NIST Security Controls BEST PRACTICES
NIST Security Controls BEST PRACTICES
Revision 3
Recommended Security Controls
for Federal Information Systems
and Organizations
INFORMATION S E C U R I T Y
June 2009
The Information Technology Laboratory (ITL) at the National Institute of Standards and
Technology (NIST) promotes the U.S. economy and public welfare by providing technical
leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test
methods, reference data, proof of concept implementations, and technical analyses to advance the
development and productive use of information technology. ITL’s responsibilities include the
development of management, administrative, technical, and physical standards and guidelines for
the cost-effective security and privacy of other than national security-related information in
federal information systems. The Special Publication 800-series reports on ITL’s research,
guidelines, and outreach efforts in information system security, and its collaborative activities
with industry, government, and academic organizations.
PAGE ii
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
Authority
This publication has been developed by NIST to further its statutory responsibilities under the
Federal Information Security Management Act (FISMA), Public Law (P.L.) 107-347. NIST is
responsible for developing information security standards and guidelines, including minimum
requirements, for federal information systems, but such standards and guidelines shall not apply
to national security systems. This guideline is consistent with the requirements of the Office of
Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency Information
Systems, as analyzed in Circular A-130, Appendix IV: Analysis of Key Sections. Supplemental
information is provided in Circular A-130, Appendix III.
Nothing in this publication should be taken to contradict the standards and guidelines made
mandatory and binding on federal agencies by the Secretary of Commerce under statutory
authority. Nor should these guidelines be interpreted as altering or superseding the existing
authorities of the Secretary of Commerce, Director of the OMB, or any other federal official.
This publication may be used by nongovernmental organizations on a voluntary basis and is not
subject to copyright. Attribution would, however, be appreciated by NIST.
(June 2009)
Certain commercial entities, equipment, or materials may be identified in this document in order to
describe an experimental procedure or concept adequately. Such identification is not intended to imply
recommendation or endorsement by NIST, nor is it intended to imply that the entities, materials, or
equipment are necessarily the best available for the purpose.
There may be references in this publication to other publications currently under development by NIST
in accordance with its assigned statutory responsibilities. The information in this publication, including
concepts and methodologies, may be used by federal agencies even before the completion of such
companion publications. Thus, until each publication is completed, current requirements, guidelines,
and procedures, where they exist, remain operative. For planning and transition purposes, federal
agencies may wish to closely follow the development of these new publications by NIST.
Organizations are encouraged to review all draft publications during public comment periods and
provide feedback to NIST. All NIST publications, other than the ones noted above, are available at
http://csrc.nist.gov/publications.
PAGE iii
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
NIST develops and issues standards, guidelines, and other publications to assist federal agencies 1
in implementing FISMA and managing cost-effective information security programs to protect
the information and information systems supporting organizational operations and assets,
individuals, other organizations, and the Nation.
• Federal Information Processing Standards (FIPS) are approved by the Secretary of
Commerce and issued by NIST in accordance with FISMA. FIPS are compulsory and
binding for federal agencies. FISMA requires that federal agencies comply with these
standards, and therefore, agencies may not waive their use.
• Special Publications (SPs) are developed and issued by NIST as recommendations and
guidance documents. For other than national security programs and systems, federal
agencies must follow those NIST Special Publications mandated in a Federal Information
Processing Standard. At the present time, FIPS 200 mandates the use of Special
Publication 800-53, as amended. In addition, OMB policies (including OMB FISMA
Reporting Instructions for the Federal Information Security Management Act and Agency
Privacy Management), state that for other than national security programs and systems,
federal agencies must follow certain specific NIST Special Publications. 2
• Other security-related publications, including interagency reports (NISTIRs) and ITL
Bulletins, provide technical and other information about NIST's activities. These
publications are mandatory only when specified by OMB.
1
The term agency is used in this publication in lieu of the more general term organization only in those circumstances
where its usage is directly related to other source documents such as federal legislation or policy.
2
While federal agencies are required to follow certain specific NIST Special Publications in accordance with OMB
policy, there is flexibility in how agencies apply the guidance. Federal agencies should apply the security concepts and
principles articulated in the NIST Special Publications in accordance with and in the context of the agency’s missions,
business functions, and environment of operation. Consequently, the application of NIST guidance by federal agencies
can result in different security solutions that are equally acceptable, compliant with the guidance, and meet the OMB
definition of adequate security for federal information systems. When assessing federal agency compliance with NIST
Special Publications, Inspectors General, evaluators, auditors, and assessors, should consider the intent of the security
concepts and principles articulated within the specific guidance document and how the agency applied the guidance in
the context of its mission/business responsibilities, operational environment, and unique organizational conditions.
PAGE iv
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
Acknowledgements
This publication was developed by the Joint Task Force Transformation Initiative Interagency
Working Group with representatives from the Civil, Defense, and Intelligence Communities in an
ongoing effort to produce a unified information security framework for the federal government—
including a consistent process for selecting and specifying safeguards and countermeasures (i.e.,
security controls) for federal information systems. The Project Leader, Ron Ross, from the
National Institute of Standards and Technology, wishes to acknowledge and thank the senior
leadership team from the U.S. Departments of Commerce and Defense, the Office of the Director
of National Intelligence, the Committee on National Security Systems, and the members of the
interagency working group whose dedicated efforts contributed significantly to the publication.
The senior leadership team, working group members, and their organizational affiliations include:
In addition to the above acknowledgments, a special note of thanks goes to Peggy Himes and
Elizabeth Lennon for their superb technical editing and administrative support; to Pat Toth,
Murugiah Souppaya, Kevin Stine, Matt Barrett, Steve Quinn, Bill MacGregor, Karen Scarfone,
Bill Burr, Doug Montgomery, Scott Rose, Mark Wilson, Annabelle Lee, and Erika McCallister
for their review of the security controls and insightful recommendations. The authors also wish
to recognize Marshall Abrams, Jennifer Fabius Greene, Harriett Goldman, John Woodward,
Karen Quigg, Peter Gouldmann, Roger Johnson, Sarbari Gupta, Dennis Bailey, Richard Wilsher,
Nadya Bartol, Joe Weiss, Mike Rubin, Tom Madden, Denise Farrar, Paul Bicknell, Robert
PAGE v
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
Niemeyer, and Brett Burley for their exceptional contributions in helping to improve the content
of the publication. And finally, the authors gratefully acknowledge and appreciate the significant
contributions from individuals and organizations in the public and private sectors, both nationally
and internationally, whose thoughtful and constructive comments improved the overall quality
and usefulness of this publication.
A special acknowledgment is given to the participants in the Industrial Control System (ICS)
Security Project who have put forth significant effort in helping to augment the security controls
in NIST Special Publication 800-53 for industrial control systems. These participants include:
Keith Stouffer, Stu Katzke, and Marshall Abrams from the ICS Security Project Development
Team; federal agencies participating in the ICS workshops; and individuals and organizations in
the public and private sector ICS community providing insightful comments on the proposed
augmentations.
PAGE vi
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
FIPS 200, Minimum Security Requirements for Federal Information and Information Systems, is a
mandatory federal standard developed by NIST in response to FISMA. To comply with the federal
standard, organizations must first determine the security category of their information system in
accordance with FIPS 199, Standards for Security Categorization of Federal Information and
Information Systems, and then apply the appropriately tailored set of baseline security controls in
NIST Special Publication 800-53, Security Controls for Federal Information Systems and
Organizations. Organizations have flexibility in applying the baseline security controls in
accordance with the guidance provided in Special Publication 800-53. This allows organizations to
select security controls that more closely align with their mission and business requirements and
environments of operation.
FIPS 200 and NIST Special Publication 800-53, in combination, help ensure that appropriate
security requirements and security controls are applied to all federal information and information
systems. An organizational assessment of risk validates the initial security control selection and
determines if any additional controls are needed to protect organizational operations (including
mission, functions, image, or reputation), organizational assets, individuals, other organizations, or
the Nation. The resulting set of agreed-upon security controls establishes a level of security due
diligence for the organization.
PAGE vii
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
In developing standards and guidelines required by FISMA, NIST consults with other federal agencies
and offices as well as the private sector to improve information security, avoid unnecessary and costly
duplication of effort, and ensure that NIST publications are complementary with the standards and
guidelines employed for the protection of national security information and systems. In addition to its
comprehensive public review and vetting process, NIST is collaborating with the Office of the Director
of National Intelligence (ODNI), the Department of Defense (DOD), and the Committee on National
Security Systems (CNSS) to establish a common foundation for information security across the federal
government. A common foundation for information security will provide the Intelligence, Defense,
and Civil sectors of the federal government and their support contractors, more uniform and consistent
ways to manage the risk to organizational operations and assets, individuals, other organizations, and
the Nation that results from the operation and use of information systems. NIST is also working with
public and private sector entities to establish specific mappings and relationships between the security
standards and guidelines developed by NIST and the International Organization for Standardization
and International Electrotechnical Commission (ISO/IEC) 27001, Information Security Management
System (ISMS).
PAGE viii
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
CAUTIONARY NOTE
Any references in this publication to national security systems or national security information, to
include descriptions of security controls and control enhancements in Appendix F, should not be
interpreted as establishing requirements for or levying requirements on organizations that are part of
the national security community. Rather, the information is provided to these organizations as part of
the ongoing development of the unified federal framework for information security and is available for
use by the national security community with the express approval of the Chairman, Committee on
National Security Systems, the Director of National Intelligence, the Secretary of Defense, or their
designees.
PAGE ix
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
Notes to Reviewers
The public draft of Special Publication 800-53, Revision 3, is historic in nature. For the first
time, and as part of the ongoing initiative to develop a unified information security framework for
the federal government and its contractors, NIST has included security controls in its catalog for
both national security and non national security systems. The updated security control catalog
incorporates best practices in information security from the United States Department of Defense,
Intelligence Community, and Civil agencies, to produce the most broad-based and comprehensive
set of safeguards and countermeasures ever developed for information systems. The standardized
set of management, operational, and technical controls provide a common specification language
for information security for federal information systems processing, storing, and transmitting both
national security and non national security information. The revised security control catalog also
includes state-of-the-practice safeguards and countermeasures needed by organizations to address
advanced cyber threats capable of exploiting vulnerabilities in federal information systems. In
addition to the expansion of the security control catalog, Special Publication 800-53, Revision 3
contains significant changes including:
• A simplified, six-step Risk Management Framework;
• Additional security controls and control enhancements for advanced cyber threats;
• Recommendations for prioritizing or sequencing security controls during implementation or
deployment;
• Revised security control structure with a new references section to list applicable federal
laws, Executive Orders, directives, policies, standards, and guidelines related to a control;
• Elimination of security requirements from Supplemental Guidance sections;
• Guidance on using the Risk Management Framework for legacy information systems and for
external providers of information system services;
• Updates to security control baselines consistent with current threat information and known
cyber attacks;
• Removal of the FIPS 199 security control baseline allocation bar resident with each control;
• Organization-level security controls for managing information security programs;
• Guidance on the management of common controls within organizations; and
• Strategy for harmonizing FISMA security standards and guidelines with international security
standard ISO/IEC 27001.
The important changes described in Special Publication 800-53, Revision 3 are part of a larger
strategic initiative to focus on enterprise-wide, near real-time risk management; that is, managing
risks from information systems in dynamic environments of operation that can adversely affect
organizational operations and assets, individuals, other organizations, and the Nation.
Your feedback to us, as always, is important. We appreciate each and every contribution from
our reviewers. The very insightful comments from both the public and private sectors continue to
help shape our publications and ensure that they are meeting the needs of our customers.
-- RON ROSS
FISMA IMPLEMENTATION PROJECT LEADER
PAGE x
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
Table of Contents
PAGE xi
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
Prologue
“…Through the process of risk management, leaders must consider risk to US interests from
adversaries using cyberspace to their advantage and from our own efforts to employ the global
nature of cyberspace to achieve objectives in military, intelligence, and business operations… “
“…For operational plans development, the combination of threats, vulnerabilities, and impacts
must be evaluated in order to identify important trends and decide where effort should be applied
to eliminate or reduce threat capabilities; eliminate or reduce vulnerabilities; and assess,
coordinate, and deconflict all cyberspace operations…”
“…Leaders at all levels are accountable for ensuring readiness and security to the same degree
as in any other domain…"
PAGE xii
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
CHAPTER ONE
INTRODUCTION
THE NEED FOR SECURITY CONTROLS TO PROTECT INFORMATION AND INFORMATION SYSTEMS
T
he selection and implementation of appropriate security controls for an information
system 3 are important tasks that can have major implications on the operations 4 and assets
of an organization 5 as well as the welfare of individuals and the Nation. Security controls
are the management, operational, and technical safeguards or countermeasures employed within
an organizational information system to protect the confidentiality, integrity, and availability of
the system and its information. There are several important questions that should be answered by
organizational officials when addressing the security considerations for their information systems:
• What security controls are needed to adequately mitigate the risk incurred by the use of
information and information systems in the execution of organizational missions and business
functions?
• Have the selected security controls been implemented or is there a realistic plan for their
implementation?
• What is the desired or required level of assurance (i.e., grounds for confidence) that the
selected security controls, as implemented, are effective 6 in their application?
The answers to these questions are not given in isolation but rather in the context of an effective
information security program for the organization that identifies, mitigates as deemed necessary,
and monitors on an ongoing basis, risks 7 arising from its information and information systems. 8
The security controls defined in this publication and recommended for use by organizations in
protecting their information systems should be employed in conjunction with and as part of a
well-defined and documented information security program. The program management controls
(Appendix G), complement the security controls for an information system (Appendix F) by
focusing on the organization-wide information security requirements that are independent of any
particular information system and are essential for managing information security programs.
3
An information system is a discrete set of information resources organized expressly for the collection, processing,
maintenance, use, sharing, dissemination, or disposition of information. Information systems also include specialized
systems such as industrial/process controls systems, telephone switching/private branch exchange (PBX) systems, and
environmental control systems.
4
Organizational operations include mission, functions, image, and reputation.
5
The term organization describes an entity of any size, complexity, or positioning within an organizational structure
(e.g., a federal agency or, as appropriate, any of its operational elements).
6
Security control effectiveness addresses the extent to which the controls are implemented correctly, operating as
intended, and producing the desired outcome with respect to meeting the security requirements for the information
system in its operational environment.
7
Risk is a measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a
function of: (i) the adverse impacts that would arise if the circumstance or event occurs; and (ii) the likelihood of
occurrence. Information system-related security risks are those risks that arise from the loss of confidentiality,
integrity, or availability of information or information systems and consider the adverse impacts to organizational
operations and assets, individuals, other organizations, and the Nation.
8
The E-Government Act (P.L. 107-347) recognizes the importance of information security to the economic and
national security interests of the United States. Title III of the E-Government Act, entitled the Federal Information
Security Management Act (FISMA), emphasizes the need for organizations to develop, document, and implement an
organization-wide program to provide security for the information systems that support its operations and assets.
CHAPTER 1 PAGE 1
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
It is of paramount importance that responsible officials within the organization understand the
risks and other factors that could adversely affect organizational operations, organizational assets,
individuals, other organizations, and the Nation. 9 These officials must also understand the
current status of their security programs and the security controls planned or in place to protect
their information and information systems in order to make informed judgments and investments
that appropriately mitigate risks to an acceptable level. The ultimate objective is to conduct the
day-to-day operations of the organization and to accomplish the organization’s stated missions
and business functions with what the Office of Management and Budget (OMB) Circular A-130
defines as adequate security, or security commensurate with risk resulting from the unauthorized
access, use, disclosure, disruption, modification, or destruction of information.
The guidelines provided in this special publication are applicable to all federal information
systems 11 other than those systems designated as national security systems as defined in 44
U.S.C., Section 3542. The guidelines have been broadly developed from a technical perspective
to complement similar guidelines for national security systems and may be used for such systems
with the approval of the Director of National Intelligence (DNI), the Secretary of Defense
(SECDEF), or the Chairman of the Committee on National Security Systems (CNSS), or their
designees. State, local, and tribal governments, as well as private sector organizations are
encouraged to consider using these guidelines, as appropriate.
9
Includes risk to U.S. critical infrastructure/key resources as described in Homeland Security Presidential Directive 7.
10
Information system components include, but are not limited to, mainframes, servers, workstations, network
components, operating systems, middleware, and applications. Network components can include, for example, such
devices as firewalls, sensors (local or remote), switches, guards, routers, gateways, wireless access points, and network
appliances. Servers can include, for example, database servers, authentication servers, electronic mail and web servers,
proxy servers, domain name servers, and network time servers. Information system components are either purchased
commercially off-the-shelf or are custom-developed and can be deployed in land-based, sea-based, airborne, and/or
space-based information systems.
11
A federal information system is an information system used or operated by an executive agency, by a contractor of an
executive agency, or by another organization on behalf of an executive agency.
CHAPTER 1 PAGE 2
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
The catalog of security controls provided in Special Publication 800-53 can be effectively used to
demonstrate compliance with a variety of governmental, organizational, or institutional security
requirements. It is the responsibility of organizations to select the appropriate security controls,
to implement the controls correctly, and to demonstrate the effectiveness of the controls in
satisfying their stated security requirements. The security controls in the catalog facilitate the
development of assessment methods and procedures that can be used to demonstrate control
effectiveness in a consistent and repeatable manner—thus contributing to the organization’s
confidence that there is ongoing compliance with its stated security requirements. 14
12
At the agency level, this position is known as the Senior Agency Information Security Officer. Organizations may
also refer to this position as the Senior Information Security Officer or the Chief Information Security Officer.
13
Security requirements are those requirements levied on an information system that are derived from laws, Executive
Orders, directives, policies, instructions, regulations, or organizational (mission) needs to ensure the confidentiality,
integrity, and availability of the information being processed, stored, or transmitted.
14
NIST Special Publication 800-53A provides guidance on assessing the effectiveness of security controls defined in
this publication.
CHAPTER 1 PAGE 3
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
While the FIPS 199 security categorization associates the operation of the information system
with the potential adverse impact on organizational operations and assets, individuals, other
organizations, and the Nation, 17 the incorporation of refined threat and vulnerability information
during the risk assessment facilitates the selection of additional security controls supplementing
the tailored baseline to address specific organizational needs and tolerance for risk. The final,
agreed-upon set of security controls is documented with appropriate rationale in the security plan
for the information system. The use of security controls from Special Publication 800-53 and the
incorporation of tailored baseline controls as a starting point in the control selection process,
facilitate a more consistent level of security across federal information systems and organizations.
It also offers the needed flexibility to appropriately modify the controls based on specific
organizational policies and requirements, particular conditions and circumstances, known threat
and vulnerability information, and tolerance for risk.
15
An organization typically exercises direct managerial, operational, and/or financial control over its information
systems and the security provided to those systems, including the authority and capability to implement the appropriate
security controls necessary to protect organizational operations, organizational assets, individuals, other organizations,
and the Nation.
16
Risk assessments can be accomplished in a variety of ways depending on the specific needs of the organization.
NIST Special Publication 800-30 provides guidance on the assessment of risk as part of an overall risk management
process.
17
Considerations for potential national-level impacts and impacts to other organizations in categorizing organizational
information systems derive from the USA PATRIOT Act and Homeland Security Presidential Directives.
18
Successful life cycle management depends on having qualified personnel to oversee and manage the information
systems within an organization. The skills and knowledge of organizational personnel with information systems (and
information security) responsibilities should be carefully evaluated (e.g., through performance, certification, etc.).
NIST Special Publication 800-64 provides guidance on security considerations in life cycle management.
CHAPTER 1 PAGE 4
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
From a systems engineering viewpoint, security is just one of many required operational
capabilities for an information system supporting organizational mission/business processes—
capabilities that must be funded by the organization throughout the life cycle of the system in
order to achieve mission/business success. It is important that the organization realistically
assesses the risk to organizational operations and assets, individuals, other organizations, and the
Nation that arises by placing the information system into operation or continuing its operation.
19
NIST Special Publication 800-39 provides guidance on organization-wide risk management.
CHAPTER 1 PAGE 5
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
CHAPTER TWO
THE FUNDAMENTALS
SECURITY CONTROL STRUCTURE, ORGANIZATION, BASELINES, AND ASSURANCE
T his chapter presents the fundamental concepts associated with security control selection
and specification including: (i) the structure of security controls and the organization of the
controls in the control catalog; (ii) security control baselines; (iii) the identification and use
of common security controls; (iv) security controls in external environments; (v) security control
assurance; and (vi) future revisions to the security controls, the control catalog, and baseline
controls.
20
The seventeen security control families in NIST Special Publication 800-53, described in the security control catalog
in Appendix F, are closely aligned with the seventeen security-related areas in FIPS 200 specifying the minimum
security requirements for protecting federal information and information systems. One additional family provides
controls for information security programs (Appendix G, Program Management [PM] family). This family, while not
referenced in FIPS 200, provides security controls at the organizational rather than the information-system level.
21
A control family is associated with a given class based on the dominant characteristics of the controls in that family.
CHAPTER 2 PAGE 6
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
To identify each security control, a numeric identifier is appended to the family identifier to
indicate the number of the control within the control family. For example, CP-9 is the ninth
control in the Contingency Planning family. The security control structure consists of four key
components: (i) a control section; (ii) a control enhancements section; (iii) a supplemental
guidance section; and (iv) a references section. The following example from the Auditing and
Accountability family illustrates the structure of a typical security control.
AU-5 RESPONSE TO AUDIT PROCESSING FAILURES
The control section provides a concise statement of the specific security capability needed to
protect a particular aspect of an organization or information system. 22 The control statement
describes specific security-related activities or actions to be carried out by the organization or by
the information system. For some controls in the control catalog, a degree of flexibility is
provided by allowing organizations to selectively define input values for certain parameters
associated with the controls. This flexibility is achieved through the use of assignment and
selection operations within the control (see Section 3.3). Assignment and selection operations
provide an opportunity for an organization to tailor the security controls to support specific
mission, business, or operational needs. For example, an organization can specify the actions to
be taken by the information system in the event of an audit processing failure (see AU-5 example
above), the specific events to be audited within the system, the frequency of conducting system
backups, restrictions on password use, or the distribution list for organizational policies and
procedures. 23 Once specified, the organization-defined values become part of the control, and the
organization is assessed against the completed control statement. Some assignment operations
may specify minimum or maximum values that constrain the values that may be input by the
organization. Selection statements also narrow the potential input values by providing a specific
list of items from which the organization must choose.
22
Security controls are designed to be technology and implementation independent and therefore, do not contain
specific details in these areas. Organizations provide such detail in the security plan for the information system.
23
The organization determines whether a specific assignment or selection is completed at the organizational-level,
information system-level, or a combination of the two with possible system-level specifics within organizational-level
constraints/guidance.
CHAPTER 2 PAGE 7
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
The control enhancements section provides statements of security capability to: (i) build in
additional, but related, functionality to a basic control; and/or (ii) increase the strength of a basic
control. In both cases, the control enhancements are used in an information system requiring
greater protection due to the potential impact of loss or when organizations seek additions to a
basic control’s functionality based on the results of a risk assessment. Control enhancements are
numbered sequentially within each control so that the enhancements can be easily identified when
selected to supplement the basic control. In the previous example for AU-5, if all three control
enhancements are selected, the control designation becomes AU-5 (1) (2) (3). 24 The numerical
designation of a security control enhancement is used only to identify a particular enhancement
within the control structure. The designation is neither indicative of the relative strength of the
control enhancement nor assumes any hierarchical relationship among the enhancements.
The supplemental guidance section provides additional information related to a specific security
control. Organizations are expected to apply the supplemental guidance as appropriate, when
defining, developing, and implementing security controls. In certain instances, the supplemental
guidance provides more detail concerning the control requirements or important considerations
and the needed flexibility for implementing security controls in the context of an organization’s
operational environment, specific mission requirements, or assessment of risk. Finally, while not
illustrated in the AU-5 example, some control enhancements also contain supplemental guidance.
Enhancement supplemental guidance is used in situations where the guidance is not generally
applicable to the entire control but instead focused on the particular control enhancement.
The references section includes a list of applicable federal laws, Executive Orders, directives,
policies, standards, and guidelines (e.g., OMB Circulars, FIPS, and NIST Special Publications),
that are relevant to a particular security control or control enhancement. 25 The references provide
appropriate federal legislative and policy mandates as well as additional implementation detail for
specific management, operational, or technical controls/enhancements. The references section
also contains pertinent websites for organizations to use in obtaining additional information with
regard to security control implementation and assessment.
24
AU-5 Enhancement (3) is an example of a requirement in the security control catalog (Appendix F) that is not in any
of the control baselines (Appendix D). Such requirements can be used by organizations in supplementing the tailored
baselines as described in Section 3.3 in order to achieve what the organization deems to be adequate risk mitigation.
25
The references listed in the security control references section are not inclusive or complete. Publications referenced
are subject to ongoing revisions and updates. Organizations should confirm from the respective official sources of the
publications (e.g., OMB, NIST, NARA), that the most recent versions are being used for organizational application.
CHAPTER 2 PAGE 8
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
To assist organizations in making the appropriate selection of security controls for an information
system, the concept of baseline controls is introduced. Baseline controls are the starting point for
the security control selection process described in this document and are determined by the
information system security categorization in accordance with FIPS 199. 26 The tailored security
control baseline (i.e., the appropriate control baseline from Appendix D adjusted in accordance
with the guidance in Section 3.3) is the minimum set of security controls for the information
system. Because the baseline is intended to be a broadly applicable starting point, supplements to
the tailored baseline (see Section 3.4) will likely be necessary in order to achieve adequate risk
mitigation. The tailored baseline is supplemented based on an organizational assessment of risk
and the resulting controls documented in the security plan for the information system.
Appendix D provides a listing of baseline security controls. Three sets of baseline controls have
been identified corresponding to the low-impact, moderate-impact, and high-impact levels
defined in the FIPS 199 security categorization process and used in Section 3.2 of this document
to provide an initial set of security controls for each impact level. 27 Appendix F provides a
catalog of security controls for information systems, arranged by control families. Chapter Three
provides additional information on how to use security categories to select the appropriate set of
baseline security controls, how to apply the tailoring guidance to the baseline controls, and how
to supplement the tailored baseline in order to achieve adequate risk mitigation.
Implementation Tip
There are additional security controls and control enhancements that appear in the security control
catalog (Appendix F) that are found in only higher-impact baselines or not used in any of the baselines.
These additional security controls and control enhancements for the information system are available to
organizations and can be used in supplementing the tailored baselines to achieve the needed level of
protection in accordance with an organizational assessment of risk. Moreover, security controls and
control enhancements contained in higher-level baselines can also be used to strengthen the level of
protection provided in lower-level baselines, if deemed appropriate. At the end of the security control
selection process, the agreed-upon set of controls in the security plan must be sufficient to adequately
mitigate risks to organizational operations and assets, individuals, other organizations, and the Nation.
26
FIPS 199 security categories are based on the potential impact on an organization or individuals should certain events
occur which jeopardize the information and information systems needed by the organization to accomplish its assigned
mission, protect its assets, fulfill its legal responsibilities, maintain its day-to-day functions, and protect individuals.
