCAL_CLI_INSTALL_PATH),)
+OSCAL_CLI_INSTALL_PATH := ./oscal-cli/
+$(OSCAL_CLI_INSTALL_PATH):
+ @echo "Downloading OSCAL CLI version $(OSCAL_CLI_VERSION)..."; \
+ mkdir -p $(OSCAL_CLI_INSTALL_PATH); \
+ curl $(CURL_INSTALL_OPTS) -o $(OSCAL_CLI_INSTALL_PATH)/oscal-cli.zip $(OSCAL_CLI_INSTALL_URL); \
+ unzip -o $(OSCAL_CLI_INSTALL_PATH)/oscal-cli.zip -d $(OSCAL_CLI_INSTALL_PATH); \
+ chmod +x $(OSCAL_CLI_INSTALL_PATH)/bin/$(OSCAL_CLI_BIN)
+else
+OSCAL_CLI_INSTALL_PATH := $(shell dirname $$(dirname $$(which oscal-cli)))
+endif
+
+
.PHONY: dependencies
-dependencies: $(JQ_PATH) $(XMLLINT_PATH) $(YQ_PATH) $(NPM_PKGS_DIR) ## Install needed jq and yq binaries, and download needed downstream dependencies
+dependencies: $(JQ_PATH) $(XMLLINT_PATH) $(YQ_PATH) $(NPM_PKGS_DIR) $(OSCAL_CLI_INSTALL_PATH) ## Install needed jq and yq binaries, and download needed downstream dependencies
# By default we install xmllint with operating system package manager, so
# to be sensible, we will not uninstall or delete it even with the package
@@ -157,6 +178,25 @@ validate-xml-content: $(GEN_XML_FILES) ## Validate XML files
$(MAKE) -C $(OSCAL_CORE_DIR) $(subst $(OSCAL_CORE_DIR)/,,$(OSCAL_COMPLETE_XML_SCHEMA))
$(XMLLINT_PATH) --schema $(OSCAL_COMPLETE_XML_SCHEMA) --noout $(GEN_XML_FILES)
+
+#
+# Validate XML with oscal-cli
+#
+.PHONY: validate-xml-by-cli
+validate-xml-by-cli: $(OSCAL_CLI_INSTALL_PATH) ## Validate XML files by directory using OSCAL CLI Tool
+ @echo "Validating XML files by directory using OSCAL CLI Tool"
+ @$(OSCAL_CLI_INSTALL_PATH)/bin/$(OSCAL_CLI_BIN) --version
+ @echo "latest oscal-cli version is $(OSCAL_CLI_VERSION)"
+ @echo "Validating OSCAL content with $(OSCAL_CLI_INSTALL_PATH)/bin/oscal-cli version $(OSCAL_CLI_VERSION)"
+ @find $(SRC_DIR)/examples -mindepth 1 -maxdepth 1 -type d | while read example_dir; do \
+ example_type=$$(basename "$$example_dir"); \
+ echo "Processing example type: $$example_type"; \
+ find "$$example_dir" -name '*.xml' | while read xml_file; do \
+ echo "Validating $$xml_file with OSCAL CLI as $$example_type"; \
+ $(OSCAL_CLI_INSTALL_PATH)/bin/oscal-cli "$$example_type" validate "$$xml_file"; \
+ done \
+ done
+
.PHONY: clean-xml-content
clean-xml-content: ## Clean generated XML content
@echo Cleaning XML content
diff --git a/src/examples/ap/xml/ifa_assessment-plan-example.xml b/src/examples/ap/xml/ifa_assessment-plan-example.xml
new file mode 100644
index 00000000..b4c7208c
--- /dev/null
+++ b/src/examples/ap/xml/ifa_assessment-plan-example.xml
@@ -0,0 +1,129 @@
+
+
+
+ IFA GoodRead Assessment Plan
+ 2024-02-01T13:57:28.355446-04:00
+ 1.0
+ 1.1.2
+
+ IFA Security Control Assessor
+
+
+ Amy Assessor
+ 3a675986-b4ff-4030-b178-e953c2e55d64
+
+
+ Important Federal Agency
+ IFA
+
+
+
+ e7730080-71ce-4b20-bec4-84f33136fd58
+
+
+
+
+
+ Examine System Elements for Least Privilege Design and Implementation
+
+ The activity and it steps will be performed by the assessor and facilitated by
+ owner, ISSO, and product team for the IFA GoodRead system with necessary
+ information and access about least privilege design and implementation of the
+ system's elements: the application, web framework, server, and cloud account
+ infrastructure.
+
+
+
+ Obtain Network Access via VPN to IFA GoodRead Environment
+
+ The assessor will obtain network access with appropriately configured VPN
+ account to see admin frontend to the application for PAO staff, which is
+ only accessible via VPN with an appropriately configured role for PAO staff
+ accounts.
+
+
+
+ Obtain Credentials and Access to AwesomeCloud Account for IFA GoodRead System
+
+ The assessor will obtain access to the GoodRead Product Team's AwesomeCloud
+ account with their single sign-on credentials to a read-only assessor role.
+
+
+
+ Obtain Applcation Access Provided by Product Team
+
+ The assessor will obtain non-privileged account credentials with the PAO
+ staff role to test this role in the application does not permit excessive
+ administrative operations.
+
+
+
+ Confirm Load Balancer Blocks Access to Admin Frontend from Internet
+
+ The assessor will confirm that the load balancer for public access does not
+ allow access to Admin Frontend of the application from the Internet.
+
+
+
+ Confirm GoodRead's PAO Role Cannot Manage Users
+
+ The assessor will confirm that user's logged into the GoodRead Application
+ with the PAO staff role cannot add, modify, or disable users from the
+ system.
+
+
+
+ Confirm Django Admin Panel Not Available
+
+ The assessor will confirm with web-based interface and API methods users with
+ the PAO Staff role cannot access the Django admin panel functions and
+ interactively change application's database records.
+
+
+
+
+
+
+
+
+ e7730080-71ce-4b20-bec4-84f33136fd58
+
+
+
+
+
+
+
+
+
+
+
+
+
+ The assessor for the IFA GoodRead Project, including the application and
+ infrastructure for this information system, are within scope of this assessment.
+
+
+
+
+ Examine Least Privilege Design and Implementation
+
+
+
+
+
+
+
+ Per IFA's use of NIST SP-800 53A, the assessor, with the support of the owner,
+ information system security officer, and product team for the IFA GoodRead project,
+ will examine least privilege design and implementation with the following:
+
+ list of security functions (deployed in hardware, software, and firmware) and
+ security-relevant information for which access must be explicitly authorized;
+ system configuration settings and associated documentation;
+
+
+
+
\ No newline at end of file
diff --git a/src/examples/ar/xml/ifa_assessment-results-example.xml b/src/examples/ar/xml/ifa_assessment-results-example.xml
new file mode 100644
index 00000000..42e456ed
--- /dev/null
+++ b/src/examples/ar/xml/ifa_assessment-results-example.xml
@@ -0,0 +1,222 @@
+
+
+
+ IFA GoodRead Continuous Monitoring Assessment Results June 2023
+ 2024-02-01T13:57:28.355446-04:00
+ 202306-002
+ 1.1.2
+
+ IFA Security Controls Assessor
+
+
+ Amy Assessor
+ 3a675986-b4ff-4030-b178-e953c2e55d64
+
+
+ Important Federal Agency
+ IFA
+
+
+
+ e7730080-71ce-4b20-bec4-84f33136fd58
+
+
+
+
+
+ Test System Elements for Least Privilege Design and Implementation
+
+ The activity and it steps will be performed by the assessor via their security
+ automation platform to test least privilege design and implementation of the
+ system's elements, specifically the cloud account infrastructure, as part of
+ continuous monitoring.
+
+
+
+ Configure Cross-Account IAM Role Trust for GoodRead and Assessor AwesomeCloud
+ Accounts
+
+ The GoodRead system engineer will coordinate with the assessor's engineering
+ support staff to configure an IAM role trust. A service account for
+ automation with its own role with the assessor's AwesomeCloud account can
+ assume the role for read-only assessor operations within the GoodRead
+ Product Team's AwesomeCloud account for continuous monitoring of least
+ privilege.
+
+
+ This step is complete.
+ GoodRead Product Team and SCA Engineering Support configured the latter's
+ cross-account role trust and authentication and authorization in to the
+ former's account on May 29, 2023.
+
+
+
+ Automate Cross-Account Login to GoodRead AwesomeCloud Account
+
+ The assessor's security automation platform will create a session from their
+ dedicated will obtain access to the GoodRead Product Team's AwesomeCloud
+ account with their single sign-on credentials to a read-only assessor role.
+
+
+ This step is complete.
+ GoodRead Product Team and SCA Engineering Support tested scripts from the
+ security automation platform interactively on May 30, 2023, to confirm they
+ work ahead of June 2023 continuous monitoring cycle.
+
+
+
+ Analyze GoodRead Developer and System Engineer Roles for Least Privilege
+
+ Once authenticated and authorized with a cross-account session, the security
+ automation pipeline will execute scripts developed and maintained by the
+ assessor's engineering support staff. It will analyze the permitted actions
+ for the developer and system engineer roles in the GoodRead Product Team's
+ AwesomeCloud account to confirm they are designed and implement to
+ facilitate only least privilege operation. Examples are included below.
+
+ For the GoodRead developer role in their AwesomeCloud account, the
+ developer role may only permit the user with this role to check the IP
+ addresses and status of the Awesome Compute Service server instances.
+ This role will not permit the user to create, change, or delete the
+ instances. Similarly, the developer will permit a user to perform
+ actions to see IP addresses of an Awesome Load Balancer instance, but
+ not add, change, or delete the instances.
+ For the GoodRead system engineer role in their AwesomeCloud account, the
+ system engineer role may only permit actions where the user can add,
+ change, or delete instances for approved services (i.e. Awesome Compute
+ Service, Awesome Load Balancer, et cetera). The role may not permit
+ actions by the user for any other service.
+
+
+
+
+
+
+
+
+
+ e7730080-71ce-4b20-bec4-84f33136fd58
+
+
+
+
+ IFA GoodRead Continous Monitoring Results June 2023
+
+ Automated monthly continuous monitoring of the GoodRead information system's cloud
+ infrastructure recorded observations below. Additionally, contingent upon the
+ confidence level of the observations and possible risks, confirmed findings may be
+ opened.
+
+ 2023-06-02T08:31:20-04:00
+ 2023-06-02T08:46:51-04:00
+
+
+ Test System Elements for Least Privilege Design and Implementation
+
+ The activity and it steps will be performed by the assessor via their
+ security automation platform to test least privilege design and
+ implementation of the system's elements, specifically the cloud account
+ infrastructure, as part of continuous monitoring.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ AwesomeCloud IAM Roles Test - GoodRead System Engineer Role
+
+ Test AwesomeCloud IAM Roles for least privilege design and implementation.
+
+ TEST
+ finding
+
+ 2023-06-02T08:31:20-04:00
+ 2023-07-01T00:00:00-04:00
+
+ The assessor's security automation platform analyzed all roles specific to the
+ GoodRead Product Team, not those managed by the Office of Information
+ Technology. The IFA-GoodRead-SystemEnginer
role in their respective
+ AwesomeCloud account permitted use of the following high-risk actions.
+
+ awesomecloud:auditlog:DeleteAccountAuditLog
+ awesomecloud:secmon:AdministerConfigurations
+
+ Both of these actions are overly permissive and not appropriate for the business
+ function of the staff member assigned this role.
+
+
+
+ AwesomeCloud IAM Roles Test - GoodRead Developer Role
+
+ Test AwesomeCloud IAM Roles for least privilege design and implementation.
+
+ TEST
+ finding
+
+ 2023-06-02T08:31:20-04:00
+ 2023-07-01T00:00:00-04:00
+
+ The assessor's security automation platform detected that the developer's role is
+ permitted to perform only permissible actions in the GoodRead AwesomeCloud
+ account in accordance with the agency's least privilege policy and procedures.
+
+
+
+ GoodRead System Engineers Have Over-Privileged Access to Cloud Infrastructure
+ Account
+
+ A user in the GoodRead cloud environment with the privileges of a system engineer
+ can exceed the intended privileges for their related business function. They can
+ delete all historical audit records and remove important security monitoring
+ functions for the IFA Security Operations Center staff.
+
+
+ An account without proper least privilege design and implementation can be used
+ to surreptitiously add, change, or delete cloud infrastructure to the too
+ managing all links to IFA's communication to public citizens, potentially
+ causing significant harm with no forensic evidence to recover the system.
+ Regardless of the extent and duration of a potential incident, such a
+ configuration greatly increases the risk of an insider threat if there were
+ likely to a potential insider threat in the GoodRead Product Team.
+ If such an insider threat existed and acted with this misconfigruatio, the
+ resulting event could cause significant financial and reputational risk to IFA's
+ Administrator, executive staff, and the agency overall.
+
+ investigating
+
+
+ GoodRead AwesomeCloud Account's System Engineer Role Permits High Risk Actions
+
+ The assessor's security automation platform detected that the system engineer's
+ role is permitted to perform the following actions in the GoodRead AwesomeCloud
+ account.
+
+ Delete and reset account audit logs.
+ Add, change, or delete security monitoring configurations in the Awesome
+ Security Monitor service used by the IFA Security Operations Center.
+
+ The system engineer is not permitted to modify these services and their role was
+ incorrectly configured.
+
+
+
+ This is a finding.
+
+
+
+ d5f9b263-965d-440b-99e7-77f5df670a11
+
+
+
+
+
\ No newline at end of file
diff --git a/src/examples/catalog/xml/basic-catalog.xml b/src/examples/catalog/xml/basic-catalog.xml
index 3bda0181..a86489cf 100644
--- a/src/examples/catalog/xml/basic-catalog.xml
+++ b/src/examples/catalog/xml/basic-catalog.xml
@@ -5,9 +5,9 @@
Sample Security Catalog for Demonstration and Testing
2023-10-12T00:00:00.000000-04:00
- 2023-10-12T00:00:00.000000-04:00
+ 2024-02-01T13:57:28.355446-04:00
1.1
- 1.1.1
+ 1.1.2
The following is a short excerpt from ISO/IEC 27002:2013 , Information technology — Security techniques — Code of practice for information security controls . This work is provided here under copyright fair use for non-profit, educational purposes only. Copyrights for this work are held by the publisher, the International Organization for Standardization (ISO).
@@ -17,11 +17,7 @@
Internal Organization
-
-
- To establish a management framework to initiate and control the implementation and operation of information security within the organization.
-
-
+
Information security roles and responsibilities
a choice from a selection
@@ -34,19 +30,22 @@
a duration
+
+ To establish a management framework to initiate and control the implementation and operation of information security within the organization.
+
All information security responsibilities should be defined and allocated.
A value has been assigned to .
A cross link has been established with a choppy syntax: (choppy) .
-
+
Allocation of information security responsibilities should be done in accordance with the information security policies. Responsibilities for the protection of individual assets and for carrying out specific information security processes should be identified. Responsibilities for information security risk management activities and in particular for acceptance of residual risks should be defined. These responsibilities should be supplemented, where necessary, with more detailed guidance for specific sites and information processing facilities. Local responsibilities for the protection of assets and for carrying out specific security processes should be defined.
-
+
Individuals with allocated information security responsibilities may delegate security tasks to others. Nevertheless they remain accountable and should determine that any delegated tasks have been correctly performed.
-
+
Areas for which individuals are responsible should be stated. In particular the following should take place:
the assets and information security processes should be identified and defined;
@@ -57,7 +56,7 @@
-
+
Many organizations appoint an information security manager to take overall responsibility for the development and implementation of information security and to support the identification of controls.
However, responsibility for resourcing and implementing the controls will often remain with individual managers. One common practice is to appoint an owner for each asset who then becomes responsible for its day-to-day protection.
@@ -70,14 +69,14 @@
Conflicting duties and areas of responsibility should be segregated to reduce opportunities for unauthorized or unintentional modification or misuse of the organization’s assets.
-
+
Care should be taken that no single person can access, modify or use assets without authorization or detection. The initiation of an event should be separated from its authorization. The possibility of collusion should be considered in designing the controls.
-
+
Small organizations may find segregation of duties difficult to achieve, but the principle should be applied as far as is possible and practicable. Whenever it is difficult to segregate, other controls such as monitoring of activities, audit trails and management supervision should be considered.
-
+
Segregation of duties is a method for reducing the risk of accidental or deliberate misuse of an organization’s assets.
@@ -89,7 +88,7 @@
Business requirements of access control
-
+
To limit access to information and information processing facilities.
@@ -99,16 +98,16 @@
An access control policy should be established, documented and reviewed based on business and information security requirements.
-
+
Asset owners should determine appropriate access control rules, access rights and restrictions for specific user roles towards their assets, with the amount of detail and the strictness of the controls reflecting the associated information security risks.
-
+
Access controls are both logical and physical and these should be considered together.
-
+
Users and service providers should be given a clear statement of the business requirements to be met by access controls.
-
+
The policy should take account of the following:
security requirements of business applications;
@@ -125,8 +124,8 @@
-
-
+
+
Care should be taken when specifying access control rules to consider:
establishing rules based on the premise “Everything is generally forbidden unless expressly permitted” rather than the weaker rule “Everything is generally permitted unless expressly forbidden”;
@@ -135,13 +134,13 @@
rules which require specific approval before enactment and those which do not.
-
+
Access control rules should be supported by formal procedures and defined responsibilities.
-
+
Role based access control is an approach used successfully by many organizations to link access rights with business roles.
-
+
Two of the frequent principles directing the access control policy are:
Need-to-know: you are only granted access to the information you need to perform your tasks (different tasks/roles mean different need-to-know and hence different access profile);
@@ -157,7 +156,7 @@
Users should only be provided with access to the network and network services that they have been specifically authorized to use.
-
+
A policy should be formulated concerning the use of networks and network services. This policy should cover:
the networks and network services which are allowed to be accessed;
@@ -168,11 +167,11 @@
monitoring of the use of network service
-
+
The policy on the use of network services should be consistent with the organization’s access control policy
-
+
\ No newline at end of file
diff --git a/src/examples/component-definition/xml/example-component-definition.xml b/src/examples/component-definition/xml/example-component-definition.xml
index 3f408ee6..cf533665 100644
--- a/src/examples/component-definition/xml/example-component-definition.xml
+++ b/src/examples/component-definition/xml/example-component-definition.xml
@@ -1,43 +1,41 @@
+ uuid="a7ba800c-a432-44cd-9075-0862cd66da6b">
MongoDB Component Definition Example
- 2023-10-12T00:00:00.000000-04:00
+ 2024-02-01T13:57:28.355446-04:00
20231012
- 1.1.1
+ 1.1.2
Provider
MongoDB
-
+
-
+
MongoDB
- MongoDB is a source-available, cross-platform document-oriented
- database program. Classified as a NoSQL database program, MongoDB
- uses JSON-like documents with optional schemas.
+ MongoDB is a source-available, cross-platform document-oriented database program.
+ Classified as a NoSQL database program, MongoDB uses JSON-like documents with optional
+ schemas.
Provides a NoSQL database service
ef7c799a-c50e-49ab-83e0-515e989e6df1
-
+
Primary daemon process for the MongoDB system.
-
+
MongoDB protocol for sharding with shardsrv option.
-
+
MongoDB protocol for configsrv operation.
@@ -46,63 +44,71 @@
source="#ba047e56-faef-430c-bafb-c54e9a87c6e8">
MongoDB control implementations for NIST SP 800-53 revision 5.
-
+
+ uuid="cf8338c5-fb6e-4593-a4a8-b3c4946ee080"
+ control-id="sc-8">
- MongoDB's implementation of SC-8 control. The details of the implementation are provided at the statement level.
+ MongoDB's implementation of SC-8 control. The details of the implementation are
+ provided at the statement level.
- confidentiality
+ confidentiality
-
-
- MongoDB implements TLS 1.x to protect the of transmitted data by encrypting data in transit, preventing unauthorized disclosure or changes to information during transmission.
-
+
+
+ MongoDB implements TLS 1.x to protect the
+ of transmitted data by encrypting data in transit, preventing unauthorized disclosure
+ or changes to information during transmission.
+
- MongoDB implements cryptographic mechanisms (TLS 1.x) to provide cryptographic protection for data in transit.
+ MongoDB implements cryptographic mechanisms (TLS 1.x) to provide cryptographic
+ protection for data in transit.
- prevent unauthorized disclosure of information
+ prevent unauthorized disclosure of information
-
-
- To implement cryptographic mechanisms (aka enable TLS 1.x) to , customers need to set the PEMKeyFile
option in the configuration file /etc/mongod.conf
to the certificate file's path and restart the component.
-
-
-
+
+
+ To implement cryptographic mechanisms (aka enable TLS 1.x) to , customers need to set the PEMKeyFile
option
+ in the configuration file /etc/mongod.conf
to the certificate file's path
+ and restart the component.
+
+
+
- Must ensure that MongoDB only listens for network
- connections on authorized interfaces by configuring the MongoDB
- configuration file to limit the services exposure to only the
- network interfaces on which MongoDB instances should listen for
- incoming connections.
+ Must ensure that MongoDB only listens for network connections on authorized interfaces
+ by configuring the MongoDB configuration file to limit the services exposure to only the
+ network interfaces on which MongoDB instances should listen for incoming connections.
-
- NIST Special Publication 800-53 Revision 5: Moderate Baseline Profile
-
-
-
-
+
+ NIST Special Publication 800-53 Revision 5: Moderate Baseline Profile
+
+
+
+
-
-
+
+
\ No newline at end of file
diff --git a/src/examples/component-definition/xml/example-component.xml b/src/examples/component-definition/xml/example-component.xml
index d3dbca63..5a5dd7c4 100644
--- a/src/examples/component-definition/xml/example-component.xml
+++ b/src/examples/component-definition/xml/example-component.xml
@@ -3,9 +3,9 @@
Test Component Definition
- 2023-10-12T00:00:00.000000-04:00
+ 2024-02-01T13:57:28.355446-04:00
20231012
- 1.1.1
+ 1.1.2
Test Vendor
diff --git a/src/examples/poam/xml/ifa_plan-of-action-and-milestones.xml b/src/examples/poam/xml/ifa_plan-of-action-and-milestones.xml
new file mode 100644
index 00000000..e71c0b6b
--- /dev/null
+++ b/src/examples/poam/xml/ifa_plan-of-action-and-milestones.xml
@@ -0,0 +1,198 @@
+
+
+
+ IFA GoodRead Plan of Action and Milestones
+ 2024-02-01T13:57:28.355446-04:00
+ 1.1
+ 1.1.2
+
+
+ 8101e04d-8305-4e73-bb95-6b59f645b143
+
+ Django Framework Examination
+
+ Examine Django Framework for least privilege design and implementation.
+
+ EXAMINE
+ control-objective
+
+ 2023-05-19T12:14:16-04:00
+
+ The assessor attempted to access the admin panel while logged into the GoodRead
+ application as a PAO staff user. They were able to see the admin panel and directly
+ edit database records for the application using the Django Framework's admin panel.
+
+
+
+ AwesomeCloud IAM Roles Test - GoodRead System Engineer Role
+
+ Test AwesomeCloud IAM Roles for least privilege design and implementation.
