SI-1 |
System and information integrity policy and procedures |
Review the organizational and system documentation to ensure that all system integrity policies and procedures are properly identified and documented. Discuss with System Owner and Security Officer. |
SP 800-12, SP 800-100 |
Examine: System and information integrity policy and procedures; other relevant documents or records. Interview: Organizational personnel with system and information integrity responsibilities; organizational personnel with information security responsibilities. |
SI-2 |
Flaw remediation |
Review documentation to determine the flaw remediation actions, activities and efforts of the organization to meet requirements operationally for system. Determine extent of software update processes and procedures follow defined and documented methods and techniques. Ensure all software patching conforms to organizational frequency and methodology needs. Discuss with Security Officer, System Owner, operational staff, and security staff. |
SP 800-40, SP 800-128 |
Examine: System and information integrity policy; procedures addressing flaw remediation; procedures addressing configuration management; list of flaws and vulnerabilities potentially affecting the information system; list of recent security flaw remediation actions performed on the information system (e.g., list of installed patches, service packs, hot fixes, and other software updates to correct information system flaws); test results from the installation of software and firmware updates to correct information system flaws; installation/change control records for security-relevant software and firmware updates; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for flaw remediation; organizational personnel with configuration management responsibility. Test: Organizational processes for identifying, reporting, and correcting information system flaws; organizational process for installing software and firmware updates; automated mechanisms supporting and/or implementing reporting, and correcting information system flaws; automated mechanisms supporting and/or implementing testing software and firmware updates. |
SI-2(1) |
Flaw remediation: Central management |
Review documentation to determine the implementation of centralized flaw management actions, such as planning, implementing, assessing, authorizing, and monitoring the organization-defined, centrally managed flaw remediation security controls. Review central management system and reporting to ensure that the system is active and operational. Discuss with System Owner, security staff, and Security Officer. |
SP 800-40, SP 800-128 |
Examine: System and information integrity policy; procedures addressing flaw remediation; automated mechanisms supporting centralized management of flaw remediation; information system design documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for flaw remediation. Test: Organizational processes for central management of the flaw remediation process; automated mechanisms supporting and/or implementing central management of the flaw remediation process. |
SI-2(2) |
Flaw remediation: Automated flaw remediation status |
Review documentation to ensure that the organization is performing automated reviews for flaw remediation-patching efforts on system. Review reports and outputs from automated system to verify remediation. Test system sample to ensure that remediation has been performed correctly and completely. Discuss with security staff, System Owner, and Security Officer. |
SP 800-40, SP 800-128 |
Examine: System and information integrity policy; procedures addressing flaw remediation; automated mechanisms supporting centralized management of flaw remediation; information system design documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for flaw remediation. Test: Automated mechanisms used to determine the state of information system components with regard to flaw remediation. |
SI-2(3) |
Flaw remediation: Time to remediate flaws/benchmarks for correction actions |
Review documentation to determine the organizational requirement for time between issuance of patch and actual loading of patch onto the system. This establishes the benchmark for corrective action. Review output and system logs to determine if the organization is meeting benchmark requirements. Discuss with System Owner, security staff, operations staff, and Security Officer. |
SP 800-40, SP 800-128 |
Examine: System and information integrity policy; procedures addressing flaw remediation; information system design documentation; information system configuration settings and associated documentation; list of benchmarks for taking corrective action on flaws identified; records providing time stamps of flaw identification and subsequent flaw remediation activities; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for flaw remediation. Test: Organizational processes for identifying, reporting, and correcting information system flaws; automated mechanisms used to measure the time between flaw identification and flaw remediation. |
SI-2(4) |
Flaw remediation: Automated patch management tools |
|
Withdrawn: Incorporated into SI-2 |
|
SI-2(5) |
Flaw remediation: Automatic software/firmware updates |
Review documentation on automated updates for system to ensure that operational, configuration management, and security needs are balanced with each other in applying updates and patches to the system in a timely manner. Discuss with System Owner, operations staff, security staff, and Security Officer. |
SP 800-40, SP 800-128 |
Examine: System and information integrity policy; procedures addressing flaw remediation; automated mechanisms supporting flaw remediation and automatic software/firmware updates; information system design documentation; information system configuration settings and associated documentation; records of recent security-relevant software and firmware updates automatically installed to information system components; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for flaw remediation. Test: Automated mechanisms implementing automatic software/firmware updates. |
SI-2(6) |
Flaw remediation: Removal of previous versions of software/firmware |
Review documentation to ensure that the previous versions of software are appropriately removed from system upon new software being applied. Discuss with security staff, System Administrators, Security Officer, and System Owner. |
SP 800-40, SP 800-128 |
Examine: System and information integrity policy; procedures addressing flaw remediation; automated mechanisms supporting flaw remediation; information system design documentation; information system configuration settings and associated documentation; records of software and firmware component removals after updated versions are installed; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for flaw remediation. Test: Automated mechanisms supporting and/or implementing removal of previous versions of software/firmware. |
SI-3 |
Malicious code protection |
Review documentation for malicious code control and protection mechanisms installed and applied to system. Various techniques can define actions in response to malicious code detection during periodic scans, actions in response to detection of malicious downloads, and/or actions in response to detection of maliciousness, when attempting to open or execute files. Test various methods of code integrity errors to ensure system responds correctly. Discuss with System Owner, security staff, and Security Officer. |
SP 800-83 |
Examine: System and information integrity policy; configuration management policy and procedures; procedures addressing malicious code protection; malicious code protection mechanisms; records of malicious code protection updates; information system design documentation; information system configuration settings and associated documentation; scan results from malicious code protection mechanisms; record of actions initiated by malicious code protection mechanisms in response to malicious code detection; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for malicious code protection; organizational personnel with configuration management responsibility. Test: Organizational processes for employing, updating, and configuring malicious code protection mechanisms; organizational process for addressing false positives and resulting potential impact; automated mechanisms supporting and/or implementing employing, updating, and configuring malicious code protection mechanisms; automated mechanisms supporting and/or implementing malicious code scanning and subsequent actions. |
SI-3(1) |
Malicious code protection: Central management |
Review documentation to ensure that the organization controls malicious code protection from central system. Central management includes planning, implementing, assessing, authorizing, and monitoring the organization-defined, centrally managed flaw malicious code protection security controls. Ensure central management through testing code load and detection actions. Discuss with System Owner, security staff, System Administrators, and Security Officer. |
SP 800-83 |
Examine: System and information integrity policy; procedures addressing malicious code protection; automated mechanisms supporting centralized management of malicious code protection mechanisms; information system design documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for malicious code protection. Test: Organizational processes for central management of malicious code protection mechanisms; automated mechanisms supporting and/or implementing central management of malicious code protection mechanisms. |
SI-3(2) |
Malicious code protection: Automatic updates |
Review documentation for malicious code detection and control to ensure that automated signature processes are enacted and active. Review recent updates to the system to verify process is functioning and active. Discuss with System Owner and Security Officer. |
SP 800-83 |
Examine: System and information integrity policy; procedures addressing malicious code protection; automated mechanisms supporting centralized management of malicious code protection mechanisms; information system design documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; system developers; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for malicious code protection. Test: Automated mechanisms supporting and/or implementing automatic updates to malicious code protection capability. |
SI-3(3) |
Malicious code protection: Nonprivileged users |
|
Withdrawn: Incorporated into AC-6(10) |
|
SI-3(4) |
Malicious code protection: Updates only by privileged users |
Review documentation for malicious code updates to ensure that only elevated privilege users are allowed to perform updates. Verify via operating system or LDAP account management processes. Test via account management review and test code load processes. Discuss with System Owner, security staff, System Administrators, and Security Officer. |
SP 800-83 |
Examine: System and information integrity policy; procedures addressing malicious code protection; information system design documentation; malicious code protection mechanisms; records of malicious code protection updates; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; system developers; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for malicious code protection. Test: Automated mechanisms supporting and/or implementing malicious code protection capability. |
SI-3(5) |
Malicious code protection: Portable storage devices |
|
