Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

NIST SP 800-53A

.pdf
Скачиваний:
16
Добавлен:
15.03.2015
Размер:
1.86 Mб
Скачать

Special Publication 800-53A

Guide for Assessing the Security Controls in

 

Federal Information Systems and Organizations

________________________________________________________________________________________________

FAMILY: ACCESS CONTROL

CLASS: TECHNICAL

 

 

 

 

ASSESSMENT PROCEDURE

 

 

 

 

AC-13

SUPERVISION AND REVIEW — ACCESS CONTROL

 

 

[Withdrawn: Incorporated into AC-2 and AU-6].

 

 

 

 

AC-13.1

ASSESSMENT OBJECTIVE:

 

 

[Withdrawn: Incorporated into AC-2 and AU-6].

 

 

POTENTIAL ASSESSMENT METHODS AND OBJECTS:

 

 

[Withdrawn: Incorporated into AC-2 and AU-6].

 

 

 

 

APPENDIX F-AC

PAGE F-31

Special Publication 800-53A

Guide for Assessing the Security Controls in

 

Federal Information Systems and Organizations

________________________________________________________________________________________________

FAMILY: ACCESS CONTROL

CLASS: TECHNICAL

 

 

 

 

 

 

ASSESSMENT PROCEDURE

 

 

 

AC-14

PERMITTED ACTIONS WITHOUT IDENTIFICATION OR AUTHENTICATION

 

 

 

AC-14.1

ASSESSMENT OBJECTIVE:

 

 

Determine if:

 

 

(i)

the organization identifies specific user actions that can be performed on the

 

 

information system without identification or authentication; and

 

(ii)

the organization documents and provides supporting rationale in the security plan

 

 

for the information system, user actions not requiring identification and

 

 

authentication.

 

POTENTIAL ASSESSMENT METHODS AND OBJECTS:

Examine: [SELECT FROM: Access control policy; procedures addressing permitted actions without identification and authentication; information system configuration settings and associated documentation; security plan; list of information system actions that can be performed without identification and authentication; information system audit records; other relevant documents or records].

AC-14(1) PERMITTED ACTIONS WITHOUT IDENTIFICATION OR AUTHENTICATION

AC-14(1).1 ASSESSMENT OBJECTIVE:

Determine if the organization permits actions to be performed without identification and authentication only to the extent necessary to accomplish mission/business objectives.

POTENTIAL ASSESSMENT METHODS AND OBJECTS:

Examine: [SELECT FROM: Access control policy; procedures addressing permitted actions without identification and authentication; information system configuration settings and associated documentation; security plan; list of information system actions that can be performed without identification and authentication; information system audit records; other relevant documents or records].

APPENDIX F-AC

PAGE F-32

Special Publication 800-53A

Guide for Assessing the Security Controls in

 

Federal Information Systems and Organizations

________________________________________________________________________________________________

FAMILY: ACCESS CONTROL

CLASS: TECHNICAL

 

 

 

 

ASSESSMENT PROCEDURE

 

 

 

 

AC-15

AUTOMATED MARKING

 

 

[Withdrawn: Incorporated into MP-3].

 

 

 

 

AC-15.1

ASSESSMENT OBJECTIVE:

 

 

[Withdrawn: Incorporated into MP-3].

 

 

POTENTIAL ASSESSMENT METHODS AND OBJECTS:

 

 

[Withdrawn: Incorporated into MP-3].

 

 

 

 

APPENDIX F-AC

PAGE F-33

Special Publication 800-53A

Guide for Assessing the Security Controls in

 

Federal Information Systems and Organizations

________________________________________________________________________________________________

FAMILY: ACCESS CONTROL

CLASS: TECHNICAL

 

 

 

 

 

 

ASSESSMENT PROCEDURE

 

 

 

 

AC-16

SECURITY ATTRIBUTES

 

 

 

 

AC-16.1

ASSESSMENT OBJECTIVE:

 

 

Determine if:

 

 

(i) the organization defines the security attributes the information system binds to

 

information:

 

 

-

in storage;

 

 

-

in process; and

 

 

-

in transmission; and

 

 

(ii) the information system supports and maintains the binding of the organization-

 

defined security attributes to information in storage, in process, and in transmission.

