|
|
| (18 intermediate revisions by the same user not shown) |
| Line 137: |
Line 137: |
|
| |
|
| == Access Control (AC) == | | == Access Control (AC) == |
| === '''AC.L1-B.1.I – AUTHORIZED ACCESS CONTROL [FCI DATA]''' === | | === AC.L1-B.1.I – Authorized Access Control [FCI Data] === |
| Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).
| |
| | |
| '''ASSESSMENT OBJECTIVES [NIST SP 800-171A][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#16|3 ]]'''
| |
| | |
| Determine if:
| |
| [a]
| |
| | |
| authorized users are identified;
| |
| | |
| [b]
| |
| | |
| processes acting on behalf of authorized users are identified;
| |
| | |
| [c]
| |
| | |
| devices (and other systems) authorized to connect to the system are identified;
| |
| | |
| [d]
| |
| | |
| system access is limited to authorized users;
| |
| | |
| [e]
| |
| | |
| system access is limited to processes acting on behalf of authorized users; and
| |
| | |
| [f]
| |
| | |
| system access is limited to authorized devices (including other systems).
| |
| | |
| '''POTENTIAL ASSESSMENT METHODS AND OBJECTS [NIST SP 800-171A]3 '''
| |
| | |
| '''Examine
| |
| '''[SELECT FROM: Access control policy; procedures addressing account management; system
| |
| | |
| security plan[[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#16|45]]; system design documentation; system configuration settings and associated
| |
| | |
| documentation; list of active system accounts and the name of the individual associated with
| |
| | |
| each account; notifications or records of recently transferred, separated, or terminated
| |
| | |
| employees; list of conditions for group and role membership; list of recently disabled system
| |
| | |
| accounts along with the name of the individual associated with each account; access
| |
| | |
| authorization records; account management compliance reviews; system monitoring
| |
| | |
| records; system audit logs and records; list of devices and systems authorized to connect to
| |
| | |
| organizational systems; other relevant documents or records].
| |
| | |
| '''Interview
| |
| '''[SELECT FROM: Personnel with account management responsibilities; system or network
| |
| | |
| administrators; personnel with information security responsibilities].
| |
| | |
|
| |
| | |
| 3
| |
| | |
| NIST SP 800-171A, p. 9
| |
| | |
| 4
| |
| | |
| It is recommended that an OSA develop a SSP as a best practice at Level 1, however, it is not required in order
| |
| | |
| to obtain a Level 1 self-assessment.
| |
| | |
|
| |
| | |
|
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| AC.L1-b.1.i – Authorized Access Control [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 13
| |
| | |
|
| |
| | |
| '''Test
| |
| '''[SELECT FROM: Organizational processes for managing system accounts; mechanisms for
| |
| | |
| implementing account management].
| |
| | |
| '''DISCUSSION [NIST SP 800-171 REV. 2][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#17|6]] '''
| |
| | |
| Access control policies (e.g., identity- or role-based policies, control matrices, and
| |
| | |
| cryptography) control access between active entities or subjects (i.e., users or processes
| |
| | |
| acting on behalf of users) and passive entities or objects (e.g., devices, files, records, and
| |
| | |
| domains) in systems. Access enforcement mechanisms can be employed at the application
| |
| | |
| and service level to provide increased information security. Other systems include systems
| |
| | |
| internal and external to the organization. This requirement focuses on account management
| |
| | |
| for systems and applications. The definition of and enforcement of access authorizations,
| |
| | |
| other than those determined by account type (e.g., privileged verses ''[sic] ''non-privileged) are
| |
| | |
| addressed in AC.L1-b.1.ii.
| |
| | |
| '''FURTHER DISCUSSION '''
| |
| | |
| Identify users, processes, and devices that are allowed to use company computers and can
| |
| | |
| log on to the company network. Automated updates and other automatic processes should
| |
| | |
| be associated with the user who initiated (authorized) the process. Limit the devices (e.g.,
| |
| | |
| printers) that can be accessed by company computers. Set up your system so that only
| |
| | |
| authorized users, processes, and devices can access the company network.
| |
| This requirement, AC.L1-b.1.i, controls system access based on user, process, or device
| |
| | |
| identity. AC.L1-b.1.i leverages IA.L1-b.1.v which provides a vetted and trusted identity for
| |
| | |
| access control.
| |
| | |
| '''Example 1
| |
| '''Your company maintains a list of all personnel authorized to use company information
| |
| | |
| systems [a]. This list is used to support identification and authentication activities conducted
| |
| | |
| by IT when authorizing access to systems [a,d].
| |
| | |
| '''Example 2
| |
| '''A coworker wants to buy a new multi-function printer/scanner/fax device and make it
| |
| | |
| available on the company network. You explain that the company controls system and device
| |
| | |
| access to the network, and will prevent network access by unauthorized systems and devices
| |
| | |
| [c]. You help the coworker submit a ticket that asks for the printer to be granted access to
| |
| | |
| the network, and appropriate leadership approves the device [f].
| |
| | |
| '''Potential Assessment Considerations
| |
| '''•
| |
| | |
| Is a list of authorized users maintained that defines their identities and roles [a]?
| |
| | |
|
| |
| | |
| 6
| |
| | |
| NIST SP 800-171 Rev. 2, p.10
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| AC.L1-b.1.i – Authorized Access Control [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 14
| |
| | |
|
| |
| | |
| •
| |
| | |
| Are account requests authorized before system access is granted [d,e,f]?
| |
| | |
| '''KEY REFERENCES '''
| |
| | |
| •
| |
| | |
| FAR Clause 52.204-21 b.1.i
| |
| | |
| •
| |
| | |
| NIST SP 800-171 Rev. 2 3.1.1
| |
| | |
|
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| AC.L1-b.1.ii – Transaction & Function Control [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 15
| |
| | |
|
| |
| | |
| '''AC.L1-B.1.II – TRANSACTION & FUNCTION CONTROL [FCI DATA] '''
| |
| | |
| Limit information system access to the types of transactions and functions that authorized
| |
| | |
| users are permitted to execute.
| |
| | |
| '''ASSESSMENT OBJECTIVES [NIST SP 800-171A][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#19|7 ]]'''
| |
| | |
| Determine if:
| |
| [a]
| |
| | |
| the types of transactions and functions that authorized users are permitted to
| |
| | |
| execute are defined; and
| |
| [b]
| |
| | |
| system access is limited to the defined types of transactions and functions for
| |
| | |
| authorized users.
| |
| | |
| '''POTENTIAL ASSESSMENT METHODS AND OBJECTS [NIST SP 800-171A]7 '''
| |
| | |
| '''Examine
| |
| '''[SELECT FROM: Access control policy; procedures addressing access enforcement; system
| |
| | |
| security plan; system design documentation; list of approved authorizations including
| |
| | |
| remote access authorizations; system audit logs and records; system configuration settings
| |
| | |
| and associated documentation; other relevant documents or records].
| |
| | |
| '''Interview
| |
| '''[SELECT FROM: Personnel with access enforcement responsibilities; system or network
| |
| | |
| administrators; personnel with information security responsibilities; system developers].
| |
| | |
| '''Test
| |
| '''[SELECT FROM: Mechanisms implementing access control policy].
| |
| | |
| '''DISCUSSION [NIST SP 800-171 REV. 2][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#19|8]] '''
| |
| | |
| Organizations may choose to define access privileges or other attributes by account, by type
| |
| | |
| of account, or a combination of both. System account types include individual, shared, group,
| |
| | |
| system, anonymous, guest, emergency, developer, manufacturer, vendor, and temporary.
| |
| | |
| Other attributes required for authorizing access include restrictions on time-of-day, day-of-
| |
| | |
| week, and point-of -origin. In defining other account attributes, organizations consider
| |
| | |
| system-related requirements (e.g., system upgrades scheduled maintenance,) and mission
| |
| | |
| or business requirements, (e.g., time zone differences, customer requirements, remote
| |
| | |
| access to support travel requirements).
| |
| | |
|
| |
| | |
| 7
| |
| | |
| NIST SP 800-171A, p. 9
| |
| | |
| 8
| |
| | |
| NIST SP 800-171 Rev. 2, pp. 10-11
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| AC.L1-b.1.ii – Transaction & Function Control [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 16
| |
| | |
|
| |
| | |
| '''FURTHER DISCUSSION '''
| |
| | |
| Limit users to only the information systems, roles, or applications they are permitted to use
| |
| | |
| and require for their roles and responsibilities. Limit access to applications and data based
| |
| | |
| on authorized users’ roles and responsibilities. Common types of functions a user can be
| |
| | |
| assigned are create, read, update, and delete.
| |
| | |
| '''Example
| |
| '''You supervise the team that manages DoD contracts for your company. Members of your
| |
| | |
| team need to access the contract information to perform their work properly. Because some
| |
| | |
| of that data contains FCI, you work with IT to set up your group’s systems so that users can
| |
| | |
| be assigned access based on their specific roles [a]. Each role limits whether an employee
| |
| | |
| has read-access or create/read/delete/update -access [b]. Implementing this access control
| |
| | |
| restricts access to FCI information unless specifically authorized.
| |
| | |
| '''Potential Assessment Considerations
| |
| '''•
| |
| | |
| Are access control lists used to limit access to applications and data based on role and/or
| |
| | |
| identity [a]?
| |
| | |
| •
| |
| | |
| Is access for authorized users restricted to those parts of the system they are explicitly
| |
| | |
| permitted to use, that is, is access denied by default and allowed by exception (e.g., a
| |
| | |
| person who only performs word-processing cannot access developer tools) [b]?
| |
| | |
| '''KEY REFERENCES '''
| |
| | |
| •
| |
| | |
| FAR Clause 52.204-21 b.1.ii
| |
| | |
| •
| |
| | |
| NIST SP 800-171 Rev. 2 3.1.2
| |
| | |
|
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| AC.L1-b.1.iii – External Connections [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 17
| |
| | |
|
| |
| | |
| '''AC.L1-B.1.III – EXTERNAL CONNECTIONS [FCI DATA] '''
| |
| | |
| Verify and control/limit connections to and use of external information systems.
| |
| | |
| '''ASSESSMENT OBJECTIVES [NIST SP 800-171A][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#21|9 ]]'''
| |
| | |
| Determine if:
| |
| [a]
| |
| | |
| connections to external systems are identified;
| |
| | |
| [b]
| |
| | |
| the use of external systems is identified;
| |
| | |
| [c]
| |
| | |
| connections to external systems are verified;
| |
| | |
| [d]
| |
| | |
| the use of external systems is verified;
| |
| | |
| [e]
| |
| | |
| connections to external systems are controlled/limited; and
| |
| | |
| [f]
| |
| | |
| the use of external systems is controlled/limited.
| |
| | |
| '''POTENTIAL ASSESSMENT METHODS AND OBJECTS [NIST SP 800-171A]9 '''
| |
| | |
| '''Examine
| |
| '''[SELECT FROM: Access control policy; procedures addressing the use of external systems;
| |
| | |
| terms and conditions for external systems; system security plan; list of applications
| |
| | |
| accessible from external systems; system configuration settings and associated
| |
| | |
| documentation; system connection or processing agreements; account management
| |
| | |
| documents; other relevant documents or records].
| |
| | |
| '''Interview
| |
| '''[SELECT FROM: Personnel with responsibilities for defining terms and conditions for use of
| |
| | |
| external systems to access organizational systems; system or network administrators;
| |
| | |
| personnel with information security responsibilities].
| |
| | |
| '''Test
| |
| '''[SELECT FROM: Mechanisms implementing terms and conditions on use of external
| |
| | |
| systems].
| |
| | |
| '''DISCUSSION [NIST SP 800-171 REV. 2][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#21|10]] '''
| |
| | |
| External systems are systems or components of systems for which organizations typically
| |
| | |
| have no direct supervision and authority over the application of security requirements and
| |
| | |
| controls or the determination of the effectiveness of implemented controls on those systems.
| |
| | |
| External systems include personally owned systems, components, or devices and privately-
| |
| | |
| owned computing and communications devices resident in commercial or public facilities.
| |
| | |
|
| |
| | |
| 9
| |
| | |
| NIST SP 800-171A, p. 17
| |
| | |
| 10
| |
| | |
| NIST SP 800-171 Rev. 2, pp. 15-16
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| AC.L1-b.1.iii – External Connections [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 18
| |
| | |
|
| |
| | |
| This requirement also addresses the use of external systems for the processing, storage, or
| |
| | |
| transmission of FCI, including accessing cloud services (e.g., infrastructure as a service,
| |
| | |
| platform as a service, or software as a service) from organizational systems.
| |
| Organizations establish terms and conditions for the use of external systems in accordance
| |
| | |
| with organizational security policies and procedures. Terms and conditions address as a
| |
| | |
| minimum, the types of applications that can be accessed on organizational systems from
| |
| | |
| external systems. If terms and conditions with the owners of external systems cannot be
| |
| | |
| established, organizations may impose restrictions on organizational personnel using those
| |
| | |
| external systems.