Withdrawn: Incorporated into MP-7 |
|
SI-3(6) |
Malicious code protection: Testing/verification |
Review documentation to ensure that the organizational testing of malicious code detection is performed. Test malicious code detection with test code to verify detection process. Discuss with System Owner and Security Officer. |
SP 800-83 |
Examine: System and information integrity policy; procedures addressing malicious code protection; information system design documentation; information system configuration settings and associated documentation; test cases; records providing evidence of test cases executed on malicious code protection mechanisms; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for malicious code protection. Test: Automated mechanisms supporting and/or implementing testing and verification of malicious code protection capability. |
SI-3(7) |
Malicious code protection: Nonsignature-based detection |
Review documentation to determine the system and organizational utilization of heuristics or other code and to provide safeguards against malicious code for which signatures do not exist yet. Test system with sample malicious code to verify system. Discuss with System Owner, operational staff, security staff, and Security Officer. |
SP 800-83 |
Examine: System and information integrity policy; procedures addressing malicious code protection; information system design documentation; malicious code protection mechanisms; records of malicious code protection updates; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; system developers; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for malicious code protection. Test: Automated mechanisms supporting and/or implementing nonsignature-based malicious code protection capability. |
SI-3(8) |
Malicious code protection: Detect unauthorized commands |
Review documentation to ensure that the system provides detection of unauthorized commands or requests to kernel, virtualized system, or other protected component of system and its operating system. Discuss with System Owner, security staff, and Security Officer. |
SP 800-83 |
Examine: System and information integrity policy; procedures addressing malicious code protection; information system design documentation; malicious code protection mechanisms; warning messages sent upon detection of unauthorized operating system command execution; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; system developers; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for malicious code protection. Test: Automated mechanisms supporting and/or implementing malicious code protection capability; automated mechanisms supporting and/or implementing detection of unauthorized operating system commands through the kernel application programming interface. |
SI-3(9) |
Malicious code protection: Authenticate remote commands |
Review documentation to ensure that the system protects against unauthorized commands and replay of authorized commands. Test with malicious code sample to verify system reaction to code command. Discuss with System Owner, security staff, and Security Officer. |
SP 800-83 |
Examine: System and information integrity policy; procedures addressing malicious code protection; information system design documentation; malicious code protection mechanisms; warning messages sent upon detection of unauthorized operating system command execution; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; system developers; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for malicious code protection. Test: Automated mechanisms supporting and/or implementing malicious code protection capability; automated mechanisms implementing authentication of remote commands; automated mechanisms supporting and/or implementing security safeguards to authenticate remote commands. |
SI-3(10) |
Malicious code protection: Malicious code analysis |
Review documentation to determine the organization’s implementation of reverse engineering and other code analysis techniques for review and evaluation of malicious code and code events. Discuss with security Staff, System Owner, and Security Officer. |
SP 800-83 |
Examine: System and information integrity policy; procedures addressing malicious code protection; procedures addressing incident response; procedures addressing flaw remediation; information system design documentation; malicious code protection mechanisms, tools, and techniques; information system configuration settings and associated documentation; results from malicious code analyses; records of flaw remediation events resulting from malicious code analyses; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for malicious code protection; organizational personnel responsible for flaw remediation; organizational personnel responsible for incident response/management. Test: Organizational process for incident response; organizational process for flaw remediation; automated mechanisms supporting and/or implementing malicious code protection capability; tools and techniques for analysis of malicious code characteristics and behavior. |
SI-4 |
Information system monitoring |
Review documentation to determine the organizational monitoring of system and operational status. Review techniques and procedures for monitoring, which could include intrusion detection systems, intrusion prevention systems, malicious code protection software, scanning tools, audit record monitoring software, network monitoring software, and other components and methods. Discuss with security staff, operations staff, System Owner, and Security Officer. |
SP 800-61, rev.2, SP 800-83,SP 800-92, SP 800-94, SP 800-137 |
Examine: Continuous monitoring strategy; system and information integrity policy; procedures addressing information system monitoring tools and techniques; facility diagram/layout; information system design documentation; information system monitoring tools and techniques documentation; locations within information system where monitoring devices are deployed; information system configuration settings and associated documentation; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility monitoring the information system. Test: Organizational processes for information system monitoring; automated mechanisms supporting and/or implementing information system monitoring capability. |
SI-4(1) |
Information system monitoring: System-wide intrusion detection system |
Review documentation for the system and organizational implementation of IDS and its sensors for the system under review. Ensure that the monitoring of the IDS is active and alarms and alerts are identified and responded to through reviews and observations. Test response times of system IDS with test code and snippets. Discuss with System Owner, security staff, and Security Officer. |
SP 800-61, rev.2, SP 800-83,SP 800-92, SP 800-94, SP 800-137 |
Examine: System and information integrity policy; procedures addressing information system monitoring tools and techniques; information system design documentation; information system monitoring tools and techniques documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for monitoring the information system; organizational personnel with responsibility for the intrusion detection system. Test: Organizational processes for intrusion detection/information system monitoring; automated mechanisms supporting and/or implementing intrusion detection capability. |
SI-4(2) |
Information system monitoring: Automated tools for real-time analysis |
Review documentation to ensure that the system is utilizing automated mechanisms for monitoring and evaluation. Automated tools include, for example, host-based, network-based, transport-based, or storage-based event monitoring tools or Security Information and Event Management (SIEM) technologies that provide real time analysis of alerts and/or notifications generated by the organizational information systems. Review outputs from tools to verify actual use and value of monitoring actions and events. Discuss with System Owner, operations staff, security staff, and Security Officer. |
SP 800-61, rev.2, SP 800-83,SP 800-92, SP 800-94, SP 800-137 |
Examine: System and information integrity policy; procedures addressing information system monitoring tools and techniques; information system design documentation; information system monitoring tools and techniques documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for monitoring the information system; organizational personnel with responsibility for incident response/management. Test: Organizational processes for near real-time analysis of events; organizational processes for information system monitoring; automated mechanisms supporting and/or implementing information system monitoring; automated mechanisms/tools supporting and/or implementing analysis of events. |
SI-4(3) |
Information system monitoring: Automated tool integration |
Review documentation to determine full integration of automatic monitoring tools with intrusion detection tools into access control and flow control mechanisms for rapid response to attacks by enabling reconfiguration of these mechanisms in support of attack isolation and elimination. Verify output from the tools that show rapid response efforts and actions. Discuss with System Owner, security staff, and Security Officer. |
SP 800-61, rev.2, SP 800-83,SP 800-92, SP 800-94, SP 800-137 |
Examine: System and information integrity policy; access control policy and procedures; procedures addressing information system monitoring tools and techniques; information system design documentation; information system monitoring tools and techniques documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for monitoring the information system; organizational personnel with responsibility for the intrusion detection system. Test: Organizational processes for intrusion detection/information system monitoring; automated mechanisms supporting and/or implementing intrusion detection/information system monitoring capability; automated mechanisms/tools supporting and/or implementing access/flow control capability; automated mechanisms/tools supporting and/or implementing integration of intrusion detection tools into access/flow control mechanisms. |
SI-4(4) |
Information system monitoring: Inbound and outbound communications traffic |
Review documentation for monitoring of internal traffic that indicates the presence of malicious code within the organizational information systems or propagating among system components, the unauthorized exporting of information, or signaling to external information systems. Discuss with System Owner, security staff, and Security Officer. |
SP 800-61, rev.2, SP 800-83,SP 800-92, SP 800-94, SP 800-137 |
Examine: System and information integrity policy; procedures addressing information system monitoring tools and techniques; information system design documentation; information system monitoring tools and techniques documentation; information system configuration settings and associated documentation; information system protocols; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for monitoring the information system; organizational personnel with responsibility for the intrusion detection system. Test: Organizational processes for intrusion detection/information system monitoring; automated mechanisms supporting and/or implementing intrusion detection capability/information system monitoring; automated mechanisms supporting and/or implementing monitoring of inbound/outbound communications traffic. |
SI-4(5) |
Information system monitoring: System-generated alerts |
