text stringlengths 51 3.17k | embedding listlengths 1.54k 1.54k | example_idx int64 0 994 |
|---|---|---|
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
- Applying a threat-centric approach to security requirements specification;
- Employing system and security architectures that support logical and physical isolation using ... | [
0.026049037,
0.04729785,
0.06375948,
0.022840193,
0.040436663,
0.013722377,
-0.026414271,
0.030549247,
-0.036158204,
0.027027344,
0.032271065,
0.011283133,
0.004011056,
0.020974888,
0.0011022252,
-0.043515068,
0.02196624,
0.023688057,
-0.016083356,
0.03503641,
0.033471122,
... | 200 |
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations:
| 1. Introduction.....................................................................................................................................1 |
|-----------------------------------------------------------------... | [
0.015706683,
0.018023662,
0.1005813,
0.013048253,
0.035632707,
0.0013879013,
-0.0023825257,
0.0022575308,
-0.049851645,
0.055363618,
-0.0018840702,
-0.031827983,
-0.0041248333,
-0.004893095,
0.021901553,
-0.02238934,
0.02447462,
0.0088533005,
-0.015048172,
0.029511003,
0.0559... | 201 |
quirements in NIST Special Publication 800-171 and are intended for use by federal agencies in contractual vehicles or other agreements established between those agencies and nonfederal organizations.
## Keywords
Advanced Persistent Threat; Basic Security Requirement; Contractor Systems; Controlled Unclassified Inform... | [
-0.0033553408,
0.033409633,
0.050555807,
-0.002449215,
0.020556686,
-0.01328093,
-0.03220592,
0.0022034575,
-0.017828278,
0.020168824,
0.02535815,
-0.0122912135,
-0.028755287,
-0.0024525584,
0.03472034,
0.018844744,
0.027551576,
-0.010104474,
0.003362028,
0.026922973,
0.02336... | 202 |
According to Assessing Enhanced Security Requirements for Controlled Unclassified Information:
| CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION.......................................................................... | [
0.03428543,
0.038844522,
0.05217921,
-0.014217516,
0.035945676,
0.011424084,
-0.009348775,
-0.00733276,
-0.028461387,
0.021438276,
0.03344213,
-0.0151267,
-0.0030009632,
0.028197855,
0.03136023,
-0.028224207,
0.016655182,
0.024179002,
-0.013222686,
0.018526254,
0.023889117,
... | 203 |
According to Incident Response Recommendations and Considerations for Cybersecurity Risk Management_ A CSF 2.0 Community Profile:
public. Sometimes, the media learns of incidents through alternate sources (i.e., not through public affairs personnel). Having a media engagement strategy in place can greatly aid in this ... | [
0.024616996,
0.0001528539,
0.03910387,
0.0359499,
0.034960944,
-0.024790732,
-0.0109186135,
-0.003731974,
-0.005709887,
0.060941096,
0.026514724,
-0.0023320662,
0.022893004,
-0.011840749,
0.009254761,
0.0099162925,
0.009361675,
-0.0049681696,
-0.037179414,
0.01356474,
0.01053... | 204 |
| ..................................................................................................................
4 |
| 1.3 ORGANIZATIONOF THIS SPECIAL PUBLICATION | ......................... | [
0.022945784,
0.004124218,
0.06246189,
-0.007458849,
0.05467619,
0.0026974517,
-0.0048477007,
-0.000031015414,
-0.04768375,
0.0036357755,
0.047860026,
-0.036519345,
-0.020756973,
-0.001863794,
0.044040628,
0.034492128,
0.04727243,
-0.014043642,
0.0124057075,
0.033287548,
0.015... | 205 |
| | | ..............................................................................................................................................................54 | | | 7.3.4 | Formulación de políticas para el candidato a la ZTA ............................................................................54 | | | 7.... | [
0.035181962,
0.022709774,
0.05534533,
-0.01056888,
0.007600239,
0.0056287237,
-0.013797357,
0.015226461,
-0.038403943,
0.008327783,
0.007509296,
-0.0059242886,
-0.019461809,
-0.032505635,
0.0212287,
0.018019712,
0.0003292625,
-0.043236915,
0.0030465915,
0.025788844,
0.0089254... | 206 |
tect audit record content. - Ask internal information security staff, or your security vendor, what audit log information, if any, the system currently captures and how it is protected and maintained.
## Questions to Ask:
- Do audit records contain information that establishes type of event, when the event occurred, w... | [
0.024958262,
0.03161294,
0.07475894,
-0.035474457,
-0.011964262,
0.020054137,
0.014146019,
-0.020491777,
0.00011996844,
0.009602302,
0.043454923,
-0.042708363,
0.017840203,
-0.013824225,
0.016282724,
-0.008282951,
-0.029321775,
0.029244544,
-0.0072918287,
0.014841092,
0.03277... | 207 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
NIST SP 800-172, Enhanced Security Requirements for Protecting Controlled Unclassified Information provides enhanced security requirements to help protect CUI associated with critical... | [
-0.027711315,
0.021571606,
0.060914047,
0.027075734,
0.038516186,
-0.007379091,
0.0059903474,
0.040473774,
-0.0056534894,
0.02641473,
0.046397384,
0.0041503413,
-0.016575942,
-0.013016691,
0.029973982,
-0.02405037,
-0.011662904,
0.021724146,
-0.035058625,
0.011770953,
0.04627... | 208 |
8 (also known as the Common Criteria) provides functionality and assurance requirements for developers of information systems and information system components (i.e., information technology products).
Since many of the technical security controls defined in Appendix F are implemented in hardware, software, and firmware... | [
-0.017650986,
0.0011124713,
0.05537035,
0.0036564688,
0.0015336574,
-0.024943667,
-0.00056045596,
-0.0016239719,
-0.005861154,
0.031655632,
0.010182742,
-0.0079814335,
-0.024849132,
-0.012633893,
0.02397131,
-0.048401788,
0.03235789,
0.004878668,
0.0027685175,
0.022620814,
-0... | 209 |
ederal Agencies
- The National Archives and Records Administration (NARA) , per 32 CFR Part 2002 "Controlled Unclassified Information," determines what CUI is and lists CUI types at archives.gov/cui.
- NIST is responsible for developing and publishing the security requirements for the protection of CUI. How requiremen... | [
-0.036690246,
-0.0028415357,
0.058652166,
-0.021060985,
0.019402742,
-0.006672141,
0.00913992,
0.010347694,
0.017626988,
0.021269899,
0.017901184,
0.007977844,
-0.032433655,
0.024978094,
-0.020068651,
-0.020395078,
-0.00006574417,
-0.011575055,
-0.009903755,
0.0065872706,
0.0... | 210 |
| ..............................................................................................................
17 |
| 3.7 MAINTENANCE | ......................... | [
0.005287199,
0.05552671,
0.0859003,
-0.03476352,
-0.018494073,
0.025835345,
-0.004860812,
0.0019817727,
0.008646387,
0.023358593,
0.026784519,
-0.006447713,
0.01914663,
-0.011627388,
0.047043465,
0.006992747,
-0.0060509876,
0.032954153,
-0.01686268,
0.01772287,
0.014971745,
... | 211 |
According to Assessing Security Requirements for Controlled Unclassified Information:
- System development life cycle responsibilities (e.g., program managers, mission/business owners, information owners/stewards, system designers and developers, system/security engineers, systems integrators)
- Acquisition or procure... | [
0.0067462036,
0.045064397,
0.08078319,
-0.0060244882,
0.02874629,
0.002793589,
-0.00321408,
-0.0026437412,
0.005458737,
-0.0015779878,
0.052893173,
-0.03126618,
0.031853337,
0.0028730999,
0.01059943,
-0.052110296,
-0.034299828,
0.032954257,
-0.022397641,
0.033492487,
0.022507... | 212 |
functional and assurance specifications, design documentation, and architectures) associated with a system. Mechanisms are the hardware, software, and firmware safeguards implemented within a system.