| |
| This requirement recognizes that there are circumstances where individuals using external
| |
| | |
| systems (e.g., contractors, coalition partners) need to access organizational systems. In those
| |
| | |
| situations, organizations need confidence that the external systems contain the necessary
| |
| | |
| controls so as not to compromise, damage, or otherwise harm organizational systems.
| |
| | |
| Verification that the required controls have been effectively implemented can be achieved
| |
| | |
| by third-party, independent assessments, attestations, or other means, depending on the
| |
| | |
| assurance or confidence level required by organizations.
| |
| Note that while “external” typically refers to outside of the organization’s direct supervision
| |
| | |
| and authority, that is not always the case. Regarding the protection of FCI across an
| |
| | |
| organization, the organization may have systems that process FCI and others that do not.
| |
| | |
| And among the systems that process FCI there are likely access restrictions for FCI that apply
| |
| | |
| between systems. Therefore, from the perspective of a given system, other systems within
| |
| | |
| the organization may be considered “external" to that system.
| |
| | |
| '''FURTHER DISCUSSION '''
| |
| | |
| Control and manage connections between your company network and outside networks.
| |
| | |
| Outside networks could include the public internet, one of your own company’s networks
| |
| | |
| that falls outside of your CMMC Assessment Scope (e.g., an isolated lab), or a network that
| |
| | |
| does not belong to your company. Tools to manage connections include firewalls and
| |
| | |
| connection allow/deny lists. External systems not controlled by your company could be
| |
| | |
| running applications that are prohibited or blocked. Control and limit access to corporate
| |
| | |
| networks from personally owned devices such as laptops, tablets, and phones. You may
| |
| | |
| choose to limit how and when your network is connected to outside systems or only allow
| |
| | |
| certain employees to connect to outside systems from network resources.
| |
| | |
| '''Example
| |
| '''Your company has just been awarded a contract which contains FCI. You remind your
| |
| | |
| coworkers of the policy requirement to use their company laptops, not personal laptops or
| |
| | |
| tablets, when working remotely on this contract [b,f]. You also remind everyone to work
| |
| | |
| from the cloud environment that is approved for processing and storing FCI rather than the
| |
| | |
| other collaborative tools that may be used for other projects [b,f].
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| AC.L1-b.1.iii – External Connections [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 19
| |
| | |
|
| |
| | |
| '''Potential Assessment Considerations
| |
| '''•
| |
| | |
| Are all connections to external systems outside of the assessment scope identified [a]?
| |
| | |
| •
| |
| | |
| Are external systems (e.g., systems managed by OSAs, partners, or vendors; personal
| |
| | |
| devices) that are permitted to connect to or make use of organizational systems
| |
| | |
| identified [b]?
| |
| | |
| •
| |
| | |
| Are methods employed to ensure that only authorized connections are being made to
| |
| | |
| external systems (e.g., requiring log-ins or certificates, access from a specific IP address,
| |
| | |
| or access via VPN) [c,e]?
| |
| | |
| •
| |
| | |
| Are methods employed to confirm that only authorized external systems are connecting
| |
| | |
| (e.g., if employees are receiving company email on personal cell phones, is the OSA
| |
| | |
| checking to verify that only known/expected devices are connecting) [d]?
| |
| | |
| •
| |
| | |
| Is the use of external systems limited, including by policy or physical control [f]?
| |
| | |
| '''KEY REFERENCES '''
| |
| | |
| •
| |
| | |
| FAR Clause 52.204-21 b.1.iii
| |
| | |
| •
| |
| | |
| NIST SP 800-171 Rev. 2 3.1.20
| |
| | |
|
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| AC.L1-b.1.iv – Control Public Information [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 20
| |
| | |
|
| |
| | |
| '''AC.L1-B.1.IV – CONTROL PUBLIC INFORMATION [FCI DATA] '''
| |
| | |
| Control information posted or processed on publicly accessible information systems.
| |
| | |
| '''ASSESSMENT OBJECTIVES [NIST SP 800-171A][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#24|11 ]]'''
| |
| | |
| Determine if:
| |
| [a]
| |
| | |
| individuals authorized to post or process information on publicly accessible systems
| |
| | |
| are identified;
| |
| [b]
| |
| | |
| procedures to ensure [FCI] is not posted or processed on publicly accessible
| |
| | |
| systems are identified;
| |
| [c]
| |
| | |
| a review process is in place prior to posting of any content to publicly accessible
| |
| | |
| systems;
| |
| [d]
| |
| | |
| content on publicly accessible systems is reviewed to ensure that it does not include
| |
| | |
| [FCI]; and
| |
| [e]
| |
| | |
| mechanisms are in place to remove and address improper posting of [FCI].
| |
| | |
| '''POTENTIAL ASSESSMENT METHODS AND OBJECTS [NIST SP 800-171A]11 '''
| |
| | |
| '''Examine
| |
| '''[SELECT FROM: Access control policy; procedures addressing publicly accessible content;
| |
| | |
| system security plan; list of users authorized to post publicly accessible content on
| |
| | |
| organizational systems; training materials and/or records; records of publicly accessible
| |
| | |
| information reviews; records of response to nonpublic information on public websites;
| |
| | |
| system audit logs and records; security awareness training records; other relevant
| |
| | |
| documents or records].
| |
| | |
| '''Interview
| |
| '''[SELECT FROM: Personnel with responsibilities for managing publicly accessible
| |
| | |
| information posted on organizational systems; personnel with information security
| |
| | |
| responsibilities].
| |
| | |
| '''Test
| |
| '''[SELECT FROM: Mechanisms implementing management of publicly accessible content].
| |
| | |
| '''DISCUSSION [NIST SP 800-171 REV. 2][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#24|12]] '''
| |
| | |
| In accordance with laws, Executive Orders, directives, policies, regulations, or standards, the
| |
| | |
| public is not authorized access to nonpublic information (e.g., information protected under
| |
| | |
| the Privacy Act, FCI, and proprietary information). This requirement addresses systems that
| |
| | |
|
| |
| | |
| 11
| |
| | |
| NIST SP 800-171A, p. 18
| |
| | |
| 12
| |
| | |
| NIST SP 800-171 Rev. 2, p. 16
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| AC.L1-b.1.iv – Control Public Information [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 21
| |
| | |
|
| |
| | |
| are controlled by the organization and accessible to the public, typically without
| |
| | |
| identification or authentication. Individuals authorized to post FCI onto publicly accessible
| |
| | |
| systems are designated. The content of information is reviewed prior to posting onto
| |
| | |
| publicly accessible systems to ensure that nonpublic information is not included.
| |
| | |
| '''FURTHER DISCUSSION '''
| |
| | |
| Only government officials can be authorized to publicly release FCI. Do not allow FCI to
| |
| | |
| become public – always safeguard the confidentiality of FCI by controlling the posting of FCI
| |
| | |
| on company-controlled websites or public forums and the exposure of FCI in public
| |
| | |
| presentations or on public displays. It is important to know which users are allowed to
| |
| | |
| publish information on publicly accessible systems, like your company website, and
| |
| | |
| implement a review process before posting such information. If FCI is discovered on a
| |
| | |
| publicly accessible system, procedures should be in place to remove that information and
| |
| | |
| alert the appropriate parties.
| |
| | |
| '''Example
| |
| '''Your company decides to start issuing press releases about its projects in an effort to reach
| |
| | |
| more potential customers. Your company receives FCI from the government as part of its
| |
| | |
| DoD contract. Because you recognize the need to manage controlled information, including
| |
| | |
| FCI, you meet with the employees who write the releases and post information to establish
| |
| | |
| a review process [c]. It is decided that you will review press releases for FCI before posting
| |
| | |
| it on the company website [a,d]. Only certain employees will be authorized to post to the
| |
| | |
| website [a].
| |
| | |
| '''Potential Assessment Considerations
| |
| '''•
| |
| | |
| Does information on externally facing systems (e.g., publicly accessible) have a
| |
| | |
| documented approval chain for public release [c]?
| |
| | |
| '''KEY REFERENCES '''
| |
| | |
| •
| |
| | |
| FAR Clause 52.204-21 b.1.iv
| |
| | |
| •
| |
| | |
| NIST SP 800-171 Rev. 2 3.1.22
| |
| | |
|
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| IA.L1-b.1.v – Identification [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 22
| |
| | |
|
| |
| | |
| Identification and Authentication (IA)
| |
| '''IA.L1-B.1.V – IDENTIFICATION [FCI DATA] '''
| |
| | |
| Identify information system users, processes acting on behalf of users, or devices.
| |
| | |
| '''ASSESSMENT OBJECTIVES [NIST SP 800-171A][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#26|13 ]]'''
| |
| | |
| Determine if:
| |
| [a]
| |
| | |
| system users are identified;
| |
| | |
| [b]
| |
| | |
| processes acting on behalf of users are identified; and
| |
| | |
| [c]
| |
| | |
| devices accessing the system are identified.
| |
| | |
| '''POTENTIAL ASSESSMENT METHODS AND OBJECTS [NIST SP 800-171A]13 '''
| |
| | |
| '''Examine
| |
| '''[SELECT FROM: Identification and authentication policy; procedures addressing user
| |
| | |
| identification and authentication; system security plan, system design documentation;
| |
| | |
| system configuration settings and associated documentation; system audit logs and records;
| |
| | |
| list of system accounts; other relevant documents or records].
| |
| | |
| '''Interview
| |
| '''[SELECT FROM: Personnel with system operations responsibilities; personnel with
| |
| | |
| information security responsibilities; system or network administrators; personnel with
| |
| | |
| account management responsibilities; system developers].
| |
| | |
| '''Test
| |
| '''[SELECT FROM: Organizational processes for uniquely identifying and authenticating users;
| |
| | |
| mechanisms supporting or implementing identification and authentication capability].
| |
| | |
| '''DISCUSSION [NIST SP 800-171 REV. 2][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#26|14]] '''
| |
| | |
| Common device identifiers include media access control (MAC), Internet Protocol (IP)
| |
| | |
| addresses, or device-unique token identifiers. Management of individual identifiers is not
| |
| | |
| applicable to shared system accounts. Typically, individual identifiers are the user names
| |
| | |
| associated with the system accounts assigned to those individuals. Organizations may
| |
| | |
| require unique identification of individuals in group accounts or for detailed accountability
| |
| | |
| of individual activity. In addition, this requirement addresses individual identifiers that are
| |
| | |
| not necessarily associated with system accounts. Organizational devices requiring
| |
| | |
|
| |
| | |
| 13
| |
| | |
| NIST SP 800-171A, p. 31
| |
| | |
| 14
| |
| | |
| NIST SP 800-171 Rev. 2, p. 23
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| IA.L1-b.1.v – Identification [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 23
| |
| | |
|
| |
| | |
| identification may be defined by type, by device, or by a combination of type/device.
| |
| | |
| NIST SP 800-63-3 provides guidance on digital identities.
| |
| | |
| '''FURTHER DISCUSSION '''
| |
| | |
| Individual, unique identifiers (e.g., user names) should be assigned to all users and processes
| |
| | |
| that access company systems. Authorized devices also should have unique identifiers.
| |
| | |
| Unique identifiers can be as simple as a short set of alphanumeric characters (e.g., SW001
| |
| | |
| could refer to a network switch, SW002 could refer to a different network switch).
| |
| This requirement, IA.L1-b.1.v, provides a vetted and trusted identity that supports the access
| |
| | |
| control mechanism required by AC.L1-b.1.i.
| |
| | |
| '''Example
| |
| '''You want to make sure that all employees working on a project can access important
| |
| | |
| information about it. Because this is work for the DoD and contains FCI, you also need to
| |
| | |
| prevent employees who are not working on that project from being able to access the
| |
| | |
| information. You assign each employee a unique user ID, which they use to log on to the
| |
| | |
| system [a].
| |
| | |
| '''Potential Assessment Considerations
| |
| '''•
| |
| | |
| Are unique identifiers issued to individual users (e.g., usernames) [a]?
| |
| | |
| •
| |
| | |
| Are the processes and service accounts that an authorized user initiates identified (e.g.,
| |
| | |
| scripts, automatic updates, configuration updates, vulnerability scans) [b]?
| |
| | |
| •
| |
| | |
| Are unique device identifiers used for devices that access the system identified [c]?
| |
| | |
| '''KEY REFERENCES'''
| |
| | |
| •
| |
| | |
| FAR Clause 52.204-21 b.1.v
| |
| | |
| •
| |
| | |
| NIST SP 800-171 Rev. 2 3.5.1
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| IA.L1-b.1.vi – Authentication [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 24
| |
| | |
|
| |
| | |
| '''IA.L1-B.1.VI – AUTHENTICATION [FCI DATA] '''
| |
| | |
| Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite
| |
| | |
| to allowing access to organizational information systems.
