text stringlengths 51 3.17k | embedding listlengths 1.54k 1.54k | example_idx int64 0 994 |
|---|---|---|
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
NIST SP 800-172, Enhanced Security Requirements for Protecting Controlled Unclassified Information provides enhanced security requirements to help protect CUI associated with critical... | [
-0.027711315,
0.021571606,
0.060914047,
0.027075734,
0.038516186,
-0.007379091,
0.0059903474,
0.040473774,
-0.0056534894,
0.02641473,
0.046397384,
0.0041503413,
-0.016575942,
-0.013016691,
0.029973982,
-0.02405037,
-0.011662904,
0.021724146,
-0.035058625,
0.011770953,
0.04627... | 0 |
According to Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations:
| Table 1. Security Requirement Families .......................................................................................................4 |
|------------------------------------------------------------... | [
-0.00629847,
0.05169411,
0.06691708,
-0.010437464,
0.0360979,
0.017622385,
-0.007844761,
-0.0008131358,
-0.022927763,
0.024287434,
0.03500483,
-0.019875173,
0.026007015,
0.025327181,
0.014823066,
-0.056892846,
0.046921935,
0.024727326,
-0.020368386,
0.034258343,
0.02940619,
... | 1 |
## Summary of NIST SP 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations
Kelley Dempsey Computer Security Division Information Technology Laboratory
Greg Witte Doug Rike G2, Inc. Annapolis Junction, MD
February 19, 2014
<!-- image -->
## Abstract
This white paper pr... | [
0.0025568528,
-0.0031894115,
0.030262616,
0.017924586,
-0.011273325,
-0.02269696,
-0.0050949166,
0.0127012795,
-0.0067076283,
-0.009876685,
0.018550882,
-0.015807707,
-0.024826366,
-0.015181411,
0.021281533,
-0.0037922212,
0.019001815,
0.013214842,
0.00548322,
0.051030584,
-0... | 2 |
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations:
The NIST Risk Management Framework (RMF), described in NIST Special Publication 800-37 Revision 1, Guide for Applying the Risk Management Framework to Federal Information Systems: a Secu... | [
-0.018804658,
0.044273976,
0.04562037,
0.0071751666,
0.0104962755,
-0.010081137,
0.026546434,
0.03287449,
-0.017671442,
0.054394383,
-0.009918448,
0.014484973,
-0.015775269,
0.01864758,
0.037115637,
-0.032133974,
0.00605878,
0.008869381,
-0.0018470865,
0.03689124,
0.032986693... | 3 |
team oversees incident response, allocates funding, and may have decision-making authority on high-impact response actions, such as shutting down or rebuilding critical services. - Incident handlers.
Incident handlers verify that an incident has occurred, collect and analyze data and evidence, prioritize incident respo... | [
-0.015856141,
0.0027793464,
0.06019305,
0.0034334876,
0.019449396,
-0.020679303,
-0.015217073,
0.049775023,
-0.008120997,
0.041310374,
0.06048244,
-0.015530578,
0.0104300855,
-0.011485152,
0.0034063575,
0.009652351,
-0.02442931,
-0.0064871516,
-0.054067634,
0.017073989,
0.001... | 4 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
| Access Control | Maintenance | Security Assessment and Monitoring |
|-----------------------------------|---------------------|-------------------------... | [
0.0024122677,
0.039233364,
0.06147799,
0.006042283,
0.029624108,
0.0016134322,
-0.019112328,
0.02795178,
-0.010989589,
-0.0002886758,
0.033924382,
-0.0013703805,
-0.004452907,
0.021050107,
0.01056487,
-0.03846356,
-0.016856011,
0.01868761,
-0.008998721,
0.05038222,
0.04448925... | 5 |
itado que los titulares de registros de patentes cuyo uso pueda ser necesario para el cumplimiento de las orientaciones o requisitos de esta publicación comuniquen dichos registros de patentes al ITL.
Sin embargo, los titulares de patentes no están obligados a responder a las solicitudes de patentes del ITL y el ITL no... | [
0.032497592,
0.046622686,
0.025064632,
-0.021595094,
-0.00792067,
-0.013779374,
-0.05748814,
0.010396266,
-0.05030212,
-0.034917627,
0.05146275,
0.010050547,
-0.005701278,
-0.010599993,
-0.0040097237,
0.03575723,
0.014384382,
-0.052302353,
-0.04190609,
0.040424436,
0.02943550... | 6 |
According to Assessing Enhanced Security Requirements for Controlled Unclassified Information:
| CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION.......................................................................... | [
0.03428543,
0.038844522,
0.05217921,
-0.014217516,
0.035945676,
0.011424084,
-0.009348775,
-0.00733276,
-0.028461387,
0.021438276,
0.03344213,
-0.0151267,
-0.0030009632,
0.028197855,
0.03136023,
-0.028224207,
0.016655182,
0.024179002,
-0.013222686,
0.018526254,
0.023889117,
... | 7 |
parameters that organizations define, providing them with the ability to tailor security controls based on specific security requirements, environments of operation, and organizational risk tolerance.
Parameters assigned and/or selected by organizations for a given base control also apply to all control enhancements as... | [
0.010864979,
0.0039596953,
0.061008636,
0.0008292269,
-0.0076073576,
0.0021140217,
-0.0013596825,
0.0131802615,
-0.0013050769,
0.038841832,
0.010852498,
-0.01965806,
-0.004689852,
0.02040694,
-0.009292334,
-0.022678537,
0.043260217,
0.0070956238,
-0.0022981209,
0.013417407,
0... | 8 |
...103 |
| Appendix D. Organization-Defined Parameters...............................................................................107 |
| Appendix E.
Change Log ............................................................................................................... | [
0.02891047,
0.033823695,
0.06413056,
-0.0065940693,
-0.0015046761,
-0.010990116,
-0.0020105448,
0.0024873216,
-0.010472934,
0.0038950262,
0.027384782,
-0.035013214,
0.012496408,
-0.016317088,
0.05694173,
0.04344328,
0.059579354,
0.023001665,
0.023105102,
0.035245948,
0.040805... | 9 |
..................................................... 50 | APPENDIX C MAPPINGTABLES ....................................................................................................
50 |
| APPENDIXD ADVERSARY EFFECTS........................................................................ | [
-0.005506949,
0.020429783,
0.08193955,
0.012198633,
0.020526215,
0.021545637,
0.013541792,
0.0005346803,
-0.028323421,
0.029480603,
0.037222706,
-0.0259264,
0.0137346545,
0.0099255955,
0.039895248,
-0.007356375,
0.026601423,
0.01114477,
0.015084702,
0.014134158,
0.0051522176,... | 10 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
............................................ 5 |
| 2.1 DEVELOPMENTAPPROACH .............................................................................. | [
0.017687652,
0.02863843,
0.05150623,
-0.015889363,
0.06081976,
0.006411439,
-0.010736057,
0.015379401,
-0.041172776,
0.016801927,
0.024437947,
-0.0016137635,
0.008192953,
0.03070512,
0.014775498,
-0.017942633,
0.04538668,
0.004952006,
-0.033093892,
0.03231553,
0.038112998,
... | 11 |
| help you take |
1 For more information on types of CUI and markings, visit the National Archives and Records Administration (NARA) https://www.archives.gov/cui.
ht ps:/
csrc.nist.gov/projects/protecting-control ed-unclas ified-information
## Overview
## Audience
<!-- image -->
<!-- image -->
Pages 2-6 provide... | [
-0.034264933,
0.00019542543,
0.053950164,
-0.0049048592,
0.008789929,
-0.0051581617,
0.004464047,
0.0025905948,
-0.0010189672,
0.033238564,
0.015132363,
0.02329068,
-0.01497446,
0.0026136222,
0.0005781549,
-0.021566907,
0.002118531,
0.018816764,
-0.003013314,
0.027633011,
0.0... | 12 |
| ........................................................................................................
