NIST 800-172A Assessment Procedure Explorer

Search

Family

ID Family Determination Statement
3.1.1e[a]Access Control

Critical or sensitive system and organizational operations for which dual authorization is to be enforced are identified.

3.1.1e[b]Access Control

Dual authorization is employed to execute critical or sensitive system and organizational operations.

3.1.2e[a]Access Control

Information resources that are owned, provisioned, or issued by the organization are identified.

3.1.2e[b]Access Control

Access to systems and system components is restricted to only those information resources that are owned, provisioned, or issued by the organization.

3.1.3e_ODP[1]Access Control

Secure information transfer solutions are defined.

3.1.3e[a]Access Control

Information flows between security domains on connected systems are identified.

3.1.3e[b]Access Control

<3.1.3e_ODP[1]: solutions> are employed to control information flows between security domains on connected systems.

3.2.1e_ODP[1]Awareness and Training

The frequency of providing awareness training is defined.

3.2.1e_ODP[2]Awareness and Training

The frequency of updating awareness training is defined.

3.2.1e[a]Awareness and Training

Threats from social engineering, advanced persistent threat actors, breaches, and suspicious behaviors are identified.

3.2.1e[b]Awareness and Training

Awareness training focused on recognizing and responding to threats from social engineering, advanced persistent threat actors, breaches, and suspicious behaviors is provided <3.2.1e_ODP[1]: frequency>.

3.2.1e[c]Awareness and Training

Significant changes to the threats from social engineering, advanced persistent threat actors, breaches, and suspicious behaviors are identified.

3.2.1e[d]Awareness and Training

Awareness training is updated <3.2.1e_ODP[2]: frequency> or when there are significant changes to the threat.

3.2.2e_ODP[1]Awareness and Training

Roles to be included in awareness training practical exercises are defined.

3.2.2e[a]Awareness and Training

Practical exercises are identified.

3.2.2e[b]Awareness and Training

Current threat scenarios are identified.

3.2.2e[c]Awareness and Training

Individuals involved in training and their supervisors are identified.

3.2.2e[d]Awareness and Training

Practical exercises that are aligned with current threat scenarios are included in awareness training for <3.2.2e_ODP[1]: roles>.

3.2.2e[e]Awareness and Training

Feedback is provided to individuals involved in the training and their supervisors.

3.4.1e[a]Configuration Management

Approved system components are identified.

3.4.1e[b]Configuration Management

Implemented system components are identified.

3.4.1e[c]Configuration Management

An authoritative source and repository are established to provide a trusted source and accountability for approved and implemented system components.

3.4.1e[d]Configuration Management

An authoritative source and repository are maintained to provide a trusted source and accountability for approved and implemented system components.

3.4.2e_ODP[1]Configuration Management

One or more of the following is/are selected: remove the components; place the components in a quarantine or remediation network.

3.4.2e[a]Configuration Management

Automated mechanisms to detect misconfigured or unauthorized system components are identified.

3.4.2e[b]Configuration Management

Automated mechanisms are employed to detect misconfigured or unauthorized system components.

3.4.2e[c]Configuration Management

Misconfigured or unauthorized system components are detected.

3.4.2e[d]Configuration Management

After detection, system components are <3.4.2.e_ODP[1]: removed and/or placed in a quarantine or remediation network> to facilitate patching, re-configuration, or other mitigations.

3.4.3e[a]Configuration Management

Automated discovery and management tools for the inventory of system components are identified.

3.4.3e[b]Configuration Management

An up-to-date, complete, accurate, and readily available inventory of system components exists.

3.4.3e[c]Configuration Management

Automated discovery and management tools are employed to maintain an up-to-date, complete, accurate, and readily available inventory of system components.

3.5.1e_ODP[1]Identification and Authentication

Systems and system components to identify and authenticate are defined.

3.5.1e[a]Identification and Authentication

Bidirectional authentication that is cryptographically-based is implemented.

3.5.1e[b]Identification and Authentication

Bidirectional authentication that is replay-resistant is implemented.

3.5.1e[c]Identification and Authentication

<3.5.1e_ODP[1]: systems and system components> are identified and authenticated before establishing a network connection using bidirectional authentication that is cryptographically-based and replay-resistant.

3.5.2e[a]Identification and Authentication

Systems and system components that do not support multifactor authentication or complex account management are identified.

