text
stringlengths
51
3.17k
embedding
listlengths
1.54k
1.54k
example_idx
int64
0
994
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: - Applying a threat-centric approach to security requirements specification; - Employing system and security architectures that support logical and physical isolation using ...
[ 0.026049037, 0.04729785, 0.06375948, 0.022840193, 0.040436663, 0.013722377, -0.026414271, 0.030549247, -0.036158204, 0.027027344, 0.032271065, 0.011283133, 0.004011056, 0.020974888, 0.0011022252, -0.043515068, 0.02196624, 0.023688057, -0.016083356, 0.03503641, 0.033471122, ...
200
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations: | 1. Introduction.....................................................................................................................................1 | |-----------------------------------------------------------------...
[ 0.015706683, 0.018023662, 0.1005813, 0.013048253, 0.035632707, 0.0013879013, -0.0023825257, 0.0022575308, -0.049851645, 0.055363618, -0.0018840702, -0.031827983, -0.0041248333, -0.004893095, 0.021901553, -0.02238934, 0.02447462, 0.0088533005, -0.015048172, 0.029511003, 0.0559...
201
quirements in NIST Special Publication 800-171 and are intended for use by federal agencies in contractual vehicles or other agreements established between those agencies and nonfederal organizations. ## Keywords Advanced Persistent Threat; Basic Security Requirement; Contractor Systems; Controlled Unclassified Inform...
[ -0.0033553408, 0.033409633, 0.050555807, -0.002449215, 0.020556686, -0.01328093, -0.03220592, 0.0022034575, -0.017828278, 0.020168824, 0.02535815, -0.0122912135, -0.028755287, -0.0024525584, 0.03472034, 0.018844744, 0.027551576, -0.010104474, 0.003362028, 0.026922973, 0.02336...
202
According to Assessing Enhanced Security Requirements for Controlled Unclassified Information: | CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION..........................................................................
[ 0.03428543, 0.038844522, 0.05217921, -0.014217516, 0.035945676, 0.011424084, -0.009348775, -0.00733276, -0.028461387, 0.021438276, 0.03344213, -0.0151267, -0.0030009632, 0.028197855, 0.03136023, -0.028224207, 0.016655182, 0.024179002, -0.013222686, 0.018526254, 0.023889117, ...
203
According to Incident Response Recommendations and Considerations for Cybersecurity Risk Management_ A CSF 2.0 Community Profile: public. Sometimes, the media learns of incidents through alternate sources (i.e., not through public affairs personnel). Having a media engagement strategy in place can greatly aid in this ...
[ 0.024616996, 0.0001528539, 0.03910387, 0.0359499, 0.034960944, -0.024790732, -0.0109186135, -0.003731974, -0.005709887, 0.060941096, 0.026514724, -0.0023320662, 0.022893004, -0.011840749, 0.009254761, 0.0099162925, 0.009361675, -0.0049681696, -0.037179414, 0.01356474, 0.01053...
204
| .................................................................................................................. 4 | | 1.3 ORGANIZATIONOF THIS SPECIAL PUBLICATION | .........................
[ 0.022945784, 0.004124218, 0.06246189, -0.007458849, 0.05467619, 0.0026974517, -0.0048477007, -0.000031015414, -0.04768375, 0.0036357755, 0.047860026, -0.036519345, -0.020756973, -0.001863794, 0.044040628, 0.034492128, 0.04727243, -0.014043642, 0.0124057075, 0.033287548, 0.015...
205
| | | ..............................................................................................................................................................54 | | | 7.3.4 | Formulación de políticas para el candidato a la ZTA ............................................................................54 | | | 7....
[ 0.035181962, 0.022709774, 0.05534533, -0.01056888, 0.007600239, 0.0056287237, -0.013797357, 0.015226461, -0.038403943, 0.008327783, 0.007509296, -0.0059242886, -0.019461809, -0.032505635, 0.0212287, 0.018019712, 0.0003292625, -0.043236915, 0.0030465915, 0.025788844, 0.0089254...
206
tect audit record content. - Ask internal information security staff, or your security vendor, what audit log information, if any, the system currently captures and how it is protected and maintained. ## Questions to Ask: - Do audit records contain information that establishes type of event, when the event occurred, w...
[ 0.024958262, 0.03161294, 0.07475894, -0.035474457, -0.011964262, 0.020054137, 0.014146019, -0.020491777, 0.00011996844, 0.009602302, 0.043454923, -0.042708363, 0.017840203, -0.013824225, 0.016282724, -0.008282951, -0.029321775, 0.029244544, -0.0072918287, 0.014841092, 0.03277...
207
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: NIST SP 800-172, Enhanced Security Requirements for Protecting Controlled Unclassified Information provides enhanced security requirements to help protect CUI associated with critical...
[ -0.027711315, 0.021571606, 0.060914047, 0.027075734, 0.038516186, -0.007379091, 0.0059903474, 0.040473774, -0.0056534894, 0.02641473, 0.046397384, 0.0041503413, -0.016575942, -0.013016691, 0.029973982, -0.02405037, -0.011662904, 0.021724146, -0.035058625, 0.011770953, 0.04627...
208
8 (also known as the Common Criteria) provides functionality and assurance requirements for developers of information systems and information system components (i.e., information technology products). Since many of the technical security controls defined in Appendix F are implemented in hardware, software, and firmware...
[ -0.017650986, 0.0011124713, 0.05537035, 0.0036564688, 0.0015336574, -0.024943667, -0.00056045596, -0.0016239719, -0.005861154, 0.031655632, 0.010182742, -0.0079814335, -0.024849132, -0.012633893, 0.02397131, -0.048401788, 0.03235789, 0.004878668, 0.0027685175, 0.022620814, -0...
209
ederal Agencies - The National Archives and Records Administration (NARA) , per 32 CFR Part 2002 "Controlled Unclassified Information," determines what CUI is and lists CUI types at archives.gov/cui. - NIST is responsible for developing and publishing the security requirements for the protection of CUI. How requiremen...
[ -0.036690246, -0.0028415357, 0.058652166, -0.021060985, 0.019402742, -0.006672141, 0.00913992, 0.010347694, 0.017626988, 0.021269899, 0.017901184, 0.007977844, -0.032433655, 0.024978094, -0.020068651, -0.020395078, -0.00006574417, -0.011575055, -0.009903755, 0.0065872706, 0.0...
210
| .............................................................................................................. 17 | | 3.7 MAINTENANCE | .........................
[ 0.005287199, 0.05552671, 0.0859003, -0.03476352, -0.018494073, 0.025835345, -0.004860812, 0.0019817727, 0.008646387, 0.023358593, 0.026784519, -0.006447713, 0.01914663, -0.011627388, 0.047043465, 0.006992747, -0.0060509876, 0.032954153, -0.01686268, 0.01772287, 0.014971745, ...
211
According to Assessing Security Requirements for Controlled Unclassified Information: - System development life cycle responsibilities (e.g., program managers, mission/business owners, information owners/stewards, system designers and developers, system/security engineers, systems integrators) - Acquisition or procure...