+
+ TEST
+ finding
+
+ 2023-06-02T08:31:20-04:00
+ 2023-07-01T00:00:00-04:00
+
+ The assessor's security automation platform analyzed all roles specific to the
+ GoodRead Product Team, not those managed by the Office of Information Technology.
+ The IFA-GoodRead-SystemEnginer
role in their respective AwesomeCloud
+ account permitted use of the following high-risk actions.
+
+ awesomecloud:auditlog:DeleteAccountAuditLog
+ awesomecloud:secmon:AdministerConfigurations
+
+ Both of these actions are overly permissive and not appropriate for the business
+ function of the staff member assigned this role.
+
+
+
+ IFA-GOODREAD-RISK-1: PAO Staff Have Over-Privileged Access to GoodRead System
+
+ A user with the privileges of a PAO staff user can exceed the intended privileges for
+ their related business function and directly edit the database for the GoodRead
+ application.
+
+
+ An account without proper least privilege design and implementation can be used to
+ significantly damage links created by the tool for use by public citizens,
+ potentially causing a national outage. If an outage were to occur, IFA and
+ Government policy will require the CIO of the agency to notify the Department of
+ Homeland Security and the public.
+ Such an event will cause significant financial and reputational risk to IFA's
+ Administrator, executive staff, and the agency overall.
+
+ deviation-approved
+
+
+
+
+
+
+
+
+
+ The GoodRead application is designed and implemented to only allow access to the
+ administrative functions for those with PAO staff fole via the VPN via network
+ configuration between the IFA Enterprise Support Systems and the GoodRead
+ AwesomeCloud account. Additionally, the load balanacer configuration only allows
+ access to view shortlinks from the public internet.
+
+
+ 2024-01-01T05:00:00-04:00
+
+ IFA-GOODREAD-RISK1-RESPONSE: IFA GoodRead Prouct Team Response
+
+ The GoodRead Product Team does not have sufficient personnel and budget to
+ implement the required changes in their use of the Django Framework and its
+ configuration in this quarter. With the consultation of the ISSO and the
+ assessor, the owner of the GoodRead system has decided to accept this risk until
+ the end of December 2023. From September to December, budget will be available
+ for the Good Read Product Team's developer and system engineer to completely
+ disable the functionality that is the source of the risk and its originating
+ finding.
+
+
+
+ End of Year Project Management Report of Developed Remediations
+
+ The owner, ISSO, and product team of the GoodRead Project intend to complete
+ the necessary development between September 2023 and December 2023. Whether
+ or not the necessary development for remedation is complete, the product
+ team's project manager will submit the final annual report. They will
+ identify this work item and whether it has been completed.
+
+
+
+
+
+
+
+
+
+ IFA-GOODREAD-RISK-2: GoodRead System Engineers Have Over-Privileged Access to Cloud
+ Infrastructure Account
+
+ A user in the GoodRead cloud environment with the privileges of a system engineer can
+ exceed the intended privileges for their related business function. They can delete
+ all historical audit records and remove important security monitoring functions for
+ the IFA Security Operations Center staff.
+
+
+ An account without proper least privilege design and implementation can be used to
+ surreptitiously add, change, or delete cloud infrastructure to the too managing all
+ links to IFA's communication to public citizens, potentially causing significant
+ harm with no forensic evidence to recover the system. Regardless of the extent and
+ duration of a potential incident, such a configuration greatly increases the risk of
+ an insider threat if there were likely to a potential insider threat in the GoodRead
+ Product Team.
+ If such an insider threat existed and acted with this misconfigruatio, the resulting
+ event could cause significant financial and reputational risk to IFA's
+ Administrator, executive staff, and the agency overall.
+
+ open
+
+
+
+
+
+
+
+ 2023-06-23T17:00:00-04:00
+
+ IFA-GOODREAD-RISK1-RESPONSE: IFA GoodRead Prouct Team Response
+
+ The GoodRead Product Team does not have siginficant mitigations or compensating
+ controls to counter this risk, even if likelihood is low. The IFA CISO has cited
+ ongoing guidance that potential insider threat risks be prioritized above
+ alternative categories of risk for this quarter. Additionally, there is
+ sufficient budget and unallocated time for the GoodRead and Office of
+ Information Technology system engineers to modify AwesomeCloud IAM roles on or
+ before the next continuous monitoring cycle beginning in July 2023. The planned
+ completion data is June 23, 2023.
+
+
+
+ Completion of GoodRead Sprint Ending June 23, 2023
+
+ The owner, ISSO, and product team of the GoodRead Project intend to complete
+ the necessary development by June 23. 2023, the last day of the coinciding
+ sprint. Whether or not the necessary development for mitigation is complete,
+ the product team's project manager will write a brief at the end of the
+ sprint to thw owner and ISSO of this system with the final status and
+ determination of this work item in this sprint.
+
+
+
+
+
+
+
+
+
+ Update Django Framework Configuration to Disable Default Admin Panel
+
+ Budget and technical staff are needed to re-design and re-implement a part of the
+ GoodRead application's use of a web appplication programming framework to mitigate
+ the risk of low privilege users directly modifying the database of this application.
+ This application is a high-visibility service and integral to future operations of
+ the IFA Office of Public Affairs and its staff.
+
+
+
+
+
+ GoodRead System Engineers Have Over-Privileged Access to Cloud Infrastructure Account
+
+ Budget and technical staff allocation are available and designated to fix a
+ misconfiguration of the IAM roles for members of the GoodRead Product Team in their
+ AwesomeCloud account to implement least privilege as designed.
+
+
+
+
+
\ No newline at end of file
diff --git a/src/examples/ssp/xml/ifa_ssp-example.xml b/src/examples/ssp/xml/ifa_ssp-example.xml
new file mode 100644
index 00000000..06b42f8b
--- /dev/null
+++ b/src/examples/ssp/xml/ifa_ssp-example.xml
@@ -0,0 +1,264 @@
+
+
+
+ IFA GoodRead System Security Plan
+ 2023-05-19T14:46:54-04:00
+ 2024-03-01T13:57:28.355446-04:00
+ 1.1
+ 1.1.2
+
+ IFA GoodRead Owner
+
+
+ IFA GoodRead Developer
+
+
+ IFA GoodRead System Engineer
+
+
+ IFA Public Affairs Office
+
+
+ Owen Stilskin
+ 3a675986-b4ff-4030-b178-e953c2e55d64
+
+
+ Juno Styles
+ 3a675986-b4ff-4030-b178-e953c2e55d64
+
+
+ Xavier Jones
+ 3a675986-b4ff-4030-b178-e953c2e55d64
+
+
+ Important Federal Agency
+ IFA
+
+
+
+ ba9c12bd-e5ef-46b6-95a2-4d8e7f864c1a
+
+
+ 67c04291-dbf6-495a-a3ba-0011638acc94
+
+
+ 4ba3f2b7-e894-48d7-b940-91c68661df55
+
+
+
+
+ 8101e04d-8305-4e73-bb95-6b59f645b143
+ IFA GoodRead
+
+ This system acts as a link shortener for IFA employees
+
+ 2023-05-19
+ moderate
+
+
+ User-provided Links
+
+ This system maintains a set of user-provided links and their associated
+ shortlinks
+
+
+ C.2.8.12
+
+
+ fips-199-low
+
+
+ fips-199-low
+ fips-199-moderate
+
+ Maliciously modified links are a concern
+
+
+
+ fips-199-low
+
+
+
+
+ low
+ medium
+ low
+
+
+
+
+ This section describes an attached diagram of the authorization boundary for IFA GoodRead Project's information system.
+
+
+
+
+ This section describes an attached diagram of the network architecture for IFA GoodRead Project's information system.
+
+
+
+
+ This section describes an attached diagram of various dataflows for application and related elements of the IFA GoodRead Project's information system.
+
+
+
+
+
+ Application Administrator
+
+ The developer of the application supports IFA Public Affairs Officers by administering the application and its infrastructure.
+
+ developer
+
+ Application Administrator Privilege
+ user-creation
+ user-enablement
+ user-disablement
+ user-role-modification
+ popular-shortlink-cache-reset
+ database-export
+ database-migration
+
+
+
+ Public Affairs Officers
+
+ IFA Public Affairs Officers (PAOs) in each division of the agency review public communications to citizens who are customers of the IFA. PAOs review requests from colleagues to generate and publish content that is the target of a shortlink and can unpublish shortlinks.
+
+ public-affairs-office
+
+ Public Affairs Officer Privilege
+ shortlink-generation
+ shortlink-approval
+ shortlink-rejection
+ shortlink-publication
+ shortlink-unpublication
+
+
+
+ General Public
+
+ The general public is free to click on shortlinks
+
+
+ General Public Privilege
+ shortlink-view
+
+
+
+ IFA GoodRead System
+
+ IFA develops, operates, and maintains the GoodRead link shortener system to
+
+
+
+ 67c04291-dbf6-495a-a3ba-0011638acc94
+
+
+ 4ba3f2b7-e894-48d7-b940-91c68661df55
+
+
+
+
+ This is the custom GoodRead application within the system.
+
+
+
+
+
+
+
+
+
+
+ This is the web application framework upon which the developer writes the custom GoodRead application for the user interface and API of this system.
+
+
+
+
+
+
+
+
+
+
+ This is the database for the custom GoodRead application within the system.
+
+
+
+
+
+
+
+
+
+
+ This is the operating system for the web server that runs the custom GoodRead application within the system.
+
+
+
+
+
+
+
+
+
+ This inventory item is an instance from the AwesomeCloud Awesome Compute Service (ACS) Service. It is a Linux server.
+
+
+
+
+
+
+
+
+
+
+
+
+ This inventory item is an instance from the AwesomeCloud Awesome Load Balancer (ALB) Service. It is a Linux server.
+
+
+
+
+
+
+
+
+
+
+
+ This is the control implementation for the application and infrastructure that compose to the IFA GoodRead Project's system.
+
+
+ individuals and roles with authorized access to security functions and security-relevant information are defined and not available to all users of the system;
+
+
+ security functions (deployed in hardware) for authorized access are defined;
+
+
+ security functions (deployed in soware) for authorized access are defined;
+
+
+ security functions (deployed in firmware) for authorized access are defined;
+
+
+ security-relevant information for authorized access is defined;
+
+
+
+
+ The IFA GoodRead application and infrastructure are composed as designed and implemented with lease privilege for the elements of this system.
+ For the IFA GoodRead application, the custom application is designed and implemented on top of the Django Framework to enforce least privilege. The application has a role for IFA Public Affairs Officers and one for the developers for privileged permissions, respectively. Only the latter can access or change administrative and security configurations and related data.
+ The Django Framework and Django REST Framework (DRF), by default, allows any user with the is_staff
role attribute to access administrative functions in an application using the framework. IFA GoodRead developers have disabled this behavior, relying on the custom roles identified in the relevant section.
+ For the IFA GoodRead database, the system account and accredentials for the application to read and write to the system datastore has specific read and write authorization for specific tables. This database service account does not have full administrative permissions to add, modify, or delete all respective tables. For the production environment, only the IFA GoodRead developer has a dedicated account with equivalent permissions. Only local network socket access, within in the Linux server, is permitted by host firewall configuration. Remote access, privileged or unprivileged, is not allowed remotely and the system engineer must locally authenticate for access.
+ For the RedHat Linux server upon which the IFA GoodRead application is deployed in this system, only the system engineer has a non-privileged user to log in remotely via the SSH protocol to perform ad-hoc inspection, monthly log review as required by policy and procedure, and emergency debugging of the system. Privileged system administration operations may only be performed with the sudo
subsystem which requires a password, two-factor authentication, and has enhanced logging of all commands executed. The system engineer must log in remotely and then use sudo
to elevate privileges. Remote access with the privileged account is prohibited by configuration and attempts are logged.
+ For this remote SSH access, least privilege is additionally enforced by allowing this access via a specific network zone in the IFA GoodRead AwesomeCloud account accessible to only the system engineer via IFA's VPN solution, which requires the system engineer use a dedicated account with their own password and two-factor authentication token.
+ For cloud account and API access to reconfigure the Linux server and its load balancer, administrative access is only allowed for the system engineer via a special AwesomeCloud IAM role. The authentication and authorization for this role is controlled by an integration with the organization's single sign-on solution. This solution will only be accessible and correctly execute for them when they are on the VPN with their account with traffic forwarded to the appropriate network zone in the IFA GoodRead account in AwesomeCloud. It will not work the developer or any staff users of the application.
+
+
+
+
+
+
\ No newline at end of file
diff --git a/src/examples/ssp/xml/oscal_leveraged-example_ssp.xml b/src/examples/ssp/xml/oscal_leveraged-example_ssp.xml
index 7b0b88c9..bf2aa596 100644
--- a/src/examples/ssp/xml/oscal_leveraged-example_ssp.xml
+++ b/src/examples/ssp/xml/oscal_leveraged-example_ssp.xml
@@ -1,30 +1,36 @@
-
- CSP IaaS System Security Plan
- 2023-10-12T00:00:00.000000-04:00
- 0.2
- 1.1.1
-
- Administrator
-
-
- External Customer
-
-
- Internal POC for Customers
-
-
-
-
-
- csp_iaas_system
- Leveraged IaaS System
-
- An example of three customers leveraging an authorized SaaS, which is running on an authorized IaaS.
-
+ uuid="d197545f-353f-407b-9166-ebf959774c5a">
+
+ CSP IaaS System Security Plan
+ 2024-02-01T13:57:28.355446-04:00
+ 0.3
+ 1.1.2
+
+ Administrator
+
+
+ External Customer
+
+
+ Internal POC for Customers
+
+
+
+ Leveraged Authorization POC
+
+
+
+
+
+
+ csp_iaas_system
+ Leveraged IaaS System
+
+ An example of three customers leveraging an authorized SaaS, which is running on an
+ authorized IaaS.
+
Cust-A Cust-B Cust-C
| | |
+---------+---------+
@@ -39,193 +45,226 @@ Cust-A Cust-B Cust-C
| this file |
+-------------------+
- In this example, the IaaS SSP specifies customer responsibilities for certain controls.
- The SaaS must address these for the control to be fully satisfied.
- The SaaS provider may either implement these directly or pass the responsibility on to their customers. Both may be necessary.
- For any given control, the Leveraged IaaS SSP must describe:
-
- HOW the IaaS is directly satisfying the control
- WHAT responsibilities are left for the Leveraging SaaS (or their customers) to implement.
-
- For any given control, the Leveraging SaaS SSP must describe:
-
- WHAT is being inherited from the underlying IaaS
- HOW the SaaS is directly satisfying the control.
- WHAT responsibilities are left for the SaaS customers to implement. (The SaaS customers are Cust-A, B and C)
-
-
- low
-
-
- System and Network Monitoring
+ In this example, the IaaS SSP specifies customer responsibilities for certain
+ controls.
+ The SaaS must address these for the control to be fully satisfied.
+ The SaaS provider may either implement these directly or pass the responsibility on
+ to their customers. Both may be necessary.
+ For any given control, the Leveraged IaaS SSP must describe:
+
+ HOW the IaaS is directly satisfying the control
+ WHAT responsibilities are left for the Leveraging SaaS (or their customers) to
+ implement.
+
+ For any given control, the Leveraging SaaS SSP must describe:
+
+ WHAT is being inherited from the underlying IaaS
+ HOW the SaaS is directly satisfying the control.
+ WHAT responsibilities are left for the SaaS customers to implement. (The SaaS
+ customers are Cust-A, B and C)
+
+
+ low
+
+
+ System and Network Monitoring
+
+ This IaaS system handles information pertaining to audit events.
+
+
+ C.3.5.8
+
+
+ fips-199-moderate
+ fips-199-low
+
+ This impact has been adjusted to low as an example of how to perform this
+ type of adjustment.
+
+
+
+ fips-199-moderate
+ fips-199-low
+
+ This impact has been adjusted to low as an example of how to perform this
+ type of adjustment.
+
+
+
+ fips-199-moderate
+ fips-199-low
+
+ This impact has been adjusted to low as an example of how to perform this
+ type of adjustment.
+
+
+
+
+
+ fips-199-low
+ fips-199-low
+ fips-199-low
+
+
+
- This IaaS system handles information pertaining to audit events.
+ The hardware and software supporting the virtualized infrastructure supporting
+ the IaaS.
-
- C.3.5.8
-
-
- fips-199-moderate
- fips-199-low
-
- This impact has been adjusted to low as an example of how to perform this type of adjustment.
-
-
-
- fips-199-moderate
- fips-199-low
-
- This impact has been adjusted to low as an example of how to perform this type of adjustment.
-
-
-
- fips-199-moderate
- fips-199-low
-
- This impact has been adjusted to low as an example of how to perform this type of adjustment.
-
-
-
-
-
- fips-199-low
- fips-199-low
- fips-199-low
-
-
-
-
- The hardware and software supporting the virtualized infrastructure supporting the IaaS.
-
-
-
- Most system-characteristics content does not support the example, and is included to meet the minimum SSP syntax requirements.
-
-
-
-
- admin
-
- Administrator
- Manages the components within the IaaS.
-
-
-
- This System
-
- The system described by this SSP.
- This text was auto-generated by the OSCAL M3-RC1 data upgrade converter.
-
-
-
-
- This System
-
- This Leveraged IaaS.
- The entire system as depicted in the system authorization boundary
-
-
-
-
- Application
-
- An application within the IaaS, exposed to SaaS customers and their downstream customers.
- This Leveraged IaaS maintains aspects of the application.
- The Leveraging SaaS maintains aspects of their assigned portion of the application.
- The customers of the Leveraging SaaS maintain aspects of their sub-assigned portions of the application.
-
-
-
-
- 11111111-0000-4000-9000-100000000001
-
-
-
-
-
-
- This is a collection of control responses.
-
-
-
- privileged and non-privileged
-
-
-
-
- Response for the "This System" component.
- Overall description of how "This System" satisfies AC-2, Part a.
- Response for the "This System" component.
- Overall description of how "This System" satisfies AC-2, Part a.
- Response for the "This System" component.
- Overall description of how "This System" satisfies AC-2, Part a.
- Response for the "This System" component.
- Overall description of how "This System" satisfies AC-2, Part a.
-
-
-
- Optional description about what is being exported.
-
-
-
- Leveraging system's responsibilities with respect to inheriting this capability.
- In the context of the application component in satisfaction of AC-2, part a.
-
-
-
-
-
-
-
- Describes how the application satisfies AC-2, Part a.
-
-
-
- Optional description about what is being exported.
-
-
-
- Consumer-appropriate description of what may be inherited.
- In the context of the application component in satisfaction of AC-2, part a.
-
-
-
-
-
- Leveraging system's responsibilities with respect to inheriting this capability.
- In the context of the application component in satisfaction of AC-2, part a.
-
-
-
-
-
+
+
+ Most system-characteristics content does not support the example, and is included to
+ meet the minimum SSP syntax requirements.
+
+
+
+
+ admin
+
+ Administrator
+ Manages the components within the IaaS.
+
+
+
+ This System
+
+ This Leveraged IaaS.
+ The entire system as depicted in the system authorization boundary
+
+
+
+
+ Application
+
+ An application within the IaaS, exposed to SaaS customers and their downstream
+ customers.
+ This Leveraged IaaS maintains aspects of the application.
+ The Leveraging SaaS maintains aspects of their assigned portion of the
+ application.
+ The customers of the Leveraging SaaS maintain aspects of their sub-assigned
+ portions of the application.
+
+
+
+
+ 11111111-0000-4000-9000-100000000001
+
+
+
+
+
+
+ This is a collection of control responses.
+
+
+
+ privileged and non-privileged
+
+
+
+
+ Response for the "This System" component.
+ Overall description of how "This System" satisfies AC-2, Part a.
+ Response for the "This System" component.
+ Overall description of how "This System" satisfies AC-2, Part a.
+ Response for the "This System" component.
+ Overall description of how "This System" satisfies AC-2, Part a.
+ Response for the "This System" component.
+ Overall description of how "This System" satisfies AC-2, Part a.
+
+
+
+ Optional description about what is being exported.
+
+
+
+ Consumer-appropriate description of what a leveraging system may
+ inherite from THIS SYSTEM in the context of satisfying
+ satisfaction of AC-2, part a.
+
+
+ 11111111-0000-4000-9000-100000000001
+
+
+
+
+ Leveraging system's responsibilities with respect to inheriting
+ this capability.
+ In the context of the application component in satisfaction of
+ AC-2, part a.
+
+
+ 11111111-0000-4000-9000-100000000002
+
+
+
+
+
+
+ Describes how the application satisfies AC-2, Part a.
+
+
+
+ Optional description about what is being exported.
+
+
+
+ Consumer-appropriate description of what may be inherited.
+ In the context of the application component in satisfaction of
+ AC-2, part a.
+
+
+ 11111111-0000-4000-9000-100000000001
+
+
+
+
+ Leveraging system's responsibilities with respect to inheriting
+ this capability.
+ In the context of the application component in satisfaction of
+ AC-2, part a.
+
+
+ 11111111-0000-4000-9000-100000000002
+
+
+
+
+
+ a. Identifies and selects the following types of information system accounts
+ to support organizational missions/business functions: [Assignment:
+ privileged and non-privileged];
+
+
- a. Identifies and selects the following types of information system accounts to support organizational missions/business functions: [Assignment: privileged and non-privileged];
+ The organization:
+ a. Identifies and selects the following types of information system accounts to
+ support organizational missions/business functions: [Assignment:
+ organization-defined information system account types];
+ b. Assigns account managers for information system accounts;
+ c. Establishes conditions for group and role membership;
+ d. through j. omitted
-
-
- The organization:
- a. Identifies and selects the following types of information system accounts to support organizational missions/business functions: [Assignment: organization-defined information system account types];
- b. Assigns account managers for information system accounts;
- c. Establishes conditions for group and role membership;
- d. through j. omitted
-
-
-
-
-
-
-
-
-
- NIST Special Publication 800-53 Revision 4: Low Baseline Profile
-
-
-
-
-
-
-
+
+
+
+
+
+
+
+
+ NIST Special Publication 800-53 Revision 4: Low Baseline Profile
+
+
+
+
+
+
+
\ No newline at end of file
diff --git a/src/examples/ssp/xml/oscal_leveraging-example_ssp.xml b/src/examples/ssp/xml/oscal_leveraging-example_ssp.xml
index e5b062ea..36fd5b69 100644
--- a/src/examples/ssp/xml/oscal_leveraging-example_ssp.xml
+++ b/src/examples/ssp/xml/oscal_leveraging-example_ssp.xml
@@ -1,28 +1,33 @@
+ uuid="bb9219b1-e51c-4680-abb0-616a43bbfbb1">
Leveraging SaaS System Security Plan
- 2023-10-12T00:00:00.000000-04:00
- 0.2
- 1.1.1
+ 2024-02-01T13:57:28.355446-04:00
+ 0.3
+ 1.1.2
Administrator
-
-
+
- Leveraged Authorization POC
+ Leveraging SaaS' Admin
+
+
+
+
+ Leveraged Authorization (IaaS) POC
-
+
saas_system_iaas_customer
Leveraging SaaS System
- An example of three customers leveraging an authorized SaaS, which is running on an authorized IaaS.
+ An example of three customers leveraging an authorized SaaS, which is running on an
+ authorized IaaS.