| |
| | |
| '''ASSESSMENT OBJECTIVES [NIST SP 800-171A][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#28|15 ]]'''
| |
| | |
| Determine if:
| |
| [a]
| |
| | |
| the identity of each user is authenticated or verified as a prerequisite to system
| |
| | |
| access;
| |
| [b]
| |
| | |
| the identity of each process acting on behalf of a user is authenticated or verified as
| |
| | |
| a prerequisite to system access; and
| |
| [c]
| |
| | |
| the identity of each device accessing or connecting to the system is authenticated or
| |
| | |
| verified as a prerequisite to system access.
| |
| | |
| '''POTENTIAL ASSESSMENT METHODS AND OBJECTS [NIST SP 800-171A]15 '''
| |
| | |
| '''Examine
| |
| '''[SELECT FROM: Identification and authentication policy; system security plan; procedures
| |
| | |
| addressing authenticator management; procedures addressing user identification and
| |
| | |
| authentication; system design documentation; list of system authenticator types; system
| |
| | |
| configuration settings and associated documentation; change control records associated
| |
| | |
| with managing system authenticators; system audit logs and records; other relevant
| |
| | |
| documents or records].
| |
| | |
| '''Interview
| |
| '''[SELECT FROM: Personnel with authenticator management responsibilities; personnel with
| |
| | |
| information security responsibilities; system or network administrators].
| |
| | |
| '''Test
| |
| '''[SELECT FROM: Mechanisms supporting or implementing authenticator management
| |
| | |
| capability].
| |
| | |
| '''DISCUSSION [NIST SP 800-171 REV. 2][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#28|16]] '''
| |
| | |
| Individual authenticators include the following: passwords, key cards, cryptographic
| |
| | |
| devices, and one-time password devices. Initial authenticator content is the actual content
| |
| | |
| of the authenticator, for example, the initial password. In contrast, the requirements about
| |
| | |
| authenticator content include the minimum password length. Developers ship system
| |
| | |
| components with factory default authentication credentials to allow for initial installation
| |
| | |
|
| |
| | |
| 15
| |
| | |
| NIST SP 800-171A, p. 31
| |
| | |
| 16
| |
| | |
| NIST SP 800-171 Rev. 2, p. 23
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| IA.L1-b.1.vi – Authentication [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 25
| |
| | |
|
| |
| | |
| and configuration. Default authentication credentials are often well known, easily
| |
| | |
| discoverable, and present a significant security risk.
| |
| Systems support authenticator management by organization-defined settings and
| |
| | |
| restrictions for various authenticator characteristics including minimum password length,
| |
| | |
| validation time window for time synchronous one-time tokens, and number of allowed
| |
| | |
| rejections during the verification stage of biometric authentication. Authenticator
| |
| | |
| management includes issuing and revoking, when no longer needed, authenticators for
| |
| | |
| temporary access such as that required for remote maintenance. Device authenticators
| |
| | |
| include certificates and passwords.
| |
| NIST SP 800-63-3 provides guidance on digital identities.
| |
| | |
| '''FURTHER DISCUSSION '''
| |
| | |
| Before a person or device is given system access, verify that the user or device is who or what
| |
| | |
| it claims to be. This verification is called authentication. The most common way to verify
| |
| | |
| identity is using a username and a hard-to-guess password.
| |
| Some devices ship with a default username (e.g., admin) and password. A default username
| |
| | |
| and password should be immediately changed to something unique. Default passwords may
| |
| | |
| be well known to the public, easily found in a search, or easy to guess, allowing an
| |
| | |
| unauthorized person to access the system.
| |
| | |
| '''Example 1
| |
| '''You are in charge of purchasing laptops that will store FCI. You know that some laptops come
| |
| | |
| with a default username and password. You notify IT that all default passwords should be
| |
| | |
| reset prior to laptop use [a]. You ask IT to explain the importance of resetting default
| |
| | |
| passwords and convey how easily they are discovered using internet searches during next
| |
| | |
| week’s cybersecurity awareness training.
| |
| | |
| '''Example 2
| |
| '''Your company decides to use cloud services for email and other capabilities that will
| |
| | |
| transmit FCI. Upon reviewing this requirement, you realize every user or device that
| |
| | |
| connects to the cloud service must be authenticated. As a result, you work with your cloud
| |
| | |
| service provider to ensure that only properly authenticated users and devices are allowed
| |
| | |
| to connect to the system [a,c].
| |
| | |
| '''Potential Assessment Considerations
| |
| '''•
| |
| | |
| Are unique authenticators used to verify user identities (e.g., usernames and passwords)
| |
| | |
| [a]?
| |
| | |
| •
| |
| | |
| An example of a process acting on behalf of users could be a script that logs in as a person
| |
| | |
| or service account [b]. Can the OSA show that it maintains a record of all of those service
| |
| | |
| accounts for use when reviewing log data or responding to an incident?
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| IA.L1-b.1.vi – Authentication [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 26
| |
| | |
|
| |
| | |
| •
| |
| | |
| Are user credentials authenticated in system processes (e.g., credentials binding,
| |
| | |
| certificates, tokens) [b]?
| |
| | |
| •
| |
| | |
| Are device identifiers used in authentication processes (e.g., MAC address, non-
| |
| | |
| anonymous computer name, certificates) [c]?
| |
| | |
| '''KEY REFERENCES '''
| |
| | |
| •
| |
| | |
| FAR Clause 52.204-21 b.1.vi
| |
| | |
| •
| |
| | |
| NIST SP 800-171 Rev. 2 3.5.2
| |
| | |
|
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| MP.L1-b.1.vii – Media Disposal [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 27
| |
| | |
|
| |
| | |
| Media Protection (MP)
| |
| '''MP.L1-B.1.VII – MEDIA DISPOSAL [FCI DATA] '''
| |
| | |
| Sanitize or destroy information system media containing Federal Contract Information
| |
| | |
| before disposal or release for reuse.
| |
| | |
| '''ASSESSMENT OBJECTIVES [NIST SP 800-171A][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#31|17 ]]'''
| |
| | |
| Determine if:
| |
| [a]
| |
| | |
| system media containing [FCI] is sanitized or destroyed before disposal; and
| |
| | |
| [b]
| |
| | |
| system media containing [FCI] is sanitized before it is released for reuse.
| |
| | |
| '''POTENTIAL ASSESSMENT METHODS AND OBJECTS [NIST SP 800-171A][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#31|18 ]]'''
| |
| | |
| '''Examine
| |
| '''[SELECT FROM: System media protection policy; procedures addressing media sanitization
| |
| | |
| and disposal; applicable standards and policies addressing media sanitization; system
| |
| | |
| security plan; media sanitization records; system audit logs and records; system design
| |
| | |
| documentation; system configuration settings and associated documentation; other relevant
| |
| | |
| documents or records].
| |
| | |
| '''Interview
| |
| '''[SELECT FROM: Personnel with media sanitization responsibilities; personnel with
| |
| | |
| information security responsibilities; system or network administrators].
| |
| | |
| '''Test
| |
| '''[SELECT FROM: Organizational processes for media sanitization; mechanisms supporting or
| |
| | |
| implementing media sanitization].
| |
| | |
| '''DISCUSSION [NIST SP 800-171 REV. 2][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#31|19]] '''
| |
| | |
| This requirement applies to all system media, digital and non-digital, subject to disposal or
| |
| | |
| reuse. Examples include: digital media found in workstations, network components,
| |
| | |
| scanners, copiers, printers, notebook computers, and mobile devices; and non-digital media
| |
| | |
| such as paper and microfilm. The sanitization process removes information from the media
| |
| | |
| such that the information cannot be retrieved or reconstructed. Sanitization techniques,
| |
| | |
| including clearing, purging, cryptographic erase, and destruction, prevent the disclosure of
| |
| | |
| information to unauthorized individuals when such media is released for reuse or disposal.
| |
| | |
|
| |
| | |
| 17
| |
| | |
| NIST SP 800-171A, p. 41
| |
| | |
| 18
| |
| | |
| NIST SP 800-171A, p. 42
| |
| | |
| 19
| |
| | |
| NIST SP 800-171 Rev. 2, p. 29
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| MP.L1-b.1.vii – Media Disposal [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 28
| |
| | |
|
| |
| | |
| Organizations determine the appropriate sanitization methods, recognizing that destruction
| |
| | |
| may be necessary when other methods cannot be applied to the media requiring sanitization.
| |
| Organizations use discretion on the employment of sanitization techniques and procedures
| |
| | |
| for media containing information that is in the public domain or publicly releasable or
| |
| | |
| deemed to have no adverse impact on organizations or individuals if released for reuse or
| |
| | |
| disposal. Sanitization of non-digital media includes destruction, removing FCI from
| |
| | |
| documents, or redacting selected sections or words from a document by obscuring the
| |
| | |
| redacted sections or words in a manner equivalent in effectiveness to removing the words
| |
| | |
| or sections from the document. NARA policy and guidance control sanitization processes.
| |
| | |
| NIST SP 800-88 provides guidance on media sanitization.
| |
| | |
| '''FURTHER DISCUSSION '''
| |
| | |
| Media can include a broad range of items that store information, including paper documents,
| |
| | |
| disks, tapes, digital photography, USB drives, CDs, DVDs, and mobile phones. It is important
| |
| | |
| to know what information is on media so that you can handle it properly. If there is FCI, you
| |
| | |
| or someone in your company should either:
| |
| •
| |
| | |
| shred or destroy the device before disposal so it cannot be read; or
| |
| | |
| •
| |
| | |
| clean or purge the information, if you want to reuse the device.
| |
| | |
| See NIST Special Publication 800-88, Revision 1, ''Guidelines for Media Sanitization'', for more
| |
| | |
| information.
| |
| | |
| '''Example
| |
| '''As you pack for an office move, you find some old CDs in a file cabinet. You determine that
| |
| | |
| one has FCI from a project your company did for the DoD. You shred the CD rather than
| |
| | |
| simply throwing it in the trash [a].
| |
| | |
| '''Potential Assessment Considerations
| |
| '''•
| |
| | |
| Is all managed data storage erased, encrypted, or destroyed using mechanisms to ensure
| |
| | |
| that no usable data is retrievable [a,b]?
| |
| | |
| '''KEY REFERENCES '''
| |
| | |
| •
| |
| | |
| FAR Clause 52.204-21 b.1.vii
| |
| | |
| •
| |
| | |
| NIST SP 800-171 Rev. 2 3.8.3
| |
| | |
|
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| PE.L1-b.1.viii – Limit Physical Access [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 29
| |
| | |
|
| |
| | |
| Physical Protection (PE)
| |
| '''PE.L1-B.1.VIII – LIMIT PHYSICAL ACCESS [FCI DATA] '''
| |
| | |
| Limit physical access to organizational information systems, equipment, and the respective
| |
| | |
| operating environments to authorized individuals.
| |
| | |
| '''ASSESSMENT OBJECTIVES [NIST SP 800-171A][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#33|20 ]]'''
| |
| | |
| Determine if:
| |
| [a]
| |
| | |
| authorized individuals allowed physical access are identified;
| |
| | |
| [b]
| |
| | |
| physical access to organizational systems is limited to authorized individuals;
| |
| | |
| [c]
| |
| | |
| physical access to equipment is limited to authorized individuals; and
| |
| | |
| [d]
| |
| | |
| physical access to operating environments is limited to authorized individuals.
| |
| | |
| '''POTENTIAL ASSESSMENT METHODS AND OBJECTS [NIST SP 800-171A]20 '''
| |
| | |
| '''Examine
| |
| '''[SELECT FROM: Physical and environmental protection policy; procedures addressing
| |
| | |
| physical access authorizations; system security plan; authorized personnel access list;
| |
| | |
| authorization credentials; physical access list reviews; physical access termination records
| |
| | |
| and associated documentation; other relevant documents or records].
| |
| | |
| '''Interview
| |
| '''[SELECT FROM: Personnel with physical access authorization responsibilities; personnel
| |
| | |
| with physical access to system facility; personnel with information security responsibilities].
| |
| | |
| '''Test
| |
| '''[SELECT FROM: Organizational processes for physical access authorizations; mechanisms
| |
| | |
| supporting or implementing physical access authorizations].
| |
| | |
| '''DISCUSSION [NIST SP 800-171 REV. 2][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#33|21]] '''
| |
| | |
| This requirement applies to employees, individuals with permanent physical access
| |
| | |
| authorization credentials, and visitors. Authorized individuals have credentials that include
| |
| | |
| badges, identification cards, and smart cards. Organizations determine the strength of
| |
| | |
| authorization credentials needed consistent with applicable laws, directives, policies,
| |
| | |
|
| |
| | |
| 20
| |
| | |
| NIST SP 800-171A, p. 46
| |
| | |
| 21
| |
| | |
| NIST SP 800-171 Rev. 2, p. 32
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| PE.L1-b.1.viii – Limit Physical Access [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 30
| |
| | |
|
| |
| | |
| regulations, standards, procedures, and guidelines. This requirement applies only to areas
| |
| | |
| within facilities that have not been designated as publicly accessible.
