NIST SP 800-53A
.pdfSpecial Publication 800-53A |
Guide for Assessing the Security Controls in |
|
Federal Information Systems and Organizations |
________________________________________________________________________________________________
PL-2(1) SYSTEM SECURITY PLAN
PL-2(1).1 ASSESSMENT OBJECTIVE:
Determine if:
(i)the organization develops a security Concept of Operations (CONOPS) for the information system containing, at a minimum:
-the purpose of the system;
-a description of the system architecture;
-the security authorization schedule; and
-the security categorization and associated factors considered in determining the categorization;
(ii)the organization defines the frequency of reviews and updates to the CONOPS; and
(iii)the organization reviews and updates the CONOPS in accordance with the organization-defined frequency.
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: Security planning policy; procedures addressing security CONOPS development; procedures addressing security CONOPS reviews and updates; security CONOPS for the information system; security plan for the information system; records of security CONOPS reviews and updates; other relevant documents or records].
Interview: [SELECT FROM: Organization personnel with security planning and plan implementation responsibilities for the information system].
PL-2(2) SYSTEM SECURITY PLAN
PL-2(2).1 ASSESSMENT OBJECTIVE:
Determine if the organization develops a functional architecture for the information system that identifies and maintains:
-external interfaces, the information being exchanged across the interfaces, and the protection mechanisms associated with each interface;
-user roles and the access privileges assigned to each role;
-unique security requirements;
-types of information processed, stored, or transmitted by the information system and any specific protection needs in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance; and
-restoration priority of information or information system services.
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: Security planning policy; access control policy; contingency planning policy; security plan for the information system; contingency plan for the information system; information system design documentation; other relevant documents or records].
Interview: [SELECT FROM: Organization personnel with security planning and plan implementation responsibilities for the information system].
APPENDIX F-PL |
PAGE F-201 |
Special Publication 800-53A |
Guide for Assessing the Security Controls in |
|
Federal Information Systems and Organizations |
________________________________________________________________________________________________
FAMILY: PLANNING |
CLASS: MANAGEMENT |
|
|
|
|
|
ASSESSMENT PROCEDURE |
|
|
|
|
PL-3 |
SYSTEM SECURITY PLAN UPDATE |
|
|
[Withdrawn: Incorporated into PL-2]. |
|
|
|
|
PL-3.1 |
ASSESSMENT OBJECTIVE: |
|
|
[Withdrawn: Incorporated into PL-2]. |
|
|
POTENTIAL ASSESSMENT METHODS AND OBJECTS: |
|
|
[Withdrawn: Incorporated into PL-2]. |
|
|
|
|
APPENDIX F-PL |
PAGE F-202 |
Special Publication 800-53A |
Guide for Assessing the Security Controls in |
|
Federal Information Systems and Organizations |
________________________________________________________________________________________________
FAMILY: PLANNING |
CLASS: MANAGEMENT |
||
|
|
|
|
|
|
ASSESSMENT PROCEDURE |
|
|
|
|
|
PL-4 |
RULES OF BEHAVIOR |
|
|
|
|
|
|
PL-4.1 |
ASSESSMENT OBJECTIVE: |
|
|
|
Determine if: |
|
|
|
(i) |
the organization establishes the rules that describe information system user |
|
|
|
responsibilities and expected behavior with regard to information and information |
|
|
|
system usage; |
|
|
(ii) |
the organization makes the rules available to all information system users; and |
|
|
(iii) |
the organization receives a signed acknowledgement from users indicating that they |
|
|
|
have read, understand, and agree to abide by the rules of behavior, before |
|
|
|
authorizing access to information and the information system. |
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: Security planning policy; procedures addressing rules of behavior for information system users; rules of behavior; other relevant documents or records].
Interview: [SELECT FROM: Organizational personnel who are authorized users of the information system and have signed rules of behavior].
PL-4(1) RULES OF BEHAVIOR
PL-4(1).1 ASSESSMENT OBJECTIVE:
Determine if the organization includes in the rules of behavior:
-explicit restrictions on the use of social networking sites;
-posting information on commercial Web sites; and
-sharing information system account information.
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: Security planning policy; procedures addressing rules of behavior for information system users; rules of behavior; other relevant documents or records].
Interview: [SELECT FROM: Organizational personnel who are authorized users of the information system and have signed rules of behavior].