Cust-A Cust-B Cust-C
| | |
@@ -38,24 +43,28 @@ Cust-A Cust-B Cust-C
| Leveraged IaaS |
+-------------------+
- In this example, the IaaS SSP specifies customer responsibilities for certain controls.
- The SaaS must address these for the control to be fully satisfied.
- The SaaS provider may either implement these directly or pass the responsibility on to their customers. Both may be necessary.
+ In this example, the IaaS SSP (the leveraged SSP) specifies what IaaS provides and the
+ customer's responsibilities for certain controls.
+ The SaaS must address these responsibilities for the control to be fully satisfied.
+ The SaaS provider may either implement these directly or pass the responsibility on to
+ their customers. Both may be necessary.
For any given control, the Leveraged IaaS SSP must describe:
HOW the IaaS is directly satisfying the control
- WHAT responsibilities are left for the Leveraging SaaS (or their customers) to implement.
+ WHAT responsibilities are left for the Leveraging SaaS (or their customers) to
+ implement.
For any given control, the Leveraging SaaS SSP must describe:
WHAT is being inherited from the underlying IaaS
HOW the SaaS is directly satisfying the control.
- WHAT responsibilities are left for the SaaS customers to implement. (The SaaS customers are Cust-A, B and C)
+ WHAT responsibilities are left for the SaaS' customers to implement. (The SaaS
+ customers are Cust-A, B and C)
low
-
+
System and Network Monitoring
This system handles information pertaining to audit events.
@@ -67,21 +76,24 @@ Cust-A Cust-B Cust-C
fips-199-moderate
fips-199-low
- This impact has been adjusted to low as an example of how to perform this type of adjustment.
+ This impact has been adjusted to low as an example of how to perform this type
+ of adjustment.
fips-199-moderate
fips-199-low
- This impact has been adjusted to low as an example of how to perform this type of adjustment.
+ This impact has been adjusted to low as an example of how to perform this type
+ of adjustment.
fips-199-moderate
fips-199-low
- This impact has been adjusted to low as an example of how to perform this type of adjustment.
+ This impact has been adjusted to low as an example of how to perform this type
+ of adjustment.
@@ -91,21 +103,22 @@ Cust-A Cust-B Cust-C
fips-199-low
fips-199-low
-
+
The virtualized components deployed on the CSP IaaS.
- Most system-characteristics content does not support the example, and is included to meet the minimum SSP syntax requirements.
+ Most system-characteristics content does not support the example, and is included to
+ meet the minimum SSP syntax requirements.
CSP IaaS [Leveraged System]
-
- 22222222-0000-4000-9000-100000000002
+
+ 11111111-0000-4000-9000-100000000001
2018-01-01
@@ -115,14 +128,6 @@ Cust-A Cust-B Cust-C
Manages the components within the SaaS.
-
- This System
-
- The system described by this SSP.
- This text was auto-generated by the OSCAL M3-RC1 data upgrade converter.
-
-
-
THIS SYSTEM (SaaS)
@@ -131,41 +136,41 @@ Cust-A Cust-B Cust-C
This Leveraging SaaS.
The entire system as depicted in the system authorization boundary
-
-
+
LEVERAGED SYSTEM (IaaS)
- If the leveraged system owner provides a UUID for their system (such as in an OSCAL-based CRM), it should be used as the UUID for this component.
+ If the leveraged system owner provides a UUID for their system (such as in an
+ OSCAL-based CRM), it should be used as the UUID for this component.
-
+
-
-
+ value="22222222-0000-4000-9000-300000000001" />
+
+
Access Control Appliance
An access control virtual appliance, wich performs XYZ functions.
-
-
-
+
+
+
- Leveraged Application
+ LEVERAGED APPLICATION
Inherited from underlying IaaS.
-
+
-
-
+ value="22222222-0000-4000-9000-300000000001" />
+
+
@@ -179,7 +184,7 @@ Cust-A Cust-B Cust-C
+ component-uuid="22222222-0000-4000-9001-000000000001">
Response for the "This System" component.
Overall description of how "This System" satisfies AC-2, Part a.
@@ -190,32 +195,38 @@ Cust-A Cust-B Cust-C
Response for the "This System" component.
Overall description of how "This System" satisfies AC-2, Part a.
-
+
+ 22222222-0000-4000-9000-100000000001
+
+ component-uuid="22222222-0000-4000-9001-000000000002">
Describe how this internal virtual appliance satisfies AC-2, Part a.
+ responsibility-uuid="11111111-0000-4000-9009-002001001001">
- Description that directly addresses how the consumer responsibility was satisfied.
+ Description that directly addresses how the consumer responsibility was
+ satisfied.
-
+
+ 22222222-0000-4000-9000-100000000001
+
+ component-uuid="22222222-0000-4000-9001-000000000003">
- duplicated/tailored description of what was inherited, and description of what was configured.
+ duplicated/tailored description of what was inherited, and description of
+ what was configured.
Consumer-appropriate description of what may be inherited.
In the context of the application component in satisfaction of AC-2, part a.
+ provided-uuid="11111111-0000-4000-9009-002001002001">
Optional description.
@@ -226,19 +237,23 @@ Cust-A Cust-B Cust-C
+ responsibility-uuid="11111111-0000-4000-9009-002001002002">
Description of how the responsibility was satisfied.
- a. Identifies and selects the following types of information system accounts to support organizational missions/business functions: [Assignment: privileged and non-privileged];
+ a. Identifies and selects the following types of information system accounts to
+ support organizational missions/business functions: [Assignment: privileged and
+ non-privileged];
The organization:
- a. Identifies and selects the following types of information system accounts to support organizational missions/business functions: [Assignment: organization-defined information system account types];
+ a. Identifies and selects the following types of information system accounts to
+ support organizational missions/business functions: [Assignment: organization-defined
+ information system account types];
b. Assigns account managers for information system accounts;
c. Establishes conditions for group and role membership;
Omitted: d. through j.
@@ -247,23 +262,29 @@ Cust-A Cust-B Cust-C
-
+
NIST Special Publication 800-53 Revision 4: Low Baseline Profile
-
-
-
+
+
+
Leveraged System Security Plan in OSCAL Data Formats
-
-
-
-
+
+
+
+
-
+
\ No newline at end of file
diff --git a/src/examples/ssp/xml/ssp-example.xml b/src/examples/ssp/xml/ssp-example.xml
index 5f563089..ba077838 100644
--- a/src/examples/ssp/xml/ssp-example.xml
+++ b/src/examples/ssp/xml/ssp-example.xml
@@ -4,12 +4,24 @@
uuid="cff8385f-108e-40a5-8f7a-82f3dc0eaba8">
Enterprise Logging and Auditing System Security Plan
- 2023-10-12T00:00:00.000000-04:00
+ 2024-02-01T13:57:28.355446-04:00
1.1
- 1.1.1
+ 1.1.2
Legal Officer
+
+ System Maintainer
+
+
+ System Assets Owner
+
+
+ System Provider
+
+
+ System Assets Admin
+
Enterprise Asset Owners
@@ -34,8 +46,8 @@
This is an example of a system that provides enterprise logging and log auditing
capabilities.
-
-
+
+
moderate
@@ -80,6 +92,11 @@
asset-administrator
+
+ System Maintainer
+
+ maintainer
+
Audit Team
@@ -90,6 +107,18 @@
legal-officer
+
+ Provider
+
+ provider
+
+
+ This System
+
+ The system described by this SSP.
+
+
+
Logging Server
@@ -124,7 +153,7 @@
-
+
ec485dcf-2519-43f5-8e7d-014cc315332d
@@ -136,7 +165,7 @@
Ensures proper integration into the enterprise as new systems are brought into
production.
-
+
Ensures logs from components in new system are able to published to the
logging server. Ensures log monitoring capabilities recognize new system as
@@ -154,7 +183,7 @@
teams know about every asset that should be producing logs, thus should be
monitored.
-
+
Ensures that all host are known and authorized. Ensures that these hosts
publish log events to the logging server.
@@ -171,7 +200,7 @@
Splunk in the appropriate format. Also describes how to configure time
synchronization.
-
+
Ensures that all host are configured to publish log events to the logging
server.
@@ -192,8 +221,13 @@
3b2a5599-cc37-403f-ae36-5708fa804b27
-
-
+
+
+
+
+
+
+
This is a partial implementation that addresses the logging server portion of the
diff --git a/src/nist.gov/SP800-53/rev5/xml/NIST_SP-800-53_rev5_HIGH-baseline_profile.xml b/src/nist.gov/SP800-53/rev5/xml/NIST_SP-800-53_rev5_HIGH-baseline_profile.xml
index 66731c2b..d7c49ec8 100644
--- a/src/nist.gov/SP800-53/rev5/xml/NIST_SP-800-53_rev5_HIGH-baseline_profile.xml
+++ b/src/nist.gov/SP800-53/rev5/xml/NIST_SP-800-53_rev5_HIGH-baseline_profile.xml
@@ -1,12 +1,12 @@
+ uuid="ad6ca352-8b0e-40e7-b6e2-279706ef5456">
NIST Special Publication 800-53 Revision 5.1.1 HIGH IMPACT BASELINE
- 2023-12-04T14:55:00.000000-04:00
- 5.1.1+u2
- 1.1.1
+ 2024-02-04T23:16:00.000000-00:00
+ 5.1.1+u4
+ 1.1.2
Document Creator
diff --git a/src/nist.gov/SP800-53/rev5/xml/NIST_SP-800-53_rev5_LOW-baseline_profile.xml b/src/nist.gov/SP800-53/rev5/xml/NIST_SP-800-53_rev5_LOW-baseline_profile.xml
index 7d4167c9..f5660cbb 100644
--- a/src/nist.gov/SP800-53/rev5/xml/NIST_SP-800-53_rev5_LOW-baseline_profile.xml
+++ b/src/nist.gov/SP800-53/rev5/xml/NIST_SP-800-53_rev5_LOW-baseline_profile.xml
@@ -1,12 +1,12 @@
+ uuid="7eca4589-7ed9-4552-9da6-738126660be3">
NIST Special Publication 800-53 Revision 5.1.1 LOW IMPACT BASELINE
- 2023-12-04T14:55:00.000000-04:00
- 5.1.1+u2
- 1.1.1
+ 2024-02-04T23:16:00.000000-00:00
+ 5.1.1+u4
+ 1.1.2
Document Creator
diff --git a/src/nist.gov/SP800-53/rev5/xml/NIST_SP-800-53_rev5_MODERATE-baseline_profile.xml b/src/nist.gov/SP800-53/rev5/xml/NIST_SP-800-53_rev5_MODERATE-baseline_profile.xml
index f6bad1b7..8eed6da5 100644
--- a/src/nist.gov/SP800-53/rev5/xml/NIST_SP-800-53_rev5_MODERATE-baseline_profile.xml
+++ b/src/nist.gov/SP800-53/rev5/xml/NIST_SP-800-53_rev5_MODERATE-baseline_profile.xml
@@ -1,12 +1,12 @@
+ uuid="f4faee53-d96f-4fdb-b491-4a1a79066b9b">
NIST Special Publication 800-53 Revision 5.1.1 MODERATE IMPACT BASELINE
- 2023-12-04T14:55:00.000000-04:00
- 5.1.1+u2
- 1.1.1
+ 2024-02-04T23:16:00.000000-00:00
+ 5.1.1+u4
+ 1.1.2
Document Creator
diff --git a/src/nist.gov/SP800-53/rev5/xml/NIST_SP-800-53_rev5_PRIVACY-baseline_profile.xml b/src/nist.gov/SP800-53/rev5/xml/NIST_SP-800-53_rev5_PRIVACY-baseline_profile.xml
index 91636b8c..988dc3b2 100644
--- a/src/nist.gov/SP800-53/rev5/xml/NIST_SP-800-53_rev5_PRIVACY-baseline_profile.xml
+++ b/src/nist.gov/SP800-53/rev5/xml/NIST_SP-800-53_rev5_PRIVACY-baseline_profile.xml
@@ -1,12 +1,12 @@
+ uuid="6a917bb8-b705-4b60-bcf9-6f10bdf24d3b">
NIST Special Publication 800-53 Revision 5.1.1 PRIVACY BASELINE
2023-12-04T14:55:00.000000-04:00
- 5.1.1+u2
- 1.1.1
+ 5.1.1+u4
+ 1.1.2
Document Creator
diff --git a/src/nist.gov/SP800-53/rev5/xml/NIST_SP-800-53_rev5_catalog.xml b/src/nist.gov/SP800-53/rev5/xml/NIST_SP-800-53_rev5_catalog.xml
index ccb5271c..9d7d849d 100644
--- a/src/nist.gov/SP800-53/rev5/xml/NIST_SP-800-53_rev5_catalog.xml
+++ b/src/nist.gov/SP800-53/rev5/xml/NIST_SP-800-53_rev5_catalog.xml
@@ -1,11 +1,9 @@
-
-
-
+
Electronic Version of NIST SP 800-53 Rev 5.1.1 Controls and SP 800-53A Rev 5.1.1 Assessment Procedures
- 2023-12-13T20:16:00.000000-00:00
- 5.1.1+u3
- 1.1.1
+ 2024-02-04T23:16:00.000000-00:00
+ 5.1.1+u4
+ 1.1.2
Electronic Version of NIST SP 800-53 Rev 5 Controls and SP 800-53A Rev 5 Assessment Procedures
@@ -14,7 +12,7 @@
1.1.1
- This revison of the SP 800-53 Revision 5 Catalog includes metadata and tagging reflecting richer control semantics, such as organizational vs system-level controls as indicated in SP800-53 Rev 5.1 Appendix C, and minor bug fixes in its content.
+ This OSCAL version of the SP 800-53 Revision 5.1.1 catalog restores the non-padded prop/@name="label" for all controls, for backwards compatibility and adds prop/@name="label" with class="zero-padded" to support and encourage users' transission to zero-padded control IDs. This SP 800-53 Revision 5.1.1 catalog preserves all content changes of the previous 5.1.1+u3 release: one new control (IA-13), three control enhancements, minor grammatical edits/clarifications that do not impact the implementation or outcome of the controls and introduces “leading 0s” to the control identifiers.
@@ -37,6 +35,16 @@
This revision of the OSCAL representation of the NIST SP 800-53 Revision 5.1.1 published on November, 7, 2023, provides enhancements to data representation per community's suggestions.
+
+ Electronic Version of NIST SP 800-53 Rev 5.1.1 Controls and SP 800-53A Rev 5.1.1 Assessment Procedures
+ 2023-12-13T20:16:00.000000-00:00
+ 5.1.1+u3
+ 1.1.1
+
+
+ This revision of the OSCAL representation of the NIST SP 800-53 Revision 5.1.1 published on November, 7, 2023, provides enhancements to data representation per community's suggestions.
+
+
@@ -78,14 +86,14 @@
organization-defined personnel or roles
-
+
personnel or roles
personnel or roles to whom the access control policy is to be disseminated is/are defined;
-
+
personnel or roles
personnel or roles to whom the access control procedures are to be disseminated is/are defined;
@@ -93,7 +101,7 @@
-
+
organization-level
mission/business process-level
@@ -102,7 +110,7 @@
-
+
official
an official to manage the access control policy and procedures is defined;
@@ -110,7 +118,7 @@
-
+
frequency
the frequency at which the current access control policy is reviewed and updated is defined;
@@ -118,7 +126,7 @@
-
+
events
events that would require the current access control policy to be reviewed and updated are defined;
@@ -126,7 +134,7 @@
-
+
frequency
the frequency at which the current access control procedures are reviewed and updated is defined;
@@ -134,14 +142,15 @@
-
+
events
events that would require procedures to be reviewed and updated are defined;
-
-
+
+
+
@@ -198,72 +207,72 @@
Access control policy and procedures address the controls in the AC family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of access control policy and procedures. Security and privacy program policies and procedures at the organization level are preferable, in general, and may obviate the need for mission- or system-specific policies and procedures. The policy can be included as part of the general security and privacy policy or be represented by multiple policies reflecting the complex nature of organizations. Procedures can be established for security and privacy programs, for mission or business processes, and for systems, if needed. Procedures describe how the policies or controls are implemented and can be directed at the individual or role that is the object of the procedure. Procedures can be documented in system security and privacy plans or in one or more separate documents. Events that may precipitate an update to access control policy and procedures include assessment or audit findings, security incidents or breaches, or changes in laws, executive orders, directives, regulations, policies, standards, and guidelines. Simply restating controls does not constitute an organizational policy or procedure.
-
+
-
+
-
+
an access control policy is developed and documented;
-
+
the access control policy is disseminated to ;
-
+
access control procedures to facilitate the implementation of the access control policy and associated controls are developed and documented;
-
+
the access control procedures are disseminated to ;
-
+
-
+
-
+
the access control policy addresses purpose;
-
+
the access control policy addresses scope;
-
+
the access control policy addresses roles;
-
+
the access control policy addresses responsibilities;
-
+
the access control policy addresses management commitment;
-
+
the access control policy addresses coordination among organizational entities;
-
+
the access control policy addresses compliance;
-
+
the access control policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;
@@ -272,35 +281,35 @@
-
+
the is designated to manage the development, documentation, and dissemination of the access control policy and procedures;
-
+
-
+
-
+
the current access control policy is reviewed and updated ;
-
+
the current access control policy is reviewed and updated following ;
-
+
-
+
the current access control procedures are reviewed and updated ;
-
+
the current access control procedures are reviewed and updated following .
@@ -312,7 +321,7 @@
-
+
Access control policy and procedures
system security plan
@@ -322,7 +331,7 @@
-
+
Organizational personnel with access control responsibilities
organizational personnel with information security with information security and privacy responsibilities
@@ -333,7 +342,7 @@
Account Management
-
+
prerequisites and criteria
prerequisites and criteria for group and role membership are defined;
@@ -341,7 +350,7 @@
-
+
attributes (as required)
attributes (as required) for each account are defined;
@@ -349,7 +358,7 @@
-
+
personnel or roles
personnel or roles required to approve requests to create accounts is/are defined;
@@ -357,7 +366,7 @@
-
+
policy, procedures, prerequisites, and criteria
policy, procedures, prerequisites, and criteria for account creation, enabling, modification, disabling, and removal are defined;
@@ -365,7 +374,7 @@
-
+
personnel or roles
personnel or roles to be notified is/are defined;
@@ -373,7 +382,7 @@
-
+
time period
time period within which to notify account managers when accounts are no longer required is defined;
@@ -381,7 +390,7 @@
-
+
time period
time period within which to notify account managers when users are terminated or transferred is defined;
@@ -389,7 +398,7 @@
-
+
time period
time period within which to notify account managers when system usage or the need to know changes for an individual is defined;
@@ -397,7 +406,7 @@
-
+
attributes (as required)
attributes needed to authorize system access (as required) are defined;
@@ -405,14 +414,15 @@
-
+
frequency
the frequency of account review is defined;
-
-
+
+
+
@@ -538,52 +548,52 @@
Temporary and emergency accounts are intended for short-term use. Organizations establish temporary accounts as part of normal account activation procedures when there is a need for short-term accounts without the demand for immediacy in account activation. Organizations establish emergency accounts in response to crisis situations and with the need for rapid account activation. Therefore, emergency account activation may bypass normal account authorization processes. Emergency and temporary accounts are not to be confused with infrequently used accounts, including local logon accounts used for special tasks or when network resources are unavailable (may also be known as accounts of last resort). Such accounts remain available and are not subject to automatic disabling or removal dates. Conditions for disabling or deactivating accounts include when shared/group, emergency, or temporary accounts are no longer required and when individuals are transferred or terminated. Changing shared/group authenticators when members leave the group is intended to ensure that former group members do not retain access to the shared or group account. Some types of system accounts may require specialized training.
-
+
-
+
-
+
account types allowed for use within the system are defined and documented;
-
+
account types specifically prohibited for use within the system are defined and documented;
-
+
account managers are assigned;
-
+
for group and role membership are required;
-
+
-
+
authorized users of the system are specified;
-
+
group and role membership are specified;
-
+
-
+
access authorizations (i.e., privileges) are specified for each account;
-
+
are specified for each account;
@@ -592,110 +602,110 @@
-
+
approvals are required by for requests to create accounts;
-
+
-
+
accounts are created in accordance with ;
-
+
accounts are enabled in accordance with ;
-
+
accounts are modified in accordance with ;
-
+
accounts are disabled in accordance with ;
-
+
accounts are removed in accordance with ;
-
+
the use of accounts is monitored;
-
+
-
+
account managers and are notified within when accounts are no longer required;
-
+
account managers and are notified within when users are terminated or transferred;
-
+
account managers and are notified within when system usage or the need to know changes for an individual;
-
+
-
+
access to the system is authorized based on a valid access authorization;
-
+
access to the system is authorized based on intended system usage;
-
+
access to the system is authorized based on ;
-
+
accounts are reviewed for compliance with account management requirements ;
-
+
-
+
a process is established for changing shared or group account authenticators (if deployed) when individuals are removed from the group;
-
+
a process is implemented for changing shared or group account authenticators (if deployed) when individuals are removed from the group;
-
+
-
+
account management processes are aligned with personnel termination processes;
-
+
account management processes are aligned with personnel transfer processes.
@@ -705,7 +715,7 @@
-
+
Access control policy
personnel termination policy and procedure
@@ -728,7 +738,7 @@
-
+
Organizational personnel with account management responsibilities
system/network administrators
@@ -737,7 +747,7 @@
-
+
Organizational processes for account management on the system
mechanisms for implementing account management
@@ -747,14 +757,15 @@
Automated System Account Management
-
+
automated mechanisms
automated mechanisms used to support the management of system accounts are defined;
-
-
+
+
+
@@ -765,13 +776,13 @@
Automated system account management includes using automated mechanisms to create, enable, modify, disable, and remove accounts; notify account managers when an account is created, enabled, modified, disabled, or removed, or when users are terminated or transferred; monitor system account usage; and report atypical system account usage. Automated mechanisms can include internal system functions and email, telephonic, and text messaging notifications.
-
+
the management of system accounts is supported using .
-
+
Access control policy
procedures for addressing account management
@@ -784,7 +795,7 @@
-
+
Organizational personnel with account management responsibilities
system/network administrators
@@ -794,7 +805,7 @@
-
+
Automated mechanisms for implementing account management functions
@@ -804,7 +815,7 @@
Automated Temporary and Emergency Account Management
-
+
remove
disable
@@ -813,14 +824,15 @@
-
+
time period
the time period after which to automatically remove or disable temporary or emergency accounts is defined;
-
-
+
+
+
@@ -831,13 +843,13 @@
Management of temporary and emergency accounts includes the removal or disabling of such accounts automatically after a predefined time period rather than at the convenience of the system administrator. Automatic removal or disabling of accounts provides a more consistent implementation.
-
+
temporary and emergency accounts are automatically after .
-
+
Access control policy
procedures for addressing account management
@@ -852,7 +864,7 @@
-
+
Organizational personnel with account management responsibilities
system/network administrators
@@ -862,7 +874,7 @@
-
+
Automated mechanisms for implementing account management functions
@@ -872,7 +884,7 @@
Disable Accounts
-
+
time period
time period within which to disable accounts is defined;
@@ -880,14 +892,15 @@
-
+
time period
time period for account inactivity before disabling is defined;
-
-
+
+
+
@@ -914,24 +927,24 @@
Disabling expired, inactive, or otherwise anomalous accounts supports the concepts of least privilege and least functionality which reduce the attack surface of the system.