[ 0.0067462036, 0.045064397, 0.08078319, -0.0060244882, 0.02874629, 0.002793589, -0.00321408, -0.0026437412, 0.005458737, -0.0015779878, 0.052893173, -0.03126618, 0.031853337, 0.0028730999, 0.01059943, -0.052110296, -0.034299828, 0.032954257, -0.022397641, 0.033492487, 0.022507...
212
functional and assurance specifications, design documentation, and architectures) associated with a system. Mechanisms are the hardware, software, and firmware safeguards implemented within a system. Activities are the protectionrelated actions supporting a system that involve people (e.g., conducting system backup 2 ...
[ -0.016108207, 0.038718585, 0.055845056, -0.016108207, -0.016586669, 0.029566474, 0.00022082843, -0.009661244, 0.030130813, 0.0026744776, 0.04470549, -0.043969397, -0.0027174165, -0.028094284, 0.0055912533, 0.013495071, -0.013163828, -0.009538561, -0.0062015983, -0.027873456, ...
213
According to A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Cloud Environments: - The global control plane can be leveraged to perform the functions of individual control planes at the enterprise level rather than at the cluster level (e.g., issuing identities to all services ...
[ 0.0080949245, 0.018787341, 0.07092696, 0.027350761, 0.073204204, -0.017862206, -0.059683014, 0.03427741, 0.01314165, 0.04606694, 0.0131653715, 0.01844338, 0.0048361984, -0.022132056, -0.032759238, -0.03565325, -0.020447837, 0.015312157, 0.0032320393, 0.020708773, 0.02287928, ...
214
According to Assessing Security and Privacy Controls in Information Systems and Organizations: CHAPTER ONE INTRODUCTION ............................................................................................................... 1 1.1 PURPOSE AND APPLICABILITY ........................................................
[ -0.001046523, 0.01816868, 0.051043686, 0.022105807, 0.01711492, -0.0054193386, -0.021503659, -0.00070274813, -0.010022303, 0.024155429, 0.030871704, -0.0376343, 0.02406279, -0.0054367087, 0.01286514, -0.025591321, 0.027351448, 0.03221496, 0.032400236, 0.006913131, 0.032956064...
215
administrator does not need access to CUI, their access should be restricted. - Reassign or remove privileges as necessary, such as when an individual no longer requires access to CUI and the system. - Identify who within the business has administrative (i.e., system administrator or domain administrator) privileges on...
[ 0.012499843, 0.046604827, 0.083255716, 0.04594123, 0.03644671, 0.014445964, -0.021745516, 0.026543822, 0.026467253, 0.044971358, 0.021987984, -0.016053908, -0.0079121, 0.013335718, 0.03381785, -0.006093594, -0.01115351, 0.023493834, -0.025586713, 0.037748378, 0.017432144, 0...
216
gnificant contributions from individuals and organizations in the public and private sectors whose constructive comments improved the overall quality, thoroughness, and usefulness of this publication. The authors also wish to thank the NIST technical editing and production staff - Jim Foti, Jeff Brewer, Eduardo Takamur...
[ 0.015862823, 0.017593062, 0.035296857, 0.0011860783, 0.025925888, 0.00421486, -0.005841284, -0.00074789545, -0.022700725, 0.015821297, 0.038618915, -0.013385123, -0.032251637, -0.023060614, 0.02092896, 0.014783154, 0.011426493, -0.014063376, -0.008727321, 0.0063534346, 0.0274...
217
According to Control Baselines for Information Systems and Organizations: | ORGANIZATIONAL RESPONSIBILITIES ......................................................................................... | 2 ...
[ -0.014251462, 0.024042154, 0.07127009, 0.006144745, 0.017676925, -0.005013575, -0.0020546392, -0.0020418575, -0.047445226, -0.0038632327, 0.046933964, -0.03583955, 0.021447493, -0.008595613, 0.018725015, -0.00039882524, 0.017165663, -0.0046684723, 0.004911322, 0.04619263, 0.0...
218
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: | Access Control | Maintenance | Security Assessment and Monitoring | |-----------------------------------|---------------------|-------------------------...
[ -0.030569682, 0.007443833, 0.059089426, -0.0045707184, 0.009705169, -0.007309306, -0.010762168, 0.009365649, 0.021460276, 0.021101536, 0.040819366, 0.021921512, -0.019820327, 0.005602093, 0.0107237315, -0.029672835, -0.027187286, 0.012530238, -0.013785825, 0.025470465, 0.0492...
219
| .................................................................................................................. 4 | | 1.3 ORGANIZATIONOF THIS SPECIAL PUBLICATION | .........................
[ 0.022946618, 0.0041317134, 0.062464163, -0.0074554477, 0.05467818, 0.0027177494, -0.004836859, -0.000042694373, -0.0476561, 0.0036469258, 0.04783239, -0.036520675, -0.02075773, -0.0018601893, 0.04404223, 0.03449338, 0.047274146, -0.014058844, 0.012428194, 0.03328876, 0.015704...
220
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations: The NIST Risk Management Framework (RMF), described in NIST Special Publication 800-37 Revision 1, Guide for Applying the Risk Management Framework to Federal Information Systems: a Secu...
[ -0.018804658, 0.044273976, 0.04562037, 0.0071751666, 0.0104962755, -0.010081137, 0.026546434, 0.03287449, -0.017671442, 0.054394383, -0.009918448, 0.014484973, -0.015775269, 0.01864758, 0.037115637, -0.032133974, 0.00605878, 0.008869381, -0.0018470865, 0.03689124, 0.032986693...
221
According to Incident Response Recommendations and Considerations for Cybersecurity Risk Management_ A CSF 2.0 Community Profile: Many organizations may use more than one of these approaches, such as internally performing basic incident response and engaging third-party resources for assistance with certain incidents....
[ -0.007807667, -0.016694069, 0.06698676, 0.026073793, 0.022206137, -0.010458459, -0.007478785, 0.029730964, -0.012293623, 0.088298336, 0.018233238, -0.029152133, 0.036676962, 0.021548372, 0.008268102, 0.0067618215, 0.03409852, 0.0029648745, -0.036466476, 0.013411823, -0.021956...
222
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: | Access Control | Maintenance | Security Assessment and Monitoring | |-----------------------------------|---------------------|-------------------------...
[ -0.015968371, 0.017861396, 0.07942977, 0.0059817, 0.028511269, -0.016251681, -0.006844507, 0.015479017, -0.008557244, 0.013830669, 0.038684666, 0.00022777464, -0.022214064, 0.03543948, -0.0026850044, -0.020784637, 0.007275911, 0.025523638, -0.011609263, 0.0134958485, 0.047003...
223
SR-9, and SR-11. T h s i p u b l i c a t i o n i s a v a i l l a b e f r e e o f c h a r g e f r o m : h t t p s : / / d o i . o r g / 1 0 . 6 0 2 8 / N S T S P . 8 0 0 - 5 3 r 5 I . viii T h s i p u b l i c a t i o n i s a v a i l l a b e f r e e o f c h a r g e f r o m : h t t p s : ...