| |
| Limiting physical access to equipment may include placing equipment in locked rooms or
| |
| | |
| other secured areas and allowing access to authorized individuals only, and placing
| |
| | |
| equipment in locations that can be monitored by organizational personnel. Computing
| |
| | |
| devices, external disk drives, networking devices, monitors, printers, copiers, scanners,
| |
| | |
| facsimile machines, and audio devices are examples of equipment.
| |
| | |
| '''FURTHER DISCUSSION '''
| |
| | |
| This addresses the company’s physical space (e.g., office, testing environments, equipment
| |
| | |
| rooms), technical assets, and non-technical assets that need to be protected from
| |
| | |
| unauthorized physical access. Specific environments are limited to authorized employees,
| |
| | |
| and access is controlled with badges, electronic locks, physical key locks, etc.
| |
| Output devices, such as printers, are placed in areas where their use does not expose data to
| |
| | |
| unauthorized individuals. Lists of personnel with authorized access are developed and
| |
| | |
| maintained, and personnel are issued appropriate authorization credentials.
| |
| | |
| '''Example
| |
| '''You manage a DoD project that stores FCI on computers used only by project team members
| |
| | |
| [b,c]. You work with the facilities manager to put locks on the doors to the areas where the
| |
| | |
| computers are stored and used [b,c,d]. Project team members are the only individuals issued
| |
| | |
| with keys to the space. This restricts access to only those employees who work on the DoD
| |
| | |
| project and require access.
| |
| | |
| '''Potential Assessment Considerations
| |
| '''•
| |
| | |
| Are lists of personnel with authorized access developed and maintained, and are
| |
| | |
| appropriate authorization credentials issued [a]?
| |
| | |
| •
| |
| | |
| Has the facility/building manager designated building areas as “sensitive” and designed
| |
| | |
| physical security protections (e.g., guards, locks, cameras, card readers) to limit physical
| |
| | |
| access to the area to only authorized employees [b,c,d]?
| |
| | |
| •
| |
| | |
| Are output devices such as printers placed in areas where their use does not expose data
| |
| | |
| to unauthorized individuals [c]?
| |
| | |
| '''KEY REFERENCES '''
| |
| | |
| •
| |
| | |
| FAR Clause 52.204-21 b.1.viii
| |
| | |
| •
| |
| | |
| NIST SP 800-171 Rev. 2 3.10.1
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| PE.L1-b.1.ix – Manage Visitors & Physical Access [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 31
| |
| | |
|
| |
| | |
| '''PE.L1-B.1.IX – MANAGE VISITORS & PHYSICAL ACCESS [FCI DATA] '''
| |
| | |
| Escort visitors and monitor visitor activity; maintain audit logs of physical access; and
| |
| | |
| control and manage physical access devices.
| |
| | |
| '''ASSESSMENT OBJECTIVES [NIST SP 800-171A][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#35|22 ]]'''
| |
| | |
| Determine if:
| |
| [a]
| |
| | |
| visitors are escorted;
| |
| | |
| [b]
| |
| | |
| visitor activity is monitored;
| |
| | |
| [c]
| |
| | |
| audit logs of physical access are maintained;
| |
| | |
| [d]
| |
| | |
| physical access devices are identified;
| |
| | |
| [e]
| |
| | |
| physical access devices are controlled; and
| |
| | |
| [f]
| |
| | |
| physical access devices are managed.
| |
| | |
| '''POTENTIAL ASSESSMENT METHODS AND OBJECTS [NIST SP 800-171A][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#35|23 ]]'''
| |
| | |
| '''Examine
| |
| '''[SELECT FROM: Physical and environmental protection policy; procedures addressing
| |
| | |
| physical access control; system security plan; physical access control logs or records;
| |
| | |
| inventory records of physical access control devices; system entry and exit points; records
| |
| | |
| of key and lock combination changes; storage locations for physical access control devices;
| |
| | |
| physical access control devices; list of security safeguards controlling access to designated
| |
| | |
| publicly accessible areas within facility; other relevant documents or records].
| |
| | |
| '''Interview
| |
| '''[SELECT FROM: Personnel with physical access control responsibilities; personnel with
| |
| | |
| information security responsibilities].
| |
| | |
| '''Test
| |
| '''[SELECT FROM: Organizational processes for physical access control; mechanisms
| |
| | |
| supporting or implementing physical access control; physical access control devices].
| |
| | |
| '''DISCUSSION [NIST SP 800-171 REV. 2][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#35|24]] '''
| |
| | |
| Individuals with permanent physical access authorization credentials are not considered
| |
| | |
| visitors. Audit logs can be used to monitor visitor activity.
| |
| | |
|
| |
| | |
| 22
| |
| | |
| NIST SP 800-171A, p.47
| |
| | |
| 23
| |
| | |
| NIST SP 800-171A, pp. 47-48
| |
| | |
| 24
| |
| | |
| NIST SP 800-171 Rev. 2, pp. 32-33
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| PE.L1-b.1.ix – Manage Visitors & Physical Access [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 32
| |
| | |
|
| |
| | |
| Organizations have flexibility in the types of audit logs employed. Audit logs can be
| |
| | |
| procedural (e.g., written log of individuals accessing the facility), automated (e.g., capturing
| |
| | |
| ID provided by a Personal Identity Verification (PIV) card), or some combination thereof.
| |
| | |
| Physical access points can include facility access points, interior access points to systems or
| |
| | |
| system components requiring supplemental access controls, or both. System components
| |
| | |
| (e.g., workstations, notebook computers) may be in areas designated as publicly accessible
| |
| | |
| with organizations safeguarding access to such devices.
| |
| Physical access devices include keys, locks, combinations, and card readers.
| |
| | |
| '''FURTHER DISCUSSION '''
| |
| | |
| Do not allow visitors, even those people you know well, to walk around your facility without
| |
| | |
| an escort. All non-employees should wear special visitor badges and/or are escorted by an
| |
| | |
| employee at all times while on the property.
| |
| Make sure you have a record of who accesses your facility (e.g., office, plant, factory). You can
| |
| | |
| do this in writing by having employees and visitors sign in and sign out or by electronic
| |
| | |
| means such as badge readers. Whatever means you use, you need to retain the access records
| |
| | |
| for the time period that your company has defined.
| |
| Identifying and controlling physical access devices (e.g., locks, badges, key cards) is just as
| |
| | |
| important as monitoring and limiting who is able to physically access certain equipment.
| |
| | |
| Physical access devices are only strong protection if you know who has them and what access
| |
| | |
| they allow. Physical access devices can be managed using manual or automatic processes
| |
| | |
| such a list of who is assigned what key, or updating the badge access system as personnel
| |
| | |
| change roles.
| |
| | |
| '''Example 1
| |
| '''Coming back from a meeting, you see the friend of a coworker walking down the hallway
| |
| | |
| near your office where FCI is stored. You know this person well and trust them, but are not
| |
| | |
| sure why they are in the building. You stop to talk, and the person explains that they are
| |
| | |
| meeting a coworker for lunch, but cannot remember where the lunchroom is. You walk the
| |
| | |
| person back to the reception area to get a visitor badge and wait until someone can escort
| |
| | |
| them to the lunchroom [a]. You report this incident, and the company decides to install a
| |
| | |
| badge reader at the main door so visitors cannot enter without an escort [a].
| |
| | |
| '''Example 2
| |
| '''You and your coworkers like to have friends and family join you for lunch at the office on
| |
| | |
| Fridays. Your small company has just signed a contract with the DoD in which your company
| |
| | |
| will receive FCI and you now need to document who enters and leaves your facility. You work
| |
| | |
| with the reception staff to ensure that all non-employees sign in at the reception area and
| |
| | |
| sign out when they leave [c]. You retain those paper sign-in sheets in a locked filing cabinet
| |
| | |
| for one year. Employees receive badges or key cards that enable tracking and logging access
| |
| | |
| to company facilities.
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| PE.L1-b.1.ix – Manage Visitors & Physical Access [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 33
| |
| | |
|
| |
| | |
| '''Example 3
| |
| '''You are a facility manager. A team member retired today and returns their company keys to
| |
| | |
| you. The project on which they were working requires access to areas that contain
| |
| | |
| equipment with FCI. You receive the keys, check your electronic records against the serial
| |
| | |
| numbers on the keys to ensure all have been returned, and mark each key returned [f].
| |
| | |
| '''Potential Assessment Considerations
| |
| '''•
| |
| | |
| Are personnel required to accompany visitors to areas in a facility with physical access
| |
| | |
| to organizational systems [a]?
| |
| | |
| •
| |
| | |
| Are visitors clearly distinguishable from regular personnel [b]?
| |
| | |
| •
| |
| | |
| Is visitor activity monitored (e.g., use of cameras or guards, reviews of secure areas upon
| |
| | |
| visitor departure, review of visitor audit logs) [b]?
| |
| | |
| •
| |
| | |
| Are logs of physical access to sensitive areas (both authorized access and visitor access)
| |
| | |
| maintained per retention requirements [c]?
| |
| | |
| •
| |
| | |
| Are visitor access records retained for as long as required [c]?
| |
| | |
| •
| |
| | |
| Are lists or inventories of physical access devices maintained (e.g., keys, facility badges,
| |
| | |
| key cards) [d]?
| |
| | |
| •
| |
| | |
| Is access to physical access devices limited (e.g., granted to, and accessible only by,
| |
| | |
| authorized individuals) [e]?
| |
| | |
| •
| |
| | |
| Are physical access devices managed (e.g., revoking key card access when necessary,
| |
| | |
| changing locks as needed, maintaining access control devices and systems) [f]?
| |
| | |
| '''KEY REFERENCES '''
| |
| | |
| •
| |
| | |
| FAR Clause 52.204-21 b.1.ix
| |
| | |
| •
| |
| | |
| NIST SP 800-171 Rev. 2 3.10.3
| |
| | |
| •
| |
| | |
| NIST SP 800-171 Rev. 2 3.10.4
| |
| | |
| •
| |
| | |
| NIST SP 800-171 Rev. 2 3.10.5
| |
| | |
|
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| SC.L1-b.1.x – Boundary Protection [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 34
| |
| | |
|
| |
| | |
| System and Communications Protection (SC)
| |
| '''SC.L1-B.1.X – BOUNDARY PROTECTION [FCI DATA] '''
| |
| | |
| Monitor, control, and protect organizational communications (i.e., information transmitted
| |
| | |
| or received by organizational information systems) at the external boundaries and key
| |
| | |
| internal boundaries of the information systems.
| |
| | |
| '''ASSESSMENT OBJECTIVES [NIST SP 800-171A][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#38|25 ]]'''
| |
| | |
| Determine if:
| |
| [a]
| |
| | |
| the external system boundary is defined;
| |
| | |
| [b]
| |
| | |
| key internal system boundaries are defined;
| |
| | |
| [c]
| |
| | |
| communications are monitored at the external system boundary;
| |
| | |
| [d]
| |
| | |
| communications are monitored at key internal boundaries;
| |
| | |
| [e]
| |
| | |
| communications are controlled at the external system boundary;
| |
| | |
| [f]
| |
| | |
| communications are controlled at key internal boundaries;
| |
| | |
| [g]
| |
| | |
| communications are protected at the external system boundary; and
| |
| | |
| [h]
| |
| | |
| communications are protected at key internal boundaries.
| |
| | |
| '''POTENTIAL ASSESSMENT METHODS AND OBJECTS [NIST SP 800-171A]25 '''
| |
| | |
| '''Examine
| |
| '''[SELECT FROM: System and communications protection policy; procedures addressing
| |
| | |
| boundary protection; system security plan; list of key internal boundaries of the system;
| |
| | |
| system design documentation; boundary protection hardware and software; enterprise
| |
| | |
| security architecture documentation; system audit logs and records; system configuration
| |
| | |
| settings and associated documentation; other relevant documents or records].
| |
| | |
| '''Interview
| |
| '''[SELECT FROM: System or network administrators; personnel with information security
| |
| | |
| responsibilities; system developers; personnel with boundary protection responsibilities].
| |
| | |
| '''Test
| |
| '''[SELECT FROM: Mechanisms implementing boundary protection capability].
| |
| | |
|
| |
| | |
| 25
| |
| | |
| NIST SP 800-171A, p. 53
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| SC.L1-b.1.x – Boundary Protection [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 35
| |
| | |
|
| |
| | |
| '''DISCUSSION [NIST SP 800-171 REV. 2][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#39|26]] '''
| |
| | |
| Communications can be monitored, controlled, and protected at boundary components and
| |
| | |
| by restricting or prohibiting interfaces in organizational systems. Boundary components
| |
| | |
| include gateways, routers, firewalls, guards, network-based malicious code analysis and
| |
| | |
| virtualization systems, or encrypted tunnels implemented within a system security
| |
| | |
| architecture (e.g., routers protecting firewalls or application gateways residing on protected
| |
| | |
| subnetworks). Restricting or prohibiting interfaces in organizational systems includes
| |
| | |
| restricting external web communications traffic to designated web servers within managed
| |
| | |
| interfaces and prohibiting external traffic that appears to be spoofing internal addresses.