-
+
-
+
accounts are disabled within when the accounts have expired;
-
+
accounts are disabled within when the accounts are no longer associated with a user or individual;
-
+
accounts are disabled within when the accounts are in violation of organizational policy;
-
+
accounts are disabled within when the accounts have been inactive for .
@@ -939,7 +952,7 @@
-
+
Access control policy
procedures for addressing account management
@@ -955,7 +968,7 @@
-
+
Organizational personnel with account management responsibilities
system/network administrators
@@ -965,7 +978,7 @@
-
+
Mechanisms for implementing account management functions
@@ -973,8 +986,9 @@
Automated Audit Actions
-
-
+
+
+
@@ -987,29 +1001,29 @@
Account management audit records are defined in accordance with AU-02 and reviewed, analyzed, and reported in accordance with AU-06 .
-
+
-
+
account creation is automatically audited;
-
+
account modification is automatically audited;
-
+
account enabling is automatically audited;
-
+
account disabling is automatically audited;
-
+
account removal actions are automatically audited.
@@ -1017,7 +1031,7 @@
-
+
Access control policy
procedures addressing account management
@@ -1031,7 +1045,7 @@
-
+
Organizational personnel with account management responsibilities
system/network administrators
@@ -1040,7 +1054,7 @@
-
+
Automated mechanisms implementing account management functions
@@ -1050,14 +1064,15 @@
Inactivity Logout
-
+
time period of expected inactivity or description of when to log out
the time period of expected inactivity or description of when to log out is defined;
-
-
+
+
+
@@ -1070,13 +1085,13 @@
Inactivity logout is behavior- or policy-based and requires users to take physical action to log out when they are expecting inactivity longer than the defined period. Automatic enforcement of inactivity logout is addressed by AC-11 .
-
+
users are required to log out when .
-
+
Access control policy
procedures addressing account management
@@ -1090,7 +1105,7 @@
-
+
Organizational personnel with account management responsibilities
system/network administrators
@@ -1103,14 +1118,15 @@
Dynamic Privilege Management
-
+
dynamic privilege management capabilities
dynamic privilege management capabilities are defined;
-
-
+
+
+
@@ -1122,13 +1138,13 @@
In contrast to access control approaches that employ static accounts and predefined user privileges, dynamic access control approaches rely on runtime access control decisions facilitated by dynamic privilege management, such as attribute-based access control. While user identities remain relatively constant over time, user privileges typically change more frequently based on ongoing mission or business requirements and the operational needs of organizations. An example of dynamic privilege management is the immediate revocation of privileges from users as opposed to requiring that users terminate and restart their sessions to reflect changes in privileges. Dynamic privilege management can also include mechanisms that change user privileges based on dynamic rules as opposed to editing specific user profiles. Examples include automatic adjustments of user privileges if they are operating out of their normal work times, if their job function or assignment changes, or if systems are under duress or in emergency situations. Dynamic privilege management includes the effects of privilege changes, for example, when there are changes to encryption keys used for communications.
-
+
are implemented.
-
+
Access control policy
procedures addressing account management
@@ -1142,7 +1158,7 @@
-
+
Organizational personnel with account management responsibilities
system/network administrators
@@ -1152,7 +1168,7 @@
-
+
system or mechanisms implementing dynamic privilege management capabilities
@@ -1162,14 +1178,15 @@
Privileged User Accounts
-
+
a role-based access scheme
an attribute-based access scheme
-
-
+
+
+
@@ -1195,24 +1212,24 @@
Privileged roles are organization-defined roles assigned to individuals that allow those individuals to perform certain security-relevant functions that ordinary users are not authorized to perform. Privileged roles include key management, account management, database administration, system and network administration, and web administration. A role-based access scheme organizes permitted system access and privileges into roles. In contrast, an attribute-based access scheme specifies allowed system access and privileges based on attributes.
-
+
-
+
privileged user accounts are established and administered in accordance with ;
-
+
privileged role or attribute assignments are monitored;
-
+
changes to roles or attributes are monitored;
-
+
access is revoked when privileged role or attribute assignments are no longer appropriate.
@@ -1220,7 +1237,7 @@
-
+
Access control policy
procedures addressing account management
@@ -1237,7 +1254,7 @@
-
+
Organizational personnel with account management responsibilities
system/network administrators
@@ -1246,7 +1263,7 @@
-
+
Mechanisms implementing account management functions
mechanisms monitoring privileged role assignments
@@ -1257,14 +1274,15 @@
Dynamic Account Management
-
+
system accounts
system accounts that are dynamically created, activated, managed, and deactivated are defined;
-
-
+
+
+
@@ -1276,24 +1294,24 @@
Approaches for dynamically creating, activating, managing, and deactivating system accounts rely on automatically provisioning the accounts at runtime for entities that were previously unknown. Organizations plan for the dynamic management, creation, activation, and deactivation of system accounts by establishing trust relationships, business rules, and mechanisms with appropriate authorities to validate related authorizations and privileges.
-
+
-
+
are created dynamically;
-
+
are activated dynamically;
-
+
are managed dynamically;
-
+
are deactivated dynamically.
@@ -1301,7 +1319,7 @@
-
+
Access control policy
procedures addressing account management
@@ -1315,7 +1333,7 @@
-
+
Organizational personnel with account management responsibilities
system/network administrators
@@ -1325,7 +1343,7 @@
-
+
Automated mechanisms implementing account management functions
@@ -1336,14 +1354,15 @@
-
+
conditions
conditions for establishing shared and group accounts are defined;
-
-
+
+
+
@@ -1354,13 +1373,13 @@
Before permitting the use of shared or group accounts, organizations consider the increased risk due to the lack of accountability with such accounts.
-
+
the use of shared and group accounts is only permitted if are met.
-
+
Access control policy
procedures addressing account management
@@ -1374,7 +1393,7 @@
-
+
Organizational personnel with account management responsibilities
system/network administrators
@@ -1383,7 +1402,7 @@
-
+
Mechanisms implementing management of shared/group accounts
@@ -1391,8 +1410,9 @@
Shared and Group Account Credential Change
-
-
+
+
+
@@ -1401,7 +1421,7 @@
Usage Conditions
-
+
circumstances and/or usage conditions
circumstances and/or usage conditions to be enforced for system accounts are defined;
@@ -1409,14 +1429,15 @@
-
+
system accounts
system accounts subject to enforcement of circumstances and/or usage conditions are defined;
-
-
+
+
+
@@ -1427,13 +1448,13 @@
Specifying and enforcing usage conditions helps to enforce the principle of least privilege, increase user accountability, and enable effective account monitoring. Account monitoring includes alerts generated if the account is used in violation of organizational parameters. Organizations can describe specific conditions or circumstances under which system accounts can be used, such as by restricting usage to certain days of the week, time of day, or specific durations of time.
-
+
for are enforced.
-
+
Access control policy
procedures addressing account management
@@ -1447,7 +1468,7 @@
-
+
Organizational personnel with account management responsibilities
system/network administrators
@@ -1457,7 +1478,7 @@
-
+
Mechanisms implementing account management functions
@@ -1467,7 +1488,7 @@
Account Monitoring for Atypical Usage
-
+
atypical usage
atypical usage for which to monitor system accounts is defined;
@@ -1475,14 +1496,15 @@
-
+
personnel or roles
personnel or roles to report atypical usage is/are defined;
-
-
+
+
+
@@ -1506,14 +1528,14 @@
Atypical usage includes accessing systems at certain times of the day or from locations that are not consistent with the normal usage patterns of individuals. Monitoring for atypical usage may reveal rogue behavior by individuals or an attack in progress. Account monitoring may inadvertently create privacy risks since data collected to identify atypical usage may reveal previously unknown information about the behavior of individuals. Organizations assess and document privacy risks from monitoring accounts for atypical usage in their privacy impact assessment and make determinations that are in alignment with their privacy program plan.
-
+
-
+
system accounts are monitored for ;
-
+
atypical usage of system accounts is reported to .
@@ -1521,7 +1543,7 @@
-
+
Access control policy
procedures addressing account management
@@ -1538,7 +1560,7 @@
-
+
Organizational personnel with account management responsibilities
system/network administrators
@@ -1547,7 +1569,7 @@
-
+
Mechanisms implementing account management functions
@@ -1557,7 +1579,7 @@
Disable Accounts for High-risk Individuals
-
+
time period
time period within which to disable accounts of individuals who are discovered to pose significant risk is defined;
@@ -1565,14 +1587,15 @@
-
+
significant risks
significant risks leading to disabling accounts are defined;
-
-
+
+
+
@@ -1585,13 +1608,13 @@
Users who pose a significant security and/or privacy risk include individuals for whom reliable evidence indicates either the intention to use authorized access to systems to cause harm or through whom adversaries will cause harm. Such harm includes adverse impacts to organizational operations, organizational assets, individuals, other organizations, or the Nation. Close coordination among system administrators, legal staff, human resource managers, and authorizing officials is essential when disabling system accounts for high-risk individuals.
-
+
accounts of individuals are disabled within of discovery of .
-
+
Access control policy
procedures addressing account management
@@ -1606,7 +1629,7 @@
-
+
Organizational personnel with account management responsibilities
system/network administrators
@@ -1615,7 +1638,7 @@
-
+
Mechanisms implementing account management functions
@@ -1624,8 +1647,9 @@
Access Enforcement
-
-
+
+
+
@@ -1687,13 +1711,13 @@
Access control policies control access between active entities or subjects (i.e., users or processes acting on behalf of users) and passive entities or objects (i.e., devices, files, records, domains) in organizational systems. In addition to enforcing authorized access at the system level and recognizing that systems can host many applications and services in support of mission and business functions, access enforcement mechanisms can also be employed at the application and service level to provide increased information security and privacy. In contrast to logical access controls that are implemented within the system, physical access controls are addressed by the controls in the Physical and Environmental Protection ( PE ) family.
-
+
approved authorizations for logical access to information and system resources are enforced in accordance with applicable access control policies.
-
+
Access control policy
procedures addressing access enforcement
@@ -1708,7 +1732,7 @@
-
+
Organizational personnel with access enforcement responsibilities
system/network administrators
@@ -1718,15 +1742,16 @@
-
+
Mechanisms implementing access control policy
Restricted Access to Privileged Functions
-
-
+
+
+
@@ -1736,14 +1761,15 @@
-
+
privileged commands and/or other actions
privileged commands and/or other actions requiring dual authorization are defined;
-
-
+
+
+
@@ -1756,13 +1782,13 @@
Dual authorization, also known as two-person control, reduces risk related to insider threats. Dual authorization mechanisms require the approval of two authorized individuals to execute. To reduce the risk of collusion, organizations consider rotating dual authorization duties. Organizations consider the risk associated with implementing dual authorization mechanisms when immediate responses are necessary to ensure public and environmental safety.
-
+
dual authorization is enforced for .
-
+
Access control policy
procedures addressing access enforcement and dual authorization
@@ -1777,7 +1803,7 @@
-
+
Organizational personnel with access enforcement responsibilities
system/network administrators
@@ -1787,7 +1813,7 @@
-
+
Dual authorization mechanisms implementing access control policy
@@ -1801,14 +1827,14 @@
organization-defined mandatory access control policy
-
+
mandatory access control policy
mandatory access control policy enforced over the set of covered subjects is defined;
-
+
mandatory access control policy
mandatory access control policy enforced over the set of covered objects is defined;
@@ -1816,7 +1842,7 @@
-
+
subjects
subjects to be explicitly granted privileges are defined;
@@ -1824,14 +1850,15 @@
-
+
privileges
privileges to be explicitly granted to subjects are defined;
-
-
+
+
+
@@ -1876,62 +1903,62 @@
The trusted subjects described above are granted privileges consistent with the concept of least privilege (see AC-6 ). Trusted subjects are only given the minimum privileges necessary for satisfying organizational mission/business needs relative to the above policy. The control is most applicable when there is a mandate that establishes a policy regarding access to controlled unclassified information or classified information and some users of the system are not authorized access to all such information resident in the system. Mandatory access control can operate in conjunction with discretionary access control as described in AC-3(4) . A subject constrained in its operation by mandatory access control policies can still operate under the less rigorous constraints of AC-3(4), but mandatory access control policies take precedence over the less rigorous constraints of AC-3(4). For example, while a mandatory access control policy imposes a constraint that prevents a subject from passing information to another subject operating at a different impact or classification level, AC-3(4) permits the subject to pass the information to any other subject with the same impact or classification level as the subject. Examples of mandatory access control policies include the Bell-LaPadula policy to protect confidentiality of information and the Biba policy to protect the integrity of information.
-
+
-
+
is enforced over the set of covered subjects specified in the policy;
-
+
is enforced over the set of covered objects specified in the policy;
-
+
-
+
is uniformly enforced across the covered subjects within the system;
-
+
is uniformly enforced across the covered objects within the system;
-
+
-
+
and specifying that a subject that has been granted access to information is constrained from passing the information to unauthorized subjects or objects are enforced;
-
+
and specifying that a subject that has been granted access to information is constrained from granting its privileges to other subjects are enforced;
-
+
and specifying that a subject that has been granted access to information is constrained from changing one of more security attributes (specified by the policy) on subjects, objects, the system, or system components are enforced;
-
+
and specifying that a subject that has been granted access to information is constrained from choosing the security attributes and attribute values (specified by the policy) to be associated with newly created or modified objects are enforced;
-
+
and specifying that a subject that has been granted access to information is constrained from changing the rules governing access control are enforced;
-
+
and specifying that may explicitly be granted such that they are not limited by any defined subset (or all) of the above constraints are enforced.
@@ -1939,7 +1966,7 @@
-
+
Access control policy
mandatory access control policies
@@ -1954,7 +1981,7 @@
-
+
Organizational personnel with access enforcement responsibilities
system/network administrators
@@ -1964,7 +1991,7 @@
-
+
Automated mechanisms implementing mandatory access control
@@ -1978,21 +2005,22 @@
organization-defined discretionary access control policy
-
+
discretionary access control policy
discretionary access control policy enforced over the set of covered subjects is defined;
-
+
discretionary access control policy
discretionary access control policy enforced over the set of covered objects is defined;
-
-
+
+
+
@@ -2023,39 +2051,39 @@
When discretionary access control policies are implemented, subjects are not constrained with regard to what actions they can take with information for which they have already been granted access. Thus, subjects that have been granted access to information are not prevented from passing the information to other subjects or objects (i.e., subjects have the discretion to pass). Discretionary access control can operate in conjunction with mandatory access control as described in AC-3(3) and AC-3(15) . A subject that is constrained in its operation by mandatory access control policies can still operate under the less rigorous constraints of discretionary access control. Therefore, while AC-3(3) imposes constraints that prevent a subject from passing information to another subject operating at a different impact or classification level, AC-3(4) permits the subject to pass the information to any subject at the same impact or classification level. The policy is bounded by the system. Once the information is passed outside of system control, additional means may be required to ensure that the constraints remain in effect. While traditional definitions of discretionary access control require identity-based access control, that limitation is not required for this particular use of discretionary access control.
-
+
-
+
is enforced over the set of covered subjects specified in the policy;
-
+
is enforced over the set of covered objects specified in the policy;
-
+
and are enforced where the policy specifies that a subject that has been granted access to information can pass the information to any other subjects or objects;
-
+
and are enforced where the policy specifies that a subject that has been granted access to information can grant its privileges to other subjects;
-
+
and are enforced where the policy specifies that a subject that has been granted access to information can change security attributes on subjects, objects, the system, or the system’s components;
-
+
and are enforced where the policy specifies that a subject that has been granted access to information can choose the security attributes to be associated with newly created or revised objects;
-
+
and are enforced where the policy specifies that a subject that has been granted access to information can change the rules governing access control.
@@ -2063,7 +2091,7 @@
-
+
Access control policy
discretionary access control policies
@@ -2078,7 +2106,7 @@
-
+
Organizational personnel with access enforcement responsibilities
system/network administrators
@@ -2088,7 +2116,7 @@
-
+
Mechanisms implementing discretionary access control policy
@@ -2098,14 +2126,15 @@
Security-relevant Information
-
+
security-relevant information
security-relevant information to which access is prevented except during secure, non-operable system states is defined;
-
-
+
+
+
@@ -2118,13 +2147,13 @@
Security-relevant information is information within systems that can potentially impact the operation of security functions or the provision of security services in a manner that could result in failure to enforce system security and privacy policies or maintain the separation of code and data. Security-relevant information includes access control lists, filtering rules for routers or firewalls, configuration parameters for security services, and cryptographic key management information. Secure, non-operable system states include the times in which systems are not performing mission or business-related processing, such as when the system is offline for maintenance, boot-up, troubleshooting, or shut down.
-
+
access to is prevented except during secure, non-operable system states.
-
+
Access control policy
procedures addressing access enforcement
@@ -2137,7 +2166,7 @@
-
+
Organizational personnel with access enforcement responsibilities
system/network administrators
@@ -2147,7 +2176,7 @@
-
+
Mechanisms preventing access to security-relevant information within the system
@@ -2155,8 +2184,9 @@
Protection of User and System Information
-
-
+
+
+
@@ -2170,21 +2200,22 @@
organization-defined roles and users authorized to assume such roles
-
+
roles
roles upon which to base control of access are defined;
-
+
users authorized to assume such roles
users authorized to assume roles (defined in AC-03(07)_ODP[01]) are defined;
-
-
+
+
+
@@ -2196,19 +2227,19 @@
Role-based access control (RBAC) is an access control policy that enforces access to objects and system functions based on the defined role (i.e., job function) of the subject. Organizations can create specific roles based on job functions and the authorizations (i.e., privileges) to perform needed operations on the systems associated with the organization-defined roles. When users are assigned to specific roles, they inherit the authorizations or privileges defined for those roles. RBAC simplifies privilege administration for organizations because privileges are not assigned directly to every user (which can be a large number of individuals) but are instead acquired through role assignments. RBAC can also increase privacy and security risk if individuals assigned to a role are given access to information beyond what they need to support organizational missions or business functions. RBAC can be implemented as a mandatory or discretionary form of access control. For organizations implementing RBAC with mandatory access controls, the requirements in AC-3(3) define the scope of the subjects and objects covered by the policy.
-
+
-
+
a role-based access control policy is enforced over defined subjects;
-
+
a role-based access control policy is enforced over defined objects;
-
+
access is controlled based on and .
@@ -2216,7 +2247,7 @@
-
+
Access control policy
role-based access control policies
@@ -2232,7 +2263,7 @@
-
+
Organizational personnel with access enforcement responsibilities
system/network administrators
@@ -2242,7 +2273,7 @@
-
+
Mechanisms implementing role-based access control policy
@@ -2253,14 +2284,15 @@
-
+
rules
rules governing the timing of revocations of access authorizations are defined;
-
-
+
+
+
@@ -2272,14 +2304,14 @@
Revocation of access rules may differ based on the types of access revoked. For example, if a subject (i.e., user or process acting on behalf of a user) is removed from a group, access may not be revoked until the next time the object is opened or the next time the subject attempts to access the object. Revocation based on changes to security labels may take effect immediately. Organizations provide alternative approaches on how to make revocations immediate if systems cannot provide such capability and immediate revocation is necessary.
-
+
-
+
revocation of access authorizations is enforced, resulting from changes to the security attributes of subjects based on ;
-
+
revocation of access authorizations is enforced resulting from changes to the security attributes of objects based on .
@@ -2287,7 +2319,7 @@
-
+
Access control policy
procedures addressing access enforcement
@@ -2300,7 +2332,7 @@
-
+
Organizational personnel with access enforcement responsibilities
system/network administrators
@@ -2310,7 +2342,7 @@
-
+
Mechanisms implementing access enforcement functions
@@ -2320,7 +2352,7 @@
Controlled Release
-
+
system or system component
the outside system or system component to which to release information is defined;
@@ -2328,7 +2360,7 @@
-
+
controls
controls to be provided by the outside system or system component (defined in AC-03(09)_ODP[01]) are defined;
@@ -2336,14 +2368,15 @@
-
+
controls
controls used to validate appropriateness of information to be released are defined;
-
-
+
+
+
@@ -2369,14 +2402,14 @@
Controlled release of information requires systems to implement technical or procedural means to validate the information prior to releasing it to external systems. For example, if the system passes information to a system controlled by another organization, technical means are employed to validate that the security and privacy attributes associated with the exported information are appropriate for the receiving system. Alternatively, if the system passes information to a printer in organization-controlled space, procedural means can be employed to ensure that only authorized individuals gain access to the printer.
-
+
-
+
information is released outside of the system only if the receiving provides ;
-
+
information is released outside of the system only if are used to validate the appropriateness of the information designated for release.
@@ -2384,7 +2417,7 @@
-
+
Access control policy
procedures addressing access enforcement
@@ -2404,7 +2437,7 @@
-
+
Organizational personnel with access enforcement responsibilities
system/network administrators
@@ -2416,7 +2449,7 @@
-
+
Mechanisms implementing access enforcement functions
@@ -2426,7 +2459,7 @@
Audited Override of Access Control Mechanisms
-
+
conditions
conditions under which to employ an audited override of automated access control mechanisms are defined;
@@ -2434,14 +2467,15 @@
-
+
roles
roles allowed to employ an audited override of automated access control mechanisms are defined;
-
-
+
+
+
@@ -2457,13 +2491,13 @@
In certain situations, such as when there is a threat to human life or an event that threatens the organization’s ability to carry out critical missions or business functions, an override capability for access control mechanisms may be needed. Override conditions are defined by organizations and used only in those limited circumstances. Audit events are defined in AU-2 . Audit records are generated in AU-12 .
-
+
an audited override of automated access control mechanisms is employed under by .
-
+
Access control policy
procedures addressing access enforcement
@@ -2477,7 +2511,7 @@
-
+
Organizational personnel with access enforcement responsibilities
system/network administrators
@@ -2486,7 +2520,7 @@
-
+
Mechanisms implementing access enforcement functions
@@ -2496,14 +2530,15 @@
Restrict Access to Specific Information Types
-
+
information types
information types requiring restricted access to data repositories are defined;
-
-
+
+
+
@@ -2518,13 +2553,13 @@
Restricting access to specific information is intended to provide flexibility regarding access control of specific information types within a system. For example, role-based access could be employed to allow access to only a specific type of personally identifiable information within a database rather than allowing access to the database in its entirety. Other examples include restricting access to cryptographic keys, authentication information, and selected system information.
-
+
access to data repositories containing is restricted.
-
+
Access control policy
procedures addressing access enforcement
@@ -2537,7 +2572,7 @@
-
+
Organizational personnel with access enforcement responsibilities
organizational personnel with responsibilities for data repositories
@@ -2547,7 +2582,7 @@
-
+
Mechanisms implementing access enforcement functions
@@ -2557,14 +2592,15 @@
Assert and Enforce Application Access
-
+
system applications and functions
system applications and functions requiring access assertion are defined;
-
-
+
+
+
@@ -2587,19 +2623,19 @@
Asserting and enforcing application access is intended to address applications that need to access existing system applications and functions, including user contacts, global positioning systems, cameras, keyboards, microphones, networks, phones, or other files.
-
+
-
+
as part of the installation process, applications are required to assert the access needed to the following system applications and functions: ;
-
+
an enforcement mechanism to prevent unauthorized access is provided;
-
+
access changes after initial installation of the application are approved.