APPENDIX F-PL |
PAGE F-203 |
Special Publication 800-53A |
Guide for Assessing the Security Controls in |
|
Federal Information Systems and Organizations |
________________________________________________________________________________________________
FAMILY: PLANNING |
CLASS: MANAGEMENT |
||
|
|
|
|
|
|
ASSESSMENT PROCEDURE |
|
|
|
|
|
PL-5 |
PRIVACY IMPACT ASSESSMENT |
|
|
|
|
|
|
PL-5.1 |
ASSESSMENT OBJECTIVE: |
|
|
|
Determine if: |
|
|
|
(i) |
the organization conducts a privacy impact assessment on the information system; |
|
|
|
and |
|
|
(ii) |
the privacy impact assessment is in accordance with OMB policy. |
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: Security planning policy; procedures addressing privacy impact assessments on the information system; privacy impact assessment; other relevant documents or records].
APPENDIX F-PL |
PAGE F-204 |
Special Publication 800-53A |
Guide for Assessing the Security Controls in |
|
Federal Information Systems and Organizations |
________________________________________________________________________________________________
FAMILY: PLANNING |
CLASS: MANAGEMENT |
|
|
|
|
|
ASSESSMENT PROCEDURE |
|
|
|
|
PL-6 |
SECURITY-RELATED ACTIVITY PLANNING |
|
|
|
|
PL-6.1 |
ASSESSMENT OBJECTIVE: |
|
|
Determine if the organization plans and coordinates security-related activities affecting |
|
|
the information system before conducting such activities in order to reduce the impact on |
|
|
organizational operations (i.e., mission, functions, image, and reputation), organizational |
|
|
assets, and individuals. |
|
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: Security planning policy; procedures addressing security-related activity planning for the information system; other relevant documents or records].
Interview: [SELECT FROM: Organizational personnel with security planning and plan implementation responsibilities].
APPENDIX F-PL |
PAGE F-205 |
Special Publication 800-53A |
Guide for Assessing the Security Controls in |
|
Federal Information Systems and Organizations |
________________________________________________________________________________________________
FAMILY: PROGRAM MANAGEMENT |
CLASS: MANAGEMENT |
||
|
|
|
|
|
|
ASSESSMENT PROCEDURE |
|
|
|
|
|
PM-1 |
INFORMATION SECURITY PROGRAM PLAN |
|
|
|
|
|
|
PM-1.1 |
ASSESSMENT OBJECTIVE: |
|
|
|
Determine if: |
|
|
|
(i) the organization develops an information security program plan for the organization |
||
|
|
that: |
|
|
|
- provides an overview of the requirements for the security program; |
|
|
|
- provides a description of the security program management controls and |
|
|
|
common controls in place or planned for meeting security program |
|
|
|
requirements; |
|
|
|
- provides sufficient information about the program management controls and |
|
|
|
common controls (including specification of parameters for any assignment and |
|
|
|
selection operations either explicitly or by reference) to enable an |
|
|
|
implementation that is unambiguously compliant with the intent of the plan and a |
|
|
|
determination of the risk to be incurred if the plan is implemented as intended; |
|
|
|
- includes roles, responsibilities, management commitment, coordination among |
|
|
|
organizational entities, and compliance; |
|
|
|
- is approved by a senior official with responsibility and accountability for the risk |
|
|
|
being incurred to organizational operations (including mission, functions, image, |
|
|
|
and reputation), organizational assets, individuals, other organizations and the |
|
|
|
Nation; |
|
|
(ii) |
the organization defines the frequency of information security program plan |
|
|
|
reviews; |
|
|
(iii) the organization reviews the organization-wide information security program plan |
||
|
|
in accordance with the organization-defined frequency; |
|
|
(iv) the organization revises the plan to address organizational changes and problems |
||
|
|
identified during plan implementation or security control assessments; and |
|
|
(v) |
the organization disseminates the most recent |
information security program plan to |
|
|
appropriate entities in the organization. |
|
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: Information security program policy; procedures addressing information security program plan development and implementation; procedures addressing information security program plan reviews and updates; information security program plan; program management controls documentation; common controls documentation; records of information security program plan reviews and updates; other relevant documents or records].
Interview: [SELECT FROM: Organizational personnel with security planning and plan implementation responsibilities for the information security program].
APPENDIX F-PM |
PAGE F-206 |
Special Publication 800-53A |
Guide for Assessing the Security Controls in |
|
Federal Information Systems and Organizations |
________________________________________________________________________________________________
FAMILY: PROGRAM MANAGEMENT |
CLASS: MANAGEMENT |
||
|
|
|
|
|
|
ASSESSMENT PROCEDURE |
|
|
|
|
|
PM-2 |
SENIOR INFORMATION SECURITY OFFICER |
|
|
|
|
|
|
PM-2.1 |
ASSESSMENT OBJECTIVE: |
|
|
|
Determine if: |
|
|
|
(i) |
organization appoints a senior information security officer to coordinate, develop, |
|
|
|
implement, and maintain an organization-wide information security program; and |
|
|
(ii) |
the organization empowers the senior information security officer with the mission |
|
|
|
and resources required to coordinate, develop, implement, and maintain an |
|
|
|
organization-wide information security program. |
|
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: Information security program policy; information security program plan; documentation addressing roles and responsibilities of the senior information security officer position; information security program mission statement; other relevant documents or records].
