DIR Security Control Standards Catalog 2.0
DIR Security Control Standards Catalog 2.0
Standards Catalog
Texas Department of Information Resources
Version 2.0
Effective Date: January 20, 2022
Table of Contents
OVERVIEW .......................................................................................................................... 1
AC – ACCESS CONTROL ..................................................................................................... 6
AT – AWARENESS AND TRAINING ................................................................................ 20
AU – ACCOUNTABILITY, AUDIT, AND RISK MANAGEMENT ...................................... 24
CA – SECURITY ASSESSMENT AND AUTHORIZATION ................................................ 34
CM – CONFIGURATION MANAGEMENT ....................................................................... 43
CP – CONTINGENCY PLANNING .................................................................................... 52
IA – IDENTIFICATION AND AUTHENTICATION............................................................ 61
IR – INCIDENT RESPONSE ............................................................................................... 71
MA – MAINTENANCE ...................................................................................................... 80
MP – MEDIA PROTECTION.............................................................................................. 84
PE – PHYSICAL AND ENVIRONMENTAL PROTECTION................................................ 88
PL – PLANNING ................................................................................................................ 99
PM – PROGRAM MANAGEMENT ................................................................................. 103
PS – PERSONNEL SECURITY .......................................................................................... 115
RA – RISK ASSESSMENT ................................................................................................ 123
SA – SYSTEM AND SERVICE ACQUISITION ................................................................. 130
SC – SYSTEM AND COMMUNICATION PROTECTION................................................ 140
SI – SYSTEM AND INFORMATION INTEGRITY ........................................................... 151
SR – SUPPLY CHAIN RISK MANAGEMENT.................................................................. 158
OVERVIEW
PURPOSE
The purpose of the Security Control Standards Catalog (catalog) is to provide Texas state
agencies and institutions of higher education (subsequently referred to as state agencies) with
specific guidance for implementing security controls in a format that easily aligns with the
National Institute of Standards and Technology Special Publication 800-53 Revision 5
(NIST 800-53 Revision 5).
Terms and definitions in this catalog are based on NIST, unless otherwise defined by Texas state
statute, rules, or guidelines. For questions concerning terms or definitions, contact DIR Security
email.
REVISION HISTORY
Version Date Change Description
1.2 4/3/2015 Corrected date on cover; added missing legacy TAC referenced in Appendix A;
ensured pdf is fully searchable
1.3 2/26/2016 Modified or corrected examples for AC-23, AC-24, AC-25, AR-5, CM-8, PM-7;
corrected TAC 202 reference in PL-1, SC-13; Added Program Management
Controls to Appendix A
2.0 1/20/2022 DIR Board approval of Version 2.0. Control language updated to align with NIST
SP 800-53 Revision 5; Introduction of New SR control family.
RISK EXCEPTIONS
Any exception to the following controls shall be approved, justified, and documented in
accordance with 1 Texas Administrative Code Chapter 202.
PRIVACY CONTROLS
While NIST 800-53 Revision 5 took substantial steps to integrate security and privacy
requirements, this catalog has not adopted privacy-specific control families. Security-focused
controls may include privacy-related components, but the defined privacy control families are
not included within this catalog. State agencies should work with the employees or divisions
responsible for privacy-related requirements to determine the appropriate privacy activities and
controls for the needs of their state agency.
For more information on the NIST SP 800-53 Privacy Baseline and Controls, refer to
https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-
search#!/controls?version=5.1&privacy_baseline=Yes
Controls that were not required in the previous iteration of the DIR Control Standards Catalog
that have been adopted in this revision are required to be in place no later than 18 months after
the adoption of this catalog.
Controls that were required in the previous iteration of the DIR Control Standards Catalog that
have been updated with more than editorial/administrative changes (i.e. require additional or
modified implementation activities) are required to be in place no later than 18 months after the
adoption of this catalog.
Existing Controls with Administrative or Nonsubstantial Changes
Controls that were required in the previous iteration of the DIR Control Standards Catalog that
have been updated with nonsubstantial revisions are required to be in place no later than 12
months after the adoption of this catalog.
Number of
ID Control Family Controls/
Enhancements
AC Access Control 13
AT Awareness and Training 4
AU Accountability, Audit, and Risk Management 10
CA Security Assessment and Authorization 9
CM Configuration Management 9
CP Contingency Planning 8
IA Identification and Authentication 10
IR Incident Response 9
MA Maintenance 4
MP Media Protection 4
PE Physical and Environmental Protection 11
PL Planning 3
PM Program Management 12
PS Personnel Security 8
RA Risk Assessment 6
SA System and Service Acquisition 10
SC System and Communication Protection 11
SI System and Information Integrity 7
SR Supply Chain Risk Management 6
Total 154
b. Identify unauthorized use of the system through the following techniques and methods:
[Assignment: organization-defined techniques and methods];
c. Invoke internal monitoring capabilities or deploy monitoring devices:
1. Strategically within the system to collect organization-determined essential
information; and
2. At ad hoc locations within the system to track specific types of transactions of interest
to the organization;
d. Protect information obtained from intrusion-monitoring tools from unauthorized access,
modification, and deletion;
e. Adjust the level of system monitoring activity when there is a change in risk to organizational
operations and assets, individuals, other organizations, or the Nation;
f. Obtain legal opinion regarding system monitoring activities; and
g. Provide [Assignment: organization-defined system monitoring information] to [Assignment:
organization-defined personnel or roles] [Selection (one or more): as needed; [Assignment:
organization-defined frequency]].
STATE IMPLEMENTATION DETAILS
Each state agency head or their designated representative and information security officer shall
establish a security strategy that includes perimeter protection.
The department will provide security information management services to include external
network monitoring, scanning, and alerting for state agencies that utilize State information
resources as specified in Texas Government Code Chapters 2054 and 2059. Perimeter security
controls may include some or all of the following components: Demilitarized Zone (DMZ),
firewall, intrusion detection or prevention system, or router.