@@ -2607,7 +2643,7 @@
-
+
Access control policy
procedures addressing access enforcement
@@ -2620,7 +2656,7 @@
-
+
Organizational personnel with access enforcement responsibilities
system/network administrators
@@ -2629,7 +2665,7 @@
-
+
Mechanisms implementing access enforcement functions
@@ -2640,14 +2676,15 @@
-
+
attributes
attributes to assume access permissions are defined;
-
-
+
+
+
@@ -2658,19 +2695,19 @@
Attribute-based access control is an access control policy that restricts system access to authorized users based on specified organizational attributes (e.g., job function, identity), action attributes (e.g., read, write, delete), environmental attributes (e.g., time of day, location), and resource attributes (e.g., classification of a document). Organizations can create rules based on attributes and the authorizations (i.e., privileges) to perform needed operations on the systems associated with organization-defined attributes and rules. When users are assigned to attributes defined in attribute-based access control policies or rules, they can be provisioned to a system with the appropriate privileges or dynamically granted access to a protected resource. Attribute-based access control can be implemented as either a mandatory or discretionary form of access control. When implemented with mandatory access controls, the requirements in AC-3(3) define the scope of the subjects and objects covered by the policy.
-
+
-
+
the attribute-based access control policy is enforced over defined subjects;
-
+
the attribute-based access control policy is enforced over defined objects;
-
+
access is controlled based on .
@@ -2678,7 +2715,7 @@
-
+
Access control policy
procedures addressing access enforcement
@@ -2692,7 +2729,7 @@
-
+
Organizational personnel with access enforcement responsibilities
system/network administrators
@@ -2701,7 +2738,7 @@
-
+
Mechanisms implementing access enforcement functions
@@ -2711,7 +2748,7 @@
Individual Access
-
+
mechanisms
mechanisms enabling individuals to have access to elements of their personally identifiable information are defined;
@@ -2719,14 +2756,15 @@
-
+
elements
elements of personally identifiable information to which individuals have access are defined;
-
-
+
+
+
@@ -2742,13 +2780,13 @@
Individual access affords individuals the ability to review personally identifiable information about them held within organizational records, regardless of format. Access helps individuals to develop an understanding about how their personally identifiable information is being processed. It can also help individuals ensure that their data is accurate. Access mechanisms can include request forms and application interfaces. For federal agencies, PRIVACT processes can be located in systems of record notices and on agency websites. Access to certain types of records may not be appropriate (e.g., for federal agencies, law enforcement records within a system of records may be exempt from disclosure under the PRIVACT ) or may require certain levels of authentication assurance. Organizational personnel consult with the senior agency official for privacy and legal counsel to determine appropriate mechanisms and access rights or limitations.
-
+
are provided to enable individuals to have access to of their personally identifiable information.
-
+
Access mechanisms (e.g., request forms and application interfaces)
access control policy
@@ -2766,7 +2804,7 @@
-
+
Organizational personnel with access enforcement responsibilities
system/network administrators
@@ -2776,7 +2814,7 @@
-
+
Mechanisms implementing access enforcement functions
mechanisms enabling individual access to personally identifiable information
@@ -2796,35 +2834,36 @@
organization-defined discretionary access control policy
-
+
mandatory access control policy
a mandatory access control policy enforced over the set of covered subjects specified in the policy is defined;
-
+
mandatory access control policy
a mandatory access control policy enforced over the set of covered objects specified in the policy is defined;
-
+
discretionary access control policy
a discretionary access control policy enforced over the set of covered subjects specified in the policy is defined;
-
+
discretionary access control policy
a discretionary access control policy enforced over the set of covered objects specified in the policy is defined;
-
-
+
+
+
@@ -2845,30 +2884,30 @@
Simultaneously implementing a mandatory access control policy and a discretionary access control policy can provide additional protection against the unauthorized execution of code by users or processes acting on behalf of users. This helps prevent a single compromised user or process from compromising the entire system.
-
+
-
+
-
+
is enforced over the set of covered subjects specified in the policy;
-
+
is enforced over the set of covered objects specified in the policy;
-
+
-
+
is enforced over the set of covered subjects specified in the policy;
-
+
is enforced over the set of covered objects specified in the policy.
@@ -2878,7 +2917,7 @@
-
+
Access control policy
procedures addressing access enforcement
@@ -2893,7 +2932,7 @@
-
+
Organizational personnel with access enforcement responsibilities
system/network administrators
@@ -2903,7 +2942,7 @@
-
+
Mechanisms implementing mandatory and discretionary access control policy
@@ -2914,14 +2953,15 @@
Information Flow Enforcement
-
+
information flow control policies
information flow control policies within the system and between connected systems are defined;
-
-
+
+
+
@@ -2953,13 +2993,13 @@
Organizations commonly employ information flow control policies and enforcement mechanisms to control the flow of information between designated sources and destinations within systems and between connected systems. Flow control is based on the characteristics of the information and/or the information path. Enforcement occurs, for example, in boundary protection devices that employ rule sets or establish configuration settings that restrict system services, provide a packet-filtering capability based on header information, or provide a message-filtering capability based on message content. Organizations also consider the trustworthiness of filtering and/or inspection mechanisms (i.e., hardware, firmware, and software components) that are critical to information flow enforcement. Control enhancements 3 through 32 primarily address cross-domain solution needs that focus on more advanced filtering techniques, in-depth analysis, and stronger flow enforcement mechanisms implemented in cross-domain products, such as high-assurance guards. Such capabilities are generally not available in commercial off-the-shelf products. Information flow enforcement also applies to control plane traffic (e.g., routing and DNS).
-
+
approved authorizations are enforced for controlling the flow of information within the system and between connected systems based on .
-
+
Access control policy
information flow control policies
@@ -2978,7 +3018,7 @@
-
+
System/network administrators
organizational personnel with information security and privacy architecture development responsibilities
@@ -2988,7 +3028,7 @@
-
+
Mechanisms implementing information flow enforcement policy
@@ -3010,56 +3050,56 @@
organization-defined information, source, and destination objects
-
+
security attributes
security attributes to be associated with information, source, and destination objects are defined;
-
+
privacy attributes
privacy attributes to be associated with information, source, and destination objects are defined;
-
+
information objects
information objects to be associated with information security attributes are defined;
-
+
information objects
information objects to be associated with privacy attributes are defined;
-
+
source objects
source objects to be associated with information security attributes are defined;
-
+
source objects
source objects to be associated with privacy attributes are defined;
-
+
destination objects
destination objects to be associated with information security attributes are defined;
-
+
destination objects
destination objects to be associated with privacy attributes are defined;
@@ -3067,14 +3107,15 @@
-
+
information flow control policies
information flow control policies as a basis for enforcement of flow control decisions are defined;
-
-
+
+
+
@@ -3085,14 +3126,14 @@
Information flow enforcement mechanisms compare security and privacy attributes associated with information (i.e., data content and structure) and source and destination objects and respond appropriately when the enforcement mechanisms encounter information flows not explicitly allowed by information flow policies. For example, an information object labeled Secret would be allowed to flow to a destination object labeled Secret, but an information object labeled Top Secret would not be allowed to flow to a destination object labeled Secret. A dataset of personally identifiable information may be tagged with restrictions against combining with other types of datasets and, thus, would not be allowed to flow to the restricted dataset. Security and privacy attributes can also include source and destination addresses employed in traffic filter firewalls. Flow enforcement using explicit security or privacy attributes can be used, for example, to control the release of certain types of information.
-
+
-
+
associated with , , and are used to enforce as a basis for flow control decisions;
-
+
associated with , , and are used to enforce as a basis for flow control decisions.
@@ -3100,7 +3141,7 @@
-
+
Access control policy
information flow control policies
@@ -3116,7 +3157,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -3126,7 +3167,7 @@
-
+
Mechanisms implementing information flow enforcement policy
@@ -3136,14 +3177,15 @@
Processing Domains
-
+
information flow control policies
information flow control policies to be enforced by use of protected processing domains are defined;
-
-
+
+
+
@@ -3155,13 +3197,13 @@
Protected processing domains within systems are processing spaces that have controlled interactions with other processing spaces, enabling control of information flows between these spaces and to/from information objects. A protected processing domain can be provided, for example, by implementing domain and type enforcement. In domain and type enforcement, system processes are assigned to domains, information is identified by types, and information flows are controlled based on allowed information accesses (i.e., determined by domain and type), allowed signaling among domains, and allowed process transitions to other domains.
-
+
protected processing domains are used to enforce as a basis for flow control decisions.
-
+
Access control policy
information flow control policies
@@ -3176,7 +3218,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -3184,7 +3226,7 @@
-
+
Mechanisms implementing information flow enforcement policy
@@ -3194,14 +3236,15 @@
Dynamic Information Flow Control
-
+
information flow control policies
information flow control policies to be enforced are defined;
-
-
+
+
+
@@ -3213,13 +3256,13 @@
Organizational policies regarding dynamic information flow control include allowing or disallowing information flows based on changing conditions or mission or operational considerations. Changing conditions include changes in risk tolerance due to changes in the immediacy of mission or business needs, changes in the threat environment, and detection of potentially harmful or adverse events.
-
+
are enforced.
-
+
Access control policy
information flow control policies
@@ -3234,7 +3277,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -3243,7 +3286,7 @@
-
+
Mechanisms implementing information flow enforcement policy
@@ -3253,7 +3296,7 @@
Flow Control of Encrypted Information
-
+
information flow control mechanisms
information flow control mechanisms that encrypted information is prevented from bypassing are defined;
@@ -3261,7 +3304,7 @@
-
+
decrypting the information
blocking the flow of the encrypted information
@@ -3272,14 +3315,15 @@
-
+
organization-defined procedure or method
the organization-defined procedure or method used to prevent encrypted information from bypassing information flow control mechanisms is defined (if selected);
-
-
+
+
+
@@ -3291,13 +3335,13 @@
Flow control mechanisms include content checking, security policy filters, and data type identifiers. The term encryption is extended to cover encoded data not recognized by filtering mechanisms.
-
+
encrypted information is prevented from bypassing by .
-
+
Access control policy
information flow control policies
@@ -3311,7 +3355,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -3320,7 +3364,7 @@
-
+
Mechanisms implementing information flow enforcement policy
@@ -3330,14 +3374,15 @@
Embedded Data Types
-
+
limitations
limitations on embedding data types within other data types are defined;
-
-
+
+
+
@@ -3348,13 +3393,13 @@
Embedding data types within other data types may result in reduced flow control effectiveness. Data type embedding includes inserting files as objects within other files and using compressed or archived data types that may include multiple embedded data types. Limitations on data type embedding consider the levels of embedding and prohibit levels of data type embedding that are beyond the capability of the inspection tools.
-
+
are enforced on embedding data types within other data types.
-
+
Access control policy
procedures addressing information flow enforcement
@@ -3368,7 +3413,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -3377,7 +3422,7 @@
-
+
Mechanisms implementing information flow enforcement policy
@@ -3387,14 +3432,15 @@
Metadata
-
+
metadata
metadata on which to base enforcement of information flow control is defined;
-
-
+
+
+
@@ -3407,13 +3453,13 @@
Metadata is information that describes the characteristics of data. Metadata can include structural metadata describing data structures or descriptive metadata describing data content. Enforcement of allowed information flows based on metadata enables simpler and more effective flow control. Organizations consider the trustworthiness of metadata regarding data accuracy (i.e., knowledge that the metadata values are correct with respect to the data), data integrity (i.e., protecting against unauthorized changes to metadata tags), and the binding of metadata to the data payload (i.e., employing sufficiently strong binding techniques with appropriate assurance).
-
+
information flow control enforcement is based on .
-
+
Access control policy
information flow control policies
@@ -3428,7 +3474,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -3437,7 +3483,7 @@
-
+
Mechanisms implementing information flow enforcement policy
@@ -3445,8 +3491,9 @@
One-way Flow Mechanisms
-
-
+
+
+
@@ -3457,13 +3504,13 @@
One-way flow mechanisms may also be referred to as a unidirectional network, unidirectional security gateway, or data diode. One-way flow mechanisms can be used to prevent data from being exported from a higher impact or classified domain or system while permitting data from a lower impact or unclassified domain or system to be imported.
-
+
one-way information flows are enforced through hardware-based flow control mechanisms.
-
+
Access control policy
information flow control policies
@@ -3478,7 +3525,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -3487,7 +3534,7 @@
-
+
Hardware mechanisms implementing information flow enforcement policy
@@ -3511,28 +3558,28 @@
organization-defined security or privacy policy
-
+
security policy filter
security policy filters to be used as a basis for enforcing information flow control are defined;
-
+
privacy policy filter
privacy policy filters to be used as a basis for enforcing information flow control are defined;
-
+
information flows
information flows for which information flow control is enforced by security filters are defined;
-
+
information flows
information flows for which information flow control is enforced by privacy filters are defined;
@@ -3540,7 +3587,7 @@
-
+
block
strip
@@ -3549,21 +3596,22 @@
-
+
security policy
security policy identifying actions to be taken after a filter processing failure are defined;
-
+
privacy policy
privacy policy identifying actions to be taken after a filter processing failure are defined;
-
-
+
+
+
@@ -3581,23 +3629,23 @@
Organization-defined security or privacy policy filters can address data structures and content. For example, security or privacy policy filters for data structures can check for maximum file lengths, maximum field sizes, and data/file types (for structured and unstructured data). Security or privacy policy filters for data content can check for specific words, enumerated values or data value ranges, and hidden content. Structured data permits the interpretation of data content by applications. Unstructured data refers to digital information without a data structure or with a data structure that does not facilitate the development of rule sets to address the impact or classification level of the information conveyed by the data or the flow enforcement decisions. Unstructured data consists of bitmap objects that are inherently non-language-based (i.e., image, video, or audio files) and textual objects that are based on written or printed languages. Organizations can implement more than one security or privacy policy filter to meet information flow control objectives.
-
+
-
+
-
+
information flow control is enforced using as a basis for flow control decisions for ;
-
+
information flow control is enforced using as a basis for flow control decisions for ;
-
+
data after a filter processing failure in accordance with ;
data after a filter processing failure in accordance with .
@@ -3606,7 +3654,7 @@
-
+
Access control policy
information flow control policies
@@ -3623,7 +3671,7 @@
-
+
System/network administrators
organizational personnel with information security and privacy responsibilities
@@ -3632,7 +3680,7 @@
-
+
Mechanisms implementing information flow enforcement policy
security and privacy policy filters
@@ -3643,7 +3691,7 @@
Human Reviews
-
+
information flows
information flows requiring the use of human reviews are defined;
@@ -3651,14 +3699,15 @@
-
+
conditions
conditions under which the use of human reviews for information flows are to be enforced are defined;
-
-
+
+
+
@@ -3670,13 +3719,13 @@
Organizations define security or privacy policy filters for all situations where automated flow control decisions are possible. When a fully automated flow control decision is not possible, then a human review may be employed in lieu of or as a complement to automated security or privacy policy filtering. Human reviews may also be employed as deemed necessary by organizations.
-
+
human reviews are used for under .
-
+
Access control policy
information flow control policies
@@ -3694,7 +3743,7 @@
-
+
System/network administrators
organizational personnel with information security and privacy responsibilities
@@ -3704,7 +3753,7 @@
-
+
Mechanisms enforcing the use of human reviews
@@ -3723,35 +3772,36 @@
organization-defined conditions
-
+
security filters
security policy filters that privileged administrators have the capability to enable and disable are defined;
-
+
privacy filters
privacy policy filters that privileged administrators have the capability to enable and disable are defined;
-
+
conditions
conditions under which privileged administrators have the capability to enable and disable security policy filters are defined;
-
+
conditions
conditions under which privileged administrators have the capability to enable and disable privacy policy filters are defined;
-
-
+
+
+
@@ -3762,14 +3812,14 @@
For example, as allowed by the system authorization, administrators can enable security or privacy policy filters to accommodate approved data types. Administrators also have the capability to select the filters that are executed on a specific data flow based on the type of data that is being transferred, the source and destination security domains, and other security or privacy relevant features, as needed.
-
+
-
+
capability is provided for privileged administrators to enable and disable under ;
-
+
capability is provided for privileged administrators to enable and disable under .
@@ -3777,7 +3827,7 @@
-
+
Access control policy
information flow information policies
@@ -3795,7 +3845,7 @@
-
+
Organizational personnel with responsibilities for enabling/disabling security and privacy policy filters
system/network administrators
@@ -3805,7 +3855,7 @@
-
+
Mechanisms implementing information flow enforcement policy
security and privacy policy filters
@@ -3820,21 +3870,22 @@
organization-defined security or privacy policy filters
-
+
security policy filters
security policy filters that privileged administrators have the capability to configure to support different security and privacy policies are defined;
-
+
privacy policy filters
privacy policy filters that privileged administrators have the capability to configure to support different security and privacy policies are defined;
-
-
+
+
+
@@ -3845,14 +3896,14 @@
Documentation contains detailed information for configuring security or privacy policy filters. For example, administrators can configure security or privacy policy filters to include the list of inappropriate words that security or privacy policy mechanisms check in accordance with the definitions provided by organizations.
-
+
-
+
capability is provided for privileged administrators to configure to support different security or privacy policies;
-
+
capability is provided for privileged administrators to configure to support different security or privacy policies.
@@ -3860,7 +3911,7 @@
-
+
Access control policy
information flow control policies
@@ -3877,7 +3928,7 @@
-
+
Organizational personnel with responsibilities for configuring security and privacy policy filters
system/network administrators
@@ -3887,7 +3938,7 @@
-
+
Mechanisms implementing information flow enforcement policy
security and privacy policy filters
@@ -3898,14 +3949,15 @@
Data Type Identifiers
-
+
data type identifiers
data type identifiers to be used to validate data essential for information flow decisions are defined;
-
-
+
+
+
@@ -3916,13 +3968,13 @@
Data type identifiers include filenames, file types, file signatures or tokens, and multiple internal file signatures or tokens. Systems only allow transfer of data that is compliant with data type format specifications. Identification and validation of data types is based on defined specifications associated with each allowed data format. The filename and number alone are not used for data type identification. Content is validated syntactically and semantically against its specification to ensure that it is the proper data type.
-
+
when transferring information between different security domains, are used to validate data essential for information flow decisions.
-
+
Access control policy
information flow control policies
@@ -3937,7 +3989,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -3946,7 +3998,7 @@
-
+
Mechanisms implementing information flow enforcement policy
@@ -3956,14 +4008,15 @@
Decomposition into Policy-relevant Subcomponents
-
+
policy-relevant subcomponents
policy-relevant subcomponents into which to decompose information for submission to policy enforcement mechanisms are defined;
-
-
+
+
+
@@ -3974,13 +4027,13 @@
Decomposing information into policy-relevant subcomponents prior to information transfer facilitates policy decisions on source, destination, certificates, classification, attachments, and other security- or privacy-related component differentiators. Policy enforcement mechanisms apply filtering, inspection, and/or sanitization rules to the policy-relevant subcomponents of information to facilitate flow enforcement prior to transferring such information to different security domains.
-
+
when transferring information between different security domains, information is decomposed into for submission to policy enforcement mechanisms.
-
+
Access control policy
information flow control policies
@@ -3994,7 +4047,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -4003,7 +4056,7 @@
-
+
Mechanisms implementing information flow enforcement policy
@@ -4017,21 +4070,22 @@
organization-defined security or privacy policy filters
-
+
security policy filters
security policy filters to be implemented that require fully enumerated formats restricting data structure and content have been defined;
-
+
privacy policy filters
privacy policy filters to be implemented that require fully enumerated formats restricting data structure and content are defined;
-
-
+
+
+
@@ -4042,14 +4096,14 @@
Data structure and content restrictions reduce the range of potential malicious or unsanctioned content in cross-domain transactions. Security or privacy policy filters that restrict data structures include restricting file sizes and field lengths. Data content policy filters include encoding formats for character sets, restricting character data fields to only contain alpha-numeric characters, prohibiting special characters, and validating schema structures.
-
+
-
+
when transferring information between different security domains, implemented require fully enumerated formats that restrict data structure and content;
-
+
when transferring information between different security domains, implemented require fully enumerated formats that restrict data structure and content.
@@ -4057,7 +4111,7 @@
-
+
Access control policy
information flow control policies
@@ -4075,7 +4129,7 @@
-
+
System/network administrators
organizational personnel with information security and privacy responsibilities
@@ -4084,7 +4138,7 @@
-
+
Mechanisms implementing information flow enforcement policy
security and privacy policy filters
@@ -4100,28 +4154,29 @@
-
+
unsanctioned information
unsanctioned information to be detected is defined;
-
+
security policy
security policy that requires the transfer of unsanctioned information between different security domains to be prohibited is defined (if selected);
-
+
privacy policy
privacy policy that requires the transfer of organization-defined unsanctioned information between different security domains to be prohibited is defined (if selected);
-
-
+
+
+
@@ -4133,19 +4188,19 @@
Unsanctioned information includes malicious code, information that is inappropriate for release from the source network, or executable code that could disrupt or harm the services or systems on the destination network.
-
+
-
+
when transferring information between different security domains, information is examined for the presence of ;
-
+
when transferring information between different security domains, transfer of is prohibited in accordance with the ;
-
+
when transferring information between different security domains, transfer of is prohibited in accordance with the .
@@ -4153,7 +4208,7 @@
-
+
Access control policy
information flow control policies
@@ -4169,7 +4224,7 @@
-
+
Organizational personnel with information security responsibilities
organizational personnel with privacy responsibilities
@@ -4178,7 +4233,7 @@
-
+
Mechanisms implementing information flow enforcement policy
@@ -4186,8 +4241,9 @@
Information Transfers on Interconnected Systems
-
-
+
+
+
@@ -4196,13 +4252,14 @@
Domain Authentication
-
+
organization, system, application, service, individual
-
-
+
+
+
@@ -4216,13 +4273,13 @@
Attribution is a critical component of a security and privacy concept of operations. The ability to identify source and destination points for information flowing within systems allows the forensic reconstruction of events and encourages policy compliance by attributing policy violations to specific organizations or individuals. Successful domain authentication requires that system labels distinguish among systems, organizations, and individuals involved in preparing, sending, receiving, or disseminating information. Attribution also allows organizations to better maintain the lineage of personally identifiable information processing as it flows through systems and can facilitate consent tracking, as well as correction, deletion, or access requests from individuals.
-
+
source and destination points are uniquely identified and authenticated by for information transfer.
-
+
Access control policy
information flow control policies
@@ -4239,7 +4296,7 @@
-
+
System/network administrators
organizational personnel with information security and privacy responsibilities
@@ -4248,7 +4305,7 @@
-
+
Mechanisms implementing information flow enforcement policy
@@ -4256,8 +4313,9 @@
Security Attribute Binding
-
-
+
+
+
@@ -4270,21 +4328,22 @@
organization-defined security or privacy policy filters
-
+
security policy filters
security policy filters to be implemented on metadata are defined (if selected);
-
+
privacy policy filters
privacy policy filters to be implemented on metadata are defined (if selected);
-
-
+
+
+
@@ -4295,14 +4354,14 @@
All information (including metadata and the data to which the metadata applies) is subject to filtering and inspection. Some organizations distinguish between metadata and data payloads (i.e., only the data to which the metadata is bound). Other organizations do not make such distinctions and consider metadata and the data to which the metadata applies to be part of the payload.
