old.reddit.com /r/NISTControls/.rss
NIST Controls Discussion, Resource Sharing, News, Recommendations for Solutions
Atom Feed
old.reddit.com /r/NISTControls/.rss
NIST Controls Discussion, Resource Sharing, News, Recommendations for Solutions
Atom Feed
If someone at my company is accessing CUI or ITAR data through a company VPN while in another country, is that legal? The data is stored securely on company servers with ITAR and NIST 800-171 compliant infrastructure in place for CUI. The individual is a U.S. citizen, and assuming the data remains secure and isn’t transferred to anyone else, are there any legal risks they should be aware of?
Thank you!
Hi everyone,
I’m looking for good free tutorials or resources on implementing the RMF. Ideally, something that breaks down NIST controls (like 800-53 or 800-171), explains how to implement them, and ties them to meeting CMMC requirements. If you have any recommendations, I’d greatly appreciate it. I do much better watching videos to learn, than reading. Thanks!
Looking for a SOC 2 correlation to 800 53 Rev 4 and 5. I know it may not line up directly but really needed. Anyone help me out?
The selection of security controls based on using the FIPS Publication 199 categorization for this system and NIST SP 800-53 Revision 5, the FISMA Moderate baseline of controls.
The system security categorization impact level is determined to be overall moderate. Therefore, the following entire moderate baseline controls are selected as the minimum security requirements to the control baseline. This is under NIST SP 800-53 Revision 5 Moderate Baseline 287 Controls, NIST SP 800-53 Revision 5 Privacy Baseline 96 of 96 Controls. The system processes and stores privacy-related data. Therefore, the entire NIST SP 800-53 Revision 5 Privacy Baseline controls are selected to the system's control baseline. Additional Security Controls.
It might be good to note that there are about 15 components under this system.
Can I get guidance on how to tailor the controls?
I am looking at different compliance managers to use for my company. This would be for programs we build and for the corporate network? I'd like for it to use OpenSCAP
I came across OpenRMF and want to try it out but just exploring other options. https://www.openrmf.io/
What else is out there? STIG Manager? Vulnerator?
We've been reviewing our vendor practices and are trying to sort out how to better address the destruction requirements for CUI. We are debating about whether we switch to a single-step destruction and adopt the 1mmx5mm particle size, or whether we stick with our multi-step process and its less stringent requirements.
Thus far, we've used a multi-step process for a variety of reasons. First is that we have about 20 locations around the country, and each uses a different disposal vendor, also each location maintains their vendor relationships. This translates to we don't know exactly what each of our vendors' particle sizes are, but we do know they crosscut shred and then recycle in bulk with other customer materials.
We're going to have each vendor complete a new security questionnaire (being written), but we want to make sure we start with a viable standard.
Along the way, we’ve re-reviewed NIST SP 800-88r1, the 2017 ISOO CUI Notice 2017-02 (2017-08-17), the ISOO CUI Notice 2019-03 (2019-07-15) about destroying CUI, and DCSA CUI destruction guidance version 2 (2020-03-17).
I am advocating that while we could continue to use a multi-step process having a larger particle size than the 1mmx5mm, it would be operationally easier to adopt a more stringent single-step process. Others are advocating continuing what we are doing. Still others agree with me on the single step process and particle size but would rather we purchase shredders for each location and bring it in-house.
Is there a better more comprehensive, more prescriptive document that we should reference?
Does anyone want to share how they are addressing this issue?
Trying to compare multiple CKLB files for changes and updates. WinDiff was the tool we were using to compare monthly CKL files. Is there a tool that works for CKLB files?
We are fully on GCC High, and have a lot of front line staff that rarely if ever accesses their email accounts. I'm considering dropping a lot of them entirely. Just wondering if anyone else out there operates in this way.
I understand that determining limits depends largely on the business, understanding of the risk, business requirements, etc.
but my question is are limits defined anywhere in that a system must be patched by some certain time of discovering the vulnerability?
this is an extremely complex hill for us to climb as some systems are legacy and or proprietary. they are entirely closed off systems and have no access to the internet. in some cases some of these systems will never be patched, they will instead be replaced.
would help to understand any CMMC / NIST defined limits or best practices.
thanks
I know 800-190 maps some but does anything have a current mapping of what controls need to be applied to different containers? As well as STIGs/SRGs to follow?
is there a control evaluation or gap analysis excel sheet available for NIST AI RMF? Kindly share some insights.Thank you so much.
(Cross-posted with r/CMMC .)
Hi, folks. Looking for some advice.
Assume that the strategy for protecting CUI at rest on laptops is Bitlocker (FIPS compliant of course).
Would an auditor inquire or care as to whether the WDE password is:
If the last applies--that is, if an auditor is going to ask "How do you KNOW that users aren't using the default Bitlocker password?", do you have a solution for that?
TIA
I totally understand that this is NIST controls sub, however there are folks here who have cross walked across various standards and with much more experience than I.
I am doing an assessment where I am stuck on real life understanding
CIS 13.9 Deploy Port-Level Access Control:
Deploy port-level access control. Port-level access control utilizes 802.1x, or similar network access control protocols, such as certificates, and may incorporate user and/or device authentication.
Does this now apply to ALL wired ports on the network? TBH, outside of the DOD, I have yet to see an environment where wired port access is 802.1x controlled. Which means if the site is deploying a desktop on that port, especially a domain joined Windows computers, it might get tricky.
