Asset Management (ID - AM) : The Data,: NIST Cybersecurity Framework Function Category Questions
Asset Management (ID - AM) : The Data,: NIST Cybersecurity Framework Function Category Questions
Does the organization employ an independent penetration agent or penetration team to perform
PROTECT penetration testing on the information system or system components?
(PR) Does the organization employ organization-defined red team penetration tester to simulate attempts by
adversaries to compromise organizational information systems in accordance with organization-defined
rules of engagement?
For each information system within the security boundary, has the least amount of privilege required for
users to perform their job been defined? For individuals with elevated privileges (e.g., system
administration), are they required to use separate accounts to access privileged and non-privileged
functions?
For each information system within the security boundary, are automated mechanisms employed to
support the management of information system accounts, including automatically auditing account
creation, modification, enabling, disabling, and removal actions? Can you provide Matrix/ spreadsheet
identifying different account types, users assigned to each account type along with the Managers
responsible for approving the different types of accounts?
For each information system within the security boundary, are inactive accounts automatically disabled?
What is the length of inactivity before automatically being disabled? For each information system within
the security boundary, what is the frequency that users accounts are reviewed for compliance with account
management requirements?
Is there a physical and environmental protection policy?
Is the physical and environmental protection policy disseminated to Information technology personnel and
executive management?
Is there a physical and environmental protection policy?
Is the physical and environmental protection policy disseminated to Information technology personnel and
executive management?
Are there procedures in place to facilitate the implementation of the physical and environmental
protection policy and associated physical and environmental protection controls?
Are individuals from the facility access list removed when access is no longer required?
Entity can demonstrate via documentation the entity's adherence to the physical security policy and
procedure; this is validated by taking a relevant sample of separated employees and ensuring they no
longer have active badges
Does the physical access authorization process within the organization include verifying individual access
authorizations before granting access to the facility?
Are visitors escorted and visitor activity monitored according to organization-defined circumstances
requiring visitor escorts and monitoring? Are keys, combinations, and other physical access devices
PROTECT secured? Does Entity have documented proof of semi-annual social engineering tests to test the
(PR) effectiveness of the physical security policy and procedure.
Are there information systems access control policy? For each information system within the security
boundary, are users authorized remote access (i.e., through external networks such as the Internet, dial-up,
etc.)
Are there information systems access control policy for remote access? For each information system within
the security boundary, are users authorized remote access (i.e., through external networks such as the
Internet, dial-up, etc.)? Are there a limited number of remote access methods and access points that are
authorized and monitored?
Does the organization have documented remote access procedures for managing user identity?
Are FIPS 140-2 cryptographic mechanisms used for remote access? Are the cryptographic mechanisms FIPS
140-2 compliant? For each information system within the security boundary, is multifactor authentication
for remote access to privileged and non-privileged accounts where one of the factors is provided by a
device separate from the information system?
For each information system within the security boundary, is multifactor authentication for remote access
to privileged and non-privileged accounts where one of the factors is provided by a device separate from
the information system? Have Entity implemented remote access technology which identifies and alerts
on anomalous remote access activity (geo-location, posture assessments, malware detection, etc?
Has separate sub-networks, either physically or logically, been defined for publicly accessible system
components and internal organizational networks?
For network connections, has the organization implemented a default policy to deny all network traffic and
allow traffic by exception (e.g., deny all and permit by exception)?
Are connections to networks and information systems external to the security boundary through managed
interfaces of boundary protection devices (e.g., firewalls)?
Has the organization limited the number of external network connections (for example, via the Trusted
Internet Connection [TIC]) and can account for all such connections?
Does the organization monitor and control communications at the external and internal boundaries of the
security boundary?
For network connections, have all the following parameters been implemented: a) Implemented a
managed interface for each external telecommunications service b) Established network traffic flow policy
for each managed interface?
For network connections, have all the following parameters been implemented: a) Implemented
protection to assure the confidentiality and integrity of information passing through each interface b)
Documented exceptions to the traffic flow policy; or c) A process to review exceptions to the traffic flow
PROTECT policy and removes exceptions no longer necessary?