[ 0.026262242, 0.0021438894, 0.060345083, 0.0076850937, 0.0068268925, 0.004610411, 0.021177562, 0.022274511, -0.0050491905, 0.008285189, 0.02293268, -0.01593802, -0.021835731, -0.015808966, 0.01251812, -0.016854294, 0.020519393, 0.006549429, 0.03481844, -0.0029456299, 0.0234617...
224
f those systems or components, helps practitioners understand the scope of applicability of SP 800-171 security requirements to business systems. <!-- image --> Scope and Applicability of SP 800-171. The security requirements in NIST SP 800-171 are only applicable to components of nonfederal systems that process, stor...
[ -0.033418585, 0.0056064073, 0.05012788, 0.002404709, -0.0040673935, -0.032075003, -0.012330432, 0.0048979726, 0.0053865486, 0.04287253, 0.023134066, -0.012171645, -0.025503658, -0.0088798655, 0.010089091, -0.0074568884, -0.01817502, 0.031146709, -0.023683712, -0.00406434, 0.0...
225
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. Th...
[ 0.012861675, 0.010412418, 0.06316374, -0.03475729, -0.0053477488, 0.012141667, 0.0073908474, 0.02577258, -0.04627741, -0.012738597, 0.015914014, -0.00617545, -0.019594053, 0.026757207, 0.002463103, -0.033994205, 0.028849537, -0.0025123344, -0.030966481, 0.025255652, 0.0226587...
226
, and academic organizations. ## Supplemental Content NIST has established an Incident Response project page that hosts links to resources with additional information on incident response activities. By moving links from this document to a website, NIST can update and expand them as needed without having to release a ...
[ -0.0160928, -0.01955644, 0.057769023, -0.027584083, 0.008852915, -0.035261612, -0.014767363, 0.010372166, -0.029534725, 0.031985532, 0.053617656, -0.006298949, 0.018968746, -0.025033243, 0.010803558, 0.018293524, 0.011303722, -0.023520244, -0.023932882, 0.02244489, -0.0166679...
227
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations: The security control baselines address the security needs of a broad and diverse set of constituencies, and are developed based on a number of general assumptions, including common envir...
[ -0.03500365, 0.009512632, 0.11119918, -0.009660251, 0.0119336, -0.012695318, -0.0036964044, -0.0049186978, 0.009766538, 0.025296161, 0.0037643095, 0.0002415432, -0.012057601, 0.001684344, 0.007274713, -0.04728563, 0.03568861, 0.012896081, -0.011213214, 0.0074341423, 0.0252725...
228
| | | D.4.1.2. Description .........................................................................................................................218 ...
[ 0.023984581, 0.038529005, 0.056311626, -0.02243409, -0.0057354434, 0.0035194766, 0.009186314, -0.016300734, -0.025809495, 0.031586103, 0.027113004, 0.0051797363, -0.0161498, -0.026083918, 0.024355052, 0.027812783, 0.039132737, 0.007368261, -0.017933551, 0.023943417, 0.0664103...
229
According to Assessing Security Requirements for Controlled Unclassified Information: Additional information about this publication is available at https://csrc.nist.gov/pubs/sp/800/171/a/r3/final, including related content, potential updates, and document history. | Access Control | Maintenance ...
[ -0.00066399074, 0.05871814, 0.08468472, -0.015801864, 0.03994466, 0.036985796, 0.047494866, 0.027777608, 0.030404875, 0.009756599, 0.033695336, -0.002997125, -0.0075629577, 0.008506733, 0.06468689, -0.061472945, 0.0069380254, -0.0014260256, -0.024576424, 0.037342902, 0.031705...
230
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations: Organizations are concerned about the risks associated with products and services that may potentially contain malicious functionality, are counterfeit, or are vulnerable due to poor manufacturing and development practices...
[ 0.013946068, 0.025322799, 0.07258379, 0.02480399, 0.054549012, 0.0074300794, 0.019801192, 0.0048113316, -0.031079102, 0.045630448, 0.01429194, -0.03073323, -0.0014506567, -0.023296975, 0.015910128, -0.026681582, 0.011117326, -0.001795757, -0.011660839, 0.010036475, 0.06670395...
231
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: ent, or possibly with other organizations like municipal governments, prime contractors, universities, etc., you will likely be required to demonstrate you are taking adequate measure...
[ -0.008649043, 0.0029976794, 0.045061782, 0.015630636, 0.018504612, -0.011299337, -0.0037788723, 0.022680013, -0.044329733, 0.012153396, 0.049074505, 0.021324363, -0.000002204254, -0.022205535, 0.016728712, -0.0052938107, -0.014315656, -0.008255905, -0.031830646, 0.012804108, ...
232
According to Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations: aft publications during public comment periods and provide feedback to NIST. Many NIST cybersecurity publications, other than the ones noted above, are available at https://csrc.nist.gov/publications. ## Authority Thi...
[ -0.027080853, 0.007467907, 0.01069797, -0.041525695, 0.007965337, -0.0027843148, -0.041474015, -0.002790775, -0.021796469, -0.007907195, 0.05232703, 0.0129267145, -0.013101137, -0.022817168, 0.008895595, 0.0016602527, 0.008514447, -0.0016844781, -0.012913794, 0.025284937, 0.0...
233
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: | CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION.......................
[ 0.02867414, 0.007869022, 0.055200994, -0.015305968, 0.042841, 0.0015891889, -0.024628337, 0.011666054, -0.052241925, 0.017374696, 0.016248679, 0.0011963925, -0.011711881, 0.024143888, 0.024667617, -0.014638214, 0.03294253, 0.013839528, -0.026042404, 0.02346304, 0.02809804, ...
234
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: | CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION.......................
[ 0.02867414, 0.007869022, 0.055200994, -0.015305968, 0.042841, 0.0015891889, -0.024628337, 0.011666054, -0.052241925, 0.017374696, 0.016248679, 0.0011963925, -0.011711881, 0.024143888, 0.024667617, -0.014638214, 0.03294253, 0.013839528, -0.026042404, 0.02346304, 0.02809804, ...
235
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: systems, but such standards and guidelines shall not apply to national security systems without the express approval of the appropriate federal officials exercising policy a...
[ 0.005651286, 0.016780078, 0.037313778, -0.011518057, 0.02336977, 0.00050482736, -0.023467086, -0.011949029, -0.026372667, 0.0049665975, 0.02512146, 0.021075891, -0.027874116, -0.00428886, 0.0053419597, -0.0070415162, -0.00080807135, -0.017169343, -0.021381741, 0.0153898485, 0...
236
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations: 8 (also known as the Common Criteria) provides functionality and assurance requirements for developers of information systems and information system components (i.e., information technol...
[ -0.007969909, -0.016911758, -0.0043312083, 0.013388475, 0.03705522, -0.013740804, 0.008231118, 0.039703757, 0.0044891485, 0.005172544, 0.0047290963, -0.0098408945, -0.03299737, -0.01672952, 0.0076418794, -0.03676364, 0.023508802, -0.011602536, 0.0015657349, -0.0019013579, 0.0...