| |
| Organizations consider the shared nature of commercial telecommunications services in the
| |
| | |
| implementation of security requirements associated with the use of such services.
| |
| | |
| Commercial telecommunications services are commonly based on network components and
| |
| | |
| consolidated management systems shared by all attached commercial customers and may
| |
| | |
| also include third party-provided access lines and other service elements. Such transmission
| |
| | |
| services may represent sources of increased risk despite contract security provisions.
| |
| | |
| NIST SP 800-41 provides guidance on firewalls and firewall policy. NIST SP 800-125B
| |
| | |
| provides guidance on security for virtualization technologies.
| |
| | |
| '''FURTHER DISCUSSION '''
| |
| | |
| Fences, locks, badges, and key cards help keep non-employees out of your physical facilities.
| |
| | |
| Similarly, your company’s IT network or system has boundaries that must be protected.
| |
| | |
| Many companies use a web proxy and a firewall.
| |
| When an employee uses a company computer to go to a website, a web proxy makes the
| |
| | |
| request on the user’s behalf, looks at the web request, and decides if it should let the
| |
| | |
| employee go to the website.
| |
| A firewall controls access from the inside and outside, protecting valuable information and
| |
| | |
| resources stored on the company’s network. A firewall stops unwanted traffic on the internet
| |
| | |
| from passing through an outside “fence” to the company’s networks and information
| |
| | |
| systems. Internal boundaries determine where data can flow, for instance a software
| |
| | |
| development environment may have its own boundary controlling, monitoring, and
| |
| | |
| protecting the data that can leave that boundary.
| |
| It may be wise to monitor, control, or protect one part of the company network from another.
| |
| | |
| This can also be accomplished with a firewall and limits the ability of attackers and
| |
| | |
| disgruntled employees from entering sensitive parts of your internal network and causing
| |
| | |
| damage.
| |
| | |
| '''Example
| |
| '''You are setting up the new network with an FCI enclave. You start by sketching out a simple
| |
| | |
| diagram that identifies the external boundary of your network and any internal boundaries
| |
| | |
| that are needed [a,b]. The first piece of equipment you install is the firewall, a device to
| |
| | |
|
| |
| | |
| 26
| |
| | |
| NIST SP 800-171 Rev. 2, p. 36
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| SC.L1-b.1.x – Boundary Protection [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 36
| |
| | |
|
| |
| | |
| separate your internal network from the internet. The firewall also has a feature that allows
| |
| | |
| you to block access to potentially malicious websites, and you configure that service as well
| |
| | |
| [a,c,e,g]. Some of your coworkers complain that they cannot get to certain websites [c,e,g].
| |
| | |
| You explain that the new network blocks websites that are known for spreading malware.
| |
| | |
| The firewall sends you a daily digest of blocked activity so that you can monitor the system
| |
| | |
| for attack trends [c,d].
| |
| | |
| '''Potential Assessment Considerations
| |
| '''•
| |
| | |
| What are the external system boundary components that make up the entry and exit
| |
| | |
| points for data flow (e.g., firewalls, gateways, cloud service boundaries), behind which all
| |
| | |
| system components that handle regulated data are contained? What are the supporting
| |
| | |
| system components necessary for the protection of regulated data [a]?
| |
| | |
| •
| |
| | |
| What are the internal system boundary components that make up the entry and exit
| |
| | |
| points for key internal data flow (e.g., internal firewalls, routers, any devices that can
| |
| | |
| bridge the connection between one segment of the system and another) that separate
| |
| | |
| segments of the internal network – including devices that separate internal network
| |
| | |
| segments such as development and production networks as well as a traditional DMZ at
| |
| | |
| the edge of the network [b]?
| |
| | |
| •
| |
| | |
| Is data flowing in and out of the external and key internal system boundaries monitored
| |
| | |
| (e.g., connections are logged and able to be reviewed, suspicious traffic generates alerts)
| |
| | |
| [c,d]?
| |
| | |
| •
| |
| | |
| Is data traversing the external and internal system boundaries controlled such that
| |
| | |
| connections are denied by default and only authorized connections are allowed [e,f]?
| |
| | |
| •
| |
| | |
| Is data flowing in and out of the external and key internal system boundaries protected
| |
| | |
| (e.g., applying encryption when required or prudent, tunneling traffic as needed) [g,h]?
| |
| | |
| '''KEY REFERENCES '''
| |
| | |
| •
| |
| | |
| FAR Clause 52.204-21 b.1.x
| |
| | |
| •
| |
| | |
| NIST SP 800-171 Rev. 2 3.13.1
| |
| | |
|
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| SC.L1-b.1.xi – Public-Access System Separation [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 37
| |
| | |
|
| |
| | |
| '''SC.L1-B.1.XI – PUBLIC-ACCESS SYSTEM SEPARATION [FCI DATA] '''
| |
| | |
| Implement subnetworks for publicly accessible system components that are physically or
| |
| | |
| logically separated from internal networks.
| |
| | |
| '''ASSESSMENT OBJECTIVES [NIST SP 800-171A][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#41|27 ]]'''
| |
| | |
| Determine if:
| |
| [a]
| |
| | |
| publicly accessible system components are identified; and
| |
| | |
| [b]
| |
| | |
| subnetworks for publicly accessible system components are physically or logically
| |
| | |
| separated from internal networks.
| |
| | |
| '''POTENTIAL ASSESSMENT METHODS AND OBJECTS [NIST SP 800-171A]27 '''
| |
| | |
| '''Examine
| |
| '''[SELECT FROM: System and communications protection policy; procedures addressing
| |
| | |
| boundary protection; system security plan; list of key internal boundaries of the system;
| |
| | |
| system design documentation; boundary protection hardware and software; system
| |
| | |
| configuration settings and associated documentation; enterprise security architecture
| |
| | |
| documentation; system audit logs and records; other relevant documents or records].
| |
| | |
| '''Interview
| |
| '''[SELECT FROM: System or network administrators; personnel with information security
| |
| | |
| responsibilities; system developers; personnel with boundary protection responsibilities].
| |
| | |
| '''Test
| |
| '''[SELECT FROM: Mechanisms implementing boundary protection capability].
| |
| | |
| '''DISCUSSION [NIST SP 800-171 REV. 2][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#41|28]] '''
| |
| | |
| Subnetworks that are physically or logically separated from internal networks are referred
| |
| | |
| to as demilitarized zones (DMZs). DMZs are typically implemented with boundary control
| |
| | |
| devices and techniques that include routers, gateways, firewalls, virtualization, or cloud-
| |
| | |
| based technologies.
| |
| NIST SP 800-41 provides guidance on firewalls and firewall policy. SP 800-125B provides
| |
| | |
| guidance on security for virtualization technologies.
| |
| | |
|
| |
| | |
| 27
| |
| | |
| NIST SP 800-171A, p. 55
| |
| | |
| 28
| |
| | |
| NIST SP 800-171 Rev. 2, pp. 37-38
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| SC.L1-b.1.xi – Public-Access System Separation [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 38
| |
| | |
|
| |
| | |
| '''FURTHER DISCUSSION '''
| |
| | |
| Publicly accessible systems should be separated from the internal systems that need to be
| |
| | |
| protected. Internal systems should not be placed on the same network as publicly accessible
| |
| | |
| systems, and access by default from DMZ networks to internal networks should be blocked.
| |
| One method of accomplishing this is to create a DMZ network, which enhances security by
| |
| | |
| providing public access to a specific set of resources while preventing connections from
| |
| | |
| those resources to the rest of the IT environment. Some OSAs may achieve a similar result
| |
| | |
| through the use of a cloud computing environment that is separated from the rest of the
| |
| | |
| company’s infrastructure.
| |
| | |
| '''Example
| |
| '''The head of recruiting at your firm wants to launch a website to post job openings and allow
| |
| | |
| the public to download an application form [a]. After some discussion, your team realizes it
| |
| | |
| needs to use a firewall to create a perimeter network to do this because your network
| |
| | |
| contains FCI [b]. You host the server separately from the company’s internal network where
| |
| | |
| FCI is stored and make sure the network on which it resides is isolated with the proper
| |
| | |
| firewall rules [b].
| |
| | |
| '''Potential Assessment Considerations
| |
| '''•
| |
| | |
| Are any system components reachable by the public (e.g., internet-facing web servers,
| |
| | |
| VPN gateways, publicly accessible cloud services) [a]?
| |
| | |
| •
| |
| | |
| Are publicly accessible system components on physically or logically separated
| |
| | |
| subnetworks (e.g., isolated subnetworks using separate, dedicated VLAN segments such
| |
| | |
| as DMZs) [b]?
| |
| | |
| '''KEY REFERENCES '''
| |
| | |
| •
| |
| | |
| FAR Clause 52.204-21 b.1.xi
| |
| | |
| •
| |
| | |
| NIST SP 800-171 Rev. 2 3.13.5
| |
| | |
|
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| SI.L1-b.1.xii – Flaw Remediation [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 39
| |
| | |
|
| |
| | |
| System and Information Integrity (SI)
| |
| '''SI.L1-B.1.XII – FLAW REMEDIATION [FCI DATA] '''
| |
| | |
| Identify, report, and correct information and information system flaws in a timely manner.
| |
| | |
| '''ASSESSMENT OBJECTIVES [NIST SP 800-171A][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#43|29 ]]'''
| |
| | |
| Determine if:
| |
| [a]
| |
| | |
| the time within which to identify system flaws is specified;
| |
| | |
| [b]
| |
| | |
| system flaws are identified within the specified time frame;
| |
| | |
| [c]
| |
| | |
| the time within which to report system flaws is specified;
| |
| | |
| [d]
| |
| | |
| system flaws are reported within the specified time frame;
| |
| | |
| [e]
| |
| | |
| the time within which to correct system flaws is specified; and
| |
| | |
| [f]
| |
| | |
| system flaws are corrected within the specified time frame.
| |
| | |
| '''POTENTIAL ASSESSMENT METHODS AND OBJECTS [NIST SP 800-171A]29 '''
| |
| | |
| '''Examine
| |
| '''[SELECT FROM: System and information integrity policy; procedures addressing flaw
| |
| | |
| remediation; procedures addressing configuration management; system security plan; list
| |
| | |
| of flaws and vulnerabilities potentially affecting the system; list of recent security flaw
| |
| | |
| remediation actions performed on the system (e.g., list of installed patches, service packs,
| |
| | |
| hot fixes, and other software updates to correct system flaws); test results from the
| |
| | |
| installation of software and firmware updates to correct system flaws; installation/change
| |
| | |
| control records for security-relevant software and firmware updates; other relevant
| |
| | |
| documents or records].
| |
| | |
| '''Interview
| |
| '''[SELECT FROM: System or network administrators; personnel with information security
| |
| | |
| responsibilities; personnel installing, configuring, and maintaining the system; personnel
| |
| | |
| with responsibility for flaw remediation; personnel with configuration management
| |
| | |
| responsibility].
| |
| | |
| '''Test
| |
| '''[SELECT FROM: Organizational processes for identifying, reporting, and correcting system
| |
| | |
| flaws; organizational process for installing software and firmware updates; mechanisms
| |
| | |
|
| |
| | |
| 29
| |
| | |
| NIST SP 800-171A, p. 60
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| SI.L1-b.1.xii – Flaw Remediation [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 40
| |
| | |
|
| |
| | |
| supporting or implementing reporting, and correcting system flaws; mechanisms supporting
| |
| | |
| or implementing testing software and firmware updates].
| |
| | |
| '''DISCUSSION [NIST SP 800-171 REV. 2][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#44|30]] '''
| |
| | |
| Organizations identify systems that are affected by announced software and firmware flaws
| |
| | |
| including potential vulnerabilities resulting from those flaws and report this information to
| |
| | |
| designated personnel with information security responsibilities. Security-relevant updates
| |
| | |
| include patches, service packs, hot fixes, and anti-virus signatures. Organizations address
| |
| | |
| flaws discovered during security assessments, continuous monitoring, incident response
| |
| | |
| activities, and system error handling. Organizations can take advantage of available
| |
| | |
| resources such as the Common Weakness Enumeration (CWE) database or Common
| |
| | |
| Vulnerabilities and Exposures (CVE) database in remediating flaws discovered in
| |
| | |
| organizational systems.
| |
| Organization-defined time periods for updating security-relevant software and firmware
| |
| | |
| may vary based on a variety of factors including the criticality of the update (i.e., severity of
| |
| | |
| the vulnerability related to the discovered flaw). Some types of flaw remediation may require
| |
| | |
| more testing than other types of remediation. NIST SP 800-40 provides guidance on patch
| |
| | |
| management technologies.