-
+
-
+
when transferring information between different security domains, are implemented on metadata;
-
+
when transferring information between different security domains, are implemented on metadata.
@@ -4310,7 +4369,7 @@
-
+
Information flow enforcement policy
information flow control policies
@@ -4326,7 +4385,7 @@
-
+
Organizational personnel with information flow enforcement responsibilities
system/network administrators
@@ -4337,7 +4396,7 @@
-
+
Mechanisms implementing information flow enforcement functions
security and policy filters
@@ -4348,7 +4407,7 @@
Approved Solutions
-
+
solutions in approved configurations
solutions in approved configurations to control the flow of information across security domains are defined;
@@ -4356,14 +4415,15 @@
-
+
information
information to be controlled when it flows across security domains is defined;
-
-
+
+
+
@@ -4374,13 +4434,13 @@
Organizations define approved solutions and configurations in cross-domain policies and guidance in accordance with the types of information flows across classification boundaries. The National Security Agency (NSA) National Cross Domain Strategy and Management Office provides a listing of approved cross-domain solutions. Contact ncdsmo@nsa.gov for more information.
-
+
are employed to control the flow of across security domains.
-
+
Information flow enforcement policy
information flow control policies
@@ -4396,7 +4456,7 @@
-
+
Organizational personnel with information flow enforcement responsibilities
system/network administrators
@@ -4405,7 +4465,7 @@
-
+
Mechanisms implementing information flow enforcement functions
@@ -4419,14 +4479,14 @@
organization-defined mechanisms and/or techniques
-
+
mechanisms and/or techniques
mechanisms and/or techniques used to logically separate information flows are defined (if selected);
-
+
mechanisms and/or techniques
mechanisms and/or techniques used to physically separate information flows are defined (if selected);
@@ -4435,14 +4495,15 @@
-
+
required separations
required separations by types of information are defined;
-
-
+
+
+
@@ -4455,14 +4516,14 @@
Enforcing the separation of information flows associated with defined types of data can enhance protection by ensuring that information is not commingled while in transit and by enabling flow control by transmission paths that are not otherwise achievable. Types of separable information include inbound and outbound communications traffic, service requests and responses, and information of differing security impact or classification levels.
-
+
-
+
information flows are separated logically using to accomplish ;
-
+
information flows are separated physically using to accomplish .
@@ -4470,7 +4531,7 @@
-
+
Information flow enforcement policy
information flow control policies
@@ -4486,7 +4547,7 @@
-
+
Organizational personnel with information flow enforcement responsibilities
system/network administrators
@@ -4496,7 +4557,7 @@
-
+
Mechanisms implementing information flow enforcement functions
@@ -4504,8 +4565,9 @@
Access Only
-
-
+
+
+
@@ -4516,13 +4578,13 @@
The system provides a capability for users to access each connected security domain without providing any mechanisms to allow users to transfer data or information between the different security domains. An example of an access-only solution is a terminal that provides a user access to information with different security classifications while assuredly keeping the information separate.
-
+
access is provided from a single device to computing platforms, applications, or data that reside in multiple different security domains while preventing information flow between the different security domains.
-
+
Information flow enforcement policy
procedures addressing information flow enforcement
@@ -4535,7 +4597,7 @@
-
+
Organizational personnel with information flow enforcement responsibilities
system/network administrators
@@ -4544,7 +4606,7 @@
-
+
Mechanisms implementing information flow enforcement functions
@@ -4554,14 +4616,15 @@
Modify Non-releasable Information
-
+
modification action
modification action implemented on non-releasable information is defined;
-
-
+
+
+
@@ -4573,13 +4636,13 @@
Modifying non-releasable information can help prevent a data spill or attack when information is transferred across security domains. Modification actions include masking, permutation, alteration, removal, or redaction.
-
+
when transferring information between security domains, non-releasable information is modified by implementing .
-
+
Information flow enforcement policy
procedures addressing information flow enforcement
@@ -4592,7 +4655,7 @@
-
+
Organizational personnel with information flow enforcement responsibilities
system/network administrators
@@ -4601,7 +4664,7 @@
-
+
Mechanisms implementing information flow enforcement functions
@@ -4609,8 +4672,9 @@
Internal Normalized Format
-
-
+
+
+
@@ -4621,14 +4685,14 @@
Converting data into normalized forms is one of most of effective mechanisms to stop malicious attacks and large classes of data exfiltration.
-
+
-
+
when transferring information between different security domains, incoming data is parsed into an internal, normalized format;
-
+
when transferring information between different security domains, the data is regenerated to be consistent with its intended specification.
@@ -4636,7 +4700,7 @@
-
+
Information flow enforcement policy
procedures addressing information flow enforcement
@@ -4649,7 +4713,7 @@
-
+
Organizational personnel with information flow enforcement responsibilities
system/network administrators
@@ -4658,7 +4722,7 @@
-
+
Mechanisms implementing information flow enforcement functions
@@ -4668,7 +4732,7 @@
Data Sanitization
-
+
delivery of malicious content, command and control of malicious code, malicious code augmentation, and steganography-encoded data
spillage of sensitive information
@@ -4676,14 +4740,15 @@
-
+
policy
policy for sanitizing data is defined;
-
-
+
+
+
@@ -4695,13 +4760,13 @@
Data sanitization is the process of irreversibly removing or destroying data stored on a memory device (e.g., hard drives, flash memory/solid state drives, mobile devices, CDs, and DVDs) or in hard copy form.
-
+
when transferring information between different security domains, data is sanitized to minimize in accordance with .
-
+
Information flow enforcement policy
procedures addressing information flow enforcement
@@ -4714,7 +4779,7 @@
-
+
Organizational personnel with information flow enforcement responsibilities
system/network administrators
@@ -4723,7 +4788,7 @@
-
+
Mechanisms implementing information flow enforcement functions
@@ -4731,8 +4796,9 @@
Audit Filtering Actions
-
-
+
+
+
@@ -4747,14 +4813,14 @@
Content filtering is the process of inspecting information as it traverses a cross-domain solution and determines if the information meets a predefined policy. Content filtering actions and the results of filtering actions are recorded for individual messages to ensure that the correct filter actions were applied. Content filter reports are used to assist in troubleshooting actions by, for example, determining why message content was modified and/or why it failed the filtering process. Audit events are defined in AU-2 . Audit records are generated in AU-12 .
-
+
-
+
when transferring information between different security domains, content-filtering actions are recorded and audited;
-
+
when transferring information between different security domains, results for the information being filtered are recorded and audited.
@@ -4762,7 +4828,7 @@
-
+
Information flow enforcement policy
procedures addressing information flow enforcement
@@ -4775,7 +4841,7 @@
-
+
Organizational personnel with information flow enforcement responsibilities
system/network administrators
@@ -4784,7 +4850,7 @@
-
+
Mechanisms implementing information flow enforcement functions
mechanisms implementing content filtering
@@ -4794,8 +4860,9 @@
Redundant/Independent Filtering Mechanisms
-
-
+
+
+
@@ -4806,13 +4873,13 @@
Content filtering is the process of inspecting information as it traverses a cross-domain solution and determines if the information meets a predefined policy. Redundant and independent content filtering eliminates a single point of failure filtering system. Independence is defined as the implementation of a content filter that uses a different code base and supporting libraries (e.g., two JPEG filters using different vendors’ JPEG libraries) and multiple, independent system processes.
-
+
when transferring information between security domains, implemented content filtering solutions provide redundant and independent filtering mechanisms for each data type.
-
+
Information flow enforcement policy
procedures addressing information flow enforcement
@@ -4825,7 +4892,7 @@
-
+
Organizational personnel with information flow enforcement responsibilities
system/network administrators
@@ -4834,7 +4901,7 @@
-
+
Mechanisms implementing information flow enforcement functions
@@ -4842,8 +4909,9 @@
Linear Filter Pipelines
-
-
+
+
+
@@ -4854,13 +4922,13 @@
Content filtering is the process of inspecting information as it traverses a cross-domain solution and determines if the information meets a predefined policy. The use of linear content filter pipelines ensures that filter processes are non-bypassable and always invoked. In general, the use of parallel filtering architectures for content filtering of a single data type introduces bypass and non-invocation issues.
-
+
when transferring information between security domains, a linear content filter pipeline is implemented that is enforced with discretionary and mandatory access controls.
-
+
Information flow enforcement policy
procedures addressing information flow enforcement
@@ -4873,7 +4941,7 @@
-
+
Organizational personnel with information flow enforcement responsibilities
system/network administrators
@@ -4882,7 +4950,7 @@
-
+
Mechanisms implementing information flow enforcement functions
mechanisms implementing linear content filters
@@ -4893,14 +4961,15 @@
Filter Orchestration Engines
-
+
policy
policy for content-filtering actions is defined;
-
-
+
+
+
@@ -4920,21 +4989,21 @@
Content filtering is the process of inspecting information as it traverses a cross-domain solution and determines if the information meets a predefined security policy. An orchestration engine coordinates the sequencing of activities (manual and automated) in a content filtering process. Errors are defined as either anomalous actions or unexpected termination of the content filter process. This is not the same as a filter failing content due to non-compliance with policy. Content filter reports are a commonly used mechanism to ensure that expected filtering actions are completed successfully.
-
+
-
+
when transferring information between security domains, content filter orchestration engines are employed to ensure that content-filtering mechanisms successfully complete execution without errors;
-
+
-
+
when transferring information between security domains, content filter orchestration engines are employed to ensure that content-filtering actions occur in the correct order;
-
+
when transferring information between security domains, content filter orchestration engines are employed to ensure that content-filtering actions comply with .
@@ -4944,7 +5013,7 @@
-
+
Information flow enforcement policy
procedures addressing information flow enforcement
@@ -4957,7 +5026,7 @@
-
+
Organizational personnel with information flow enforcement responsibilities
system/network administrators
@@ -4966,7 +5035,7 @@
-
+
Mechanisms implementing information flow enforcement functions
mechanisms implementing content filter orchestration engines
@@ -4975,8 +5044,9 @@
Filter Mechanisms Using Multiple Processes
-
-
+
+
+
@@ -4987,13 +5057,13 @@
The use of multiple processes to implement content filtering mechanisms reduces the likelihood of a single point of failure.
-
+
when transferring information between security domains, content-filtering mechanisms using multiple processes are implemented.
-
+
Information flow enforcement policy
procedures addressing information flow enforcement
@@ -5006,7 +5076,7 @@
-
+
Organizational personnel with information flow enforcement responsibilities
system/network administrators
@@ -5015,7 +5085,7 @@
-
+
Mechanisms implementing information flow enforcement functions
mechanisms implementing content filtering
@@ -5024,8 +5094,9 @@
Failed Content Transfer Prevention
-
-
+
+
+
@@ -5036,13 +5107,13 @@
Content that failed filtering checks can corrupt the system if transferred to the receiving domain.
-
+
when transferring information between different security domains, the transfer of failed content to the receiving domain is prevented.
-
+
Information flow enforcement policy
procedures addressing information flow enforcement
@@ -5055,7 +5126,7 @@
-
+
Organizational personnel with information flow enforcement responsibilities
system/network administrators
@@ -5064,7 +5135,7 @@
-
+
Mechanisms implementing information flow enforcement functions
@@ -5072,8 +5143,9 @@
Process Requirements for Information Transfer
-
-
+
+
+
@@ -5100,24 +5172,24 @@
The processes transferring information between filter pipelines have minimum complexity and functionality to provide assurance that the processes operate correctly.
-
+
-
+
when transferring information between different security domains, the process that transfers information between filter pipelines does not filter message content;
-
+
when transferring information between different security domains, the process that transfers information between filter pipelines validates filtering metadata;
-
+
when transferring information between different security domains, the process that transfers information between filter pipelines ensures that the content with the filtering metadata has successfully completed filtering;
-
+
when transferring information between different security domains, the process that transfers information between filter pipelines transfers the content to the destination filter pipeline.
@@ -5125,7 +5197,7 @@
-
+
Information flow enforcement policy
procedures addressing information flow enforcement
@@ -5138,7 +5210,7 @@
-
+
Organizational personnel with information flow enforcement responsibilities
system/network administrators
@@ -5147,7 +5219,7 @@
-
+
Mechanisms implementing information flow enforcement functions
mechanisms implementing content filtering
@@ -5160,14 +5232,15 @@
-
+
duties of individuals
duties of individuals requiring separation are defined;
-
-
+
+
+
@@ -5200,14 +5273,14 @@
Separation of duties addresses the potential for abuse of authorized privileges and helps to reduce the risk of malevolent activity without collusion. Separation of duties includes dividing mission or business functions and support functions among different individuals or roles, conducting system support functions with different individuals, and ensuring that security personnel who administer access control functions do not also administer audit functions. Because separation of duty violations can span systems and application domains, organizations consider the entirety of systems and system components when developing policy on separation of duties. Separation of duties is enforced through the account management activities in AC-2 , access control mechanisms in AC-3 , and identity management activities in IA-2 , IA-4 , and IA-12 .
-
+
-
+
are identified and documented;
-
+
system access authorizations to support separation of duties are defined.
@@ -5215,7 +5288,7 @@
-
+
Access control policy
procedures addressing divisions of responsibility and separation of duties
@@ -5229,7 +5302,7 @@
-
+
Organizational personnel with responsibilities for defining appropriate divisions of responsibility and separation of duties
organizational personnel with information security responsibilities
@@ -5238,7 +5311,7 @@
-
+
Mechanisms implementing separation of duties policy
@@ -5246,8 +5319,9 @@
Least Privilege
-
-
+
+
+
@@ -5269,13 +5343,13 @@
Organizations employ least privilege for specific duties and systems. The principle of least privilege is also applied to system processes, ensuring that the processes have access to systems and operate at privilege levels no higher than necessary to accomplish organizational missions or business functions. Organizations consider the creation of additional processes, roles, and accounts as necessary to achieve least privilege. Organizations apply least privilege to the development, implementation, and operation of organizational systems.
-
+
the principle of least privilege is employed, allowing only authorized accesses for users (or processes acting on behalf of users) that are necessary to accomplish assigned organizational tasks.
-
+
Access control policy
procedures addressing least privilege
@@ -5288,7 +5362,7 @@
-
+
Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks
organizational personnel with information security responsibilities
@@ -5297,7 +5371,7 @@
-
+
Mechanisms implementing least privilege functions
@@ -5313,28 +5387,28 @@
-
+
individuals and roles
individuals and roles with authorized access to security functions and security-relevant information are defined;
-
+
security functions (deployed in hardware)
security functions (deployed in hardware) for authorized access are defined;
-
+
security functions (deployed in software)
security functions (deployed in software) for authorized access are defined;
-
+
security functions (deployed in firmware)
security functions (deployed in firmware) for authorized access are defined;
@@ -5342,14 +5416,15 @@
-
+
security-relevant information
security-relevant information for authorized access is defined;
-
-
+
+
+
@@ -5373,28 +5448,28 @@
Security functions include establishing system accounts, configuring access authorizations (i.e., permissions, privileges), configuring settings for events to be audited, and establishing intrusion detection parameters. Security-relevant information includes filtering rules for routers or firewalls, configuration parameters for security services, cryptographic key management information, and access control lists. Authorized personnel include security administrators, system administrators, system security officers, system programmers, and other privileged users.
-
+
-
+
-
+
access is authorized for to ;
-
+
access is authorized for to ;
-
+
access is authorized for to ;
-
+
access is authorized for to .
@@ -5402,7 +5477,7 @@
-
+
Access control policy
procedures addressing least privilege
@@ -5415,7 +5490,7 @@
-
+
Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks
organizational personnel with information security responsibilities
@@ -5424,7 +5499,7 @@
-
+
Mechanisms implementing least privilege functions
@@ -5434,14 +5509,15 @@
Non-privileged Access for Nonsecurity Functions
-
+
security functions or security-relevant information
security functions or security-relevant information, the access to which requires users to use non-privileged accounts to access non-security functions, are defined;
-
-
+
+
+
@@ -5456,13 +5532,13 @@
Requiring the use of non-privileged accounts when accessing nonsecurity functions limits exposure when operating from within privileged accounts or roles. The inclusion of roles addresses situations where organizations implement access control policies, such as role-based access control, and where a change of role provides the same degree of assurance in the change of access authorizations for the user and the processes acting on behalf of the user as would be provided by a change between a privileged and non-privileged account.
-
+
users of system accounts (or roles) with access to are required to use non-privileged accounts or roles when accessing non-security functions.
-
+
Access control policy
procedures addressing least privilege
@@ -5475,7 +5551,7 @@
-
+
Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks
organizational personnel with information security responsibilities
@@ -5484,7 +5560,7 @@
-
+
Mechanisms implementing least privilege functions
@@ -5494,7 +5570,7 @@
Network Access to Privileged Commands
-
+
privileged commands
privileged commands to which network access is to be authorized only for compelling operational needs are defined;
@@ -5502,14 +5578,15 @@
-
+
compelling operational needs
compelling operational needs necessitating network access to privileged commands are defined;
-
-
+
+
+
@@ -5523,14 +5600,14 @@
Network access is any access across a network connection in lieu of local access (i.e., user being physically present at the device).
-
+
-
+
network access to is authorized only for ;
-
+
the rationale for authorizing network access to privileged commands is documented in the security plan for the system.
@@ -5538,7 +5615,7 @@
-
+
Access control policy
procedures addressing least privilege
@@ -5551,7 +5628,7 @@
-
+
Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks
organizational personnel with information security responsibilities
@@ -5559,7 +5636,7 @@
-
+
Mechanisms implementing least privilege functions
@@ -5567,8 +5644,9 @@
Separate Processing Domains
-
-
+
+
+
@@ -5586,13 +5664,13 @@
Providing separate processing domains for finer-grained allocation of user privileges includes using virtualization techniques to permit additional user privileges within a virtual machine while restricting privileges to other virtual machines or to the underlying physical machine, implementing separate physical domains, and employing hardware or software domain separation mechanisms.
-
+
separate processing domains are provided to enable finer-grain allocation of user privileges.
-
+
Access control policy
procedures addressing least privilege
@@ -5605,7 +5683,7 @@
-
+
Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks
organizational personnel with information security responsibilities
@@ -5614,7 +5692,7 @@
-
+
Mechanisms implementing least privilege functions
@@ -5624,14 +5702,15 @@
Privileged Accounts
-
+
personnel or roles
personnel or roles to which privileged accounts on the system are to be restricted is/are defined;
-
-
+
+
+
@@ -5645,13 +5724,13 @@
Privileged accounts, including super user accounts, are typically described as system administrator for various types of commercial off-the-shelf operating systems. Restricting privileged accounts to specific personnel or roles prevents day-to-day users from accessing privileged information or privileged functions. Organizations may differentiate in the application of restricting privileged accounts between allowed privileges for local accounts and for domain accounts provided that they retain the ability to control system configurations for key parameters and as otherwise necessary to sufficiently mitigate risk.
-
+
privileged accounts on the system are restricted to .
-
+
Access control policy
procedures addressing least privilege
@@ -5665,7 +5744,7 @@
-
+
Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks
organizational personnel with information security responsibilities
@@ -5674,7 +5753,7 @@
-
+
Mechanisms implementing least privilege functions
@@ -5682,8 +5761,9 @@
Privileged Access by Non-organizational Users
-
-
+
+
+
@@ -5698,13 +5778,13 @@
An organizational user is an employee or an individual considered by the organization to have the equivalent status of an employee. Organizational users include contractors, guest researchers, or individuals detailed from other organizations. A non-organizational user is a user who is not an organizational user. Policies and procedures for granting equivalent status of employees to individuals include a need-to-know, citizenship, and the relationship to the organization.
-
+
privileged access to the system by non-organizational users is prohibited.
-
+
Access control policy
procedures addressing least privilege
@@ -5718,7 +5798,7 @@
-
+
Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks
organizational personnel with information security responsibilities
@@ -5727,7 +5807,7 @@
-
+
Mechanisms prohibiting privileged access to the system
@@ -5737,7 +5817,7 @@
Review of User Privileges
-
+
frequency
the frequency at which to review the privileges assigned to roles or classes of users is defined;
@@ -5746,14 +5826,15 @@
-
+
roles and classes
roles or classes of users to which privileges are assigned are defined;
-
-
+
+
+
@@ -5772,14 +5853,14 @@
The need for certain assigned user privileges may change over time to reflect changes in organizational mission and business functions, environments of operation, technologies, or threats. A periodic review of assigned user privileges is necessary to determine if the rationale for assigning such privileges remains valid. If the need cannot be revalidated, organizations take appropriate corrective actions.
-
+
-
+
privileges assigned to are reviewed to validate the need for such privileges;
-
+
privileges are reassigned or removed, if necessary, to correctly reflect organizational mission and business needs.
@@ -5787,7 +5868,7 @@
-
+
Access control policy
procedures addressing least privilege
@@ -5803,7 +5884,7 @@
-
+
Organizational personnel with responsibilities for reviewing least privileges necessary to accomplish specified tasks
organizational personnel with information security responsibilities
@@ -5812,7 +5893,7 @@
-
+
Mechanisms implementing review of user privileges
@@ -5822,14 +5903,15 @@
Privilege Levels for Code Execution
-
+
software
software to be prevented from executing at higher privilege levels than users executing the software is defined;
-
-
+
+
+
@@ -5840,13 +5922,13 @@
In certain situations, software applications or programs need to execute with elevated privileges to perform required functions. However, depending on the software functionality and configuration, if the privileges required for execution are at a higher level than the privileges assigned to organizational users invoking such applications or programs, those users may indirectly be provided with greater privileges than assigned.
-
+
is prevented from executing at higher privilege levels than users executing the software.
-
+
Access control policy
procedures addressing least privilege
@@ -5860,7 +5942,7 @@
-
+
Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks
organizational personnel with information security responsibilities
@@ -5870,7 +5952,7 @@
-
+
Mechanisms implementing least privilege functions for software execution
@@ -5878,8 +5960,9 @@
Log Use of Privileged Functions
-
-
+
+
+
@@ -5893,13 +5976,13 @@
The misuse of privileged functions, either intentionally or unintentionally by authorized users or by unauthorized external entities that have compromised system accounts, is a serious and ongoing concern and can have significant adverse impacts on organizations. Logging and analyzing the use of privileged functions is one way to detect such misuse and, in doing so, help mitigate the risk from insider threats and the advanced persistent threat.
-
+
the execution of privileged functions is logged.
-
+
Access control policy
procedures addressing least privilege
@@ -5914,7 +5997,7 @@
-
+
Organizational personnel with responsibilities for reviewing least privileges necessary to accomplish specified tasks
organizational personnel with information security responsibilities
@@ -5924,7 +6007,7 @@
-
+
Mechanisms auditing the execution of least privilege functions
@@ -5932,8 +6015,9 @@
Prohibit Non-privileged Users from Executing Privileged Functions
-
-
+
+
+
@@ -5944,13 +6028,13 @@
Privileged functions include disabling, circumventing, or altering implemented security or privacy controls, establishing system accounts, performing system integrity checks, and administering cryptographic key management activities. Non-privileged users are individuals who do not possess appropriate authorizations. Privileged functions that require protection from non-privileged users include circumventing intrusion detection and prevention mechanisms or malicious code protection mechanisms. Preventing non-privileged users from executing privileged functions is enforced by AC-3 .