237
tems (including hardware, software, firmware, and documentation); and establishing and enforcing security configuration settings for information technology products employed in organizational systems. ## Getting Started with Configuration Management <!-- image --> Changes to a system can have potentially significant ...
[ 0.012264149, 0.033847723, 0.06886536, 0.01403896, 0.017920947, -0.02322544, 0.015860304, 0.02685483, -0.008495167, 0.03320959, 0.021537043, -0.0077174404, -0.011891904, 0.015235463, 0.037596762, 0.0043339976, 0.0024046374, 0.030683639, -0.002667203, 0.015514648, 0.0449619, ...
238
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: ent, or possibly with other organizations like municipal governments, prime contractors, universities, etc., you will likely be required to demonstrate you are taking adequate measure...
[ -0.008680938, 0.003012238, 0.04507853, 0.015627043, 0.018527465, -0.011289963, -0.0037949455, 0.022688352, -0.04434665, 0.012137049, 0.04909033, 0.021319462, 0.000029727425, -0.022200432, 0.016711313, -0.0052824286, -0.014312366, -0.008274336, -0.03187754, 0.012814717, 0.0477...
239
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: NIST SP 800-172, Enhanced Security Requirements for Protecting Controlled Unclassified Information provides enhanced security requirements to help protect CUI associated with critical...
[ -0.03381602, 0.015649445, 0.07571738, -0.0004270703, 0.0139205055, 0.00039191148, 0.00867648, 0.031222614, -0.0070873806, 0.020658284, 0.04085891, 0.008949804, -0.014619709, 0.009712572, -0.0010917109, -0.019298015, 0.0057970323, 0.019120036, -0.03043442, 0.01904376, 0.034451...
240
According to Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations: | 1. Introduction.....................................................................................................................................1 | |-----------------------------------------------------------------...
[ 0.015706683, 0.018023662, 0.1005813, 0.013048253, 0.035632707, 0.0013879013, -0.0023825257, 0.0022575308, -0.049851645, 0.055363618, -0.0018840702, -0.031827983, -0.0041248333, -0.004893095, 0.021901553, -0.02238934, 0.02447462, 0.0088533005, -0.015048172, 0.029511003, 0.0559...
241
According to Security and Privacy Controls for Information Systems and Organizations: ............................................................. 16 3.1 ACCESS CONTROL .................................................................................................................. 18 3.2 AWARENESS AND TRAINING ...
[ -0.0040349783, 0.032724887, 0.06021379, 0.00015022767, 0.030970832, 0.0017851425, 0.018600825, 0.015721034, -0.010465418, 0.023614278, 0.047621254, -0.013966981, 0.019765832, -0.0032119476, 0.019792011, -0.026323898, 0.021624604, 0.033955343, 0.023954617, 0.024046246, 0.01608...
242
According to Assessing Security Requirements for Controlled Unclassified Information: other than the ones noted above, are available at Organizations are encouraged to review all draft publications during public comment periods and provide feedback https://csrc.nist.gov/publications. ## Authority This publication ha...
[ -0.023494147, 0.044498675, 0.043712478, -0.05325165, 0.015435641, 0.005755607, -0.028879587, -0.022210026, -0.010279508, -0.010200888, 0.03962426, -0.0134177385, -0.0078881625, -0.0031775406, 0.010030546, -0.002908924, 0.020545913, -0.0039964947, -0.010836396, 0.031631272, 0....
243
<!-- image --> <!-- image --> Howard Lutnick, Secretary of Commerce <!-- image --> Protecting Controlled Unclassified Information (CUI): NIST Special Publication 800-171, Revision 3 Small Business Primer ## Purpose of this Primer This guide provides small businesses with an overview of NIST Special Publication (S...
[ -0.033670038, -0.010702927, 0.0055806693, 0.0199974, 0.013699215, -0.030268488, -0.0010613237, 0.036646396, -0.0104571115, 0.0006352994, 0.049774256, -0.0076136277, -0.019665215, -0.018867977, 0.009540287, 0.0028567712, -0.015586012, -0.008437441, 0.00096499076, 0.034121808, ...
244
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations: | 1 | Introduction ............................................................................................................1 | |------------------------------------------------------...
[ -0.020964958, 0.03140085, 0.049710244, -0.014023228, 0.013895108, -0.007384324, -0.01210144, 0.0065981383, -0.021815203, 0.034545593, 0.0038726935, -0.009981649, -0.02328275, 0.0076405625, 0.02727774, -0.035710312, 0.014768648, 0.008811106, 0.009638057, 0.039390825, 0.0194508...
245
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: | CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION.......................
[ 0.02867414, 0.007869022, 0.055200994, -0.015305968, 0.042841, 0.0015891889, -0.024628337, 0.011666054, -0.052241925, 0.017374696, 0.016248679, 0.0011963925, -0.011711881, 0.024143888, 0.024667617, -0.014638214, 0.03294253, 0.013839528, -0.026042404, 0.02346304, 0.02809804, ...
246
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: d, communicated, understood, and enforced. Even if cybersecurity activities are outsourced to an external provider, someone within the business should still be designated to manage cy...
[ -0.011644907, 0.022290196, 0.056653704, 0.0053680814, 0.035441022, -0.014851476, 0.007964494, 0.0240947, -0.0094898855, 0.034895774, 0.037466224, 0.017551744, -0.011365793, -0.010651779, 0.02522414, -0.013657127, -0.016539143, 0.005114931, -0.014241319, -0.0047903797, 0.05852...
247
According to Assessing Security and Privacy Controls in Information Systems and Organizations: In developing standards and guidelines required by [FISMA], NIST consults with other federal agencies and offices as well as private sector entities to improve information security, avoid unnecessary and costly duplication o...
[ -0.030255347, -0.0042959377, 0.07792418, 0.016931048, 0.03473507, 0.011561126, -0.02095131, -0.02439725, -0.023225632, -0.0005631957, 0.0059270156, 0.0077016745, -0.045785047, -0.01188849, -0.0035033715, -0.0017789662, -0.019147936, -0.0069263377, 0.012612138, -0.024489142, 0...
248
Implement in phases based upon your resources (includin g time, expertise, budget, etc.), starting with understanding what security requirements you may have already satisfied and building from there. A system security plan documents how an organization meets or plans to meet the security requirements for a system. In ...
[ 0.01342506, 0.036649942, 0.06759307, 0.004788817, -0.014383992, -0.031574618, 0.0029878942, -0.005589877, 0.013612168, 0.026896896, 0.015997807, -0.021692932, 0.052390475, -0.042122878, 0.022757113, -0.028884927, -0.0062389104, 0.02918898, 0.0053296783, -0.010542414, 0.036533...
249
Parameters - Appendix E: Change Log The contents of this publication can be used for many different assessment-related purposes to determine organizational compliance with the security requirements. The broad range of potential assessment methods and objects listed in this publication does not necessarily reflect an...