22 |
| 3.13 SYSTEMANDCOMMUNICATIONSPROTECTION ..................................................................... | 23 ... | [
0.018712983,
0.018425753,
0.046157733,
-0.017851295,
-0.018009271,
0.011273746,
0.01239394,
-0.022432601,
-0.02302142,
-0.008609695,
0.008286563,
-0.006275958,
0.009485744,
-0.0148066655,
0.030072898,
-0.00017985485,
0.021700166,
0.033404756,
-0.008810756,
0.045611996,
0.0144... | 13 |
According to Security and Privacy Controls for Information Systems and Organizations:
In working with the Office of Management and Budget to develop standards and guidelines
required by FISMA, NIST consults with federal agencies, state, local, and tribal governments, and
private sector organizations to im... | [
0.008601245,
0.022809137,
0.06431507,
0.016281994,
0.023203636,
-0.0047070743,
-0.023179727,
-0.021087693,
-0.038278226,
0.011350773,
0.0015421272,
0.0070650945,
-0.04566609,
-0.011171456,
0.013269466,
-0.008398018,
-0.01239679,
-0.015182182,
0.018254483,
-0.010693277,
0.0488... | 14 |
According to Security and Privacy Controls for Information Systems and Organizations:
s of computing platforms, including
general purpose computing systems, cyber-physical systems, cloud systems, mobile systems,
industrial control systems, and Internet of Things (IoT) devices.
Safeguarding measures include
bo... | [
0.008451067,
0.004665633,
0.05978454,
0.05205259,
0.035230998,
-0.00017591409,
-0.0067309383,
0.019421922,
-0.016315334,
0.0021329022,
0.016246298,
-0.01771905,
0.012069666,
-0.028787706,
-0.022125803,
-0.031134905,
0.010694713,
0.015233782,
0.035323042,
0.0063454914,
0.03334... | 15 |
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations:
ne or more information systems. If an information system inherits a common control, such as environmental controls within a data center, that system does not need to explicitly implement... | [
0.0039408454,
0.02045858,
0.08589222,
0.024529487,
0.035714723,
-0.011998119,
0.005703171,
0.0012079406,
-0.025804084,
0.015373199,
-0.005706422,
-0.0003314521,
-0.011965604,
0.028249228,
0.0031897437,
-0.070076816,
0.030824434,
-0.0056023737,
-0.011165729,
0.019678215,
0.049... | 16 |
tect audit record content. - Ask internal information security staff, or your security vendor, what audit log information, if any, the system currently captures and how it is protected and maintained.
## Questions to Ask:
- Do audit records contain information that establishes type of event, when the event occurred, w... | [
0.024958262,
0.03161294,
0.07475894,
-0.035474457,
-0.011964262,
0.020054137,
0.014146019,
-0.020491777,
0.00011996844,
0.009602302,
0.043454923,
-0.042708363,
0.017840203,
-0.013824225,
0.016282724,
-0.008282951,
-0.029321775,
0.029244544,
-0.0072918287,
0.014841092,
0.03277... | 17 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
Advanced Persistent Threat; Basic Security Requirement; Contractor Systems; Controlled Unclassified Information; CUI Registry; Derived Security Requirement; Enhanced Securit... | [
0.015054227,
0.009209796,
0.063402444,
0.010847521,
0.031136045,
0.0067307292,
-0.032471914,
-0.00036768537,
-0.05078875,
0.02336488,
0.03460417,
-0.01975546,
-0.028078958,
0.009569453,
0.042054214,
-0.0139881,
0.0463701,
0.021027107,
-0.0051604398,
0.017225016,
0.04218266,
... | 18 |
According to Risk Management Framework for Information Systems and Organizations_ A System Life Cycle Approach for Security and Privacy:
In addition to the responsibility to protect organizational assets from the threats that exist in today's environment, organizations have a responsibility to consider and manage the ... | [
0.017954508,
0.048456103,
0.08670599,
0.032561563,
0.05777278,
-0.0039502257,
0.04531933,
0.04553001,
-0.022261716,
0.007853634,
0.023162954,
-0.017650194,
0.022905458,
0.0033152634,
-0.014361265,
-0.0511247,
0.009632698,
0.025140991,
-0.0021258066,
0.023677945,
0.021021053,
... | 19 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
| Access Control | Maintenance | Security Assessment and Monitoring |
|-----------------------------------|---------------------|-------------------------... | [
-0.0061866627,
0.031211993,
0.07013518,
-0.00091636047,
0.017900996,
-0.020104196,
0.011540568,
0.025494166,
-0.023369651,
0.023592595,
0.045952447,
-0.005429313,
-0.022071337,
0.026018737,
0.025717108,
-0.024943365,
0.0025490886,
0.010753712,
-0.029008793,
0.034306962,
0.042... | 20 |
According to Assessing Enhanced Security Requirements for Controlled Unclassified Information:
| CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION.......................................................................... | [
0.03428341,
0.038842235,
0.05220249,
-0.0142298555,
0.035969913,
0.011469527,
-0.0093350485,
-0.0073059765,
-0.028512415,
0.02147654,
0.03344016,
-0.015125809,
-0.0029941988,
0.028222546,
0.031384736,
-0.028222546,
0.016641025,
0.02417758,
-0.013248259,
0.018525163,
0.0239008... | 21 |
TS
SP 800-171A [84] provides a set of procedures to assess the security requirements described in this publication. The assessment procedures are based on the procedures described in SP 800-53A [57].
15 With few exceptions, the security controls in SP 800-53 are policy-, technology-, and sector-neutral, meaning that ... | [
-0.013670656,
0.017516352,
0.0780202,
-0.007612369,
0.014566229,
-0.02227079,
-0.0068155727,
0.012156084,
-0.0004979978,
0.019715773,
0.024470212,
-0.031002624,
0.0048532146,
0.026972547,
-0.014526718,
-0.049309187,
0.028605651,
0.020585006,
0.002250456,
0.0064270524,
0.03708... | 22 |
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations:
....................................................................................... | 63 |
| A.1.1.