27
The baseline security controls contained in Appendix D are not necessarily absolutes in that the tailoring guidance
described in Section 3.3 provides organizations with the ability to eliminate certain controls or specify compensating
controls in accordance with the terms and conditions established by authorizing officials.
28
The assignment of responsibility for the development, implementation, assessment, and approval/authorization of
common controls is carried out by the Chief Information Officer or other appropriate organizational officials at the
senior leadership level. Organizational entities assigned responsibility for common controls use the Risk Management
Framework described in Chapter Three to help ensure appropriate security capabilities are provided.
CHAPTER 2 PAGE 9
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
exercise with the active involvement of authorizing officials, chief information officer, senior
information security officer, information system owners, information owners/stewards, and
information system security officers. The organization-wide exercise considers the security
categories of information systems within the organization in accordance with FIPS 199 and the
security controls necessary to adequately mitigate the risks arising from the use of those systems
(see baseline security controls in Section 2.2). For example, common controls can be identified
for all low-impact information systems by considering the associated baseline security controls in
Appendix D. Similar exercises can be conducted for moderate-impact and high-impact
information systems as well.
Many of the security controls needed to protect organizational information systems (e.g.,
contingency planning controls, incident response controls, security training and awareness
controls, personnel security controls, physical and environmental protection controls, and
intrusion detection controls) are excellent candidates for common control status. Information
security program management controls (see Appendix G, PM family) may also be deemed
common controls by the organization since the controls are employed at the organization level
and typically serve multiple information systems. By centrally managing and documenting the
development, implementation, assessment, and approval/authorization of the common controls,
security costs can be amortized across multiple information systems. Security controls not
designated as common controls are considered system-specific controls and are the responsibility
of information system owners and authorizing officials. Security plans for individual information
systems identify which security controls required for those systems have been designated by the
organization as common controls and which controls have been designated as system-specific
controls.
Organizations assign a hybrid status to security controls where one part of the control is deemed
to be common, while another part of the control is deemed to be system-specific. For example,
an organization may view the IR-1 (Incident Response Policy and Procedures) security control as
a hybrid control with the policy portion of the control deemed to be common and the procedures
portion of the control deemed to be system-specific. Hybrid controls may also serve as templates
for further control refinement. An organization may choose, for example, to implement the CP-2
(Contingency Planning) security control as a master template for a generalized contingency plan
for all organizational information systems with individual information system owners tailoring
the plan, where appropriate, for system-specific uses.
29
Information security program plans are described in Appendix G.
CHAPTER 2 PAGE 10
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
Information system owners are responsible for any system-specific issues associated with the
implementation of an organization’s common controls. These issues are identified and described
in the security plans for the individual information systems. The senior information security
officer, acting on behalf of the chief information officer, coordinates with common control
providers (e.g., facilities managers, site managers, personnel managers) responsible for the
implementation, assessment, and approval/authorization of the designated common controls to
ensure that the required controls are put into place, the controls are assessed for effectiveness, and
the assessment results are shared with the appropriate information system owners.
The common controls contained in the information security program plan are approved and/or
authorized for use by a senior organizational official, with at least the same level of authority and
responsibility for managing risk as the authorization officials for information systems. 30 A plan
of action and milestones document is developed and maintained for the common controls that are
deemed through assessment to be less than effective. Common controls are subject to the same
continuous monitoring requirements as security controls employed in individual organizational
information systems.
The security plans for individual information systems and the organization-wide information
security program plan together, provide complete coverage for all security controls employed
within the organization. Partitioning security controls into common controls and system-specific
controls can result in significant savings to the organization in implementation and assessment
costs. It can also result in a more consistent application of the security controls across the
organization. While the concept of security control partitioning into common controls and
system-specific controls is straightforward and intuitive, the application of this principle within
an organization takes planning, coordination, and perseverance.
Implementation Tip
The FIPS 199 security categorization process and the selection of common controls are closely related
activities that are most effectively accomplished on an organization-wide basis with the involvement of
the organization’s senior leadership (i.e., authorizing officials, chief information officer, senior information
security officer, information system owners, mission/business owners, information owners/stewards).
These individuals have the collective corporate knowledge to understand the organization’s priorities, the
importance of the organization’s operations and assets, and the relative importance of the organizational
information systems that support those operations and assets. The organization’s senior leaders are
also in the best position to select the common controls for each of the security control baselines and
assign organizational responsibilities for implementing, assessing, and approving those controls.
30
When common controls are inherited from external environments, organizations should consult Section 2.4.
CHAPTER 2 PAGE 11
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
Relationships with external service providers are established in a variety of ways, for example,
through joint ventures, business partnerships, outsourcing arrangements (i.e., through contracts,
interagency agreements, lines of business arrangements), licensing agreements, and/or supply
chain exchanges. The growing dependence on external service providers and new relationships
being forged with those providers present new and difficult challenges for the organization,
especially in the area of information system security. These challenges include:
• Defining the types of external services provided to the organization;
• Describing how the external services are protected in accordance with the security
requirements of the organization; and
• Obtaining the necessary assurances that the risk to organizational operations and assets,
individuals, other organizations, and the Nation arising from the use of the external services
is acceptable.
FISMA and OMB policy require external providers handling federal information or operating
information systems on behalf of the federal government to meet the same security requirements
as federal agencies. Security requirements for external providers including the security controls
for information systems processing, storing, or transmitting federal information are expressed in
appropriate contracts or other formal agreements using the Risk Management Framework and
associated NIST security standards and guidelines described in Chapter Three. Organizations can
require external providers to implement all steps in the Risk Management Framework described
in Chapter Three with the exception of the security authorization step, which remains an inherent
federal responsibility that is directly linked to the management of risk related to the use of
external information system services. 31
The assurance or confidence that the risk from using external services is at an acceptable level
depends on the trust 32 that the organization places in the external service provider. In some cases,
the level of trust is based on the amount of direct control the organization is able to exert on the
external service provider with regard to employment of security controls necessary for the
protection of the service and the evidence brought forth as to the effectiveness of those controls.
The level of control is usually established by the terms and conditions of the contract or service-
level agreement with the external service provider and can range from extensive (e.g., negotiating
a contract or agreement that specifies detailed security control requirements for the provider) to
very limited (e.g., using a contract or service-level agreement to obtain commodity services 33
such as commercial telecommunications services). In other cases, the level of trust is based on
factors that convince the organization that the requisite security controls have been employed and
that a credible determination of control effectiveness exists. For example, a separately authorized
external information system service provided to an organization through a line of business
relationship may provide a degree of trust in the external service within the tolerable risk range of
the authorizing official.
31
See Implementation Tip in Section 3.3 for applying the Risk management Framework to external service providers.
32
The level of trust that an organization places in an external service provider can vary widely, ranging from those who
are highly trusted (e.g., business partners in a joint venture that share a common business model and common goals) to
those who are less trusted and represent greater sources of risk (e.g., business partners in one endeavor who are also
competitors in another market sector).
33
Commercial providers of commodity-type services typically organize their business models and services around the
concept of shared resources and devices for a broad and diverse customer base. Therefore, unless organizations obtain
fully dedicated services from commercial service providers, there may be a need for greater reliance on compensating
security controls to provide the necessary protections for the information system that relies on those external services.
The organization’s risk assessment and risk mitigation activities should reflect this situation.
CHAPTER 2 PAGE 12
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
The provision of services by external providers may result in some services without explicit
agreements between the organization and the external entities responsible for the services.
Whenever explicit agreements are feasible and practical (e.g., through contracts, service-level
agreements, etc.), the organization should develop such agreements and require the use of the
security controls in Special Publication 800-53. When the organization is not in a position to
require explicit agreements with external service providers (e.g., the service is imposed on the
organization or the service is commodity service), the organization should establish explicit
assumptions about the service capabilities with regard to security. 34 Contracts between the
organization and external providers may also require the active participation of the organization.
For example, the organization may be required by the contract to install public key encryption-
enabled client software recommended by the service provider.
Ultimately, the responsibility for adequately mitigating unacceptable risks arising from the use of
external information system services remains with the authorizing official. Organizations require
that an appropriate chain of trust be established with external service providers when dealing with
the many issues associated with information system security. A chain of trust requires that the
organization establish and retain a level of confidence that each participating service provider in
the potentially complex consumer-provider relationship provides adequate protection for the
services rendered to the organization. The chain of trust can be complicated due to the number of
entities participating in the consumer-provider relationship and the type of relationship between
the parties. External service providers may also in turn outsource the services to other external
entities, making the chain of trust even more complicated and difficult to manage. Depending on
the nature of the service, it may simply be unwise for the organization to place significant trust in
the provider—not due to any inherent untrustworthiness on the provider's part, but due to the
intrinsic level of risk in the service. Where a sufficient level of trust cannot be established in the
external services and/or service providers, the organization employs compensating controls or
accepts a greater degree of risk.
34
In situations where an organization is procuring information system services or technologies through a centralized
acquisition vehicle (e.g., governmentwide contract by the General Services Administration or other preferred and/or
mandatory acquisition organization), it may be more efficient and cost-effective for the originator of the contract to
establish and maintain a stated level of trust with the external provider (including the definition of required security
controls and level of assurance with regard to the provision of such controls). Organizations subsequently acquiring
information system services or technologies from the centralized contract can take advantage of the negotiated trust
level established by the procurement originator and thus avoid costly repetition of the activities necessary to establish
such trust. For example, a procurement originator could authorize an information system providing external services to
the federal government under specific terms and conditions of the contract. A federal agency requesting information
system services under the terms of the contract would not be required to reauthorize the information system when
acquiring such services (unless the request included services outside the scope of the original contract).
35
In this context, a developer/implementer is an individual or group of individuals responsible for the development or
implementation of security controls for an information system. This may include, for example, hardware and software
vendors providing the controls, contractors implementing the controls, or organizational personnel such as information
system owners, information system security officers, system and network administrators, or other individuals with
security responsibility for the information system.
CHAPTER 2 PAGE 13
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
• Actions taken by security control assessors to determine the extent to which the controls are
implemented correctly, operating as intended, and producing the desired outcome with
respect to meeting the security requirements for the system.
Appendix E describes the minimum assurance requirements 36 for security controls in low-impact,
moderate-impact, and high-impact information systems. For security controls in low-impact
systems, the emphasis is on the control being in place with the expectation that no obvious errors
exist and that as flaws are discovered, they are addressed in a timely manner. For security
controls in moderate-impact systems, the emphasis is on increasing the grounds for confidence in
control correctness. While flaws are still likely to be uncovered (and addressed expeditiously),
the control developer or control implementer incorporates, as part of the control, specific
capabilities to increase grounds for confidence that the control meets its function or purpose. For
security controls in high-impact systems, the emphasis is on requiring within the control, the
capabilities that are needed to support ongoing, consistent operation of the control and to support
continuous improvement in the control’s effectiveness. There are additional assurance
requirements available to developers/implementers of security controls supplementing the
minimum assurance requirements for the moderate-impact and high-impact information systems
in order to protect against threats from highly skilled, highly motivated, and well-financed threat
agents. This level of protection is necessary for those information systems where the
organization is not willing to accept the risks associated with the type of threat agents cited
above.
The security controls in the security control catalog are expected to change over time, as controls
are withdrawn, revised, and added. The security controls defined in the low, moderate, and high
baselines are also expected to change over time as the level of security and due diligence for
mitigating risks within organizations changes. In addition to the need for change, the need for
stability will be addressed by requiring that proposed additions, deletions, or modifications to the
catalog of security controls go through a rigorous public review process to obtain government and
private sector feedback and to build consensus for the changes. A stable, yet flexible and
technically rigorous set of security controls will be maintained in the security control catalog.
36
Assurance requirements imposed upon developers and implementers of security controls are addressed in this special
publication. Assurance gained from the assessment of security controls (e.g., by testers, evaluators, auditors, Inspectors
General, information system owners) is addressed in NIST Special Publication 800-53A.
37
The security control catalog in Appendix F will be updated as needed with new controls developed from national-
level threat databases containing information on known cyber attacks. The proposed modifications to security controls
and security control baselines will be carefully weighed with each revision cycle, considering the desire for stability on
one hand, and the need to respond to changing threats and vulnerabilities, new attack methods, new technologies, and
the important objective of raising the foundational level of security over time. Organizations may develop new controls
when appropriate controls are not available in Appendix F.
CHAPTER 2 PAGE 14
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
CHAPTER THREE
THE PROCESS
SELECTION AND SPECIFICATION OF SECURITY CONTROLS
T
his chapter describes the process of selecting and specifying security controls for an
organizational information system to include: (i) using the Risk Management Framework
(RMF) to organize and guide the selection process; (ii) categorizing the information and
information system in accordance with FIPS 199; (iii) selecting security controls, including
tailoring the initial set of baseline security controls and supplementing the tailored baseline as
necessary based on an organizational assessment of risk; and (iv) updating the controls as part of
a comprehensive continuous monitoring process.
38
Tailoring guidance provides organizations with specific considerations on the applicability and implementation of
individual security controls in the control baselines (see Section 3.3).
39
NIST Special Publication 800-30 provides guidance on the assessment of risk.
40
For legacy systems, some or all of the security controls selected may already be implemented.
41
NIST Special Publication 800-53A provides guidance on assessing the effectiveness of security controls.
CHAPTER 3 PAGE 15
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
Figure 3-1 illustrates the specific activities in the Risk Management Framework and the
information security standards and guidance documents associated with each activity. 43 The
remainder of this chapter focuses on several key activities in the Risk Management Framework
associated with security control selection and specification.
Risk Management
Architecture Description Organizational Inputs
Mission/Business Processes
Strategy Laws, Directives, Policy Guidance
FEA Reference Models Strategic Goals and Objectives
Segment and Solution Architectures Starting Information Security Requirements
Information System Boundaries Point Priorities and Resource Availability
Repeat as necessary
Step 1
CATEGORIZE
Information Systems
Step 6 FIPS 199 / SP 800-60 Step 2
MONITOR SELECT
Security Controls Security Controls
42
NIST Special Publication 800-37 provides guidance on the security authorization of information systems.
43
NIST Special Publication 800-39 provides guidance on organization-wide risk management including the
development of risk management strategies, risk-related governance issues, defining protection requirements and
associated risks for organizational mission/business processes, integration of security and privacy requirements into
enterprise architectures, and managing risk within the system development life cycle.
CHAPTER 3 PAGE 16
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
Since the potential impact values for confidentiality, integrity, and availability may not always be
the same for a particular information system, the high water mark concept is used to determine
the impact level of the information system for the express purpose of selecting an initial set of
security controls from one of the three security control baselines. 45 Thus, a low-impact system is
defined as an information system in which all three of the security objectives are low. A
moderate-impact system is an information system in which at least one of the security objectives
is moderate and no security objective is greater than moderate. And finally, a high-impact system
is an information system in which at least one security objective is high.
Implementation Tip
To determine the overall impact level of the information system:
• First, determine the different types of information that are processed, stored, or transmitted by the
information system (e.g., financial sector oversight, inspections and auditing, official information
dissemination, etc.). NIST Special Publication 800-60 provides guidance on a variety of information
types commonly used by organizations.
• Second, using the impact levels in FIPS 199 and the recommendations of NIST Special Publication
800-60, categorize the confidentiality, integrity, and availability of each information type as low,
moderate, or high impact.
• Third, determine the information system security categorization, that is, the highest impact level for
each security objective (confidentiality, integrity, availability) from among the categorizations for the
information types associated with the information system.
• Fourth, determine the overall impact level of the information system from the highest impact level
among the three security objectives in the system security categorization.
44
NIST Special Publication 800-60, Guide for Mapping Types of Information and Information Systems to Security
Categories, provides guidance on the assignment of security categories to information systems.
45
The high water mark concept is employed because there are significant dependencies among the security objectives
of confidentiality, integrity, and availability. In most cases, a compromise in one security objective ultimately affects
the other security objectives as well. Accordingly, the security controls in the control catalog are not categorized by
security objective—rather, they are grouped into baselines to provide a general protection capability for classes of
information systems based on impact level. The application of scoping guidance may allow selective security control
baseline tailoring based on the individual impact levels for confidentiality, integrity, and availability (see Section 3.3).
CHAPTER 3 PAGE 17
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
46
The general security control selection process may be augmented or further detailed by additional sector-specific
guidance such as that provided for industrial control systems in Appendix I.
47
The level of detail required in documenting tailoring decisions in the security control selection process is strictly at
the discretion of the organization and is consistent with the FIPS 199 impact level of the information system.
CHAPTER 3 PAGE 18
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
Scoping Guidance
Scoping guidance provides organizations with specific terms and conditions on the applicability
and implementation of individual security controls in the security control baselines. Application
of scoping guidance can eliminate unnecessary security controls from initial baselines and help to
ensure that organizations select only those controls that are essential to providing the appropriate
level of protection for the information system based on specific mission/business requirements
and particular environments of operation. There are several scoping considerations described
below, that can potentially affect how the baseline security controls are applied and implemented
by organizations:
48
When applying the “high water mark” process in Section 3.2, some of the original FIPS 199 confidentiality, integrity,
or availability security objectives may have been upgraded to a higher baseline of security controls. As part of this
process, security controls that uniquely support the confidentiality, integrity, or availability security objectives may
have been upgraded unnecessarily. Consequently, it is recommended that organizations consider appropriate and
allowable downgrading actions to ensure cost-effective, risk-based application of security controls.
49
Information that is security-relevant at the system level (e.g., password files, network routing tables, cryptographic
key management information) is distinguished from user-level information within an information system. Certain
security controls within an information system are used to support the security objectives of confidentiality and
integrity for both user-level and system-level information. Caution should be exercised in downgrading confidentiality
or integrity-related security controls to ensure that the downgrading action does not result in insufficient protection for
the security-relevant information within the information system. Security-relevant information must be protected at the
high water mark in order to achieve that level of protection for any of the security objectives related to user-level
information.
50
Downgrading actions apply only to the moderate and high baselines. Certain security controls that are uniquely
attributable to confidentiality, integrity, or availability that would ordinarily be considered as potential candidates for
downgrading (e.g., AC-16, AU-10, IA-7, PE-12, PE-14, PL-5, SC-5, SC-13, SC-14, SC-16) are eliminated from
consideration because the controls are either selected for use in all baselines and have no enhancements that could be
downgraded, or the controls are optional and not selected for use in any baseline. Organizations should exercise
caution when considering downgrading security controls that do not appear in the list in Section 3.3 to ensure that the
downgrading action does not affect security objectives other than the objectives targeted for downgrading.
CHAPTER 3 PAGE 19
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
• TECHNOLOGY-RELATED CONSIDERATIONS—
Security controls that refer to specific technologies (e.g., wireless, cryptography, public key
infrastructure) are applicable only if those technologies are employed or are required to be
employed within the information system. Security controls that can be supported by
automated mechanisms do not require the development of such mechanisms if the
mechanisms do not already exist or are not readily available in commercial or government
off-the-shelf products. For example, automated mechanisms may be used to maintain up-to-
date, complete, accurate, and readily available baseline configurations of organizational
information systems. If automated mechanisms are not readily available, cost-effective, or
technically feasible, compensating security controls, implemented through nonautomated
mechanisms or procedures, are used to satisfy specified security control requirements (see
terms and conditions for selecting and applying compensating controls below).
• POLICY/REGULATORY-RELATED CONSIDERATIONS—
Security controls that address matters governed by applicable federal laws, Executive Orders,
directives, policies, standards, or regulations (e.g., privacy impact assessments) are required
only if the employment of those controls is consistent with the types of information and
information systems covered by the applicable laws, Executive Orders, directives, policies,
standards, or regulations.
51
As technology advances, more powerful and diverse functionality can be found in such devices as personal digital
assistants and cellular telephones. These devices may require the application of security controls in accordance with an
organizational assessment of risk. While the scoping guidance may support not allocating a particular security control
to a specific component, any residual risk associated with the absence of that control must be addressed to adequately
protect organizational operations and assets, individuals, other organizations, and the Nation.
CHAPTER 3 PAGE 20
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
• OPERATIONAL/ENVIRONMENTAL-RELATED CONSIDERATIONS—
Security controls that are dependent on the nature of the operational environment are
applicable only if the information system is employed in an environment necessitating the
controls. For example, certain physical security controls may not be applicable to space-
based information systems, and temperature and humidity controls may not be applicable to
remote sensors that exist outside of the indoor facilities that contain information systems.
• SCALABILITY-RELATED CONSIDERATIONS—
Security controls are scalable with regard to the extent and rigor of the implementation.
Scalability is guided by the FIPS 199 security categorization of the information system being
protected. For example, a contingency plan for a FIPS 199 high-impact information system
may be quite lengthy and contain a significant amount of implementation detail. In contrast,
a contingency plan for a FIPS 199 low-impact information system may be considerably
shorter and contain much less implementation detail. Organizations should use discretion in
applying the security controls to information systems, giving consideration to the scalability
factors in particular environments. This approach facilitates a cost-effective, risk-based
approach to security control implementation that expends no more resources than necessary,
yet achieves sufficient risk mitigation and adequate security.
52
More than one compensating control may be required to provide the equivalent or comparable protection for a
particular security control in NIST Special Publication 800-53. For example, an organization with significant staff
limitations may have difficulty in meeting the separation of duty security control but may employ compensating
controls by strengthening the audit, accountability, and personnel security controls within an information system.
CHAPTER 3 PAGE 21
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
53
Organizations should make every attempt to select compensating controls from the security control catalog in NIST
Special Publication 800-53. Organization-defined compensating controls should be used only as a last resort when the
security control catalog does not contain suitable compensating controls.
54
Considerations for potential national-level impacts and impacts to other organizations in categorizing organizational
information systems derive from the USA PATRIOT Act and Homeland Security Presidential Directives.
55
Security controls and control enhancements selected to supplement tailored baselines are allocated to appropriate
information system components in the same manner as the control allocations carried out by the organization in the
initial baselines. See Section 3.3, Scoping Guidance, for security control allocation.
CHAPTER 3 PAGE 22
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
In selecting the security controls and control enhancements to supplement the tailored baseline,
an organization can employ a requirements definition approach or a gap analysis approach. In
the requirements definition approach, the organization acquires specific and credible threat 56
information (or makes a reasonable assumption) about the activities of adversaries with certain
capabilities or attack potential (e.g., skill levels, expertise, available resources). To effectively
withstand cyber attacks from adversaries with the stated capabilities or attack potential, the
organization strives to achieve a certain level of security capability or cyber preparedness.
Organizations can choose additional security controls and control enhancements from Appendix
F to obtain such security capability or level of preparedness. In contrast to the requirements
definition approach, the gap analysis approach begins with an organizational assessment of its
current security capability or level of cyber preparedness. From that initial security capability
assessment, the organization determines the types of threats it can reasonably expect to counter.
If the organization’s current security capability or level of cyber preparedness is insufficient, the
gap analysis determines the required capability and level of preparedness. The organization
subsequently defines the security controls and control enhancements from Appendix F needed to
achieve the desired capability or cyber preparedness level. 57
There may be situations in which an organization is employing information technology beyond its
ability to adequately protect essential missions and business functions (e.g., certain web-based,
social networking, and collaborative computing-based technologies). That is, the organization
cannot apply sufficient security controls within an information system to adequately reduce or
mitigate risk. In those situations, an alternative strategy is needed to prevent the mission and
business functions from being adversely affected; a strategy that considers the mission/business
risks that result from an aggressive use of information technology. Restrictions on the types of
technologies used and how the information system is employed provide an alternative method to
reduce or mitigate risk when security controls cannot be implemented within technology/resource
constraints, or when controls lack reasonable expectation of effectiveness against identified threat
sources. Restrictions on the use of information systems and specific information technologies are
in many situations, the only practical or reasonable course of action an organization can take in
order to have the ability to carry out its assigned missions and business functions in the face of
determined adversaries. Examples of use restrictions include:
• Limiting the information an information system can process, store, or transmit or the manner
in which an organizational mission or business function is automated;
• Prohibiting external access to organizational information by removing selected information
system components from the network (i.e., air gapping); and
• Prohibiting moderate- or high-impact information on an information system component to
which the public has access, unless an explicit determination is made authorizing such access.
Organizations document the decisions taken during the security control selection process,
providing a sound rationale for those decisions. This documentation is essential when examining
the overall security considerations for information systems with respect to potential
mission/business impact. The resulting set of selected security controls along with the supporting
rationale for selection decisions and any information system use restrictions are documented in
the security plan for the information system.
56
While this example focuses on threats to information systems from purposeful attacks, the threat space of concern to
organizations also includes environmental disruptions and human errors.
57
NIST Special Publication 800-30 provides guidance on conducting risk assessments. Future updates to Special
Publication 800-30 will include additional information on threat taxonomies and security capabilities.
CHAPTER 3 PAGE 23
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
Figure 3-2 summarizes the security control selection process, including tailoring of the initial
security control baseline and any additional modifications to the baseline required based on the
organization’s assessment of risk. 58
Application of Assessment of
INITIAL Tailoring Guidance TAILORED Organizational AGREED-UPON
SECURITY SECURITY Risk SET OF SECURITY
CONTROL CONTROL CONTROLS
BASELINE BASELINE (Low, Mod, High)
(Low, Mod, High) (Low, Mod, High)
Scoping Guidance Supplements After Risk
Before Tailoring Compensating After Tailoring Tailored Baseline Assessment
Controls Controls to Mitigate
Parameterization Unacceptable Risks
58
An information system can employ security controls at different layers within the system. An operating system, for
example, typically provides an access control capability that includes the identification and authentication of users. An
application, hosted by that operating system, may also provide its own access control capability requiring users to go
through a second level of identification and authentication, thus rendering an additional level of protection for the
information system. Organizations carrying out the security control selection process consider components at all layers
within the information system as part of effective organizational security architecture implementing a defense-in-depth
security strategy.
CHAPTER 3 PAGE 24
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
• Second, review the existing security plan for the information system that describes the
security requirements and associated security controls that are currently employed and
document in the plan any additional controls that would be needed by the system to ensure
that the risk to organizational operations and assets, individuals, other organizations, and the
Nation, remains at an acceptable level.
• Third, implement the security controls described in the updated security plan, document in the
Plan of Action and Milestone any security controls not implemented, and continue with the
remaining steps in the RMF in the same manner as a new development system.
The gap analysis perspective is also applied when interacting with external service providers. As
described in Section 2.4, organizations are becoming increasingly reliant on external providers for
critical information system services. Using the steps in the gap analysis described above, the
organization can effectively use the acquisition process and appropriate contractual vehicles to
require external providers to carry out, in collaboration with the organization, the security
categorization and security control selection steps in the RMF. The resulting information can
help determine what security controls the external provider either has in place or intends to
implement for the information system services that are to be provided to the organization. If a
security control deficit exists, the organization can reduce the organizational risk to an acceptable
level by using the existing contractual vehicle to:
• Require the external provider to meet the additional security control requirements established
by the organization; or
• If the existing contractual vehicle does not provide for such added requirements, negotiate
with the provider for additional security controls (including compensating controls). 59
Implementation Tip
Many organizations own and operate large and complex information systems (sometimes referred to as
a system-of-systems). Organizations can analyze a large and complex information system by dividing
the system into two or more subsystems and apply the FIPS 199 categorization to each subsystem.
