100% found this document useful (3 votes)
450 views14 pages

Asset Management (ID - AM) : The Data,: NIST Cybersecurity Framework Function Category Questions

The document discusses the NIST Cybersecurity Framework which includes functions, categories, and questions related to asset management and identifying systems. It focuses on 3 key areas: 1) Identifying and managing critical system assets, software, and data. This includes taking inventory, categorizing assets and data, and limiting unauthorized use. 2) Understanding the business environment and priorities to inform cybersecurity roles. This involves business impact analyses, risk assessments, and contingency planning. 3) Establishing governance, policies, and oversight of regulatory requirements, risk management, and privacy practices. This includes resource allocation, notice to the public, and information security program reviews.

Uploaded by

Hala Elasri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (3 votes)
450 views14 pages

Asset Management (ID - AM) : The Data,: NIST Cybersecurity Framework Function Category Questions

The document discusses the NIST Cybersecurity Framework which includes functions, categories, and questions related to asset management and identifying systems. It focuses on 3 key areas: 1) Identifying and managing critical system assets, software, and data. This includes taking inventory, categorizing assets and data, and limiting unauthorized use. 2) Understanding the business environment and priorities to inform cybersecurity roles. This involves business impact analyses, risk assessments, and contingency planning. 3) Establishing governance, policies, and oversight of regulatory requirements, risk management, and privacy practices. This includes resource allocation, notice to the public, and information security program reviews.

Uploaded by

Hala Elasri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

NIST Cybersecurity Framework

Function Category Questions


Does the organization develop and documents policy for an inventory of information system components?
Asset Management
Does the organization develop and documents policy for an inventory of information system components?
(ID.AM): The data,
personnel, devices, Are there procedures in place for physical device inventory?
systems, and facilities Is system inventory documented such that the following requirements is met: It accurately reflect the current
that enable the entity to information system?
achieve business
purposes are identified Does The organization employ automated mechanisms to update physical device inventory?
and managed consistent Does the organization develop and documents policy for software platform and application inventory?
with their relative
importance to business Does the organization develop and documents policy for software platform and application inventory?
objectives and the entity’s Is system inventory for software platform and application documented such that the following requirements is met:
risks It accurately reflect the current information system?
Asset Management
(ID.AM): The data, Does the information system provide the least functionality to meet operational needs?
IDENTIFY personnel, devices, Does the organization perform all the following requirements: Identify software programs not authorized to
(ID) systems, and facilities execute on the information system? Employ a deny-all, allow by exception policy to prohibit the execution of
that enable the entity to unauthorized software on the information system? Review and update a list of unauthorized software programs?
achieve business
purposes are identified Is the information and information system categorized following FIPS 199-200, and NIST 800-53 requirements?
and managed consistent Does the organization have documented procedures for how to categorize information systems?
with their relative
importance to business Does the organization have documented system categorization for mission critical systems (tested via relevant
objectives and the entity’s sample) or a documented decision to apply "Moderate" categorization for all systems?
risk strategy. Do All information systems have documented system categorization per FIPS 199?
Provide Tested via relevant sample.
Is the security categorization decision per FIPS 199 reviewed and approved by the authorizing official or authorizing
official designated representative?
Business Environment Does the Entity have a BIA and a TRP?
(ID.BE): The
Does the organization conduct annual Business Impact Analysis (BIA) for the system?
organization’s mission,
objectives, stakeholders, Does Entity have a TRP which was informed from a Business Impact Analysis (BIA)?
and activities are Does the organization identify critical information system assets supporting essential missions and business
understood and functions?
prioritized; this Do you perform contingency plan or disaster recovery testing to test the execution of the contingency plan?
information is used to Provide the results or reports from all contingency plan testing which have taken place since the last assessment
inform cybersecurity which included testing TRP?
roles, responsibilities, and
risk management
decisions.
Has a Privacy Impact Assessment (PIA) been conducted for information systems, programs, or other activities that
Governance (ID.GV): The pose a privacy risk in accordance with applicable law, or any existing organizational policies and procedures?
policies, procedures, and
Has a Privacy Impact Assessment (PIA) been conducted for information systems, programs, or other activities that
processes to manage and
pose a privacy risk in accordance with applicable law, or any existing organizational policies and procedures?
monitor the entity’s
regulatory, legal, risk, Are sufficient resources allocated (organization-defined allocation of budget and staffing) to implement and
environmental, and operate the organization-wide privacy program?
operational requirements
Are sufficient resources allocated (organization-defined allocation of budget and staffing) to implement and
are understood and
operate the organization-wide privacy program? Is a risk management process documented and implemented
inform the management
along with Privacy Impact Assessment (PIA)?
of cybersecurity risk.
Are privacy plans, policies, and procedures updated according to the organization-defined frequency, at least
IDENTIFY annually?
(ID)
Has a strategic organizational privacy plan been developed for implementing applicable privacy controls, policies,
and procedures? For publicly accessible content, have designated individuals been authorized to post information
onto a publicly accessible information system?
Has a strategic organizational privacy plan been developed for implementing applicable privacy controls, policies,
and procedures? For publicly accessible content, have designated individuals been authorized to post information
onto a publicly accessible information system?
Is effective notice provided to the public and to individuals regarding? or Provide evidence demonstrating effective
notice to the public and to individuals that states the following:
(i) its activities that impact privacy, including its collection, use, sharing, safeguarding, maintenance, and disposal of
personally identifiable information (PII);
(ii) authority for collecting PII;
(iii) the choices, if any, individuals may have regarding how the organization uses PII and the consequences of
exercising or not exercising those choices; and
(iv) the ability to access and have PII amended or corrected if necessary.
For publicly accessible content, have designated individuals been authorized to post information onto a publicly
accessible information system?
Are public notices revised to reflect changes in practice or policy that affect PII or changes in its activities that
impact privacy, before or as soon as practicable after the change?
Does the organization develop and disseminates an organization-wide information security program plan Develops
a comprehensive strategy to manage risk to organizational operations and assets, individuals, other organizations,
and the nation associated with the operation and use of information system?
Does the organization develop and disseminate an organization-wide information security program plan and
develop a comprehensive strategy to manage risk to organizational operations and assets, individuals, other
organizations, and the nation associated with the operation and use of information system?
Does the organization review and update the risk management strategy at least quarterly to [ discuss, prioritize,
address, and monitor identified risks, including security risks.] or as required, to address organizational changes?
Does the organization measure the effectiveness of its information security program with Key Performance
Indicators (KPIs)?
Does the organization develop, monitor, and report on the results of information security measures of performance
and mitigate all security risk?
Is there a security and privacy awareness training policy?