C-SCRM Controls Summa... | [
0.014118211,
0.03545788,
0.072630204,
0.009215153,
0.037561975,
-0.0034256468,
0.0051303525,
0.005104376,
-0.048887715,
0.050264467,
-0.0011892352,
-0.0234048,
0.001886541,
0.018560188,
0.023430776,
-0.029924892,
0.036367055,
0.021807246,
-0.019326493,
0.031249693,
0.06774663... | 23 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
<!-- image -->
<!-- image -->
Howard Lutnick, Secretary of Commerce
<!-- image -->
Protecting Controlled Unclassified Information (CUI): NIST Special Publication 800-171, Revision... | [
-0.029982954,
-0.012517091,
0.02689492,
0.02363533,
0.017736396,
-0.031091478,
-0.009640206,
0.03977492,
-0.014358034,
0.012748034,
0.038771972,
0.002870287,
-0.026789347,
-0.007093238,
0.011560329,
-0.0057768654,
-0.012761231,
-0.0023374695,
-0.00986455,
0.027449183,
0.03322... | 24 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
| CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION....................... | [
0.02867414,
0.007869022,
0.055200994,
-0.015305968,
0.042841,
0.0015891889,
-0.024628337,
0.011666054,
-0.052241925,
0.017374696,
0.016248679,
0.0011963925,
-0.011711881,
0.024143888,
0.024667617,
-0.014638214,
0.03294253,
0.013839528,
-0.026042404,
0.02346304,
0.02809804,
... | 25 |
| Implementación basada en enclaves....................................................................................................26 | | | 3.2.3 | Despliegue basado en un portal de recursos........................................................................................27 | | | 3.2.4 | Entorno de pruebas (s... | [
-0.0008761691,
0.024131345,
0.06911102,
0.007183089,
0.040234886,
-0.0029280523,
0.00712318,
0.0072729527,
-0.03520253,
0.027773812,
0.012293327,
-0.020932205,
0.01604363,
-0.025233671,
0.0014782546,
0.015863903,
0.017960718,
-0.008093706,
-0.019793933,
0.0127246715,
0.011149... | 26 |
According to Assessing Enhanced Security Requirements for Controlled Unclassified Information:
There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including conc... | [
-0.011995599,
0.008788983,
0.049592193,
-0.03336438,
0.017629895,
0.016305706,
0.009652303,
0.011846303,
-0.016669208,
0.0012162746,
0.025549067,
0.0043360717,
-0.02509469,
0.012144895,
0.0031303451,
-0.029755317,
-0.004449666,
-0.007114273,
-0.02434172,
0.013423647,
0.030274... | 27 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
Advanced Persistent Threat; Basic Security Requirement; Contractor Systems; Controlled Unclassified Information; CUI Registry; Derived Security Requirement; Enhanced Securit... | [
0.015054227,
0.009209796,
0.063402444,
0.010847521,
0.031136045,
0.0067307292,
-0.032471914,
-0.00036768537,
-0.05078875,
0.02336488,
0.03460417,
-0.01975546,
-0.028078958,
0.009569453,
0.042054214,
-0.0139881,
0.0463701,
0.021027107,
-0.0051604398,
0.017225016,
0.04218266,
... | 28 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
| Access Control | Maintenance | Security Assessment and Monitoring |
|-----------------------------------|---------------------|-------------------------... | [
-0.023050858,
0.021448392,
0.052462276,
0.022841305,
-0.0024745774,
-0.016776588,
-0.016640995,
0.049725756,
0.005907553,
0.005926043,
0.03249308,
-0.007260404,
0.010274273,
-0.02101696,
0.039617892,
0.015580901,
-0.034563962,
0.027587071,
-0.02625579,
0.028055483,
0.03219724... | 29 |
However, holders of patents are not obligated to respond to ITL calls for patents and ITL has not undertaken a patent search in order to identify which, if any, patents may apply to this publication.
As of the date of publication and following call(s) for the identification of patent claims whose use may be required fo... | [
0.015165179,
0.028894916,
0.06262781,
-0.039820224,
-0.018620873,
-0.02647593,
-0.008439868,
-0.0026615488,
-0.014952521,
-0.001348219,
0.05013414,
-0.02046834,
-0.0018408215,
-0.005907907,
-0.0024256313,
-0.01610885,
0.013091763,
-0.014168344,
-0.040165793,
0.019165808,
0.01... | 30 |
According to Zero Trust Architecture:
3.2.4 | Entorno de pruebas (sandbox) para aplicaciones en dispositivos... 3.2.4 Entorno de pruebas ( sandbox ) ... | [
0.003100072,
0.049888976,
0.071523525,
0.01339567,
0.030868804,
-0.0030386103,
0.007321447,
0.015242521,
-0.002920184,
0.030988729,
-0.020807061,
-0.0077112047,
0.019631792,
-0.01948788,
-0.010235635,
0.000120768644,
0.010319582,
0.0039275577,
-0.036121536,
0.013119841,
0.036... | 31 |
ets. By achieving the above objectives, organizations can simplify RMF execution, employ innovative approaches for managing risk, and increase the level of automation when carrying out specific tasks.
Organizations implementing the RMF will be able to:
- -Use the tasks and outputs of the Organization-Level and System-... | [
0.026789874,
0.072729364,
0.08830374,
0.023728874,
0.0040986794,
-0.015696809,
-0.016211057,
0.049318835,
0.014105089,
0.061856695,
0.023361554,
0.00872385,
0.0077259648,
0.015709054,
0.008619777,
-0.024071706,
0.014203041,
0.020202601,
0.018231317,
0.0060883295,
0.04339274,
... | 32 |
According to Zero Trust Architecture:
3.1.1 | ZTA basada en una gobernanza de la identidad mejorada... 3.1.1 ZTA basada en una gobernanza de la ident... | [
0.019888585,
0.026578588,
0.03936897,
0.034493204,
0.04898443,
-0.019128874,
-0.02039884,
0.052658264,
-0.032792356,
-0.004025341,
0.015194245,
0.012280124,
0.0064235367,
-0.045242563,
0.0055872863,
0.022621281,
-0.012586277,
-0.020319467,
-0.006559605,
0.034130353,
-0.008600... | 33 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
## NIST Special Publication 800-172
## Enhanced Security Requirements for Protecting Controlled Unclassified Information
A Supplement to NIST Special Publication 800-171
... | [
-0.020219872,
0.032804854,
0.042565208,
-0.029392926,
0.03722358,
-0.009180046,
-0.005243743,
0.005666738,
-0.043348275,
-0.012396208,
0.022792801,
0.005852017,
-0.028889528,
0.009215004,
0.027197545,
0.009110129,
0.006121196,
0.0017173258,
-0.013808522,
0.03442692,
-0.000581... | 34 |
| help you take |
1 For more information on types of CUI and markings, visit the National Archives and Records Administration (NARA) https://www.archives.gov/cui.
ht ps:/
csrc.nist.gov/projects/protecting-control ed-unclas ified-information
## Overview
## Audience
<!-- image -->
<!-- image -->
Pages 2-6 provide... | [
-0.034264933,
0.00019542543,
0.053950164,
-0.0049048592,
0.008789929,
-0.0051581617,
0.004464047,
0.0025905948,
-0.0010189672,
0.033238564,
0.015132363,
0.02329068,
-0.01497446,
0.0026136222,
0.0005781549,
-0.021566907,
0.002118531,
0.018816764,
-0.003013314,
0.027633011,
0.0... | 35 |
| ........................................................................................................
22 |
| 3.13 SYSTEMANDCOMMUNICATIONSPROTECTION ..................................................................... | 23 ... | [
0.018712983,
0.018425753,
0.046157733,
-0.017851295,
-0.018009271,
0.011273746,
0.01239394,
-0.022432601,
-0.02302142,
-0.008609695,
0.008286563,
-0.006275958,
0.009485744,
-0.0148066655,
0.030072898,
-0.00017985485,
0.021700166,
0.033404756,
-0.008810756,
0.045611996,
0.0144... | 36 |
However, holders of patents are not obligated to respond to ITL calls for patents and ITL has not undertaken a patent search in order to identify which, if any, patents may apply to this publication.