POTENTIAL ASSESSMENT METHODS AND OBJECTS:

Examine: [SELECT FROM: Access control policy; procedures addressing the binding of security attributes to information in storage, in process, and in transmission; information system design documentation; information system configuration settings and associated documentation; other relevant documents or records].

Test: [SELECT FROM: Automated mechanisms supporting and maintaining the binding of security attributes to information in storage, in process, and in transmission].

AC-16(1) SECURITY ATTRIBUTES

AC-16(1).1 ASSESSMENT OBJECTIVE:

Determine if the information system dynamically reconfigures security attributes in accordance with an identified security policy as information is created and combined.

POTENTIAL ASSESSMENT METHODS AND OBJECTS:

Examine: [SELECT FROM: Access control policy; procedures addressing the dynamic reconfiguration of security attributes; information system design documentation; information system configuration settings and associated documentation; other relevant documents or records].

Test: [SELECT FROM: Automated mechanisms implementing the dynamic reconfiguration of security attributes to information].

APPENDIX F-AC

PAGE F-34

Special Publication 800-53A

Guide for Assessing the Security Controls in

 

Federal Information Systems and Organizations

________________________________________________________________________________________________

AC-16(2) SECURITY ATTRIBUTES

AC-16(2).1 ASSESSMENT OBJECTIVE:

Determine if:

(i)the organization identifies the entities authorized to change security attributes; and

(ii)the information system allows authorized entities to change security attributes.

POTENTIAL ASSESSMENT METHODS AND OBJECTS:

Examine: [SELECT FROM: Access control policy; procedures addressing the change of security attributes; information system design documentation; information system configuration settings and associated documentation; list of entities authorized to change security attributes; information system audit records; other relevant documents or records].

Interview: [SELECT FROM: Organizational personnel with responsibilities for changing security attributes].

Test: [SELECT FROM: Automated mechanisms allowing the change of security attributes].

AC-16(3) SECURITY ATTRIBUTES

AC-16(3).1 ASSESSMENT OBJECTIVE:

Determine if the information system maintains the binding of security attributes to information with sufficient assurance that the information-attribute association can be used as the basis for automated policy actions.

POTENTIAL ASSESSMENT METHODS AND OBJECTS:

Examine: [SELECT FROM: Access control policy; procedures addressing the binding of security attributes to information; information system design documentation; information system configuration settings and associated documentation; other relevant documents or records].

Test: [SELECT FROM: Automated mechanisms maintaining the binding of security attributes to information].

AC-16(4) SECURITY ATTRIBUTES

AC-16(4).1 ASSESSMENT OBJECTIVE:

Determine if:

(i)the organization identifies users authorized to associate security attributes with information; and

(ii)the information system allows authorized users to associate security attributes with information.

POTENTIAL ASSESSMENT METHODS AND OBJECTS:

Examine: [SELECT FROM: Access control policy; procedures addressing the association of security attributes to information; information system design documentation; information system configuration settings and associated documentation; list of users authorized to associate security attributes with information; information system audit records; other relevant documents or records].

Interview: [SELECT FROM: Organizational personnel with responsibilities for associating security attributes with information].

Test: [SELECT FROM: Automated mechanisms allowing users to associate security attributes with information].