IDENTIFY Is there a security and privacy awareness training policy?


(ID) Does the security and privacy awareness training policy address all of the following? Purpose, Scope, Roles and
Responsibilities, Management Commitment, Organizational Coordination, Compliance Measures?
Is Basic security and privacy awareness training required as part of initial training from users?
Is basic security and privacy awareness training provided to information system users (including managers, senior
executives, and contractors)?
Risk Assessment (ID.RA): Does Entity have a documented vulnerability management program which is referenced in the entity's information
The entity understands security program plan.
the cybersecurity risk to
Are vulnerabilities in the information system and hosted applications scanned monthly or when changes occur to
entity operations
the environment and when new vulnerabilities potentially affecting the system/ applications are identified and
(including mission,
reported?
functions, image, or
reputation), entity assets, Does Entity has documented authenticated scan results of all assets from prior two consecutive months or more?
and individuals. Does Entity achieve a California Cybersecurity Vulnerability Metric (CCVM) score at the Moderate level or lower
{< 6.9 weighted vulnerabilities per host}?
Does Entity achieve a California Cybersecurity Vulnerability Metric (CCVM) score at the Low level (0-3.9 weighted
vulnerabilities per host)?
Are vulnerability scan reports and results from security control assessments analyzed?
NIST Cybersecurity Framework
Function Category Questions
Access Control (PR.AC): Access Has an information system access control policy and procedures which cover all information systems within
to assets and associated the security boundary been developed and disseminated to all employees?
facilities is limited to
Has an information system access control policy and procedures which cover all information systems within
authorized users, processes, or
the security boundary been developed and disseminated to all employees?
devices, and to authorized
activities and transactions. Are there procedures in place to facilitate the implementation of access control policy?
Does Systems implement logical password management process and enforces a minimum of 8 characters
and 3 of 4 complexity types; Each
password shall contain each of the following four types of characters:
• English uppercase letters (A-Z)
• English lowercase letters (a-z)
• Westernized Arabic numerals (0-9)
• Non-alphanumeric special characters (such as !,@,#,$,&,*).