As of the date of publication and following call(s) for the identification of patent claims whose use may be required fo... | [
-0.019765142,
0.021252533,
0.06121187,
-0.039072625,
-0.014831007,
-0.0404456,
-0.039473075,
0.010740681,
-0.031034991,
-0.016003758,
0.045565657,
-0.024255918,
0.021481361,
-0.01073353,
0.0017323103,
-0.014595027,
0.06538801,
-0.013179145,
-0.044507325,
0.051429413,
0.005313... | 37 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
The National Institute of Standards and Technology (NIST) Information Technology Laboratory (ITL) promotes the U.S. economy and public welfare by providing technical leaders... | [
-0.0055062273,
-0.01550315,
0.0562983,
-0.015664643,
0.046633676,
-0.026708152,
-0.019565275,
0.016372718,
-0.06385112,
-0.009260897,
0.018882042,
0.027130514,
-0.043428697,
-0.00453728,
0.031602576,
-0.015850978,
-0.0070000202,
0.012708112,
-0.0057888366,
0.038633652,
0.0465... | 38 |
..........30 |
| 2.3.4. Level 3 -Operational................................................................................................................32 |
| 2.3.5.
C-SCRM PMO................................................................................................................ | [
0.031596992,
0.04263212,
0.105905496,
-0.020283999,
0.033026002,
0.014343023,
0.005312476,
-0.01241783,
-0.013112487,
0.03551354,
0.015031065,
-0.060441818,
-0.00511731,
0.02037662,
0.05499041,
0.018338958,
0.018974073,
-0.0135491295,
0.0078000114,
0.04294968,
0.07965406,
0... | 39 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
........................................................................ | CHAPTERONE INTRODUCTION.............................................................................. | [
0.024662834,
0.011386939,
0.05403475,
-0.014752472,
0.044270717,
-0.00014643141,
-0.02617932,
0.012018808,
-0.052571476,
0.0170272,
0.017386366,
0.001578009,
-0.00804136,
0.025926571,
0.023252768,
-0.015244664,
0.03474613,
0.011998855,
-0.028999448,
0.022853693,
0.028733399,
... | 40 |
tems (including hardware, software, firmware, and documentation); and establishing and enforcing security configuration settings for information technology products employed in organizational systems.
## Getting Started with Configuration Management
<!-- image -->
Changes to a system can have potentially significant ... | [
0.012264149,
0.033847723,
0.06886536,
0.01403896,
0.017920947,
-0.02322544,
0.015860304,
0.02685483,
-0.008495167,
0.03320959,
0.021537043,
-0.0077174404,
-0.011891904,
0.015235463,
0.037596762,
0.0043339976,
0.0024046374,
0.030683639,
-0.002667203,
0.015514648,
0.0449619,
... | 41 |
ed as independent, third-party assessments or as government-sponsored assessments. The assessments can be applied with various degrees of rigor based on customer-defined depth and coverage attributes.
## Keywords
assessment; assessment method; assessment object; assessment procedure; assurance; Controlled Unclassified... | [
-0.025152372,
-0.006919191,
0.07157243,
-0.02091453,
0.022392543,
-0.023177328,
-0.03759122,
-0.04444501,
0.023726678,
0.00699113,
0.025309328,
-0.010136811,
-0.036309402,
-0.025636323,
0.02039134,
0.013073216,
-0.03544614,
-0.0036786816,
-0.011327069,
0.014662407,
0.01506787... | 42 |
According to Assessing Enhanced Security Requirements for Controlled Unclassified Information:
| FAMILY | FAMILY |
|-----------------------------------|--------------------------------------|
| Access Control | Media Protection ... | [
0.010063917,
0.046926316,
0.075669326,
0.012903449,
0.02691438,
0.010817262,
-0.006689962,
-0.006023541,
0.004767966,
0.020964885,
0.04646272,
-0.0019026792,
0.006735034,
0.012961399,
0.010096112,
-0.041904014,
0.009181796,
0.0021473553,
-0.034022868,
0.026862869,
0.02339877,... | 43 |
parameters that organizations define, providing them with the ability to tailor security controls based on specific security requirements, environments of operation, and organizational risk tolerance.
Parameters assigned and/or selected by organizations for a given base control also apply to all control enhancements as... | [
0.011079969,
0.003910761,
0.060874287,
0.0006324166,
-0.007634255,
0.0021535715,
-0.0013896779,
0.013258509,
-0.0011735404,
0.038901616,
0.010817795,
-0.019625591,
-0.004650466,
0.020511989,
-0.009119907,
-0.02272174,
0.04334609,
0.007153603,
-0.0021832222,
0.013508199,
0.034... | 44 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
| CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION....................... | [
0.02867414,
0.007869022,
0.055200994,
-0.015305968,
0.042841,
0.0015891889,
-0.024628337,
0.011666054,
-0.052241925,
0.017374696,
0.016248679,
0.0011963925,
-0.011711881,
0.024143888,
0.024667617,
-0.014638214,
0.03294253,
0.013839528,
-0.026042404,
0.02346304,
0.02809804,
... | 45 |
According to Assessing Security and Privacy Controls in Information Systems and Organizations:
NTROL ASSESSMENTS ..................................................... 30
3.4 ANALYZE ASSESSMENT REPORT RESULTS .....................................................................................
32
3.5 ASSESS SECURIT... | [
-0.001266238,
0.046408955,
0.052468646,
0.017035274,
0.022401387,
0.0151857305,
0.013056321,
0.0015575108,
-0.004794213,
0.022948949,
0.035043992,
-0.02944669,
0.034435593,
-0.0009384611,
-0.0015210067,
-0.042150136,
0.012885968,
0.040592626,
0.02181732,
0.018203408,
0.023216... | 46 |
According to Control Baselines for Information Systems and Organizations:
........................................................ 1 | CHAPTERONE INTRODUCTION......................................................................................................
1 |
|-------------------------------------... | [
-0.017479543,
0.01870018,
0.07294535,
-0.008745874,
0.019920819,
-0.04242939,
-0.026121661,
-0.015001646,
-0.045114797,
0.023961132,
0.029075606,
-0.024620276,
-0.0111505315,
-0.01967669,
0.026780806,
-0.0050778557,
0.014586629,
0.0023512547,
0.012249107,
0.027098173,
0.02130... | 47 |
blication 800-series reports on ITL's research, guidelines, and outreach efforts in information system security, and its collaborative activities with industry, government, and academic organizations.
## Audience
This publication serves a diverse group of individuals and organizations in the public and private sectors... | [
-0.0023717494,
-0.00066400575,
0.07907177,
-0.031677153,
0.0022035402,
-0.029066546,
-0.021315467,
0.011061436,
-0.02831297,
-0.010846128,
0.043734387,
-0.022688054,
0.017857086,
-0.036252443,
0.036979105,
0.0040033786,
0.041177608,
-0.0013246473,
-0.01990251,
0.045241542,
0.... | 48 |
## Control Baselines for Information Systems and Organizations
JOINT TASK FORCE
This publication is available free of charge from:
https://doi.org/10.6028/NIST.SP.800-53B
<!-- image -->
## NIST Special Publication 800-53B
## Control Baselines for Information Systems and Organizations
## JOINT TASK FORCE
This pu... | [
-0.042390596,
0.008133696,
0.07089827,
-0.016161416,
-0.009339179,
-0.006345343,
-0.028905088,
-0.017645087,
-0.020837627,
0.015167885,
0.018598875,
0.008656955,
-0.0214205,
-0.0015747445,
0.013737204,
0.018731346,
-0.009988285,
-0.00784226,
0.023738734,
0.007047437,
0.000844... | 49 |
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations:
- Authority and Purpose (AP);
- Accountability, Audit, and Risk Management (AR);
- Data Quality and Integrity (DI);
- Data Minimization and Retention (DM);
- Individual Participation and... | [
-0.018334901,
0.035024703,
0.056676336,
0.021227092,
0.018334901,
-0.0037213746,
-0.04062335,
0.016119324,
-0.012948526,
0.013379701,
0.03136303,
-0.0111110555,
-0.027860558,
0.01565498,
0.010142569,
-0.038261835,
0.014965099,
0.020895418,
0.009591992,
0.023336533,
0.03635139... | 50 |
vant -based on the systems that personnel have authorized access to, contextualized to the work environments of personnel (e.g., telework, shop floor), and tailored to the specific roles of personnel.