Review documentation to ensure that monitoring component provides alarms and alerts, when events are identified or discovered. Verify alert mechanism when triggered through testing with test code. Discuss with System Owner, Security Officer, and security staff. |
SP 800-61, rev.2, SP 800-83,SP 800-92, SP 800-94, SP 800-137 |
Examine: System and information integrity policy; procedures addressing information system monitoring tools and techniques; information system monitoring tools and techniques documentation; information system configuration settings and associated documentation; alerts/notifications generated based on compromise indicators; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; system developers; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for monitoring the information system; organizational personnel with responsibility for the intrusion detection system. Test: Organizational processes for intrusion detection/information system monitoring; automated mechanisms supporting and/or implementing intrusion detection/information system monitoring capability; automated mechanisms supporting and/or implementing alerts for compromise indicators. |
SI-4(6) |
Information system monitoring: Restrict nonprivileged users |
|
Withdrawn: Incorporated into AC-6(10) |
|
SI-4(7) |
Information system monitoring: Automated response to suspicious events |
Review documentation for monitoring tool to identify and verify automated response mechanisms, which are less disruptive. Least-disruptive actions may include, for example, initiating requests for human responses. Verify system provides this notification process. Discuss with System Owner and Security Officer. |
SP 800-61, rev.2, SP 800-83,SP 800-92, SP 800-94, SP 800-137 |
Examine: System and information integrity policy; procedures addressing information system monitoring tools and techniques; information system design documentation; information system monitoring tools and techniques documentation; information system configuration settings and associated documentation; alerts/notifications generated based on detected suspicious events; records of actions taken to terminate suspicious events; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; system developers; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for monitoring the information system; organizational personnel with responsibility for the intrusion detection system. Test: Organizational processes for intrusion detection/information system monitoring; automated mechanisms supporting and/or implementing intrusion detection/information system monitoring capability; automated mechanisms supporting and/or implementing notifications to incident response personnel; automated mechanisms supporting and/or implementing actions to terminate suspicious events. |
SI-4(8) |
Information system monitoring: Protection of monitoring information |
|
Withdrawn: Incorporated into SI-4 |
|
SI-4(9) |
Information system monitoring: Testing of monitoring tools |
Review documentation for intrusion monitoring tools. Verify tools through testing each tool, its operation and outputs. Discuss with Security Officer and System Owner. |
SP 800-61, rev.2, SP 800-83,SP 800-92, SP 800-94, SP 800-137 |
Examine: System and information integrity policy; procedures addressing testing of information system monitoring tools and techniques; documentation providing evidence of testing intrusion-monitoring tools; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for monitoring the information system; organizational personnel with responsibility for the intrusion detection system. Test: Organizational processes for intrusion detection/information system monitoring; automated mechanisms supporting and/or implementing intrusion detection/information system monitoring capability; automated mechanisms supporting and/or implementing testing of intrusion monitoring tools. |
SI-4(10) |
Information system monitoring: Visibility of encrypted communications |
Review documentation for monitoring of the encrypted communications within the system. Ensure documentation defines the organizational balance, the potentially conflicting needs for encrypting communications traffic and for having insight into such traffic from a monitoring perspective that are required for system. Discuss with System Owner, security staff, operations staff, and Security Officer. |
SP 800-61, rev.2, SP 800-83,SP 800-92, SP 800-94, SP 800-137 |
Examine: System and information integrity policy; procedures addressing information system monitoring tools and techniques; information system design documentation; information system monitoring tools and techniques documentation; information system configuration settings and associated documentation; information system protocols; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for monitoring the information system; organizational personnel with responsibility for the intrusion detection system. Test: Organizational processes for intrusion detection/information system monitoring; automated mechanisms supporting and/or implementing intrusion detection/information system monitoring capability; automated mechanisms supporting and/or implementing visibility of encrypted communications traffic to monitoring tools. |
SI-4(11) |
Information system monitoring: Analyze communications traffic anomalies |
Review documentation for system and traffic anomalies such as large file transfers, long-time persistent connections, unusual protocols and ports in use, and attempted communications with suspected malicious external addresses. Verify with testing the notification process with test code. Discuss with System Owner, security staff, and Security Officer. |
SP 800-61, rev.2, SP 800-83,SP 800-92, SP 800-94, SP 800-137 |
Examine: System and information integrity policy; procedures addressing information system monitoring tools and techniques; information system design documentation; network diagram; information system monitoring tools and techniques documentation; information system configuration settings and associated documentation; information system monitoring logs or records; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for monitoring the information system; organizational personnel with responsibility for the intrusion detection system. Test: Organizational processes for intrusion detection/information system monitoring; automated mechanisms supporting and/or implementing intrusion detection/information system monitoring capability; automated mechanisms supporting and/or implementing analysis of communications traffic. |
SI-4(12) |
Information system monitoring: Automated alerts |
Review documentation for monitoring the system to verify system reports alarms and alerts from external sources, as well as internal to system sources. Discuss with System Owner and Security Officer. |
SP 800-61, rev.2, SP 800-83,SP 800-92, SP 800-94, SP 800-137 |
Examine: System and information integrity policy; procedures addressing information system monitoring tools and techniques; information system design documentation; information system monitoring tools and techniques documentation; information system configuration settings and associated documentation; list of inappropriate or unusual activities (with security implications) that trigger alerts; alerts/notifications provided to security personnel; information system monitoring logs or records; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; system developers; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for monitoring the information system; organizational personnel with responsibility for the intrusion detection system. Test: Organizational processes for intrusion detection/information system monitoring; automated mechanisms supporting and/or implementing intrusion detection/information system monitoring capability; automated mechanisms supporting and/or implementing automated alerts to security personnel. |
SI-4(13) |
Information system monitoring: Analyze traffic/event patterns |
Review documentation to determine, what level of traffic analysis on patterns is utilized to define the traffic/event profiles in tuning system-monitoring devices to reduce the number of false positives and the number of false negatives. Discuss with security staff, System Owner, and Security Officer. |
SP 800-61, rev.2, SP 800-83,SP 800-92, SP 800-94, SP 800-137 |
Examine: System and information integrity policy; procedures addressing information system monitoring tools and techniques; information system design documentation; information system monitoring tools and techniques documentation; information system configuration settings and associated documentation; list of profiles representing common traffic patterns and/or events; information system protocols documentation; list of acceptable thresholds for false positives and false negatives; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for monitoring the information system; organizational personnel with responsibility for the intrusion detection system. Test: Organizational processes for intrusion detection/information system monitoring; automated mechanisms supporting and/or implementing intrusion detection/information system monitoring capability; automated mechanisms supporting and/or implementing analysis of communications traffic/event patterns. |
SI-4(14) |
Information system monitoring: Wireless intrusion detection |
Review documentation to determine extent the wireless network deployments within the system are monitored with wireless-based IDS (WIDS) components. WIDS scans are not limited to those areas within facilities containing information systems, but also include areas outside of facilities as needed, to verify that unauthorized wireless access points are not connected to the systems. Test WIDS through injecting a rogue WAP and evaluating the resultant scans and reports. Discuss with System Owner and Security Officer. |
SP 800-61, rev.2, SP 800-83,SP 800-92, SP 800-94, SP 800-137 |
Examine: System and information integrity policy; procedures addressing information system monitoring tools and techniques; information system design documentation; information system monitoring tools and techniques documentation; information system configuration settings and associated documentation; information system protocols; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for monitoring the information system; organizational personnel with responsibility for the intrusion detection system. Test: Organizational processes for intrusion detection; automated mechanisms supporting and/or implementing wireless intrusion detection capability. |
SI-4(15) |
Information system monitoring: Wireless to wireline communications |
Review documentation to determine the monitoring of wireless activity as it travels the wireless to wired connections within the system. Discuss with security staff, Security Officer, and System Owner. |
SP 800-61, rev.2, SP 800-83,SP 800-92, SP 800-94, SP 800-137 |
Examine: System and information integrity policy; procedures addressing information system monitoring tools and techniques; information system design documentation; information system monitoring tools and techniques documentation; information system configuration settings and associated documentation; information system protocols documentation; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for monitoring the information system; organizational personnel with responsibility for the intrusion detection system. Test: Organizational processes for intrusion detection/information system monitoring; automated mechanisms supporting and/or implementing intrusion detection/information system monitoring capability; automated mechanisms supporting and/or implementing wireless intrusion detection capability. |
