t z/dd e e&kzd d/ke hz/dz w zk'z d...

40
IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA) WRITTEN INFORMATION SECURITY PROGRAM (WISP) [NIST SP 800 53 REV4 LOW-MODERATE-HIGH BASELINES] ACME Business Solutions, LLC

Upload: others

Post on 11-Aug-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

WRITTEN INFORMATION SECURITY PROGRAM (WISP)

[NIST SP 800 53 REV4 LOW-MODERATE-HIGH BASELINES]

ACME Business Solutions, LLC

Page 2: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Page 2 of 235 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

TABLE OF CONTENTS

WRITTEN INFORMATION SECURITY PROGRAM (WISP) OVERVIEW 15 INTRODUCTION 15 PURPOSE 15 SCOPE & APPLICABILITY 16 POLICY OVERVIEW 16 VIOLATIONS 16 EXCEPTIONS 16 UPDATES 16 KEY TERMINOLOGY 17

CYBERSECURITY PROGRAM STRUCTURE 19 POLICIES, STANDARDS, PROCEDURES & GUIDELINES STRUCTURE 19 CYBERSECURITY CONTROL OBJECTIVES 19 CYBERSECURITY PROGRAM ACTIVITIES 21 CYBERSECURITY CONSIDERATIONS FOR PROTECTING SYSTEMS 21

MANAGEMENT CONTROLS 22 PROGRAM MANAGEMENT (PM) 22

PM-1: INFORMATION SECURITY PROGRAM PLAN 22 PM-2: SENIOR INFORMATION SECURITY OFFICER 22 PM-3: INFORMATION SECURITY RESOURCES 23 PM-4: PLAN OF ACTION & MILESTONES (POA&M) PROCESS (VULNERABILITY REMEDIATION) 23 PM-5: INFORMATION SYSTEM INVENTORY 23 PM-6: INFORMATION SECURITY MEASURES OF PERFORMANCE 23 PM-7: ENTERPRISE ARCHITECTURE 24 PM-8: CRITICAL INFRASTRUCTURE PLAN (CIP) 24 PM-9: RISK MANAGEMENT STRATEGY 24 PM-10: SECURITY AUTHORIZATION PROCESS 25 PM-11: MISSION / BUSINESS PROCESS DEFINITION 25 PM-12: INSIDER THREAT PROGRAM 25 PM-13: INFORMATION SECURITY WORKFORCE 25 PM-14: TESTING, TRAINING & MONITORING 26 PM-15: CONTACTS WITH SECURITY GROUPS & ASSOCIATIONS 26 PM-16: THREAT AWARENESS PROGRAM 27

SECURITY ASSESSMENTS & AUTHORIZATION (CA) 28 CA-1: SECURITY ASSESSMENT & AUTHORIZATION POLICY & PROCEDURES 28 CA-2: SECURITY ASSESSMENTS 28

CA-2(1): Security Assessments | Independent Assessors 29 CA-2(2): Security Assessments | Specialized Assessments 29 CA-2(3): Security Assessments | External Organizations 29

CA-3: SYSTEM INTERCONNECTIONS 29 CA-3(3): System Interconnections | Unclassified Non-National Security System Connections 30 CA-3(5): System Interconnections | Restrictions on External System Connections 30

CA-4: SECURITY CERTIFICATION [WITHDRAWN FROM NIST 800-53 REV4] 30 CA-5: PLAN OF ACTION & MILESTONES (POA&M) 30 CA-6: SECURITY AUTHORIZATION 30 CA-7: CONTINUOUS MONITORING 31

CA-7(1): Continuous Monitoring | Independent Assessment 31 CA-7(3): Continuous Monitoring | Trend Analysis 31

CA-8: PENETRATION TESTING 32 CA-8(1): Penetration Testing | Independent Penetration Agent or Team 32 CA-8(2): Penetration Testing | Red Team Exercises 32

CA-9: INTERNAL SYSTEM CONNECTIONS 33 PLANNING (PL) 34

PL-1: SECURITY PLANNING POLICY & PROCEDURES 34 PL-2: SYSTEM SECURITY PLAN (SSP) 34

PL-2(3): System Security Plan | Plan / Coordinate with Other Organizational Entities 35 PL-3: SYSTEM SECURITY PLAN UPDATE [WITHDRAWN FROM NIST 800-53 REV4] 36

Page 3: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Page 3 of 235 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

PL-4: RULES OF BEHAVIOR 36 PL-4(1): Rules Of Behavior | Social Media & Social Networking Restrictions 36

PL-5: PRIVACY IMPACT ASSESSMENT [WITHDRAWN FROM NIST 800-53 REV4] 36 PL-6: SECURITY-RELATED ACTIVITY PLANNING [WITHDRAWN FROM NIST 800-53 REV4] 36 PL-7: SECURITY CONCEPT OF OPERATIONS 37 PL-8: INFORMATION SECURITY ARCHITECTURE 37

PL-8(1): Information Security Architecture | Defense In Depth 37 PL-8(2): Information Security Architecture | Supplier Diversity 37

PL-9: CENTRAL MANAGEMENT 38 RISK ASSESSMENT (RA) 39

RA-1: RISK ASSESSMENT POLICY & PROCEDURES 39 RA-2: SECURITY CATEGORIZATION 39 RA-3: RISK ASSESSMENT 39 RA-4: RISK ASSESSMENT UPDATE [WITHDRAWN FROM NIST 800-53 REV4] 40 RA-5: VULNERABILITY SCANNING 40

RA-5(1): Vulnerability Scanning | Update Tool Capability 41 RA-5(2): Vulnerability Scanning | Update by Frequency / Prior to New Scan / When Identified 41 RA-5(3): Vulnerability Scanning | Breadth / Depth of Coverage 41 RA-5(4): Vulnerability Scanning | Discoverable Information 42 RA-5(5): Vulnerability Scanning | Privileged Access 42 RA-5(6): Vulnerability Scanning | Automated Trend Analysis 42 RA-5(8): Vulnerability Scanning | Review Historical Audit Logs 42 RA-5(10): Vulnerability Scanning | Correlate Scanning Information 42

RA-6: TECHNICAL SURVEILLANCE COUNTERMEASURES SECURITY 43 SYSTEM & SERVICE ACQUISITION (SA) 44

SA-1: SYSTEM & SERVICES ACQUISITION POLICY & PROCEDURES 44 SA-2: ALLOCATION OF RESOURCES 44 SA-3: SYSTEM DEVELOPMENT LIFE CYCLE (SDLC) 45 SA-4: ACQUISITION PROCESS 45

SA-4(1): Acquisition Process | Functional Properties Of Security Controls 45 SA-4(2): Acquisition Process | Design & Implementation of Security Controls 45 SA-4(3): Acquisition Process | Development Methods, Techniques & Processes 46 SA-4(6): Acquisition Process | Use of Information Assurance Products 46 SA-4(8): Acquisition Process | Continuous Monitoring Plan 46 SA-4(9): Acquisition Process | Functions, Ports, Protocols & Services In Use 46 SA-4(10): Acquisition Process | Use of Approved PIV Products 47

SA-5: INFORMATION SYSTEM DOCUMENTATION 47 SA-6: SOFTWARE USAGE RESTRICTIONS [WITHDRAWN FROM NIST 800-53 REV4] 48 SA-7: USER-INSTALLED SOFTWARE [WITHDRAWN FROM NIST 800-53 REV4] 48 SA-8: SECURITY ENGINEERING PRINCIPLES 48 SA-9: EXTERNAL INFORMATION SYSTEM SERVICES 48

SA-9(1): External Information System Services | Risk Assessments & Organizational Approvals 49 SA-9(2): External Information System Services | Identification Of Functions, Ports, Protocols & Services 50 SA-9(3): External Information System Services | Maintain Trust Relationship with Providers 50 SA-9(4): External Information System Services | Consistent Interests of Consumers and Providers 50 SA-9(5): External Information System Services | Processing, Storage and Service Location 51

SA-10: DEVELOPER CONFIGURATION MANAGEMENT 51 SA-10(1): Developer Configuration Management | Software / Firmware Integrity Verification 51

SA-11: DEVELOPER SECURITY TESTING 52 SA-11(1): Developer Security Testing | Static Code Analysis 52 SA-11(2): Developer Security Testing | Threat Analysis & Flaw Remediation 52 SA-11(8): Developer Security Testing | Dynamic Code Analysis 53

SA-12: SUPPLY CHAIN PROTECTION 53 SA-12(1): Supply Chain Protection | Acquisition Strategies, Tools & Methods 54 SA-12(2): Supply Chain Protection | Supplier Reviews 54 SA-12(5): Supply Chain Protection | Limitation of Harm 54 SA-12(10): Supply Chain Protection | Validate As Genuine & Not Altered 54 SA-12(15): Supply Chain Protection | Processes To Address Weaknesses or Deficiencies 55

Page 4: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Page 4 of 235 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

SA-13: TRUSTWORTHINESS 55 SA-14: CRITICALITY ANALYSIS 55 SA-15: DEVELOPMENT PROCESS, STANDARDS & TOOLS 55

SA-15(9): Development Process, Standards & Tools | Use of Live Data 56 SA-16: DEVELOPER-PROVIDED TRAINING 56 SA-17: DEVELOPER SECURITY ARCHITECTURE & DESIGN 57 SA-18: TAMPER RESISTANCE & DETECTION 57

SA-18(2): Tamper Resistance & Detection | Inspection of Information Systems, Components or Devices 57 SA-19: COMPONENT AUTHENTICITY 57

SA-19(1): Component Authenticity | Anti-Counterfeit Training 58 SA-19(3): Component Authenticity | Component Disposal 58

SA-20: CUSTOMIZED DEVELOPMENT OF CRITICAL COMPONENTS 58 SA-21: DEVELOPER SCREENING 58 SA-22: UNSUPPORTED SYSTEM COMPONENTS 58

SA-22(1): Unsupported System Components | Alternate Sources For Continued Support 59

OPERATIONAL CONTROLS 60 AWARENESS & TRAINING (AT) 60

AT-1: SECURITY AWARENESS & TRAINING POLICY & PROCEDURES 60 AT-2: SECURITY AWARENESS TRAINING 60

AT-2(1): Security Awareness Training | Practical Exercises 61 AT-2(2): Security Awareness Training | Insider Threat 61

AT-3: ROLE-BASED SECURITY TRAINING 61 AT-3(3): Roles-Based Security Training | Practical Exercises 62 AT-3(4): Roles-Based Security Training | Suspicious Communications & Anomalous System Behavior 62

AT-4: SECURITY TRAINING RECORDS 62 AT-5: CONTACTS WITH SECURITY GROUPS & ASSOCIATIONS [WITHDRAWN FROM NIST 800-53 REV4] 63

CONTINGENCY PLANNING (CP) 64 CP-1: CONTINGENCY PLANNING POLICY & PROCEDURES 64 CP-2: CONTINGENCY PLAN 64

CP-2(1): Contingency Plan | Coordinate with Related Plans 65 CP-2(2): Contingency Plan | Capacity Planning 65 CP-2(3): Contingency Plan | Resume Essential Missions / Business Functions 65 CP-2(4): Contingency Plan | Resume All Missions / Business Functions 65 CP-2(5): Contingency Plan | Continue Essential Missions / Business Functions 66 CP-2(6): Contingency Plan | Alternate Processing / Storage Site 66 CP-2(8): Contingency Plan | Identify Critical Assets 66

CP-3: CONTINGENCY TRAINING 67 CP-3(1): Contingency Training | Simulated Events 67

CP-4: CONTINGENCY PLAN TESTING 67 CP-4(1): Contingency Plan Testing | Coordinate with Related Plans 67 CP-4(2): Contingency Plan Testing | Alternate Processing Site 68

CP-5: CONTINGENCY PLAN UPDATE [WITHDRAWN FROM NIST 800-53 REV4] 68 CP-6: ALTERNATE STORAGE SITE 68

CP-6(1): Alternate Storage Site | Separation from Primary Site 68 CP-6(2): Alternate Storage Site | Recovery Time / Point Objectives 68 CP-6(3): Alternate Storage Site | Accessibility 69

CP-7: ALTERNATE PROCESSING SITE 69 CP-7(1): Alternate Processing Site | Separation from Primary Site 69 CP-7(2): Alternate Processing Site | Accessibility 69 CP-7(3): Alternate Processing Site | Priority of Service 70 CP-7(4): Alternate Processing Site | Preparation for Use 70 CP-7(6): Alternate Processing Site | Inability to Return to Primary Site 70

CP-8: TELECOMMUNICATIONS SERVICES 70 CP-8(1): Telecommunications Services | Priority of Service Provisions 70 CP-8(2): Telecommunications Services | Single Points of Failure 71 CP-8(3): Telecommunications Services | Separation of Primary / Alternate Providers 71 CP-8(4): Telecommunications Services | Provider Contingency Plan 71

CP-9: INFORMATION SYSTEM BACKUP 71

Page 5: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Page 5 of 235 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

CP-9(1): Information System Backup | Testing for Reliability & Integrity 73 CP-9(2): Information System Backup| Test Restoration Using Sampling 73 CP-9(3): Information System Backup | Separate Storage for Critical Information 73 CP-9(5): Information System Backup | Transfer to Alternate Storage Site 73 CP-9(6): Information System Backup | Redundant Secondary System 74 CP-9(7): Information System Backup | Dual Authorization 74

CP-10: INFORMATION SYSTEM RECOVERY & RECONSTITUTION 74 CP-10(2): Information System Recovery & Reconstitution | Transaction Recovery 74 CP-10(4): Information System Recovery & Reconstitution | Restore Within Time Period 75 CP-10(6): Information System Recovery & Reconstitution | Component Protection 75

CP-11: ALTERNATE COMMUNICATIONS PROTOCOLS 75 CP-12: SAFE MODE 75 CP-13: ALTERNATIVE SECURITY MEASURES 75

INCIDENT RESPONSE (IR) 77 IR-1: INCIDENT RESPONSE POLICY & PROCEDURES 77 IR-2: INCIDENT RESPONSE TRAINING 77

IR-2(1): Incident Response Training | Simulated Events 77 IR-2(2): Incident Response Training | Automated Training Environments 78

