Test 2015-01-15-1052 ([project acronym not provided]) [project id not provided] System Security Plan



Yüklə 1,74 Mb.
səhifə14/26
tarix09.01.2019
ölçüsü1,74 Mb.
#94342
1   ...   10   11   12   13   14   15   16   17   ...   26

10.0 Maintenance (MA)





10.47

System Maintenance Policy and Procedures

MA-1

Control: System Maintenance Policy and Procedures

The organization:

(a) Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:

(1) A system maintenance policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and


(2) Procedures to facilitate the implementation of the system maintenance policy and associated system maintenance controls; and

(b) Reviews and updates the current:

(1) System maintenance policy [Assignment: organization-defined frequency]; and
(2) System maintenance procedures [Assignment: organization-defined frequency].

Supplemental Guidance

This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the MA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.

Related control: PM-9.

References: NIST Special Publications 800-12, 800-100.


Status:

Implementation: Not Provided

Responsible Entitles:




10.47

Controlled Maintenance

MA-2

Control: Controlled Maintenance

The organization:

(a) Schedules, performs, documents, and reviews records of maintenance and repairs on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements;
(b) Approves and monitors all maintenance activities, whether performed on site or remotely and whether the equipment is serviced on site or removed to another location;
(c) Requires that [Assignment: organization-defined personnel or roles] explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs;
(d) Sanitizes equipment to remove all information from associated media prior to removal from organizational facilities for off-site maintenance or repairs;
(e) Checks all potentially impacted security controls to verify that the controls are still functioning properly following maintenance or repair actions; and
(f) Includes [Assignment: organization-defined maintenance-related information] in organizational maintenance records.

Supplemental Guidance

This control addresses the information security aspects of the information system maintenance program and applies to all types of maintenance to any system component (including applications) conducted by any local or nonlocal entity (e.g., in-contract, warranty, in-house, software maintenance agreement). System maintenance also includes those components not directly associated with information processing and/or data/information retention such as scanners, copiers, and printers. Information necessary for creating effective maintenance records includes, for example: (i) date and time of maintenance; (ii) name of individuals or group performing the maintenance; (iii) name of escort, if necessary; (iv) a description of the maintenance performed; and (v) information system components/equipment removed or replaced (including identification numbers, if applicable). The level of detail included in maintenance records can be informed by the security categories of organizational information systems. Organizations consider supply chain issues associated with replacement components for information systems.

Related controls: CM-3, CM-4, MA-4, MP-6, PE-16, SA-12, SI-2.

References: None.


Status:

Implementation: Not Provided

Responsible Entitles:




10.47

Controlled Maintenance

MA-2 (2)

Control: Controlled Maintenance

The organization:

(a) Employs automated mechanisms to schedule, conduct, and document maintenance and repairs; and
(b) Produces up-to date, accurate, and complete records of all maintenance and repair actions requested, scheduled, in process, and completed.

Supplemental Guidance

None.

Related controls: CA-7, MA-3.



References: None.


Status:

Implementation: Not Provided

Responsible Entitles:




10.47

Maintenance Tools

MA-3

Control: Maintenance Tools

The organization approves, controls, and monitors information system maintenance tools.

Supplemental Guidance

This control addresses security-related issues associated with maintenance tools used specifically for diagnostic and repair actions on organizational information systems. Maintenance tools can include hardware, software, and firmware items. Maintenance tools are potential vehicles for transporting malicious code, either intentionally or unintentionally, into a facility and subsequently into organizational information systems. Maintenance tools can include, for example, hardware/software diagnostic test equipment and hardware/software packet sniffers. This control does not cover hardware/software components that may support information system maintenance, yet are a part of the system, for example, the software implementing “ping,” “ls,” “ipconfig,” or the hardware and software implementing the monitoring port of an Ethernet switch.

Related controls: MA-2, MA-5, MP-6.

References: NIST Special Publication 800-88.




Status:

Implementation: Not Provided

Responsible Entitles:




10.47

Maintenance Tools

MA-3 (1)

Control: Maintenance Tools

The organization inspects the maintenance tools carried into a facility by maintenance personnel for improper or unauthorized modifications.