SI-4(16) |
Information system monitoring: Correlate monitoring information |
Review documentation to determine, if organization provides methods to correlate various monitoring efforts to provide an organizational-wide monitoring capability. Discuss with System Owner, security staff, and Security Officer. |
SP 800-61, rev.2, SP 800-83,SP 800-92, SP 800-94, SP 800-137 |
Examine: System and information integrity policy; procedures addressing information system monitoring tools and techniques; information system design documentation; information system monitoring tools and techniques documentation; information system configuration settings and associated documentation; event correlation logs or records; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for monitoring the information system; organizational personnel with responsibility for the intrusion detection system. Test: Organizational processes for intrusion detection/information system monitoring; automated mechanisms supporting and/or implementing intrusion detection/information system monitoring capability; automated mechanisms supporting and/or implementing correlation of information from monitoring tools. |
SI-4(17) |
Information system monitoring: Integrated situational awareness |
Review documentation to determine, if the organization provides methods to correlate various monitoring efforts, both inclusive to organization as well as external to organization, to provide a larger organizational-wide monitoring capability and situational awareness. Discuss with System Owner, security staff, and Security Officer. |
SP 800-61, rev.2, SP 800-83,SP 800-92, SP 800-94, SP 800-137 |
Examine: System and information integrity policy; procedures addressing information system monitoring tools and techniques; information system design documentation; information system monitoring tools and techniques documentation; information system configuration settings and associated documentation; event correlation logs or records resulting from physical, cyber, and supply chain activities; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for monitoring the information system; organizational personnel with responsibility for the intrusion detection system. Test: Organizational processes for intrusion detection/information system monitoring; automated mechanisms supporting and/or implementing intrusion detection/system monitoring capability; automated mechanisms supporting and/or implementing correlation of information from monitoring tools. |
SI-4(18) |
Information system monitoring: Analyze traffic/covert exfiltration |
Review documentation to determine, if the organization has covert exfiltration detection methods and techniques available and deployed within system or organization. Covert means that can be used for the unauthorized exfiltration of organizational information include, for example, steganography. Discuss with security staff, System Owner, and Security Officer. |
SP 800-61, rev.2, SP 800-83,SP 800-92, SP 800-94, SP 800-137 |
Examine: System and information integrity policy; procedures addressing information system monitoring tools and techniques; information system design documentation; network diagram; information system monitoring tools and techniques documentation; information system configuration settings and associated documentation; information system monitoring logs or records; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for monitoring the information system; organizational personnel with responsibility for the intrusion detection system. Test: Organizational processes for intrusion detection/information system monitoring; automated mechanisms supporting and/or implementing intrusion detection/system monitoring capability; automated mechanisms supporting and/or implementing analysis of outbound communications traffic. |
SI-4(19) |
Information system monitoring: Individuals posing greater risk |
Review documentation to determine, if the organization provides monitoring of at-risk or suspect individuals with access to system. Ensure all monitoring is under supervision of appropriate organizational management oversight to include legal staff, management, personnel department, and operations. The monitoring of individuals is closely coordinated with management, legal, security, and human resources officials within organizations conducting such monitoring and complies with federal legislation, Executive Orders, policies, directives, regulations, and standards. Discuss with System Owner and Security Officer. |
SP 800-61, rev.2, SP 800-83,SP 800-92, SP 800-94, SP 800-137 |
Examine: System and information integrity policy; procedures addressing information system monitoring; information system design documentation; list of individuals who have been identified as posing an increased level of risk; information system monitoring tools and techniques documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for monitoring the information system. Test: Organizational processes for information system monitoring; automated mechanisms supporting and/or implementing system monitoring capability. |
SI-4(20) |
Information system monitoring: Privileged users |
Review documentation for monitoring efforts on elevated privilege users and their activities. Ensure all monitoring is under supervision of appropriate organizational management oversight to include legal staff, management, personnel department, and operations. The monitoring of individuals is closely coordinated with management, legal, security, and human resources officials within the organizations conducting such monitoring and complies with federal legislation, executive orders, policies, directives, regulations, and standards. Discuss with System Owner and Security Officer. |
SP 800-61, rev.2, SP 800-83,SP 800-92, SP 800-94, SP 800-137 |
Examine: System and information integrity policy; procedures addressing information system monitoring tools and techniques; information system design documentation; list of privileged users; information system monitoring tools and techniques documentation; information system configuration settings and associated documentation; information system monitoring logs or records; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for monitoring the information system. Test: Organizational processes for information system monitoring; automated mechanisms supporting and/or implementing system monitoring capability. |
SI-4(21) |
Information system monitoring: Probationary periods |
Review documentation for monitoring efforts on users during the organizationally define probationary period. Ensure all monitoring is under supervision of appropriate organizational management oversight to include legal staff, management, personnel department, and operations. The monitoring of individuals is closely coordinated with management, legal, security, and human resources officials within organizations conducting such monitoring and complies with federal legislation, Executive Orders, policies, directives, regulations, and standards. Discuss with System Owner and Security Officer. |
SP 800-61, rev.2, SP 800-83,SP 800-92, SP 800-94, SP 800-137 |
Examine: System and information integrity policy; procedures addressing information system monitoring; information system design documentation; information system monitoring tools and techniques documentation; information system configuration settings and associated documentation; information system monitoring logs or records; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for monitoring the information system. Test: Organizational processes for information system monitoring; automated mechanisms supporting and/or implementing system monitoring capability. |
SI-4(22) |
Information system monitoring: Unauthorized network services |
Review documentation to determine, how system and organization validate and verify outside or unauthorized network services to ensure their use and lack of malicious components or software. Test system with test code to verify control. Discuss with System Owner, security staff, and Security Officer. |
SP 800-61, rev.2, SP 800-83,SP 800-92, SP 800-94, SP 800-137 |
Examine: System and information integrity policy; procedures addressing information system monitoring tools and techniques; information system design documentation; information system monitoring tools and techniques documentation; information system configuration settings and associated documentation; documented authorization/approval of network services; notifications or alerts of unauthorized network services; information system monitoring logs or records; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; system developer; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for monitoring the information system. Test: Organizational processes for information system monitoring; automated mechanisms supporting and/or implementing system monitoring capability; automated mechanisms for auditing network services; automated mechanisms for providing alerts. |
SI-4(23) |
Information system monitoring: host-based devices |
Review documentation to ensure that host-based monitoring devices are installed and operating correctly. Evaluate with test code to ensure monitoring is functioning and operational. Discuss with Security Officer, security staff, and System Owner. |
SP 800-61, rev.2, SP 800-83,SP 800-92, SP 800-94, SP 800-137 |
Examine: System and information integrity policy; procedures addressing information system monitoring tools and techniques; information system design documentation; host-based monitoring mechanisms; information system monitoring tools and techniques documentation; information system configuration settings and associated documentation; list of information system components requiring host-based monitoring; information system monitoring logs or records; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for monitoring information system hosts. Test: Organizational processes for information system monitoring; automated mechanisms supporting and/or implementing host-based monitoring capability. |
SI-4(24) |
Information system monitoring: Indicators of compromise |
Review documentation for use, if indicators of compromise (IOC) in monitoring efforts. IOC are forensic artifacts from intrusions and are often retrieved via forensics methods after an intrusion to be used to help other systems and organizational components, identify potential compromise events. Discuss with Security Officer and System Owner. |
SP 800-61, rev.2, SP 800-83,SP 800-92, SP 800-94, SP 800-137 |
Examine: System and information integrity policy; procedures addressing information system monitoring; information system design documentation; information system monitoring tools and techniques documentation; information system configuration settings and associated documentation; information system monitoring logs or records; information system audit records; other relevant documents or records. Interview: System/network administrators; organizational personnel with information security responsibilities; system developer; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for monitoring information system hosts. Test: Organizational processes for information system monitoring; organizational processes for discovery, collection, distribution, and use of indicators of compromise; automated mechanisms supporting and/or implementing system monitoring capability; automated mechanisms supporting and/or implementing the discovery, collection, distribution, and use of indicators of compromise. |