IR-3: INCIDENT RESPONSE TESTING 78 IR-3(2): Incident Response Testing | Coordination with Related Plans 78

IR-4: INCIDENT HANDLING 78 IR-4(1): Incident Handling | Automated Incident Handling Processes 79 IR-4(2): Incident Handling | Dynamic Reconfiguration 79 IR-4(3): Incident Handling | Continuity of Operations 79 IR-4(4): Incident Handling | Information Correlation 80 IR-4(6): Incident Handling | Insider Threats – Specific Capabilities 81 IR-4(8): Incident Handling | Correlation with External Organizations 81

IR-5: INCIDENT MONITORING 82 IR-5(1): Incident Monitoring | Automated Tracking / Data Collection / Analysis 82

IR-6: INCIDENT REPORTING 82 IR-6(1): Incident Reporting | Automated Reporting 83

IR-7: INCIDENT REPORTING ASSISTANCE 83 IR-7(1): Incident Reporting Assistance | Automation Support of Availability of Information / Support 84 IR-7(2): Incident Reporting Assistance | Coordination With External Providers 84

IR-8: INCIDENT RESPONSE PLAN (IRP) 84 IR-9: INFORMATION SPILLAGE RESPONSE 85

IR-9(1): Information Spillage Response | Responsible Personnel 85 IR-9(2): Information Spillage Response | Training 85 IR-9(3): Information Spillage Response | Post-Spill Operations 85 IR-9(4): Information Spillage Response | Exposure to Unauthorized Personnel 86

IR-10: INTEGRATED INFORMATION SECURITY ANALYSIS TEAM 86 MEDIA PROTECTION (MP) 87

MP-1: MEDIA PROTECTION POLICY & PROCEDURES 87 MP-2: MEDIA ACCESS 87 MP-3: MEDIA MARKING 88 MP-4: MEDIA STORAGE 88 MP-5: MEDIA TRANSPORT 89

MP-5(3): Media Transport | Custodians 89 MP-5(4): Media Transport | Cryptographic Protection (Encrypting Data In Storage Media) 89

MP-6: MEDIA SANITIZATION 89 MP-6(1): Media Sanitization | Review, Approve, Track, Document & Verify 90 MP-6(2): Media Sanitization | Equipment Testing 90 MP-6(3): Media Sanitization | Non-Destructive Techniques 90 MP-6(7): Media Sanitization | Dual Authorization 91

MP-7: MEDIA USE 91 MP-7(1): Media Use | Prohibit Use Without Owner 91

MP-8: MEDIA DOWNGRADING 91 PERSONNEL SECURITY (PS) 93

Page 6: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Page 6 of 235 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

PS-1: PERSONNEL SECURITY POLICY & PROCEDURES 93 PS-2: POSITION RISK DESIGNATION (POSITION CATEGORIZATION) 93 PS-3: PERSONNEL SCREENING 94

PS-3(3): Personnel Screening | Information With Special Protection Measures 94 PS-4: PERSONNEL TERMINATION 94

PS-4(1): Personnel Termination | Post-Employment Requirements 95 PS-4(2): Personnel Termination | Automated Notification 95

PS-5: PERSONNEL TRANSFER 96 PS-6: ACCESS AGREEMENTS 96

PS-6(3): Access Agreements | Post-Employment Requirements 96 PS-7: THIRD-PARTY PERSONNEL SECURITY 96 PS-8: PERSONNEL SANCTIONS 97

PHYSICAL & ENVIRONMENTAL PROTECTION (PE) 98 PE-1: PHYSICAL & ENVIRONMENTAL PROTECTION POLICY & PROCEDURES 98 PE-2: PHYSICAL ACCESS AUTHORIZATIONS 98

PE-2(1): Physical Access Authorizations | Access by Position / Role 98 PE-2(2): Physical Access Authorizations | Two Forms of Identification 99 PE-2(3): Physical Access Authorizations | Restrict Unescorted Access 99

PE-3: PHYSICAL ACCESS CONTROL 99 PE-3(1): Physical Access Control | Information System Access 100 PE-3(4): Physical Access Control | Lockable Casings 100

PE-4: ACCESS CONTROL FOR TRANSMISSION MEDIUM 101 PE-5: ACCESS CONTROL FOR OUTPUT DEVICES 101 PE-6: MONITORING PHYSICAL ACCESS 101

PE-6(1): Monitoring Physical Access | Intrusion Alarms / Surveillance Equipment 101 PE-6(4): Monitoring Physical Access | Monitoring Physical Access to Information Systems 102

PE-7: VISITOR CONTROL [WITHDRAWN FROM NIST 800-53 REV4] 102 PE-8: VISITOR ACCESS RECORDS 102

PE-8(1): Visitor Access Records | Automated Records Management & Review 102 PE-9: POWER EQUIPMENT & POWER CABLING 102

PE-9(2): Power Equipment & Power Cabling | Automatic Voltage Controls 103 PE-10: EMERGENCY SHUTOFF 103 PE-11: EMERGENCY POWER 103

PE-11(1): Emergency Power | Long-Term Alternate Power Supply – Minimal Operational Capacity 103 PE-12: EMERGENCY LIGHTING 104 PE-13: FIRE PROTECTION 104

PE-13(1): Fire Protection | Fire Detection Devices 104 PE-13(2): Fire Protection | Fire Suppression Devices 104 PE-13(3): Fire Protection | Automatic Fire Suppression 104

PE-14: TEMPERATURE & HUMIDITY CONTROLS 105 PE-14(2): Temperature & Humidity Controls | Monitoring with Alarms / Notifications 105

PE-15: WATER DAMAGE PROTECTION 105 PE-15(1): Water Damage Protection | Automation Support 105

PE-16: DELIVERY & REMOVAL 105 PE-17: ALTERNATE WORK SITE 106 PE-18: LOCATION OF INFORMATION SYSTEM COMPONENTS 106 PE-19: INFORMATION LEAKAGE 106 PE-20: ASSET MONITORING & TRACKING 107

TECHNICAL CONTROLS 108 ACCESS CONTROL (AC) 108

AC-1: ACCESS CONTROL POLICY & PROCEDURES 108 AC-2: ACCOUNT MANAGEMENT 108

AC-2(1): Account Management | Automated System Account Management 109 AC-2(2): Account Management | Removal of Temporary / Emergency Accounts 109 AC-2(3): Account Management | Disable Inactive Accounts 109 AC-2(4): Account Management | Automated Audit Actions 110 AC-2(5): Account Management | Inactivity Logout 110 AC-2(7): Account Management | Role Based Schemes (Role-Based Access Control (RBAC)) 110

Page 7: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Page 7 of 235 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

AC-2(9): Account Management | Restrictions on Shared Groups / Accounts 110 AC-2(10): Account Management | Shared / Group Account Credential Termination 110 AC-2(11): Account Management | Usage Conditions 110 AC-2(12): Account Management | Account Monitoring / Atypical Usage 111 AC-2(13): Account Management | Disable Accounts for High-Risk Individuals 111

AC-3: ACCESS ENFORCEMENT 111 AC-3(2): Access Enforcement | Dual Authorization 112

AC-4: INFORMATION FLOW ENFORCEMENT – ACCESS CONTROL LISTS (ACLS) 112 AC-4(1): Information Flow Enforcement | Object Security Attributes 112 AC-4(4): Information Flow Enforcement | Content Check For Encrypted Data 113 AC-4(5): Information Flow Enforcement | Embedded Data Types 113 AC-4(6): Information Flow Enforcement | Metadata 113 AC-4(8): Information Flow Enforcement | Security Policy Filters 113 AC-4(9): Information Flow Enforcement | Human Reviews 114 AC-4(12): Information Flow Enforcement | Data Type Identifiers 114 AC-4(13): Information Flow Enforcement | Decomposition Into Policy-Relevant Subcomponents 114 AC-4(15): Information Flow Enforcement | Detection of Unsanctioned Information 114 AC-4(20): Information Flow Enforcement | Approved Solutions 115 AC-4(21): Information Flow Enforcement | Physical / Logical Separation for Information Flows 115

AC-5: SEPARATION OF DUTIES 115 AC-6: LEAST PRIVILEGE 115

AC-6(1): Least Privilege | Authorize Access to Security Functions 116 AC-6(2): Least Privilege | Non-Privileged Access for Non-Security Functions 116 AC-6(3): Least Privilege | Network Access to Privileged Commands 116 AC-6(5): Least Privilege | Privileged Accounts 116 AC-6(7): Least Privilege | Review of User Privileges 117 AC-6(8): Least Privilege | Privilege Levels for Code Execution 117 AC-6(9): Least Privilege | Auditing Use of Privileged Functions 117 AC-6(10): Least Privilege | Prohibit Non-Privileged Users from Executing Privileged Functions 117

AC-7: UNSUCCESSFUL LOGIN ATTEMPTS 118 AC-7(2): Unsuccessful Login Attempts | Purge / Wipe Mobile Device 118

AC-8: SYSTEM USE NOTIFICATION (LOGON BANNER) 118 AC-9: PREVIOUS LOGON NOTIFICATION 119 AC-10: CONCURRENT SESSION CONTROL 119 AC-11: SESSION LOCK 119

AC-11(1): Session Lock | Pattern-Hiding Displays 120 AC-12: SESSION TERMINATION 120

AC-12(1): Session Termination | User-Initiated Logouts / Message Displays 120 AC-13: SUPERVISION & REVIEW – ACCESS CONTROL [WITHDRAWN FROM NIST 800-53 REV4] 120 AC-14: PERMITTED ACTIONS WITHOUT IDENTIFICATION OR AUTHORIZATION 120 AC-15: AUTOMATED MARKING [WITHDRAWN FROM NIST 800-53 REV4] 121 AC-16: SECURITY ATTRIBUTES 121 AC-17: REMOTE ACCESS 121

AC-17(1): Remote Access | Automated Monitoring / Control 122 AC-17(2): Remote Access | Protection of Confidentiality / Integrity Using Encryption 122 AC-17(3): Remote Access | Managed Access Control Points 122 AC-17(4): Remote Access | Privileged Commands & Access 122 AC-17(6): Remote Access | Protection of Information 122 AC-17(9): Remote Access | Disconnect / Disable Remote Access 122

AC-18: WIRELESS ACCESS 123 AC-18(1): Wireless Access | Authentication & Encryption 123 AC-18(3): Wireless Access | Disable Wireless Networking 123 AC-18(4): Wireless Access | Restrict Configuration By Users 123 AC-18(5): Wireless Access | Antennas Transmission Power Levels 124

AC-19: ACCESS CONTROL FOR MOBILE DEVICES 124 AC-19(5): Access Control For Mobile Devices | Full Device / Container-Based Encryption 125

AC-20: USE OF EXTERNAL INFORMATION SYSTEMS 125 AC-20(1): Use of External Information Systems | Limits of Authorized Use 126

Page 8: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Page 8 of 235 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

AC-20(2): Use of External Information Systems | Portable Storage Devices 126 AC-20(3): Use of External Information Systems | Non-Organizationally Owned Systems / Components / Devices 126

AC-21: INFORMATION SHARING 127 AC-21(2): Information Sharing | Information Search & Retrieval 127

AC-22: PUBLICLY ACCESSIBLE CONTENT 127 AC-23: DATA MINING PROTECTION 128 AC-24: ACCESS CONTROL DECISIONS 128 AC-25: REFERENCE MONITOR 128

AUDIT & ACCOUNTABILITY (AU) 129 AU-1: AUDIT & ACCOUNTABILITY POLICY & PROCEDURES 129 AU-2: AUDITABLE EVENTS 129

AU-2(3): Auditable Events | Reviews & Updates 130 AU-3: CONTENT OF AUDIT RECORDS 130

AU-3(1): Content Of Audit Records | Additional Audit Information 130 AU-3(2): Content of Audit Records | Centralized Management of Planned Audit Record Content 130

AU-4: AUDIT STORAGE CAPACITY 131 AU-4(1): Audit Storage Capacity | Transfer To Alternate Storage 131

AU-5: RESPONSE TO AUDIT PROCESSING FAILURES 131 AU-5(1): Response To Audit Processing Failures | Audit Storage Capacity 131 AU-5(2): Response To Audit Processing Failures | Real-Time Alerts 132

AU-6: AUDIT REVIEW, ANALYSIS & REPORTING 132 AU-6(1): Audit Review, Analysis & Reporting | Process Integration 133 AU-6(3): Audit Review, Analysis & Reporting | Correlate Audit Repositories 133 AU-6(4): Audit Review, Analysis & Reporting | Central Review & Analysis 133 AU-6(5) Audit Review, Analysis & Reporting | Integration / Scanning and Monitoring Capabilities 133 AU-6(6) Audit Review, Analysis & Reporting | Correlation with Physical Monitoring 133 AU-6(7) Audit Review, Analysis & Reporting | Permitted Actions 134 AU-6(8): Audit Review, Analysis & Reporting | Full-Text Analysis Of Privileged Commands 134 AU-6(10) Audit Review, Analysis & Reporting | Audit Level Adjustment 134

AU-7: AUDIT REDUCTION & REPORT GENERATION 134 AU-7(1): Audit Reduction & Report Generation | Automatic Processing 135

AU-8: TIME STAMPS 135 AU-8(1): Time Stamps | Synchronization With Authoritative Time Source 135

AU-9: PROTECTION OF AUDIT INFORMATION 135 AU-9(2): Protection of Audit Information | Audit Backup on Separate Physical Systems / Components 136 AU-9(3): Protection of Audit Information | Cryptographic Protection 136 AU-9(4): Protection of Audit Information | Access by Subset of Privileged Users 136 AU-9(5): Protection of Audit Information | Dual Authorization 136

AU-10: NON-REPUDIATION 137 AU-10(3): Non-Repudiation | Chain of Custody 137

AU-11: AUDIT RECORD RETENTION 137 AU-11(1): Audit Record Retention | Long-Term Retrieval Capability 138