The content should include:
- An understanding of the need for security (why is cybersecurity important to our busines... | [
-0.020306952,
0.044211593,
0.0818674,
0.034857605,
0.024584204,
-0.042479374,
-0.0028148582,
0.058149304,
0.027822124,
0.041386742,
0.040827103,
-0.018281588,
-0.0046003778,
-0.037762403,
0.042506024,
0.0063226046,
0.013318109,
0.011026249,
-0.06598427,
-0.0037409298,
0.03637... | 51 |
parameters that organizations define, providing them with the ability to tailor security controls based on specific security requirements, environments of operation, and organizational risk tolerance.
Parameters assigned and/or selected by organizations for a given base control also apply to all control enhancements as... | [
0.010864979,
0.0039596953,
0.061008636,
0.0008292269,
-0.0076073576,
0.0021140217,
-0.0013596825,
0.0131802615,
-0.0013050769,
0.038841832,
0.010852498,
-0.01965806,
-0.004689852,
0.02040694,
-0.009292334,
-0.022678537,
0.043260217,
0.0070956238,
-0.0022981209,
0.013417407,
0... | 52 |
.......................................................................... 424
APPENDIX C CONTROL SUMMARIES ..........................................................................................
428
xiii
T
h
s
i
p
u
b
l
i
c
a
t
i
o
n
i
s
a
v
a
i
l
l
a
b
e
f
r
e
e
o
f
c
h
a
r
g
e
f
r
o
m
:
h
t
t
... | [
0.03676339,
0.009441927,
0.053968973,
0.043846488,
0.051246736,
0.013822611,
-0.013981189,
0.038877748,
-0.00037352272,
0.022782201,
0.02730164,
-0.022914348,
-0.008285638,
-0.026099099,
0.01053875,
0.005959845,
0.035574064,
-0.00021071306,
0.034067582,
0.006858447,
0.0160559... | 53 |
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations:
The security control baselines address the security needs of a broad and diverse set of constituencies, and are developed based on a number of general assumptions, including common envir... | [
-0.03500365,
0.009512632,
0.11119918,
-0.009660251,
0.0119336,
-0.012695318,
-0.0036964044,
-0.0049186978,
0.009766538,
0.025296161,
0.0037643095,
0.0002415432,
-0.012057601,
0.001684344,
0.007274713,
-0.04728563,
0.03568861,
0.012896081,
-0.011213214,
0.0074341423,
0.0252725... | 54 |
following components: (i) a control section; (ii) a supplemental guidance section; (iii) a control enhancements section; (iv) a references section; and (v) a priority and baseline allocation section.
Figure 2: The Risk Management Framework
<!-- image -->
## 3 Control Baselines and Tailoring
To assist organizations i... | [
-0.027147004,
0.033233777,
0.10722458,
-0.02702527,
0.003813363,
-0.019489845,
-0.0067319702,
0.018747259,
0.009172766,
0.06588323,
-0.00097007933,
-0.012721354,
-0.025540097,
0.0017088613,
0.03661802,
-0.048304625,
0.018138582,
0.008527568,
0.01329351,
0.018162929,
0.0038742... | 55 |
According to Control Baselines for Information Systems and Organizations:
| CHAPTERONE INTRODUCTION...................................................................................................... 1 | CHAPTERONE INTRODUCTION............................................................................... | [
-0.016269423,
0.0185118,
0.068733744,
-0.0020199677,
0.021205092,
-0.045676254,
-0.030052733,
-0.01697626,
-0.03726734,
0.020912608,
0.025129251,
-0.026591672,
-0.011473904,
-0.019620802,
0.026347935,
-0.0071171112,
0.013344583,
0.0049052006,
0.012710868,
0.026079824,
0.02851... | 56 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
ource code. | CUI//SP-CTI |
| General Proprietary | e.g., financial information, trade secrets, product research and development, existing and future product designs and performanc... | [
-0.008124537,
0.008853749,
0.048705943,
-0.002142924,
0.023472412,
-0.031204823,
-0.0016802863,
0.02098208,
-0.015327238,
0.0024920518,
0.0517879,
0.008922543,
-0.0069791214,
0.017528636,
0.024229143,
-0.014900716,
-0.00090377725,
-0.007842482,
-0.03769895,
0.012465419,
0.043... | 57 |
According to Zero Trust Architecture:
| | | 3.2.2. | [
0.0068728575,
0.043250676,
0.04080759,
0.008040706,
0.03130372,
-0.0070205163,
-0.033263557,
0.013712156,
-0.021048125,
0.028887479,
-0.0016015972,
-0.0029716382,
0.0006971856,
0.012993996,
-0.0043861447,
-0.009819326,
0.04913019,
-0.016242495,
-0.016819708,
0.036243584,
0.01... | 58 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
............................................ 5 |
| 2.1 DEVELOPMENTAPPROACH .............................................................................. | [
0.017715218,
0.028639602,
0.051454652,
-0.015903434,
0.060768563,
0.0064553176,
-0.010763337,
0.01538003,
-0.0412013,
0.016789194,
0.024465788,
-0.0016071191,
0.008179868,
0.030706376,
0.014802943,
-0.017916527,
0.045388535,
0.004989115,
-0.033095248,
0.032343693,
0.03808772,... | 59 |
According to Incident Response Recommendations and Considerations for Cybersecurity Risk Management_ A CSF 2.0 Community Profile:
The target audience for this publication includes cybersecurity program leadership, cybersecurity personnel, and others who are responsible for preparing for, detecting, responding to, or r... | [
-0.015239611,
-0.004197243,
0.057758126,
0.0034098632,
0.023799194,
-0.0075563076,
0.012826673,
0.051128898,
0.0023192784,
0.09301243,
0.042493116,
-0.0353559,
0.011264613,
-0.0034955859,
0.018605025,
0.0035590844,
0.015811097,
-0.0005841851,
-0.048004776,
0.010731227,
0.0036... | 60 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
| Access Control | Maintenance | Security Assessment and Monitoring |
|-----------------------------------|---------------------|-------------------------... | [
-0.045868356,
0.03636945,
0.049533695,
-0.004878514,
0.011454184,
-0.01963021,
0.0060303854,
0.03162,
-0.0030361651,
0.027077043,
0.051624488,
0.0008929423,
0.0122350035,
0.013783738,
0.017487796,
-0.029322708,
0.0151001625,
0.026083272,
-0.035388585,
0.040086415,
0.06391112,... | 61 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
| | When provided as part of a government contract, examples include: ... | [
0.010481475,
0.006414983,
0.03987097,
-0.0038296415,
0.017760463,
-0.018774584,
-0.023244722,
0.0242455,
-0.04120534,
-0.0037829385,
0.042539712,
0.0051206443,
-0.0007026291,
-0.0019131528,
0.023538284,
0.013617245,
-0.014891568,
-0.018134085,
-0.040538155,
-0.0008756802,
0.0... | 62 |
According to Assessing Enhanced Security Requirements for Controlled Unclassified Information:
t of Defense Federal Acquisition Regulation). Organizations can use the assessment procedures to generate evidence to support the assertion that the enhanced security requirements have been satisfied.