Does the organization employ an independent penetration agent or penetration team to perform
PROTECT penetration testing on the information system or system components?
(PR) Does the organization employ organization-defined red team penetration tester to simulate attempts by
adversaries to compromise organizational information systems in accordance with organization-defined
rules of engagement?
For each information system within the security boundary, has the least amount of privilege required for
users to perform their job been defined? For individuals with elevated privileges (e.g., system
administration), are they required to use separate accounts to access privileged and non-privileged
functions?
For each information system within the security boundary, are automated mechanisms employed to
support the management of information system accounts, including automatically auditing account
creation, modification, enabling, disabling, and removal actions? Can you provide Matrix/ spreadsheet
identifying different account types, users assigned to each account type along with the Managers
responsible for approving the different types of accounts?
For each information system within the security boundary, are inactive accounts automatically disabled?
What is the length of inactivity before automatically being disabled? For each information system within
the security boundary, what is the frequency that users accounts are reviewed for compliance with account
management requirements?
Is there a physical and environmental protection policy?
Is the physical and environmental protection policy disseminated to Information technology personnel and
executive management?
Is there a physical and environmental protection policy?
Is the physical and environmental protection policy disseminated to Information technology personnel and
executive management?
Are there procedures in place to facilitate the implementation of the physical and environmental
protection policy and associated physical and environmental protection controls?
Are individuals from the facility access list removed when access is no longer required?
Entity can demonstrate via documentation the entity's adherence to the physical security policy and
procedure; this is validated by taking a relevant sample of separated employees and ensuring they no
longer have active badges
Does the physical access authorization process within the organization include verifying individual access
authorizations before granting access to the facility?
Are visitors escorted and visitor activity monitored according to organization-defined circumstances
requiring visitor escorts and monitoring? Are keys, combinations, and other physical access devices
PROTECT secured? Does Entity have documented proof of semi-annual social engineering tests to test the
(PR) effectiveness of the physical security policy and procedure.
Are there information systems access control policy? For each information system within the security
boundary, are users authorized remote access (i.e., through external networks such as the Internet, dial-up,
etc.)
Are there information systems access control policy for remote access? For each information system within
the security boundary, are users authorized remote access (i.e., through external networks such as the
Internet, dial-up, etc.)? Are there a limited number of remote access methods and access points that are
authorized and monitored?
Does the organization have documented remote access procedures for managing user identity?
Are FIPS 140-2 cryptographic mechanisms used for remote access? Are the cryptographic mechanisms FIPS
140-2 compliant? For each information system within the security boundary, is multifactor authentication
for remote access to privileged and non-privileged accounts where one of the factors is provided by a
device separate from the information system?
For each information system within the security boundary, is multifactor authentication for remote access
to privileged and non-privileged accounts where one of the factors is provided by a device separate from
the information system? Have Entity implemented remote access technology which identifies and alerts
on anomalous remote access activity (geo-location, posture assessments, malware detection, etc?
Has separate sub-networks, either physically or logically, been defined for publicly accessible system
components and internal organizational networks?
For network connections, has the organization implemented a default policy to deny all network traffic and
allow traffic by exception (e.g., deny all and permit by exception)?
Are connections to networks and information systems external to the security boundary through managed
interfaces of boundary protection devices (e.g., firewalls)?
Has the organization limited the number of external network connections (for example, via the Trusted
Internet Connection [TIC]) and can account for all such connections?
Does the organization monitor and control communications at the external and internal boundaries of the
security boundary?
For network connections, have all the following parameters been implemented: a) Implemented a
managed interface for each external telecommunications service b) Established network traffic flow policy
for each managed interface?
For network connections, have all the following parameters been implemented: a) Implemented
protection to assure the confidentiality and integrity of information passing through each interface b)
Documented exceptions to the traffic flow policy; or c) A process to review exceptions to the traffic flow
PROTECT policy and removes exceptions no longer necessary?
(PR) Awareness and Training Is the information security and privacy awareness training policy disseminated to the appropriate
(PR.AT): The organization’s stakeholders?
personnel and partners are
Is the information security and privacy awareness training policy disseminated to the appropriate
provided cybersecurity
stakeholders?
awareness education and are
adequately trained to perform Is general and role-based security and privacy awareness training provided to personnel with assigned
their information security- security roles and responsibilities?
related duties and
Are individual security and privacy awareness training records retained for one year? Does at least 80% of
responsibilities consistent with
state entity's identified users who require role-based information security and privacy awareness training
related policies, procedures,
have taken the training in past 12 months? Provide evidence via relevant sample.
and agreements.
Is Basic security and privacy awareness training required as part of initial training from users? Does Entity's
information security and privacy awareness training occur within 30 days of personnel onboarding? Provide
evidence via relevant sample.
Data Security (PR.DS): For each information system within the security boundary, has the organized identified how the
Information and records (data) confidentiality and integrity of data at rest is to be protected?
are managed consistent with
For each information system within the security boundary, has the organized identified how the
the organization’s risk strategy
confidentiality and integrity of data at rest is to be protected? Is encryption used to protect data at rest?
to protect the confidentiality, Have organizational requirements been implemented for the establishment and management of
integrity, and availability of cryptographic keys?
information.
Is a manual process used for Encryption process and which requires staff to take action to enforce
encryption? For each information system and application within the security boundary where cryptography
is deployed, has the cryptography products been validated under the Cryptographic Module Validation
Program to confirm compliance with FIPS 140-2, and in accordance with applicable federal laws, Executive
Orders, directives, policies, regulations, and standards?
Are Mobile devices encrypted via automated method? Is FIPS 140-2 validated (enforced via MDM, GPO or
3rd party application)?
Entity does not have a published encryption policy which covers encryption at rest for databases and non-
mobile assets with confidential or sensitive data.
Entity does not have a published encryption policy which covers encryption at rest for databases and non-
mobile assets with confidential or sensitive data.
Does the organization have documented inventory of all its data on confidential and sensitive databases
and non-mobile assets?