Activities are the protectionrelated actions supporting a system that involve people (e.g., conducting system backup
2 ... | [
-0.016108207,
0.038718585,
0.055845056,
-0.016108207,
-0.016586669,
0.029566474,
0.00022082843,
-0.009661244,
0.030130813,
0.0026744776,
0.04470549,
-0.043969397,
-0.0027174165,
-0.028094284,
0.0055912533,
0.013495071,
-0.013163828,
-0.009538561,
-0.0062015983,
-0.027873456,
... | 213 |
According to A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Cloud Environments:
- The global control plane can be leveraged to perform the functions of individual control planes at the enterprise level rather than at the cluster level (e.g., issuing identities to all services ... | [
0.0080949245,
0.018787341,
0.07092696,
0.027350761,
0.073204204,
-0.017862206,
-0.059683014,
0.03427741,
0.01314165,
0.04606694,
0.0131653715,
0.01844338,
0.0048361984,
-0.022132056,
-0.032759238,
-0.03565325,
-0.020447837,
0.015312157,
0.0032320393,
0.020708773,
0.02287928,
... | 214 |
According to Assessing Security and Privacy Controls in Information Systems and Organizations:
CHAPTER ONE INTRODUCTION ............................................................................................................... 1
1.1 PURPOSE AND APPLICABILITY ........................................................ | [
-0.001046523,
0.01816868,
0.051043686,
0.022105807,
0.01711492,
-0.0054193386,
-0.021503659,
-0.00070274813,
-0.010022303,
0.024155429,
0.030871704,
-0.0376343,
0.02406279,
-0.0054367087,
0.01286514,
-0.025591321,
0.027351448,
0.03221496,
0.032400236,
0.006913131,
0.032956064... | 215 |
administrator does not need access to CUI, their access should be restricted. - Reassign or remove privileges as necessary, such as when an individual no longer requires access to CUI and the system.
- Identify who within the business has administrative (i.e., system administrator or domain administrator) privileges on... | [
0.012499843,
0.046604827,
0.083255716,
0.04594123,
0.03644671,
0.014445964,
-0.021745516,
0.026543822,
0.026467253,
0.044971358,
0.021987984,
-0.016053908,
-0.0079121,
0.013335718,
0.03381785,
-0.006093594,
-0.01115351,
0.023493834,
-0.025586713,
0.037748378,
0.017432144,
0... | 216 |
gnificant contributions from individuals and organizations in the public and private sectors whose constructive comments improved the overall quality, thoroughness, and usefulness of this publication.
The authors also wish to thank the NIST technical editing and production staff - Jim Foti, Jeff Brewer, Eduardo Takamur... | [
0.015862823,
0.017593062,
0.035296857,
0.0011860783,
0.025925888,
0.00421486,
-0.005841284,
-0.00074789545,
-0.022700725,
0.015821297,
0.038618915,
-0.013385123,
-0.032251637,
-0.023060614,
0.02092896,
0.014783154,
0.011426493,
-0.014063376,
-0.008727321,
0.0063534346,
0.0274... | 217 |
According to Control Baselines for Information Systems and Organizations:
| ORGANIZATIONAL RESPONSIBILITIES .........................................................................................
| 2 ... | [
-0.014251462,
0.024042154,
0.07127009,
0.006144745,
0.017676925,
-0.005013575,
-0.0020546392,
-0.0020418575,
-0.047445226,
-0.0038632327,
0.046933964,
-0.03583955,
0.021447493,
-0.008595613,
0.018725015,
-0.00039882524,
0.017165663,
-0.0046684723,
0.004911322,
0.04619263,
0.0... | 218 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
| Access Control | Maintenance | Security Assessment and Monitoring |
|-----------------------------------|---------------------|-------------------------... | [
-0.030569682,
0.007443833,
0.059089426,
-0.0045707184,
0.009705169,
-0.007309306,
-0.010762168,
0.009365649,
0.021460276,
0.021101536,
0.040819366,
0.021921512,
-0.019820327,
0.005602093,
0.0107237315,
-0.029672835,
-0.027187286,
0.012530238,
-0.013785825,
0.025470465,
0.0492... | 219 |
| ..................................................................................................................
4 |
| 1.3 ORGANIZATIONOF THIS SPECIAL PUBLICATION | ......................... | [
0.022946618,
0.0041317134,
0.062464163,
-0.0074554477,
0.05467818,
0.0027177494,
-0.004836859,
-0.000042694373,
-0.0476561,
0.0036469258,
0.04783239,
-0.036520675,
-0.02075773,
-0.0018601893,
0.04404223,
0.03449338,
0.047274146,
-0.014058844,
0.012428194,
0.03328876,
0.015704... | 220 |
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations:
The NIST Risk Management Framework (RMF), described in NIST Special Publication 800-37 Revision 1, Guide for Applying the Risk Management Framework to Federal Information Systems: a Secu... | [
-0.018804658,
0.044273976,
0.04562037,
0.0071751666,
0.0104962755,
-0.010081137,
0.026546434,
0.03287449,
-0.017671442,
0.054394383,
-0.009918448,
0.014484973,
-0.015775269,
0.01864758,
0.037115637,
-0.032133974,
0.00605878,
0.008869381,
-0.0018470865,
0.03689124,
0.032986693... | 221 |
According to Incident Response Recommendations and Considerations for Cybersecurity Risk Management_ A CSF 2.0 Community Profile:
Many organizations may use more than one of these approaches, such as internally performing basic incident response and engaging third-party resources for assistance with certain incidents.... | [
-0.007807667,
-0.016694069,
0.06698676,
0.026073793,
0.022206137,
-0.010458459,
-0.007478785,
0.029730964,
-0.012293623,
0.088298336,
0.018233238,
-0.029152133,
0.036676962,
0.021548372,
0.008268102,
0.0067618215,
0.03409852,
0.0029648745,
-0.036466476,
0.013411823,
-0.021956... | 222 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
| Access Control | Maintenance | Security Assessment and Monitoring |
|-----------------------------------|---------------------|-------------------------... | [
-0.015968371,
0.017861396,
0.07942977,
0.0059817,
0.028511269,
-0.016251681,
-0.006844507,
0.015479017,
-0.008557244,
0.013830669,
0.038684666,
0.00022777464,
-0.022214064,
0.03543948,
-0.0026850044,
-0.020784637,
0.007275911,
0.025523638,
-0.011609263,
0.0134958485,
0.047003... | 223 |
SR-9, and SR-11. T
h
s
i
p
u
b
l
i
c
a
t
i
o
n
i
s
a
v
a
i
l
l
a
b
e
f
r
e
e
o
f
c
h
a
r
g
e
f
r
o
m
:
h
t
t
p
s
:
/
/
d
o
i
. o
r
g
/
1
0
. 6
0
2
8
/
N
S
T
S
P
. 8
0
0
-
5
3
r
5
I
.
viii
T
h
s
i
p
u
b
l
i
c
a
t
i
o
n
i
s
a
v
a
i
l
l
a
b
e
f
r
e
e
o
f
c
h
a
r
g
e
f
r
o
m
:
h
t
t
p
s
:
... | [
0.026262242,
0.0021438894,
0.060345083,
0.0076850937,
0.0068268925,
0.004610411,
0.021177562,
0.022274511,
-0.0050491905,
0.008285189,
0.02293268,
-0.01593802,
-0.021835731,
-0.015808966,
0.01251812,
-0.016854294,
0.020519393,
0.006549429,
0.03481844,
-0.0029456299,
0.0234617... | 224 |
f those systems or components, helps practitioners understand the scope of applicability of SP 800-171 security requirements to business systems. <!-- image -->
Scope and Applicability of SP 800-171.