[ 0.01069364, 0.012967092, 0.06155806, -0.028188203, 0.006904555, 0.0010484755, -0.014793625, -0.0066389954, 0.04940708, 0.04248957, 0.04624627, -0.00045258517, 0.02288996, 0.011121127, 0.007196023, 0.002989167, 0.029664975, 0.02492376, -0.01272744, -0.026270991, 0.014586358, ...
250
However, holders of patents are not obligated to respond to ITL calls for patents and ITL has not undertaken a patent search in order to identify which, if any, patents may apply to this publication. As of the date of publication and following call(s) for the identification of patent claims whose use may be required fo...
[ 0.003459111, 0.009379639, 0.08349126, -0.015241093, 0.012904388, -0.0103838965, -0.009031759, -0.003135845, -0.03008836, -0.015136072, 0.023826515, -0.009701264, -0.027147787, 0.0012627068, -0.003757763, 0.0034623928, 0.015910598, -0.017446522, 0.0116966525, -0.0067672553, 0....
251
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations: - Authority and Purpose (AP); - Accountability, Audit, and Risk Management (AR); - Data Quality and Integrity (DI); - Data Minimization and Retention (DM); - Individual Participation and...
[ -0.018318204, 0.035044674, 0.056718785, 0.021236384, 0.018318204, -0.0037007814, -0.040589213, 0.016142834, -0.012939471, 0.013390462, 0.031410217, -0.011128873, -0.027855344, 0.015691843, 0.010140671, -0.03825467, 0.015002092, 0.020904772, 0.009616726, 0.023332166, 0.0363711...
252
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: d, communicated, understood, and enforced. Even if cybersecurity activities are outsourced to an external provider, someone within the business should still be designated to manage cy...
[ -0.011644907, 0.022290196, 0.056653704, 0.0053680814, 0.035441022, -0.014851476, 0.007964494, 0.0240947, -0.0094898855, 0.034895774, 0.037466224, 0.017551744, -0.011365793, -0.010651779, 0.02522414, -0.013657127, -0.016539143, 0.005114931, -0.014241319, -0.0047903797, 0.05852...
253
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: NIST SP 800-172, Enhanced Security Requirements for Protecting Controlled Unclassified Information provides enhanced security requirements to help protect CUI associated with critical...
[ -0.03386234, 0.015520239, 0.07570724, -0.00035710214, 0.013829664, 0.00035670493, 0.008586341, 0.03126928, -0.007054654, 0.020604674, 0.040878862, 0.008961317, -0.014566908, 0.00968585, -0.0010947424, -0.019282721, 0.0057231677, 0.019219166, -0.030354079, 0.019066632, 0.03444...
254
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: Advanced Persistent Threat; Basic Security Requirement; Contractor Systems; Controlled Unclassified Information; CUI Registry; Derived Security Requirement; Enhanced Securit...
[ 0.015045553, 0.009218774, 0.06336863, 0.010863378, 0.031118983, 0.0067454446, -0.03250662, -0.0004115524, -0.050802834, 0.023345662, 0.03458807, -0.019748092, -0.028086746, 0.009514289, 0.042065877, -0.013966282, 0.046331566, 0.020994393, -0.0051490227, 0.01724264, 0.04219436...
255
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: | Access Control | Maintenance | Security Assessment and Monitoring | |-----------------------------------|---------------------|-------------------------...
[ -0.00762443, 0.02506322, 0.074792616, 0.012866613, 0.015571456, -0.0078043393, 0.0029700536, 0.02672583, 0.007897396, 0.014889042, 0.050622743, 0.0040975884, 0.006662846, -0.0008979953, 0.024045803, -0.015670717, -0.040795974, 0.026849905, -0.01409496, 0.028760666, 0.03776853...
256
According to Zero Trust Architecture: | | | 3.2.2.
[ 0.0068854997, 0.043218926, 0.04080296, 0.008066637, 0.03132701, -0.0069995867, -0.033259783, 0.013703889, -0.021032315, 0.028857356, -0.0015628272, -0.0029595569, 0.0007335976, 0.012958966, -0.004392358, -0.009771235, 0.049124617, -0.016254073, -0.016831221, 0.03623947, 0.014...
257
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations: To aid in review activities, security planning, and risk assessments, organizations document the relevant decisions taken during the security control selection process, providing a sound...
[ -0.010191585, 0.010681679, 0.036066163, 0.02494163, 0.027303528, 0.014313095, 0.0038971298, -0.000739938, -0.0021508024, 0.00057017663, 0.010675774, -0.011254438, -0.013887953, 0.0077942596, 0.0059076943, -0.03223989, 0.030799136, -0.0013551383, 0.0068022627, -0.004998364, 0....
258
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: ............................................ 5 | | 2.1 DEVELOPMENTAPPROACH ..............................................................................
[ 0.018343858, 0.027703518, 0.050713796, -0.015769282, 0.06066346, 0.0065101925, -0.0112369545, 0.015675418, -0.041220047, 0.01597042, 0.024364613, -0.0024572457, 0.008917154, 0.029661268, 0.014602677, -0.017512485, 0.045001455, 0.0048910254, -0.03320131, 0.03218221, 0.03808228...
259
quirements in NIST Special Publication 800-171 and are intended for use by federal agencies in contractual vehicles or other agreements established between those agencies and nonfederal organizations. ## Keywords Advanced Persistent Threat; Basic Security Requirement; Contractor Systems; Controlled Unclassified Inform...
[ -0.0033553408, 0.033409633, 0.050555807, -0.002449215, 0.020556686, -0.01328093, -0.03220592, 0.0022034575, -0.017828278, 0.020168824, 0.02535815, -0.0122912135, -0.028755287, -0.0024525584, 0.03472034, 0.018844744, 0.027551576, -0.010104474, 0.003362028, 0.026922973, 0.02336...
260
According to Incident Response Recommendations and Considerations for Cybersecurity Risk Management_ A CSF 2.0 Community Profile: so develop and maintain procedures for particularly important processes that may be urgently needed during emergency situations, such as redeploying the organization's primary authenticatio...
[ 0.025772575, 0.026726106, 0.08069595, 0.027393578, 0.030676449, -0.008622643, -0.022653168, 0.051953807, -0.016373485, 0.054269526, 0.030485742, 0.0027175627, 0.014534534, 0.040347975, -0.00046101512, 0.0037357975, 0.021985697, 0.013090616, -0.02814278, -0.007131048, -0.00105...
261
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: ............................................ 5 | | 2.1 DEVELOPMENTAPPROACH ..............................................................................
[ 0.017715218, 0.028639602, 0.051454652, -0.015903434, 0.060768563, 0.0064553176, -0.010763337, 0.01538003, -0.0412013, 0.016789194, 0.024465788, -0.0016071191, 0.008179868, 0.030706376, 0.014802943, -0.017916527, 0.045388535, 0.004989115, -0.033095248, 0.032343693, 0.03808772,...
262
P[06]: circumstances requiring users to log out of the system are defined . A.03.01.01.a[01]: A.03.01.01.a[02]: system account types allowed are defined. system account types prohibited are defined. A.03.01.01.b[01]: system accounts are created in accordance with organizational policy, procedures, prerequisites, and ...