| |
| | |
| '''FURTHER DISCUSSION '''
| |
| | |
| All software and firmware have potential flaws. Many vendors work to remedy those flaws
| |
| | |
| by releasing vulnerability information and updates to their software and firmware. OSAs
| |
| | |
| should have a process to review relevant vendor notifications and updates about problems
| |
| | |
| or weaknesses. After reviewing the information, the OSA should implement a patch
| |
| | |
| management process that allows for software and firmware flaws to be fixed without
| |
| | |
| adversely affecting the system functionality. OSAs should define the time frames within
| |
| | |
| which flaws are identified, reported, and corrected for all systems.
| |
| | |
| '''Example
| |
| '''You know that software vendors typically release patches, service packs, hot fixes, etc. and
| |
| | |
| want to make sure your software that processes FCI is up to date. You develop a policy that
| |
| | |
| requires checking vendor websites for flaw notifications every week [a]. The policy further
| |
| | |
| requires that those flaws be assessed for severity and patched on end-user computers once
| |
| | |
| each week and servers once each month [c,e]. Consistent with that policy, you configure the
| |
| | |
| system to check for updates weekly or daily depending on the criticality of the software [b,e].
| |
| | |
| Your team reviews available updates and implements the applicable ones according to the
| |
| | |
| defined schedule [f].
| |
| | |
|
| |
| | |
| 30
| |
| | |
| NIST SP 800-171 Rev. 2, pp. 40-41
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| SI.L1-b.1.xii – Flaw Remediation [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 41
| |
| | |
|
| |
| | |
| '''Potential Assessment Considerations
| |
| '''•
| |
| | |
| Is the time frame (e.g., a set number of days) within which system flaw identification
| |
| | |
| activities (e.g., vulnerability scans, configuration scans, manual review) must be
| |
| | |
| performed defined and documented [a]?
| |
| | |
| •
| |
| | |
| Are system flaws (e.g., vulnerabilities, misconfigurations) identified in accordance with
| |
| | |
| the specified time frame [b]?
| |
| | |
| •
| |
| | |
| Is the time frame (e.g., a set number of days dependent on the assessed severity of a flaw)
| |
| | |
| within which system flaws must be corrected defined and documented [e]?
| |
| | |
| •
| |
| | |
| Are system flaws (e.g., applied security patches, made configuration changes, or
| |
| | |
| implemented workarounds or mitigations) corrected within the specified time frame [f]?
| |
| | |
| '''KEY REFERENCES '''
| |
| | |
| •
| |
| | |
| FAR Clause 52.204-21 b.1.xii
| |
| | |
| •
| |
| | |
| NIST SP 800-171 Rev. 2 3.14.1
| |
| | |
|
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| SI.L1-b.1.xiii – Malicious Code ProTection [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 42
| |
| | |
|
| |
| | |
| '''SI.L1-B.1.XIII – MALICIOUS CODE PROTECTION [FCI DATA] '''
| |
| | |
| Provide protection from malicious code at appropriate locations within organizational
| |
| | |
| information systems.
| |
| | |
| '''ASSESSMENT OBJECTIVES [NIST SP 800-171A][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#46|31 ]]'''
| |
| | |
| Determine if:
| |
| [a]
| |
| | |
| designated locations for malicious code protection are identified; and
| |
| | |
| [b]
| |
| | |
| protection from malicious code at designated locations is provided.
| |
| | |
| '''POTENTIAL ASSESSMENT METHODS AND OBJECTS [NIST SP 800-171A][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#46|32 ]]'''
| |
| | |
| '''Examine
| |
| '''[SELECT FROM: System and information integrity policy; configuration management policy
| |
| | |
| and procedures; procedures addressing malicious code protection; records of malicious
| |
| | |
| code protection updates; malicious code protection mechanisms; system security plan;
| |
| | |
| system configuration settings and associated documentation; record of actions initiated by
| |
| | |
| malicious code protection mechanisms in response to malicious code detection; scan results
| |
| | |
| from malicious code protection mechanisms; system design documentation; system audit
| |
| | |
| logs and records; other relevant documents or records].
| |
| | |
| '''Interview
| |
| '''[SELECT FROM: System or network administrators; personnel with information security
| |
| | |
| responsibilities; personnel installing, configuring, and maintaining the system; personnel
| |
| | |
| with responsibility for malicious code protection; personnel with configuration management
| |
| | |
| responsibility].
| |
| | |
| '''Test
| |
| '''[SELECT FROM: Organizational processes for employing, updating, and configuring
| |
| | |
| malicious code protection mechanisms; organizational process for addressing false positives
| |
| | |
| and resulting potential impact; mechanisms supporting or implementing employing,
| |
| | |
| updating, and configuring malicious code protection mechanisms; mechanisms supporting
| |
| | |
| or implementing malicious code scanning and subsequent actions].
| |
| | |
| '''DISCUSSION [NIST SP 800-171 REV. 2][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#46|33]] '''
| |
| | |
| Designated [''appropriate''] locations include system entry and exit points which may include
| |
| | |
| firewalls, remote access servers, workstations, electronic mail servers, web servers, proxy
| |
| | |
| servers, notebook computers, and mobile devices. Malicious code includes viruses, worms,
| |
| | |
|
| |
| | |
| 31
| |
| | |
| NIST SP 800-171A, p. 61
| |
| | |
| 32
| |
| | |
| NIST SP 800-171A, p. 61-62
| |
| | |
| 33
| |
| | |
| NIST SP 800-171 Rev. 2, p. 41
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| SI.L1-b.1.xiii – Malicious Code ProTection [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 43
| |
| | |
|
| |
| | |
| Trojan horses, and spyware. Malicious code can be encoded in various formats (e.g.,
| |
| | |
| UUENCODE, Unicode), contained within compressed or hidden files, or hidden in files using
| |
| | |
| techniques such as steganography. Malicious code can be inserted into systems in a variety
| |
| | |
| of ways including web accesses, electronic mail, electronic mail attachments, and portable
| |
| | |
| storage devices. Malicious code insertions occur through the exploitation of system
| |
| | |
| vulnerabilities.
| |
| Malicious code protection mechanisms include anti-virus signature definitions and
| |
| | |
| reputation-based technologies. A variety of technologies and methods exist to limit or
| |
| | |
| eliminate the effects of malicious code. Pervasive configuration management and
| |
| | |
| comprehensive software integrity controls may be effective in preventing execution of
| |
| | |
| unauthorized code. In addition to commercial off-the-shelf software, malicious code may also
| |
| | |
| be present in custom-built software. This could include logic bombs, back doors, and other
| |
| | |
| types of cyber-attacks that could affect organizational missions/business functions.
| |
| | |
| Traditional malicious code protection mechanisms cannot always detect such code. In these
| |
| | |
| situations, organizations rely instead on other safeguards including secure coding practices,
| |
| | |
| configuration management and control, trusted procurement processes, and monitoring
| |
| | |
| practices to help ensure that software does not perform functions other than the functions
| |
| | |
| intended. NIST SP 800-83 provides guidance on malware incident prevention.
| |
| | |
| '''FURTHER DISCUSSION '''
| |
| | |
| Malicious code purposely performs unauthorized activity that undermines the security of an
| |
| | |
| information system. A designated location may be a network device such as a firewall or an
| |
| | |
| end user’s computer.
| |
| Malicious code, which can be delivered by a range of means (e.g., email, removable media, or
| |
| | |
| websites), includes the following:
| |
| •
| |
| | |
| Virus – program designed to cause damage, steal information, change data, send email,
| |
| | |
| show messages, or any combination of these things;
| |
| | |
| •
| |
| | |
| Spyware – program designed to secretly gather information about a person’s activity;
| |
| | |
| •
| |
| | |
| Trojan Horse – type of malware made to look like legitimate software and used by cyber
| |
| | |
| criminals to get access to a company’s systems; and
| |
| | |
| •
| |
| | |
| Ransomware – type of malware that threatens to publish the victim’s data or perpetually
| |
| | |
| block access to it unless a ransom is paid.
| |
| | |
| Consider use of anti-malware tools to stop or lessen the impact of malicious code.
| |
| | |
| '''Example
| |
| '''Your company’s IT team is buying new computers and wants to protect your company’s
| |
| | |
| information from viruses and spyware. The computers will be used to process, store, and
| |
| | |
| transmit FCI. They research anti-malware products, select an appropriate solution, and
| |
| | |
| deploy antivirus software on all hosts for which satisfactory antivirus software is available
| |
| | |
| [a,b].
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| SI.L1-b.1.xiii – Malicious Code ProTection [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 44
| |
| | |
|
| |
| | |
| '''Potential Assessment Considerations
| |
| '''•
| |
| | |
| Are system components (e.g., workstations, servers, email gateways, mobile devices) for
| |
| | |
| which malicious code protection must be provided identified and documented [a]?
| |
| | |
| '''KEY REFERENCES '''
| |
| | |
| •
| |
| | |
| FAR Clause 52.204-21 b.1.xiii
| |
| | |
| •
| |
| | |
| NIST SP 800-171 Rev. 2 3.14.2
| |
| | |
|
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| SI.L1-b.1.xiv – Update Malicious Code Protection [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 45
| |
| | |
|
| |
| | |
| '''SI.L1-B.1.XIV – UPDATE MALICIOUS CODE PROTECTION [FCI DATA] '''
| |
| | |
| Update malicious code protection mechanisms when new releases are available.
| |
| | |
| '''ASSESSMENT OBJECTIVES [NIST SP 800-171A][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#49|34 ]]'''
| |
| | |
| Determine if:
| |
| [a] malicious code protection mechanisms are updated when new releases are available.
| |
| | |
| '''POTENTIAL ASSESSMENT METHODS AND OBJECTS [NIST SP 800-171A][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#49|35 ]]'''
| |
| | |
| '''Examine
| |
| '''[SELECT FROM: System and information integrity policy; configuration management policy
| |
| | |
| and procedures; procedures addressing malicious code protection; malicious code
| |
| | |
| protection mechanisms; records of malicious code protection updates; system security plan;
| |
| | |
| system design documentation; system configuration settings and associated documentation;
| |
| | |
| scan results from malicious code protection mechanisms; record of actions initiated by
| |
| | |
| malicious code protection mechanisms in response to malicious code detection; system audit
| |
| | |
| logs and records; other relevant documents or records].
| |
| | |
| '''Interview
| |
| '''[SELECT FROM: System or network administrators; personnel with information security
| |
| | |
| responsibilities; personnel installing, configuring, and maintaining the system; personnel
| |
| | |
| with responsibility for malicious code protection; personnel with configuration management
| |
| | |
| responsibility].
| |
| | |
| '''Test
| |
| '''[SELECT FROM: Organizational processes for employing, updating, and configuring
| |
| | |
| malicious code protection mechanisms; organizational process for addressing false positives
| |
| | |
| and resulting potential impact; mechanisms supporting or implementing malicious code
| |
| | |
| protection mechanisms (including updates and configurations); mechanisms supporting or
| |
| | |
| implementing malicious code scanning and subsequent actions].
| |
| | |
| '''DISCUSSION [NIST SP 800-171 REV. 2][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#49|36]] '''
| |
| | |
| Malicious code protection mechanisms include anti-virus signature definitions and
| |
| | |
| reputation-based technologies. A variety of technologies and methods exist to limit or
| |
| | |
| eliminate the effects of malicious code. Pervasive configuration management and
| |
| | |
| comprehensive software integrity controls may be effective in preventing execution of
| |
| | |
| unauthorized code. In addition to commercial off-the-shelf software, malicious code may also
| |
| | |
| be present in custom-built software. This could include logic bombs, back doors, and other
| |
| | |
|
| |
| | |
| 34
| |
| | |
| NIST SP 800-171A, p. 62
| |
| | |
| 35
| |
| | |
| NIST SP 800-171A, p. 62-63
| |
| | |
| 36
| |
| | |
| NIST SP 800-171 Rev. 2, pp 41-42
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| SI.L1-b.1.xiv – Update Malicious Code Protection [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 46
| |
| | |
|
| |
| | |
| types of cyber-attacks that could affect organizational missions/business functions.
| |
| | |
| Traditional malicious code protection mechanisms cannot always detect such code. In these
| |
| | |
| situations, organizations rely instead on other safeguards including secure coding practices,
| |
| | |
| configuration management and control, trusted procurement processes, and monitoring
| |
| | |
| practices to help ensure that software does not perform functions other than the functions
| |
| | |
| intended.
| |
| | |
| '''FURTHER DISCUSSION '''
| |
| | |
| Malware changes on an hourly or daily basis, and it is important to update detection and
| |
| | |
| protection mechanisms frequently to maintain the effectiveness of the protection.
| |
| | |
| '''Example
| |
| '''You have installed anti-malware software to protect a computer that stores FCI from
| |
| | |
| malicious code. Knowing that malware evolves rapidly, you configure the software to
| |
| | |
| automatically check for malware definition updates every day and update as needed [a].