However, that process does not change the overall FIPS 199 impact level of the information system;
rather, it allows the constituent subsystems to receive a separate allocation of security controls instead
of deploying higher impact controls across every constituent subsystem. The security architecture plays
a key part in the selection and allocation of security controls. It is not valid to treat the subsystems as
independent entities, when in fact the subsystems are interdependent and interconnected. The security
architecture allocates controls among the constituent subsystems including monitoring and controlling
communications at key internal boundaries within the large and complex system (or system-of-systems)
and provides common controls that meet or exceed the highest information system impact level of the
constituent subsystems inheriting the security capability from those common controls.
The organization considers that replicated subsystems within a large and complex information system
may exhibit common vulnerabilities that can be exploited by a common threat source; thereby negating
the redundancy that might be relied upon as a risk mitigation measure. The impact due to a security
incident against one constituent subsystem might cascade and impact many subsystems at the same
time. Risk levels can be adjusted upward or downward based on the actual deployment of security
controls, the effectiveness of the controls, the environment in which the information system is operating,
and how the organization is using its information technology.
59
In some situations, when a contract either does not exist or the contract does not provide the necessary leverage for
the organization to obtain needed safeguards, alternative risk mitigation measures are employed. For example, local
policies, procedures, and/or compensating controls could be established on the organization side to serve as mitigation
factors for risks identified in a gap analysis. Ultimately, the responsibility for adequately mitigating unacceptable risks
arising from the use of external information system services remains with the authorizing official.
CHAPTER 3 PAGE 25
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
When such events occur, organizations should, at a minimum, take the following actions: 60
• Reconfirm the impact level of the information system and the information processed, stored,
and/or transmitted by that system.
The organization reexamines the FIPS 199 impact level of the information system to confirm
that the level previously established and approved by the authorizing official is still valid.
The resulting analysis may provide new insights as to the overall importance of the
information system in allowing the organization to fulfill its mission/business responsibilities.
• Assess the current security state of the information system and the risk to organizational
operations and assets, individuals, other organizations, and the Nation.
The organization investigates the information system vulnerability (or vulnerabilities)
exploited by the threat source (or that are potentially exploitable by a threat source) and the
security controls currently implemented within the system as described in the security plan.
The exploitation of an information system vulnerability (or vulnerabilities) by a threat source
may be traced to one or more factors including but not limited to: (i) the failure of currently
implemented security controls; (ii) missing security controls; (iii) insufficient strength of
security controls; and/or (iv) an increase in the sophistication or capability of the threat
source. Using the results from the assessment of the current security state, the organization
reassesses the risks arising from use of the information system.
60
Organizations should determine the specific types of events that would trigger changes to the security controls within
the information system and a resulting modification to the security plan. The decision to commit resources in light of
such events should be guided by an organizational assessment of risk.
CHAPTER 3 PAGE 26
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
CHAPTER 3 PAGE 27
Special Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations
________________________________________________________________________________________________
APPENDIX A
REFERENCES
LAWS, POLICIES, DIRECTIVES, REGULATIONS, MEMORANDA, STANDARDS, AND GUIDELINES
LEGISLATION
11. Office of Management and Budget Memorandum M-03-22, OMB Guidance for
Implementing the Privacy Provisions of the E-Government Act of 2002, September 2003.
12. Office of Management and Budget Memorandum M-04-04, E-Authentication Guidance
for Federal Agencies, December 2003.
13. Office of Management and Budget Memorandum M-04-26, Personal Use Policies and
File Sharing Technology, September 2004.
14. Office of Management and Budget Memorandum M-05-08, Designation of Senior
Agency Officials for Privacy, February 2005.
15. Office of Management and Budget Memorandum M-05-24, Implementation of Homeland
Security Presidential Directive (HSPD) 12—Policy for a Common Identification
Standard for Federal Employees and Contractors, August 2005.
16. Office of Management and Budget Memorandum M-06-15, Safeguarding Personally
Identifiable Information, May 2006.
17. Office of Management and Budget Memorandum M-06-16, Protection of Sensitive
Information, June 2006.
18. Office of Management and Budget Memorandum M-06-19, Reporting Incidents
Involving Personally Identifiable Information and Incorporating the Cost for Security in
Agency Information Technology Investments, July 2006.
19. Office of Management and Budget Memorandum, Recommendations for Identity Theft
Related Data Breach Notification Guidance, September 2006.
20. Office of Management and Budget Memorandum M-07-11, Implementation of
Commonly Accepted Security Configurations for Windows Operating Systems, March
2007.
21. Office of Management and Budget Memorandum M-07-16, Safeguarding Against and
Responding to the Breach of Personally Identifiable Information, May 2007.
22. Office of Management and Budget Memorandum M-07-18, Ensuring New Acquisitions
Include Common Security Configurations, June 2007.
23. Office of Management and Budget Memorandum M-08-09, New FISMA Privacy
Reporting Requirements for FY 2008, January 2008.
24. Office of Management and Budget Memorandum M-08-21, FY08 Reporting Instructions
for the Federal Information Security Management Act and Agency Privacy Management,
July 2008.
25. Office of Management and Budget Memorandum M-08-22, Guidance on the Federal
Desktop Core Configuration (FDCC), August 2008.
STANDARDS
19. National Institute of Standards and Technology Special Publication 800-32, Introduction
to Public Key Technology and the Federal PKI Infrastructure, February 2001.
20. National Institute of Standards and Technology Special Publication 800-33, Underlying
Technical Models for Information Technology Security, December 2001.
21. National Institute of Standards and Technology Special Publication 800-34, Contingency
Planning Guide for Information Technology Systems, June 2002.
22. National Institute of Standards and Technology Special Publication 800-35, Guide to
Information Technology Security Services, October 2003.
23. National Institute of Standards and Technology Special Publication 800-36, Guide to
Selecting Information Security Products, October 2003.
24. National Institute of Standards and Technology Special Publication 800-37, Guide for the
Security Certification and Accreditation of Federal Information Systems, May 2004.
25. National Institute of Standards and Technology Special Publication 800-38A,
Recommendation for Block Cipher Modes of Operation - Methods and Techniques,
December 2001.
26. National Institute of Standards and Technology Special Publication 800-38B,
Recommendation for Block Cipher Modes of Operation: The CMAC Mode for
Authentication, May 2005.
27. National Institute of Standards and Technology Special Publication 800-38C,
Recommendation for Block Cipher Modes of Operation: the CCM Mode for
Authentication and Confidentiality, May 2004.
28. National Institute of Standards and Technology Special Publication 800-38D,
Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM)
for Confidentiality and Authentication, November 2007.
29. National Institute of Standards and Technology Special Publication 800-39 (Second
Public Draft), Managing Risk from Information Systems: An Organizational Perspective,
April 2008.
30. National Institute of Standards and Technology Special Publication 800-40, Version 2,
Creating a Patch and Vulnerability Management Program, November 2005.
31. National Institute of Standards and Technology Special Publication 800-41, Revision 1
(Draft), Guidelines on Firewalls and Firewall Policy, July 2008.
32. National Institute of Standards and Technology Special Publication 800-43, Systems
Administration Guidance for Windows 2000 Professional, November 2002.
33. National Institute of Standards and Technology Special Publication 800-44, Version 2,
Guidelines on Securing Public Web Servers, September 2007.
34. National Institute of Standards and Technology Special Publication 800-45, Version 2,
Guidelines on Electronic Mail Security, February 2007.
35. National Institute of Standards and Technology Special Publication 800-46, Security for
Telecommuting and Broadband Communications, August 2002.
36. National Institute of Standards and Technology Special Publication 800-47, Security
Guide for Interconnecting Information Technology Systems, August 2002.
37. National Institute of Standards and Technology Special Publication 800-48, Revision 1,
Guide to Securing Legacy IEEE 802.11 Wireless Networks, July 2008.
38. National Institute of Standards and Technology Special Publication 800-49, Federal
S/MIME V3 Client Profile, November 2002.
39. National Institute of Standards and Technology Special Publication 800-50, Building an
Information Technology Security Awareness and Training Program, October 2003.
40. National Institute of Standards and Technology Special Publication 800-51, Use of the
Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme, September
2002.
41. National Institute of Standards and Technology Special Publication 800-52, Guidelines
for the Selection and Use of Transport Layer Security (TLS) Implementations, June 2005.
42. National Institute of Standards and Technology Special Publication 800-53A, Guide for
Assessing the Security Controls in Federal Information Systems: Building Effective
Security Assessment Plans, July 2008.
43. National Institute of Standards and Technology Special Publication 800-54, Border
Gateway Protocol Security, July 2007.
44. National Institute of Standards and Technology Special Publication 800-55, Revision 1,
Performance Measurement Guide for Information Security, July 2008.
45. National Institute of Standards and Technology Special Publication 800-56A (Revised),
Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm
Cryptography, March 2007.
46. National Institute of Standards and Technology Special Publication 800-57 (Revised),
Recommendation for Key Management, March 2007.
47. National Institute of Standards and Technology Special Publication 800-58, Security
Considerations for Voice Over IP Systems, January 2005.
48. National Institute of Standards and Technology Special Publication 800-59, Guideline for
Identifying an Information System as a National Security System, August 2003.
49. National Institute of Standards and Technology Special Publication 800-60, Revision 1,
Guide for Mapping Types of Information and Information Systems to Security Categories,
August 2008.
50. National Institute of Standards and Technology Special Publication 800-61, Revision 1,
Computer Security Incident Handling Guide, March 2008.
51. National Institute of Standards and Technology Special Publication 800-63-1 (Draft),
Electronic Authentication Guideline, December 2008.
52. National Institute of Standards and Technology Special Publication 800-64, Revision 2,
Security Considerations in the System Development Life Cycle, October 2008.
53. National Institute of Standards and Technology Special Publication 800-65, Integrating
Security into the Capital Planning and Investment Control Process, January 2005.
54. National Institute of Standards and Technology Special Publication 800-66, Revision 1,
An Introductory Resource Guide for Implementing the Health Insurance Portability and
Accountability Act (HIPAA) Security Rule, October 2008.
55. National Institute of Standards and Technology Special Publication 800-67, Version 1.1,
Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, May
2008.
56. National Institute of Standards and Technology Special Publication 800-68, Revision 1,
Guide to Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security
Configuration Checklist, October 2008.
57. National Institute of Standards and Technology Special Publication 800-69, Guidance for
Securing Microsoft Windows XP Home Edition: A NIST Security Configuration
Checklist, September 2006.
58. National Institute of Standards and Technology Special Publication 800-70, Revision 1
(Draft), National Checklist Program for IT Products--Guidelines for Checklist Users and
Developers, September 2008.
59. National Institute of Standards and Technology Special Publication 800-72, Guidelines
on PDA Forensics, November 2004.
60. National Institute of Standards and Technology Special Publication 800-73-2, Interfaces
for Personal Identity Verification, September 2008.
61. National Institute of Standards and Technology Special Publication 800-76-1, Biometric
Data Specification for Personal Identity Verification, January 2007.
62. National Institute of Standards and Technology Special Publication 800-77, Guide to
IPsec VPNs, December 2005.
63. National Institute of Standards and Technology Special Publication 800-78-1,
Cryptographic Algorithms and Key Sizes for Personal Identity Verification, August 2007.
64. National Institute of Standards and Technology Special Publication 800-79-1, Guidelines
for the Accreditation of Personal Identity Verification Card Issuers, June 2008.
65. National Institute of Standards and Technology Special Publication 800-81, Secure
Domain Name System (DNS) Deployment Guide, May 2006.
66. National Institute of Standards and Technology Special Publication 800-82 (Final Public
Draft), Guide to Industrial Control Systems (ICS) Security, September 2008.
67. National Institute of Standards and Technology Special Publication 800-83, Guide to
Malware Incident Prevention and Handling, November 2005.
68. National Institute of Standards and Technology Special Publication 800-84, Guide to
Test, Training, and Exercise Programs for IT Plans and Capabilities, September 2006.
69. National Institute of Standards and Technology Special Publication 800-85A-1, PIV Card
Application and Middleware Interface Test Guidelines (SP 800-73 Compliance), March
2009.
70. National Institute of Standards and Technology Special Publication 800-85B, PIV Data
Model Test Guidelines, July 2006.
71. National Institute of Standards and Technology Special Publication 800-86, Guide to
Integrating Forensic Techniques into Incident Response, August 2006.
72. National Institute of Standards and Technology Special Publication 800-87, Revision 1,
Codes for the Identification of Federal and Federally-Assisted Organizations, April
2008.
73. National Institute of Standards and Technology Special Publication 800-88, Guidelines
for Media Sanitization, September 2006.
74. National Institute of Standards and Technology Special Publication 800-89,
Recommendation for Obtaining Assurances for Digital Signature Applications,
November 2006.
75. National Institute of Standards and Technology Special Publication 800-90 (Revised),
Recommendation for Random Number Generation Using Deterministic Random Bit
Generators, March 2007.
76. National Institute of Standards and Technology Special Publication 800-92, Guide to
Computer Security Log Management, September 2006.
77. National Institute of Standards and Technology Special Publication 800-94, Guide to
Intrusion Detection and Prevention Systems (IDPS), February 2007.
78. National Institute of Standards and Technology Special Publication 800-95, Guide to
Secure Web Services, August 2007.
79. National Institute of Standards and Technology Special Publication 800-96, PIV Card /
Reader Interoperability Guidelines, September 2006.
80. National Institute of Standards and Technology Special Publication 800-97, Establishing
Robust Security Networks: A Guide to IEEE 802.11i, February 2007.
81. National Institute of Standards and Technology Special Publication 800-98, Guidance for
Securing Radio Frequency Identification (RFID) Systems, April 2007.
82. National Institute of Standards and Technology Special Publication 800-100, Information
Security Handbook: A Guide for Managers, October 2006.
83. National Institute of Standards and Technology Special Publication 800-101, Guidelines
on Cell Phone Forensics, May 2007.
84. National Institute of Standards and Technology Special Publication 800-103 (Draft), An
Ontology of Identity Credentials, Part I: Background and Formulation, October 2006.
85. National Institute of Standards and Technology Special Publication 800-104, A Scheme
for PIV Visual Card Topography, June 2007.
86. National Institute of Standards and Technology Special Publication 800-106, Randomized
Hashing Digital Signatures, February 2009.
87. National Institute of Standards and Technology Special Publication 800-107,
Recommendation for Using Approved Hash Algorithms, February 2009.
88. National Institute of Standards and Technology Special Publication 800-108,
Recommendation for Key Derivation Using Pseudorandom Functions, November 2008.
89. National Institute of Standards and Technology Special Publication 800-111, Guide to
Storage Encryption Technologies for End User Devices, November 2007.
90. National Institute of Standards and Technology Special Publication 800-113, Guide to
SSL VPNs, July 2008.
91. National Institute of Standards and Technology Special Publication 800-114, User's
Guide to Securing External Devices for Telework and Remote Access, November 2007.
92. National Institute of Standards and Technology Special Publication 800-115, Technical
Guide to Information Security Testing and Assessment, September 2008.
93. National Institute of Standards and Technology Special Publication 800-116, A
Recommendation for the Use of PIV Credentials in Physical Access Control Systems
(PACS), November 2008.
94. National Institute of Standards and Technology Special Publication 800-121, Guide to
Bluetooth Security, September 2008.
95. National Institute of Standards and Technology Special Publication 800-123, Guide to
General Server Security, July 2008.
96. National Institute of Standards and Technology Special Publication 800-124, Guidelines
on Cell Phone and PDA Security, October 2008.
97. National Institute of Standards and Technology Special Publication 800-128 (Draft),
Guide for Security Configuration Management of Information Systems, July 2009.
APPENDIX B
GLOSSARY
COMMON TERMS AND DEFINITIONS
Appendix B provides definitions for security terminology used within Special Publication 800-53.
Unless specifically defined in this glossary, all terms used in this publication are consistent with
the definitions contained in CNSS Instruction 4009, National Information Assurance Glossary.
Non-Organizational User A user who is not an organizational user (including public users).
Non-repudiation Protection against an individual falsely denying having performed
a particular action. Provides the capability to determine whether
a given individual took a particular action such as creating
information, sending a message, approving information, and
receiving a message.
Object Passive information system-related entity (e.g., devices, files,
records, tables, processes, programs, domains) containing or
receiving information. Access to an object implies access to the
information it contains.
Operational Controls The security controls (i.e., safeguards or countermeasures) for an
[FIPS 200] information system that are primarily implemented and executed
by people (as opposed to systems).
Organization A federal agency or, as appropriate, any of its operational
[FIPS 200] elements.
Organizational User An organizational employee or an individual the organization
deems to have equivalent status of an employee (e.g., contractor,
guest researcher, individual detailed from another organization,
individual from allied nation).
Penetration Testing A test methodology in which assessors, typically working under
specific constraints, attempt to circumvent or defeat the security
features of an information system.
Plan of Action and A document that identifies tasks needing to be accomplished. It
Milestones details resources required to accomplish the elements of the plan,
[OMB Memorandum 02-01] any milestones in meeting the tasks, and scheduled completion
dates for the milestones.
Potential Impact The loss of confidentiality, integrity, or availability could be
[FIPS 199] expected to have: (i) a limited adverse effect (FIPS 199 low); (ii)
a serious adverse effect (FIPS 199 moderate); or (iii) a severe or
catastrophic adverse effect (FIPS 199 high) on organizational
operations, organizational assets, or individuals.
Privacy Impact An analysis of how information is handled: (i) to ensure handling
Assessment conforms to applicable legal, regulatory, and policy requirements
[OMB Memorandum 03-22] regarding privacy; (ii) to determine the risks and effects of
collecting, maintaining, and disseminating information in
identifiable form in an electronic information system; and (iii) to
examine and evaluate protections and alternative processes for
handling information to mitigate potential privacy risks.
Privileged Account An information system account with authorizations of a
privileged user.
Privileged Command A human-initiated command executed on an information system
involving the control, monitoring, or administration of the system
including security functions and associated security-relevant
information.
System-specific Security A security control for an information system that has not been
Control designated as a common security control or the portion of a
[NIST SP 800-37] hybrid control that is to be implemented within an information
system.
System Security Plan Formal document that provides an overview of the security
[NIST SP 800-18] requirements for an information system and describes the security
controls in place or planned for meeting those requirements.
Tailoring The process by which a security control baseline selected in
accordance with the FIPS 199 security categorization of the
information system is modified based on: (i) the application of
scoping guidance; (ii) the specification of compensating security
controls, if needed; and (iii) the specification of organization-
defined parameters in the security controls via explicit assignment
and selection statements.
Tailored Security Control Set of security controls resulting from the application of the
Baseline tailoring guidance to the security control baseline.
Technical Controls The security controls (i.e., safeguards or countermeasures) for an
[FIPS 200] information system that are primarily implemented and executed
by the information system through mechanisms contained in the
hardware, software, or firmware components of the system.
Threat Any circumstance or event with the potential to adversely impact
[CNSS Inst. 4009, Adapted] organizational operations (including mission, functions, image, or
reputation), organizational assets, individuals, other
organizations, or the Nation through an information system via
unauthorized access, destruction, disclosure, modification of
information, and/or denial of service.
Threat Source The intent and method targeted at the intentional exploitation of a
[FIPS 200] vulnerability or a situation and method that may accidentally
trigger a vulnerability. Synonymous with threat agent.
Threat Assessment Formal description and evaluation of threat to an information
[CNSS Inst. 4009] system.
Trusted Path A mechanism by which a user (through an input device) can
communicate directly with the security functions of the
information system with the necessary confidence to support the
system security policy. This mechanism can only be activated by
the user or the security functions of the information system and
cannot be imitated by untrusted software.
User Individual, or (system) process acting on behalf of an individual,
[CNSS Inst. 4009, adapted] authorized to access an information system.
See also organizational user and non-organizational user.
Vulnerability Weakness in an information system, system security procedures,
[CNSS Inst. 4009, Adapted] internal controls, or implementation that could be exploited or
triggered by a threat source.
Vulnerability Assessment Formal description and evaluation of the vulnerabilities in an
[CNSS Inst. 4009] information system.
APPENDIX C
ACRONYMS
COMMON ABBREVIATIONS
APPENDIX D
T his appendix contains the security control baselines that represent the starting point in
determining the security controls for low-impact, moderate-impact, and high-impact
information systems. The three security control baselines are hierarchical in nature with
regard to the security controls employed in those baselines. 61 If a security control is selected for
one of the baselines, the family identifier and control number are listed in the appropriate column.
If a control is not used in a particular baseline, the entry is marked “not selected.” Control
enhancements, when used to supplement security controls, are indicated by the number of the
control enhancement. For example, an “IR-2 (1)” in the high baseline entry for the IR-2 security
control indicates that the second control from the Incident Response family has been selected
along with control enhancement (1). Some security controls and enhancements in the security
control catalog are not used in any of the baselines in this appendix but are available for use by
organizations if needed; for example, when the results of a risk assessment indicate the need for
additional controls or control enhancements in order to adequately mitigate risk to organizational
operations and assets, individuals, other organizations, and the Nation. A complete description of
security controls, control enhancements, and supplemental guidance is provided in Appendices F
and G. In addition, a separate document is provided for each security control baseline, containing
only the controls and enhancements from Appendices F and G associated with that baseline.
These documents are listed as Annexes 1, 2, and 3 (indicating low, moderate, and high baselines,
respectively) and are available at http://csrc.nist.gov/publications/PubsSPs.html under the entry
for Special Publication 800-53, Revision 3.
Organizations can use the recommended priority code designation associated with each security
control in the baselines to assist in making prioritization decisions for control implementation
(i.e., a Priority Code 1 (P1) control is of greater criticality than a Priority Code 2 (P2) control; a
Priority Code 2 (P2) control is of greater criticality than a Priority Code 3 (P3) control). Priority
codes are used only for sequencing decisions during security control implementation, not for
making security control selection decisions. While prioritization can help organizations deploy
security controls in a more structured and timely manner in accordance with available resources,
all controls documented in the security plan must be implemented. Table D-1 summarizes
prioritization codes for the baseline security controls in Table D-2.
TABLE D-1: SECURITY CONTROL PRIORITIZATION CODES
61
The hierarchical nature applies to the security requirements of each control (i.e., the base control plus all of its
enhancements) at the low-impact, moderate-impact, and high-impact level in that the control requirements at a
particular impact level (e.g., CP-4 Contingency Plan Testing and Exercises—Moderate: CP-4 (1)) meets a stronger set
of security requirements for that control than the next lower impact level of the same control (e.g., CP-4 Contingency
Plan Testing and Exercises—Low: CP-4).