The security requirements in NIST SP 800-171 are only applicable to components of nonfederal systems that process, stor... | [
-0.033418585,
0.0056064073,
0.05012788,
0.002404709,
-0.0040673935,
-0.032075003,
-0.012330432,
0.0048979726,
0.0053865486,
0.04287253,
0.023134066,
-0.012171645,
-0.025503658,
-0.0088798655,
0.010089091,
-0.0074568884,
-0.01817502,
0.031146709,
-0.023683712,
-0.00406434,
0.0... | 225 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. Th... | [
0.012861675,
0.010412418,
0.06316374,
-0.03475729,
-0.0053477488,
0.012141667,
0.0073908474,
0.02577258,
-0.04627741,
-0.012738597,
0.015914014,
-0.00617545,
-0.019594053,
0.026757207,
0.002463103,
-0.033994205,
0.028849537,
-0.0025123344,
-0.030966481,
0.025255652,
0.0226587... | 226 |
, and academic organizations. ## Supplemental Content
NIST has established an Incident Response project page that hosts links to resources with additional information on incident response activities.
By moving links from this document to a website, NIST can update and expand them as needed without having to release a ... | [
-0.0160928,
-0.01955644,
0.057769023,
-0.027584083,
0.008852915,
-0.035261612,
-0.014767363,
0.010372166,
-0.029534725,
0.031985532,
0.053617656,
-0.006298949,
0.018968746,
-0.025033243,
0.010803558,
0.018293524,
0.011303722,
-0.023520244,
-0.023932882,
0.02244489,
-0.0166679... | 227 |
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations:
The security control baselines address the security needs of a broad and diverse set of constituencies, and are developed based on a number of general assumptions, including common envir... | [
-0.03500365,
0.009512632,
0.11119918,
-0.009660251,
0.0119336,
-0.012695318,
-0.0036964044,
-0.0049186978,
0.009766538,
0.025296161,
0.0037643095,
0.0002415432,
-0.012057601,
0.001684344,
0.007274713,
-0.04728563,
0.03568861,
0.012896081,
-0.011213214,
0.0074341423,
0.0252725... | 228 |
| |
| D.4.1.2.
Description .........................................................................................................................218 ... | [
0.023984581,
0.038529005,
0.056311626,
-0.02243409,
-0.0057354434,
0.0035194766,
0.009186314,
-0.016300734,
-0.025809495,
0.031586103,
0.027113004,
0.0051797363,
-0.0161498,
-0.026083918,
0.024355052,
0.027812783,
0.039132737,
0.007368261,
-0.017933551,
0.023943417,
0.0664103... | 229 |
According to Assessing Security Requirements for Controlled Unclassified Information:
Additional information about this publication is available at https://csrc.nist.gov/pubs/sp/800/171/a/r3/final, including related content, potential updates, and document history.
| Access Control | Maintenance ... | [
-0.00066399074,
0.05871814,
0.08468472,
-0.015801864,
0.03994466,
0.036985796,
0.047494866,
0.027777608,
0.030404875,
0.009756599,
0.033695336,
-0.002997125,
-0.0075629577,
0.008506733,
0.06468689,
-0.061472945,
0.0069380254,
-0.0014260256,
-0.024576424,
0.037342902,
0.031705... | 230 |
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations:
Organizations are concerned about the risks associated with products and services that may potentially contain malicious functionality, are counterfeit, or are vulnerable due to poor manufacturing and development practices... | [
0.013946068,
0.025322799,
0.07258379,
0.02480399,
0.054549012,
0.0074300794,
0.019801192,
0.0048113316,
-0.031079102,
0.045630448,
0.01429194,
-0.03073323,
-0.0014506567,
-0.023296975,
0.015910128,
-0.026681582,
0.011117326,
-0.001795757,
-0.011660839,
0.010036475,
0.06670395... | 231 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
ent, or possibly with other organizations like municipal governments, prime contractors, universities, etc., you will likely be required to demonstrate you are taking adequate measure... | [
-0.008649043,
0.0029976794,
0.045061782,
0.015630636,
0.018504612,
-0.011299337,
-0.0037788723,
0.022680013,
-0.044329733,
0.012153396,
0.049074505,
0.021324363,
-0.000002204254,
-0.022205535,
0.016728712,
-0.0052938107,
-0.014315656,
-0.008255905,
-0.031830646,
0.012804108,
... | 232 |
According to Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations:
aft publications during public comment periods and provide feedback to NIST. Many NIST cybersecurity publications, other than the ones noted above, are available at https://csrc.nist.gov/publications.
## Authority
Thi... | [
-0.027080853,
0.007467907,
0.01069797,
-0.041525695,
0.007965337,
-0.0027843148,
-0.041474015,
-0.002790775,
-0.021796469,
-0.007907195,
0.05232703,
0.0129267145,
-0.013101137,
-0.022817168,
0.008895595,
0.0016602527,
0.008514447,
-0.0016844781,
-0.012913794,
0.025284937,
0.0... | 233 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
| CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION....................... | [
0.02867414,
0.007869022,
0.055200994,
-0.015305968,
0.042841,
0.0015891889,
-0.024628337,
0.011666054,
-0.052241925,
0.017374696,
0.016248679,
0.0011963925,
-0.011711881,
0.024143888,
0.024667617,
-0.014638214,
0.03294253,
0.013839528,
-0.026042404,
0.02346304,
0.02809804,
... | 234 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
| CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION....................... | [
0.02867414,
0.007869022,
0.055200994,
-0.015305968,
0.042841,
0.0015891889,
-0.024628337,
0.011666054,
-0.052241925,
0.017374696,
0.016248679,
0.0011963925,
-0.011711881,
0.024143888,
0.024667617,
-0.014638214,
0.03294253,
0.013839528,
-0.026042404,
0.02346304,
0.02809804,
... | 235 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
systems, but such standards and guidelines shall not apply to national security systems without the express approval of the appropriate federal officials exercising policy a... | [
0.005651286,
0.016780078,
0.037313778,
-0.011518057,
0.02336977,
0.00050482736,
-0.023467086,
-0.011949029,
-0.026372667,
0.0049665975,
0.02512146,
0.021075891,
-0.027874116,
-0.00428886,
0.0053419597,
-0.0070415162,
-0.00080807135,
-0.017169343,
-0.021381741,
0.0153898485,
0... | 236 |
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations:
8 (also known as the Common Criteria) provides functionality and assurance requirements for developers of information systems and information system components (i.e., information technol... | [
-0.007969909,
-0.016911758,
-0.0043312083,
0.013388475,
0.03705522,
-0.013740804,
0.008231118,
0.039703757,
0.0044891485,
0.005172544,
0.0047290963,
-0.0098408945,
-0.03299737,
-0.01672952,
0.0076418794,
-0.03676364,
0.023508802,
-0.011602536,
0.0015657349,
-0.0019013579,
0.0... | 237 |
tems (including hardware, software, firmware, and documentation); and establishing and enforcing security configuration settings for information technology products employed in organizational systems.