Supplemental Guidance

If, upon inspection of maintenance tools, organizations determine that the tools have been modified in an improper/unauthorized manner or contain malicious code, the incident is handled consistent with organizational policies and procedures for incident handling.

Related control: SI-7.

References: NIST Special Publication 800-88.




Status:

Implementation: Not Provided

Responsible Entitles:




10.47

Maintenance Tools

MA-3 (2)

Control: Maintenance Tools

The organization checks media containing diagnostic and test programs for malicious code before the media are used in the information system.

Supplemental Guidance

If, upon inspection of media containing maintenance diagnostic and test programs, organizations determine that the media contain malicious code, the incident is handled consistent with organizational incident handling policies and procedures.

Related control: SI-3.

References: NIST Special Publication 800-88.




Status:

Implementation: Not Provided

Responsible Entitles:




10.47

Maintenance Tools

MA-3 (3)

Control: Maintenance Tools

The organization prevents the unauthorized removal of maintenance equipment containing organizational information by:

(a) Verifying that there is no organizational information contained on the equipment;
(b) Sanitizing or destroying the equipment;
(c) Retaining the equipment within the facility; or
(d) Obtaining an exemption from [Assignment: organization-defined personnel or roles] explicitly authorizing removal of the equipment from the facility.

Supplemental Guidance

Organizational information includes all information specifically owned by organizations and information provided to organizations in which organizations serve as information stewards.

Related control: None.

References: NIST Special Publication 800-88.


Status:

Implementation: Not Provided

Responsible Entitles:




10.47

Nonlocal Maintenance

MA-4

Control: Non-Local Maintenance

The organization:

(a) Approves and monitors nonlocal maintenance and diagnostic activities;
(b) Allows the use of nonlocal maintenance and diagnostic tools only as consistent with organizational policy and documented in the security plan for the information system;
(c) Employs strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions;
(d) Maintains records for nonlocal maintenance and diagnostic activities; and
(e) Terminates session and network connections when nonlocal maintenance is completed.

Supplemental Guidance

Nonlocal maintenance and diagnostic activities are those activities conducted by individuals communicating through a network, either an external network (e.g., the Internet) or an internal network. Local maintenance and diagnostic activities are those activities carried out by individuals physically present at the information system or information system component and not communicating across a network connection. Authentication techniques used in the establishment of nonlocal maintenance and diagnostic sessions reflect the network access requirements in IA-2. Typically, strong authentication requires authenticators that are resistant to replay attacks and employ multifactor authentication. Strong authenticators include, for example, PKI where certificates are stored on a token protected by a password, passphrase, or biometric. Enforcing requirements in MA-4 is accomplished in part by other controls.

Related controls: AC-2, AC-3, AC-6, AC-17, AU-2, AU-3, IA-2, IA-4, IA-5, IA-8, MA-2, MA-5, MP-6, PL-2, SC-7, SC-10, SC-17.

References: FIPS Publications 140-2, 197, 201; NIST Special Publications 800-63, 800-88; CNSS Policy 15.


Status:

Implementation: Not Provided

Responsible Entitles:




10.47

Nonlocal Maintenance

MA-4 (2)

Control: Non-Local Maintenance

The organization documents in the security plan for the information system, the policies and procedures for the establishment and use of nonlocal maintenance and diagnostic connections.

Supplemental Guidance

None.


Related control: None.

References: FIPS Publications 140-2, 197, 201; NIST Special Publications 800-63, 800-88; CNSS Policy 15.




Status:

Implementation: Not Provided

Responsible Entitles:




10.47

Nonlocal Maintenance

MA-4 (3)

Control: Non-Local Maintenance

The organization:

(a) Requires that nonlocal maintenance and diagnostic services be performed from an information system that implements a security capability comparable to the capability implemented on the system being serviced; or

(b) Removes the component to be serviced from the information system and prior to nonlocal maintenance or diagnostic services, sanitizes the component (with regard to organizational information) before removal from organizational facilities, and after the service is performed, inspects and sanitizes the component (with regard to potentially malicious software) before reconnecting the component to the information system.