PROTECT Does the organization encrypt its confidential and sensitive databases and non-mobile assets? For each
(PR) information system and application within the security boundary where cryptography is deployed, has the
cryptography products been validated under the Cryptographic Module Validation Program to confirm
compliance with FIPS 140-2, and in accordance with applicable federal laws, Executive Orders, directives,
policies, regulations, and standards?
Have organizational requirements been implemented for the establishment and management of
cryptographic keys?
Has the organized identified how the confidentiality and integrity of data in transit is to be protected?
Has the organized identified how the confidentiality and integrity of data in transit is to be protected? Is
encryption used to protect data in transit?
For each information system and application outside the security boundary, does the organization employ
cryptographic mechanisms to protect information integrity during transmission?
For each information system within the security boundary, has the organized identified how the
confidentiality and integrity of data in transit is to be protected? Is encryption used to protect data in
transit? Does Entity's implemented encryption use /not any deprecated standards.
Entity has a break and inspect point being leveraged for detection and analysis for all encrypted traffic on
the network.
Is there a current baseline configuration for the system?
Information Protection Is there a current baseline configuration for the system? Is the baseline configuration documented and
Processes and Procedures maintained in a repository?
(PR.IP): Security policies (that
Does the organization have documented configuration baselines for workstations, servers, network
address purpose, scope, roles,
devices, and mobile device?
responsibilities, management
commitment, and coordination Did the company implement configuration baselines for workstations and servers and achieve average
among organizational entities), combined assessment scores between 50% - 75% compliant, based on an approved SCAP template (e.g.
processes, and procedures are USGCB or STIG as applicable) appropriate for the target Operating System?
maintained and used to
Entity implemented configured baselines for workstations and servers and achieved average combined
manage protection of
assessment scores > 75% compliant, based on an approved SCAP template (e.g., USGCB or STIG as
information systems and
applicable) appropriate for the target Operating System?
assets.
Entity implemented configuration baselines for workstations and servers and achieved average combined
assessment scores > 75% compliant, based on an approved SCAP template (e.g., USGCB or STIG as
applicable) appropriate for the target Operating System?
Is there a configuration management policy? Is the configuration management policy disseminated to the
appropriate personnel and executive management?