APPENDIX F-AC

PAGE F-35

Special Publication 800-53A

Guide for Assessing the Security Controls in

 

Federal Information Systems and Organizations

________________________________________________________________________________________________

AC-16(5) SECURITY ATTRIBUTES

AC-16(5).1 ASSESSMENT OBJECTIVE:

Determine if:

(i)the organization defines the set of special dissemination, handling, or distribution instructions to be used for each object output from the information system;

(ii)the organization defines standard naming conventions for the security attributes to be displayed in human-readable form on each object output from the system to system output devices; and

(iii)the information system displays security attributes in human-readable form on each object output from the system to system output devices to identify the organizationdefined set of special dissemination, handling, or distribution instructions using organization-defined human readable, standard naming conventions.

POTENTIAL ASSESSMENT METHODS AND OBJECTS:

Examine: [SELECT FROM: Access control policy; procedures addressing display of security attributes in human-readable form; special instructions for the dissemination, handling, or distribution of object output from the information system; information system design documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records].

Test: [SELECT FROM: System output devices displaying security attributes in human-readable form on each object].

APPENDIX F-AC

PAGE F-36

Special Publication 800-53A

Guide for Assessing the Security Controls in

 

Federal Information Systems and Organizations

________________________________________________________________________________________________

FAMILY: ACCESS CONTROL

CLASS: TECHNICAL

 

 

 

 

 

 

ASSESSMENT PROCEDURE

 

 

 

 

AC-17

REMOTE ACCESS

 

 

 

 

AC-17.1

ASSESSMENT OBJECTIVE:

 

 

Determine if:

 

 

(i)

the organization documents allowed methods of remote access to the information

 

 

system;

 

 

(ii) the organization establishes usage restrictions and implementation guidance for

 

 

each allowed remote access method;

 

 

(iii)

the organization monitors for unauthorized remote access to the information system;

 

(iv)

the organization authorizes remote access to the information system prior to

 

 

connection; and

 

 

(v)

the organization enforces requirements for remote connections to the information

 

 

system.

 

POTENTIAL ASSESSMENT METHODS AND OBJECTS:

Examine: [SELECT FROM: Access control policy; procedures addressing remote access to the information system; information system configuration settings and associated documentation; information system audit records; other relevant documents or records].

Interview: [SELECT FROM: Organizational personnel with remote access authorization, monitoring, and control responsibilities].

Test: [SELECT FROM: Remote access methods for the information system].

AC-17(1) REMOTE ACCESS

AC-17(1).1 ASSESSMENT OBJECTIVE:

Determine if the organization employs automated mechanisms to facilitate the monitoring and control of remote access methods.

POTENTIAL ASSESSMENT METHODS AND OBJECTS:

Examine: [SELECT FROM: Access control policy; procedures addressing remote access to the information system; information system configuration settings and associated documentation; other relevant documents or records].

Test: [SELECT FROM: Automated mechanisms implementing the access control policy for remote access].

APPENDIX F-AC

PAGE F-37

Special Publication 800-53A

Guide for Assessing the Security Controls in

 

Federal Information Systems and Organizations

________________________________________________________________________________________________

AC-17(2) REMOTE ACCESS

AC-17(2).1 ASSESSMENT OBJECTIVE:

Determine if the organization uses cryptography to protect the confidentiality and integrity of remote access sessions.

POTENTIAL ASSESSMENT METHODS AND OBJECTS:

Examine: [SELECT FROM: Access control policy; procedures addressing remote access to the information system; information system design documentation; information system configuration settings and associated documentation; other relevant documents or records].

Test: [SELECT FROM: Automated mechanisms implementing cryptographic protections for remote access].

AC-17(3) REMOTE ACCESS

AC-17(3).1 ASSESSMENT OBJECTIVE:

Determine if:

(i)the organization defines a limited number of managed access control points for remote access to the information system; and

(ii)the information system routes all remote accesses through managed access control points.

POTENTIAL ASSESSMENT METHODS AND OBJECTS:

Examine: [SELECT FROM: Access control policy; procedures addressing remote access to the information system; information system design documentation; list of managed access control points; information system configuration settings and associated documentation; information system audit records; other relevant documents or records].

Test: [SELECT FROM: Automated mechanisms implementing the access control policy for remote access].

