text stringlengths 51 3.17k | embedding listlengths 1.54k 1.54k | example_idx int64 0 994 |
|---|---|---|
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations:
SP 800-53 Revision 4 has been updated to reflect the evolving technology and threat space. Example areas include issues particular to mobile and cloud computing; insider threats; applica... | [
-0.010951821,
0.0129095595,
0.05177643,
0.017239617,
0.015754038,
-0.0012358226,
0.014533332,
-0.0006996037,
-0.0073472783,
0.016571682,
0.003126624,
0.0067369244,
-0.04240232,
0.034364074,
-0.009132275,
-0.04260961,
0.039868776,
0.0043444526,
0.0096217105,
0.00882134,
-0.005... | 100 |
## NIST Publicación especial 800-207
## Arquitectura de confianza cero
Scott Rose Oliver Borchert Stu Mitchell Sean Connelly
Esta publicación se encuentra disponible en inglés de forma gratuita en https://doi.org/10.6028/NIST.SP.800-207
## S E G U R I D A D I N F O R M Á T I C A
## NIST
Natio... | [
0.0024894988,
-0.014012189,
0.044116598,
-0.0149338795,
0.001796674,
-0.011452629,
-0.025408769,
-0.0050225914,
-0.06307353,
-0.030764539,
0.022755794,
-0.006532794,
-0.023204185,
-0.020924868,
0.034501124,
0.049248174,
-0.01762422,
-0.0052934936,
0.0070932815,
0.017997878,
-... | 101 |
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations:
3.1.2. 3.1.2. 3.1.2. | [
-0.010929853,
0.015952673,
0.05152996,
-0.0057166815,
0.06508789,
-0.018212328,
-0.0067175613,
0.011335117,
-0.030726396,
0.032986052,
0.0049614166,
-0.0025666733,
-0.0071412465,
-0.018605312,
0.0033372894,
-0.011660556,
0.04349836,
-0.017438643,
-0.039740454,
0.0070000184,
0... | 102 |
sions. This documentation is essential when examining the security considerations for organizational information systems with respect to the potential impact on an organization's mission and business.
The resulting tailored baseline set of security controls and the supporting rationale for the selection decisions (incl... | [
-0.011124856,
0.008030369,
0.06650204,
-0.0022473268,
-0.009089319,
0.0076656197,
0.0018193346,
-0.002475295,
0.018766943,
0.025297133,
0.029579997,
-0.0076656197,
-0.01910816,
-0.034992408,
0.003129785,
-0.01731971,
0.024497038,
0.016543148,
0.006177207,
-0.021202527,
0.0289... | 103 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
The National Institute of Standards and Technology (NIST) Information Technology Laboratory (ITL) promotes the U.S. economy and public welfare by providing technical leaders... | [
-0.0055062273,
-0.01550315,
0.0562983,
-0.015664643,
0.046633676,
-0.026708152,
-0.019565275,
0.016372718,
-0.06385112,
-0.009260897,
0.018882042,
0.027130514,
-0.043428697,
-0.00453728,
0.031602576,
-0.015850978,
-0.0070000202,
0.012708112,
-0.0057888366,
0.038633652,
0.0465... | 104 |
blication 800-series reports on ITL's research, guidelines, and outreach efforts in information system security, and its collaborative activities with industry, government, and academic organizations.
## Patent Disclosure Notice
NOTICE: ITL has requested that holders of patent claims whose use may be required for comp... | [
0.008201354,
0.003141513,
0.064167075,
-0.03601377,
0.0009399474,
-0.032912362,
-0.031522077,
0.0066239135,
-0.042377006,
-0.02093451,
0.031629022,
-0.025292521,
0.011911013,
-0.028474139,
0.017164692,
0.00036302858,
0.050665252,
-0.011342867,
-0.016375972,
0.050852407,
0.008... | 105 |
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations:
3.1.8. 3.1.8. | [
-0.008925056,
0.020652816,
0.047982298,
-0.000978611,
0.058894157,
-0.014773365,
-0.0052846544,
0.013888956,
-0.030518334,
0.030941855,
0.0063496823,
-0.0015461585,
-0.0053843064,
-0.020441055,
0.004275681,
-0.00929875,
0.04095685,
-0.014997582,
-0.04145511,
0.0021144846,
0.0... | 106 |
tise, and understanding. Appendix E provides three tables that identify specific assurance-related controls that are included in the low-, moderate-, and high-impact baselines described in Appendix D.
The controls described assist organizations in defining the controls needed to satisfy minimum assurance requirements. ... | [
-0.02884311,
0.005428479,
0.08991821,
0.010925991,
0.0005126461,
-0.013806537,
0.011095435,
-0.01940446,
0.0054002386,
0.022655271,
0.0004494969,
-0.017120106,
-0.004383575,
-0.0047099115,
0.012450986,
-0.0404155,
0.047946338,
0.01248864,
0.012739668,
0.020006927,
0.026006494... | 107 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
............................................ 5 |
| 2.1 DEVELOPMENTAPPROACH .............................................................................. | [
0.017715218,
0.028639602,
0.051454652,
-0.015903434,
0.060768563,
0.0064553176,
-0.010763337,
0.01538003,
-0.0412013,
0.016789194,
0.024465788,
-0.0016071191,
0.008179868,
0.030706376,
0.014802943,
-0.017916527,
0.045388535,
0.004989115,
-0.033095248,
0.032343693,
0.03808772,... | 108 |
and specificity needed by organizations to clearly define their CUI security requirements, given the diverse nature of their missions, business functions, operational environments, and risk tolerance.
ODPs support consistent security assessments in determining whether security requirements have been satisfied. If a fed... | [
-0.02541161,
-0.013419917,
0.079333805,
0.014416979,
0.007161331,
-0.013675919,
-0.0037019297,
-0.0069592237,
0.035597812,
0.046107385,
0.0323102,
0.00017526482,
-0.028672272,
-0.030181339,
0.030935872,
-0.03015439,
-0.0023680225,
0.0020985461,
-0.023942964,
-0.0014450663,
0.... | 109 |
and communications. Therefore, CUI that is processed, stored, or transmitted by any of the above systems related to a critical program or high value asset requires additional protection from the APT.
## 1.1 PURPOSE AND APPLICABILITY
The purpose of this publication is to provide federal agencies with a set of enhance... | [
-0.014394797,
0.005963824,
0.07504092,
0.031114528,
0.021666396,
0.0059669157,
-0.0010844019,
0.020231863,
-0.01720203,
0.029828396,
0.018562363,
0.006056574,
-0.010369448,
-0.0035399578,
-0.0022244537,
-0.0034008329,
0.040958393,
0.0030452912,
-0.023904763,
-0.0022244537,
0.... | 110 |
4. An Istio Authorization Policy that allows Service 1 to Service 2 on port 443 but only allows it to execute the GET HTTP verb on the '/public' path........................................15 Fig. 5.
Policy | Deployment for a Three-tier ... | [
0.0054905773,
-0.0026690306,
0.07229859,
-0.021447942,
0.047608927,
-0.024199212,
-0.044331327,
-0.0028335087,
0.02208193,
0.022644145,
0.024641806,
-0.009354317,
0.0016432855,
-0.022464715,
-0.031651564,
-0.0047997693,
0.0042704493,
-0.011064889,
0.012512296,
0.022656107,
0.... | 111 |
ores disponibles para el propósito. En esta publicación puede haber referencias a otras que actualmente están siendo desarrolladas por NIST de acuerdo con sus responsabilidades estatutarias asignadas.
La información contenida en esta publicación, incluidos conceptos y metodologías, puede ser utilizada por los or... | [
0.017790603,
0.029861895,
0.047601886,
-0.02542057,
0.012020678,
-0.014892987,
-0.013855413,
0.032544404,
-0.021055166,
-0.01914451,
0.011090657,
0.026344264,
-0.02996312,
-0.035201605,
0.006238099,
0.027710825,
-0.0314056,
-0.023585835,
-0.016208936,
0.02144742,
0.007288327,... | 112 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
| CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION....................... | [
0.02867414,
0.007869022,
0.055200994,
-0.015305968,
0.042841,
0.0015891889,
-0.024628337,
0.011666054,
-0.052241925,
0.017374696,
0.016248679,
0.0011963925,
-0.011711881,
0.024143888,
0.024667617,
-0.014638214,
0.03294253,
0.013839528,
-0.026042404,
0.02346304,
0.02809804,
... | 113 |
According to Assessing Security Requirements for Controlled Unclassified Information:
| Access Control | Maintenance | Security Assessment and Monitoring |
|-----------------------------------|---------------------|--------------------------------------|
| Awareness and Training ... | [
0.003231682,
0.040286213,
0.05783142,
0.023418713,
0.034914717,
0.006275111,
0.022377046,
-0.007185002,
-0.0011326575,
0.0064068884,
0.045231,
0.0073795305,
0.0005074996,
0.014646109,
0.020494511,
-0.061445884,
0.0061652963,
0.01248747,
-0.024661185,
-0.005406008,
0.039934807... | 114 |
## Table of Contents | 1 | Introduction ............................................................................................................1 | |------------------------------------------------------------------------------------------------------------|----------------------------------------------------------... | [
-0.0062529766,
0.042053513,
0.058688223,
-0.03157005,
0.0066838036,
-0.0064265043,
-0.011799876,
0.0028332865,
-0.02096692,
0.021038724,
0.000721411,
0.0013223998,
-0.030205768,
0.010974124,
0.020739539,
-0.023910904,
0.01053133,
-0.020009525,
-0.0021346884,
0.021948248,
0.00... | 115 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
<!-- image -->
<!-- image -->
Howard Lutnick, Secretary of Commerce
<!-- image -->
Protecting Controlled Unclassified Information (CUI): NIST Special Publication 800-171, Revision... | [
-0.029982954,
-0.012517091,
0.02689492,
0.02363533,
0.017736396,
-0.031091478,
-0.009640206,
0.03977492,
-0.014358034,
0.012748034,
0.038771972,
0.002870287,
-0.026789347,
-0.007093238,
0.011560329,
-0.0057768654,
-0.012761231,
-0.0023374695,
-0.00986455,
0.027449183,
0.03322... | 116 |
According to Incident Response Recommendations and Considerations for Cybersecurity Risk Management_ A CSF 2.0 Community Profile:
ts, guidelines, and procedures, where they exist, remain operative. For planning and transition purposes, federal agencies may wish to closely follow the development of these new publicatio... | [
-0.00783296,
-0.0067733983,
0.06781199,
0.012227219,
0.039054297,
-0.0013000765,
0.026599564,
0.0014780244,
-0.009653067,
0.050962996,
0.023011353,
0.012708247,
-0.008391993,
0.02685958,
-0.004368257,
-0.016614977,
0.020528207,
-0.0120062055,
-0.03044779,
-0.010140596,
-0.003... | 117 |
<!-- image -->
## NIST Special Publication NIST SP 800-207A
## A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Location Environments
Ramaswamy Chandramouli Zack Butcher
This publication is available free of charge from:
https://doi.org/10.6028/NIST.SP.800-207A
<!-- image -... | [
-0.00060948305,
0.00020762486,
0.021188764,
-0.014605987,
0.017890174,
-0.021246381,
-0.00749025,
0.022542771,
-0.03658699,
-0.04364511,
0.018106239,
-0.002383916,
-0.028290097,
-0.020727826,
-0.0053043934,
0.0047066137,
-0.014793243,
0.0023262987,
0.0069572898,
0.04517197,
0... | 118 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
systems, but such standards and guidelines shall not apply to national security systems without the express approval of the appropriate federal officials exercising policy a... | [
0.005651286,
0.016780078,
0.037313778,
-0.011518057,
0.02336977,
0.00050482736,
-0.023467086,
-0.011949029,
-0.026372667,
0.0049665975,
0.02512146,
0.021075891,
-0.027874116,
-0.00428886,
0.0053419597,
-0.0070415162,
-0.00080807135,
-0.017169343,
-0.021381741,
0.0153898485,
0... | 119 |
According to A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Cloud Environments:
- A built-in infrastructure for (a) providing service identities, (b) service discovery, and (c) external policy-based authorization engines in which policies incorporate contextual variables. Poli... | [
0.013616745,
0.019416692,
0.062057037,
0.04427531,
0.07308409,
-0.011116563,
-0.049550157,
0.03711488,
0.00312672,
0.006342945,
-0.011868408,
-0.010824179,
0.035014488,
-0.0212426,
-0.03310504,
-0.01412991,
-0.013795757,
0.0056149685,
0.022615016,
0.014523733,
0.02950096,
0... | 120 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
<!-- image -->
<!-- image -->
Howard Lutnick, Secretary of Commerce
<!-- image -->
Protecting Controlled Unclassified Information (CUI): NIST Special Publication 800-171, Revision... | [
-0.029982954,
-0.012517091,
0.02689492,
0.02363533,
0.017736396,
-0.031091478,
-0.009640206,
0.03977492,
-0.014358034,
0.012748034,
0.038771972,
0.002870287,
-0.026789347,
-0.007093238,
0.011560329,
-0.0057768654,
-0.012761231,
-0.0023374695,
-0.00986455,
0.027449183,
0.03322... | 121 |
According to Zero Trust Architecture:
| | | 3.2.2. | [
0.0068734917,
0.04320097,
0.040811356,
0.008028023,
0.031306606,
-0.0069943145,
-0.033212926,
0.013699996,
-0.021050068,
0.028863294,
-0.0016042622,
-0.0029400287,
0.0007056404,
0.012981771,
-0.0043630563,
-0.009773246,
0.049188424,
-0.016230568,
-0.016807836,
0.036220077,
0.... | 122 |
efore the completion of such companion publications. Thus, until each publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative.
For planning and transition purposes, federal agencies may wish to closely follow the development of these new publicat... | [
0.014710637,
0.017966378,
0.064423814,
-0.054962233,
0.005847046,
-0.020451372,
0.0062490306,
0.02333503,
0.009541316,
-0.0075214277,
0.02787978,
0.03165378,
-0.035294898,
-0.015787024,
0.015694004,
0.00918252,
-0.019069344,
-0.005740736,
0.0013371796,
0.032477684,
0.02571371... | 123 |
According to Assessing Security Requirements for Controlled Unclassified Information:
| Access Control | Maintenance | Security Assessment and Monitoring |
|-----------------------------------|---------------------|--------------------------------------|
| Awareness and Training ... | [
-0.01806275,
0.060908023,
0.07843319,
-0.0042636963,
0.036206137,
-0.016140895,
0.011322818,
0.047602873,
0.026341511,
0.0031162947,
0.06735901,
0.007385031,
0.034566514,
-0.0034640431,
0.025830807,
-0.034539632,
-0.013016201,
-0.000385547,
-0.027712345,
0.0148103805,
0.04281... | 124 |
According to Assessing Enhanced Security Requirements for Controlled Unclassified Information:
| CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION.......................................................................... | [
0.03428543,
0.038844522,
0.05217921,
-0.014217516,
0.035945676,
0.011424084,
-0.009348775,
-0.00733276,
-0.028461387,
0.021438276,
0.03344213,
-0.0151267,
-0.0030009632,
0.028197855,
0.03136023,
-0.028224207,
0.016655182,
0.024179002,
-0.013222686,
0.018526254,
0.023889117,
... | 125 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
| Access Control | Maintenance | Security Assessment and Monitoring |
|-----------------------------------|---------------------|-------------------------... | [
-0.015209428,
0.01997827,
0.10209138,
0.0027087023,
0.008889122,
-0.00062630797,
-0.009092593,
0.017765528,
0.00027877858,
0.023144782,
0.03225009,
0.005907006,
-0.026044236,
0.0007332095,
0.023704326,
-0.025815332,
-0.015463766,
0.01734587,
-0.008698368,
0.032860503,
0.02491... | 126 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
d, communicated, understood, and enforced. Even if cybersecurity activities are outsourced to an external provider, someone within the business should still be designated to manage cy... | [
-0.011644907,
0.022290196,
0.056653704,
0.0053680814,
0.035441022,
-0.014851476,
0.007964494,
0.0240947,
-0.0094898855,
0.034895774,
0.037466224,
0.017551744,
-0.011365793,
-0.010651779,
0.02522414,
-0.013657127,
-0.016539143,
0.005114931,
-0.014241319,
-0.0047903797,
0.05852... | 127 |
effectiveness of security
and privacy controls associated with systems and their environments of operation and to
provide credible and meaningful inputs to the organization’s risk management process.
A well-
executed assessment helps determine the validity of the controls contained in the organization’s
security and pr... | [
0.015923,
-0.01118743,
0.0501454,
0.0065609193,
-0.011629416,
-0.014442058,
-0.00037454066,
0.00014359187,
0.03225929,
0.033912435,
-0.015107908,
-0.0039405697,
-0.013454763,
-0.0020678663,
-0.007134928,
-0.0277361,
0.01121613,
0.008093523,
0.026565121,
-0.03106535,
0.0229144... | 128 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
Advanced Persistent Threat; Basic Security Requirement; Contractor Systems; Controlled Unclassified Information; CUI Registry; Derived Security Requirement; Enhanced Securit... | [
-0.009854641,
0.009702151,
0.06902696,
0.019709282,
0.030040452,
0.014029044,
0.006677774,
0.0067349575,
-0.04188381,
0.023191126,
0.012853603,
-0.021691646,
-0.02438563,
0.016811978,
0.013800309,
-0.016392631,
0.035885885,
0.0088507505,
-0.030142112,
0.012580392,
0.015287083... | 129 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
........................................................................ | CHAPTERONE INTRODUCTION.............................................................................. | [
0.024662834,
0.011386939,
0.05403475,
-0.014752472,
0.044270717,
-0.00014643141,
-0.02617932,
0.012018808,
-0.052571476,
0.0170272,
0.017386366,
0.001578009,
-0.00804136,
0.025926571,
0.023252768,
-0.015244664,
0.03474613,
0.011998855,
-0.028999448,
0.022853693,
0.028733399,
... | 130 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
- Applying a threat-centric approach to security requirements specification;
- Employing system and security architectures that support logical and physical isolation using ... | [
0.026049037,
0.04729785,
0.06375948,
0.022840193,
0.040436663,
0.013722377,
-0.026414271,
0.030549247,
-0.036158204,
0.027027344,
0.032271065,
0.011283133,
0.004011056,
0.020974888,
0.0011022252,
-0.043515068,
0.02196624,
0.023688057,
-0.016083356,
0.03503641,
0.033471122,
... | 131 |
gns to achieve cyber resiliency and survivability. 4 Unless specified by legislation, regulation, or government-wide policy, the term system is used in this publication instead of information system.
This change reflects a broad-based and holistic definition of systems that includes general-purpose systems, industrial... | [
0.020718997,
0.037999157,
0.085676186,
-0.00022433043,
0.0044674184,
-0.017771423,
-0.02876342,
-0.0022030054,
0.0066750296,
0.048536737,
0.017697733,
-0.028051091,
-0.021099726,
0.019589093,
0.0025714524,
0.00085510383,
-0.0094261,
0.016150257,
-0.009315566,
-0.025250895,
0.... | 132 |
| SYSTEMANDSERVICESACQUISITION FAMILY .........................................................................
| 42 |
| 3.18 ... | [
0.0053870515,
0.006823599,
0.055601213,
-0.02685659,
-0.010404705,
0.013975551,
-0.03603681,
-0.00054169795,
-0.01952336,
-0.0004728634,
0.03094733,
-0.023326788,
-0.004128363,
-0.037870117,
0.043096412,
0.013872941,
0.039977055,
0.018292034,
-0.026022024,
0.032808,
0.0429322... | 133 |
sions. This documentation is essential when examining the security considerations for organizational information systems with respect to the potential impact on an organization's mission and business.
The resulting tailored baseline set of security controls and the supporting rationale for the selection decisions (incl... | [
-0.011142329,
0.008036125,
0.066501,
-0.0022355255,
-0.009100942,
0.007665499,
0.001835484,
-0.0024531952,
0.018754883,
0.025273204,
0.029579531,
-0.007665499,
-0.019096093,
-0.034991857,
0.0031326772,
-0.017331205,
0.024520185,
0.016578186,
0.0061771097,
-0.021202194,
0.0289... | 134 |
According to Risk Management Framework for Information Systems and Organizations_ A System Life Cycle Approach for Security and Privacy:
There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in t... | [
-0.013004304,
0.028909568,
0.05109191,
-0.025395906,
-0.0014215643,
-0.009753228,
0.007690045,
0.02269501,
-0.024208011,
0.01251039,
0.0031823032,
0.012141518,
-0.012304072,
0.014054651,
0.018506125,
-0.035636794,
-0.01320437,
-0.0021397707,
-0.009903277,
0.032585785,
0.03148... | 135 |
e requirements also apply to services, including externally provided services, that process, store, or transmit CUI, or that provide security protections, for the system requiring enhanced protection.
The protection of a specific service to include CUI that is processed, stored or transmitted during the provision of th... | [
-0.010923502,
0.01710924,
0.06797361,
0.0033361278,
0.03060434,
-0.0050331512,
0.021974426,
-0.0007435337,
-0.02222927,
0.052080665,
0.017873768,
-0.014363884,
0.0017795578,
-0.014850403,
0.020619124,
-0.0048738746,
0.040960237,
0.010101054,
-0.010101054,
0.009556617,
0.05462... | 136 |
According to Assessing Enhanced Security Requirements for Controlled Unclassified Information:
| |-----------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------... | [
-0.015357851,
0.047342584,
0.039935593,
0.004376858,
0.03545514,
0.01736499,
-0.008041506,
-0.0026594594,
-0.017118955,
0.005662075,
0.018957753,
-0.012114055,
-0.020058442,
0.021159131,
-0.012269448,
-0.027115801,
0.027038107,
-0.019307382,
-0.0452966,
-0.000536586,
0.043872... | 137 |
According to Assessing Enhanced Security Requirements for Controlled Unclassified Information:
| ASSESSMENT PROCEDURES................................................................................................................
| 3 |
| 2.2 ... | [
0.013672956,
0.053870387,
0.06237624,
-0.019992724,
0.019555507,
0.027584394,
0.0034480493,
-0.0019211033,
-0.002800505,
0.011155648,
0.044993564,
-0.022046316,
0.014984606,
0.028988786,
-0.0051571685,
-0.03651421,
0.0007787921,
0.021158634,
-0.032009557,
-0.00010443929,
0.03... | 138 |
nt security and privacy controls that meet mission and business needs, assess the effectiveness of the controls, authorize the systems for operation, and continuously monitor the systems.
Exercising due diligence and implementing robust and comprehensive information security and privacy risk management pro... | [
0.004533511,
0.040630806,
0.08313135,
0.028237812,
0.028381638,
-0.0017588706,
-0.02021952,
0.0025139563,
-0.0018472634,
0.016599903,
0.0073351194,
-0.014466485,
-0.033894964,
-0.001247989,
0.0175108,
-0.013243965,
-0.006148556,
-0.0027731424,
0.030323287,
-0.024929818,
0.052... | 139 |
According to Assessing Security and Privacy Controls in Information Systems and Organizations:
3.2.4 DEVELOP ASSESSMENT PROCEDURES FOR ORGANIZATION-SPECIFIC CONTROLS
Based on organizational policies, mission or business function requirements, and an assessment
of risk, organizations may choose to develop and implem... | [
-0.0045098276,
-0.0074491594,
0.052846868,
0.022109155,
0.013065056,
0.02250025,
0.007864699,
0.0037948547,
0.01176955,
0.015216084,
-0.0068808477,
-0.02967442,
0.034783114,
-0.0065019736,
0.0031868224,
-0.023416882,
0.036396384,
0.005560898,
0.011586224,
0.0128450645,
0.0395... | 140 |
e of continuous improvement in the organization's risk-related activities, with effective communication among tiers and stakeholders. Figure 1 illustrates the three-tiered approach to risk management.
Figure 1: Risk Management 3-Tiered Approach
<!-- image -->
The NIST Risk Management Framework (RMF), described in NIS... | [
-0.012383115,
0.032615505,
0.06265364,
0.0016709004,
0.009067673,
-0.010028331,
0.0148667665,
0.025047397,
-0.015921148,
0.06963598,
-0.011094427,
-0.008657636,
-0.013988116,
0.00045689827,
0.032943536,
-0.017139543,
0.009255119,
0.0068417587,
0.010813259,
0.035075728,
0.0225... | 141 |
as normas y directrices no se aplicarán a los sistemas de seguridad nacional sin la aprobación expresa de los funcionarios federales apropiados que ejercen la autoridad política sobre dichos sistemas.
Esta directriz es coherente con los requisitos de la Circular A-130 de la Oficina de Gestión y Presupuesto (OMB). Nada ... | [
0.0133409165,
0.029194804,
0.03456566,
-0.0008638336,
0.009706965,
-0.014116981,
-0.03394974,
-0.016864004,
-0.032101966,
-0.023811627,
0.016174167,
0.00487196,
-0.04515956,
-0.048953652,
0.013119184,
0.015706066,
-0.011228297,
-0.039098866,
0.010409118,
0.0069291466,
0.01586... | 142 |
s and disclosure
Preventing disruption in how information is accessed
<!-- image -->
2 SP 800-171 does not explicitly cover integrity and availability so it is not a comprehensive security program.
## Overview
## Structure of SP 800-171
SP 800-171 security requirements are organized into 17 families, as illustrate... | [
-0.047701623,
-0.0023587144,
0.063991845,
-0.0014970292,
0.01693827,
-0.010406934,
0.0060357675,
0.0033482625,
0.022262452,
0.025223155,
0.02035642,
-0.0072683347,
-0.012293905,
0.019047612,
-0.009148953,
-0.021474626,
0.0131770335,
0.01160138,
-0.00014414366,
-0.00053249765,
... | 143 |
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations:
| 1 | Introduction ............................................................................................................1 | |------------------------------------------------------... | [
-0.020964958,
0.03140085,
0.049710244,
-0.014023228,
0.013895108,
-0.007384324,
-0.01210144,
0.0065981383,
-0.021815203,
0.034545593,
0.0038726935,
-0.009981649,
-0.02328275,
0.0076405625,
0.02727774,
-0.035710312,
0.014768648,
0.008811106,
0.009638057,
0.039390825,
0.0194508... | 144 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
| CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION....................... | [
0.028646424,
0.007855509,
0.055250417,
-0.015344428,
0.04283871,
0.0015514632,
-0.024600837,
0.011678524,
-0.052265324,
0.017386861,
0.016247813,
0.0011619608,
-0.011691617,
0.024142599,
0.024653208,
-0.014611247,
0.032993138,
0.013878066,
-0.026001737,
0.02347488,
0.02807035... | 145 |
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations:
The NIST Risk Management Framework (RMF), described in NIST Special Publication 800-37 Revision 1, Guide for Applying the Risk Management Framework to Federal Information Systems: a Secu... | [
-0.018804658,
0.044273976,
0.04562037,
0.0071751666,
0.0104962755,
-0.010081137,
0.026546434,
0.03287449,
-0.017671442,
0.054394383,
-0.009918448,
0.014484973,
-0.015775269,
0.01864758,
0.037115637,
-0.032133974,
0.00605878,
0.008869381,
-0.0018470865,
0.03689124,
0.032986693... | 146 |
. Entre ellas se encuentran Greg Holden, director del proyecto ZTA del Consejo Federal de CIO; Alper Kerman, director del proyecto ZTA del NIST/Centro Nacional de Ciberseguridad; y Douglas Montgomery.
En la traducción, un especial reconocimiento a las personas que colaboraron de alguna u otra forma con la gestión, r... | [
0.02675764,
0.018849103,
0.052757274,
-0.011768056,
0.0051481295,
-0.02660604,
-0.031103546,
0.058366526,
-0.066906735,
-0.03873415,
0.015046435,
0.0049270443,
0.012203909,
-0.048032366,
-0.0006987875,
0.06382418,
-0.016006578,
-0.041008167,
-0.02855159,
0.027212445,
-0.01782... | 147 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
| Access Control | Maintenance | Security Assessment and Monitoring |
|-----------------------------------|---------------------|-------------------------... | [
0.0024202093,
0.03925417,
0.061469004,
0.0060413997,
0.029593237,
0.0016165139,
-0.019122805,
0.028000776,
-0.010994618,
-0.00027432633,
0.033919424,
-0.0013486156,
-0.0044323504,
0.02104703,
0.010550056,
-0.038431395,
-0.016827006,
0.018698148,
-0.009037217,
0.050374854,
0.0... | 148 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
............................................ 5 |
| 2.1 DEVELOPMENTAPPROACH .............................................................................. | [
0.017715218,
0.028639602,
0.051454652,
-0.015903434,
0.060768563,
0.0064553176,
-0.010763337,
0.01538003,
-0.0412013,
0.016789194,
0.024465788,
-0.0016071191,
0.008179868,
0.030706376,
0.014802943,
-0.017916527,
0.045388535,
0.004989115,
-0.033095248,
0.032343693,
0.03808772,... | 149 |
ent, or possibly with other organizations like municipal governments, prime contractors, universities, etc., you will likely be required to demonstrate you are taking adequate measures to protect CUI.
Examples of CUI include:
<!-- image -->
| | When provided as part of a government contract, exam... | [
-0.0075195483,
-0.000009436495,
0.03969197,
0.027618527,
0.01862318,
-0.013774126,
0.008419083,
0.014252003,
-0.021420171,
0.004114669,
0.0475629,
0.008714243,
0.014870434,
-0.025116697,
0.028110461,
-0.008257448,
0.0031167474,
-0.01612135,
-0.03294546,
0.0013905894,
0.036065... | 150 |
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations:
As the risk to an information system's confidentiality, integrity and/or availability increases, the need for additional controls to protect the system may also increase accordingly. SP... | [
-0.037388116,
0.012397242,
0.078262195,
0.001047168,
0.00448326,
-0.010899753,
-0.017834844,
0.011605537,
-0.017761197,
0.016766964,
0.012949594,
0.010912028,
-0.030121615,
0.015134455,
-0.0028906441,
-0.05931037,
0.031422712,
0.019442802,
-0.012777751,
0.015760453,
0.0162146... | 151 |
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations:
3.1.7. 3.1.7. | [
-0.0126268165,
0.018794268,
0.048072584,
-0.0025759824,
0.061910532,
-0.015899977,
-0.004356966,
0.014533572,
-0.029067144,
0.029067144,
0.0053165546,
0.00033267285,
-0.0007810242,
-0.019129658,
0.0059718075,
-0.005934542,
0.04765024,
-0.01204299,
-0.04081822,
0.006471787,
0.... | 152 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
............................................ 5 |
| 2.1 DEVELOPMENTAPPROACH .............................................................................. | [
0.017715218,
0.028639602,
0.051454652,
-0.015903434,
0.060768563,
0.0064553176,
-0.010763337,
0.01538003,
-0.0412013,
0.016789194,
0.024465788,
-0.0016071191,
0.008179868,
0.030706376,
0.014802943,
-0.017916527,
0.045388535,
0.004989115,
-0.033095248,
0.032343693,
0.03808772,... | 153 |
nks to non-NIST sites throughout this publication because they may have information of interest to readers. NIST does not necessarily endorse the views expressed or the facts presented on those sites.
Further, NIST does not endorse any commercial products that may be advertised or available on these sites. ht ps:/
csr... | [
-0.012384674,
0.042894866,
0.04674407,
0.025296636,
0.041497555,
-0.016899576,
-0.045715857,
0.018428711,
-0.032797307,
0.023675226,
0.04481947,
-0.037226524,
-0.031610906,
0.018217796,
0.014948611,
-0.036620144,
0.0045907,
0.025731647,
0.006795422,
0.050856914,
0.014988158,
... | 154 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
The system component inventory includes system-specific information required for component accountability and to provide support to identify, control, monitor, and verify co... | [
-0.013703321,
0.031076044,
0.025913574,
0.010445144,
0.040363427,
-0.016575577,
0.0023107748,
-0.009825142,
-0.057090845,
0.020042531,
0.023686627,
0.01747395,
-0.035960145,
-0.017182928,
0.029456446,
-0.0300891,
0.0106539205,
0.03229074,
-0.076323576,
-0.01414618,
0.04532345... | 155 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
ent, or possibly with other organizations like municipal governments, prime contractors, universities, etc., you will likely be required to demonstrate you are taking adequate measure... | [
-0.008573076,
0.002956525,
0.04524415,
0.015600964,
0.018460914,
-0.011317815,
-0.0037342012,
0.022622075,
-0.04432246,
0.012131071,
0.049120672,
0.021361528,
0.00004140406,
-0.022215448,
0.01669886,
-0.0053369934,
-0.014259092,
-0.008295213,
-0.031852532,
0.012788453,
0.0477... | 156 |
According to Security and Privacy Controls for Information Systems and Organizations:
...................................................................... 14
CHAPTER THREE THE CONTROLS .................................................................................................
16
3.1 ACCESS CONTROL ........... | [
0.0028781448,
0.033307627,
0.05384733,
-0.0044220923,
0.03035536,
0.00031423033,
0.015821123,
0.013852945,
-0.019164503,
0.014824417,
0.033509493,
-0.012332654,
0.019959344,
-0.0011835878,
0.01023831,
-0.022558348,
0.02621714,
0.03323193,
0.028462881,
0.050415635,
0.028891843... | 157 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
............................................ 5 |
| 2.1 DEVELOPMENTAPPROACH .............................................................................. | [
0.017687652,
0.02863843,
0.05150623,
-0.015889363,
0.06081976,
0.006411439,
-0.010736057,
0.015379401,
-0.041172776,
0.016801927,
0.024437947,
-0.0016137635,
0.008192953,
0.03070512,
0.014775498,
-0.017942633,
0.04538668,
0.004952006,
-0.033093892,
0.03231553,
0.038112998,
... | 158 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
............................................ 5 |
| 2.1 DEVELOPMENTAPPROACH .............................................................................. | [
0.017715218,
0.028639602,
0.051454652,
-0.015903434,
0.060768563,
0.0064553176,
-0.010763337,
0.01538003,
-0.0412013,
0.016789194,
0.024465788,
-0.0016071191,
0.008179868,
0.030706376,
0.014802943,
-0.017916527,
0.045388535,
0.004989115,
-0.033095248,
0.032343693,
0.03808772,... | 159 |
According to Assessing Enhanced Security Requirements for Controlled Unclassified Information:
| CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION.......................................................................... | [
0.03428543,
0.038844522,
0.05217921,
-0.014217516,
0.035945676,
0.011424084,
-0.009348775,
-0.00733276,
-0.028461387,
0.021438276,
0.03344213,
-0.0151267,
-0.0030009632,
0.028197855,
0.03136023,
-0.028224207,
0.016655182,
0.024179002,
-0.013222686,
0.018526254,
0.023889117,
... | 160 |
efore the completion of such companion publications. Thus, until each publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative.
For planning and transition purposes, federal agencies may wish to closely follow the development of these new publicat... | [
0.014723705,
0.017979398,
0.06442285,
-0.054961413,
0.0058403146,
-0.02042449,
0.0062323264,
0.023308104,
0.009534529,
-0.007521315,
0.027879363,
0.031653307,
-0.03529437,
-0.015800077,
0.015693769,
0.009189027,
-0.01905577,
-0.0057439725,
0.0013213794,
0.0324772,
0.025726618... | 161 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
d, communicated, understood, and enforced. Even if cybersecurity activities are outsourced to an external provider, someone within the business should still be designated to manage cy... | [
-0.011594072,
0.022162465,
0.05681485,
0.0053199003,
0.035366464,
-0.01478796,
0.008088586,
0.023889242,
-0.009477797,
0.0347952,
0.037495725,
0.017644282,
-0.011418798,
-0.0108345505,
0.025161603,
-0.013593498,
-0.016579654,
0.0051219054,
-0.014294595,
-0.004657753,
0.058424... | 162 |
e of continuous improvement in the organization's risk-related activities, with effective communication among tiers and stakeholders. Figure 1 illustrates the three-tiered approach to risk management.
Figure 1: Risk Management 3-Tiered Approach
<!-- image -->
The NIST Risk Management Framework (RMF), described in NIS... | [
-0.012380432,
0.032491315,
0.06268692,
0.0016588257,
0.009089135,
-0.010061298,
0.014851834,
0.025065398,
-0.015894273,
0.069527194,
-0.011080311,
-0.008685043,
-0.014031937,
0.00034058632,
0.03288955,
-0.017241245,
0.009258971,
0.006799282,
0.010781635,
0.03497443,
0.0224534... | 163 |
s
i
p
u
b
l
i
c
a
t
i
o
n
i
s
a
v
a
i
l
l
a
b
e
f
r
e
e
o
f
c
h
a
r
g
e
f
r
o
m
:
h
t
t
p
s
:
/
/
d
o
i
. o
r
g
/
1
0
. 6
0
2
8
/
N
S
T
S
P
. 8
0
0
-
5
3
r
5
. I
NIST SP 800-53, REV.
5 SECURITY AND PRIVACY CONTROLS FOR ... | [
0.0057022995,
-0.037072536,
0.061569054,
-0.013692802,
0.01800215,
-0.0075686723,
-0.013292215,
0.019021828,
-0.0019513457,
0.015537932,
0.028259613,
-0.018900437,
-0.017795788,
-0.024326574,
0.025540475,
0.0016387663,
0.040325787,
0.04044718,
0.030954473,
0.023950266,
0.0111... | 164 |
NIST does not necessarily endorse the views expressed or the facts presented on those sites. Further, NIST does not endorse any commercial products that may be advertised or available on these sites.
ht ps:/
csrc.nist.gov/projects/protecting-control ed-unclas ified-information
## Introductory Tips for Implementers
<... | [
-0.00553216,
0.0026156236,
0.07422949,
-0.013782452,
0.015052237,
-0.008075035,
-0.0004422752,
-0.0065407124,
0.0070697893,
0.048780885,
0.025488278,
-0.010984958,
-0.021837648,
0.0061868923,
0.01972134,
-0.016189752,
0.010257478,
-0.005366823,
-0.017366948,
0.05073847,
0.014... | 165 |
e of continuous improvement in the organization's risk-related activities, with effective communication among tiers and stakeholders. Figure 1 illustrates the three-tiered approach to risk management.
Figure 1: Risk Management 3-Tiered Approach
<!-- image -->
The NIST Risk Management Framework (RMF), described in NIS... | [
-0.012383115,
0.032615505,
0.06265364,
0.0016709004,
0.009067673,
-0.010028331,
0.0148667665,
0.025047397,
-0.015921148,
0.06963598,
-0.011094427,
-0.008657636,
-0.013988116,
0.00045689827,
0.032943536,
-0.017139543,
0.009255119,
0.0068417587,
0.010813259,
0.035075728,
0.0225... | 166 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
d, communicated, understood, and enforced. Even if cybersecurity activities are outsourced to an external provider, someone within the business should still be designated to manage cy... | [
-0.011871152,
0.022132656,
0.056545366,
0.0051956573,
0.035256475,
-0.014824335,
0.008041748,
0.024001924,
-0.009391774,
0.03471127,
0.037515175,
0.017615257,
-0.011377872,
-0.010774255,
0.025157236,
-0.013643062,
-0.016589755,
0.005257317,
-0.014331057,
-0.004754302,
0.05862... | 167 |
According to Security and Privacy Controls for Information Systems and Organizations:
With a renewed emphasis on the use of trustworthy, secure information systems and supply
chain security, it is essential that organizations express their security and privacy requirements
with clarity and specificity in order to obta... | [
-0.0122281825,
-0.009672776,
0.048487812,
-0.001051966,
0.0110301515,
-0.010499004,
-0.032340948,
-0.012712116,
-0.028280623,
0.027690459,
0.02953177,
-0.06501238,
0.012818346,
-0.009277366,
0.033308815,
-0.023889808,
0.0527842,
0.008309498,
-0.010056382,
0.008634089,
0.06534... | 168 |
According to Assessing Enhanced Security Requirements for Controlled Unclassified Information:
| CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION.......................................................................... | [
0.03428543,
0.038844522,
0.05217921,
-0.014217516,
0.035945676,
0.011424084,
-0.009348775,
-0.00733276,
-0.028461387,
0.021438276,
0.03344213,
-0.0151267,
-0.0030009632,
0.028197855,
0.03136023,
-0.028224207,
0.016655182,
0.024179002,
-0.013222686,
0.018526254,
0.023889117,
... | 169 |
## Assessing Enhanced Security Requirements for Controlled Unclassified Information
RON ROSS VICTORIA PILLITTERI KELLEY DEMPSEY
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-172A
<!-- image -->
## NIST Special Publication 800-172A
## Assessing Enhanced Security Requirements... | [
-0.017489862,
0.045271054,
0.049889997,
-0.022540987,
0.039760735,
0.004595309,
-0.007468643,
-0.014153957,
-0.016787566,
-0.0026690608,
0.027376022,
-0.008137175,
-0.037005574,
0.010750525,
0.025012527,
0.0050612553,
-0.003768086,
0.0037748388,
0.0042948076,
0.051024474,
0.0... | 170 |
vant -based on the systems that personnel have authorized access to, contextualized to the work environments of personnel (e.g., telework, shop floor), and tailored to the specific roles of personnel.
The content should include:
- An understanding of the need for security (why is cybersecurity important to our busines... | [
-0.020327888,
0.04417253,
0.0818444,
0.03487445,
0.024577297,
-0.04249408,
-0.0028157323,
0.05818625,
0.027840948,
0.041401755,
0.040868916,
-0.01826313,
-0.0045924243,
-0.037778437,
0.042547364,
0.0063308184,
0.01334101,
0.011003169,
-0.065965734,
-0.0037132367,
0.03639305,
... | 171 |
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations:
- Authority and Purpose (AP);
- Accountability, Audit, and Risk Management (AR);
- Data Quality and Integrity (DI);
- Data Minimization and Retention (DM);
- Individual Participation and... | [
-0.018484728,
0.035164773,
0.056741346,
0.021138674,
0.01835203,
-0.0036558094,
-0.040605363,
0.01593694,
-0.012745571,
0.013349344,
0.03147579,
-0.010987333,
-0.027866423,
0.015857322,
0.010191149,
-0.03819027,
0.015074409,
0.020674232,
0.0097333435,
0.023301639,
0.03625289,... | 172 |
ent, or possibly with other organizations like municipal governments, prime contractors, universities, etc., you will likely be required to demonstrate you are taking adequate measures to protect CUI.
Examples of CUI include:
<!-- image -->
| | When provided as part of a government contract, exam... | [
-0.007387156,
0.00014189174,
0.0397824,
0.027608706,
0.018626036,
-0.013579434,
0.008708551,
0.014162816,
-0.021634316,
0.004101242,
0.047710765,
0.0088702105,
0.014760255,
-0.025064318,
0.027974198,
-0.008258714,
0.0031119536,
-0.016053533,
-0.03289428,
0.0013275443,
0.03632... | 173 |
According to Assessing Security Requirements for Controlled Unclassified Information:
| Access Control | Maintenance | Security Assessment and Monitoring |
|-----------------------------------|---------------------|--------------------------------------|
| Awareness and Training ... | [
0.01883993,
0.04287623,
0.06309529,
0.0049839616,
0.04194039,
0.0063415444,
0.0042728465,
0.0055934885,
0.04676735,
0.016857427,
0.029011026,
-0.021955289,
0.006218408,
0.00009081338,
0.012412188,
-0.055657826,
-0.036202215,
0.03075957,
-0.01844589,
0.011827288,
0.04427999,
... | 174 |
The guide was developed and is maintained by the Joint Task Force Transformation Initiative Interagency Working Group, part of an ongoing information security partnership among the U.S. Department of Defense, the Intelligence Community, the Committee on National Security Systems, the Department of Homeland Security, an... | [
-0.020826433,
0.0052127773,
0.07708742,
-0.024725221,
0.001958647,
-0.0115976585,
0.002243962,
0.01654517,
-0.023762861,
0.016384777,
0.022504393,
0.018371185,
-0.03590339,
0.0155457975,
-0.011091803,
-0.020110833,
0.021282937,
-0.0076495195,
-0.0079271225,
0.009734631,
-0.00... | 175 |
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations:
3.1.10. 3.1.10. | [
-0.0080276085,
0.021435952,
0.055074863,
0.0010679143,
0.0637238,
-0.017061776,
-0.002533481,
0.011730747,
-0.030072467,
0.028332736,
0.0027959938,
-0.0053154947,
-0.008499821,
-0.023250243,
0.006263026,
-0.006729025,
0.04289676,
-0.015583006,
-0.040610258,
0.0048712427,
0.03... | 176 |
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations:
.......24 |
| 2.3.2. Level 1 -Enterprise...................................................................................................................27 |
| 2.3.3.
Level 2 -Mission and ... | [
-0.003931448,
0.031605255,
0.10475323,
-0.010257621,
0.045179635,
0.010577772,
-0.0060092243,
0.010699429,
-0.039007135,
0.0580881,
0.021693395,
-0.04120977,
-0.016570989,
0.010424099,
0.038751014,
0.019862136,
0.02476684,
-0.0044308826,
-0.017313737,
0.035267774,
0.074531026... | 177 |
tegrity, and availability protection. The enhanced security requirements are implemented in addition to the basic and derived requirements since those requirements are not designed to address the APT.
The enhanced security requirements apply to those components of nonfederal systems that process, store, or transmit CUI... | [
-0.013148433,
0.019653842,
0.07175966,
0.040608764,
0.036830623,
0.01120932,
0.0022737656,
0.0133360885,
-0.035404436,
0.04083395,
0.0039876904,
-0.022931566,
-0.009326505,
-0.0003788306,
-0.0007295128,
-0.008625922,
0.03985814,
0.0019531865,
-0.033277668,
0.00568285,
0.03648... | 178 |
nts, third-party assessments, or assessments conducted by sponsoring organizations (e.g., government agencies). Such approaches may be specified in contracts or in agreements by participating parties.
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\... | [
-0.02154128,
0.03007937,
0.02270499,
0.018771145,
0.018050151,
0.0027622296,
-0.0026246717,
-0.021579228,
0.013117034,
0.043284945,
-0.0005407456,
-0.03678335,
0.022388766,
-0.014053062,
0.009467792,
0.0018641494,
0.0022341332,
-0.0015186729,
-0.007652657,
-0.018657304,
0.034... | 179 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
3.4.3e Employ automated discovery and management tools to maintain an up-to-date, complete, accurate, and readily available inventory of system components. 3.4.3. 3.4.3e | E... | [
-0.0119802905,
0.050263483,
0.02876923,
-0.015404215,
0.022582743,
-0.0025076629,
-0.022486296,
0.0056904657,
-0.052936487,
0.03596154,
0.02548998,
0.002531775,
0.00827391,
0.00053391175,
0.03813852,
-0.03039508,
-0.010492227,
0.02092934,
-0.03739449,
-0.00046071416,
0.024773... | 180 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
<!-- image -->
<!-- image -->
Howard Lutnick, Secretary of Commerce
<!-- image -->
Protecting Controlled Unclassified Information (CUI): NIST Special Publication 800-171, Revision... | [
-0.03013797,
-0.012471793,
0.026815673,
0.02382297,
0.01807487,
-0.031166298,
-0.0097625395,
0.039577506,
-0.0143834315,
0.012807977,
0.038601913,
0.003040494,
-0.026828857,
-0.0073696957,
0.011634627,
-0.005510792,
-0.0129398145,
-0.00247689,
-0.009709805,
0.027290286,
0.033... | 181 |
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations:
There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts and ... | [
0.007412683,
0.013071705,
0.07083872,
-0.00522349,
0.012598678,
-0.005373474,
0.04531832,
0.026212633,
-0.04577981,
0.022243818,
0.018240392,
-0.027043315,
-0.03050449,
-0.01468692,
0.012102576,
-0.02227843,
-0.015136872,
-0.008012621,
-0.016313672,
0.011894905,
0.03869594,
... | 182 |
ent procedures to generate evidence to support the assertion that the enhanced security requirements have been satisfied. The assessment procedures are typically used as part of an assessment process.
An assessment process is an information-gathering and evidenceproducing activity to determine the effectiveness of the ... | [
0.025900371,
0.00632864,
0.07707791,
0.007721502,
0.012613656,
0.03340375,
0.005468618,
0.019680792,
0.012052772,
0.055340543,
0.041729763,
-0.018633809,
-0.005325281,
-0.010719115,
0.010264175,
-0.01067549,
-0.003440088,
0.010220551,
-0.025750803,
-0.03562236,
0.049457494,
... | 183 |
ibed in NIST SP 800-39. To ensure that an appropriate set of controls is identified to provide security commensurate with risk, organizations tailor the controls to align with specific security needs.
Organizations may perform tailoring at the organization level for all information systems, in support of a particular l... | [
0.017040115,
0.02042675,
0.095396124,
-0.012370125,
0.023753969,
-0.021306086,
0.015328974,
-0.005397819,
-0.011847277,
0.034127764,
-0.00718917,
-0.002941024,
-0.011532379,
-0.014425872,
0.044560973,
-0.043515272,
0.019725656,
0.019381052,
-0.03042029,
0.008656711,
0.0418041... | 184 |
| |
| D.4.1.6.
Impact Analysis...................................................................................................................226 ... | [
0.015204367,
0.016922763,
0.07736906,
-0.00328901,
-0.010867136,
0.0025311972,
0.010234767,
-0.024868626,
0.008317037,
0.029281467,
0.03818963,
-0.019452242,
-0.010427226,
-0.039234415,
0.017390167,
0.01781633,
0.019617207,
0.002369668,
0.005234234,
0.026435804,
0.026642011,
... | 185 |
According to Assessing Security Requirements for Controlled Unclassified Information:
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurement and standards infras... | [
-0.02371727,
0.03680177,
0.04560219,
-0.017265346,
0.039201885,
0.0011218281,
0.0003969949,
0.012619962,
-0.028775577,
-0.0027307766,
0.030246615,
0.025252827,
-0.011006981,
0.013303866,
0.0062454618,
-0.039898694,
0.0030598245,
0.030324038,
-0.033601616,
0.026788386,
0.06126... | 186 |
following components: (i) a control section; (ii) a supplemental guidance section; (iii) a control enhancements section; (iv) a references section; and (v) a priority and baseline allocation section.
