Awareness and Training (AT)
Program-specific policies and procedures shall be included in the specific security controls listed below. There is no requirement for the Program to develop additional policy to meet the -1 control.
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AT-2 – Security Awareness
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AT-2(2) – Security Awareness: Insider Threat
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AT-3 – Role-Based Security Training
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AT-3(2) – Security Training: Physical Security Controls
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AT-3(4) – Security Training: Suspicious Communications and Anomalous System Behavior
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AT-4 – Security Training Records
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
Retains individual training records for a minimum of five (5) years.
Click here to enter text.
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
Audit and Accountability (AU) AU-1 – Audit and Accountability Policy and Procedures
Program-specific policies and procedures shall be included in the specific security controls listed below. There is no requirement for the Program to develop additional policy to meet the -1 control.
Recommended Continuous Monitoring Frequency: Annually
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AU-2 – Auditable Events
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
Coordinates the security audit function with other organizational entities requiring audit-related information to enhance mutual support and to help guide the selection of auditable events
Click here to enter text.
Provides a rationale for why the auditable events are deemed to be adequate to support after-the-fact investigations of security incidents
Click here to enter text.
d. Determines that the information system is capable of auditing the following events at minimum: Authentication events:
Logons (Success/Failure)
Logoffs (Success)
Security Relevant File and Objects events:
Create (Success/Failure)
Access (Success/Failure)
Delete (Success/Failure)
Modify (Success/Failure)
Permission Modification (Success/Failure)
Ownership Modification (Success/Failure)
Export/Writes/downloads to devices/digital media (e.g., CD/DVD, USB, SD) (Success/Failure)
Import/Uploads from devices/digital media (e.g., CD/DVD, USB, SD) (Success/Failure)
User and Group Management events:
User add, delete, modify, disable, lock (Success/Failure)
Group/Role add, delete, modify (Success/Failure)
Use of Privileged/Special Rights events:
Security or audit policy changes (Success/Failure)
Configuration changes (Success/Failure)
Admin or root-level access (Success/Failure)
Privilege/Role escalation (Success/Failure)
Audit and security relevant log data accesses (Success/Failure)
System reboot, restart and shutdown (Success/Failure)
Print to a device (Success/Failure)
Click here to enter text.
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AU-2(3) – Auditable Events: Reviews and Updates
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AU-3 – Content of Audit Records
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AU-3(1) – Content of Audit Records: Additional Audit Information
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AU-4 – Audit Storage Capacity
After a relevance determination, this control can be tailored out for standalone IS with a single user.
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AU-4(1) – Audit Storage: Transfer to Alternate Storage
After a relevance determination, this control can be tailored out for standalone IS.
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AU-5 – Response to Audit Processing Failures
After a relevance determination, this control can be tailored out for standalone IS with a single user. Audit processing failures must be recorded in the audit log (second requirement below).
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
Takes the following additional actions: at a minimum, record any audit processing failure in the audit log.
Click here to enter text.
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AU-5(1) – Response to Audit Processing Failures: Audit Storage Capacity
After a relevance determination, this control can be tailored out for standalone IS with single users.
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AU-6 – Audit Review, Analysis and Reporting
Recommended Continuous Monitoring Frequency: Weekly
Program Frequency:
Reports findings to ISO, ISSM and FSO.
Click here to enter text.
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AU-6(1) – Audit Review, Analysis and Reporting: Process Integration
After a relevance determination, this control can be tailored out for standalone IS.
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AU-6(3) – Audit Review, Analysis, and Reporting: Correlate Audit Repositories - Standalone Overlay
After a relevance determination, this control can be tailored out for standalone IS.
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AU-6(4) – Audit Review, Analysis and Reporting: Central Review and Analysis
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AU-6(5) – Audit Review, Analysis, and Reporting: Scanning and Monitoring Capabilities
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AU-6(8) – Audit Review, Analysis and Reporting: Full Text Analysis of Privileged Commands
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AU-6(9) – Audit Review, Analysis and Reporting: Correlation with Information from Non-Technical Sources
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AU-6(10) – Audit Review, Analysis and Reporting: Audit Level Adjustment
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AU-7 – Audit Reduction and Report Generation
After a relevance determination, this control can be tailored out for standalone IS.
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
Does not alter the original content or time ordering of audit records
Click here to enter text.
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AU-7(1) – Audit Reduction and Report Generation: Automatic Processing
After a relevance determination, this control can be tailored out for standalone IS.
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AU-8 – Time Stamps
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
Records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT). Time stamps shall include date and time.
Click here to enter text.
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AU-8(1) – Time Stamps: Synchronization with an Authoritative Time Source
After a relevance determination, this control can be tailored out for standalone IS.
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AU-9 – Protection of Audit Information
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AU-9(4) – Protection of Audit Information: Access by Subset of Privileged Users
After a relevance determination, this control can be tailored out for standalone IS with a single user.
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
Recommended Continuous Monitoring Frequency: Annual
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AU-11(1) – Audit Record Retention: Long-Term Retrieval Capability
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AU-12 – Audit Generation
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
Allows designated personnel to select which auditable events are to be audited by specific components of the information system.
Click here to enter text.
Generates audit records for the events with the content defined in AU-2 with content defined in AU-3.
Click here to enter text.
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AU-12(1) Audit Generation: System-Wide/Time Correlated Audit Trail
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AU-12(3) – Audit Generation: Changes by Authorized Individuals
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
AU-16(2) – Cross-Organizational Auditing: Sharing of Audit Information
Recommended Continuous Monitoring Frequency: Quarterly
Program Frequency:
CONTINUOUS MONITORING STRATEGY
Click here to enter text.
Share with your friends: |