PRIORITY
CONTROL BASELINES
CNTL
NO. CONTROL NAME
LOW MOD HIGH
Access Control
AC-1 Access Control Policy and Procedures P1 AC-1 AC-1 AC-1
AC-2 Account Management P1 AC-2 AC-2 (1) (2) (3) AC-2 (1) (2) (3)
(4) (4)
AC-3 Access Enforcement P1 AC-3 AC-3 AC-3
AC-4 Information Flow Enforcement P1 Not Selected AC-4 AC-4
AC-5 Separation of Duties P1 Not Selected AC-5 AC-5
AC-6 Least Privilege P1 Not Selected AC-6 (1) (2) AC-6 (1) (2)
AC-7 Unsuccessful Login Attempts P2 AC-7 AC-7 AC-7
AC-8 System Use Notification P1 AC-8 AC-8 AC-8
AC-9 Previous Logon (Access) Notification P0 Not Selected Not Selected Not Selected
AC-10 Concurrent Session Control P2 Not Selected Not Selected AC-10
AC-11 Session Lock P3 Not Selected AC-11 AC-11
AC-12 Session Termination --- --- --- ---
(Withdrawn: Incorporated into SC-10)
AC-13 Supervision and Review—Access Control --- --- --- ---
(Withdrawn: Incorporated into AC-2, AU-6)
AC-14 Permitted Actions without Identification or P1 AC-14 AC-14 (1) AC-14 (1)
Authentication
AC-15 Automated Marking --- --- --- ---
(Withdrawn: Incorporated into AC-16)
AC-16 Security Attributes P0 Not Selected Not Selected Not Selected
AC-17 Remote Access P1 AC-17 AC-17 (1) (2) AC-17 (1) (2)
(3) (4) (5) (10) (3) (4) (5) (6)
(10)
AC-18 Wireless Access Restrictions --- --- --- ---
(Withdrawn: Incorporated into AC-17)
AC-19 Access Control for Mobile Devices P1 AC-19 AC-19 (1) (2) AC-19 (1) (2)
(3) (3)
AC-20 Use of External Information Systems P1 AC-20 AC-20 (1) (2) AC-20 (1) (2)
AC-21 User-Based Collaboration and Information P0 Not Selected Not Selected Not Selected
Sharing
AC-22 Publicly Accessible Content P2 AC-22 AC-22 AC-22
PRIORITY
CONTROL BASELINES
CNTL
NO. CONTROL NAME
LOW MOD HIGH
AU-2 Auditable Events P1 AU-2 AU-2 (3) (4) AU-2 (3) (4)
AU-3 Content of Audit Records P1 AU-3 AU-3 (1) AU-3 (1) (2)
AU-4 Audit Storage Capacity P1 AU-4 AU-4 AU-4
AU-5 Response to Audit Processing Failures P1 AU-5 AU-5 AU-5 (1) (2)
AU-6 Audit Review, Analysis, and Reporting P1 AU-6 AU-6 AU-6 (1)
AU-7 Audit Reduction and Report Generation P2 Not Selected AU-7 (1) AU-7 (1)
AU-8 Time Stamps P1 AU-8 AU-8 (1) AU-8 (1)
AU-9 Protection of Audit Information P1 AU-9 AU-9 AU-9
AU-10 Non-repudiation P1 Not Selected Not Selected AU-10
AU-11 Audit Record Retention P3 AU-11 AU-11 AU-11
AU-12 Audit Generation P1 AU-12 AU-12 AU-12 (1)
AU-13 Monitoring for Information Disclosure P0 Not Selected Not Selected Not Selected
AU-14 Session Audit P0 Not Selected Not Selected Not Selected
Configuration Management
CM-1 Configuration Management Policy and P1 CM-1 CM-1 CM-1
Procedures
CM-2 Baseline Configuration P1 CM-2 CM-2 (1) (5) (6) CM-2 (1) (2) (3)
(4) (6)
CM-3 Configuration Change Control P1 Not Selected CM-3 (2) CM-3 (1) (2)
CM-4 Security Impact Analysis P2 Not Selected CM-4 CM-4 (1)
CM-5 Access Restrictions for Change P1 Not Selected CM-5 CM-5 (1) (2) (3)
CM-6 Configuration Settings P1 CM-6 CM-6 (3) CM-6 (1) (2) (3)
CM-7 Least Functionality P1 CM-7 CM-7 (1) CM-7 (1) (2)
CM-8 Information System Component Inventory P1 CM-8 CM-8 (1) (5) CM-8 (1) (2) (3)
(4) (5)
CM-9 Configuration Management Plan P1 Not Selected CM-9 CM-9
Contingency Planning
CP-1 Contingency Planning Policy and P1 CP-1 CP-1 CP-1
Procedures
CP-2 Contingency Plan P1 CP-2 CP-2 (1) CP-2 (1) (2) (3)
CP-3 Contingency Training P2 CP-3 CP-3 CP-3 (1)
CP-4 Contingency Plan Testing and Exercises P2 CP-4 CP-4 (1) CP-4 (1) (2) (4)
CP-5 Contingency Plan Update --- --- --- ---
(Withdrawn: Incorporated into CP-2)
PRIORITY
CONTROL BASELINES
CNTL
NO. CONTROL NAME
LOW MOD HIGH
CP-6 Alternate Storage Site P1 Not Selected CP-6 (1) (3) CP-6 (1) (2) (3)
CP-7 Alternate Processing Site P1 Not Selected CP-7 (1) (2) (3) CP-7 (1) (2) (3)
(5) (4) (5)
CP-8 Telecommunications Services P1 Not Selected CP-8 (1) (2) CP-8 (1) (2) (3)
(4)
CP-9 Information System Backup P1 CP-9 CP-9 (1) CP-9 (1) (2) (3)
CP-10 Information System Recovery and P1 CP-10 CP-10 (2) (3) CP-10 (2) (3)
Reconstitution (4)
Incident Response
IR-1 Incident Response Policy and Procedures P1 IR-1 IR-1 IR-1
IR-2 Incident Response Training P2 IR-2 IR-2 IR-2 (1) (2)
IR-3 Incident Response Testing and Exercises P2 Not Selected IR-3 IR-3 (1)
IR-4 Incident Handling P1 IR-4 IR-4 (1) IR-4 (1)
IR-5 Incident Monitoring P1 IR-5 IR-5 IR-5 (1)
IR-6 Incident Reporting P1 IR-6 IR-6 (1) IR-6 (1)
IR-7 Incident Response Assistance P3 IR-7 IR-7 (1) IR-7 (1)
IR-8 Incident Response Plan P1 IR-8 IR-8 IR-8
Maintenance
MA-1 System Maintenance Policy and Procedures P1 MA-1 MA-1 MA-1
MA-2 Controlled Maintenance P2 MA-2 MA-2 (1) MA-2 (1) (2)
MA-3 Maintenance Tools P2 Not Selected MA-3 (1) (2) MA-3 (1) (2) (3)
MA-4 Non-Local Maintenance P1 MA-4 MA-4 (1) (2) MA-4 (1) (2) (3)
MA-5 Maintenance Personnel P1 MA-5 MA-5 MA-5
MA-6 Timely Maintenance P1 Not Selected MA-6 MA-6
Media Protection
MP-1 Media Protection Policy and Procedures P1 MP-1 MP-1 MP-1
MP-2 Media Access P1 MP-2 MP-2 (1) MP-2 (1)
MP-3 Media Marking P1 Not Selected MP-3 MP-3
MP-4 Media Storage P1 Not Selected MP-4 MP-4
MP-5 Media Transport P1 Not Selected MP-5 (2) (4) MP-5 (2) (3) (4)
MP-6 Media Sanitization P1 MP-6 MP-6 MP-6 (1) (2) (3)
PRIORITY
CONTROL BASELINES
CNTL
NO. CONTROL NAME
LOW MOD HIGH
Planning
PL-1 Security Planning Policy and Procedures P1 PL-1 PL-1 PL-1
PL-2 System Security Plan P1 PL-2 PL-2 PL-2
PL-3 System Security Plan Update --- --- --- ---
(Withdrawn: Incorporated into PL-2)
PL-4 Rules of Behavior P1 PL-4 PL-4 PL-4
PL-5 Privacy Impact Assessment P1 PL-5 PL-5 PL-5
PL-6 Security-Related Activity Planning P3 Not Selected PL-6 PL-6
Personnel Security
PS-1 Personnel Security Policy and Procedures P1 PS-1 PS-1 PS-1
PS-2 Position Categorization P1 PS-2 PS-2 PS-2
PS-3 Personnel Screening P1 PS-3 PS-3 PS-3
PS-4 Personnel Termination P2 PS-4 PS-4 PS-4
PS-5 Personnel Transfer P2 PS-5 PS-5 PS-5
PS-6 Access Agreements P3 PS-6 PS-6 PS-6
PS-7 Third-Party Personnel Security P1 PS-7 PS-7 PS-7
PS-8 Personnel Sanctions P3 PS-8 PS-8 PS-8
Risk Assessment
RA-1 Risk Assessment Policy and Procedures P1 RA-1 RA-1 RA-1
RA-2 Security Categorization P1 RA-2 RA-2 RA-2
PRIORITY
CONTROL BASELINES
CNTL
NO. CONTROL NAME
LOW MOD HIGH
PRIORITY
CONTROL BASELINES
CNTL
NO. CONTROL NAME
LOW MOD HIGH
SC-20 Secure Name /Address Resolution Service P1 SC-20 (1) SC-20 (1) SC-20 (1)
(Authoritative Source)
SC-21 Secure Name /Address Resolution Service P1 Not Selected Not Selected SC-21
(Recursive or Caching Resolver)
SC-22 Architecture and Provisioning for P1 Not Selected SC-22 SC-22
Name/Address Resolution Service
SC-23 Session Authenticity P1 Not Selected SC-23 SC-23
SC-24 Fail in Known State P1 Not Selected Not Selected SC-24
SC-25 Thin Nodes P0 Not Selected Not Selected Not Selected
SC-26 Honeypots P0 Not Selected Not Selected Not Selected
SC-27 Operating System-Independent Applications P0 Not Selected Not Selected Not Selected
SC-28 Protection of Information at Rest P1 Not Selected SC-28 SC-28
SC-29 Heterogeneity P0 Not Selected Not Selected Not Selected
SC-30 Virtualization Techniques P0 Not Selected Not Selected Not Selected
SC-31 Covert Channel Analysis P0 Not Selected Not Selected Not Selected
SC-32 Information System Partitioning P0 Not Selected SC-32 SC-32
SC-33 Transmission Preparation Integrity P0 Not Selected Not Selected Not Selected
Program Management
PM-1 Security Program Plan P1
PM-2 Senior Information Security Officer P1
PM-3 Information Security Resources P1
PM-4 Plan of Action and Milestones Process P1
Deployed organization-wide
PM-5 Information System Inventory P1 Supporting all baselines
PM-6 Information Security Measures of P1
Performance
PM-7 Enterprise Architecture P1
PM-8 Critical Infrastructure Plan P1
PRIORITY
CONTROL BASELINES
CNTL
CONTROL NAME
LOW MOD HIGH
APPENDIX E
T
he minimum assurance requirements for security controls described in the security control
catalog are listed below. The assurance requirements are directed at the activities and
actions that security control developers and implementers 62 define and apply to increase
the level of confidence that the controls are implemented correctly, operating as intended, and
producing the desired outcome with respect to meeting the security requirements for the
information system. The assurance requirements are applied on a control-by-control basis. The
requirements are grouped by information system impact level (i.e., low, moderate, and high) since
the requirements apply to each control within the respective impact level. Using a format similar
to security controls, assurance requirements are followed by supplemental guidance that provides
additional detail and explanation of how the requirements are to be applied. Bolded text indicates
requirements that appear for the first time at a particular impact level.
Note: This level of assurance is not intended to protect a moderate-impact information system against high-
end threat agents (i.e., threat agents that are highly skilled, highly motivated, and well-resourced). When
such protection is required, the section below entitled Additional Assurance Requirements for Moderate-
Impact and High-Impact Information Systems applies.
62
In this context, a developer/implementer is an individual or group of individuals responsible for the development or
implementation of security controls for an information system. This may include, for example, hardware and software
vendors providing the controls, contractors implementing the controls, or organizational personnel such as information
system owners, information system security officers, system and network administrators, or other individuals with
security responsibility for the information system.
Note: This level of assurance is not intended to protect a high-impact information system against high-end
threat agents (i.e., threat agents that are highly skilled, highly motivated, and well-resourced). When such
protection is required, the section below entitled Additional Assurance Requirements for Moderate-Impact
and High-Impact Information Systems applies.
APPENDIX F
T
he catalog of security controls in this appendix provides a range of safeguards and
countermeasures for organizations and information systems. 63 The organization of the
security control catalog, the structure of the controls, and the concept of allocating security
controls and control enhancements to the initial baselines in Appendix D are described in Chapter
Two. The security controls in the catalog are expected to change over time, as controls are
withdrawn, revised and added. In order to maintain stability in security plans and automated
tools supporting the implementation of NIST Special Publication 800-53, security controls and
control enhancements will not be renumbered each time a control or enhancement is withdrawn.
Notations of security controls and controls enhancements that have been withdrawn will be
maintained in the catalog for historical purposes.
63
FIPS and Special Publications listed in the References section of security controls refer to the most recent versions of
those publications.
Assignment and selection statements provide organizations with the capability to specialize security
controls and control enhancements based on organizational security requirements and/or requirements
originating in federal laws, Executive Orders, directives, policies, regulations, standards, or guidelines.
Security control enhancements are used to strengthen or broaden the fundamental security capability
described in the base control and are not used as a substitute for using assignment or selection
statements to add greater specificity to the control. The first security control in each family (a.k.a. the
dash one control) generates the requirement for policy and procedures that are needed for the effective
implementation of the other security controls and control enhancements in the family. Therefore, the
individual controls/enhancements in the family typically do not call for the development of such policy
and procedures.
Security controls and control enhancements are employed in federal information systems in accordance
with the risk management guidance provided in NIST Special Publication 800-39 as summarized in
Chapter Three of this publication. This guidance includes selecting baseline security controls (see
Appendix D) in accordance with the FIPS 199 security categorization of the information system and
tailoring the baseline. The tailored security control baseline represents the minimum controls for low-
impact, moderate-impact, and high-impact information systems, respectively. There are additional
security controls and control enhancements that appear in the catalog that are not used in any of the
baselines. These additional controls and control enhancements are available to organizations and can
be used in supplementing the tailored baselines to achieve the needed level of protection in accordance
with an organizational assessment of risk. Moreover, security controls and control enhancements
contained in higher-level baselines can also be used by organizations in lower-level baselines, if
deemed appropriate, to provide additional protection measures.
Beginning with NIST Special Publication 800-53, Revision 3, the supplemental guidance sections for
security controls and control enhancements contain no requirements or references to FIPS or NIST
Special Publications. NIST publications are included in a new References section that has been added
to the general description and content of the security control specification. In addition, security control
baseline allocations are summarized in Appendix D and are no longer resident with each control.
Finally, in support of the Joint Task Force Transformation Initiative to develop a unified information
security framework for the federal government, security controls and control enhancements for national
security systems are included in the control catalog. The inclusion of these security controls and control
enhancements in the catalog is not intended to impose security requirements on organizations that
process, store, or transmit classified, national security information or operate national security systems.
Rather, the security controls and enhancements are available to the national security community to use
on a voluntary basis with the express consent of the Director of National Intelligence, the Secretary of
Defense, and/or the Chairman, Committee on National Security Systems, or their designees.
Control Enhancements:
(1) The organization employs automated mechanisms to support the management of information
system accounts.
(2) The information system automatically terminates temporary and emergency accounts after
[Assignment: organization-defined time period for each type of account].
(3) The information system automatically disables inactive accounts after [Assignment: organization-
defined time period].
(4) The information system automatically audits account creation, modification, disabling, and
termination actions and notifies, as required, appropriate individuals.
(5) The organization:
(a) Requires that users log out when [Assignment: organization defined time-period of expected
inactivity and/or description of when to log out];
(b) Determines normal time-of-day and duration usage for information system accounts;
(c) Monitors for atypical usage of information system accounts; and
(d) Reports atypical usage to designated organizational officials.
(6) The information system dynamically manages user privileges and associated access
authorizations.
Enhancement Supplemental Guidance: Privileged roles include, for example, key management,
network and system administration, database administration, web administration.
References: None.
Control:The information system enforces approved authorizations for logical access to the system
in accordance with applicable policy.
Supplemental Guidance: Access control policies (e.g., identity-based policies, role-based policies,
attribute-based policies) and access enforcement mechanisms (e.g., access control lists, access
control matrices, cryptography) are employed by organizations to control access between users (or
processes acting on behalf of users) and objects (e.g., devices, files, records, processes, programs,
domains) in the information system. In addition to enforcing authorized access at the information-
system level, access enforcement mechanisms are employed at the application level, when
necessary, to provide increased information security for the organization. Consideration is given
to the implementation of an audited, explicit override of automated mechanisms in the event of
emergencies or other serious events. If encryption of stored information is employed as an access
enforcement mechanism, the cryptography used is FIPS 140-2 (as amended) compliant. For
classified, national security information, the cryptography used is largely dependent on the
classification level of the information. Mechanisms implemented by AC-3 are configured to
enforce authorizations determined by other security controls. Related controls: AC-2, AC-4, AC-
5, AC-6, AC-16, AC-17, AC-19, AC-20, AU-9, CM-5, CM-6, MA-3, MA-4, MA-5, SA-7, SC-13,
SI-9.
Control Enhancements:
(1) [Withdrawn: Incorporated into AC-6].
(2) The information system enforces dual authorization, based on organizational policies and
procedures for [Assignment: organization-defined privileged commands].
References: None.
Control:The information system enforces approved authorizations for controlling the flow of
information within the system and between interconnected systems in accordance with applicable
policy.
Supplemental Guidance: Information flow control regulates where information is allowed to travel
within an information system and between information systems (as opposed to who is allowed to
access the information) and without explicit regard to subsequent accesses to that information. A
few examples of flow control restrictions include: keeping export controlled information from
being transmitted in the clear to the Internet, blocking outside traffic that claims to be from within
the organization, and not passing any web requests to the Internet that are not from the internal
web proxy. Information flow control policies and enforcement mechanisms are commonly
employed by organizations to control the flow of information between designated sources and
destinations (e.g., networks, individuals, devices) within information systems and between
interconnected systems. Flow control is based on the characteristics of the information and/or the
information path. Specific examples of flow control enforcement can be found in boundary
protection devices (e.g., proxies, gateways, guards, encrypted tunnels, firewalls, and routers) that
employ rule sets or establish configuration settings that restrict information system services,
provide a packet-filtering capability based on header information, or message-filtering capability
based on content (e.g., using key word searches or document characteristics). Mechanisms
implemented by AC-4 are configured to enforce authorizations determined by other security
controls. Related controls: AC-17, AC-19, AC-21, CM-7, SA-8, SC-2, SC-5, SC-7, SC-18.
Control Enhancements:
(1) The information system enforces information flow control using explicit security attributes on
information, source, and destination objects as a basis for flow control decisions.
(9) The information system enforces the use of human review for [Assignment: organization-defined
security policy filters] when the system is not capable of making an information flow control
decision.
(10) The information system provides the capability for a privileged administrator to enable/disable
[Assignment: organization-defined security policy filters].
(11) The information system provides the capability for a privileged administrator to configure the
[Assignment: organization-defined security policy filters] to support different security policies.
Enhancement Supplemental Guidance: For example, to reflect changes in the security policy, an
administrator can change the list of “dirty words” that the security policy mechanism checks
in accordance with the definitions provided by the organization.
(12) The information system, when transferring information between different security domains,
identifies information flows by data type specification and usage.
Enhancement Supplemental Guidance: Data type specification and usage include, for example,
using file naming to reflect type of data and limiting data transfer based on file type.
(13) The information system, when transferring information between different security domains,
decomposes information into policy-relevant subcomponents for submission to policy
enforcement mechanisms.
fully tested, re-grading mechanisms to reassign security attributes and associated security
labels.
(17) The information system:
(a) Uniquely identifies and authenticates source and destination domains for information
transfer;
(b) Binds security attributes to information to facilitate information flow policy enforcement; and
(c) Tracks problems associated with the security attribute binding and information transfer.
Control:The organization employs the concept of least privilege, allowing only authorized
accesses for users (and processes acting on behalf of users) which are necessary to accomplish
assigned tasks in accordance with organizational missions and business functions.
Supplemental Guidance: The access authorizations defined in this control are largely implemented
by control AC-3. The organization employs the concept of least privilege for specific duties and
information systems (including specific ports, protocols, and services) in accordance with risk
assessments as necessary to adequately mitigate risk to organizational operations and assets,
individuals, other organizations, and the Nation. Related controls: AC-2, AC-3, CM-7.
Control Enhancements:
(1) The organization explicitly authorizes access to [Assignment: organization-defined list of security
functions (deployed in hardware, software, and firmware) and security-relevant information].
Enhancement Supplemental Guidance: Super user accounts are typically described as “root” or
“administrator” for various types of commercial off-the-shelf operating systems. Configuring
organizational information systems (e.g., notebook/laptop computers, servers, workstations)
such that day-to-day users are not authorized access to super user accounts is an example of
limiting system authorization. The organization may differentiate in the application of this
control enhancement between allowed privileges for local information system accounts and
for domain accounts provided the organization retains the ability to control the configuration
of the system with regard to key security parameters and as otherwise necessary to
sufficiently mitigate risk.
(6) The organization prohibits privileged access to the information system by non-organizational
users.
Supplemental Guidance: Due to the potential for denial of service, automatic lockouts initiated by
the information system are usually temporary and automatically release after a predetermined time
period established by the organization. If a delay algorithm is selected, the organization may
chose to employ different algorithms for different information system components based on the
capabilities of those components. Response to unsuccessful login attempts may be implemented
at both the operating system and the application levels. This control applies to all accesses other
than those accesses explicitly identified and documented by the organization in AC-14.
Control Enhancements:
(1) The information system automatically locks the account/node until released by an administrator
when the maximum number of unsuccessful attempts is exceeded.
(2) The information system provides additional protection for mobile devices by purging information
from the device after [Assignment: organization-defined consecutive, unsuccessful login attempts]
to the device.
Enhancement Supplemental Guidance: The login is to the mobile device, not to any one account
on the device. Therefore, a successful login to any account on the mobile device resets the
unsuccessful login count to zero.
References: None.
Control: The information system notifies the user, upon successful logon (access), of the date and
time of the last logon (access).
Supplemental Guidance: This control is intended to cover both traditional logons to information
systems and general accesses to information systems that occur in other types of architectural
configurations (e.g., service oriented architectures).
Control Enhancements:
(1) The information system notifies the user, upon successful logon/access, of the number of
unsuccessful logon/access attempts since the last successful logon/access.
(2) The information system notifies the user of the number of [Selection: successful logins/accesses;
unsuccessful login/access attempts; both] during [Assignment: organization-defined time period].
(3) The information system notifies the user of [Assignment: organization-defined set of security-
related changes to the user’s account] during [Assignment: organization-defined time period].
References: None.
Control: The information system limits the number of concurrent sessions for each system account
to [Assignment: organization-defined number of concurrent sessions].
Supplemental Guidance: The organization may define the maximum number of concurrent sessions
for an information system account globally, by account type, by account, or a combination. This
control addresses concurrent sessions for a given information system account and does not address
concurrent sessions by a single user via multiple system accounts.
Control Enhancements: None.
References: None.
References: None.
Control: The information system supports and maintains the binding of [Assignment: organization-
defined security attributes] to information in storage, in process, and in transmission.
Supplemental Guidance: Security attributes are abstractions representing the basic properties or
characteristics of an entity (e.g., subjects and objects) with respect to safeguarding information.
These attributes are typically associated with internal data structures (e.g., records, buffers, files)
within the information system and are used to enable the implementation of access control and
flow control policies, reflect special dissemination, handling or distribution instructions, or
support other aspects of the information security policy. The term security label is often used to
associate a set of security attributes with a specific information object as part of the data structure
for that object (e.g., user access privileges, nationality, affiliation as contractor). Related controls:
AC-3, AC-4, SC-16, MP-3.
Control Enhancements:
(1) The information system dynamically reconfigures security attributes in accordance with an
identified security policy as information is created and combined.
(2) The information system allows authorized entities to change security attributes.
(3) The information system maintains the binding of security attributes to information with sufficient
assurance that the information--attribute association can be used as the basis for automated policy
actions.
(4) The information system allows authorized users to associate security attributes with information.
Enhanced Supplemental Guidance: The support provided by the information system can vary
from prompting users to select security attributes to be associated with specific information
objects, to ensuring that the combination of attributes selected is valid.
(5) The information system displays security attributes in human-readable form on each object (page,
screen, or equivalent) that the system outputs to external output devices to identify [Assignment:
organization-identified set of special dissemination, handling, or distribution instructions] using
[Assignment: organization-identified human readable, standard naming conventions].
Enhancement Supplemental Guidance: Information system output devices include, for example,
printers and video displays on computer terminals, monitors, screens on notebook/laptop
computers and personal digital assistants.
References: None.
Enhancement Supplemental Guidance: Additional security measures are typically above and
beyond standard bulk or session layer encryption (e.g., Secure Shell [SSH], Virtual Private
Networking [VPN] with blocking mode enabled). Related controls: SC-8, SC-9.
(11) The organization disables peer-to-peer wireless networking capability within the information
system except for explicitly identified components in support of specific operational requirements.
(12) The organization disables networking protocols within the information system that the
organization deems to be non-secure except for explicitly identified components in support of
specific operational requirements.
Enhancement Supplemental Guidance: The organization can either make a determination of the
relative security of the networking protocol or base the security decision on the assessment of
other entities. Bluetooth is an example of a less than secure networking protocol for wireless
applications.
References:NIST Special Publications 800-46, 800-48, 800-77, 800-94, 800-97, 800-113, 800-
114, 800-121.
(3) The organization prohibits the use of removable media in organizational information systems when
the media has no identifiable owner.
Control: The organization establishes terms and conditions, consistent with any trust relationships
established with other organizations owning, operating, and/or maintaining external information
systems, allowing authorized individuals to:
a. Access the information system from the external information systems; and
b. Process, store, and/or transmit organization-controlled information using the external
information systems.
Supplemental Guidance: External information systems are information systems or components of
information systems that are outside of the authorization boundary established by the organization
and for which the organization typically has no direct supervision and authority over the
application of required security controls or the assessment of security control effectiveness.
External information systems include, but are not limited to: (i) personally owned information
systems (e.g., computers, cellular telephones, or personal digital assistants); (ii) privately owned
computing and communications devices resident in commercial or public facilities (e.g., hotels,
convention centers, or airports); (iii) information systems owned or controlled by nonfederal
governmental organizations; and (iv) federal information systems that are not owned by, operated
by, or under the direct supervision and authority of the organization. For some external systems,
in particular those systems operated by other federal agencies, including organizations subordinate
to those agencies, the trust relationships that have been established between those organizations
and the originating organization may be such, that no explicit terms and conditions are required.
In effect, the information systems of these organizations would not be considered external. These
situations typically occur when, for example, there is some pre-existing sharing or trust agreement
(either implicit or explicit) established between federal agencies and/or organizations subordinate
to those agencies, or such trust agreements are specified by applicable laws, Executive Orders,
directives, or policies. Authorized individuals include organizational personnel, contractors, or
any other individuals with authorized access to the organizational information system. The
restrictions that an organization imposes on authorized individuals need not be uniform, as those
restrictions are likely to vary depending upon the trust relationships between organizations. Thus,
an organization might impose more stringent security restrictions on a contractor than on a state,
local, or tribal government.
This control does not apply to the use of external information systems to access public interfaces
to organizational information systems and information (e.g., individuals accessing federal
information through www.usa.gov). The organization establishes terms and conditions for the use
of external information systems in accordance with organizational security policies and
procedures. The terms and conditions address as a minimum; (i) the types of applications that can
be accessed on the organizational information system from the external information system; and
(ii) the maximum security categorization of information that can be processed, stored, and
transmitted on the external information system. This control defines access authorizations
enforced by AC-3, rules of behavior requirements enforced by PL-4, and session establishment
rules enforced by AC-17. Related controls: AC-3, AC-17, PL-4.
Control Enhancements:
(1) The organization prohibits authorized individuals from using an external information system to
access the information system or to process, store, or transmit organization-controlled information
except in situations where the organization:
(a) Can verify the implementation of required security controls on the external system as
specified in the organization’s information security policy and security plan; or
(b) Has approved information system connection or processing agreements with the
organizational entity hosting the external information system.
(2) The organization imposes restrictions on authorized individuals with regard to the use of
organization-controlled removable media on external information systems.
References: None.
Control: The organization provides basic security awareness training to all information system
users (including managers, senior executives, and contractors) as part of initial training for new
users, when required by system changes, and [Assignment: organization-defined frequency]
thereafter.
Supplemental Guidance: The organization determines the appropriate content of security awareness
training and security awareness techniques based on the specific requirements of the organization
and the information systems to which personnel have authorized access. The content includes a
basic understanding of the need for information security and user actions to maintain security and
to respond to suspected security incidents. The content also addresses awareness of the need for
operations security as it relates to the organization’s information security program. Security
awareness techniques can include, for example, displaying posters, offering supplies inscribed
with security reminders, generating email advisories/notices from senior organizational officials,
displaying logon screen messages, and conducting information security awareness events.
Control Enhancements:
(1) The organization includes practical exercises in security awareness training that simulate actual
cyber attacks.
Enhancement Supplemental Guidance: Practical exercises may include, for example, no-notice
social engineering attempts to collect information, gain unauthorized access, or simulate the
adverse impact of opening malicious email attachments or invoking malicious web links.
References: C.F.R. Part 5 Subpart C (5 C.F.R 930.301); NIST Special Publication 800-50.
Enhancement Supplemental Guidance: Physical security controls include, for example, physical
access control devices, physical intrusion alarms, monitoring and surveillance equipment, and
security guards (deployment and operating procedures).
References: C.F.R. Part 5 Subpart C (5 C.F.R 930.301); NIST Special Publication 800-50.
Control: The organization establishes and institutionalizes contact with selected groups and
associations within the security community:
- To facilitate ongoing security education and training for organizational personnel;
- To stay up-to-date with the latest recommended security practices, techniques, and
technologies; and
Control:The organization selects both knowledgeable and unbiased individuals to develop and
conduct security-related training that provides sufficient understanding of the security controls
implemented within an organizational information system to permit independent assessment of the
controls.
Supplemental Guidance: Security-related training is intended for independent security control
assessors (e.g., security assessment teams, independent verification and validation teams). The
depth and breadth of training is commensurate with the complexity of the information system and
the degree of rigor required in the assessment. Related control: SA-5.
Control Enhancements: None.
References: None.
Control Enhancements:
(1) [Withdrawn: Incorporated into AU-12].
(2) [Withdrawn: Incorporated into AU-12].
(3) The organization reviews and updates the list of auditable events [Assignment: organization-
defined frequency].
Control: The information system produces audit records that contain sufficient information to, at a
minimum, establish what type of event occurred, when (date and time) the event occurred, where
the event occurred, the source of the event, the outcome (success or failure) of the event, and the
identity of any user/subject associated with the event.
Supplemental Guidance: Audit record content that may be necessary to satisfy the requirement of
this control, includes, for example, timestamps, source and destination addresses, user/process
identifiers, event descriptions, success/fail indications, filenames involved, and access control or
flow control rules invoked. Related controls: AU-2, AU-8.
Control Enhancements:
(1) The information system includes [Assignment: organization-defined additional, more detailed
information] in the audit records for audit events identified by type, location, or subject.
References: None.
Control: The organization allocates audit record storage capacity and configures auditing to reduce
the likelihood of such capacity being exceeded.