3.5.2e[b]Identification and Authentication

Automated mechanisms for the generation, protection, rotation, and management of passwords for systems and system components that do not support multifactor authentication or complex account management are identified.

3.5.2e[c]Identification and Authentication

Automated mechanisms for the generation, protection, rotation, and management of passwords for systems and system components that do not support multifactor authentication or complex account management are employed.

3.5.3e[a]Identification and Authentication

System components that are known, authenticated, in a properly configured state, or in a trust profile are identified.

3.5.3e[b]Identification and Authentication

Automated or manual/procedural mechanisms to prohibit system components from connecting to organizational systems are identified.

3.5.3e[c]Identification and Authentication

Automated or manual/procedural mechanisms are employed to prohibit system components from connecting to organizational systems unless the components are known, authenticated, in a properly configured state, or in a trust profile.

3.6.1e_ODP[1]Incident Response

A time period to operate a security operations center capability is defined.

3.6.1e[a]Incident Response

A security operations center capability is established.

3.6.1e[b]Incident Response

The security operations center capability operates <3.6.1e_ODP[1]: time period>.

3.6.1e[c]Incident Response

The security operations center capability is maintained.

3.6.2e_ODP[1]Incident Response

A time period for deploying a cyber incident response team is defined.

3.6.2e[a]Incident Response

A cyber incident response team is established.

3.6.2e[b]Incident Response

The cyber incident response team can be deployed by the organization within <3.6.2e_ODP[1]: time period>.

3.6.2e[c]Incident Response

The cyber incident response team is maintained.

3.9.1e_ODP[1]Personnel Security

Enhanced personnel screening for individuals is defined.

3.9.1e_ODP[2]Personnel Security

The frequency with which to reassess individual positions and access to CUI is defined.

3.9.1e[a]Personnel Security

Individuals that require enhanced personnel screening are identified.

3.9.1e[b]Personnel Security

Positions that require access to CUI are identified.

3.9.1e[c]Personnel Security

<3.9.1e_ODP[1]: enhanced personnel screening> is conducted for individuals.

3.9.1e[d]Personnel Security

Individual positions and access to CUI is reassessed <3.9.1e_ODP[2]: frequency>.

3.9.2e[a]Personnel Security

Individuals with access to CUI are identified.

3.9.2e[b]Personnel Security

Adverse information about individuals with access to CUI is defined.

3.9.2e[c]Personnel Security

Organizational systems to which individuals have access are identified.

3.9.2e[d]Personnel Security

Mechanisms are in place to protect organizational systems if adverse information develops or is obtained about individuals with access to CUI.

3.11.1e_ODP[1]Risk Assessment

Sources of threat intelligence are defined.

3.11.1e[a]Risk Assessment

A risk assessment methodology is identified.

3.11.1e[b]Risk Assessment

<3.11.1e_ODP[1]: sources of threat intelligence> are employed as part of a risk assessment to guide and inform the development of organizational systems and security architectures.

3.11.1e[c]Risk Assessment

<3.11.1e_ODP[1]: sources of threat intelligence> are employed as part of a risk assessment to guide and inform the selection of security solutions.

3.11.1e[d]Risk Assessment

<3.11.1e_ODP[1]: sources of threat intelligence> are employed as part of a risk assessment to guide and inform system monitoring activities.

3.11.1e[e]Risk Assessment

<3.11.1e_ODP[1]: sources of threat intelligence> are employed as part of a risk assessment to guide and inform threat hunting activities.

3.11.2e_ODP[1]Risk Assessment

One or more of the following is/are selected: the frequency with which to conduct cyber threat hunting activities; the event triggering cyber threat hunting activities.

3.11.2e_ODP[2]Risk Assessment

The frequency with which to conduct cyber threat hunting activities is defined. (If selected in 3.11.2e_ODP[1])

3.11.2e_ODP[3]Risk Assessment

The event triggering cyber threat hunting activities is defined. (If selected in 3.11.2e_ODP[1])

3.11.2e_ODP[4]Risk Assessment

Organizational systems to search for indicators of compromise are defined.

3.11.2e[a]Risk Assessment

Indicators of compromise are identified.

3.11.2e[b]Risk Assessment

Cyber threat hunting activities are conducted <3.11.2e_ODP[2] frequency and/or 3.11.2e_ODP[3] event> to search for indicators of compromise in <3.11.2e_ODP[4]: systems>.