AU-12: AUDIT GENERATION 138 AU-12(1): Audit Generation | System-Wide / Time-Correlated Audit Trail 138 AU-12(3): Audit Generation | Changes by Authorized Individuals 138

AU-13: MONITORING FOR INFORMATION DISCLOSURE 139 AU-14: SESSION AUDIT 139 AU-15: ALTERNATE AUDIT CAPABILITY 139 AU-16: CROSS-ORGANIZATIONAL AUDITING 139

AU-16(2): Cross-Organizational Auditing | Sharing of Audit Information 140 CONFIGURATION MANAGEMENT (CM) 141

CM-1: CONFIGURATION MANAGEMENT POLICY & PROCEDURES 141 CM-2: BASELINE CONFIGURATIONS 141

CM-2(1): Baseline Configuration | Reviews & Updates 141 CM-2(2): Baseline Configuration | Automation Support for Accuracy / Currency 142 CM-2(3): Baseline Configuration | Retention Of Previous Configurations 142 CM-2(6): Baseline Configuration | Development & Test Environments 142 CM-2(7): Baseline Configuration | Configure Systems, Components or Devices for High-Risk Areas 142

Page 9: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Page 9 of 235 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

CM-3: CONFIGURATION CHANGE CONTROL 143 CM-3(1): Configuration Change Control | Automated Document / Notification / Prohibition Of Changes 143 CM-3(2): Configuration Change Control | Test, Validate & Document Changes 144 CM-3(4): Configuration Change Control | Security Representative 144 CM-3(5): Configuration Change Control | Automated Security Response 144 CM-3(6): Configuration Change Control | Cryptography Management 144

CM-4: SECURITY IMPACT ANALYSIS 144 CM-4(1): Security Impact Analysis | Separate Test Environments 145 CM-4(2): Security Impact Analysis | Verification of Security Functions 145

CM-5: ACCESS RESTRICTION FOR CHANGE 145 CM-5(1): Access Restrictions For Change | Automated Access Enforcement / Auditing 145 CM-5(2): Access Restrictions for Change | Review System Changes 146 CM-5(3): Access Restrictions For Change | Signed Components 146 CM-5(4): Access Restrictions For Change | Dual Authorization (Two-Person Rule) 146 CM-5(5): Access Restrictions For Change | Limit Production / Operational Privileges (Incompatible Roles) 146 CM-5(6): Access Restrictions For Change | Library Privileges 147

CM-6: CONFIGURATION SETTINGS 147 CM-6(1): Configuration Settings | Automated Central Management / Application / Verification 147 CM-6(2): Configuration Settings | Respond To Unauthorized Changes 147

CM-7: LEAST FUNCTIONALITY 147 CM-7(1): Least Functionality | Periodic Review 148 CM-7(2): Least Functionality | Prevent Program Execution 148 CM-7(4): Least Functionality | Unauthorized Software (Blacklisting) 148 CM-7(5): Least Functionality | Authorized Software (Whitelisting) 149

CM-8: INFORMATION SYSTEM COMPONENT INVENTORY 149 CM-8(1): Information System Component Inventory | Updates During Installations / Removals 149 CM-8(2): Information System Component Inventory | Automated Maintenance (CMDB) 150 CM-8(3): Information System Component Inventory | Automated Unauthorized Component Detection 150 CM-8(4): Information System Component Inventory | Accountability Information 150 CM-8(5): Information System Component Inventory | No Duplicate Accounting of Components 150 CM-8(6): Information System Component Inventory | Approved Deviations 150

CM-9: CONFIGURATION MANAGEMENT PLAN 151 CM-9(1): Configuration Management Plan | Assignment of Responsibility 151

CM-10: SOFTWARE USAGE RESTRICTIONS 151 CM-10(1): Software Usage Restrictions | Open Source Software 152

CM-11: USER-INSTALLED SOFTWARE 152 CM-11(1): User-Installed Software | Unauthorized Installation Alerts 152 CM-11(2): User-Installed Software | Prohibit Installation Without Privileged Status 152

IDENTIFICATION & AUTHENTICATION (IA) 153 IA-1: IDENTIFICATION & AUTHENTICATION POLICY & PROCEDURES 153 IA-2: IDENTIFICATION & AUTHENTICATION (ORGANIZATIONAL USERS) 153

IA-2(1): Identification & Authentication (Organizational Users) | Network Access to Privileged Accounts 153 IA-2(2): Identification & Authentication (Organizational Users) | Network Access to Non-Privileged Accounts 154 IA-2(3): Identification & Authentication (Organizational Users) | Local Access to Privileged Accounts 154 IA-2(4): Identification & Authentication (Organizational Users) | Local Access to Non-Privileged Users 154 IA-2(5): Identification & Authentication (Organizational Users) | Group Authentication 154 IA-2(8): Identification & Authentication (Organizational Users) | Network Access to Privileged Accounts - Replay Resistant

154 IA-2(9): Identification & Authentication (Organizational Users) | Network Access to Non-Privileged Accounts - Replay

Resistant 154 IA-2(11): Identification & Authentication (Organizational Users) | Remote Access – Separate Device 155 IA-2(12): Identification & Authentication (Organizational Users) | Acceptance of PIV Credentials 155 IA-2(13): Identification & Authentication (Organizational Users) | Out-Of-Band Authentication 155

IA-3: DEVICE IDENTIFICATION & AUTHENTICATION 155 IA-3(1): Device Identification & Authentication | Cryptographic Bidirectional Authentication 156 IA-3(4): Device Identification & Authentication | Device Attestation 156

IA-4: IDENTIFIER MANAGEMENT (USER NAMES) 156 IA-4(4): Identifier Management | Identity User Status 157

Page 10: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Page 10 of 235 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

IA-4(5): Identifier Management | Dynamic Management 157 IA-4(6): Identifier Management | Cross-Organization Management 157

IA-5: AUTHENTICATOR MANAGEMENT (PASSWORDS) 157 IA-5(1): Authenticator Management | Password-Based Authentication 158 IA-5(2): Authenticator Management | PKI-Based Authentication 159 IA-5(3): Authenticator Management | In-Person or Trusted Third-Party Registration 160 IA-5(4): Authenticator Management | Automated Support For Password Strength Determination 160 IA-5(5): Authenticator Management | Change Authenticators Prior to Delivery 160 IA-5(6): Authenticator Management | Protection of Authenticators 161 IA-5(7): Authenticator Management | No Embedded Unencrypted Static Authenticators 161 IA-5(8): Authenticator Management | Multiple Information System Accounts 161 IA-5(11): Authenticator Management | Hardware Token-Based Authentication 161 IA-5(13): Authenticator Management | Expiration of Cached Authenticators 161

IA-6: AUTHENTICATOR FEEDBACK 162 IA-7: CRYPTOGRAPHIC MODULE AUTHENTICATION 162 IA-8: IDENTIFICATION & AUTHENTICATION (NON-ORGANIZATIONAL USERS) 162

IA-8(1): Identification & Authentication (Non-Organizational Users) | Acceptance of PIV Credentials from Other Organizations 162

IA-8(2): Identification & Authentication (Non-Organizational Users) | Acceptance of Third-Party Credentials 163 IA-8(3): Identification & Authentication (Non-Organizational Users) | Use of FICAM-Approved Products 163 IA-8(4): Identification & Authentication (Non-Organizational Users) | Use of FICAM-Issued Profiles 163

IA-9: SERVICE PROVIDER IDENTIFICATION & AUTHENTICATION (VENDORS) 163 IA-9(1): Service Provider Identification & Authentication | Information Exchange 164

IA-10: ADAPTIVE IDENTIFICATION & AUTHENTICATION 164 IA-11: RE-AUTHENTICATION 164

MAINTENANCE (MA) 165 MA-1: MAINTENANCE POLICY & PROCEDURES 165 MA-2: CONTROLLED MAINTENANCE 165

MA-2(2): Controlled Maintenance | Automated Maintenance Activities 166 MA-3: MAINTENANCE TOOLS 166

MA-3(1): Maintenance Tools | Inspect Tools 166 MA-3(2): Maintenance Tools | Inspect Media 166 MA-3(3): Maintenance Tools | Prevent Unauthorized Removal 167 MA-3(4): Maintenance Tools | Restrict Tool Use 167

MA-4: NON-LOCAL MAINTENANCE 167 MA-4(1): Non-Local Maintenance | Auditing & Review 168 MA-4(2): Non-Local Maintenance | Document Non-Local Maintenance 168 MA-4(3): Non-Local Maintenance | Comparable Security / Sanitization 168 MA-4(5): Non-Local Maintenance | Approvals & Notifications 168 MA-4(6): Non-Local Maintenance | Cryptographic Protection 169 MA-4(7): Non-Local Maintenance | Remote Disconnect Verification 169

MA-5: MAINTENANCE PERSONNEL 169 MA-5(1): Maintenance Personnel | Individuals Without Appropriate Access 169 MA-5(2): Maintenance Personnel | Security Clearances for Classified Systems 170 MA-5(3): Maintenance Personnel | Citizenship Requirements for Classified Systems 170 MA-5(4): Maintenance Personnel | Foreign Nationals 170 MA-5(5): Maintenance Personnel | Non-System Related Maintenance 170

MA-6: TIMELY MAINTENANCE 171 MA-6(1): Timely Maintenance | Preventative Maintenance 171 MA-6(2): Timely Maintenance | Predictive Maintenance 171 MA-6(3): Timely Maintenance | Automated Support for Predictive Maintenance 171

SYSTEM & COMMUNICATION PROTECTION (SC) 173 SC-1: SYSTEM & COMMUNICATION POLICY & PROCEDURES 173 SC-2: APPLICATION PARTITIONING 173 SC-3: SECURITY FUNCTION ISOLATION 174

SC-3(5): Security Function Isolation | Layered Structures (Defense In Depth) 174 SC-4: INFORMATION IN SHARED RESOURCES 174 SC-5: DENIAL OF SERVICE (DOS) PROTECTION 175

Page 11: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Page 11 of 235 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

SC-6: RESOURCE PRIORITY 175 SC-7: BOUNDARY PROTECTION 175

SC-7(3): Boundary Protection | Access Points 176 SC-7(4): Boundary Protection | External Telecommunications Services 176 SC-7(5): Boundary Protection | Deny by Default & Allow by Exception (Access Control List) 176 SC-7(7): Boundary Protection | Prevent Split Tunneling for Remote Devices 176 SC-7(8): Boundary Protection | Route Traffic To Authenticated Proxy Servers 177 SC-7(9): Boundary Protection | Restrict Threatening Outgoing Communications Traffic 177 SC-7(10): Boundary Protection | Prevent Unauthorized Exfiltration 177 SC-7(11): Boundary Protection | Restrict Incoming Communications Traffic 177 SC-7(12): Boundary Protection | Host-Based Protection 178 SC-7(13): Boundary Protection | Isolation of Security Tools / Mechanisms / Support Components (Security Subnet) 178 SC-7(16): Boundary Protection | Prevent Discovery of Components / Devices 178 SC-7(18): Boundary Protection | Fail Secure 178 SC-7(20): Boundary Protection | Dynamic Isolation / Segregation (Sandboxing) 179 SC-7(21): Boundary Protection | Isolation of Information System Components (DMZ) 179 SC-7(22): Boundary Protection | Separate Subnets for Connecting To Different Security Domains 179

SC-8: TRANSMISSION CONFIDENTIALITY AND INTEGRITY 179 SC-8(1): Transmission Confidentiality and Integrity | Cryptographic or Alternate Physical Protection 180 SC-8(2): Transmission Confidentiality & Integrity | Pre / Post Transmission Handling 180 SC-8(4): Transmission Confidentiality & Integrity | Conceal / Randomize Communications 181

SC-9: TRANSMISSION CONFIDENTIALITY [WITHDRAWN FROM NIST 800-53 REV4] 181 SC-10: NETWORK DISCONNECT 181 SC-11: TRUSTED PATH 181 SC-12: CRYPTOGRAPHIC KEY ESTABLISHMENT & MANAGEMENT 181

SC-12(1): Cryptographic Key Establishment & Management | Availability 182 SC-12(2): Cryptographic Key Establishment & Management | Symmetric Keys 183 SC-12(3): Cryptographic Key Establishment & Management | Asymmetric Keys 183

SC-13: USE OF CRYPTOGRAPHY 183 SC-14: PUBLIC ACCESS PROTECTIONS [WITHDRAWN FROM NIST 800-53 REV4] 183 SC-15: COLLABORATIVE COMPUTING DEVICES 183

SC-15(1): Collaborative Computing Devices | Physical Disconnect 184 SC-15(3): Collaborative Computing Devices | Disabling / Removal in Secure Work Areas 184 SC-15(4): Collaborative Computing Devices | Explicitly Indicate Current Participants 184

SC-16: TRANSMISSION OF SECURITY ATTRIBUTES 184 SC-17: PUBLIC KEY INFRASTRUCTURE (PKI) CERTIFICATES 184 SC-18: MOBILE CODE 185

SC-18(2): Mobile Code | Acquisition / Development / Use 185 SC-18(3): Mobile Code | Prevent Downloading / Execution 185 SC-18(4): Mobile Code | Prevent Automatic Execution 186

SC-19: VOICE OVER INTERNET PROTOCOL (VOIP) 186 SC-20: SECURE NAME / ADDRESS RESOLUTION SERVICE (AUTHORITATIVE SOURCE) 186 SC-21: SECURE NAME / ADDRESS RESOLUTION SERVICE (RECURSIVE OR CACHING RESOLVER) 187 SC-22: ARCHITECTURE & PROVISIONING FOR NAME / ADDRESS RESOLUTION SERVICE 187 SC-23: SESSION AUTHENTICITY 187

SC-23(1): Session Authenticity | Invalidate Session Identifiers at Logout 187 SC-24: FAIL IN KNOWN STATE 188 SC-25: THIN NODES 188 SC-26: HONEYPOTS 188 SC-27: PLATFORM-INDEPENDENT APPLICATIONS 188 SC-28: ENCRYPTING DATA AT REST 189