(PR) Awareness and Training Is the information security and privacy awareness training policy disseminated to the appropriate
(PR.AT): The organization’s stakeholders?
personnel and partners are
Is the information security and privacy awareness training policy disseminated to the appropriate
provided cybersecurity
stakeholders?
awareness education and are
adequately trained to perform Is general and role-based security and privacy awareness training provided to personnel with assigned
their information security- security roles and responsibilities?
related duties and
Are individual security and privacy awareness training records retained for one year? Does at least 80% of
responsibilities consistent with
state entity's identified users who require role-based information security and privacy awareness training
related policies, procedures,
have taken the training in past 12 months? Provide evidence via relevant sample.
and agreements.
Is Basic security and privacy awareness training required as part of initial training from users? Does Entity's
information security and privacy awareness training occur within 30 days of personnel onboarding? Provide
evidence via relevant sample.
Data Security (PR.DS): For each information system within the security boundary, has the organized identified how the
Information and records (data) confidentiality and integrity of data at rest is to be protected?
are managed consistent with
For each information system within the security boundary, has the organized identified how the
the organization’s risk strategy
confidentiality and integrity of data at rest is to be protected? Is encryption used to protect data at rest?
to protect the confidentiality, Have organizational requirements been implemented for the establishment and management of
integrity, and availability of cryptographic keys?
information.
Is a manual process used for Encryption process and which requires staff to take action to enforce
encryption? For each information system and application within the security boundary where cryptography
is deployed, has the cryptography products been validated under the Cryptographic Module Validation
Program to confirm compliance with FIPS 140-2, and in accordance with applicable federal laws, Executive
Orders, directives, policies, regulations, and standards?
Are Mobile devices encrypted via automated method? Is FIPS 140-2 validated (enforced via MDM, GPO or
3rd party application)?
Entity does not have a published encryption policy which covers encryption at rest for databases and non-
mobile assets with confidential or sensitive data.
Entity does not have a published encryption policy which covers encryption at rest for databases and non-
mobile assets with confidential or sensitive data.
Does the organization have documented inventory of all its data on confidential and sensitive databases
and non-mobile assets?
PROTECT Does the organization encrypt its confidential and sensitive databases and non-mobile assets? For each
(PR) information system and application within the security boundary where cryptography is deployed, has the
cryptography products been validated under the Cryptographic Module Validation Program to confirm
compliance with FIPS 140-2, and in accordance with applicable federal laws, Executive Orders, directives,
policies, regulations, and standards?
Have organizational requirements been implemented for the establishment and management of
cryptographic keys?
Has the organized identified how the confidentiality and integrity of data in transit is to be protected?
Has the organized identified how the confidentiality and integrity of data in transit is to be protected? Is
encryption used to protect data in transit?
For each information system and application outside the security boundary, does the organization employ
cryptographic mechanisms to protect information integrity during transmission?
For each information system within the security boundary, has the organized identified how the
confidentiality and integrity of data in transit is to be protected? Is encryption used to protect data in
transit? Does Entity's implemented encryption use /not any deprecated standards.
Entity has a break and inspect point being leveraged for detection and analysis for all encrypted traffic on
the network.
Is there a current baseline configuration for the system?
Information Protection Is there a current baseline configuration for the system? Is the baseline configuration documented and
Processes and Procedures maintained in a repository?
(PR.IP): Security policies (that
Does the organization have documented configuration baselines for workstations, servers, network
address purpose, scope, roles,
devices, and mobile device?
responsibilities, management
commitment, and coordination Did the company implement configuration baselines for workstations and servers and achieve average
among organizational entities), combined assessment scores between 50% - 75% compliant, based on an approved SCAP template (e.g.
processes, and procedures are USGCB or STIG as applicable) appropriate for the target Operating System?
maintained and used to
Entity implemented configured baselines for workstations and servers and achieved average combined
manage protection of
assessment scores > 75% compliant, based on an approved SCAP template (e.g., USGCB or STIG as
information systems and
applicable) appropriate for the target Operating System?
assets.