## Getting Started with Configuration Management
<!-- image -->
Changes to a system can have potentially significant ... | [
0.012264149,
0.033847723,
0.06886536,
0.01403896,
0.017920947,
-0.02322544,
0.015860304,
0.02685483,
-0.008495167,
0.03320959,
0.021537043,
-0.0077174404,
-0.011891904,
0.015235463,
0.037596762,
0.0043339976,
0.0024046374,
0.030683639,
-0.002667203,
0.015514648,
0.0449619,
... | 238 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
ent, or possibly with other organizations like municipal governments, prime contractors, universities, etc., you will likely be required to demonstrate you are taking adequate measure... | [
-0.008680938,
0.003012238,
0.04507853,
0.015627043,
0.018527465,
-0.011289963,
-0.0037949455,
0.022688352,
-0.04434665,
0.012137049,
0.04909033,
0.021319462,
0.000029727425,
-0.022200432,
0.016711313,
-0.0052824286,
-0.014312366,
-0.008274336,
-0.03187754,
0.012814717,
0.0477... | 239 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
NIST SP 800-172, Enhanced Security Requirements for Protecting Controlled Unclassified Information provides enhanced security requirements to help protect CUI associated with critical... | [
-0.03381602,
0.015649445,
0.07571738,
-0.0004270703,
0.0139205055,
0.00039191148,
0.00867648,
0.031222614,
-0.0070873806,
0.020658284,
0.04085891,
0.008949804,
-0.014619709,
0.009712572,
-0.0010917109,
-0.019298015,
0.0057970323,
0.019120036,
-0.03043442,
0.01904376,
0.034451... | 240 |
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations:
| 1. Introduction.....................................................................................................................................1 |
|-----------------------------------------------------------------... | [
0.015706683,
0.018023662,
0.1005813,
0.013048253,
0.035632707,
0.0013879013,
-0.0023825257,
0.0022575308,
-0.049851645,
0.055363618,
-0.0018840702,
-0.031827983,
-0.0041248333,
-0.004893095,
0.021901553,
-0.02238934,
0.02447462,
0.0088533005,
-0.015048172,
0.029511003,
0.0559... | 241 |
According to Security and Privacy Controls for Information Systems and Organizations:
............................................................. 16
3.1 ACCESS CONTROL ..................................................................................................................
18
3.2 AWARENESS AND TRAINING ... | [
-0.0040349783,
0.032724887,
0.06021379,
0.00015022767,
0.030970832,
0.0017851425,
0.018600825,
0.015721034,
-0.010465418,
0.023614278,
0.047621254,
-0.013966981,
0.019765832,
-0.0032119476,
0.019792011,
-0.026323898,
0.021624604,
0.033955343,
0.023954617,
0.024046246,
0.01608... | 242 |
According to Assessing Security Requirements for Controlled Unclassified Information:
other than the ones noted above, are available at
Organizations are encouraged to review all draft publications during public comment periods and provide feedback https://csrc.nist.gov/publications.
## Authority
This publication ha... | [
-0.023494147,
0.044498675,
0.043712478,
-0.05325165,
0.015435641,
0.005755607,
-0.028879587,
-0.022210026,
-0.010279508,
-0.010200888,
0.03962426,
-0.0134177385,
-0.0078881625,
-0.0031775406,
0.010030546,
-0.002908924,
0.020545913,
-0.0039964947,
-0.010836396,
0.031631272,
0.... | 243 |
<!-- image -->
<!-- image -->
Howard Lutnick, Secretary of Commerce
<!-- image -->
Protecting Controlled Unclassified Information (CUI): NIST Special Publication 800-171, Revision 3 Small Business Primer
## Purpose of this Primer
This guide provides small businesses with an overview of NIST Special Publication (S... | [
-0.033670038,
-0.010702927,
0.0055806693,
0.0199974,
0.013699215,
-0.030268488,
-0.0010613237,
0.036646396,
-0.0104571115,
0.0006352994,
0.049774256,
-0.0076136277,
-0.019665215,
-0.018867977,
0.009540287,
0.0028567712,
-0.015586012,
-0.008437441,
0.00096499076,
0.034121808,
... | 244 |
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations:
| 1 | Introduction ............................................................................................................1 | |------------------------------------------------------... | [
-0.020964958,
0.03140085,
0.049710244,
-0.014023228,
0.013895108,
-0.007384324,
-0.01210144,
0.0065981383,
-0.021815203,
0.034545593,
0.0038726935,
-0.009981649,
-0.02328275,
0.0076405625,
0.02727774,
-0.035710312,
0.014768648,
0.008811106,
0.009638057,
0.039390825,
0.0194508... | 245 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
| CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION....................... | [
0.02867414,
0.007869022,
0.055200994,
-0.015305968,
0.042841,
0.0015891889,
-0.024628337,
0.011666054,
-0.052241925,
0.017374696,
0.016248679,
0.0011963925,
-0.011711881,
0.024143888,
0.024667617,
-0.014638214,
0.03294253,
0.013839528,
-0.026042404,
0.02346304,
0.02809804,
... | 246 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
d, communicated, understood, and enforced. Even if cybersecurity activities are outsourced to an external provider, someone within the business should still be designated to manage cy... | [
-0.011644907,
0.022290196,
0.056653704,
0.0053680814,
0.035441022,
-0.014851476,
0.007964494,
0.0240947,
-0.0094898855,
0.034895774,
0.037466224,
0.017551744,
-0.011365793,
-0.010651779,
0.02522414,
-0.013657127,
-0.016539143,
0.005114931,
-0.014241319,
-0.0047903797,
0.05852... | 247 |
According to Assessing Security and Privacy Controls in Information Systems and Organizations:
In developing standards and guidelines required by [FISMA], NIST consults with other federal agencies and
offices as well as private sector entities to improve information security, avoid unnecessary and costly
duplication o... | [
-0.030255347,
-0.0042959377,
0.07792418,
0.016931048,
0.03473507,
0.011561126,
-0.02095131,
-0.02439725,
-0.023225632,
-0.0005631957,
0.0059270156,
0.0077016745,
-0.045785047,
-0.01188849,
-0.0035033715,
-0.0017789662,
-0.019147936,
-0.0069263377,
0.012612138,
-0.024489142,
0... | 248 |
Implement in phases based upon your resources (includin g time, expertise, budget, etc.), starting with understanding what security requirements you may have already satisfied and building from there.
A system security plan documents how an organization meets or plans to meet the security requirements for a system. In ... | [
0.01342506,
0.036649942,
0.06759307,
0.004788817,
-0.014383992,
-0.031574618,
0.0029878942,
-0.005589877,
0.013612168,
0.026896896,
0.015997807,
-0.021692932,
0.052390475,
-0.042122878,
0.022757113,
-0.028884927,
-0.0062389104,
0.02918898,
0.0053296783,
-0.010542414,
0.036533... | 249 |
Parameters
- Appendix E: Change Log
The contents of this publication can be used for many different assessment-related purposes to determine organizational compliance with the security requirements.