PROTECT Is there a configuration management policy? Is the configuration management policy disseminated to the
(PR) appropriate personnel and executive management?
Is there a change control process in place for this information system? Does the organization have a
formalized change control process, including provision for emergency requests, with a security subject
matter expert as a voting member?
Does the organization perform security impact analysis prior to implementation? Are previous versions of
the baseline retained for roll-back, including diagrams and organization-defined configurations? Does the
organization have documented roll back process and a security impact analysis for tested changes Provide
relevant evidence?
Does the organization have an enterprise-wide single automated workflow tool for change management?
Is there a physical and environmental protection policy? Is the physical and environmental protection
policy disseminated to Information technology personnel and executive management?
Is there a physical and environmental protection policy? Is the physical and environmental protection
policy disseminated to Information technology personnel and executive management?
Are, power, door access, temperature and humidity levels monitored at an organization-defined
frequency?
Does Entity have documented assessment of physical and environmental controls with identified gaps?
Is there a physical and environmental protection policy? Is the physical and environmental protection
policy disseminated to Information technology personnel and executive management?
Is there a physical and environmental protection policy? Is the physical and environmental protection
policy disseminated to Information technology personnel and executive management?
Is the physical and environmental protection policy disseminated to Information technology personnel and
executive management?
PROTECT Are, power, door access, temperature and humidity levels monitored at an organization-defined
(PR)
frequency?
Does Entity have documented assessment of physical and environmental controls with identified gaps?
Is there a physical and environmental protection policy? Is the physical and environmental protection
policy disseminated to Information technology personnel and executive management?
Are, power, door access, temperature and humidity levels monitored at an organization-defined
frequency?
Does Entity have documented assessment of physical and environmental controls with identified gaps?
* Pursuant to Government Code 6254.19, this information security record is confidential and is exempt from public disclosure.
NIST Cybersecurity Framework
Function Category Questions
Anomalies and Events (DE.AE): Is there an audit and accountability policy?
Anomalous activity is detected in
Does the information system audit all the following event types? User successful logins, logoffs, User
a timely manner and the potential
failed login attempts, Data viewed, Data updated, Data deleted, Changes in data access, User accounts
impact of events is understood.
created, User accounts modified, User accounts deleted
Does the organization review the audit records? Is there a documented rationale explaining why these
logged events will support after-action investigations of security incidents?
Do audit records contain the following information:
Type of event?
When the event occurred?
Where the event occurred?
The source of the event?
Event outcome/end state?
Individual or agent associated with the event?
DETECT
Does the information system provide notifications in the event of audit processing failure? Are
(DT) automated mechanisms used to support all audit activities below:
review?
Analysis?
Reporting?
If yes, are their management level reviews the audit records for indications of inappropriate or unusual
activity quarterly?
Does the information system have an audit reduction and report creation capacity?
Are audit records analyzed and correlated across different repositories to gain situational awareness?
Are findings reported to the Security Manager and CIO?
Does Entity have documented network defense architecture or a network diagram depicting network
Security Continuous Monitoring security technologies in the entity?
(DE.CM): The information system
Does Entity have documented network defense architecture or a network diagram depicting network
and assets are monitored at
security technologies in the entity?
discrete intervals to identify
cybersecurity events and verify Are the network manager and CIO notified of audit processing failure?
the effectiveness of protective Does the system provide e-mail notification to responsible personnel in the event of audit processing
measures. failure? Are automated mechanisms used to support all audit activities below: review? analysis?
reporting? Are findings reported to the Security Manager and CIO?
Does the organization monitor and control communications at the external and internal boundaries of the
security boundary?
For each information system within the security boundary, is monitoring performed to detect
unauthorized local, network and remote connections?
For all the information systems within the security boundary, are monitoring devices strategically placed
to track specific types of transactions?
For each information system within the security boundary, is the information system monitored to detect
attacks or potential attacks?
For each information system within the security boundary, are malicious code protection mechanisms
(e.g., antivirus) deployed?
For each information system within the security boundary, are malicious code protection mechanisms