-
+
non-privileged users are prevented from executing privileged functions.
-
+
Access control policy
procedures addressing least privilege
@@ -5964,7 +6048,7 @@
-
+
Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks
organizational personnel with information security responsibilities
@@ -5973,7 +6057,7 @@
-
+
Mechanisms implementing least privilege functions for non-privileged users
@@ -5984,7 +6068,7 @@
Unsuccessful Logon Attempts
-
+
number
the number of consecutive invalid logon attempts by a user allowed during a time period is defined;
@@ -5992,7 +6076,7 @@
-
+
time period
the time period to which the number of consecutive invalid logon attempts by a user is limited is defined;
@@ -6000,7 +6084,7 @@
-
+
lock the account or node for
lock the account or node until released by an administrator
@@ -6011,7 +6095,7 @@
-
+
time period
time period for an account or node to be locked is defined (if selected);
@@ -6019,7 +6103,7 @@
-
+
delay algorithm
delay algorithm for the next logon prompt is defined (if selected);
@@ -6027,14 +6111,15 @@
-
+
action
other action to be taken when the maximum number of unsuccessful attempts is exceeded is defined (if selected);
-
-
+
+
+
@@ -6058,14 +6143,14 @@
The need to limit unsuccessful logon attempts and take subsequent action when the maximum number of attempts is exceeded applies regardless of whether the logon occurs via a local or network connection. Due to the potential for denial of service, automatic lockouts initiated by systems are usually temporary and automatically release after a predetermined, organization-defined time period. If a delay algorithm is selected, organizations may employ different algorithms for different components of the system based on the capabilities of those components. Responses to unsuccessful logon attempts may be implemented at the operating system and the application levels. Organization-defined actions that may be taken when the number of allowed consecutive invalid logon attempts is exceeded include prompting the user to answer a secret question in addition to the username and password, invoking a lockdown mode with limited user capabilities (instead of full lockout), allowing users to only logon from specified Internet Protocol (IP) addresses, requiring a CAPTCHA to prevent automated attacks, or applying user profiles such as location, time of day, IP address, device, or Media Access Control (MAC) address. If automatic system lockout or execution of a delay algorithm is not implemented in support of the availability objective, organizations consider a combination of other actions to help prevent brute force attacks. In addition to the above, organizations can prompt users to respond to a secret question before the number of allowed unsuccessful logon attempts is exceeded. Automatically unlocking an account after a specified period of time is generally not permitted. However, exceptions may be required based on operational mission or need.
-
+
-
+
a limit of consecutive invalid logon attempts by a user during is enforced;
-
+
automatically when the maximum number of unsuccessful attempts is exceeded.
@@ -6073,7 +6158,7 @@
-
+
Access control policy
procedures addressing unsuccessful logon attempts
@@ -6086,7 +6171,7 @@
-
+
Organizational personnel with information security responsibilities
system developers
@@ -6095,15 +6180,16 @@
-
+
Mechanisms implementing access control policy for unsuccessful logon attempts
Automatic Account Lock
-
-
+
+
+
@@ -6112,7 +6198,7 @@
Purge or Wipe Mobile Device
-
+
mobile devices
mobile devices to be purged or wiped of information are defined;
@@ -6121,7 +6207,7 @@
-
+
purging or wiping requirements and techniques
purging and wiping requirements and techniques to be used when mobile devices are purged or wiped of information are defined;
@@ -6129,14 +6215,15 @@
-
+
number
the number of consecutive, unsuccessful logon attempts before the information is purged or wiped from mobile devices is defined;
-
-
+
+
+
@@ -6150,13 +6237,13 @@
A mobile device is a computing device that has a small form factor such that it can be carried by a single individual; is designed to operate without a physical connection; possesses local, non-removable or removable data storage; and includes a self-contained power source. Purging or wiping the device applies only to mobile devices for which the organization-defined number of unsuccessful logons occurs. The logon is to the mobile device, not to any one account on the device. Successful logons to accounts on mobile devices reset the unsuccessful logon count to zero. Purging or wiping may be unnecessary if the information on the device is protected with sufficiently strong encryption mechanisms.
-
+
information is purged or wiped from based on after consecutive, unsuccessful device logon attempts.
-
+
Access control policy
procedures addressing unsuccessful logon attempts on mobile devices
@@ -6171,7 +6258,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -6179,7 +6266,7 @@
-
+
Mechanisms implementing access control policy for unsuccessful device logon attempts
@@ -6189,14 +6276,15 @@
Biometric Attempt Limiting
-
+
number
the number of unsuccessful biometric logon attempts is defined;
-
-
+
+
+
@@ -6208,13 +6296,13 @@
Biometrics are probabilistic in nature. The ability to successfully authenticate can be impacted by many factors, including matching performance and presentation attack detection mechanisms. Organizations select the appropriate number of attempts for users based on organizationally-defined factors.
-
+
unsuccessful biometric logon attempts are limited to .
-
+
Access control policy
procedures addressing unsuccessful logon attempts on biometric devices
@@ -6227,7 +6315,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -6235,7 +6323,7 @@
-
+
Mechanisms implementing access control policy for unsuccessful logon attempts
@@ -6245,7 +6333,7 @@
Use of Alternate Authentication Factor
-
+
authentication factors
authentication factors allowed to be used that are different from the primary authentication factors are defined;
@@ -6253,7 +6341,7 @@
-
+
number
the number of consecutive, invalid logon attempts through the use of alternative factors for which to enforce a limit by a user is defined;
@@ -6261,14 +6349,15 @@
-
+
time period
time period during which a user can attempt logons through alternative factors is defined;
-
-
+
+
+
@@ -6288,14 +6377,14 @@
The use of alternate authentication factors supports the objective of availability and allows a user who has inadvertently been locked out to use additional authentication factors to bypass the lockout.
-
+
-
+
that are different from the primary authentication factors are allowed to be used after the number of organization-defined consecutive invalid logon attempts have been exceeded;
-
+
a limit of consecutive invalid logon attempts through the use of the alternative factors by the user during a is enforced.
@@ -6303,7 +6392,7 @@
-
+
Access control policy
procedures addressing unsuccessful logon attempts for primary and alternate authentication factors
@@ -6316,7 +6405,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -6324,7 +6413,7 @@
-
+
Mechanisms implementing access control policy for unsuccessful logon attempts
@@ -6336,7 +6425,7 @@
-
+
system use notification
system use notification message or banner to be displayed by the system to users before granting access to the system is defined;
@@ -6344,14 +6433,15 @@
-
+
conditions
conditions for system use to be displayed by the system before granting further access are defined;
-
-
+
+
+
@@ -6404,51 +6494,51 @@
System use notifications can be implemented using messages or warning banners displayed before individuals log in to systems. System use notifications are used only for access via logon interfaces with human users. Notifications are not required when human interfaces do not exist. Based on an assessment of risk, organizations consider whether or not a secondary system use notification is needed to access applications or other system resources after the initial network logon. Organizations consider system use notification messages or banners displayed in multiple languages based on organizational needs and the demographics of system users. Organizations consult with the privacy office for input regarding privacy messaging and the Office of the General Counsel or organizational equivalent for legal review and approval of warning banner content.
-
+
-
+
is displayed to users before granting access to the system that provides privacy and security notices consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;
-
+
the system use notification states that users are accessing a U.S. Government system;
-
+
the system use notification states that system usage may be monitored, recorded, and subject to audit;
-
+
the system use notification states that unauthorized use of the system is prohibited and subject to criminal and civil penalties; and
-
+
the system use notification states that use of the system indicates consent to monitoring and recording;
-
+
the notification message or banner is retained on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access the system;
-
+
-
+
for publicly accessible systems, system use information is displayed before granting further access to the publicly accessible system;
-
+
for publicly accessible systems, any references to monitoring, recording, or auditing that are consistent with privacy accommodations for such systems that generally prohibit those activities are displayed;
-
+
for publicly accessible systems, a description of the authorized uses of the system is included.
@@ -6458,7 +6548,7 @@
-
+
Access control policy
privacy and security policies, procedures addressing system use notification
@@ -6477,7 +6567,7 @@
-
+
System/network administrators
organizational personnel with information security and privacy responsibilities
@@ -6487,7 +6577,7 @@
-
+
Mechanisms implementing system use notification
@@ -6495,8 +6585,9 @@
Previous Logon Notification
-
-
+
+
+
@@ -6508,13 +6599,13 @@
Previous logon notification is applicable to system access via human user interfaces and access to systems that occurs in other types of architectures. Information about the last successful logon allows the user to recognize if the date and time provided is not consistent with the user’s last access.
-
+
the user is notified, upon successful logon to the system, of the date and time of the last logon.
-
+
Access control policy
procedures addressing previous logon notification
@@ -6527,7 +6618,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -6536,15 +6627,16 @@
-
+
Mechanisms implementing access control policy for previous logon notification
Unsuccessful Logons
-
-
+
+
+
@@ -6555,13 +6647,13 @@
Information about the number of unsuccessful logon attempts since the last successful logon allows the user to recognize if the number of unsuccessful logon attempts is consistent with the user’s actual logon attempts.
-
+
the user is notified, upon successful logon, of the number of unsuccessful logon attempts since the last successful logon.
-
+
Access control policy
procedures addressing previous logon notification
@@ -6574,7 +6666,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -6583,7 +6675,7 @@
-
+
Mechanisms implementing access control policy for previous logon notification
@@ -6593,7 +6685,7 @@
Successful and Unsuccessful Logons
-
+
successful logons
unsuccessful logon attempts
@@ -6602,14 +6694,15 @@
-
+
time period
the time period for which the system notifies the user of the number of successful logons, unsuccessful logon attempts, or both is defined;
-
-
+
+
+
@@ -6620,13 +6713,13 @@
Information about the number of successful and unsuccessful logon attempts within a specified time period allows the user to recognize if the number and type of logon attempts are consistent with the user’s actual logon attempts.
-
+
the user is notified, upon successful logon, of the number of during .
-
+
Access control policy
procedures addressing previous logon notification
@@ -6639,7 +6732,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -6648,7 +6741,7 @@
-
+
Mechanisms implementing access control policy for previous logon notification
@@ -6659,7 +6752,7 @@
-
+
security-related characteristics or parameters
changes to security-related characteristics or parameters of the user’s account that require notification are defined;
@@ -6667,14 +6760,15 @@
-
+
time period
the time period for which the system notifies the user of changes to security-related characteristics or parameters of the user’s account is defined;
-
-
+
+
+
@@ -6685,13 +6779,13 @@
Information about changes to security-related account characteristics within a specified time period allows users to recognize if changes were made without their knowledge.
-
+
the user is notified, upon successful logon, of changes to during .
-
+
Access control policy
procedures addressing previous logon notification
@@ -6704,7 +6798,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -6713,7 +6807,7 @@
-
+
Mechanisms implementing access control policy for previous logon notification
@@ -6723,14 +6817,15 @@
Additional Logon Information
-
+
additional information
additional information about which to notify the user is defined;
-
-
+
+
+
@@ -6741,13 +6836,13 @@
Organizations can specify additional information to be provided to users upon logon, including the location of the last logon. User location is defined as information that can be determined by systems, such as Internet Protocol (IP) addresses from which network logons occurred, notifications of local logons, or device identifiers.
-
+
the user is notified, upon successful logon, of .
-
+
Access control policy
procedures addressing previous logon notification
@@ -6760,7 +6855,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -6769,7 +6864,7 @@
-
+
Mechanisms implementing access control policy for previous logon notification
@@ -6781,7 +6876,7 @@
-
+
account and/or account types
accounts and/or account types for which to limit the number of concurrent sessions is defined;
@@ -6789,14 +6884,15 @@
-
+
number
the number of concurrent sessions to be allowed for each account and/or account type is defined;
-
-
+
+
+
@@ -6807,13 +6903,13 @@
Organizations may define the maximum number of concurrent sessions for system accounts globally, by account type, by account, or any combination thereof. For example, organizations may limit the number of concurrent sessions for system administrators or other individuals working in particularly sensitive domains or mission-critical applications. Concurrent session control addresses concurrent sessions for system accounts. It does not, however, address concurrent sessions by single users via multiple system accounts.
-
+
the number of concurrent sessions for each is limited to .
-
+
Access control policy
procedures addressing concurrent session control
@@ -6826,7 +6922,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -6835,7 +6931,7 @@
-
+
Mechanisms implementing access control policy for concurrent session control
@@ -6845,7 +6941,7 @@
Device Lock
-
+
initiating a device lock after of inactivity
requiring the user to initiate a device lock before leaving the system unattended
@@ -6853,14 +6949,15 @@
-
+
time period
time period of inactivity after which a device lock is initiated is defined (if selected);
-
-
+
+
+
@@ -6881,14 +6978,14 @@
Device locks are temporary actions taken to prevent logical access to organizational systems when users stop work and move away from the immediate vicinity of those systems but do not want to log out because of the temporary nature of their absences. Device locks can be implemented at the operating system level or at the application level. A proximity lock may be used to initiate the device lock (e.g., via a Bluetooth-enabled device or dongle). User-initiated device locking is behavior or policy-based and, as such, requires users to take physical action to initiate the device lock. Device locks are not an acceptable substitute for logging out of systems, such as when organizations require users to log out at the end of workdays.
-
+
-
+
further access to the system is prevented by ;
-
+
device lock is retained until the user re-establishes access using established identification and authentication procedures.
@@ -6896,7 +6993,7 @@
-
+
Access control policy
procedures addressing session lock
@@ -6910,7 +7007,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -6919,15 +7016,16 @@
-
+
Mechanisms implementing access control policy for session lock
Pattern-hiding Displays
-
-
+
+
+
@@ -6938,13 +7036,13 @@
The pattern-hiding display can include static or dynamic images, such as patterns used with screen savers, photographic images, solid colors, clock, battery life indicator, or a blank screen with the caveat that controlled unclassified information is not displayed.
-
+
information previously visible on the display is concealed, via device lock, with a publicly viewable image.
-
+
Access control policy
procedures addressing session lock
@@ -6957,7 +7055,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -6966,7 +7064,7 @@
-
+
System session lock mechanisms
@@ -6978,14 +7076,15 @@
-
+
conditions or trigger events
conditions or trigger events requiring session disconnect are defined;
-
-
+
+
+
@@ -6998,13 +7097,13 @@
Session termination addresses the termination of user-initiated logical sessions (in contrast to SC-10 , which addresses the termination of network connections associated with communications sessions (i.e., network disconnect)). A logical session (for local, network, and remote access) is initiated whenever a user (or process acting on behalf of a user) accesses an organizational system. Such user sessions can be terminated without terminating network sessions. Session termination ends all processes associated with a user’s logical session except for those processes that are specifically created by the user (i.e., session owner) to continue after the session is terminated. Conditions or trigger events that require automatic termination of the session include organization-defined periods of user inactivity, targeted responses to certain types of incidents, or time-of-day restrictions on system use.
-
+
a user session is automatically terminated after .
-
+
Access control policy
procedures addressing session termination
@@ -7018,7 +7117,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -7027,7 +7126,7 @@
-
+
Automated mechanisms implementing user session termination
@@ -7036,14 +7135,15 @@
User-initiated Logouts
-
+
information resources
information resources for which a logout capability for user-initiated communications sessions is required are defined;
-
-
+
+
+
@@ -7055,13 +7155,13 @@
Information resources to which users gain access via authentication include local workstations, databases, and password-protected websites or web-based services.
-
+
a logout capability is provided for user-initiated communications sessions whenever authentication is used to gain access to .
-
+
Access control policy
procedures addressing session termination
@@ -7075,7 +7175,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -7084,7 +7184,7 @@
-
+
System session termination mechanisms
logout capabilities for user-initiated communications sessions
@@ -7093,8 +7193,9 @@
Termination Message
-
-
+
+
+
@@ -7105,13 +7206,13 @@
Logout messages for web access can be displayed after authenticated sessions have been terminated. However, for certain types of sessions, including file transfer protocol (FTP) sessions, systems typically send logout messages as final messages prior to terminating sessions.
-
+
an explicit logout message is displayed to users indicating the termination of authenticated communication sessions.
-
+
Access control policy
procedures addressing session termination
@@ -7125,7 +7226,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -7134,7 +7235,7 @@
-
+
System session termination mechanisms
display of logout messages
@@ -7146,14 +7247,15 @@
-
+
time
time until the end of session for display to users is defined;
-
-
+
+
+
@@ -7164,13 +7266,13 @@
To increase usability, notify users of pending session termination and prompt users to continue the session. The pending session termination time period is based on the parameters defined in the AC-12 base control.
-
+
an explicit message to users is displayed indicating that the session will end in .
-
+
Access control policy
procedures addressing session termination
@@ -7184,7 +7286,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -7193,7 +7295,7 @@
-
+
System session termination mechanisms
display of end of session time
@@ -7203,8 +7305,9 @@
Supervision and Review — Access Control
-
-
+
+
+
@@ -7214,14 +7317,15 @@
Permitted Actions Without Identification or Authentication
-
+
user actions
user actions that can be performed on the system without identification or authentication are defined;
-
-
+
+
+
@@ -7241,21 +7345,21 @@
Specific user actions may be permitted without identification or authentication if organizations determine that identification and authentication are not required for the specified user actions. Organizations may allow a limited number of user actions without identification or authentication, including when individuals access public websites or other publicly accessible federal systems, when individuals use mobile phones to receive calls, or when facsimiles are received. Organizations identify actions that normally require identification or authentication but may, under certain circumstances, allow identification or authentication mechanisms to be bypassed. Such bypasses may occur, for example, via a software-readable physical switch that commands bypass of the logon functionality and is protected from accidental or unmonitored use. Permitting actions without identification or authentication does not apply to situations where identification and authentication have already occurred and are not repeated but rather to situations where identification and authentication have not yet occurred. Organizations may decide that there are no user actions that can be performed on organizational systems without identification and authentication, and therefore, the value for the assignment operation can be none.
-
+
-
+
that can be performed on the system without identification or authentication consistent with organizational mission and business functions are identified;
-
+
-
+
user actions not requiring identification or authentication are documented in the security plan for the system;
-
+
a rationale for user actions not requiring identification or authentication is provided in the security plan for the system.
@@ -7265,7 +7369,7 @@
-
+
Access control policy
procedures addressing permitted actions without identification or authentication
@@ -7279,7 +7383,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -7287,8 +7391,9 @@
Necessary Uses
-
-
+
+
+
@@ -7296,8 +7401,9 @@
Automated Marking
-
-
+
+
+
@@ -7335,56 +7441,56 @@
organization-defined frequency
-
+
types of security attributes
types of security attributes to be associated with information security attribute values for information in storage, in process, and/or in transmission are defined;
-
+
types of privacy attributes
types of privacy attributes to be associated with privacy attribute values for information in storage, in process, and/or in transmission are defined;
-
+
security attribute values
security attribute values for types of security attributes are defined;
-
+
privacy attribute values
privacy attribute values for types of privacy attributes are defined;
-
+
systems
systems for which permitted security attributes are to be established are defined;
-
+
systems
systems for which permitted privacy attributes are to be established are defined;
-
+
security attributes
security attributes defined as part of AC-16a that are permitted for systems are defined;
-
+
privacy attributes
privacy attributes defined as part of AC-16a that are permitted for systems are defined;
@@ -7393,28 +7499,29 @@
-
+
attribute values or ranges
attribute values or ranges for established attributes are defined;
-
+
frequency
the frequency at which to review security attributes for applicability is defined;
-
+
frequency
the frequency at which to review privacy attributes for applicability is defined;
-
-
+
+
+
@@ -7470,68 +7577,68 @@
Organizations can define the types of attributes needed for systems to support missions or business functions. There are many values that can be assigned to a security attribute. By specifying the permitted attribute ranges and values, organizations ensure that attribute values are meaningful and relevant. Labeling refers to the association of attributes with the subjects and objects represented by the internal data structures within systems. This facilitates system-based enforcement of information security and privacy policies. Labels include classification of information in accordance with legal and compliance requirements (e.g., top secret, secret, confidential, controlled unclassified), information impact level; high value asset information, access authorizations, nationality; data life cycle protection (i.e., encryption and data expiration), personally identifiable information processing permissions, including individual consent to personally identifiable information processing, and contractor affiliation. A related term to labeling is marking. Marking refers to the association of attributes with objects in a human-readable form and displayed on system media. Marking enables manual, procedural, or process-based enforcement of information security and privacy policies. Security and privacy labels may have the same value as media markings (e.g., top secret, secret, confidential). See MP-3 (Media Marking).
-
+
-
+
-
+
the means to associate with for information in storage, in process, and/or in transmission are provided;
-
+
the means to associate with for information in storage, in process, and/or in transmission are provided;
-
+
-
+
attribute associations are made;
-
+
attribute associations are retained with the information;
-
+
-
+
the following permitted security attributes are established from the attributes defined in AC-16_ODP[01] for : ;
-
+
the following permitted privacy attributes are established from the attributes defined in AC-16_ODP[02] for : ;
-
+
the following permitted attribute values or ranges for each of the established attributes are determined: ;
-
+
changes to attributes are audited;
-
+
-
+
are reviewed for applicability ;
-
+
are reviewed for applicability .
@@ -7541,7 +7648,7 @@
-
+
Access control policy
procedures addressing the association of security and privacy attributes to information in storage, in process, and in transmission
@@ -7555,7 +7662,7 @@
-
+
System/network administrators
organizational personnel with information security and privacy responsibilities
@@ -7564,7 +7671,7 @@
-
+
Organizational capability supporting and maintaining the association of security and privacy attributes to information in storage, in process, and in transmission
@@ -7584,49 +7691,50 @@
organization-defined security and privacy policies
-
+
subjects
subjects with which security attributes are to be dynamically associated as information is created and combined are defined;
-
+
objects
objects with which security attributes are to be dynamically associated as information is created and combined are defined;
-
+
subjects
subjects with which privacy attributes are to be dynamically associated as information is created and combined are defined;
-
+
objects
objects with which privacy attributes are to be dynamically associated as information is created and combined are defined;
-
+
security policies
security policies requiring dynamic association of security attributes with subjects and objects are defined;
-
+
privacy policies
privacy policies requiring dynamic association of privacy attributes with subjects and objects are defined;
-
-
+
+
+
@@ -7637,24 +7745,24 @@
Dynamic association of attributes is appropriate whenever the security or privacy characteristics of information change over time. Attributes may change due to information aggregation issues (i.e., characteristics of individual data elements are different from the combined elements), changes in individual access authorizations (i.e., privileges), changes in the security category of information, or changes in security or privacy policies. Attributes may also change situationally.
-
+
-
+
security attributes are dynamically associated with in accordance with the following security policies as information is created and combined: ;
-
+
security attributes are dynamically associated with in accordance with the following security policies as information is created and combined: ;
-
+
privacy attributes are dynamically associated with in accordance with the following privacy policies as information is created and combined: ;
-
+
privacy attributes are dynamically associated with in accordance with the following privacy policies as information is created and combined: .