The broad range of potential assessment methods and objects listed in this publication does not necessarily reflect an... | [
0.01069364,
0.012967092,
0.06155806,
-0.028188203,
0.006904555,
0.0010484755,
-0.014793625,
-0.0066389954,
0.04940708,
0.04248957,
0.04624627,
-0.00045258517,
0.02288996,
0.011121127,
0.007196023,
0.002989167,
0.029664975,
0.02492376,
-0.01272744,
-0.026270991,
0.014586358,
... | 250 |
However, holders of patents are not obligated to
respond to ITL calls for patents and ITL has not undertaken a patent search in order to identify
which, if any, patents may apply to this publication.
As of the date of publication and following call(s) for the identification of patent claims whose
use may be required fo... | [
0.003459111,
0.009379639,
0.08349126,
-0.015241093,
0.012904388,
-0.0103838965,
-0.009031759,
-0.003135845,
-0.03008836,
-0.015136072,
0.023826515,
-0.009701264,
-0.027147787,
0.0012627068,
-0.003757763,
0.0034623928,
0.015910598,
-0.017446522,
0.0116966525,
-0.0067672553,
0.... | 251 |
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations:
- Authority and Purpose (AP);
- Accountability, Audit, and Risk Management (AR);
- Data Quality and Integrity (DI);
- Data Minimization and Retention (DM);
- Individual Participation and... | [
-0.018318204,
0.035044674,
0.056718785,
0.021236384,
0.018318204,
-0.0037007814,
-0.040589213,
0.016142834,
-0.012939471,
0.013390462,
0.031410217,
-0.011128873,
-0.027855344,
0.015691843,
0.010140671,
-0.03825467,
0.015002092,
0.020904772,
0.009616726,
0.023332166,
0.0363711... | 252 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
d, communicated, understood, and enforced. Even if cybersecurity activities are outsourced to an external provider, someone within the business should still be designated to manage cy... | [
-0.011644907,
0.022290196,
0.056653704,
0.0053680814,
0.035441022,
-0.014851476,
0.007964494,
0.0240947,
-0.0094898855,
0.034895774,
0.037466224,
0.017551744,
-0.011365793,
-0.010651779,
0.02522414,
-0.013657127,
-0.016539143,
0.005114931,
-0.014241319,
-0.0047903797,
0.05852... | 253 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
NIST SP 800-172, Enhanced Security Requirements for Protecting Controlled Unclassified Information provides enhanced security requirements to help protect CUI associated with critical... | [
-0.03386234,
0.015520239,
0.07570724,
-0.00035710214,
0.013829664,
0.00035670493,
0.008586341,
0.03126928,
-0.007054654,
0.020604674,
0.040878862,
0.008961317,
-0.014566908,
0.00968585,
-0.0010947424,
-0.019282721,
0.0057231677,
0.019219166,
-0.030354079,
0.019066632,
0.03444... | 254 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
Advanced Persistent Threat; Basic Security Requirement; Contractor Systems; Controlled Unclassified Information; CUI Registry; Derived Security Requirement; Enhanced Securit... | [
0.015045553,
0.009218774,
0.06336863,
0.010863378,
0.031118983,
0.0067454446,
-0.03250662,
-0.0004115524,
-0.050802834,
0.023345662,
0.03458807,
-0.019748092,
-0.028086746,
0.009514289,
0.042065877,
-0.013966282,
0.046331566,
0.020994393,
-0.0051490227,
0.01724264,
0.04219436... | 255 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
| Access Control | Maintenance | Security Assessment and Monitoring |
|-----------------------------------|---------------------|-------------------------... | [
-0.00762443,
0.02506322,
0.074792616,
0.012866613,
0.015571456,
-0.0078043393,
0.0029700536,
0.02672583,
0.007897396,
0.014889042,
0.050622743,
0.0040975884,
0.006662846,
-0.0008979953,
0.024045803,
-0.015670717,
-0.040795974,
0.026849905,
-0.01409496,
0.028760666,
0.03776853... | 256 |
According to Zero Trust Architecture:
| | | 3.2.2. | [
0.0068854997,
0.043218926,
0.04080296,
0.008066637,
0.03132701,
-0.0069995867,
-0.033259783,
0.013703889,
-0.021032315,
0.028857356,
-0.0015628272,
-0.0029595569,
0.0007335976,
0.012958966,
-0.004392358,
-0.009771235,
0.049124617,
-0.016254073,
-0.016831221,
0.03623947,
0.014... | 257 |
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations:
To aid in review activities, security planning, and risk assessments, organizations document the relevant decisions taken during the security control selection process, providing a sound... | [
-0.010191585,
0.010681679,
0.036066163,
0.02494163,
0.027303528,
0.014313095,
0.0038971298,
-0.000739938,
-0.0021508024,
0.00057017663,
0.010675774,
-0.011254438,
-0.013887953,
0.0077942596,
0.0059076943,
-0.03223989,
0.030799136,
-0.0013551383,
0.0068022627,
-0.004998364,
0.... | 258 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
............................................ 5 |
| 2.1 DEVELOPMENTAPPROACH .............................................................................. | [
0.018343858,
0.027703518,
0.050713796,
-0.015769282,
0.06066346,
0.0065101925,
-0.0112369545,
0.015675418,
-0.041220047,
0.01597042,
0.024364613,
-0.0024572457,
0.008917154,
0.029661268,
0.014602677,
-0.017512485,
0.045001455,
0.0048910254,
-0.03320131,
0.03218221,
0.03808228... | 259 |
quirements in NIST Special Publication 800-171 and are intended for use by federal agencies in contractual vehicles or other agreements established between those agencies and nonfederal organizations.
## Keywords
Advanced Persistent Threat; Basic Security Requirement; Contractor Systems; Controlled Unclassified Inform... | [
-0.0033553408,
0.033409633,
0.050555807,
-0.002449215,
0.020556686,
-0.01328093,
-0.03220592,
0.0022034575,
-0.017828278,
0.020168824,
0.02535815,
-0.0122912135,
-0.028755287,
-0.0024525584,
0.03472034,
0.018844744,
0.027551576,
-0.010104474,
0.003362028,
0.026922973,
0.02336... | 260 |
According to Incident Response Recommendations and Considerations for Cybersecurity Risk Management_ A CSF 2.0 Community Profile:
so develop and maintain procedures for particularly important processes that may be urgently needed during emergency situations, such as redeploying the organization's primary authenticatio... | [
0.025772575,
0.026726106,
0.08069595,
0.027393578,
0.030676449,
-0.008622643,
-0.022653168,
0.051953807,
-0.016373485,
0.054269526,
0.030485742,
0.0027175627,
0.014534534,
0.040347975,
-0.00046101512,
0.0037357975,
0.021985697,
0.013090616,
-0.02814278,
-0.007131048,
-0.00105... | 261 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
............................................ 5 |
| 2.1 DEVELOPMENTAPPROACH .............................................................................. | [
0.017715218,
0.028639602,
0.051454652,
-0.015903434,
0.060768563,
0.0064553176,
-0.010763337,
0.01538003,
-0.0412013,
0.016789194,
0.024465788,
-0.0016071191,
0.008179868,
0.030706376,
0.014802943,
-0.017916527,
0.045388535,
0.004989115,
-0.033095248,
0.032343693,
0.03808772,... | 262 |
P[06]: circumstances requiring users to log out of the system are defined . A.03.01.01.a[01]:
A.03.01.01.a[02]:
system account types allowed are defined. system account types prohibited are defined.