The assessment procedur... | [
0.022073518,
0.029854128,
0.048830036,
0.010347724,
0.03373224,
0.04702513,
-0.012914837,
0.026366267,
-0.005417768,
0.040634785,
0.03380541,
-0.011768478,
0.01095749,
-0.0067623015,
0.018463705,
-0.031610254,
-0.01670758,
-0.017561251,
-0.040537223,
-0.005262278,
0.039732333... | 63 |
According to Assessing Security and Privacy Controls in Information Systems and Organizations:
CHAPTER ONE INTRODUCTION ............................................................................................................... 1
1.1 PURPOSE AND APPLICABILITY ........................................................ | [
-0.001046523,
0.01816868,
0.051043686,
0.022105807,
0.01711492,
-0.0054193386,
-0.021503659,
-0.00070274813,
-0.010022303,
0.024155429,
0.030871704,
-0.0376343,
0.02406279,
-0.0054367087,
0.01286514,
-0.025591321,
0.027351448,
0.03221496,
0.032400236,
0.006913131,
0.032956064... | 64 |
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations:
SP 800-53 Revision 4 has been updated to reflect the evolving technology and threat space. Example areas include issues particular to mobile and cloud computing; insider threats; applica... | [
-0.012614118,
0.006695367,
0.047491215,
0.019109448,
0.023145495,
-0.008913428,
0.015708813,
-0.010666696,
0.021156888,
0.033347398,
0.014037914,
0.0018194572,
-0.02586365,
0.021768767,
-0.02586365,
-0.048856173,
0.023027826,
-0.005471609,
0.027252143,
-0.001123739,
0.0262637... | 65 |
..................................................... 50 | APPENDIX C MAPPINGTABLES ....................................................................................................
50 |
| APPENDIXD ADVERSARY EFFECTS........................................................................ | [
-0.005496149,
0.020427067,
0.081928805,
0.012198349,
0.0205649,
0.021571092,
0.013549128,
0.0005315241,
-0.028338766,
0.029469008,
0.03724287,
-0.025885312,
0.013700745,
0.0099447565,
0.039889295,
-0.007339685,
0.02660205,
0.011130133,
0.015106657,
0.014114249,
0.005127442,
... | 66 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
............................................ 5 |
| 2.1 DEVELOPMENTAPPROACH .............................................................................. | [
0.017698973,
0.028635034,
0.051500123,
-0.015874062,
0.06086622,
0.006450934,
-0.010721365,
0.015390996,
-0.04119473,
0.016799936,
0.02444847,
-0.001623636,
0.008198691,
0.030728318,
0.014787164,
-0.017953925,
0.04535446,
0.004968192,
-0.03308997,
0.03228486,
0.038135316,
0... | 67 |
| ........................................................................................................
22 |
| 3.13 SYSTEMANDCOMMUNICATIONSPROTECTION ..................................................................... | 23 ... | [
0.018712983,
0.018425753,
0.046157733,
-0.017851295,
-0.018009271,
0.011273746,
0.01239394,
-0.022432601,
-0.02302142,
-0.008609695,
0.008286563,
-0.006275958,
0.009485744,
-0.0148066655,
0.030072898,
-0.00017985485,
0.021700166,
0.033404756,
-0.008810756,
0.045611996,
0.0144... | 68 |
.................................................................................. 4
1.3 RELATED PUBLICATIONS AND ASSESSMENT PROCESSES ...............................................................
4
1.4 ORGANIZATION OF THIS PUBLICATION ................................................................................. | [
0.018476287,
0.006189848,
0.06984852,
-0.006434644,
0.016063295,
0.021600354,
0.0016582031,
0.0031969224,
0.0030220677,
-0.0043043336,
0.03886432,
-0.049052503,
0.009039976,
-0.021052476,
0.008690266,
-0.0073497156,
0.032965895,
0.031263977,
0.033129092,
-0.0019219419,
0.0155... | 69 |
n the risk tolerance of the organizations or communities of interest developing the overlays. General guidance on overlays is provided in section 3.3 and an overlay template is provided in Appendix I.
The template is included as an example only-organizations may choose to use other formats or modify the format in this ... | [
0.0027670853,
-0.0044724997,
0.057323493,
0.004071424,
-0.011391898,
-0.013393906,
0.014465689,
-0.032490503,
-0.008446182,
0.003835497,
-0.0032878097,
0.0080619585,
0.007697957,
-0.0021519903,
0.016717104,
-0.015112802,
0.07021184,
-0.020087488,
0.020208823,
0.026477737,
-0.... | 70 |
nformation, including inconsistent markings, inadequate safeguarding, and needless restrictions, both by standardizing procedures and by providing common definitions through a CUI Registry [NARA CUI].
The CUI Registry is the online repository of information, guidance, policy, and requirements on handling CUI, including... | [
-0.012287515,
0.019476263,
0.03390552,
0.037347835,
0.020731542,
0.014610432,
0.021339772,
-0.024704441,
-0.0073634507,
0.037347835,
0.031317312,
-0.0028162934,
-0.026037369,
-0.010106951,
0.0035102565,
-0.0061275815,
0.0053025903,
-0.0027952641,
0.0031834953,
0.0059658187,
0... | 71 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
............................................ 5 |
| 2.1 DEVELOPMENTAPPROACH .............................................................................. | [
0.017687652,
0.02863843,
0.05150623,
-0.015889363,
0.06081976,
0.006411439,
-0.010736057,
0.015379401,
-0.041172776,
0.016801927,
0.024437947,
-0.0016137635,
0.008192953,
0.03070512,
0.014775498,
-0.017942633,
0.04538668,
0.004952006,
-0.033093892,
0.03231553,
0.038112998,
... | 72 |
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations:
Information technologySecurity techniques-Information security management systems-Requirements and ISO/IEC 15408, Information technology -- Security techniques -- Evaluation criteria for... | [
-0.04415619,
0.0071929963,
0.01652334,
-0.0060303733,
0.04035124,
-0.0075864093,
0.014268557,
0.017662477,
-0.0026981076,
0.008420209,
0.016311955,
-0.007968078,
-0.040867962,
-0.0057191662,
0.011450076,
-0.045166146,
-0.0106749935,
0.0034937412,
-0.0027259989,
0.0020199108,
... | 73 |
description of assessment methods and objects is provided in Appendix C. Figure 1 illustrates an example of an assessment procedure for the CUI enhanced security requirement 3.1.3e from [SP 800-172].
FIGURE 1: ASSESSMENT PROCEDURE FOR CUI ENHANCED SECURITY REQUIREMENT
<!-- image -->
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\... | [
-0.0025200052,
0.016067302,
0.07124007,
-0.0021189828,
0.008152473,
-0.011453069,
0.0039112065,
-0.021612303,
0.03482789,
0.046604417,
0.03870939,
-0.038102083,
0.0171631,
-0.0018483339,
0.013189183,
-0.019103851,
0.010330866,
0.006604493,
-0.022774113,
0.020767352,
0.0211370... | 74 |
According to Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations:
<!-- image -->
## NIST Special Publication 800 NIST SP 800-171r3
## Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
Ron Ross Victoria Pillitteri
This publication is available ... | [
-0.029872952,
-0.008530106,
0.020337235,
-0.014043381,
0.03282649,
0.006888078,
-0.004940148,
0.016666407,
-0.025625478,
-0.012608805,
0.038677316,
0.010667907,
-0.0056715007,
-0.017439952,
0.02478161,
-0.0007616794,
-0.005973887,
0.00741198,
-0.02694754,
0.04660968,
-0.00026... | 75 |
traditional Information Technology (IT) systems, Operational Technology (OT) systems, Internet of Things
6 [32 CFR 2002] was issued on September 14, 2016, and went into effect on November 14, 2016.