Entity implemented configuration baselines for workstations and servers and achieved average combined
assessment scores > 75% compliant, based on an approved SCAP template (e.g., USGCB or STIG as
applicable) appropriate for the target Operating System?
Is there a configuration management policy? Is the configuration management policy disseminated to the
appropriate personnel and executive management?
PROTECT Is there a configuration management policy? Is the configuration management policy disseminated to the
(PR) appropriate personnel and executive management?
Is there a change control process in place for this information system? Does the organization have a
formalized change control process, including provision for emergency requests, with a security subject
matter expert as a voting member?
Does the organization perform security impact analysis prior to implementation? Are previous versions of
the baseline retained for roll-back, including diagrams and organization-defined configurations? Does the
organization have documented roll back process and a security impact analysis for tested changes Provide
relevant evidence?
Does the organization have an enterprise-wide single automated workflow tool for change management?
Is there a physical and environmental protection policy? Is the physical and environmental protection
policy disseminated to Information technology personnel and executive management?
Is there a physical and environmental protection policy? Is the physical and environmental protection
policy disseminated to Information technology personnel and executive management?
Are, power, door access, temperature and humidity levels monitored at an organization-defined
frequency?
Does Entity have documented assessment of physical and environmental controls with identified gaps?
Is there a physical and environmental protection policy? Is the physical and environmental protection
policy disseminated to Information technology personnel and executive management?
Is there a physical and environmental protection policy? Is the physical and environmental protection
policy disseminated to Information technology personnel and executive management?
Is the physical and environmental protection policy disseminated to Information technology personnel and
executive management?
PROTECT Are, power, door access, temperature and humidity levels monitored at an organization-defined
(PR)
frequency?
Does Entity have documented assessment of physical and environmental controls with identified gaps?
Is there a physical and environmental protection policy? Is the physical and environmental protection
policy disseminated to Information technology personnel and executive management?
Are, power, door access, temperature and humidity levels monitored at an organization-defined
frequency?
Does Entity have documented assessment of physical and environmental controls with identified gaps?
* Pursuant to Government Code 6254.19, this information security record is confidential and is exempt from public disclosure.
NIST Cybersecurity Framework
Function Category Questions
Anomalies and Events (DE.AE): Is there an audit and accountability policy?
Anomalous activity is detected in
Does the information system audit all the following event types? User successful logins, logoffs, User
a timely manner and the potential
failed login attempts, Data viewed, Data updated, Data deleted, Changes in data access, User accounts
impact of events is understood.
created, User accounts modified, User accounts deleted
Does the organization review the audit records? Is there a documented rationale explaining why these
logged events will support after-action investigations of security incidents?
Do audit records contain the following information:
Type of event?
When the event occurred?
Where the event occurred?
The source of the event?
Event outcome/end state?
Individual or agent associated with the event?
DETECT
Does the information system provide notifications in the event of audit processing failure? Are
(DT) automated mechanisms used to support all audit activities below:
review?
Analysis?
Reporting?
If yes, are their management level reviews the audit records for indications of inappropriate or unusual
activity quarterly?
Does the information system have an audit reduction and report creation capacity?
Are audit records analyzed and correlated across different repositories to gain situational awareness?
Are findings reported to the Security Manager and CIO?
Does Entity have documented network defense architecture or a network diagram depicting network
Security Continuous Monitoring security technologies in the entity?
(DE.CM): The information system
Does Entity have documented network defense architecture or a network diagram depicting network
and assets are monitored at
security technologies in the entity?
discrete intervals to identify
cybersecurity events and verify Are the network manager and CIO notified of audit processing failure?
the effectiveness of protective Does the system provide e-mail notification to responsible personnel in the event of audit processing
measures. failure? Are automated mechanisms used to support all audit activities below: review? analysis?
reporting? Are findings reported to the Security Manager and CIO?
Does the organization monitor and control communications at the external and internal boundaries of the
security boundary?
For each information system within the security boundary, is monitoring performed to detect
unauthorized local, network and remote connections?