Supplemental Guidance: The organization considers the types of auditing to be performed and the
audit processing requirements when allocating audit storage capacity. Related controls: AU-2,
AU-5, AU-6, AU-7, SI-4.
Control Enhancements: None.
References: None.
Supplemental Guidance: Audit processing failures include, for example, software/hardware errors,
failures in the audit capturing mechanisms, and audit storage capacity being reached or exceeded.
Related control: AU-4.
Control Enhancements:
(1) The information system provides a warning when allocated audit record storage volume reaches
[Assignment: organization-defined percentage of maximum audit record storage capacity].
(2) The information system provides a real-time alert when the following audit failure events occur:
[Assignment: organization-defined audit failure events requiring real-time alerts].
(3) The information system enforces configurable traffic volume thresholds representing auditing
capacity for network traffic and [Selection: rejects or delays] network traffic above those
thresholds.
(4) The information system invokes a system shutdown in the event of an audit failure, unless an
alternative audit capability exists.
References: None.
Enhancement Supplemental Guidance: Permitted actions for information system processes, roles,
and/or users associated with the review, analysis, and reporting of audit records include, for
example, read, write, append, and delete.
(8) The organization employs automated mechanisms to alert security personnel of the following
inappropriate or unusual activities with security implications: [Assignment: organization-defined
list of inappropriate or unusual activities that are to result in alerts].
(9) The organization performs, in a physically dedicated information system, full-text analysis of
privileged functions executed.
References: None.
Control: The information system provides an audit reduction and report generation capability.
Supplemental Guidance: An audit reduction and report generation capability provides support for
near real-time audit review, analysis, and reporting requirements described in AU-6 and after-the-
fact investigations of security incidents. Audit reduction and reporting tools do not alter original
audit records. Related control: AU-6.
Control Enhancements:
(1) The information system provides the capability to automatically process audit records for events
of interest based on selectable, event criteria.
References: None.
Control: The information system uses internal system clocks to generate time stamps for audit
records.
Supplemental Guidance: Time stamps generated by the information system include both date and
time. Related control: AU-3.
Control Enhancements:
(1) The information system synchronizes internal information system clocks [Assignment:
organization-defined frequency].
References: None.
Control:The information system protects audit information and audit tools from unauthorized
access, modification, and deletion.
Supplemental Guidance: Audit information includes all information (e.g., audit records, audit
settings, and audit reports) needed to successfully audit information system activity. Related
controls: AC-3, AC-6.
Control Enhancements:
(1) The information system produces audit records on hardware-enforced, write-once media.
(2) The information system backs up audit records [Assignment: organization-defined frequency] onto
a different system or media than the system being audited.
(3) The information system uses cryptographic mechanisms to protect the integrity of audit
information and audit tools.
Enhancement Supplemental Guidance: Auditing may not be reliable when performed by the
information system to which the user being audited has privileged access. The privileged user
may inhibit auditing or modify audit records. This control enhancement helps mitigate this
risk by requiring that privileged access be further defined between audit-related privileges and
other privileges, thus, limiting the users with audit-related privileges. Reducing the risk of
audit compromises by privileged users can also be achieved, for example, by performing audit
activity on a separate information system or by using storage media that cannot be modified
(e.g., write-once recording devices).
References: None.
AU-10 NON-REPUDIATION
Control: The information system protects against an individual falsely denying having performed a
particular action.
Supplemental Guidance: Examples of particular actions taken by individuals include creating
information, sending a message, approving information (e.g., indicating concurrence or signing a
contract), and receiving a message. Non-repudiation protects individuals against later claims by
an author of not having authored a particular document, a sender of not having transmitted a
message, a receiver of not having received a message, or a signatory of not having signed a
document. Non-repudiation services can be used to determine if information originated from an
individual, or if an individual took specific actions (e.g., sending an email, signing a contract,
approving a procurement request) or received specific information. Non-repudiation services are
obtained by employing various techniques or mechanisms (e.g., digital signatures, digital message
receipts).
Control Enhancements:
(1) The information system associates the identity of the information producer with the information.
Enhancement Supplemental Guidance: This control enhancement is intended to mitigate the risk
that information is modified between production and review. The validation of bindings can
be achieved, for example, by the use of cryptographic checksums.
(3) The information system maintains reviewer/releaser identity and credentials within the established
chain of custody for all information reviewed or released.
information label. In the case of human reviews, this control enhancement provides
appropriate organizational officials the means to identify who reviewed and released the
information. In the case of automated reviews, this control enhancement helps ensure that
only approved review functions are employed.
(4) The information system validates the binding of the reviewer’s identity to the information at the
transfer/release point prior to release/transfer from one security domain to another security
domain.
Enhancement Supplemental Guidance: This control enhancement is intended to mitigate the risk
that information is modified between review and transfer/release.
(5) The organization employs [Selection: FIPS 140-2 validated; NSA-approved] cryptography to
implement digital signatures.
References: None.
Control:The organization retains audit records for [Assignment: organization-defined time period
consistent with records retention policy] to provide support for after-the-fact investigations of
security incidents and to meet regulatory and organizational information retention requirements.
Supplemental Guidance: The organization retains audit records until it is determined that they are no
longer needed for administrative, legal, audit, or other operational purposes. This includes, for
example, retention and availability of audit records relative to Freedom of Information Act (FOIA)
requests, subpoena, and law enforcement actions. Standard categorizations of audit records
relative to such types of actions and standard response processes for each type of action are
developed and disseminated. The National Archives and Records Administration (NARA)
General Records Schedules (GRS) provide Federal policy on record retention.
Control Enhancements: None.
References: NIST Special Publication 800-61.
Enhancement Supplemental Guidance: The audit trail is time-correlated if the time stamp in the
individual audit records can be reliably related to the time stamp in other audit records to
achieve a time ordering of the records within the organization-defined tolerance.
(2) The information system produces a system-wide (logical or physical) audit trail composed of audit
records in a standardized format.
Control: The organization monitors open source information for evidence of unauthorized
exfiltration or disclosure of organizational information [Assignment: organization-defined
frequency].
Supplemental Guidance: None.
Control Enhancements: None.
References: None.
Control:The information system provides the capability to remotely view, listen to, log, and
capture all content related to a specific user session in real-time.
Supplemental Guidance: Session auditing activities are developed, integrated, and used in
consultation with legal counsel in accordance with applicable federal laws, Executive Orders,
directives, policies, or regulations.
Control Enhancements:
(1) The information system initiates session audits at system start up.
References: None.
the most volatile or critical to protecting the information system are assessed at least annually. All
other controls are assessed at least once during the information system’s three-year authorization
cycle. The organization can use the current year’s assessment results from any of the above
sources to meet the FISMA annual assessment requirement provided that the results are current,
valid, and relevant to determining security control effectiveness. External audits (e.g., audits
conducted by external entities such as regulatory agencies) are outside the scope of this control.
Related controls: CA-6, CA-7, PM-9, SA-11.
Control Enhancements:
(1) The organization employs an independent assessor or assessment team to conduct an
assessment of the security controls in the information system.
Enhancement Supplemental Guidance: Penetration testing exercises both physical and technical
security controls. A standard method for penetration testing consists of: (i) pre-test analysis
based on full knowledge of the target system; (ii) pre-test identification of potential
vulnerabilities based on pre-test analysis; and (iii) testing designed to determine exploitability
of identified vulnerabilities. Detailed rules of engagement are agreed upon by all parties
before the commencement of any penetration testing scenario. These rules of engagement are
correlated with the tools, techniques, and procedures that are anticipated to be employed by
threat-sources in carrying out attacks. An organizational assessment of risk guides the
decision on the level of independence required for penetration agents or penetration teams
conducting penetration testing. Red team exercises are conducted as a simulated adversarial
attempt to compromise organizational missions and/or business processes to provide a
comprehensive assessment of the security capability of the information system and
organization. While penetration testing may be laboratory-based testing, red team exercises
are intended to be more comprehensive in nature and reflect real-world conditions.
Information system monitoring, malicious user testing, penetration testing, red-team
exercises, and other forms of security testing (e.g., independent verification and validation)
are conducted to improve the readiness of the organization by exercising organizational
capabilities and indicating current performance levels as a means of focusing organizational
actions to improve the security state of the system and organization. Testing is conducted in
accordance with applicable federal laws, Executive Orders, directives, policies, regulations,
and standards. Testing methods are approved by authorizing officials in coordination with the
organization’s Risk Executive Function. Vulnerabilities uncovered during red team exercises
are incorporated into the vulnerability remediation process. Related controls: RA-5, SI-2.
(3) The organization develops and employs:
(a) A security assessment plan that describes the applicable security controls and control
enhancements for the information system under assessment, the assessment environment,
the scope of the assessment, the assessment team, and the assessment roles and
responsibilities; and
(2) The organization prohibits the direct connection of a classified, national security system to an
external network.
the authorizing official and the information system owner with an up-to-date status of the security
state of the information system. To reduce the administrative cost of security reauthorization, the
authorizing official uses the results of the continuous monitoring process to the maximum extent
possible as the basis for rendering a reauthorization decision. OMB policy requires that federal
information systems are reauthorized at least every three years or when there is a significant
change to the system. The organization defines what constitutes a significant change to the
information system. Related controls: CA-2, CA-7, PM-9, PM-10.
Control Enhancements: None.
References: OMB Circular A-130; NIST Special Publication 800-37.
Control: The organization monitors the security controls in the information system on an ongoing
basis.
Supplemental Guidance: A continuous monitoring program allows an organization to maintain the
security authorization of an information system over time in a highly dynamic environment of
operation with changing threats, vulnerabilities, technologies, and missions/business processes.
Continuous monitoring of security controls using automated support tools facilitates near real-time
risk management for information systems. An effective continuous monitoring program includes:
(i) configuration management and control of information system components; (ii) security impact
analyses of changes to the system or its environment of operation; (iii) ongoing assessment of
security controls; and (iv) status reporting.
This control is closely related to and mutually supportive of the activities required in monitoring
configuration changes to the information system. An effective continuous monitoring program
results in ongoing updates to the security plan, the security assessment report, and the plan of
action and milestones—the three principle documents in the security authorization package. A
rigorous and well executed continuous monitoring program significantly reduces the level of effort
required for the reauthorization of the information system. Related controls: CA-2, CA-5, CA-6,
CM-4.
Control Enhancements:
(1) The organization employs an independent assessor or assessment team to monitor the security
controls in the information system on an ongoing basis.
Enhancement Supplemental Guidance: The organization can extend and maximize the value of
the ongoing assessment of security controls during the continuous monitoring process by
requiring an independent assessor or team to assess all of the security controls during the
information system’s three-year authorization cycle. See supplemental guidance for CA-2,
enhancement (1) for further information on assessor independence. Related controls: CA-2,
CA-5, CA-6, CM-3, CM-4.
(2) The organization plans, schedules, and conducts assessments [Assignment: organization-defined
frequency], [Selection: announced; unannounced], [Selection: in-depth monitoring; malicious user
testing; penetration testing; red team exercises; [Assignment: organization-defined other forms of
security assessment]] to ensure compliance with all vulnerability mitigation procedures.
software installed on the operating systems, and current patch levels. Software inventory
tools can also scan information systems for unauthorized software to validate organization-
defined lists of authorized and unauthorized software programs.
(3) The organization maintains a baseline configuration for development and test environments that is
managed separately from the operational baseline configuration.
(4) The organization:
(a) Develops and maintains [Assignment: organization-defined list of software programs
authorized to execute on organizational information systems];
(b) Employs a deny-all, permit-by-exception authorization policy to identify software allowed to
execute on organizational information systems.
(5) The organization:
(a) Develops and maintains [Assignment: organization-defined list of software programs not
authorized to execute on organizational information systems];
(b) Employs an explicit-deny authorization policy to identify software allowed to execute on
organizational information systems.
(6) The organization retains older versions of baseline configurations as deemed necessary to support
rollback.
(2) The organization tests, validates, and documents changes to the information system before
implementing the changes on the operational system.
Enhancement Supplemental Guidance: The organization ensures that testing does not interfere
with information system operations. The individual/group conducting the tests understands
the organizational information security policies and procedures, the information system
security policies and procedures, and the specific health, safety, and environmental risks
associated with a particular facility and/or process. A production information system may
need to be taken off-line, or replicated to the extent feasible, before testing can be conducted.
If an information system must be taken off-line for testing, the tests are scheduled to occur
during planned system outages whenever possible. In situations where the organization
cannot, for operational reasons, conduct live testing of a production system, the organization
employs compensating controls (e.g., providing a replicated system to conduct testing) in
accordance with the general tailoring guidance.
(3) The organization employs automated mechanisms to implement changes to the current
information system baseline and deploys the updated baseline across the installed base.
Control: The organization defines, documents, approves, and enforces physical and logical access
restrictions associated with changes to the information system.
Supplemental Guidance: Any changes to the hardware, software, and/or firmware components of the
information system can potentially have significant effects on the overall security of the system.
Accordingly, only qualified and authorized individuals are allowed to obtain access to information
system components for purposes of initiating changes, including upgrades and modifications.
Additionally, maintaining records of access is essential for ensuring that configuration change
control is being implemented as intended and for supporting after the fact actions should the
organization become aware of an unauthorized change to the information system. Access
restrictions for change also include software libraries. Examples of access restrictions include, for
example, physical and logical access controls (see AC-3 and PE-3), workflow automation, media
libraries, abstract layers (e.g., changes are implemented into a third-party interface rather than
directly into the information system component), and change windows (e.g., changes occur only
during specified times making unauthorized changes outside the window, easy to discover). Some
or all of the enforcement mechanisms and processes necessary to implement this security control
are included in other controls. For measures implemented in other controls, this control provides
information to be used in the implementation of the other controls to cover specific needs related
to enforcing authorizations to make changes to the information system, auditing changes, and
retaining and review records of changes. Related controls: AC-3, AC-6, PE-3.
Control Enhancements:
(1) The organization employs automated mechanisms to enforce access restrictions and support
auditing of the enforcement actions.
(2) The organization conducts audits of information system changes at [Assignment: organization-
defined frequency] and when indications so warrant to determine whether unauthorized changes
have occurred.
(3) The information system prevents the installation of [Assignment: organization-defined critical
software programs] that are not signed with an organizationally recognized and approved
certificate.
Enhancement Supplemental Guidance: Critical software programs and/or modules include, for
example, device drivers, patches, and service packs.
(4) The organization enforces a two-person rule for changes to [Assignment: organization-defined
information system components and system-level information].
(5) The organization:
(a) Limits information system developer/integrator privileges to change hardware, software, and
firmware components and system information directly within a production environment; and
(b) Reviews and reevaluates information system developer/integrator privileges [Assignment:
organization-defined frequency].
(6) The organization protects software libraries (including privileged programs) from the introduction
of unauthorized or malicious code.
(7) The information system automatically implements [Assignment: organization-defined safeguards
and countermeasures] if security functions (or mechanisms) are changed inappropriately.
References: OMB Memoranda 07-11, 07-18, 08-22; NIST Special Publications 800-70, 800-128;
Web: NVD.NIST.GOV; WWW.NSA.GOV.
Control: The organization configures the information system to provide only essential capabilities
and specifically prohibits and/or restricts the use of the following functions, ports, protocols,
and/or services: [Assignment: organization-defined list of prohibited and/or restricted functions,
ports, protocols, and/or services].
Supplemental Guidance: Information systems are capable of providing a wide variety of functions
and services. Some of the functions and services, provided by default, may not be necessary to
support essential organizational operations (e.g., key missions, functions). Additionally, it is
sometimes convenient to provide multiple services from a single component of an information
system, but doing so increases risk over limiting the services provided by any one component.
Where feasible, organizations limit component functionality to a single function per device (e.g.,
email server or web server, not both). The functions and services provided by organizational
information systems, or individual components of information systems, are carefully reviewed to
determine which functions and services are candidates for elimination (e.g., Voice Over Internet
Protocol, Instant Messaging, auto-execute, file sharing). Organizations consider disabling unused
or unnecessary physical and logical ports and protocols (e.g., Universal Serial Bus [USB], File
Transfer Protocol [FTP], Internet Protocol Version 6 [IPv6], Hyper Text Transfer Protocol
[HTTP]) on information system components to prevent unauthorized connection of devices,
unauthorized transfer of information, or unauthorized tunneling. Organizations can utilize
network scanning tools, intrusion detection and prevention systems, and end-point protections
such as firewalls and host-based intrusion detection systems to identify and prevent the use of
prohibited functions, ports, protocols, and services. Related control: RA-5.
Control Enhancements:
(1) The organization reviews the information system [Assignment: organization-defined frequency], to
identify and eliminate unnecessary functions, ports, protocols, and/or services.
(2) The organization employs automated mechanisms to prevent program execution in accordance
with [Selection (one or more): list of authorized software programs; list of unauthorized software
programs; rules authorizing the terms an conditions of software program usage].
(3) The organization ensures compliance with [Assignment: organization-defined registration
requirements for ports, protocols, and services].
(manufacturer, type, model, serial number, physical location), software license information,
information system/component owner, and for a networked component/device, the machine name
and network address. Related controls: CM-2, CM-6.
Control Enhancements:
(1) The organization updates the inventory of information system components as an integral part of
component installations, removals, and information system updates.
(2) The organization employs automated mechanisms to help maintain an up-to-date, complete,
accurate, and readily available inventory of information system components.
Control: The organization develops, documents, and implements a configuration management plan
for the information system that:
a. Addresses roles, responsibilities, and configuration management processes and procedures;
b. Defines the configuration items for the information system and when in the system
development life cycle the configuration items are placed under configuration management;
and
c. Establishes the means for identifying configuration items throughout the system development
life cycle and a process for managing the configuration of the configuration items.
Supplemental Guidance: Configuration items are the information system items (hardware, software,
firmware, and documentation) to be configuration managed. The configuration management plan
satisfies the requirements in the organization’s configuration management policy while being
tailored to the individual information system. The configuration management plan defines
detailed processes and procedures for how configuration management is used to support system
development life cycle activities at the information system level. The plan describes how to move
a change through the change management process, how configuration settings and configuration
baselines are updated, how the information system component inventory is maintained, how
development, test, and operational environments are controlled, and finally, how documents are
developed, released, and updated. The configuration management approval process includes
designation of key management stakeholders that are responsible for reviewing and approving
proposed changes to the information system, and security personnel that would conduct an impact
analysis prior to the implementation of any changes to the system. Related control: SA-10.
Control Enhancements:
(1) The organization assigns responsibility for developing the configuration management process to
organizational personnel that are not directly involved in system development.
Control Enhancements:
(1) The organization coordinates contingency plan development with organizational elements
responsible for related plans.
Control: The organization trains personnel in their contingency roles and responsibilities with
respect to the information system and provides refresher training [Assignment: organization-
defined frequency].
Supplemental Guidance: None.
Control Enhancements:
(1) The organization incorporates simulated events into contingency training to facilitate effective
response by personnel in crisis situations.
(2) The organization employs automated mechanisms to provide a more thorough and realistic
training environment.
Control: The organization provides for the recovery and reconstitution of the information system to
a known [Selection: secure; safe] state after a disruption, compromise, or failure.
Supplemental Guidance: Recovery and reconstitution to a known secure state means that all system
parameters (default or organization-established) are set to secure values, security-critical patches
are reinstalled, security-related configuration settings are reestablished, system documentation and
operating procedures are available, application and system software is reinstalled and configured
with secure settings, information from the most recent, known secure backups is loaded, and the
system is fully tested. The information system recovery and reconstitution capability employed by
the organization is based on organizational priorities, established recovery point/time and
reconstitution objectives, and appropriate metrics. The recovery and reconstitution includes the
deactivation of any information systems located at the relocation site. Deactivation is the process
of finalizing the system recovery and validation operations and includes the necessary activities to
prepare the system against another outage or disruption. The recovery and reconstitution
capability employed by the organization can be a combination of automated mechanisms and
manual procedures. Related control: SC-24.
Control Enhancements:
(1) [Withdrawn: Incorporated into CP-4].
(2) The information system implements transaction recovery for systems that are transaction-based.
Control: The information system uniquely identifies and authenticates organizational users (or
processes acting on behalf of organizational users).
Supplemental Guidance: Organizational users include organizational employees or individuals the
organization deems to have equivalent status of employees (e.g., contractors, guest researchers,
individuals from allied nations). Users are uniquely identified and authenticated for all accesses
other than those accesses explicitly identified and documented by the organization in AC-14.
Authentication of user identities is accomplished through the use of passwords, tokens, biometrics,
or in the case of multifactor authentication, some combination thereof. Access to organizational
information systems is defined as either local or network. Local access is any access to an
organizational information system by a user (or process acting on behalf of a user) where such
access is obtained by direct connection without the use of a network. Network access is any
access to an organizational information system by a user (or process acting on behalf of a user)
where such access is obtained through a network connection. Remote access is a type of network
access which involves communication through an external network (e.g., the Internet). Internal
networks include local area networks, wide area networks, and virtual private networks that are
under the control of the organization. For a virtual private network (VPN), the VPN is considered
an internal network if the organization establishes the VPN connection between organization-
controlled endpoints in a manner that does not require the organization to depend on any external
networks across which the VPN transits to protect the confidentiality and integrity of information
transmitted. Identification and authentication requirements for information system access by other
than organizational users are described in IA-8.
The identification and authentication requirements in this control are satisfied by complying with
Homeland Security Presidential Directive 12. In addition to identifying and authenticating users
at the information system level (i.e., at logon), identification and authentication mechanisms are
employed at the application level, when necessary, to provide increased information security for
the organization. Related controls: AC-14, AC-17, IA-4, IA-5.
Control Enhancements:
(1) The information system uses multifactor authentication for network access to privileged accounts.
(2) The information system uses multifactor authentication for network access to non-privileged
accounts.
(3) The information system uses multifactor authentication for local access to privileged accounts.
(4) The information system uses multifactor authentication for local access to non-privileged
accounts.
(5) The information system uses passwords/personal identification numbers (PINs) for local and
network access to non-privileged accounts.
(6) The information system uses passwords/personal identification numbers (PINs) for local access.
(7) The organization:
(a) Allows the use of group authenticators only when used in conjunction with an
individual/unique authenticator; and
(b) Requires individuals to be authenticated with an individual authenticator prior to using a
group authenticator.
(8) The organization employs multi-factor authentication for remote access to non-privileged accounts
where one of the factors is provided by a device separate from the information system being
accessed.
References: HSPD 12; OMB Memorandum 04-04; FIPS Publication 201; NIST Special
Publications 800-73, 800-76, 800-78.
Enhancement Supplemental Guidance: With regard to dynamic address allocation for devices,
DHCP-enabled clients typically obtain leases for IP addresses from DHCP servers.
References: None.
Control: The organization manages information system identifiers for users and devices by:
a. Receiving authorization from a designated organizational official to assign a user or device
identifier;
b. Selecting an identifier that uniquely identifies an individual or device;
c. Assigning the user identifier to the intended party or the device identifier to the intended
device;
d. Preventing reuse of user or device identifiers for [Assignment: organization-defined time
period]; and
e. Disabling the user identifier after [Assignment: organization-defined time period of
inactivity].
Supplemental Guidance: Common device identifiers include media access control (MAC) or Internet
protocol (IP) addresses, or device unique token identifiers. Management of user identifiers is not
applicable to shared information system accounts (e.g., guest and anonymous accounts). It is
commonly the case that a user identifier is the name of an information system account associated
with an individual. In such instances, identifier management is largely addressed by the account
management activities of AC-2. IA-4 also covers user identifiers not necessarily associated with
an information system account (e.g., the identifier used in a physical security control database
accessed by a badge reader system for access to the information system). Related control: AC-2,
IA-2.
Control Enhancements:
(1) The organization prohibits the use of information system account identifiers as public identifiers
for user electronic mail accounts (i.e., user identifier portion of the electronic mail address).
Control: The organization manages information system authenticators for users and devices by:
a. Verifying, as part of the initial authenticator distribution, the identity of the individual and/or
device receiving the authenticator;
b. Establishing initial authenticator content for authenticators defined by the organization;
c. Ensuring that authenticators have sufficient strength of mechanism for their intended use;
d. Establishing and implementing administrative procedures for initial authenticator distribution,
for lost/compromised, or damaged authenticators, and for revoking authenticators;
e. Changing default content of authenticators upon information system installation;
f. Establishing minimum and maximum lifetime restrictions and reuse conditions for
authenticators (if appropriate);
g. Changing/refreshing authenticators [Assignment: organization-defined time period by
authenticator type];
h. Protecting authenticator content from unauthorized disclosure and modification; and
i. Requiring users to take, and having devices implement, specific measures to safeguard
authenticators.
Supplemental Guidance: User authenticators include, for example, tokens, PKI certificates,
biometrics, passwords, and key cards. Initial authenticator content is the actual content (e.g., the
initial password) as opposed to requirements about authenticator content (e.g., minimum password
length). Many information system components are shipped with factory default authentication
credentials to allow for initial installation and configuration. Default authentication credentials are
often well known, easily discoverable, present a significant security risk, and therefore, are
changed upon installation. The requirement to protect user authenticators may be implemented via
control PL-4 or PS-6 for authenticators in the possession of users and by controls AC-3, AC-6,
and SC-28 for authenticators stored within the information system (e.g., passwords stored in a
hashed or encrypted format, files containing encrypted or hashed passwords accessible only with
super user privileges). The information system supports user authenticator management by
organization-defined settings and restrictions for various authenticator characteristics including,
for example, minimum password length, password composition, validation time window for time
synchronous one time tokens, and number of allowed rejections during verification stage of
biometric authentication. Measures to safeguard user authenticators include, for example,
maintaining possession of individual authenticators, not loaning or sharing authenticators with
others, and reporting lost or compromised authenticators immediately. Authenticator management
includes issuing and revoking, when no longer needed, authenticators for temporary access such as
that required for remote maintenance. In accordance with OMB policy and related E-
authentication initiatives, authentication of public users accessing federal information systems
may also be required to protect nonpublic or privacy-related information. Device authenticators
include, for example, certificates and passwords. Related controls: AC-2, IA-2, PL-4, PS-6.
Control Enhancements:
(1) The information system, for PKI-based authentication:
(a) Validates certificates by constructing a certification path with status information to an
accepted trust anchor;
(b) Enforces authorized access to the corresponding private key; and
(c) Maps the authenticated identity to the user account.
Enhancement Supplemental Guidance: Status information for certification paths includes, for
example, certificate revocation lists or online certificate status protocol responses.
(2) The organization requires that the registration process to receive [Assignment: organization-
defined types of and/or specific authenticators] be carried out in person before a designated
registration authority with authorization by a designated organizational official (e.g., a supervisor).
(3) The organization employs automated tools to determine if authenticators are sufficiently strong to
resist attacks intended to discover or otherwise compromise the authenticators.
(4) The organization requires vendors and/or manufacturers of information system components to
provide unique authenticators or change default authenticators prior to delivery.
Enhancement Supplemental Guidance: This control enhancement extends the requirement for
organizations to change default authenticators upon information system installation, by
requiring vendors and/or manufacturers of information system components to provide unique
authenticators or change default authenticators for those components prior to delivery to the
organization. Unique authenticators are assigned by vendors and/or manufacturers to specific
information system components (i.e., delivered information technology products) with distinct
serial numbers. This requirement is included in acquisition documents prepared by the
organization when procuring information systems and/or information system components.