SC-28(1): Encrypting Data at Rest | Cryptographic Protection 189 SC-28(2): Encrypting Data at Rest | Offline Storage 189

SC-29: HETEROGENEITY 190 SC-29(1): Heterogeneity | Virtualization Techniques 190

SC-30: CONCEALMENT & MISDIRECTION 190 SC-30(2): Concealment and Misdirection | Randomness 190 SC-30(3): Concealment and Misdirection | Change Processing / Storage Locations 191

Page 12: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Page 12 of 235 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

SC-31: COVERT CHANNEL ANALYSIS 191 SC-32: INFORMATION SYSTEM PARTITIONING 191 SC-33: TRANSMISSION PREPARATION INTEGRITY [WITHDRAWN FROM NIST 800-53 REV4] 192 SC-34: NON-MODIFIABLE EXECUTABLE PROGRAMS 192 SC-35: HONEYCLIENTS 192 SC-36: DISTRIBUTED PROCESSING & STORAGE 192 SC-37: OUT-OF-BAND CHANNELS 192 SC-38: OPERATIONS SECURITY 193 SC-39: PROCESS ISOLATION 193

SC-39(1): Process Isolation | Hardware Separation 193 SC-39(2): Process Isolation | Thread Separation 193

SC-40: WIRELESS LINK PROTECTION 193 SC-41: PORT & I/O DEVICE ACCESS 194 SC-42: SENSOR CAPABILITY & DATA 194

SC-42(3): Sensor Capability & Data | Prohibit Use of Devices 194 SC-43: USAGE RESTRICTIONS 195 SC-44: DETONATION CHAMBERS 195

SYSTEM & INFORMATION INTEGRITY (SI) 196 SI-1: SYSTEM & INFORMATION INTEGRITY POLICY & PROCEDURES 196 SI-2: FLAW REMEDIATION (SOFTWARE PATCHING) 196

SI-2(1): Flaw Remediation | Centralized Management 197 SI-2(2): Flaw Remediation | Automated Flaw Remediation Status 197 SI-2(3): Flaw Remediation | Time To Remediate Flaws / Benchmarks For Corrective Action 197 SI-2(5): Flaw Remediation | Automatic Software / Firmware Updates 197 SI-2(6): Flaw Remediation | Removal of Previous Versions of Software / Firmware 198

SI-3: MALICIOUS CODE PROTECTION (MALWARE) 198 SI-3(1): Malicious Code Protection | Central Management 198 SI-3(2): Malicious Code Protection | Automatic Updates 199 SI-3(6): Malicious Code Protection | Testing / Verification 199 SI-3(7): Malicious Code Protection | Nonsignature-Based Detection 199

SI-4: INFORMATION SYSTEM MONITORING 199 SI-4(1): Information System Monitoring | System-Wide Intrusion Detection Systems 200 SI-4(2): Information System Monitoring | Automated Tools for Real-Time Analysis 200 SI-4(4): Information System Monitoring | Inbound & Outbound Communications Traffic 200 SI-4(5): Information System Monitoring | System Generated Alerts 200 SI-4(7): Information System Monitoring | Automated Response To Suspicious Events 200 SI-4(11): Information System Monitoring | Analyze Communications Traffic Anomalies 201 SI-4(12): Information System Monitoring | Automated Alerts 201 SI-4(13): Information System Monitoring | Analyze Traffic / Event Patterns 201 SI-4(14): Information System Monitoring | Wireless Intrusion Detection 201 SI-4(15): Information System Monitoring | Wireless to Wire Communications 202 SI-4(16): Information System Monitoring | Correlate Monitoring Information 202 SI-4(18): Information System Monitoring | Analyze Traffic / Covert Exfiltration 202 SI-4(19): Information System Monitoring | Individuals Posing Greater Risk 202 SI-4(20): Information System Monitoring | Privileged Users 202 SI-4(22): Information System Monitoring | Unauthorized Network Services 202 SI-4(23): Information System Monitoring | Host-Based Devices 203 SI-4(24): Information System Monitoring | Indicators of Compromise (IOC) 203

SI-5: SECURITY ALERTS, ADVISORIES & DIRECTIVES 203 SI-5(1): Security Alerts, Advisories & Directives | Automated Alerts & Advisories 203

SI-6: SECURITY FUNCTIONALITY VERIFICATION 204 SI-7: SOFTWARE, FIRMWARE & INFORMATION INTEGRITY 204

SI-7(1): Software, Firmware & Information Integrity | Integrity Checks 205 SI-7(2): Software, Firmware & Information Integrity | Automated Notifications of Integrity Violations 205 SI-7(5): Software, Firmware & Information Integrity| Automated Response to Integrity Violations 205 SI-7(6): Software & Information Integrity | Cryptographic Protection 205 SI-7(7): Software, Firmware & Information Integrity | Integration of Detection & Response 206 SI-7(9): Software & Information Integrity | Verify Boot Process 206

Page 13: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Page 13 of 235 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

SI-7(10): Software, Firmware & Information Integrity | Protection of Boot Firmware 206 SI-7(14): Software, Firmware & Information Integrity | Binary or Machine-Executable Code 206

SI-8: SPAM PROTECTION 206 SI-8(1): Spam Protection | Central Management 207 SI-8(2): Spam Protection | Automatic Updates 207

SI-9: INFORMATION INPUT RESTRICTIONS [WITHDRAWN FROM NIST 800-53 REV4] 207 SI-10: INPUT DATA VALIDATION 207 SI-11: ERROR HANDLING 207 SI-12: INFORMATION OUTPUT HANDLING & RETENTION 208 SI-13: PREDICTABLE FAILURE ANALYSIS 209

CP-10(5): Information System Recovery & Reconstitution | Failover Capability 209 SI-14: NON-PERSISTENCE 210

SI-14(1): Non-Persistence | Refresh from Trusted Sources 210 SI-15: INFORMATION OUTPUT FILTERING 210 SI-16: MEMORY PROTECTION 210 SI-17: FAIL-SAFE PROCEDURES 210

PRIVACY CONTROLS 212 AUTHORITY & PURPOSE (AP) 212

AP-1: AUTHORITY TO COLLECT 212 AP-2: PURPOSE SPECIFICATION 212

ACCOUNTABILITY, AUDIT & RISK MANAGEMENT (AR) 213 AR-1: GOVERNANCE & PRIVACY PROGRAM 213 AR-2: PRIVACY IMPACT & RISK ASSESSMENT 213 AR-3: PRIVACY REQUIREMENTS FOR CONTRACTORS & SERVICE PROVIDERS 214 AR-4: PRIVACY MONITORING & AUDITING 214 AR-5: PRIVACY AWARENESS & TRAINING 214 AR-6: PRIVACY REPORTING 214 AR-7: PRIVACY-ENHANCED SYSTEM DESIGN & DEVELOPMENT 214 AR-8: ACCOUNTING OF DISCLOSURES 215

DATA QUALITY & INTEGRITY (DI) 216 DI-1: DATA QUALITY 216 DI-2: DATA INTEGRITY 216

DATA MINIMIZATION & RETENTION (DM) 217 DM-1: MINIMIZATION OF PERSONAL DATA (PD) 217 DM-2: DATA RETENTION & DISPOSAL 217 DM-3: MINIMIZATION OF PD USED IN TESTING, TRAINING & RESEARCH 218

INDIVIDUAL PARTICIPATION & REDRESS (IP) 220 IP-1: CONSENT 220 IP-2: INDIVIDUAL ACCESS 220 IP-3: REDRESS 220 IP-4: USER FEEDBACK MANAGEMENT 221

SECURITY (SE) 222 SE-1: INVENTORY OF PERSONAL DATA (PD) 222 SE-2: PRIVACY INCIDENT RESPONSE 222

TRANSPARENCY (TR) 223 TR-1: PRIVACY NOTICE 223 TR-2: SAFE HARBOR 223 TR-3: DISSEMINATION OF PRIVACY PROGRAM INFORMATION 225

USE LIMITATION (UL) 226 UL-1: INTERNAL USE 226 UL-2: INFORMATION SHARING WITH THIRD PARTIES 226

GLOSSARY: ACRONYMS & DEFINITIONS 227 ACRONYMS 227 DEFINITIONS 227

KEY WORD INDEX 228

RECORD OF CHANGES 229

Page 14: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Page 14 of 235 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

APPENDIX A - CYBERSECURITY POLICIES SUMMARY 230 POLICY STATEMENT 1: SECURITY ASSESSMENT & AUTHORIZATION (CA) 230 POLICY STATEMENT 2: PLANNING (PL) 230 POLICY STATEMENT 3: PROGRAM MANAGEMENT (PM) 231 POLICY STATEMENT 4: RISK ASSESSMENT (RA) 231 POLICY STATEMENT 5: SYSTEM & SERVICES ACQUISITION (SA) 231 POLICY STATEMENT 6: AWARENESS & TRAINING (AT) 231 POLICY STATEMENT 7: CONTINGENCY PLANNING (CP) 231 POLICY STATEMENT 8: INCIDENT RESPONSE (IR) 232 POLICY STATEMENT 9: MEDIA PROTECTION (MP) 232 POLICY STATEMENT 10: PERSONNEL SECURITY (PS) 232 POLICY STATEMENT 11: PHYSICAL & ENVIRONMENTAL PROTECTION (PE) 232 POLICY STATEMENT 12: ACCESS CONTROL (AC) 232 POLICY STATEMENT 13: AUDIT & ACCOUNTABILITY (AU) 233 POLICY STATEMENT 14: CONFIGURATION MANAGEMENT (CM) 233 POLICY STATEMENT 15: IDENTIFICATION & AUTHENTICATION (IA) 233 POLICY STATEMENT 16: MAINTENANCE (MA) 233 POLICY STATEMENT 17: SYSTEM & COMMUNICATION PROTECTION (SC) 233 POLICY STATEMENT 18: SYSTEM & INFORMATION INTEGRITY (SI) 234 POLICY STATEMENT 19: AUTHORITY & PURPOSE (AP) 234 POLICY STATEMENT 20: ACCOUNTABILITY, AUDIT & RISK MANAGEMENT (AR) 234 POLICY STATEMENT 21: DATA QUALITY & INTEGRITY (DI) 234 POLICY STATEMENT 22: DATA MINIMIZATION & RETENTION DM) 234 POLICY STATEMENT 23: INDIVIDUAL PARTICIPATION & REDRESS (IP) 235 POLICY STATEMENT 24: SECURITY (SE) 235 POLICY STATEMENT 25: TRANSPARENCY (TR) 235 POLICY STATEMENT 26: USE LIMITATION (UL) 235

Page 15: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Page 15 of 235 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

WRITTEN INFORMATION SECURITY PROGRAM (WISP) OVERVIEW

INTRODUCTION The Written Information Security Program (WISP) provides definitive information on the prescribed measures used to establish and enforce the cybersecurity program at ACME Business Solutions, LLC (ACME). ACME is committed to protecting its employees, partners, clients and ACME from damaging acts that are intentional or unintentional. Effective security is a team effort involving the participation and support of every vendor that interacts with ACME data and/or systems. Therefore, it is the responsibility of VENDOR to be aware of and adhere to ACME’s cybersecurity requirements. Protecting ACME data and the systems that collect, process and maintain this data is of critical importance. Therefore, the security of systems must include controls and safeguards to offset possible threats, as well as controls to ensure the confidentiality, availability and integrity of the data: Commensurate with risk, cybersecurity and privacy measures must be implemented to guard against unauthorized access to, alteration, disclosure or destruction of data and systems. This also includes protection against accidental loss or destruction. The security of systems must include controls and safeguards to offset possible threats, as well as controls to ensure confidentiality, integrity, availability and safety:

CONFIDENTIALITY – Confidentiality addresses preserving restrictions on information access and disclosure so that access is limited to only authorized users and services.

INTEGRITY – Integrity addresses the concern that sensitive

data has not been modified or deleted in an unauthorized and undetected manner.

AVAILABILITY – Availability addresses ensuring timely and

reliable access to and use of information.

SAFETY – Safety addresses reducing risk associated with embedded technologies that could fail or be manipulated by nefarious actors.

Security measures must be taken to guard against unauthorized access to, alteration, disclosure or destruction of data and systems. This also includes against accidental loss or destruction. PURPOSE The purpose of the Written Information Security Program (WISP) is to prescribe a comprehensive framework for:

Creating a NIST-based Information Security Management System (ISMS); Protecting the confidentiality, integrity and availability of ACME data and systems; Protecting ACME, its employees and its clients from illicit use of ACME systems and data; Ensuring the effectiveness of security controls over data and systems that support ACME’s operations. Recognizing the highly-networked nature of the current computing environment and provide effective company-wide

management and oversight of those related cybersecurity risks; and Providing for the development, review and maintenance of minimum security controls required to protect ACME’s data

and systems. The formation of these cybersecurity policies is driven by many factors, with the key factor being a risk. These policies set the ground rules under which ACME operates and safeguards its data and systems to both reduce risk and minimize the effect of potential incidents. These policies, including their related standards, procedures and guidelines, are necessary to support the management of information risks in daily operations. The development of policies provides due care to ensure ACME users understand their day-to-day security responsibilities and the threats that could impact the company.

Page 16: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Page 16 of 235 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

Implementing consistent security controls across the company will help ACME comply with current and future legal obligations to ensure long-term due diligence in protecting the confidentiality, integrity and availability of ACME data. SCOPE & APPLICABILITY These policies, standards, procedures and guidelines apply to all ACME data, systems, activities and assets owned, leased, controlled or used by ACME, its agents, contractors or other business partners on behalf of ACME. These policies, standards, procedures and guidelines apply to all ACME employees, contractors, sub-contractors and their respective facilities supporting ACME business operations, wherever ACME data is stored or processed, including any third-party contracted by ACME to handle, process, transmit, store or dispose of ACME data. Some standards apply specifically to persons with a specific job function (e.g., a System Administrator); otherwise, all personnel supporting ACME business functions shall comply with the policies. ACME departments shall use these policies or may create a more restrictive policy, but none that are less restrictive, less comprehensive or less compliant than these policies. These policies do not supersede any other applicable law or higher-level company directive or existing labor management agreement in effect as of the effective date of this policy. ACME’s documented cybersecurity roles & responsibilities provides a detailed description of ACME user roles and responsibilities, in regards to cybersecurity. ACME reserves the right to revoke, change or supplement these policies, standards, procedures and guidelines at any time without prior notice. Such changes shall be effective immediately upon approval by management unless otherwise stated. POLICY OVERVIEW To ensure an acceptable level of Cybersecurity risk, ACME is required to design, implement and maintain a coherent set of policies, standards, procedures and guidelines to manage risks to its data and systems. ACME users are required to protect and ensure the Confidentiality, Integrity and Availability (CIA) of data and systems, regardless of how its data is created, distributed or stored.