(e.g., antivirus) deployed?
Do malicious code protection mechanisms scan the information system? Is real-time scanning of files
received from external sources at network entry/exit points performed? In response to malicious code
detection, do malicious code protection measures?
DETECT For each information system within the security boundary, are malicious code protection mechanisms
(DT) (e.g., antivirus) deployed?
Does the organization manage all hosts in an enterprise anti-malware solution that provides consolidated
management and reporting capabilities? Between 75% - 95% of non-stale hosts check-in and update no
less than every 15 days?
Does the organization have tools in place to detect malicious software on endpoints? Greater than 95%
of expected clients under enterprise management meet all conditions within the ISA Phase II criteria?
Are malicious code protection mechanisms automatically updated?
Does the information system alert support staff if indications of compromise or potential compromise
occur? For information security monitoring of all the information systems within the security boundary,
are support staff and/or security personnel on email distribution or alert lists to receive security alerts,
advisories, and directives?
Does the organization generate and disseminate security alerts, advisories, and directives to staff and
users engaged in supporting and using the information systems within the security boundary?
Pulled from the Identify function.
Detection Processes (DE.DP): For information security monitoring of all the information systems within the security boundary, has roles
Detection processes and and responsibilities been developed, assigned, and documented?
procedures are maintained and
For information security monitoring of all the information systems within the security boundary, has roles
tested to ensure timely and
and responsibilities been developed, assigned, and documented?
adequate awareness of Does Entity have documented escalation criteria within its organization with clear thresholds for
anomalous events. communication of incidents and information needed to best inform decisions at the executive level.
Are security incidents reported?
For which of the following procedures is the IR plan reviewed, approved and followed?
DETECT
Distributed to IR personnel, reviewed at a defined interval, Updated to address changes needed due to
(DT)
implementation and testing, Initiates communication of changes to IR personnel?
Does Entity has performed tabletop exercises or is able to show documentation of an incident being
handled using its communication plan in the past twelve months? (NIST SI-4 (9))
Does Entity provide relevant event metadata to Cal-CSIC and/or other relevant coordinating bodies, as
appropriate?
* Pursuant to Government Code 6254.19, this information security record is confidential and is exempt from public disclosure.
NIST Cybersecurity Framework
Function Category Questions
Response Planning (RS.RP): Response Is there an incident response plan?
processes and procedures are executed
Is there an incident response plan? Does the organization have a documented incident
and maintained, to ensure timely response
response plan and reports discovered incidents via Cal-CSIRS?
to detected cybersecurity events.
Is there incident response training for users with assigned contingency roles? Does the
organization train staff on incident response plans and staff understand their roles and
responsibilities?
Are incident response lessoned learned incorporated into all of the following:
IR procedures
IR training
IR testing/exercises?
RESPOND (RS) Do Entity's users identify threat and notify cybersecurity team (in accordance with published
policy) of detection of a phishing simulation in < 60 minutes of activation?
Analysis (RS.AN): Analysis is conducted to Is there an incident response policy?
ensure adequate response and support
Is there an incident response policy?
recovery activities.
Are there procedures for incident response planning? Are all information system security
incidents tracked and documented including non-reportable incidents?
Are security incidents reported? Are organization's personnel required to report incidents
immediately and report incidents to the CIO or other management? Do automated
mechanisms support security incident reporting?
Does the organization conduct trend analysis within the past twelve months on incidents to
detect systemic issues within the organization?
* Pursuant to Government Code 6254.19, this information security record is confidential and is exempt from public disclosure.
NIST Cybersecurity Framework
Function Category Questions
Recovery Planning (RC.RP): Recovery
processes and procedures are executed
and maintained to ensure timely
restoration of systems or assets
affected by cybersecurity events.

Improvements (RC.IM): Recovery


planning and processes are improved
by incorporating lessons learned into
RECOVER (RC) future activities.
Are lessons learned captured from annual TRP testing for any mission critical systems?
Are lessons learned captured from annual TRP testing for at least one (1) mission critical system?
Are lessons learned captured from annual TRP testing for all mission critical systems?

Communications (RC.CO): Restoration


activities are coordinated with internal
and external parties, such as
coordinating centers, Internet Service
Providers, owners of attacking systems,
victims, other CSIRTs, and vendors.
* Pursuant to Government Code 6254.19, this information security record is confidential and is exempt from public disclosure.

You might also like