Receives information system security alerts, advisories, and directives from [Assignment: organization-defined external organizations] on an ongoing basis;
Disseminates security alerts, advisories, and directives to: [Selection (one or more): [Assignment: organization-defined personnel or roles]; [Assignment: organization-defined elements within the organization]; [Assignment: organization-defined external organizations]]; and
Implements security directives in accordance with established time frames, or notifies the issuing organization of the degree of noncompliance.
Supplemental Guidance: The United States Computer Emergency Readiness Team (US-CERT) generates security alerts and advisories to maintain situational awareness across the federal government. Security directives are issued by OMB or other designated organizations with the responsibility and authority to issue such directives. Compliance to security directives is essential due to the critical nature of many of these directives and the potential immediate adverse effects on organizational operations and assets, individuals, other organizations, and the Nation should the directives not be implemented in a timely manner. External organizations include, for example, external mission/business partners, supply chain partners, external service providers, and other peer/supporting organizations. Related control: SI-2.
Control Enhancements:
security alerts, advisories, and directives | automated alerts and advisories
The organization employs automated mechanisms to make security alert and advisory information available throughout the organization.
Supplemental Guidance: The significant number of changes to organizational information systems and the environments in which those systems operate requires the dissemination of security-related information to a variety of organizational entities that have a direct interest in the success of organizational missions and business functions. Based on the information provided by the security alerts and advisories, changes may be required at one or more of the three tiers related to the management of information security risk including the governance level, mission/business process/enterprise architecture level, and the information system level.
References: NIST Special Publication 800-40.
Priority and Baseline Allocation:
P1
LOW SI-5
MOD SI-5
HIGH SI-5 (1)
SI-6 SECURITY FUNCTION VERIFICATION
Control: The information system:
Verifies the correct operation of [Assignment: organization-defined security functions];
Performs this verification [Selection (one or more): [Assignment: organization-defined system transitional states]; upon command by user with appropriate privilege; [Assignment: organization-defined frequency]];
Notifies [Assignment: organization-defined personnel or roles] of failed security verification tests; and
[Selection (one or more): shuts the information system down; restarts the information system; [Assignment: organization-defined alternative action(s)]] when anomalies are discovered.
Supplemental Guidance: Transitional states for information systems include, for example, system startup, restart, shutdown, and abort. Notifications provided by information systems include, for example, electronic alerts to system administrators, messages to local computer consoles, and/or hardware indications such as lights. Related controls: CA-7, CM-6.
Control Enhancements:
security function verification | notification of failed security tests
[Withdrawn: Incorporated into SI-6].
security function verification | automation support for distributed testing
The information system implements automated mechanisms to support the management of distributed security testing.
Supplemental Guidance: Related control: SI-2.
security function verification | report verification results
The organization reports the results of security function verification to [Assignment: organization-defined personnel or roles].
Supplemental Guidance: Organizational personnel with potential interest in security function verification results include, for example, senior information security officers, information system security managers, and information systems security officers. Related controls: SA-12, SI-4, SI-5.