7 The definition of a critical program may vary from organization to organization. For example, the Department of Defens... | [
-0.014965037,
-0.005012132,
0.039825212,
0.005188831,
0.04507181,
-0.0027965999,
-0.008005819,
0.0024313089,
0.007407761,
0.026504835,
0.034442693,
-0.0062014516,
-0.03900968,
-0.03033784,
0.029821336,
0.012865039,
0.006639801,
-0.015766978,
-0.017887365,
0.029196095,
0.02335... | 76 |
According to Assessing Security Requirements for Controlled Unclassified Information:
The purpose of this publication is to provide procedures for assessing the security requirements in NIST Special Publication (SP) 800-171, Protecting Controlled Unclassified Information (CUI) in Nonfederal Systems and Organizations [... | [
-0.014503748,
0.045798704,
0.050942406,
0.0035641135,
0.034225382,
0.008315234,
0.024729323,
0.027523736,
0.01732289,
0.010794349,
0.037638027,
-0.014380101,
0.013168364,
0.021032289,
0.04203985,
-0.048716765,
0.0071467743,
0.0277463,
-0.040704466,
0.016865399,
0.04463643,
... | 77 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
ance. The decision to select a particular set of enhanced security requirements will be based on the mission and business needs of federal agencies and guided and informed b... | [
-0.028788645,
-0.0015861555,
0.057873826,
0.017841546,
0.043368302,
0.018953554,
-0.008092945,
0.00072550785,
-0.03521358,
0.019867871,
0.014900904,
-0.018558174,
-0.030320745,
0.026811743,
0.019843161,
-0.017680923,
0.01664305,
-0.015073882,
-0.04465329,
0.003277334,
0.04247... | 78 |
ed security services provider (MSSP), talk to others in your industry to get their perspective on vendors they have worked with and always thoroughly review any contract or agreement prior to signing.
A helpful resource, assembled by member company participants of the National Defense Information Sharing& Analysis Cent... | [
-0.03928658,
-0.039415475,
0.068416394,
-0.021898918,
0.00500427,
-0.01781301,
-0.031707674,
0.017684117,
0.03967326,
0.03727585,
0.027943999,
-0.028691579,
0.0056616245,
-0.020648656,
0.01470669,
-0.00016796366,
-0.01578939,
0.0058517414,
-0.0352909,
-0.023432745,
0.02688707... | 79 |
According to Assessing Security Requirements for Controlled Unclassified Information:
<!-- image -->
## NIST Special Publication 800 NIST SP 800-171Ar3
## Assessing Security Requirements for Controlled Unclassified Information
Ron Ross Victoria Pillitteri
This publication is available free of charge from:
https:/... | [
-0.02332809,
0.010972947,
0.045809936,
-0.029646702,
0.041042767,
0.0037587278,
0.0039843926,
-0.008525895,
-0.013025085,
-0.008342543,
0.030126238,
0.0051761842,
-0.010451097,
0.0011741617,
0.024315372,
-0.0036670514,
-0.0021508667,
0.002505231,
-0.020662425,
0.045330398,
0.... | 80 |
According to Assessing Security and Privacy Controls in Information Systems and Organizations:
NTROL ASSESSMENTS ..................................................... 30
3.4 ANALYZE ASSESSMENT REPORT RESULTS .....................................................................................
32
3.5 ASSESS SECURIT... | [
-0.0012594354,
0.046386164,
0.052470393,
0.017023673,
0.0224143,
0.015198404,
0.013032419,
0.0015697312,
-0.004806541,
0.022961881,
0.035045158,
-0.029423332,
0.0344124,
-0.0009301265,
-0.0015271415,
-0.042175878,
0.012886398,
0.04056964,
0.021805877,
0.018191844,
0.02321742,... | 81 |
According to Zero Trust Architecture:
forma estricta antes de permitir el acceso . Se trata de un ciclo constante de acceso, escaneo y evaluación de amenazas, adaptación y reevaluación continua de la confianza en permanente comunicación.
Así, se espera que la empresa que implemente una ZTA cuente con una gestión de la... | [
0.022867287,
0.05811036,
0.05020102,
0.02322786,
0.037243668,
-0.0077406815,
-0.014899794,
0.04747928,
-0.033568155,
0.026217123,
-0.0072754263,
0.009287654,
0.008037281,
-0.023041757,
-0.0035068602,
0.0036057269,
-0.011067255,
0.0051265294,
-0.024449155,
-0.0044170152,
-0.00... | 82 |
According to A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Cloud Environments:
There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication... | [
-0.0057982365,
-0.00015926437,
0.054595124,
-0.00024796117,
0.014559532,
-0.009818639,
0.010816721,
0.042717937,
-0.015457805,
-0.011577759,
-0.011215954,
0.0002906526,
-0.022768762,
0.0036086927,
-0.028420404,
-0.003755286,
0.0039455458,
-0.03972369,
-0.004825106,
0.02572558,
... | 83 |
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations:
SP 800-53 Revision 4 has been updated to reflect the evolving technology and threat space. Example areas include issues particular to mobile and cloud computing; insider threats; applica... | [
-0.010951821,
0.0129095595,
0.05177643,
0.017239617,
0.015754038,
-0.0012358226,
0.014533332,
-0.0006996037,
-0.0073472783,
0.016571682,
0.003126624,
0.0067369244,
-0.04240232,
0.034364074,
-0.009132275,
-0.04260961,
0.039868776,
0.0043444526,
0.0096217105,
0.00882134,
-0.005... | 84 |
According to Security and Privacy Controls for Information Systems and Organizations:
............................................................. 16
3.1 ACCESS CONTROL ..................................................................................................................