| |
| | |
| '''Potential Assessment Considerations
| |
| '''•
| |
| | |
| Is there a defined frequency at which malicious code protection mechanisms must be
| |
| | |
| updated (e.g., frequency of automatic updates or manual processes) [a]?
| |
| | |
| '''KEY REFERENCES '''
| |
| | |
| •
| |
| | |
| FAR Clause 52.204-21 b.1.xiv
| |
| | |
| •
| |
| | |
| NIST SP 800-171 Rev. 2 3.14.4
| |
| | |
|
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| SI.L1-b.1.xv – System & File Scanning [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 47
| |
| | |
|
| |
| | |
| '''SI.L1-B.1.XV – SYSTEM & FILE SCANNING [FCI DATA] '''
| |
| | |
| Perform periodic scans of the information system and real-time scans of files from external
| |
| | |
| sources as files are downloaded, opened, or executed.
| |
| | |
| '''ASSESSMENT OBJECTIVES [NIST SP 800-171A][[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#51|37 ]]'''
| |
| | |
| Determine if:
| |
| [a]
| |
| | |
| the frequency for malicious code scans is defined;
| |
| | |
| [b]
| |
| | |
| malicious code scans are performed with the defined frequency; and
| |
| | |
| [c]
| |
| | |
| real-time malicious code scans of files from external sources as files are
| |
| | |
| downloaded, opened, or executed are performed.
| |
| | |
| '''POTENTIAL ASSESSMENT METHODS AND OBJECTS [NIST SP 800-171A]37 '''
| |
| | |
| '''Examine
| |
| '''[SELECT FROM: System and information integrity policy; configuration management policy
| |
| | |
| and procedures; procedures addressing malicious code protection; malicious code
| |
| | |
| protection mechanisms; records of malicious code protection updates; system security plan;
| |
| | |
| system design documentation; system configuration settings and associated documentation;
| |
| | |
| scan results from malicious code protection mechanisms; record of actions initiated by
| |
| | |
| malicious code protection mechanisms in response to malicious code detection; system audit
| |
| | |
| logs and records; other relevant documents or records].
| |
| | |
| '''Interview
| |
| '''[SELECT FROM: System or network administrators; personnel with information security
| |
| | |
| responsibilities; personnel installing, configuring, and maintaining the system; personnel
| |
| | |
| with responsibility for malicious code protection; personnel with configuration management
| |
| | |
| responsibility].
| |
| | |
| '''Test
| |
| '''[SELECT FROM: Organizational processes for employing, updating, and configuring
| |
| | |
| malicious code protection mechanisms; organizational process for addressing false positives
| |
| | |
| and resulting potential impact; mechanisms supporting or implementing malicious code
| |
| | |
| protection mechanisms (including updates and configurations); mechanisms supporting or
| |
| | |
| implementing malicious code scanning and subsequent actions].
| |
| | |
| '''DISCUSSION [NIST SP 800-17]1 REV. 2[[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#51|38]] '''
| |
| | |
| Periodic scans of organizational systems and real-time scans of files from external sources
| |
| | |
| can detect malicious code. Malicious code can be encoded in various formats (e.g.,
| |
| | |
|
| |
| | |
| 37
| |
| | |
| NIST SP 800-171A, p. 63
| |
| | |
| 38
| |
| | |
| NIST SP 800-171 Rev. 2, p. 42
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| SI.L1-b.1.xv – System & File Scanning [FCI Data]
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 48
| |
| | |
|
| |
| | |
| UUENCODE, Unicode), contained within compressed or hidden files, or hidden in files using
| |
| | |
| techniques such as steganography. Malicious code can be inserted into systems in a variety
| |
| | |
| of ways including web accesses, electronic mail, electronic mail attachments, and portable
| |
| | |
| storage devices. Malicious code insertions occur through the exploitation of system
| |
| | |
| vulnerabilities.
| |
| | |
| '''FURTHER DISCUSSION '''
| |
| | |
| Consider use of anti-malware software to scan for viruses in your computer systems and
| |
| | |
| determine how often scans are conducted. Real-time scans look at the system whenever files
| |
| | |
| are downloaded, opened, and saved. Periodic scans check previously saved files against
| |
| | |
| updated malware information. Anti-malware software should be installed, run, and updated
| |
| | |
| on all hosts for which satisfactory antivirus software is available.
| |
| | |
| '''Example
| |
| '''Your company transmits FCI over email. You work with your company’s email provider to
| |
| | |
| enable enhanced protections that will scan all attachments to identify and quarantine those
| |
| | |
| that may be harmful prior to a user opening them [c]. In addition, you configure antivirus
| |
| | |
| software on each computer to scan for malicious code every day [a,b]. The software also
| |
| | |
| scans files that are downloaded or copied from removable media such as USB drives. It
| |
| | |
| quarantines any suspicious files and notifies the security team [c].
| |
| | |
| '''Potential Assessment Considerations
| |
| '''•
| |
| | |
| Are files from media (e.g., USB drives, CD-ROM) included in the definition of external
| |
| | |
| sources and are they being scanned [c]?
| |
| | |
| '''KEY REFERENCES '''
| |
| | |
| •
| |
| | |
| FAR Clause 52.204-21 b.1.xv
| |
| | |
| •
| |
| | |
| NIST SP 800-171 Rev. 2 3.14.5
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
| Appendix A – Acronyms and Abbreviations
| |
| | |
| CMMC Assessment Guide – Level 1 | Version 2.13
| |
| | |
| 49
| |
| | |
|
| |
| | |
| Appendix A – Acronyms and Abbreviations
| |
| | |
| AC
| |
| | |
| Access Control
| |
| | |
| CD-ROM
| |
| | |
| Compact Disk Read-Only Memory
| |
| | |
| CFR
| |
| | |
| Code of Federal Regulations
| |
| | |
| CMMC
| |
| | |
| Cybersecurity Maturity Model Certification
| |
| | |
| CUI
| |
| | |
| Controlled Unclassified Information
| |
| | |
| CVE
| |
| | |
| Common Vulnerabilities and Exposures
| |
| | |
| CWE
| |
| | |
| Common Weakness Enumeration
| |
| | |
| DFARS
| |
| | |
| Defense Federal Acquisition Regulation Supplement
| |
| | |
| DMZ
| |
| | |
| Demilitarized Zone
| |
| | |
| DoD
| |
| | |
| Department of Defense
| |
| | |
| ESP
| |
| | |
| External Service Provider
| |
| | |
| FAR
| |
| | |
| Federal Acquisition Regulation
| |
| | |
| FCI
| |
| | |
| Federal Contract Information
| |
| | |
| IT
| |
| | |
| Information Technology
| |
| | |
| NIST
| |
| | |
| National Institute of Standards and Technology
| |
| | |
| OSA
| |
| | |
| Organization Seeking Assessment
| |
| | |
| PIV
| |
| | |
| Personal Identity Verification
| |
| | |
| SC
| |
| | |
| System and Communications Protection
| |
| | |
| SI
| |
| | |
| System and Information Integrity
| |
| | |
| SP
| |
| | |
| Special Publication
| |
| | |
| SPRS
| |
| | |
| Supplier Performance Risk System
| |
| | |
| USB
| |
| | |
| Universal Serial Bus
| |
| | |
| UUENCODE Unix-to-Unix Encode
| |
| | |
| VLAN
| |
| | |
| Virtual Local Area Network
| |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
|
| |
| | |
|
| |
| | |
|
| |
| | |
| | |
| | |
| | |
| | |
| = Document Outline =
| |
| | |
| * [[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#5|Introduction]]
| |
| * [[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#6|Assessment and Compliance]]
| |
| ** [[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#6|Assessment Scope]]
| |
| * [[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#7|CMMC-Custom Terms]]
| |
| * [[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#9|Assessment Criteria and Methodology]]
| |
| ** [[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#10|Criteria]]
| |
| ** [[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#10|Methodology]]
| |
| *** [[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#11|Who Is Interviewed]]
| |
| *** [[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#11|What Is Examined]]
| |
| *** [[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#11|What Is Tested]]
| |
| ** [[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#12|Assessment Findings]]
| |
| * [[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#14|Requirement Descriptions]]
| |
| ** [[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#14|Introduction]]
| |
| * [[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#16|Access Control (AC)]]
| |
| * [[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#26|Identification and Authentication (IA)]]
| |
| * [[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#31|Media Protection (MP)]]
| |
| * [[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#33|Physical Protection (PE)]]
| |
| * [[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#38|System and Communications Protection (SC)]]
| |
| * [[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#43|System and Information Integrity (SI)]]
| |
| * [[3912f0904f8f7d41c23a95c5f4ab1dc9d2769d6e.html#53|Appendix A – Acronyms and Abbreviations]]
| |
| | |
| | |
| -----
| |
| | |
| Original source: https://dodcio.defense.gov/Portals/0/Documents/CMMC/AssessmentGuideL1v2.pdf
| |
| | |
| == Access Control (AC) ==
| |
| === Level 1 AC Practices ===
| |
| ==== AC.L1-3.1.1 - AUTHORIZED ACCESS CONTROL ====
| |
| {|class="wikitable" | | {|class="wikitable" |
| |'''SECURITY REQUIREMENT''' | | |'''SECURITY REQUIREMENT''' |
| Line 3,252: |
Line 150: |
| : [f] system access is limited to authorized devices (including other systems). | | : [f] system access is limited to authorized devices (including other systems). |
| |- | | |- |
| |[[DoD_Assessment_Methodology|DoD Assessment Scoring Value]]: '''5'''
| | |[[Practice_AC.L2-3.1.1_Details|More Practice Details...]] |
| |-
| |
| |[[Practice_AC.L1-3.1.1_Details|More Practice Details...]] | |
| |} | | |} |
|
| |
|
| ==== AC.L1-3.1.2 - TRANSACTION & FUNCTION CONTROL ====
| | === AC.L1-B.1.II – Transaction & Function Control [FCI Data] === |
| {|class="wikitable" | | {|class="wikitable" |
| |'''SECURITY REQUIREMENT''' | | |'''SECURITY REQUIREMENT''' |
| Line 3,266: |
Line 162: |
| : [b] system access is limited to the defined types of transactions and functions for authorized users. | | : [b] system access is limited to the defined types of transactions and functions for authorized users. |
| |- | | |- |
| |[[DoD_Assessment_Methodology|DoD Assessment Scoring Value]]: '''5'''
| | |[[Practice_AC.L2-3.1.2_Details|More Practice Details...]] |
| |-
| |
| |[[Practice_AC.L1-3.1.2_Details|More Practice Details...]] | |
| |} | | |} |
|
| |
|
| ==== AC.L1-3.1.20 - EXTERNAL CONNECTIONS ====
| | === AC.L1-B.1.III – External Connections [FCI Data] === |
| {|class="wikitable" | | {|class="wikitable" |
| |'''SECURITY REQUIREMENT''' | | |'''SECURITY REQUIREMENT''' |
| Line 3,284: |
Line 178: |
| : [f] the use of external systems is controlled/limited. | | : [f] the use of external systems is controlled/limited. |
| |- | | |- |
| |[[DoD_Assessment_Methodology|DoD Assessment Scoring Value]]: '''1'''
| | |[[Practice_AC.L2-3.1.20_Details|More Practice Details...]] |
| |-
| |
| |[[Practice_AC.L1-3.1.20_Details|More Practice Details...]] | |
| |} | | |} |
|
| |
|
| ==== AC.L1-3.1.22 - CONTROL PUBLIC INFORMATION ====
| | === AC.L1-B.1.IV – Control Public Information [FCI Data] === |
| {|class="wikitable" | | {|class="wikitable" |
| |'''SECURITY REQUIREMENT''' | | |'''SECURITY REQUIREMENT''' |
| Line 3,301: |
Line 193: |
| : [e] mechanisms are in place to remove and address improper posting of FCI. | | : [e] mechanisms are in place to remove and address improper posting of FCI. |