On the wireless side the site is 802.1x. But not on the wired side. The way I am reading the control, it seems to be requiring that wired ports be 802.1x authenticated.
Hi everyone, I am a designer that was hired to help design a GRC tool MVP. I have no prior domain experience but I’m eager to learn! Please be kind :)
I’m coming to all of you amazing SMEs for help, I’ll take all the info and advice you want to give me! Thank you in advance!
Knowledge I have so far: - an overview of the RMF process - some concepts of personas involved but not the nuances (e.g., small org vs large org) - some concepts of risk baselines and tailoring controls - some concepts of controls to assessment objectives and assessment procedures - some concepts of evidence and implementation statements - Some concepts of an SSP - we’re wanting to start with NIST 800-53 rev 5 controls management with OSCAL and inheritance through system components that other systems can inherit through a component library.
Things I could use help on: - Educational resources - The must-knows for someone in my position - Your idea of what the perfect GRC tool MVP looks like (necessary features and magic wand features) - Any pitfalls to avoid - Best existing tools to reference great UX/UI - Any one that would be interested in testing a prototype!
Anyone have a link to an SSP in a more readable format other than the one provided by NIST?
Howdy y’all!
Fresh to the ISSO world and looking for some help. I work with mostly standalone MUSAs and small P2P s and was stumped on which tools to use for auditing requirements… do y’all just use event viewer or is there some good solutions..?
Since the requirement (and recommendation *NOT* to rotate passwords frequently) was changed and the recommendation is to only change passwords when there's a suspected breach of the credentials... Does that mean PIEE is being compromised every 60 days?
Has anyone gotten the Cisco_IOS_XE_Router to work with the guidance provided by DISA? Looking for some pointers to get it working.
Hi all,
I had a quick question, I am mostly familiar with 800-53. I am helping with some privacy components, and I have a cloud SaaS that has a ISO 27018 certification as well as 27001.
The customer has not completed for example incident response protocols with the cloud provider, etc.. How does the ISO 27018 look at those when they are assessed "just" as a provider.
Everywhere I look it seems that PII processing at the ISO 27018 is assessed considering the customer (I dont have access to the ISO control list, so I am a bit blind)
How do they contuct ISO 27018 audits without a customer, obtain a certification and the certification basically extends to the customer... I am scratching my head a bit on this one. Unless the provider is bound to establish processes with the customer, in which case I would have no evidence for.
Thank you all! Hopefully this was a clear question, I am just a bit questionning my reasoning here.
Background:
We are a small federal consulting company about 100 employees. We have been working with our MSP on going through our processes and controls as we prepare for CMMC Level 2 and pretty comfortable with where we are at, however, we are now taking a look at GCC High to see if it's worth going the extra mile to not only be CMMC audit ready but also if the cost of having GCCH could be worth the appeal to future potential DoD clients and projects.
What we currently have: About a quarter of employees have Microsoft 365 Business Premium licenses and 75% use Business Basic. We use PreVeil Business plan (about 10 seats) to handle our CUI documents.
Questions:
Does anyone have insight on costs for GCC high for a company this size?
Would only employees that work with CUI need GCC high while the other employees remain with Business Basic plan? Or does GCCH have to be applied to the enterprise?
Folks, I have written this in an attempt to simplify a pain I felt. Beginning to write the SSP felt overwhelming and I wrote the article to help somewhat simplify and ease that process. It isnt by any way a complete guide however I would be very much indebted to get some constructive feedback to improve this and help build more useful pieces of text in the future. Also please let me know if I got anything wrong with my limited knowledge, I wouldnt want to share any form of inaccurate information through my write ups.
Moderators I am unsure if this is against the rules, If so please let me know I would be more than happy to remove and keep the sanctity of this forum.
Is there a way to get "official answer/clarification" about some of the nist controls ?
I seems to have a bit of disagreement with fedramp pmo/advisors and look for "ultimate authority" for interpretation of controls
(control in question was discussed in this subreddit, and based on the discussion my interpretation is correct. but as I am unable to point to here as to official source of wisdom, i look for other possibilities)
I need recommendation of a software that we can use for remote desktop other team members. We currently use Quick Assist but looks like it does comply with NIST standard. We a small company of less than 10 people and starting our NIST compliance journey. We operate 100% remote using Microsoft 365 Business and NordLayer VPN.
I have been trying to gain an understanding on what specific artifact/evidence that should be requested per specific selected controls. To include tailored questions that can be used as a guide to gather information for writing implementation statements.
Background: Currently going through my first full start to finish RMF process for ATO. I am assisting ISSO’s, ISSM’s, and other stakeholders with writing the control implementation statements while also gathering artifacts/evidence. The system has 15 components and 188 controls we are working on writing implementation statements per each component. With that comes with meeting with the appropriate POC per components and interview them to gain knowledge on the processes and how these components are being used in the main system.
Does somebody have some sort of guide for internal auditing? Maybe an artifact request list?
I’ve worked as an ISSO for a while, and im looking to get back into this line of work.
Ive gone through the quarterly ConMon checklist for the SAP I work in. But who actually writes the ConMon spreadsheet? Why are those controls selected? Is it written prior to the ATO by an ISSO/ISSM or is given to the program by the customer? Is it based on your Risk Assessment Report?