SI-5 |
Security alerts, advisories, and directives |
Review documentation to determine receipt and use of external security alerts and advisories from governmental and nongovernmental entities. Discuss with System Owner, security staff, and Security Officer. |
SP 800-137, SP 800-94, SP 800-40 |
Examine: System and information integrity policy; procedures addressing security alerts, advisories, and directives; records of security alerts and advisories; other relevant documents or records. Interview: Organizational personnel with security alert and advisory responsibilities; organizational personnel implementing, operating, maintaining, and using the information system; organizational personnel, organizational elements, and/or external organizations to whom alerts, advisories, and directives are to be disseminated; system/network administrators; organizational personnel with information security responsibilities. Test: Organizational processes for defining, receiving, generating, disseminating, and complying with security alerts, advisories, and directives; automated mechanisms supporting and/or implementing definition, receipt, generation, and dissemination of security alerts, advisories, and directives; automated mechanisms supporting and/or implementing security directives. |
SI-5(1) |
Security alerts, advisories, and directives: Automated alerts and advisories |
Review documentation to determine receipt and use of external security alerts and advisories from governmental and nongovernmental entities. Ensure automated mechanisms are used to disseminate these alerts and advisories. Discuss with System Owner, security staff, and Security Officer. |
SP 800-137, SP 800-94, SP 800-40 |
Examine: System and information integrity policy; procedures addressing security alerts, advisories, and directives; information system design documentation; information system configuration settings and associated documentation; automated mechanisms supporting the distribution of security alert and advisory information; records of security alerts and advisories; information system audit records; other relevant documents or records. Interview: Organizational personnel with security alert and advisory responsibilities; organizational personnel implementing, operating, maintaining, and using the information system; organizational personnel, organizational elements, and/or external organizations to whom alerts and advisories are to be disseminated; system/network administrators; organizational personnel with information security responsibilities. Test: Organizational processes for defining, receiving, generating, and disseminating security alerts and advisories; automated mechanisms supporting and/or implementing dissemination of security alerts and advisories. |
SI-6 |
Security function verification |
Review documentation to ensure that the system security functions, such as system startup, restart, shutdown, and abort provide notification to appropriate operational and security staff in a timely manner. Notifications provided by information systems include, for example, electronic alerts to system administrators, messages to local computer consoles, and/or hardware indications such as lights. Discuss with operations staff, security staff, Security Officer, and System Owner. |
|
Examine: System and information integrity policy; procedures addressing security function verification; information system design documentation; information system configuration settings and associated documentation; alerts/notifications of failed security verification tests; list of system transition states requiring security functionality verification; information system audit records; other relevant documents or records. Interview: Organizational personnel with security function verification responsibilities; organizational personnel implementing, operating, and maintaining the information system; system/network administrators; organizational personnel with information security responsibilities; system developer. Test: Organizational processes for security function verification; automated mechanisms supporting and/or implementing security function verification capability. |
SI-6(1) |
Security function verification: Notification of failed security tests |
|
Withdrawn: Incorporated into SI-6 |
|
SI-6(2) |
Security function verification: Automation support for distributed testing |
Review documentation to determine the automated mechanisms in place for distributed security testing of system components and functions. Discuss with Security Officer, security staff, and System Owner. |
|
Examine: System and information integrity policy; procedures addressing security function verification; information system design documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: Organizational personnel with security function verification responsibilities; organizational personnel implementing, operating, and maintaining the information system; system/network administrators; organizational personnel with information security responsibilities. Test: Organizational processes for security function verification; automated mechanisms supporting and/or implementing the management of distributed security testing. |
SI-6(3) |
Security function verification: Report verification results |
Review documentation to ensure that appropriate interested security personnel receive results from security function testing and evaluations. Discuss with security staff, Security Officer, and System Owner. |
|
Examine: System and information integrity policy; procedures addressing security function verification; information system design documentation; information system configuration settings and associated documentation; records of security function verification results; information system audit records; other relevant documents or records. Interview: Organizational personnel with security function verification responsibilities; organizational personnel with information security responsibilities. Test: Organizational processes for reporting security function verification results; automated mechanisms supporting and/or implementing the reporting of security function verification results. |
SI-7 |
Software, firmware, and information integrity |
Review documentation to determine the level and extent of software and firmware integrity checks employed by system. Test with sample code to ensure accuracy of checks and results reporting of integrity tools employed. Discuss with security staff, Security Officer, and System Owner. |
SP 800-147, SP 800-155 |
Examine: System and information integrity policy; procedures addressing software, firmware, and information integrity; information system design documentation; information system configuration settings and associated documentation; integrity verification tools and associated documentation; records generated/triggered from integrity verification tools regarding unauthorized software, firmware, and information changes; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for software, firmware, and/or information integrity; organizational personnel with information security responsibilities; system/network administrators. Test: Software, firmware, and information integrity verification tools. |
SI-7(1) |
Software, firmware, and information integrity: Integrity checks |
Review documentation to ensure that integrity check actions are used for all installations of SW and FW at critical points during process. Verify using test code during a test installation. Discuss with security staff, Security Officer, and System Owner. |
SP 800-147, SP 800-155 |
Examine: System and information integrity policy; procedures addressing software, firmware, and information integrity; information system design documentation; information system configuration settings and associated documentation; integrity verification tools and associated documentation; records of integrity scans; other relevant documents or records Interview: Organizational personnel with responsibility for software, firmware, and/or information integrity; organizational personnel with information security responsibilities; system/network administrators; system developer. Test: Software, firmware, and information integrity verification tools. |
SI-7(2) |
Software, firmware, and information integrity: Automated notifications of integrity violations |
Review documentation to ensure that integrity check tools provide automated reporting of integrity violations and notification of appropriate organizational personnel in a timely matter. Review reports and tool results to ensure reporting is provided. Discuss with operations staff, security staff, System Owner, and Security Officer. |
SP 800-147, SP 800-155 |
Examine: System and information integrity policy; procedures addressing software, firmware, and information integrity; information system design documentation; information system configuration settings and associated documentation; integrity verification tools and associated documentation; records of integrity scans; automated tools supporting alerts and notifications for integrity discrepancies; alerts/notifications provided upon discovering discrepancies during integrity verifications; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for software, firmware, and/or information integrity; organizational personnel with information security responsibilities. Test: Software, firmware, and information integrity verification tools; automated mechanisms providing integrity discrepancy notifications. |
SI-7(3) |
Software, firmware, and information integrity: Centrally-managed integrity tools |
Review documentation to determine the organizational use of centrally managed integrity check tools and techniques. Discuss with operations staff, security staff, Security Officer, and System Owner. |
SP 800-147, SP 800-155 |
Examine: System and information integrity policy; procedures addressing software, firmware, and information integrity; information system design documentation; information system configuration settings and associated documentation; integrity verification tools and associated documentation; records of integrity scans; other relevant documents or records. Interview: Organizational personnel with responsibility for central management of integrity verification tools; organizational personnel with information security responsibilities. Test: Automated mechanisms supporting and/or implementing central management of integrity verification tools. |
SI-7(4) |
Security function verification: Tamper-evident packaging |
|
Withdrawn: Incorporated into SA-12 |
|
SI-7(5) |
Software, firmware, and information integrity: Automated response to integrity violations |
Review documentation to determine the organizational or system use of automatic response mechanisms to integrity violations. Such responses can include reversing the changes, halting the information system, or triggering audit alerts, when unauthorized modifications to critical security files occur. Verify response mechanisms with test code. Discuss with security staff, operations staff, Security Officer, and System Owner. |
SP 800-147, SP 800-155 |