A.03.01.01.b[01]: system accounts are created in accordance with organizational policy, procedures, prerequisites, and ... | [
-0.003325664,
0.0618652,
0.06841756,
0.010763616,
0.047340803,
0.027451659,
0.008770607,
0.00046071282,
0.040706538,
0.043218274,
0.047559213,
-0.020012,
-0.024052622,
0.034700207,
0.019425018,
-0.005310142,
0.011753296,
0.050616983,
-0.050971903,
0.028693877,
0.031697042,
... | 263 |
| ..................................................................................................................
4 |
| 1.3 ORGANIZATIONOF THIS SPECIAL PUBLICATION | ......................... | [
0.022945784,
0.004124218,
0.06246189,
-0.007458849,
0.05467619,
0.0026974517,
-0.0048477007,
-0.000031015414,
-0.04768375,
0.0036357755,
0.047860026,
-0.036519345,
-0.020756973,
-0.001863794,
0.044040628,
0.034492128,
0.04727243,
-0.014043642,
0.0124057075,
0.033287548,
0.015... | 264 |
According to Risk Management Framework for Information Systems and Organizations_ A System Life Cycle Approach for Security and Privacy:
curity officer; senior agency official for privacy; supply chain risk management; system development life cycle; system owner; system privacy officer; system security officer; system... | [
0.027702853,
0.008609425,
0.05993196,
0.03700076,
0.03323797,
0.018227715,
0.016332686,
0.016782586,
-0.008548075,
0.0017842574,
0.030238647,
-0.005201102,
-0.013674194,
0.006308807,
-0.0048909443,
-0.037518825,
0.020545375,
0.0346013,
-0.01169055,
0.000013173969,
0.008623059... | 265 |
According to Incident Response Recommendations and Considerations for Cybersecurity Risk Management_ A CSF 2.0 Community Profile:
## Incident Response Recommendations and Considerations for Cybersecurity Risk Management
## Incident Response Recommendations and Considerations for Cybersecurity Risk Management
Nelson ... | [
0.021263007,
-0.017891442,
0.052960634,
-0.0078013577,
0.030983942,
-0.019109635,
0.00054411084,
0.017103923,
-0.011658969,
0.06285384,
-0.0036545792,
-0.009308718,
-0.0038822214,
0.035955153,
0.0062939976,
-0.0011758948,
0.006100194,
0.004746646,
-0.029212024,
0.022148965,
-... | 266 |
ization's cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored. - Identify (ID): The organization's current cybersecurity risks are understood.
- Protect (PR): Safeguards to manage the organization's cybersecurity risks are used. - Detect (DE): Possible cybersecu... | [
-0.0076835263,
0.015041888,
0.05096659,
0.0328537,
0.011127866,
-0.0019675489,
0.006858571,
0.040175933,
0.009905486,
0.08088176,
0.06859776,
-0.028325478,
-0.0012457129,
-0.039525602,
0.018209236,
0.0058379145,
-0.03726149,
0.03201068,
-0.030156035,
0.031577125,
0.03025238,
... | 267 |
processing, storing, or transmitting CUI. The assessments focus on the overall effectiveness of the security safeguards intended to satisfy the enhanced security requirements defined in [SP 800-172].
## 1.2 TARGET AUDIENCE
This publication serves system, information security, and privacy professionals, including ind... | [
0.032144565,
0.02090182,
0.07256086,
-0.013912734,
-0.0066618826,
-0.021215936,
0.010549071,
0.012538475,
0.008952314,
0.032641917,
0.02874164,
-0.027249588,
-0.012283255,
-0.0017816282,
0.022066668,
-0.0094104,
0.0117793605,
0.0112885535,
-0.0048982506,
-0.025234008,
0.02105... | 268 |
<!-- image -->
<!-- image -->
Howard Lutnick, Secretary of Commerce
<!-- image -->
Protecting Controlled Unclassified Information (CUI): NIST Special Publication 800-171, Revision 3 Small Business Primer
## Purpose of this Primer
This guide provides small businesses with an overview of NIST Special Publication (S... | [
-0.03369574,
-0.010715935,
0.005597133,
0.020010166,
0.013725433,
-0.030267702,
-0.0010430266,
0.03661887,
-0.010470127,
0.00064940035,
0.049772963,
-0.007600143,
-0.019638132,
-0.018880775,
0.009553326,
0.0028351059,
-0.015585608,
-0.0084770825,
0.0009998439,
0.03412092,
0.0... | 269 |
According to Security and Privacy Controls for Information Systems and Organizations:
There may be references in this publication to other publications currently under development by
NIST in accordance with its assigned statutory responsibilities. The information in this publication,
including concepts, practices, and... | [
-0.010413678,
-0.015459353,
0.045919362,
-0.02403824,
0.0061273337,
0.004208862,
-0.010264912,
0.014851889,
-0.033323772,
0.014504766,
0.031166652,
-0.02256297,
-0.0010932813,
-0.020616604,
0.009006592,
-0.01291792,
0.024794472,
-0.0035022192,
0.018199142,
0.032679114,
0.0191... | 270 |
and specificity needed by organizations to clearly define their CUI security requirements, given the diverse nature of their missions, business functions, operational environments, and risk tolerance.
ODPs support consistent security assessments in determining whether security requirements have been satisfied. If a fed... | [
-0.025293933,
-0.013516614,
0.079333425,
0.014386261,
0.007233579,
-0.013476165,
-0.003822404,
-0.0068863947,
0.035567906,
0.046084575,
0.032305043,
0.00029851997,
-0.028448932,
-0.030417437,
0.030875856,
-0.030039916,
-0.0023325428,
0.0020696262,
-0.023851262,
-0.0011797543,
... | 271 |
NIST does not necessarily endorse the views expressed or the facts presented on those sites. Further, NIST does not endorse any commercial products that may be advertised or available on these sites.
ht ps:/
csrc.nist.gov/projects/protecting-control ed-unclas ified-information
## Introductory Tips for Implementers
<... | [
-0.00553216,
0.0026156236,
0.07422949,
-0.013782452,
0.015052237,
-0.008075035,
-0.0004422752,
-0.0065407124,
0.0070697893,
0.048780885,
0.025488278,
-0.010984958,
-0.021837648,
0.0061868923,
0.01972134,
-0.016189752,
0.010257478,
-0.005366823,
-0.017366948,
0.05073847,
0.014... | 272 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
| CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION....................... | [
0.02867414,
0.007869022,
0.055200994,
-0.015305968,
0.042841,
0.0015891889,
-0.024628337,
0.011666054,
-0.052241925,
0.017374696,
0.016248679,
0.0011963925,
-0.011711881,
0.024143888,
0.024667617,
-0.014638214,
0.03294253,
0.013839528,
-0.026042404,
0.02346304,
0.02809804,
... | 273 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
| FAMILY | FAMILY |
|-----------------------------------|--------------------------------------|
| Access Control ... | [
0.037914764,
0.057977535,
0.043579873,
-0.005644381,
0.008829277,
0.034184087,
0.0046253526,
0.019496258,
-0.025948955,
-0.009775764,
0.032277294,
0.0129882945,
0.016511714,
0.03882671,
0.0039172145,
-0.044906337,
0.027137244,
0.0076271687,
-0.02882296,
0.05344545,
0.03277471... | 274 |
| | B.3 | BRECHAS SISTÉMICAS QUE AFECTAN A LA ZTA......................................................................................................65 | | | B.3.1 | Estandarización de las interfaces entre componentes.........................................................................65 | | | B.3.2 | Nuevas norm... | [
0.020777155,
0.049567815,
0.05493535,
0.020096762,
0.023964917,
0.021759944,
-0.013028246,
0.029811248,
-0.056598533,
-0.016405007,
0.019063575,
-0.0043721483,
0.011465865,
-0.02625809,
-0.01528362,
0.029382853,
0.0065834224,
-0.011554063,
-0.016757803,
0.010980771,
0.0095002... | 275 |
ategory) |
| Post-Incident Activity | Identify (Improvement Category) |
Organizations should use the incident response life cycle framework or model that suits them best.