Security controls will be tailored accordingly so that cost-effective controls can be applied commensurate with the risk and sensitivity of the data and system; and

Security controls must be designed and maintained to ensure compliance with all legal requirements. VIOLATIONS Any ACME user found to have violated any policy, standard or procedure may be subject to disciplinary action, up to and including termination of employment. Violators of local, state, Federal, and/or international law may be reported to the appropriate law enforcement agency for civil and/or criminal prosecution. EXCEPTIONS While every exception to a standard potentially weakens protection mechanisms for ACME systems and underlying data, occasionally exceptions will exist. Users are required to submit a request for an exception to a cybersecurity standard and receive approval for the exception, before any deviation from a standard can be implemented. UPDATES Updates to the Written Information Security Program (WISP) will be announced to employees via management updates or email announcements. Changes will be noted in the Record of Changes to highlight the pertinent changes from the previous policies, procedures, standards and guidelines.

Page 17: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Page 17 of 235 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

KEY TERMINOLOGY In the realm of Cybersecurity terminology, the National Institute of Standards and Technology (NIST) IR 7298, Glossary of Key Cybersecurity Terms, is the primary reference document that ACME uses to define common Cybersecurity terms. 1 Key terminology to be aware of includes: Asset Custodian: A term describing a person or entity with the responsibility to assure that the assets are properly maintained, are used for the purposes intended and that information regarding the equipment is properly documented. Cardholder Data Environment (CDE): A term describing the area of the network that possesses cardholder data or sensitive authentication data and those systems and segments that directly attach or support cardholder processing, storage or transmission. Adequate network segmentation, which isolates systems that store, process or transmit cardholder data from those that do not, may reduce the scope of the cardholder data environment and thus the scope of the PCI assessment Control: A term describing any management, operational or technical method that is used to manage risk. Controls are designed to monitor and measure specific aspects of standards to help ACME accomplish stated goals or objectives. All controls map to standards, but not all standards map to Controls. Applicability: A term describing the scope in which a control or standard is relevant and applicable. Control Objective: A term describing targets or desired conditions to be met that are designed to ensure that policy intent is met. Where applicable, Control Objectives are directly linked to an industry-recognized leading practice to align ACME with accepted due care requirements. Controlled Unclassified Information (CUI): CUI is a broad range of sensitive data that is defined by the US National Archives on the CUI Registry website.2 Data: A term describing an information resource that is maintained in electronic or digital format. Data may be accessed, searched or retrieved via electronic networks or other electronic data processing technologies. Annex 1: Data Classification & Handling Guidelines provides guidance on data classification and handling restrictions. Data Owner: A term describing a person or entity that has been given formal responsibility for the security of an asset, asset category or the data hosted on the asset. It does not mean that the asset belongs to the owner in a legal sense. Asset owners are formally responsible for making sure that assets are secure while they are being developed, produced, maintained and used. Encryption: A term describing the conversion of data from its original form to a form that can only be read by someone that can reverse the encryption process. The purpose of encryption is to prevent unauthorized disclosure of data. Guidelines: A term describing recommended practices that are based on industry-recognized secure practices. Unlike Standards, Guidelines allow users to apply discretion or leeway in their interpretation, implementation or use. Cybersecurity: A term that covers the protection of information against unauthorized disclosure, transfer, modification or destruction, whether accidental or intentional. The focus is on the Confidentiality, Integrity and Availability (CIA) of data. Least Privilege: A term describing the theory of restricting access by only allowing users or processes the least set of privileges necessary to complete a specific job or function. Personally Data (PD): PD is commonly defined as the first name or first initial and last name, in combination with any one or more of the following data elements: 3

Social Security Number (SSN) / Taxpayer Identification Number (TIN) / National Identification Number (NIN) Driver License (DL) or other government-issued identification number (e.g., passport, permanent resident card, etc.) Financial account number Payment card number (e.g., credit or debit card)

1 NIST IR 7298 - https://nvlpubs.nist.gov/nistpubs/ir/2019/NIST.IR.7298r3.pdf 2 US National Archives – CUI Registry - https://www.archives.gov/cui 3 The source of this definition comes from two state laws - Oregon Consumer Identity Theft Protection Act - ORS 646A.600(11)(a) - https://www.oregonlegislature.gov/bills_laws/ors/ors646A.html and Massachusetts 201 CMR 17.00” Standards For The Protection of Personal Information of Residents of The Commonwealth - MA201CMR17.02 http://www.mass.gov/ocabr/docs/idtheft/201cmr1700reg.pdf

Page 18: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Page 19 of 235 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

CYBERSECURITY PROGRAM STRUCTURE

POLICIES, STANDARDS, PROCEDURES & GUIDELINES STRUCTURE Cybersecurity documentation is comprised of six (6) main parts:

(1) Core policy that establishes management’s intent; (2) Control objective that identifies leading practices; (3) Standards that provides quantifiable requirements; (4) Controls identify desired conditions that are expected to be met; (5) Procedures / Control Activities establish how tasks are performed to meet the requirements established in standards and

to meet controls; and (6) Guidelines are recommended, but not mandatory.

Figure 1: Cybersecurity Documentation Hierarchy CYBERSECURITY CONTROL OBJECTIVES ACME’s standards are organized into classes and families for ease of use in the control selection and specification process. There are four (4) general classes of security control objectives that align with FIPS 199.4 These classes are further broken down into twenty-six (26) families of security control objectives.

Management o Management controls are non-technical mechanisms that define and guide employee actions in dealing with

cybersecurity topics. o Management controls also play an important role in policy enforcement, since these focus on the management of

the cybersecurity program and the management of risk within ACME. Operational

o Operational controls are primarily focused on resource the execution of the day-to-day cybersecurity program. o These controls generally focus on the means to control logical and physical access to information and to protect

the security of supporting systems. Technical

o Technical controls are primarily technical in nature. These controls, such as devices, processes, protocols and other measures, are used to protect the confidentiality, integrity and availability of the organization's technology assets and data.

o These are dependent upon the proper functioning of the system for their effectiveness and therefore require significant operational considerations.

Privacy

4 FIPS 199 - http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.199.pdf

Page 19: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Page 20 of 235 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

o The focus is on controls that impact Personal Data (PD). o These dependent upon the proper functioning of the other classes of controls for their effectiveness and therefore

require significant operational considerations. Each family contains security controls related to the security functionality of the family. A two-character identifier is assigned to uniquely identify each control family. The table below summarizes the classes and families in the security control catalog and the associated family identifiers.

Figure 2: NIST SP 800-53 Control Objectives Families & Identifiers

Page 20: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Page 21 of 235 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

Figure 3: NIST 800-53 Security Control Objective Relationships CYBERSECURITY PROGRAM ACTIVITIES An Information Security Management System (ISMS) focuses on Cybersecurity management and IT-related risks. The governing principle behind ACME’s ISMS is that, as with all management processes, the ISMS must remain effective and efficient in the long-term, adapting to changes in the internal organization and external environment. In accordance with ISO/IEC 27001, ACME’s ISMS incorporates the typical "Plan-Do-Check-Act" (PDCA) or Deming Cycle, approach:

Plan: This phase involves designing the ISMS, assessing IT-related risks and selecting appropriate controls. Do: This phase involves implementing and operating the appropriate security controls. Check: This phase involves reviewing and evaluating the performance (efficiency and effectiveness) of the ISMS. Act: This involves making changes, where necessary, to bring the ISMS back to optimal performance.

CYBERSECURITY CONSIDERATIONS FOR PROTECTING SYSTEMS ACME’s cybersecurity considerations for protecting systems are based on the following criteria:

The criticality of the system / application / process; and The sensitivity of the data that is stored, processed and/or transmitted by that system / application / process.

Page 21: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Page 22 of 235 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

MANAGEMENT CONTROLS

Management controls are non-technical mechanisms that define and guide employee actions in dealing with cybersecurity topics. These cybersecurity controls address broader Information Security Management System (ISMS)-level governance of the security program that impact operational, technical and privacy controls. PROGRAM MANAGEMENT (PM) Cybersecurity Program Management Policy: ACME shall implement Cybersecurity program management controls to provide a foundation for ACME’s cybersecurity Management System (ISMS). Management Intent: The purpose of the Program Management (PM) policy is for ACME to specify the development, implementation, assessment, authorization and monitoring of the Cybersecurity program management. The successful implementation of security controls for organizational systems depends on the successful implementation of the organization’s program management controls. The Cybersecurity Program Management (PM) controls are essential for managing the Cybersecurity program. Supporting Documentation: Program Management (PM) control objectives, standards and guidelines directly support this policy. PM-1: INFORMATION SECURITY PROGRAM PLAN Control Objective: The organization: 5

Develops and disseminates organization-wide cybersecurity standards that: o Provides an overview of the requirements for the cybersecurity program and a description of the controls in place

or planned, for meeting those requirements; o Provides sufficient information about controls to enable an implementation that is unambiguously compliant with

the intent of the plan; o Includes roles, responsibilities, management commitment and compliance; o Is approved by senior management with responsibility and accountability for the risk being incurred to

organizational operations (including mission, functions, image and reputation), organizational assets, individuals and other organizations;

Reviews standards for applicability; and Revises standards to address organizational changes and problems identified during implementation or security

assessments. Standard: ACME’s cybersecurity policies and standards shall be represented in a single document, the Written Information Security Program (WISP) that shall be:

(a) Endorsed by executive management; (b) Reviewed and updated at least annually; and (c) Disseminated to the appropriate parties to ensure all ACME personnel understand their applicable requirements.

Supplemental Guidance: The security plans for individual systems and the organization-wide cybersecurity program plan together, provide complete coverage for all security controls employed within the organization. PM-2: SENIOR INFORMATION SECURITY OFFICER Control Objective: The organization appoints an individual assigned with the mission and resources to coordinate, develop, implement and maintain an organization-wide cybersecurity program.6 Standard: The authority and responsibility for managing the cybersecurity program are delegated to ACME’s Information Security Officer (ISO and he/she is required to perform or delegate the following cybersecurity management responsibilities:

(a) Establish, document and distribute security policies and procedures;

5 HIPAA 164.308(a)(1)(i) & 164.316(a)-(b) | GLBA Sec 6801(b)(a) | PCI DSS 12.1 & 12.1.1 | MA201CMR17 17.03(1), 17.04 & 17.03(2)(b)(b) | NIST CSF ID.GV-1 & ID.GV-2 | DFARS 252.204-7008 | NY DFS 500.02 & 500.03 6 HIPAA 164.308(a)(2) | GLBA Safeguards Rule | PCI DSS 12.5-12.5.5 | MA201CMR17 17.03(2)(a) | OR646A.622(2)(d)(A)(i) | NIST CSF ID.AM-6 & ID.GV-2 | NY DFS 500.04

Page 22: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Page 23 of 235 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

(b) Monitor and analyze security alerts and information; (c) Distribute and escalate security alerts to appropriate personnel; (d) Establish, document and distribute security incident response and escalation procedures to ensure timely and effective

handling of all situations; (e) Administer user accounts, including additions, deletions and modifications; and (f) Monitor and control all access to data.

Supplemental Guidance: None PM-3: INFORMATION SECURITY RESOURCES Control Objective: The organization addresses all capital planning and investment requests, including the resources needed to implement the cybersecurity program and documents all exceptions to this requirement. Standard: The Information Security Officer (ISO) and his/her designated representatives are responsible for managing and providing oversight for the cybersecurity-related aspects of the planning and service / tool selection process. Supplemental Guidance: None PM-4: PLAN OF ACTION & MILESTONES (POA&M) PROCESS (VULNERABILITY REMEDIATION) Control Objective: The organization implements a process for ensuring that vulnerabilities are properly identified, documents remediation actions and tracks vulnerabilities to mitigate risk to operations, assets, individuals and other organizations. 7 Standard: ACME is required to use a Plan of Action & Milestones (POA&M) or some other company-approved method, as a key tool in documenting identified weaknesses, their status and remediation steps. Supplemental Guidance: POA&M-related issues shall be based on the findings from security control assessments, security impact analyses and continuous monitoring activities. PM-5: INFORMATION SYSTEM INVENTORY Control Objective: The organization develops and maintains an inventory of its systems. 8 Standard: ACME is required to maintain an inventory of its systems that includes, but is not limited to:

(a) A list of all such devices and personnel with access; (b) A method to accurately and readily determine owner, contact information and purpose (e.g., labeling, coding, and/or

inventorying of devices); (c) List of company-approved products; and (d) Update the inventory at necessary.

Supplemental Guidance: It is also possible that the owner and custodian of the hardware, software and data are the same, but this needs to be identified and documented. PM-6: INFORMATION SECURITY MEASURES OF PERFORMANCE Control Objective: The organization develops, monitors and reports on the results of cybersecurity measures of performance. 9 Standard: The Information Security Officer (ISO) shall develop measures of performance or outcome-based metrics, to measure the effectiveness or efficiency of the cybersecurity program and the security controls employed in support of the program. Supplemental Guidance: Measures of performance are outcome-based metrics used by ACME to measure the effectiveness or efficiency of the cybersecurity program and the security controls employed in support of the program.