[ -0.003325664, 0.0618652, 0.06841756, 0.010763616, 0.047340803, 0.027451659, 0.008770607, 0.00046071282, 0.040706538, 0.043218274, 0.047559213, -0.020012, -0.024052622, 0.034700207, 0.019425018, -0.005310142, 0.011753296, 0.050616983, -0.050971903, 0.028693877, 0.031697042, ...
263
| .................................................................................................................. 4 | | 1.3 ORGANIZATIONOF THIS SPECIAL PUBLICATION | .........................
[ 0.022945784, 0.004124218, 0.06246189, -0.007458849, 0.05467619, 0.0026974517, -0.0048477007, -0.000031015414, -0.04768375, 0.0036357755, 0.047860026, -0.036519345, -0.020756973, -0.001863794, 0.044040628, 0.034492128, 0.04727243, -0.014043642, 0.0124057075, 0.033287548, 0.015...
264
According to Risk Management Framework for Information Systems and Organizations_ A System Life Cycle Approach for Security and Privacy: curity officer; senior agency official for privacy; supply chain risk management; system development life cycle; system owner; system privacy officer; system security officer; system...
[ 0.027702853, 0.008609425, 0.05993196, 0.03700076, 0.03323797, 0.018227715, 0.016332686, 0.016782586, -0.008548075, 0.0017842574, 0.030238647, -0.005201102, -0.013674194, 0.006308807, -0.0048909443, -0.037518825, 0.020545375, 0.0346013, -0.01169055, 0.000013173969, 0.008623059...
265
According to Incident Response Recommendations and Considerations for Cybersecurity Risk Management_ A CSF 2.0 Community Profile: ## Incident Response Recommendations and Considerations for Cybersecurity Risk Management ## Incident Response Recommendations and Considerations for Cybersecurity Risk Management Nelson ...
[ 0.021263007, -0.017891442, 0.052960634, -0.0078013577, 0.030983942, -0.019109635, 0.00054411084, 0.017103923, -0.011658969, 0.06285384, -0.0036545792, -0.009308718, -0.0038822214, 0.035955153, 0.0062939976, -0.0011758948, 0.006100194, 0.004746646, -0.029212024, 0.022148965, -...
266
ization's cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored. - Identify (ID): The organization's current cybersecurity risks are understood. - Protect (PR): Safeguards to manage the organization's cybersecurity risks are used. - Detect (DE): Possible cybersecu...
[ -0.0076835263, 0.015041888, 0.05096659, 0.0328537, 0.011127866, -0.0019675489, 0.006858571, 0.040175933, 0.009905486, 0.08088176, 0.06859776, -0.028325478, -0.0012457129, -0.039525602, 0.018209236, 0.0058379145, -0.03726149, 0.03201068, -0.030156035, 0.031577125, 0.03025238, ...
267
processing, storing, or transmitting CUI. The assessments focus on the overall effectiveness of the security safeguards intended to satisfy the enhanced security requirements defined in [SP 800-172]. ## 1.2 TARGET AUDIENCE This publication serves system, information security, and privacy professionals, including ind...
[ 0.032144565, 0.02090182, 0.07256086, -0.013912734, -0.0066618826, -0.021215936, 0.010549071, 0.012538475, 0.008952314, 0.032641917, 0.02874164, -0.027249588, -0.012283255, -0.0017816282, 0.022066668, -0.0094104, 0.0117793605, 0.0112885535, -0.0048982506, -0.025234008, 0.02105...
268
<!-- image --> <!-- image --> Howard Lutnick, Secretary of Commerce <!-- image --> Protecting Controlled Unclassified Information (CUI): NIST Special Publication 800-171, Revision 3 Small Business Primer ## Purpose of this Primer This guide provides small businesses with an overview of NIST Special Publication (S...
[ -0.03369574, -0.010715935, 0.005597133, 0.020010166, 0.013725433, -0.030267702, -0.0010430266, 0.03661887, -0.010470127, 0.00064940035, 0.049772963, -0.007600143, -0.019638132, -0.018880775, 0.009553326, 0.0028351059, -0.015585608, -0.0084770825, 0.0009998439, 0.03412092, 0.0...
269
According to Security and Privacy Controls for Information Systems and Organizations: There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts, practices, and...
[ -0.010413678, -0.015459353, 0.045919362, -0.02403824, 0.0061273337, 0.004208862, -0.010264912, 0.014851889, -0.033323772, 0.014504766, 0.031166652, -0.02256297, -0.0010932813, -0.020616604, 0.009006592, -0.01291792, 0.024794472, -0.0035022192, 0.018199142, 0.032679114, 0.0191...
270
and specificity needed by organizations to clearly define their CUI security requirements, given the diverse nature of their missions, business functions, operational environments, and risk tolerance. ODPs support consistent security assessments in determining whether security requirements have been satisfied. If a fed...
[ -0.025293933, -0.013516614, 0.079333425, 0.014386261, 0.007233579, -0.013476165, -0.003822404, -0.0068863947, 0.035567906, 0.046084575, 0.032305043, 0.00029851997, -0.028448932, -0.030417437, 0.030875856, -0.030039916, -0.0023325428, 0.0020696262, -0.023851262, -0.0011797543, ...
271
NIST does not necessarily endorse the views expressed or the facts presented on those sites. Further, NIST does not endorse any commercial products that may be advertised or available on these sites. ht ps:/ csrc.nist.gov/projects/protecting-control ed-unclas ified-information ## Introductory Tips for Implementers <...
[ -0.00553216, 0.0026156236, 0.07422949, -0.013782452, 0.015052237, -0.008075035, -0.0004422752, -0.0065407124, 0.0070697893, 0.048780885, 0.025488278, -0.010984958, -0.021837648, 0.0061868923, 0.01972134, -0.016189752, 0.010257478, -0.005366823, -0.017366948, 0.05073847, 0.014...
272
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: | CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION.......................
[ 0.02867414, 0.007869022, 0.055200994, -0.015305968, 0.042841, 0.0015891889, -0.024628337, 0.011666054, -0.052241925, 0.017374696, 0.016248679, 0.0011963925, -0.011711881, 0.024143888, 0.024667617, -0.014638214, 0.03294253, 0.013839528, -0.026042404, 0.02346304, 0.02809804, ...
273
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: | FAMILY | FAMILY | |-----------------------------------|--------------------------------------| | Access Control ...
[ 0.037914764, 0.057977535, 0.043579873, -0.005644381, 0.008829277, 0.034184087, 0.0046253526, 0.019496258, -0.025948955, -0.009775764, 0.032277294, 0.0129882945, 0.016511714, 0.03882671, 0.0039172145, -0.044906337, 0.027137244, 0.0076271687, -0.02882296, 0.05344545, 0.03277471...
274
| | B.3 | BRECHAS SISTÉMICAS QUE AFECTAN A LA ZTA......................................................................................................65 | | | B.3.1 | Estandarización de las interfaces entre componentes.........................................................................65 | | | B.3.2 | Nuevas norm...