(5) The information system, for password-based authentication:
(a) Enforces minimum password complexity of [Assignment: organization-defined requirements
for case sensitivity, number of characters, mix of upper case letters, lower case letters,
numbers, and special characters, including minimum requirements for each type];
(b) Enforces at least a [Assignment: organization-defined number of changed characters] when
new passwords are created;
(c) Encrypts passwords in storage and in transmission;
(d) Enforces password minimum and maximum lifetime restrictions of [Assignment: organization-
defined numbers for lifetime minimum, lifetime maximum]; and
(e) Prohibits password reuse for [Assignment: organization-defined number] generations.
References:OMB Memorandum 04-04; FIPS Publication 201; NIST Special Publications 800-73,
800-76, 800-78.
Control:The information system uniquely identifies and authenticates non-organizational users (or
processes acting on behalf of non-organizational users).
Supplemental Guidance: Non-organizational users include all information system users other than
organizational users explicitly covered by IA-2. Users are uniquely identified and authenticated
for all accesses other than those accesses explicitly identified and documented by the organization
in accordance with AC-14. In accordance with OMB policy and E-Authentication E-Government
initiative, authentication of non-organizational users accessing federal information systems may be
required to protect federal, proprietary, or privacy-related information. The E-authentication risk
assessment is used in determining the authentication needs of non-organizational users based on
risks, potential impacts, and required assurance levels. Scalability, practicality, and security issues
are simultaneously considered in balancing the need to ensure ease of use for access to federal
information and information systems with the need to protect and adequately mitigate risk to
organizational operations, organizational assets, individuals, other organizations, and the Nation.
Identification and authentication requirements for information system access by organizational
users are described in IA-2. Related controls: AC-14, MA-4.
Control Enhancements: None.
References: OMB Memorandum 04-04; NIST Special Publication 800-63.
Control: The organization tests and/or exercises the incident response capability for the information
system [Assignment: organization-defined frequency] using [Assignment: organization-defined
tests and/or exercises] to determine the incident response effectiveness and documents the results.
Supplemental Guidance: None.
Control Enhancements:
(1) The organization employs automated mechanisms to more thoroughly and effectively test/exercise
the incident response capability.
Enhancement Supplemental Guidance: Automated mechanisms can provide the ability to more
thoroughly and effectively test or exercise the incident response capability by providing more
complete coverage of incident response issues, selecting more realistic test/exercise scenarios
and environments, and more effectively stressing the response capability. Related control:
AT-2.
References: NIST Special Publications 800-84, 800-115.
Control: The organization tracks and documents information system security incidents.
Supplemental Guidance: Incident-related information can be obtained from a variety of sources
including, but not limited to, audit monitoring, network monitoring, physical access monitoring,
and user/administrator reports.
Control Enhancements:
(1) The organization employs automated mechanisms to assist in the tracking of security incidents
and in the collection and analysis of incident information.
Enhancement Supplemental Guidance: Automated mechanisms can provide a push and/or pull
capability for users to obtain incident response assistance. For example, individuals might
have access to a website to query the assistance capability, or conversely, the assistance
capability may have the ability to proactively send information to users (general distribution
or targeted) as part of increasing understanding of current response capabilities and support.
(2) The organization:
(a) Establishes a direct, cooperative relationship between its incident response capability and
external providers of information system protection capability; and
(b) Identifies organizational incident response team members to the external providers.
(2) The organization employs automated mechanisms to schedule, conduct, and document
maintenance and repairs as required, producing up-to date, accurate, complete, and available
records of all maintenance and repair actions, needed, in process, and completed.
Control: The organization approves, controls, monitors the use of, and maintains on an ongoing
basis, information system maintenance tools.
Supplemental Guidance: The intent of this control is to address the security-related issues arising
from the hardware and software brought into the information system specifically for diagnostic
and repair actions (e.g., a hardware or software packet sniffer that is introduced for the purpose of
a particular maintenance activity). Hardware and/or software components that may support
information system maintenance, yet are a part of the system (e.g., the software implementing
“ping,” “ls,” “ipconfig,” or the hardware and software implementing the monitoring port of an
Ethernet switch) are not covered by this control. Related control: MP-6.
Control Enhancements:
(1) The organization inspects all maintenance tools carried into a facility by maintenance personnel
for obvious improper modifications.
Enhancement Supplemental Guidance: Maintenance tools include, for example, diagnostic and
test equipment used to conduct maintenance on the information system.
(2) The organization checks all media containing diagnostic and test programs for malicious code
before the media are used in the information system.
(3) The organization prevents the unauthorized removal of maintenance equipment by one of the
following: (i) verifying that there is no organizational information contained on the equipment; (ii)
sanitizing or destroying the equipment; (iii) retaining the equipment within the facility; or (iv)
obtaining an exemption from a designated organization official explicitly authorizing removal of the
equipment from the facility.
(4) The organization employs automated mechanisms to restrict the use of maintenance tools to
authorized personnel only.
and diagnostic sessions are consistent with the network access requirements in IA-2. Strong
authenticators include, for example, PKI where certificates are stored on a token protected by a
password, pass-phrase or biometric. Enforcing requirements in MA-4 is accomplished in part, by
other controls. Related controls: AC-2, AC-3, AC-6, AC-17, AU-2, AU-3, IA-2, IA-8, MA-5,
MP-6, SC-7.
Control Enhancements:
(1) The organization audits non-local maintenance and diagnostic sessions and designated
organizational personnel review the maintenance records of the sessions.
(2) The organization documents, in the security plan for the information system, the installation and
use of non-local maintenance and diagnostic connections.
(3) The organization:
(a) Requires that non-local maintenance and diagnostic services be performed from an
information system that implements a level of security at least as high as that implemented on
the system being serviced; or
(b) Removes the component to be serviced from the information system and prior to non-local
maintenance or diagnostic services, sanitizes the component (with regard to organizational
information) before removal from organizational facilities and after the service is performed,
inspects and sanitizes the component (with regard to potentially malicious software and
surreptitious implants) before reconnecting the component to the information system.
(4) The organization protects non-local maintenance sessions through the use of a strong
authenticator tightly bound to the user and either:
(a) Physically separated communications paths; or
(b) Logically separated communications paths based upon either:
- NSA-approved cryptographic mechanisms used to protect classified, national security
information from individuals who lack the necessary clearance; or
- FIPS-validated cryptographic mechanisms used to protect information from individuals
who lack the necessary access approvals.
(5) The organization requires that:
(a) Maintenance personnel notify the [Assignment: organization-defined personnel] when non-
local maintenance is planned (i.e., date/time); and
(b) A designated organizational official with specific information security/information system
knowledge approves the non-local maintenance.
(6) The organization employs cryptographic mechanisms to protect the integrity and confidentiality of
non-local maintenance and diagnostic communications.
(7) The organization employs remote disconnect verification at the termination of non-local
maintenance and diagnostic sessions.
individuals. Temporary credentials may be for one-time use or for a very limited time period.
Related controls: IA-8, MA-5.
Control Enhancements:
(1) The organization maintains procedures for the use of maintenance personnel that lack appropriate
security clearances or are not U.S. citizens, that include the following requirements:
(a) Maintenance personnel who do not have needed access authorizations, clearances, or formal
access approvals are escorted and supervised during the performance of maintenance and
diagnostic activities on the information system by approved organizational personnel who are
fully cleared, have appropriate access authorizations, and are technically qualified;
(b) Prior to initiating maintenance or diagnostic activities by personnel who do not have needed
access authorizations, clearances or formal access approvals, all volatile information storage
components within the information system are sanitized and all nonvolatile storage media are
removed or physically disconnected from the system and secured; and
(c) In the event an information system component cannot be sanitized, the procedures contained
in the security plan for the system are enforced.
References: None.
Control: The organization obtains maintenance support and/or spare parts for [Assignment:
organization-defined list of security-critical information system components and/or key
information technology components] within [Assignment: organization-defined time period] of
failure.
Supplemental Guidance: The organization specifies those information system components that,
when not operational, result in increased risk to organizations, individuals, or the Nation because
the security functionality intended by that component is not being provided. Security-critical
components include, for example, firewalls, guards, gateways, intrusion detection systems, audit
repositories, authentication servers, and intrusion prevention systems. Related control: CP-2.
Control Enhancements: None.
References: None.
accessed by other than authorized personnel. In these situations, it is assumed that the physical
access controls to the facility where the media resides provide adequate protection.
As part of a defense-in-depth strategy, the organization considers routinely encrypting information
at rest on selected secondary storage devices. The organization implements cryptographic key
management in support of secondary storage encryption and provides protections to maintain the
availability of the information in the event of the loss of cryptographic keys by users. Related
controls: AC-19, CP-6, CP-9, MP-2, PE-3.
Control Enhancements:
(1) The organization employs cryptographic mechanisms to prevent unauthorized disclosure of
information at rest unless otherwise protected by alternative physical protection measures:
(a) The information system implements FIPS-validated cryptography to encrypt sensitive or
Controlled Unclassified Information (CUI) at rest;
(b) The information system implements FIPS-validated cryptography to encrypt collateral,
classified, national security information (i.e., other than Sources and Methods Information
[SAMI]) at rest; and
(c) The organization employs NSA-approved cryptography to protect Sensitive Compartmented
Information (SCI) at rest.
References: FIPS Publication 199; NIST Special Publications 800-56, 800-57, 800-111.
organization has confidence that the physical and procedural protections provided are sufficient to
meet the requirements established for protecting the information and/or information system.
Physical and technical security measures for the protection of digital and non-digital media are
approved by the organization, commensurate with the classification or sensitivity of the
information residing on the media, and consistent with applicable federal laws, Executive Orders,
directives, policies, regulations, standards, and guidance. Locked containers and cryptography are
examples of security measures available to protect digital and non-digital media during transport.
Cryptographic mechanisms can provide confidentiality and/or integrity protections depending
upon the mechanisms used. An organizational assessment of risk guides the selection of media
and associated information contained on that media requiring protection during transport. An
organizational assessment of risk guides the selection and use of storage containers for
transporting non-digital media. Authorized transport and courier personnel may include
individuals from outside the organization (e.g., U.S. Postal Service or a commercial transport or
delivery service). Related controls: AC-19, CP-9.
Control Enhancements:
(1) [Withdrawn: Incorporated into MP-5].
(2) The organization documents activities associated with the transport of information system media.
Enhancement Supplemental Guidance: This control enhancement also applies to mobile devices.
Mobile devices include portable storage media (e.g., USB memory sticks, external hard disk
drives) and portable computing and communications devices with storage capability (e.g.,
notebook/laptop computers, personal digital assistants, cellular telephones). Related control:
MP-4.
References: FIPS Publication 199; NIST Special Publication 800-60.
Control:The organization sanitizes information system media, both digital and non-digital, prior to
disposal, release out of organizational control, or release for reuse.
Supplemental Guidance: This control applies to all media subject to disposal or reuse, whether or not
considered removable. Sanitization is the process used to remove information from information
system media such that there is reasonable assurance that the information cannot be retrieved or
reconstructed. Sanitization techniques, including clearing, purging, and destroying media
information, prevent the disclosure of organizational information to unauthorized individuals
when such media is reused or disposed of. The organization employs sanitization mechanisms
with strength and integrity commensurate with the classification or sensitivity of the information.
The organization uses its discretion on the employment of sanitization techniques and procedures
for media containing information deemed to be in the public domain or publicly releasable, or
deemed to have no adverse impact on the organization or individuals if released for reuse or
disposed.
Control Enhancements:
(1) The organization tracks, documents, and verifies media sanitization and disposal actions.
(2) The organization tests sanitization equipment and procedures to verify correct performance
[Assignment: organization-defined frequency].
(3) The organization sanitizes portable, removable storage devices prior to connecting such devices
to the information system under the following circumstances: [Assignment: organization-defined
list of circumstances requiring sanitization of portable, removable storage devices].
Enhancement Supplemental Guidance: Portable, removable storage devices (e.g., thumb drives,
flash drives, external storage devices) can be the source of malicious code insertions into
organizational information systems. Many of these devices are obtained from unknown
sources and may contain various types of malicious code that can be readily transferred to the
information system through USB ports or other entry portals. While scanning such devices is
always recommended, sanitization provides additional assurance that the device is free of all
malicious code to include code capable of initiating zero-day attacks. Organizations consider
sanitization of portable, removable storage devices, for example, when such devices are first
purchased from the manufacturer or vendor prior to initial use or when the organization loses
a positive chain of custody for the device. An organizational assessment of risk guides the
specific circumstances for employing the sanitization process. Related control: SI-3.
(4) Information system media containing Controlled Unclassified Information (CUI) are sanitized in
accordance with applicable organizational/federal standards and policies.
(5) Information system media containing classified, collateral, national security information are
sanitized in accordance with applicable organizational/federal standards and policies.
(6) Information system media containing Sensitive Compartmented Information (SCI) are sanitized in
accordance with NSA standards and policies.
(7) The organization destroys information system media that cannot be sanitized.
References: FIPS Publication 199; NIST Special Publications 800-60, 800-88; Web:
WWW.NSA.GOV/IA/GOVERNMENT/MDG.CFM.
References: None.
Enhancement Supplemental Guidance: This control enhancement applies to server rooms, media
storage areas, communications centers, or any other areas within an organizational facility
containing large concentrations of information system components. The intent is to provide
additional physical security for those areas where the organization may be more vulnerable
due to the concentration of information system components. Security requirements for
facilities containing organizational information systems that process, store, or transmit
Sensitive Compartmented Information (SCI) are consistent with applicable federal laws,
Executive Orders, directives, policies, regulations, standards, and guidance. See also PS-3,
security requirements for personnel access to SCI.
(2) The organization performs security checks at the physical boundary of the facility or information
system for unauthorized exfiltration of information or information system components.
Control: The organization controls physical access to information system distribution and
transmission lines within organizational facilities.
Supplemental Guidance: Physical protections applied to information system distribution and
transmission lines help prevent accidental damage, disruption, and physical tampering.
Additionally, physical protections are necessary to help prevent eavesdropping or in transit
modification of unencrypted transmissions. Protective measures to control physical access to
information system distribution and transmission lines include: (i) locked wiring closets; (ii)
disconnected or locked spare jacks; and/or (iii) protection of cabling by conduit or cable trays.
Related control: PE-2.
Control Enhancements: None.
References: NSTISSI No. 7003.
Control: The organization controls physical access to information system output devices to prevent
unauthorized individuals from obtaining the output.
Supplemental Guidance: Monitors, printers, and audio devices are examples of information system
output devices.
Control Enhancements: None.
References: None.
References: None.
Control: The organization controls physical access to the information system by authenticating
visitors before authorizing access to the facility where the information system resides other than
areas designated as publicly accessible.
Supplemental Guidance: Individuals (to include organizational employees, contract personnel, and
others) with permanent authorization credentials for the facility are not considered visitors.
Control Enhancements:
(1) The organization escorts visitors and monitors visitor activity, when required.
(2) The organization requires two forms of identification for visitor access to the facility.
References: None.
References: None.
The organization protects power equipment and power cabling for the information system
Control:
from damage and destruction.
Supplemental Guidance: This control, to include any enhancements specified, may be satisfied by
similar requirements fulfilled by another organizational entity other than the information security
program. Organizations should avoid duplicating actions already covered.
Control Enhancements:
(1) The organization employs redundant and parallel power cabling paths.
(2) The organization employs automatic voltage controls for [Assignment: organization-defined list of
critical information system components].
References: None.
References: None.
Enhancement Supplemental Guidance: Long-term alternate power supplies for the information
system are either manually or automatically activated.
References: None.
Control:The organization employs and maintains automatic emergency lighting that activates in
the event of a power outage or disruption and that covers emergency exits and evacuation routes.
Supplemental Guidance: This control, to include any enhancements specified, may be satisfied by
similar requirements fulfilled by another organizational entity other than the information security
program. Organizations should avoid duplicating actions already covered.
Control Enhancements:
(1) The organization provides emergency lighting for all areas within the facility supporting essential
missions and business functions.
References: None.
Control:The organization employs and maintains fire suppression and detection devices/systems
supported by an independent energy source.
Supplemental Guidance: Fire suppression and detection devices/systems include, for example,
sprinkler systems, handheld fire extinguishers, fixed fire hoses, and smoke detectors. This control,
to include any enhancements specified, may be satisfied by similar requirements fulfilled by
another organizational entity other than the information security program. Organizations should
avoid duplicating actions already covered.
Control Enhancements:
(1) The organization employs fire detection devices/systems that activate automatically and notify the
organization and emergency responders in the event of a fire.
(2) The organization employs fire suppression devices/systems that provide automatic notification of
any activation to the organization and emergency responders.
(3) The organization employs an automatic fire suppression capability in facilities that are not staffed
on a continuous basis.
(4) The organization ensures that the facility undergoes [Assignment: organization-defined frequency]
fire marshal inspections and promptly resolves identified deficiencies.
References: None.
References: None.
Control:The organization protects the information system from damage resulting from water
leakage by providing master shutoff valves that are accessible, working properly, and known to
key personnel.
Supplemental Guidance: This control, to include any enhancements specified, may be satisfied by
similar requirements fulfilled by another organizational entity other than the information security
program. Organizations should avoid duplicating actions already covered.
Control Enhancements:
(1) The organization employs mechanisms that, without the need for manual intervention, protect the
information system from water damage in the event of a water leak.
References: None.
Supplemental Guidance: Alternate work sites may, for example, include government facilities or
private residences of employees. The organization may define different sets of security controls
for specific alternate work sites or types of sites.
Control Enhancements: None.
References: NIST Special Publication 800-46.
Control:The organization positions information system components within the facility to minimize
potential damage from physical and environmental hazards and to minimize the opportunity for
unauthorized access.
Supplemental Guidance: Physical and environmental hazards include, for example, flooding, fire,
tornados, earthquakes, hurricanes, acts of terrorism, vandalism, electrical interference, and
electromagnetic radiation. Whenever possible, the organization also considers the location or site
of the facility with regard to physical and environmental hazards. In addition, the organization
considers the location of physical entry points where unauthorized individuals, while not being
granted access, might none-the-less be in close proximity to the information system and therefore,
increase the potential for unauthorized access to organizational communications (e.g., through the
use of wireless sniffers or microphones). This control, to include any enhancements specified,
may be satisfied by similar requirements fulfilled by another organizational entity other than the
information security program. Organizations should avoid duplicating actions already covered.
Control Enhancements:
(1) The organization plans the location or site of the facility where the information system resides with
regard to physical and environmental hazards and for existing facilities, considers the physical and
environmental hazards in its risk mitigation strategy.
References: None.
Control:The organization protects the information system from information leakage due to
electromagnetic signals emanations.
Supplemental Guidance: The security categorization of the information system (with respect to
confidentiality) and organizational security policy guides the application of safeguards and
countermeasures employed to protect the information system against information leakage due to
electromagnetic signals emanations.
Control Enhancements:
(1) The organization ensures that information system components, associated data communications,
and networks are protected in accordance with: (i) national emissions and TEMPEST policies and
procedures; and (ii) the sensitivity of the information being transmitted.
The organization ensures that information and equipment are deployed or stored in
Control:
approved facilities or containers with documented accountability procedures.
Supplemental Guidance: None.
Control Enhancements:
(1) The organization implements procedures that ensure the proper handling and storage of
information.
References: None.
reference) to enable an implementation that is unambiguously compliant with the intent of the plan
and a subsequent determination of risk to organizational operations and assets, individuals, other
organizations, and the Nation if the plan is implemented as intended. Security plans are reviewed
and approved by authorizing officials or authorizing official designated representatives prior to
implementation as part of an organizational risk management strategy. Related controls: PM-1,
PM-7, PM-8, PM-9, PM-11.
Control Enhancements:
(1) The organization:
(a) Develops a security Concept of Operations (CONOPS) for the information system containing,
at a minimum: (i) the purpose of the system; (ii) a description of the system architecture; (iii)
the security authorization schedule; and (iv) the security categorization and associated
factors considered in determining the categorization.
(b) Reviews and updates the CONOPS [Assignment: organization-defined frequency].
Enhancement Supplemental Guidance: The security CONOPS may be included in the security
plan for the information system.
(2) The organization develops a functional architecture for the information system that identifies and
maintains:
(a) All external interfaces, the information being exchanged across the interfaces, and the
protection mechanisms associated with each interface;
(b) User roles and the access privileges assigned to each role;
(c) Unique security requirements;
(d) Categories of sensitive information processed, stored, or transmitted by the information
system and any specific protection needs in accordance with applicable federal laws,
Executive Orders, directives, policies, regulations, standards, and guidance; and
(e) Restoration priority of information or information system services.
Enhancement Supplemental Guidance: Unique security requirements for the information system
include, for example, encryption of key data elements at rest. Specific protection needs for
the information system include, for example, the Privacy Act and Health Insurance Portability
and Accountability Act.
References: NIST Special Publication 800-18.
(1) The organization includes in the rules of behavior, explicit restrictions on the use of social
networking sites, posting information on commercial web sites, and sharing information system
account information.
Control:The organization plans and coordinates security-related activities affecting the information
system before conducting such activities in order to reduce the impact on organizational
operations (i.e., mission, functions, image, and reputation), organizational assets, and individuals.
Supplemental Guidance: Security-related activities include, for example, security assessments,
audits, system hardware and software maintenance, and contingency plan testing/exercises.
Organizational advance planning and coordination includes both emergency and non-emergency
(i.e., planned or nonurgent unplanned) situations.
Control Enhancements: None.
References: None.
Control Enhancements:
(1) The organization ensures that every user accessing an information system processing, storing, or
transmitting classified, national security information is cleared and indoctrinated to the highest
classification level of the information on the system.
(2) The organization ensures that every user accessing an information system processing, storing, or
transmitting Sensitive Compartmented Information (SCI) is cleared to the highest classification
level (i.e., Top Secret) and formally indoctrinated for the SCI compartments of the information on
the system.
References: 5 CFR 731.106; FIPS Publications 199, 201; NIST Special Publications 800-73, 800-
76, 800-78; DCID 6/4.
Control: The organization employs a formal sanctions process for personnel failing to comply with
established information security policies and procedures.
Supplemental Guidance: The sanctions process is consistent with applicable federal laws, Executive
Orders, directives, policies, regulations, standards, and guidance. The process is described in
access agreements and can be included as part of the general personnel policies and procedures for
the organization. Related controls: PL-4, PS-6.
Control Enhancements: None.
References: None.
Supplemental Guidance: The security categorization of the information system guides the frequency
and comprehensiveness of the vulnerability scans. Vulnerability analysis for custom software and
applications may require additional, more specialized techniques and approaches (e.g., web-based
application scanners, source code reviews, source code analyzers). Vulnerability scanning
includes scanning for specific functions, ports, protocols, and services that should not be
accessible to users or devices and for improperly configured or incorrectly operating information
flow mechanisms. The organization considers using tools that express vulnerabilities in the
Common Vulnerabilities and Exposures (CVE) naming convention and use the Open
Vulnerability Assessment Language (OVAL) to test for the presence of vulnerabilities. The
Common Weakness Enumeration (CWE) and the National Vulnerability Database (NVD) are also
excellent sources for vulnerability information. In addition, security control assessments such as
red team exercises are another source of potential vulnerabilities for which to scan. Related
controls: CA-2, CM-6, SI-2.
Control Enhancements:
(1) The organization employs vulnerability scanning tools that include the capability to readily update
the list of information system vulnerabilities scanned.
(2) The organization updates the list of information system vulnerabilities scanned [Assignment:
organization-defined frequency] or when new vulnerabilities are identified and reported.
(3) The organization employs vulnerability scanning procedures that can demonstrate the breadth and
depth of coverage (i.e., information system components scanned and vulnerabilities checked).
(4) The organization attempts to discern what information about the information system is
discoverable by adversaries.
(5) The organization includes privileged access authorization to [Assignment: organization-identified
information system components] for selected vulnerability scanning activities to facilitate more
thorough scanning.
(6) The organization employs automated mechanisms to compare the results of vulnerability scans
over time to determine trends in information system vulnerabilities.
(7) The organization employs automated mechanisms [Assignment: organization-defined frequency]
to detect the presence of unauthorized software on organizational information systems and notify
designated organizational officials.
(8) The organization reviews historic audit logs to determine if a vulnerability identified in the
information system has been previously exploited.
(9) The organization employs an independent penetration agent or penetration team to:
(a) Conduct a vulnerability analysis on the information system; and
(b) Perform penetration testing on the information system based on the vulnerability analysis to
determine the exploitability of identified vulnerabilities.
Enhancement Supplemental Guidance: A standard method for penetration testing includes: (i)
pre-test analysis based on full knowledge of the target information system; (ii) pre-test
identification of potential vulnerabilities based on pre-test analysis; and (iii) testing designed
to determine exploitability of identified vulnerabilities. Detailed rules of engagement are
agreed upon by all parties before the commencement of any penetration testing scenario.
References: NIST Special Publications 800-40, 800-70, 800-115; Web: CWE.MITRE.ORG;
NVD.NIST.GOV.
SA-4 ACQUISITIONS
(5) The organization ensures that each information system component acquired is explicitly assigned
to an information system and that the owner of the system acknowledges this assignment.
(6) The organization limits the acquisition of information assurance (IA) and IA-enabled government
off-the-shelf (GOTS) information technology products to those products that have been evaluated
by the National Security Agency (NSA) or in accordance with NSA-approved processes.
(7) The organization ensures that, at a minimum, basic robustness commercial off-the-shelf (COTS)
information assurance (IA) and IA-enabled information technology products are used to protect
publicly-released information from malicious tampering or destruction and ensure its availability.
References: ISO/IEC 15408; FIPS 140-2; NIST Special Publications 800-23, 800-35, 800-36, 800-
64, 800-70; Web: WWW.NIAP-CCEVS.ORG.
- Methods for user interaction with the information system, which enables individuals to
use the system in a more secure manner; and
- User responsibilities in maintaining the security of the information and information
system; and
c. Documents attempts to obtain information system documentation when such documentation is
either unavailable or non existent.
Supplemental Guidance: The inability of the organization to obtain necessary information system
documentation may occur, for example, due to the age of the system and/or lack of support from
the vendor/contractor. In those situations, organizations may need to recreate selected information
system documentation if such documentation is essential to the effective implementation and/or
operation of security controls.
Control Enhancements:
(1) The organization obtains, protects as required, and makes available to authorized personnel,
vendor/manufacturer documentation that describes the functional properties of the security
controls employed within the information system with sufficient detail to permit analysis and
testing.
(2) The organization obtains, protects as required, and makes available to authorized personnel,
vendor/manufacturer documentation that describes the security-relevant external interfaces to the
information system with sufficient detail to permit analysis and testing.
(3) The organization obtains, protects as required, and makes available to authorized personnel,
vendor/manufacturer documentation that describes the high-level design of the information system
in terms of subsystems and implementation details of the security controls employed within the
system with sufficient detail to permit analysis and testing.
Enhancement Supplemental Guidance: Each subsystem within an information system can contain
one or more modules.