Supplemental Guidance

Comparable security capability on information systems, diagnostic tools, and equipment providing maintenance services implies that the implemented security controls on those systems, tools, and equipment are at least as comprehensive as the controls on the information system being serviced.

Related controls: MA-3, SA-12, SI-3, SI-7.

References: FIPS Publications 140-2, 197, 201; NIST Special Publications 800-63, 800-88; CNSS Policy 15.




Status:

Implementation: Not Provided

Responsible Entitles:




10.47

Nonlocal Maintenance

MA-4 (DHS-5.4.4.c)

Control: Non-Local Maintenance

Components shall encrypt remote maintenance paths to the firewalls and PEPs.

Related controls: MA-4 and SC-7.

References: None.




Status:

Implementation: Not Provided

Responsible Entitles:




10.47

Maintenance Personnel

MA-5

Control: Maintenance Personnel

The organization:

(a) Establishes a process for maintenance personnel authorization and maintains a list of authorized maintenance organizations or personnel;
(b) Ensures that non-escorted personnel performing maintenance on the information system have required access authorizations; and
(c) Designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations.

Supplemental Guidance

This control applies to individuals performing hardware or software maintenance on organizational information systems, while PE-2 addresses physical access for individuals whose maintenance duties place them within the physical protection perimeter of the systems (e.g., custodial staff, physical plant maintenance personnel). Technical competence of supervising individuals relates to the maintenance performed on the information systems while having required access authorizations refers to maintenance on and near the systems. Individuals not previously identified as authorized maintenance personnel, such as information technology manufacturers, vendors, systems integrators, and consultants, may require privileged access to organizational information systems, for example, when required to conduct maintenance activities with little or no notice. Based on organizational assessments of risk, organizations may issue temporary credentials to these individuals. Temporary credentials may be for one-time use or for very limited time periods.

Related controls: AC-2, IA-8, MP-2, PE-2, PE-3, PE-4, RA-3.

References: None.


Status:

Implementation: Not Provided

Responsible Entitles:




10.47

Maintenance Personnel

MA-5 (1)

Control: Maintenance Personnel

The organization:

(a) Implements procedures for the use of maintenance personnel that lack appropriate security clearances or are not U.S. citizens, that include the following requirements:

(1) Maintenance personnel who do not have needed access authorizations, clearances, or formal access approvals are escorted and supervised during the performance of maintenance and diagnostic activities on the information system by approved organizational personnel who are fully cleared, have appropriate access authorizations, and are technically qualified;

(2) Prior to initiating maintenance or diagnostic activities by personnel who do not have needed access authorizations, clearances or formal access approvals, all volatile information storage components within the information system are sanitized and all nonvolatile storage media are removed or physically disconnected from the system and secured; and

(b) Develops and implements alternate security safeguards in the event an information system component cannot be sanitized, removed, or disconnected from the system.

Supplemental Guidance

This control enhancement denies individuals who lack appropriate security clearances (i.e., individuals who do not possess security clearances or possess security clearances at a lower level than required) or who are not U.S. citizens, visual and electronic access to any classified information, Controlled Unclassified Information (CUI), or any other sensitive information contained on organizational information systems. Procedures for the use of maintenance personnel can be documented in security plans for the information systems.

Related controls: MP-6, PL-2.

References: None.




Status:

Implementation: Not Provided

Responsible Entitles:




10.47

Timely Maintenance

MA-6

Control: Timely Maintenance

The organization obtains maintenance support and/or spare parts for [Assignment: organization-defined information system components] within [Assignment: organization-defined time period] of failure.

Supplemental Guidance

Organizations specify the information system components that result in increased risk to organizational operations and assets, individuals, other organizations, or the Nation when the functionality provided by those components is not operational. Organizational actions to obtain maintenance support typically include having appropriate contracts in place.

Related controls: CM-8, CP-2, CP-7, SA-14, SA-15.

References: None.




Status:

Implementation: Not Provided

Responsible Entitles:



Yüklə 1,74 Mb.

Dostları ilə paylaş:
1   ...   10   11   12   13   14   15   16   17   ...   26




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin