text
stringlengths
51
3.17k
embedding
listlengths
1.54k
1.54k
example_idx
int64
0
994
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations: SP 800-53 Revision 4 has been updated to reflect the evolving technology and threat space. Example areas include issues particular to mobile and cloud computing; insider threats; applica...
[ -0.010951821, 0.0129095595, 0.05177643, 0.017239617, 0.015754038, -0.0012358226, 0.014533332, -0.0006996037, -0.0073472783, 0.016571682, 0.003126624, 0.0067369244, -0.04240232, 0.034364074, -0.009132275, -0.04260961, 0.039868776, 0.0043444526, 0.0096217105, 0.00882134, -0.005...
100
## NIST Publicación especial 800-207 ## Arquitectura de confianza cero Scott Rose Oliver Borchert Stu Mitchell Sean Connelly Esta publicación se encuentra disponible en inglés de forma gratuita en https://doi.org/10.6028/NIST.SP.800-207 ## S E G U R I D A D I N F O R M Á T I C A ## NIST Natio...
[ 0.0024894988, -0.014012189, 0.044116598, -0.0149338795, 0.001796674, -0.011452629, -0.025408769, -0.0050225914, -0.06307353, -0.030764539, 0.022755794, -0.006532794, -0.023204185, -0.020924868, 0.034501124, 0.049248174, -0.01762422, -0.0052934936, 0.0070932815, 0.017997878, -...
101
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations: 3.1.2. 3.1.2. 3.1.2.
[ -0.010929853, 0.015952673, 0.05152996, -0.0057166815, 0.06508789, -0.018212328, -0.0067175613, 0.011335117, -0.030726396, 0.032986052, 0.0049614166, -0.0025666733, -0.0071412465, -0.018605312, 0.0033372894, -0.011660556, 0.04349836, -0.017438643, -0.039740454, 0.0070000184, 0...
102
sions. This documentation is essential when examining the security considerations for organizational information systems with respect to the potential impact on an organization's mission and business. The resulting tailored baseline set of security controls and the supporting rationale for the selection decisions (incl...
[ -0.011124856, 0.008030369, 0.06650204, -0.0022473268, -0.009089319, 0.0076656197, 0.0018193346, -0.002475295, 0.018766943, 0.025297133, 0.029579997, -0.0076656197, -0.01910816, -0.034992408, 0.003129785, -0.01731971, 0.024497038, 0.016543148, 0.006177207, -0.021202527, 0.0289...
103
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: The National Institute of Standards and Technology (NIST) Information Technology Laboratory (ITL) promotes the U.S. economy and public welfare by providing technical leaders...
[ -0.0055062273, -0.01550315, 0.0562983, -0.015664643, 0.046633676, -0.026708152, -0.019565275, 0.016372718, -0.06385112, -0.009260897, 0.018882042, 0.027130514, -0.043428697, -0.00453728, 0.031602576, -0.015850978, -0.0070000202, 0.012708112, -0.0057888366, 0.038633652, 0.0465...
104
blication 800-series reports on ITL's research, guidelines, and outreach efforts in information system security, and its collaborative activities with industry, government, and academic organizations. ## Patent Disclosure Notice NOTICE: ITL has requested that holders of patent claims whose use may be required for comp...
[ 0.008201354, 0.003141513, 0.064167075, -0.03601377, 0.0009399474, -0.032912362, -0.031522077, 0.0066239135, -0.042377006, -0.02093451, 0.031629022, -0.025292521, 0.011911013, -0.028474139, 0.017164692, 0.00036302858, 0.050665252, -0.011342867, -0.016375972, 0.050852407, 0.008...
105
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations: 3.1.8. 3.1.8.
[ -0.008925056, 0.020652816, 0.047982298, -0.000978611, 0.058894157, -0.014773365, -0.0052846544, 0.013888956, -0.030518334, 0.030941855, 0.0063496823, -0.0015461585, -0.0053843064, -0.020441055, 0.004275681, -0.00929875, 0.04095685, -0.014997582, -0.04145511, 0.0021144846, 0.0...
106
tise, and understanding. Appendix E provides three tables that identify specific assurance-related controls that are included in the low-, moderate-, and high-impact baselines described in Appendix D. The controls described assist organizations in defining the controls needed to satisfy minimum assurance requirements. ...
[ -0.02884311, 0.005428479, 0.08991821, 0.010925991, 0.0005126461, -0.013806537, 0.011095435, -0.01940446, 0.0054002386, 0.022655271, 0.0004494969, -0.017120106, -0.004383575, -0.0047099115, 0.012450986, -0.0404155, 0.047946338, 0.01248864, 0.012739668, 0.020006927, 0.026006494...
107
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: ............................................ 5 | | 2.1 DEVELOPMENTAPPROACH ..............................................................................
[ 0.017715218, 0.028639602, 0.051454652, -0.015903434, 0.060768563, 0.0064553176, -0.010763337, 0.01538003, -0.0412013, 0.016789194, 0.024465788, -0.0016071191, 0.008179868, 0.030706376, 0.014802943, -0.017916527, 0.045388535, 0.004989115, -0.033095248, 0.032343693, 0.03808772,...
108
and specificity needed by organizations to clearly define their CUI security requirements, given the diverse nature of their missions, business functions, operational environments, and risk tolerance. ODPs support consistent security assessments in determining whether security requirements have been satisfied. If a fed...
[ -0.02541161, -0.013419917, 0.079333805, 0.014416979, 0.007161331, -0.013675919, -0.0037019297, -0.0069592237, 0.035597812, 0.046107385, 0.0323102, 0.00017526482, -0.028672272, -0.030181339, 0.030935872, -0.03015439, -0.0023680225, 0.0020985461, -0.023942964, -0.0014450663, 0....
109
and communications. Therefore, CUI that is processed, stored, or transmitted by any of the above systems related to a critical program or high value asset requires additional protection from the APT. ## 1.1 PURPOSE AND APPLICABILITY The purpose of this publication is to provide federal agencies with a set of enhance...
[ -0.014394797, 0.005963824, 0.07504092, 0.031114528, 0.021666396, 0.0059669157, -0.0010844019, 0.020231863, -0.01720203, 0.029828396, 0.018562363, 0.006056574, -0.010369448, -0.0035399578, -0.0022244537, -0.0034008329, 0.040958393, 0.0030452912, -0.023904763, -0.0022244537, 0....
110
4. An Istio Authorization Policy that allows Service 1 to Service 2 on port 443 but only allows it to execute the GET HTTP verb on the '/public' path........................................15 Fig. 5. Policy | Deployment for a Three-tier ...
[ 0.0054905773, -0.0026690306, 0.07229859, -0.021447942, 0.047608927, -0.024199212, -0.044331327, -0.0028335087, 0.02208193, 0.022644145, 0.024641806, -0.009354317, 0.0016432855, -0.022464715, -0.031651564, -0.0047997693, 0.0042704493, -0.011064889, 0.012512296, 0.022656107, 0....
111
ores disponibles para el propósito. En esta publicación puede haber referencias a otras que actualmente están siendo desarrolladas por NIST de acuerdo con sus responsabilidades estatutarias asignadas. La información contenida en esta publicación, incluidos conceptos y metodologías, puede ser utilizada por los or...
[ 0.017790603, 0.029861895, 0.047601886, -0.02542057, 0.012020678, -0.014892987, -0.013855413, 0.032544404, -0.021055166, -0.01914451, 0.011090657, 0.026344264, -0.02996312, -0.035201605, 0.006238099, 0.027710825, -0.0314056, -0.023585835, -0.016208936, 0.02144742, 0.007288327,...
112
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: | CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION.......................
[ 0.02867414, 0.007869022, 0.055200994, -0.015305968, 0.042841, 0.0015891889, -0.024628337, 0.011666054, -0.052241925, 0.017374696, 0.016248679, 0.0011963925, -0.011711881, 0.024143888, 0.024667617, -0.014638214, 0.03294253, 0.013839528, -0.026042404, 0.02346304, 0.02809804, ...
113
According to Assessing Security Requirements for Controlled Unclassified Information: | Access Control | Maintenance | Security Assessment and Monitoring | |-----------------------------------|---------------------|--------------------------------------| | Awareness and Training ...
[ 0.003231682, 0.040286213, 0.05783142, 0.023418713, 0.034914717, 0.006275111, 0.022377046, -0.007185002, -0.0011326575, 0.0064068884, 0.045231, 0.0073795305, 0.0005074996, 0.014646109, 0.020494511, -0.061445884, 0.0061652963, 0.01248747, -0.024661185, -0.005406008, 0.039934807...
114
## Table of Contents | 1 | Introduction ............................................................................................................1 | |------------------------------------------------------------------------------------------------------------|----------------------------------------------------------...
[ -0.0062529766, 0.042053513, 0.058688223, -0.03157005, 0.0066838036, -0.0064265043, -0.011799876, 0.0028332865, -0.02096692, 0.021038724, 0.000721411, 0.0013223998, -0.030205768, 0.010974124, 0.020739539, -0.023910904, 0.01053133, -0.020009525, -0.0021346884, 0.021948248, 0.00...
115
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: <!-- image --> <!-- image --> Howard Lutnick, Secretary of Commerce <!-- image --> Protecting Controlled Unclassified Information (CUI): NIST Special Publication 800-171, Revision...
[ -0.029982954, -0.012517091, 0.02689492, 0.02363533, 0.017736396, -0.031091478, -0.009640206, 0.03977492, -0.014358034, 0.012748034, 0.038771972, 0.002870287, -0.026789347, -0.007093238, 0.011560329, -0.0057768654, -0.012761231, -0.0023374695, -0.00986455, 0.027449183, 0.03322...
116
According to Incident Response Recommendations and Considerations for Cybersecurity Risk Management_ A CSF 2.0 Community Profile: ts, guidelines, and procedures, where they exist, remain operative. For planning and transition purposes, federal agencies may wish to closely follow the development of these new publicatio...
[ -0.00783296, -0.0067733983, 0.06781199, 0.012227219, 0.039054297, -0.0013000765, 0.026599564, 0.0014780244, -0.009653067, 0.050962996, 0.023011353, 0.012708247, -0.008391993, 0.02685958, -0.004368257, -0.016614977, 0.020528207, -0.0120062055, -0.03044779, -0.010140596, -0.003...
117
<!-- image --> ## NIST Special Publication NIST SP 800-207A ## A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Location Environments Ramaswamy Chandramouli Zack Butcher This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-207A <!-- image -...
[ -0.00060948305, 0.00020762486, 0.021188764, -0.014605987, 0.017890174, -0.021246381, -0.00749025, 0.022542771, -0.03658699, -0.04364511, 0.018106239, -0.002383916, -0.028290097, -0.020727826, -0.0053043934, 0.0047066137, -0.014793243, 0.0023262987, 0.0069572898, 0.04517197, 0...
118
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: systems, but such standards and guidelines shall not apply to national security systems without the express approval of the appropriate federal officials exercising policy a...
[ 0.005651286, 0.016780078, 0.037313778, -0.011518057, 0.02336977, 0.00050482736, -0.023467086, -0.011949029, -0.026372667, 0.0049665975, 0.02512146, 0.021075891, -0.027874116, -0.00428886, 0.0053419597, -0.0070415162, -0.00080807135, -0.017169343, -0.021381741, 0.0153898485, 0...
119
According to A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Cloud Environments: - A built-in infrastructure for (a) providing service identities, (b) service discovery, and (c) external policy-based authorization engines in which policies incorporate contextual variables. Poli...
[ 0.013616745, 0.019416692, 0.062057037, 0.04427531, 0.07308409, -0.011116563, -0.049550157, 0.03711488, 0.00312672, 0.006342945, -0.011868408, -0.010824179, 0.035014488, -0.0212426, -0.03310504, -0.01412991, -0.013795757, 0.0056149685, 0.022615016, 0.014523733, 0.02950096, 0...
120
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: <!-- image --> <!-- image --> Howard Lutnick, Secretary of Commerce <!-- image --> Protecting Controlled Unclassified Information (CUI): NIST Special Publication 800-171, Revision...
[ -0.029982954, -0.012517091, 0.02689492, 0.02363533, 0.017736396, -0.031091478, -0.009640206, 0.03977492, -0.014358034, 0.012748034, 0.038771972, 0.002870287, -0.026789347, -0.007093238, 0.011560329, -0.0057768654, -0.012761231, -0.0023374695, -0.00986455, 0.027449183, 0.03322...
121
According to Zero Trust Architecture: | | | 3.2.2.
[ 0.0068734917, 0.04320097, 0.040811356, 0.008028023, 0.031306606, -0.0069943145, -0.033212926, 0.013699996, -0.021050068, 0.028863294, -0.0016042622, -0.0029400287, 0.0007056404, 0.012981771, -0.0043630563, -0.009773246, 0.049188424, -0.016230568, -0.016807836, 0.036220077, 0....
122
efore the completion of such companion publications. Thus, until each publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For planning and transition purposes, federal agencies may wish to closely follow the development of these new publicat...
[ 0.014710637, 0.017966378, 0.064423814, -0.054962233, 0.005847046, -0.020451372, 0.0062490306, 0.02333503, 0.009541316, -0.0075214277, 0.02787978, 0.03165378, -0.035294898, -0.015787024, 0.015694004, 0.00918252, -0.019069344, -0.005740736, 0.0013371796, 0.032477684, 0.02571371...
123
According to Assessing Security Requirements for Controlled Unclassified Information: | Access Control | Maintenance | Security Assessment and Monitoring | |-----------------------------------|---------------------|--------------------------------------| | Awareness and Training ...
[ -0.01806275, 0.060908023, 0.07843319, -0.0042636963, 0.036206137, -0.016140895, 0.011322818, 0.047602873, 0.026341511, 0.0031162947, 0.06735901, 0.007385031, 0.034566514, -0.0034640431, 0.025830807, -0.034539632, -0.013016201, -0.000385547, -0.027712345, 0.0148103805, 0.04281...
124
According to Assessing Enhanced Security Requirements for Controlled Unclassified Information: | CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION..........................................................................
[ 0.03428543, 0.038844522, 0.05217921, -0.014217516, 0.035945676, 0.011424084, -0.009348775, -0.00733276, -0.028461387, 0.021438276, 0.03344213, -0.0151267, -0.0030009632, 0.028197855, 0.03136023, -0.028224207, 0.016655182, 0.024179002, -0.013222686, 0.018526254, 0.023889117, ...
125
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: | Access Control | Maintenance | Security Assessment and Monitoring | |-----------------------------------|---------------------|-------------------------...
[ -0.015209428, 0.01997827, 0.10209138, 0.0027087023, 0.008889122, -0.00062630797, -0.009092593, 0.017765528, 0.00027877858, 0.023144782, 0.03225009, 0.005907006, -0.026044236, 0.0007332095, 0.023704326, -0.025815332, -0.015463766, 0.01734587, -0.008698368, 0.032860503, 0.02491...
126
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: d, communicated, understood, and enforced. Even if cybersecurity activities are outsourced to an external provider, someone within the business should still be designated to manage cy...
[ -0.011644907, 0.022290196, 0.056653704, 0.0053680814, 0.035441022, -0.014851476, 0.007964494, 0.0240947, -0.0094898855, 0.034895774, 0.037466224, 0.017551744, -0.011365793, -0.010651779, 0.02522414, -0.013657127, -0.016539143, 0.005114931, -0.014241319, -0.0047903797, 0.05852...
127
effectiveness of security and privacy controls associated with systems and their environments of operation and to provide credible and meaningful inputs to the organization’s risk management process. A well- executed assessment helps determine the validity of the controls contained in the organization’s security and pr...
[ 0.015923, -0.01118743, 0.0501454, 0.0065609193, -0.011629416, -0.014442058, -0.00037454066, 0.00014359187, 0.03225929, 0.033912435, -0.015107908, -0.0039405697, -0.013454763, -0.0020678663, -0.007134928, -0.0277361, 0.01121613, 0.008093523, 0.026565121, -0.03106535, 0.0229144...
128
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: Advanced Persistent Threat; Basic Security Requirement; Contractor Systems; Controlled Unclassified Information; CUI Registry; Derived Security Requirement; Enhanced Securit...
[ -0.009854641, 0.009702151, 0.06902696, 0.019709282, 0.030040452, 0.014029044, 0.006677774, 0.0067349575, -0.04188381, 0.023191126, 0.012853603, -0.021691646, -0.02438563, 0.016811978, 0.013800309, -0.016392631, 0.035885885, 0.0088507505, -0.030142112, 0.012580392, 0.015287083...
129
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: ........................................................................ | CHAPTERONE INTRODUCTION..............................................................................
[ 0.024662834, 0.011386939, 0.05403475, -0.014752472, 0.044270717, -0.00014643141, -0.02617932, 0.012018808, -0.052571476, 0.0170272, 0.017386366, 0.001578009, -0.00804136, 0.025926571, 0.023252768, -0.015244664, 0.03474613, 0.011998855, -0.028999448, 0.022853693, 0.028733399, ...
130
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: - Applying a threat-centric approach to security requirements specification; - Employing system and security architectures that support logical and physical isolation using ...
[ 0.026049037, 0.04729785, 0.06375948, 0.022840193, 0.040436663, 0.013722377, -0.026414271, 0.030549247, -0.036158204, 0.027027344, 0.032271065, 0.011283133, 0.004011056, 0.020974888, 0.0011022252, -0.043515068, 0.02196624, 0.023688057, -0.016083356, 0.03503641, 0.033471122, ...
131
gns to achieve cyber resiliency and survivability. 4 Unless specified by legislation, regulation, or government-wide policy, the term system is used in this publication instead of information system. This change reflects a broad-based and holistic definition of systems that includes general-purpose systems, industrial...
[ 0.020718997, 0.037999157, 0.085676186, -0.00022433043, 0.0044674184, -0.017771423, -0.02876342, -0.0022030054, 0.0066750296, 0.048536737, 0.017697733, -0.028051091, -0.021099726, 0.019589093, 0.0025714524, 0.00085510383, -0.0094261, 0.016150257, -0.009315566, -0.025250895, 0....
132
| SYSTEMANDSERVICESACQUISITION FAMILY ......................................................................... | 42 | | 3.18 ...
[ 0.0053870515, 0.006823599, 0.055601213, -0.02685659, -0.010404705, 0.013975551, -0.03603681, -0.00054169795, -0.01952336, -0.0004728634, 0.03094733, -0.023326788, -0.004128363, -0.037870117, 0.043096412, 0.013872941, 0.039977055, 0.018292034, -0.026022024, 0.032808, 0.0429322...
133
sions. This documentation is essential when examining the security considerations for organizational information systems with respect to the potential impact on an organization's mission and business. The resulting tailored baseline set of security controls and the supporting rationale for the selection decisions (incl...
[ -0.011142329, 0.008036125, 0.066501, -0.0022355255, -0.009100942, 0.007665499, 0.001835484, -0.0024531952, 0.018754883, 0.025273204, 0.029579531, -0.007665499, -0.019096093, -0.034991857, 0.0031326772, -0.017331205, 0.024520185, 0.016578186, 0.0061771097, -0.021202194, 0.0289...
134
According to Risk Management Framework for Information Systems and Organizations_ A System Life Cycle Approach for Security and Privacy: There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in t...
[ -0.013004304, 0.028909568, 0.05109191, -0.025395906, -0.0014215643, -0.009753228, 0.007690045, 0.02269501, -0.024208011, 0.01251039, 0.0031823032, 0.012141518, -0.012304072, 0.014054651, 0.018506125, -0.035636794, -0.01320437, -0.0021397707, -0.009903277, 0.032585785, 0.03148...
135
e requirements also apply to services, including externally provided services, that process, store, or transmit CUI, or that provide security protections, for the system requiring enhanced protection. The protection of a specific service to include CUI that is processed, stored or transmitted during the provision of th...
[ -0.010923502, 0.01710924, 0.06797361, 0.0033361278, 0.03060434, -0.0050331512, 0.021974426, -0.0007435337, -0.02222927, 0.052080665, 0.017873768, -0.014363884, 0.0017795578, -0.014850403, 0.020619124, -0.0048738746, 0.040960237, 0.010101054, -0.010101054, 0.009556617, 0.05462...
136
According to Assessing Enhanced Security Requirements for Controlled Unclassified Information: | |-----------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------...
[ -0.015357851, 0.047342584, 0.039935593, 0.004376858, 0.03545514, 0.01736499, -0.008041506, -0.0026594594, -0.017118955, 0.005662075, 0.018957753, -0.012114055, -0.020058442, 0.021159131, -0.012269448, -0.027115801, 0.027038107, -0.019307382, -0.0452966, -0.000536586, 0.043872...
137
According to Assessing Enhanced Security Requirements for Controlled Unclassified Information: | ASSESSMENT PROCEDURES................................................................................................................ | 3 | | 2.2 ...
[ 0.013672956, 0.053870387, 0.06237624, -0.019992724, 0.019555507, 0.027584394, 0.0034480493, -0.0019211033, -0.002800505, 0.011155648, 0.044993564, -0.022046316, 0.014984606, 0.028988786, -0.0051571685, -0.03651421, 0.0007787921, 0.021158634, -0.032009557, -0.00010443929, 0.03...
138
nt security and privacy controls that meet mission and business needs, assess the effectiveness of the controls, authorize the systems for operation, and continuously monitor the systems. Exercising due diligence and implementing robust and comprehensive information security and privacy risk management pro...
[ 0.004533511, 0.040630806, 0.08313135, 0.028237812, 0.028381638, -0.0017588706, -0.02021952, 0.0025139563, -0.0018472634, 0.016599903, 0.0073351194, -0.014466485, -0.033894964, -0.001247989, 0.0175108, -0.013243965, -0.006148556, -0.0027731424, 0.030323287, -0.024929818, 0.052...
139
According to Assessing Security and Privacy Controls in Information Systems and Organizations: 3.2.4 DEVELOP ASSESSMENT PROCEDURES FOR ORGANIZATION-SPECIFIC CONTROLS Based on organizational policies, mission or business function requirements, and an assessment of risk, organizations may choose to develop and implem...
[ -0.0045098276, -0.0074491594, 0.052846868, 0.022109155, 0.013065056, 0.02250025, 0.007864699, 0.0037948547, 0.01176955, 0.015216084, -0.0068808477, -0.02967442, 0.034783114, -0.0065019736, 0.0031868224, -0.023416882, 0.036396384, 0.005560898, 0.011586224, 0.0128450645, 0.0395...
140
e of continuous improvement in the organization's risk-related activities, with effective communication among tiers and stakeholders. Figure 1 illustrates the three-tiered approach to risk management. Figure 1: Risk Management 3-Tiered Approach <!-- image --> The NIST Risk Management Framework (RMF), described in NIS...
[ -0.012383115, 0.032615505, 0.06265364, 0.0016709004, 0.009067673, -0.010028331, 0.0148667665, 0.025047397, -0.015921148, 0.06963598, -0.011094427, -0.008657636, -0.013988116, 0.00045689827, 0.032943536, -0.017139543, 0.009255119, 0.0068417587, 0.010813259, 0.035075728, 0.0225...
141
as normas y directrices no se aplicarán a los sistemas de seguridad nacional sin la aprobación expresa de los funcionarios federales apropiados que ejercen la autoridad política sobre dichos sistemas. Esta directriz es coherente con los requisitos de la Circular A-130 de la Oficina de Gestión y Presupuesto (OMB). Nada ...
[ 0.0133409165, 0.029194804, 0.03456566, -0.0008638336, 0.009706965, -0.014116981, -0.03394974, -0.016864004, -0.032101966, -0.023811627, 0.016174167, 0.00487196, -0.04515956, -0.048953652, 0.013119184, 0.015706066, -0.011228297, -0.039098866, 0.010409118, 0.0069291466, 0.01586...
142
s and disclosure Preventing disruption in how information is accessed <!-- image --> 2 SP 800-171 does not explicitly cover integrity and availability so it is not a comprehensive security program. ## Overview ## Structure of SP 800-171 SP 800-171 security requirements are organized into 17 families, as illustrate...
[ -0.047701623, -0.0023587144, 0.063991845, -0.0014970292, 0.01693827, -0.010406934, 0.0060357675, 0.0033482625, 0.022262452, 0.025223155, 0.02035642, -0.0072683347, -0.012293905, 0.019047612, -0.009148953, -0.021474626, 0.0131770335, 0.01160138, -0.00014414366, -0.00053249765, ...
143
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations: | 1 | Introduction ............................................................................................................1 | |------------------------------------------------------...
[ -0.020964958, 0.03140085, 0.049710244, -0.014023228, 0.013895108, -0.007384324, -0.01210144, 0.0065981383, -0.021815203, 0.034545593, 0.0038726935, -0.009981649, -0.02328275, 0.0076405625, 0.02727774, -0.035710312, 0.014768648, 0.008811106, 0.009638057, 0.039390825, 0.0194508...
144
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: | CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION.......................
[ 0.028646424, 0.007855509, 0.055250417, -0.015344428, 0.04283871, 0.0015514632, -0.024600837, 0.011678524, -0.052265324, 0.017386861, 0.016247813, 0.0011619608, -0.011691617, 0.024142599, 0.024653208, -0.014611247, 0.032993138, 0.013878066, -0.026001737, 0.02347488, 0.02807035...
145
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations: The NIST Risk Management Framework (RMF), described in NIST Special Publication 800-37 Revision 1, Guide for Applying the Risk Management Framework to Federal Information Systems: a Secu...
[ -0.018804658, 0.044273976, 0.04562037, 0.0071751666, 0.0104962755, -0.010081137, 0.026546434, 0.03287449, -0.017671442, 0.054394383, -0.009918448, 0.014484973, -0.015775269, 0.01864758, 0.037115637, -0.032133974, 0.00605878, 0.008869381, -0.0018470865, 0.03689124, 0.032986693...
146
. Entre ellas se encuentran Greg Holden, director del proyecto ZTA del Consejo Federal de CIO; Alper Kerman, director del proyecto ZTA del NIST/Centro Nacional de Ciberseguridad; y Douglas Montgomery. En la traducción, un especial reconocimiento a las personas que colaboraron de alguna u otra forma con la gestión, r...
[ 0.02675764, 0.018849103, 0.052757274, -0.011768056, 0.0051481295, -0.02660604, -0.031103546, 0.058366526, -0.066906735, -0.03873415, 0.015046435, 0.0049270443, 0.012203909, -0.048032366, -0.0006987875, 0.06382418, -0.016006578, -0.041008167, -0.02855159, 0.027212445, -0.01782...
147
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: | Access Control | Maintenance | Security Assessment and Monitoring | |-----------------------------------|---------------------|-------------------------...
[ 0.0024202093, 0.03925417, 0.061469004, 0.0060413997, 0.029593237, 0.0016165139, -0.019122805, 0.028000776, -0.010994618, -0.00027432633, 0.033919424, -0.0013486156, -0.0044323504, 0.02104703, 0.010550056, -0.038431395, -0.016827006, 0.018698148, -0.009037217, 0.050374854, 0.0...
148
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: ............................................ 5 | | 2.1 DEVELOPMENTAPPROACH ..............................................................................
[ 0.017715218, 0.028639602, 0.051454652, -0.015903434, 0.060768563, 0.0064553176, -0.010763337, 0.01538003, -0.0412013, 0.016789194, 0.024465788, -0.0016071191, 0.008179868, 0.030706376, 0.014802943, -0.017916527, 0.045388535, 0.004989115, -0.033095248, 0.032343693, 0.03808772,...
149
ent, or possibly with other organizations like municipal governments, prime contractors, universities, etc., you will likely be required to demonstrate you are taking adequate measures to protect CUI. Examples of CUI include: <!-- image --> | | When provided as part of a government contract, exam...
[ -0.0075195483, -0.000009436495, 0.03969197, 0.027618527, 0.01862318, -0.013774126, 0.008419083, 0.014252003, -0.021420171, 0.004114669, 0.0475629, 0.008714243, 0.014870434, -0.025116697, 0.028110461, -0.008257448, 0.0031167474, -0.01612135, -0.03294546, 0.0013905894, 0.036065...
150
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations: As the risk to an information system's confidentiality, integrity and/or availability increases, the need for additional controls to protect the system may also increase accordingly. SP...
[ -0.037388116, 0.012397242, 0.078262195, 0.001047168, 0.00448326, -0.010899753, -0.017834844, 0.011605537, -0.017761197, 0.016766964, 0.012949594, 0.010912028, -0.030121615, 0.015134455, -0.0028906441, -0.05931037, 0.031422712, 0.019442802, -0.012777751, 0.015760453, 0.0162146...
151
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations: 3.1.7. 3.1.7.
[ -0.0126268165, 0.018794268, 0.048072584, -0.0025759824, 0.061910532, -0.015899977, -0.004356966, 0.014533572, -0.029067144, 0.029067144, 0.0053165546, 0.00033267285, -0.0007810242, -0.019129658, 0.0059718075, -0.005934542, 0.04765024, -0.01204299, -0.04081822, 0.006471787, 0....
152
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: ............................................ 5 | | 2.1 DEVELOPMENTAPPROACH ..............................................................................
[ 0.017715218, 0.028639602, 0.051454652, -0.015903434, 0.060768563, 0.0064553176, -0.010763337, 0.01538003, -0.0412013, 0.016789194, 0.024465788, -0.0016071191, 0.008179868, 0.030706376, 0.014802943, -0.017916527, 0.045388535, 0.004989115, -0.033095248, 0.032343693, 0.03808772,...
153
nks to non-NIST sites throughout this publication because they may have information of interest to readers. NIST does not necessarily endorse the views expressed or the facts presented on those sites. Further, NIST does not endorse any commercial products that may be advertised or available on these sites. ht ps:/ csr...
[ -0.012384674, 0.042894866, 0.04674407, 0.025296636, 0.041497555, -0.016899576, -0.045715857, 0.018428711, -0.032797307, 0.023675226, 0.04481947, -0.037226524, -0.031610906, 0.018217796, 0.014948611, -0.036620144, 0.0045907, 0.025731647, 0.006795422, 0.050856914, 0.014988158, ...
154
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: The system component inventory includes system-specific information required for component accountability and to provide support to identify, control, monitor, and verify co...
[ -0.013703321, 0.031076044, 0.025913574, 0.010445144, 0.040363427, -0.016575577, 0.0023107748, -0.009825142, -0.057090845, 0.020042531, 0.023686627, 0.01747395, -0.035960145, -0.017182928, 0.029456446, -0.0300891, 0.0106539205, 0.03229074, -0.076323576, -0.01414618, 0.04532345...
155
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: ent, or possibly with other organizations like municipal governments, prime contractors, universities, etc., you will likely be required to demonstrate you are taking adequate measure...
[ -0.008573076, 0.002956525, 0.04524415, 0.015600964, 0.018460914, -0.011317815, -0.0037342012, 0.022622075, -0.04432246, 0.012131071, 0.049120672, 0.021361528, 0.00004140406, -0.022215448, 0.01669886, -0.0053369934, -0.014259092, -0.008295213, -0.031852532, 0.012788453, 0.0477...
156
According to Security and Privacy Controls for Information Systems and Organizations: ...................................................................... 14 CHAPTER THREE THE CONTROLS ................................................................................................. 16 3.1 ACCESS CONTROL ...........
[ 0.0028781448, 0.033307627, 0.05384733, -0.0044220923, 0.03035536, 0.00031423033, 0.015821123, 0.013852945, -0.019164503, 0.014824417, 0.033509493, -0.012332654, 0.019959344, -0.0011835878, 0.01023831, -0.022558348, 0.02621714, 0.03323193, 0.028462881, 0.050415635, 0.028891843...
157
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: ............................................ 5 | | 2.1 DEVELOPMENTAPPROACH ..............................................................................
[ 0.017687652, 0.02863843, 0.05150623, -0.015889363, 0.06081976, 0.006411439, -0.010736057, 0.015379401, -0.041172776, 0.016801927, 0.024437947, -0.0016137635, 0.008192953, 0.03070512, 0.014775498, -0.017942633, 0.04538668, 0.004952006, -0.033093892, 0.03231553, 0.038112998, ...
158
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: ............................................ 5 | | 2.1 DEVELOPMENTAPPROACH ..............................................................................
[ 0.017715218, 0.028639602, 0.051454652, -0.015903434, 0.060768563, 0.0064553176, -0.010763337, 0.01538003, -0.0412013, 0.016789194, 0.024465788, -0.0016071191, 0.008179868, 0.030706376, 0.014802943, -0.017916527, 0.045388535, 0.004989115, -0.033095248, 0.032343693, 0.03808772,...
159
According to Assessing Enhanced Security Requirements for Controlled Unclassified Information: | CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION..........................................................................
[ 0.03428543, 0.038844522, 0.05217921, -0.014217516, 0.035945676, 0.011424084, -0.009348775, -0.00733276, -0.028461387, 0.021438276, 0.03344213, -0.0151267, -0.0030009632, 0.028197855, 0.03136023, -0.028224207, 0.016655182, 0.024179002, -0.013222686, 0.018526254, 0.023889117, ...
160
efore the completion of such companion publications. Thus, until each publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For planning and transition purposes, federal agencies may wish to closely follow the development of these new publicat...
[ 0.014723705, 0.017979398, 0.06442285, -0.054961413, 0.0058403146, -0.02042449, 0.0062323264, 0.023308104, 0.009534529, -0.007521315, 0.027879363, 0.031653307, -0.03529437, -0.015800077, 0.015693769, 0.009189027, -0.01905577, -0.0057439725, 0.0013213794, 0.0324772, 0.025726618...
161
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: d, communicated, understood, and enforced. Even if cybersecurity activities are outsourced to an external provider, someone within the business should still be designated to manage cy...
[ -0.011594072, 0.022162465, 0.05681485, 0.0053199003, 0.035366464, -0.01478796, 0.008088586, 0.023889242, -0.009477797, 0.0347952, 0.037495725, 0.017644282, -0.011418798, -0.0108345505, 0.025161603, -0.013593498, -0.016579654, 0.0051219054, -0.014294595, -0.004657753, 0.058424...
162
e of continuous improvement in the organization's risk-related activities, with effective communication among tiers and stakeholders. Figure 1 illustrates the three-tiered approach to risk management. Figure 1: Risk Management 3-Tiered Approach <!-- image --> The NIST Risk Management Framework (RMF), described in NIS...
[ -0.012380432, 0.032491315, 0.06268692, 0.0016588257, 0.009089135, -0.010061298, 0.014851834, 0.025065398, -0.015894273, 0.069527194, -0.011080311, -0.008685043, -0.014031937, 0.00034058632, 0.03288955, -0.017241245, 0.009258971, 0.006799282, 0.010781635, 0.03497443, 0.0224534...
163
s i p u b l i c a t i o n i s a v a i l l a b e f r e e o f c h a r g e f r o m : h t t p s : / / d o i . o r g / 1 0 . 6 0 2 8 / N S T S P . 8 0 0 - 5 3 r 5 . I NIST SP 800-53, REV. 5 SECURITY AND PRIVACY CONTROLS FOR ...
[ 0.0057022995, -0.037072536, 0.061569054, -0.013692802, 0.01800215, -0.0075686723, -0.013292215, 0.019021828, -0.0019513457, 0.015537932, 0.028259613, -0.018900437, -0.017795788, -0.024326574, 0.025540475, 0.0016387663, 0.040325787, 0.04044718, 0.030954473, 0.023950266, 0.0111...
164
NIST does not necessarily endorse the views expressed or the facts presented on those sites. Further, NIST does not endorse any commercial products that may be advertised or available on these sites. ht ps:/ csrc.nist.gov/projects/protecting-control ed-unclas ified-information ## Introductory Tips for Implementers <...
[ -0.00553216, 0.0026156236, 0.07422949, -0.013782452, 0.015052237, -0.008075035, -0.0004422752, -0.0065407124, 0.0070697893, 0.048780885, 0.025488278, -0.010984958, -0.021837648, 0.0061868923, 0.01972134, -0.016189752, 0.010257478, -0.005366823, -0.017366948, 0.05073847, 0.014...
165
e of continuous improvement in the organization's risk-related activities, with effective communication among tiers and stakeholders. Figure 1 illustrates the three-tiered approach to risk management. Figure 1: Risk Management 3-Tiered Approach <!-- image --> The NIST Risk Management Framework (RMF), described in NIS...
[ -0.012383115, 0.032615505, 0.06265364, 0.0016709004, 0.009067673, -0.010028331, 0.0148667665, 0.025047397, -0.015921148, 0.06963598, -0.011094427, -0.008657636, -0.013988116, 0.00045689827, 0.032943536, -0.017139543, 0.009255119, 0.0068417587, 0.010813259, 0.035075728, 0.0225...
166
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: d, communicated, understood, and enforced. Even if cybersecurity activities are outsourced to an external provider, someone within the business should still be designated to manage cy...
[ -0.011871152, 0.022132656, 0.056545366, 0.0051956573, 0.035256475, -0.014824335, 0.008041748, 0.024001924, -0.009391774, 0.03471127, 0.037515175, 0.017615257, -0.011377872, -0.010774255, 0.025157236, -0.013643062, -0.016589755, 0.005257317, -0.014331057, -0.004754302, 0.05862...
167
According to Security and Privacy Controls for Information Systems and Organizations: With a renewed emphasis on the use of trustworthy, secure information systems and supply chain security, it is essential that organizations express their security and privacy requirements with clarity and specificity in order to obta...
[ -0.0122281825, -0.009672776, 0.048487812, -0.001051966, 0.0110301515, -0.010499004, -0.032340948, -0.012712116, -0.028280623, 0.027690459, 0.02953177, -0.06501238, 0.012818346, -0.009277366, 0.033308815, -0.023889808, 0.0527842, 0.008309498, -0.010056382, 0.008634089, 0.06534...
168
According to Assessing Enhanced Security Requirements for Controlled Unclassified Information: | CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION..........................................................................
[ 0.03428543, 0.038844522, 0.05217921, -0.014217516, 0.035945676, 0.011424084, -0.009348775, -0.00733276, -0.028461387, 0.021438276, 0.03344213, -0.0151267, -0.0030009632, 0.028197855, 0.03136023, -0.028224207, 0.016655182, 0.024179002, -0.013222686, 0.018526254, 0.023889117, ...
169
## Assessing Enhanced Security Requirements for Controlled Unclassified Information RON ROSS VICTORIA PILLITTERI KELLEY DEMPSEY This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-172A <!-- image --> ## NIST Special Publication 800-172A ## Assessing Enhanced Security Requirements...
[ -0.017489862, 0.045271054, 0.049889997, -0.022540987, 0.039760735, 0.004595309, -0.007468643, -0.014153957, -0.016787566, -0.0026690608, 0.027376022, -0.008137175, -0.037005574, 0.010750525, 0.025012527, 0.0050612553, -0.003768086, 0.0037748388, 0.0042948076, 0.051024474, 0.0...
170
vant -based on the systems that personnel have authorized access to, contextualized to the work environments of personnel (e.g., telework, shop floor), and tailored to the specific roles of personnel. The content should include: - An understanding of the need for security (why is cybersecurity important to our busines...
[ -0.020327888, 0.04417253, 0.0818444, 0.03487445, 0.024577297, -0.04249408, -0.0028157323, 0.05818625, 0.027840948, 0.041401755, 0.040868916, -0.01826313, -0.0045924243, -0.037778437, 0.042547364, 0.0063308184, 0.01334101, 0.011003169, -0.065965734, -0.0037132367, 0.03639305, ...
171
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations: - Authority and Purpose (AP); - Accountability, Audit, and Risk Management (AR); - Data Quality and Integrity (DI); - Data Minimization and Retention (DM); - Individual Participation and...
[ -0.018484728, 0.035164773, 0.056741346, 0.021138674, 0.01835203, -0.0036558094, -0.040605363, 0.01593694, -0.012745571, 0.013349344, 0.03147579, -0.010987333, -0.027866423, 0.015857322, 0.010191149, -0.03819027, 0.015074409, 0.020674232, 0.0097333435, 0.023301639, 0.03625289,...
172
ent, or possibly with other organizations like municipal governments, prime contractors, universities, etc., you will likely be required to demonstrate you are taking adequate measures to protect CUI. Examples of CUI include: <!-- image --> | | When provided as part of a government contract, exam...
[ -0.007387156, 0.00014189174, 0.0397824, 0.027608706, 0.018626036, -0.013579434, 0.008708551, 0.014162816, -0.021634316, 0.004101242, 0.047710765, 0.0088702105, 0.014760255, -0.025064318, 0.027974198, -0.008258714, 0.0031119536, -0.016053533, -0.03289428, 0.0013275443, 0.03632...
173
According to Assessing Security Requirements for Controlled Unclassified Information: | Access Control | Maintenance | Security Assessment and Monitoring | |-----------------------------------|---------------------|--------------------------------------| | Awareness and Training ...
[ 0.01883993, 0.04287623, 0.06309529, 0.0049839616, 0.04194039, 0.0063415444, 0.0042728465, 0.0055934885, 0.04676735, 0.016857427, 0.029011026, -0.021955289, 0.006218408, 0.00009081338, 0.012412188, -0.055657826, -0.036202215, 0.03075957, -0.01844589, 0.011827288, 0.04427999, ...
174
The guide was developed and is maintained by the Joint Task Force Transformation Initiative Interagency Working Group, part of an ongoing information security partnership among the U.S. Department of Defense, the Intelligence Community, the Committee on National Security Systems, the Department of Homeland Security, an...
[ -0.020826433, 0.0052127773, 0.07708742, -0.024725221, 0.001958647, -0.0115976585, 0.002243962, 0.01654517, -0.023762861, 0.016384777, 0.022504393, 0.018371185, -0.03590339, 0.0155457975, -0.011091803, -0.020110833, 0.021282937, -0.0076495195, -0.0079271225, 0.009734631, -0.00...
175
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations: 3.1.10. 3.1.10.
[ -0.0080276085, 0.021435952, 0.055074863, 0.0010679143, 0.0637238, -0.017061776, -0.002533481, 0.011730747, -0.030072467, 0.028332736, 0.0027959938, -0.0053154947, -0.008499821, -0.023250243, 0.006263026, -0.006729025, 0.04289676, -0.015583006, -0.040610258, 0.0048712427, 0.03...
176
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations: .......24 | | 2.3.2. Level 1 -Enterprise...................................................................................................................27 | | 2.3.3. Level 2 -Mission and ...
[ -0.003931448, 0.031605255, 0.10475323, -0.010257621, 0.045179635, 0.010577772, -0.0060092243, 0.010699429, -0.039007135, 0.0580881, 0.021693395, -0.04120977, -0.016570989, 0.010424099, 0.038751014, 0.019862136, 0.02476684, -0.0044308826, -0.017313737, 0.035267774, 0.074531026...
177
tegrity, and availability protection. The enhanced security requirements are implemented in addition to the basic and derived requirements since those requirements are not designed to address the APT. The enhanced security requirements apply to those components of nonfederal systems that process, store, or transmit CUI...
[ -0.013148433, 0.019653842, 0.07175966, 0.040608764, 0.036830623, 0.01120932, 0.0022737656, 0.0133360885, -0.035404436, 0.04083395, 0.0039876904, -0.022931566, -0.009326505, -0.0003788306, -0.0007295128, -0.008625922, 0.03985814, 0.0019531865, -0.033277668, 0.00568285, 0.03648...
178
nts, third-party assessments, or assessments conducted by sponsoring organizations (e.g., government agencies). Such approaches may be specified in contracts or in agreements by participating parties. \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\...
[ -0.02154128, 0.03007937, 0.02270499, 0.018771145, 0.018050151, 0.0027622296, -0.0026246717, -0.021579228, 0.013117034, 0.043284945, -0.0005407456, -0.03678335, 0.022388766, -0.014053062, 0.009467792, 0.0018641494, 0.0022341332, -0.0015186729, -0.007652657, -0.018657304, 0.034...
179
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: 3.4.3e Employ automated discovery and management tools to maintain an up-to-date, complete, accurate, and readily available inventory of system components. 3.4.3. 3.4.3e | E...
[ -0.0119802905, 0.050263483, 0.02876923, -0.015404215, 0.022582743, -0.0025076629, -0.022486296, 0.0056904657, -0.052936487, 0.03596154, 0.02548998, 0.002531775, 0.00827391, 0.00053391175, 0.03813852, -0.03039508, -0.010492227, 0.02092934, -0.03739449, -0.00046071416, 0.024773...
180
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: <!-- image --> <!-- image --> Howard Lutnick, Secretary of Commerce <!-- image --> Protecting Controlled Unclassified Information (CUI): NIST Special Publication 800-171, Revision...
[ -0.03013797, -0.012471793, 0.026815673, 0.02382297, 0.01807487, -0.031166298, -0.0097625395, 0.039577506, -0.0143834315, 0.012807977, 0.038601913, 0.003040494, -0.026828857, -0.0073696957, 0.011634627, -0.005510792, -0.0129398145, -0.00247689, -0.009709805, 0.027290286, 0.033...
181
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations: There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts and ...
[ 0.007412683, 0.013071705, 0.07083872, -0.00522349, 0.012598678, -0.005373474, 0.04531832, 0.026212633, -0.04577981, 0.022243818, 0.018240392, -0.027043315, -0.03050449, -0.01468692, 0.012102576, -0.02227843, -0.015136872, -0.008012621, -0.016313672, 0.011894905, 0.03869594, ...
182
ent procedures to generate evidence to support the assertion that the enhanced security requirements have been satisfied. The assessment procedures are typically used as part of an assessment process. An assessment process is an information-gathering and evidenceproducing activity to determine the effectiveness of the ...
[ 0.025900371, 0.00632864, 0.07707791, 0.007721502, 0.012613656, 0.03340375, 0.005468618, 0.019680792, 0.012052772, 0.055340543, 0.041729763, -0.018633809, -0.005325281, -0.010719115, 0.010264175, -0.01067549, -0.003440088, 0.010220551, -0.025750803, -0.03562236, 0.049457494, ...
183
ibed in NIST SP 800-39. To ensure that an appropriate set of controls is identified to provide security commensurate with risk, organizations tailor the controls to align with specific security needs. Organizations may perform tailoring at the organization level for all information systems, in support of a particular l...
[ 0.017040115, 0.02042675, 0.095396124, -0.012370125, 0.023753969, -0.021306086, 0.015328974, -0.005397819, -0.011847277, 0.034127764, -0.00718917, -0.002941024, -0.011532379, -0.014425872, 0.044560973, -0.043515272, 0.019725656, 0.019381052, -0.03042029, 0.008656711, 0.0418041...
184
| | | D.4.1.6. Impact Analysis...................................................................................................................226 ...
[ 0.015204367, 0.016922763, 0.07736906, -0.00328901, -0.010867136, 0.0025311972, 0.010234767, -0.024868626, 0.008317037, 0.029281467, 0.03818963, -0.019452242, -0.010427226, -0.039234415, 0.017390167, 0.01781633, 0.019617207, 0.002369668, 0.005234234, 0.026435804, 0.026642011, ...
185
According to Assessing Security Requirements for Controlled Unclassified Information: The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurement and standards infras...
[ -0.02371727, 0.03680177, 0.04560219, -0.017265346, 0.039201885, 0.0011218281, 0.0003969949, 0.012619962, -0.028775577, -0.0027307766, 0.030246615, 0.025252827, -0.011006981, 0.013303866, 0.0062454618, -0.039898694, 0.0030598245, 0.030324038, -0.033601616, 0.026788386, 0.06126...
186
following components: (i) a control section; (ii) a supplemental guidance section; (iii) a control enhancements section; (iv) a references section; and (v) a priority and baseline allocation section. Figure 2: The Risk Management Framework <!-- image --> ## 3 Control Baselines and Tailoring To assist organizations i...
[ -0.027171869, 0.03301528, 0.10732401, -0.026977088, 0.00394126, -0.01930761, -0.0063912324, 0.018723268, 0.0092520695, 0.06593317, -0.00090238114, -0.012867682, -0.025540583, 0.0014623748, 0.036350895, -0.0482325, 0.017907625, 0.008637294, 0.013452022, 0.018078057, 0.00387126...
187
According to Assessing Enhanced Security Requirements for Controlled Unclassified Information: lar A-130. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on federal agencies by the Secretary of Commerce under statutory authority. Nor should these guidel...
[ 0.01737353, 0.006562127, 0.02729092, -0.031504, 0.020066427, 0.009946345, -0.010981519, -0.021919603, -0.0059033805, -0.019429397, 0.02574178, 0.013609265, -0.021687957, -0.0076009193, 0.0032394393, 0.004158789, -0.0020757748, -0.015288706, -0.018792368, 0.014883324, 0.020327...
188
According to Assessing Security and Privacy Controls in Information Systems and Organizations: DEVELOPMENT LIFE CYCLE .................................................. 6 2.2 CONTROL STRUCTURE AND ORGANIZATION .................................................................................. 7 2.3 BUILDING AN EFFE...
[ 0.02439317, 0.024453457, 0.049678624, 0.01958206, 0.015313556, 0.032170527, 0.01094859, -0.0028215528, -0.000424288, 0.019135917, 0.058697946, -0.0488828, 0.031205893, -0.012721104, 0.008030574, -0.038778264, 0.019015336, 0.038778264, 0.022319207, 0.0030642184, 0.026189798, ...
189
| .............................................................................................................. 17 | | 3.7 MAINTENANCE | .........................
[ 0.005279712, 0.05552596, 0.08589913, -0.034763046, -0.018493822, 0.025834994, -0.0048459154, 0.0019743305, 0.008675931, 0.023387937, 0.026769325, -0.006432795, 0.019116709, -0.011619816, 0.047013164, 0.006992652, -0.006069444, 0.03298337, -0.01683279, 0.017722629, 0.014971542...
190
According to Incident Response Recommendations and Considerations for Cybersecurity Risk Management_ A CSF 2.0 Community Profile: | CSF Element | CSF Element Description | Priority | Recommendations, Considerations, Notes assist with maintaining cross-references | |---------------------|-------------------------------...
[ 0.021702657, 0.021972343, 0.047180925, 0.02157491, 0.04434212, -0.009069979, -0.010219695, 0.0026081512, -0.014371445, 0.06415697, 0.033128843, 0.004300788, -0.0146766165, 0.02210009, 0.017628973, -0.0055676047, 0.015102438, -0.012313313, -0.032333978, 0.0030996192, 0.0059756...
191
According to Assessing Enhanced Security Requirements for Controlled Unclassified Information: | ASSESSMENT PROCEDURES................................................................................................................ | 3 | | 2.2 ...
[ 0.013672956, 0.053870387, 0.06237624, -0.019992724, 0.019555507, 0.027584394, 0.0034480493, -0.0019211033, -0.002800505, 0.011155648, 0.044993564, -0.022046316, 0.014984606, 0.028988786, -0.0051571685, -0.03651421, 0.0007787921, 0.021158634, -0.032009557, -0.00010443929, 0.03...
192
n before the completion of such companion publications. Thus, until each publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For planning and transition purposes, federal agencies may wish to closely follow the development of thes...
[ 0.030432494, -0.0027782286, 0.055544622, -0.053283464, 0.0013184532, -0.02399485, 0.0023259975, 0.020988844, 0.00625143, -0.015974399, 0.028410755, 0.026269307, -0.035141017, -0.009935783, 0.018953804, -0.003980299, -0.029235411, 0.00228942, 0.0047151744, 0.029873855, 0.01241...
193
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: | Access Control | Maintenance | Security Assessment and Monitoring | |-----------------------------------|---------------------|-------------------------...
[ -0.015192494, 0.0199473, 0.10216475, 0.0028048903, 0.008835802, -0.0006996334, -0.009045573, 0.01773517, 0.00031982106, 0.023163784, 0.032291993, 0.005953042, -0.026138717, 0.00070757925, 0.023710461, -0.025833596, -0.015510328, 0.017201208, -0.008695954, 0.032749675, 0.02480...
194
cy is followed. 12 'Adequately addressed by other related controls' means that the protection capability offered by the control is provided by another control in the same or different control family. Using this tailoring option helps to eliminate potential redundancy in requirements without affecting the protection of...
[ 0.024524432, 0.041477926, 0.07868368, 0.03212241, 0.00723295, 0.02144198, -0.008537585, 0.008706579, 0.0070369164, 0.029148113, 0.04564194, -0.050076347, 0.012985511, 0.014763329, 0.03090565, -0.07068012, 0.042667646, -0.0022121335, 0.0050664446, 0.033312127, 0.027052585, 0...
195
traditional Information Technology (IT) systems, Operational Technology (OT) systems, Internet of Things 6 [32 CFR 2002] was issued on September 14, 2016, and went into effect on November 14, 2016. 7 The definition of a critical program may vary from organization to organization. For example, the Department of Defens...
[ -0.014965037, -0.005012132, 0.039825212, 0.005188831, 0.04507181, -0.0027965999, -0.008005819, 0.0024313089, 0.007407761, 0.026504835, 0.034442693, -0.0062014516, -0.03900968, -0.03033784, 0.029821336, 0.012865039, 0.006639801, -0.015766978, -0.017887365, 0.029196095, 0.02335...
196
According to Control Baselines for Information Systems and Organizations: | ORGANIZATIONAL RESPONSIBILITIES ......................................................................................... | 2 ...
[ -0.014097086, 0.024155479, 0.07121393, 0.0061347247, 0.017688457, -0.0050291964, -0.0019586387, -0.0019714194, -0.047544118, -0.003831008, 0.046853963, -0.03586258, 0.021433195, -0.0086269565, 0.018825937, -0.00047807719, 0.017074984, -0.004645776, 0.0048438767, 0.046368297, ...
197
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations: | 3.4.3. Enhancing Practices....................................................................................................................49 | ...
[ 0.009809112, 0.02632672, 0.07821927, 0.019123647, 0.04468948, 0.021114638, 0.01247222, 0.00857267, -0.0240821, 0.05295779, -0.00970132, -0.02001135, 0.014241284, -0.010018356, 0.029218093, -0.02330853, 0.022560325, 0.00441632, -0.007976641, 0.03238846, 0.058486912, 0.063204...
198
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations: SP 800-53 Revision 4 has been updated to reflect the evolving technology and threat space. Example areas include issues particular to mobile and cloud computing; insider threats; applica...
[ -0.02551039, 0.0073714294, 0.09999292, -0.0016279336, 0.009084723, -0.00979199, 0.008938392, -0.0069568246, -0.001182081, 0.041753143, 0.0019084015, 0.007103156, -0.01620617, 0.025778662, -0.0003244816, -0.049094085, 0.038119253, 0.011115067, -0.0024678132, 0.01488919, 0.0224...
199