3.11.2e[c]Risk Assessment

Cyber threat hunting activities are conducted <3.11.2e_ODP[2] frequency and/or 3.11.2e_ODP[3] event> to detect, track, and disrupt threats that evade existing controls.

3.11.3e[a]Risk Assessment

Advanced automation and analytics capabilities to predict and identify risks to organizations, systems, and system components are identified.

3.11.3e[b]Risk Assessment

Analysts to predict and identify risks to organizations, systems, and system components are identified.

3.11.3e[c]Risk Assessment

Advanced automation and analytics capabilities are employed in support of analysts to predict and identify risks to organizations, systems, and system components.

3.11.4e[a]Risk Assessment

The system security plan documents or references the security solution selected.

3.11.4e[b]Risk Assessment

The system security plan documents or references the rationale for the security solution.

3.11.4e[c]Risk Assessment

The system security plan documents or references the risk determination.

3.11.5e_ODP[1]Risk Assessment

The frequency to assess the effectiveness of security solutions is defined.

3.11.5e[a]Risk Assessment

Security solutions are identified.

3.11.5e[b]Risk Assessment

Current and accumulated threat intelligence is identified.

3.11.5e[c]Risk Assessment

Anticipated risk to organizational systems and the organization based on current and accumulated threat intelligence is identified.

3.11.5e[d]Risk Assessment

The effectiveness of security solutions is assessed <3.11.5e_ODP[1]: frequency> to address anticipated risk to organizational systems and the organization based on current and accumulated threat intelligence.

3.11.6e[a]Risk Assessment

Supply chain risks associated with organizational systems and system components are identified.

3.11.6e[b]Risk Assessment

Supply chain risks associated with organizational systems and system components are assessed.

3.11.6e[c]Risk Assessment

Supply chain risks associated with organizational systems and system components are responded to.

3.11.6e[d]Risk Assessment

Supply chain risks associated with organizational systems and system components are monitored.

3.11.7e_ODP[1]Risk Assessment

The frequency for updating the supply chain risk management plan is defined.

3.11.7e[a]Risk Assessment

Supply chain risks associated with organizational systems and system components are identified.

3.11.7e[b]Risk Assessment

Organizational systems and system components to include in a supply chain risk management plan are identified.

3.11.7e[c]Risk Assessment

A plan for managing supply chain risks associated with organizational systems and system components is developed.

3.11.7e[d]Risk Assessment

The plan for managing supply chain risks is updated <3.11.7e_ODP[1]: frequency>.

3.12.1e_ODP[1]Security Assessment

The frequency to conduct penetration testing is defined.

3.12.1e[a]Security Assessment

Automated scanning tools are identified.

3.12.1e[b]Security Assessment

Ad hoc tests using subject matter experts are identified.

3.12.1e[c]Security Assessment

Penetration testing is conducted <3.12.1e_ODP[1]: frequency> leveraging automated scanning tools and ad hoc tests using subject matter experts.

3.13.1e_ODP[1]System and Communications Protection

System components that require diversity are defined.

3.13.1e[a]System and Communications Protection

Diversity in <3.13.1e_ODP[1]: system components> is created to reduce the extent of malicious code propagation.

3.13.2e_ODP[1]System and Communications Protection

Changes to organizational systems and system components to introduce a degree of unpredictability into operations are defined.

3.13.2e_ODP[2]System and Communications Protection

The frequency of changes by system and system components is defined.

3.13.2e[a]System and Communications Protection

Organizational systems and system components necessitating unpredictability are identified.

3.13.2e[b]System and Communications Protection

<3.13.2e_ODP[1]: changes> to organizational systems and system components are implemented <3.13.2e_ODP[2]: frequency> to introduce a degree of unpredictability into operations.

3.13.3e_ODP[1]System and Communications Protection

Technical and procedural means to confuse and mislead adversaries are defined.

3.13.3e[a]System and Communications Protection

<3.13.3e_ODP[1]: technical and procedural means> are employed to confuse and mislead adversaries.

3.13.4e_ODP[1]System and Communications Protection

One or more of the following is/are selected: physical isolation techniques; logical isolation techniques.