(5) The organization obtains, protects as required, and makes available to authorized personnel, the
source code for the information system to permit analysis and testing.
References: None.
(a) Prohibits the use of binary or machine executable code in the information system from the
public domain sources or from sources with limited or no warranty without accompanying
source code; and
(b) Provides exceptions to the source code requirement only for compelling mission/operational
requirements when no alternative solutions are available and with the express written consent
of the authorizing official.
Enhancement Supplemental Guidance: Public domain software products are typically referred to
as shareware or freeware. Software products without accompanying source code from public
domain sources or sources with limited or no warranty are assessed for potential security
impacts. The assessment addresses the fact that these types of software products are difficult
or impossible to review, repair, or extend, given that the organization does not have access to
the original source code and there is no owner who could make such repairs on behalf of the
organization.
References: None.
Control: The organization enforces explicit rules governing the installation of software by users.
Supplemental Guidance: If provided the necessary privileges, users have the ability to install
software. The organization identifies what types of software installations are permitted (e.g.,
updates and security patches to existing software) and what types of installations are prohibited
(e.g., software whose pedigree with regard to being potentially malicious is unknown or suspect).
Related control: CM-2.
Control Enhancements: None.
References: None.
with applicable federal laws, Executive Orders, directives, policies, regulations, standards,
and guidance;
b. Defines and documents government oversight and user roles and responsibilities with regard
to external information system services; and
c. Monitors security control compliance by external service providers.
Supplemental Guidance: An external information system service is a service that is implemented
outside of the authorization boundary of the organizational information system (i.e., a service that
is used by, but not a part of, the organizational information system). Relationships with external
service providers are established in a variety of ways, for example, through joint ventures,
business partnerships, outsourcing arrangements (i.e., contracts, interagency agreements, lines of
business arrangements), licensing agreements, and/or supply chain exchanges. The responsibility
for adequately mitigating risks arising from the use of external information system services
remains with the authorizing official. Authorizing officials require that an appropriate chain of
trust be established with external service providers when dealing with the many issues associated
with information security. For services external to the organization, a chain of trust requires that
the organization establish and retain a level of confidence that each participating provider in the
potentially complex consumer-provider relationship provides adequate protection for the services
rendered to the organization. The extent and nature of this chain of trust varies based on the
relationship between the organization and the external provider. Where a sufficient level of trust
cannot be established in the external services and/or service providers, the organization employs
compensating security controls or accepts the greater degree of risk. The external information
system services documentation includes government, service provider, and end user security roles
and responsibilities, and any service-level agreements. Service-level agreements define the
expectations of performance for each required security control, describe measurable outcomes,
and identify remedies and response requirements for any identified instance of non-compliance.
Control Enhancements:
(1) The organization:
(a) Conducts an organizational assessment of risk prior to the acquisition or outsourcing of
dedicated information security services; and
(b) Ensures that the acquisition or outsourcing of dedicated information security services is
approved by [Assignment: organization-defined senior organizational official].
(1) The organization requires that information system developers/integrators provide an integrity
check of software to facilitate organizational verification of software integrity after delivery.
(2) The organization provides an alternative configuration management process with organizational
personnel in the absence of dedicated developer/integrator configuration management team.
References: None.
Enhancement Supplemental Guidance: The organization can reduce the likelihood of targeted
supply chain attacks during design, manufacture, and delivery by protecting the identity of the
customer through the use of anonymous acquisition vehicles. An example of such a vehicle is
Enhancement Supplemental Guidance: The organization reviews supplier claims with regard to
the use of appropriate security processes in the development and manufacture of information
system components or products.
(4) The organization uses trusted shipping and warehousing for information systems, information
system components, and information technology products.
Enhancement Supplemental Guidance: By minimizing the time between purchase decisions and
required delivery of information systems, information system components, and information
technology products, the organization limits the opportunity for an adversary to corrupt the
purchased system, component, or product.
(8) The organization employs independent analysis and penetration testing against delivered
information systems, information system components, and information technology products.
References: None.
SA-13 TRUSTWORTHINESS
Control:The organization requires that the information system meets [Assignment: organization-
defined level of trustworthiness].
Supplemental Guidance: The intent of this control is to ensure that organizations recognize the
importance of trustworthiness and making explicit trustworthiness decisions when designing
developing, and implementing organizational information systems. Trustworthiness is a
characteristic or property of an information system that expresses the degree to which the system
can be expected to preserve the confidentiality, integrity, and availability of the information being
processed, stored, or transmitted by the system. Trustworthy information systems are systems that
are capable of being trusted to operate within defined levels of risk despite the environmental
disruptions, human errors, and purposeful attacks that are expected to occur in the specified
environments of operation. Two factors affecting the trustworthiness of an information system
include: (i) security functionality (i.e., the security features or functions employed within the
system); and (ii) security assurance (i.e., the grounds for confidence that the security functionality
is effective in its application).
Appropriate security functionality for the information system can be obtained by using the Risk
Management Framework (Steps 1, 2, and 3) to select and implement the necessary management,
operational, and technical security controls necessary to mitigate risk to organizational operations
and assets, individuals, other organizations, and the Nation. Appropriate security assurance can be
obtained by: (i) the actions taken by developers and implementers of security controls with regard
to the design, development, implementation, and operation of those controls; and (ii) the actions
taken by assessors to determine the extent to which the controls are implemented correctly,
operating as intended, and producing the desired outcome with respect to meeting the security
requirements for the information system.
Developers and implementers can increase the assurance in security controls by employing well-
defined security policy models, structured, disciplined, and rigorous hardware and software
development techniques, and sound system/security engineering principles. Assurance is also
based on the assessment of evidence produced during the initiation, acquisition/development,
implementation, and operations/maintenance phases of the system development life cycle. For
example, developmental evidence may include the techniques and methods used to design and
develop security functionality. Operational evidence may include flaw reporting and remediation,
the results of security incident reporting, and the results of the ongoing monitoring of security
controls. Independent assessments by qualified assessors may include analyses of the evidence as
well as testing, inspections, and audits. Minimum assurance requirements are described in
Appendix E.
Explicit trustworthiness decisions highlight situations where achieving the information system
resilience and security capability necessary to withstand cyber attacks from adversaries with
certain threat capabilities may require adjusting the risk management strategy, the design of
mission/business processes with regard to automation, the selection and implementation rigor of
management and operational protections, or the selection of information technology components
with higher levels of trustworthiness.
Supplemental Guidance: The underlying assumption is that the list of information technology
products defined by the organization cannot be trusted due to threats from the supply chain that the
organization finds unacceptable. The organization re-implements or custom develops such
components to satisfy requirements for high assurance. Related controls: SA-12, SA-13.
Control Enhancements:
(1) The organization:
(a) Identifies information system components for which alternative sourcing is not viable; and
(b) Employs [Assignment: organization-defined measures] to ensure that critical security controls
for the information system components are not compromised.
References: None.
Control:The information system separates user functionality (including user interface services)
from information system management functionality.
Supplemental Guidance: Information system management functionality includes, for example,
functions necessary to administer databases, network components, workstations, or servers, and
typically requires privileged user access. The separation of user functionality from information
system management functionality is either physical or logical and is accomplished by using
different computers, different central processing units, different instances of the operating system,
different network addresses, combinations of these methods, or other methods as appropriate. An
example of this type of separation is observed in web administrative interfaces that use separate
authentication methods for users of any other information system resources. This may include
isolating the administrative interface on a different domain and with additional access controls.
Control Enhancements:
(1) The information system prevents the presentation of information system management-related
functionality at an interface for general (i.e., non-privileged) users.
Enhancement Supplemental Guidance: The intent of this control enhancement is to ensure that
administration options are not available to general users (including prohibiting the use of the
grey-out option commonly used to eliminate accessibility to such information). For example,
administration options are not presented until the user has appropriately established a session
with administrator privileges.
References: None.
Control: The information system isolates security functions from nonsecurity functions.
Supplemental Guidance: The information system isolates security functions from nonsecurity
functions by means of an isolation boundary (implemented via partitions and domains) that
controls access to and protects the integrity of, the hardware, software, and firmware that perform
those security functions. The information system maintains a separate execution domain (e.g.,
address space) for each executing process. Related control: SA-13.
Control Enhancements:
(1) The information system implements underlying hardware separation mechanisms to facilitate
security function isolation.
(2) The information system isolates security functions enforcing access and information flow control
from both nonsecurity functions and from other security functions.
(3) The organization implements an information system isolation boundary to minimize the number of
nonsecurity functions included within the boundary containing security functions.
References: None.
Control:The information system prevents unauthorized and unintended information transfer via
shared system resources.
Supplemental Guidance: The purpose of this control is to prevent information, including encrypted
representations of information, produced by the actions of a prior user/role (or the actions of a
process acting on behalf of a prior user/role) from being available to any current user/role (or
current process) that obtains access to a shared system resource (e.g., registers, main memory,
secondary storage) after that resource has been released back to the information system. Control of
information in shared resources is also referred to as object reuse. This control does not address:
(i) information remanence which refers to residual representation of data that has been in some
way nominally erased or removed; (ii) covert channels where shared resources are manipulated to
achieve a violation of information flow restrictions; or (iii) components in the information system
for which there is only a single user/role.
Control Enhancements:
(1) The information system does not share resources that are used to interface with systems
operating at different security levels.
Control: The information system protects against or limits the effects of the following types of
denial of service attacks: [Assignment: organization-defined list of types of denial of service
attacks or reference to source for current list].
Supplemental Guidance: A variety of technologies exist to limit, or in some cases, eliminate the
effects of denial of service attacks. For example, boundary protection devices can filter certain
types of packets to protect devices on an organization’s internal network from being directly
affected by denial of service attacks. Employing increased capacity and bandwidth combined with
service redundancy may reduce the susceptibility to some denial of service attacks. Related
control SC-7.
Control Enhancements:
(1) The information system restricts the ability of users to launch denial of service attacks against
other information systems or networks.
(2) The information system manages excess capacity, bandwidth, or other redundancy to limit the
effects of information flooding types of denial of service attacks.
(3) The information system fails securely.
Enhancement Supplemental Guidance: External networks are networks outside the control of the
organization. Proxy servers support logging individual Transmission Control Protocol (TCP)
sessions and blocking specific Uniform Resource Locators (URLs), domain names, and
Internet Protocol (IP) addresses. Proxy servers are also configurable with organization-
defined lists of authorized and unauthorized web sites.
(9) The information system, at managed interfaces, denies network traffic and audits internal users (or
malicious code) posing a threat to external information systems.
Enhancement Supplemental Guidance: Detecting internal actions that may pose a security threat
to external information systems is sometimes termed extrusion detection. Extrusion detection
at the information system boundary includes the analysis of network traffic (incoming as well
as outgoing) looking for indications of an internal threat to the security of external systems.
(10) The organization prevents the unauthorized exfiltration of information across managed interfaces.
The network addresses are not available for discovery (e.g., not published or entered in the
domain name system), requiring prior knowledge for access. Another obfuscation technique
is to periodically change network addresses.
(17) The organization employs automated mechanisms to enforce strict adherence to protocol format.
References: NIST Special Publications 800-52, 800-77, 800-81, 800-113; NSTISSI No. 7003.
Enhancement Supplemental Guidance: Alternative physical protection measures include, for example,
protected distribution systems.
(2) The information system maintains the confidentiality of information during aggregation, packaging,
and transformation in preparation for transmission.
References: NIST Special Publications 800-52, 800-77, 800-113; NSTISSI No. 7003.
Control: The information system establishes a trusted communications path between the user and
the following security functions of the system: [Assignment: organization-defined security
functions to include at a minimum, information system authentication and reauthentication].
Supplemental Guidance: A trusted path is employed for high-confidence connections between the
security functions of the information system and the user (e.g., for login).
Control Enhancements: None.
References: None.
The organization establishes and manages cryptographic keys for required cryptography
Control:
employed within the information system.
Supplemental Guidance: Cryptographic key management and establishment can be performed using
manual procedures or automated mechanisms with supporting manual procedures.
Control Enhancements:
(1) The organization maintains availability of information in the event of the loss of cryptographic keys
by users.
(2) The organization produces, controls, and distributes symmetric cryptographic keys using
[Selection: NIST-approved, NSA-approved] key management technology and processes.
(3) The organization produces, controls, and distributes symmetric and asymmetric cryptographic
keys using NSA-approved key management technology and processes.
(4) The organization produces, controls, and distributes asymmetric cryptographic keys using
approved PKI Class 3 certificates or prepositioned keying material.
(5) The organization produces, controls, and distributes asymmetric cryptographic keys using
approved PKI Class 3 or Class 4 certificates and hardware security tokens that protect the user’s
private key.
Control:The information system protects the integrity and availability of publicly available
information and applications.
Supplemental Guidance: The purpose of this control is to ensure that organizations explicitly address
the protection needs for public information and applications with such protection likely being
implemented as part of other security controls.
Control Enhancements: None.
References: None.
(1) The information system provides physical disconnect of collaborative computing devices in a
manner that supports ease of use.
(2) The information system or supporting environment blocks both inbound and outbound traffic
between instant messaging clients that are independently configured by end users and external
service providers.
References: None.
Control: The information system associates security attributes with information exchanged between
information systems.
Supplemental Guidance: Security attributes may be explicitly or implicitly associated with the
information contained within the information system. Related control: AC-16.
Control Enhancements:
(1) The information system validates the integrity of security attributes exchanged between systems.
References: None.
Control:The organization issues public key certificates under an appropriate certificate policy or
obtains public key certificates under an appropriate certificate policy from an approved service
provider.
Supplemental Guidance: For user certificates, each organization attains certificates from an
approved, shared service provider, as required by OMB policy. For federal agencies operating a
legacy public key infrastructure cross-certified with the Federal Bridge Certification Authority at
medium assurance or higher, this Certification Authority will suffice. This control focuses on
certificates with a visibility external to the information system and does not include certificates
related to internal system operations, for example, application-specific time services.
Control Enhancements: None.
References: OMB Memorandum 05-24; NIST Special Publications 800-32, 800-63.
Policy and procedures related to mobile code, address preventing the development, acquisition, or
introduction of unacceptable mobile code within the information system.
Control Enhancements:
(1) The information system implements detection and inspection mechanisms to identify unauthorized
mobile code and takes corrective actions, when necessary.
Enhancement Supplemental Guidance: Actions required before executing mobile code, include,
for example, prompting users prior to opening electronic mail attachments.
References: NIST Special Publication 800-28; DOD Instruction 8552.01
Control:The information system provides additional data origin and integrity artifacts along with
the authoritative data the system returns in response to name/address resolution queries.
Supplemental Guidance: This control enables remote clients to obtain origin authentication and
integrity verification assurances for the host/service name to network address resolution
information obtained through the service. A domain name system (DNS) server is an example of
an information system that provides name/address resolution service. Digital signatures and
cryptographic keys are examples of additional artifacts. DNS resource records are examples of
authoritative data. Information systems that use technologies other than the DNS to map between
host/service names and network addresses provide other means to assure the authenticity and
integrity of response data. The DNS security controls are consistent with, and referenced from,
OMB Memorandum 08-23.
Control Enhancements:
(1) The information system, when operating as part of a distributed, hierarchical namespace, provides
the means to indicate the security status of child subspaces and (if the child supports secure
resolution services) enable verification of a chain of trust among parent and child domains.
Enhancement Supplemental Guidance: An example means to indicate the security status of child
subspaces is through the use of delegation signer (DS) resource records in the DNS.
Control:The information system performs data origin authentication and data integrity verification
on the name/address resolution responses the system receives from authoritative sources when
requested by client systems.
Supplemental Guidance: A recursive resolving or caching domain name system (DNS) server is an
example of an information system that provides name/address resolution service for local clients.
Authoritative DNS servers are examples of authoritative sources. Information systems that use
technologies other than the DNS to map between host/service names and network addresses
provide other means to enable clients to verify the authenticity and integrity of response data.
Control Enhancements:
(1) The information system performs data origin authentication and data integrity verification on all
resolution responses whether or not local clients explicitly request this service.
Enhancement Supplemental Guidance: Local clients include, for example, DNS stub resolvers.
References: NIST Special Publication 800-81.
Control:The information systems that collectively provide name/address resolution service for an
organization are fault tolerant and implement internal/external role separation.
Supplemental Guidance: A domain name system (DNS) server is an example of an information
system that provides name/address resolution service. To eliminate single points of failure and to
enhance redundancy, there are typically at least two authoritative domain name system (DNS)
servers, one configured as primary and the other as secondary. Additionally, the two servers are
commonly located in two different network subnets and geographically separated (i.e., not located
in the same physical facility). With regard to role separation, DNS servers with an internal role,
only process name/address resolution requests from within the organization (i.e., internal clients).
DNS servers with an external role only process name/address resolution information requests from
clients external to the organization (i.e., on the external networks including the Internet). The set
of clients that can access an authoritative DNS server in a particular role is specified by the
organization (e.g., by address ranges, explicit lists).
Control Enhancements: None.
References: NIST Special Publication 800-81.
(2) The information system provides a readily observable logout capability whenever authentication is
used to gain access to web pages.
(3) The information system generates a unique session identifier for each session and recognizes only
session identifiers that are system-generated.
(4) The information system generates unique session identifiers with [Assignment: organization-
defined randomness requirements].
Control: The information system employs processing components that have minimal functionality
and information storage.
Supplemental Guidance: The deployment of information system components with minimal
functionality (e.g., diskless nodes and thin client technologies), reduces the need to secure every
user endpoint, and may reduce the exposure of information, information systems, and services to a
successful attack.
Control Enhancements: None.
References: None.
SC-26 HONEYPOTS
Enhancement Supplemental Guidance: Devices that actively seek out web-based malicious code
by posing as clients are referred to as client honeypots or honey clients.
References: None.
Control: The information system protects the confidentiality and integrity of information at rest.
Supplemental Guidance: This control is intended to address the confidentiality and integrity of
information at rest in non-mobile devices and covers user information and system information.
Information at rest refers to the state of information when it is located on a secondary storage
device (e.g., disk drive, tape drive) within an organizational information system. Configurations
and/or rule sets for firewalls, gateways, intrusion detection/prevention systems, and filtering
routers and authenticator content are examples of system information likely requiring protection.
Organizations may choose to employ different mechanisms to achieve confidentiality and integrity
protections, as appropriate.
Control Enhancements:
(1) The organization employs cryptographic mechanisms to prevent unauthorized disclosure and
modification of information at rest unless otherwise protected by alternative physical measures.
References: None.
SC-29 HETEROGENEITY
work-factor for adversaries in order to carry out successful attacks. Changing the apparent
operating system or application, as opposed to the actual operating system or application,
results in virtual changes that still impede attacker success while helping to reduce the
configuration management effort.
(2) The organization employs randomness in the implementation of the virtualization techniques.
References: None.
Control: The organization requires that information system developers/integrators perform a covert
channel analysis to identify those aspects of system communication that are potential avenues for
covert storage and timing channels.
Supplemental Guidance: Information system developers/integrators are in the best position to
identify potential avenues within the system that might lead to covert channels. Covert channel
analysis is a meaningful activity when there is the potential for unauthorized information flows
across security domains, for example, in the case of information systems containing export
controlled information and having connections to external networks (i.e., networks not controlled
by the organization). Covert channel analysis is also meaningful in the case of multilevel secure
(MLS) systems, multiple security level (MSL) systems, and cross domain systems.
Control Enhancements:
(1) The organization tests a subset of the vendor identified covert channel avenues to determine if
they are exploitable.
References: None.
The information system protects the integrity of information during the processes of data
Control:
aggregation, packaging, and transformation in preparation for transmission.
Supplemental Guidance: Information can be subjected to unauthorized changes (e.g., malicious
and/or unintentional modification) at information aggregation or protocol transformation points.
Control Enhancements: None.
(3) The information system prevents non-privileged users from circumventing malicious code
protection capabilities.
(4) The information system updates malicious code protection mechanisms only when directed by a
privileged user.
(5) The organization does not allow users to introduce removable media into the information system.
(6) The organization tests malicious code protection mechanisms [Assignment: organization-defined
frequency] by introducing a known benign, non-spreading test case into the information system
and subsequently verifying that both detection of the test case and associated incident reporting
occur, as required.
Enhancement Supplemental Guidance: The least-disruptive actions may include initiating request
for human response.
(8) The organization protects information obtained from intrusion monitoring tools from unauthorized
access, modification, and deletion.
(9) The organization tests/exercises intrusion monitoring tools [Assignment: organization-defined
time-period].
Enhancement Supplemental Guidance: Anomalies within the information system include, for
example, large file transfers, long-time persistent connections, unusual protocols and ports in
use, and attempted communications with suspected malicious external addresses.
(12) The organization employs automated mechanisms to alert security personnel of the following
inappropriate or unusual activities with security implications: [Assignment: organization-defined
list of inappropriate or unusual activities that trigger alerts].
(13) The organization:
(a) Analyzes communications traffic/event patterns for the information system;
(b) Develops profiles representing common traffic patterns and/or events; and
(c) Uses the traffic/event profiles in tuning system monitoring devices to reduce the number of
false positives to [Assignment: organization-defined measure of false positives] and the
number of false negatives to [Assignment: organization-defined measure of false negatives].
(14) The organization employs a wireless intrusion detection system to identify rogue wireless devices
and to detect attack attempts and potential compromises/breaches to the information system.
(15) The organization employs an intrusion detection system to monitor wireless communications
traffic as the traffic passes from wireless to wireline networks.
(16) The organization correlates information from monitoring tools employed throughout the
information system to achieve organization-wide situational awareness.
Control: The information system verifies the correct operation of security functions [Selection (one
or more): [Assignment: organization-defined system transitional states]; upon command by user
with appropriate privilege; periodically every [Assignment: organization-defined time-period]]
and [Selection (one or more): notifies system administrator; shuts the system down; restarts the
system] when anomalies are discovered.
Supplemental Guidance: The need to verify security functionality applies to all security functions.
For those security functions that are not able to execute automated self-tests, the organization
either implements compensating security controls or explicitly accepts the risk of not performing
the verification as required. Information system transitional states include, for example, startup,
restart, shutdown, and abort.
Control Enhancements:
(1) The information system provides notification of failed automated security tests.
(2) The information system provides automated support for the management of distributed security
testing.
(3) The organization reports the result of security function verification to designated organizational
officials with information security responsibilities.
Control: The information system detects unauthorized changes to software and information.
Supplemental Guidance: The organization employs integrity verification applications on the
information system to look for evidence of information tampering, errors, and omissions. The
organization employs good software engineering practices with regard to commercial off-the-shelf
integrity mechanisms (e.g., parity checks, cyclical redundancy checks, cryptographic hashes) and
uses tools to automatically monitor the integrity of the information system and the applications it
hosts.
Control Enhancements:
(1) The organization reassesses the integrity of software and information by performing [Assignment:
organization-defined frequency] integrity scans of the information system.
(2) The organization employs automated tools that provide notification to designated individuals upon
discovering discrepancies during integrity verification.
(3) The organization employs centrally managed integrity verification tools.
(4) The organization requires use of tamper evident packaging for [Assignment: organization-defined
information system components] during [Selection: transportation from vendor to operational site;
during operation; both].
References: None.
Control:The organization restricts the capability to input information to the information system to
authorized personnel.
Supplemental Guidance: Restrictions on organizational personnel authorized to input information to
the information system may extend beyond the typical access controls employed by the system
and include limitations based on specific operational/project responsibilities. Related controls:
AC-5, AC-6.
Control Enhancements: None.
References: None.
Control: The organization handles and retains both information within and output from the
information system in accordance with applicable federal laws, Executive Orders, directives,
policies, regulations, standards, and operational requirements.
Supplemental Guidance: The output handling and retention requirements cover the full life cycle of
the information, in some cases, extending beyond the disposal of the information system. The
National Archives and Records Administration provides guidance on records retention. Related
controls: MP-2, MP-4.
Control Enhancements: None.
References: None.
Supplemental Guidance: While mean time to failure is primarily a reliability issue, this control
focuses on the potential failure of specific components of the information system that provide
security capability. Mean time to failure rates are defendable and based on considerations that are
installation-specific, not industry average. The transfer of responsibilities between active and
standby information system components does not compromise safety, operational readiness, or
security (e.g., state variables are preserved). The standby component is available at all times
except where a failure recovery is in progress, or for maintenance reasons. Related control: CP-2.
Control Enhancements:
(1) The organization takes the information system component out of service by transferring
component responsibilities to a substitute component no later than [Assignment: organization-
defined fraction or percentage] of mean time to failure.
(2) The organization does not allow a process to execute without supervision for more than
[Assignment: organization-defined time period].
(3) The organization manually initiates a transfer between active and standby information system
components at least once per [Assignment: organization-defined frequency] if the mean time to
failure exceeds [Assignment: organization-defined time period].
(4) The organization, if an information system component failure is detected:
(a) Ensures that the standby information system component successfully and transparently
assumes its role within [Assignment: organization-defined time period]; and
(b) [Selection (one or more): activates [Assignment: organization-defined alarm]; automatically
shuts down the information system].
APPENDIX G
T
he Federal Information Security Management Act (FISMA) requires organizations to
develop and implement an organization-wide information security program to address
information security for the information and information systems that support the
operations and assets of the organization, including those provided or managed by another
organization, contractor, or other source. The information security program management (PM)
controls described in this appendix complement the security controls in Appendix F and focus on
the organization-wide information security requirements that are independent of any particular
information system and are essential for managing information security programs. Organizations
document program management controls in an organization-wide information security program
plan. The organization-wide security program plan supplements the individual security plans
developed for each organizational information system. Together, the security plans for the
individual information systems and the security plan for the information security program cover
the totality of security controls employed by the organization.
In addition to documenting the information security program management controls, the security
program plan provides a vehicle for the organization, in a central repository, to document all
security controls from Appendix F that have been designated as common controls (i.e., security
controls inherited by organizational information systems) and to document organization-level,
and mission/business process-level security issues and associated security controls. The program
management controls and common controls contained in the information security program plan
should be implemented, assessed for effectiveness, 64 and approved/authorized for use by a senior
organizational official, with the same or similar authority and responsibility for managing risk as
the authorization officials for information systems. 65 Plans of action and milestones are
developed and maintained for the program management and common controls that are deemed
through assessment to be less than effective. Program management and common controls are
also subject to the same continuous monitoring requirements as security controls employed in
individual organizational information systems.
Cautionary Note
Organizations are required to implement security program management controls to provide a foundation
for the organization’s information security program. The successful implementation of security controls
for organizational information systems depends on the successful implementation of the organization’s
program management controls.
64
Assessment procedures for program management controls and common controls can be found in NIST Special
Publication 800-53A.
65
In situations where common controls are inherited from external environments, organizations should consult the
guidance provided in Section 3.4.
Control: The organization appoints a senior information security officer with the mission and
resources to coordinate, develop, implement, and maintain an organization-wide information
security program.
Supplemental Guidance: The security officer described in this control is an organizational official.
For a federal agency (as defined in applicable federal laws, Executive Orders, directives, policies,
or regulations) this official is the Senior Agency Information Security Officer. Organizations may
also refer to this organizational official as the Senior Information Security Officer or Chief
Information Security Officer.
Control Enhancements: None.
References: None.