The model in this document is based on CSF 2.0 to take advantage of the wealth of resources available for CSF 2.0 and a... | [
-0.04758288,
0.0022312445,
0.068747826,
0.021470945,
0.01568246,
-0.036490407,
0.010920348,
0.024339689,
0.026137434,
0.06395384,
0.07114482,
-0.053498864,
0.028865928,
0.008013355,
0.017327206,
0.022784192,
0.0030631798,
0.015083212,
-0.033404917,
0.054824863,
0.020731447,
... | 276 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
- Applying a threat-centric approach to security requirements specification;
- Employing system and security architectures that support logical and physical isolation using ... | [
0.026049037,
0.04729785,
0.06375948,
0.022840193,
0.040436663,
0.013722377,
-0.026414271,
0.030549247,
-0.036158204,
0.027027344,
0.032271065,
0.011283133,
0.004011056,
0.020974888,
0.0011022252,
-0.043515068,
0.02196624,
0.023688057,
-0.016083356,
0.03503641,
0.033471122,
... | 277 |
and Privacy Reference Tool (CPRT). An example of a CPRT mapping is associating CSF 2.0 outcomes with NIST Special Publication (SP) 800-53 controls that can be implemented to help achieve the outcomes.
In this way, CSF 2.0 provides a common language that facilitates access to a large number of other resources. This publ... | [
-0.026809867,
0.0007443173,
0.06209412,
-0.016075648,
-0.019426882,
-0.017821886,
0.014393612,
0.0208136,
0.01569045,
0.04650639,
0.038828082,
-0.024447313,
0.010991018,
0.031920176,
0.017937444,
-0.012827135,
0.01045174,
-0.0009646031,
-0.006965686,
0.027760025,
-0.00245404,... | 278 |
According to Incident Response Recommendations and Considerations for Cybersecurity Risk Management_ A CSF 2.0 Community Profile:
- Technology professionals. Cybersecurity, privacy, system, network, cloud, and other technology architects, engineers, and administrators, as well as software developers, may be involved i... | [
0.012144665,
0.0068730456,
0.030757347,
0.015378674,
0.022644287,
-0.026071463,
-0.019080024,
0.0046827686,
-0.020986779,
0.03686395,
0.046734218,
-0.028514104,
0.046534818,
0.018008253,
0.01409504,
0.033025514,
-0.012412609,
-0.0016637382,
-0.020189183,
0.001422278,
0.000947... | 279 |
According to A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Cloud Environments:
via mutual Transport Layer Security (mTLS) when a service makes an initial connection establishment as part of its inter-service call. This authentication is not performed again in subsequent call... | [
-0.011137416,
0.014927572,
0.08492893,
0.008825298,
0.045432806,
-0.0015087028,
-0.00005299242,
0.030272182,
-0.0022201235,
0.022262566,
-0.021489816,
-0.016301349,
0.022471085,
-0.0013001829,
-0.02759822,
0.012891436,
-0.027107587,
-0.006623573,
-0.0025712342,
-0.00899702,
0... | 280 |
tegrity, and availability protection. The enhanced security requirements are implemented in addition to the basic and derived requirements since those requirements are not designed to address the APT.
The enhanced security requirements apply to those components of nonfederal systems that process, store, or transmit CUI... | [
-0.013136676,
0.019705012,
0.07176378,
0.04056105,
0.036807712,
0.011234986,
0.0022707682,
0.013336853,
-0.035356425,
0.04081127,
0.0040035583,
-0.022932881,
-0.009314529,
-0.00034425128,
-0.0007299456,
-0.008688972,
0.039860427,
0.0019830125,
-0.033304602,
0.005695687,
0.036... | 281 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
............................................ 5 |
| 2.1 DEVELOPMENTAPPROACH .............................................................................. | [
0.01835447,
0.027699295,
0.05073288,
-0.01576688,
0.060654216,
0.0064723305,
-0.011248649,
0.015726658,
-0.041240577,
0.015981395,
0.0243609,
-0.002460223,
0.008895684,
0.029629935,
0.014600451,
-0.017509816,
0.045048226,
0.0048735207,
-0.03324988,
0.032177303,
0.03810329,
... | 282 |
According to Security and Privacy Controls for Information Systems and Organizations:
CHAPTER ONE INTRODUCTION ...................................................................................................... 1
1.1 PURPOSE AND APPLICABILITY ........................................................................ | [
-0.0026053197,
0.001176266,
0.04933011,
0.013922314,
0.035629902,
-0.0145652415,
-0.013910624,
0.018679982,
-0.036471553,
0.025202777,
0.016575852,
-0.041124012,
0.014156106,
-0.012367597,
0.013314455,
-0.016529094,
0.047506534,
0.041357804,
0.025226157,
0.036985897,
0.033782... | 283 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
| Access Control | Maintenance | Security Assessment and Monitoring |
|-----------------------------------|---------------------|-------------------------... | [
-0.035576396,
0.019514699,
0.07507666,
-0.0038257705,
0.014976093,
-0.0031963168,
0.010529043,
0.025714409,
0.008789462,
0.023817874,
0.06089842,
-0.014282877,
-0.0026486104,
0.008645588,
0.024838079,
-0.03463467,
0.008377456,
0.014295956,
-0.022261407,
0.039735693,
0.0453075... | 284 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
........................................................................ | CHAPTERONE INTRODUCTION.............................................................................. | [
0.025199596,
0.010261828,
0.053427927,
-0.014638879,
0.04418232,
-0.00018504086,
-0.026833517,
0.012533379,
-0.05276373,
0.01612668,
0.017269095,
0.00043089714,
-0.007239736,
0.024960486,
0.022981182,
-0.0147717185,
0.034405354,
0.012075083,
-0.029171487,
0.022542812,
0.02885... | 285 |
According to Zero Trust Architecture:
| ACT-IAC | American Council for Technology and Industry Advisory Council. (2019). Zero Trust Cybersecurity Current Trends . Disponible en https://www.actiac.org/zero- trust-cybersecurity-current-trends ... | [
-0.005545116,
0.000097116295,
0.049639314,
-0.00397283,
0.05503001,
-0.0015398226,
-0.04335017,
0.016902074,
-0.02886268,
0.036499497,
0.0065523614,
-0.010914753,
-0.022489306,
-0.022938529,
0.023865055,
0.025282921,
-0.00013654408,
0.007868449,
-0.02431428,
0.011862337,
-0.0... | 286 |
scribed in a similar manner to those of Appendix F (Security Controls) and Appendix G (Information Security Programs Organization-Wide Information Security Program Management Controls). SP 800-53 Rev.