7 MA201CMR17 17.03(2)(j) | OR646A.622(2)(d)(B)(iii) | NIST CSF ID.RA-6 8 PCI DSS 12.3.3, 12.3.4 & 12.3.7 | NIST CSF ID.AM-1 & ID.AM-2 9 HIPAA 164.308(a)(8) | SOX Sec 404 | MA201CMR17 17.03(2)(j) | OR646A.622(2)(d)(A)(vi) & OR646A.622(2)(d)(B)(iii) | NIST CSF ID.AM-2 & PR.IP-7

Page 23: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Page 60 of 235 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

OPERATIONAL CONTROLS

Operational Controls are primarily focused on resource protection. Operational Controls generally focus on the means to control access to information and to protect the availability of that information. Management and Technical controls depend on proper Operational Controls being in place. A Management Control allowing only authorized personnel access to the data center does little good without some kind of Operational Control that addresses access. AWARENESS & TRAINING (AT) Awareness & Training Policy: ACME shall ensure that users are made aware of the security risks associated with their roles and that users understand the applicable laws, policies, standards and procedures related to the security of systems and data. Management Intent: The purpose of the Awareness & Training (AT) policy is to provide guidance for broad security awareness and security training for ACME users. Supporting Documentation: Awareness & Training (AT) control objectives, standards and guidelines directly support this policy. AT-1: SECURITY AWARENESS & TRAINING POLICY & PROCEDURES Control Objective: The organization develops, disseminates, reviews & updates: 54

A formal, documented security awareness and training policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities and compliance; and

Formal, documented procedures to facilitate the implementation of the security awareness and training policy and associated security awareness and training controls.

Standard: ACME is required to document organization-wide security awareness and training controls that, at a minimum, include:

(a) A formal, documented security awareness and training policy; and (b) Processes to facilitate the implementation of the security awareness and training policy, standards and procedures.

Supplemental Guidance: This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the AT family. Policy and procedures reflect applicable laws, regulations, policies, standards and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general cybersecurity policy for organizations. The procedures can be established for the security program in general and for particular systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures. The security awareness and training program should include, at a minimum, the following components:

Training goals; Target audience(s); Learning objectives; Deployment methods; Evaluation method to determine training effectiveness; Frequency; Duration; Deliverables or handouts; and Attendance tracking

AT-2: SECURITY AWARENESS TRAINING Control Objective: The organization provides basic security awareness training to all system users (including managers, senior executives and contractors) as part of initial training for new users, when required by system changes and thereafter as required.55 Standard: ACME’s cybersecurity personnel are responsible for developing and implementing a formal security awareness program to make all ACME users aware of the importance of cybersecurity. 54 NY DFS 500.14 55 HIPAA 164.308(a)(5)(i) & 164.308(a)(5)(ii)(A) | PCI DSS 12.6 | MA201CMR17 17.04(8) & 17.03(2)(b)(a) | NIST CSF PR.AT-1 | NY DFS 500.14

Page 24: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Page 61 of 235 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

Supplemental Guidance: Organizations generally determine the appropriate content of security awareness training and security awareness techniques based on the specific organizational requirements and the systems to which personnel have authorized access. The content includes a basic understanding of the need for cybersecurity and user actions to maintain security and to respond to suspected security incidents. AT-2(1): SECURITY AWARENESS TRAINING | PRACTICAL EXERCISES Control Objective: The organization includes practical exercises in security awareness training that simulate actual cyber-attacks. Standard: ACME’s cybersecurity personnel are responsible for developing and implementing practical exercises in security awareness training that simulate actual cyber-attacks. Supplemental Guidance: Practical exercises may include, for example, no-notice social engineering attempts to collect information, gain unauthorized access or simulate the adverse impact of opening malicious email attachments or invoking malicious web links. AT-2(2): SECURITY AWARENESS TRAINING | INSIDER THREAT Control Objective: The organization includes security awareness training on recognizing and reporting potential indicators of insider threat. Standard: ACME’s cybersecurity personnel are required to implement security awareness training that includes how to identify and report potential indicators of insider threat. Supplemental Guidance: Potential indicators and possible precursors of insider threat can include concerning behaviors such as inordinate, long-term job dissatisfaction, attempts to gain access to information not required for job performance, unexplained access to financial resources, bullying or sexual harassment of fellow colleagues, workplace violence and other serious violations of organizational policies, procedures, directives, rules, and/or practices. AT-3: ROLE-BASED SECURITY TRAINING Control Objective: The organization provides role-based security-related training:56

Before authorizing access to the system or performing assigned duties; When required by system changes; and Annually thereafter.

Standard: For cybersecurity training:

(a) Human Resources (HR) and users’ direct management shall provide initial security training to personnel upon hire; (b) ACME’s cybersecurity personnel are required to provide training, at least annually, thereafter; (c) ACME’s management is required to ensure that every user accessing a system that processes, stores or transmits sensitive

information is formally trained in handling procedures for all of the relevant types of sensitive information; and (d) Incorporate relevant security training to all employees and/or contractors that are involved in the deployment of

cybersecurity-oriented solutions to maintain professional competency in their assigned role and responsibility.

Supplemental Guidance: Initial orientation and ongoing security training should include the following topics: Cybersecurity basics Company cybersecurity policies Email policy Acceptable usage policy Data classification & handling Malicious software & spam Offsite security / security at home Wireless security Third party security (outsourced vendors) Visitor security procedures Incident response procedures Business continuity roles and procedures

56 PCI DSS 1.5, 2.5, 3.7, 4.3, 5.4, 6.7, 7.3, 8.8, 9.10, 10.9, 11.6, 12.6, 12.6.1, 12.6.2, 12.8.3 & 12.8.5, 12.10.4 | MA201CMR17 17.04(8) | OR646A.622(2)(d)(A)(iv) | NIST CSF PR.AT-2, PR.AT-4 & PR.AT-5 | NY DFS 500.10 & 500.14

Page 25: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Page 62 of 235 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

Methods can vary depending on the role of the personnel and their level of access to sensitive data. For end-user training: All users must sign an acknowledgment form stating they have read and understood ACME’s requirements regarding

cybersecurity policies, standards, procedures and guidelines prior to having access to ACME systems or data. All new users must attend a security awareness training class within thirty (30) days of, being granted access to any system; All users shall undergo at least one (1) hour of security awareness training annually. All users must be provided with sufficient training and supporting reference materials to allow them to properly protect

ACME’s systems and data; and ACME’s management must develop and maintain a communications process to be able to communicate new Cybersecurity

program information, such as an informational security bulletin or email about security items of interest. The organization should incorporate cybersecurity topics into all relevant vendor product, process and skills training. Training should focus on implementing best practices associated with the use of a vendor product or process. A record of this training should be saved as a log sheet or sign in sheet from the session or a certificate of completion from the vendor and documentation for specialized training should be maintained by individual supervisors. AT-3(3): ROLES-BASED SECURITY TRAINING | PRACTICAL EXERCISES Control Objective: The organization includes practical exercises in security training that reinforce training objectives. Standard: ACME’s Information Security Officer (ISO) is required to implement role-based practical exercises with both cybersecurity personnel and key stakeholders to reinforce security and privacy training objectives. Supplemental Guidance: Practical exercises may include, for example, security training for software developers that includes simulated cyber attacks exploiting common software vulnerabilities (e.g., buffer overflows) or spear/whale phishing attacks targeted at senior leaders/executives. These types of practical exercises help developers better understand the effects of such vulnerabilities and appreciate the need for security coding standards and processes. AT-3(4): ROLES-BASED SECURITY TRAINING | SUSPICIOUS COMMUNICATIONS & ANOMALOUS SYSTEM BEHAVIOR Control Objective: The organization provides training to its personnel on indicators of malicious code to recognize suspicious communications and anomalous behavior in organizational information systems. Standard: ACME’s cybersecurity personnel is required to create training content to educate ACME personnel about realistic indicators of malicious code or system compromise in an effort to assist users in recognizing suspicious communications an anomalous behavior that should be reported as a potential security incident. Supplemental Guidance: A well-trained workforce provides another organizational safeguard that can be employed as part of a defense-in-depth strategy to protect organizations against malicious code coming in to organizations via email or the web applications. Personnel are trained to look for indications of potentially suspicious email (e.g., receiving an unexpected email, receiving an email containing strange or poor grammar or receiving an email from an unfamiliar sender but who appears to be from a known sponsor or contractor). Personnel are also trained on how to respond to such suspicious email or web communications (e.g., not opening attachments, not clicking on embedded web links and checking the source of email addresses). For this process to work effectively, all organizational personnel are trained and made aware of what constitutes suspicious communications. Training personnel on how to recognize anomalous behaviors in organizational information systems can potentially provide early warning for the presence of malicious code. Recognition of such anomalous behavior by organizational personnel can supplement automated malicious code detection and protection tools and systems employed by organizations. AT-4: SECURITY TRAINING RECORDS Control Objective: The organization: 57

Documents and monitors individual system security training activities including basic security awareness training and specific system security training; and

Retains individual training records. Standard: ACME requires personnel to acknowledge in writing or electronically, at least annually, that they have read and understood ACME’s cybersecurity policies.

57 PCI DSS 12.6.2 | NY DFS 500.14

Page 26: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Page 77 of 235 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

INCIDENT RESPONSE (IR) Incident Response Policy: ACME shall establish an actionable Cybersecurity incident handling capability that includes adequate preparation, detection, analysis, containment, recovery and reporting activities. Management Intent: The purpose of Incident Response (IR) policy is to establish a protocol to guide ACME’s response to a cyber-security incident. Supporting Documentation: Incident Response (IR) control objectives, standards and guidelines directly support this policy. IR-1: INCIDENT RESPONSE POLICY & PROCEDURES Control Objective: The organization develops, disseminates, reviews & updates:67

A formal, documented incident response policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities and compliance; and

Formal, documented procedures to facilitate the implementation of the incident response policy and associated incident response controls.

Standard: ACME is required to document organization-wide incident response controls that, at a minimum, include:

(a) A formal, documented incident response policy; and (b) Processes to facilitate the implementation of the incident response policy, standards and procedures.

Supplemental Guidance: This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the IR family. Policy and procedures reflect applicable laws, regulations, policies, standards and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general cybersecurity policy for organizations. The procedures can be established for the security program in general and for particular systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures. IR-2: INCIDENT RESPONSE TRAINING Control Objective: The organization:

Trains personnel in their incident response roles and responsibilities with respect to systems; and Provides refresher training.

Standard: ACME’s Information Security Officer (ISO) is required to implement role-based incident response training that:

(a) Trains personnel in their incident response roles and responsibilities; and (b) Provides refresher training.

Supplemental Guidance: Incident response training provided by organizations is linked to the assigned roles and responsibilities of organizational personnel to ensure the appropriate content and level of detail is included in such training. For example, regular users may only need to know who to call or how to recognize an incident on the system; system administrators may require additional training on how to handle/remediate incidents; and incident responders may receive more specific training on forensics, reporting, system recovery and restoration. Incident response training includes user training in the identification and reporting of suspicious activities, both from external and internal sources. IR-2(1): INCIDENT RESPONSE TRAINING | SIMULATED EVENTS Control Objective: The organization incorporates simulated events into incident response training to facilitate effective response by personnel in crisis situations. Standard: ACME’s Information Security Officer (ISO) is required to engage key stakeholders in planning and conducting simulated events to facilitate an effective response training opportunity for personnel in crisis situations. Supplemental Guidance: None

67 HIPAA 164.308(a)(6)(i) | NY DFS 500.16

Page 27: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Page 78 of 235 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

IR-2(2): INCIDENT RESPONSE TRAINING | AUTOMATED TRAINING ENVIRONMENTS Control Objective: The organization employs automated mechanisms to provide a more thorough and realistic incident response training environment. Standard: Where technically feasible and a business justification exists, ACME shall employ automated mechanisms to provide a more thorough and realistic incident response training environment. Supplemental Guidance: None IR-3: INCIDENT RESPONSE TESTING Control Objective: The organization tests and/or exercises the incident response capability for systems using organization-defined tests and/or exercises to determine the incident response effectiveness and documents the results.68 Standard: ACME management and IT staff are required to perform annual tests and/or exercises of its incident response capability to formally determine incident response effectiveness and make corrections, based on any deficiencies. Supplemental Guidance: Organizations test incident response capabilities to determine the overall effectiveness of the capabilities and to identify potential weaknesses or deficiencies. Incident response testing includes, for example, the use of checklists, walk-through or tabletop exercises, simulations (parallel/full interrupt) and comprehensive exercises. Incident response testing can also include a determination of the effects on organizational operations (e.g., reduction in mission capabilities), organizational assets and individuals due to incident response. IR-3(2): INCIDENT RESPONSE TESTING | COORDINATION WITH RELATED PLANS Control Objective: The organization coordinates incident response testing with organizational elements responsible for related plans. Standard: Data/process owners must ensure coordinated incident response testing is conducted with appropriate personnel responsible for related plans. Supplemental Guidance: Organizational plans related to incident response testing include, for example, Business Continuity Plans, Contingency Plans, Disaster Recovery Plans, Continuity of Operations Plans, Crisis Communications Plans, Critical Infrastructure Plans and Occupant Emergency Plans. IR-4: INCIDENT HANDLING Control Objective: The organization: 69

Implements an incident handling capability for security incidents that includes preparation, detection and analysis, containment, eradication and recovery;

Coordinates incident handling activities with contingency planning activities; and Incorporates lessons learned from ongoing incident handling activities into incident response procedures, training and

testing/exercises and implements the resulting changes accordingly. Standard: ACME management and IT staff are required:

(a) Identify the severity and classification of incidents; and (b) Define appropriate actions to take in response to ensure the continuation of business functions.

