Joint task force transformation initiative



Download 5.8 Mb.
Page125/186
Date31.01.2017
Size5.8 Mb.
#13082
1   ...   121   122   123   124   125   126   127   128   ...   186

P1

LOW SA-4 (10)

MOD SA-4 (1) (2) (9) (10)

HIGH SA-4 (1) (2) (9) (10)



SA-5 INFORMATION SYSTEM DOCUMENTATION


Control: The organization:

  1. Obtains administrator documentation for the information system, system component, or information system service that describes:

  1. Secure configuration, installation, and operation of the system, component, or service;

  2. Effective use and maintenance of security functions/mechanisms; and

  3. Known vulnerabilities regarding configuration and use of administrative (i.e., privileged) functions;

  1. Obtains user documentation for the information system, system component, or information system service that describes:

  1. User-accessible security functions/mechanisms and how to effectively use those security functions/mechanisms;

  2. Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and

  3. User responsibilities in maintaining the security of the system, component, or service;

  1. Documents attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent and takes [Assignment: organization-defined actions] in response;

  2. Protects documentation as required, in accordance with the risk management strategy; and

  3. Distributes documentation to [Assignment: organization-defined personnel or roles].

Supplemental Guidance: This control helps organizational personnel understand the implementation and operation of security controls associated with information systems, system components, and information system services. Organizations consider establishing specific measures to determine the quality/completeness of the content provided. The inability to obtain needed documentation may occur, for example, due to the age of the information system/component or lack of support from developers and contractors. In those situations, organizations may need to recreate selected documentation if such documentation is essential to the effective implementation or operation of security controls. The level of protection provided for selected information system, component, or service documentation is commensurate with the security category or classification of the system. For example, documentation associated with a key DoD weapons system or command and control system would typically require a higher level of protection than a routine administrative system. Documentation that addresses information system vulnerabilities may also require an increased level of protection. Secure operation of the information system, includes, for example, initially starting the system and resuming secure system operation after any lapse in system operation. Related controls: CM-6, CM-8, PL-2, PL-4, PS-2, SA-3, SA-4.

Control Enhancements:

  1. information system documentation | functional properties of security controls

[Withdrawn: Incorporated into SA-4 (1)].

  1. information system documentation | security-relevant external system interfaces

[Withdrawn: Incorporated into SA-4 (2)].

  1. information system documentation | high-level design

[Withdrawn: Incorporated into SA-4 (2)].

  1. information system documentation | low-level design

[Withdrawn: Incorporated into SA-4 (2)].

  1. information system documentation | source code

[Withdrawn: Incorporated into SA-4 (2)].

References: None.

Priority and Baseline Allocation:


P2

LOW SA-5

MOD SA-5

HIGH SA-5



SA-6 SOFTWARE USAGE RESTRICTIONS


[Withdrawn: Incorporated into CM-10 and SI-7].

SA-7 USER-INSTALLED SOFTWARE


[Withdrawn: Incorporated into CM-11 and SI-7].

SA-8 SECURITY ENGINEERING PRINCIPLES


Control: The organization applies information system security engineering principles in the specification, design, development, implementation, and modification of the information system.

Supplemental Guidance: Organizations apply security engineering principles primarily to new development information systems or systems undergoing major upgrades. For legacy systems, organizations apply security engineering principles to system upgrades and modifications to the extent feasible, given the current state of hardware, software, and firmware within those systems. Security engineering principles include, for example: (i) developing layered protections; (ii) establishing sound security policy, architecture, and controls as the foundation for design; (iii) incorporating security requirements into the system development life cycle; (iv) delineating physical and logical security boundaries; (v) ensuring that system developers are trained on how to build secure software; (vi) tailoring security controls to meet organizational and operational needs; (vii) performing threat modeling to identify use cases, threat agents, attack vectors, and attack patterns as well as compensating controls and design patterns needed to mitigate risk; and (viii) reducing risk to acceptable levels, thus enabling informed risk management decisions. Related controls: PM-7, SA-3, SA-4, SA-17, SC-2, SC-3.

Control Enhancements: None.

References: NIST Special Publication 800-27.



Priority and Baseline Allocation:

Directory: publications
publications -> Acm word Template for sig site
publications ->  Preparation of Papers for ieee transactions on medical imaging
publications -> Adjih, C., Georgiadis, L., Jacquet, P., & Szpankowski, W. (2006). Multicast tree structure and the power law
publications -> Swiss Federal Institute of Technology (eth) Zurich Computer Engineering and Networks Laboratory
publications -> Quantitative skills
publications -> Multi-core cpu and gpu implementation of Discrete Periodic Radon Transform and Its Inverse
publications -> List of Publications Department of Mechanical Engineering ucek, jntu kakinada
publications -> 1. 2 Authority 1 3 Planning Area 1
publications -> Sa michelson, 2011: Impact of Sea-Spray on the Atmospheric Surface Layer. Bound. Layer Meteor., 140 ( 3 ), 361-381, doi: 10. 1007/s10546-011-9617-1, issn: Jun-14, ids: 807TW, sep 2011 Bao, jw, cw fairall, sa michelson

Download 5.8 Mb.

Share with your friends:
1   ...   121   122   123   124   125   126   127   128   ...   186




The database is protected by copyright ©ininet.org 2024
send message

    Main page