Examine: System and information integrity policy; procedures addressing software, firmware, and information integrity; information system design documentation; information system configuration settings and associated documentation; integrity verification tools and associated documentation; records of integrity scans; records of integrity checks and responses to integrity violations; information audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for software, firmware, and/or information integrity; organizational personnel with information security responsibilities; system/network administrators; system developer. Test: Software, firmware, and information integrity verification tools; automated mechanisms providing an automated response to integrity violations; automated mechanisms supporting and/or implementing security safeguards to be implemented when integrity violations are discovered. |
SI-7(6) |
Software, firmware, and information integrity: Cryptographic protection |
Review documentation to determine use of various cryptographic mechanisms used to protect files and code. Discuss with System Owner, Security Officer, and security staff. |
SP 800-147, SP 800-155 |
Examine: System and information integrity policy; procedures addressing software, firmware, and information integrity; information system design documentation; information system configuration settings and associated documentation; cryptographic mechanisms and associated documentation; records of detected unauthorized changes to software, firmware, and information; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for software, firmware, and/or information integrity; organizational personnel with information security responsibilities; system/network administrators; system developer. Test: Software, firmware, and information integrity verification tools; cryptographic mechanisms implementing software, firmware, and information integrity. |
SI-7(7) |
Software, firmware, and information integrity: Integration of detection and response |
Review documentation to ensure that detected events are tracked, monitored, corrected, and available for historical purposes by the organization or the system. Review reports and event logs to validate retention. Discuss with System Owner, Security Officer, and security staff. |
SP 800-147, SP 800-155 |
Examine: System and information integrity policy; procedures addressing software, firmware, and information integrity; procedures addressing incident response; information system design documentation; information system configuration settings and associated documentation; incident response records; information audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for software, firmware, and/or information integrity; organizational personnel with information security responsibilities; organizational personnel with incident response responsibilities. Test: Organizational processes for incorporating detection of unauthorized security relevant changes into the incident response capability; software, firmware, and information integrity verification tools; automated mechanisms supporting and/or implementing incorporation of detection of unauthorized security-relevant changes into the incident response capability. |
SI-7(8) |
Software, firmware, and information integrity: Auditing capability for significant events |
Review documentation to determine the extent to which the organization reviews results of significant events for evaluation, auditing, and response efforts. Discuss with System Owner and Security Officer. |
SP 800-147, SP 800-155 |
Examine: System and information integrity policy; procedures addressing software, firmware, and information integrity; information system design documentation; information system configuration settings and associated documentation; integrity verification tools and associated documentation; records of integrity scans; incident response records, list of security-relevant changes to the information system; automated tools supporting alerts and notifications if unauthorized security changes are detected; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for software, firmware, and/or information integrity; organizational personnel with information security responsibilities; system/network administrators; system developer. Test: Software, firmware, and information integrity verification tools; automated mechanisms supporting and/or implementing the capability to audit potential integrity violations; automated mechanisms supporting and/or implementing alerts about potential integrity violations. |
SI-7(9) |
Software, firmware, and information integrity: Verify boot process |
Review documentation to determine how the organization or system only allows trusted code to be executed during boot processes. Discuss with System Owner, security staff, and Security Officer. |
SP 800-147, SP 800-155 |
Examine: System and information integrity policy; procedures addressing software, firmware, and information integrity; information system design documentation; information system configuration settings and associated documentation; integrity verification tools and associated documentation; documentation; records of integrity verification scans; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for software, firmware, and/or information integrity; organizational personnel with information security responsibilities; system developer. Test: Software, firmware, and information integrity verification tools; automated mechanisms supporting and/or implementing integrity verification of the boot process. |
SI-7(10) |
Software, firmware, and information integrity: Protection of boot software |
Review documentation to determine the organizational efforts to ensure that only allowable boot firmware is executed during startup of system. Unauthorized modifications to boot firmware may be indicative of a sophisticated, targeted cyber-attack. Review organizational implementation of specialized review processes found in SP 800-155. Discuss with System Owner, security staff, and Security Officer. |
SP 800-147, SP 800-155 |
Examine: System and information integrity policy; procedures addressing software, firmware, and information integrity; information system design documentation; information system configuration settings and associated documentation; integrity verification tools and associated documentation; records of integrity verification scans; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for software, firmware, and/or information integrity; organizational personnel with information security responsibilities; system/network administrators; system developer. Test: Software, firmware, and information integrity verification tools; automated mechanisms supporting and/or implementing protection of the integrity of boot firmware; safeguards implementing protection of the integrity of boot firmware. |
SI-7(11) |
Software, firmware, and information integrity: Confined environments with limited privileges |
Review documentation to determine the extent that the organization limits user installation of suspect software. Ensure user installations occur in confined environments of operation to limit or contain damage from malicious code that may be executed. Discuss with operations staff, security staff, System Owner, and Security Officer. |
SP 800-147, SP 800-155 |
Examine: System and information integrity policy; procedures addressing software, firmware, and information integrity; information system design documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for software, firmware, and/or information integrity; organizational personnel with information security responsibilities. Test: Software, firmware, and information integrity verification tools; automated mechanisms supporting and/or implementing execution of software in a confined environment (physical and/or virtual); automated mechanisms supporting and/or implementing limited privileges in the confined environment. |
SI-7(12) |
Software, firmware, and information integrity: Integrity verification |
Review documentation to determine the organizational process for user installed software to verify the integrity of user-installed software prior to execution to reduce the likelihood of executing malicious code or code that contains errors from unauthorized modifications. Discuss with security staff, System Owner, and Security Officer. |
SP 800-147, SP 800-155 |
Examine: System and information integrity policy; procedures addressing software, firmware, and information integrity; information system design documentation; information system configuration settings and associated documentation; integrity verification records; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for software, firmware, and/or information integrity; organizational personnel with information security responsibilities. Test: Software, firmware, and information integrity verification tools; automated mechanisms supporting and/or implementing verification of the integrity of user-installed software prior to execution. |
SI-7(13) |
Software, firmware, and information integrity: Code execution in protected environments |
Review documentation of system control for all code execution action to ensure that all sources of binary or machine-executable code including, for example, commercial software/firmware and open source software are controlled and verified. Discuss with Security Officer, security staff, and System Owner. |
SP 800-147, SP 800-155 |
Examine: System and information integrity policy; procedures addressing software, firmware, and information integrity; information system design documentation; information system configuration settings and associated documentation; approval records for execution of binary and machine-executable code; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for software, firmware, and/or information integrity; organizational personnel with information security responsibilities; system/network administrators; system developer. Test: Software, firmware, and information integrity verification tools; automated mechanisms supporting and/or implementing approvals for execution of binary or machine executable code. |
SI-7(14) |
Software, firmware, and information integrity: Binary or machine executable code |
Review documentation to determine how the organization limits the use and execution of software and code with limited or no external verification testing results. Discuss with Security Officer and System Owner. |
SP 800-147, SP 800-155 |
Examine: System and information integrity policy; procedures addressing software, firmware, and information integrity; information system design documentation; information system configuration settings and associated documentation; approval records for execution of binary and machine-executable code; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for software, firmware, and/or information integrity; organizational personnel with information security responsibilities; authorizing official; system/network administrators; system developer. Test: Automated mechanisms supporting and/or implementing prohibition of the execution of binary or machine-executable code. |
SI-7(15) |
Software, firmware, and information integrity: Code authentication |
Review documentation to ensure that the organization uses only proper authenticated software and code on system. Code signing and cryptographic authentication are proper techniques for this process. Discuss with security staff, operations staff, System Owner, and Security Officer. |
SP 800-147, SP 800-155 |