Supplemental Guidance: Organizations recognize that incident response capability is dependent on the capabilities of organizational systems and the mission/business processes being supported by those systems. Therefore, organizations consider incident response as part of the definition, design and development of mission/business processes and systems. Incident-related information can be obtained from a variety of sources including, for example, audit monitoring, network monitoring, physical access monitoring, user/administrator reports and reported supply chain events. Effective incident handling capability includes coordination among many organizational entities including, for example, mission/business owners, system owners, authorizing officials, human

68 NIST CSF PR.IP-10 & RS.CO-1 | PCI DSS 12.10.2 69 PCI DSS 12.5.3 | NIST CSF DE.AE-2, DE.AE-3, DE.AE-4, DE.AE-5, RS.AN-1, RS.AN-2, RS.AN-3, RS.AN-4, RS.CO-3, RS.CO-4, RS.IM-1, RS.IM-2, RS.MI-1, RS.MI-2, RS.RP-1, RC.RP-1, RC.IM-1, RC.IM-2 & RC.CO-3 | NY DFS 500.16

Page 28: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Page 79 of 235 IT IS PROHIBITED TO DISCLOSE THIS DOCUMENT TO THIRD-PARTIES

WITHOUT AN EXECUTED NON-DISCLOSURE AGREEMENT (NDA)

resources offices, physical and personnel security offices, legal departments, operations personnel, procurement offices and the risk executive (function). IR-4(1): INCIDENT HANDLING | AUTOMATED INCIDENT HANDLING PROCESSES Control Objective: The organization employs automated mechanisms to support the incident handling process. Standard: Where technically feasible and a business justification exists, ACME shall employ automated mechanisms to support the incident handling process. Supplemental Guidance: Automated mechanisms supporting incident handling processes include, for example, online incident management systems. IR-4(2): INCIDENT HANDLING | DYNAMIC RECONFIGURATION Control Objective: The organization includes dynamic reconfiguration of organization-defined information system components as part of the incident response capability. Standard: Where technically feasible and a business justification exists, ACME shall employ automated mechanisms to enable dynamic reconfiguration of information systems as part of incident response remediation actions. Supplemental Guidance: Dynamic reconfiguration includes, for example, changes to router rules, access control lists, intrusion detection/prevention system parameters and filter rules for firewalls and gateways. Organizations perform dynamic reconfiguration of information systems, for example, to stop attacks, to misdirect attackers and to isolate components of systems, thus limiting the extent of the damage from breaches or compromises. Organizations include time frames for achieving the reconfiguration of information systems in the definition of the reconfiguration capability, considering the potential need for rapid response in order to effectively address sophisticated cyber threats. IR-4(3): INCIDENT HANDLING | CONTINUITY OF OPERATIONS Control Objective: The organization identifies organization-defined classes of incidents and actions to take in response to classes of incidents to ensure continuation of organizational missions and business functions. Standard: ACME’s Cybersecurity Incident Response Program (CIRP) addresses ten (10) categories of cybersecurity incidents. Each category has the potential to escalate and requires different handling procedures, per the CIRP:

# Threat Category Category Description

0 Training

Simulated Incident (Training & Exercises)

This category is used during exercises and approved testing of internal/external network defenses or responses.

1

Illegal Content or Activities

Illegal Content

This category is used for any data that is illegal to have in possession. This includes illegal content such as child pornography or classified information on unclassified systems.

2 Criminal Conduct

This category is used for any incident that would be considered criminal conduct. This includes embezzlement, corporate espionage, terrorism/national security threats, fraud, violence or other conduct that would constitute a criminal felony or misdemeanor charge.

3 Safety Technology Compromise

This category is used for any incident that has safety implications from the compromise of the technology to be used in a manner it was not designed for. This includes categories of technologies that includes Operational Technology (OT) and Internet of Things (IoT).

Page 29: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

- SUPPLEMENTAL DOCUMENTATION -

WRITTEN INFORMATION

SECURITY PROGRAM (WISP)

ANNEXES, TEMPLATES & REFERENCES

Version 2020.1

Page 30: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Written Information Security Program (WISP) – Supplemental Documentation Page 2 of 56

TABLE OF CONTENTS

ANNEXES 3 ANNEX 1: DATA CLASSIFICATION & HANDLING GUIDELINES 3 ANNEX 2: DATA CLASSIFICATION EXAMPLES 8 ANNEX 3: DATA RETENTION PERIODS 10 ANNEX 4: BASELINE SECURITY CATEGORIZATION GUIDELINES 12 ANNEX 5: RULES OF BEHAVIOR (ACCEPTABLE & UNACCEPTABLE USE) 14 ANNEX 6: GUIDELINES FOR PERSONAL USE OF ORGANIZATIONAL IT RESOURCES 16 ANNEX 7: RISK MANAGEMENT FRAMEWORK (RMF) 17 ANNEX 8: SYSTEM HARDENING 20

TEMPLATES 22 TEMPLATE 1: MANAGEMENT DIRECTIVE (POLICY AUTHORIZATION) 22 TEMPLATE 2: USER ACKNOWLEDGEMENT FORM 23 TEMPLATE 3: USER EQUIPMENT RECEIPT OF ISSUE 24 TEMPLATE 4: SERVICE PROVIDER NON-DISCLOSURE AGREEMENT (NDA) 25 TEMPLATE 5: INCIDENT RESPONSE PLAN (IRP) 26 TEMPLATE 6: INCIDENT RESPONSE FORM 37 TEMPLATE 7: APPOINTMENT ORDERS (INFORMATION SECURITY OFFICER) 38 TEMPLATE 8: PRIVILEGED USER ACCOUNT REQUEST FORM 39 TEMPLATE 9: CHANGE MANAGEMENT REQUEST FORM 40 TEMPLATE 10: CHANGE CONTROL BOARD (CCB) MEETING MINUTES 42 TEMPLATE 11: PLAN OF ACTION & MILESTONES (POA&M) / RISK REGISTER 43 TEMPLATE 12: PORTS, PROTOCOLS & SERVICES (PPS) 44 TEMPLATE 13: BUSINESS IMPACT ANALYSIS (BIA) 45 TEMPLATE 14: DISASTER RECOVERY PLAN (DRP) & BUSINESS CONTINUITY PLAN (BCP) 47 TEMPLATE 15: PRIVACY IMPACT ASSESSMENT (PIA) 51

REFERENCES 53 REFERENCE 1: WISP EXCEPTION REQUEST PROCESS 53 REFERENCE 2: ELECTRONIC DISCOVERY (EDISCOVERY) GUIDELINES 54 REFERENCE 3: TYPES OF SECURITY CONTROLS 55 REFERENCE 4: INFORMATION SECURITY MANAGEMENT SYSTEM (ISMS) 56

Page 31: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Written Information Security Program (WISP) – Supplemental Documentation Page 3 of 56

ANNEXES

ANNEX 1: DATA CLASSIFICATION & HANDLING GUIDELINES

DATA CLASSIFICATION Information assets are assigned a sensitivity level based on the appropriate audience for the information. If the information has been previously classified by regulatory, legal, contractual, or company directive, then that classification will take precedence. The sensitivity level then guides the selection of protective measures to secure the information. All data are to be assigned one of the following four sensitivity levels:

CLASSIFICATION DATA CLASSIFICATION DESCRIPTION

RESTRICTED

Definition

Restricted information is highly valuable, highly sensitive business information and the level of protection is dictated externally by legal and/or contractual requirements. Restricted information must be limited to only authorized employees, contractors, and business partners with a specific business need.

Potential Impact of

Loss

· SIGNIFICANT DAMAGE would occur if Restricted information were to become available to unauthorized parties either internal or external to ACME.

· Impact could include negatively affecting ACME’s competitive position, violating regulatory requirements, damaging the company’s reputation, violating contractual requirements, and posing an identity theft risk.

CONFIDENTIAL

Definition Confidential information is highly valuable, sensitive business information and the level of protection is dictated internally by ACME

Potential Impact of

Loss

· MODERATE DAMAGE would occur if Confidential information were to become available to unauthorized parties either internal or external to ACME.

· Impact could include negatively affecting ACME’s competitive position, damaging the company’s reputation, violating contractual requirements, and exposing the geographic location of individuals.

INTERNAL USE

Definition

Internal Use information is information originated or owned by ACME, or entrusted to it by others. Internal Use information may be shared with authorized employees, contractors, and business partners who have a business need, but may not be released to the general public, due to the negative impact it might have on the company’s business interests.

Potential Impact of

Loss

· MINIMAL or NO DAMAGE would occur if Internal Use information were to become available to unauthorized parties either internal or external to ACME.

· Impact could include damaging the company’s reputation and violating contractual requirements.

PUBLIC

Definition Public information is information that has been approved for release to the general public and is freely shareable both internally and externally.

Potential Impact of

Loss

· NO DAMAGE would occur if Public information were to become available to parties either internal or external to ACME.

· Impact would not be damaging or a risk to business operations.

Page 32: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Written Information Security Program (WISP) – Supplemental Documentation Page 4 of 56

LABELING Labeling is the practice of marking a system or document with its appropriate sensitivity level so that others know how to appropriately handle the information. There are several methods for labeling information assets.

Printed. Information that can be printed (e.g., spreadsheets, files, reports, drawings, or handouts) should contain one of the following confidentiality symbols in the document footer on every printed page (see below), or simply the words if the graphic is not technically feasible. The exception for labeling is with marketing material since marketing material is primarily developed for public release. Displayed. Restricted or Confidential information that is displayed or viewed (e.g., websites, presentations, etc.) must be labeled with its classification as part of the display.

GENERAL ASSUMPTIONS

Any information created or received by ACME employees in the performance of their jobs at is Internal Use, by default, unless the information requires greater confidentiality or is approved for release to the general public.

Treat information that is not assigned a classification level as “Internal Use” at a minimum and use corresponding controls.

When combining information with different sensitivity levels into a single application or database, assign the most restrictive classification of the combined asset. For example, if an application contains Internal Use and Confidential information, the entire application is Confidential.

Restricted, Confidential and Internal Use information must never be released to the general public but may be shared with third parties, such as government agencies, business partners, or consultants, when there is a business need to do so, and the appropriate security controls are in place according to the level of classification.

You may not change the format or media of information if the new format or media you will be using does not have the same level of security controls in place. For example, you may not export Restricted information from a secured database to an unprotected Microsoft Excel spreadsheet.

PERSONAL DATA (PD) PD is any information about an individual maintained by ACME including any information that:

Can be used to distinguish or trace an individual’s identity, such as name, social security number, date and place of birth, mother’s maiden name, or biometric records; and

Is linked or linkable to an individual, such as medical, educational, financial, and employment information. Sensitive PD (sPD) is always PD, but PD is not always sPD. Examples of PD include, but are not limited to:

Name o Full name; o Maiden name; o Mother’s maiden name; and o Alias(es);

Personal Identification Numbers o Social Security Number (SSN); o Passport number; o Driver’s license number; o Taxpayer Identification Number (TIN), and o Financial account or credit card number;

Address Information o Home address; and o Personal email address;

Personal Characteristics o Photographic image (especially of the face or other identifying characteristics, such as scars or tattoos); o Fingerprints; o Handwriting, and

Page 33: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Written Information Security Program (WISP) – Supplemental Documentation Page 6 of 56

DATA HANDLING GUIDELINES HANDLING CONTROLS RESTRICTED CONFIDENTIAL INTERNAL USE PUBLIC

Non-Disclosure Agreement (NDA)

▪ NDA is required prior to access by non-ACME employees.

▪ NDA is recommended prior to access by non-ACME employees. No NDA requirements No NDA requirements

Internal Network Transmission (wired & wireless)

▪ Encryption is required ▪ Instant Messaging is prohibited ▪ FTP is prohibited

▪ Encryption is recommended ▪ Instant Messaging is prohibited ▪ FTP is prohibited

No special requirements No special requirements

External Network Transmission (wired & wireless)

▪ Encryption is required ▪ Instant Messaging is prohibited ▪ FTP is prohibited ▪ Remote access should be used only when necessary and only with VPN and two-factor authentication

▪ Encryption is required ▪ Instant Messaging is prohibited ▪ FTP is prohibited

▪ Encryption is recommended ▪ Instant Messaging is prohibited ▪ FTP is prohibited No special requirements

Data At Rest (file servers, databases, archives, etc.)

▪ Encryption is required ▪ Logical access controls are required to limit unauthorized use ▪ Physical access restricted to specific individuals

▪ Encryption is recommended ▪ Logical access controls are required to limit unauthorized use ▪ Physical access restricted to specific groups

▪ Encryption is recommended ▪ Logical access controls are required to limit unauthorized use ▪ Physical access restricted to specific groups

▪ Logical access controls are required to limit unauthorized use ▪ Physical access restricted to specific groups

Mobile Devices (iPhone, iPad, MP3 player, USB drive, etc.)

▪ Encryption is required ▪ Remote wipe must be enabled, if possible

▪ Encryption is required ▪ Remote wipe must be enabled, if possible

▪ Encryption is recommended ▪ Remote wipe should be enabled, if possible

No special requirements

Email (with and without attachments)

▪ Encryption is required ▪ Do not forward

▪ Encryption is required ▪ Do not forward

▪ Encryption is recommended No special requirements

Physical Mail

▪ Mark “Open by Addressee Only” ▪ Use “Certified Mail” and sealed, tamper- resistant envelopes for external mailings ▪ Delivery confirmation is required ▪ Hand deliver internally

▪ Mark “Open by Addressee Only” ▪ Use “Certified Mail” and sealed, tamper- resistant envelopes for external mailings ▪ Delivery confirmation is required ▪ Hand delivering is recommended over interoffice mail

▪ Mail with company interoffice mail ▪ US Mail or other public delivery systems and sealed, tamper-resistant envelopes for external mailings

No special requirements

Printer

▪ Verify destination printer ▪ Attend printer while printing

▪ Verify destination printer ▪ Attend printer while printing

▪ Verify destination printer ▪ Retrieve printed material without delay

No special requirements

Page 34: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Written Information Security Program (WISP) – Supplemental Documentation Page 8 of 56

ANNEX 2: DATA CLASSIFICATION EXAMPLES

The table below shows examples of common data instances that are already classified to simplify the process. This list is not inclusive of all types of data, but it establishes a baseline for what constitutes data sensitivity levels and will adjust to accommodate new types or changes to data sensitivity levels, when necessary. IMPORTANT: You are instructed to classify data more sensitive than this guide, if you feel that is warranted by the content.