AC-17(4) REMOTE ACCESS

AC-17(4).1 ASSESSMENT OBJECTIVE:

Determine if:

(i)the organization authorizes the execution of privileged commands and access to security-relevant information via remote access only for compelling operational needs; and

(ii)the organization documents the rationale for such access in the security plan for the information system.

POTENTIAL ASSESSMENT METHODS AND OBJECTS:

Examine: [SELECT FROM: Access control policy; procedures addressing remote access to the information system; information system configuration settings and associated documentation; security plan; information system audit records; other relevant documents or records].

APPENDIX F-AC

PAGE F-38

Special Publication 800-53A

Guide for Assessing the Security Controls in

 

Federal Information Systems and Organizations

________________________________________________________________________________________________

AC-17(5) REMOTE ACCESS

AC-17(5).1 ASSESSMENT OBJECTIVE:

Determine if:

(i)the organization defines the frequency of monitoring for unauthorized remote connections to the information system;

(ii)the organization monitors for unauthorized remote connections to the information system in accordance with the organization-defined frequency;

(iii)the organization defines the appropriate action(s) to be taken if an unauthorized connection is discovered; and

(iv)the organization takes organization-defined appropriate action(s) if an unauthorized connection is discovered.

POTENTIAL ASSESSMENT METHODS AND OBJECTS:

Examine: [SELECT FROM: Access control policy; procedures addressing remote access to the information system; information system design documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records].

Interview: [SELECT FROM: Organizational personnel with responsibilities for monitoring remote connections to the information system].

AC-17(6) REMOTE ACCESS

AC-17(6).1 ASSESSMENT OBJECTIVE:

Determine if the organization ensures that users protect information about remote access mechanisms from unauthorized use and disclosure.

POTENTIAL ASSESSMENT METHODS AND OBJECTS:

Examine: [SELECT FROM: Access control policy; procedures addressing remote access to the information system; other relevant documents or records].

Interview: [SELECT FROM: Organizational personnel with responsibilities for implementing or monitoring remote access to the information system; information system users with knowledge of information about remote access mechanisms].

APPENDIX F-AC

PAGE F-39

Special Publication 800-53A

Guide for Assessing the Security Controls in

 

Federal Information Systems and Organizations

________________________________________________________________________________________________

AC-17(7) REMOTE ACCESS

AC-17(7).1 ASSESSMENT OBJECTIVE:

Determine if:

(i)the organization defines the security functions and security-relevant information that can be accessed using remote sessions;

(ii)the organization defines the additional security measures to be employed for remote sessions used to access organization-defined security functions and security-relevant information;

(iii)the organization employs organization-defined additional security measures for remote sessions used to access organization-defined security functions and securityrelevant information; and

(iv)the organization audits remote sessions for accessing organization-defined security functions and security-relevant information.

POTENTIAL ASSESSMENT METHODS AND OBJECTS:

Examine: [SELECT FROM: Access control policy; procedures addressing remote access to the information system; information system design documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records].

Test: [SELECT FROM: Automated mechanisms implementing the access control policy for remote access].

AC-17(8) REMOTE ACCESS

AC-17(8).1 ASSESSMENT OBJECTIVE:

Determine if:

(i)the organization defines the networking protocols within the information system deemed to be nonsecure; and

(ii)the organization disables the organization-defined networking protocols within the information system deemed to be nonsecure except for explicitly identified components in support of specific operational requirements.

POTENTIAL ASSESSMENT METHODS AND OBJECTS:

Examine: [SELECT FROM: Access control policy; procedures addressing remote access to the information system; information system design documentation; information system configuration settings and associated documentation; security plan; list of networking protocols deemed to be non-secure; other relevant documents or records].

Test: [SELECT FROM: Automated mechanisms disabling networking protocols deemed to be nonsecure].

APPENDIX F-AC

PAGE F-40

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]