Figure 2: The Risk Management Framework
<!-- image -->
## 3 Control Baselines and Tailoring
To assist organizations i... | [
-0.027171869,
0.03301528,
0.10732401,
-0.026977088,
0.00394126,
-0.01930761,
-0.0063912324,
0.018723268,
0.0092520695,
0.06593317,
-0.00090238114,
-0.012867682,
-0.025540583,
0.0014623748,
0.036350895,
-0.0482325,
0.017907625,
0.008637294,
0.013452022,
0.018078057,
0.00387126... | 187 |
According to Assessing Enhanced Security Requirements for Controlled Unclassified Information:
lar A-130. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on federal agencies by the Secretary of Commerce under statutory authority.
Nor should these guidel... | [
0.01737353,
0.006562127,
0.02729092,
-0.031504,
0.020066427,
0.009946345,
-0.010981519,
-0.021919603,
-0.0059033805,
-0.019429397,
0.02574178,
0.013609265,
-0.021687957,
-0.0076009193,
0.0032394393,
0.004158789,
-0.0020757748,
-0.015288706,
-0.018792368,
0.014883324,
0.020327... | 188 |
According to Assessing Security and Privacy Controls in Information Systems and Organizations:
DEVELOPMENT LIFE CYCLE .................................................. 6
2.2 CONTROL STRUCTURE AND ORGANIZATION ..................................................................................
7
2.3 BUILDING AN EFFE... | [
0.02439317,
0.024453457,
0.049678624,
0.01958206,
0.015313556,
0.032170527,
0.01094859,
-0.0028215528,
-0.000424288,
0.019135917,
0.058697946,
-0.0488828,
0.031205893,
-0.012721104,
0.008030574,
-0.038778264,
0.019015336,
0.038778264,
0.022319207,
0.0030642184,
0.026189798,
... | 189 |
| ..............................................................................................................
17 |
| 3.7 MAINTENANCE | ......................... | [
0.005279712,
0.05552596,
0.08589913,
-0.034763046,
-0.018493822,
0.025834994,
-0.0048459154,
0.0019743305,
0.008675931,
0.023387937,
0.026769325,
-0.006432795,
0.019116709,
-0.011619816,
0.047013164,
0.006992652,
-0.006069444,
0.03298337,
-0.01683279,
0.017722629,
0.014971542... | 190 |
According to Incident Response Recommendations and Considerations for Cybersecurity Risk Management_ A CSF 2.0 Community Profile:
| CSF Element | CSF Element Description | Priority | Recommendations, Considerations, Notes assist with maintaining cross-references | |---------------------|-------------------------------... | [
0.021702657,
0.021972343,
0.047180925,
0.02157491,
0.04434212,
-0.009069979,
-0.010219695,
0.0026081512,
-0.014371445,
0.06415697,
0.033128843,
0.004300788,
-0.0146766165,
0.02210009,
0.017628973,
-0.0055676047,
0.015102438,
-0.012313313,
-0.032333978,
0.0030996192,
0.0059756... | 191 |
According to Assessing Enhanced Security Requirements for Controlled Unclassified Information:
| ASSESSMENT PROCEDURES................................................................................................................
| 3 |
| 2.2 ... | [
0.013672956,
0.053870387,
0.06237624,
-0.019992724,
0.019555507,
0.027584394,
0.0034480493,
-0.0019211033,
-0.002800505,
0.011155648,
0.044993564,
-0.022046316,
0.014984606,
0.028988786,
-0.0051571685,
-0.03651421,
0.0007787921,
0.021158634,
-0.032009557,
-0.00010443929,
0.03... | 192 |
n before the
completion of such companion publications. Thus, until each publication is completed, current
requirements, guidelines, and procedures, where they exist, remain operative.
For planning and
transition purposes, federal agencies may wish to closely follow the development of thes... | [
0.030432494,
-0.0027782286,
0.055544622,
-0.053283464,
0.0013184532,
-0.02399485,
0.0023259975,
0.020988844,
0.00625143,
-0.015974399,
0.028410755,
0.026269307,
-0.035141017,
-0.009935783,
0.018953804,
-0.003980299,
-0.029235411,
0.00228942,
0.0047151744,
0.029873855,
0.01241... | 193 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
| Access Control | Maintenance | Security Assessment and Monitoring |
|-----------------------------------|---------------------|-------------------------... | [
-0.015192494,
0.0199473,
0.10216475,
0.0028048903,
0.008835802,
-0.0006996334,
-0.009045573,
0.01773517,
0.00031982106,
0.023163784,
0.032291993,
0.005953042,
-0.026138717,
0.00070757925,
0.023710461,
-0.025833596,
-0.015510328,
0.017201208,
-0.008695954,
0.032749675,
0.02480... | 194 |
cy is followed. 12 'Adequately addressed by other related controls' means that the protection capability offered by the control is provided by another control in the same or different control family.
Using this tailoring option helps to eliminate potential redundancy in requirements without affecting the protection of... | [
0.024524432,
0.041477926,
0.07868368,
0.03212241,
0.00723295,
0.02144198,
-0.008537585,
0.008706579,
0.0070369164,
0.029148113,
0.04564194,
-0.050076347,
0.012985511,
0.014763329,
0.03090565,
-0.07068012,
0.042667646,
-0.0022121335,
0.0050664446,
0.033312127,
0.027052585,
0... | 195 |
traditional Information Technology (IT) systems, Operational Technology (OT) systems, Internet of Things
6 [32 CFR 2002] was issued on September 14, 2016, and went into effect on November 14, 2016.
7 The definition of a critical program may vary from organization to organization. For example, the Department of Defens... | [
-0.014965037,
-0.005012132,
0.039825212,
0.005188831,
0.04507181,
-0.0027965999,
-0.008005819,
0.0024313089,
0.007407761,
0.026504835,
0.034442693,
-0.0062014516,
-0.03900968,
-0.03033784,
0.029821336,
0.012865039,
0.006639801,
-0.015766978,
-0.017887365,
0.029196095,
0.02335... | 196 |
According to Control Baselines for Information Systems and Organizations:
| ORGANIZATIONAL RESPONSIBILITIES .........................................................................................
| 2 ... | [
-0.014097086,
0.024155479,
0.07121393,
0.0061347247,
0.017688457,
-0.0050291964,
-0.0019586387,
-0.0019714194,
-0.047544118,
-0.003831008,
0.046853963,
-0.03586258,
0.021433195,
-0.0086269565,
0.018825937,
-0.00047807719,
0.017074984,
-0.004645776,
0.0048438767,
0.046368297,
... | 197 |
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations:
| 3.4.3. Enhancing Practices....................................................................................................................49 | ... | [
0.009809112,
0.02632672,
0.07821927,
0.019123647,
0.04468948,
0.021114638,
0.01247222,
0.00857267,
-0.0240821,
0.05295779,
-0.00970132,
-0.02001135,
0.014241284,
-0.010018356,
0.029218093,
-0.02330853,
0.022560325,
0.00441632,
-0.007976641,
0.03238846,
0.058486912,
0.063204... | 198 |
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations:
SP 800-53 Revision 4 has been updated to reflect the evolving technology and threat space. Example areas include issues particular to mobile and cloud computing; insider threats; applica... | [
-0.02551039,
0.0073714294,
0.09999292,
-0.0016279336,
0.009084723,
-0.00979199,
0.008938392,
-0.0069568246,
-0.001182081,
0.041753143,
0.0019084015,
0.007103156,
-0.01620617,
0.025778662,
-0.0003244816,
-0.049094085,
0.038119253,
0.011115067,
-0.0024678132,
0.01488919,
0.0224... | 199 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.