Examine: System and information integrity policy; procedures addressing software, firmware, and information integrity; information system design documentation; information system configuration settings and associated documentation; cryptographic mechanisms and associated documentation; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for software, firmware, and/or information integrity; organizational personnel with information security responsibilities; system/network administrators; system developer. Test: Cryptographic mechanisms authenticating software/firmware prior to installation. |
SI-7(16) |
Software, firmware, and information integrity: Time limit on process execution without supervision |
Review documentation to determine the organizational process for which normal execution periods can be determined and situations, in which organizations exceed such periods. Discuss with System Owner and Security Officer. |
SP 800-147, SP 800-155 |
Examine: System and information integrity policy; procedures addressing software and information integrity; information system design documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for software, firmware, and/or information integrity; organizational personnel with information security responsibilities; system/network administrators; system developer. Test: Software, firmware, and information integrity verification tools; automated mechanisms supporting and/or implementing time limits on process execution without supervision. |
SI-8 |
Spam protection |
Review documentation to determine the spam protection mechanisms employed by the system on the entry and exit points, which could include, for example, firewalls, electronic mail servers, web servers, proxy servers, remote-access servers, workstations, mobile devices, and notebook/laptop computers. Discuss with System Owner, operations staff, security staff, and Security Officer. |
SP 800-45 |
Examine: System and information integrity policy; configuration management policy and procedures (CM-1); procedures addressing spam protection; spam protection mechanisms; records of spam protection updates; information system design documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for spam protection; organizational personnel with information security responsibilities; system/network administrators; system developer. Test: Organizational processes for implementing spam protection; automated mechanisms supporting and/or implementing spam protection. |
SI-8(1) |
Spam protection: Central management |
Review documentation to determine the level of organizational oversight and central management of all spam protection processes and mechanisms employed. Discuss with System Owner, operations staff, security staff, and Security Officer. |
SP 800-45 |
Examine: System and information integrity policy; procedures addressing spam protection; spam protection mechanisms; information system design documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for spam protection; organizational personnel with information security responsibilities; system/network administrators. Test: Organizational processes for central management of spam protection; automated mechanisms supporting and/or implementing central management of spam protection. |
SI-8(2) |
Spam protection: Automatic updates |
Review documentation to ensure that all spam protection components employ automatic update features. Discuss with Security officer and System Owner. |
SP 800-45 |
Examine: System and information integrity policy; procedures addressing spam protection; spam protection mechanisms; records of spam protection updates; information system design documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for spam protection; organizational personnel with information security responsibilities; system/network administrators; system developer. Test: Organizational processes for spam protection; automated mechanisms supporting and/or implementing automatic updates to spam protection mechanisms. |
SI-8(3) |
Spam protection: Continuous learning capability |
Review documentation to determine the extent, the spam protection process employs various continuous learning techniques, such as Bayesian filters that respond to user inputs, which identifies specific traffic as spam or legitimate by updating algorithm parameters and thereby more accurately separating types of traffic. Discuss with security staff, Security Officer, Security Engineer, and System Owner. |
SP 800-45 |
Examine: System and information integrity policy; procedures addressing spam protection; spam protection mechanisms; information system design documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for spam protection; organizational personnel with information security responsibilities; system/network administrators; system developer. Test: Organizational processes for spam protection; automated mechanisms supporting and/or implementing spam protection mechanisms with a learning capability. |
SI-9 |
Information input restrictions |
|
Withdrawn: Incorporated into AC-2, AC-3, AC-5, AC-6 |
|
SI-10 |
Information input validation |
Review documentation to determine the input validation checks performed by system upon data entry. Checking the valid syntax and semantics of information system inputs (e.g., character set, length, numerical range, and acceptable values) verifies that inputs match specified definitions for format and content. Text input process with various input anomalies to verify input validation processes employed by the system. Discuss with System Owner, Developers, security staff, and Security Officer. |
|
Examine: System and information integrity policy; access control policy and procedures; separation of duties policy and procedures; procedures addressing information input validation; documentation for automated tools and applications to verify validity of information; list of information inputs requiring validity checks; information system design documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for information input validation; organizational personnel with information security responsibilities; system/network administrators; system developer. Test: Automated mechanisms supporting and/or implementing validity checks on information inputs. |
SI-10(1) |
Information input validation: Manual override capability |
Review documentation to determine the organizational implementation of manual override capabilities for any inputs into system. Review criteria and selection processes and procedures for manual override actions. Discuss with System Owner, operations staff, and Security Officer. |
|
Examine: System and information integrity policy; access control policy and procedures; separation of duties policy and procedures; procedures addressing information input validation; information system design documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for information input validation; organizational personnel with information security responsibilities; system/network administrators; system developer. Test: Organizational processes for use of manual override capability; automated mechanisms supporting and/or implementing manual override capability for input validation; automated mechanisms supporting and/or implementing auditing of the use of manual override capability. |
SI-10(2) |
Information input validation: Review/resolution of errors |
Review documentation to evaluate processes and procedures for resolution of errors during input activities, to include correcting systemic causes of errors and resubmitting transactions with corrected input. Discuss with System Owner, Security Officer, and operations staff. |
|
Examine: System and information integrity policy; access control policy and procedures; separation of duties policy and procedures; procedures addressing information input validation; information system design documentation; information system configuration settings and associated documentation; review records of information input validation errors and resulting resolutions; information input validation error logs or records; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for information input validation; organizational personnel with information security responsibilities; system/network administrators. Test: Organizational processes for review and resolution of input validation errors; automated mechanisms supporting and/or implementing review and resolution of input validation errors. |
SI-10(3) |
Information input validation: Predictable behavior |
Review documentation to determine capabilities of the system to resolve issues correctly, when given incorrect inputs. Identify the expected and predictable behavior resultant from incorrect inputs. Test system with unexpected inputs and evaluate the results. Discuss with System Owner, Developers, and Security Officer. |
|
Examine: System and information integrity policy; procedures addressing information input validation; information system design documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for information input validation; organizational personnel with information security responsibilities; system/network administrators; system developer. Test: Automated mechanisms supporting and/or implementing predictable behavior when invalid inputs are received. |
SI-10(4) |
Information input validation: Review/timing interactions |
Review documentation to determine the organizational mechanism for handling and responding to timing of input actions, such as invalid information system inputs received across protocol interfaces, since this causes timing interactions become relevant, where one protocol needs to consider the impact of the error response on other protocols within the protocol stack. Test via test code inputs and review of outputs in response. Discuss with Security Officer, Developers, and System Owner. |
|
Examine: System and information integrity policy; procedures addressing information input validation; information system design documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for information input validation; organizational personnel with information security responsibilities; system/network administrators; system developer. Test: Organizational processes for determining appropriate responses to invalid inputs; automated mechanisms supporting and/or implementing responses to invalid inputs. |
SI-10(5) |
Information input validation: Restrict inputs to trusted sources and approved formats |
Review documentation to ensure that the system provides for whitelisting (list of trusted sources and sites) of valid sources of inputs to system. Discuss with Security Officer and System Owner. |
|
Examine: System and information integrity policy; procedures addressing information input validation; information system design documentation; information system configuration settings and associated documentation; list of trusted sources for information inputs; list of acceptable formats for input restrictions; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for information input validation; organizational personnel with information security responsibilities; system/network administrators; system developer. Test: Organizational processes for restricting information inputs; automated mechanisms supporting and/or implementing restriction of information inputs. |
SI-11 |
Error handling |
Review documentation for system to determine the error handling routines and messages for system and their required outputs to users. Ensure the structure/content of error messages only provides the needed information and not additional information, which can be used by malicious systems, programs, or attackers. Discuss with Developers, System Owner, and Security Officer. |
|