[ 0.020777155, 0.049567815, 0.05493535, 0.020096762, 0.023964917, 0.021759944, -0.013028246, 0.029811248, -0.056598533, -0.016405007, 0.019063575, -0.0043721483, 0.011465865, -0.02625809, -0.01528362, 0.029382853, 0.0065834224, -0.011554063, -0.016757803, 0.010980771, 0.0095002...
275
ategory) | | Post-Incident Activity | Identify (Improvement Category) | Organizations should use the incident response life cycle framework or model that suits them best. The model in this document is based on CSF 2.0 to take advantage of the wealth of resources available for CSF 2.0 and a...
[ -0.04758288, 0.0022312445, 0.068747826, 0.021470945, 0.01568246, -0.036490407, 0.010920348, 0.024339689, 0.026137434, 0.06395384, 0.07114482, -0.053498864, 0.028865928, 0.008013355, 0.017327206, 0.022784192, 0.0030631798, 0.015083212, -0.033404917, 0.054824863, 0.020731447, ...
276
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: - Applying a threat-centric approach to security requirements specification; - Employing system and security architectures that support logical and physical isolation using ...
[ 0.026049037, 0.04729785, 0.06375948, 0.022840193, 0.040436663, 0.013722377, -0.026414271, 0.030549247, -0.036158204, 0.027027344, 0.032271065, 0.011283133, 0.004011056, 0.020974888, 0.0011022252, -0.043515068, 0.02196624, 0.023688057, -0.016083356, 0.03503641, 0.033471122, ...
277
and Privacy Reference Tool (CPRT). An example of a CPRT mapping is associating CSF 2.0 outcomes with NIST Special Publication (SP) 800-53 controls that can be implemented to help achieve the outcomes. In this way, CSF 2.0 provides a common language that facilitates access to a large number of other resources. This publ...
[ -0.026809867, 0.0007443173, 0.06209412, -0.016075648, -0.019426882, -0.017821886, 0.014393612, 0.0208136, 0.01569045, 0.04650639, 0.038828082, -0.024447313, 0.010991018, 0.031920176, 0.017937444, -0.012827135, 0.01045174, -0.0009646031, -0.006965686, 0.027760025, -0.00245404,...
278
According to Incident Response Recommendations and Considerations for Cybersecurity Risk Management_ A CSF 2.0 Community Profile: - Technology professionals. Cybersecurity, privacy, system, network, cloud, and other technology architects, engineers, and administrators, as well as software developers, may be involved i...
[ 0.012144665, 0.0068730456, 0.030757347, 0.015378674, 0.022644287, -0.026071463, -0.019080024, 0.0046827686, -0.020986779, 0.03686395, 0.046734218, -0.028514104, 0.046534818, 0.018008253, 0.01409504, 0.033025514, -0.012412609, -0.0016637382, -0.020189183, 0.001422278, 0.000947...
279
According to A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Cloud Environments: via mutual Transport Layer Security (mTLS) when a service makes an initial connection establishment as part of its inter-service call. This authentication is not performed again in subsequent call...
[ -0.011137416, 0.014927572, 0.08492893, 0.008825298, 0.045432806, -0.0015087028, -0.00005299242, 0.030272182, -0.0022201235, 0.022262566, -0.021489816, -0.016301349, 0.022471085, -0.0013001829, -0.02759822, 0.012891436, -0.027107587, -0.006623573, -0.0025712342, -0.00899702, 0...
280
tegrity, and availability protection. The enhanced security requirements are implemented in addition to the basic and derived requirements since those requirements are not designed to address the APT. The enhanced security requirements apply to those components of nonfederal systems that process, store, or transmit CUI...
[ -0.013136676, 0.019705012, 0.07176378, 0.04056105, 0.036807712, 0.011234986, 0.0022707682, 0.013336853, -0.035356425, 0.04081127, 0.0040035583, -0.022932881, -0.009314529, -0.00034425128, -0.0007299456, -0.008688972, 0.039860427, 0.0019830125, -0.033304602, 0.005695687, 0.036...
281
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: ............................................ 5 | | 2.1 DEVELOPMENTAPPROACH ..............................................................................
[ 0.01835447, 0.027699295, 0.05073288, -0.01576688, 0.060654216, 0.0064723305, -0.011248649, 0.015726658, -0.041240577, 0.015981395, 0.0243609, -0.002460223, 0.008895684, 0.029629935, 0.014600451, -0.017509816, 0.045048226, 0.0048735207, -0.03324988, 0.032177303, 0.03810329, ...
282
According to Security and Privacy Controls for Information Systems and Organizations: CHAPTER ONE INTRODUCTION ...................................................................................................... 1 1.1 PURPOSE AND APPLICABILITY ........................................................................
[ -0.0026053197, 0.001176266, 0.04933011, 0.013922314, 0.035629902, -0.0145652415, -0.013910624, 0.018679982, -0.036471553, 0.025202777, 0.016575852, -0.041124012, 0.014156106, -0.012367597, 0.013314455, -0.016529094, 0.047506534, 0.041357804, 0.025226157, 0.036985897, 0.033782...
283
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: | Access Control | Maintenance | Security Assessment and Monitoring | |-----------------------------------|---------------------|-------------------------...
[ -0.035576396, 0.019514699, 0.07507666, -0.0038257705, 0.014976093, -0.0031963168, 0.010529043, 0.025714409, 0.008789462, 0.023817874, 0.06089842, -0.014282877, -0.0026486104, 0.008645588, 0.024838079, -0.03463467, 0.008377456, 0.014295956, -0.022261407, 0.039735693, 0.0453075...
284
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: ........................................................................ | CHAPTERONE INTRODUCTION..............................................................................
[ 0.025199596, 0.010261828, 0.053427927, -0.014638879, 0.04418232, -0.00018504086, -0.026833517, 0.012533379, -0.05276373, 0.01612668, 0.017269095, 0.00043089714, -0.007239736, 0.024960486, 0.022981182, -0.0147717185, 0.034405354, 0.012075083, -0.029171487, 0.022542812, 0.02885...
285
According to Zero Trust Architecture: | ACT-IAC | American Council for Technology and Industry Advisory Council. (2019). Zero Trust Cybersecurity Current Trends . Disponible en https://www.actiac.org/zero- trust-cybersecurity-current-trends ...
[ -0.005545116, 0.000097116295, 0.049639314, -0.00397283, 0.05503001, -0.0015398226, -0.04335017, 0.016902074, -0.02886268, 0.036499497, 0.0065523614, -0.010914753, -0.022489306, -0.022938529, 0.023865055, 0.025282921, -0.00013654408, 0.007868449, -0.02431428, 0.011862337, -0.0...
286
scribed in a similar manner to those of Appendix F (Security Controls) and Appendix G (Information Security Programs Organization-Wide Information Security Program Management Controls). SP 800-53 Rev. 4 reminds readers to view the privacy controls in Appendix J from the same perspective as the Program Management contro...