18
3.2 AWARENESS AND TRAINING ... | [
-0.003994667,
0.032690182,
0.06019809,
0.00016307058,
0.03098893,
0.0017863129,
0.01858289,
0.015730023,
-0.010443061,
0.023581948,
0.04768736,
-0.013976427,
0.019760678,
-0.0031538566,
0.019734506,
-0.026317036,
0.02160588,
0.033946488,
0.024000717,
0.024118496,
0.0160441,
... | 85 |
According to Security and Privacy Controls for Information Systems and Organizations:
CHAPTER ONE INTRODUCTION ...................................................................................................... 1
1.1 PURPOSE AND APPLICABILITY ........................................................................ | [
-0.0026053197,
0.001176266,
0.04933011,
0.013922314,
0.035629902,
-0.0145652415,
-0.013910624,
0.018679982,
-0.036471553,
0.025202777,
0.016575852,
-0.041124012,
0.014156106,
-0.012367597,
0.013314455,
-0.016529094,
0.047506534,
0.041357804,
0.025226157,
0.036985897,
0.033782... | 86 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
| CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION....................... | [
0.02862907,
0.007844837,
0.05521508,
-0.015349164,
0.042825736,
0.0015871389,
-0.024582235,
0.011682128,
-0.052229065,
0.017352937,
0.016265923,
0.0012130685,
-0.011708321,
0.02415005,
0.024647718,
-0.014615756,
0.032950934,
0.013856156,
-0.026009759,
0.02345593,
0.028105209,... | 87 |
According to A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Cloud Environments:
| Executive Summary................................................................................................................. 1 ... | [
0.0023762074,
0.008735113,
0.04566983,
0.022240136,
0.06293014,
-0.029389165,
-0.04359393,
0.024817519,
-0.019371193,
0.023651281,
-0.035826795,
-0.029179243,
0.0069274465,
-0.004906941,
-0.029482465,
-0.0049011097,
0.009125803,
-0.007889592,
0.005280137,
0.045040064,
0.02428... | 88 |
Romine Thomas Michelli Director, Information Technology Laboratory Chair-Defense Community Donna Dodson Susan Dorr-Intelligence Community Co-Chair Cybersecurity Advisor, Information Technology Laboratory Matt Scholl Vicki Michetti Tri-Chair-Defense Community Chief, Computer Security Division Kevin Stine Chris Johnson C... | [
-0.010415895,
0.00724584,
0.06040087,
-0.018425945,
0.017732495,
0.00018364472,
0.0028569414,
0.044267554,
-0.01152683,
-0.008010049,
0.034191307,
0.020817637,
0.043220304,
0.0065736184,
0.009984258,
0.023251787,
-0.02626617,
-0.019826995,
-0.010826304,
0.025799153,
0.0063047... | 89 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
| Access Control | Maintenance | Security Assessment and Monitoring |
|-----------------------------------|---------------------|-------------------------... | [
-0.007580421,
0.025086107,
0.074637994,
0.012865624,
0.015545446,
-0.007791333,
0.0029775794,
0.026723776,
0.007890586,
0.014937524,
0.050643664,
0.004075562,
0.0066933506,
-0.00088939676,
0.024006734,
-0.015706731,
-0.040768027,
0.026847841,
-0.014093876,
0.028758455,
0.0377... | 90 |
According to Assessing Security and Privacy Controls in Information Systems and Organizations:
NTROL ASSESSMENTS ..................................................... 30
3.4 ANALYZE ASSESSMENT REPORT RESULTS .....................................................................................
32
3.5 ASSESS SECURIT... | [
-0.0012396731,
0.04641093,
0.052470874,
0.017048167,
0.02239017,
0.015174207,
0.013056876,
0.0015378031,
-0.004800501,
0.022998597,
0.03506982,
-0.029472278,
0.034437053,
-0.0009970622,
-0.001514987,
-0.042151928,
0.012886516,
0.040570013,
0.021806078,
0.018192014,
0.02319329... | 91 |
According to Assessing Security Requirements for Controlled Unclassified Information:
blication 800-series reports on ITL's research, guidelines, and outreach efforts in information system security, and its collaborative activities with industry, government, and academic organizations.
- System development life cycle ... | [
-0.0005125435,
0.0063250046,
0.0818574,
-0.03641707,
0.008886164,
-0.012724788,
0.01086156,
-0.0012977165,
-0.017597847,
0.0037233403,
0.042773236,
-0.018669669,
0.011827447,
-0.021461396,
0.02062637,
-0.037289485,
-0.0025580437,
0.015528977,
-0.04820713,
0.028789677,
0.02642... | 92 |
According to A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Cloud Environments:
- Sidecar - Beside each application instance to intercept all traffic into and out of the application and handles east-west internal communication between services in the infrastructure. This is th... | [
-0.01393048,
0.0028824303,
0.07094091,
0.019692302,
0.039870832,
-0.037974536,
-0.058833793,
0.019011581,
0.00075859425,
0.011329152,
0.013626587,
-0.0124353245,
0.0011601136,
-0.014343776,
-0.0616053,
-0.010855078,
-0.007117187,
0.008849381,
-0.02155213,
0.050178904,
0.02209... | 93 |
According to Zero Trust Architecture:
CDM System (sistema CDM). Industry Compliance (cumplimiento de la industria). Threat Intelligence (inteligencia sobre amenazas). Activity Logs (registros de actividades). Control Plane (plano de control). Policy Engine (motor de políticas). Policy Administrator (a... | [
0.016921269,
0.027687082,
0.059411347,
0.0068283174,
0.015413556,
0.003856504,
-0.037555747,
0.024771342,
-0.01870311,
0.024995629,
0.028459629,
-0.017058333,
0.024958247,
-0.02154409,
0.008205195,
0.013257901,
-0.03396714,
0.01698357,
0.0072644325,
0.029954882,
0.033369042,
... | 94 |
According to Assessing Security Requirements for Controlled Unclassified Information:
| Access Control | Maintenance | Security Assessment and Monitoring |
|-----------------------------------|---------------------|--------------------------------------|
| Awareness and Training ... | [
0.021735502,
0.082242444,
0.028384322,
-0.008023978,
0.04331079,
0.030440385,
0.011688841,
0.014539288,
0.03305719,
-0.025700763,
0.042483028,
0.003075747,
0.017943805,
0.005370458,
0.008003952,
-0.038771436,
-0.03025347,
0.020453801,
-0.04750302,
0.028010493,
0.027503153,
... | 95 |
scribed in a similar manner to those of Appendix F (Security Controls) and Appendix G (Information Security Programs Organization-Wide Information Security Program Management Controls). SP 800-53 Rev.
4 reminds readers to view the privacy controls in Appendix J from the same perspective as the Program Management contro... | [
-0.0006034462,
0.017487327,
0.046980098,
0.0036947348,
-0.011530177,
-0.0017838896,
0.004091878,
0.0055307085,
0.014609665,
0.007669423,
0.0084702205,
-0.004186281,
0.008626473,
0.034427766,
0.010149941,
-0.023281712,
0.06817844,
0.006058063,
0.030859986,
0.019661848,
0.03346... | 96 |
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations:
3.1.6. 3.1.6. | [
-0.0050110924,
0.018847138,
0.05055526,
-0.000022684335,
0.060330592,
-0.01827938,
-0.0040452844,
0.012972064,
-0.033349685,
0.026339091,
0.0016353935,
-0.00051877456,
-0.0052764583,
-0.025117176,
0.007886916,
-0.0042551085,
0.045445424,
-0.01095405,
-0.043445926,
0.0022432662,... | 97 |
rses, and awareness posters. The resources will likely need to be customized to meet your own unique business needs, but they offer a starting point. Resources can be found in the resources box below.
## Related Resources:
- View all SP 800-171 Awareness and Training Requirements and Assessment Procedures
- NIST Free ... | [
-0.028131064,
0.042316332,
0.062826514,
-0.00005381545,
0.006053743,
-0.022778131,
0.008599907,
0.03620272,
0.036850706,
0.03417424,
0.05648751,
-0.030539881,
0.00833226,
-0.022735871,
0.04482376,
-0.0042506503,
-0.004211912,
0.030877963,
-0.030004589,
0.043358743,
0.02608849... | 98 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
ent, or possibly with other organizations like municipal governments, prime contractors, universities, etc., you will likely be required to demonstrate you are taking adequate measure... | [
-0.008680649,
0.0029951967,
0.045077033,
0.015640076,
0.018513298,
-0.011296364,
-0.0037812663,
0.022660492,
-0.04431807,
0.012116316,
0.049088698,
0.02134586,
3.2426433e-7,
-0.0222268,
0.016697206,
-0.0052890293,
-0.01431189,
-0.008253732,
-0.031876482,
0.012814292,
0.047760... | 99 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.