Examine: System and information integrity policy; procedures addressing information system error handling; information system design documentation; information system configuration settings and associated documentation; documentation providing structure/content of error messages; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for information input validation; organizational personnel with information security responsibilities; system/network administrators; system developer. Test: Organizational processes for error handling; automated mechanisms supporting and/or implementing error handling; automated mechanisms supporting and/or implementing management of error messages. |
SI-12 |
Information handling and retention |
Review documentation to ensure that the system and organization is performing information handling and storage actions in compliance of data retention requirements, federal law requirements, and agency regulations. Discuss with System Owner, operations staff, and Security Officer. |
|
Examine: System and information integrity policy; federal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements applicable to information handling and retention; media protection policy and procedures; procedures addressing information system output handling and retention; information retention records, other relevant documents or records. Interview: Organizational personnel with responsibility for information handling and retention; organizational personnel with information security responsibilities/network administrators. Test: Organizational processes for information handling and retention; automated mechanisms supporting and/or implementing information handling and retention. |
SI-13 |
Predictable failure prevention |
Review documentation for the organization to determine documented status and repair reports for security equipment and components. Review potential failures of specific information system components that provide security capability documents and maintenance reports to ensure MTTF (Mean Time To Fail) is with requirements and specifications for the system and organization. Discuss with security staff, System Owner, and Security Officer. |
|
Examine: System and information integrity policy; procedures addressing predictable failure prevention; information system design documentation; information system configuration settings and associated documentation; list of MTTF substitution criteria; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for MTTF determinations and activities; organizational personnel with information security responsibilities; system/network administrators; organizational personnel with contingency planning responsibilities. Test: Organizational processes for managing MTTF. |
SI-13(1) |
Predictable failure prevention: Transferring component responsibilities |
Review documentation for the system to ensure that time limits are set and used for substitution of component functionality, when original system components are experiencing long repair times. Discuss with System Owner and Security Officer |
|
Examine: System and information integrity policy; procedures addressing predictable failure prevention; information system design documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for MTTF activities; organizational personnel with information security responsibilities; system/network administrators; organizational personnel with contingency planning responsibilities. Test: Organizational processes for managing MTTF; automated mechanisms supporting and/or implementing transfer of component responsibilities to substitute components. |
SI-13(2) |
Predictable failure prevention: Time limit on process execution without supervision |
|
Withdrawn: Incorporated into SI-7(16) |
|
SI-13(3) |
Predictable failure prevention: Manual transfer between components |
Review documentation to ensure that the organization invokes transfers to standby system or components, if primary component is experiencing long repair times. Discuss with System Owner and Security Officer. |
|
Examine: System and information integrity policy; procedures addressing predictable failure prevention; information system design documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for MTTF activities; organizational personnel with information security responsibilities; system/network administrators; organizational personnel with contingency planning responsibilities. Test: Organizational processes for managing MTTF and conducting the manual transfer between active and standby components. |
SI-13(4) |
Predictable failure prevention: Standby component installation/notification |
Review documentation to ensure that the process for automated or manual transfers of components are defined and instituted, when required. Discuss with System Owner, operations staff, and Security Officer. |
|
Examine: System and information integrity policy; procedures addressing predictable failure prevention; information system design documentation; information system configuration settings and associated documentation; list of actions to be taken once information system component failure is detected; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for MTTF activities; organizational personnel with information security responsibilities; system/network administrators; organizational personnel with contingency planning responsibilities. Test: Organizational processes for managing MTTF; automated mechanisms supporting and/or implementing transparent installation of standby components; automated mechanisms supporting and/or implementing alarms or system shutdown if component failures are detected. |
SI-13(5) |
Predictable failure prevention: Failover capability |
Review documentation to ensure that the process for automated failover transfers of components are defined and instituted, when required. Discuss with System Owner, operations staff, and Security Officer. |
|
Examine: System and information integrity policy; procedures addressing predictable failure prevention; information system design documentation; information system configuration settings and associated documentation; documentation describing failover capability provided for the information system; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for failover capability; organizational personnel with information security responsibilities; system/network administrators; organizational personnel with contingency planning responsibilities. Test: Organizational processes for managing failover capability; automated mechanisms supporting and/or implementing failover capability. |
SI-14 |
Nonpersistence |
Review documentation of the organization to ensure that the nonpersistence of select components of system is performed. This risk from advanced persistent threats (APTs) is treated by significantly reducing the targeting capability of adversaries (i.e., window of opportunity and available attack surface) to initiate and complete cyber-attacks. Ensure system performs nonpersistence by evaluating logs for system, monitoring reports for select components, and access logs for user activities. Discuss with System Owner, security staff, and Security Officer. |
|
Examine: System and information integrity policy; procedures addressing nonpersistence for information system components; information system design documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for nonpersistence; organizational personnel with information security responsibilities; system/network administrators; system developer. Test: Automated mechanisms supporting and/or implementing initiation and termination of nonpersistent components. |
SI-14(1) |
Nonpersistence: Refresh from trusted sources |
Review documentation for the system to ensure that refresh actions for system are performed with software/data from write-once, read-only media (WORM) or from selected off-line secure storage facilities. Discuss with System Owner, Security Officer, and security staff. |
|
Examine: System and information integrity policy; procedures addressing nonpersistence for information system components; information system design documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for obtaining component and service refreshes from trusted sources; organizational personnel with information security responsibilities. Test: Organizational processes for defining and obtaining component and service refreshes from trusted sources; automated mechanisms supporting and/or implementing component and service refreshes. |
SI-15 |
Information output filtering |
Review documentation for the system and organization to ensure that the monitoring of outputs from system are consistently being performed to detect extraneous content, preventing such extraneous content from being displayed, and alerting monitoring tools that anomalous behavior has been discovered. Discuss with System Owner, operations staff, security staff, and Security Officer. |
|
Examine: System and information integrity policy; procedures addressing information output filtering; information system design documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for validating information output; organizational personnel with information security responsibilities; system/network administrators; system developer. Test: Organizational processes for validating information output; automated mechanisms supporting and/or implementing information output validation. |
SI-16 |
Memory protection |
Review documentation to ensure that the system provides memory protection methods to prevent unauthorized code execution. These techniques, such as data execution prevention and address space layout randomization are tested for proper execution via sample test injection tests and subsequent evaluations of results. Discuss with System Owner, security staff, and Security Officer. |
|
Examine: System and information integrity policy; procedures addressing memory protection for the information system; information system design documentation; information system configuration settings and associated documentation; list of security safeguards protecting information system memory from unauthorized code execution; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for memory protection; organizational personnel with information security responsibilities; system/network administrators; system developer. Test: Automated mechanisms supporting and/or implementing safeguards to protect information system memory from unauthorized code execution. |
SI-17 |
Fail-safe procedures |
Review documentation to determine failure modes for system and actions to be taken as result of failure, such as do nothing, reestablish system settings, shut down processes, restart the system, or contact designated organizational personnel. Test system by causing an interruption of processing, correlated with operations, to evaluation failure techniques and actions of system. Discuss with operations staff, System Owner, security staff, and Security Officer. |
|
Examine: System and information integrity policy; procedures addressing memory protection for the information system; information system design documentation; information system configuration settings and associated documentation; list of security safeguards protecting information system memory from unauthorized code execution; information system audit records; other relevant documents or records. Interview: Organizational personnel with responsibility for fail-safe procedures; organizational personnel with information security responsibilities; system/network administrators; system developer. Test: Organizational fail-safe procedures; automated mechanisms supporting and/or implementing fail-safe procedures. |