| |- | | |- |
| |[[DoD_Assessment_Methodology|DoD Assessment Scoring Value]]: '''1'''
| | |[[Practice_AC.L2-3.1.22_Details|More Practice Details...]] |
| |-
| |
| |[[Practice_AC.L1-3.1.22_Details|More Practice Details...]] | |
| |} | | |} |
|
| |
|
| == Identification and Authentication (IA) == | | == Identification and Authentication (IA) == |
| === Level 1 IA Practices ===
| | === IA.L1-B.1.V – Identification [FCI Data] === |
| ==== IA.L1-3.5.1 – IDENTIFICATION ====
| |
| {|class="wikitable" | | {|class="wikitable" |
| |'''SECURITY REQUIREMENT''' | | |'''SECURITY REQUIREMENT''' |
| Line 3,318: |
Line 207: |
| : [c] devices accessing the system are identified. | | : [c] devices accessing the system are identified. |
| |- | | |- |
| |[[DoD_Assessment_Methodology|DoD Assessment Scoring Value]]: '''5'''
| | |[[Practice_IA.L2-3.5.1_Details|More Practice Details...]] |
| |-
| |
| |[[Practice_IA.L1-3.5.1_Details|More Practice Details...]] | |
| |} | | |} |
|
| |
|
| ==== IA.L1-3.5.2 – AUTHENTICATION ====
| | === IA.L1-B.1.VI – Authentication [FCI Data] === |
| {|class="wikitable" | | {|class="wikitable" |
| |'''SECURITY REQUIREMENT''' | | |'''SECURITY REQUIREMENT''' |
| Line 3,333: |
Line 220: |
| : [c] the identity of each device accessing or connecting to the system is authenticated or verified as a prerequisite to system access. | | : [c] the identity of each device accessing or connecting to the system is authenticated or verified as a prerequisite to system access. |
| |- | | |- |
| |[[DoD_Assessment_Methodology|DoD Assessment Scoring Value]]: '''5'''
| | |[[Practice_IA.L2-3.5.2_Details|More Practice Details...]] |
| |-
| |
| |[[Practice_IA.L1-3.5.2_Details|More Practice Details...]] | |
| |} | | |} |
|
| |
|
| == Media Protection (MP) == | | == Media Protection (MP) == |
| === Level 1 MP Practices ===
| | === MP.L1-B.1.VII – Media Disposal [FCI Data] === |
| ==== MP.L1-3.8.3 – MEDIA DISPOSAL ====
| |
| {|class="wikitable" | | {|class="wikitable" |
| |'''SECURITY REQUIREMENT''' | | |'''SECURITY REQUIREMENT''' |
| Line 3,349: |
Line 233: |
| : [b] system media containing FCI is sanitized before it is released for reuse. | | : [b] system media containing FCI is sanitized before it is released for reuse. |
| |- | | |- |
| |[[DoD_Assessment_Methodology|DoD Assessment Scoring Value]]: '''5'''
| | |[[Practice_MP.L2-3.8.3_Details|More Practice Details...]] |
| |-
| |
| |[[Practice_MP.L1-3.8.3_Details|More Practice Details...]] | |
| |} | | |} |
|
| |
|
| == Physical Protection (PE) == | | == Physical Protection (PE) == |
| === Level 1 PE Practices ===
| | === PE.L1-B.1.VIII – Limit Physical Access [FCI Data] === |
| ==== PE.L1-3.10.1 – LIMIT PHYSICAL ACCESS ====
| |
| {|class="wikitable" | | {|class="wikitable" |
| |'''SECURITY REQUIREMENT''' | | |'''SECURITY REQUIREMENT''' |
| Line 3,367: |
Line 248: |
| : [d] physical access to operating environments is limited to authorized. | | : [d] physical access to operating environments is limited to authorized. |
| |- | | |- |
| |[[DoD_Assessment_Methodology|DoD Assessment Scoring Value]]: '''5'''
| | |[[Practice_PE.L2-3.10.1_Details|More Practice Details...]] |
| |-
| |
| |[[Practice_PE.L1-3.10.1_Details|More Practice Details...]] | |
| |} | | |} |
|
| |
|
| ==== PE.L1-3.10.3 – ESCORT VISITORS ====
| | === PE.L1-B.1.IX – Manage Visitors & Physical Access [FCI Data] === |
| {|class="wikitable" | | {|class="wikitable" |
| |'''SECURITY REQUIREMENT''' | | |'''SECURITY REQUIREMENT''' |
| Line 3,381: |
Line 260: |
| : [b] visitor activity is monitored. | | : [b] visitor activity is monitored. |
| |- | | |- |
| |[[DoD_Assessment_Methodology|DoD Assessment Scoring Value]]: '''1'''
| | |[[Practice_PE.L2-3.10.3_Details|More Practice Details...]] |
| |-
| |
| |[[Practice_PE.L1-3.10.3_Details|More Practice Details...]] | |
| |} | | |} |
|
| |
| ==== PE.L1-3.10.4 – PHYSICAL ACCESS LOGS ====
| |
| {|class="wikitable" | | {|class="wikitable" |
| |'''SECURITY REQUIREMENT''' | | |'''SECURITY REQUIREMENT''' |
| Line 3,394: |
Line 269: |
| : [a] audit logs of physical access are maintained. | | : [a] audit logs of physical access are maintained. |
| |- | | |- |
| |[[DoD_Assessment_Methodology|DoD Assessment Scoring Value]]: '''1'''
| | |[[Practice_PE.L2-3.10.4_Details|More Practice Details...]] |
| |-
| |
| |[[Practice_PE.L1-3.10.4_Details|More Practice Details...]] | |
| |} | | |} |
|
| |
| ==== PE.L1-3.10.5 – MANAGE PHYSICAL ACCESS ====
| |
| {|class="wikitable" | | {|class="wikitable" |
| |'''SECURITY REQUIREMENT''' | | |'''SECURITY REQUIREMENT''' |
| Line 3,409: |
Line 280: |
| : [c] physical access devices are managed. | | : [c] physical access devices are managed. |
| |- | | |- |
| |[[DoD_Assessment_Methodology|DoD Assessment Scoring Value]]: '''1'''
| | |[[Practice_PE.L2-3.10.5_Details|More Practice Details...]] |
| |-
| |
| |[[Practice_PE.L1-3.10.5_Details|More Practice Details...]] | |
| |} | | |} |
|
| |
|
| == System and Communications Protection (SC) == | | == System and Communications Protection (SC) == |
| === Level 1 SC Practices ===
| | === SC.L1-B.1.X – Boundary Protection [FCI Data] === |
| ==== SC.L1-3.13.1 – BOUNDARY PROTECTION ====
| |
| {|class="wikitable" | | {|class="wikitable" |
| |'''SECURITY REQUIREMENT''' | | |'''SECURITY REQUIREMENT''' |
| Line 3,433: |
Line 301: |
| |[[DoD_Assessment_Methodology|DoD Assessment Scoring Value]]: '''5''' | | |[[DoD_Assessment_Methodology|DoD Assessment Scoring Value]]: '''5''' |
| |- | | |- |
| |[[Practice_SC.L1-3.13.1_Details|More Practice Details...]] | | |[[Practice_SC.L2-3.13.1_Details|More Practice Details...]] |
| |} | | |} |
|
| |
|
| ==== SC.L1-3.13.5 – PUBLIC-ACCESS SYSTEM SEPARATION ==== | | === SC.L1-B.1.XI – Public-Access System Separation [FCI Data] === |
| {|class="wikitable" | | {|class="wikitable" |
| |'''SECURITY REQUIREMENT''' | | |'''SECURITY REQUIREMENT''' |
| Line 3,445: |
Line 313: |
| : [b] subnetworks for publicly accessible system components are physically or logically separated from internal networks. | | : [b] subnetworks for publicly accessible system components are physically or logically separated from internal networks. |
| |- | | |- |
| |[[DoD_Assessment_Methodology|DoD Assessment Scoring Value]]: '''5'''
| | |[[Practice_SC.L2-3.13.5_Details|More Practice Details...]] |
| |-
| |
| |[[Practice_SC.L1-3.13.5_Details|More Practice Details...]] | |
| |} | | |} |
|
| |
|
| == System and Information Integrity (SI) == | | == System and Information Integrity (SI) == |
| === Level 1 SI Practices ===
| | === SI.L1-B.1.XII – Flaw Remediation [FCI Data] === |
| ==== SI.L1-3.14.1 – FLAW REMEDIATION ====
| |
| {|class="wikitable" | | {|class="wikitable" |
| |'''SECURITY REQUIREMENT''' | | |'''SECURITY REQUIREMENT''' |
| Identify, report, and correct information and information system flaws in a timely manner. | | Identify, report, and correct information and information system flaws in a timely manner. |
| |- | | |- |
| |ASSESSMENT OBJECTIVES''' | | |'''ASSESSMENT OBJECTIVES''' |
| : [a] the time within which to identify system flaws is specified; | | : [a] the time within which to identify system flaws is specified; |
| : [b] system flaws are identified within the specified time frame; | | : [b] system flaws are identified within the specified time frame; |
| Line 3,465: |
Line 330: |
| : [f] system flaws are corrected within the specified time frame. | | : [f] system flaws are corrected within the specified time frame. |
| |- | | |- |
| |[[DoD_Assessment_Methodology|DoD Assessment Scoring Value]]: '''5'''
| | |[[Practice_SI.L2-3.14.1_Details|More Practice Details...]] |
| |-
| |
| |[[Practice_SI.L1-3.14.1_Details|More Practice Details...]] | |
| |} | | |} |
|
| |
|
| ==== SI.L1-3.14.2 – MALICIOUS CODE PROTECTION ====
| | === SI.L1-B.1.XIII – Malicious Code ProTection [FCI Data] === |
| {|class="wikitable" | | {|class="wikitable" |
| |'''SECURITY REQUIREMENT''' | | |'''SECURITY REQUIREMENT''' |
| Line 3,479: |
Line 342: |
| : [b] protection from malicious code at designated locations is provided. | | : [b] protection from malicious code at designated locations is provided. |
| |- | | |- |
| |[[DoD_Assessment_Methodology|DoD Assessment Scoring Value]]: '''5'''
| | |[[Practice_SI.L2-3.14.2_Details|More Practice Details...]] |
| |-
| |
| |[[Practice_SI.L1-3.14.2_Details|More Practice Details...]] | |
| |} | | |} |
|
| |
|
| ==== SI.L1-3.14.4 – UPDATE MALICIOUS CODE PROTECTION ====
| | === SI.L1-B.1.XIV – Update Malicious Code Protection [FCI Data] === |
| {|class="wikitable" | | {|class="wikitable" |
| |'''SECURITY REQUIREMENT''' | | |'''SECURITY REQUIREMENT''' |
| Update malicious code protection mechanisms when new releases are available. | | Update malicious code protection mechanisms when new releases are available. |
| |- | | |- |
| |ASSESSMENT OBJECTIVES''' | | |'''ASSESSMENT OBJECTIVES''' |
| : [a] malicious code protection mechanisms are updated when new releases are available. | | : [a] malicious code protection mechanisms are updated when new releases are available. |
| |- | | |- |
| |[[DoD_Assessment_Methodology|DoD Assessment Scoring Value]]: '''5'''
| | |[[Practice_SI.L2-3.14.4_Details|More Practice Details...]] |
| |-
| |
| |[[Practice_SI.L1-3.14.4_Details|More Practice Details...]] | |
| |} | | |} |
|
| |
|
| ==== SI.L1-3.14.5 – SYSTEM & FILE SCANNING ====
| | === SI.L1-B.1.XV – System & File Scanning [FCI Data] === |
| {|class="wikitable" | | {|class="wikitable" |
| |'''SECURITY REQUIREMENT''' | | |'''SECURITY REQUIREMENT''' |
| Line 3,507: |
Line 366: |
| : [c] real-time malicious code scans of files from external sources as files are downloaded, opened, or executed are performed. | | : [c] real-time malicious code scans of files from external sources as files are downloaded, opened, or executed are performed. |
| |- | | |- |
| |[[DoD_Assessment_Methodology|DoD Assessment Scoring Value]]: '''3''' | | |[[Practice_SI.L2-3.14.5_Details|More Practice Details...]] |
| | |} |
| | |
| | == Appendix A – Acronyms and Abbreviations == |
| | {| class="wikitable" |
| | |- |
| | || AC || Access Control |
| | |- |
| | || CD-ROM || Compact Disk Read-Only Memory |
| | |- |
| | || CFR || Code of Federal Regulations |
| | |- |
| | || CMMC || Cybersecurity Maturity Model Certification |
| | |- |
| | || CUI || Controlled Unclassified Information |
| | |- |
| | || CVE || Common Vulnerabilities and Exposures |
| | |- |
| | || CWE || Common Weakness Enumeration |
| | |- |
| | || DFARS || Defense Federal Acquisition Regulation Supplement |
| | |- |
| | || DMZ || Demilitarized Zone |
| | |- |
| | || DoD || Department of Defense |
| | |- |
| | || ESP || External Service Provider |
| | |- |
| | || FAR || Federal Acquisition Regulation |
| | |- |
| | || FCI || Federal Contract Information |
| | |- |
| | || IT || Information Technology |
| | |- |
| | || NIST || National Institute of Standards and Technology |
| | |- |
| | || OSA || Organization Seeking Assessment |
| | |- |
| | || PIV || Personal Identity Verification |
| | |- |
| | || SC || System and Communications Protection |
| | |- |
| | || SI || System and Information Integrity |
| | |- |
| | || SP || Special Publication |
| | |- |
| | || SPRS || Supplier Performance Risk System |
| | |- |
| | || USB || Universal Serial Bus |
| | |- |
| | || UUENCODE || Unix-to-Unix Encode |
| |- | | |- |
| |[[Practice_SI.L1-3.14.5_Details|More Practice Details...]] | | || VLAN || Virtual Local Area Network |
| |} | | |} |