Interview: [SELECT FROM: Organizational person appointed to the senior information security officer position].
APPENDIX F-PM |
PAGE F-207 |
Special Publication 800-53A |
Guide for Assessing the Security Controls in |
|
Federal Information Systems and Organizations |
________________________________________________________________________________________________
FAMILY: PROGRAM MANAGEMENT |
CLASS: MANAGEMENT |
||
|
|
|
|
|
|
ASSESSMENT PROCEDURE |
|
|
|
|
|
PM-3 |
INFORMATION SECURITY RESOURCES |
|
|
|
|
|
|
PM-3.1 |
ASSESSMENT OBJECTIVE: |
|
|
|
Determine if: |
|
|
|
(i) |
the organization includes in its capital planning and investment requests the |
|
|
|
resources needed to implement the information security program; |
|
|
(ii) |
the organization documents all exceptions to the requirement that all capital |
|
|
|
planning and investment requests include the resources needed to implement the |
|
|
|
information security program; |
|
|
(iii) |
the organization employs a business case/Exhibit 300/Exhibit 53 to record the |
|
|
|
resources required; and |
|
|
(iv) |
the organization makes the required |
information security resources available for |
|
|
expenditure as planned. |
|
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: Information security program policy; capital planning and investment policy; procedures addressing management and oversight for information security-related aspects of the capital planning and investment control process; capital planning and investment documentation; documentation of exceptions supporting capital planning and investment requests; business cases; Exhibit 300; Exhibit 53; other relevant documents or records].
Interview: [SELECT FROM: Organizational personnel managing and overseeing the information securityrelated aspects of the capital planning and investment control process].
APPENDIX F-PM |
PAGE F-208 |
Special Publication 800-53A |
Guide for Assessing the Security Controls in |
|
Federal Information Systems and Organizations |
________________________________________________________________________________________________
FAMILY: PROGRAM MANAGEMENT |
CLASS: MANAGEMENT |
||
|
|
|
|
|
|
ASSESSMENT PROCEDURE |
|
|
|
|
|
PM-4 |
PLAN OF ACTION AND MILESTONES PROCESS |
|
|
|
|
|
|
PM-4.1 |
ASSESSMENT OBJECTIVE: |
|
|
|
Determine if: |
|
|
|
(i) |
the organization implements a process to maintain plans of action and milestones for |
|
|
|
the security program and the associated organizational information systems; and |
|
|
(ii) |
the organization implements a process to document the remedial information security |
|
|
|
actions that mitigate risk to organizational operations and assets, individuals, other |
|
|
|
organizations, and the Nation. |
|
POTENTIAL ASSESSMENT METHODS AND OBJECTS:
Examine: [SELECT FROM: Information security program policy; plan of action and milestones policy; procedures addressing plan of action and milestones process; plan of action and milestones for the security program; plan of action and milestones for organizational information systems; other relevant documents or records].
Interview: [SELECT FROM: Organizational personnel with plan of action and milestones development and implementation responsibilities].
APPENDIX F-PM |
PAGE F-209 |
Special Publication 800-53A |
Guide for Assessing the Security Controls in |
|
Federal Information Systems and Organizations |
________________________________________________________________________________________________
FAMILY: PROGRAM MANAGEMENT |
CLASS: MANAGEMENT |
|
|
|
|
|
ASSESSMENT PROCEDURE |
|
|
|
|
PM-5 |
INFORMATION SYSTEM INVENTORY |
|
|
|
|
PM-5.1 |
ASSESSMENT OBJECTIVE: |
|
|
Determine if: |
|
|
(i) the organization develops an inventory of its information systems; and |
|
|
(ii) the organization maintains an inventory of its information systems. |
|
|
POTENTIAL ASSESSMENT METHODS AND OBJECTS: |
|
|
Examine: [SELECT FROM: Information security program policy; procedures addressing information |
|
|
system inventory development and maintenance; information system inventory records, |
|
|
other relevant documents or records]. |
|
|
Interview: [SELECT FROM: Organizational personnel with information system inventory development |
|
|
and maintenance responsibilities]. |
|
|
|
|
APPENDIX F-PM |
PAGE F-210 |