@@ -7662,7 +7770,7 @@
-
+
Access control policy
procedures addressing dynamic association of security and privacy attributes to information
@@ -7676,7 +7784,7 @@
-
+
System/network administrators
organizational personnel with information security and privacy responsibilities
@@ -7685,7 +7793,7 @@
-
+
Automated mechanisms implementing dynamic association of security and privacy attributes to information
@@ -7693,8 +7801,9 @@
Attribute Value Changes by Authorized Individuals
-
-
+
+
+
@@ -7705,14 +7814,14 @@
The content or assigned values of attributes can directly affect the ability of individuals to access organizational information. Therefore, it is important for systems to be able to limit the ability to create or modify attributes to authorized individuals.
-
+
-
+
authorized individuals (or processes acting on behalf of individuals) are provided with the capability to define or change the value of associated security attributes;
-
+
authorized individuals (or processes acting on behalf of individuals) are provided with the capability to define or change the value of associated privacy attributes.
@@ -7720,7 +7829,7 @@
-
+
Access control policy
procedures addressing the change of security and privacy attribute values
@@ -7735,7 +7844,7 @@
-
+
Organizational personnel with responsibilities for changing values of security and privacy attributes
organizational personnel with information security and privacy responsibilities
@@ -7744,7 +7853,7 @@
-
+
Mechanisms permitting changes to values of security and privacy attributes
@@ -7765,49 +7874,50 @@
organization-defined subjects and objects
-
+
security attributes
security attributes that require association and integrity maintenance are defined;
-
+
privacy attributes
privacy attributes that require association and integrity maintenance are defined;
-
+
subjects
subjects requiring the association and integrity of security attributes to such subjects to be maintained are defined;
-
+
objects
objects requiring the association and integrity of security attributes to such objects to be maintained are defined;
-
+
subjects
subjects requiring the association and integrity of privacy attributes to such subjects to be maintained are defined;
-
+
objects
objects requiring the association and integrity of privacy attributes to such objects to be maintained are defined;
-
-
+
+
+
@@ -7818,24 +7928,24 @@
Maintaining the association and integrity of security and privacy attributes to subjects and objects with sufficient assurance helps to ensure that the attribute associations can be used as the basis of automated policy actions. The integrity of specific items, such as security configuration files, may be maintained through the use of an integrity monitoring mechanism that detects anomalies and changes that deviate from known good baselines. Automated policy actions include retention date expirations, access control decisions, information flow control decisions, and information disclosure decisions.
-
+
-
+
the association and integrity of to is maintained;
-
+
the association and integrity of to is maintained.
-
+
the association and integrity of to is maintained;
-
+
the association and integrity of to is maintained.
@@ -7843,7 +7953,7 @@
-
+
Access control policy
procedures addressing the association of security and privacy attributes to information
@@ -7857,7 +7967,7 @@
-
+
Organizational personnel with information security and privacy responsibilities
system developers
@@ -7865,7 +7975,7 @@
-
+
Mechanisms maintaining association and integrity of security and privacy attributes to information
@@ -7888,63 +7998,64 @@
organization-defined subjects and objects
-
+
security attributes
security attributes to be associated with subjects by authorized individuals (or processes acting on behalf of individuals) are defined;
-
+
security attributes
security attributes to be associated with objects by authorized individuals (or processes acting on behalf of individuals) are defined;
-
+
privacy attributes
privacy attributes to be associated with subjects by authorized individuals (or processes acting on behalf of individuals) are defined;
-
+
privacy attributes
privacy attributes to be associated with objects by authorized individuals (or processes acting on behalf of individuals) are defined;
-
+
subjects
subjects requiring the association of security attributes by authorized individuals (or processes acting on behalf of individuals) are defined;
-
+
objects
objects requiring the association of security attributes by authorized individuals (or processes acting on behalf of individuals) are defined;
-
+
subjects
subjects requiring the association of privacy attributes by authorized individuals (or processes acting on behalf of individuals) are defined;
-
+
objects
objects requiring the association of privacy attributes by authorized individuals (or processes acting on behalf of individuals) are defined;
-
-
+
+
+
@@ -7955,24 +8066,24 @@
Systems, in general, provide the capability for privileged users to assign security and privacy attributes to system-defined subjects (e.g., users) and objects (e.g., directories, files, and ports). Some systems provide additional capability for general users to assign security and privacy attributes to additional objects (e.g., files, emails). The association of attributes by authorized individuals is described in the design documentation. The support provided by systems can include prompting users to select security and privacy attributes to be associated with information objects, employing automated mechanisms to categorize information with attributes based on defined policies, or ensuring that the combination of the security or privacy attributes selected is valid. Organizations consider the creation, deletion, or modification of attributes when defining auditable events.
-
+
-
+
authorized individuals (or processes acting on behalf of individuals) are provided with the capability to associate with ;
-
+
authorized individuals (or processes acting on behalf of individuals) are provided with the capability to associate with ;
-
+
authorized individuals (or processes acting on behalf of individuals) are provided with the capability to associate with ;
-
+
authorized individuals (or processes acting on behalf of individuals) are provided with the capability to associate with .
@@ -7980,7 +8091,7 @@
-
+
Access control policy
procedures addressing the association of security and privacy attributes to information
@@ -7996,7 +8107,7 @@
-
+
Organizational personnel with responsibilities for associating security and privacy attributes to information
organizational personnel with information security and privacy responsibilities
@@ -8005,7 +8116,7 @@
-
+
Mechanisms supporting user associations of security and privacy attributes to information
@@ -8016,7 +8127,7 @@
-
+
instructions
special dissemination, handling, or distribution instructions to be used for each object that the system transmits to output devices are defined;
@@ -8025,14 +8136,15 @@
-
+
naming conventions
human-readable, standard naming conventions for the security and privacy attributes to be displayed in human-readable form on each object that the system transmits to output devices are defined;
-
-
+
+
+
@@ -8043,14 +8155,14 @@
System outputs include printed pages, screens, or equivalent items. System output devices include printers, notebook computers, video displays, smart phones, and tablets. To mitigate the risk of unauthorized exposure of information (e.g., shoulder surfing), the outputs display full attribute values when unmasked by the subscriber.
-
+
-
+
security attributes are displayed in human-readable form on each object that the system transmits to output devices to identify using ;
-
+
privacy attributes are displayed in human-readable form on each object that the system transmits to output devices to identify using .
@@ -8058,7 +8170,7 @@
-
+
Access control policy
procedures addressing display of security and privacy attributes in human-readable form
@@ -8074,7 +8186,7 @@
-
+
Organizational personnel with information security and privacy responsibilities
system developers
@@ -8082,7 +8194,7 @@
-
+
System output devices displaying security and privacy attributes in human-readable form on each object
@@ -8110,77 +8222,78 @@
organization-defined security and privacy policies
-
+
security attributes
security attributes to be associated with subjects are defined;
-
+
security attributes
security attributes to be associated with objects are defined;
-
+
privacy attributes
privacy attributes to be associated with subjects are defined;
-
+
privacy attributes
privacy attributes to be associated with objects are defined;
-
+
subjects
subjects to be associated with information security attributes are defined;
-
+
objects
objects to be associated with information security attributes are defined;
-
+
subjects
subjects to be associated with privacy attributes are defined;
-
+
objects
objects to be associated with privacy attributes are defined;
-
+
security policies
security policies that require personnel to associate and maintain the association of security and privacy attributes with subjects and objects;
-
+
privacy policies
privacy policies that require personnel to associate and maintain the association of security and privacy attributes with subjects and objects;
-
-
+
+
+
@@ -8191,24 +8304,24 @@
Maintaining attribute association requires individual users (as opposed to the system) to maintain associations of defined security and privacy attributes with subjects and objects.
-
+
-
+
personnel are required to associate and maintain the association of with in accordance with ;
-
+
personnel are required to associate and maintain the association of with in accordance with ;
-
+
personnel are required to associate and maintain the association of with in accordance with ;
-
+
personnel are required to associate and maintain the association of with in accordance with .
@@ -8216,7 +8329,7 @@
-
+
Access control policy
procedures addressing association of security and privacy attributes with subjects and objects
@@ -8227,7 +8340,7 @@
-
+
Organizational personnel with responsibilities for associating and maintaining association of security and privacy attributes with subjects and objects
organizational personnel with information security and privacy responsibilities
@@ -8236,7 +8349,7 @@
-
+
Mechanisms supporting associations of security and privacy attributes to subjects and objects
@@ -8244,8 +8357,9 @@
Consistent Attribute Interpretation
-
-
+
+
+
@@ -8256,14 +8370,14 @@
To enforce security and privacy policies across multiple system components in distributed systems, organizations provide a consistent interpretation of security and privacy attributes employed in access enforcement and flow enforcement decisions. Organizations can establish agreements and processes to help ensure that distributed system components implement attributes with consistent interpretations in automated access enforcement and flow enforcement actions.
-
+
-
+
a consistent interpretation of security attributes transmitted between distributed system components is provided;
-
+
a consistent interpretation of privacy attributes transmitted between distributed system components is provided.
@@ -8271,7 +8385,7 @@
-
+
Access control policies and procedures
procedures addressing consistent interpretation of security and privacy attributes transmitted between distributed system components
@@ -8287,7 +8401,7 @@
-
+
Organizational personnel with responsibilities for providing consistent interpretation of security and privacy attributes used in access enforcement and information flow enforcement actions
organizational personnel with information security and privacy responsibilities
@@ -8296,7 +8410,7 @@
-
+
Mechanisms implementing access enforcement and information flow enforcement functions
@@ -8310,21 +8424,22 @@
organization-defined techniques and technologies
-
+
techniques and technologies
techniques and technologies to be implemented in associating security attributes to information are defined;
-
+
techniques and technologies
techniques and technologies to be implemented in associating privacy attributes to information are defined;
-
-
+
+
+
@@ -8337,14 +8452,14 @@
The association of security and privacy attributes to information within systems is important for conducting automated access enforcement and flow enforcement actions. The association of such attributes to information (i.e., binding) can be accomplished with technologies and techniques that provide different levels of assurance. For example, systems can cryptographically bind attributes to information using digital signatures that support cryptographic keys protected by hardware devices (sometimes known as hardware roots of trust).
-
+
-
+
are implemented in associating security attributes to information;
-
+
are implemented in associating privacy attributes to information.
@@ -8352,7 +8467,7 @@
-
+
Access control policy
procedures addressing association of security and privacy attributes to information
@@ -8366,7 +8481,7 @@
-
+
Organizational personnel with responsibilities for associating security and privacy attributes to information
organizational personnel with information security and privacy responsibilities
@@ -8375,7 +8490,7 @@
-
+
Mechanisms implementing techniques or technologies associating security and privacy attributes to information
@@ -8389,21 +8504,22 @@
organization-defined techniques or procedures
-
+
techniques or procedures
techniques or procedures used to validate regrading mechanisms for security attributes are defined;
-
+
techniques or procedures
techniques or procedures used to validate regrading mechanisms for privacy attributes are defined;
-
-
+
+
+
@@ -8414,14 +8530,14 @@
A regrading mechanism is a trusted process authorized to re-classify and re-label data in accordance with a defined policy exception. Validated regrading mechanisms are used by organizations to provide the requisite levels of assurance for attribute reassignment activities. The validation is facilitated by ensuring that regrading mechanisms are single purpose and of limited function. Since security and privacy attribute changes can directly affect policy enforcement actions, implementing trustworthy regrading mechanisms is necessary to help ensure that such mechanisms perform in a consistent and correct mode of operation.
-
+
-
+
security attributes associated with information are changed only via regrading mechanisms validated using ;
-
+
privacy attributes associated with information are changed only via regrading mechanisms validated using .
@@ -8429,7 +8545,7 @@
-
+
Access control policy
procedures addressing reassignment of security attributes to information
@@ -8443,7 +8559,7 @@
-
+
Organizational personnel with responsibilities for reassigning association of security and privacy attributes to information
organizational personnel with information security and privacy responsibilities
@@ -8452,7 +8568,7 @@
-
+
Mechanisms implementing techniques or procedures for reassigning association of security and privacy attributes to information
@@ -8460,8 +8576,9 @@
Attribute Configuration by Authorized Individuals
-
-
+
+
+
@@ -8472,14 +8589,14 @@
The content or assigned values of security and privacy attributes can directly affect the ability of individuals to access organizational information. Thus, it is important for systems to be able to limit the ability to create or modify the type and value of attributes available for association with subjects and objects to authorized individuals only.
-
+
-
+
authorized individuals are provided with the capability to define or change the type and value of security attributes available for association with subjects and objects;
-
+
authorized individuals are provided with the capability to define or change the type and value of privacy attributes available for association with subjects and objects.
@@ -8487,7 +8604,7 @@
-
+
Access control policy
procedures addressing configuration of security and privacy attributes by authorized individuals
@@ -8501,7 +8618,7 @@
-
+
Organizational personnel with responsibilities for defining or changing security and privacy attributes associated with information
organizational personnel with information security and privacy responsibilities
@@ -8510,7 +8627,7 @@
-
+
Mechanisms implementing capability for defining or changing security and privacy attributes
@@ -8519,8 +8636,9 @@
Remote Access
-
-
+
+
+
@@ -8562,28 +8680,28 @@
Remote access is access to organizational systems (or processes acting on behalf of users) that communicate through external networks such as the Internet. Types of remote access include dial-up, broadband, and wireless. Organizations use encrypted virtual private networks (VPNs) to enhance confidentiality and integrity for remote connections. The use of encrypted VPNs provides sufficient assurance to the organization that it can effectively treat such connections as internal networks if the cryptographic mechanisms used are implemented in accordance with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines. Still, VPN connections traverse external networks, and the encrypted VPN does not enhance the availability of remote connections. VPNs with encrypted tunnels can also affect the ability to adequately monitor network communications traffic for malicious code. Remote access controls apply to systems other than public web servers or systems designed for public access. Authorization of each remote access type addresses authorization prior to allowing remote access without specifying the specific formats for such authorization. While organizations may use information exchange and system connection security agreements to manage remote access connections to other systems, such agreements are addressed as part of CA-3 . Enforcing access restrictions for remote access is addressed via AC-3 .
-
+
-
+
-
+
usage restrictions are established and documented for each type of remote access allowed;
-
+
configuration/connection requirements are established and documented for each type of remote access allowed;
-
+
implementation guidance is established and documented for each type of remote access allowed;
-
+
each type of remote access to the system is authorized prior to allowing such connections.
@@ -8591,7 +8709,7 @@
-
+
Access control policy
procedures addressing remote access implementation and usage (including restrictions)
@@ -8605,7 +8723,7 @@
-
+
Organizational personnel with responsibilities for managing remote access connections
system/network administrators
@@ -8614,15 +8732,16 @@
-
+
Remote access management capability for the system
Monitoring and Control
-
-
+
+
+
@@ -8638,14 +8757,14 @@
Monitoring and control of remote access methods allows organizations to detect attacks and help ensure compliance with remote access policies by auditing the connection activities of remote users on a variety of system components, including servers, notebook computers, workstations, smart phones, and tablets. Audit logging for remote access is enforced by AU-2 . Audit events are defined in AU-2a .
-
+
-
+
automated mechanisms are employed to monitor remote access methods;
-
+
automated mechanisms are employed to control remote access methods.
@@ -8653,7 +8772,7 @@
-
+
Access control policy
procedures addressing remote access to the system
@@ -8667,7 +8786,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -8676,7 +8795,7 @@
-
+
Automated mechanisms monitoring and controlling remote access methods
@@ -8684,8 +8803,9 @@
Protection of Confidentiality and Integrity Using Encryption
-
-
+
+
+
@@ -8699,13 +8819,13 @@
Virtual private networks can be used to protect the confidentiality and integrity of remote access sessions. Transport Layer Security (TLS) is an example of a cryptographic protocol that provides end-to-end communications security over networks and is used for Internet communications and online transactions.
-
+
cryptographic mechanisms are implemented to protect the confidentiality and integrity of remote access sessions.
-
+
Access control policy
procedures addressing remote access to the system
@@ -8719,7 +8839,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -8728,7 +8848,7 @@
-
+
Cryptographic mechanisms protecting confidentiality and integrity of remote access sessions
@@ -8736,8 +8856,9 @@
Managed Access Control Points
-
-
+
+
+
@@ -8749,13 +8870,13 @@
Organizations consider the Trusted Internet Connections (TIC) initiative DHS TIC requirements for external network connections since limiting the number of access control points for remote access reduces attack surfaces.
-
+
remote accesses are routed through authorized and managed network access control points.
-
+
Access control policy
procedures addressing remote access to the system
@@ -8769,7 +8890,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -8777,7 +8898,7 @@
-
+
Mechanisms routing all remote accesses through managed network access control points
@@ -8791,21 +8912,22 @@
organization-defined needs
-
+
needs requiring remote access
needs requiring execution of privileged commands via remote access are defined;
-
+
needs requiring remote access
needs requiring access to security-relevant information via remote access are defined;
-
-
+
+
+
@@ -8826,33 +8948,33 @@
Remote access to systems represents a significant potential vulnerability that can be exploited by adversaries. As such, restricting the execution of privileged commands and access to security-relevant information via remote access reduces the exposure of the organization and the susceptibility to threats by adversaries to the remote access capability.
-
+
-
+
-
+
the execution of privileged commands via remote access is authorized only in a format that provides assessable evidence;
-
+
access to security-relevant information via remote access is authorized only in a format that provides assessable evidence;
-
+
the execution of privileged commands via remote access is authorized only for the following needs: ;
-
+
access to security-relevant information via remote access is authorized only for the following needs: ;
-
+
the rationale for remote access is documented in the security plan for the system.
@@ -8860,7 +8982,7 @@
-
+
Access control policy
procedures addressing remote access to the system
@@ -8873,7 +8995,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -8881,7 +9003,7 @@
-
+
Mechanisms implementing remote access management
@@ -8889,16 +9011,18 @@
Monitoring for Unauthorized Connections
-
-
+
+
+
Protection of Mechanism Information
-
-
+
+
+
@@ -8912,13 +9036,13 @@
Remote access to organizational information by non-organizational entities can increase the risk of unauthorized use and disclosure about remote access mechanisms. The organization considers including remote access requirements in the information exchange agreements with other organizations, as applicable. Remote access requirements can also be included in rules of behavior (see PL-4 ) and access agreements (see PS-6 ).
-
+
information about remote access mechanisms is protected from unauthorized use and disclosure.
-
+
Access control policy
procedures addressing remote access to the system
@@ -8928,7 +9052,7 @@
-
+
Organizational personnel with responsibilities for implementing or monitoring remote access to the system
system users with knowledge of information about remote access mechanisms
@@ -8938,16 +9062,18 @@
Additional Protection for Security Function Access
-
-
+
+
+
Disable Nonsecure Network Protocols
-
-
+
+
+
@@ -8956,14 +9082,15 @@
Disconnect or Disable Access
-
+
time period
the time period within which to disconnect or disable remote access to the system is defined;
-
-
+
+
+
@@ -8974,13 +9101,13 @@
The speed of system disconnect or disablement varies based on the criticality of missions or business functions and the need to eliminate immediate or future remote access to systems.
-
+
the capability to disconnect or disable remote access to the system within is provided.
-
+
Access control policy
procedures addressing disconnecting or disabling remote access to the system
@@ -8993,7 +9120,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -9002,7 +9129,7 @@
-
+
Mechanisms implementing capability to disconnect or disable remote access to system
@@ -9012,7 +9139,7 @@
Authenticate Remote Commands
-
+
mechanisms
mechanisms implemented to authenticate remote commands are defined;
@@ -9020,14 +9147,15 @@
-
+
remote commands
remote commands to be authenticated by mechanisms are defined;
-
-
+
+
+
@@ -9041,13 +9169,13 @@
Authenticating remote commands protects against unauthorized commands and the replay of authorized commands. The ability to authenticate remote commands is important for remote systems for which loss, malfunction, misdirection, or exploitation would have immediate or serious consequences, such as injury, death, property damage, loss of high value assets, failure of mission or business functions, or compromise of classified or controlled unclassified information. Authentication mechanisms for remote commands ensure that systems accept and execute commands in the order intended, execute only authorized commands, and reject unauthorized commands. Cryptographic mechanisms can be used, for example, to authenticate remote commands.
-
+
are implemented to authenticate .
-
+
Access control policy
procedures addressing authentication of remote commands
@@ -9060,7 +9188,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -9069,7 +9197,7 @@
-
+
Mechanisms implementing authentication of remote commands
@@ -9078,8 +9206,9 @@
Wireless Access
-
-
+
+
+
@@ -9111,28 +9240,28 @@
Wireless technologies include microwave, packet radio (ultra-high frequency or very high frequency), 802.11x, and Bluetooth. Wireless networks use authentication protocols that provide authenticator protection and mutual authentication.
-
+
-
+
-
+
configuration requirements are established for each type of wireless access;
-
+
connection requirements are established for each type of wireless access;
-
+
implementation guidance is established for each type of wireless access;
-
+
each type of wireless access to the system is authorized prior to allowing such connections.
@@ -9140,7 +9269,7 @@
-
+
Access control policy
procedures addressing wireless access implementation and usage (including restrictions)
@@ -9155,7 +9284,7 @@
-
+
Organizational personnel with responsibilities for managing wireless access connections
organizational personnel with information security responsibilities
@@ -9163,7 +9292,7 @@
-
+
Wireless access management capability for the system
@@ -9172,14 +9301,15 @@
Authentication and Encryption
-
+
users
devices
-
-
+
+
+
@@ -9193,14 +9323,14 @@
Wireless networking capabilities represent a significant potential vulnerability that can be exploited by adversaries. To protect systems with wireless access points, strong authentication of users and devices along with strong encryption can reduce susceptibility to threats by adversaries involving wireless technologies.
-
+
-
+
wireless access to the system is protected using authentication of ;
-
+
wireless access to the system is protected using encryption.
@@ -9208,7 +9338,7 @@
-
+
Access control policy
procedures addressing wireless implementation and usage (including restrictions)
@@ -9221,7 +9351,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -9230,7 +9360,7 @@
-
+
Mechanisms implementing wireless access protections to the system
@@ -9238,16 +9368,18 @@
Monitoring Unauthorized Connections
-
-
+
+
+
Disable Wireless Networking
-
-
+
+
+
@@ -9259,13 +9391,13 @@
Wireless networking capabilities that are embedded within system components represent a significant potential vulnerability that can be exploited by adversaries. Disabling wireless capabilities when not needed for essential organizational missions or functions can reduce susceptibility to threats by adversaries involving wireless technologies.
-
+
when not intended for use, wireless networking capabilities embedded within system components are disabled prior to issuance and deployment.
-
+
Access control policy
procedures addressing wireless implementation and usage (including restrictions)
@@ -9278,7 +9410,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -9286,7 +9418,7 @@
-
+
Mechanisms managing the disabling of wireless networking capabilities internally embedded within system components
@@ -9294,8 +9426,9 @@
Restrict Configurations by Users
-
-
+
+
+
@@ -9308,14 +9441,14 @@
Organizational authorizations to allow selected users to configure wireless networking capabilities are enforced, in part, by the access enforcement mechanisms employed within organizational systems.
-
+
-
+
users allowed to independently configure wireless networking capabilities are identified;
-
+
users allowed to independently configure wireless networking capabilities are explicitly authorized.
@@ -9323,7 +9456,7 @@
-
+
Access control policy
procedures addressing wireless implementation and usage (including restrictions)
@@ -9336,7 +9469,7 @@
-
+
System/network administrators
organizational personnel with information security responsibilities
@@ -9344,7 +9477,7 @@
-
+