3.13.4e_ODP[2]System and Communications Protection

Physical isolation techniques are defined. (If selected in 3.13.4e_ODP[1])

3.13.4e_ODP[3]System and Communications Protection

Logical isolation techniques are defined. (If selected in 3.13.4e_ODP[1])

3.13.4e[a]System and Communications Protection

<3.13.4e_ODP[2]: physical isolation techniques and/or 3.13.4e_ODP[3] logical isolation techniques> are employed in organizational systems and system components.

3.13.5e_ODP[1]System and Communications Protection

System functions or resources to distribute and relocate are defined.

3.13.5e_ODP[2]System and Communications Protection

Frequency to distribute and relocate system functions or resources is defined.

3.13.5e[a]System and Communications Protection

<3.13.5e_ODP[1]: system functions or resources> are distributed and relocated <3.13.5e_ODP[2]: frequency>.

3.14.1e_ODP[1]System and Information Integrity

Security critical or essential software is defined.

3.14.1e[a]System and Information Integrity

Root of trust mechanisms or cryptographic signatures are identified.

3.14.1e[b]System and Information Integrity

The integrity of <3.14.1e_ODP[1]: security critical or essential software> is verified using root of trust mechanisms or cryptographic signatures.

3.14.2e[a]System and Information Integrity

Anomalous or suspicious behavior is defined.

3.14.2e[b]System and Information Integrity

Organizational systems and system components are monitored on an ongoing basis for anomalous or suspicious behavior.

3.14.3e_ODP[1]System and Information Integrity

Systems and system components included in the scope of the specified enhanced security requirements are identified.

3.14.3e[a]System and Information Integrity

<3.14.3e_ODP[1]: systems and system components> are included in the scope of the specified enhanced security requirements.

3.14.3e[b]System and Information Integrity

Systems and system components that are not included in <3.14.3e_ODP[1]: systems and system components> are segregated in purpose-specific networks.

3.14.4e_ODP[1]System and Information Integrity

Systems and system components to refresh from a known, trusted state are defined.

3.14.4e_ODP[2]System and Information Integrity

The frequency to refresh systems and systems components is defined.

3.14.4e[a]System and Information Integrity

A known, trusted state is identified for <3.14.4e_ODP[1]: systems and system components>.

3.14.4e[b]System and Information Integrity

<3.14.4e_ODP[1]: systems and system components> are refreshed from a known, trusted state .

3.14.5e_ODP[1]System and Information Integrity

The frequency with which to conduct reviews of persistent organizational storage locations is defined.

3.14.5e[a]System and Information Integrity

Persistent organizational storage locations are identified.

3.14.5e[b]System and Information Integrity

Reviews of persistent organizational storage locations are conducted <3.14.5e_ODP[1]: frequency> to identify CUI that is no longer needed.

3.14.5e[c]System and Information Integrity

CUI that is no longer needed is removed.

3.14.6e_ODP[1]System and Information Integrity

External organizations from which to obtain threat indicator information and effective mitigations are defined.

3.14.6e[a]System and Information Integrity

Threat indicator information is identified.

3.14.6e[b]System and Information Integrity

Effective mitigations are identified.

3.14.6e[c]System and Information Integrity

Intrusion detection approaches are identified.

3.14.6e[d]System and Information Integrity

Threat hunting activities are identified.

3.14.6e[e]System and Information Integrity

Threat indicator information and effective mitigations obtained from <3.14.6e_ODP[1]: external organizations> are used to guide and inform intrusion detection and threat hunting.

3.14.7e_ODP[1]System and Information Integrity

Security critical or essential software components for which to verify correctness are defined.

3.14.7e_ODP[2]System and Information Integrity

Security critical or essential firmware components for which to verify correctness are defined.

3.14.7e_ODP[3]System and Information Integrity

Security critical or essential hardware components for which to verify correctness are defined.

3.14.7e_ODP[4]System and Information Integrity

Verification methods or techniques are defined.

3.14.7e[a]System and Information Integrity

The correctness of <3.14.7e_ODP[1]: security critical or essential software components> is verified using <3.14.7e_ODP[4]: verification methods or techniques>.

3.14.7e[b]System and Information Integrity

The correctness of <3.14.7e_ODP[2]: security critical or essential firmware components> is verified using <3.14.7e_ODP[4]: verification methods or techniques>.

3.14.7e[c]System and Information Integrity

The correctness of <3.14.7e_ODP[3]: security critical or essential hardware components> is verified using <3.14.7e_ODP[4]: verification methods or techniques>.