Data Class

Sensitive Data Elements

Publ

ic

Inte

rnal

Use

Conf

iden

tial

Rest

ricte

d

Clie

nt o

r Em

ploy

ee P

erso

nal D

ata

Social Security Number (SSN) X Employer Identification Number (EIN) X Driver’s License (DL) Number X Financial Account Number X Payment Card Number (credit or debit) X Government-Issued Identification (e.g., passport, permanent resident card, etc.) X Controlled Unclassified Information (CUI) X Birth Date X

First & Last Name X

Age X

Phone and/or Fax Number X

Home Address X

Gender X

Ethnicity X

Email Address X

Empl

oyee

-Re

late

d D

ata Compensation & Benefits Data X

Medical Data X Workers Compensation Claim Data X Education Data X

Dependent or Beneficiary Data X

Sale

s &

Mar

ketin

g D

ata

Business Plan (including marketing strategy) X

Financial Data Related to Revenue Generation X

Marketing Promotions Development X

Internet-Facing Websites (e.g., company website, social networks, blogs, promotions, etc.) X

News Releases X

Net

wor

king

&

Infr

astr

uctu

re D

ata

Username & Password Pairs X Public Key Infrastructure (PKI) Cryptographic Keys (public & private) X Hardware or Software Tokens (multifactor authentication) X System Configuration Settings X

Regulatory Compliance Data X

Internal IP Addresses X

Privileged Account Usernames X

Service Provider Account Numbers X

Stra

tegi

c Fi

nanc

ial D

ata Corporate Tax Return Information X

Legal Billings X

Budget-Related Data X

Unannounced Merger and Acquisition Information X

Trade Secrets (e.g., design diagrams, competitive information, etc.) X

Ope

ratin

g Fi

nanc

ial D

ata Electronic Payment Information (Wire Payment / ACH) X

Paychecks X

Incentives or Bonuses (amounts or percentages) X

Stock Dividend Information X

Bank Account Information X

Page 35: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Written Information Security Program (WISP) – Supplemental Documentation Page 10 of 56

ANNEX 3: DATA RETENTION PERIODS

The following schedule highlights suggested retention periods* for some of the major categories of data: * Retention periods are measured in years, after the event occurrence (e.g., termination, expiration, contract, filing, etc.)

CATEGORY TYPE OF RECORD RETENTION PERIOD

Business Records

Amendments Permanent Annual Reports Permanent Articles of Incorporation Permanent Board of Directors (elections, minutes, committees, etc.) Permanent Bylaws Permanent Capital stock & bond records Permanent Charter Permanent Contracts & agreements Permanent Copyrights Permanent Correspondence (General) 5 Correspondence (Legal) Permanent Partnership agreement Permanent Patents Permanent Service marks Permanent Stock transfers Permanent Trademarks Permanent

CATEGORY TYPE OF RECORD RETENTION PERIOD

Financial Records

Audit report (external) Permanent Audit report (internal) 3 Balance sheets Permanent Bank deposit slips, reconciliations & statements 7 Bills of lading 3 Budgets 3 Cash disbursement & receipt record 7 Checks (canceled) 3 Credit memos 3 Depreciation schedule 7 Dividend register & canceled dividend checks Permanent Employee expense reports 3 Employee payroll records (W-2, W-4, annual earnings records, etc.) 7 Financial statements (annual) Permanent Freight bills 3 General ledger Permanent Internal reports (work orders, sales reports, production reports) 3 Inventory lists 3 Investments (sales & purchases) Permanent Profit / Loss statements Permanent Purchase and sales contracts 3 Purchase order 3 Subsidiary ledgers (accounts receivable, accounts payable, etc.) Permanent Tax returns Permanent Vendor Invoices 7 Worthless securities 7

Page 36: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Written Information Security Program (WISP) – Supplemental Documentation Page 12 of 56

ANNEX 4: BASELINE SECURITY CATEGORIZATION GUIDELINES

Assets and services are categorized by two primary attributes: (a) the potential impact they pose from misuse and (b) the data classification level of the data processed, stored or transmitted by the asset or process. These two attributes combine to establish a basis for controls that should be assigned to that system or asset. This basis is called an Assurance Level (AL). DATA SENSITIVITY This is straightforward where the data sensitivity rating represents the highest data classification of the data processed, stored or transmitted by the asset or process SAFETY & CRITICALITY The Safety & Criticality (SC) rating reflects two aspects of the “importance” of the asset or process:

On one hand, SC simply represents the importance of the asset relative to the achievement of the company’s goals and objectives (e.g., business critical, mission critical, or non-critical).

On the other hand, SC represents the potential for harm that misuse of the asset or service could cause to ACME, its clients, its partners, or the general public.

The three (3) SC ratings are:

SC-1: Mission Critical. This category involves systems, services and data that is determined to be vital to the operations or mission effectiveness of ACME:

o Includes systems, services or data with the potential to significantly impact the brand, revenue or customers. o Any business interruption would have a significant impact on ACME’s mission.

Cannot go down without having a significant impact on ACME’s mission. The consequences of loss of integrity or availability of a SC-1 system are unacceptable and could

include the immediate and sustained loss of mission effectiveness. o Requires the most stringent protection measures that exceed leading practices to ensure adequate security. o Safety aspects of SC-1 systems, services and data could lead to:

Catastrophic hardware failure; Unauthorized physical access to premises; and/or Physical injury to users.

SC-2: Business Critical. This category involves systems, services and data that are determined to be important to the support of ACME’s business operations:

o Includes systems, services or data with the potential to moderately impact the brand, revenue or customers. o Affected systems, services or data can go down for up to twenty-four (24) hours (e.g., one (1) business day)

without having a significant impact on ACME’s mission. Loss of availability is difficult to deal with and can only be tolerated for a short time. The consequences could include delay or degradation in providing important support services or

commodities that may seriously impact mission effectiveness or the ability to operate. The consequences of loss of integrity are unacceptable.

o Requires protection measures equal to or beyond leading practices to ensure adequate security. o Safety aspects of SC-2 systems could lead to:

Loss of privacy; and/or Unwanted harassment.

SC-3: Non-Critical. This category involves systems, services and data that are necessary for the conduct of day-to-day operations, but are not business critical in the short-term:

o Includes systems, services or data with little or potential to impact the brand, revenue or customers. o Affected systems, services or data can go down for up to seventy-two (72) hours (e.g., three (3) business days)

without having a significant impact on ACME’s mission. The consequences of loss of integrity or availability can be tolerated or overcome without significant

impacts on mission effectiveness. The consequences could include the delay or degradation of services or routine activities.

o Requires protection measures that are commensurate with leading practices to ensure adequate security. o Safety aspects of SC-3 systems could lead to:

Inconvenience; Frustration; and/or Embarrassment.

Page 37: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Written Information Security Program (WISP) – Supplemental Documentation Page 13 of 56

Where the data sensitivity and SC levels meet are considered the Assurance Levels (AL). The AL represents the “level of effort” that is needed to properly ensure the Confidentiality, Integrity, Availability and Safety (CIAS) of the asset or process.

Asset Categorization

Matrix

Data Sensitivity

RESTRICTED CONFIDENTIAL INTERNAL

USE PUBLIC

Safe

ty &

Cr

itica

lity

SC-1 Mission Critical

Enhanced Enhanced Enhanced Enhanced

SC-2 Business Critical

Enhanced Enhanced Basic Basic

SC-3 Non-Critical

Enhanced Basic Basic Basic

Figure 1: Asset Categorization Risk Matrix BASIC ASSURANCE REQUIREMENTS

The minimum level of controls is defined as industry-recognized leading practices (e.g., PCI DSS, NIST 800-53, ISO 27002, etc.).

For security controls in Basic assurance projects or initiatives, the focus is on the digital security controls being in place with the expectation that no obvious errors exist and that as flaws are discovered they are addressed in a timely manner.

ENHANCED ASSURANCE REQUIREMENTS

The minimum level of controls is defined as exceeding industry-recognized leading practices (e.g., DLP, FIM, DAM, etc.). For security controls in Enhanced Assurance projects, it is essentially the Standard Assurance level that is expanded to

require more robust Cybersecurity capabilities that are commensurate with the value of the project to ACME.

Page 38: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Written Information Security Program (WISP) – Supplemental Documentation Page 17 of 56

ANNEX 7: RISK MANAGEMENT FRAMEWORK (RMF)

ACME maintains a cybersecurity risk management program to evaluate threats and vulnerabilities in order to assure the creation of appropriate remediation plans. RISK MANAGEMENT OVERVIEW There is sometimes conflict between cybersecurity and other general system/software engineering principles. Cybersecurity can sometimes be construed as interfering with ``ease of use'' where installing security countermeasures take more effort than a ``trivial'' installation that works, but is insecure. Often, this apparent conflict can be resolved by re-thinking the problem and it is generally possible to make a secure system also easy to use. Based on the value owners place on their assets, it is a necessity to impose countermeasures to mitigate any risks posed by specific threats.

Figure 1: Risk Overview RISK MANAGEMENT FRAMEWORK (RMF) Risk management requires finding security equilibrium between vulnerabilities and acceptable security controls. This equilibrium can be thought of as acceptable risk – it changes as vulnerabilities and controls change. From a systems perspective, the components used to determine acceptable risk cover the entire Defense-in-Depth (DiD) breadth. If one component is weakened, another component must be strengthened to maintain the same level of security assurance. Risk management activities can be applied to both new and legacy systems.

Page 39: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Written Information Security Program (WISP) – Supplemental Documentation Page 26 of 56

TEMPLATE 5: INCIDENT RESPONSE PLAN (IRP)

By the very nature of every incident being somewhat different, the guidelines provided in this Incident Response Plan (IRP) do not comprise an exhaustive set of incident handling procedures. These guidelines document basic information about responding to incidents that can be used regardless of hardware platform or operating system. This plan describes the stages of incident identification and handling, with the focus on preparation and follow-up, including reporting guidelines and requirements. PLAN OBJECTIVES The objective of Incident Response Plan (IRP) is to:

Limit immediate incident impact to customers and business partners; Recover from the incident; Determine how the incident occurred; Find out how to avoid further exploitation of the same vulnerability; Avoid escalation and further incidents; Assess the impact and damage in terms of financial impact and loss of image; Update company policies, procedures, standards and guidelines as needed; and Determine who initiated the incident for possible criminal and/or civil prosecution.

INCIDENT DISCOVERY

Malicious Actions Possible Indications of an Incident

Denial of Service (DoS) Examples You might be experiencing a DoS if you see…

Network-based DoS against a particular

host

• User reports of system unavailability • Unexplained connection losses • Network intrusion detection alerts • Host intrusion detection alerts (until the host is overwhelmed) • Increased network bandwidth utilization • Large number of connections to a single host • Asymmetric network traffic pattern (large amount of traffic going to the host, little traffic coming from the host) • Firewall and router log entries • Packets with unusual source addresses

Network-based DoS against a network

• User reports of system and network unavailability • Unexplained connection losses • Network intrusion detection alerts • Increased network bandwidth utilization • Asymmetric network traffic pattern (large amount of traffic entering the network, little traffic leaving the network) • Firewall and router log entries • Packets with unusual source addresses • Packets with nonexistent destination addresses

DoS against the operating system of a

particular host

• User reports of system and application unavailability • Network and host intrusion detection alerts • Operating system log entries • Packets with unusual source addresses

DoS against an application on a particular host

• User reports of application unavailability • Network and host intrusion detection alerts • Application log entries • Packets with unusual source addresses

Page 40: t Z/dd E E&KZD d/KE hZ/dz W ZK'Z D ~t/^Wexamples.complianceforge.com/example-written-information-security... · W P î } ( î ï ñ /d /^ WZK,/ /d dK /^ >K^ d,/^ K hD Ed dK d,/Z

Written Information Security Program (WISP) – Supplemental Documentation Page 47 of 56

TEMPLATE 14: DISASTER RECOVERY PLAN (DRP) & BUSINESS CONTINUITY PLAN (BCP)

DISASTER RECOVERY PLAN (DRP) A Disaster Recovery Plan (DRP) specifies emergency response procedures, including specifying individual responsibility for responding to emergency situations and specifying procedures to enable team members to communicate with each other and with management during and after an emergency. RDP CLASSIFICATION Information system criticality and mission importance for the DRP is the same Mission Assurance Category (MAC) levels as defined in Annex 4: Baseline Security Categorization Guidelines. DRP SCOPING REQUIREMENTS The DRP requirements for critical assets are summarized below:

Disaster Recovery Plan (DRP) Summary Criticality MAC I MAC II MAC III

Data Sensitivity

Restricted High security required; must be in Disaster Recovery Plan

High security required; must be in Disaster Recovery Plan

High security required; must be in Disaster Recovery Plan

Confidential Moderate security required; must be in Disaster Recovery Plan

Moderate security required; may be in Disaster Recovery Plan

Moderate security required; need not be in Disaster Recovery Plan

Internal Use Minimal security required; must be in Disaster Recovery Plan

Minimal security required; may be in Disaster Recovery Plan

Minimal security required; need not be in Disaster Recovery Plan

Public Minimal security required; must be in Disaster Recovery Plan

Minimal security required; may be in Disaster Recovery Plan

Minimal security required; need not be in Disaster Recovery Plan

Backup copies of data and software that are sufficient for recovery from an emergency situation pertaining to critical assets must be stored at a secure, external site providing standard protection against hazards such as fire, flood, earthquake, theft, and decay. Requirements and procedures for such offsite backup shall be included in the DRP, including procedures and authorities for obtaining access to such sites in the event of an emergency. Disaster recovery requirements should be specified when establishing maintenance agreements with vendors supplying components of critical resources. Ensure that vendors can provide replacement components within a reasonable period of time when planning system upgrades or deployments. DATA BACKUP AVAILABILITY Backup copies of data and software must be sufficient to satisfy DRP requirements, application or other critical information asset processing requirements, and any functional requirements of any critical information asset custodian dependent upon such data. Backup copies for disaster recovery purposes must be stored at a secure, off-site location that provides industry-standard protection. These backup requirements extend to all information systems and data necessary to be reconstituted in the event of a disaster.