[ -0.00063189346, 0.017499339, 0.046951354, 0.003694522, -0.011529513, -0.0018098275, 0.004075367, 0.005488074, 0.014621844, 0.007655961, 0.008482752, -0.00418604, 0.008593426, 0.034425784, 0.010162377, -0.023267351, 0.06817451, 0.006054459, 0.030858211, 0.019647695, 0.03351436...
287
g/10.6028/NIST.SP.800-171r2 ## How to Cite this NIST Technical Series Publication: Ross R, Pillitteri V (2024) Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-171r3. ht...
[ -0.042946495, 0.004255097, 0.026768196, -0.013690311, 0.039782286, -0.0047877813, 0.0052088257, 0.013575481, -0.011164048, -0.0019122418, 0.014111356, 0.008133806, -0.010455928, 0.0021769893, 0.020707713, -0.026768196, 0.032305565, 0.025109537, 0.0027463557, 0.03480631, 0.001...
288
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: ource code. | CUI//SP-CTI | | General Proprietary | e.g., financial information, trade secrets, product research and development, existing and future product designs and performanc...
[ -0.008121959, 0.008837187, 0.048662983, -0.0021284898, 0.023464967, -0.031194925, -0.0016943673, 0.02096167, -0.015349884, 0.0024947, 0.05179898, 0.008954099, -0.006980346, 0.017495567, 0.024248965, -0.01489599, -0.0009138064, -0.007833118, -0.037686992, 0.01247522, 0.0431612...
289
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: deral agency to ensure that requirements to protect CUI are identified in applicable contracts or agreements, and CUI is marked by the federal agency. | | How do I get a 'NIST SP 800 ...
[ -0.030050358, -0.0018205737, 0.060748033, 0.0027386409, 0.011757483, 0.0032988172, -0.0063704518, 0.011776156, 0.015834322, 0.018236859, 0.008564477, 0.008975273, -0.035477847, 0.003491767, -0.013020992, 0.0014051094, -0.045013297, -0.021050189, -0.033062864, 0.01010185, 0.05...
290
According to Summary of NIST SP 800-53, Revision 4_ Security and Privacy Controls for Federal Information Systems and Organizations: Information technologySecurity techniques-Information security management systems-Requirements and ISO/IEC 15408, Information technology -- Security techniques -- Evaluation criteria for...
[ -0.044074, 0.007294764, 0.016245827, -0.0061024637, 0.040479477, -0.0075766873, 0.014354591, 0.017690683, -0.0028309792, 0.008387216, 0.016398536, -0.007782256, -0.040925857, -0.0056795785, 0.011412018, -0.0451782, -0.010812931, 0.0034036357, -0.0027193846, 0.0021158927, 0.05...
291
e requirements also apply to services, including externally provided services, that process, store, or transmit CUI, or that provide security protections, for the system requiring enhanced protection. The protection of a specific service to include CUI that is processed, stored or transmitted during the provision of th...
[ -0.010931775, 0.017113123, 0.06798904, 0.003325299, 0.030564941, -0.0050313976, 0.021979414, -0.0007350127, -0.022234315, 0.05213883, 0.017877826, -0.014378731, 0.0017973414, -0.014842188, 0.020600632, -0.0049097403, 0.040946364, 0.010097554, -0.010109141, 0.009552993, 0.0546...
292
According to Control Baselines for Information Systems and Organizations: The National Institute of Standards and Technology (NIST) Information Technology Laboratory (ITL) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurement and standards infrastructure. ITL devel...
[ -0.03809371, -0.016907446, 0.05789853, -0.021430768, 0.040367596, -0.033448137, -0.02689543, -0.0033527599, -0.057116114, -0.016393987, 0.028289104, 0.036944542, -0.041639015, -0.040392045, 0.036039878, -0.012096832, -0.016772969, 0.012225196, 0.007873026, 0.038656067, 0.0469...
293
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: systems, but such standards and guidelines shall not apply to national security systems without the express approval of the appropriate federal officials exercising policy a...
[ 0.005651286, 0.016780078, 0.037313778, -0.011518057, 0.02336977, 0.00050482736, -0.023467086, -0.011949029, -0.026372667, 0.0049665975, 0.02512146, 0.021075891, -0.027874116, -0.00428886, 0.0053419597, -0.0070415162, -0.00080807135, -0.017169343, -0.021381741, 0.0153898485, 0...
294
According to Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer: <!-- image --> <!-- image --> Howard Lutnick, Secretary of Commerce <!-- image --> Protecting Controlled Unclassified Information (CUI): NIST Special Publication 800-171, Revision...
[ -0.029982954, -0.012517091, 0.02689492, 0.02363533, 0.017736396, -0.031091478, -0.009640206, 0.03977492, -0.014358034, 0.012748034, 0.038771972, 0.002870287, -0.026789347, -0.007093238, 0.011560329, -0.0057768654, -0.012761231, -0.0023374695, -0.00986455, 0.027449183, 0.03322...
295
specific protection needs. The determination of ODP values can be guided and informed by laws, Executive Orders, directives, regulations, policies, standards, guidance, or mission and business needs. Once specified, the values for the organizationdefined parameters become part of the requirement. ## ORGANIZATION-DEFINE...
[ 0.030157074, 0.0033569722, 0.06529229, 0.0038351363, 0.0138340015, 0.020436592, -0.0069563016, -0.017502107, 0.02381649, 0.020777203, 0.04247143, 0.013316536, -0.010552356, -0.033039156, 0.032986756, -0.04799979, 0.03555443, -0.0066746436, -0.011783792, 0.0057674423, 0.016781...
296
...197 | | | D.1.1.3. Strategic Objectives............................................................................................................198 | | | D.1.1.4. Implementation Plan and Progress Tracking......................................................................199 ...
[ 0.024944905, 0.0362427, 0.08584215, -0.02425859, 0.0112384055, 0.045983095, -0.0053057414, -0.032045625, -0.023163125, 0.03199283, 0.03714019, -0.049493857, -0.0007688046, -0.016102001, 0.02167171, 0.028402876, 0.014531396, -0.0015895778, 0.040650956, 0.040914923, 0.072221436...
297
According to Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171: | CHAPTERONE INTRODUCTION...................................................................................................... | CHAPTERONE INTRODUCTION.......................
[ 0.029218564, 0.0065787546, 0.05461805, -0.015210917, 0.042663813, 0.0014828355, -0.025111746, 0.01218966, -0.05255156, 0.016505742, 0.016074134, -0.000002758859, -0.010855598, 0.02317605, 0.024470873, -0.014203832, 0.03261911, 0.013968409, -0.026053438, 0.023110654, 0.0281722...
298
According to Assessing Security and Privacy Controls in Information Systems and Organizations: CHAPTER ONE INTRODUCTION ............................................................................................................... 1 1.1 PURPOSE AND APPLICABILITY ........................................................
[ -0.001046523, 0.01816868, 0.051043686, 0.022105807, 0.01711492, -0.0054193386, -0.021503659, -0.00070274813, -0.010022303, 0.024155429, 0.030871704, -0.0376343, 0.02406279, -0.0054367087, 0.01286514, -0.025591321, 0.027351448, 0.03221496, 0.032400236, 0.006913131, 0.032956064...
299