Control:The organization implements a process for ensuring that plans of action and milestones for
the security program and the associated organizational information systems are maintained and
document the remedial information security actions (from identification of needed action through
assessment of implementation) to mitigate risk to organizational operations and assets, individuals,
other organizations, and the Nation.
Supplemental Guidance: The plan of action and milestones is a key document in the information
security program and is subject to federal reporting requirements established by OMB. The plan
of action and milestones updates are based on the findings from security control assessments,
security impact analyses, and continuous monitoring activities. OMB FISMA reporting guidance
contains instructions regarding organizational plans of action and milestones. Related control:
CA-5.
Control Enhancements: None.
References: None.
Control: The organization develops and maintains an inventory of its information systems.
Supplemental Guidance: This control addresses the inventory requirements in FISMA. OMB
provides guidance on developing information systems inventories and associated reporting
requirements.
Control Enhancements: None.
References: None.
The organization develops, monitors, and reports on the results of information security
Control:
measures of performance.
Supplemental Guidance: Measures of performance are outcome-based metrics used by an
organization to measure the effectiveness or efficiency of the information security program and
the security controls employed in support of the program.
Control Enhancements: None.
References: NIST Special Publication 800-55.
Control: The organization develops an enterprise architecture with consideration for information
security and the resulting risk to organizational operations, organizational assets, individuals, other
organizations, and the Nation.
Supplemental Guidance: The enterprise architecture developed by the organization is aligned with
the Federal Enterprise Architecture. The integration of information security requirements and
associated security controls into the organization’s enterprise architecture helps to ensure that
security considerations are addressed by organizations early in the system development life cycle
and are directly and explicitly related to the organization’s mission/business processes. This also
embeds into the enterprise architecture, an integral security architecture consistent with
organizational risk management and information security strategies. Security requirements and
control integration are most effectively accomplished through the application of the Risk
Management Framework and supporting security standards and guidelines. The Federal Segment
Architecture Methodology provides guidance on integrating information security requirements and
security controls into enterprise architectures. Related controls: PM-11, RA-2.
Control Enhancements: None.
References: NIST Special Publication 800-39; Web: WWW.FSAM.GOV.
APPENDIX H
Table H-1 provides a forward mapping from the security controls in NIST Special Publication
800-53 to the controls in ISO/IEC 27001 (Annex A). The mappings are created by using the
primary security topic identified in each of the Special Publication 800-53 security controls and
associated control enhancements (if any) and searching for a similar security topic in ISO/IEC
27001 (Annex A). Security controls with similar functional meaning are included in the mapping
table. For example, Special Publication 800-53 contingency planning and ISO/IEC 27001
(Annex A) business continuity were deemed to have similar, but not the same, functionality. In
some cases, similar topics are addressed in the security control sets but provide a different
context, perspective, or scope. For example, Special Publication 800-53 addresses information
flow control broadly in terms of approved authorizations for controlling access between source
and destination objects, whereas ISO/IEC 27001 (Annex A) addresses the information flow more
narrowly as it applies to interconnected network domains. Table H-2 provides a reverse mapping
from the security controls in ISO/IEC 27001 (Annex A) to the security controls in Special
Publication 800-53. 67
66
ISO/IEC 27001 was published in October 2005 by the International Organization for Standardization (ISO) and the
International Electrotechnical Commission (IEC).
67
The use of the term XX-1 controls in mapping Table H-2 refers to the set of security controls represented by the first
control in each family in NIST Special Publication 800-53, where XX is a placeholder for the two-letter family
identifier. These security controls primarily focus on policies and procedures for each topic area addressed by the
respective security control family.
Organizations are encouraged to use the mapping tables as a starting point for conducting further
analyses and interpretation of the extent of compliance with ISO/IEC 27001 from compliance
with the NIST security standards and guidelines and visa versa. Organizations that use the
security controls in Special Publication 800-53 as an extension to the security controls in Annex
A in their ISO/IEC 27001 implementations will have a higher probability of complying with
NIST security standards and guidelines than those organizations that use only Annex A.
TABLE H-1: MAPPING NIST SP 800-53 TO ISO/IEC 27001 (ANNEX A)
APPENDIX I
I
ndustrial control systems (ICS) 68 are information systems that differ significantly from
traditional administrative, mission support, and scientific data processing information
systems. ICS typically have many unique characteristics—including a need for real-time
response and extremely high availability, predictability, and reliability. These types of
specialized systems are pervasive throughout the critical infrastructure, often being required to
meet several and often conflicting safety, operational, performance, reliability, and security
requirements such as: (i) minimizing risk to the health and safety of the public; (ii) preventing
serious damage to the environment; (iii) preventing serious production stoppages or slowdowns
that result in negative impact to the Nation’s economy and ability to carry out critical functions;
(iv) protecting the critical infrastructure from cyber attacks and common human error; and (v)
safeguarding against the compromise of proprietary information. 69
Previously, ICS had little resemblance to traditional information systems in that they were
isolated systems running proprietary software and control protocols. However, as these systems
have been increasingly integrated more closely into mainstream organizational information
systems to promote connectivity, efficiency, and remote access capabilities, portions of these ICS
have started to resemble the more traditional information systems. Increasingly, ICS use the
same commercially available hardware and software components as are used in the organization’s
traditional information systems. While the change in ICS architecture supports new information
system capabilities, it also provides significantly less isolation from the outside world for these
systems, introducing many of the same vulnerabilities that exist in current networked information
systems. The result is an even greater need to secure ICS.
FIPS 200, in combination with NIST Special Publication 800-53, requires that federal agencies
(and organizations subordinate to those agencies) implement minimum security controls for their
organizational information systems based on the FIPS 199 security categorization of those
systems. This includes implementing the baseline security controls described in this document in
ICS that are operated by or on behalf of federal agencies. Section 3.3, Tailoring the Initial
Baseline, allows organizations 70 to modify or adjust recommended security control baselines
when certain conditions exist that require that flexibility. NIST recommends that ICS owners
take advantage of the ability to tailor the initial baselines applying the ICS-specific guidance in
this appendix. This appendix also contains additions to the initial security control baselines that
have been determined to be generally required for ICS.
68
An ICS is an information system used to control industrial processes such as manufacturing, product handling,
production, and distribution. Industrial control systems include supervisory control and data acquisition (SCADA)
systems, distributed control systems (DCS), and programmable logic controllers (PLC). ICS are typically found in the
electric, water, oil and gas, chemical, pharmaceutical, pulp and paper, food and beverage, and discrete manufacturing
(automotive, aerospace, and durable goods) industries as well as in air and rail transportation control systems.
69
See Executive Order 13231 on Critical Infrastructure Protection, October 16, 2001.
70
NIST Special Publication 800-53 employs the term organization to refer to the owner or operator of an information
system. In this Appendix, organization may refer to the owner or operator of an ICS.
NIST has worked cooperatively with ICS communities in the public and private sectors to
develop specific guidance on the application of the security controls in this document to ICS.
That guidance, contained in this Appendix, includes ICS-specific:
• Tailoring guidance;
• Supplements to the security control baselines; and
• Supplemental guidance.
Implementation Tip
In situations where the ICS cannot support, or the organization determines it is not advisable to
implement particular security controls or control enhancements in an ICS (e.g., performance, safety,
or reliability are adversely impacted), the organization provides a complete and convincing rationale
for how the selected compensating controls provide an equivalent security capability or level of
protection for the ICS and why the related baseline security controls could not be employed.
In accordance with the Technology-related Considerations of the Scoping Guidance in Section 3.3, if
automated mechanisms are not readily available, cost-effective, or technically feasible in the ICS,
compensating security controls, implemented through nonautomated mechanisms or procedures are
employed.
Compensating controls are not exceptions or waivers to the baseline controls; rather, they are
alternative safeguards and countermeasures employed within the ICS that accomplish the intent of
the original security controls that could not be effectively employed. Organizational decisions on the
use of compensating controls are documented in the security plan for the ICS.
The security controls and control enhancements listed in Table I-1 are likely candidates for
tailoring with the applicability of scoping guidance indicated for each control/enhancement. In
Table I-1, the citation of a control without enhancements (e.g., AC-17) refers only to the base
control without any enhancements, while reference to an enhancement by a parenthetical number
following the control identification (e.g., AC-17(1)) refers only to the specific control
enhancement.
TAILORING OPTIONS
CONTROL
NUMBER CONTROL NAME SCOPING COMPENSATING
GUIDANCE CONTROLS
The following table lists the recommended ICS supplements (highlighted in bold text) to the
security control baselines in Appendix D.
TABLE I-2: ICS SUPPLEMENTS TO SECURITY CONTROL BASELINES
CONTROL BASELINES
CNTL
NO. CONTROL NAME
LOW MOD HIGH
Access Control
AC-3 Access Enforcement AC-3 AC-3 (2) AC-3 (2)
In addition to the security controls added for ICS in the table above, the security control
supplement process described in Section 3.4 is still applicable to ICS. Organizations are required
to conduct a risk assessment taking into account the tailoring and supplementing performed in
arriving at the agreed-upon set of security controls for the ICS and the risk to the organization’s
operations and assets, individuals, other organizations, and the Nation being incurred by
operation of the ICS with the intended controls. The organization decides whether that risk is
acceptable, and if not, supplements the control set with additional controls until an acceptable
level of risk is obtained.
ACCESS CONTROL
ICS Supplemental Guidance: In situations where physical access to the ICS (e.g., workstations,
hardware components, field devices) predefines account privileges or where the ICS (e.g., certain
remote terminal units, meters, relays) cannot support account management, the organization
employs appropriate compensating controls (e.g., providing increased physical security, personnel
security, intrusion detection, auditing measures) in accordance with the general tailoring guidance.
Control Enhancement: (1)
ICS Enhancement Supplemental Guidance: In situations where the ICS (e.g., field devices) cannot
support the use of automated mechanisms for the management of information system accounts, the
organization employs nonautomated mechanisms or procedures as compensating controls in
accordance with the general tailoring guidance.
ICS Supplemental Guidance: The organization ensures that access enforcement mechanisms do not
adversely impact the operational performance of the ICS.
References: NIST Special Publication 800-82.
ICS Supplemental Guidance: In situations where the ICS cannot support the differentiation of roles,
the organization employs appropriate compensating controls (e.g., providing increased personnel
security and auditing) in accordance with the general tailoring guidance. The organization
carefully considers the appropriateness of a single individual performing multiple critical roles.
ICS Supplemental Guidance: In situations where the ICS cannot support differentiation of privileges,
the organization employs appropriate compensating controls (e.g., providing increased personnel
security and auditing) in accordance with the general tailoring guidance. The organization
carefully considers the appropriateness of a single individual having multiple critical privileges.
ICS Supplemental Guidance: In situations where the ICS cannot support account/node locking or
delayed login attempts, or the ICS cannot perform account/node locking or delayed logins due to
significant adverse impact on performance, safety, or reliability, the organization employs
appropriate compensating controls (e.g., logging or recording all unsuccessful login attempts and
alerting ICS security personnel though alarms or other means when the number of organization-
defined consecutive invalid access attempts is exceeded) in accordance with the general tailoring
guidance.
ICS Supplemental Guidance: In situations where the ICS cannot support system use notification, the
organization employs appropriate compensating controls (e.g., posting physical notices in ICS
facilities) in accordance with the general tailoring guidance.
ICS Supplemental Guidance:In situations where the ICS cannot support concurrent session control,
the organization employs appropriate compensating controls (e.g., providing increased auditing
measures) in accordance with the general tailoring guidance.
ICS Supplemental Guidance: The ICS employs session lock to prevent access to specified
workstations/nodes. The ICS activates session lock mechanisms automatically after an
organization-defined time period for designated workstations/nodes on the ICS. In some cases,
session lock for ICS operator workstations/nodes is not advised (e.g., when immediate operator
responses are required in emergency situations). Session lock is not a substitute for logging out of
the ICS. In situations where the ICS cannot support session lock, the organization employs
appropriate compensating controls (e.g., providing increased physical security, personnel security,
and auditing measures) in accordance with the general tailoring guidance.
References: NIST Special Publication 800-82.
ICS Supplemental Guidance: In situations where the ICS cannot implement any or all of the
components of this control, the organization employs other mechanisms or procedures as
compensating controls in accordance with the general tailoring guidance.
Control Enhancement: (1)
ICS Enhancement Supplemental Guidance: In situations where the ICS cannot support the use of
automated mechanisms for monitoring and control of remote access methods, the organization
employs nonautomated mechanisms or procedures as compensating controls (e.g., following
manual authentication [see IA-2 in this appendix], dial-in remote access may be enabled for a
specified period of time or a call may be placed from the ICS site to the authenticated remote
entity) in accordance with the general tailoring guidance.
Control Enhancement: (2)
ICS Enhancement Supplemental Guidance: ICS security objectives typically follow the priority of
availability, integrity and confidentiality, in that order. The use of cryptography is determined
after careful consideration of the security needs and the potential ramifications on system
performance. For example, the organization considers whether latency induced from the use of
cryptography would adversely impact the operational performance of the ICS. The organization
explores all possible cryptographic mechanism (e.g., encryption, digital signature, hash function).
Each mechanism has a different delay impact. In situations where the ICS cannot support the use
of cryptographic mechanisms to protect the confidentiality and integrity of remote sessions, or the
components cannot use cryptographic mechanisms due to significant adverse impact on safety,
performance, or reliability, the organization employs appropriate compensating controls (e.g.,
providing increased auditing for remote sessions or limiting remote access privileges to key
personnel) in accordance with the general tailoring guidance.
References: NIST Special Publication 800-82.
ICS Supplemental Guidance: In situations where the ICS cannot implement any or all of the
components of this control, the organization employs other mechanisms or procedures as
compensating controls in accordance with the general tailoring guidance.
ICS Supplemental Guidance: Generally, public access to ICS information is not permitted.
ICS Supplemental Guidance: Security awareness training includes initial and periodic review of ICS-
specific policies, standard operating procedures, security trends, and vulnerabilities. The ICS
security awareness program is consistent with the requirements of the security awareness and
training policy established by the organization.
ICS Supplemental Guidance: Security training includes initial and periodic review of ICS-specific
policies, standard operating procedures, security trends, and vulnerabilities. The ICS security
training program is consistent with the requirements of the security awareness and training policy
established by the organization.
ICS Supplemental Guidance: Most ICS auditing occurs at the application level.
ICS Supplemental Guidance: In general, audit record processing is not performed on the ICS, but on
a separate information system. In situations where the ICS cannot support auditing, including
response to audit failures, the organization employs compensating controls (e.g., providing an
auditing capability on a separate information system) in accordance with the general tailoring
guidance.
ICS Supplemental Guidance: In general, audit reduction and report generation is not performed on
the ICS, but on a separate information system. In situations where the ICS cannot support
auditing including audit reduction and report generation, the organization employs compensating
controls (e.g., providing an auditing capability on a separate information system) in accordance
with the general tailoring guidance.
ICS Supplemental Guidance: Assessments are performed and documented by qualified assessors
(i.e., experienced in assessing ICS) authorized by the organization. The organization ensures that
assessments do not interfere with ICS functions. The individual/group conducting the assessment
fully understands the organizational information security policies and procedures, the ICS security
policies and procedures, and the specific health, safety, and environmental risks associated with a
particular facility and/or process. A production ICS may need to be taken off-line, or replicated to
the extent feasible, before an assessment can be conducted. If an ICS must be taken off-line to
conduct an assessment, the assessment is scheduled to occur during planned ICS outages
whenever possible. In situations where the organization cannot, for operational reasons, conduct a
live assessment of a production ICS, the organization employs compensating controls (e.g.,
providing a replicated system to conduct the assessment) in accordance with the general tailoring
guidance.
ICS Supplemental Guidance: Assessments are performed and documented by qualified assessors
(i.e., experienced in assessing ICS) authorized by the organization. The organization ensures that
assessments do not interfere with ICS functions. The individual/group conducting the assessment
fully understands the organizational information security policies and procedures, the ICS security
policies and procedures, and the specific health, safety, and environmental risks associated with a
particular facility and/or process. Ongoing assessments of ICS may not be feasible. See CA-2
ICS Supplemental Guidance in this appendix.
CONFIGURATION MANAGEMENT
ICS Supplemental Guidance: The organization considers ICS safety and security interdependencies.
ICS Enhancement Supplemental Guidance: In situations where the ICS cannot support the use of
automated mechanisms to enforce access restrictions and support auditing of enforcement actions,
the organization employs nonautomated mechanisms or procedures as compensating controls in
accordance with the general tailoring guidance.
Control Enhancement: (3)
ICS Enhancement Supplemental Guidance: In situations where the ICS cannot prevent the installation
of software programs that are not signed with an organizationally-recognized and approved
ICS Enhancement Supplemental Guidance: In situations where the ICS cannot support the use of
automated mechanisms to centrally manage, apply, and verify configuration settings, the
organization employs nonautomated mechanisms or procedures as compensating controls in
accordance with the general tailoring guidance.
CONTINGENCY PLANNING
ICS Supplemental Guidance: The organization defines contingency plans for categories of
disruptions or failures. In the event of a loss of processing within the ICS or communication with
operational facilities, the ICS executes predetermined procedures (e.g., alert the operator of the
failure and then do nothing, alert the operator and then safely shut down the industrial process,
alert the operator and then maintain the last operational setting prior to failure). Consideration is
given to restoring system state variables as part of restoration (e.g., valves are restored to their
original settings prior to the disruption).
References: NIST Special Publication 800-82.
ICS Supplemental Guidance: In situations where the organization cannot test or exercise the
contingency plan on production ICS due to significant adverse impact on performance, safety, or
reliability, the organization employs appropriate compensating controls (e.g., using scheduled and
unscheduled system maintenance activities including responding to ICS component and system
failures, as an opportunity to test or exercise the contingency plan) in accordance with the general
tailoring guidance.
Control Enhancement: (4)
ICS Enhancement Supplemental Guidance: Reconstitution of the ICS includes restoration of system
state variables (e.g., valves are restored to their appropriate settings as part of the reconstitution).
ICS Supplemental Guidance: Reconstitution of the ICS includes restoration of system state variables
(e.g., valves are restored to their appropriate settings as part of the reconstitution).
ICS Supplemental Guidance: Where users function as a single group (e.g., control room operators),
user identification and authentication may be role-based, group-based, or device-based. For
certain ICS, the capability for immediate operator interaction is critical. Local emergency actions
for ICS are not hampered by identification or authentication requirements. Access to these
systems may be restricted by appropriate physical security controls. In situations where the ICS
cannot support user identification and authentication, or the organization determines it is not
advisable to perform user identification and authentication due to significant adverse impact on
performance, safety, or reliability, the organization employs appropriate compensating controls
(e.g., providing increased physical security, personnel security, and auditing measures) in
accordance with the general tailoring guidance. For example, manual voice authentication of
remote personnel and local, manual actions may be required in order to establish a remote access.
See AC-17 ICS Supplemental Guidance in this appendix. Local user access to ICS components is
enabled only when necessary, approved, and authenticated.
Control Enhancements: (1) (2) (3)
ICS Enhancement Supplemental Guidance: In situations where the ICS cannot support multifactor
authentication, the organization employs compensating controls in accordance with the general
tailoring guidance (e.g., implementing physical security measures).
ICS Supplemental Guidance: In situations where the ICS cannot support device identification and
authentication (e.g., serial devices), the organization employs compensating controls (e.g.,
implementing physical security measures) in accordance with the general tailoring guidance.
ICS Supplemental Guidance: Where users function as a single group (e.g., control room operators),
user identification may be role-based, group-based, or device-based.
References: NIST Special Publication 800-82.
ICS Supplemental Guidance: The use of cryptography is determined after careful consideration of the
security needs and the potential ramifications on system performance. For example, the
organization considers whether latency induced from the use of cryptography would adversely
impact the operational performance of the ICS.
INCIDENT RESPONSE
ICS Supplemental Guidance:The United States Computer Emergency Readiness Team (US-CERT)
maintains the ICS Security Center at http://www.uscert.gov/control_systems.
References: NIST Special Publication 800-82.
MAINTENANCE
ICS Enhancement Supplemental Guidance: In crisis or emergency situations, the organization may
need immediate access to non-local maintenance and diagnostic services in order to restore
essential ICS operations or services. In situations where the organization may not have access to
non-local maintenance or diagnostic service at the required level of security, the organization
employs appropriate compensating controls (e.g., limiting the extent of the maintenance and
diagnostic services to the minimum essential activities, carefully monitoring and auditing the non-
local maintenance and diagnostic activities) in accordance with the general tailoring guidance.
MEDIA PROTECTION
ICS Enhancement Supplemental Guidance: In situations where the ICS cannot support cryptographic
mechanisms, the organization employs compensating controls in accordance with the general
tailoring guidance (e.g., implementing physical security measures).
ICS Supplemental Guidance: The organization considers ICS safety and security interdependencies.
The organization considers access requirements in emergency situations. During an emergency-
related event, the organization may restrict access to ICS facilities and assets to authorized
individuals only. ICS are often constructed of devices that either do not have or cannot use
comprehensive access control capabilities due to time-restrictive safety constraints. Physical
access controls and defense-in-depth measures are used by the organization when necessary and
possible to supplement ICS security when electronic mechanisms are unable to fulfill the security
requirements of the organization’s security plan.
References: NIST Special Publication 800-82.
PLANNING
RISK ASSESSMENT
ICS Supplemental Guidance: Vulnerability scanning and penetration testing are used with care on
ICS networks to ensure that ICS functions are not adversely impacted by the scanning process.
Production ICS may need to be taken off-line, or replicated to the extent feasible, before scanning
can be conducted. If ICS are taken off-line for scanning, scans are scheduled to occur during
planned ICS outages whenever possible. If vulnerability scanning tools are used on non-ICS
networks, extra care is taken to ensure that they do not scan the ICS network. In situations where
the organization cannot, for operational reasons, conduct vulnerability scanning on a production
ICS, the organization employs compensating controls (e.g., providing a replicated system to
conduct scanning) in accordance with the general tailoring guidance.
References: NIST Special Publication 800-82.
SA-4 ACQUISITIONS
ICS Supplemental Guidance: In situations where the ICS cannot separate user functionality from
information system management functionality, the organization employs compensating controls
(e.g., providing increased auditing measures) in accordance with the general tailoring guidance.
ICS Supplemental Guidance: In situations where the ICS cannot support security function isolation,
the organization employs compensating controls (e.g., providing increased auditing measures,
limiting network connectivity) in accordance with the general tailoring guidance.
ICS Enhancement Supplemental Guidance: Generally, public access to ICS information is not
permitted.
Control Enhancement: (6)
ICS Enhancement Supplemental Guidance: The organization selects an appropriate failure mode (e.g.,
fail closed, fail open).
ICS Enhancement Supplemental Guidance: The use of cryptography is determined after careful
consideration of the security needs and the potential ramifications on system performance. For
example, the organization considers whether latency induced from the use of cryptography would
adversely impact the operational performance of the ICS. The organization explores all possible
cryptographic integrity mechanisms (e.g., digital signature, hash function). Each mechanism has a
different delay impact.
ICS Enhancement Supplemental Guidance: ICS security objectives typically follow the priority of
availability, integrity and confidentiality, in that order. The use of cryptography is determined
after careful consideration of the security needs and the potential ramifications on system
performance. For example, the organization considers whether latency induced from the use of
cryptography would adversely impact the operational performance of the ICS.
ICS Supplemental Guidance: In situations where the ICS cannot terminate a network connection at
the end of a session or after an organization-defined time period of inactivity, or the ICS cannot
terminate a network connection due to significant adverse impact on performance, safety, or
reliability, the organization employs appropriate compensating controls (e.g., providing increased
auditing measures or limiting remote access privileges to key personnel) in accordance with the
general tailoring guidance.
ICS Supplemental Guidance: The use of cryptography, including key management, is determined
after careful consideration of the security needs and the potential ramifications on system
performance. For example, the organization considers whether latency induced from the use of
cryptography would adversely impact the operational performance of the ICS. The use of
cryptographic key management in ICS is intended to support internal nonpublic use.
ICS Supplemental Guidance: The use of cryptography is determined after careful consideration of the
security needs and the potential ramifications on system performance. For example, the
organization considers whether latency induced from the use of cryptography would adversely
impact the operational performance of the ICS.
ICS Supplemental Guidance: Generally, collaborative computing mechanisms are not permitted on
ICS.
ICS Supplemental Guidance: The use of VoIP technologies is determined after careful consideration
and after verification that it does not adversely impact the operational performance of the ICS.
ICS Supplemental Guidance: The use of secure name/address resolution services is determined after
careful consideration and after verification that it does not adversely impact the operational
performance of the ICS.
ICS Supplemental Guidance: The use of secure name/address resolution services is determined after
careful consideration and after verification that it does not adversely impact the operational
performance of the ICS.
ICS Supplemental Guidance: The use of secure name/address resolution services is determined after
careful consideration and after verification that it does not adversely impact the operational
performance of the ICS.
ICS Supplemental Guidance:In situations where the ICS cannot protect the authenticity of
communications sessions, the organization employs compensating controls (e.g., auditing
measures) in accordance with the general tailoring guidance.
ICS Supplemental Guidance: The use of malicious code protection is determined after careful
consideration and after verification that it does not adversely impact the operational performance
of the ICS.
Control Enhancement: (1)
ICS Enhancement Supplemental Guidance:In situations where the organization cannot centrally
manage malicious code protection mechanisms, the organization employs appropriate
compensating controls in accordance with the general tailoring guidance.
Control Enhancement: (2)
ICS Supplemental Guidance:The organization ensures that the use of monitoring tools and
techniques does not adversely impact the operational performance of the ICS.
Control Enhancement: (2)
ICS Enhancement Supplemental Guidance: In situations where the ICS cannot support the use of
automated tools to support near-real-time analysis of events, the organization employs
nonautomated mechanisms or procedures as compensating controls in accordance with the general
tailoring guidance.
Control Enhancement: (6)
ICS Enhancement Supplemental Guidance: In situations where the ICS cannot prevent non-privileged
users from circumventing intrusion detection and prevention capabilities, the organization
employs appropriate compensating controls (e.g., enhanced auditing) in accordance with the
general tailoring guidance.
ICS Supplemental Guidance: Generally, it is not recommended to shut down and restart the ICS upon
the identification of an anomaly.
ICS Supplemental Guidance: The organization ensures that the use of integrity verification
applications does not adversely impact the operational performance of the ICS.
Control Enhancements: (1)
ICS Enhancement Supplemental Guidance: The organization ensures that the use of integrity
verification applications does not adversely impact the operational performance of the ICS.
Control Enhancement: (2)
ICS Enhancement Supplemental Guidance: In situations where the organization cannot employ
automated tools that provide notification of integrity discrepancies, the organization employs
nonautomated mechanisms or procedures as compensating controls in accordance with the general
tailoring guidance.
ICS Supplemental Guidance: The organization removes unused and unnecessary functions and
services (e.g., electronic mail, Internet access). Due to differing operational characteristics
between ICS and general purpose information systems, ICS do not generally employ spam
protection mechanisms. Unusual traffic flow (e.g., during crisis situations), may be misinterpreted
and detected as spam, which can cause issues with the ICS and possible system failure.
Control Enhancement: (1)