For all the information systems within the security boundary, are monitoring devices strategically placed
to track specific types of transactions?
For each information system within the security boundary, is the information system monitored to detect
attacks or potential attacks?
For each information system within the security boundary, are malicious code protection mechanisms
(e.g., antivirus) deployed?
For each information system within the security boundary, are malicious code protection mechanisms
(e.g., antivirus) deployed?
Do malicious code protection mechanisms scan the information system? Is real-time scanning of files
received from external sources at network entry/exit points performed? In response to malicious code
detection, do malicious code protection measures?
DETECT For each information system within the security boundary, are malicious code protection mechanisms
(DT) (e.g., antivirus) deployed?
Does the organization manage all hosts in an enterprise anti-malware solution that provides consolidated
management and reporting capabilities? Between 75% - 95% of non-stale hosts check-in and update no
less than every 15 days?
Does the organization have tools in place to detect malicious software on endpoints? Greater than 95%
of expected clients under enterprise management meet all conditions within the ISA Phase II criteria?
Are malicious code protection mechanisms automatically updated?
Does the information system alert support staff if indications of compromise or potential compromise
occur? For information security monitoring of all the information systems within the security boundary,
are support staff and/or security personnel on email distribution or alert lists to receive security alerts,
advisories, and directives?
Does the organization generate and disseminate security alerts, advisories, and directives to staff and
users engaged in supporting and using the information systems within the security boundary?
Pulled from the Identify function.
Detection Processes (DE.DP): For information security monitoring of all the information systems within the security boundary, has roles
Detection processes and and responsibilities been developed, assigned, and documented?
procedures are maintained and
For information security monitoring of all the information systems within the security boundary, has roles
tested to ensure timely and
and responsibilities been developed, assigned, and documented?
adequate awareness of Does Entity have documented escalation criteria within its organization with clear thresholds for
anomalous events. communication of incidents and information needed to best inform decisions at the executive level.
Are security incidents reported?
For which of the following procedures is the IR plan reviewed, approved and followed?
DETECT
Distributed to IR personnel, reviewed at a defined interval, Updated to address changes needed due to
(DT)
implementation and testing, Initiates communication of changes to IR personnel?
Does Entity has performed tabletop exercises or is able to show documentation of an incident being
handled using its communication plan in the past twelve months? (NIST SI-4 (9))
Does Entity provide relevant event metadata to Cal-CSIC and/or other relevant coordinating bodies, as
appropriate?
* Pursuant to Government Code 6254.19, this information security record is confidential and is exempt from public disclosure.
NIST Cybersecurity Framework
Function Category Questions
Response Planning (RS.RP): Response Is there an incident response plan?
processes and procedures are executed
Is there an incident response plan? Does the organization have a documented incident
and maintained, to ensure timely response
response plan and reports discovered incidents via Cal-CSIRS?
to detected cybersecurity events.
Is there incident response training for users with assigned contingency roles? Does the
organization train staff on incident response plans and staff understand their roles and
responsibilities?
Are incident response lessoned learned incorporated into all of the following:
IR procedures
IR training
IR testing/exercises?
RESPOND (RS) Do Entity's users identify threat and notify cybersecurity team (in accordance with published
policy) of detection of a phishing simulation in < 60 minutes of activation?
Analysis (RS.AN): Analysis is conducted to Is there an incident response policy?
ensure adequate response and support
Is there an incident response policy?
recovery activities.
Are there procedures for incident response planning? Are all information system security
incidents tracked and documented including non-reportable incidents?
Are security incidents reported? Are organization's personnel required to report incidents
immediately and report incidents to the CIO or other management? Do automated
mechanisms support security incident reporting?
Does the organization conduct trend analysis within the past twelve months on incidents to
detect systemic issues within the organization?
* Pursuant to Government Code 6254.19, this information security record is confidential and is exempt from public disclosure.
NIST Cybersecurity Framework
Function Category Questions
Recovery Planning (RC.RP): Recovery
processes and procedures are executed
and maintained to ensure timely
restoration of systems or assets
affected by cybersecurity events.