4 reminds readers to view the privacy controls in Appendix J from the same perspective as the Program Management contro... | [
-0.00063189346,
0.017499339,
0.046951354,
0.003694522,
-0.011529513,
-0.0018098275,
0.004075367,
0.005488074,
0.014621844,
0.007655961,
0.008482752,
-0.00418604,
0.008593426,
0.034425784,
0.010162377,
-0.023267351,
0.06817451,
0.006054459,
0.030858211,
0.019647695,
0.03351436... | 287 |
g/10.6028/NIST.SP.800-171r2
## How to Cite this NIST Technical Series Publication:
Ross R, Pillitteri V (2024) Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations.
(National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-171r3. ht... | [
-0.042946495,
0.004255097,
0.026768196,
-0.013690311,
0.039782286,
-0.0047877813,
0.0052088257,
0.013575481,
-0.011164048,
-0.0019122418,
0.014111356,
0.008133806,
-0.010455928,
0.0021769893,
0.020707713,
-0.026768196,
0.032305565,
0.025109537,
0.0027463557,
0.03480631,
0.001... | 288 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
ource code. | CUI//SP-CTI |
| General Proprietary | e.g., financial information, trade secrets, product research and development, existing and future product designs and performanc... | [
-0.008121959,
0.008837187,
0.048662983,
-0.0021284898,
0.023464967,
-0.031194925,
-0.0016943673,
0.02096167,
-0.015349884,
0.0024947,
0.05179898,
0.008954099,
-0.006980346,
0.017495567,
0.024248965,
-0.01489599,
-0.0009138064,
-0.007833118,
-0.037686992,
0.01247522,
0.0431612... | 289 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
deral agency to ensure that requirements to protect CUI are identified in applicable contracts or agreements, and CUI is marked by the federal agency. |
| How do I get a 'NIST SP 800 ... | [
-0.030050358,
-0.0018205737,
0.060748033,
0.0027386409,
0.011757483,
0.0032988172,
-0.0063704518,
0.011776156,
0.015834322,
0.018236859,
0.008564477,
0.008975273,
-0.035477847,
0.003491767,
-0.013020992,
0.0014051094,
-0.045013297,
-0.021050189,
-0.033062864,
0.01010185,
0.05... | 290 |
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations:
Information technologySecurity techniques-Information security management systems-Requirements and ISO/IEC 15408, Information technology -- Security techniques -- Evaluation criteria for... | [
-0.044074,
0.007294764,
0.016245827,
-0.0061024637,
0.040479477,
-0.0075766873,
0.014354591,
0.017690683,
-0.0028309792,
0.008387216,
0.016398536,
-0.007782256,
-0.040925857,
-0.0056795785,
0.011412018,
-0.0451782,
-0.010812931,
0.0034036357,
-0.0027193846,
0.0021158927,
0.05... | 291 |
e requirements also apply to services, including externally provided services, that process, store, or transmit CUI, or that provide security protections, for the system requiring enhanced protection.
The protection of a specific service to include CUI that is processed, stored or transmitted during the provision of th... | [
-0.010931775,
0.017113123,
0.06798904,
0.003325299,
0.030564941,
-0.0050313976,
0.021979414,
-0.0007350127,
-0.022234315,
0.05213883,
0.017877826,
-0.014378731,
0.0017973414,
-0.014842188,
0.020600632,
-0.0049097403,
0.040946364,
0.010097554,
-0.010109141,
0.009552993,
0.0546... | 292 |
According to Control Baselines for Information Systems and Organizations:
The National Institute of Standards and Technology (NIST) Information Technology Laboratory (ITL) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurement and standards infrastructure. ITL devel... | [
-0.03809371,
-0.016907446,
0.05789853,
-0.021430768,
0.040367596,
-0.033448137,
-0.02689543,
-0.0033527599,
-0.057116114,
-0.016393987,
0.028289104,
0.036944542,
-0.041639015,
-0.040392045,
0.036039878,
-0.012096832,
-0.016772969,
0.012225196,
0.007873026,
0.038656067,
0.0469... | 293 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
systems, but such standards and guidelines shall not apply to national security systems without the express approval of the appropriate federal officials exercising policy a... | [
0.005651286,
0.016780078,
0.037313778,
-0.011518057,
0.02336977,
0.00050482736,
-0.023467086,
-0.011949029,
-0.026372667,
0.0049665975,
0.02512146,
0.021075891,
-0.027874116,
-0.00428886,
0.0053419597,
-0.0070415162,
-0.00080807135,
-0.017169343,
-0.021381741,
0.0153898485,
0... | 294 |
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer:
<!-- image -->
<!-- image -->
Howard Lutnick, Secretary of Commerce
<!-- image -->
Protecting Controlled Unclassified Information (CUI): NIST Special Publication 800-171, Revision... | [
-0.029982954,
-0.012517091,
0.02689492,
0.02363533,
0.017736396,
-0.031091478,
-0.009640206,
0.03977492,
-0.014358034,
0.012748034,
0.038771972,
0.002870287,
-0.026789347,
-0.007093238,
0.011560329,
-0.0057768654,
-0.012761231,
-0.0023374695,
-0.00986455,
0.027449183,
0.03322... | 295 |
specific protection needs. The determination of ODP values can be guided and informed by laws, Executive Orders, directives, regulations, policies, standards, guidance, or mission and business needs.
Once specified, the values for the organizationdefined parameters become part of the requirement. ## ORGANIZATION-DEFINE... | [
0.030157074,
0.0033569722,
0.06529229,
0.0038351363,
0.0138340015,
0.020436592,
-0.0069563016,
-0.017502107,
0.02381649,
0.020777203,
0.04247143,
0.013316536,
-0.010552356,
-0.033039156,
0.032986756,
-0.04799979,
0.03555443,
-0.0066746436,
-0.011783792,
0.0057674423,
0.016781... | 296 |
...197 | |
| D.1.1.3. Strategic Objectives............................................................................................................198 | |
| D.1.1.4.
Implementation Plan and Progress Tracking......................................................................199 ... | [
0.024944905,
0.0362427,
0.08584215,
-0.02425859,
0.0112384055,
0.045983095,
-0.0053057414,
-0.032045625,
-0.023163125,
0.03199283,
0.03714019,
-0.049493857,
-0.0007688046,
-0.016102001,
0.02167171,
0.028402876,
0.014531396,
-0.0015895778,
0.040650956,
0.040914923,
0.072221436... | 297 |
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171:
| CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION....................... | [
0.029218564,
0.0065787546,
0.05461805,
-0.015210917,
0.042663813,
0.0014828355,
-0.025111746,
0.01218966,
-0.05255156,
0.016505742,
0.016074134,
-0.000002758859,
-0.010855598,
0.02317605,
0.024470873,
-0.014203832,
0.03261911,
0.013968409,
-0.026053438,
0.023110654,
0.0281722... | 298 |
According to Assessing Security and Privacy Controls in Information Systems and Organizations:
CHAPTER ONE INTRODUCTION ............................................................................................................... 1
1.1 PURPOSE AND APPLICABILITY ........................................................ | [
-0.001046523,
0.01816868,
0.051043686,
0.022105807,
0.01711492,
-0.0054193386,
-0.021503659,
-0.00070274813,
-0.010022303,
0.024155429,
0.030871704,
-0.0376343,
0.02406279,
-0.0054367087,
0.01286514,
-0.025591321,
0.027351448,
0.03221496,
0.032400236,
0.006913131,
0.032956064... | 299 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.